WorldWideScience

Sample records for security officers revision

  1. 75 FR 36126 - Office of New Reactors; Proposed Revision to Standard Review Plan Section 13.6.1, Revision 1 on...

    Science.gov (United States)

    2010-06-24

    ... Standard Review Plan Section 13.6.1, Revision 1 on Physical Security--Combined License and Operating...), Section 13.6.1 on ``Physical Security--Combined License and Operating Reactors,'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML100350158). The Office of Nuclear Security and...

  2. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  3. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  4. 75 FR 29588 - Office of New Reactors: Proposed NUREG-0800; Standard Review Plan Section 13.6.6, Draft Revision...

    Science.gov (United States)

    2010-05-26

    ...; Standard Review Plan Section 13.6.6, Draft Revision 0 on Cyber Security Plan AGENCY: Nuclear Regulatory... Plants,'' on a proposed Standard Review Plan (SRP) Section 13.6.6 on ``Cyber Security Plan'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML093560837). The Office of Nuclear Security...

  5. 12 CFR 605.501 - Information Security Officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  6. Nuclear security officer training

    International Nuclear Information System (INIS)

    Harrington, W.F.

    1981-01-01

    Training has become complex and precise in today's world of critical review and responsibility. Entrusted to a security officer is the success or demise of large business. In more critical environments the security officer is entrusted with the monitoring and protection of life sensitive systems and devices. The awareness of this high visibility training requirement has been addressed by a limited few. Those involved in the nuclear power industry through dedication and commitment to the American public have without a doubt become leading pioneers in demanding training excellence

  7. 18 CFR 3a.51 - Designation of security officers.

    Science.gov (United States)

    2010-04-01

    ... Top Secret Control Officer and Security Officer for classified material for the Federal Power Commission. The Director, OAO, will designate alternate Top Secret Control Officers and alternated Security... the duties for which the Top Secret Control Officer and Security Officer is responsible. As used...

  8. 12 CFR 568.2 - Designation of security officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Designation of security officer. 568.2 Section 568.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.2 Designation of security officer. Within 30 days after the effective date of insurance of...

  9. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  10. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  11. 41 CFR 105-53.133 - Information Security Oversight Office.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Information Security... FUNCTIONS Central Offices § 105-53.133 Information Security Oversight Office. (a) Creation and authority. The Information Security Oversight Office (ISOO), headed by the Director of ISOO, who is appointed by...

  12. 77 FR 61771 - Facility Security Officer Training Requirements

    Science.gov (United States)

    2012-10-11

    ... following: (1) Draft model FSO training course; (2) Computer-based training and distance learning; (3... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... Security Officer training program, with the primary focus on developing the curriculum for such a program...

  13. Offices of Industrial Security International: A Review

    National Research Council Canada - National Science Library

    Sands, W

    1998-01-01

    The Defense Security Service (DSS), formerly the Defense Investigative Service (DIS), handles many of its overseas industrial security issues through its Offices of Industrial Security International...

  14. Infectious disease protection for healthcare security officers.

    Science.gov (United States)

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  15. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Science.gov (United States)

    2012-10-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... comments on the development of a Facility Security Officer training program. The notice contains an inaccurate Internet link to RSVP for the public meeting. DATES: The notice of public meeting; request for...

  16. Carlsbad Area Office strategic plan, March 1995. Revision 1

    International Nuclear Information System (INIS)

    1995-03-01

    This edition of the Carlsbad Area Office Strategic Plan captures the US Department of Energy's (DOE's) new focus, and supersedes the edition issued previously (DOE, 1993a). This revision reflects: a revised strategy designed to demonstrate compliance with environmental regulations earlier than the previous course of action; and a focus on establishment of standardized transuranic waste characterization and acceptance criteria for disposal facilities

  17. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Office of Nuclear Security and Incident Response. 1.46... Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear... evaluation and assessment of technical issues involving security at nuclear facilities, and is the agency...

  18. 42 CFR 401.130 - Materials available at social security district offices and branch offices.

    Science.gov (United States)

    2010-10-01

    ... (HIM-10). (13) Home Health Agency Manual (HIM-11). (14) Outpatient Physical Therapy Provider Manual... social security district offices and branch offices: (1) Claims Manual of the Social Security Administration. (2) Department Staff Manual on Organization, Department of Health and Human Services, Part F, CMS...

  19. Use of Security Officers on Inpatient Psychiatry Units.

    Science.gov (United States)

    Lawrence, Ryan E; Perez-Coste, Maria M; Arkow, Stan D; Appelbaum, Paul S; Dixon, Lisa B

    2018-04-02

    Violent and aggressive behaviors are common among psychiatric inpatients. Hospital security officers are sometimes used to address such behaviors. Research on the role of security in inpatient units is scant. This study examined when security is utilized and what happens when officers arrive. The authors reviewed the security logbook and the medical records for all patients discharged from an inpatient psychiatry unit over a six-month period. Authors recorded when security calls happened, what behaviors triggered security calls, what outcomes occurred, and whether any patient characteristics were associated with security calls. A total of 272 unique patients were included. A total of 49 patients (18%) generated security calls (N=157 calls). Security calls were most common in the first week of hospitalization (N=45 calls), and roughly half of the patients (N=25 patients) had only one call. The most common inciting behavior was "threats to persons" (N=34 calls), and the most common intervention was intramuscular antipsychotic injection (N=49 calls). The patient variables associated with security calls were having more than one prior hospitalization (odds ratio [OR]=4.56, p=.001, 95% confidence interval [CI]=1.80-11.57), involuntary hospitalization (OR=5.09, pSecurity officers were often called for threats of violence and occasionally called for actual violence. Patient variables associated with security calls are common among inpatients, and thus clinicians should stay attuned to patients' moment-to-moment care needs.

  20. 75 FR 55529 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative

    Science.gov (United States)

    2010-09-13

    ... 3002 Definitions of Words and Terms Add an additional office within components--the Office of Selective... (b) of HSAR section 3003.1004 advises contracting officers that special posters and instructions may... DHS Hotline Poster described in the clause at FAR 52.203-14. Part 3004 Administrative Matters Revise...

  1. Prototype of smart office system using based security system

    Science.gov (United States)

    Prasetyo, T. F.; Zaliluddin, D.; Iqbal, M.

    2018-05-01

    Creating a new technology in the modern era gives a positive impact on business and industry. Internet of Things (IoT) as a new communication technology is very useful in realizing smart systems such as: smart home, smart office, smart parking and smart city. This study presents a prototype of the smart office system which was designed as a security system based on IoT. Smart office system development method used waterfall model. IoT-based smart office system used platform (project builder) cayenne so that. The data can be accessed and controlled through internet network from long distance. Smart office system used arduino mega 2560 microcontroller as a controller component. In this study, Smart office system is able to detect threats of dangerous objects made from metals, earthquakes, fires, intruders or theft and perform security monitoring outside the building by using raspberry pi cameras on autonomous robots in real time to the security guard.

  2. Target assignment for security officers to K targets (TASK)

    International Nuclear Information System (INIS)

    Rowland, J.R.; Shelton, K.W.; Stunkel, C.B.

    1983-02-01

    A probabilistic algorithm is developed to provide an optimal Target Assignment for Security officers to K targets (TASK) using a maximin criterion. Under the assumption of only a limited number (N) of security officers, the TASK computer model determines deployment assignments which maximize the system protection against sabotage by an adversary who may select any link in the system, including the weakest, for the point of attack. Applying the TASK model to a hypothetical nuclear facility containing a nine-level building reveals that aggregate targets covering multiple vital areas should be utilized to reduce the number of possible target assignments to a value equal to or only slightly larger than N. The increased probability that a given aggregate target is covered by one or more security officers offsets the slight decrease in interruption probability due to its occurring earlier in the adversary's path. In brief, the TASK model determines the optimal maximin deployment strategy for limited numbers of security officers and calculates a quantitative measure of the resulting system protection

  3. The Office of Safeguards and Security Nonproliferation Support Program

    International Nuclear Information System (INIS)

    Desmond, W.J.

    1996-01-01

    The Nonproliferation Support Program was established in the Department of Energy, Office of Safeguards and Security on october 1, 1995. its mission includes providing assistance to Departmental efforts for improved international material protection, control and accounting programs by coordinating and leveraging domestic safeguards and security policy, practice and experience into the international arena. A major objective of the program is to balance US national security requirements with global support of the nonproliferation objectives. This paper describes the organization of the Office of Safeguards and Security and the Nonproliferation Support Program role and responsibility, and presents some of the current areas of program emphasis and activity

  4. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  5. Underground Test Area Fiscal Year 2012 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2013-01-01

    This report is mandated by the Underground Test Area (UGTA) Quality Assurance Project Plan (QAPP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2012. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2012. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, revising the QAPP, and publishing documents. In addition, processes and procedures were developed to address deficiencies identified in the FY 2011 QAPP gap analysis.

  6. Office of Safeguards and Security - Operational Interface

    International Nuclear Information System (INIS)

    Hammond, G.A.

    1987-01-01

    The mission of the Office of Safeguards and Security (OSS), Department of Energy (DOE) is to: Develop policy and programs to protect DOE facilities, nuclear materials, and classified information; Provide oversight for safeguards and security operations; Direct research and development (RandD) to support the protection program; and Strengthen international safeguards in support of nonproliferation policy. Objectives are to maintain an integrated safeguards and security system that is effective against a wide range of threats, and do so in a manner to minimize impacts on facility operation. Implementation is the responsibility of field offices and contractors operating DOE facilities. The OSS-operational interface is the focus of this discussion with emphasis on RandD to meet user needs. The scope and project selection process will be discussed along with information required for evaluation, and field operational planning and budgeting commitments to permit implementation of successful RandD results

  7. Tentative job analysis for a high-level, fixed-site, nuclear security officer

    International Nuclear Information System (INIS)

    Adams, K.G.; Trujillo, A.A.

    1977-10-01

    A tentative job analysis for a high-level, fixed-site, nuclear security officer is presented. The primary objective of the report is to provide a framework for evaluating the functions of a security officer in physical protection systems. Several job requirements related to duties, basic skills, personal contacts, supervision, working conditions, and decision making are presented. Individual character traits desirable in security officers are described

  8. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Science.gov (United States)

    2011-10-07

    ... Office of Disaster Management and National Security AGENCY: Office of the Secretary, HUD. ACTION: Notice... Succession for the Office of Disaster Management and National Security. This is the first order of succession... L. McClure, Acting Chief Disaster and National Security Officer, Office of Disaster Management and...

  9. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Science.gov (United States)

    2010-11-05

    ... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...

  10. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-09-01

    Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.

  11. The chief information security officer insights, tools and survival skills

    CERN Document Server

    Kouns, Barry

    2011-01-01

    Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills.

  12. Policy revision in health enterprise information security: P3WG final report

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2003-05-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center (TATRC), TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG) examined military policies and regulations relating to computer-based information systems and medical records management. Using an interdisciplinary and interservice QA approach they compared existing military policies with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to identify gaps and discrepancies. The final report, including a plain English explanation of the individual standards and relevance to the Department of Defense (DoD), a comparative analysis and recommendations, will feed in to the security management process and HIPAA implementation efforts at multiple levels within the DoD. In light of High Reliability Theory, this process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains, building consensus on key policy reforms among military stakeholders across different disciplines, levels of command hierarchy and services.

  13. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Science.gov (United States)

    2010-07-01

    ... Information Security Oversight Office. 2400.19 Section 2400.19 National Defense Other Regulations Relating to... SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19 Declassification by the Director of the Information Security Oversight Office. If the Director of the Information...

  14. 12 CFR 563g.17 - Sales of securities at an office of a savings association.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Sales of securities at an office of a savings association. 563g.17 Section 563g.17 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.17 Sales of securities at an office of a savings association. Sales of...

  15. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  16. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  17. 12 CFR 551.150 - How do my officers and employees file reports of personal securities trading transactions?

    Science.gov (United States)

    2010-01-01

    ... of personal securities trading transactions? 551.150 Section 551.150 Banks and Banking OFFICE OF... TRANSACTIONS Securities Trading Policies and Procedures § 551.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 551.140(d) must...

  18. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participant’s requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  19. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... Security, Washington, DC 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- [[Page...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  20. ‘Persons of versatility’: private security officers and private policing in residential estates in Hong Kong

    OpenAIRE

    Kwong, Wilkie

    2013-01-01

    This study is the result of exploratory research on the daily lives and experiences of private security officers working in Hong Kong housing estates. As the first qualitative investigation of its kind, it examined two case studies of separate estates through the lens of Nodal Governance, which involved interviews with security practitioners and end-users, work practice observations, and documentary analysis. Security officers were found to ‘wear many hats’. Apart from crime prevention, the ...

  1. 24 CFR 960.505 - Occupancy by police officers to provide security for public housing residents.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Occupancy by police officers to... HOUSING Occupancy by Over-Income Families or Police Officers § 960.505 Occupancy by police officers to provide security for public housing residents. (a) Police officer. For purpose of this subpart E, “police...

  2. Revised IAEA Code of Conduct on the Safety and Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Wheatley, J. S.

    2004-01-01

    The revised Code of Conduct on the Safety and Security of Radioactive Sources is aimed primarily at Governments, with the objective of achieving and maintaining a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations; and through the fostering of international co-operation. It focuses on sealed radioactive sources and provides guidance on legislation, regulations and the regulatory body, and import/export controls. Nuclear materials (except for sources containing 239Pu), as defined in the Convention on the Physical Protection of Nuclear Materials, are not covered by the revised Code, nor are radioactive sources within military or defence programmes. An earlier version of the Code was published by IAEA in 2001. At that time, agreement was not reached on a number of issues, notably those relating to the creation of comprehensive national registries for radioactive sources, obligations of States exporting radioactive sources, and the possibility of unilateral declarations of support. The need to further consider these and other issues was highlighted by the events of 11th September 2001. Since then, the IAEA's Secretariat has been working closely with Member States and relevant International Organizations to achieve consensus. The text of the revised Code was finalized at a meeting of technical and legal experts in August 2003, and it was submitted to IAEA's Board of Governors for approval in September 2003, with a recommendation that the IAEA General Conference adopt it and encourage its wide implementation. The IAEA General Conference, in September 2003, endorsed the revised Code and urged States to work towards following the guidance contained within it. This paper summarizes the history behind the revised Code, its content and the outcome of the discussions within the IAEA Board of Governors and General Conference. (Author) 8 refs

  3. 76 FR 21768 - Privacy Act of 1974; Department of Homeland Security/Office of Health Affairs-001 Contractor...

    Science.gov (United States)

    2011-04-18

    ... Homeland Security, Washington, DC 20520. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0013] Privacy Act of... Immunization Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  4. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0055] Privacy Act of... Operations Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  5. 77 FR 50631 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative [HSAR Case 2009-002

    Science.gov (United States)

    2012-08-22

    ..., provides guidance and direction for compliance with green purchasing and other sustainable practices...--IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST 0 14. Revise section 3003.101-3 to read as follows: 3003.101-3 Agency regulations. The United States Office of Government Ethics has promulgated...

  6. Accessibility and security of digital records in the Office of the ...

    African Journals Online (AJOL)

    Accessibility and security of digital records in the Office of the Premier in ... preservation and accessibility of digital records for effective e-governance. ... Questionnaires, interviews, observations and document analysis were used to collect data. ... be knowledgeable in the use of the technologies that generate digital records.

  7. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  8. Overlapping values, mutual prejudices. Empirical research into the ethos of police officers and private security guards

    NARCIS (Netherlands)

    van Steden, R.; van der Wal, Z.; Lasthuizen, K.M.

    2015-01-01

    What determines professional motivations and values of security operatives: sector or profession? Our article aims to answer this question through a survey study among police officers (n = 405) and private security guards (n = 329) in the Netherlands. Our results show that both groups closely

  9. U.S. statutes of general interest to safeguards and security officers

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1988-01-01

    A handbook of enforcement provisions of Federal law and regulations was prepared for use by U.S. DOE Security Inspectors. This handbook provides security inspectors for the U.S. Department of Energy, security officers at Nuclear Regulatory Licensee facilities, and others with a single document containing most of the Federal law provisions available to assist them in enforcing agency regulations. The handbook contains selected enforcement provisions of Titles 18, 42 and 50 of the United States Code (USC). Topical coverage of Title 18 includes Espionage and Misrepresentation or Impersonation; Theft and Embezzlement; Malicious Mischief; Conspiracy; Search and Seizure. A miscellaneous section deals with explosives, blackmail, firearms, and other subjects. Certain enforcement sections of Title 42 of the USC (The Atomic Energy Act) and of the Internal Security Act of the United States Code (Title 50) are also provided. Finally, relevant parts of the Federal Property Management Regulations of Title 50, Chapter 101 of the Code of Federal Regulations are presented. A comprehensive index is provided based on key words

  10. 15 CFR 758.7 - Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs...

    Science.gov (United States)

    2010-01-01

    ... forfeiture. In addition to the authority of Customs officers to seize and detain items, both Customs... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs offices and Postmasters in clearing shipments 758.7...

  11. 76 FR 23630 - Office of New Reactors; Proposed Revision 2 to Standard Review Plan, Section 1.0 on Introduction...

    Science.gov (United States)

    2011-04-27

    ... Standard Review Plan, Section 1.0 on Introduction and Interfaces AGENCY: Nuclear Regulatory Commission (NRC... Revision 2 to Standard Review Plan (SRP), Section 1.0, ``Introduction and Interfaces'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML110110573). The Office of New Reactors (NRO...

  12. [An overview on the collation and revision of medical books by the Bureau for Revising Medical Books in the Northern Song Dynasty].

    Science.gov (United States)

    Meng, Yongliang; Liang, Yongxuan

    2014-07-01

    The Bureau for Revising Medical Books was a temporary agency established by the government of the Northern Song Dynasty in 1057, the 2nd year of Jiayou of Emperor Renzong, exclusively for the edition, revision and publishing of ancient medical books. 11 medical books were revised and edited by 13 Bureau members in a period of 12 years until 1069, the 2nd year of Xining of Emperor ShenZong, which eventually became the final versions until today. 8 medical books were initially planned for the revision, but 11 were actually completed in the end. The time for completing a revision varied from over 10 years at most to less than 1 year at least. Instead of working in the office, the officers of the Bureau for Revising Medical Books did their works at home. The members of the said Bureau came from the Tiju officer of the Bureau for Revising Medical Books and the officials of revising medical books, consisting of both Confucian ministers and medical officers. Confucian ministers played an important role in revising medical books. The Bureau had a strict workflow in electing revising officials, making the project, and the determination of the principles and arrangements of the tasks of editing and proofreading.

  13. 76 FR 67472 - Order of Succession for the Office of the Chief Information Officer

    Science.gov (United States)

    2011-11-01

    ...: Juanita Galbreath, Deputy Chief Information Officer for Cyber Security and Privacy, Office of the Chief...) Deputy Chief Information Officer, for IT Operations; (3) Deputy Chief Information Officer, for Cyber Security and Privacy; (4) Deputy Chief Information Officer, for Business and IT Modernization. These...

  14. A fear of coercion and accountability? Security officers and the non-use of force

    NARCIS (Netherlands)

    Eski, Y.

    2017-01-01

    Based on fieldwork among operational security officers working in the Hamburg and Rotterdam ports, it became clear these frontline port policing professionals possess a critical, even fearful attitude towards coercion while performing their duties in the ports. The power of arrest and the

  15. 75 FR 6413 - Office of New Reactors; Proposed Revision to Standard Review Plan, Section 14.3.12 on Physical...

    Science.gov (United States)

    2010-02-09

    ... Standard Review Plan, Section 14.3.12 on Physical Security Hardware Inspections, Tests, Analyses, and.... SUMMARY: The NRC is soliciting public comment on NUREG-0800, ``Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants,'' on a proposed Revision 1 to Standard Review Plan (SRP...

  16. Microsoft® Office Communications Server 2007 R2 Resource Kit

    CERN Document Server

    Maximo, Rui; Ramanathan, Rajesh; Kamdar, Nirav

    2009-01-01

    In-depth, comprehensive, and fully revised for R2-this RESOURCE KIT delivers the information you need to deploy, manage, and troubleshoot Microsoft Office Communications Server 2007 R2. Get technical insights, scenarios, and best practices from those who know the technology best-the engineers who designed and developed it-along with 90+ Windows PowerShell™ scripts, bonus references, and other essential resources on CD. Get expert advice on how to: Plan server roles, infrastructure, topology, and securityDesign and manage enterprise instant messaging (IM), presence, and conferencing solutio

  17. 48 CFR 15.307 - Proposal revisions.

    Science.gov (United States)

    2010-10-01

    ... AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Source Selection 15.307 Proposal revisions. (a) If an... allow proposal revisions to clarify and document understandings reached during negotiations. At the... submit a final proposal revision. The contracting officer is required to establish a common cut-off date...

  18. 2009.3 Revision of the Evaluated Nuclear Data Library (ENDL2009.3)

    Energy Technology Data Exchange (ETDEWEB)

    Thompson, I. J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Beck, B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Descalle, M. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mattoon, C. M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Jurgenson, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-11-06

    LLNL's Computational Nuclear Data and Theory Group have created a 2009.3 revised release of the Evaluated Nuclear Data Library (ENDL2009.3). This library is designed to support LLNL's current and future nuclear data needs and will be employed in nuclear reactor, nuclear security and stockpile stewardship simulations with ASC codes. The ENDL2009 database was the most complete nuclear database for Monte Carlo and deterministic transport of neutrons and charged particles. It was assembled with strong support from the ASC PEM and Attribution programs, leveraged with support from Campaign 4 and the DOE/Office of Science's US Nuclear Data Program. This document lists the revisions and fixes made in a new release called ENDL2009.3, by com- paring with the existing data in the previous release ENDL2009.2. These changes are made in conjunction with the revisions for ENDL2011.3, so that both the .3 releases are as free as possible of known defects.

  19. The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent

    Science.gov (United States)

    2015-09-01

    and M. Epstein, “ Millennials and the World of Work: An Organizational and Management Perspective,” Journal of Business and Psychology, Vol. 25, 2010...Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent FOR THIS AND OTHER PUBLICATIONS, VISIT US AT http://www.carlisle.army.mil...SUBTITLE The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  20. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  1. Annual Waste Minimization Summary Report for the National Nuclear Security Administration Nevada Site Office

    International Nuclear Information System (INIS)

    Alfred J. Karns

    2007-01-01

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U. S. Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during CY06. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit ((number s ign)NEV HW0021) and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the DOE, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume and toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO

  2. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Bjornstad, D.J.; Curlee, T.R. (Oak Ridge National Lab., TN (United States)); Bohi, D.R. (Resources for the Future, Inc., Washington, DC (United States))

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab.

  3. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    International Nuclear Information System (INIS)

    Bjornstad, D.J.; Curlee, T.R.; Bohi, D.R.

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab

  4. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  5. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  6. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  7. Questions and answers based on revised 10 CFR Part 20

    International Nuclear Information System (INIS)

    Borges, T.; Stafford, R.S.; Lu, P.Y.; Carter, D.

    1994-05-01

    NUREG/CR-6204 is a collection of questions and answers that were originally issued in seven sets and which pertain to revised 10 CFR Part 20. The questions came from both outside and within the NRC. The answers were compiled and provided by NRC staff within the offices of Nuclear Reactor Regulation, Nuclear Material Safety and Safeguards, Nuclear Regulatory Research, the Office of State Programs, and the five regional offices. Although all of the questions and answers have been reviewed by attorneys in the NRC Office of the General Counsel, they do not constitute official legal interpretations relevant to revised 10 CFR Part 20. The questions and answers do, however, reflect NRC staff decisions and technical options on aspects of the revised 10 CFR Part 20 regulatory requirements. This NUREG is being made available to encourage communication among the public, industry, and NRC staff concerning the major revisions of the NRC's standards for protection against radiation

  8. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  9. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    Science.gov (United States)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  10. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  11. Contemporary, emerging, and ratified wireless security standards: an update for the networked dental office.

    Science.gov (United States)

    Mupparapu, Muralidhar

    2006-02-15

    Wireless networking is not new to contemporary dental offices around the country. Wireless routers and network cards have made access to patient records within the office handy and, thereby, saving valuable chair side time and increasing productivity. As is the case with any rapidly developing technology, wireless technology also changes with the same rate. Unless, the users of the wireless networking understand the implications of these changes and keep themselves updated periodically, the office network will become obsolete very quickly. This update of the emerging security protocols and pertaining to ratified wireless 802.11 standards will be timely for the contemporary dentist whose office is wirelessly networked. This article brings the practicing dentist up-to-date on the newer versions and standards in wireless networking that are changing at a fast pace. The introduction of newer 802.11 standards like super G, Super AG, Multiple Input Multiple Output (MIMO), and pre-n are changing the pace of adaptation of this technology. Like any other rapidly transforming technology, information pertaining to wireless networking should be a priority for the contemporary dentist, an eventual end-user in order to be a well-informed and techno-savvy consumer.

  12. Introduction to Sonar, Revision.

    Science.gov (United States)

    1976-01-01

    own ship anddesign e andm constructiones ofmmechanicale andthe the target, measured in the deck plane. Thiserni equipntto ovehicol quantity is...attention of your security 6. You may associate with non-citizens on officer or commanding officer. State the facts: a close social basis. However, any...Rank/Rate Designator Social Security Number COURSE COMPLETION Letters of satisfactory completion are issued only to personnel whose courses are

  13. Progress report for the Office of Safeguards and Security for FY 1982

    International Nuclear Information System (INIS)

    Smith, D.H.; McKown, H.S.; Walker, R.L.; Sherman, R.L.; Pritchard, C.A.; Carter, J.A.

    1982-12-01

    Progress in various areas funded by, or of interest to, the Office of Safeguards and Security during FY 1982 is reported. The quadrupole mass spectrometer and its mobile laboratory visited several sites; results were uniformly excellent. We designed, built, and evaluated a new ion source for this instrument; as a result, performance is considerably enhanced. We have completed initial evaluation of lutetium for use as a double spike in calibrating holding tanks or other vessels of indeterminate volume. Precisions and accuracies of about 0.1% were obtained. Two uranium standards have been evaluated using NBS isotopic standards and SALE samples

  14. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  15. 32 CFR 700.826 - Physical security.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Physical security. 700.826 Section 700.826... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate... officer shall take action to protect and maintain the security of the command against dangers from fire...

  16. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  17. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  18. 17 CFR 200.26a - Office of Information Technology.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible...

  19. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    This document includes the US Nuclear Regulatory Commission`s (NRC`s or Commission`s) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC`s policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees` health and safety, the common defense and security, and the environment.

  20. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    International Nuclear Information System (INIS)

    1998-05-01

    This document includes the US Nuclear Regulatory Commission's (NRC's or Commission's) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC's policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees' health and safety, the common defense and security, and the environment

  1. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records... two Privacy Act Systems of Records entitled ``Information on Persons Disqualified from the...

  2. Reviewing and reforming policy in health enterprise information security

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2001-08-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center, TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG), examined military policies and regulations relating to computer-based information systems and medical records management. Using a system of templates and matrices created for the purpose, P3WG identified gaps and discrepancies in DoD and service compliance with the proposed Health Insurance Portability and Accountability Act (HIPAA) Security Standard. P3WG represents an unprecedented attempt to coordinate policy review and revision across all military health services and the Office of Health Affairs. This method of policy reform can identify where changes need to be made to integrate health management policy and IT policy in to an organizational policy that will enable compliance with HIPAA standards. The process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains.

  3. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  4. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  5. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  6. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  7. The Relationship Between Job Stress, Job Satisfaction, and the Symptom Checklist-90-Revision (SCL-90-R in Marine Officers on Board

    Directory of Open Access Journals (Sweden)

    Jae Hee Kim

    2016-11-01

    Full Text Available Objectives This study was conducted to investigate the relationships among job stress, job satisfaction, and mental health in marine officers. Methods The researchers gathered data on marine officers working at a harbor in Chungcheong Province, South Korea, using a self-reported questionnaire. Mental health was measured by the Symptom Checklist-90-Revision (SCL-90-R, and general characteristics including socioeconomic factors, job stress, and job satisfaction were measured by structured questionnaires. Multiple regression analysis was performed to investigate the relationships among job stress, job satisfaction, and mental health status according to the symptom dimensions of the SCL-90-R. Results Among the marine officers, obsessive-compulsive behavior, depression, and somatization were the most problematic symptoms. Those who reported poor health, low job satisfaction, and high job stress had a higher prevalence of psychoticism, somatization, depression, anxiety, and phobic anxiety. Conclusions An occupational health system should be introduced that would regularly check the mental health of marine officers in charge of ships and sailors, in order to help reduce their stress levels, enhance their job satisfaction, and thereby improve their mental health.

  8. Underground Test Area Fiscal Year 2013 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2013. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2013. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. In addition, integrated UGTA required reading and corrective action tracking was instituted.

  9. Converting a major dosimetry service from film to optically stimulated luminescence dosemeters including revision of the 'back-office' software

    International Nuclear Information System (INIS)

    Perks, Christopher A.; Faugoin, Stephane; Serise, Bertrand; Prugnaud, Brice; Million, Marc

    2008-01-01

    Full text: In our offices at Fontenay-aux-Roses we provide personal dosimetry for over 100,000 participants. During 2005/6 we transformed our operations from film dosemeters to those using Optically Stimulated Luminescence (InLight (Trade Mark)). The opportunity was taken to fully overhaul our operational procedures and we are currently completely reworking our 'back-office' software support. The change from film to InLight dosimetry has involved: 1) The installation of new readers at our offices in Fontenay-aux Roses; 2) The installation of a physical badge archiving system; 3) Complete revision of the operational flow to optimise the benefits of the new service; 4) Maintenance of our approval to operate a personal dosimetry service in France; 5) Considerable liaison between our office in Fontenay-aux-Roses and our Glenwood, USA, parent company to enable complete integration of the processes; and 6) Maintaining the service throughout the changeover and keeping client satisfaction high. Having changed the physical environment we are now completely renewing the back office software and systems in support of the dosimetry service. This ranges in scope from entering new clients, client support, all aspects of the dosimetry operations and chain of custody of the dosemeters and participants records and reports. This system is being rolled out in sections and it is envisaged that it will be fully implemented at the start of 2008. A key feature is that continuing improvement and the possibility of future developments of our services is in-built into the philosophy of the new back-office system. The nature of the new system, its benefits to our own operations and, in particular, clients will be discussed. (author)

  10. Near field communication (NFC) model for arduino uno based security systems office system

    Science.gov (United States)

    Chairunnas, A.; Abdurrasyid, I.

    2018-03-01

    Currently, many offices or companies that start growing rapidly in a company or office should have a very limited room to enter only people entitled to enter the room and use the facilities contained in it, for example, Files in it must have many files and documents very important because to reduce the abuse of files and irresponsible person. Because it will be made room door security system by using Near Field Communication on android smartphone. Software used is Arduino IDE. The tools used in this system are Arduino Uno R3, NFC shield, pear sensor, bell, led, servo, 16 × 2 LCD, and Near Field Communication (NFC) in android smartphone. This system runs based on 2 inputs of a new technology that is Near Field Communication (NFC) in android smartphone. And also use pear sensor to detect unauthorized person entering the room. If the correct password is entered then the door will open and the pear sensor will light off if wrong then the bell will light up.

  11. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  12. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  13. Security Clearances and the Protection of National Security Information: Law and Procedures

    National Research Council Canada - National Science Library

    Cohen, Sheldon

    2000-01-01

    ... designed to protect National Security information. The report provides an authoritative compendium for lawyers, security officers and for managers of corporations who must deal with the legal and procedural aspects of security clearances...

  14. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  15. 78 FR 13897 - Final Revision and Publication of the 2012 Form M-1, Notice

    Science.gov (United States)

    2013-03-01

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration RIN 1210-AB51 Final Revision and Publication of the 2012 Form M-1, Notice AGENCY: Employee Benefits Security Administration, Department of... revisions to the Form M-1, Report for Multiple Employer Welfare Arrangements (MEWAs) and Certain Entities...

  16. 78 FR 25521 - Revised Medical Criteria for Evaluating Visual Disorders

    Science.gov (United States)

    2013-05-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0078] Revised Medical Criteria for Evaluating Visual Disorders AGENCY: Social Security Administration. ACTION: Final rules; Correction. SUMMARY: The Social Security Administration published a document in the Federal Register of March 28, 2013, in FR Doc...

  17. 76 FR 54197 - Membership of the Office of the Secretary Performance Review Board

    Science.gov (United States)

    2011-08-31

    ..., Director, Office of Executive Resources, Office of Human Resources Management, Office of the Director, 14th..., Office of Information Technology, Security, Infrastructure, and Technology. Ellen Herbst, Senior Advisor..., Director, Office of Civil Rights. Alfred J. Broadbent, Director, Office of Security. Economic Development...

  18. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    CERN Document Server

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  19. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  20. U.S. Department of Energy Office of Health, Safety and Security Illness and Injury Surveillance Program Worker Health at a Glance, 2000-2009

    Energy Technology Data Exchange (ETDEWEB)

    Strader, Cliff [US Dept. of Energy, Washington, DC (United States); Richter, Bonnie [US Dept. of Energy, Washington, DC (United States)

    2013-01-23

    The Worker Health at a Glance, 2000 – 2009 provides an overview of selected illness and injury patterns among the current DOE contractor workforce that have emerged over the 10-years covered by this report. This report is a roll-up of data from 16 individual DOE sites, assigned to one of three program offices (Office of Environmental Management, Office of Science and the National Nuclear Security Administration). In this report, an absences is defined as 40 or more consecutive work hours (5+ calendar days) off the job. Shorter absences were not included.

  1. 75 FR 4271 - Labor Organization Officer and Employee Reports

    Science.gov (United States)

    2010-01-27

    ... DEPARTMENT OF LABOR Office of Labor-Management Standards 29 CFR Part 404 Labor Organization Officer and Employee Reports CFR Correction In Title 29 of the Code of Federal Regulations, Parts 100 to 499, revised as [[Page 4272

  2. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  3. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  4. Information security principles and practice

    CERN Document Server

    Stamp, Mark

    2011-01-01

    Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a pract

  5. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  6. Computer Security Handbook

    CERN Document Server

    Bosworth, Seymour; Whyne, Eric

    2012-01-01

    The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapter

  7. 28 CFR 700.24 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...

  8. 75 FR 73947 - Securities of Nonmember Insured Banks

    Science.gov (United States)

    2010-11-30

    ..., DC, and should be addressed as follows: Accounting and Securities Disclosure Section, Division of..., Accounting and Securities Disclosure Section, Division of Supervision and Consumer Protection, 550 17th... comment. SUMMARY: The FDIC is revising its securities disclosure regulations applicable to state nonmember...

  9. Physician office readiness for managing Internet security threats.

    Science.gov (United States)

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  10. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  11. 17 CFR 140.1 - Headquarters office.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Headquarters office. 140.1..., FUNCTIONS, AND PROCEDURES OF THE COMMISSION Organization § 140.1 Headquarters office. (a) General. The headquarters office of the Commission is located at Three Lafayette Centre, 1155 21st Street, NW., Washington...

  12. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  13. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  14. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  15. Evolution of nuclear security regulatory activities in Brazil

    International Nuclear Information System (INIS)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B.

    2009-01-01

    The changing of the world scenario in the last 15 years has increased worldwide the concerns about overall security and, as a consequence, about the nuclear and radioactive material as well as their associated facilities. Considering the new situation, in February 2004, the Brazilian National Nuclear Energy Commission (CNEN), decided to create the Nuclear Security Office. This Office is under the Coordination of Nuclear Safeguards and Security, in the Directorate for Safety, Security and Safeguards (Regulatory Directorate). Before that, security regulation issues were dealt in a decentralized manner, within that Directorate, by different licensing groups in specific areas (power reactors, fuel cycle facilities, radioactive facilities, transport of nuclear material, etc.). This decision was made in order to allow a coordinated approach on the subject, to strengthen the regulation in nuclear/radioactive security, and to provide support to management in the definition of institutional security policies. The CNEN Security Office develops its work based in the CNEN Physical Protection Regulation for Nuclear Operational Units - NE-2.01, 1996, the Convention on the Physical Protection of Nuclear Material and the IAEA Nuclear Security Series . This paper aims at presenting the activities developed and the achievements obtained by this new CNEN office, as well as identifying the issues and directions for future efforts. (author)

  16. 77 FR 9214 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-02-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... meeting of the National Security Education Board. The purpose of the meeting is to review and make... p.m. ADDRESSES: Defense Language and National Security Education Office, 1101 Wilson Boulevard...

  17. Carlsbad Area Office strategic plan

    International Nuclear Information System (INIS)

    1995-10-01

    This edition of the Carlsbad Area Office Strategic Plan captures the U.S. Department of Energy's new focus, and supercedes the edition issued previously in 1995. This revision reflects a revised strategy designed to demonstrate compliance with environmental regulations earlier than the previous course of action; and a focus on the selected combination of scientific investigations, engineered alternatives, and waste acceptance criteria for supporting the compliance applications. An overview of operations and historical aspects of the Waste Isolation Pilot Plant near Carlsbad, New Mexico is presented

  18. Passport officers' errors in face matching.

    Science.gov (United States)

    White, David; Kemp, Richard I; Jenkins, Rob; Matheson, Michael; Burton, A Mike

    2014-01-01

    Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of 'fraudulent' photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately--though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection.

  19. Passport officers' errors in face matching.

    Directory of Open Access Journals (Sweden)

    David White

    Full Text Available Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of 'fraudulent' photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately--though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection.

  20. Nevada National Security Site Radiological Control Manual

    International Nuclear Information System (INIS)

    2012-01-01

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  1. Nevada National Security Site Radiological Control Manual

    Energy Technology Data Exchange (ETDEWEB)

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  2. 33 CFR 106.205 - Company Security Officer (CSO).

    Science.gov (United States)

    2010-07-01

    ... TWIC. (b) Qualifications. The CSO must have general knowledge, through training or equivalent job...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security training and education, including security measures and procedures. (c) In addition to the knowledge and...

  3. Office of Personnel Management Catch 62 Match

    Data.gov (United States)

    Social Security Administration — SSA provides the Office of Personnel Management (OPM) with tax returns, Social Security benefits, and military retirement information for the purpose of correctly...

  4. Wireless networking for the dental office: current wireless standards and security protocols.

    Science.gov (United States)

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  5. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    Science.gov (United States)

    2012-01-01

    tenfold to account for uninsured and other costs unaccounted for, the result would be in the low billions of dollars rather than tens of billions...Aviation Security GAO—See U.S. Government Accountability Office or, prior to 2004, U.S. General Accounting Office. Ghylin, K. M., C. G . Drury , and A...outweigh their costs . This document seeks to contribute to the national debate on avia- tion security by examining a set of issues that are either

  6. 6 CFR 27.215 - Security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215 Section 27.215 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...

  7. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  8. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  9. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  10. Field Office Contact Information for Application Developers

    Data.gov (United States)

    Social Security Administration — SSA provides a web service and downloadable file for SSA Field Office locations, telephone numbers, and hours of operation. (Note: If you think an office might be...

  11. Underground Test Area (UGTA) Closure Report for Corrective Action Unit 98: Frenchman Flat Nevada National Security Site, Nevada, Revision 1 ROTC-1

    International Nuclear Information System (INIS)

    Farnham, Irene

    2016-01-01

    This Closure Report (CR) has been prepared for Corrective Action Unit (CAU) 98, Frenchman Flat, Nevada National Security Site (NNSS), Nevada. The Frenchman Flat CAU was the site of 10 underground nuclear tests, some of which have impacted groundwater near the tests. This work was performed as part of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity in accordance with the Federal Facility Agreement and Consent Order (FFACO). This CR describes the selected corrective action to be implemented during closure to protect human health and the environment from the impacted groundwater

  12. Underground Test Area (UGTA) Closure Report for Corrective Action Unit 98: Frenchman Flat Nevada National Security Site, Nevada, Revision 1 ROTC-1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2016-08-01

    This Closure Report (CR) has been prepared for Corrective Action Unit (CAU) 98, Frenchman Flat, Nevada National Security Site (NNSS), Nevada. The Frenchman Flat CAU was the site of 10 underground nuclear tests, some of which have impacted groundwater near the tests. This work was performed as part of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity in accordance with the Federal Facility Agreement and Consent Order (FFACO). This CR describes the selected corrective action to be implemented during closure to protect human health and the environment from the impacted groundwater

  13. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  14. 22 CFR 8.7 - Security.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the committee...

  15. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  16. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Alternative security program. 27.235 Section 27.235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered...

  17. 76 FR 53156 - Agency Information Collection Activities: Submission for the Office of Management and Budget...

    Science.gov (United States)

    2011-08-25

    ... revised Cyber Security Plans, Security Plans, Safeguards Contingency Plans, and Security Training and... requirements to establish and maintain a physical protection system and security organization with capabilities... material are consistent with interests of common defense and security and that these activities do not...

  18. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must... chemical facility security. (b) Except as provided in § 27.235, a covered facility must complete the Site...

  19. 78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-09-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...

  20. 48 CFR 819.705 - Appeal of Contracting Officer decisions.

    Science.gov (United States)

    2010-10-01

    ... the Senior Procurement Executive (SPE) within 5 working days. The SPE shall have 15 working days to... decision. The contracting officer has 5 working days to reply to the challenge by either revising the... filed within 5 working days of receipt of the contracting officer's decision. The HCA has 5 working days...

  1. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  2. 75 FR 65511 - Employee Benefits Security Administration; Submission for OMB Review

    Science.gov (United States)

    2010-10-25

    ... DEPARTMENT OF LABOR Office of the Secretary Employee Benefits Security Administration; Submission...--Employee Benefits Security Administration (EBSA), Office of Management and Budget, Room 10235, Washington...: Employee Benefits Security Administration. Type of Review: Extension without change of a currently approved...

  3. LANL Safeguards and Security Assurance Program. Revision 6

    International Nuclear Information System (INIS)

    1995-01-01

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms

  4. The Western Environmental Technology Office (WETO), Butte, Montana. Technology summary (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    This document has been prepared by the US Department of Energy`s (DOE`s) Office of Environmental Management (EM) Office of Science and Technology (OST) to highlight its research, development, demonstration, testing, and evaluation (RDDT&E) activities funded through the Western environmental Technology Office (WETO) in Butte, Montana. Technologies and processes described in this document have the potential to enhance DOE`s cleanup and waste management efforts, as well as improve US industry`s competitiveness in global environmental markets. The information presented in this document has been assembled from recently produced OST documents that highlight technology development activities within each of the OST program elements and Focus Areas. This document presents one in a series for each of DOE`s Operations Office and Energy Technology Centers.

  5. The Western Environmental Technology Office (WETO), Butte, Montana. Technology summary (Revised)

    International Nuclear Information System (INIS)

    1996-03-01

    This document has been prepared by the US Department of Energy's (DOE's) Office of Environmental Management (EM) Office of Science and Technology (OST) to highlight its research, development, demonstration, testing, and evaluation (RDDT ampersand E) activities funded through the Western environmental Technology Office (WETO) in Butte, Montana. Technologies and processes described in this document have the potential to enhance DOE's cleanup and waste management efforts, as well as improve US industry's competitiveness in global environmental markets. The information presented in this document has been assembled from recently produced OST documents that highlight technology development activities within each of the OST program elements and Focus Areas. This document presents one in a series for each of DOE's Operations Office and Energy Technology Centers

  6. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  7. Implementing shared decision making in federally qualified health centers, a quasi-experimental design study: the Office-Guidelines Applied to Practice (Office-GAP) program

    OpenAIRE

    Olomu, Adesuwa; Hart-Davidson, William; Luo, Zhehui; Kelly-Blake, Karen; Holmes-Rovner, Margaret

    2016-01-01

    Background Use of Shared Decision-Making (SDM) and Decision Aids (DAs) has been encouraged but is not regularly implemented in primary care. The Office-Guidelines Applied to Practice (Office-GAP) intervention is an application of a previous model revised to address guidelines based care for low-income populations with diabetes and coronary heart disease (CHD). Objective: To evaluate Office-GAP Program feasibility and preliminary efficacy on medication use, patient satisfaction with physician ...

  8. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  9. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    van Dongen Diana

    2011-11-01

    Full Text Available Abstract Background The amount of exposure to electromagnetic fields (EMF at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Methods Three occupational groups, the general Dutch working population (n = 567, airport security officers who work with metal detectors (n = 106, and MRI radiographers who work with MRI (n = 193, were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Results Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. Conclusions These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF.

  10. Emotional Exhaustion and Job Satisfaction in Airport Security Officers - Work-Family Conflict as Mediator in the Job Demands-Resources Model.

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners' job performance. The present study bridges this research gap by applying the job demands-resources (JD-R) model and using work-family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD-R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  11. 46 CFR 4.03-55 - Law enforcement officer.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Law enforcement officer. 4.03-55 Section 4.03-55 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE CASUALTIES AND INVESTIGATIONS Definitions § 4.03-55 Law enforcement officer. Law enforcement officer means a Coast Guard commissioned, warrant or petty officer...

  12. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  13. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...

  14. 12 CFR 326.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...

  15. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Security June 2006, NIMS Revision Version 2 March 2007, NWDC Domestic Disaster Relief Operations Planning, 15 May 2006, AFRL-Supported Studies on Large- Scale Coordination, A Sociotechnical Systems...

  16. 75 FR 69709 - Office of New Reactors; Notice of Availability of the Final Staff Guidance; Standard Review Plan...

    Science.gov (United States)

    2010-11-15

    ... the Final Staff Guidance; Standard Review Plan, Section 13.6.6, Revision 0 on Cyber Security Plan... Reports for Nuclear Power Plants,'' Section 13.6.6, Revision 0 on ``Cyber Security Plan'' (Agencywide... reviews to amendments to licenses for operating reactors or for activities associated with review of...

  17. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  18. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  19. 12 CFR 563g.20 - Form for securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Form for securities sale report. 563g.20 Section 563g.20 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.20 Form for securities sale report. Office of Thrift Supervision, 1700 G Street, NW...

  20. 75 FR 35720 - Massachusetts: Final Authorization of State Hazardous Waste Management Program Revisions

    Science.gov (United States)

    2010-06-23

    ...: Final Authorization of State Hazardous Waste Management Program Revisions AGENCY: Environmental...: Robin Biscaia, RCRA Waste Management Section, Office of Site Remediation and Restoration (OSRR 07-1... Courier: Deliver your comments to: Robin Biscaia, RCRA Waste Management Section, Office of Site...

  1. 8 CFR 3.0 - Executive Office for Immigration Review

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Executive Office for Immigration Review 3.0 Section 3.0 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY GENERAL PROVISIONS EXECUTIVE OFFICE FOR IMMIGRATION REVIEW § 3.0 Executive Office for Immigration Review Regulations of the Executive Office for...

  2. 8 CFR 103.1 - Delegations of authority; designation of immigration officers.

    Science.gov (United States)

    2010-01-01

    ... immigration officers. 103.1 Section 103.1 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION... immigration officers. (a) Delegations of authority. Delegations of authority to perform functions and exercise authorities under the immigration laws may be made by the Secretary of Homeland Security as provided by § 2.1...

  3. Federal Bureau of Investigation (FBI) Field Office Jurisdiction/Divisions

    Data.gov (United States)

    Department of Homeland Security — This dataset represents the FBI (Federal Bureau of Investigations) national field office jurisdiction/divisional boundary locations. The field offices are centrally...

  4. 78 FR 18837 - Revised Medical Criteria for Evaluating Visual Disorders

    Science.gov (United States)

    2013-03-28

    ... updating our regulations is to address advances in medical technology and terminology. We have removed the... Medical Criteria for Evaluating Visual Disorders AGENCY: Social Security Administration. ACTION: Final..., Office of Medical Listings Improvement, Social Security Administration, 6401 Security Boulevard...

  5. 20 CFR 404.1212 - Police officers and firefighters.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Police officers and firefighters. 404.1212... May Be Covered § 404.1212 Police officers and firefighters. (a) General. For Social Security coverage purposes under section 218 of the Act, a police officer's or firefighter's position is any position so...

  6. Revision of the Paris Convention from the German point of view

    International Nuclear Information System (INIS)

    Mahlmann, Wilfried.

    1977-01-01

    The paper discusses the revision of the Paris Convention from the German point of view and states how this country has used the possibilities for exceptions provided under the Convention so that German nuclear third party liability legislation differs somewhat from the standards laid down in the Convention. This is explained by a desire to provide increased financial security for the population concerned. After describing various proposed procedures for increasing liability amounts in the Paris Convention and the Brussels Supplementary Convention the author concludes that his country would welcome a revision of the Conventions which would provide increased financial security for the public. (NEA) [fr

  7. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... (CSO), Vessel Security Officers (VSO), public safety officers, emergency response personnel, and crisis management organization representatives within the port, including 24-hour contact details; (m) Measures to...

  8. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  9. 32 CFR 2001.26 - Automatic declassification exemption markings.

    Science.gov (United States)

    2010-07-01

    ... intelligence source, a relationship with an intelligence or security service of a foreign government or... SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY... human intelligence source, or key design concepts of weapons of mass destruction, the revised...

  10. 76 FR 34761 - Classified National Security Information

    Science.gov (United States)

    2011-06-14

    ... MARINE MAMMAL COMMISSION Classified National Security Information [Directive 11-01] AGENCY: Marine... Commission's (MMC) policy on classified information, as directed by Information Security Oversight Office... of Executive Order 13526, ``Classified National Security Information,'' and 32 CFR part 2001...

  11. 76 FR 72984 - Revised Application for a License To Export High-Enriched Uranium

    Science.gov (United States)

    2011-11-28

    ... NUCLEAR REGULATORY COMMISSION Revised Application for a License To Export High-Enriched Uranium The application for a license to export high-enriched Uranium has been revised as noted below. Notice... fabricate fuel France. Security Complex; October 18, Uranium (93.35%). uranium (174.0 elements in France...

  12. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis.

    Science.gov (United States)

    van Dongen, Diana; Smid, Tjabe; Timmermans, Daniëlle R M

    2011-11-09

    The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. © 2011 van Dongen et al; licensee BioMed Central Ltd.

  13. 46 CFR 10.214 - Security Check.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...

  14. Security and Office Administration Coordinator | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Under the supervision of the Manager, Local Operations (MLO), the Security and ... Sees to the continuous updating and relevance of the Business Continuity Plan ... BCP to local management (Manager and Regional Director) and to the Head ...

  15. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  16. Emotional Exhaustion and Job Satisfaction in Airport Security Officers − Work−Family Conflict as Mediator in the Job Demands–Resources Model

    Directory of Open Access Journals (Sweden)

    Sophie eBaeriswyl

    2016-05-01

    Full Text Available The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners. Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD−R model and using work–family conflict (WFC as an intervening variable to study relationships between work characteristics (workload and supervisor support, emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a supervisor support as a major job resource predicted job satisfaction among screeners; (b workload as a major job demand predicted their emotional exhaustion; and (c WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  17. Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD–R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed. PMID:27242581

  18. 78 FR 77606 - Security Requirements for Facilities Storing Spent Nuclear Fuel

    Science.gov (United States)

    2013-12-24

    ... NUCLEAR REGULATORY COMMISSION 10 CFR Parts 72 and 73 [NRC-2009-0558] RIN 3150-AI78 Security... rulemaking that would revise the security requirements for storing spent nuclear fuel (SNF) in an independent... Nuclear Security and Incident Response, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001...

  19. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  20. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Science.gov (United States)

    2010-05-10

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; National Security... June 23, 2010, from 8 a.m. to 12:30 p.m. ADDRESSES: The meeting will be held at the National Security.... Kevin Gormley, Program Officer, National Security Education Program, 1101 Wilson Boulevard, Suite 1210...

  1. Loose glenoid components in revision shoulder arthroplasty: is there an association with positive cultures?

    Science.gov (United States)

    Lucas, Robert M; Hsu, Jason E; Whitney, Ian J; Wasserburger, Jory; Matsen, Frederick A

    2016-08-01

    Glenoid loosening is one of the most common causes of total shoulder failure. High rates of positive cultures of Propionibacterium and coagulase-negative staphylococcus have been found among shoulders having surgical revision for glenoid loosening. This study reviewed the culture results in a series of surgical revisions for failed total shoulder arthroplasty to determine the relationship between glenoid loosening and positive cultures. The medical records of 221 patients without obvious evidence of infection who underwent revision total shoulder arthroplasty were reviewed to examine the association between the security of fixation of the glenoid component and the results of cultures obtained at revision surgery. Of the revised shoulders, 53% had positive cultures; 153 of the shoulders (69%) had a loose glenoid component, whereas 68 (31%) had secure glenoid component fixation. Of the 153 loose glenoid components, 82 (54%) had at least 1 positive culture and 44 (29%) had 2 or more positive cultures of the same microorganism. Similarly, of the 68 secure glenoid components, 35 (51%) had at least 1 positive culture (P = .77) and 14 (21%) had 2 or more positive cultures of the same microorganism (P = .25). Explanted glenoid components that were loose had a higher rate of culture positivity (56% [24/43]) in comparison to explanted glenoid components that were well fixed (13% [1/8]) (P = .05). Propionibacterium and coagulase-negative staphylococcus are commonly recovered in revision shoulder arthroplasty, whether or not the glenoid components are loose. Copyright © 2016 Journal of Shoulder and Elbow Surgery Board of Trustees. Published by Elsevier Inc. All rights reserved.

  2. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  3. Programs of the Office of Energy Research: Revision

    International Nuclear Information System (INIS)

    1987-06-01

    In establishing each of the Federal Agencies that have been successively responsible for energy technologies and their development - the Atomic Energy Commission, the Energy Research and Development Administration, and, currently, the US Department of Energy (DOE) - Congress made specific provisions for the conduct of advanced and fundamental research. The purpose of this research has been to support the energy technology development programs by providing insight into fundamental science and associated phenomena and developing new or advanced concepts and techniques. Today, this responsibility rests with the Office of Energy Research (ER), DOE, whose present programs have their origins in pioneering energy-related research of this nature, which was initiated nearly 40 years ago. The Director, Office of Energy Research, also acts as the chief scientist and scientific advisor to the Secretary of Energy for the entire spectrum of energy research and development (R and D) programs of the Department. ER programs include several thousand individual projects and hundreds of laboratories, universities, and other research facilities throughout the Unites States. In the following pages, each of these programs and activities are described briefly for the information of the scientific community and the public at large. 5 figs., 6 tabs

  4. 48 CFR 1339.107-70 - Information security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...

  5. 77 FR 21538 - Announcing DRAFT Revisions to Federal Information Processing Standard (FIPS) 186-3, Digital...

    Science.gov (United States)

    2012-04-10

    ...-01] Announcing DRAFT Revisions to Federal Information Processing Standard (FIPS) 186-3, Digital... Technology (NIST) requests comments on revisions to Federal Information Processing Standard (FIPS) 186-3... 25, 2012. ADDRESSES: Written comments may be sent to: Chief, Computer Security Division, Information...

  6. Office of Personnel Management (OPM)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for the Office of Personnel Management. OPM will use the SSN verifications in its investigative...

  7. Underground Test Area Activity Preemptive Review Guidance Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    Preemptive reviews (PERs) of Underground Test Area (UGTA) Activity corrective action unit (CAU) studies are an important and long-maintained quality improvement process. The CAU-specific PER committees provide internal technical review of ongoing work throughout the CAU lifecycle. The reviews, identified in the UGTA Quality Assurance Plan (QAP) (Sections 1.3.5.1 and 3.2), assure work is comprehensive, accurate, in keeping with the state of the art, and consistent with CAU goals. PER committees review various products, including data, documents, software/codes, analyses, and models. PER committees may also review technical briefings including Federal Facility Agreement and Consent Order (FFACO)-required presentations to the Nevada Division of Environmental Protection (NDEP) and presentations supporting key technical decisions (e.g., investigation plans and approaches). PER committees provide technical recommendations to support regulatory decisions that are the responsibility of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and NDEP.

  8. Solar Energy Technologies Office Fact Sheet

    Energy Technology Data Exchange (ETDEWEB)

    Solar Energy Technologies Office

    2018-03-13

    The U.S. Department of Energy Solar Energy Technologies Office (SETO) supports early-stage research and development to improve the affordability, reliability, and performance of solar technologies on the grid. The office invests in innovative research efforts that securely integrate more solar energy into the grid, enhance the use and storage of solar energy, and lower solar electricity costs.

  9. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-05-24

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), DoD. ACTION: Meeting notice. SUMMARY: Under the... announces that the following Federal advisory committee meeting of the National Security Education Board...

  10. Office of Technology Development FY 1993 program summary: Office of Research and Development, Office of Demonstration, Testing and Evaluation. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    1994-02-01

    This report summarizes significant FY93 programmatic information and accomplishments relevant to the individual activities within the Office of Technology Development Program for Research, Development, Demonstration, Testing, and Evaluation (RDDT&E). A brief discussion of the mission of the Office of Environmental Restoration and Waste Management (EM) and the Office of Technology Development is presented. An overview is presented of the major problem areas confronting DOE. These problem areas include: groundwater and soils cleanup; waste retrieval and processing; and pollution prevention. The organizational elements within EM are highlighted. An EM-50 Funding Summary for FY92 and FY93 is also provided. RDDT&E programs are discussed and their key problem areas are summarized. Three salient program-formulating concepts are explained. They are: Integrated Demonstrations, Integrated Programs, and the technology window of opportunity. Detailed information for each of the programs within RDDT&E is presented and includes a fact sheet, a list of technical task plans and an accomplishments and objectives section.

  11. Office of Technology Development FY 1993 program summary: Office of Research and Development, Office of Demonstration, Testing and Evaluation. Revision 1

    International Nuclear Information System (INIS)

    1994-02-01

    This report summarizes significant FY93 programmatic information and accomplishments relevant to the individual activities within the Office of Technology Development Program for Research, Development, Demonstration, Testing, and Evaluation (RDDT ampersand E). A brief discussion of the mission of the Office of Environmental Restoration and Waste Management (EM) and the Office of Technology Development is presented. An overview is presented of the major problem areas confronting DOE. These problem areas include: groundwater and soils cleanup; waste retrieval and processing; and pollution prevention. The organizational elements within EM are highlighted. An EM-50 Funding Summary for FY92 and FY93 is also provided. RDDT ampersand E programs are discussed and their key problem areas are summarized. Three salient program-formulating concepts are explained. They are: Integrated Demonstrations, Integrated Programs, and the technology window of opportunity. Detailed information for each of the programs within RDDT ampersand E is presented and includes a fact sheet, a list of technical task plans and an accomplishments and objectives section

  12. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  13. 75 FR 43478 - Rhode Island: Final Authorization of State Hazardous Waste Management Program Revisions

    Science.gov (United States)

    2010-07-26

    ...: Final Authorization of State Hazardous Waste Management Program Revisions AGENCY: Environmental.... Mail: Robin Biscaia, RCRA Waste Management Section, Office of Site Remediation and Restoration (OSRR 07... Delivery or Courier: Deliver your comments to: Robin Biscaia, RCRA Waste Management Section, Office of Site...

  14. 12 CFR 208.61 - Bank security procedures.

    Science.gov (United States)

    2010-01-01

    ... procedures for opening and closing for business and for the safekeeping of all currency, negotiable...; the cost of the security devices; other security measures in effect at the banking office; and the... directors on the implementation, administration, and effectiveness of the security program. (e) Reserve...

  15. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Science.gov (United States)

    2012-06-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... of the National Security Education Board. This meeting was to be held on June 20, 2012, from 8:30 a.m. to 2 p.m. at Defense Language and National Security Education Office, 1101 Wilson Boulevard, Suite...

  16. 76 FR 44965 - Notice of Revision of Standard Forms 39 and 39-A

    Science.gov (United States)

    2011-07-27

    ... OFFICE OF PERSONNEL MANAGEMENT Notice of Revision of Standard Forms 39 and 39-A AGENCY: U.S... Management (OPM) has revised Standard Form (SF) 39, Request For Referral Of Eligibles, and SF 39-A, Request... part 332. The SF 39 outlines instructions to be used by hiring officials to request a list of eligible...

  17. 77 FR 12329 - Office of the Secretary

    Science.gov (United States)

    2012-02-29

    ... for OMB Review; Comment Request; Migrant and Seasonal Farmworker Monitoring Report and One-Stop Career... Seasonal Farmworker Monitoring Report and One- Stop Career Center Complaint/Referral Record,'' as proposed to be revised, to the Office of Management and Budget (OMB) for review and approval for continued use...

  18. Information security value in e-entrepreneurship

    OpenAIRE

    Nunes, Sérgio

    2012-01-01

    This paper researches the information security value in e-entrepreneurship by revising the literature that establishes the entrepreneurial domain and by relating it with the development of technological resources that create value for the customer in an online business. It details multiple paradigms regarding consumer’s values of information security, while relating them with common practices and previous researches in technological entrepreneurship. This research presents and discusses the b...

  19. 76 FR 13111 - Compassionate Allowances for Autoimmune Disease, Office of the Commissioner; Hearing

    Science.gov (United States)

    2011-03-10

    [email protected] ; or Mail to Jamillah Jackson, Deputy Director, Office of Compassionate Allowances and....gov . You may also mail inquiries about this hearing to Jamillah Jackson, Deputy Director, Office of... Security--Disability Insurance; 96.006, Supplemental Security Income.) Dated: March 3, 2011. Michael J...

  20. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  1. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45... SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45 Information Security Program Review. (a) The Director, OSTP, shall require an annual formal review of the OSTP...

  2. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  3. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    Science.gov (United States)

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  4. 75 FR 17787 - Submission for OMB Review; Request for Review of a Revised Information Collection

    Science.gov (United States)

    2010-04-07

    ... Review; Request for Review of a Revised Information Collection AGENCY: Office of Personnel Management... of Management and Budget (OMB) a request for review of a revised information collection. This... retired on disability and are not yet age 62. The supplement approximates the portion of a full career...

  5. Twilight Policing. Private Security in Durban, South Africa

    NARCIS (Netherlands)

    Diphoorn, T.G.

    2013-01-01

    This ethnography analyses the everyday policing practices of armed response officers in Durban, South Africa. Armed response officers are private security officers who patrol communities in vehicles and respond to distress calls from clients. This study considers their interactions with other

  6. Facility Decontamination and Decommissioning Program Surveillance and Maintenance Plan, Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Poderis, Reed J. [NSTec; King, Rebecca A. [NSTec

    2013-09-30

    This Surveillance and Maintenance (S&M) Plan describes the activities performed between deactivation and final decommissioning of the following facilities located on the Nevada National Security Site, as documented in the Federal Facility Agreement and Consent Order under the Industrial Sites program as decontamination and decommissioning sites: ? Engine Maintenance, Assembly, and Disassembly (EMAD) Facility: o EMAD Building (Building 25-3900) o Locomotive Storage Shed (Building 25-3901) ? Test Cell C (TCC) Facility: o Equipment Building (Building 25-3220) o Motor Drive Building (Building 25-3230) o Pump Shop (Building 25-3231) o Cryogenic Lab (Building 25-3232) o Ancillary Structures (e.g., dewars, water tower, piping, tanks) These facilities have been declared excess and are in various stages of deactivation (low-risk, long-term stewardship disposition state). This S&M Plan establishes and implements a solid, cost-effective, and balanced S&M program consistent with federal, state, and regulatory requirements. A graded approach is used to plan and conduct S&M activities. The goal is to maintain the facilities in a safe condition in a cost-effective manner until their final end state is achieved. This plan accomplishes the following: ? Establishes S&M objectives and framework ? Identifies programmatic guidance for S&M activities to be conducted by National Security Technologies, LLC, for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) ? Provides present facility condition information and identifies hazards ? Identifies facility-specific S&M activities to be performed and their frequency ? Identifies regulatory drivers, NNSA/NFO policies and procedures, and best management practices that necessitate implementation of S&M activities ? Provides criteria and frequencies for revisions and updates ? Establishes the process for identifying and dispositioning a condition that has not been previously identified or

  7. 4 CFR 83.9 - Social Security number.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Social Security number. 83.9 Section 83.9 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.9 Social Security number. (a) GAO may not require individuals to disclose their Social Security Number (SSN) unless...

  8. 76 FR 15368 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-03-21

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... security devices and procedures to discourage robberies, burglaries, and larcenies, and to assist in the...

  9. 6 CFR 5.31 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security of systems of records. 5.31 Section 5.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each component...

  10. 76 FR 69734 - Public Water System Supervision Program Revision for the State of New Mexico

    Science.gov (United States)

    2011-11-09

    ... Water System Supervision Program. New Mexico has adopted the Lead and Copper Rule Short Term Revisions... water. EPA has determined that this rule revision submitted by New Mexico is no less stringent than the... the following offices: New Mexico Environment Department, Drinking Water Bureau, 525 Camino De Los...

  11. 6 CFR 27.204 - Minimum concentration by security issue.

    Science.gov (United States)

    2010-01-01

    ... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...

  12. 76 FR 30243 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-05-24

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures.... Title of Proposal: Minimum Security Devices and Procedures. OMB Number: 1550-0062. Form Number: N/A... respect to the installation, maintenance, and operation of security devices and procedures to discourage...

  13. 8 CFR 287.5 - Exercise of power by immigration officers.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Exercise of power by immigration officers. 287.5 Section 287.5 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS FIELD OFFICERS; POWERS AND DUTIES § 287.5 Exercise of power by immigration officers. (a) Power and...

  14. Nuclear security. Improving correction of security deficiencies at DOE's weapons facilities

    International Nuclear Information System (INIS)

    Wells, James E.; Cannon, Doris E.; Fenzel, William F.; Lightner, Kenneth E. Jr.; Curtis, Lois J.; DuBois, Julia A.; Brown, Gail W.; Trujillo, Charles S.; Tumler, Pamela K.

    1992-11-01

    The US nuclear weapons research, development, and production are conducted at 10 DOE nuclear weapons facilities by contractors under the guidance and oversight of 9 DOE field offices. Because these facilities house special nuclear materials used in making nuclear weapons and nuclear weapons components, DOE administers a security program to protect (1) against theft, sabotage, espionage, terrorism, or other risks to national security and (2) the safety and health of DOE employees and the public. DOE spends almost $1 billion a year on this security program. DOE administers the security program through periodic inspections that evaluate and monitor the effectiveness of facilities' safeguards and security. Security inspections identify deficiencies, instances of noncompliance with safeguards and security requirements or poor performance of the systems being evaluated, that must be corrected to maintain adequate security. The contractors and DOE share responsibility for correcting deficiencies. Contractors, in correcting deficiencies, must comply with several DOE orders. The contractors' performances were not adequate in conducting four of the eight procedures considered necessary in meeting DOE's deficiency correction requirements. For 19 of the 20 deficiency cases we reviewed, contractors could not demonstrate that they had conducted three critical deficiency analyses (root cause, risk assessment, and cost-benefit) required by DOE. Additionally, the contractors did not always adequately verify that corrective actions taken were appropriate, effective, and complete. The contractors performed the remaining four procedures (reviewing deficiencies for duplication, entering deficiencies into a data base, tracking the status of deficiencies, and preparing and implementing a corrective action plan) adequately in all 20 cases. DOE's oversight of the corrective action process could be improved in three areas. The computerized systems used to track the status of security

  15. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    Science.gov (United States)

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  16. 12 CFR 563g.12 - Securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Securities sale report. 563g.12 Section 563g.12 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.12 Securities sale report. (a) Within 30 days after the first sale of the securities, every six...

  17. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  18. 75 FR 69129 - Proposed Revision of Information Collection: Comment Request National Medical Support Notice-Part B

    Science.gov (United States)

    2010-11-10

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Proposed Revision of Information Collection: Comment Request National Medical Support Notice--Part B AGENCY: Employee Benefits Security... assess the impact of its collection requirements on respondents. Currently, the Employee Benefits...

  19. Percutaneous Revision of a Testicular Prosthesis is Safe, Cost-effective, and Provides Good Patient Satisfaction

    Directory of Open Access Journals (Sweden)

    Eugene B. Cone

    2015-09-01

    Full Text Available Office-based percutaneous revision of a testicular prosthesis has never been reported. A patient received a testicular prosthesis but was dissatisfied with the firmness of the implant. In an office setting, the prosthesis was inflated with additional fluid via a percutaneous approach. Evaluated outcomes included patient satisfaction, prosthesis size, recovery time, and cost savings. The patient was satisfied, with no infection, leak, or complication after more than 1 year of follow-up, at significantly less cost than revision surgery. Percutaneous adjustment of testicular prosthesis fill-volume can be safe, inexpensive, and result in good patient satisfaction.

  20. Office of Personnel Management (OPM) Earnings

    Data.gov (United States)

    Social Security Administration — Each year the Office of Personnel Management (OPM) sends SSA a file to be verified and matched against the Master Earnings File (MEF) and Employer Information File...

  1. Revised inspection program for nuclear power plants

    International Nuclear Information System (INIS)

    1978-01-01

    The United States Nuclear Regulatory Commission (NRC) regulates nuclear power plants to assure adequate protection of the public and the environment from the dangers associated with nuclear materials. NRC fulfills this responsibility through comprehensive safety reviews of nuclear facilities, licensing of organizations that use nuclear materials, and continuing inspection. The NRC inspection program is currently conducted from the five regional offices in or near Philadelphia, Atlanta, Chicago, Dallas and San Francisco. Inspectors travel from the regional offices to nuclear power plants in various phases of construction, test and operation in order to conduct inspections. However, in June 1977 the Commission approved a revision to the inspection program that will include stationing inspectors at selected plants under construction and at all plants in operation. In addition, the revised program provides for appraising the performance of licensees on a national basis and involves more direct measurement and observation by NRC inspectors of work and tests in progress. The program also includes enhanced career management consisting of improved training and career development for inspectors and other professionals. The report was requested in the Conference Report on the NRC Authorization for Appropriations for Fiscal Year 1978. The report provides a discussion of the basis for both the current and revised inspection programs, describes these programs, and shows how the NRC inspection force will be trained and utilized. In addition, the report includes a discussion of the actions that will be taken to assure the objectivity of inspectors

  2. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  3. Multi-Level Secure Local Area Network

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...

  4. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Karen L. Neuman, (202) 343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974... Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...

  5. A Psychometric Evaluation of Super's Work Values Inventory--Revised

    Science.gov (United States)

    Robinson, Carrie H.; Betz, Nancy E.

    2008-01-01

    This study describes the psychometric evaluation of Super's Work Values Inventory--Revised (SWVI-R), an instrument comprised of 12 scales measuring the relative importance placed on the following work-related value dimensions: Achievement, Coworkers, Creativity, Income, Independence, Lifestyle, Mental Challenge, Prestige, Security, Supervision,…

  6. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  7. 19 CFR 101.2 - Authority of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Authority of Customs officers. 101.2 Section 101.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL PROVISIONS § 101.2 Authority of Customs officers. (a) Supremacy of delegated authority...

  8. Revision of ISO 15859 Aerospace Fluid Standards

    Science.gov (United States)

    Greene, Benjamin; McClure, Mark B.

    2012-01-01

    A detailed review of ISO 15859 "Space Systems - Fluid Characteristics, Sampling and Test Methods" was performed An approach to revising Parts 1-9 and 11-13 was developed and concurred by the NASA Technical Standards Program Office. The approach was to align them with the highest level source documents, and not to program-specific requirements. The updated documents were prepared and presented.

  9. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  10. 76 FR 30227 - On behalf of the Accessibility Committee of the Federal Chief Information Officers Council...

    Science.gov (United States)

    2011-05-24

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0041] On behalf of the Accessibility Committee of the Federal Chief Information Officers Council; Listening Session Regarding Improving the Accessibility of Government Information AGENCY: Federal Chief Information Officers Council, Social Security...

  11. 75 FR 50932 - Massachusetts: Final Authorization of State Hazardous Waste Management Program Revisions

    Science.gov (United States)

    2010-08-18

    ...: Final Authorization of State Hazardous Waste Management Program Revisions AGENCY: Environmental...-1990. FOR FURTHER INFORMATION CONTACT: Robin Biscaia, RCRA Waste Management Section, Office of Site... final [[Page 50933

  12. 77 FR 13997 - Revising Standards Referenced in the Acetylene Standard

    Science.gov (United States)

    2012-03-08

    ...: Occupational Safety and Health Administration (OSHA), Labor. ACTION: Proposed rule; withdrawal. SUMMARY: With this document, OSHA is withdrawing the proposed rule that accompanied its direct-final rule revising... and press inquiries: Contact Frank Meilinger, Director, OSHA Office of Communications, Room N-3647, U...

  13. 75 FR 5707 - Revising Standards Referenced in the Acetylene Standard

    Science.gov (United States)

    2010-02-04

    ...: Occupational Safety and Health Administration (OSHA), Labor. ACTION: Proposed rule; withdrawal. SUMMARY: With this document, OSHA is withdrawing the proposed rule that accompanied its direct-final rule revising... and press inquiries: Contact Jennifer Ashley, Director, OSHA Office of Communications, Room N-3647, U...

  14. 77 FR 17081 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-03-23

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... FOR FURTHER INFORMATION CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0082] Information Collection Requests to...

  15. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  16. 10 CFR 95.19 - Changes to security practices and procedures.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Changes to security practices and procedures. 95.19 Section 95.19 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND..., also to the Director, Division of Security Operations, Office of Nuclear Security and Incident Response...

  17. Water Security Toolkit User Manual Version 1.2.

    Energy Technology Data Exchange (ETDEWEB)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William Eugene; Phillips, Cynthia Ann; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License Py

  18. 20 CFR 416.1443 - Responsibilities of the adjudication officer.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Responsibilities of the adjudication officer. 416.1443 Section 416.1443 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... disagreement and refer the claim to the administrative law judge for further proceedings. At this point, the...

  19. 75 FR 21008 - Office of Biotechnology Activities; Recombinant DNA Research: Proposed Actions Under the NIH...

    Science.gov (United States)

    2010-04-22

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Office of Biotechnology... Biotechnology Activities (OBA) published a proposal to revise the NIH Guidelines for Research with Recombinant... by fax to 301-496-9839 or mail to the Office of Biotechnology Activities, National Institutes of...

  20. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Science.gov (United States)

    2010-03-10

    ... 20472. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management Agency System of Records AGENCY: Privacy Office...

  1. 78 FR 77694 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-12-24

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and...-7710. FOR FURTHER INFORMATION: Contact Mr. Anthony Smith, Office of Information Management, telephone... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0949] Information Collection Requests to...

  2. 78 FR 19502 - Information Collection Requests to Office of Management and Budget.

    Science.gov (United States)

    2013-04-01

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... FURTHER INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0164] Information Collection Requests to...

  3. 78 FR 12083 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-02-21

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and..., Washington, DC 20593-7101. FOR FURTHER INFORMATION CONTACT: Anthony Smith, Office of Information Management... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0037] Information Collection Request to...

  4. 78 FR 65351 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-10-31

    ... Information Collection Request (ICRs) to the Office of Management and Budget (OMB), Office of Information and..., DC 20593-7710. FOR FURTHER INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0861] Information Collection Request to...

  5. 12 CFR 563g.19 - Approval of the security.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Approval of the security. 563g.19 Section 563g.19 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.19 Approval of the security. Any securities of a savings association which are not exempt under...

  6. 76 FR 28960 - National Security Education Board Members Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  7. 77 FR 49439 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-08-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Secretary of Defense concerning requirements established by the David L. Boren National Security Education...

  8. 77 FR 27739 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-05-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  9. The Need for an Implant Identification Card at Airport Security Check.

    Science.gov (United States)

    Ali, Erden; Kosuge, Dennis; MacDowell, Andrew

    2017-06-01

    Joint replacement surgery is having an increasing demand as national healthcare systems confront an ever ageing population. Surgical complications associated with lower limb arthroplasty are well known but less investigation has been performed examining its effect on air travel, more specifically, unwanted and significant inconvenience caused to travelers going through airport security. In lower limb arthroplasty clinics, 50 patients who met our selection criteria were given questionnaires. Ten airport security officers from 4 international airports (London Stansted, London Gatwick, London Heathrow, and Amsterdam Schiphol International Airport) were also given a separate questionnaire. The opinion of the Civil Aviation Authority was also sought. All 50 patients (mean age, 70.4 years; range, 55 to 84 years) who were presenting in lower limb arthroplasty clinics and who met our selection criteria volunteered to enter the study. Twenty-eight of these patients were female (mean age, 69.1 years; range, 55 to 84 years) and 22 were male (mean age, 71.2 years; range, 58 to 81 years). Of the patients, 14% stated that their joint replacements did not set off the airport security alarm. Responses were received from 10 airport security officers as well. Six airport security officers were male and 4 were female. All of the airport officers were aware of some form of implant identification card with 90% stating that these were useful to them at airport security. Eight-four percent of the patients stated that an implant identification card outlining what joint replacement they possessed and when this had been done would be very useful. Sixteen percent of the patients did not think a card would be beneficial since all of them had set off the airport alarm system only once or less in their lifetime. It is the opinion of airport security officers and patients that joint replacement implant identification cards streamline airport security checks and decrease the need for more

  10. 75 FR 71632 - Revised Medical Criteria for Evaluating Mental Disorders

    Science.gov (United States)

    2010-11-24

    ... Revised Medical Criteria for Evaluating Mental Disorders AGENCY: Social Security Administration. ACTION... comments on any other aspects of the proposed listings for mental disorders that we receive during this... our mental disorders listings: Definitions we provide for the terms ``marked'' and ``extreme'' that...

  11. Wireless local area network for the dental office.

    Science.gov (United States)

    Mupparapu, Muralidhar

    2004-01-01

    Dental offices are no exception to the implementation of new and advanced technology, especially if it enhances productivity. In a rapidly transforming digital world, wireless technology has a special place, as it has truly "retired the wire" and contributed to the ease and efficient access to patient data and other software-based applications for diagnosis and treatment. If the office or the clinic is networked, access to patient management software, imaging software and treatment planning tools is enhanced. Access will be further enhanced and unrestricted if the entire network is wireless. As with any new, emerging technology, there will be issues that should be kept in mind before adapting to the wireless environment. Foremost is the network security involved in the installation and use of these wireless networks. This short, technical manuscript deals with standards and choices in wireless technology currently available for implementation within a dental office. The benefits of each network security protocol available to protect patient data and boost the efficiency of a modern dental office are discussed.

  12. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    International Nuclear Information System (INIS)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  13. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-06-12

    ... cybersecurity awareness, education, talent management, and professional development and training. NICCS Portal... Education Office, will submit the following Information Collection Request (ICR) to the Office of Management... contemplated: Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. 3546; Homeland Security...

  14. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  15. Weatherization and Intergovernmental Programs Office Fact Sheet

    Energy Technology Data Exchange (ETDEWEB)

    None

    2018-02-01

    One of the Department of Energy’s (DOE) primary forums for helping state and local governments implement costeffective and productive energy systems for American homes, communities, businesses, and industries is the Weatherization and Intergovernmental Programs Office (WIP). WIP is part of DOE’s Office of Energy Efficiency and Renewable Energy’s “all of the above” national energy strategy to create greater energy affordability, security and resiliency.

  16. 49 CFR 387.303 - Security for the protection of the public: Minimum limits.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false Security for the protection of the public: Minimum... Insurance for Motor Carriers and Property Brokers § 387.303 Security for the protection of the public... convenience of the user, the revised text is set forth as follows: § 387.303 Security for the protection of...

  17. 77 FR 40624 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-07-10

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0598] Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and...

  18. 78 FR 19504 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-01

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0133] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...

  19. 78 FR 54666 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-09-05

    ... Information Collection Request (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0782] Information Collection Request to...

  20. 77 FR 16044 - Information Collection Requests to Office of Management and Budget.

    Science.gov (United States)

    2012-03-19

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0149] Information Collection Requests to...

  1. 77 FR 5816 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-02-06

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0016] Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  2. 77 FR 53899 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-09-04

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0733] Information Collection Request to...

  3. 78 FR 42535 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-07-16

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax 202... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0519] Information Collection Requests to...

  4. 77 FR 6132 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-02-07

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... Tyler, Office of Information Management, telephone (202) 475-3652, or fax (202) 475- 3929, for questions... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0029] Information Collection Request to...

  5. 78 FR 77693 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-12-24

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Contact Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532, or... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0896] Information Collection Requests to...

  6. 76 FR 46824 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-08-03

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0710] Information Collection Requests to...

  7. 76 FR 58529 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-09-21

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0869] Information Collection Requests to...

  8. 76 FR 62426 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-10-07

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0902] Information Collection Request to...

  9. 77 FR 27472 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-05-10

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0231] Information Collection Request to...

  10. 77 FR 32657 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-06-01

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0472] Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  11. 78 FR 5192 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-01-24

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-1006] Information Collection Requests to...

  12. 78 FR 74155 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-12-10

    ... Information Collection Request (ICRs) to the Office of Management and Budget (OMB), Office of Information and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0950] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  13. 77 FR 18253 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-03-27

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0173] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...

  14. 6 CFR 27.240 - Review and approval of security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of security vulnerability assessments. 27.240 Section 27.240 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval...

  15. 78 FR 21366 - Agency Information Collection Activities: Announcement of Board Approval Under Delegated...

    Science.gov (United States)

    2013-04-10

    ... information from senior credit officers at responding financial institutions on (1) stringency of credit terms, (2) credit availability and demand across the entire range of securities financing and over-the... extension for three years, with revision, of the following survey: Report title: Senior Credit Officer...

  16. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  17. Report to the Congress on the need for, and the feasibility of, establishing a security agency within the Office of Nuclear Material Safety and Safeguards

    International Nuclear Information System (INIS)

    1976-08-01

    In response to the Congressional mandate Section 204(b)-(2) (C) of the Energy Reorganization Act of 1974, the Director of the Office of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory Commission (NRC) has assessed the need for and the feasibility of establishing a security agency within that office for the performance of safeguards functions. The study assessed guard force effectiveness, and addressed public policy, administrative and legal issues. The study concluded that creation of a special security force within NRC would not result in a higher degree of guard force effectiveness than can be achieved through the use of private guards who have been properly trained and certified. Disparate gun laws in various states, it concluded, restrict arms possessed by both private and federal guards and private and federal transportation guards would require legislation authorizing them to bear the necessary weapons to protect nuclear material in transit. The role of reaction forces was also addressed and it was concluded that primary reliance at fixed sites should be placed on onsite protection systems; for material in transit, on invulnerability of vehicles and containers and on guard forces accompanying shipments

  18. 78 FR 32595 - Revision of Freedom of Information Act Regulation

    Science.gov (United States)

    2013-05-31

    ... Revision of Freedom of Information Act Regulation AGENCY: Office of the Secretary, HUD. ACTION: Proposed rule. SUMMARY: This proposed rule would amend HUD's regulations implementing the Freedom of Information... with speech or hearing impairments may access this number via TTY by calling the toll-free Federal...

  19. 6 CFR 27.245 - Review and approval of site security plans.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  20. 76 FR 5815 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-02-02

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0016; OMB Control numbers: 1625-0005, 1625-0024, 1625-0036 and 1625-0061] Information Collection Request to Office of Management and Budget AGENCY... (ICRs) to the Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA...

  1. 76 FR 35228 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-06-16

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and..., Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on these... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0494] Information Collection Request to...

  2. 76 FR 61369 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-10-04

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and..., Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on these... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0914] Information Collection Request to...

  3. 77 FR 9951 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-02-21

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0077] Information Collection Requests to...

  4. 78 FR 19503 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-01

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...: Contact Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0045] Information Collection Request to...

  5. 76 FR 63626 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-10-13

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0955] Information Collection Requests to...

  6. 19 CFR 12.62 - Enforcement; duties of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Enforcement; duties of Customs officers. 12.62 Section 12.62 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...; duties of Customs officers. (a) In accordance with the authority contained in sections 10 and 12 of the...

  7. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  8. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Science.gov (United States)

    2010-07-01

    ... for National Security, who shall refer such questions to the Office of Legal Counsel, as appropriate... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security...

  9. 76 FR 77025 - Office of New Reactors; Notice of Availability of the Final Staff Guidance Section 1.0, Revision...

    Science.gov (United States)

    2011-12-09

    ... the Final Staff Guidance Section 1.0, Revision 2 on Introduction and Interfaces AGENCY: Nuclear... Plants: LWR Edition,'' Section 1.0, Revision 2 on ``Introduction and Interfaces'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML112730393). The NRC staff issues revisions to SRP...

  10. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  11. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    Science.gov (United States)

    Kuhn, D. R.; Tracy, Miles C.; Frankel, Sheila E.

    2002-08-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. This document is not intended to provide a mandatory framework for telecommuting or home office broadband communication environments, but rather to present suggested approaches to the topic.

  12. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  13. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Science.gov (United States)

    2010-01-01

    ... chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information regarding security risk for a chemical facility. (a) Information to determine security risk. In order to...

  14. 75 FR 733 - Implementation of the Executive Order, ``Classified National Security Information''

    Science.gov (United States)

    2010-01-05

    ... of the Executive Order, ``Classified National Security Information'' Memorandum for the Heads of... Security Information'' (the ``order''), which substantially advances my goals for reforming the security... classified information shall provide the Director of the Information Security Oversight Office (ISOO) a copy...

  15. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  16. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  17. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Science.gov (United States)

    2010-02-23

    ... privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  18. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  19. 75 FR 62447 - Departmental Offices; Proposed Collections; Comment Requests

    Science.gov (United States)

    2010-10-08

    ... Management and Budget. The Office of International Affairs of the Department of the Treasury is soliciting... the formulation of international financial and monetary policies and for the preparation of the U.S... Statistical Reports section of the Introduction) will be revised by adding a paragraph on the proposed new SLT...

  20. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  1. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  2. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  3. 49 CFR 1544.221 - Carriage of prisoners under the control of armed law enforcement officers.

    Science.gov (United States)

    2010-10-01

    ... Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.221 Carriage... custody of an armed law enforcement officer aboard an aircraft for which screening is required unless, in...

  4. Proposed Guideline Revisions for Dental Sedation and General Anesthesia: Why Target the Safest Level of Sedation?

    Science.gov (United States)

    Dionne, Raymond A

    2016-09-01

    Recently proposed revisions to the American Dental Association's Guidelines for the Use of Sedation and General Anesthesia by Dentists, aimed at improving safety in dental offices, differentiate between levels of sedation based on drug-induced changes in physiologic and behavioral states. However, the author of this op-ed is concerned the proposed revisions may have far-reaching and unintended consequences.

  5. 75 FR 32122 - Revisions to Defense Priorities and Allocations System Regulations

    Science.gov (United States)

    2010-06-07

    ... INFORMATION CONTACT: John Isbell, Director (Acting), Defense Programs Division, Office of Strategic Industries.... 700.15 would reflect the time period in which the Office of Strategic Industries and Economic Security... allocation action; (c) The written signature on a manually placed order, or the digital signature or name on...

  6. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  7. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  8. 75 FR 65404 - Security Savings Bank, FSB; Olathe, KS; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-10-22

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Security Savings Bank, FSB; Olathe, KS... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision (OTS) has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Security Savings Bank, FSB, Olathe...

  9. 75 FR 54621 - Transparency Provisions of Section 23 of the Natural Gas Act; Notice of Availability of Revised...

    Science.gov (United States)

    2010-09-08

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. RM07-10-002] Transparency Provisions of Section 23 of the Natural Gas Act; Notice of Availability of Revised Form No. 552 for eFiling August 31, 2010. On August 17, 2010, the Office of Management and Budget approved a revised Form No. 552...

  10. 75 FR 67989 - Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure...

    Science.gov (United States)

    2010-11-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0084] Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure Protection Stakeholder Input Project--Generic... comments; New Information Collection Request: 1670-NEW. SUMMARY: The Department of Homeland Security...

  11. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    Biometrics security technology uses the physiological and ... verification and authentication methodology to verify how facial screening explores the different ... mouth, nose etc and stores the bio-information extracted from the face of every ...

  12. Special report. New products that improve officer performance, safety.

    Science.gov (United States)

    1991-12-01

    The need for products that improve performance of security officers is counterbalanced these days by budgetary constraints. While this may limit major investments in security systems and personnel, less costly improvements or innovations might be worth considering. In this report, we will discuss four advances that may be valuable not only in hospital security, but in other industries as well. One of them, a smoke filter, was originally developed for the hotel industry. Another, a drug detection device, may replace the use of undercover agents or drug-sniffing' dogs in certain circumstances. The third new product is an economical patrol vehicle for parking facilities which might replace more costly vehicles such as golf carts or cars. The fourth product, a roving CCTV camera, is actually being tested at a Midwest medical center and may allow you to monitor areas of parking garages with cameras instead of officers on patrol.

  13. 15 CFR 2008.18 - Information Security Oversight Committee.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Information Security Oversight Committee. 2008.18 Section 2008.18 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF...

  14. 12 CFR 792.68 - Use and collection of Social Security numbers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Use and collection of Social Security numbers... Act § 792.68 Use and collection of Social Security numbers. The head of each NCUA Office shall take... furnish Social Security numbers, and that individuals who are requested to provide Social Security numbers...

  15. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2012-03-14

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice...

  16. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day notice. SUMMARY: This notice...

  17. 77 FR 47440 - Office of the Assistant Secretary for Office of Disability Employment Program National Center on...

    Science.gov (United States)

    2012-08-08

    ... Opportunity Description The U.S. Department of Labor (DOL or Department), Office of Disability Employment... of policy by performing, upon request, rapid response to policy analysis and policy implementation... strategies to both individual job seekers and the systems that assist them in securing, retaining, and...

  18. Amplifying Security Education in the Laboratory

    National Research Council Canada - National Science Library

    Irvine, Cynthia

    1999-01-01

    Computer and network security have become concerns for enterprises ranging from sole proprietorships run from home offices to global corporations and government agencies with hundred of thousands of employees...

  19. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  20. Security of radioactive sources. Interim guidance for comment

    International Nuclear Information System (INIS)

    2003-06-01

    In previous IAEA publications, there have been only rather general security requirements for non-nuclear radioactive material. These requirements were primarily directed to such issues as unintentional exposure to radiation, negligence and inadvertent loss. However, it is clear that more guidance is needed to not only try and prevent further events involving orphan sources, but also to prevent the deliberate attempt to acquire radioactive sources for malevolent purposes. Member States have requested guidance on the type and nature of security measures that might be put in place and on the methodology to be used in choosing such measures. These requests were also endorsed in the findings of the international conference on 'Security of Radioactive Sources' held in March 2003. Practical advice on assessing and implementing security measures complements the general commitments in the proposed Revised Code of Conduct on Safety and Security of radioactive Sources. A Safety Guide entitled 'Safety and Security of Radiation Sources' that, amongst other things, discusses these issues is being drafted. However, it is recognized that guidance material is required before this document will be finalized in order to allow Member States opportunity to put in place appropriate actions and planning to address current issues. Hence the purpose of the current document is to provide advice on security approaches and to allow comment on detailed recommendations for levels of security on radioactive sources that may be incorporated within the Safety Guide. This report is primarily addressed to Regulatory Authorities but it is also intended to provide guidance to manufacturers, suppliers and users of sources. Its objective is to assist Member States in deciding which security measures are needed to ensure consistency with the International Basic Safety Standards and the Revised Code of Conduct for the Safety and Security of Radioactive Sources. It is recognized that there must be a

  1. 76 FR 72209 - Agency Information Collection Activities: Form N-300; Revision of an Existing Information...

    Science.gov (United States)

    2011-11-22

    ...) will be submitting the following information collection request to the Office of Management and Budget... Security (DHS), and to the Office of Management and Budget (OMB) USCIS Desk Officer. Comments may be... documentary requirements for those seeking to work in certain occupations [[Page 72210

  2. Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety

    Science.gov (United States)

    1998-05-01

    Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...

  3. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  4. Law enforcement officers' perception of rape and rape victims: a multimethod study.

    Science.gov (United States)

    Mennicke, Annelise; Anderson, Delaney; Oehme, Karen; Kennedy, Stephanie

    2014-01-01

    In a study to assess law enforcement officers' perceptions of rape and rape victims, researchers asked 149 law enforcement officers to respond to surveys which included a definition of rape measure, an unfounded rape claims measure, and the Rape Myth Acceptance Scale-Revised (RMA-R) measure. Although most officers scored low on the RMA-R--indicating that they did not adhere to myths about rape--most officers also responded with incomplete definitions of rape and inaccurate estimates of the number of false rape claims. Multivariate analyses indicated that officers' open-ended responses did not predict their scores on the RMA-R scale. It is argued that the RMA-R alone does not accurately measure officers' understanding of rape. Officers need ongoing training on the legal elements of the crime, the necessity of sensitivity with victims, and research-based statistics on the prevalence of rape.

  5. Revised conceptual designs for the FMDP MOX fresh fuel transport package

    International Nuclear Information System (INIS)

    Ludwig, S.B.; Michelhaugh, R.D.; Shappert, L.B.; Chae, S.M.; Tang, J.S.

    1998-03-01

    The revised conceptual designs described in this document provide a foundation for the development and certification of final transport package designs that will be needed to support the disposition of surplus weapons-grade plutonium as mixed-oxide (MOX) fuel in commercial light-water reactors in the US. This document is intended to describe the revised package design concepts and summarize the results of preliminary analyses and assessments of two new concepts for fresh MOX fuel transport packages that have been developed by Oak Ridge National Laboratory during the past year in support of the Department of Energy/Office of Fissile Materials Disposition

  6. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  7. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  8. Nuclear Regulatory Commission Human Factors Program Plan. Revision 2

    International Nuclear Information System (INIS)

    1986-04-01

    This document is the Second Annual Revision to the NRC Human Factors Program Plan. The first edition was published in August 1983. Revision 1 was published in July of 1984. Purpose of the NRC Human Factors Program is to ensure that proper consideration is given to human factors in the design and operation of nuclear power plants. This document describes the plans of the Office of Nuclear Reactor Regulation to address high priority human factors concerns of importance to reactor safety in FY 1986 and FY 1987. Revision 2 of the plan incorporates recent Commission decisions and policies bearing on the human factors aspects of reactor safety regulation. With a few exceptions, the principal changes from prior editions reflect a shift from developing new requirements to staff evaluation of industry progress in resolving human factors issues. The plan addresses seven major program elements: (1) Training, (2) Licensing Examinations, (3) Procedures, (4) Man-Machine Interface, (5) Staffing and Qualifications, (6) Management and Organization, and (7) Human Performance

  9. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  10. DOE Office of Environmental Management, 2016 Year in Review

    Energy Technology Data Exchange (ETDEWEB)

    None

    2016-12-01

    2016 accomplishments and primary areas of focus for the Department of Energy's (DOE's) Office of Environmental Management and EM sites are presented. For DOE EM, these include Focusing on the Field, Teaming with Cleanup Partners, Developing New Technology, and Maximizing Cleanup Dollars. Major 2016 achievements are highlighted for EM, Richland Operations Office, Office of River Protection, Savannah River Site, Oak Ridge, Idaho, Waste Isolation Pilot Plant, Los Alamos, Portsmouth, Paducah, West Valley Demonstration Project, and the Nevada National Security Site,

  11. 75 FR 59278 - Information Collection Request to Office of Management and Budget; OMB Control Numbers: 1625-0062...

    Science.gov (United States)

    2010-09-27

    ... Office of Management and Budget; OMB Control Numbers: 1625-0062, 1625-0078, and 1625-0082 AGENCY: Coast... Analyses to the Office of Management and Budget (OMB) requesting a revision of its approval for the...: (1) Online: http://www.regulations.gov . (2) Mail: Docket Management Facility (DMF) (M-30), U.S...

  12. [Food security in Mexico].

    Science.gov (United States)

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  13. Closure Report for Corrective Action Unit 566: EMAD Compound, Nevada National Security Site, Nevada with ROTC-1, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Mark Krauss

    2011-06-01

    lead shot • PCB-contaminated soil • Radiologically contaminated filters and equipment • Fuels, lubricants, engine coolants, and oils • Lead debris • Electrical and lighting components assumed to be potential source materials, including - fluorescent light bulbs - mercury switches (thermostats) - circuit boards - PCB-containing ballasts Closure of CAU 566 was achieved through a combination of removal activities and closure in place. Corrective actions to remove COCs, and known and assumed potential source materials, were implemented as was practical. The PCBs remaining at the site are bounded laterally, but not vertically, within CAS 25-99-20 based upon step-out sampling; the sources (e.g., PCB transformer oils, diesel fuel from locomotive reservoirs) have been removed; the practice of the application of PCB-containing oils for soil stabilization has ceased; and the COCs are not readily mobile in the environment. Closure in place is necessary, and future land use of the site will be restricted from intrusive activities. This will effectively eliminate inadvertent contact by humans with the contaminated media. The DOE, National Nuclear Security Administration Nevada Site Office, provides the following recommendations: • No further corrective action is required at CAS 25-99-20. • Closure in place of CAS 25-99-20. • A use restriction is required at CAU 566. • A Notice of Completion to the DOE, National Nuclear Security Administration Nevada Site Office, is requested from the Nevada Division of Environmental Protection for closure of CAU 566. • Corrective Action Unit 566 should be moved from Appendix III to Appendix IV of the Federal Facility Agreement and Consent Order.

  14. Report: Fiscal Year 2010 Federal Information Security Management Act Report

    Science.gov (United States)

    Report #11-P-0017, November 16, 2010. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2010 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  15. Punishment in School: The Role of School Security Measures

    Directory of Open Access Journals (Sweden)

    Thomas J Mowen

    2014-09-01

    Full Text Available Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001, perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010, and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004; Kupchik, 2010, few studies have sought to explore the impacts of these measures on suspension rates. Using data from the Educational Longitudinal Study (2002, I explore the relationship between security measures and in-school, out-of-school, and overall suspension rates. Results indicate schools with a security officer experience higher rates of in-school suspensions but have no difference in rates of out-of-school or overall suspensions compared to schools without a security officer. No other measure of security was related to higher suspension rates. As prior literature suggests, schools with greater proportions of black students experienced significantly higher rates of all suspension types. Finally, different types of parental involvement correlated with both higher and lower suspension rates.

  16. Training Course for Compliance Safety and Health Officers. Final Report.

    Science.gov (United States)

    McKnight, A. James; And Others

    The report describes revision of the Compliance Safety and Health Officers (CSHO) course for the Department of Labor, Occupational Safety and Health Administration (OSHA). The CSHO's job was analyzed in depth, in accord with OSHA standards, policies, and procedures. A listing of over 1,700 violations of OSHA standards was prepared, and specialists…

  17. 20 CFR 726.106 - Type of security.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Type of security. 726.106 Section 726.106... Authorization of Self-Insurers § 726.106 Type of security. (a) The Office shall determine the type or types of... which the surety on any such bond is a surety company, such company must be one approved by the U.S...

  18. 78 FR 3906 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-01-17

    ... intends to submit an Information Collection Request (ICR) to the Office of Management and Budget (OMB... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-1096] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  19. Russia and the System of Transatlantic Security: Perspectives for the Future

    National Research Council Canada - National Science Library

    Alexeev, Denis

    2006-01-01

    .... The international security system, which was created in the middle of 20th Century, can hardly be applied to contemporary reality and calls for a serious revision of at least some key principles...

  20. [General practitioners' commitment to treating excessive alcohol consumption: A question of role security in treating affected patients?].

    Science.gov (United States)

    Fankhänel, Thomas; Rascher, Anja; Thiel, Carolin; Schulz, Katrin; Klement, Andreas

    2016-01-01

    Only a few general practitioners (GPs) are committed to screen their patients for alcohol consumption and, in case of excessive alcohol consumption conduct by a brief intervention according to WHO recommendations. Apart from inadequate compensation and work load, another barrier identified by the GPs was their uncertainty about how to deal with affected patients. Most German universities presently spend no more than 90minutes lecture time on addiction medicine teaching. Our research aims to investigate the question whether medical studies and advanced medical education increases the role security of medical students and physicians and their commitment to implementing alcohol screening and brief intervention. Moreover, we will explore whether lack of therapeutic commitment can be related to lack of role security. Questionnaires were administered to pre-clinical and clinical medical students as well as senior house officers. Role security and therapeutic commitment of students and senior house officers were assessed using the Alcohol and Alcohol Problems Questionnaire (SAAPPQ) subscales "Role Security" and "Therapeutic Commitment". Analysis was based on 367 questionnaires. As expected, senior house officers reported more Role Security than clinical medical students who showed a higher level of Role Security than pre-clinical medical students. No differences could be found for Therapeutic Commitment. An association between Role Security and Therapeutic Commitment was only revealed for clinical medical students. Medical studies and advanced medical education can increase students' and senior house officers' Role Security to treat patients with excessive alcohol consumption, but not Therapeutic Commitment. Moreover, no association between Role Security and Therapeutic Commitment could be found for senior house officers. Hence, it may be assumed that educational activities aiming to increase Role Security do not promote the development of motivational aspects such as

  1. 13 CFR 102.35 - Use and collection of Social Security Numbers.

    Science.gov (United States)

    2010-01-01

    ... § 102.35 Use and collection of Social Security Numbers. Each Program/Support Office Head or designee... their social security numbers, unless: (1) The collection is authorized either by a statute; or (2) The social security numbers are required under statute or regulation adopted prior to 1975 to verify the...

  2. 75 FR 43492 - Federal Advisory Committee; National Security Education Board; Charter Renewal

    Science.gov (United States)

    2010-07-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; National Security... Department of Defense gives notice that it is renewing the charter for the National Security Education Board... awards that favors individuals expressing an interest in national security issues or pursuing a career in...

  3. 77 FR 43100 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-009...

    Science.gov (United States)

    2012-07-23

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Mary Ellen Callahan (703) 235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0097] Privacy Act of... Assistance Grant Programs System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system...

  4. 78 FR 59364 - Revision of Agency Information Collection Activity Under OMB Review: Transportation Worker...

    Science.gov (United States)

    2013-09-26

    ...: Joanna Johnson, TSA PRA Officer, Office of Information Technology (OIT), TSA-11, Transportation Security..., electronic, mechanical, or other technological collection techniques or other forms of information technology... documentation, biometric information, and proof of immigration status (if required). This information allows TSA...

  5. 17 CFR 200.19c - Director of the Office of Compliance Inspections and Examinations.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Director of the Office of Compliance Inspections and Examinations. 200.19c Section 200.19c Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organizatio...

  6. 78 FR 23573 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-19

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... Information Management, telephone 202-475-3532, or fax 202-475-3929, for questions on these documents. Contact... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0233] Information Collection Request to...

  7. 78 FR 54667 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-09-05

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... Information Management, telephone 202-475-3532, or fax 202-475-3929, for questions on these documents. Contact... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0779] Information Collection Requests to...

  8. 76 FR 46827 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-08-03

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on these documents. Contact... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0728] Information Collection Request to...

  9. 77 FR 74686 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-12-17

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on these documents. Contact... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-1047] Information Collection Request to...

  10. 78 FR 26798 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-05-08

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... Information Management, telephone 202-475-3532, or fax 202-475-3929, for questions on these documents. Contact... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0222] Information Collection Request to...

  11. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  12. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Science.gov (United States)

    2011-04-05

    ... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need the Social Security Number of the... request (ICR) 3206-0144, We Need the Social Security Number of the Person Named Below, RI 38-45. As... Operations, Retirement Services, Office of Personnel Management. Title: We Need the Social Security Number of...

  13. 13 CFR 102.33 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Security of systems of records....33 Security of systems of records. (a) Each Program/Support Office Head or designee shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent...

  14. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  15. TRAINING OF DEVELOPMENT OF SKILLS OF PROFESSIONAL COMMUNICATION THE SECURITY OFFICER OF THE CRIMINAL INVESTIGATION DEPARTMENT OF THE INTERNAL AFFAIRS

    Directory of Open Access Journals (Sweden)

    Yuliya Leonidovna Lampusova

    2015-08-01

    Full Text Available Training is a form of active learning that is aimed at developing knowledge, skills, and attitudes. To improve operational security officers of Internal Affairs Agencies activity, we have schemed out training for the development of communication skills. This paper presents the exercises focusing on the professional communication skills of employees of the Criminal Investigation Department of the Interior development. Eight exercises are described, the main objectives of them are: learning to navigate the feelings of the partner, the ability to change the position of the interlocutor, the formation of the ability to listen to the end and not to interrupt, developing the ability to talk, improving the communicative competence and the development of the ability to accurately convey information.

  16. 77 FR 30335 - Proposed Revision 3 to Standard Review Plan, Section 19.1 on Determining the Technical Adequacy...

    Science.gov (United States)

    2012-05-22

    ...). The Office of New Reactors and Office of Nuclear Reactor Regulation are revising SRP Section 19.1... of the Code of Federal Regulations (10 CFR), 50.71(h)(1), (h)(2), and (h)(3) for new reactors, (2... searching on http://www.regulations.gov under Docket ID NRC-2012-0113. You may submit comments by the...

  17. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  18. Security Police Officer Utilization Field, AFSCs 8111, 8116, 8121, and 8124.

    Science.gov (United States)

    1981-06-01

    STATEMENT A M C Approved for public release 82 0 4 26Distribution Unlimited C=DCC=D= APS 8 1 X CECI I CODING INSTRUCTIONS -- -- -" Print the booklet copy...m == NAME (Last, First, Middle Initial) DATE OF BIRTH SEX YR NO DAY (MALE -"(11-34) (3s-5- rayo (41) PRESENT GRADE: SOCIAL SECURITY ACCOUNT NUMBER...Branch - 11. OIC Missile Support Branch - __m 12. OIC Weapons Systems Security , 4 8 CODE 99 X ~.t ! AFS 81XX -mmm -C - . .’ .9 - =, BACKGROUND

  19. 76 FR 8373 - Agency Information Collection Activities: Revision of an Existing Information Collection; Comment...

    Science.gov (United States)

    2011-02-14

    ... DEPARTMENT OF HOMELAND SECURITY United States Immigration and Customs Enforcement Agency... Management and Budget. Comments should be addressed to OMB Desk Officer, for United States Immigration and... (SEVIS); OMB Control No. 1653-0038, * * * * * The Department of Homeland Security, U.S. Immigration and...

  20. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Science.gov (United States)

    2010-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of the...

  1. Professionalization of the Senior Chinese Officer Corps Trends and Implications

    National Research Council Canada - National Science Library

    Mulvenon, James

    1997-01-01

    ... consequences for longer-term U.S. national security interests. Specifically, this report evaluates demographic and cohort changes in the officer corps of the Chinese People's Liberation Army (PLA...

  2. Information security governance simplified from the boardroom to the keyboard

    CERN Document Server

    Fitzgerald, Todd

    2011-01-01

    Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security d

  3. Business processes in the RFID-equipped restricted access administrative office

    Directory of Open Access Journals (Sweden)

    Robert Waszkowski

    2016-01-01

    Full Text Available The paper presents business processes in the RFID-equipped restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. The presented models include the fact that the facilities in the secret office (cabinet, sluice, photocopier, desks are equipped with the RFID reader, which allows to immediately read the documents that are within their reach.

  4. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  5. US statutes of general interest to safeguards and security officers

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1988-09-01

    This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)

  6. 76 FR 31272 - Permanent Certification Program for Health Information Technology; Revisions to ONC-Approved...

    Science.gov (United States)

    2011-05-31

    ... Permanent Certification Program for Health Information Technology; Revisions to ONC-Approved Accreditor Processes AGENCY: Office of the National Coordinator for Health Information Technology (ONC), Department of... Coordinator for Health Information Technology (the National Coordinator) by section 3001(c)(5) of the Public...

  7. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  8. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Amended Record of Decision... National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of... Manager, Office of Fissile Materials Disposition, National Nuclear Security Administration, U.S...

  9. Lethal stakes: rig-hand killings show rising security risks abroad

    Energy Technology Data Exchange (ETDEWEB)

    Lorenz, A

    1999-05-03

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards.

  10. Lethal stakes: rig-hand killings show rising security risks abroad

    International Nuclear Information System (INIS)

    Lorenz, A.

    1999-01-01

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards

  11. Securing IoT Devices at CERN

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    CERN has more than 1000 Internet of Things (IoT) devices, which are connected to the office network. We have been doing the research to find all vulnerable IoT devices in CERN and mitigated them. We are currently working on detecting IoT devices automatically and, moreover, identifying the manufacturer, model and the running firmware version. This will help the CERN Computer Security Team to spot vulnerable devices and to show the security risks associated with them.

  12. Task team approach to safeguards and security designs

    International Nuclear Information System (INIS)

    Zack, N.R.; Wilkey, D.D.

    1991-01-01

    In 1987, a U.S. department of Energy (DOE) supported task team was organized at the request of the DOE Idaho Field Office (DOE-ID) to provide support for safeguards and security (S and S) designs of the Special Isotope Separation (SIS) facility. Prior to deferral of the project, the SIS facility was to be constructed at the Idaho National Engineering Laboratory (INEL) to produce weapons grade plutonium from DOE owned fuel grade plutonium. The task team was assembled to provide the resources necessary to assure that S and S considerations were included as an integral part of the design of the facility, and that SIS designs would take advantage of available technology in the areas of physical security, measurements, accountability, and material and personnel tracking. The task team included personnel from DOE/Office of Safeguards and Security (DOE-OSS), DOE-ID, DOE contractors, and the national laboratories providing a wide range of expertise and experience. This paper reports that the team reviewed proposed designs and provided recommendations for safeguards and security features in each stage of the design process. The value of this approach to safeguards and security designs will be discussed with respect to benefits, lessons learned, and recommendations for future applications

  13. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Science.gov (United States)

    2010-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  14. Underground Test Area Fiscal Year 2014 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan

    2015-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities from October 1, 2013, through September 30, 2014 (fiscal year [FY] 2014). All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); National Security Technologies, LLC (NSTec); Navarro-Intera, LLC (N-I); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2014. The activities included conducting oversight assessments for QAP compliance, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. UGTA Activity participants conducted 25 assessments on topics including safe operations, QAP compliance, activity planning, and sampling. These assessments are summarized in Section 2.0. Corrective actions tracked in FY 2014 are presented in Appendix A. Laboratory performance was evaluated based on three approaches: (1) established performance evaluation programs (PEPs), (2) interlaboratory comparisons, or (3) data review. The results of the laboratory performance evaluations, and interlaboratory comparison results are summarized in Section 4.0. The UGTA Activity published three public documents and a variety of other publications in FY 2014. The titles, dates, and main authors are identified in Section 5.0. The Contract Managers, Corrective Action Unit (CAU) Leads, Preemptive Review (PER) Committee members, and Topical Committee members are listed by name and organization in Section 6.0. Other activities that affected UGTA quality are discussed in Section 7.0. Section 8.0 provides the FY 2014 UGTA QA program conclusions, and Section 9.0 lists the references not identified in Section 5.0.

  15. Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  16. Novel Approaches to Enhance Mobile WiMAX Security

    Directory of Open Access Journals (Sweden)

    Taeshik Shon

    2010-01-01

    Full Text Available The IEEE 802.16 Working Group on Broadband Wireless Access Standards released IEEE 802.16-2004 which is a standardized technology for supporting broadband and wireless communication with fixed and nomadic access. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handover and roaming capabilities. In the area of security aspects, compared to IEEE 802.16-2004, IEEE 802.16e, called Mobile WiMAX, adopts improved security architecture—PKMv2 which includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, there is no guarantee that PKMv2-based Mobile WiMAX network will not have security flaws. In this paper, we investigate the current Mobile WiMAX security architecture focusing mainly on pointing out new security vulnerabilities such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication. Based on the investigation results, we propose a novel Mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX, to prevent the new security vulnerabilities.

  17. Office of Child Support and Enforcement (OCSE) State Wage Alerts

    Data.gov (United States)

    Social Security Administration — The OCSE State Wage Alert is a quarterly match which detects SSI overpayments by identifying unreported wage and unemployment data provided to the Office of Child...

  18. 78 FR 79654 - Vermont: Proposed Authorization of State Hazardous Waste Management Program Revisions

    Science.gov (United States)

    2013-12-31

    ...] Vermont: Proposed Authorization of State Hazardous Waste Management Program Revisions AGENCY... Docket ID No. EPA-R01- RCRA-2013-0554, by mail to Sharon Leitch, RCRA Waste Management and UST Section..., RCRA Waste Management and UST Section, Office of Site Remediation and Restoration (OSRR07-1), US EPA...

  19. 7 CFR 2.91 - Director, Office of Operations.

    Science.gov (United States)

    2010-01-01

    ..., excess property pool, resource recovery, shipping and receiving, forms, labor services, issuing of... maintaining the security of physical facilities, self-protection, and warden services, in the Washington, DC..., Office of Operations: (1) Provide services for Department headquarters in the Washington, DC metropolitan...

  20. 15 CFR 730.9 - Organization of the Bureau of Industry and Security.

    Science.gov (United States)

    2010-01-01

    ... Enforcement Analysis and the Office of Antiboycott Compliance. The roles of these units are described on BIS's...-units: the Office of Nonproliferation and Treaty Compliance, the Office of National Security and... Operating Committee are described in § 750.4(f)(1) of the EAR. The roles of the other units are described on...

  1. 76 FR 72636 - Permanent Certification Program for Health Information Technology; Revisions to ONC-Approved...

    Science.gov (United States)

    2011-11-25

    ... Permanent Certification Program for Health Information Technology; Revisions to ONC-Approved Accreditor Processes AGENCY: Office of the National Coordinator for Health Information Technology (ONC), Department of... Coordinator for Health Information Technology by section 3001(c)(5) of the Public Health Service Act (PHSA) as...

  2. Security culture: One for all, and all for one

    International Nuclear Information System (INIS)

    Gaspar, Milos

    2016-01-01

    Preventing the theft of nuclear material and attacks and sabotage against nuclear installations is a challenge that governments, nuclear regulators and operators around the world are increasingly facing. “Terrorism is a real threat that exists around the world and also in Indonesia. And it can affect nuclear security,” said Khairul Khairul, a senior nuclear security officer at Indonesia’s National Nuclear Energy Agency (BATAN), which operates three research reactors. “We need to strengthen the notion of nuclear security in our entire workforce by developing a strong nuclear security culture.”

  3. Nevada National Security Site Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  4. Differences in ergonomic and workstation factors between computer office workers with and without reported musculoskeletal pain.

    Science.gov (United States)

    Rodrigues, Mirela Sant'Ana; Leite, Raquel Descie Veraldi; Lelis, Cheila Maira; Chaves, Thaís Cristina

    2017-01-01

    Some studies have suggested a causal relationship between computer work and the development of musculoskeletal disorders. However, studies considering the use of specific tools to assess workplace ergonomics and psychosocial factors in computer office workers with and without reported musculoskeletal pain are scarce. The aim of this study was to compare the ergonomic, physical, and psychosocial factors in computer office workers with and without reported musculoskeletal pain (MSP). Thirty-five computer office workers (aged 18-55 years) participated in the study. The following evaluations were completed: Rapid Upper Limb Assessment (RULA), Rapid Office Strain Assessment (ROSA), and Maastricht Upper Extremity Questionnaire revised Brazilian Portuguese version (MUEQ-Br revised). Student t-tests were used to make comparisons between groups. The computer office workers were divided into two groups: workers with reported MSP (WMSP, n = 17) and workers without positive report (WOMSP, n = 18). Those in the WMSP group showed significantly greater mean values in the total ROSA score (WMSP: 6.71 [CI95% :6.20-7.21] and WOMSP: 5.88 [CI95% :5.37-6.39], p = 0.01). The WMSP group also showed higher scores in the chair section of the ROSA, workstation of MUEQ-Br revised, and in the upper limb RULA score. The chair height and armrest sections from ROSA showed the higher mean values in workers WMSP compared to workers WOMSP. A positive moderate correlation was observed between ROSA and RULA total scores (R = 0.63, p ergonomics indexes for chair workstation and worse physical risk related to upper limb (RULA upper limb section) than workers without pain. However, there were no observed differences in workers with and without MSP regarding work-related psychosocial factors. The results suggest that inadequate workstation conditions, specifically the chair height, arm and back rest, are linked to improper upper limb postures and that these factors are contributing to

  5. Audit Report on "The Office of Science's Management of Information Technology Resources"

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-11-01

    The Department of Energy's Office of Science (Science) and its facility contractors are aggressive users of information technology (IT) to support fundamental research in areas such as energy, environmental remediation and computational sciences. Of its $4 billion Fiscal Year 2008 budget, Science spent about $287 million to manage its IT program. This included cyber security activities, acquisition of hardware and software, and support service costs used to maintain the operating environments necessary to support the missions of the program. Prior Office of Inspector General reports have identified various issues with Science's management of its IT programs and resources. For instance, our report on Facility Contractor Acquisition and Management of Information Technology Hardware (DOE/IG-0768, June 2007) noted that the Science sites reviewed spent more than necessary when acquiring IT hardware. In another example, our review of The Department's Efforts to Implement Common Information Technology Services at Headquarters (DOE/IG-0763, March 2007) disclosed that Science's reluctance to adopt the Department of Energy Common Operating Environment (DOE-COE) at Headquarters contributed to the Department's inability to fully realize potential cost savings through consolidation and economies of scale. In light of the magnitude of the Office of Science IT program and previously identified program weaknesses, we initiated this audit to determine whether Science adequately managed its IT resources. Science had taken a number of actions to improve its cyber security posture and align its program to Federal requirements. Yet, our review disclosed that it had not taken some basic steps to enhance security and reduce costs. In particular, we found that: (1) For their non-scientific computing environments, all seven of the field sites reviewed (two Federal, five contractor) had implemented security configurations that were less stringent than those included

  6. Preliminary Study on the Revision of Nuclear Safety Policy Statement

    International Nuclear Information System (INIS)

    Lee, Y. E.; Lee, S. H.; Chang, H. S.; Choi, K. S.; Jung, S. J.

    2011-01-01

    Nuclear safety policy in Korea is currently declared in the Nuclear Safety Charter as the highest tier document and safety principles and directions are announced in the Nuclear Safety Policy Statement. As the circumstances affecting on the nuclear safety policy change, it needs to revise the Statement. This study aims to develop the revised Nuclear Safety Policy Statement to declare that securing safety is a prerequisite to the utilization of nuclear energy, and that all workers in nuclear industry and regulatory body must adhere to the principle of priority to safety. As a result, two different types of revision are being prepared as of August. One is based on the spirit of Nuclear Safety Charter as well as the direction of future-oriented safety policies including the changes in the environment after declaration of the Statement. The other is to declare the fundamental safety objective and safety principles as the top philosophy of national nuclear safety policy by adopting the '10 Safety Principles in IAEA Safety Fundamental' instead of the current Charter. Both versions of revision are subject to further in-depth discussion. However once the revision is finalized and declared, it would be useful to accomplish effectively the organizational responsibilities and to enhance the public confidence in nuclear safety by performing the regulatory activities in a planned and systematic manner and promulgating the government's dedication to priority to safety

  7. Lawrence Livermore National Laboratory Safeguards and Security quarterly progress report ending March 31, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Davis, B.; Davis, G.; Johnson, D.; Mansur, D.L.; Ruhter, W.D.; Strait, R.S.

    1996-04-01

    LLNL carries out safeguards and security activities for DOE Office of Safeguards and Security (OSS) and other organizations within and outside DOE. LLNL is supporting OSS in 6 areas: safeguards technology, safeguards and materials accountability, computer security--distributed systems, complex-wide access control, standardization of security systems, and information technology and security center. This report describes the activities in each of these areas.

  8. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  9. 75 FR 77939 - Agency Information Collection Activities; Revision of a Currently Approved Information Collection...

    Science.gov (United States)

    2010-12-14

    ...-0378] Agency Information Collection Activities; Revision of a Currently Approved Information Collection... Affairs, Office of Management and Budget. Comments should be addressed to the attention of the Desk... divided by 60 minutes per hour). Background: Under the Paperwork Reduction Act of 1995 (44 U.S.C. 3501...

  10. Cardiology office computer use: primer, pointers, pitfalls.

    Science.gov (United States)

    Shepard, R B; Blum, R I

    1986-10-01

    An office computer is a utility, like an automobile, with benefits and costs that are both direct and hidden and potential for disaster. For the cardiologist or cardiovascular surgeon, the increasing power and decreasing costs of computer hardware and the availability of software make use of an office computer system an increasingly attractive possibility. Management of office business functions is common; handling and scientific analysis of practice medical information are less common. The cardiologist can also access national medical information systems for literature searches and for interactive further education. Selection and testing of programs and the entire computer system before purchase of computer hardware will reduce the chances of disappointment or serious problems. Personnel pretraining and planning for office information flow and medical information security are necessary. Some cardiologists design their own office systems, buy hardware and software as needed, write programs for themselves and carry out the implementation themselves. For most cardiologists, the better course will be to take advantage of the professional experience of expert advisors. This article provides a starting point from which the practicing cardiologist can approach considering, specifying or implementing an office computer system for business functions and for scientific analysis of practice results.

  11. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Science.gov (United States)

    2010-08-16

    ... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security... Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... System Operator Security Information. Type of Request: New collection. OMB Control Number: Not yet...

  12. Hearing Office Dispositions Per ALJ Per Day Rate Ranking Report

    Data.gov (United States)

    Social Security Administration — A ranking of ODAR hearing offices by the average number of hearings dispositions per ALJ per day. The average shown will be a combined average for all ALJs working...

  13. 75 FR 74123 - Office of the Commissioner; Cost-of-Living Increase and Other Determinations for 2011; Correction

    Science.gov (United States)

    2010-11-30

    ... claiming benefits, call 1-800-772- 1213, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0054] Office of the Commissioner; Cost-of-Living Increase and Other Determinations for 2011; Correction AGENCY: Social Security Administration...

  14. A methodology for performing computer security reviews

    International Nuclear Information System (INIS)

    Hunteman, W.J.

    1991-01-01

    DOE Order 5637.1, ''Classified Computer Security,'' requires regular reviews of the computer security activities for an ADP system and for a site. Based on experiences gained in the Los Alamos computer security program through interactions with DOE facilities, we have developed a methodology to aid a site or security officer in performing a comprehensive computer security review. The methodology is designed to aid a reviewer in defining goals of the review (e.g., preparation for inspection), determining security requirements based on DOE policies, determining threats/vulnerabilities based on DOE and local threat guidance, and identifying critical system components to be reviewed. Application of the methodology will result in review procedures and checklists oriented to the review goals, the target system, and DOE policy requirements. The review methodology can be used to prepare for an audit or inspection and as a periodic self-check tool to determine the status of the computer security program for a site or specific ADP system. 1 tab

  15. A methodology for performing computer security reviews

    International Nuclear Information System (INIS)

    Hunteman, W.J.

    1991-01-01

    This paper reports on DIE Order 5637.1, Classified Computer Security, which requires regular reviews of the computer security activities for an ADP system and for a site. Based on experiences gained in the Los Alamos computer security program through interactions with DOE facilities, the authors have developed a methodology to aid a site or security officer in performing a comprehensive computer security review. The methodology is designed to aid a reviewer in defining goals of the review (e.g., preparation for inspection), determining security requirements based on DOE policies, determining threats/vulnerabilities based on DOE and local threat guidance, and identifying critical system components to be reviewed. Application of the methodology will result in review procedures and checklists oriented to the review goals, the target system, and DOE policy requirements. The review methodology can be used to prepare for an audit or inspection and as a periodic self-check tool to determine the status of the computer security program for a site or specific ADP system

  16. Revised White House Peer Review Guidelines Draw Generally Favorable Respons

    Science.gov (United States)

    Showstack, Randy

    2004-04-01

    A new bulletin from the White House Office of Management and Budget outlines minimum standards for peer review of scientific information that includes findings representing an official position of a department or agency of the federal government. The OMB Revised Information Quality Bulletin for Peer Review, released on 15 April, substantially modifies a previous draft issued on 15 September 2003, which some had criticized as restrictive and imbalanced.

  17. New HIPAA rules: a guide for radiology providers.

    Science.gov (United States)

    Dresevic, Adrienne; Mikel, Clinton

    2013-01-01

    The Office for Civil Rights issued its long awaited final regulations modifying the HIPAA privacy, security, enforcement, and breach notification rules--the HIPAA Megarule. The new HIPAA rules will require revisions to Notice of Privacy Practices, changes to business associate agreements, revisions to HIPAA privacy and security policies and procedures, and an overall assessment of HIPAA compliance. The HIPAA Megarule formalizes the HITECH Act requirements, and makes it clear that the OCRs ramp up of HIPAA enforcement is not merely a passing trend. The new rules underscore that both covered entities and business associates must reassess and strengthen HIPAA compliance.

  18. 75 FR 43579 - Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and...

    Science.gov (United States)

    2010-07-26

    ... the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of Management and... safeguards for disclosure of Social Security benefit information to OPM via direct computer link for the... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  19. 78 FR 3474 - Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and...

    Science.gov (United States)

    2013-01-16

    ... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  20. Recent advances in systems safety and security

    CERN Document Server

    Stamatescu, Grigore

    2016-01-01

    This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security – IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania. It includes 14 chapters, co-authored by 34 researchers from 7 countries. The book provides an useful reference from both theoretical and applied perspectives in what concerns recent progress in this area of critical interest. Contributions, broadly grouped by core topic, address challenges related to information theoretic methods for assuring systems safety and security, cloud-based solutions, image processing approaches, distributed sensor networks and legal or risk analysis viewpoints. These are mostly accompanied by associated case studies providing additional practical value and underlying the broad relevance and impact of the field.

  1. 76 FR 17158 - Assumption Buster Workshop: Distributed Data Schemes Provide Security

    Science.gov (United States)

    2011-03-28

    ... national security systems, is seeking expert participants in a day-long workshop on the pros and cons of... AGENCY: The National Coordination Office (NCO) for the Networking and Information Technology Research and... Office for the Networking and Information Technology Research and Development (NITRD) Program on behalf...

  2. 76 FR 68811 - Notice of Request for the Revision of Currently Approved Information Collection

    Science.gov (United States)

    2011-11-07

    ... operating information from the nation's public transportation systems. Congress created the NTD to be the... request the Office of Management and Budget (OMB) to approve the revision of the currently approved information collection: 49 U.S.C. 5335(a) and (b) National Transit Database (NTD). DATES: Comments must be...

  3. 78 FR 28732 - Revisions to Electric Quarterly Report Filing Process; Availability of Draft XML Schema

    Science.gov (United States)

    2013-05-16

    ...] Revisions to Electric Quarterly Report Filing Process; Availability of Draft XML Schema AGENCY: Federal... the SUPPLEMENTARY INFORMATION Section below for details. DATES: The XML is now available at the links mentioned below. FOR FURTHER INFORMATION CONTACT: Christina Switzer, Office of the General Counsel, Federal...

  4. 76 FR 1431 - Public Water System Supervision Program Revision for the State of New Mexico

    Science.gov (United States)

    2011-01-10

    ... Public Water System Supervision Program. New Mexico has adopted the Ground Water Rule (GWR), the Long... the following offices: New Mexico Environment Department, Drinking Water Bureau, 525 Camino De Los... of New Mexico proposes to revise its approved Public Water System Supervision Primacy Program. This...

  5. Security and the 2015 elections: issues and perspectives | Attoh Ph ...

    African Journals Online (AJOL)

    Politics is the quest for power, influence and authority and for the simple reason that political office aids the allocation of resources in transition states it is often viewed as warfare with attendant security implications. Security which is the freedom from danger or damage whether physical or emotional is imperative in the ...

  6. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Science.gov (United States)

    2010-02-23

    ... Policy, U.S. Department of Homeland Security, Washington, DC 20528. For privacy issues please contact... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0040] Privacy Act of... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY...

  7. Affairs of State: The Interagency and National Security

    National Research Council Canada - National Science Library

    Marcella, Gabriel

    2008-01-01

    The war colleges of the United States are a unique national asset. They are centers of academic excellence for preparing military and civilian officers for higher positions in the national security system...

  8. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-04-06

    ... issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program Records System of Records AGENCY: Privacy Office...

  9. 17 CFR 200.13b - Director of the Office of Public Affairs, Policy Evaluation, and Research.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Director of the Office of Public Affairs, Policy Evaluation, and Research. 200.13b Section 200.13b Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General...

  10. 78 FR 42872 - Communication with the U.S. Copyright Office: Revised Addresses

    Science.gov (United States)

    2013-07-18

    ... required by that form and its accompanying instructions. Computation of the copyright royalty fee shall be... distant signal equivalents and the copyright royalty fee shall be in accordance with the procedures set... Office and to make advance deposits into that account. Deposit Account holders can charge copyright fees...

  11. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0102] Privacy Act of... Data System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to...

  12. Low Emissions Alternative Power (LEAP) Project Office Business Team of the Aeropropulsion Research Program Office (ARPO) Org. 0140

    Science.gov (United States)

    Buttler, Jennifer A.

    2004-01-01

    The program for which I am working at this summer is Propulsion and Power/Low Emissions Alternative Power (P&P/LEAP). It invests in a fundamental TRL 1-6 research and technology portfolio that will enable the future of: Alternative fuels and/or alternative propulsion systems, non-combustion (electric) propulsion systems. P&P/LEAP will identify and capitalize on the highest potential concepts generated both internal and external to the Agency. During my 2004 summer at NASA Glenn Research Center, I worked with my mentor Barbara Mader, in the Project Office with the Business Team completing various tasks for the project and personnel. The LEAP project is a highly matrixed organization. The Project Office is responsible for the goals advocacy and dollar (budget) of the LEAP project. The objectives of the LEAP Project are to discover new energy sources and develop unconventional engines and power systems directed towards greatly reduced emissions, enable new vehicle concepts for public mobility, new science missions and national security. The Propulsion and PowerLow Emissions Alternative Power directly supports the environmental, mobility, national security objectives of the Vehicle Systems Program and the Aeronautics Technology Theme. Technology deliverables include the demonstration through integrated ground tests, a constant volume combustor in an engine system, and UAV/small transport aircraft all electric power system. My mentor serves as a key member of the management team for the Aeropropulsion Research Program Office (ARPO). She has represented the office on numerous occasions, and is a member of a number of center-wide panels/teams, such as the Space management Committee and is chair to the Business Process Consolidation Team. She is responsible for the overall coordination of resources for the Propulsion and Power Project - from advocacy to implementation. The goal for my summer at NASA was to document processes and archive program documents from the past

  13. 78 FR 47697 - Public Water System Supervision Program Revision for the State of Louisiana

    Science.gov (United States)

    2013-08-06

    ...: 1) Long Term 2 Enhanced Surface Water Treatment Rule (LT2), 2) the Stage 2 Disinfectants and Disinfection Byproducts Rule (DBP2), and 3) the Lead and Copper Rule Short-Term Revisions and Clarifications...: Louisiana Department of Health and Hospitals, Office of Public Health, Bienville Building, 628 4th Street...

  14. 75 FR 46845 - Revisions to the California State Implementation Plan, South Coast Air Quality Management District

    Science.gov (United States)

    2010-08-04

    ... the California State Implementation Plan, South Coast Air Quality Management District AGENCY... approve revisions to the South Coast Air Quality Management District (SCAQMD) portion of the California..., this action: Is not a ``significant regulatory action'' subject to review by the Office of Management...

  15. 76 FR 76115 - Revisions to the California State Implementation Plan, Feather River Air Quality Management District

    Science.gov (United States)

    2011-12-06

    ... the California State Implementation Plan, Feather River Air Quality Management District AGENCY... limited disapproval of revisions to the Feather River Air Quality Management District (FRAQMD) portion of..., Regulatory Planning and Review The Office of Management and Budget (OMB) has exempted this regulatory action...

  16. 75 FR 21012 - Extension of Agency Information Collection Activity Under OMB Review: Highway Corporate Security...

    Science.gov (United States)

    2010-04-22

    ... Information Collection Activity Under OMB Review: Highway Corporate Security Review (CSR) AGENCY... (ICR), OMB control number 1652-0036, abstracted below to the Office of Management and Budget (OMB) for... collection to the Office of Information and Regulatory Affairs, Office of Management and Budget. Comments...

  17. 12 CFR 563g.16 - Delayed or continuous offering and sale of securities.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Delayed or continuous offering and sale of securities. 563g.16 Section 563g.16 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.16 Delayed or continuous offering and sale of securities. Any offer or...

  18. 77 FR 53773 - Revisions to the California State Implementation Plan, South Coast Air Quality Management...

    Science.gov (United States)

    2012-09-04

    ... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 52 [EPA-R09-OAR-2012-0236; FRL-9711-2] Revisions to the California State Implementation Plan, South Coast Air Quality Management District (SCAQMD) AGENCY... ``significant regulatory action'' subject to review by the Office of Management and Budget under Executive Order...

  19. Categorization of radioactive sources. Revision of IAEA-TECDOC-1191, Categorization of radiation sources

    International Nuclear Information System (INIS)

    2003-07-01

    the Safety of Radiation Sources and the Security of Radioactive Materials (the Action Plan) in Attachment 2 to publication GOV/1999/46-GC(43)/10. In September 1999, the Board approved the Action Plan and requested the Secretariat to implement it. The subsequent General Conference endorsed the Board's decision and urged the Secretariat to implement the Action Plan. The Action Plan covered seven major work areas, one of which identified the need for a system of source categorization. The resulting IAEA-TECDOC-1191 Categorization of Radiation Sources, was published in December 2000. Whilst IAEA-TECDOC-1191 provided a useful system for categorizing radioactive sources, according to radiological and other risks, it was limited in its scope of application. Under the auspices of the Action Plan, the IAEA also organized an International Conference of National Regulatory Authorities with Competence in the Safety of Radiation Sources and the Security of Radioactive Material, which was held in Buenos Aires, Argentina, from 11 to 15 December 2000 (the Buenos Aires Conference). At its meetings in March 2001 the Board considered the report on the major findings of the Buenos Aires Conference (GOV/2001/3, 12 February 2001). It noted these major findings and requested the Secretariat to assess the implications of the major findings of the Buenos Aires Conference for the Action Plan for the Safety of Radiation Sources and the Security of Radioactive Materials, and to implement any adjustments to the Action Plan that may be necessary. The subsequent revised Action Plan on the Safety and Security of Radiation Sources (GOV/2001/29-GC(45)/12) noted the need to review how the categorization system was being used, and to consider revising it. The Secretariat also recognized that the new categorization system was crucial to other high priority work initiatives being carried out by IAEA, such as the revised Code of Conduct on the Safety and Security of Radioactive Sources (in preparation) and

  20. 75 FR 52753 - Agency Recordkeeping/Reporting Requirements Under Emergency Review by the Office of Management...

    Science.gov (United States)

    2010-08-27

    ... therefore submitting a revised data collection form for emergency clearance. The definition of subsidized... Recordkeeping/Reporting Requirements Under Emergency Review by the Office of Management and Budget (OMB) Title: TANF Emergency Fund Subsidized Employment Report, Form OFA- 200. OMB No.: New Collection. Description...

  1. 40 CFR 56.5 - Mechanisms for fairness and uniformity-Responsibilities of Regional Office employees.

    Science.gov (United States)

    2010-07-01

    ....2-005A, or revision thereof. Where regulatory actions may involve inconsistent application of the... interpretation of the Act, or rule, regulation, or program directive when such interpretation may result in inconsistent application among the Regional Offices of the act or rule, regulation, or program directive. (c...

  2. Field Office Telephone Service - Monthly National Answer Rate and Busy Rate

    Data.gov (United States)

    Social Security Administration — This dataset provides information at the national level by month for federal fiscal year 2013 onward for answer rate and busy rate for calls to our field offices....

  3. 76 FR 39887 - Extension of Agency Information Collection Activity Under OMB Review: Highway Corporate Security...

    Science.gov (United States)

    2011-07-07

    ... Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of Management... industry by way of its Highway Corporate Security Review (CSR) Program, which encompasses site visits and... the site visit, TSA personnel complete the CSR form, which asks security-related questions. This...

  4. 77 FR 25686 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Science.gov (United States)

    2012-05-01

    ... Director of the Office of Management and Budget, and the Director of NIST on security and privacy issues... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB...

  5. 78 FR 56742 - Revision of Approved Information Collection (Paperwork) Requirements for Office of Management and...

    Science.gov (United States)

    2013-09-13

    ... the causes and prevention of occupational injuries, illnesses, and accidents (29 U.S.C. 657). The OSH... construction. Accordingly, construction businesses with workers who operate or work in the vicinity of cranes... in construction work subject to 29 CFR part 1926 subpart V. OSHA revised the exemption in existing 29...

  6. 12 CFR 559.12 - How may a subsidiary of a savings association issue securities?

    Science.gov (United States)

    2010-01-01

    ... issue securities? 559.12 Section 559.12 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF... may a subsidiary of a savings association issue securities? (a) A subsidiary may issue, either...”) may issue. The subsidiary must not state or imply that the securities it issues are covered by federal...

  7. 78 FR 59981 - Proposed Revision to Physical Security-Standard Design Certification and Operating Reactors

    Science.gov (United States)

    2013-09-30

    ... Design Certification and Operating Reactors AGENCY: Nuclear Regulatory Commission. ACTION: Standard... Design Certification and Operating Reactors.'' The NRC seeks comments on the proposed revised section of... subject): Federal Rulemaking Web site: Go to http://www.regulations.gov and search for Docket ID NRC-2013...

  8. 75 FR 28276 - Agency Information Collection Activities: NAFTA Regulations and Certificate of Origin

    Science.gov (United States)

    2010-05-20

    ... Review: Revision. Affected Public: Businesses. Form 434, NAFTA Certificate of Origin: Estimated Number of... Activities: NAFTA Regulations and Certificate of Origin AGENCY: U.S. Customs and Border Protection... Homeland Security has submitted the following information collection request to the Office of Management...

  9. 76 FR 39108 - HIT Policy Committee's Workgroup Meetings; Notice of Meetings

    Science.gov (United States)

    2011-07-05

    ...: Meaningful Use, Privacy & Security Tiger Team, Quality Measures, Governance, Adoption/Certification, and... with the Federal Health IT Strategic Plan and that includes recommendations on the areas in which... revised schedules as it becomes available. Contact Person: Judy Sparrow, Office of the National...

  10. 78 FR 56639 - Revisions to the California State Implementation Plan, South Coast Air Quality Management District

    Science.gov (United States)

    2013-09-13

    ...] Revisions to the California State Implementation Plan, South Coast Air Quality Management District AGENCY... the South Coast Air Quality Management District (SCAQMD) portion of the California State... the Office of Management and Budget under Executive Order 12866 (58 FR 51735, October 4, 1993); does...

  11. 77 FR 32398 - Revisions to the California State Implementation Plan, South Coast Air Quality Management District

    Science.gov (United States)

    2012-06-01

    ... the California State Implementation Plan, South Coast Air Quality Management District AGENCY... approve a revision to the South Coast Air Quality Management District (SCAQMD) portion of the California... action: Is not a ``significant regulatory action'' subject to review by the Office of Management and...

  12. 77 FR 22676 - Revisions to the Arizona State Implementation Plan, Pinal County Air Quality Control District

    Science.gov (United States)

    2012-04-17

    ... the Arizona State Implementation Plan, Pinal County Air Quality Control District AGENCY: Environmental... disapproval of a revision to the Pinal County Air Quality Control District portion of the Arizona State... the Control Officer to determine whether the manner of control of fugitive emissions is satisfactory...

  13. RELIGION, PEACE AND SECURITY IN NIGERIA Osaji, Jacob ...

    African Journals Online (AJOL)

    HP

    2005-02-07

    Feb 7, 2005 ... (modern) state faces justify an assessment of the role of religion in sustaining .... fortress and refuge, thus, God becomes his Chief security officer, a .... Houses and other places of financial mismanagement, corruption, money.

  14. UMTRA Project Office quality assurance program plan. Revision 6

    International Nuclear Information System (INIS)

    1994-09-01

    The Uranium Mill Tailings Remedial Action (UMTRA) Project was established to accomplish remedial actions at inactive uranium mill tailings sites. The UMTRA Project's mission is to stabilize and control the residual radioactive materials at designated sites in a safe and environmentally sound manner so as to minimize or eliminate radiation health hazards to the public. Because these efforts may involve possible risks to public health and safety, a quality assurance (QA) program that conforms to the applicable criteria has been established to control the quality of the work. This document, the Quality Assurance Program Plan (QAPP), brings into one document the essential criteria to be applied on a selective basis, depending upon the nature of the activity being conducted, and describes how those criteria shall be applied to the UMTRA Project. QA requirements contained in this QAPP shall apply to all personnel, processes, and activities, including planning, scheduling, and cost control, performed by the UMTRA Project Office and its contractors

  15. Reputational Penalties and the Merits of Class-Action Securities Litigation

    OpenAIRE

    Helland, Eric

    2006-01-01

    If private securities class actions alleging fraudulent behavior by officers or directors of a company are meritorious, directors and officers should pay a reputational penalty when they sit on a board of a company whose officers and directors are accused of fraud. I find little evidence of a negative effect associated with allegations of fraud. Using various definitions of board positions as a proxy for the reputation of directors who are accused of fraud, I find that the net number of board...

  16. Revising Translations

    DEFF Research Database (Denmark)

    Rasmussen, Kirsten Wølch; Schjoldager, Anne

    2011-01-01

    The paper explains the theoretical background and findings of an empirical study of revision policies, using Denmark as a case in point. After an overview of important definitions, types and parameters, the paper explains the methods and data gathered from a questionnaire survey and an interview...... survey. Results clearly show that most translation companies regard both unilingual and comparative revisions as essential components of professional quality assurance. Data indicate that revision is rarely fully comparative, as the preferred procedure seems to be a unilingual revision followed by a more...... or less comparative rereading. Though questionnaire data seem to indicate that translation companies use linguistic correctness and presentation as the only revision parameters, interview data reveal that textual and communicative aspects are also considered. Generally speaking, revision is not carried...

  17. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Science.gov (United States)

    2013-07-22

    ... titled, ``Department of Homeland Security/Federal Emergency Management Agency--006 Citizen Corps Database... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0049] Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency--006 Citizen Corps Program...

  18. Prison officers' views about hepatitis C testing and treatment: a qualitative enquiry.

    Science.gov (United States)

    Jack, Kathryn; Islip, Natalie; Linsley, Paul; Thomson, Brian; Patterson, Anne

    2017-07-01

    To explore the views of prison officers in an English category B male prison about people in prison being tested and treated for hepatitis C. Hepatitis C testing and treatment in English prisons remain low with the reasons being poorly understood. Prison officers are in continuous contact with prisoners so might observe factors that may influence people in prisons' choice in whether to accept hepatitis C testing and treatment. A qualitative design within an interpretative framework was employed. Semistructured interviews were conducted with 10 prison officers at an English male category B prison. The interviews were audiorecorded and transcribed at the prison. Four themes emerged Safeguarding, Stigma, Confidentiality and Education. Hepatitis C testing and treatment were supported in principle but if a person in prison poses a threat to the overall security of a prison, any health issues that are not immediately life threatening will be overridden, irrespective of the financial or health consequences. The prison officers respected people in prisons' confidentiality regarding health matters, but this could be compromised during violent incidents. All of the prison officers displayed limited knowledge about hepatitis C. This qualitative enquiry illustrates that prison security transcends health. This suggests that health providers may need to offer greater flexibility and collaboration across the network of National Health Service hospitals to maintain continuity in treatment if a prisoner is moved to a different establishment or liberated. This study introduces the notion that prison security staff may have a potential role in promoting or discouraging hepatitis C testing and treatment by the ways in which their knowledge impacts on their interactions with people in prison. Engaging this staff group in educational opportunities should be a component of commissioned hepatitis service delivery in prisons. © 2016 John Wiley & Sons Ltd.

  19. 2011.2 Revision of the Evaluated Nuclear Data Library (ENDL2011.2)

    Energy Technology Data Exchange (ETDEWEB)

    Beck, B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Descalles, M. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mattoon, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Jurgenson, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Thompson, I. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-09-22

    LLNL's Computational Nuclear Physics Group and Nuclear Theory and Modeling Group have col- laborated to create the 2011.2 revised release of the Evaluated Nuclear Data Library (ENDL2011.2). ENDL2011.2 is designed to support LLNL's current and future nuclear data needs and will be em- ployed in nuclear reactor, nuclear security and stockpile stewardship simulations with ASC codes. This database is currently the most complete nuclear database for Monte Carlo and deterministic transport of neutrons and charged particles. This library was assembled with strong support from the ASC PEM and Attribution programs, leveraged with support from Campaign 4 and the DOE/O ce of Science's US Nuclear Data Program. This document lists the revisions made in ENDL2011.2 compared with the data existing in the original ENDL2011.0 release and the ENDL2011.1-rc4 re- lease candidate of April 2015. These changes are made in parallel with some similar revisions for ENDL2009.2.

  20. 20 CFR 404.943 - Responsibilities of the adjudication officer.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Responsibilities of the adjudication officer. 404.943 Section 404.943 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS... disagreement and refer the claim to the administrative law judge for further proceedings. At this point, the...

  1. Performance of the U.S. Office of Management and Budget's Revised Race and Ethnicity Categories in Asian Populations*

    Science.gov (United States)

    Holup, Joan L; Press, Nancy; Vollmer, William M; Harris, Emily L; Vogt, Thomas M; Chen, Chuhe

    2007-09-01

    OBJECTIVES: The U.S. Office of Management and Budget (OMB) guidelines for collecting and reporting race and ethnicity information recently divided the "Asian or Pacific Islander" category into "Asian" and "Native Hawaiian or Other Pacific Islander". The OMB's decision to disaggregate the "Asian or Pacific Islander" category was the first step toward providing these communities with information to better serve their needs. However, whether individuals who formerly made up the combined group categorize themselves as the new guidelines intend is a question analyzed in this report. METHODS: A subset of adults participating in the Hemochromatosis and Iron Overload Screening Study completed both the OMB-minimum and the expanded race and ethnicity measure used in the National Health Interview Survey. We compared responses on the expanded measure contained within the OMB "Asian" definition (Filipino, Korean, Vietnamese, Japanese, Asian Indian, Chinese, and/or Other Asian) to "Asian" responses on the OMB-minimum measure. RESULTS: Mixed heritage Asians less often marked "Asian". Among mixed heritage Japanese, Chinese, and Filipinos, 27%, 49%, and 52% did not mark "Asian" on the OMB measure, respectively. Eleven percent of single-heritage Filipinos did not mark "Asian." CONCLUSIONS: Many individuals formerly making up the combined "Asian or Pacific Islander" group do not categorize themselves as the revised OMB guidelines intend. This is particularly evident among Filipinos and among Asians of mixed heritage. This research illuminates the reliability and utility of the broad "Asian" category and points to possible consequences of collapsing groups into a single category, i.e., missed information and/or erroneous generalization.

  2. 77 FR 57639 - Privacy Act; System of Records: Records of the Office of White House Liaison, State-34

    Science.gov (United States)

    2012-09-18

    ..., background and security clearance information received from Executive Offices and Bureau of Human Resources... the provisions of the Privacy Act of 1974, as amended (5 U.S.C.552a) and Office of Management and... Liaison Office for the consideration, review, clearance and appointment of an individual to a non-career...

  3. 48 CFR 352.239-72 - Security requirements for Federal information technology resources.

    Science.gov (United States)

    2010-10-01

    ..., Security Self-Assessment Guide for Information Technology Systems and FIPS 200, on an annual basis. (C) HHS... basis, the Contractor shall provide to the Contracting Officer verification that the IT-SP remains valid... Contracting Officer verification that the IT-SC&A remains valid. Evidence of a valid system accreditation...

  4. Walking the Walk: Modeling Social Model and Universal Design in the Disabilities Office

    Science.gov (United States)

    Thornton, Melanie; Downs, Sharon

    2010-01-01

    Making the shift from the medical model of disability to the social model requires postsecondary disabilities offices to carefully examine and revise policies and procedures to reflect this paradigm shift, which gives them the credibility to work toward such change on the campus level. The process followed by one university is covered in-depth, as…

  5. ICT-Based Framework for Improved Food Security in Nigeria ...

    African Journals Online (AJOL)

    The six regional decision support systems in this model is a comprehensive database ... from research findings and innovations, inputs from agricultural extension officers, ... Keywords: Food Security, Interactive websites, National Internet host, ...

  6. Data flow between RFID devices in a modern restricted access administrative office

    Directory of Open Access Journals (Sweden)

    Robert Waszkowski

    2016-01-01

    Full Text Available The paper presents models of data flow between RFID devices in a modern restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. The presented models include the fact that the facilities in the secret office (cabinet, sluice, photocopier, desks are equipped with the RFID reader, which allows to immediately read the documents that are within their reach.

  7. Environmental Guidance Regulatory Bulletin - revised rule issued, October 17, 1994

    International Nuclear Information System (INIS)

    1995-01-01

    On September 15, 1994, at 59 FR 47384-47495, the Environmental Protection Agency promulgated a Final Rule revising 40 CFR Part 300; the National Oil and Hazardous Substances Pollution Contingency Plan (NCP). One of the primary purposes of the revised NCP is to provide for efficient, coordinated, and effective action to minimize adverse impact from oil discharges and hazardous substance releases. The NCP is required by Section 105 of the Comprehensive Environmental Response, Compensation and Liability Act and Section 311 (c) (2) of the Clean Water Act. The NCP establishes an organizational structure and procedures for preparing for and responding to discharges of oil and releases of hazardous substances, pollutants, and contaminants under these two Acts. The Oil Pollution Act of 1990 (OPA) amends the existing provisions of the Clean Water Act (CWA) and creates major new authorities addressing oil, and to a lesser extent, hazardous substance spill response. These amendments to the CWA, in turn, require revision of the NCP. The OPA specifies a number of revisions to the NCP that enhance and expand upon the current framework, standards, and procedures for response. A Notice of Proposed Rulemaking on changes to the NCP was issued on October 22, 1993 (58 FR 54702). DOE solicited comments on the proposed rule from DOE program and field offices, and submitted those comments to EPA on December 20, 1993

  8. 76 FR 68809 - Bureau of International Security and Nonproliferation; Termination of Chemical and Biological...

    Science.gov (United States)

    2011-11-07

    ..., Office of Missile, Biological, and Chemical Nonproliferation, Bureau of International Security and... DEPARTMENT OF STATE [Public Notice: 7678] Bureau of International Security and Nonproliferation; Termination of Chemical and Biological Weapons (CBW) Proliferation Sanctions Against a Foreign Person AGENCY...

  9. 75 FR 69673 - Agency Forms Undergoing Paperwork Reduction Act Review

    Science.gov (United States)

    2010-11-15

    ... making and for effective and efficient execution of CDC's response activities. Public health partners... impact and implications. Epi-X was specifically designed to provide public health decision-makers at the... Secure Communication Network (Epi-X))--Revision--Office of Public Health Preparedness and Response (OPHPR...

  10. 12 CFR 1700.2 - Organization of the Office of Federal Housing Enterprise Oversight.

    Science.gov (United States)

    2010-01-01

    ... regulatory issues, securities and corporate law principles, and administrative and general legal matters... developments in Enterprise activities, housing finance and financial regulation. The Office also prepares data...

  11. Revision total hip arthoplasty: factors associated with re-revision surgery.

    Science.gov (United States)

    Khatod, Monti; Cafri, Guy; Inacio, Maria C S; Schepps, Alan L; Paxton, Elizabeth W; Bini, Stefano A

    2015-03-04

    The survivorship of implants after revision total hip arthroplasty and risk factors associated with re-revision are not well defined. We evaluated the re-revision rate with use of the institutional total joint replacement registry. The purpose of this study was to determine patient, implant, and surgeon factors associated with re-revision total hip arthroplasty. A retrospective cohort study was conducted. The total joint replacement registry was used to identify patients who had undergone revision total hip arthroplasty for aseptic reasons from April 1, 2001, to December 31, 2010. The end point of interest was re-revision total hip arthroplasty. Risk factors evaluated for re-revision total hip arthroplasty included: patient risk factors (age, sex, body mass index, race, and general health status), implant risk factors (fixation type, bearing surface, femoral head size, and component replacement), and surgeon risk factors (volume and experience). A multivariable Cox proportional hazards model was used. Six hundred and twenty-nine revision total hip arthroplasties with sixty-three (10%) re-revisions were evaluated. The mean cohort age (and standard deviation) was 57.0 ± 12.4 years, the mean body mass index (and standard deviation) was 29.5 ± 6.1 kg/m(2), and most of the patients were women (64.5%) and white (81.9%) and had an American Society of Anesthesiologists score of associated with the risk of re-revision. For every ten-year increase in patient age, the hazard ratio for re-revision decreases by a factor of 0.72 (95% confidence interval, 0.58 to 0.90). For every five revision surgical procedures performed by a surgeon, the risk of revision decreases by a factor of 0.93 (95% confidence interval, 0.86 to 0.99). At the time of revision, a new or retained cemented femoral implant or all-cemented hip implant increases the risk of revision by a factor of 3.19 (95% confidence interval, 1.22 to 8.38) relative to a retained or new uncemented hip implant. A ceramic on a

  12. 78 FR 42149 - Privacy Act; System of Records: State-53, Office of Inspector General Investigation Management...

    Science.gov (United States)

    2013-07-15

    ... media. RETRIEVABILITY: Name, Social Security number or case number. SAFEGUARDS: All Office of Inspector... may contain names, dates of birth, passport numbers, Social Security numbers, account numbers and... response to a subpoena issued by an independent Federal agency having the power to subpoena records of...

  13. Research Awards: Agriculture and Food Security program Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... HEAD OFFICE / SIÈGE : 150 Kent Street / 150, rue Kent PO Box ... to pursue their research goals in a dynamic team environment in ... You should have an interest in agriculture, food security, nutrition, rural livelihoods, and.

  14. Does office space occupation matter? The role of the number of persons per enclosed office space, psychosocial work characteristics, and environmental satisfaction in the physical and mental health of employees.

    Science.gov (United States)

    Herbig, B; Schneider, A; Nowak, D

    2016-10-01

    The study examined the effects of office space occupation, psychosocial work characteristics, and environmental satisfaction on physical and mental health of office workers in small-sized and open-plan offices as well as possible underlying mechanisms. Office space occupation was characterized as number of persons per one enclosed office space. A total of 207 office employees with similar jobs in offices with different space occupation were surveyed regarding their work situation (psychosocial work characteristics, satisfaction with privacy, acoustics, and control) and health (psychosomatic complaints, irritation, mental well-being, and work ability). Binary logistic and linear regression analyses as well as bootstrapped mediation analyses were used to determine associations and underlying mechanisms. Employee health was significantly associated with all work characteristics. Psychosocial work stressors had the strongest relation to physical and mental health (OR range: 1.66-3.72). The effect of office space occupation on employee health was mediated by stressors and environmental satisfaction, but not by psychosocial work resources. As assumed by sociotechnical approaches, a higher number of persons per enclosed office space was associated with adverse health effects. However, the strongest associations were found with psychosocial work stressors. When revising office design, a holistic approach to work (re)design is needed. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  15. 76 FR 12609 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0051] Privacy Act of 1974: Implementation of Exemptions... Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  16. 7 CFR 1951.230 - Transfer of security and assumption of loans.

    Science.gov (United States)

    2010-01-01

    ... reflected in Finance Office records. (2) If the loan is evidenced and secured by a bond, procedures will be... of the borrower's counsel and OGC. The interest rate will be the rate currently reflected in Finance... Public Law 103-354 office), and will be added to the basic fee. (ii) Transfer fees will be deposited in...

  17. Privacy, Security, & Compliance: Strange Bedfellows or a Marriage Made in Heaven?

    Science.gov (United States)

    Corn, Michael; Rosenthal, Jane

    2013-01-01

    Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…

  18. New government to make social security cutbacks

    NARCIS (Netherlands)

    Grünell, M.

    2003-01-01

    In May 2003, a new coalition government of the Christian Democrats and two liberal parties, VVD and D66, took office in the Netherlands. The parties' coalition agreement provides for major cutbacks in public spending, largely targeted on social security expenditure. The trade unions are fiercely

  19. 78 FR 63973 - Agency Information Collection Activities; Submission to the Office of Management and Budget for...

    Science.gov (United States)

    2013-10-25

    ...; Submission to the Office of Management and Budget for Review and Approval; Comment Request; Student Assistance General Provisions--Subpart K--Cash Management AGENCY: Federal Student Aid (FSA), Department of... General Provisions--Subpart K--Cash Management OMB Control Number: 1845-0038 Type of Review: Revision of...

  20. Guns, guards, gates and geeks: Romania strengthens computer security at nuclear installations

    International Nuclear Information System (INIS)

    Gil, Laura

    2016-01-01

    A cyberattack could swipe all the information stored on your computer or even prevent it from working. That’s bad enough. But a cyberattack on a nuclear power plant could lead to sabotage or theft of nuclear material. Computer security, concerned with the protection of digital data and the defence of systems and networks against malicious acts, is a critical component of nuclear security. “The advance of computers and their use in all aspects of nuclear operations has changed the security paradigm,” said Donald Dudenhoeffer, Information Technology Security Officer at the IAEA. “Information and computer security must be considered as components in the overall nuclear security plan.”

  1. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  2. 48 CFR 1352.237-70 - Security processing requirements-high or moderate risk contracts.

    Science.gov (United States)

    2010-10-01

    ... background inquiries pertaining to verification of name, physical description, marital status, present and... undergo security processing by the Department's Office of Security before being eligible to work on the.... citizens must have: (1) Official legal status in the United States; (2) Continuously resided in the United...

  3. 78 FR 17939 - Announcement of Funding Awards; Capital Fund Safety and Security Grants; Fiscal Year 2012

    Science.gov (United States)

    2013-03-25

    ...; Capital Fund Safety and Security Grants; Fiscal Year 2012 AGENCY: Office of the Assistant Secretary for... availability of the Safety and Security funds with PIH Notice 2012-38 (Notice), which was issued September 7... Fund Safety and Security grant program. FOR FURTHER INFORMATION CONTACT: For questions concerning the...

  4. 78 FR 56728 - Announcement of Funding Awards; Capital Fund Safety and Security Grants; Fiscal Year 2013

    Science.gov (United States)

    2013-09-13

    ...; Capital Fund Safety and Security Grants; Fiscal Year 2013 AGENCY: Office of the Assistant Secretary for... availability of the Safety and Security funds with PIH Notice 2013-10 (Notice), which was issued May 3, 2013... Fund Safety and Security grant program. FOR FURTHER INFORMATION CONTACT: For questions concerning the...

  5. 77 FR 23492 - Announcement of Funding Awards; Capital Fund Safety and Security Grants; Fiscal Year 2011

    Science.gov (United States)

    2012-04-19

    ...; Capital Fund Safety and Security Grants; Fiscal Year 2011 AGENCY: Office of the Assistant Secretary for... notified of the availability of the Safety and Security funds with PIH Notice 2011-56 (Notice), which was... award recipients under the Capital Fund Safety and Security grant program. FOR FURTHER INFORMATION...

  6. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  7. Revision of the Paris and Brussels Conventions of Nuclear Liability

    International Nuclear Information System (INIS)

    Reyners, P.

    2002-01-01

    The Contracting Parties to the 1960 Paris Convention on Third Party Liability in the Field of Nuclear Energy and to the 1963 Brussels Convention Supplementary to the Paris Convention, have concluded this Spring four years of negotiation on the revision of these instruments. This exercise was itself started as a logical consequence of the adoption in 1997 of a revised Vienna Convention on Civil Liability for Nuclear Damage and of a Convention on Supplementary Compensation for Nuclear Damage. The Contracting Parties have concluded that the existing regime established by these Conventions remains viable and sound but that it also warrants improvements to ensure that greater financial security will be available to compensate a potentially larger number of victims in respect of a broader range of nuclear damage. A number of more technical amendments have also been agreed, in particular to ensure compatibility with other existing Conventions in this field. When the revised Paris and Brussels Conventions come into force, the total amount of funds available for compensation, provided by the liable nuclear operator and by the States concerned, will be 1.5 billion euros. (author)

  8. Use of computer programs to evaluate effectiveness of security systems

    International Nuclear Information System (INIS)

    Harris, L. Jr.; Goldman, L.A.; Mc Daniel, T.L.

    1987-01-01

    Thirty or more computer programs for security vulnerability analysis were developed from 1975 through 1980. Most of these programs are intended for evaluating security system effectiveness against outsider threats, but at least six programs are primarily oriented to insider threats. Some strengths and weaknesses of these programs are described. Six of these programs, four for outsider threats and two for insider threats, have been revised and adapted for use with IBM personal computers. The vulnerability analysis process is discussed with emphasis on data collection. The difference between design data and operational data is described. For performance-type operational data, such as detection probabilities and barrier delay times, the difference between unstressed and stressed performance data is discussed. Stressed performance data correspond to situations where an adversary attempts to weaken a security system by mitigating certain security measures. Suggestions are made on the combined use of manual analysis and computer analysis

  9. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Science.gov (United States)

    2010-04-01

    ... the amount fixed by the Office, or deposit negotiable securities under §§ 703.306 and 703.307 in that... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Filing of Agreement and Undertaking; deposit... REGULATIONS Authorization of Self-Insurers § 703.304 Filing of Agreement and Undertaking; deposit of security...

  10. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  11. Don't Drop Your Guard: Securing Nuclear Facilities

    International Nuclear Information System (INIS)

    Lööf, Susanna

    2013-01-01

    You're never quite finished with nuclear security. ''Even the most advanced security system for radioactive or nuclear material needs to be continuously updated to ensure that it remains effective,'' says Arvydas Stadalnikas, an IAEA Senior Nuclear Security Officer. ''Security can always be improved. Even if you think you have the best system for today, it may require enhancements because of the changing environment,'' he said. To help States with this daunting task, the IAEA offers support through its International Physical Protection Advisory Service (IPPAS) which includes in-depth analysis of the physical protection and nuclear security followed by expert advice. The IAEA has carried out 58 missions to 37 countries since the IPPAS programme was launched in 1996, helping States translate international conventions, codes and guidance on nuclear security into practice. Although each mission focuses on improving the security in a specific country, ''the programme has benefits that reach far beyond the recipient State's national borders,'' Stadalnikas noted. ''Each IPPAS mission helps improve global nuclear security because enhanced security in one country means that you improve globally. Deficiencies in one country could open the way for malicious acts, which can have worldwide effects,'' he said

  12. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Determination that a chemical facility âpresents... SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.205 Determination that a chemical facility “presents a high level of security risk.” (a...

  13. 76 FR 38146 - Revision to the Final Principles of Integrated Resource Planning for Use in Resource Acquisition...

    Science.gov (United States)

    2011-06-29

    ... Western office responsible for marketing power from a specific project will identify the need for a long... appropriate level of NEPA review. Factors affecting the level of NEPA review include whether the project... DEPARTMENT OF ENERGY Western Area Power Administration Revision to the Final Principles of...

  14. Education and the Degree of Data Security

    Science.gov (United States)

    Spears, Phillip Dewitt

    2013-01-01

    New technology development has researchers inundated with a plethora of data security issues linked to cyber attacks and hackers' ability to transmogrify their techniques. The present research focused on the information technology managing officers' (ITMOs') level of education, size of organization, organization's industry, and effect they have on…

  15. 77 FR 64819 - New Agency Information Collection Activity Under OMB Review: Office of Law Enforcement/Federal...

    Science.gov (United States)

    2012-10-23

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the new Information Collection Request (ICR) abstracted below to the Office of Management and Budget (OMB) for review and approval under the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of the following collection of information on June 20, 2012, 77 FR 37062. The collection involves the reimbursement of expenses incurred by airport operators for the provision of law enforcement officers (LEOs) to support airport security checkpoint screening.

  16. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  17. Predicting malicious behavior tools and techniques for ensuring global security

    CERN Document Server

    Jackson, Gary M

    2012-01-01

    A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates ava

  18. Business of Nuclear Safety Analysis Office, Nuclear Technology Test Center

    International Nuclear Information System (INIS)

    Hayakawa, Masahiko

    1981-01-01

    The Nuclear Technology Test Center established the Nuclear Safety Analysis Office to execute newly the works concerning nuclear safety analysis in addition to the works related to the proving tests of nuclear machinery and equipments. The regulations for the Nuclear Safety Analysis Office concerning its organization, business and others were specially decided, and it started the business formally in August, 1980. It is a most important subject to secure the safety of nuclear facilities in nuclear fuel cycle as the premise of developing atomic energy. In Japan, the strict regulation of safety is executed by the government at each stage of the installation, construction, operation and maintenance of nuclear facilities, based on the responsibility for the security of installers themselves. The Nuclear Safety Analysis Office was established as the special organ to help the safety examination related to the installation of nuclear power stations and others by the government. It improves and puts in order the safety analysis codes required for the cross checking in the safety examination, and carries out safety analysis calculation. It is operated by the cooperation of the Science and Technology Agency and the Agency of Natural Resources and Energy. The purpose of establishment, the operation and the business of the Nuclear Safety Analysis Office, the plan of improving and putting in order of analysis codes, and the state of the similar organs in foreign countries are described. (Kako, I.)

  19. Plant Operations. OSHA on Campus: Campus Safety Officers Discuss Problems and Potentials

    Science.gov (United States)

    Kuchta, Joseph F.; And Others

    1973-01-01

    The Occupation Safety and Health Act (OSHA) has presented campus safety officers with new problems, but it is also offering them new potentials, which were explored at the recent national conference on Campus Security. (Editor)

  20. Safeguards and security deficiencies fulfilled through technology development

    International Nuclear Information System (INIS)

    Smoot, W.

    1996-01-01

    The Office of Safeguards and Security (OSS) sponsors research and development activities based on identified field and headquarters customer requirements. Annually, a formal solicitation of safeguards and security user needs is conducted. Currently, there are over 300 valid safeguards and security deficiencies that have been identified. These user needs serve as the basis for formulating the OSS Technology Development Program (TDP). Due to budget constraints, the TDP can only address approximately 47% of these needs in FY 1996. This paper will discuss, in a general sense, the current deficiencies and how the TDP is responding to each. Specifically, the paper will highlight technologies in the areas of Material Control and Accounting, Physical Security, and Information Security. A brief discussion of unfulfilled user requirements will also be presented as a catalyst for leveraging available or developing technologies from other similar programs or from private industry

  1. 77 FR 22191 - Revisions to the Export Administration Regulations (EAR): Export Control Classification Number...

    Science.gov (United States)

    2012-04-13

    ..., Director, Office of National Security and Technology Transfer Controls, by phone at (202) 482-0092 or by... Administrative practice and procedure, Exports, Inventions and patents, Research science and technology. 15 CFR...

  2. 20 CFR 703.205 - Filing of Agreement and Undertaking; deposit of security.

    Science.gov (United States)

    2010-04-01

    ...— (1) Deposit with the Branch indemnity bonds or letters of credit in the amount fixed by the Office... and payable from the proceeds of the deposited security; (b) Give security in the amount fixed in the... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Filing of Agreement and Undertaking; deposit...

  3. Report: Improvements Needed in Key EPA Information System Security Practices

    Science.gov (United States)

    Report #10-P-0146, June 15, 2010. Williams Adley found that EPA program offices lacked evidence that they planned and executed tests of information system security controls as required by federal requirements.

  4. 78 FR 79298 - Securities Exempted; Distribution of Shares by Registered Open-End Management Investment Company...

    Science.gov (United States)

    2013-12-30

    ...] Securities Exempted; Distribution of Shares by Registered Open- End Management Investment Company...) 551-6792, Investment Company Rulemaking Office, Division of Investment Management, U.S. Securities and... Distribution of shares by registered open-end management investment company. * * * * * (g) If a plan covers...

  5. Data Protection and the Prevention of Cybercrime: The EU as an area of security?

    OpenAIRE

    PORCEDDA, Maria Grazia

    2012-01-01

    (This working paper is a revised version of Ms. Porcedda's EUI LL.M. thesis, 2012.) Cybercrime and cyber-security are attracting increasing attention, both for the relevance of Critical Information Infrastructure to the national economy and security, and the interplay of the policies tackling them with ‘ICT sensitive’ liberties, such as privacy and data protection. This study addresses the subject in two ways. On the one hand, it aims to cast light on the (legal substantive) nature of, ...

  6. 77 FR 18797 - Notice of Submission for OMB Review; Office of Postsecondary Education; Child Care Access Means...

    Science.gov (United States)

    2012-03-28

    ... DEPARTMENT OF EDUCATION Notice of Submission for OMB Review; Office of Postsecondary Education; Child Care Access Means Parents in School Program Annual Performance Report Summary: This is a revision of the Child Care Access Means Parent In School Program (CCAMPIS) Annual Performance Report (APR...

  7. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...

  8. Revision Total Hip Arthoplasty: Factors Associated with Re-Revision Surgery

    OpenAIRE

    Khatod, M; Cafri, G; Inacio, MCS; Schepps, AL; Paxton, EW; Bini, SA

    2015-01-01

    The survivorship of implants after revision total hip arthroplasty and risk factors associated with re-revision are not well defined. We evaluated the re-revision rate with use of the institutional total joint replacement registry. The purpose of this study was to determine patient, implant, and surgeon factors associated with re-revision total hip arthroplasty.A retrospective cohort study was conducted. The total joint replacement registry was used to identify patients who had undergone revi...

  9. A summary of waste disposal operator and office abolition of the Radioisotope Center in the University of Tokyo

    International Nuclear Information System (INIS)

    Higaki, Shogo; Kosaka, Naoki; Nogawa, Norio

    2014-01-01

    Radioisotope center in the University of Tokyo had approval of waste disposal operator only in the universities of Japan since 1983. However, the radioisotope center abolished the waste disposal office in December 2013. In this paper, we summarize the history of the waste disposal operator in the radioisotope center, and report the procedure of office abolition under the Japanese law and regulations concerning prevention from radiation hazards due to radio-isotopes, etc. revised after April 2012. (author)

  10. 75 FR 32833 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-06-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  11. CUSTOM TRIFLANGE ACETABULAR COMPONENTS IN REVISION HIP REPLACEMENT (EXPERIENCE REVIEW

    Directory of Open Access Journals (Sweden)

    A. A. Korytkin

    2017-01-01

    Full Text Available Extensive defects of acetabulum especially accompanied by pelvis discontinuity at the level of acetabulum pose a serious challenge in revision hip replacement and create additional complexity in fixing the acetabular component. One of the perspective options to solve the above issue is the use of custom triflange acetabular components (CTAC designed based on preoperative computer tomography given the specifics of bone defects of the patient. Purpose of the study — to evaluate the outcomes of CTAC use in revision hip replacement.Materials and methods. The authors analyzed treatment outcomes of 12 patients after revision hip replacement using additive techniques of computer simulation and 3D printing CTAC. Follow up period after the surgery averaged 7±3 months (from one to ten months. 7 out of 12 patients had acetabular defects of Paprosky 3B type, 4 patients had defects of Paprosky 3A and in one patient — of Paprosky 2C.Results. Two out of twelve patients had prosthesis dislocations that required revision hip surgery, one of those patients underwent open reduction of dislocation with wound debridement, another patient underwent replacement of articulating couple of acetabular component. Total scores under Harris Hip Score and paint VAS score prior to treatment was 28±7 and 7±1 points respectively, postoperative scores were 76±9 and 3±1 respectively.Conclusion. The application of additive techniques for revision hip replacement in patients with extensive acetabular and pelvic defects allows to make a precise preoperative planning, to restore joint rotation center, to reconstruct bone defects and to securely fix triflange acetabular component that altogether significantly improve treatment outcomes and patients satisfaction with the surgery.

  12. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  13. Report: EPA’s National Security Information Program Could Be Improved

    Science.gov (United States)

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  14. Mortgage Finance and Security of Collateral

    DEFF Research Database (Denmark)

    Haldrup, Karin

    2011-01-01

    Developing economies face a gigantic lack of financing for urbanization due to the absence of formal and transparent property markets. The paper discuss the interference between mortgage finance and collateral security by using the Danish mortgage financing model as an example, because of its 200...... years long history, and because the system is recommended as an option in emerging markets and as a possible model for remedying failures in mature housing finance markets. It is suggested that development policies in land administration need to be revised in order to support a widening of credit...

  15. Smart Grid Communications Security Project, U.S. Department of Energy

    Energy Technology Data Exchange (ETDEWEB)

    Barnes, Frank [Univ. of Colorado, Boulder, CO (United States)

    2012-09-01

    There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) This report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.

  16. Closure Report for Corrective Action Unit 116: Area 25 Test Cell C Facility, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2011-09-29

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 116, Area 25 Test Cell C Facility. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 [as amended March 2010]). CAU 116 consists of the following two Corrective Action Sites (CASs), located in Area 25 of the Nevada National Security Site: (1) CAS 25-23-20, Nuclear Furnace Piping and (2) CAS 25-41-05, Test Cell C Facility. CAS 25-41-05 consisted of Building 3210 and the attached concrete shield wall. CAS 25-23-20 consisted of the nuclear furnace piping and tanks. Closure activities began in January 2007 and were completed in August 2011. Activities were conducted according to Revision 1 of the Streamlined Approach for Environmental Restoration Plan for CAU 116 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2008). This CR provides documentation supporting the completed corrective actions and provides data confirming that closure objectives for CAU 116 were met. Site characterization data and process knowledge indicated that surface areas were radiologically contaminated above release limits and that regulated and/or hazardous wastes were present in the facility.

  17. 'Adoption and attachment theory' the attachment models of adoptive mothers and the revision of attachment patterns of their late-adopted children.

    Science.gov (United States)

    Pace, C S; Zavattini, G C

    2011-01-01

    This study examined the attachment patterns of late-adopted children (aged 4-7) and their adoptive mothers during the first 7- to 8-month period after adoption and aimed to evaluate the effect of adoptive mothers' attachment security on the revision of the attachment patterns of their late-adopted children. We assessed attachment patterns in 20 adoptive dyads and 12 genetically related dyads at two different times: T1 (time 1) within 2 months of adoption and T2 (time 2) 6 months after T1. The children's behavioural attachment patterns were assessed using the Separation-Reunion Procedure and the children's representational (verbal) attachment patterns using the Manchester Child Attachment Story Task. The attachment models of the adoptive mothers were classified using the Adult Attachment Interview. We found that there was a significant enhancement of the late-adopted children's attachment security across the time period considered (P= 0.008). Moreover, all the late-adopted children who showed a change from insecurity to security had adoptive mothers with secure attachment models (P= 0.044). However, the matching between maternal attachment models and late-adopted children's attachment patterns (behaviours and representations) was not significant. Our data suggest that revision of the attachment patterns in the late-adopted children is possible but gradual, and that the adoptive mothers' attachment security makes it more likely to occur. © 2010 Blackwell Publishing Ltd.

  18. Revised

    DEFF Research Database (Denmark)

    Johannsen, Vivian Kvist; Nord-Larsen, Thomas; Riis-Nielsen, Torben

    This report is a revised analysis of the Danish data on CO2 emissions from forest, afforestation and deforestation for the period 1990 - 2008 and a prognosis for the period until 2020. Revision have included measurements from 2009 in the estimations. The report is funded by the Ministry of Climate...

  19. 75 FR 38526 - Office of Consumer Information and Insurance Oversight: Privacy Act of 1974; Report of a New...

    Science.gov (United States)

    2010-07-02

    .... Office of Personnel Management, the U.S. Department of Agriculture's National Finance Center (NFC), and... birth, Social Security Number (SSN), gender, state of residence, information about prior coverage... residential address (if different than the mailing address), date of birth, Social Security Number (if the...

  20. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Science.gov (United States)

    2010-01-01

    ... of the Secretary Office of the Deputy Secretary Office of the Under Secretary for Management B Office... Hazard Information System of the National Oceanic and Atmospheric Administration), National Oceanic and... Preparedness d. Strategic National Stockpile 2. Centers for Disease Control and Agency for Toxic Substances and...