WorldWideScience

Sample records for security officers revision

  1. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  2. Nuclear security officer training

    International Nuclear Information System (INIS)

    Harrington, W.F.

    1981-01-01

    Training has become complex and precise in today's world of critical review and responsibility. Entrusted to a security officer is the success or demise of large business. In more critical environments the security officer is entrusted with the monitoring and protection of life sensitive systems and devices. The awareness of this high visibility training requirement has been addressed by a limited few. Those involved in the nuclear power industry through dedication and commitment to the American public have without a doubt become leading pioneers in demanding training excellence

  3. Offices of Industrial Security International: A Review

    National Research Council Canada - National Science Library

    Sands, W

    1998-01-01

    The Defense Security Service (DSS), formerly the Defense Investigative Service (DIS), handles many of its overseas industrial security issues through its Offices of Industrial Security International...

  4. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  5. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  6. Infectious disease protection for healthcare security officers.

    Science.gov (United States)

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  7. 75 FR 36126 - Office of New Reactors; Proposed Revision to Standard Review Plan Section 13.6.1, Revision 1 on...

    Science.gov (United States)

    2010-06-24

    ... Standard Review Plan Section 13.6.1, Revision 1 on Physical Security--Combined License and Operating...), Section 13.6.1 on ``Physical Security--Combined License and Operating Reactors,'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML100350158). The Office of Nuclear Security and...

  8. 75 FR 29588 - Office of New Reactors: Proposed NUREG-0800; Standard Review Plan Section 13.6.6, Draft Revision...

    Science.gov (United States)

    2010-05-26

    ...; Standard Review Plan Section 13.6.6, Draft Revision 0 on Cyber Security Plan AGENCY: Nuclear Regulatory... Plants,'' on a proposed Standard Review Plan (SRP) Section 13.6.6 on ``Cyber Security Plan'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML093560837). The Office of Nuclear Security...

  9. 18 CFR 3a.51 - Designation of security officers.

    Science.gov (United States)

    2010-04-01

    ... Top Secret Control Officer and Security Officer for classified material for the Federal Power Commission. The Director, OAO, will designate alternate Top Secret Control Officers and alternated Security... the duties for which the Top Secret Control Officer and Security Officer is responsible. As used...

  10. Carlsbad Area Office strategic plan, March 1995. Revision 1

    International Nuclear Information System (INIS)

    1995-03-01

    This edition of the Carlsbad Area Office Strategic Plan captures the US Department of Energy's (DOE's) new focus, and supersedes the edition issued previously (DOE, 1993a). This revision reflects: a revised strategy designed to demonstrate compliance with environmental regulations earlier than the previous course of action; and a focus on establishment of standardized transuranic waste characterization and acceptance criteria for disposal facilities

  11. Office of Safeguards and Security - Operational Interface

    International Nuclear Information System (INIS)

    Hammond, G.A.

    1987-01-01

    The mission of the Office of Safeguards and Security (OSS), Department of Energy (DOE) is to: Develop policy and programs to protect DOE facilities, nuclear materials, and classified information; Provide oversight for safeguards and security operations; Direct research and development (RandD) to support the protection program; and Strengthen international safeguards in support of nonproliferation policy. Objectives are to maintain an integrated safeguards and security system that is effective against a wide range of threats, and do so in a manner to minimize impacts on facility operation. Implementation is the responsibility of field offices and contractors operating DOE facilities. The OSS-operational interface is the focus of this discussion with emphasis on RandD to meet user needs. The scope and project selection process will be discussed along with information required for evaluation, and field operational planning and budgeting commitments to permit implementation of successful RandD results

  12. 12 CFR 605.501 - Information Security Officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  13. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  14. 41 CFR 105-53.133 - Information Security Oversight Office.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Information Security... FUNCTIONS Central Offices § 105-53.133 Information Security Oversight Office. (a) Creation and authority. The Information Security Oversight Office (ISOO), headed by the Director of ISOO, who is appointed by...

  15. 12 CFR 568.2 - Designation of security officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Designation of security officer. 568.2 Section 568.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.2 Designation of security officer. Within 30 days after the effective date of insurance of...

  16. 75 FR 55529 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative

    Science.gov (United States)

    2010-09-13

    ... 3002 Definitions of Words and Terms Add an additional office within components--the Office of Selective... (b) of HSAR section 3003.1004 advises contracting officers that special posters and instructions may... DHS Hotline Poster described in the clause at FAR 52.203-14. Part 3004 Administrative Matters Revise...

  17. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Science.gov (United States)

    2012-10-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... comments on the development of a Facility Security Officer training program. The notice contains an inaccurate Internet link to RSVP for the public meeting. DATES: The notice of public meeting; request for...

  18. 77 FR 61771 - Facility Security Officer Training Requirements

    Science.gov (United States)

    2012-10-11

    ... following: (1) Draft model FSO training course; (2) Computer-based training and distance learning; (3... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... Security Officer training program, with the primary focus on developing the curriculum for such a program...

  19. The chief information security officer insights, tools and survival skills

    CERN Document Server

    Kouns, Barry

    2011-01-01

    Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills.

  20. 42 CFR 401.130 - Materials available at social security district offices and branch offices.

    Science.gov (United States)

    2010-10-01

    ... (HIM-10). (13) Home Health Agency Manual (HIM-11). (14) Outpatient Physical Therapy Provider Manual... social security district offices and branch offices: (1) Claims Manual of the Social Security Administration. (2) Department Staff Manual on Organization, Department of Health and Human Services, Part F, CMS...

  1. Prototype of smart office system using based security system

    Science.gov (United States)

    Prasetyo, T. F.; Zaliluddin, D.; Iqbal, M.

    2018-05-01

    Creating a new technology in the modern era gives a positive impact on business and industry. Internet of Things (IoT) as a new communication technology is very useful in realizing smart systems such as: smart home, smart office, smart parking and smart city. This study presents a prototype of the smart office system which was designed as a security system based on IoT. Smart office system development method used waterfall model. IoT-based smart office system used platform (project builder) cayenne so that. The data can be accessed and controlled through internet network from long distance. Smart office system used arduino mega 2560 microcontroller as a controller component. In this study, Smart office system is able to detect threats of dangerous objects made from metals, earthquakes, fires, intruders or theft and perform security monitoring outside the building by using raspberry pi cameras on autonomous robots in real time to the security guard.

  2. Use of Security Officers on Inpatient Psychiatry Units.

    Science.gov (United States)

    Lawrence, Ryan E; Perez-Coste, Maria M; Arkow, Stan D; Appelbaum, Paul S; Dixon, Lisa B

    2018-04-02

    Violent and aggressive behaviors are common among psychiatric inpatients. Hospital security officers are sometimes used to address such behaviors. Research on the role of security in inpatient units is scant. This study examined when security is utilized and what happens when officers arrive. The authors reviewed the security logbook and the medical records for all patients discharged from an inpatient psychiatry unit over a six-month period. Authors recorded when security calls happened, what behaviors triggered security calls, what outcomes occurred, and whether any patient characteristics were associated with security calls. A total of 272 unique patients were included. A total of 49 patients (18%) generated security calls (N=157 calls). Security calls were most common in the first week of hospitalization (N=45 calls), and roughly half of the patients (N=25 patients) had only one call. The most common inciting behavior was "threats to persons" (N=34 calls), and the most common intervention was intramuscular antipsychotic injection (N=49 calls). The patient variables associated with security calls were having more than one prior hospitalization (odds ratio [OR]=4.56, p=.001, 95% confidence interval [CI]=1.80-11.57), involuntary hospitalization (OR=5.09, pSecurity officers were often called for threats of violence and occasionally called for actual violence. Patient variables associated with security calls are common among inpatients, and thus clinicians should stay attuned to patients' moment-to-moment care needs.

  3. The Office of Safeguards and Security Nonproliferation Support Program

    International Nuclear Information System (INIS)

    Desmond, W.J.

    1996-01-01

    The Nonproliferation Support Program was established in the Department of Energy, Office of Safeguards and Security on october 1, 1995. its mission includes providing assistance to Departmental efforts for improved international material protection, control and accounting programs by coordinating and leveraging domestic safeguards and security policy, practice and experience into the international arena. A major objective of the program is to balance US national security requirements with global support of the nonproliferation objectives. This paper describes the organization of the Office of Safeguards and Security and the Nonproliferation Support Program role and responsibility, and presents some of the current areas of program emphasis and activity

  4. Security and Office Administration Coordinator | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Under the supervision of the Manager, Local Operations (MLO), the Security and ... Sees to the continuous updating and relevance of the Business Continuity Plan ... BCP to local management (Manager and Regional Director) and to the Head ...

  5. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Science.gov (United States)

    2011-10-07

    ... Office of Disaster Management and National Security AGENCY: Office of the Secretary, HUD. ACTION: Notice... Succession for the Office of Disaster Management and National Security. This is the first order of succession... L. McClure, Acting Chief Disaster and National Security Officer, Office of Disaster Management and...

  6. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Science.gov (United States)

    2010-11-05

    ... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...

  7. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-09-01

    Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.

  8. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  9. Target assignment for security officers to K targets (TASK)

    International Nuclear Information System (INIS)

    Rowland, J.R.; Shelton, K.W.; Stunkel, C.B.

    1983-02-01

    A probabilistic algorithm is developed to provide an optimal Target Assignment for Security officers to K targets (TASK) using a maximin criterion. Under the assumption of only a limited number (N) of security officers, the TASK computer model determines deployment assignments which maximize the system protection against sabotage by an adversary who may select any link in the system, including the weakest, for the point of attack. Applying the TASK model to a hypothetical nuclear facility containing a nine-level building reveals that aggregate targets covering multiple vital areas should be utilized to reduce the number of possible target assignments to a value equal to or only slightly larger than N. The increased probability that a given aggregate target is covered by one or more security officers offsets the slight decrease in interruption probability due to its occurring earlier in the adversary's path. In brief, the TASK model determines the optimal maximin deployment strategy for limited numbers of security officers and calculates a quantitative measure of the resulting system protection

  10. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Office of Nuclear Security and Incident Response. 1.46... Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear... evaluation and assessment of technical issues involving security at nuclear facilities, and is the agency...

  11. 12 CFR 563g.17 - Sales of securities at an office of a savings association.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Sales of securities at an office of a savings association. 563g.17 Section 563g.17 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.17 Sales of securities at an office of a savings association. Sales of...

  12. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  13. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Science.gov (United States)

    2010-07-01

    ... Information Security Oversight Office. 2400.19 Section 2400.19 National Defense Other Regulations Relating to... SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19 Declassification by the Director of the Information Security Oversight Office. If the Director of the Information...

  14. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participant’s requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  15. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  16. Programs of the Office of Energy Research: Revision

    International Nuclear Information System (INIS)

    1987-06-01

    In establishing each of the Federal Agencies that have been successively responsible for energy technologies and their development - the Atomic Energy Commission, the Energy Research and Development Administration, and, currently, the US Department of Energy (DOE) - Congress made specific provisions for the conduct of advanced and fundamental research. The purpose of this research has been to support the energy technology development programs by providing insight into fundamental science and associated phenomena and developing new or advanced concepts and techniques. Today, this responsibility rests with the Office of Energy Research (ER), DOE, whose present programs have their origins in pioneering energy-related research of this nature, which was initiated nearly 40 years ago. The Director, Office of Energy Research, also acts as the chief scientist and scientific advisor to the Secretary of Energy for the entire spectrum of energy research and development (R and D) programs of the Department. ER programs include several thousand individual projects and hundreds of laboratories, universities, and other research facilities throughout the Unites States. In the following pages, each of these programs and activities are described briefly for the information of the scientific community and the public at large. 5 figs., 6 tabs

  17. UMTRA Project Office quality assurance program plan. Revision 6

    International Nuclear Information System (INIS)

    1994-09-01

    The Uranium Mill Tailings Remedial Action (UMTRA) Project was established to accomplish remedial actions at inactive uranium mill tailings sites. The UMTRA Project's mission is to stabilize and control the residual radioactive materials at designated sites in a safe and environmentally sound manner so as to minimize or eliminate radiation health hazards to the public. Because these efforts may involve possible risks to public health and safety, a quality assurance (QA) program that conforms to the applicable criteria has been established to control the quality of the work. This document, the Quality Assurance Program Plan (QAPP), brings into one document the essential criteria to be applied on a selective basis, depending upon the nature of the activity being conducted, and describes how those criteria shall be applied to the UMTRA Project. QA requirements contained in this QAPP shall apply to all personnel, processes, and activities, including planning, scheduling, and cost control, performed by the UMTRA Project Office and its contractors

  18. Tentative job analysis for a high-level, fixed-site, nuclear security officer

    International Nuclear Information System (INIS)

    Adams, K.G.; Trujillo, A.A.

    1977-10-01

    A tentative job analysis for a high-level, fixed-site, nuclear security officer is presented. The primary objective of the report is to provide a framework for evaluating the functions of a security officer in physical protection systems. Several job requirements related to duties, basic skills, personal contacts, supervision, working conditions, and decision making are presented. Individual character traits desirable in security officers are described

  19. Policy revision in health enterprise information security: P3WG final report

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2003-05-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center (TATRC), TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG) examined military policies and regulations relating to computer-based information systems and medical records management. Using an interdisciplinary and interservice QA approach they compared existing military policies with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to identify gaps and discrepancies. The final report, including a plain English explanation of the individual standards and relevance to the Department of Defense (DoD), a comparative analysis and recommendations, will feed in to the security management process and HIPAA implementation efforts at multiple levels within the DoD. In light of High Reliability Theory, this process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains, building consensus on key policy reforms among military stakeholders across different disciplines, levels of command hierarchy and services.

  20. 24 CFR 960.505 - Occupancy by police officers to provide security for public housing residents.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Occupancy by police officers to... HOUSING Occupancy by Over-Income Families or Police Officers § 960.505 Occupancy by police officers to provide security for public housing residents. (a) Police officer. For purpose of this subpart E, “police...

  1. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0055] Privacy Act of... Operations Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  2. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... Security, Washington, DC 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- [[Page...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  3. Underground Test Area Fiscal Year 2012 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2013-01-01

    This report is mandated by the Underground Test Area (UGTA) Quality Assurance Project Plan (QAPP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2012. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2012. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, revising the QAPP, and publishing documents. In addition, processes and procedures were developed to address deficiencies identified in the FY 2011 QAPP gap analysis.

  4. Physician office readiness for managing Internet security threats.

    Science.gov (United States)

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  5. 12 CFR 551.150 - How do my officers and employees file reports of personal securities trading transactions?

    Science.gov (United States)

    2010-01-01

    ... of personal securities trading transactions? 551.150 Section 551.150 Banks and Banking OFFICE OF... TRANSACTIONS Securities Trading Policies and Procedures § 551.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 551.140(d) must...

  6. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  7. 77 FR 50631 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative [HSAR Case 2009-002

    Science.gov (United States)

    2012-08-22

    ..., provides guidance and direction for compliance with green purchasing and other sustainable practices...--IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST 0 14. Revise section 3003.101-3 to read as follows: 3003.101-3 Agency regulations. The United States Office of Government Ethics has promulgated...

  8. 33 CFR 106.205 - Company Security Officer (CSO).

    Science.gov (United States)

    2010-07-01

    ... TWIC. (b) Qualifications. The CSO must have general knowledge, through training or equivalent job...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security training and education, including security measures and procedures. (c) In addition to the knowledge and...

  9. LANL Safeguards and Security Assurance Program. Revision 6

    International Nuclear Information System (INIS)

    1995-01-01

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms

  10. US statutes of general interest to safeguards and security officers

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1988-09-01

    This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)

  11. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    Biometrics security technology uses the physiological and ... verification and authentication methodology to verify how facial screening explores the different ... mouth, nose etc and stores the bio-information extracted from the face of every ...

  12. Overlapping values, mutual prejudices. Empirical research into the ethos of police officers and private security guards

    NARCIS (Netherlands)

    van Steden, R.; van der Wal, Z.; Lasthuizen, K.M.

    2015-01-01

    What determines professional motivations and values of security operatives: sector or profession? Our article aims to answer this question through a survey study among police officers (n = 405) and private security guards (n = 329) in the Netherlands. Our results show that both groups closely

  13. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  14. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene

    2018-03-01

    . Frenchman Flat is currently the only UGTA CAU in the CR stage. Sampling requirements for this CAU are described in Underground Test Area (UGTA) Closure Report for Corrective Action Unit 98: Frenchman Flat Nevada National Security Site, Nevada (NNSA/NFO, 2016).

  15. Revised IAEA Code of Conduct on the Safety and Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Wheatley, J. S.

    2004-01-01

    The revised Code of Conduct on the Safety and Security of Radioactive Sources is aimed primarily at Governments, with the objective of achieving and maintaining a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations; and through the fostering of international co-operation. It focuses on sealed radioactive sources and provides guidance on legislation, regulations and the regulatory body, and import/export controls. Nuclear materials (except for sources containing 239Pu), as defined in the Convention on the Physical Protection of Nuclear Materials, are not covered by the revised Code, nor are radioactive sources within military or defence programmes. An earlier version of the Code was published by IAEA in 2001. At that time, agreement was not reached on a number of issues, notably those relating to the creation of comprehensive national registries for radioactive sources, obligations of States exporting radioactive sources, and the possibility of unilateral declarations of support. The need to further consider these and other issues was highlighted by the events of 11th September 2001. Since then, the IAEA's Secretariat has been working closely with Member States and relevant International Organizations to achieve consensus. The text of the revised Code was finalized at a meeting of technical and legal experts in August 2003, and it was submitted to IAEA's Board of Governors for approval in September 2003, with a recommendation that the IAEA General Conference adopt it and encourage its wide implementation. The IAEA General Conference, in September 2003, endorsed the revised Code and urged States to work towards following the guidance contained within it. This paper summarizes the history behind the revised Code, its content and the outcome of the discussions within the IAEA Board of Governors and General Conference. (Author) 8 refs

  16. 76 FR 23630 - Office of New Reactors; Proposed Revision 2 to Standard Review Plan, Section 1.0 on Introduction...

    Science.gov (United States)

    2011-04-27

    ... Standard Review Plan, Section 1.0 on Introduction and Interfaces AGENCY: Nuclear Regulatory Commission (NRC... Revision 2 to Standard Review Plan (SRP), Section 1.0, ``Introduction and Interfaces'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML110110573). The Office of New Reactors (NRO...

  17. 75 FR 6413 - Office of New Reactors; Proposed Revision to Standard Review Plan, Section 14.3.12 on Physical...

    Science.gov (United States)

    2010-02-09

    ... Standard Review Plan, Section 14.3.12 on Physical Security Hardware Inspections, Tests, Analyses, and.... SUMMARY: The NRC is soliciting public comment on NUREG-0800, ``Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants,'' on a proposed Revision 1 to Standard Review Plan (SRP...

  18. A fear of coercion and accountability? Security officers and the non-use of force

    NARCIS (Netherlands)

    Eski, Y.

    2017-01-01

    Based on fieldwork among operational security officers working in the Hamburg and Rotterdam ports, it became clear these frontline port policing professionals possess a critical, even fearful attitude towards coercion while performing their duties in the ports. The power of arrest and the

  19. Accessibility and security of digital records in the Office of the ...

    African Journals Online (AJOL)

    Accessibility and security of digital records in the Office of the Premier in ... preservation and accessibility of digital records for effective e-governance. ... Questionnaires, interviews, observations and document analysis were used to collect data. ... be knowledgeable in the use of the technologies that generate digital records.

  20. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  1. 76 FR 21768 - Privacy Act of 1974; Department of Homeland Security/Office of Health Affairs-001 Contractor...

    Science.gov (United States)

    2011-04-18

    ... Homeland Security, Washington, DC 20520. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0013] Privacy Act of... Immunization Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  2. Revised

    DEFF Research Database (Denmark)

    Johannsen, Vivian Kvist; Nord-Larsen, Thomas; Riis-Nielsen, Torben

    This report is a revised analysis of the Danish data on CO2 emissions from forest, afforestation and deforestation for the period 1990 - 2008 and a prognosis for the period until 2020. Revision have included measurements from 2009 in the estimations. The report is funded by the Ministry of Climate...

  3. ‘Persons of versatility’: private security officers and private policing in residential estates in Hong Kong

    OpenAIRE

    Kwong, Wilkie

    2013-01-01

    This study is the result of exploratory research on the daily lives and experiences of private security officers working in Hong Kong housing estates. As the first qualitative investigation of its kind, it examined two case studies of separate estates through the lens of Nodal Governance, which involved interviews with security practitioners and end-users, work practice observations, and documentary analysis. Security officers were found to ‘wear many hats’. Apart from crime prevention, the ...

  4. 15 CFR 758.7 - Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs...

    Science.gov (United States)

    2010-01-01

    ... forfeiture. In addition to the authority of Customs officers to seize and detain items, both Customs... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs offices and Postmasters in clearing shipments 758.7...

  5. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  6. Contemporary, emerging, and ratified wireless security standards: an update for the networked dental office.

    Science.gov (United States)

    Mupparapu, Muralidhar

    2006-02-15

    Wireless networking is not new to contemporary dental offices around the country. Wireless routers and network cards have made access to patient records within the office handy and, thereby, saving valuable chair side time and increasing productivity. As is the case with any rapidly developing technology, wireless technology also changes with the same rate. Unless, the users of the wireless networking understand the implications of these changes and keep themselves updated periodically, the office network will become obsolete very quickly. This update of the emerging security protocols and pertaining to ratified wireless 802.11 standards will be timely for the contemporary dentist whose office is wirelessly networked. This article brings the practicing dentist up-to-date on the newer versions and standards in wireless networking that are changing at a fast pace. The introduction of newer 802.11 standards like super G, Super AG, Multiple Input Multiple Output (MIMO), and pre-n are changing the pace of adaptation of this technology. Like any other rapidly transforming technology, information pertaining to wireless networking should be a priority for the contemporary dentist, an eventual end-user in order to be a well-informed and techno-savvy consumer.

  7. Progress report for the Office of Safeguards and Security for FY 1982

    International Nuclear Information System (INIS)

    Smith, D.H.; McKown, H.S.; Walker, R.L.; Sherman, R.L.; Pritchard, C.A.; Carter, J.A.

    1982-12-01

    Progress in various areas funded by, or of interest to, the Office of Safeguards and Security during FY 1982 is reported. The quadrupole mass spectrometer and its mobile laboratory visited several sites; results were uniformly excellent. We designed, built, and evaluated a new ion source for this instrument; as a result, performance is considerably enhanced. We have completed initial evaluation of lutetium for use as a double spike in calibrating holding tanks or other vessels of indeterminate volume. Precisions and accuracies of about 0.1% were obtained. Two uranium standards have been evaluated using NBS isotopic standards and SALE samples

  8. U.S. statutes of general interest to safeguards and security officers

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1988-01-01

    A handbook of enforcement provisions of Federal law and regulations was prepared for use by U.S. DOE Security Inspectors. This handbook provides security inspectors for the U.S. Department of Energy, security officers at Nuclear Regulatory Licensee facilities, and others with a single document containing most of the Federal law provisions available to assist them in enforcing agency regulations. The handbook contains selected enforcement provisions of Titles 18, 42 and 50 of the United States Code (USC). Topical coverage of Title 18 includes Espionage and Misrepresentation or Impersonation; Theft and Embezzlement; Malicious Mischief; Conspiracy; Search and Seizure. A miscellaneous section deals with explosives, blackmail, firearms, and other subjects. Certain enforcement sections of Title 42 of the USC (The Atomic Energy Act) and of the Internal Security Act of the United States Code (Title 50) are also provided. Finally, relevant parts of the Federal Property Management Regulations of Title 50, Chapter 101 of the Code of Federal Regulations are presented. A comprehensive index is provided based on key words

  9. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Bjornstad, D.J.; Curlee, T.R. (Oak Ridge National Lab., TN (United States)); Bohi, D.R. (Resources for the Future, Inc., Washington, DC (United States))

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab.

  10. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    International Nuclear Information System (INIS)

    Bjornstad, D.J.; Curlee, T.R.; Bohi, D.R.

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab

  11. Annual Waste Minimization Summary Report for the National Nuclear Security Administration Nevada Site Office

    International Nuclear Information System (INIS)

    Alfred J. Karns

    2007-01-01

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U. S. Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during CY06. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit ((number s ign)NEV HW0021) and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the DOE, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume and toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO

  12. Converting a major dosimetry service from film to optically stimulated luminescence dosemeters including revision of the 'back-office' software

    International Nuclear Information System (INIS)

    Perks, Christopher A.; Faugoin, Stephane; Serise, Bertrand; Prugnaud, Brice; Million, Marc

    2008-01-01

    Full text: In our offices at Fontenay-aux-Roses we provide personal dosimetry for over 100,000 participants. During 2005/6 we transformed our operations from film dosemeters to those using Optically Stimulated Luminescence (InLight (Trade Mark)). The opportunity was taken to fully overhaul our operational procedures and we are currently completely reworking our 'back-office' software support. The change from film to InLight dosimetry has involved: 1) The installation of new readers at our offices in Fontenay-aux Roses; 2) The installation of a physical badge archiving system; 3) Complete revision of the operational flow to optimise the benefits of the new service; 4) Maintenance of our approval to operate a personal dosimetry service in France; 5) Considerable liaison between our office in Fontenay-aux-Roses and our Glenwood, USA, parent company to enable complete integration of the processes; and 6) Maintaining the service throughout the changeover and keeping client satisfaction high. Having changed the physical environment we are now completely renewing the back office software and systems in support of the dosimetry service. This ranges in scope from entering new clients, client support, all aspects of the dosimetry operations and chain of custody of the dosemeters and participants records and reports. This system is being rolled out in sections and it is envisaged that it will be fully implemented at the start of 2008. A key feature is that continuing improvement and the possibility of future developments of our services is in-built into the philosophy of the new back-office system. The nature of the new system, its benefits to our own operations and, in particular, clients will be discussed. (author)

  13. 78 FR 56742 - Revision of Approved Information Collection (Paperwork) Requirements for Office of Management and...

    Science.gov (United States)

    2013-09-13

    ... the causes and prevention of occupational injuries, illnesses, and accidents (29 U.S.C. 657). The OSH... construction. Accordingly, construction businesses with workers who operate or work in the vicinity of cranes... in construction work subject to 29 CFR part 1926 subpart V. OSHA revised the exemption in existing 29...

  14. The Western Environmental Technology Office (WETO), Butte, Montana. Technology summary (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    This document has been prepared by the US Department of Energy`s (DOE`s) Office of Environmental Management (EM) Office of Science and Technology (OST) to highlight its research, development, demonstration, testing, and evaluation (RDDT&E) activities funded through the Western environmental Technology Office (WETO) in Butte, Montana. Technologies and processes described in this document have the potential to enhance DOE`s cleanup and waste management efforts, as well as improve US industry`s competitiveness in global environmental markets. The information presented in this document has been assembled from recently produced OST documents that highlight technology development activities within each of the OST program elements and Focus Areas. This document presents one in a series for each of DOE`s Operations Office and Energy Technology Centers.

  15. The Western Environmental Technology Office (WETO), Butte, Montana. Technology summary (Revised)

    International Nuclear Information System (INIS)

    1996-03-01

    This document has been prepared by the US Department of Energy's (DOE's) Office of Environmental Management (EM) Office of Science and Technology (OST) to highlight its research, development, demonstration, testing, and evaluation (RDDT ampersand E) activities funded through the Western environmental Technology Office (WETO) in Butte, Montana. Technologies and processes described in this document have the potential to enhance DOE's cleanup and waste management efforts, as well as improve US industry's competitiveness in global environmental markets. The information presented in this document has been assembled from recently produced OST documents that highlight technology development activities within each of the OST program elements and Focus Areas. This document presents one in a series for each of DOE's Operations Office and Energy Technology Centers

  16. 76 FR 10755 - Establishment of Office of the Chief Scientist; Revision of Delegations of Authority

    Science.gov (United States)

    2011-02-28

    ... 1066-001, ``Establishment of the Office of the Chief Scientist.'' OCS exists to provide leadership and... the Small Business Regulatory Fairness Enforcement Act, 5 U.S.C. 801 et seq., and thus is exempt from...

  17. Office of Technology Development FY 1993 program summary: Office of Research and Development, Office of Demonstration, Testing and Evaluation. Revision 1

    International Nuclear Information System (INIS)

    1994-02-01

    This report summarizes significant FY93 programmatic information and accomplishments relevant to the individual activities within the Office of Technology Development Program for Research, Development, Demonstration, Testing, and Evaluation (RDDT ampersand E). A brief discussion of the mission of the Office of Environmental Restoration and Waste Management (EM) and the Office of Technology Development is presented. An overview is presented of the major problem areas confronting DOE. These problem areas include: groundwater and soils cleanup; waste retrieval and processing; and pollution prevention. The organizational elements within EM are highlighted. An EM-50 Funding Summary for FY92 and FY93 is also provided. RDDT ampersand E programs are discussed and their key problem areas are summarized. Three salient program-formulating concepts are explained. They are: Integrated Demonstrations, Integrated Programs, and the technology window of opportunity. Detailed information for each of the programs within RDDT ampersand E is presented and includes a fact sheet, a list of technical task plans and an accomplishments and objectives section

  18. Office of Technology Development FY 1993 program summary: Office of Research and Development, Office of Demonstration, Testing and Evaluation. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    1994-02-01

    This report summarizes significant FY93 programmatic information and accomplishments relevant to the individual activities within the Office of Technology Development Program for Research, Development, Demonstration, Testing, and Evaluation (RDDT&E). A brief discussion of the mission of the Office of Environmental Restoration and Waste Management (EM) and the Office of Technology Development is presented. An overview is presented of the major problem areas confronting DOE. These problem areas include: groundwater and soils cleanup; waste retrieval and processing; and pollution prevention. The organizational elements within EM are highlighted. An EM-50 Funding Summary for FY92 and FY93 is also provided. RDDT&E programs are discussed and their key problem areas are summarized. Three salient program-formulating concepts are explained. They are: Integrated Demonstrations, Integrated Programs, and the technology window of opportunity. Detailed information for each of the programs within RDDT&E is presented and includes a fact sheet, a list of technical task plans and an accomplishments and objectives section.

  19. 78 FR 42872 - Communication with the U.S. Copyright Office: Revised Addresses

    Science.gov (United States)

    2013-07-18

    ... required by that form and its accompanying instructions. Computation of the copyright royalty fee shall be... distant signal equivalents and the copyright royalty fee shall be in accordance with the procedures set... Office and to make advance deposits into that account. Deposit Account holders can charge copyright fees...

  20. The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent

    Science.gov (United States)

    2015-09-01

    and M. Epstein, “ Millennials and the World of Work: An Organizational and Management Perspective,” Journal of Business and Psychology, Vol. 25, 2010...Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent FOR THIS AND OTHER PUBLICATIONS, VISIT US AT http://www.carlisle.army.mil...SUBTITLE The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  1. Near field communication (NFC) model for arduino uno based security systems office system

    Science.gov (United States)

    Chairunnas, A.; Abdurrasyid, I.

    2018-03-01

    Currently, many offices or companies that start growing rapidly in a company or office should have a very limited room to enter only people entitled to enter the room and use the facilities contained in it, for example, Files in it must have many files and documents very important because to reduce the abuse of files and irresponsible person. Because it will be made room door security system by using Near Field Communication on android smartphone. Software used is Arduino IDE. The tools used in this system are Arduino Uno R3, NFC shield, pear sensor, bell, led, servo, 16 × 2 LCD, and Near Field Communication (NFC) in android smartphone. This system runs based on 2 inputs of a new technology that is Near Field Communication (NFC) in android smartphone. And also use pear sensor to detect unauthorized person entering the room. If the correct password is entered then the door will open and the pear sensor will light off if wrong then the bell will light up.

  2. Underground Test Area Activity Preemptive Review Guidance Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    Preemptive reviews (PERs) of Underground Test Area (UGTA) Activity corrective action unit (CAU) studies are an important and long-maintained quality improvement process. The CAU-specific PER committees provide internal technical review of ongoing work throughout the CAU lifecycle. The reviews, identified in the UGTA Quality Assurance Plan (QAP) (Sections 1.3.5.1 and 3.2), assure work is comprehensive, accurate, in keeping with the state of the art, and consistent with CAU goals. PER committees review various products, including data, documents, software/codes, analyses, and models. PER committees may also review technical briefings including Federal Facility Agreement and Consent Order (FFACO)-required presentations to the Nevada Division of Environmental Protection (NDEP) and presentations supporting key technical decisions (e.g., investigation plans and approaches). PER committees provide technical recommendations to support regulatory decisions that are the responsibility of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and NDEP.

  3. Wireless networking for the dental office: current wireless standards and security protocols.

    Science.gov (United States)

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  4. U.S. Department of Energy, Carlsbad Area Office quality assurance program document. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-04-01

    Mission of the Carlsbad Area Office (CAO) is to protect human health and the environment by opening and operating the Waste Isolation Pilot Plant (WIPP) for safe disposal of TRU waste, and establishing an effective system for management of TRU waste from generation to disposal. To help in fulfilling this mission and to ensure that risks and environmental impacts are identified and minimized, and that safety, reliability, and performance are optimized, CAO`s policy is to establish and maintain an effective quality assurance (QA) program that supports compliance with applicable Federal, State, and local regulations, and DOE orders and requirements. This document establishes QA program requirements for all programs, projects, and activities sponsored by CAO.

  5. Environmental Monitoring Plan United States Department of Energy Richland Operations Office. Revision 2

    International Nuclear Information System (INIS)

    1997-01-01

    This Environmental Monitoring Plan was prepared for the US Department of Energy's (DOE's) Richland Operations Office (RL) to implement the requirements of DOE Order 5400.1. According to the Order, each DOE site, facility, or activity that uses, generates, releases, or manages significant pollutants or hazardous materials shall prepare a written environmental monitoring plan covering two major activities: (1) effluent monitoring and (2) environmental surveillance. The plan is to contain information discussing the rationale and design criteria for the monitoring programs, sampling locations and schedules, quality assurance requirements, program implementation procedures, analytical procedures, and reporting requirements. The plan's purpose is to assist DOE in the management of environmental activities at the Hanford Site and to help ensure that operations on the site are conducted in an environmentally safe and sound manner

  6. Environmental Monitoring Plan United States Department of Energy Richland Operations Office. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-10

    This Environmental Monitoring Plan was prepared for the US Department of Energy`s (DOE`s) Richland Operations Office (RL) to implement the requirements of DOE Order 5400.1. According to the Order, each DOE site, facility, or activity that uses, generates, releases, or manages significant pollutants or hazardous materials shall prepare a written environmental monitoring plan covering two major activities: (1) effluent monitoring and (2) environmental surveillance. The plan is to contain information discussing the rationale and design criteria for the monitoring programs, sampling locations and schedules, quality assurance requirements, program implementation procedures, analytical procedures, and reporting requirements. The plan`s purpose is to assist DOE in the management of environmental activities at the Hanford Site and to help ensure that operations on the site are conducted in an environmentally safe and sound manner.

  7. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  8. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  9. 76 FR 77025 - Office of New Reactors; Notice of Availability of the Final Staff Guidance Section 1.0, Revision...

    Science.gov (United States)

    2011-12-09

    ... the Final Staff Guidance Section 1.0, Revision 2 on Introduction and Interfaces AGENCY: Nuclear... Plants: LWR Edition,'' Section 1.0, Revision 2 on ``Introduction and Interfaces'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML112730393). The NRC staff issues revisions to SRP...

  10. 76 FR 12609 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0051] Privacy Act of 1974: Implementation of Exemptions... Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  11. 78 FR 59981 - Proposed Revision to Physical Security-Standard Design Certification and Operating Reactors

    Science.gov (United States)

    2013-09-30

    ... Design Certification and Operating Reactors AGENCY: Nuclear Regulatory Commission. ACTION: Standard... Design Certification and Operating Reactors.'' The NRC seeks comments on the proposed revised section of... subject): Federal Rulemaking Web site: Go to http://www.regulations.gov and search for Docket ID NRC-2013...

  12. Underground Test Area Fiscal Year 2013 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2013. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2013. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. In addition, integrated UGTA required reading and corrective action tracking was instituted.

  13. Performance of the U.S. Office of Management and Budget's Revised Race and Ethnicity Categories in Asian Populations*

    Science.gov (United States)

    Holup, Joan L; Press, Nancy; Vollmer, William M; Harris, Emily L; Vogt, Thomas M; Chen, Chuhe

    2007-09-01

    OBJECTIVES: The U.S. Office of Management and Budget (OMB) guidelines for collecting and reporting race and ethnicity information recently divided the "Asian or Pacific Islander" category into "Asian" and "Native Hawaiian or Other Pacific Islander". The OMB's decision to disaggregate the "Asian or Pacific Islander" category was the first step toward providing these communities with information to better serve their needs. However, whether individuals who formerly made up the combined group categorize themselves as the new guidelines intend is a question analyzed in this report. METHODS: A subset of adults participating in the Hemochromatosis and Iron Overload Screening Study completed both the OMB-minimum and the expanded race and ethnicity measure used in the National Health Interview Survey. We compared responses on the expanded measure contained within the OMB "Asian" definition (Filipino, Korean, Vietnamese, Japanese, Asian Indian, Chinese, and/or Other Asian) to "Asian" responses on the OMB-minimum measure. RESULTS: Mixed heritage Asians less often marked "Asian". Among mixed heritage Japanese, Chinese, and Filipinos, 27%, 49%, and 52% did not mark "Asian" on the OMB measure, respectively. Eleven percent of single-heritage Filipinos did not mark "Asian." CONCLUSIONS: Many individuals formerly making up the combined "Asian or Pacific Islander" group do not categorize themselves as the revised OMB guidelines intend. This is particularly evident among Filipinos and among Asians of mixed heritage. This research illuminates the reliability and utility of the broad "Asian" category and points to possible consequences of collapsing groups into a single category, i.e., missed information and/or erroneous generalization.

  14. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  15. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Science.gov (United States)

    2013-12-05

    ... critical physical and cyber infrastructure. IV. NCISR R&D Plan Outline Below is the list of the topic areas... research and development topics are welcomed. V. Specific Questions Answers to the below specific questions... Critical Infrastructure Security and Resilience (NCISR) Research and Development (R&D) Plan Outline and...

  16. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  17. Security Police Officer Utilization Field, AFSCs 8111, 8116, 8121, and 8124.

    Science.gov (United States)

    1981-06-01

    STATEMENT A M C Approved for public release 82 0 4 26Distribution Unlimited C=DCC=D= APS 8 1 X CECI I CODING INSTRUCTIONS -- -- -" Print the booklet copy...m == NAME (Last, First, Middle Initial) DATE OF BIRTH SEX YR NO DAY (MALE -"(11-34) (3s-5- rayo (41) PRESENT GRADE: SOCIAL SECURITY ACCOUNT NUMBER...Branch - 11. OIC Missile Support Branch - __m 12. OIC Weapons Systems Security , 4 8 CODE 99 X ~.t ! AFS 81XX -mmm -C - . .’ .9 - =, BACKGROUND

  18. CBO Testimony: Statement of Robert F. Hale, Assistant Director, National Security Division, Congressional Budget Office

    National Research Council Canada - National Science Library

    Hale, Robert F

    1991-01-01

    .... This testimony, by Robert F. Hale, Congressional Budget Office, covers the following topics: Socioeconomic Backgrounds of Enlisted Recruits, Racial Mix of Enlisted Recruits, Shifts in Recruiting during the 1980s, Altering the Composition of the Military: Reserve Mobilization and Conscription, and Should the Social Composition of the Military be a Concern?

  19. 76 FR 42005 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-07-18

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... Title 6, Code of Federal Regulations, as follows: PART 5--DISCLOSURE OF RECORDS AND INFORMATION 0 1. The...

  20. Closure Report for Corrective Action Unit 465: Hydronuclear Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Mark Burmeister and Patrick Matthews

    2012-11-01

    The corrective action sites (CASs) within CAU 465 are located within Areas 6 and 27 of the NNSS. CAU 465 comprises the following CASs: • 00-23-01, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Charlie site. • 00-23-02, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Dog site. • 00-23-03, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Charlie Prime and Anja sites. • 06-99-01, Hydronuclear, located in Area 6 of the NNSS and known as the Trailer 13 site. The purpose of this CR is to provide documentation supporting the completed corrective actions and provide data confirming that the closure objectives for CASs within CAU 465 were met. From September 2011 through July 2012, closure activities were performed as set forth in the Streamlined Approach for Environmental Restoration Plan for CAU 465: Hydronuclear, Nevada National Security Site, Nevada.

  1. The Relationship Between Job Stress, Job Satisfaction, and the Symptom Checklist-90-Revision (SCL-90-R in Marine Officers on Board

    Directory of Open Access Journals (Sweden)

    Jae Hee Kim

    2016-11-01

    Full Text Available Objectives This study was conducted to investigate the relationships among job stress, job satisfaction, and mental health in marine officers. Methods The researchers gathered data on marine officers working at a harbor in Chungcheong Province, South Korea, using a self-reported questionnaire. Mental health was measured by the Symptom Checklist-90-Revision (SCL-90-R, and general characteristics including socioeconomic factors, job stress, and job satisfaction were measured by structured questionnaires. Multiple regression analysis was performed to investigate the relationships among job stress, job satisfaction, and mental health status according to the symptom dimensions of the SCL-90-R. Results Among the marine officers, obsessive-compulsive behavior, depression, and somatization were the most problematic symptoms. Those who reported poor health, low job satisfaction, and high job stress had a higher prevalence of psychoticism, somatization, depression, anxiety, and phobic anxiety. Conclusions An occupational health system should be introduced that would regularly check the mental health of marine officers in charge of ships and sailors, in order to help reduce their stress levels, enhance their job satisfaction, and thereby improve their mental health.

  2. Closure Report for Corrective Action Unit 566: EMAD Compound, Nevada National Security Site, Nevada with ROTC-1, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Mark Krauss

    2011-06-01

    lead shot • PCB-contaminated soil • Radiologically contaminated filters and equipment • Fuels, lubricants, engine coolants, and oils • Lead debris • Electrical and lighting components assumed to be potential source materials, including - fluorescent light bulbs - mercury switches (thermostats) - circuit boards - PCB-containing ballasts Closure of CAU 566 was achieved through a combination of removal activities and closure in place. Corrective actions to remove COCs, and known and assumed potential source materials, were implemented as was practical. The PCBs remaining at the site are bounded laterally, but not vertically, within CAS 25-99-20 based upon step-out sampling; the sources (e.g., PCB transformer oils, diesel fuel from locomotive reservoirs) have been removed; the practice of the application of PCB-containing oils for soil stabilization has ceased; and the COCs are not readily mobile in the environment. Closure in place is necessary, and future land use of the site will be restricted from intrusive activities. This will effectively eliminate inadvertent contact by humans with the contaminated media. The DOE, National Nuclear Security Administration Nevada Site Office, provides the following recommendations: • No further corrective action is required at CAS 25-99-20. • Closure in place of CAS 25-99-20. • A use restriction is required at CAU 566. • A Notice of Completion to the DOE, National Nuclear Security Administration Nevada Site Office, is requested from the Nevada Division of Environmental Protection for closure of CAU 566. • Corrective Action Unit 566 should be moved from Appendix III to Appendix IV of the Federal Facility Agreement and Consent Order.

  3. 76 FR 31381 - Office Of New Reactors; Proposed Revision 4 to Standard Review Plan; Section 8.1 on Electric...

    Science.gov (United States)

    2011-05-31

    ... Standard Review Plan; Section 8.1 on Electric Power--Introduction AGENCY: U.S. Nuclear Regulatory...,'' on a proposed Revision 4 to Standard Review Plan (SRP), Section 8.1 on ``Electric Power--Introduction,'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML111180542). The previous version of...

  4. TRAINING OF DEVELOPMENT OF SKILLS OF PROFESSIONAL COMMUNICATION THE SECURITY OFFICER OF THE CRIMINAL INVESTIGATION DEPARTMENT OF THE INTERNAL AFFAIRS

    Directory of Open Access Journals (Sweden)

    Yuliya Leonidovna Lampusova

    2015-08-01

    Full Text Available Training is a form of active learning that is aimed at developing knowledge, skills, and attitudes. To improve operational security officers of Internal Affairs Agencies activity, we have schemed out training for the development of communication skills. This paper presents the exercises focusing on the professional communication skills of employees of the Criminal Investigation Department of the Interior development. Eight exercises are described, the main objectives of them are: learning to navigate the feelings of the partner, the ability to change the position of the interlocutor, the formation of the ability to listen to the end and not to interrupt, developing the ability to talk, improving the communicative competence and the development of the ability to accurately convey information.

  5. Underground Test Area Fiscal Year 2014 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan

    2015-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities from October 1, 2013, through September 30, 2014 (fiscal year [FY] 2014). All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); National Security Technologies, LLC (NSTec); Navarro-Intera, LLC (N-I); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2014. The activities included conducting oversight assessments for QAP compliance, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. UGTA Activity participants conducted 25 assessments on topics including safe operations, QAP compliance, activity planning, and sampling. These assessments are summarized in Section 2.0. Corrective actions tracked in FY 2014 are presented in Appendix A. Laboratory performance was evaluated based on three approaches: (1) established performance evaluation programs (PEPs), (2) interlaboratory comparisons, or (3) data review. The results of the laboratory performance evaluations, and interlaboratory comparison results are summarized in Section 4.0. The UGTA Activity published three public documents and a variety of other publications in FY 2014. The titles, dates, and main authors are identified in Section 5.0. The Contract Managers, Corrective Action Unit (CAU) Leads, Preemptive Review (PER) Committee members, and Topical Committee members are listed by name and organization in Section 6.0. Other activities that affected UGTA quality are discussed in Section 7.0. Section 8.0 provides the FY 2014 UGTA QA program conclusions, and Section 9.0 lists the references not identified in Section 5.0.

  6. U.S. Department of Energy Office of Health, Safety and Security Illness and Injury Surveillance Program Worker Health at a Glance, 2000-2009

    Energy Technology Data Exchange (ETDEWEB)

    Strader, Cliff [US Dept. of Energy, Washington, DC (United States); Richter, Bonnie [US Dept. of Energy, Washington, DC (United States)

    2013-01-23

    The Worker Health at a Glance, 2000 – 2009 provides an overview of selected illness and injury patterns among the current DOE contractor workforce that have emerged over the 10-years covered by this report. This report is a roll-up of data from 16 individual DOE sites, assigned to one of three program offices (Office of Environmental Management, Office of Science and the National Nuclear Security Administration). In this report, an absences is defined as 40 or more consecutive work hours (5+ calendar days) off the job. Shorter absences were not included.

  7. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  8. Corrective Action Investigation Plan for Corrective Action Unit 365: Baneberry Contamination Area, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2010-12-01

    Corrective Action Unit 365 comprises one corrective action site (CAS), CAS 08-23-02, U-8d Contamination Area. This site is being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for the CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The site will be investigated based on the data quality objectives (DQOs) developed on July 6, 2010, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for the Baneberry site. The primary release associated with Corrective Action Unit 365 was radiological contamination from the Baneberry nuclear test. Baneberry was an underground weapons-related test that vented significant quantities of radioactive gases from a fissure located in close proximity to ground zero. A crater formed shortly after detonation, which stemmed part of the flow from the fissure. The scope of this investigation includes surface and shallow subsurface (less than 15 feet below ground surface) soils. Radionuclides from the Baneberry test with the potential to impact groundwater are included within the Underground Test Area Subproject. Investigations and corrective actions associated with the Underground Test Area Subproject include the radiological inventory resulting from the Baneberry test.

  9. Underground Test Area (UGTA) Closure Report for Corrective Action Unit 98: Frenchman Flat Nevada National Security Site, Nevada, Revision 1 ROTC-1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2016-08-01

    This Closure Report (CR) has been prepared for Corrective Action Unit (CAU) 98, Frenchman Flat, Nevada National Security Site (NNSS), Nevada. The Frenchman Flat CAU was the site of 10 underground nuclear tests, some of which have impacted groundwater near the tests. This work was performed as part of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity in accordance with the Federal Facility Agreement and Consent Order (FFACO). This CR describes the selected corrective action to be implemented during closure to protect human health and the environment from the impacted groundwater

  10. Underground Test Area (UGTA) Closure Report for Corrective Action Unit 98: Frenchman Flat Nevada National Security Site, Nevada, Revision 1 ROTC-1

    International Nuclear Information System (INIS)

    Farnham, Irene

    2016-01-01

    This Closure Report (CR) has been prepared for Corrective Action Unit (CAU) 98, Frenchman Flat, Nevada National Security Site (NNSS), Nevada. The Frenchman Flat CAU was the site of 10 underground nuclear tests, some of which have impacted groundwater near the tests. This work was performed as part of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity in accordance with the Federal Facility Agreement and Consent Order (FFACO). This CR describes the selected corrective action to be implemented during closure to protect human health and the environment from the impacted groundwater

  11. Preliminary remediation goals for use at the US Department of Energy Oak Ridge Operations Office. Revision 1

    International Nuclear Information System (INIS)

    1996-05-01

    This technical memorandum presents Preliminary Remediation Goals (PRGs) for use in human health risk assessment efforts under the United States Department of Energy, Oak Ridge Operations Office Environmental Restoration (ER) Division. This document provides the ER Division with standardized PRGs which are integral to the Remedial Investigation/Feasibility Study process. They are used during project scooping (Data Quality Objectives development), in screening level risk assessments to support early action or No Further Investigation decisions, and in the baselines risk assessment where they are employed in the selection of chemicals of potential concern. The primary objective of this document is to standardize these values and eliminate any duplication of effort by providing PRGs to all contractors involved in risk activities. In addition, by managing the assumptions and systems used in PRG derivation, the ER Risk Assessment Program will be able to control the level of quality assurance associated with these risk-based guideline values

  12. Preliminary remediation goals for use at the US Department of Energy Oak Ridge Operations Office. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-05-01

    This technical memorandum presents Preliminary Remediation Goals (PRGs) for use in human health risk assessment efforts under the United States Department of Energy, Oak Ridge Operations Office Environmental Restoration (ER) Division. This document provides the ER Division with standardized PRGs which are integral to the Remedial Investigation/Feasibility Study process. They are used during project scooping (Data Quality Objectives development), in screening level risk assessments to support early action or No Further Investigation decisions, and in the baselines risk assessment where they are employed in the selection of chemicals of potential concern. The primary objective of this document is to standardize these values and eliminate any duplication of effort by providing PRGs to all contractors involved in risk activities. In addition, by managing the assumptions and systems used in PRG derivation, the ER Risk Assessment Program will be able to control the level of quality assurance associated with these risk-based guideline values.

  13. Corrective Action Investigation Plan for Corrective Action Unit 550: Smoky Contamination Area Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Grant Evenson

    2012-05-01

    on January 31, 2012, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 550. The potential contamination sources associated with the study groups are from nuclear testing activities conducted at CAU 550. The DQO process resulted in an assumption that the total effective dose (TED) within the default contamination boundary of CAU 550 exceeds the final action level and requires corrective action. The presence and nature of contamination outside the default contamination boundary at CAU 550 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the TED at sample locations to the dose-based final action level. The TED will be calculated as the total of separate estimates of internal and external dose. Results from the analysis of soil samples will be used to calculate internal radiological dose. Thermoluminescent dosimeters placed at the center of each sample location will be used to measure external radiological dose. Appendix A provides a detailed discussion of the DQO methodology and the DQOs specific to each group of CASs.

  14. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Science.gov (United States)

    2010-01-01

    ... of the Secretary Office of the Deputy Secretary Office of the Under Secretary for Management B Office... Hazard Information System of the National Oceanic and Atmospheric Administration), National Oceanic and... Preparedness d. Strategic National Stockpile 2. Centers for Disease Control and Agency for Toxic Substances and...

  15. Closure Report for Corrective Action Unit 539: Areas 25 and 26 Railroad Tracks Nevada National Security Site, Nevada, Revision 0

    International Nuclear Information System (INIS)

    Kauss, Mark

    2011-01-01

    This Closure Report (CR) presents information supporting the closure of Corrective Action Unit (CAU) 539: Areas 25 and 26 Railroad Tracks, Nevada National Security Site, Nevada. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The corrective action sites (CASs) within CAU 539 are located within Areas 25 and 26 of the Nevada National Security Site. Corrective Action Unit 539 comprises the following CASs: (1) 25-99-21, Area 25 Railroad Tracks; and (2) 26-99-05, Area 26 Railroad Tracks The purpose of this CR is to provide documentation supporting the completed corrective actions and provide data confirming that the closure objectives for CASs within CAU 539 were met. To achieve this, the following actions were performed: (1) Reviewed documentation on historical and current site conditions, including the concentration and extent of contamination; (2) Conducted radiological walkover surveys of railroad tracks in both Areas 25 and 26; (3) Collected ballast and soil samples and calculated internal dose estimates for radiological releases; (4) Collected in situ thermoluminescent dosimeter measurements and calculated external dose estimates for radiological releases; (5) Removed lead bricks as potential source material (PSM) and collected verification samples; (6) Implemented corrective actions as necessary to protect human health and the environment; (7) Properly disposed of corrective action and investigation wastes; and (8) Implemented an FFACO use restriction (UR) for radiological contamination at CAS 25-99-21. The approved UR form and map are provided in Appendix F and will be filed in the DOE, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Facility Information Management System; the FFACO database; and the NNSA/NSO CAU/CAS files. From

  16. An analysis of international situation concerning nuclear security. Focused on the revision to INFCIRC/225/Rev.5

    International Nuclear Information System (INIS)

    Inamura, Tomoaki; Tanabe, Tomoyuki

    2011-01-01

    Since the September 11 attacks in 2001, counterterrorism measures have become not just domestic issues but critical issues that need international cooperation. Various nuclear security measures are in place as part of international counterterrorism measures. This report looks at the trend of international nuclear security measures to get implications for Japan, focusing on INFCIRC/225/Rev.5, an international guideline for physical protection of nuclear materials and nuclear facilities drawn up by IAEA. The observations of this report are as follows: 1) While legally binding nuclear security measures such as multilateral treaties and United Nations Security Council Resolutions impose minimum requirements on individual countries, the approaches led by IAEA or individual countries or private associations aim at more detailed consideration or information sharing to further improve nuclear security. 2) INFCIRC/225/Rev.5 comprises new concepts such as risk-based physical protection and nuclear security culture, as well as extended range of threats such as insiders or stand-off attacks and broader scope of measures to response. Japan should consider incorporation of INFCIRC/225/Rev.5 to its national laws and regulations putting in mind that it may have heavy influence and that Japan pledged to role leadership about nuclear security to international society. (author)

  17. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis.

    Science.gov (United States)

    van Dongen, Diana; Smid, Tjabe; Timmermans, Daniëlle R M

    2011-11-09

    The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. © 2011 van Dongen et al; licensee BioMed Central Ltd.

  18. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    van Dongen Diana

    2011-11-01

    Full Text Available Abstract Background The amount of exposure to electromagnetic fields (EMF at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Methods Three occupational groups, the general Dutch working population (n = 567, airport security officers who work with metal detectors (n = 106, and MRI radiographers who work with MRI (n = 193, were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Results Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. Conclusions These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF.

  19. 75 FR 14335 - Revisions to the Export Administration Regulations To Enhance U.S. Homeland Security: Addition of...

    Science.gov (United States)

    2010-03-25

    ... Division, Office of Nonproliferation and Treaty Compliance, telephone: (202) 482-4563. SUPPLEMENTARY... foreign policy report was submitted to Congress on March 19, 2010, notifying Congress of the imposition of...

  20. Emotional Exhaustion and Job Satisfaction in Airport Security Officers - Work-Family Conflict as Mediator in the Job Demands-Resources Model.

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners' job performance. The present study bridges this research gap by applying the job demands-resources (JD-R) model and using work-family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD-R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  1. Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5): Recommendations

    International Nuclear Information System (INIS)

    2011-01-01

    This publication, Revision 5 of Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225), is intended to provide guidance to States and their competent authorities on how to develop or enhance, implement and maintain a physical protection regime for nuclear material and nuclear facilities, through the establishment or improvement of their capabilities to implement legislative and regulatory programmes. The recommendations presented in this publication reflect a broad consensus among IAEA Member States on the requirements which should be met for the physical protection of nuclear materials and nuclear facilities.

  2. Validation of the A&D UM-211 device for office blood pressure measurement according to the European Society of Hypertension International Protocol revision 2010.

    Science.gov (United States)

    Fania, Claudio; Albertini, Federica; Palatini, Paolo

    2017-10-01

    The aim of this study was to define the accuracy of UM-211, an automated oscillometric device for office use coupled to several cuffs for different arm sizes, according to the International Protocol of the European Society of Hypertension. The validation was performed in 33 individuals. Their mean age was 59.6±12.9 years, systolic blood pressure (BP) was 144.3±21.5 mmHg (range: 96-184 mmHg), diastolic BP was 86.8±18.5 mmHg (range: 48-124 mmHg), and arm circumference was 30.2±4.3 cm (range: 23-39 cm). Four sequential readings were taken by observers 1 and 2 using a double-headed stethoscope and a mercury sphygmomanometer, whereas three BP readings were taken by the supervisor using the test instrument. The differences between the readings provided by the device and the mean observer measurements were calculated. Therefore, each device measurement was compared with the previous and the next mean observer measurement. The validation results fulfilled all the 2010 European Society of Hypertension revision Protocol criteria for the general population and passed all validation grades. On average, the device overestimated systolic BP by 1.7±2.4 mmHg and diastolic BP by 1.7±2.5 mmHg. These data show that the UM-211 device coupled to several cuffs for different ranges of arm circumference met the requirements for validation according to the International Protocol and can be recommended for clinical use in the adult population. However, these results mainly apply to the use of the 22-32 and the 31-45 cm cuffs.

  3. A Systematic Approach to Applying Lean Techniques to Optimize an Office Process at the Y-12 National Security Complex

    Energy Technology Data Exchange (ETDEWEB)

    Credille, Jennifer [Y-12 National Security Complex, Oak Ridge, TN (United States); Univ. of Tennessee, Knoxville, TN (United States); Owens, Elizabeth [Y-12 National Security Complex, Oak Ridge, TN (United States); Univ. of Tennessee, Knoxville, TN (United States)

    2017-10-11

    This capstone offers the introduction of Lean concepts to an office activity to demonstrate the versatility of Lean. Traditionally Lean has been associated with process improvements as applied to an industrial atmosphere. However, this paper will demonstrate that implementing Lean concepts within an office activity can result in significant process improvements. Lean first emerged with the conception of the Toyota Production System. This innovative concept was designed to improve productivity in the automotive industry by eliminating waste and variation. Lean has also been applied to office environments, however the limited literature reveals most Lean techniques within an office are restricted to one or two techniques. Our capstone confronts these restrictions by introducing a systematic approach that utilizes multiple Lean concepts. The approach incorporates: system analysis, system reliability, system requirements, and system feasibility. The methodical Lean outline provides tools for a successful outcome, which ensures the process is thoroughly dissected and can be achieved for any process in any work environment.

  4. Corrective Action Investigation Plan for Corrective Action Unit 573: Alpha Contaminated Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick

    2014-05-01

    Corrective Action Unit (CAU) 573 is located in Area 5 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 573 is a grouping of sites where there has been a suspected release of contamination associated with non-nuclear experiments and nuclear testing. This document describes the planned investigation of CAU 573, which comprises the following corrective action sites (CASs): • 05-23-02, GMX Alpha Contaminated Area • 05-45-01, Atmospheric Test Site - Hamilton These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives.

  5. Special report. Hospitals that are becoming 'hotel friendly' to guests ... and the role played by security officers.

    Science.gov (United States)

    1996-01-01

    Faced with increasing competition, hospitals in New York City are developing programs to become more user friendly and, like hotels, to treat patients more as "guests" than as "customers." These programs, which have particular applications for security personnel, are also seeking to improve communications and relationships among the hospital's medical staff and other employees. In this report, we'll describe some of these efforts in which hospitals are turning to hoteliers, consultants, and others for advice in the area of customer service, and the role seen for hospital security.

  6. Report to the Congress on the need for, and the feasibility of, establishing a security agency within the Office of Nuclear Material Safety and Safeguards

    International Nuclear Information System (INIS)

    1976-08-01

    In response to the Congressional mandate Section 204(b)-(2) (C) of the Energy Reorganization Act of 1974, the Director of the Office of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory Commission (NRC) has assessed the need for and the feasibility of establishing a security agency within that office for the performance of safeguards functions. The study assessed guard force effectiveness, and addressed public policy, administrative and legal issues. The study concluded that creation of a special security force within NRC would not result in a higher degree of guard force effectiveness than can be achieved through the use of private guards who have been properly trained and certified. Disparate gun laws in various states, it concluded, restrict arms possessed by both private and federal guards and private and federal transportation guards would require legislation authorizing them to bear the necessary weapons to protect nuclear material in transit. The role of reaction forces was also addressed and it was concluded that primary reliance at fixed sites should be placed on onsite protection systems; for material in transit, on invulnerability of vehicles and containers and on guard forces accompanying shipments

  7. Emotional Exhaustion and Job Satisfaction in Airport Security Officers − Work−Family Conflict as Mediator in the Job Demands–Resources Model

    Directory of Open Access Journals (Sweden)

    Sophie eBaeriswyl

    2016-05-01

    Full Text Available The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners. Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD−R model and using work–family conflict (WFC as an intervening variable to study relationships between work characteristics (workload and supervisor support, emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a supervisor support as a major job resource predicted job satisfaction among screeners; (b workload as a major job demand predicted their emotional exhaustion; and (c WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  8. Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD–R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed. PMID:27242581

  9. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  10. 287(g): Cross-Delegating State and Local Law Enforcement Officers with Federal Immigration Authority - Homeland Security Remedy or Rue?

    Science.gov (United States)

    2008-12-01

    illegal foreign nationals have killed over 43,000 Americans on U.S. soil since 9/11.28 The website “immigrationshumancost.org” is dedicated to the...enforcement officers face as they work in areas with a high ratio of Latino residents. How they must walk on proverbial eggshells to avoid even the...trailblazer in instituting programs to foster exactly what the 9/11 commission advocated to decrease opportunities for foreign strikes on U.S. soil . As

  11. [The bioethics law revision: comparative analysis of contributions from different public and professional offices. Assisted Reproductive Technology, embryo and stem cells research, umbilical cord blood bank].

    Science.gov (United States)

    Merviel, P; Cabry, R; Lourdel, E; Brasseur, F; Devaux, A; Copin, H

    2009-09-01

    The revision of the bioethics law of 2004 must occur in a five year's time. For this revision, the authorities decided to organize general states of bioethics and requested the production of contributions by the companies, institutions or associations. These texts tackle various subjects, like the Assisted Reproductive Technologies, research on the embryo and the stem cells and the banks of umbilical cord blood. Certain opinions converge, others differ, but all take part in the great debate which will take place at the time of the general conference.

  12. Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)

    International Nuclear Information System (INIS)

    Jesse Schreiber

    2008-01-01

    In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America's nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization and improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in 'green' technology

  13. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  14. Mid-level healthcare personnel training: an evaluation of the revised, nationally-standardized, pre-service curriculum for clinical officers in Mozambique.

    Directory of Open Access Journals (Sweden)

    Caryl Feldacker

    Full Text Available Mozambique suffers from a critical shortage of healthcare workers. Mid-level healthcare workers, (Tecnicos de Medicina Geral (TMG, in Mozambique require less money and time to train than physicians. From 2009-2010, the Mozambique Ministry of Health (MoH and the International Training and Education Center for Health (I-TECH, University of Washington, Seattle, revised the TMG curriculum. To evaluate the effect of the curriculum revision, we used mixed methods to determine: 1 if TMGs meet the MoH's basic standards of clinical competency; and 2 do scores on measurements of clinical knowledge, physical exam, and clinical case scenarios differ by curriculum?T-tests of differences in means examined differences in continuous score variables between curriculum groups. Univariate and multivariate linear regression models assess curriculum-related and demographic factors associated with assessment scores on each of the three evaluation methods at the p<0.05 level. Qualitative interviews and focus groups inform interpretation.We found no significant differences in sex, marital status and age between the 112 and 189 TMGs in initial and revised curriculum, respectively. Mean scores at graduation of initial curriculum TMGs were 56.7%, 63.5%, and 49.1% on the clinical cases, knowledge test, and physical exam, respectively. Scores did not differ significantly from TMGs in the revised curriculum. Results from linear regression models find that training institute was the most significant predictor of TMG scores on both the clinical cases and physical exam.TMGs trained in either curriculum may be inadequately prepared to provide quality care. Curriculum changes are a necessary, but insufficient, part of improving TMG knowledge and skills overall. A more comprehensive, multi-level approach to improving TMG training that includes post-graduation mentoring, strengthening the pre-service internship training, and greater resources for training institute faculty may

  15. Introduction to Sonar, Revision.

    Science.gov (United States)

    1976-01-01

    own ship anddesign e andm constructiones ofmmechanicale andthe the target, measured in the deck plane. Thiserni equipntto ovehicol quantity is...attention of your security 6. You may associate with non-citizens on officer or commanding officer. State the facts: a close social basis. However, any...Rank/Rate Designator Social Security Number COURSE COMPLETION Letters of satisfactory completion are issued only to personnel whose courses are

  16. Office of Personnel Management Catch 62 Match

    Data.gov (United States)

    Social Security Administration — SSA provides the Office of Personnel Management (OPM) with tax returns, Social Security benefits, and military retirement information for the purpose of correctly...

  17. Corrective Action Investigation Plan for Corrective Action Unit 571: Area 9 Yucca Flat Plutonium Dispersion Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, Bernadine; Matthews, Patrick

    2013-07-01

    CAU 571 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 571, which comprises the following corrective action sites (CASs): • 09-23-03, Atmospheric Test Site S-9F • 09-23-04, Atmospheric Test Site T9-C • 09-23-12, Atmospheric Test Site S-9E • 09-23-13, Atmospheric Test Site T-9D • 09-45-01, Windrows Crater These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on March 6, 2013, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (now the Nevada Field Office). The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 571. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CAU 571 CASs are from nuclear testing activities. The DQO process resulted in an assumption that total effective dose (TED) within a default contamination boundary exceeds the final action level (FAL) and requires corrective action. The presence and nature of contamination outside the default

  18. External Peer Review Team Report for Corrective Action Unit 97: Yucca Flat/Climax Mine, Nevada National Security Site, Nye County, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam J. [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Andrews, Robert [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-01-01

    The peer review team commends the Navarro-Intera, LLC (N-I), team for its efforts in using limited data to model the fate of radionuclides in groundwater at Yucca Flat. Recognizing the key uncertainties and related recommendations discussed in Section 6.0 of this report, the peer review team has concluded that U.S. Department of Energy (DOE) is ready for a transition to model evaluation studies in the corrective action decision document (CADD)/corrective action plan (CAP) stage. The DOE, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) clarified the charge to the peer review team in a letter dated October 9, 2014, from Bill R. Wilborn, NNSA/NFO Underground Test Area (UGTA) Activity Lead, to Sam J. Marutzky, N-I UGTA Project Manager: “The model and supporting information should be sufficiently complete that the key uncertainties can be adequately identified such that they can be addressed by appropriate model evaluation studies. The model evaluation studies may include data collection and model refinements conducted during the CADD/CAP stage. One major input to identifying ‘key uncertainties’ is the detailed peer review provided by independent qualified peers.” The key uncertainties that the peer review team recognized and potential concerns associated with each are outlined in Section 6.0, along with recommendations corresponding to each uncertainty. The uncertainties, concerns, and recommendations are summarized in Table ES-1. The number associated with each concern refers to the section in this report where the concern is discussed in detail.

  19. Mid-level healthcare personnel training: an evaluation of the revised, nationally-standardized, pre-service curriculum for clinical officers in Mozambique.

    Science.gov (United States)

    Feldacker, Caryl; Chicumbe, Sergio; Dgedge, Martinho; Augusto, Gerito; Cesar, Freide; Robertson, Molly; Mbofana, Francisco; O'Malley, Gabrielle

    2014-01-01

    Mozambique suffers from a critical shortage of healthcare workers. Mid-level healthcare workers, (Tecnicos de Medicina Geral (TMG)), in Mozambique require less money and time to train than physicians. From 2009-2010, the Mozambique Ministry of Health (MoH) and the International Training and Education Center for Health (I-TECH), University of Washington, Seattle, revised the TMG curriculum. To evaluate the effect of the curriculum revision, we used mixed methods to determine: 1) if TMGs meet the MoH's basic standards of clinical competency; and 2) do scores on measurements of clinical knowledge, physical exam, and clinical case scenarios differ by curriculum? T-tests of differences in means examined differences in continuous score variables between curriculum groups. Univariate and multivariate linear regression models assess curriculum-related and demographic factors associated with assessment scores on each of the three evaluation methods at the pTMG scores on both the clinical cases and physical exam. TMGs trained in either curriculum may be inadequately prepared to provide quality care. Curriculum changes are a necessary, but insufficient, part of improving TMG knowledge and skills overall. A more comprehensive, multi-level approach to improving TMG training that includes post-graduation mentoring, strengthening the pre-service internship training, and greater resources for training institute faculty may result in improvements in TMG capacity and patient care over time.

  20. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  1. 76 FR 67472 - Order of Succession for the Office of the Chief Information Officer

    Science.gov (United States)

    2011-11-01

    ...: Juanita Galbreath, Deputy Chief Information Officer for Cyber Security and Privacy, Office of the Chief...) Deputy Chief Information Officer, for IT Operations; (3) Deputy Chief Information Officer, for Cyber Security and Privacy; (4) Deputy Chief Information Officer, for Business and IT Modernization. These...

  2. 48 CFR 15.307 - Proposal revisions.

    Science.gov (United States)

    2010-10-01

    ... AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Source Selection 15.307 Proposal revisions. (a) If an... allow proposal revisions to clarify and document understandings reached during negotiations. At the... submit a final proposal revision. The contracting officer is required to establish a common cut-off date...

  3. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  4. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  5. Corrective Action Investigation Plan for Corrective Action Unit 567: Miscellaneous Soil Sites, Nevada National Security Site, Nevada, with ROTC 1 Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick K.

    2013-07-01

    Corrective Action Unit (CAU) 567 is located in Areas 1, 3, 5, 20, and 25 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 567 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 567, which comprises the following corrective action sites (CASs): • 01-23-03, Atmospheric Test Site T-1 • 03-23-25, Seaweed E Contamination Area • 05-23-07, A5b RMA • 20-23-08, Colby Mud Spill • 25-23-23, J-11 Soil RMA These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on May 6, 2013, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 567. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CAU 567 releases are nuclear test operations and other NNSS operations. The DQO process resulted in an assumption that total effective dose (TED) within a default contamination boundary

  6. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 547: Miscellaneous Contaminated Waste Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Mark Krauss

    2011-09-01

    The purpose of this CADD/CAP is to present the corrective action alternatives (CAAs) evaluated for CAU 547, provide justification for selection of the recommended alternative, and describe the plan for implementing the selected alternative. Corrective Action Unit 547 consists of the following three corrective action sites (CASs): (1) CAS 02-37-02, Gas Sampling Assembly; (2) CAS 03-99-19, Gas Sampling Assembly; and(3) CAS 09-99-06, Gas Sampling Assembly. The gas sampling assemblies consist of inactive process piping, equipment, and instrumentation that were left in place after completion of underground safety experiments. The purpose of these safety experiments was to confirm that a nuclear explosion would not occur in the case of an accidental detonation of the high-explosive component of the device. The gas sampling assemblies allowed for the direct sampling of the gases and particulates produced by the safety experiments. Corrective Action Site 02-37-02 is located in Area 2 of the Nevada National Security Site (NNSS) and is associated with the Mullet safety experiment conducted in emplacement borehole U2ag on October 17, 1963. Corrective Action Site 03-99-19 is located in Area 3 of the NNSS and is associated with the Tejon safety experiment conducted in emplacement borehole U3cg on May 17, 1963. Corrective Action Site 09-99-06 is located in Area 9 of the NNSS and is associated with the Player safety experiment conducted in emplacement borehole U9cc on August 27, 1964. The CAU 547 CASs were investigated in accordance with the data quality objectives (DQOs) developed by representatives of the Nevada Division of Environmental Protection (NDEP) and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to determine and implement appropriate corrective actions for CAU 547. Existing radiological survey data and historical knowledge of

  7. Corrective Action Decision Document/Closure Report for Corrective Action Unit 372: Area 20 Cabriolet/Palanquin Unit Craters, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick and Sloop, Christy

    2011-04-01

    contamination areas and within the craters at Palanquin and Cabriolet exceed the FAL. It is also assumed that potential source material in the form of lead bricks at Little Feller I and lead-acid batteries at Palanquin and Cabriolet exceed the FAL. Therefore, corrective actions were undertaken that consist of removing potential source material, where present, and implementing a use restriction and posting warning signs at each CAS. These use restrictions were recorded in the FFACO database; the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Facility Information Management System; and the NNSA/NSO CAU/CAS files. Therefore, NNSA/NSO provides the following recommendations: • No further corrective actions are necessary for CAU 372. • A Notice of Completion to NNSA/NSO is requested from the Nevada Division of Environmental Protection for closure of CAU 372. • Corrective Action Unit 372 should be moved from Appendix III to Appendix IV of the FFACO.

  8. Streamlined Approach for Environmental Restoration (SAFER) Plan for Corrective Action Unit 465: Hydronuclear Nevada National Security Site, Nevada, with ROTC 1, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-11-01

    This Streamlined Approach for Environmental Restoration (SAFER) Plan addresses the actions needed to achieve closure for Corrective Action Unit (CAU) 465, Hydronuclear, identified in the Federal Facility Agreement and Consent Order (FFACO). Corrective Action Unit 465 comprises the following four corrective action sites (CASs) located in Areas 6 and 27 of the Nevada National Security Site: (1) 00-23-01, Hydronuclear Experiment; (2) 00-23-02, Hydronuclear Experiment; (3) 00-23-03, Hydronuclear Experiment; (4) 06-99-01, Hydronuclear. The sites will be investigated based on the data quality objectives (DQOs) developed on July 6, 2011, by representatives of the Nevada Division of Environmental Protection (NDEP) and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to determine and implement appropriate corrective actions for each CAS in CAU 465. For CAU 465, two potential release components have been identified. The subsurface release component includes potential releases of radiological and nonradiological contaminants from the subsurface hydronuclear experiments and disposal boreholes. The surface release component consists of other potential releases of radiological and nonradiological contaminants to surface soils that may have occurred during the pre- and post-test activities. This plan provides the methodology for collection of the necessary information for closing each CAS component. There is sufficient information and process knowledge from historical documentation, contaminant characteristics, existing regional and site groundwater models, and investigations of similar sites regarding the expected nature and extent of potential contaminants to recommend closure of CAU 465 using the SAFER process. For potential subsurface releases, flow and transport models will be developed to integrate existing data into a conservative

  9. Corrective Action Investigation Plan for Corrective Action Unit 569: Area 3 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews; Christy Sloop

    2012-02-01

    Corrective Action Unit (CAU) 569 is located in Area 3 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. Corrective Action Unit 569 comprises the nine numbered corrective action sites (CASs) and one newly identified site listed below: (1) 03-23-09, T-3 Contamination Area (hereafter referred to as Annie, Franklin, George, and Moth); (2) 03-23-10, T-3A Contamination Area (hereafter referred to as Harry and Hornet); (3) 03-23-11, T-3B Contamination Area (hereafter referred to as Fizeau); (4) 03-23-12, T-3S Contamination Area (hereafter referred to as Rio Arriba); (5) 03-23-13, T-3T Contamination Area (hereafter referred to as Catron); (6) 03-23-14, T-3V Contamination Area (hereafter referred to as Humboldt); (7) 03-23-15, S-3G Contamination Area (hereafter referred to as Coulomb-B); (8) 03-23-16, S-3H Contamination Area (hereafter referred to as Coulomb-A); (9) 03-23-21, Pike Contamination Area (hereafter referred to as Pike); and (10) Waste Consolidation Site 3A. Because CAU 569 is a complicated site containing many types of releases, it was agreed during the data quality objectives (DQO) process that these sites will be grouped. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each study group. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the DQOs developed on September 26, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO

  10. Corrective Action Investigation Plan for Corrective Action Unit 105: Area 2 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2012-09-01

    Corrective Action Unit (CAU) 105 is located in Area 2 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 105 is a geographical grouping of sites where there has been a suspected release of contamination associated with atmospheric nuclear testing. This document describes the planned investigation of CAU 105, which comprises the following corrective action sites (CASs): • 02-23-04, Atmospheric Test Site - Whitney • 02-23-05, Atmospheric Test Site T-2A • 02-23-06, Atmospheric Test Site T-2B • 02-23-08, Atmospheric Test Site T-2 • 02-23-09, Atmospheric Test Site - Turk These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 30, 2012, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 105. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with all CAU 105 CASs are from atmospheric nuclear testing activities. The presence and nature of contamination at CAU

  11. Over-the-horizon, connected home/office (OCHO): situation management of environmental, medical, and security conditions at remote premises via broadband wireless access

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    Broadband wireless access standards, together with advances in the development of commercial sensing and actuator devices, enable the feasibility of a consumer service for a multi-sensor system that monitors the conditions within a residence or office: the environment/infrastructure, patient-occupant health, and physical security. The proposed service is a broadband reimplementation and combination of existing services to allow on-demand reports on and management of the conditions by remote subscribers. The flow of on-demand reports to subscribers and to specialists contracted to mitigate out-of-tolerance conditions is the foreground process. Service subscribers for an over-the-horizon connected home/office (OCHO) monitoring system are the occupant of the premises and agencies, contracted by the service provider, to mitigate or resolve any observed out-of-tolerance condition(s) at the premises. Collectively, these parties are the foreground users of the OCHO system; the implemented wireless standards allow the foreground users to be mobile as they request situation reports on demand from the subsystems on remote conditions that comprise OCHO via wireless devices. An OCHO subscriber, i.e., a foreground user, may select the level of detail found in on-demand reports, i.e., the amount of information displayed in the report of monitored conditions at the premises. This is one context of system operations. While foreground reports are sent only periodically to subscribers, the information generated by the monitored conditions at the premises is continuous and is transferred to a background configuration of servers on which databases reside. These databases are each used, generally, in non-real time, for the assessment and management of situations defined by attributes like those being monitored in the foreground by OCHO. This is the second context of system operations. Context awareness and management of conditions at the premises by a second group of analysts and

  12. Corrective Action Decision Document/Closure Report for Corrective Action Unit 365: Baneberry Contamination Area, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-09-01

    Corrective Action Unit 365 comprises one corrective action site (CAS), CAS 08-23-02, U-8d Contamination Area. The purpose of this CADD/CR is to provide justification and documentation supporting the recommendation that no further corrective action is needed for CAU 365 based on the implementation of the corrective action of closure in place with a use restriction (UR). Corrective action investigation (CAI) activities were performed from January 18, 2011, through August 2, 2011, as set forth in the Corrective Action Investigation Plan for Corrective Action Unit 365: Baneberry Contamination Area. The purpose of the CAI was to fulfill data needs as defined during the data quality objective (DQO) process. The CAU 365 dataset of investigation results was evaluated based on a data quality assessment. This assessment demonstrated the dataset is complete and acceptable for use in supporting the DQO decisions. Investigation results were evaluated against final action levels (FALs) established in this document. A radiological dose FAL of 25 millirem per year was established based on the Remote Work Area exposure scenario (336 hours of annual exposure). Radiological doses exceeding the FAL were found to be present to the southwest of the Baneberry crater. It was also assumed that radionuclide levels present within the crater and fissure exceed the FAL. Corrective actions were undertaken that consisted of establishing a UR and posting warning signs for the crater, fissure, and the area located to the southwest of the crater where soil concentrations exceeded the FAL. These URs were recorded in the FFACO database; the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Facility Information Management System; and the NNSA/NSO CAU/CAS files. Therefore, NNSA/NSO provides the following recommendations: (1) No further corrective actions beyond what are described in this document are necessary for CAU 365. (2) A Notice of Completion to

  13. Corrective Action Investigation Plan for Corrective Action Unit 570: Area 9 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2012-08-01

    CAU 570 comprises the following six corrective action sites (CASs): • 02-23-07, Atmospheric Test Site - Tesla • 09-23-10, Atmospheric Test Site T-9 • 09-23-11, Atmospheric Test Site S-9G • 09-23-14, Atmospheric Test Site - Rushmore • 09-23-15, Eagle Contamination Area • 09-99-01, Atmospheric Test Site B-9A These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 30, 2012, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 570. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The presence and nature of contamination at CAU 570 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the total effective dose at sample locations to the dose-based final action level. The total effective dose will be calculated as the total of separate estimates of internal and external dose. Results from the analysis of soil samples will be used to calculate internal radiological

  14. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  15. Program plan for the DOE Office of Fusion Energy First Wall/Blanket/Shield Engineering Technology Program. Volume I. Summary, objectives and management. Revision 2

    International Nuclear Information System (INIS)

    1982-08-01

    This document defines a plan for conducting selected aspects of the engineering testing required for magnetic fusion reactor FWBS components and systems. The ultimate product of this program is an established data base that contributes to a functional, reliable, maintainable, economically attractive, and environmentally acceptable commercial fusion reactor first wall, blanket, and shield system. This program plan updates the initial plan issued in November of 1980 by the DOE/Office of Fusion Energy (unnumbered report). The plan consists of two parts. Part I is a summary of activities, responsibilities and program management including reporting and interfaces with other programs. Part II is a compilation of the Detailed Technical Plans for Phase I (1982 to 1984) developed by the participants during Phase 0 of the program

  16. Closure Report for Corrective Action Unit 539: Areas 25 and 26 Railroad Tracks Nevada National Security Site, Nevada with ROTC-1, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Mark Kauss

    2011-06-01

    This Closure Report (CR) presents information supporting the closure of Corrective Action Unit (CAU) 539: Areas 25 and 26 Railroad Tracks, Nevada National Security Site, Nevada. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The corrective action sites (CASs) within CAU 539 are located within Areas 25 and 26 of the Nevada National Security Site. Corrective Action Unit 539 comprises the following CASs: • 25-99-21, Area 25 Railroad Tracks • 26-99-05, Area 26 Railroad Tracks The purpose of this CR is to provide documentation supporting the completed corrective actions and provide data confirming that the closure objectives for CASs within CAU 539 were met. To achieve this, the following actions were performed: • Reviewed documentation on historical and current site conditions, including the concentration and extent of contamination. • Conducted radiological walkover surveys of railroad tracks in both Areas 25 and 26. • Collected ballast and soil samples and calculated internal dose estimates for radiological releases. • Collected in situ thermoluminescent dosimeter measurements and calculated external dose estimates for radiological releases. • Removed lead bricks as potential source material (PSM) and collected verification samples. • Implemented corrective actions as necessary to protect human health and the environment. • Properly disposed of corrective action and investigation wastes. • Implemented an FFACO use restriction (UR) for radiological contamination at CAS 25-99-21. The approved UR form and map are provided in Appendix F and will be filed in the DOE, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Facility Information Management System; the FFACO database; and the NNSA/NSO CAU/CAS files. From November 29

  17. Validation of the A&D UM-201 device for office blood pressure measurement according to the European Society of Hypertension International Protocol Revision 2010.

    Science.gov (United States)

    Fania, Claudio; Albertini, Federica; Palatini, Paolo

    2017-08-01

    The aim of this study was to determine the accuracy of the A&D UM-201 device coupled to several cuffs for different arm sizes for office blood pressure (BP) measurement according to the International Protocol of the European Society of Hypertension. Evaluation was carried out in 33 individuals. The mean age of the individuals was 59.3±13.2 years, systolic BP was 145.4±20.6 mmHg (range: 109-186 mmHg), diastolic BP was 87.3±18.0 mmHg (range: 50-124 mmHg), and arm circumference was 30.4±4.2 cm (range: 23-39 cm). The protocol requirements were followed precisely. The UM-201 monitor passed all requirements, fulfilling the standards of the protocol. On average, the device overestimated systolic BP by 3.0±2.1 mmHg and diastolic BP by 2.6±2.0 mmHg. These data show that the A&D UM-201 device coupled to several cuffs for different ranges of arm circumference fulfilled the requirements for validation by the International Protocol and can be recommended for clinical use in the adult population.

  18. Corrective Action Decision Document/Closure Report for Corrective Action Unit 367: Area 10 Sedan, Ess and Uncle Unit Craters Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-06-01

    investigation results was evaluated based on a data quality assessment. This assessment demonstrated the dataset is complete and acceptable for use in fulfilling the DQO data needs. Analytes detected during the CAI were evaluated against final action levels (FALs) established in this document. For the primary release, radiological doses exceeding the FAL of 25 millirem per year were not found to be present in the surface or shallow subsurface soil outside the default contamination boundary. However, it was assumed that radionuclides are present in subsurface media within each of the three craters (Sedan, Ess, and Uncle) due to prompt injection of radionuclides from the tests. Based on the assumption of radiological dose exceeding the FAL, corrective actions were undertaken that consisted of implementing a use restriction and posting warning signs at each crater CAS. These use restrictions were recorded in the FFACO database; the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Facility Information Management System; and the NNSA/NSO CAU/CAS files. With regard to other releases, no contaminants of concern were identified at the mud pits or any of the other release locations, with one exception. Potential source material in the form of lead was found at one location. A corrective action of clean closure was implemented at this location, and verification samples indicated that no further action is necessary. Therefore, NNSA/NSO provides the following recommendations: • A Notice of Completion to NNSA/NSO is requested from the Nevada Division of Environmental Protection for closure of CAU 367. • Corrective Action Unit 367 should be promoted from Appendix III to Appendix IV of the FFACO.

  19. Corrective Action Decision Document/Closure Report for Corrective Action Unit 375: Area 30 Buggy Unit Craters, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-08-01

    consisted of removing the PSM. Use restrictions and warning signs were implemented for the remaining radiological contamination at CASs 25-23-22 and 30-45-01. These use restrictions were recorded in the FFACO database; the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Facility Information Management System; and the NNSA/NSO CAU/CAS files. Therefore, NNSA/NSO provides the following recommendations: (1) No further corrective actions are necessary for CAU 375; (2) A Notice of Completion to NNSA/NSO is requested from the Nevada Division of Environmental Protection for closure of CAU 375; and (3) Move CAU 375 from Appendix III to Appendix IV of the FFACO.

  20. Corrective Action Investigation Plan for Corrective Action Unit 366: Area 11 Plutonium Valley Dispersion Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-09-01

    Corrective Action Unit 366 comprises the six corrective action sites (CASs) listed below: (1) 11-08-01, Contaminated Waste Dump No.1; (2) 11-08-02, Contaminated Waste Dump No.2; (3) 11-23-01, Radioactively Contaminated Area A; (4) 11-23-02, Radioactively Contaminated Area B; (5) 11-23-03, Radioactively Contaminated Area C; and (6) 11-23-04, Radioactively Contaminated Area D. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed July 6, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 366. The presence and nature of contamination at CAU 366 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the total effective dose (TED) at sample locations to the dose-based final action level (FAL). The TED will be calculated by summing the estimates of internal and external dose. Results from the analysis of soil samples collected from sample plots will be used to calculate internal radiological dose. Thermoluminescent dosimeters placed at each sample location will be used to measure external radiological dose. Based on historical documentation of the releases

  1. Corrective Action Investigation Plan for Corrective Action Unit 104: Area 7 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-08-01

    CAU 104 comprises the 15 CASs listed below: (1) 07-23-03, Atmospheric Test Site T-7C; (2) 07-23-04, Atmospheric Test Site T7-1; (3) 07-23-05, Atmospheric Test Site; (4) 07-23-06, Atmospheric Test Site T7-5a; (5) 07-23-07, Atmospheric Test Site - Dog (T-S); (6) 07-23-08, Atmospheric Test Site - Baker (T-S); (7) 07-23-09, Atmospheric Test Site - Charlie (T-S); (8) 07-23-10, Atmospheric Test Site - Dixie; (9) 07-23-11, Atmospheric Test Site - Dixie; (10) 07-23-12, Atmospheric Test Site - Charlie (Bus); (11) 07-23-13, Atmospheric Test Site - Baker (Buster); (12) 07-23-14, Atmospheric Test Site - Ruth; (13) 07-23-15, Atmospheric Test Site T7-4; (14) 07-23-16, Atmospheric Test Site B7-b; (15) 07-23-17, Atmospheric Test Site - Climax These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 28, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 104. The releases at CAU 104 consist of surface-deposited radionuclides from 30 atmospheric nuclear tests. The presence and nature of contamination at CAU 104 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison

  2. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  3. Revising the security organisation at Forsmark NPP - A case study from the point of view of the operator and the regulatory and supervisory authority

    International Nuclear Information System (INIS)

    Roeden, B.; Strandberg, L.; Isaksson, S.

    2001-01-01

    Forsmark Nuclear Power Plant consists of three reactor-units. Each unit has separate shift crews and separate control rooms for operation of the plant. During 1996, Forsmarks Kraftgrupp AB (FKA) decided to change the organisation of Security at the site in Forsmark, Sweden. Reasons for changing the Organisation Experiences pointed out that it was necessary to have a Security supervisor present at site 24 hours per day. Experiences were basically gained from occasions when malfunctions in the technical security systems occurred. Another experience was that the procedures describing counter measures to different malfunctions in the technical security systems, did not meet the same high requirements, that would be expected in comparison with the Standard Operational and Emergency Operational Procedures, which are used for operation of the Nuclear Power Plant. It was decided to integrate the Security guards in the shift crew, one guard for each reactor unit and shift. Some of the regular Field Operators in the shift-crews for operating the plant were educated to competent Security Guards. The Shift Supervisor on each reactor unit became in charge for one Security Guard. One of the units also became in charge of the Security Central and the Security Guard operating the technical security systems. During incidents the supervisor from the fire brigade takes the responsibility for the security. He also has additionally two Security Guards at disposal from the fire brigade. In case of a major incident, this arrangement let the Shift Supervisors proceed taking the necessary counter measures concerning the process in the power plant. The attitude to new duties among the regular Field Operators educated to Security Guards were not positive, this problem affected also the attitude among the Shift supervisors. It was difficult to bring the different reactor units to work in the same direction and at the same time, generally speaking. The procedures and standards at each unit

  4. 75 FR 33885 - Office of International Affairs; Survey of Foreign Ownership of U.S. Securities as of June 30, 2010

    Science.gov (United States)

    2010-06-15

    ... any agency, corporation, financial institution, or other entity or instrumentality thereof, including... equities, short-term debt securities (including selected money market instruments), and long-term debt...

  5. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  6. Revising Translations

    DEFF Research Database (Denmark)

    Rasmussen, Kirsten Wølch; Schjoldager, Anne

    2011-01-01

    The paper explains the theoretical background and findings of an empirical study of revision policies, using Denmark as a case in point. After an overview of important definitions, types and parameters, the paper explains the methods and data gathered from a questionnaire survey and an interview...... survey. Results clearly show that most translation companies regard both unilingual and comparative revisions as essential components of professional quality assurance. Data indicate that revision is rarely fully comparative, as the preferred procedure seems to be a unilingual revision followed by a more...... or less comparative rereading. Though questionnaire data seem to indicate that translation companies use linguistic correctness and presentation as the only revision parameters, interview data reveal that textual and communicative aspects are also considered. Generally speaking, revision is not carried...

  7. Federal Bureau of Investigation (FBI) Field Office Jurisdiction/Divisions

    Data.gov (United States)

    Department of Homeland Security — This dataset represents the FBI (Federal Bureau of Investigations) national field office jurisdiction/divisional boundary locations. The field offices are centrally...

  8. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  9. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance (Revision 1, Feb. 1983)

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    This regulatory guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport Special Nuclear Materials (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standard format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical security plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CFR Part 73

  10. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  11. 32 CFR 700.826 - Physical security.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Physical security. 700.826 Section 700.826... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate... officer shall take action to protect and maintain the security of the command against dangers from fire...

  12. 78 FR 18837 - Revised Medical Criteria for Evaluating Visual Disorders

    Science.gov (United States)

    2013-03-28

    ... updating our regulations is to address advances in medical technology and terminology. We have removed the... Medical Criteria for Evaluating Visual Disorders AGENCY: Social Security Administration. ACTION: Final..., Office of Medical Listings Improvement, Social Security Administration, 6401 Security Boulevard...

  13. Corrective Action Decision Document/Closure Report for Corrective Action Unit 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2013-11-01

    This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada. This complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The purpose of the CADD/CR is to provide justification and documentation supporting the recommendation that no further corrective action is needed.

  14. Report to the Congress on the need for, and the feasibility of, establishing a security agency within the Office of Nuclear Material Safety and Safeguards. Executive summary

    International Nuclear Information System (INIS)

    1976-08-01

    The Executive Summary of a report written in response to the Congressional mandate Section 204(b)-(2) (c) of the Energy Reorganization Act of 1974, by the Director of the Office of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory Commission (NRC) is given. It summarizes the main report, which assessed guard force effectiveness, and addressed public policy, administration and legal issues

  15. Field Office Contact Information for Application Developers

    Data.gov (United States)

    Social Security Administration — SSA provides a web service and downloadable file for SSA Field Office locations, telephone numbers, and hours of operation. (Note: If you think an office might be...

  16. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  17. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  18. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  19. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  20. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  1. 76 FR 34761 - Classified National Security Information

    Science.gov (United States)

    2011-06-14

    ... MARINE MAMMAL COMMISSION Classified National Security Information [Directive 11-01] AGENCY: Marine... Commission's (MMC) policy on classified information, as directed by Information Security Oversight Office... of Executive Order 13526, ``Classified National Security Information,'' and 32 CFR part 2001...

  2. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  3. Office of Personnel Management (OPM)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for the Office of Personnel Management. OPM will use the SSN verifications in its investigative...

  4. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    Science.gov (United States)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  5. 17 CFR 200.26a - Office of Information Technology.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible...

  6. 75 FR 4271 - Labor Organization Officer and Employee Reports

    Science.gov (United States)

    2010-01-27

    ... DEPARTMENT OF LABOR Office of Labor-Management Standards 29 CFR Part 404 Labor Organization Officer and Employee Reports CFR Correction In Title 29 of the Code of Federal Regulations, Parts 100 to 499, revised as [[Page 4272

  7. Corrective Action Decision Document/Closure Report for Corrective Action Unit 105: Area 2 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick

    2013-09-01

    This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 105: Area 2 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada. CAU 105 comprises the following five corrective action sites (CASs): -02-23-04 Atmospheric Test Site - Whitney Closure In Place -02-23-05 Atmospheric Test Site T-2A Closure In Place -02-23-06 Atmospheric Test Site T-2B Clean Closure -02-23-08 Atmospheric Test Site T-2 Closure In Place -02-23-09 Atmospheric Test Site - Turk Closure In Place The purpose of this Corrective Action Decision Document/Closure Report is to provide justification and documentation supporting the recommendation that no further corrective action is needed for CAU 105 based on the implementation of the corrective actions. Corrective action investigation (CAI) activities were performed from October 22, 2012, through May 23, 2013, as set forth in the Corrective Action Investigation Plan for Corrective Action Unit 105: Area 2 Yucca Flat Atmospheric Test Sites; and in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices.

  8. Corrective Action Decision Document/Closure Report for Corrective Action Unit 550: Smoky Contamination Area Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick K. [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-02-01

    This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 550: Smoky Contamination Area, Nevada National Security Site, Nevada. CAU 550 includes 19 corrective action sites (CASs), which consist of one weapons-related atmospheric test (Smoky), three safety experiments (Ceres, Oberon, Titania), and 15 debris sites (Table ES-1). The CASs were sorted into the following study groups based on release potential and technical similarities: • Study Group 1, Atmospheric Test • Study Group 2, Safety Experiments • Study Group 3, Washes • Study Group 4, Debris The purpose of this document is to provide justification and documentation supporting the conclusion that no further corrective action is needed for CAU 550 based on implementation of the corrective actions listed in Table ES-1. Corrective action investigation (CAI) activities were performed between August 2012 and October 2013 as set forth in the Corrective Action Investigation Plan for Corrective Action Unit 550: Smoky Contamination Area; and in accordance with the Soils Activity Quality Assurance Plan. The approach for the CAI was to investigate and make data quality objective (DQO) decisions based on the types of releases present. The purpose of the CAI was to fulfill data needs as defined during the DQO process. The CAU 550 dataset of investigation results was evaluated based on a data quality assessment. This assessment demonstrated the dataset is complete and acceptable for use in fulfilling the DQO data needs.

  9. Corrective Action Investigation Plan for Corrective Action Unit 576: Miscellaneous Radiological Sites and Debris Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro, Las Vegas, NV (United States)

    2016-12-01

    Corrective Action Unit (CAU) 576 is located in Areas 2, 3, 5, 8, and 9 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 576 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 576, which comprises the following corrective action sites (CASs): 00-99-01, Potential Source Material; 02-99-12, U-2af (Kennebec) Surface Rad-Chem Piping; 03-99-20, Area 3 Subsurface Rad-Chem Piping; 05-19-04, Frenchman Flat Rad Waste Dump ; 09-99-08, U-9x (Allegheny) Subsurface Rad-Chem Piping; 09-99-09, U-9its u24 (Avens-Alkermes) Surface Contaminated Flex Line These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document (CADD).

  10. Framework for a Risk-Informed Groundwater Compliance Strategy for Corrective Action Unit 98: Frenchman Flat, Nevada National Security Site, Nye County, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam

    2010-09-01

    Note: This document was prepared before the NTS was renamed the Nevada National Security Site (August 23, 2010); thus, all references to the site herein remain NTS. Corrective Action Unit (CAU) 98, Frenchman Flat, at the Nevada Test Site (NTS) was the location of ten underground nuclear tests between 1965 and 1971. As a result, radionuclides were released in the subsurface in the vicinity of the test cavities. Corrective Action Unit 98 and other CAUs at the NTS and offsite locations are being investigated. The Frenchman Flat CAU is one of five Underground Test Area (UGTA) CAUs at the NTS that are being evaluated as potential sources of local or regional impact to groundwater resources. For UGTA sites, including Frenchman Flat, contamination in and around the test cavities will not be remediated because it is technologically infeasible due to the depth of the test cavities (150 to 2,000 feet [ft] below ground surface) and the volume of contaminated groundwater at widely dispersed locations on the NTS. Instead, the compliance strategy for these sites is to model contaminant flow and transport, estimate the maximum spatial extent and volume of contaminated groundwater (over a period of 1,000 years), maintain institutional controls, and restrict access to potentially contaminated groundwater at areas where contaminants could migrate beyond the NTS boundaries.

  11. Results of special security inspection on improvement of security management setup in Head Office and Tsuruga Nuclear Power Station of the Japan Atomic Power Company and improvement of facilities in Tsuruga Nuclear Power Station

    International Nuclear Information System (INIS)

    1982-01-01

    In connection with the series of accidents in the Tsuruga Nuclear Power Station, the Agency of Natural Resources and Energy had instructed JAPC to make comprehensive inspection on the security management setup and to take improvement measures in the nuclear power station. The results of the subsequent inspection by ANRE confirmed that the improvements made by JAPC are adequate, and the following items are described: improvement of security management setup - communication and reporting in emergency, the management of inspection and maintenance records, work control and supervision in repair, improvement, etc., functional authority and responsibility in maintenance management, operation management, radiation control, personnel education; improvement of facilities - feed water heaters, laundry waste-water filter room, radioactive waste treatment facility, general drainage, concentrated waste liquid storage tanks in newly-built waste treatment building, etc. (J.P.N.)

  12. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  13. 76 FR 54197 - Membership of the Office of the Secretary Performance Review Board

    Science.gov (United States)

    2011-08-31

    ..., Director, Office of Executive Resources, Office of Human Resources Management, Office of the Director, 14th..., Office of Information Technology, Security, Infrastructure, and Technology. Ellen Herbst, Senior Advisor..., Director, Office of Civil Rights. Alfred J. Broadbent, Director, Office of Security. Economic Development...

  14. Corrective Action Decision Document for Corrective Action Unit 568. Area 3 Plutonium Dispersion Sites, Nevada National Security Site, Nevada Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Nevada Field Ofice, Las Vegas, NV (United States). National Nuclear Security Administration

    2015-08-01

    The purpose of this Corrective Action Decision Document is to identify and provide the rationale for the recommendation of corrective action alternatives (CAAs) for the 14 CASs within CAU 568. Corrective action investigation (CAI) activities were performed from April 2014 through May 2015, as set forth in the Corrective Action Investigation Plan for Corrective Action Unit 568: Area 3 Plutonium Dispersion Sites, Nevada National Security Site, Nevada; and in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices. The purpose of the CAI was to fulfill data needs as defined during the DQO process. The CAU 568 dataset of investigation results was evaluated based on a data quality assessment. This assessment demonstrated that the dataset is complete and acceptable for use in fulfilling the DQO data needs. Based on the evaluation of analytical data from the CAI, review of future and current operations at the 14 CASs, and the detailed and comparative analysis of the potential CAAs, the following corrective actions are recommended for CAU 568: • No further action is the preferred corrective action for CASs 03-23-17, 03-23-22, 03-23-26. • Closure in place is the preferred corrective action for CAS 03-23-19; 03-45-01; the SE DCBs at CASs 03-23-20, 03-23-23, 03-23-31, 03-23-32, 03-23-33, and 03-23-34; and the Pascal-BHCA at CAS 03-23-31. • Clean closure is the preferred corrective action for CASs 03-08-04, 03-23-30, and 03-26-04; and the four well head covers at CASs 03-23-20, 03-23-23, 03-23-31, and 03-23-33.

  15. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 97: Yucca Flat/Climax Mine Nevada National Security Site, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States)

    2017-08-01

    This corrective action decision document (CADD)/corrective action plan (CAP) has been prepared for Corrective Action Unit (CAU) 97, Yucca Flat/Climax Mine, Nevada National Security Site (NNSS), Nevada. The Yucca Flat/Climax Mine CAU is located in the northeastern portion of the NNSS and comprises 720 corrective action sites. A total of 747 underground nuclear detonations took place within this CAU between 1957 and 1992 and resulted in the release of radionuclides (RNs) in the subsurface in the vicinity of the test cavities. The CADD portion describes the Yucca Flat/Climax Mine CAU data-collection and modeling activities completed during the corrective action investigation (CAI) stage, presents the corrective action objectives, and describes the actions recommended to meet the objectives. The CAP portion describes the corrective action implementation plan. The CAP presents CAU regulatory boundary objectives and initial use-restriction boundaries identified and negotiated by DOE and the Nevada Division of Environmental Protection (NDEP). The CAP also presents the model evaluation process designed to build confidence that the groundwater flow and contaminant transport modeling results can be used for the regulatory decisions required for CAU closure. The UGTA strategy assumes that active remediation of subsurface RN contamination is not feasible with current technology. As a result, the corrective action is based on a combination of characterization and modeling studies, monitoring, and institutional controls. The strategy is implemented through a four-stage approach that comprises the following: (1) corrective action investigation plan (CAIP), (2) CAI, (3) CADD/CAP, and (4) closure report (CR) stages.

  16. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    This document includes the US Nuclear Regulatory Commission`s (NRC`s or Commission`s) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC`s policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees` health and safety, the common defense and security, and the environment.

  17. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    International Nuclear Information System (INIS)

    1998-05-01

    This document includes the US Nuclear Regulatory Commission's (NRC's or Commission's) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC's policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees' health and safety, the common defense and security, and the environment

  18. Security Clearances and the Protection of National Security Information: Law and Procedures

    National Research Council Canada - National Science Library

    Cohen, Sheldon

    2000-01-01

    ... designed to protect National Security information. The report provides an authoritative compendium for lawyers, security officers and for managers of corporations who must deal with the legal and procedural aspects of security clearances...

  19. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  20. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  1. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  2. Microsoft® Office Communications Server 2007 R2 Resource Kit

    CERN Document Server

    Maximo, Rui; Ramanathan, Rajesh; Kamdar, Nirav

    2009-01-01

    In-depth, comprehensive, and fully revised for R2-this RESOURCE KIT delivers the information you need to deploy, manage, and troubleshoot Microsoft Office Communications Server 2007 R2. Get technical insights, scenarios, and best practices from those who know the technology best-the engineers who designed and developed it-along with 90+ Windows PowerShell™ scripts, bonus references, and other essential resources on CD. Get expert advice on how to: Plan server roles, infrastructure, topology, and securityDesign and manage enterprise instant messaging (IM), presence, and conferencing solutio

  3. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  4. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  5. 17 CFR 140.1 - Headquarters office.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Headquarters office. 140.1..., FUNCTIONS, AND PROCEDURES OF THE COMMISSION Organization § 140.1 Headquarters office. (a) General. The headquarters office of the Commission is located at Three Lafayette Centre, 1155 21st Street, NW., Washington...

  6. Computer Security Handbook

    CERN Document Server

    Bosworth, Seymour; Whyne, Eric

    2012-01-01

    The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapter

  7. Office Hysteroscopy

    OpenAIRE

    Hikmet Hassa; Basar Tekin; H. Mete Tanir; Bulent Cakmak

    2007-01-01

    Although hysteroscopy has evolved in recent years, its use in the office setting was not made practical until early 1980s with the introduction of small caliber hysteroscopes of less than 5- mm outer diameter.This innovation simplifies ambulatory uterine exploration and the office evaluation of patients with abnormal uterine bleeding. This article reviews current trends in office hysteroscopy and its areas of application in different forms of gynecological problems.

  8. Office Hysteroscopy

    Directory of Open Access Journals (Sweden)

    Hikmet Hassa

    2007-06-01

    Full Text Available Although hysteroscopy has evolved in recent years, its use in the office setting was not made practical until early 1980s with the introduction of small caliber hysteroscopes of less than 5- mm outer diameter.This innovation simplifies ambulatory uterine exploration and the office evaluation of patients with abnormal uterine bleeding. This article reviews current trends in office hysteroscopy and its areas of application in different forms of gynecological problems.

  9. Nevada National Security Site Radiological Control Manual

    International Nuclear Information System (INIS)

    2012-01-01

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  10. Nevada National Security Site Radiological Control Manual

    Energy Technology Data Exchange (ETDEWEB)

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  11. 75 FR 65511 - Employee Benefits Security Administration; Submission for OMB Review

    Science.gov (United States)

    2010-10-25

    ... DEPARTMENT OF LABOR Office of the Secretary Employee Benefits Security Administration; Submission...--Employee Benefits Security Administration (EBSA), Office of Management and Budget, Room 10235, Washington...: Employee Benefits Security Administration. Type of Review: Extension without change of a currently approved...

  12. 78 FR 25521 - Revised Medical Criteria for Evaluating Visual Disorders

    Science.gov (United States)

    2013-05-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0078] Revised Medical Criteria for Evaluating Visual Disorders AGENCY: Social Security Administration. ACTION: Final rules; Correction. SUMMARY: The Social Security Administration published a document in the Federal Register of March 28, 2013, in FR Doc...

  13. Radiation security regulation. 1st revision

    International Nuclear Information System (INIS)

    1984-01-01

    Established are allowable maximum levels for personnel occupationally exposed to ionizing radiation in the ININ and for the public, in accordance with the international standards; defined are categories of radiation facilities, requirements and operating conditions that must be met. Demarcated are the kinds of placards to be posted in controlled and restricted areas and the signs, symbols and tags to be used, defined and established is environmental dosimetric and medical radiation monitoring. Regulated are methods for handling sealed and unsealed sources of radiation, work clothes, closing of radiation installations, storage, transfer and transport of radioactive material; classified are types of possible radiation accidents, action to be taken upon the occurrence and subsequent clean up. (corporate author)

  14. Job security provisions and employment. revised estimates

    DEFF Research Database (Denmark)

    Addision, John; Grosso, Jean-Luc

    1995-01-01

    the directional effect of severance pay on employment and unemployment, but report vety different results in respect of working hours. Also contrary to Lazear, longer notice intervals are associated with favorable labor market outcomes. Recalibrating the two job protection measures according to length of service...

  15. Information security principles and practice

    CERN Document Server

    Stamp, Mark

    2011-01-01

    Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a pract

  16. Carlsbad Area Office strategic plan

    International Nuclear Information System (INIS)

    1995-10-01

    This edition of the Carlsbad Area Office Strategic Plan captures the U.S. Department of Energy's new focus, and supercedes the edition issued previously in 1995. This revision reflects a revised strategy designed to demonstrate compliance with environmental regulations earlier than the previous course of action; and a focus on the selected combination of scientific investigations, engineered alternatives, and waste acceptance criteria for supporting the compliance applications. An overview of operations and historical aspects of the Waste Isolation Pilot Plant near Carlsbad, New Mexico is presented

  17. 75 FR 50932 - Massachusetts: Final Authorization of State Hazardous Waste Management Program Revisions

    Science.gov (United States)

    2010-08-18

    ...: Final Authorization of State Hazardous Waste Management Program Revisions AGENCY: Environmental...-1990. FOR FURTHER INFORMATION CONTACT: Robin Biscaia, RCRA Waste Management Section, Office of Site... final [[Page 50933

  18. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Alternative security program. 27.235 Section 27.235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered...

  19. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must... chemical facility security. (b) Except as provided in § 27.235, a covered facility must complete the Site...

  20. 6 CFR 27.215 - Security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215 Section 27.215 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...

  1. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  2. 22 CFR 8.7 - Security.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the committee...

  3. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...

  4. 12 CFR 326.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...

  5. 28 CFR 700.24 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...

  6. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  7. Questions and answers based on revised 10 CFR Part 20

    International Nuclear Information System (INIS)

    Borges, T.; Stafford, R.S.; Lu, P.Y.; Carter, D.

    1994-05-01

    NUREG/CR-6204 is a collection of questions and answers that were originally issued in seven sets and which pertain to revised 10 CFR Part 20. The questions came from both outside and within the NRC. The answers were compiled and provided by NRC staff within the offices of Nuclear Reactor Regulation, Nuclear Material Safety and Safeguards, Nuclear Regulatory Research, the Office of State Programs, and the five regional offices. Although all of the questions and answers have been reviewed by attorneys in the NRC Office of the General Counsel, they do not constitute official legal interpretations relevant to revised 10 CFR Part 20. The questions and answers do, however, reflect NRC staff decisions and technical options on aspects of the revised 10 CFR Part 20 regulatory requirements. This NUREG is being made available to encourage communication among the public, industry, and NRC staff concerning the major revisions of the NRC's standards for protection against radiation

  8. 76 FR 53156 - Agency Information Collection Activities: Submission for the Office of Management and Budget...

    Science.gov (United States)

    2011-08-25

    ... revised Cyber Security Plans, Security Plans, Safeguards Contingency Plans, and Security Training and... requirements to establish and maintain a physical protection system and security organization with capabilities... material are consistent with interests of common defense and security and that these activities do not...

  9. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  10. 76 FR 30227 - On behalf of the Accessibility Committee of the Federal Chief Information Officers Council...

    Science.gov (United States)

    2011-05-24

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0041] On behalf of the Accessibility Committee of the Federal Chief Information Officers Council; Listening Session Regarding Improving the Accessibility of Government Information AGENCY: Federal Chief Information Officers Council, Social Security...

  11. 46 CFR 4.03-55 - Law enforcement officer.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Law enforcement officer. 4.03-55 Section 4.03-55 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE CASUALTIES AND INVESTIGATIONS Definitions § 4.03-55 Law enforcement officer. Law enforcement officer means a Coast Guard commissioned, warrant or petty officer...

  12. 8 CFR 3.0 - Executive Office for Immigration Review

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Executive Office for Immigration Review 3.0 Section 3.0 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY GENERAL PROVISIONS EXECUTIVE OFFICE FOR IMMIGRATION REVIEW § 3.0 Executive Office for Immigration Review Regulations of the Executive Office for...

  13. Structuring the Chief Information Security Officer Organization

    Science.gov (United States)

    2015-09-07

    production. Identity Management Identity and access management Define and manage identities and access controls based on identities ( password ...management, single sign on, two-factor authentication, PIN management, digital signatures, smart cards, biometrics , Active Directory, etc.) Application...access controls based on these identities and their rights. Methods used for identity and access management include Active Directory, passwords , PINs

  14. Homeland Security Office: Issues and Options

    National Research Council Canada - National Science Library

    Lee, Rensselaer

    2002-01-01

    ... attacks as a federal focal point for coordinating domestic efforts against terrorism. Former Governor Tom Ridge of Pennsylvania, a close friend and political ally of the President, was appointed to head the OHS...

  15. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  16. Office of Personnel Management (OPM) Earnings

    Data.gov (United States)

    Social Security Administration — Each year the Office of Personnel Management (OPM) sends SSA a file to be verified and matched against the Master Earnings File (MEF) and Employer Information File...

  17. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Security June 2006, NIMS Revision Version 2 March 2007, NWDC Domestic Disaster Relief Operations Planning, 15 May 2006, AFRL-Supported Studies on Large- Scale Coordination, A Sociotechnical Systems...

  18. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2012-03-14

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice...

  19. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day notice. SUMMARY: This notice...

  20. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  1. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records... two Privacy Act Systems of Records entitled ``Information on Persons Disqualified from the...

  2. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    field of PP and most of them have been revised at least once. They have been produced by the French Operators, assessed by the IPSN and approved by the French Competent Authority. They are mandatory as far as PP is concerned for NM held in category I facilities. To go ahead preliminary security studies in the field of MC and A have been performed by operators of two different types of facilities, the results of which are very encouraging. In the field of PP, security studies are based on an analysis consisting in grouping together all the possible paths leading to NM in compliance with a set of threats. Diagrams could be used to show which actions have to be taken to successfully carry out the theft of NM. This may involve crossing zones or outwitting detection devices and overcoming obstacles. By following the diagrams mentioned above, the probability of undetected persons or nuclear materials as they progress in the facility is evaluated. The relevant criteria to assume that the theft has been detected is determined. Then the time elapsing between positive detection of the action and the removal of the NM from the facility is estimated. This estimate is based on documented data and/or the results of tests carried out in the facility or elsewhere. Critical paths are taken as being those along which nuclear materials can be removed from the facility in the shortest time after detection. Special care is taken when analyzing these paths. In the field of MC and A, when unauthorized removal or dysfunction occurs, a discrepancy appears between the physical reality of NM and the way in which it is represented in the MC and A systems. In the case of these studies, an assumption is made that such a discrepancy exists in compliance with a set of threats. Then, the purpose of the security study is to analyse the way in which the discrepancy is revealed in connection with a discovery threshold amount, if any. It should be noted that possible detection of the discrepancy by the

  3. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  4. Solar Energy Technologies Office Fact Sheet

    Energy Technology Data Exchange (ETDEWEB)

    Solar Energy Technologies Office

    2018-03-13

    The U.S. Department of Energy Solar Energy Technologies Office (SETO) supports early-stage research and development to improve the affordability, reliability, and performance of solar technologies on the grid. The office invests in innovative research efforts that securely integrate more solar energy into the grid, enhance the use and storage of solar energy, and lower solar electricity costs.

  5. 78 FR 13897 - Final Revision and Publication of the 2012 Form M-1, Notice

    Science.gov (United States)

    2013-03-01

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration RIN 1210-AB51 Final Revision and Publication of the 2012 Form M-1, Notice AGENCY: Employee Benefits Security Administration, Department of... revisions to the Form M-1, Report for Multiple Employer Welfare Arrangements (MEWAs) and Certain Entities...

  6. Reviewing and reforming policy in health enterprise information security

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2001-08-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center, TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG), examined military policies and regulations relating to computer-based information systems and medical records management. Using a system of templates and matrices created for the purpose, P3WG identified gaps and discrepancies in DoD and service compliance with the proposed Health Insurance Portability and Accountability Act (HIPAA) Security Standard. P3WG represents an unprecedented attempt to coordinate policy review and revision across all military health services and the Office of Health Affairs. This method of policy reform can identify where changes need to be made to integrate health management policy and IT policy in to an organizational policy that will enable compliance with HIPAA standards. The process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains.

  7. Recommendations and Justifications for Modifications for Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office Federal Facility Agreement and Consent Order, Revision 0

    International Nuclear Information System (INIS)

    Lynn Kidman

    2008-01-01

    This document is part of an effort to re-evaluate all FFACO URs against the current RBCA criteria (referred to in this document as the Industrial Sites [IS] RBCA process) as defined in the Industrial Sites Project Establishment of Final Action Levels (NNSA/NSO, 2006c). Based on this evaluation, the URs were sorted into the following categories: (1) Where sufficient information exists to determine that the current UR is consistent with the RCBA criteria; (2) Where sufficient information exists to determine that the current UR may be removed or downgraded based on RCBA criteria; (3) Where sufficient information does not exist to evaluate the current UR against the RCBA criteria. After reviewing all the existing FFACO URs, the 49 URs addressed in this document have sufficient information to determine that these current URs may be removed or downgraded based on RCBA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RCBA criteria

  8. 6 CFR 5.31 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security of systems of records. 5.31 Section 5.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each component...

  9. Mail Office

    CERN Multimedia

    GS Department

    2009-01-01

    The Mail Office wishes to remind users that the CERN mail service is exclusively reserved for official CERN mail. All external official mail must be sent to the Mail Office in an unstamped envelope on which your name and Department must be clearly indicated below the official CERN address (see example) to help us to find you in the event that it cannot be delivered. If you wish to send private mail from the CERN site you must use the post offices at Meyrin (63-R-011) or Prévessin (866-R-C02). Please use "PRIORITY" envelopes only in the case of urgent mail. Any mail containing merchandise (i.e. anything other than documents) must be sent using an EDH shipping request form. INTERNAL MAIL Please remember to include the recipient’s MAILBOX number on the internal mail envelopes, either in the relevant box (new envelopes) or next to the name (old envelopes). This information, which can be found in the CERN PHONEBOOK, simplifies our t...

  10. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  11. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  12. [An overview on the collation and revision of medical books by the Bureau for Revising Medical Books in the Northern Song Dynasty].

    Science.gov (United States)

    Meng, Yongliang; Liang, Yongxuan

    2014-07-01

    The Bureau for Revising Medical Books was a temporary agency established by the government of the Northern Song Dynasty in 1057, the 2nd year of Jiayou of Emperor Renzong, exclusively for the edition, revision and publishing of ancient medical books. 11 medical books were revised and edited by 13 Bureau members in a period of 12 years until 1069, the 2nd year of Xining of Emperor ShenZong, which eventually became the final versions until today. 8 medical books were initially planned for the revision, but 11 were actually completed in the end. The time for completing a revision varied from over 10 years at most to less than 1 year at least. Instead of working in the office, the officers of the Bureau for Revising Medical Books did their works at home. The members of the said Bureau came from the Tiju officer of the Bureau for Revising Medical Books and the officials of revising medical books, consisting of both Confucian ministers and medical officers. Confucian ministers played an important role in revising medical books. The Bureau had a strict workflow in electing revising officials, making the project, and the determination of the principles and arrangements of the tasks of editing and proofreading.

  13. Corrective Action Decision Document/Closure Report for Corrective Action Unit 374: Area 20 Schooner Unit Crater, Nevada National Security Site, Nevada with ROTC 1 and 2, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick

    2011-07-01

    Schooner sites exceed the FAL. It is also assumed that PSM in the form of lead-acid batteries at Schooner exceeds the FAL. Therefore, corrective actions were undertaken that consist of removing PSM, where present, and implementing a use restriction and posting warning signs at the Danny Boy and Schooner sites. These use restrictions were recorded in the FFACO database; the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Facility Information Management System; and the NNSA/NSO CAU/CAS files. Therefore, NNSA/NSO provides the following recommendations: • No further corrective actions are necessary for CAU 374. • A Notice of Completion to NNSA/NSO is requested from the Nevada Division of Environmental Protection for closure of CAU 374. • Corrective Action Unit 374 should be moved from Appendix III to Appendix IV of the FFACO.

  14. 2009.3 Revision of the Evaluated Nuclear Data Library (ENDL2009.3)

    Energy Technology Data Exchange (ETDEWEB)

    Thompson, I. J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Beck, B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Descalle, M. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mattoon, C. M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Jurgenson, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-11-06

    LLNL's Computational Nuclear Data and Theory Group have created a 2009.3 revised release of the Evaluated Nuclear Data Library (ENDL2009.3). This library is designed to support LLNL's current and future nuclear data needs and will be employed in nuclear reactor, nuclear security and stockpile stewardship simulations with ASC codes. The ENDL2009 database was the most complete nuclear database for Monte Carlo and deterministic transport of neutrons and charged particles. It was assembled with strong support from the ASC PEM and Attribution programs, leveraged with support from Campaign 4 and the DOE/Office of Science's US Nuclear Data Program. This document lists the revisions and fixes made in a new release called ENDL2009.3, by com- paring with the existing data in the previous release ENDL2009.2. These changes are made in conjunction with the revisions for ENDL2011.3, so that both the .3 releases are as free as possible of known defects.

  15. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  16. 77 FR 12329 - Office of the Secretary

    Science.gov (United States)

    2012-02-29

    ... for OMB Review; Comment Request; Migrant and Seasonal Farmworker Monitoring Report and One-Stop Career... Seasonal Farmworker Monitoring Report and One- Stop Career Center Complaint/Referral Record,'' as proposed to be revised, to the Office of Management and Budget (OMB) for review and approval for continued use...

  17. Loosening After Acetabular Revision

    DEFF Research Database (Denmark)

    Beckmann, Nicholas A.; Weiss, Stefan; Klotz, Matthias C.M.

    2014-01-01

    The best method of revision acetabular arthroplasty remains unclear. Consequently, we reviewed the literature on the treatment of revision acetabular arthroplasty using revision rings (1541 cases; mean follow-up (FU) 5.7 years) and Trabecular Metal, or TM, implants (1959 cases; mean FU 3.7 years...

  18. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  19. 46 CFR 10.214 - Security Check.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...

  20. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  1. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  2. 12 CFR 563g.20 - Form for securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Form for securities sale report. 563g.20 Section 563g.20 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.20 Form for securities sale report. Office of Thrift Supervision, 1700 G Street, NW...

  3. 77 FR 9214 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-02-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... meeting of the National Security Education Board. The purpose of the meeting is to review and make... p.m. ADDRESSES: Defense Language and National Security Education Office, 1101 Wilson Boulevard...

  4. [Food security in Mexico].

    Science.gov (United States)

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  5. Passport officers' errors in face matching.

    Science.gov (United States)

    White, David; Kemp, Richard I; Jenkins, Rob; Matheson, Michael; Burton, A Mike

    2014-01-01

    Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of 'fraudulent' photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately--though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection.

  6. Passport officers' errors in face matching.

    Directory of Open Access Journals (Sweden)

    David White

    Full Text Available Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of 'fraudulent' photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately--though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection.

  7. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  8. 75 FR 69129 - Proposed Revision of Information Collection: Comment Request National Medical Support Notice-Part B

    Science.gov (United States)

    2010-11-10

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Proposed Revision of Information Collection: Comment Request National Medical Support Notice--Part B AGENCY: Employee Benefits Security... assess the impact of its collection requirements on respondents. Currently, the Employee Benefits...

  9. 48 CFR 819.705 - Appeal of Contracting Officer decisions.

    Science.gov (United States)

    2010-10-01

    ... the Senior Procurement Executive (SPE) within 5 working days. The SPE shall have 15 working days to... decision. The contracting officer has 5 working days to reply to the challenge by either revising the... filed within 5 working days of receipt of the contracting officer's decision. The HCA has 5 working days...

  10. Back office to box office

    DEFF Research Database (Denmark)

    Haigh, Matthew

    Consider the representation of value in the organizations we rely on for our long retirements. Social security has been symbolized by private mechanisms such as the employment-related pension scheme, yet, reporting requirement would impute its fitness for financial trading. A scheme's financier...... of the pension scheme would challenge the most ardent advocate of agency theory; its market rationality enfeebles stewardship theory; while resource dependency and stakeholder analysis shrug off the complexity of substitutable interests. A dialectical reconstruction of network theory allows comprehension...

  11. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  12. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  13. 20 CFR 404.1212 - Police officers and firefighters.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Police officers and firefighters. 404.1212... May Be Covered § 404.1212 Police officers and firefighters. (a) General. For Social Security coverage purposes under section 218 of the Act, a police officer's or firefighter's position is any position so...

  14. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  15. Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5). Recommendations (Spanish Edition); Recomendaciones de Seguridad Fisica Nuclear sobre la Proteccion Fisica de los Materiales y las Instalaciones Nucleares (INFCIRC/225/Rev.5). Recomendaciones

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-06-15

    This publication, Revision 5 of Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225), is intended to provide guidance to States and their competent authorities on how to develop or enhance, implement and maintain a physical protection regime for nuclear material and nuclear facilities, through the establishment or improvement of their capabilities to implement legislative and regulatory programmes. The recommendations presented in this publication reflect a broad consensus among IAEA Member States on the requirements which should be met for the physical protection of nuclear materials and nuclear facilities.

  16. Office of Child Care

    Science.gov (United States)

    ... for Children & Families Office of Child Care By Office Administration for Native Americans (ANA) Administration on Children, ... about the Child Care Rule > What is the Office of Child Care (OCC)? The Office of Child ...

  17. 78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-09-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...

  18. 75 FR 73947 - Securities of Nonmember Insured Banks

    Science.gov (United States)

    2010-11-30

    ..., DC, and should be addressed as follows: Accounting and Securities Disclosure Section, Division of..., Accounting and Securities Disclosure Section, Division of Supervision and Consumer Protection, 550 17th... comment. SUMMARY: The FDIC is revising its securities disclosure regulations applicable to state nonmember...

  19. Multi-Level Secure Local Area Network

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...

  20. 8111/8116 Security Police Staff Officers 8121/8124 Security Police Officers AFSC: 81XX

    Science.gov (United States)

    1992-02-01

    c 6I4 .1 4 6 5 . 5 6 -6 0 m 0 60 . 0.. C afa 0 -6 0 1 0 .4 L 0 CL & f6 C 6.4 6%. 4 040E .~ ~ a 0 0.41.ft i 0 a 0w m a 2m 2 0 0. Mv 0U 4 0. L.~ 0 0ty...m ~ SC 6& Ct D0 CC Z~C)d Ř-66 64 I Ř.64C0 Ř E~ L 𔄀 6660 LO U64 W . .0 C 𔄀 -4 0L 6 0 L 1- 4 0ŘC C #.4 f6 ൶ 0 151 6W ~ )d6I.ILC E 11 .4 6.4...L - - R~ . ( *U # ACCa .4 % 40 a - 4- 1 4 4-L 0 *-46.40 50 a .40C CL 0 Ŕ 1 0. 0 OUUCC>CU.U0C4-LSa LC .CaC CW~ift-4C .4,4f L .4 -S(( a-..CA a COC *-. 4

  1. Revision of ISO 15859 Aerospace Fluid Standards

    Science.gov (United States)

    Greene, Benjamin; McClure, Mark B.

    2012-01-01

    A detailed review of ISO 15859 "Space Systems - Fluid Characteristics, Sampling and Test Methods" was performed An approach to revising Parts 1-9 and 11-13 was developed and concurred by the NASA Technical Standards Program Office. The approach was to align them with the highest level source documents, and not to program-specific requirements. The updated documents were prepared and presented.

  2. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  3. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  4. Report: Fiscal Year 2010 Federal Information Security Management Act Report

    Science.gov (United States)

    Report #11-P-0017, November 16, 2010. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2010 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  5. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  6. Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety

    Science.gov (United States)

    1998-05-01

    Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...

  7. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  8. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  9. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  10. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    Science.gov (United States)

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  11. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45... SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45 Information Security Program Review. (a) The Director, OSTP, shall require an annual formal review of the OSTP...

  12. 12 CFR 563g.19 - Approval of the security.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Approval of the security. 563g.19 Section 563g.19 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.19 Approval of the security. Any securities of a savings association which are not exempt under...

  13. 12 CFR 563g.12 - Securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Securities sale report. 563g.12 Section 563g.12 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.12 Securities sale report. (a) Within 30 days after the first sale of the securities, every six...

  14. 6 CFR 27.204 - Minimum concentration by security issue.

    Science.gov (United States)

    2010-01-01

    ... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...

  15. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  16. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Science.gov (United States)

    2010-08-16

    ... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security... Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... System Operator Security Information. Type of Request: New collection. OMB Control Number: Not yet...

  17. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  18. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  19. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  20. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  1. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Amended Record of Decision... National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of... Manager, Office of Fissile Materials Disposition, National Nuclear Security Administration, U.S...

  2. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  3. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  4. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  5. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  6. Bibliocable. Revised Edition.

    Science.gov (United States)

    Cable Television Information Center, Washington, DC.

    This selective, annotated bibliography is a revision of the original published in 1972 (ED 071 402). Some 104 books, articles, and reports included here deal with access, applications, franchising, regulation, technology, and other aspects of cable television. The listings are of two types in each category. First are revisions of the original…

  7. The Impact of Leadership Styles and Knowledge Sharing on Police Officers' Willingness to Exert Extra Effort to Provide Better Security: A Study in the Riot Unit of the Turkish National Police

    Science.gov (United States)

    Tombul, Fatih

    2011-01-01

    The motivation for this study is to understand the factors affecting police officers' willingness to exert extra effort for providing better service through knowledge sharing in different working environments such as riots. Since managers' leadership styles may be important factors affecting subordinates' willingness to exert extra effort, this…

  8. Weatherization and Intergovernmental Programs Office Fact Sheet

    Energy Technology Data Exchange (ETDEWEB)

    None

    2018-02-01

    One of the Department of Energy’s (DOE) primary forums for helping state and local governments implement costeffective and productive energy systems for American homes, communities, businesses, and industries is the Weatherization and Intergovernmental Programs Office (WIP). WIP is part of DOE’s Office of Energy Efficiency and Renewable Energy’s “all of the above” national energy strategy to create greater energy affordability, security and resiliency.

  9. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    CERN Document Server

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  10. Amplifying Security Education in the Laboratory

    National Research Council Canada - National Science Library

    Irvine, Cynthia

    1999-01-01

    Computer and network security have become concerns for enterprises ranging from sole proprietorships run from home offices to global corporations and government agencies with hundred of thousands of employees...

  11. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  12. Uniformed Services Worldwide Legal Assistance & Reserve Components Office Directory. Revised.

    Science.gov (United States)

    1999-11-01

    257-1829 Commander (dl) 14th Coast Guard District Prince Kalanianaole Federal Building 300 Ala Moana Blvd, 9th Floor Honolulu, Hawaii 96850-4982...a),aarons.org Practice Area: 351 - Criminal Law - Defense, 400 - General Practice Bars Admitted: NM County of Practice: Santa Fe, Rio Arriba , Los

  13. 75 FR 69709 - Office of New Reactors; Notice of Availability of the Final Staff Guidance; Standard Review Plan...

    Science.gov (United States)

    2010-11-15

    ... the Final Staff Guidance; Standard Review Plan, Section 13.6.6, Revision 0 on Cyber Security Plan... Reports for Nuclear Power Plants,'' Section 13.6.6, Revision 0 on ``Cyber Security Plan'' (Agencywide... reviews to amendments to licenses for operating reactors or for activities associated with review of...

  14. 75 FR 67989 - Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure...

    Science.gov (United States)

    2010-11-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0084] Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure Protection Stakeholder Input Project--Generic... comments; New Information Collection Request: 1670-NEW. SUMMARY: The Department of Homeland Security...

  15. 12 CFR 1700.2 - Organization of the Office of Federal Housing Enterprise Oversight.

    Science.gov (United States)

    2010-01-01

    ... regulatory issues, securities and corporate law principles, and administrative and general legal matters... developments in Enterprise activities, housing finance and financial regulation. The Office also prepares data...

  16. 75 FR 17787 - Submission for OMB Review; Request for Review of a Revised Information Collection

    Science.gov (United States)

    2010-04-07

    ... Review; Request for Review of a Revised Information Collection AGENCY: Office of Personnel Management... of Management and Budget (OMB) a request for review of a revised information collection. This... retired on disability and are not yet age 62. The supplement approximates the portion of a full career...

  17. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  18. 76 FR 44965 - Notice of Revision of Standard Forms 39 and 39-A

    Science.gov (United States)

    2011-07-27

    ... OFFICE OF PERSONNEL MANAGEMENT Notice of Revision of Standard Forms 39 and 39-A AGENCY: U.S... Management (OPM) has revised Standard Form (SF) 39, Request For Referral Of Eligibles, and SF 39-A, Request... part 332. The SF 39 outlines instructions to be used by hiring officials to request a list of eligible...

  19. Proposed Guideline Revisions for Dental Sedation and General Anesthesia: Why Target the Safest Level of Sedation?

    Science.gov (United States)

    Dionne, Raymond A

    2016-09-01

    Recently proposed revisions to the American Dental Association's Guidelines for the Use of Sedation and General Anesthesia by Dentists, aimed at improving safety in dental offices, differentiate between levels of sedation based on drug-induced changes in physiologic and behavioral states. However, the author of this op-ed is concerned the proposed revisions may have far-reaching and unintended consequences.

  20. 76 FR 69734 - Public Water System Supervision Program Revision for the State of New Mexico

    Science.gov (United States)

    2011-11-09

    ... Water System Supervision Program. New Mexico has adopted the Lead and Copper Rule Short Term Revisions... water. EPA has determined that this rule revision submitted by New Mexico is no less stringent than the... the following offices: New Mexico Environment Department, Drinking Water Bureau, 525 Camino De Los...

  1. Revised inspection program for nuclear power plants

    International Nuclear Information System (INIS)

    1978-01-01

    The United States Nuclear Regulatory Commission (NRC) regulates nuclear power plants to assure adequate protection of the public and the environment from the dangers associated with nuclear materials. NRC fulfills this responsibility through comprehensive safety reviews of nuclear facilities, licensing of organizations that use nuclear materials, and continuing inspection. The NRC inspection program is currently conducted from the five regional offices in or near Philadelphia, Atlanta, Chicago, Dallas and San Francisco. Inspectors travel from the regional offices to nuclear power plants in various phases of construction, test and operation in order to conduct inspections. However, in June 1977 the Commission approved a revision to the inspection program that will include stationing inspectors at selected plants under construction and at all plants in operation. In addition, the revised program provides for appraising the performance of licensees on a national basis and involves more direct measurement and observation by NRC inspectors of work and tests in progress. The program also includes enhanced career management consisting of improved training and career development for inspectors and other professionals. The report was requested in the Conference Report on the NRC Authorization for Appropriations for Fiscal Year 1978. The report provides a discussion of the basis for both the current and revised inspection programs, describes these programs, and shows how the NRC inspection force will be trained and utilized. In addition, the report includes a discussion of the actions that will be taken to assure the objectivity of inspectors

  2. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  3. Publishing and Revising Content

    Science.gov (United States)

    Editors and Webmasters can publish content without going through a workflow. Publishing times and dates can be set, and multiple pages can be published in bulk. Making an edit to published content created a revision.

  4. Letter of Map Revision

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — The National Flood Hazard Layer (NFHL) data incorporates all Digital Flood Insurance Rate Map(DFIRM) databases published by FEMA, and any Letters Of Map Revision...

  5. 49 CFR 1544.221 - Carriage of prisoners under the control of armed law enforcement officers.

    Science.gov (United States)

    2010-10-01

    ... Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.221 Carriage... custody of an armed law enforcement officer aboard an aircraft for which screening is required unless, in...

  6. Hearing Office Dispositions Per ALJ Per Day Rate Ranking Report

    Data.gov (United States)

    Social Security Administration — A ranking of ODAR hearing offices by the average number of hearings dispositions per ALJ per day. The average shown will be a combined average for all ALJs working...

  7. Office of Child Support and Enforcement (OCSE) State Wage Alerts

    Data.gov (United States)

    Social Security Administration — The OCSE State Wage Alert is a quarterly match which detects SSI overpayments by identifying unreported wage and unemployment data provided to the Office of Child...

  8. Professionalization of the Senior Chinese Officer Corps Trends and Implications

    National Research Council Canada - National Science Library

    Mulvenon, James

    1997-01-01

    ... consequences for longer-term U.S. national security interests. Specifically, this report evaluates demographic and cohort changes in the officer corps of the Chinese People's Liberation Army (PLA...

  9. 76 FR 72984 - Revised Application for a License To Export High-Enriched Uranium

    Science.gov (United States)

    2011-11-28

    ... NUCLEAR REGULATORY COMMISSION Revised Application for a License To Export High-Enriched Uranium The application for a license to export high-enriched Uranium has been revised as noted below. Notice... fabricate fuel France. Security Complex; October 18, Uranium (93.35%). uranium (174.0 elements in France...

  10. 77 FR 21538 - Announcing DRAFT Revisions to Federal Information Processing Standard (FIPS) 186-3, Digital...

    Science.gov (United States)

    2012-04-10

    ...-01] Announcing DRAFT Revisions to Federal Information Processing Standard (FIPS) 186-3, Digital... Technology (NIST) requests comments on revisions to Federal Information Processing Standard (FIPS) 186-3... 25, 2012. ADDRESSES: Written comments may be sent to: Chief, Computer Security Division, Information...

  11. Corrective Action Decision Document/Closure Report for Corrective Action Unit 569: Area 3 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada with ROTC 1, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Sloop, Christy

    2013-04-01

    This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 569: Area 3 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada. CAU 569 comprises the following nine corrective action sites (CASs): • 03-23-09, T-3 Contamination Area • 03-23-10, T-3A Contamination Area • 03-23-11, T-3B Contamination Area • 03-23-12, T-3S Contamination Area • 03-23-13, T-3T Contamination Area • 03-23-14, T-3V Contamination Area • 03-23-15, S-3G Contamination Area • 03-23-16, S-3H Contamination Area • 03-23-21, Pike Contamination Area The purpose of this Corrective Action Decision Document/Closure Report is to provide justification and documentation supporting the recommendation that no further corrective action is needed for CAU 569 based on the implementation of the corrective actions listed in Table ES-2.

  12. Phase I Flow and Transport Model Document for Corrective Action Unit 97: Yucca Flat/Climax Mine, Nevada National Security Site, Nye County, Nevada, Revision 1 with ROTCs 1 and 2

    Energy Technology Data Exchange (ETDEWEB)

    Andrews, Robert

    2013-09-01

    The Underground Test Area (UGTA) Corrective Action Unit (CAU) 97, Yucca Flat/Climax Mine, in the northeast part of the Nevada National Security Site (NNSS) requires environmental corrective action activities to assess contamination resulting from underground nuclear testing. These activities are necessary to comply with the UGTA corrective action strategy (referred to as the UGTA strategy). The corrective action investigation phase of the UGTA strategy requires the development of groundwater flow and contaminant transport models whose purpose is to identify the lateral and vertical extent of contaminant migration over the next 1,000 years. In particular, the goal is to calculate the contaminant boundary, which is defined as a probabilistic model-forecast perimeter and a lower hydrostratigraphic unit (HSU) boundary that delineate the possible extent of radionuclide-contaminated groundwater from underground nuclear testing. Because of structural uncertainty in the contaminant boundary, a range of potential contaminant boundaries was forecast, resulting in an ensemble of contaminant boundaries. The contaminant boundary extent is determined by the volume of groundwater that has at least a 5 percent chance of exceeding the radiological standards of the Safe Drinking Water Act (SDWA) (CFR, 2012).

  13. 78 FR 32595 - Revision of Freedom of Information Act Regulation

    Science.gov (United States)

    2013-05-31

    ... Revision of Freedom of Information Act Regulation AGENCY: Office of the Secretary, HUD. ACTION: Proposed rule. SUMMARY: This proposed rule would amend HUD's regulations implementing the Freedom of Information... with speech or hearing impairments may access this number via TTY by calling the toll-free Federal...

  14. 77 FR 13997 - Revising Standards Referenced in the Acetylene Standard

    Science.gov (United States)

    2012-03-08

    ...: Occupational Safety and Health Administration (OSHA), Labor. ACTION: Proposed rule; withdrawal. SUMMARY: With this document, OSHA is withdrawing the proposed rule that accompanied its direct-final rule revising... and press inquiries: Contact Frank Meilinger, Director, OSHA Office of Communications, Room N-3647, U...

  15. 75 FR 5707 - Revising Standards Referenced in the Acetylene Standard

    Science.gov (United States)

    2010-02-04

    ...: Occupational Safety and Health Administration (OSHA), Labor. ACTION: Proposed rule; withdrawal. SUMMARY: With this document, OSHA is withdrawing the proposed rule that accompanied its direct-final rule revising... and press inquiries: Contact Jennifer Ashley, Director, OSHA Office of Communications, Room N-3647, U...

  16. Fermilab Education Office - FAQ

    Science.gov (United States)

    Search The Education Office FAQ - Frequently Asked Questions Click on the question to see the answer and the difference between the Education Office and the Lederman Science Center? The Education Office is store selling logo items and science toys. The Education Office staff works on both the 15th floor of

  17. Information security value in e-entrepreneurship

    OpenAIRE

    Nunes, Sérgio

    2012-01-01

    This paper researches the information security value in e-entrepreneurship by revising the literature that establishes the entrepreneurial domain and by relating it with the development of technological resources that create value for the customer in an online business. It details multiple paradigms regarding consumer’s values of information security, while relating them with common practices and previous researches in technological entrepreneurship. This research presents and discusses the b...

  18. 6 CFR 27.245 - Review and approval of site security plans.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  19. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Science.gov (United States)

    2010-01-01

    ... chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information regarding security risk for a chemical facility. (a) Information to determine security risk. In order to...

  20. 6 CFR 27.240 - Review and approval of security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of security vulnerability assessments. 27.240 Section 27.240 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval...

  1. Office 365 For Dummies

    CERN Document Server

    Withee, Ken

    2012-01-01

    The information you need to create a virtual office that can be accessed anywhere Microsoft Office 365 is a revolutionary technology that allows individuals and companies of all sizes to create and maintain a virtual office in the cloud. Featuring familiar Office Professional applications, web apps, Exchange Online, and Lync Online, Office 365 offers business professionals added flexibility and an easy way to work on the go. This friendly guide explains the cloud, how Office 365 takes advantage of it, how to use the various components, and the many possibilities offered by Office 365. It provi

  2. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  3. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  4. Corrective Action Investigation Plan for Corrective Action Unit 97: Yucca Flat/Climax Mine, Nevada National Security Site, Nevada with ROTCs 1, 2, and 3 (Revision 0, September 2000)

    Energy Technology Data Exchange (ETDEWEB)

    Andrews, Robert; Marutzky, Sam

    2000-09-01

    This Corrective Action Investigation Plan contains the U.S. Department of Energy, Nevada Operations Office's (DOE/NV's) approach to collect the data necessary to evaluate Corrective Action Alternatives (CAAs) appropriate for the closure of Corrective Action Unit (CAU) 97 under the Federal Facility Agreement and Consent Order (FFACO). Corrective Action Unit 97, collectively known as the Yucca Flat/Climax Mine CAU, consists of 720 Corrective Action Sites (CASs). The Yucca Flat/Climax Mine CAU extends over several areas of the NTS and constitutes one of several areas used for underground nuclear testing in the past. The nuclear tests resulted in groundwater contamination in the vicinity as well as downgradient of the underground test areas. Based on site history, the Yucca Flat underground nuclear tests were conducted in alluvial, volcanic, and carbonate rocks; whereas, the Climax Mine tests were conducted in an igneous intrusion located in northern Yucca Flat. Particle-tracking simulations performed during the regional evaluation indicate that the local Climax Mine groundwater flow system merges into the much larger Yucca Flat groundwater flow systems during the 1,000-year time period of interest. Addressing these two areas jointly and simultaneously investigating them as a combined CAU has been determined the best way to proceed with corrective action investigation (CAI) activities. The purpose and scope of the CAI includes characterization activities and model development conducted in five major sequential steps designed to be consistent with FFACO Underground Test Area Project's strategy to predict the location of the contaminant boundary, develop and implement a corrective action, and close each CAU. The results of this field investigation will support a defensible evaluation of CAAs in the subsequent corrective action decision document.

  5. 75 FR 71632 - Revised Medical Criteria for Evaluating Mental Disorders

    Science.gov (United States)

    2010-11-24

    ... Revised Medical Criteria for Evaluating Mental Disorders AGENCY: Social Security Administration. ACTION... comments on any other aspects of the proposed listings for mental disorders that we receive during this... our mental disorders listings: Definitions we provide for the terms ``marked'' and ``extreme'' that...

  6. A Psychometric Evaluation of Super's Work Values Inventory--Revised

    Science.gov (United States)

    Robinson, Carrie H.; Betz, Nancy E.

    2008-01-01

    This study describes the psychometric evaluation of Super's Work Values Inventory--Revised (SWVI-R), an instrument comprised of 12 scales measuring the relative importance placed on the following work-related value dimensions: Achievement, Coworkers, Creativity, Income, Independence, Lifestyle, Mental Challenge, Prestige, Security, Supervision,…

  7. Post-Closure Monitoring Report for Corrective Action Unit 98, Frenchman Flat, Underground Test Area, Nevada National Security Site, Nevada for Calendar Year 2016 (January 2016–December 2016), Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States)

    2017-06-01

    Corrective Action Unit (CAU) 98: Frenchman Flat on the Nevada National Security Site was the location of 10 underground nuclear tests. CAU 98 underwent a series of investigations and actions in accordance with the Federal Facility Agreement and Consent Order to assess contamination of groundwater by radionuclides from the tests. A Closure Report completed that process in 2016 and called for long-term monitoring, use restrictions (URs), and institutional controls to protect the public and environment from potential exposure to contaminated groundwater. Three types of monitoring are performed for CAU 98: water quality, water level, and institutional control. These are evaluated to determine whether the UR boundaries remain protective of human health and the environment, and to ensure that the regulatory boundary objectives are being met. Additionally, monitoring data are used to evaluate consistency with the groundwater flow and contaminant transport models because the contaminant boundaries (CBs) calculated with the models are the primary basis of the UR boundaries. In summary, the monitoring results from 2016 indicate the regulatory controls on the closure of CAU 98 remain effective in protection of human health and the environment. Recommendations resulting from this first year of monitoring activities include formally incorporating wells UE-5 PW-1, UE-5 PW-2, and UE-5 PW-3 into the groundwater-level monitoring network given their strategic location in the basin; and early development of a basis for trigger levels for the groundwater-level monitoring given the observed trends. Additionally, it is recommended to improve the Real Estate/Operations Permit process for capturing information important for evaluating the impact of activities on groundwater resources, and to shift the reporting requirement for this annual report from the second quarter of the federal fiscal year (end of March) to the second quarter of the calendar year (end of June).

  8. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    Science.gov (United States)

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  9. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  10. Segurança na terapia medicamentosa: uma revisão bibliográfica Seguridad en la terapia medicamentosa: una revisión bibliográfica Security in the medicine therapy: a bibliographical revision

    Directory of Open Access Journals (Sweden)

    Anna Bianca Ribeiro Melo

    2008-03-01

    Full Text Available Trata-se de revisão bibliográfica que objetivou analisar as publicações científicas de enfermeiros sobre erros no manejo da terapia medicamentosa realizada pela enfermagem, indexados em bancos de dados no período de 2000 a 2006. Foram pesquisadas as bibliotecas virtuais MedLine, Lilacs e Scielo. A amostra foi constituída por 16 publicações que foram analisadas quanto aos fatores de erro e propostas ou não de barreiras para erro. Destaca-se que estudos em relação a erros em medicação são relativamente recentes e poucos se referem à realidade brasileira. Entre os motivos apontados para a ocorrência de erros tem-se a ilegibilidade da letra do médico na prescrição, a carga de trabalho excessiva da enfermagem, interrupções freqüentes durante as etapas da prescrição e administração de medicamentos, número reduzido de funcionários e inexperiência do profissional de enfermagem que prepara a medicação. Três estudos apresentaram propostas de barreiras relacionadas à informatização do processo.Se trata de una revisión bibliográfica con el objetivo de analizar las publicaciones de enfermeros acerca de errores con la terapia medicamentosa indexados en bancos de datos entre 2000 a 2006. La muestra consistió en 16 estudios que fueron analizados si presentaban los factores del error y si tenían propuestas de barreras para el error. Se ha visto que este tipo de estudio es reciente y que pocos hablan de la realidad brasilera. Entre las causas de error están la letra del médico, la cantidad de trabajo de los enfermeros, inter r upciones frecuentes, número pequeño de profesionales de enfermería y la inexperiencia de quien prepara la medicación. Tres estudios han hablado de barreras a los errores relacionadas a la informatización.It is a bibliographical revision that objectified to analyze scientific publications of nurses on, errors in the handling of the medicine therapy, carried through for the nursing, indexded in

  11. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  12. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  13. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  14. 19 CFR 12.62 - Enforcement; duties of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Enforcement; duties of Customs officers. 12.62 Section 12.62 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...; duties of Customs officers. (a) In accordance with the authority contained in sections 10 and 12 of the...

  15. 19 CFR 101.2 - Authority of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Authority of Customs officers. 101.2 Section 101.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL PROVISIONS § 101.2 Authority of Customs officers. (a) Supremacy of delegated authority...

  16. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    Science.gov (United States)

    2012-01-01

    tenfold to account for uninsured and other costs unaccounted for, the result would be in the low billions of dollars rather than tens of billions...Aviation Security GAO—See U.S. Government Accountability Office or, prior to 2004, U.S. General Accounting Office. Ghylin, K. M., C. G . Drury , and A...outweigh their costs . This document seeks to contribute to the national debate on avia- tion security by examining a set of issues that are either

  17. Acetabular Cup Revision.

    Science.gov (United States)

    Kim, Young-Ho

    2017-09-01

    The use of acetabular cup revision arthroplasty is on the rise as demands for total hip arthroplasty, improved life expectancies, and the need for individual activity increase. For an acetabular cup revision to be successful, the cup should gain stable fixation within the remaining supportive bone of the acetabulum. Since the patient's remaining supportive acetabular bone stock plays an important role in the success of revision, accurate classification of the degree of acetabular bone defect is necessary. The Paprosky classification system is most commonly used when determining the location and degree of acetabular bone loss. Common treatment options include: acetabular liner exchange, high hip center, oblong cup, trabecular metal cup with augment, bipolar cup, bulk structural graft, cemented cup, uncemented cup including jumbo cup, acetabular reinforcement device (cage), trabecular metal cup cage. The optimal treatment option is dependent upon the degree of the discontinuity, the amount of available bone stock and the likelihood of achieving stable fixation upon supportive host bone. To achieve successful acetabular cup revision, accurate evaluation of bone defect preoperatively and intraoperatively, proper choice of method of acetabular revision according to the evaluation of acetabular bone deficiency, proper technique to get primary stability of implant such as precise grafting technique, and stable fixation of implant are mandatory.

  18. 20 CFR 416.1443 - Responsibilities of the adjudication officer.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Responsibilities of the adjudication officer. 416.1443 Section 416.1443 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... disagreement and refer the claim to the administrative law judge for further proceedings. At this point, the...

  19. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  20. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  1. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  2. Twilight Policing. Private Security in Durban, South Africa

    NARCIS (Netherlands)

    Diphoorn, T.G.

    2013-01-01

    This ethnography analyses the everyday policing practices of armed response officers in Durban, South Africa. Armed response officers are private security officers who patrol communities in vehicles and respond to distress calls from clients. This study considers their interactions with other

  3. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Science.gov (United States)

    2010-03-10

    ... 20472. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management Agency System of Records AGENCY: Privacy Office...

  4. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  5. 48 CFR 1339.107-70 - Information security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...

  6. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  7. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  8. 76 FR 15368 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-03-21

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... security devices and procedures to discourage robberies, burglaries, and larcenies, and to assist in the...

  9. 76 FR 30243 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-05-24

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures.... Title of Proposal: Minimum Security Devices and Procedures. OMB Number: 1550-0062. Form Number: N/A... respect to the installation, maintenance, and operation of security devices and procedures to discourage...

  10. 4 CFR 83.9 - Social Security number.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Social Security number. 83.9 Section 83.9 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.9 Social Security number. (a) GAO may not require individuals to disclose their Social Security Number (SSN) unless...

  11. 76 FR 28960 - National Security Education Board Members Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  12. 77 FR 49439 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-08-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Secretary of Defense concerning requirements established by the David L. Boren National Security Education...

  13. 77 FR 27739 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-05-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  14. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  15. 12 CFR 208.61 - Bank security procedures.

    Science.gov (United States)

    2010-01-01

    ... procedures for opening and closing for business and for the safekeeping of all currency, negotiable...; the cost of the security devices; other security measures in effect at the banking office; and the... directors on the implementation, administration, and effectiveness of the security program. (e) Reserve...

  16. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... (CSO), Vessel Security Officers (VSO), public safety officers, emergency response personnel, and crisis management organization representatives within the port, including 24-hour contact details; (m) Measures to...

  17. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Science.gov (United States)

    2012-06-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... of the National Security Education Board. This meeting was to be held on June 20, 2012, from 8:30 a.m. to 2 p.m. at Defense Language and National Security Education Office, 1101 Wilson Boulevard, Suite...

  18. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Science.gov (United States)

    2010-05-10

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; National Security... June 23, 2010, from 8 a.m. to 12:30 p.m. ADDRESSES: The meeting will be held at the National Security.... Kevin Gormley, Program Officer, National Security Education Program, 1101 Wilson Boulevard, Suite 1210...

  19. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-05-24

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), DoD. ACTION: Meeting notice. SUMMARY: Under the... announces that the following Federal advisory committee meeting of the National Security Education Board...

  20. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Karen L. Neuman, (202) 343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974... Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...

  1. CY2017 Annual Closure Monitoring Report for Corrective Action Unit 98, Frenchman Flat, Underground Test Area, Nevada National Security Site, Nevada: (January 2017–December 2017), Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Rehfeldt, Ken; Haight, Brian

    2018-05-01

    Corrective Action Unit (CAU) 98: Frenchman Flat on the Nevada National Security Site was the location of 10 underground nuclear tests. CAU 98 underwent a series of investigations and actions in accordance with the Federal Facility Agreement and Consent Order to assess contamination of groundwater by radionuclides from the tests. A Closure Report completed that process in 2016 and called for long-term monitoring, use restrictions (URs), and institutional controls to protect the public and environment from potential exposure to contaminated groundwater. Three types of monitoring are performed for CAU 98: water quality, water level, and institutional control. These are monitored to determine whether the URs remain protective of human health and the environment, and to ensure that the regulatory boundary objectives are being met. Monitoring data will be used in the future, once multiple years of data are available, to evaluate consistency with the groundwater flow and contaminant transport models because the contaminant boundaries calculated with the models are the primary basis of the UR boundaries.

    Six wells were sampled for water-quality monitoring in 2017. Contaminants of concern were detected only in the two source/plume wells already known to contain contamination as a result of a radionuclide migration experiment. The 86,000-picocuries-per-liter (pCi/L) tritium concentration in one of the wells is about 12 percent higher than measured in 2016 but is over an order of magnitude less than the peak value measured in the well in 1980. The concentration in the other source/plume well is lower than measured in 2016.

    The water-level monitoring network includes 16 wells. Depth to water measured in 2017 is generally consistent with recent measurements for most wells. Water-level declines differing from long-term trends were observed in four wells. Three of these (WW-4, WW-4A, and WW-5B) are water-supply wells that experienced increases in pumping during

  2. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  3. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  4. 75 FR 43478 - Rhode Island: Final Authorization of State Hazardous Waste Management Program Revisions

    Science.gov (United States)

    2010-07-26

    ...: Final Authorization of State Hazardous Waste Management Program Revisions AGENCY: Environmental.... Mail: Robin Biscaia, RCRA Waste Management Section, Office of Site Remediation and Restoration (OSRR 07... Delivery or Courier: Deliver your comments to: Robin Biscaia, RCRA Waste Management Section, Office of Site...

  5. 75 FR 35720 - Massachusetts: Final Authorization of State Hazardous Waste Management Program Revisions

    Science.gov (United States)

    2010-06-23

    ...: Final Authorization of State Hazardous Waste Management Program Revisions AGENCY: Environmental...: Robin Biscaia, RCRA Waste Management Section, Office of Site Remediation and Restoration (OSRR 07-1... Courier: Deliver your comments to: Robin Biscaia, RCRA Waste Management Section, Office of Site...

  6. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  7. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  8. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  9. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  10. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  11. 76 FR 72209 - Agency Information Collection Activities: Form N-300; Revision of an Existing Information...

    Science.gov (United States)

    2011-11-22

    ...) will be submitting the following information collection request to the Office of Management and Budget... Security (DHS), and to the Office of Management and Budget (OMB) USCIS Desk Officer. Comments may be... documentary requirements for those seeking to work in certain occupations [[Page 72210

  12. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  13. NOAA Workforce Management Office

    Science.gov (United States)

    Management Fellows (PMFs) Program Coordination Office - Leadership Development Program (PCO-LDP) Employee (NRAP) Presidential Management Fellows (PMFs) Program Coordination Office - Leadership Development ) NOAA Leadership Seminar (NLS) NOAA Rotational Assignment Program (NRAP) Presidential Management Fellows

  14. HUD's Local Office Directory

    Data.gov (United States)

    Department of Housing and Urban Development — HUD is organized in 10 Regions. Each Region is managed by a Regional Administrator, who also oversees the Regional Office. Each Field Office within a Region is...

  15. 75 FR 62447 - Departmental Offices; Proposed Collections; Comment Requests

    Science.gov (United States)

    2010-10-08

    ... Management and Budget. The Office of International Affairs of the Department of the Treasury is soliciting... the formulation of international financial and monetary policies and for the preparation of the U.S... Statistical Reports section of the Introduction) will be revised by adding a paragraph on the proposed new SLT...

  16. Training Course for Compliance Safety and Health Officers. Final Report.

    Science.gov (United States)

    McKnight, A. James; And Others

    The report describes revision of the Compliance Safety and Health Officers (CSHO) course for the Department of Labor, Occupational Safety and Health Administration (OSHA). The CSHO's job was analyzed in depth, in accord with OSHA standards, policies, and procedures. A listing of over 1,700 violations of OSHA standards was prepared, and specialists…

  17. 76 FR 13111 - Compassionate Allowances for Autoimmune Disease, Office of the Commissioner; Hearing

    Science.gov (United States)

    2011-03-10

    [email protected] ; or Mail to Jamillah Jackson, Deputy Director, Office of Compassionate Allowances and....gov . You may also mail inquiries about this hearing to Jamillah Jackson, Deputy Director, Office of... Security--Disability Insurance; 96.006, Supplemental Security Income.) Dated: March 3, 2011. Michael J...

  18. 8 CFR 103.1 - Delegations of authority; designation of immigration officers.

    Science.gov (United States)

    2010-01-01

    ... immigration officers. 103.1 Section 103.1 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION... immigration officers. (a) Delegations of authority. Delegations of authority to perform functions and exercise authorities under the immigration laws may be made by the Secretary of Homeland Security as provided by § 2.1...

  19. Fermilab Education Office - Contacts

    Science.gov (United States)

    Search The Office of Education and Public Outreach: Contacts All telephone numbers require area code Presentations for Presenters 840-3094 Office of Education and Public Outreach Spencer Pasero spasero@fnal.gov Education Office 840-3076 Fermilab Friends for Science Education General Questions Susan Dahl sdahl@fnal.gov

  20. Fermilab Education Office - Physicists

    Science.gov (United States)

    on Education Server, but to take full advantage of all of this site's features, you should turn Custom Search Connect with the Fermilab Education Office! Facebook Fermilab Education Office Join these groups: Science Adventures Group Teacher Resource Center Group Twitter Fermilab Education Office For more

  1. Office Computers: Ergonomic Considerations.

    Science.gov (United States)

    Ganus, Susannah

    1984-01-01

    Each new report of the office automation market indicates technology is overrunning the office. The impacts of this technology are described and some ways to manage and physically "soften" the change to a computer-based office environment are suggested. (Author/MLW)

  2. Revision of Pachycentria (Melastomataceae)

    NARCIS (Netherlands)

    Clausing, Gudrun

    2000-01-01

    A revision of Pachycentria Blume, which includes the monotypic Pogonanthera Blume, is presented. Pachycentria comprises eight species and one subspecies. Two species, P. vogelkopensis and P. hanseniana, are newly described. The genus is distinguished from other genera in the Medinillinae by a small

  3. Revision of Oxandra (Annonaceae)

    NARCIS (Netherlands)

    Junikka, L.; Maas, P.J.M.; Maas-van de Kamer, H.; Westra, L.Y.Th.

    2016-01-01

    A taxonomic revision is given of the Neotropical genus Oxandra (Annonaceae). Within the genus 27 species are recognized, 4 of which are new to science. Most of the species are occurring in tropical South America, whereas a few (6) are found in Mexico and Central America and two in the West Indies

  4. Revision without ordinals

    NARCIS (Netherlands)

    Rivello, Edoardo

    2013-01-01

    We show that Herzberger’s and Gupta’s revision theories of truth can be recast in purely inductive terms, without any appeal neither to the transfinite ordinal numbers nor to the axiom of Choice. The result is presented in an abstract and general setting, emphasising both its validity for a wide

  5. Revising and editing for translators

    CERN Document Server

    Mossop, Brian

    2014-01-01

    Revising and Editing for Translators provides guidance and learning materials for translation students learning to edit texts written by others, and professional translators wishing to improve their self-revision ability or learning to revise the work of others. Editing is understood as making corrections and improvements to texts, with particular attention to tailoring them to the given readership. Revising is this same task applied to draft translations. The linguistic work of editors and revisers is related to the professional situations in which they work. Mossop offers in-depth coverage of a wide range of topics, including copyediting, style editing, structural editing, checking for consistency, revising procedures and principles, and translation quality assessment. This third edition provides extended coverage of computer aids for revisers, and of the different degrees of revision suited to different texts. The inclusion of suggested activities and exercises, numerous real-world examples, a proposed gra...

  6. Implementing shared decision making in federally qualified health centers, a quasi-experimental design study: the Office-Guidelines Applied to Practice (Office-GAP) program

    OpenAIRE

    Olomu, Adesuwa; Hart-Davidson, William; Luo, Zhehui; Kelly-Blake, Karen; Holmes-Rovner, Margaret

    2016-01-01

    Background Use of Shared Decision-Making (SDM) and Decision Aids (DAs) has been encouraged but is not regularly implemented in primary care. The Office-Guidelines Applied to Practice (Office-GAP) intervention is an application of a previous model revised to address guidelines based care for low-income populations with diabetes and coronary heart disease (CHD). Objective: To evaluate Office-GAP Program feasibility and preliminary efficacy on medication use, patient satisfaction with physician ...

  7. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  8. Office 2013 simplified

    CERN Document Server

    Marmel, Elaine

    2013-01-01

    A basic introduction to learn Office 2013 quickly, easily, and in full color Office 2013 has new features and tools to master, and whether you're upgrading from an earlier version or using the Office applications for the first time, you'll appreciate this simplified approach. Offering a clear, visual style of learning, this book provides you with concise, step-by-step instructions and full-color screen shots that walk you through the applications in the Microsoft Office 2013 suite: Word, Excel, PowerPoint, Outlook, and Publisher.Shows you how to tackle dozens of Office 2013

  9. Office 2013 for dummies

    CERN Document Server

    Wang, Wallace

    2013-01-01

    Office 2013 For Dummies is the key to your brand new Office! Packed with straightforward, friendly instruction, this update to one of the bestselling Office books of all time gets you thoroughly up to speed and helps you learn how to take full advantage of the new features in Office 2013. After coverage of the fundamentals, you'll discover how to spice up your Word documents, edit Excel spreadsheets and create formulas, add pizazz to your PowerPoint presentation, and much more.Helps you harness the power of all five Office 2013 applications: Word, Excel, PowerPoint,

  10. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  11. Water Security Toolkit User Manual Version 1.2.

    Energy Technology Data Exchange (ETDEWEB)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William Eugene; Phillips, Cynthia Ann; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License Py

  12. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  13. 78 FR 77606 - Security Requirements for Facilities Storing Spent Nuclear Fuel

    Science.gov (United States)

    2013-12-24

    ... NUCLEAR REGULATORY COMMISSION 10 CFR Parts 72 and 73 [NRC-2009-0558] RIN 3150-AI78 Security... rulemaking that would revise the security requirements for storing spent nuclear fuel (SNF) in an independent... Nuclear Security and Incident Response, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001...

  14. 49 CFR 387.303 - Security for the protection of the public: Minimum limits.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false Security for the protection of the public: Minimum... Insurance for Motor Carriers and Property Brokers § 387.303 Security for the protection of the public... convenience of the user, the revised text is set forth as follows: § 387.303 Security for the protection of...

  15. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  16. 75 FR 21008 - Office of Biotechnology Activities; Recombinant DNA Research: Proposed Actions Under the NIH...

    Science.gov (United States)

    2010-04-22

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Office of Biotechnology... Biotechnology Activities (OBA) published a proposal to revise the NIH Guidelines for Research with Recombinant... by fax to 301-496-9839 or mail to the Office of Biotechnology Activities, National Institutes of...

  17. Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  18. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  19. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  20. 76 FR 68809 - Bureau of International Security and Nonproliferation; Termination of Chemical and Biological...

    Science.gov (United States)

    2011-11-07

    ..., Office of Missile, Biological, and Chemical Nonproliferation, Bureau of International Security and... DEPARTMENT OF STATE [Public Notice: 7678] Bureau of International Security and Nonproliferation; Termination of Chemical and Biological Weapons (CBW) Proliferation Sanctions Against a Foreign Person AGENCY...

  1. 75 FR 54621 - Transparency Provisions of Section 23 of the Natural Gas Act; Notice of Availability of Revised...

    Science.gov (United States)

    2010-09-08

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. RM07-10-002] Transparency Provisions of Section 23 of the Natural Gas Act; Notice of Availability of Revised Form No. 552 for eFiling August 31, 2010. On August 17, 2010, the Office of Management and Budget approved a revised Form No. 552...

  2. 78 FR 54666 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-09-05

    ... Information Collection Request (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0782] Information Collection Request to...

  3. 77 FR 16044 - Information Collection Requests to Office of Management and Budget.

    Science.gov (United States)

    2012-03-19

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0149] Information Collection Requests to...

  4. 77 FR 5816 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-02-06

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0016] Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  5. 77 FR 53899 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-09-04

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0733] Information Collection Request to...

  6. 78 FR 77694 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-12-24

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and...-7710. FOR FURTHER INFORMATION: Contact Mr. Anthony Smith, Office of Information Management, telephone... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0949] Information Collection Requests to...

  7. 76 FR 35228 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-06-16

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and..., Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on these... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0494] Information Collection Request to...

  8. 78 FR 19502 - Information Collection Requests to Office of Management and Budget.

    Science.gov (United States)

    2013-04-01

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... FURTHER INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0164] Information Collection Requests to...

  9. 77 FR 17081 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-03-23

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... FOR FURTHER INFORMATION CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0082] Information Collection Requests to...

  10. 76 FR 61369 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-10-04

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and..., Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on these... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0914] Information Collection Request to...

  11. 78 FR 12083 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-02-21

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and..., Washington, DC 20593-7101. FOR FURTHER INFORMATION CONTACT: Anthony Smith, Office of Information Management... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0037] Information Collection Request to...

  12. 78 FR 42535 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-07-16

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax 202... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0519] Information Collection Requests to...

  13. 78 FR 65351 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-10-31

    ... Information Collection Request (ICRs) to the Office of Management and Budget (OMB), Office of Information and..., DC 20593-7710. FOR FURTHER INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0861] Information Collection Request to...

  14. 77 FR 6132 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-02-07

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... Tyler, Office of Information Management, telephone (202) 475-3652, or fax (202) 475- 3929, for questions... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0029] Information Collection Request to...

  15. 78 FR 77693 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-12-24

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Contact Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532, or... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0896] Information Collection Requests to...

  16. 76 FR 46824 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-08-03

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0710] Information Collection Requests to...

  17. 76 FR 58529 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-09-21

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0869] Information Collection Requests to...

  18. 77 FR 9951 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-02-21

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0077] Information Collection Requests to...

  19. 76 FR 62426 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-10-07

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0902] Information Collection Request to...

  20. 77 FR 27472 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-05-10

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0231] Information Collection Request to...

  1. 77 FR 32657 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-06-01

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0472] Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  2. 78 FR 5192 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-01-24

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-1006] Information Collection Requests to...

  3. 78 FR 19503 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-01

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...: Contact Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0045] Information Collection Request to...

  4. 76 FR 63626 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-10-13

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0955] Information Collection Requests to...

  5. 78 FR 74155 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-12-10

    ... Information Collection Request (ICRs) to the Office of Management and Budget (OMB), Office of Information and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0950] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  6. 8 CFR 287.5 - Exercise of power by immigration officers.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Exercise of power by immigration officers. 287.5 Section 287.5 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS FIELD OFFICERS; POWERS AND DUTIES § 287.5 Exercise of power by immigration officers. (a) Power and...

  7. 77 FR 40624 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-07-10

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0598] Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and...

  8. 78 FR 19504 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-01

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0133] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...

  9. 76 FR 5815 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-02-02

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0016; OMB Control numbers: 1625-0005, 1625-0024, 1625-0036 and 1625-0061] Information Collection Request to Office of Management and Budget AGENCY... (ICRs) to the Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA...

  10. 77 FR 18253 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-03-27

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0173] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...

  11. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  12. 17 CFR 200.19c - Director of the Office of Compliance Inspections and Examinations.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Director of the Office of Compliance Inspections and Examinations. 200.19c Section 200.19c Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organizatio...

  13. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  14. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  15. 10 CFR 95.19 - Changes to security practices and procedures.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Changes to security practices and procedures. 95.19 Section 95.19 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND..., also to the Director, Division of Security Operations, Office of Nuclear Security and Incident Response...

  16. 12 CFR 792.68 - Use and collection of Social Security numbers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Use and collection of Social Security numbers... Act § 792.68 Use and collection of Social Security numbers. The head of each NCUA Office shall take... furnish Social Security numbers, and that individuals who are requested to provide Social Security numbers...

  17. 75 FR 733 - Implementation of the Executive Order, ``Classified National Security Information''

    Science.gov (United States)

    2010-01-05

    ... of the Executive Order, ``Classified National Security Information'' Memorandum for the Heads of... Security Information'' (the ``order''), which substantially advances my goals for reforming the security... classified information shall provide the Director of the Information Security Oversight Office (ISOO) a copy...

  18. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Science.gov (United States)

    2010-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of the...

  19. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Science.gov (United States)

    2010-07-01

    ... for National Security, who shall refer such questions to the Office of Legal Counsel, as appropriate... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security...

  20. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  1. Auxiliary office chair

    OpenAIRE

    Pascual Osés, Maite

    2007-01-01

    The aim of this project is to develop an auxiliary office chair, which favorably will compete with the existing chairs on the market. Evolutions of ergonomical survey in the work environment and on the configuration of offices require new products which fulfill the requirements properly. In order to achieve it a survey about office chairs has been carried out: types, characteristics, ways of usage and products on the market besides a large antropometrical study and ergonomics related to work ...

  2. Cardiology office computer use: primer, pointers, pitfalls.

    Science.gov (United States)

    Shepard, R B; Blum, R I

    1986-10-01

    An office computer is a utility, like an automobile, with benefits and costs that are both direct and hidden and potential for disaster. For the cardiologist or cardiovascular surgeon, the increasing power and decreasing costs of computer hardware and the availability of software make use of an office computer system an increasingly attractive possibility. Management of office business functions is common; handling and scientific analysis of practice medical information are less common. The cardiologist can also access national medical information systems for literature searches and for interactive further education. Selection and testing of programs and the entire computer system before purchase of computer hardware will reduce the chances of disappointment or serious problems. Personnel pretraining and planning for office information flow and medical information security are necessary. Some cardiologists design their own office systems, buy hardware and software as needed, write programs for themselves and carry out the implementation themselves. For most cardiologists, the better course will be to take advantage of the professional experience of expert advisors. This article provides a starting point from which the practicing cardiologist can approach considering, specifying or implementing an office computer system for business functions and for scientific analysis of practice results.

  3. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  4. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  5. Facility Decontamination and Decommissioning Program Surveillance and Maintenance Plan, Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Poderis, Reed J. [NSTec; King, Rebecca A. [NSTec

    2013-09-30

    This Surveillance and Maintenance (S&M) Plan describes the activities performed between deactivation and final decommissioning of the following facilities located on the Nevada National Security Site, as documented in the Federal Facility Agreement and Consent Order under the Industrial Sites program as decontamination and decommissioning sites: ? Engine Maintenance, Assembly, and Disassembly (EMAD) Facility: o EMAD Building (Building 25-3900) o Locomotive Storage Shed (Building 25-3901) ? Test Cell C (TCC) Facility: o Equipment Building (Building 25-3220) o Motor Drive Building (Building 25-3230) o Pump Shop (Building 25-3231) o Cryogenic Lab (Building 25-3232) o Ancillary Structures (e.g., dewars, water tower, piping, tanks) These facilities have been declared excess and are in various stages of deactivation (low-risk, long-term stewardship disposition state). This S&M Plan establishes and implements a solid, cost-effective, and balanced S&M program consistent with federal, state, and regulatory requirements. A graded approach is used to plan and conduct S&M activities. The goal is to maintain the facilities in a safe condition in a cost-effective manner until their final end state is achieved. This plan accomplishes the following: ? Establishes S&M objectives and framework ? Identifies programmatic guidance for S&M activities to be conducted by National Security Technologies, LLC, for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) ? Provides present facility condition information and identifies hazards ? Identifies facility-specific S&M activities to be performed and their frequency ? Identifies regulatory drivers, NNSA/NFO policies and procedures, and best management practices that necessitate implementation of S&M activities ? Provides criteria and frequencies for revisions and updates ? Establishes the process for identifying and dispositioning a condition that has not been previously identified or

  6. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  7. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  8. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  9. Securing IoT Devices at CERN

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    CERN has more than 1000 Internet of Things (IoT) devices, which are connected to the office network. We have been doing the research to find all vulnerable IoT devices in CERN and mitigated them. We are currently working on detecting IoT devices automatically and, moreover, identifying the manufacturer, model and the running firmware version. This will help the CERN Computer Security Team to spot vulnerable devices and to show the security risks associated with them.

  10. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Science.gov (United States)

    2010-02-23

    ... privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  11. Revised White House Peer Review Guidelines Draw Generally Favorable Respons

    Science.gov (United States)

    Showstack, Randy

    2004-04-01

    A new bulletin from the White House Office of Management and Budget outlines minimum standards for peer review of scientific information that includes findings representing an official position of a department or agency of the federal government. The OMB Revised Information Quality Bulletin for Peer Review, released on 15 April, substantially modifies a previous draft issued on 15 September 2003, which some had criticized as restrictive and imbalanced.

  12. (No) Security in Automation!?

    CERN Document Server

    Lüders, S

    2008-01-01

    Modern Information Technologies like Ethernet, TCP/IP, web server or FTP are nowadays increas-ingly used in distributed control and automation systems. Thus, information from the factory floor is now directly available at the management level (From Shop-Floor to Top-Floor) and can be ma-nipulated from there. Despite the benefits coming with this (r)evolution, new vulnerabilities are in-herited, too: worms and viruses spread within seconds via Ethernet and attackers are becoming interested in control systems. Unfortunately, control systems lack the standard security features that usual office PCs have. This contribution will elaborate on these problems, discuss the vulnerabilities of modern control systems and present international initiatives for mitigation.

  13. Procedure Study Guide (Revision)

    Science.gov (United States)

    1997-04-01

    dismissed eight days after the accused enlisted.) In Russo, the accused suffered from dyslexia . The recruiter was advised of the accused’s inability...v. Blaylock, 15 M.J. 190 (C.M.A. 1983), the court repudiated Hardy insofar as the intervention in a court-martial by a superior officer might give

  14. Materiel Acquisition Handbook. Revision

    Science.gov (United States)

    1987-03-26

    DISTRIBUTION: CINC USAREUR & SEVEN.TH ARMY (AEAGC- FMD (75)) (if primary user) (see over) S. A TRANSMITTAL LETTERS OFFICE SYMBOL SUBJECT: DISTRIBUTICN...outlines adv•;rtising procedures and the process for collecting and considering industry comments. ft-F .’.0. , ftA - ATCD-ET/AMCDE-PQ SUBJECT: Letter of

  15. Regulatory Office for Network Industries

    International Nuclear Information System (INIS)

    2005-01-01

    The main goal of the economic regulation of network industries is to ensure a balance between the interests of consumers and investors and to encourage providing high-quality goods and services. The task of the regulatory authority is to protect the interests of consumers against monopolistic behaviour of regulated enterprises. At the same time, the regulatory office has to protect the interests of investors by giving them an opportunity to achieve an adequate return on their investments. And last, but not least, the regulatory office has to provide regulated enterprises with appropriate incentives to make them function in an efficient and effective manner and to guarantee the security of delivery of energies and related services. All this creates an efficient regulatory framework that is capable of attracting the required amount and type of investments. This also means providing third party access to the grids, the opening of energy markets, the un-bundling of accounts according to production, distribution, transmission and other activities and the establishment of a transparent and stable legislative environment for regulated companies, investors and consumers. Otherwise, in the long run consumers may suffer from a serious deterioration of service quality, although in the short run they are protected against increased prices. Under the Act No. 276/2001 Coll. on Regulation of Network Industries and on amendment of some acts the Office for Regulation of Network Industries has been commissioned to implement the main objectives of regulation of network industries. By network industries the Act No. 276/2001 Coll. on Regulation means the following areas: (a) Production, purchase, transit and distribution of electricity; (b) Production, purchase, transit and distribution of gas; (c) Production, purchase and distribution of heat; (d) Water management activities relating to the operation of the public water supply system or the public sewerage system; (e) Water management

  16. Multi-office engineering

    International Nuclear Information System (INIS)

    Cowle, E.S.; Hall, L.D.; Koss, P.; Saheb, E.; Setrakian, V.

    1995-01-01

    This paper addresses the viability of multi-office project engineering as has been made possible in a large part by the computer age. Brief discussions are provided on two past projects describing the authors' initial efforts at multi-office engineering, and an in-depth discussion is provided on a current Bechtel project that demonstrates their multi-office engineering capabilities. Efficiencies and cost savings associated with executing an engineering project from multiple office locations was identified as a viable and cost-effective execution approach. The paper also discusses how the need for multi-office engineering came about, what is required to succeed, and where they are going from here. Furthermore, it summarizes the benefits to their clients and to Bechtel

  17. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  18. Research Awards: Agriculture and Food Security program Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... HEAD OFFICE / SIÈGE : 150 Kent Street / 150, rue Kent PO Box ... to pursue their research goals in a dynamic team environment in ... You should have an interest in agriculture, food security, nutrition, rural livelihoods, and.

  19. Report: Improvements Needed in Key EPA Information System Security Practices

    Science.gov (United States)

    Report #10-P-0146, June 15, 2010. Williams Adley found that EPA program offices lacked evidence that they planned and executed tests of information system security controls as required by federal requirements.

  20. RELIGION, PEACE AND SECURITY IN NIGERIA Osaji, Jacob ...

    African Journals Online (AJOL)

    HP

    2005-02-07

    Feb 7, 2005 ... (modern) state faces justify an assessment of the role of religion in sustaining .... fortress and refuge, thus, God becomes his Chief security officer, a .... Houses and other places of financial mismanagement, corruption, money.

  1. Affairs of State: The Interagency and National Security

    National Research Council Canada - National Science Library

    Marcella, Gabriel

    2008-01-01

    The war colleges of the United States are a unique national asset. They are centers of academic excellence for preparing military and civilian officers for higher positions in the national security system...

  2. ICT-Based Framework for Improved Food Security in Nigeria ...

    African Journals Online (AJOL)

    The six regional decision support systems in this model is a comprehensive database ... from research findings and innovations, inputs from agricultural extension officers, ... Keywords: Food Security, Interactive websites, National Internet host, ...

  3. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  4. Evolution of nuclear security regulatory activities in Brazil

    International Nuclear Information System (INIS)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B.

    2009-01-01

    The changing of the world scenario in the last 15 years has increased worldwide the concerns about overall security and, as a consequence, about the nuclear and radioactive material as well as their associated facilities. Considering the new situation, in February 2004, the Brazilian National Nuclear Energy Commission (CNEN), decided to create the Nuclear Security Office. This Office is under the Coordination of Nuclear Safeguards and Security, in the Directorate for Safety, Security and Safeguards (Regulatory Directorate). Before that, security regulation issues were dealt in a decentralized manner, within that Directorate, by different licensing groups in specific areas (power reactors, fuel cycle facilities, radioactive facilities, transport of nuclear material, etc.). This decision was made in order to allow a coordinated approach on the subject, to strengthen the regulation in nuclear/radioactive security, and to provide support to management in the definition of institutional security policies. The CNEN Security Office develops its work based in the CNEN Physical Protection Regulation for Nuclear Operational Units - NE-2.01, 1996, the Convention on the Physical Protection of Nuclear Material and the IAEA Nuclear Security Series . This paper aims at presenting the activities developed and the achievements obtained by this new CNEN office, as well as identifying the issues and directions for future efforts. (author)

  5. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  6. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    International Nuclear Information System (INIS)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  7. Russia and the System of Transatlantic Security: Perspectives for the Future

    National Research Council Canada - National Science Library

    Alexeev, Denis

    2006-01-01

    .... The international security system, which was created in the middle of 20th Century, can hardly be applied to contemporary reality and calls for a serious revision of at least some key principles...

  8. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  9. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  10. Extremely secure identification documents

    International Nuclear Information System (INIS)

    Tolk, K.M.; Bell, M.

    1997-09-01

    The technology developed in this project uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals or alter existing documents to allow their use by unauthorized individuals. This process can be used to produce many types of identification documents with much higher security than any currently in use. The system is demonstrated using a security badge as an example. This project focused on the technologies requiring development in order to make the approach viable with existing badge printing and laminating technologies. By far the most difficult was the image processing required to verify that the picture on the badge had not been altered. Another area that required considerable work was the high density printed data storage required to get sufficient data on the badge for verification of the picture. The image processing process was successfully tested, and recommendations are included to refine the badge system to ensure high reliability. A two dimensional data array suitable for printing the required data on the badge was proposed, but testing of the readability of the array had to be abandoned due to reallocation of the budgeted funds by the LDRD office

  11. 77 FR 30335 - Proposed Revision 3 to Standard Review Plan, Section 19.1 on Determining the Technical Adequacy...

    Science.gov (United States)

    2012-05-22

    ...). The Office of New Reactors and Office of Nuclear Reactor Regulation are revising SRP Section 19.1... of the Code of Federal Regulations (10 CFR), 50.71(h)(1), (h)(2), and (h)(3) for new reactors, (2... searching on http://www.regulations.gov under Docket ID NRC-2012-0113. You may submit comments by the...

  12. Office 2013 digital classroom

    CERN Document Server

    Holland, Walter

    2013-01-01

    This complete training package makes learning the new Office 2013 even easier! Featuring both a video training DVD and a full-color book, this training package is like having your own personal instructor guiding you through each lesson of learning Office 2013, all while you work at your own pace. The self-paced lessons allow you to discover the new features and capabilities of the new Office suite. Each lesson includes step-by-step instructions and lesson files, and provides valuable video tutorials that complement what you're learning and clearly demonstrate how to do tasks. This essential

  13. Office 2010 Bible

    CERN Document Server

    Walkenbach, John; Groh, Michael R

    2010-01-01

    The best of the best from the bestselling authors of Excel, Word, and PowerPoint Bibles !. Take your pick of applications from the Office 2010 suite and your choice of leading experts to show you how to use them. This Office 2010 Bible features the best-of-the-best content from the Excel 2010 Bible , by "Mr. Spreadsheet" John Walkenbach; the Word 2010 Bible by Microsoft MVP Herb Tyson; the PowerPoint 2010 Bible , by PowerPoint expert Faithe Wempen; and coverage of Access 2010 from Microsoft MVP Michael Alexander. If you want to quickly and effectively begin using Office 2010, start i

  14. 77 FR 22191 - Revisions to the Export Administration Regulations (EAR): Export Control Classification Number...

    Science.gov (United States)

    2012-04-13

    ..., Director, Office of National Security and Technology Transfer Controls, by phone at (202) 482-0092 or by... Administrative practice and procedure, Exports, Inventions and patents, Research science and technology. 15 CFR...

  15. Preliminary Study on the Revision of Nuclear Safety Policy Statement

    International Nuclear Information System (INIS)

    Lee, Y. E.; Lee, S. H.; Chang, H. S.; Choi, K. S.; Jung, S. J.

    2011-01-01

    Nuclear safety policy in Korea is currently declared in the Nuclear Safety Charter as the highest tier document and safety principles and directions are announced in the Nuclear Safety Policy Statement. As the circumstances affecting on the nuclear safety policy change, it needs to revise the Statement. This study aims to develop the revised Nuclear Safety Policy Statement to declare that securing safety is a prerequisite to the utilization of nuclear energy, and that all workers in nuclear industry and regulatory body must adhere to the principle of priority to safety. As a result, two different types of revision are being prepared as of August. One is based on the spirit of Nuclear Safety Charter as well as the direction of future-oriented safety policies including the changes in the environment after declaration of the Statement. The other is to declare the fundamental safety objective and safety principles as the top philosophy of national nuclear safety policy by adopting the '10 Safety Principles in IAEA Safety Fundamental' instead of the current Charter. Both versions of revision are subject to further in-depth discussion. However once the revision is finalized and declared, it would be useful to accomplish effectively the organizational responsibilities and to enhance the public confidence in nuclear safety by performing the regulatory activities in a planned and systematic manner and promulgating the government's dedication to priority to safety

  16. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    : Combating Illicit Trafficking in Nuclear and Other Radioactive Material, IAEA Nuclear Security Series No. 6; Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5), IAEA Nuclear Security Series No. 13; Nuclear Security Recommendations on Radioactive Material and Associated Facilities, IAEA Nuclear Security Series No. 14; Nuclear Security Recommendations on Nuclear and Other Radioactive Material out of Regulatory Control, IAEA Nuclear Security Series No. 15. This publication is been based on material presented during meetings and workshops that focused on State requests to establish NSSCs and the International Network for Nuclear Security Training and Support Centres

  17. Waste Management Program management plan. Revision 1

    International Nuclear Information System (INIS)

    1997-02-01

    As the prime contractor to the Department of Energy Idaho Operations Office (DOE-ID), Lockheed Martin Idaho Technologies Company (LMITCO) provides comprehensive waste management services to all contractors at the Idaho National Engineering and Environmental Laboratory (INEEL) through the Waste Management (WM) Program. This Program Management Plan (PMP) provides an overview of the Waste Management Program objectives, organization and management practices, and scope of work. This document will be reviewed at least annually and updated as needed to address revisions to the Waste Management's objectives, organization and management practices, and scope of work. Waste Management Program is managed by LMITCO Waste Operations Directorate. The Waste Management Program manages transuranic, low-level, mixed low-level, hazardous, special-case, and industrial wastes generated at or transported to the INEEL

  18. Waste Management Program management plan. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-01

    As the prime contractor to the Department of Energy Idaho Operations Office (DOE-ID), Lockheed Martin Idaho Technologies Company (LMITCO) provides comprehensive waste management services to all contractors at the Idaho National Engineering and Environmental Laboratory (INEEL) through the Waste Management (WM) Program. This Program Management Plan (PMP) provides an overview of the Waste Management Program objectives, organization and management practices, and scope of work. This document will be reviewed at least annually and updated as needed to address revisions to the Waste Management`s objectives, organization and management practices, and scope of work. Waste Management Program is managed by LMITCO Waste Operations Directorate. The Waste Management Program manages transuranic, low-level, mixed low-level, hazardous, special-case, and industrial wastes generated at or transported to the INEEL.

  19. Office of the Chief Financial Officer Annual Report 2009

    Energy Technology Data Exchange (ETDEWEB)

    Fernandez, Jeffrey

    2009-12-15

    Presented is the 2009 Chief Financial Officer's Annual Report. The data included in this report has been compiled from the Budget Office, the Controller, Procurement and Property Management and the Sponsored Projects Office.

  20. Percutaneous Revision of a Testicular Prosthesis is Safe, Cost-effective, and Provides Good Patient Satisfaction

    Directory of Open Access Journals (Sweden)

    Eugene B. Cone

    2015-09-01

    Full Text Available Office-based percutaneous revision of a testicular prosthesis has never been reported. A patient received a testicular prosthesis but was dissatisfied with the firmness of the implant. In an office setting, the prosthesis was inflated with additional fluid via a percutaneous approach. Evaluated outcomes included patient satisfaction, prosthesis size, recovery time, and cost savings. The patient was satisfied, with no infection, leak, or complication after more than 1 year of follow-up, at significantly less cost than revision surgery. Percutaneous adjustment of testicular prosthesis fill-volume can be safe, inexpensive, and result in good patient satisfaction.