WorldWideScience

Sample records for vessel security officer

  1. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  2. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  3. Report of the DHS Small Vessel Security Institute

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  4. 12 CFR 605.501 - Information Security Officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  5. Report of the DHS National Small Vessel Security Summit

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  6. Nuclear security officer training

    International Nuclear Information System (INIS)

    Harrington, W.F.

    1981-01-01

    Training has become complex and precise in today's world of critical review and responsibility. Entrusted to a security officer is the success or demise of large business. In more critical environments the security officer is entrusted with the monitoring and protection of life sensitive systems and devices. The awareness of this high visibility training requirement has been addressed by a limited few. Those involved in the nuclear power industry through dedication and commitment to the American public have without a doubt become leading pioneers in demanding training excellence

  7. 18 CFR 3a.51 - Designation of security officers.

    Science.gov (United States)

    2010-04-01

    ... Top Secret Control Officer and Security Officer for classified material for the Federal Power Commission. The Director, OAO, will designate alternate Top Secret Control Officers and alternated Security... the duties for which the Top Secret Control Officer and Security Officer is responsible. As used...

  8. 12 CFR 568.2 - Designation of security officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Designation of security officer. 568.2 Section 568.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.2 Designation of security officer. Within 30 days after the effective date of insurance of...

  9. 75 FR 75486 - Maritime Security Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk...

    Science.gov (United States)

    2010-12-03

    ... Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk Waters AGENCY: Coast Guard, DHS... Maritime Transportation Security Act (MTSA) on international voyages through or in designated high risk... MARSEC Directives are available at your local Captain of the Port (COTP) office. Phone numbers and...

  10. 33 CFR 104.215 - Vessel Security Officer (VSO).

    Science.gov (United States)

    2010-07-01

    ...) Understanding of the importance of creating and maintaining safe working and living conditions for passengers... responsibility to preserve the marine environment; and (B) Basic working knowledge of pollution prevention... space numbering; and (B) Understanding of various vessel types; and working knowledge of nautical terms...

  11. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  12. 41 CFR 105-53.133 - Information Security Oversight Office.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Information Security... FUNCTIONS Central Offices § 105-53.133 Information Security Oversight Office. (a) Creation and authority. The Information Security Oversight Office (ISOO), headed by the Director of ISOO, who is appointed by...

  13. 77 FR 61771 - Facility Security Officer Training Requirements

    Science.gov (United States)

    2012-10-11

    ... following: (1) Draft model FSO training course; (2) Computer-based training and distance learning; (3... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... Security Officer training program, with the primary focus on developing the curriculum for such a program...

  14. Offices of Industrial Security International: A Review

    National Research Council Canada - National Science Library

    Sands, W

    1998-01-01

    The Defense Security Service (DSS), formerly the Defense Investigative Service (DIS), handles many of its overseas industrial security issues through its Offices of Industrial Security International...

  15. Infectious disease protection for healthcare security officers.

    Science.gov (United States)

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  16. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Science.gov (United States)

    2012-10-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... comments on the development of a Facility Security Officer training program. The notice contains an inaccurate Internet link to RSVP for the public meeting. DATES: The notice of public meeting; request for...

  17. Progress report for the Office of Safeguards and Security for FY 1982

    International Nuclear Information System (INIS)

    Smith, D.H.; McKown, H.S.; Walker, R.L.; Sherman, R.L.; Pritchard, C.A.; Carter, J.A.

    1982-12-01

    Progress in various areas funded by, or of interest to, the Office of Safeguards and Security during FY 1982 is reported. The quadrupole mass spectrometer and its mobile laboratory visited several sites; results were uniformly excellent. We designed, built, and evaluated a new ion source for this instrument; as a result, performance is considerably enhanced. We have completed initial evaluation of lutetium for use as a double spike in calibrating holding tanks or other vessels of indeterminate volume. Precisions and accuracies of about 0.1% were obtained. Two uranium standards have been evaluated using NBS isotopic standards and SALE samples

  18. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Office of Nuclear Security and Incident Response. 1.46... Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear... evaluation and assessment of technical issues involving security at nuclear facilities, and is the agency...

  19. 42 CFR 401.130 - Materials available at social security district offices and branch offices.

    Science.gov (United States)

    2010-10-01

    ... (HIM-10). (13) Home Health Agency Manual (HIM-11). (14) Outpatient Physical Therapy Provider Manual... social security district offices and branch offices: (1) Claims Manual of the Social Security Administration. (2) Department Staff Manual on Organization, Department of Health and Human Services, Part F, CMS...

  20. Use of Security Officers on Inpatient Psychiatry Units.

    Science.gov (United States)

    Lawrence, Ryan E; Perez-Coste, Maria M; Arkow, Stan D; Appelbaum, Paul S; Dixon, Lisa B

    2018-04-02

    Violent and aggressive behaviors are common among psychiatric inpatients. Hospital security officers are sometimes used to address such behaviors. Research on the role of security in inpatient units is scant. This study examined when security is utilized and what happens when officers arrive. The authors reviewed the security logbook and the medical records for all patients discharged from an inpatient psychiatry unit over a six-month period. Authors recorded when security calls happened, what behaviors triggered security calls, what outcomes occurred, and whether any patient characteristics were associated with security calls. A total of 272 unique patients were included. A total of 49 patients (18%) generated security calls (N=157 calls). Security calls were most common in the first week of hospitalization (N=45 calls), and roughly half of the patients (N=25 patients) had only one call. The most common inciting behavior was "threats to persons" (N=34 calls), and the most common intervention was intramuscular antipsychotic injection (N=49 calls). The patient variables associated with security calls were having more than one prior hospitalization (odds ratio [OR]=4.56, p=.001, 95% confidence interval [CI]=1.80-11.57), involuntary hospitalization (OR=5.09, pSecurity officers were often called for threats of violence and occasionally called for actual violence. Patient variables associated with security calls are common among inpatients, and thus clinicians should stay attuned to patients' moment-to-moment care needs.

  1. Prototype of smart office system using based security system

    Science.gov (United States)

    Prasetyo, T. F.; Zaliluddin, D.; Iqbal, M.

    2018-05-01

    Creating a new technology in the modern era gives a positive impact on business and industry. Internet of Things (IoT) as a new communication technology is very useful in realizing smart systems such as: smart home, smart office, smart parking and smart city. This study presents a prototype of the smart office system which was designed as a security system based on IoT. Smart office system development method used waterfall model. IoT-based smart office system used platform (project builder) cayenne so that. The data can be accessed and controlled through internet network from long distance. Smart office system used arduino mega 2560 microcontroller as a controller component. In this study, Smart office system is able to detect threats of dangerous objects made from metals, earthquakes, fires, intruders or theft and perform security monitoring outside the building by using raspberry pi cameras on autonomous robots in real time to the security guard.

  2. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... (CSO), Vessel Security Officers (VSO), public safety officers, emergency response personnel, and crisis management organization representatives within the port, including 24-hour contact details; (m) Measures to...

  3. Target assignment for security officers to K targets (TASK)

    International Nuclear Information System (INIS)

    Rowland, J.R.; Shelton, K.W.; Stunkel, C.B.

    1983-02-01

    A probabilistic algorithm is developed to provide an optimal Target Assignment for Security officers to K targets (TASK) using a maximin criterion. Under the assumption of only a limited number (N) of security officers, the TASK computer model determines deployment assignments which maximize the system protection against sabotage by an adversary who may select any link in the system, including the weakest, for the point of attack. Applying the TASK model to a hypothetical nuclear facility containing a nine-level building reveals that aggregate targets covering multiple vital areas should be utilized to reduce the number of possible target assignments to a value equal to or only slightly larger than N. The increased probability that a given aggregate target is covered by one or more security officers offsets the slight decrease in interruption probability due to its occurring earlier in the adversary's path. In brief, the TASK model determines the optimal maximin deployment strategy for limited numbers of security officers and calculates a quantitative measure of the resulting system protection

  4. The Office of Safeguards and Security Nonproliferation Support Program

    International Nuclear Information System (INIS)

    Desmond, W.J.

    1996-01-01

    The Nonproliferation Support Program was established in the Department of Energy, Office of Safeguards and Security on october 1, 1995. its mission includes providing assistance to Departmental efforts for improved international material protection, control and accounting programs by coordinating and leveraging domestic safeguards and security policy, practice and experience into the international arena. A major objective of the program is to balance US national security requirements with global support of the nonproliferation objectives. This paper describes the organization of the Office of Safeguards and Security and the Nonproliferation Support Program role and responsibility, and presents some of the current areas of program emphasis and activity

  5. 19 CFR 162.3 - Boarding and search of vessels.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Boarding and search of vessels. 162.3 Section 162.3 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... Boarding and search of vessels. (a) General authority. A Customs officer, for the purpose of examining the...

  6. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  7. 76 FR 27897 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port...

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0342] Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port Columbia River... will enforce the security and safety zone in 33 CFR 165.1318 for large passenger vessels operating in...

  8. Office of Safeguards and Security - Operational Interface

    International Nuclear Information System (INIS)

    Hammond, G.A.

    1987-01-01

    The mission of the Office of Safeguards and Security (OSS), Department of Energy (DOE) is to: Develop policy and programs to protect DOE facilities, nuclear materials, and classified information; Provide oversight for safeguards and security operations; Direct research and development (RandD) to support the protection program; and Strengthen international safeguards in support of nonproliferation policy. Objectives are to maintain an integrated safeguards and security system that is effective against a wide range of threats, and do so in a manner to minimize impacts on facility operation. Implementation is the responsibility of field offices and contractors operating DOE facilities. The OSS-operational interface is the focus of this discussion with emphasis on RandD to meet user needs. The scope and project selection process will be discussed along with information required for evaluation, and field operational planning and budgeting commitments to permit implementation of successful RandD results

  9. Tentative job analysis for a high-level, fixed-site, nuclear security officer

    International Nuclear Information System (INIS)

    Adams, K.G.; Trujillo, A.A.

    1977-10-01

    A tentative job analysis for a high-level, fixed-site, nuclear security officer is presented. The primary objective of the report is to provide a framework for evaluating the functions of a security officer in physical protection systems. Several job requirements related to duties, basic skills, personal contacts, supervision, working conditions, and decision making are presented. Individual character traits desirable in security officers are described

  10. 77 FR 2019 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-01-13

    ...-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI... vessel SAFARI EXPLORER to its intended berth in the harbor. Entry into the temporary security zone is... operation of the SAFARI EXPLORER into Molokai has been voluntarily suspended by the operating company...

  11. 77 FR 50926 - Security Zones; Certain Dangerous Cargo Vessels, Tampa, FL

    Science.gov (United States)

    2012-08-23

    ... (LPG), and ammonium nitrate. The security zones will start at buoys 3 and 4 in Tampa Bay ``F'' cut... propane gas, and ammonium nitrate. The security zones prohibit any vessel from entering within 500 yards.... We seek any comments or information that may lead to the discovery of a significant environmental...

  12. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Science.gov (United States)

    2011-10-07

    ... Office of Disaster Management and National Security AGENCY: Office of the Secretary, HUD. ACTION: Notice... Succession for the Office of Disaster Management and National Security. This is the first order of succession... L. McClure, Acting Chief Disaster and National Security Officer, Office of Disaster Management and...

  13. Analisa Greenwater Akibat Gerakan Offshore Security Vessel

    Directory of Open Access Journals (Sweden)

    Maulidya Octaviani Bustamin

    2012-09-01

    Full Text Available Analisa  Tugas  Akhir  ini,  terdiri  atas  beberapa  tahapan.  Yang pertama yaitu perancangan struktur Offshore Security Vessel (OSV dengan bantuan software MAXSURF guna mendapatkan Lines Plan. Offset data yang diperoleh digunakan dalam pemodelan menggunakan MOSES,  kemudian  dilakukan  analisa  gerak  OSV  dalam  gelombang  regular  dan dinyatakan dalam grafik RAO. Analisa gerak relatif vertikal  haluan dihitung dari RAO gerakan, dan kemudian melakukan evaluasi perilaku di gelombang acak dengan analisis spektra gelombang. Dari analisa spektra didapatkan parameter greenwater sehingga dapat dihitung peluang, intensitas dan tekanan greenwater. Dari hasil analisa diperoleh RAO gerak vertikal Offshore Security Vessel (OSV pada  gelombang  reguler yang dipengaruhi  oleh  kecepatan,  kondisi  muatan  dan arah gelombang. Peluang terjadinya greenwater terbesar terjadi pada sudut datang gelombang following sea (0o dimana harga terbesar terjadi pada ω = 0.2 rad/sec dengan periode 29 detik mencapai 0.477. Intensitas greenwater terbesar terjadi pada saat sudut datang gelombang following sea (0o adalah sebanyak 59.265 per jam dan 0.378 per detik. Tekanan greenwater terbesar terjadi pada saat sudut datang gelombang head sea (180o sebesar 1678x10-6 MPa. Dengan nilai tersebut, deck mampu menahan beban akibat tekanan greenwater.

  14. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  15. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  16. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Science.gov (United States)

    2010-11-05

    ... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...

  17. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-09-01

    Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.

  18. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge...) Methods of physical screening of persons, personal effects, baggage, cargo, and vessel stores; and (m) The...

  19. 77 FR 24381 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-04-24

    ...-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI... channel's entrance during the arrival and departure of the Passenger Vessel Safari Explorer in Kaunakakai... entrance during the arrival and departure of the Passenger Vessel Safari Explorer in Kaunakakai Harbor...

  20. Report of the DHS Small Vessel Security Institute

    Science.gov (United States)

    2007-10-19

    Local Government Interests: LtCol Don Holway; Florida Fish and Wildlife Conservation Commission Maj John Fetterman , Maine Department of Marine...AWW program to help fill gaps in law enforcement patrols. 68 National Small Vessel Security Summit Major John C. Fetterman – State of Maine...Major Fetterman currently serves as Vice President of the National Association of State Boating Law Administrators and for the last 30 years has been a

  1. The chief information security officer insights, tools and survival skills

    CERN Document Server

    Kouns, Barry

    2011-01-01

    Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills.

  2. 33 CFR 165.1151 - Security Zones; liquefied hazardous gas tank vessels, San Pedro Bay, California.

    Science.gov (United States)

    2010-07-01

    ... a tank vessel as liquefied petroleum gas, liquefied natural gas, or similar liquefied gas products... Eleventh Coast Guard District § 165.1151 Security Zones; liquefied hazardous gas tank vessels, San Pedro... the sea floor, within a 500 yard radius around any liquefied hazardous gas (LHG) tank vessel that is...

  3. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Science.gov (United States)

    2010-07-01

    ... Information Security Oversight Office. 2400.19 Section 2400.19 National Defense Other Regulations Relating to... SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19 Declassification by the Director of the Information Security Oversight Office. If the Director of the Information...

  4. 12 CFR 563g.17 - Sales of securities at an office of a savings association.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Sales of securities at an office of a savings association. 563g.17 Section 563g.17 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.17 Sales of securities at an office of a savings association. Sales of...

  5. Report of the DHS National Small Vessel Security Summit

    Science.gov (United States)

    2007-10-19

    Fetterman , Maine Department of Marine Resources Lt Bill Krul, Marine Patrol, St. Clair County, Michigan Sgt Jim Lambert, Marine Patrol, Alameda...Major John C. Fetterman – State of Maine Major Fetterman currently serves as Vice President of the National Association of State Boating Law...or seemingly out of place vessel enters a maritime community, it will attract the attention of his officers. Major Fetterman was concerned that

  6. 33 CFR 165.121 - Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode Island.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: High... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.121 Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode...

  7. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  8. 12 CFR 551.150 - How do my officers and employees file reports of personal securities trading transactions?

    Science.gov (United States)

    2010-01-01

    ... of personal securities trading transactions? 551.150 Section 551.150 Banks and Banking OFFICE OF... TRANSACTIONS Securities Trading Policies and Procedures § 551.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 551.140(d) must...

  9. 76 FR 63547 - Security Zone; Columbia and Willamette Rivers, Dredge Vessels Patriot and Liberty

    Science.gov (United States)

    2011-10-13

    ... or his designated representative. The security zone will be in effect while the Dredge Vessels are... its effects on them and participate in the rulemaking process. Small businesses may send comments on... requirements. (c) Enforcement period. The security zone created by this section will be in effect from 7 a.m...

  10. 33 CFR 165.103 - Safety and Security Zones; LPG Vessel Transits in Portland, Maine, Captain of the Port Zone...

    Science.gov (United States)

    2010-07-01

    ... within a 500-yard radius of any Liquefied Petroleum Gas (LPG) vessel while it is moored at the LPG... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; LPG... and Security Zones; LPG Vessel Transits in Portland, Maine, Captain of the Port Zone, Portsmouth...

  11. 75 FR 45055 - Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2010-08-02

    ...-AA87 Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... (NCSM 710) which include all waters within 100 yards from the vessels while underway in the Puget Sound... authorized by the COTP, Puget Sound or Designated Representative. DATES: This rule is effective from 8 a.m...

  12. 76 FR 40617 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington

    Science.gov (United States)

    2011-07-11

    ... better evaluate its effects on them and participate in the rulemaking process. Small businesses may send... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0505] RIN 1625-AA87 Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington AGENCY...

  13. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... Security, Washington, DC 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- [[Page...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  14. ‘Persons of versatility’: private security officers and private policing in residential estates in Hong Kong

    OpenAIRE

    Kwong, Wilkie

    2013-01-01

    This study is the result of exploratory research on the daily lives and experiences of private security officers working in Hong Kong housing estates. As the first qualitative investigation of its kind, it examined two case studies of separate estates through the lens of Nodal Governance, which involved interviews with security practitioners and end-users, work practice observations, and documentary analysis. Security officers were found to ‘wear many hats’. Apart from crime prevention, the ...

  15. 33 CFR 165.1317 - Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters, Washington. 165.1317 Section 165.1317 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS...

  16. 33 CFR 165.1318 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of the Port Zone 165.1318 Section 165.1318 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND...

  17. 24 CFR 960.505 - Occupancy by police officers to provide security for public housing residents.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Occupancy by police officers to... HOUSING Occupancy by Over-Income Families or Police Officers § 960.505 Occupancy by police officers to provide security for public housing residents. (a) Police officer. For purpose of this subpart E, “police...

  18. 76 FR 21768 - Privacy Act of 1974; Department of Homeland Security/Office of Health Affairs-001 Contractor...

    Science.gov (United States)

    2011-04-18

    ... Homeland Security, Washington, DC 20520. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0013] Privacy Act of... Immunization Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  19. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0055] Privacy Act of... Operations Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  20. 77 FR 44475 - Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2012-07-30

    ...-AA87 Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... temporary rule, call or email Lieutenant Junior Grade Anthony P. LaBoy, Sector Puget Sound, Waterways Management Division, U.S. Coast Guard; telephone 206-217-6323, email SectorPugetSound[email protected] . If you...

  1. 33 CFR 90.3 - Pushing vessel and vessel being pushed: Composite unit.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Pushing vessel and vessel being... HOMELAND SECURITY INLAND NAVIGATION RULES INLAND RULES: INTERPRETATIVE RULES § 90.3 Pushing vessel and vessel being pushed: Composite unit. Rule 24(b) of the Inland Rules states that when a pushing vessel and...

  2. 33 CFR 82.3 - Pushing vessel and vessel being pushed: Composite unit.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Pushing vessel and vessel being... HOMELAND SECURITY INTERNATIONAL NAVIGATION RULES 72 COLREGS: INTERPRETATIVE RULES § 82.3 Pushing vessel and vessel being pushed: Composite unit. Rule 24(b) of the 72 COLREGS states that when a pushing vessel and a...

  3. Accessibility and security of digital records in the Office of the ...

    African Journals Online (AJOL)

    Accessibility and security of digital records in the Office of the Premier in ... preservation and accessibility of digital records for effective e-governance. ... Questionnaires, interviews, observations and document analysis were used to collect data. ... be knowledgeable in the use of the technologies that generate digital records.

  4. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  5. Overlapping values, mutual prejudices. Empirical research into the ethos of police officers and private security guards

    NARCIS (Netherlands)

    van Steden, R.; van der Wal, Z.; Lasthuizen, K.M.

    2015-01-01

    What determines professional motivations and values of security operatives: sector or profession? Our article aims to answer this question through a survey study among police officers (n = 405) and private security guards (n = 329) in the Netherlands. Our results show that both groups closely

  6. U.S. statutes of general interest to safeguards and security officers

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1988-01-01

    A handbook of enforcement provisions of Federal law and regulations was prepared for use by U.S. DOE Security Inspectors. This handbook provides security inspectors for the U.S. Department of Energy, security officers at Nuclear Regulatory Licensee facilities, and others with a single document containing most of the Federal law provisions available to assist them in enforcing agency regulations. The handbook contains selected enforcement provisions of Titles 18, 42 and 50 of the United States Code (USC). Topical coverage of Title 18 includes Espionage and Misrepresentation or Impersonation; Theft and Embezzlement; Malicious Mischief; Conspiracy; Search and Seizure. A miscellaneous section deals with explosives, blackmail, firearms, and other subjects. Certain enforcement sections of Title 42 of the USC (The Atomic Energy Act) and of the Internal Security Act of the United States Code (Title 50) are also provided. Finally, relevant parts of the Federal Property Management Regulations of Title 50, Chapter 101 of the Code of Federal Regulations are presented. A comprehensive index is provided based on key words

  7. 15 CFR 758.7 - Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs...

    Science.gov (United States)

    2010-01-01

    ... forfeiture. In addition to the authority of Customs officers to seize and detain items, both Customs... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs offices and Postmasters in clearing shipments 758.7...

  8. 76 FR 67472 - Order of Succession for the Office of the Chief Information Officer

    Science.gov (United States)

    2011-11-01

    ...: Juanita Galbreath, Deputy Chief Information Officer for Cyber Security and Privacy, Office of the Chief...) Deputy Chief Information Officer, for IT Operations; (3) Deputy Chief Information Officer, for Cyber Security and Privacy; (4) Deputy Chief Information Officer, for Business and IT Modernization. These...

  9. A fear of coercion and accountability? Security officers and the non-use of force

    NARCIS (Netherlands)

    Eski, Y.

    2017-01-01

    Based on fieldwork among operational security officers working in the Hamburg and Rotterdam ports, it became clear these frontline port policing professionals possess a critical, even fearful attitude towards coercion while performing their duties in the ports. The power of arrest and the

  10. 37 CFR 212.5 - Recordation of distinctive identification of vessel hull designer.

    Science.gov (United States)

    2010-07-01

    ... identification of vessel hull designer. 212.5 Section 212.5 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT OFFICE AND PROCEDURES PROTECTION OF VESSEL HULL DESIGNS § 212.5 Recordation of distinctive identification of vessel hull designer. (a) General. Any owner of a vessel hull may...

  11. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.240 Maritime Security (MARSEC) Level coordination and implementation. (a) The vessel owner or...

  12. Vacuum vessel for thermonuclear device

    International Nuclear Information System (INIS)

    Kikuchi, Mitsuru; Nagashima, Keisuke; Suzuki, Masaru; Onozuka, Masaki.

    1997-01-01

    A vacuum vessel main body and structural members at the inside and the outside of the vacuum vessel main body are constituted by structural materials activated by irradiation of neutrons from plasmas such as stainless steels. Shielding members comprising tungsten or molybdenum are disposed on the surface of the vacuum vessel main body and the structural members of the inside and the outside of the main body. The shielding members have a function also as first walls or a seat member for the first walls. Armor tiles may be disposed to the shielding members. The shielding members and the armor tiles are secured to a securing seat member disposed, for example, to an inner plate of the vacuum vessel main body by bolts. Since the shielding members are disposed, it is not necessary to constitute the vacuum vessel main body and the structural members at the inside and the outside thereof by using a low activation material which is less activated, such as a titanium alloy. (I.N.)

  13. Vacuum vessel for thermonuclear device

    Energy Technology Data Exchange (ETDEWEB)

    Kikuchi, Mitsuru; Nagashima, Keisuke [Japan Atomic Energy Research Inst., Tokyo (Japan); Suzuki, Masaru; Onozuka, Masaki

    1997-07-11

    A vacuum vessel main body and structural members at the inside and the outside of the vacuum vessel main body are constituted by structural materials activated by irradiation of neutrons from plasmas such as stainless steels. Shielding members comprising tungsten or molybdenum are disposed on the surface of the vacuum vessel main body and the structural members of the inside and the outside of the main body. The shielding members have a function also as first walls or a seat member for the first walls. Armor tiles may be disposed to the shielding members. The shielding members and the armor tiles are secured to a securing seat member disposed, for example, to an inner plate of the vacuum vessel main body by bolts. Since the shielding members are disposed, it is not necessary to constitute the vacuum vessel main body and the structural members at the inside and the outside thereof by using a low activation material which is less activated, such as a titanium alloy. (I.N.)

  14. The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent

    Science.gov (United States)

    2015-09-01

    and M. Epstein, “ Millennials and the World of Work: An Organizational and Management Perspective,” Journal of Business and Psychology, Vol. 25, 2010...Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent FOR THIS AND OTHER PUBLICATIONS, VISIT US AT http://www.carlisle.army.mil...SUBTITLE The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  15. 76 FR 2402 - Maritime Security Directive 104-6 (Rev 5); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2011-01-13

    ... Directive 104-6 (Rev 5); Guidelines for U.S. Vessels Operating in High Risk Waters AGENCY: Coast Guard, DHS... designated high risk waters, and provides additional counter-piracy guidance and mandatory measures for these... MARSEC Directives are available at your local Captain of the Port (COTP) office. Phone numbers and...

  16. A locking mechanism for securing a loading buoy to a vessel. Lsemekanisme for fastgjring av en lastebye til et farty

    Energy Technology Data Exchange (ETDEWEB)

    Breivik, K.; Smedal, A.

    1994-07-04

    The invention relates to a locking mechanism for securing a loading/unloading buoy on a vessel. The buoy is of the type to be introduced into a submerged downwardly open receiving space in the vessel, and to be fastened in a releasable manner in the receiving space. The mechanism comprises hydraulically actuated locking elements, mounted about horizontal axes at the sides of the receiving space, to pivot between the locking and releasing positions, the buoy having a peripheral collar having a downwards facing abutment edge for engagement with the locking elements in the locking position thereof. 6 figs.

  17. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  18. Annual Waste Minimization Summary Report for the National Nuclear Security Administration Nevada Site Office

    International Nuclear Information System (INIS)

    Alfred J. Karns

    2007-01-01

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U. S. Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during CY06. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit ((number s ign)NEV HW0021) and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the DOE, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume and toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO

  19. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Bjornstad, D.J.; Curlee, T.R. (Oak Ridge National Lab., TN (United States)); Bohi, D.R. (Resources for the Future, Inc., Washington, DC (United States))

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab.

  20. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    International Nuclear Information System (INIS)

    Bjornstad, D.J.; Curlee, T.R.; Bohi, D.R.

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab

  1. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  2. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  3. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  4. Contemporary, emerging, and ratified wireless security standards: an update for the networked dental office.

    Science.gov (United States)

    Mupparapu, Muralidhar

    2006-02-15

    Wireless networking is not new to contemporary dental offices around the country. Wireless routers and network cards have made access to patient records within the office handy and, thereby, saving valuable chair side time and increasing productivity. As is the case with any rapidly developing technology, wireless technology also changes with the same rate. Unless, the users of the wireless networking understand the implications of these changes and keep themselves updated periodically, the office network will become obsolete very quickly. This update of the emerging security protocols and pertaining to ratified wireless 802.11 standards will be timely for the contemporary dentist whose office is wirelessly networked. This article brings the practicing dentist up-to-date on the newer versions and standards in wireless networking that are changing at a fast pace. The introduction of newer 802.11 standards like super G, Super AG, Multiple Input Multiple Output (MIMO), and pre-n are changing the pace of adaptation of this technology. Like any other rapidly transforming technology, information pertaining to wireless networking should be a priority for the contemporary dentist, an eventual end-user in order to be a well-informed and techno-savvy consumer.

  5. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... baggage; and (vi) Vessel stores; (2) Threat assessments, including the purpose and methodology of the assessment, for the area or areas in which the vessel operates or at which passengers embark or disembark; (3... and control procedures; (ii) Identification systems; (iii) Surveillance and monitoring equipment; (iv...

  6. USCG Vessel

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  7. 76 FR 68772 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-11-07

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone (202) 475-3652, or fax... vessel to provide information that details the vessel operator's ballast water management efforts. Need...

  8. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  9. 32 CFR 700.826 - Physical security.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Physical security. 700.826 Section 700.826... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate... officer shall take action to protect and maintain the security of the command against dangers from fire...

  10. 33 CFR 157.450 - Maneuvering and vessel status information.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) POLLUTION RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Interim Measures for Certain Tank Vessels Without Double Hulls Carrying Petroleum Oils...

  11. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  12. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  13. 17 CFR 200.26a - Office of Information Technology.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible...

  14. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  15. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  16. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  17. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  18. Apparatus for carrying out ultrasonic inspection of pressure vessels

    International Nuclear Information System (INIS)

    Dent, K.H.; Greenhalgh, F.G.

    1975-01-01

    An apparatus is described for moving an ultrasonic scanning mechanism over the interior surface of a pressure vessel and comprising a mast for supporting the scanning mechanism inside the vessel and a carriage for traversing the mast within the vessel, the mast being pivotably secured to the carriage so that when the ultrasonic scanning mechanism contacts the interior surface of the pressure vessel the mast is caused to pivot. (auth)

  19. 46 CFR 122.340 - Vessels carrying vehicles.

    Science.gov (United States)

    2010-10-01

    ... vehicles freely in the event of fire or other disaster. The decks, where necessary, must be distinctly... their emergency brakes set when the vessel is underway, and that the motors are not started until the... loading ramp must have its wheels securely blocked, while the vessel is being navigated. (c) The master...

  20. 46 CFR 15.915 - Engineer Officer Endorsements.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Engineer Officer Endorsements. 15.915 Section 15.915... REQUIREMENTS Equivalents § 15.915 Engineer Officer Endorsements. The following licenses and MMC officer... designated duty engineer license or endorsement authorizes service as chief or assistant engineer on vessels...

  1. USCG Vessel Events

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  2. USCG Vessel Pollution

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  3. VESSEL-SOURCED POLLUTION: A SECURITY THREAT IN ...

    African Journals Online (AJOL)

    and some other conventions make provisions concerning protection of ma- ... the pollution of the marine in Malaysia, it appears that pollution by vessels .... pollution from ships and maritime safety; providing effective legal, technical and scientific ..... of the offence after the service of the notice on the offending ship through.

  4. 33 CFR 157.420 - Vessel specific watch policy and procedures.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) POLLUTION RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Interim Measures for Certain Tank Vessels Without Double Hulls Carrying Petroleum Oils...

  5. 46 CFR 185.340 - Vessels carrying vehicles.

    Science.gov (United States)

    2010-10-01

    ... and away from the vehicles freely in the event of fire or other disaster. The decks, where necessary... motors turned off and their emergency brakes set when the vessel is underway, and that the motors are not... vehicles or next to a loading ramp must have its wheels securely blocked, while the vessel is being...

  6. Near field communication (NFC) model for arduino uno based security systems office system

    Science.gov (United States)

    Chairunnas, A.; Abdurrasyid, I.

    2018-03-01

    Currently, many offices or companies that start growing rapidly in a company or office should have a very limited room to enter only people entitled to enter the room and use the facilities contained in it, for example, Files in it must have many files and documents very important because to reduce the abuse of files and irresponsible person. Because it will be made room door security system by using Near Field Communication on android smartphone. Software used is Arduino IDE. The tools used in this system are Arduino Uno R3, NFC shield, pear sensor, bell, led, servo, 16 × 2 LCD, and Near Field Communication (NFC) in android smartphone. This system runs based on 2 inputs of a new technology that is Near Field Communication (NFC) in android smartphone. And also use pear sensor to detect unauthorized person entering the room. If the correct password is entered then the door will open and the pear sensor will light off if wrong then the bell will light up.

  7. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  8. Security Clearances and the Protection of National Security Information: Law and Procedures

    National Research Council Canada - National Science Library

    Cohen, Sheldon

    2000-01-01

    ... designed to protect National Security information. The report provides an authoritative compendium for lawyers, security officers and for managers of corporations who must deal with the legal and procedural aspects of security clearances...

  9. Vacuum vessel for a nuclear fusion device

    International Nuclear Information System (INIS)

    Watanabe, Takashi; Sato, Hiroshi; Owada, Koro.

    1976-01-01

    Object: To provide a reinforcing member on a bellows portion to reduce a stress at the bellows portion thereby increasing the strength of a vessel. Structure: A vacuum vessel for a nuclear fusion device has a bellows portion and a wall thick portion. A support extended toward the bellows portion is secured inside of a toroidal section in order to reduce the stress at the bellows portion. An insulator is interposed between the support and the bellows portion and is retained on the support by a bolt. Since the stress may be reduced by the support, the wall thick of the bellows portion may be decreased to sufficiently secure the low electric resistance value. (Yoshihara, H.)

  10. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  11. 33 CFR 104.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 104.145 Section 104.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.145 Maritime Security (MARSEC...

  12. 76 FR 54197 - Membership of the Office of the Secretary Performance Review Board

    Science.gov (United States)

    2011-08-31

    ..., Director, Office of Executive Resources, Office of Human Resources Management, Office of the Director, 14th..., Office of Information Technology, Security, Infrastructure, and Technology. Ellen Herbst, Senior Advisor..., Director, Office of Civil Rights. Alfred J. Broadbent, Director, Office of Security. Economic Development...

  13. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  14. U.S. Department of Energy Office of Health, Safety and Security Illness and Injury Surveillance Program Worker Health at a Glance, 2000-2009

    Energy Technology Data Exchange (ETDEWEB)

    Strader, Cliff [US Dept. of Energy, Washington, DC (United States); Richter, Bonnie [US Dept. of Energy, Washington, DC (United States)

    2013-01-23

    The Worker Health at a Glance, 2000 – 2009 provides an overview of selected illness and injury patterns among the current DOE contractor workforce that have emerged over the 10-years covered by this report. This report is a roll-up of data from 16 individual DOE sites, assigned to one of three program offices (Office of Environmental Management, Office of Science and the National Nuclear Security Administration). In this report, an absences is defined as 40 or more consecutive work hours (5+ calendar days) off the job. Shorter absences were not included.

  15. 75 FR 56015 - Vessel Inspection Alternatives

    Science.gov (United States)

    2010-09-15

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 46 CFR Part 8 Vessel Inspection Alternatives CFR... Certificate; (ii) International Tonnage Certificate; (iii) Cargo Ship Safety Construction Certificate; (iv) Cargo Ship Safety Equipment Certificate; and (v) International Oil Pollution Prevention Certificate; and...

  16. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  17. 75 FR 9415 - Notice of Hearing Schedule; Passenger Vessel Financial Responsibility

    Science.gov (United States)

    2010-03-02

    ... Inc...... Charles A. Robertson, 15 Chairman & Chief Executive Officer. Carnival Corporation & PLC..... David Bernstein, Senior 15 Vice President & Chief Financial Officer. Crystal Cruises, Inc Ann G. Miller... FEDERAL MARITIME COMMISSION Notice of Hearing Schedule; Passenger Vessel Financial Responsibility...

  18. 75 FR 8489 - Security Zone; Freeport Channel Entrance, Freeport, TX

    Science.gov (United States)

    2010-02-25

    ... environmental risk to health or risk to safety that may disproportionately affect children. Indian Tribal... Captain of the Port, Houston-Galveston deems enhanced security measures necessary on a case-by-case basis... vessels. The moving security zone may commence at any point after certain vessels bound for the Port of...

  19. 28 CFR 700.24 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...

  20. Physician office readiness for managing Internet security threats.

    Science.gov (United States)

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  1. Metallurgy of steels for PWR pressure vessels

    International Nuclear Information System (INIS)

    Kepka, M.; Mocek, J.; Barackova, L.

    1980-01-01

    A survey and the chemical compositions are presented of reactor pressure vessel steels. The metallurgy is described of steel making for pressure vessels in Japan and the USSR. Both acidic and alkaline open-hearth steel is used for the manufacture of ingots. The leading world manufacturers of forging ingots for pressure vessels, however, exclusively use electric steel. Vacuum casting techniques are exclusively used. Experience is shown gained with the introduction of the manufacture of forging ingots for pressure vessels at SKODA, Plzen. The metallurgical procedure was tested utilizing alkaline open hearths, electric arc furnaces and facilities for vacuum casting of steel. Pure charge raw materials should be used for securing high steel purity. Prior to forging pressure vessel rings, not only should sufficiently big bottoms and heads be removed but also the ingot middle part should be scrapped showing higher contents of impurities and nonhomogeneous structure. (B.S.)

  2. Metallurgy of steels for PWR pressure vessels

    Energy Technology Data Exchange (ETDEWEB)

    Kepka, M; Mocek, J; Barackova, L [Skoda, Plzen (Czechoslovakia)

    1980-09-01

    A survey and the chemical compositions are presented of reactor pressure vessel steels. The metallurgy is described of steel making for pressure vessels in Japan and the USSR. Both acidic and alkaline open-hearth steel is used for the manufacture of ingots. The leading world manufacturers of forging ingots for pressure vessels, however, exclusively use electric steel. Vacuum casting techniques are exclusively used. Experience is shown gained with the introduction of the manufacture of forging ingots for pressure vessels at SKODA, Plzen. The metallurgical procedure was tested utilizing alkaline open hearths, electric arc furnaces and facilities for vacuum casting of steel. Pure charge raw materials should be used for securing high steel purity. Prior to forging pressure vessel rings, not only should sufficiently big bottoms and heads be removed but also the ingot middle part should be scrapped showing higher contents of impurities and nonhomogeneous structure.

  3. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  4. 17 CFR 140.1 - Headquarters office.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Headquarters office. 140.1..., FUNCTIONS, AND PROCEDURES OF THE COMMISSION Organization § 140.1 Headquarters office. (a) General. The headquarters office of the Commission is located at Three Lafayette Centre, 1155 21st Street, NW., Washington...

  5. Private Security Companies (PSCs) as a Piracy Countermeasure

    DEFF Research Database (Denmark)

    Struwe, Lars Bangert

    2012-01-01

    Private Security Companies (PSC) are a part of the Best Management Practice in the shipping industry. The ship owners are using PSCs to protect their vessels against pirates, but protection of the vessels is just a part of the services that PSCs can provide. The services can be divided in four main...... groups: (1) security intelligence, risk assessment and consulting; (2) security services; (3) crisis response; and (4) intervention. While the use of PSCs may offer some deterrent value, the potential costs of hiring these firms would appear to outweigh the benefits. The argument in this article...

  6. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  7. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  8. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  9. Evolution of nuclear security regulatory activities in Brazil

    International Nuclear Information System (INIS)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B.

    2009-01-01

    The changing of the world scenario in the last 15 years has increased worldwide the concerns about overall security and, as a consequence, about the nuclear and radioactive material as well as their associated facilities. Considering the new situation, in February 2004, the Brazilian National Nuclear Energy Commission (CNEN), decided to create the Nuclear Security Office. This Office is under the Coordination of Nuclear Safeguards and Security, in the Directorate for Safety, Security and Safeguards (Regulatory Directorate). Before that, security regulation issues were dealt in a decentralized manner, within that Directorate, by different licensing groups in specific areas (power reactors, fuel cycle facilities, radioactive facilities, transport of nuclear material, etc.). This decision was made in order to allow a coordinated approach on the subject, to strengthen the regulation in nuclear/radioactive security, and to provide support to management in the definition of institutional security policies. The CNEN Security Office develops its work based in the CNEN Physical Protection Regulation for Nuclear Operational Units - NE-2.01, 1996, the Convention on the Physical Protection of Nuclear Material and the IAEA Nuclear Security Series . This paper aims at presenting the activities developed and the achievements obtained by this new CNEN office, as well as identifying the issues and directions for future efforts. (author)

  10. 77 FR 9214 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-02-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... meeting of the National Security Education Board. The purpose of the meeting is to review and make... p.m. ADDRESSES: Defense Language and National Security Education Office, 1101 Wilson Boulevard...

  11. Littoral Combat Vessels: Analysis and Comparison of Designs

    National Research Council Canada - National Science Library

    Christiansen, Bryan J

    2008-01-01

    .... The candidates are a Littoral Combat Ship with a surface warfare module, a National Security Cutter augmented with offensive and defensive weaponry, a "Sea Lance" inshore combat vessel, and a Combat...

  12. Passport officers' errors in face matching.

    Science.gov (United States)

    White, David; Kemp, Richard I; Jenkins, Rob; Matheson, Michael; Burton, A Mike

    2014-01-01

    Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of 'fraudulent' photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately--though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection.

  13. Passport officers' errors in face matching.

    Directory of Open Access Journals (Sweden)

    David White

    Full Text Available Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of 'fraudulent' photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately--though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection.

  14. 46 CFR 180.204 - Survival craft-vessels operating on coastwise routes.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Survival craft-vessels operating on coastwise routes. 180.204 Section 180.204 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL... Craft § 180.204 Survival craft—vessels operating on coastwise routes. (a) Except as allowed by paragraph...

  15. 33 CFR 106.205 - Company Security Officer (CSO).

    Science.gov (United States)

    2010-07-01

    ... TWIC. (b) Qualifications. The CSO must have general knowledge, through training or equivalent job...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security training and education, including security measures and procedures. (c) In addition to the knowledge and...

  16. Office of Personnel Management Catch 62 Match

    Data.gov (United States)

    Social Security Administration — SSA provides the Office of Personnel Management (OPM) with tax returns, Social Security benefits, and military retirement information for the purpose of correctly...

  17. Armed guards on vessels : insurance and liability

    Directory of Open Access Journals (Sweden)

    Mišo Mudrić

    2011-12-01

    Full Text Available The Paper examines the insurance and liability issues resulting from the use of armed guards on board vessels. The study begins with an overview of the available data on key economic fi gures representing the projected overall annual costs of modern piracy. The focus is then shifted to the issue of public versus private security, where possible dangers of private-based security options are discussed in general. After explaining why the Somalia region deserves a closer attention when compared to other pirate-infested waters, a brief summary of the international effort to combat piracy threat is presented, followed by a structured overview of the use of private maritime security options in the maritime sector in general. One security option is the use of armed guards on board vessels. This option is explored both from the political (the acceptance by stakeholders and legal standpoint (legal issues arising from the use of armed guards. An important remedy for the shipping companies/ operators threatened by the piracy hazard is the existence of affordable and effective (specialized marine insurance. A study of available piracy insurance policies is presented, followed by an analysis of case law and other legal issues arising from piracy attacks, which could prove important when considering the legal implications of armed guards employment. Finally, a simplifi ed economic analysis of available security options is presented, followed by the final assessment of benefi ts derived from the use of armed guards.

  18. 76 FR 57749 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-09-16

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... FOR FURTHER INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone... reception facility standards. Advance notice information from vessels ensures effective management of...

  19. Wireless networking for the dental office: current wireless standards and security protocols.

    Science.gov (United States)

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  20. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    Science.gov (United States)

    2012-01-01

    tenfold to account for uninsured and other costs unaccounted for, the result would be in the low billions of dollars rather than tens of billions...Aviation Security GAO—See U.S. Government Accountability Office or, prior to 2004, U.S. General Accounting Office. Ghylin, K. M., C. G . Drury , and A...outweigh their costs . This document seeks to contribute to the national debate on avia- tion security by examining a set of issues that are either

  1. 6 CFR 27.215 - Security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215 Section 27.215 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...

  2. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  3. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  4. Efficient Vessel Tracking  with Accuracy Guarantees

    DEFF Research Database (Denmark)

    Redoutey, Martin; Scotti, Eric; Jensen, Christian Søndergaard

    2008-01-01

    Safety and security are top concerns in maritime navigation, particularly as maritime traffic continues to grow and as crew sizes are reduced. The Automatic Identification System (AIS) plays a key role in regard to these concerns. This system, whose objective is in part to identify and locate ves...... accuracies at lower communication costs. The techniques employ movement predictions that are shared between vessels and the VTS. Empirical studies with a prototype implementation and real vessel data demonstrate that the techniques are capable of significantly improving the AIS....

  5. 46 CFR 178.340 - Stability standards for pontoon vessels on protected waters.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Stability standards for pontoon vessels on protected waters. 178.340 Section 178.340 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL....340 Stability standards for pontoon vessels on protected waters. (a) The portion of the deck...

  6. On the Adequacy of API 521 Relief-Valve Sizing Method for Gas-Filled Pressure Vessels Exposed to Fire

    DEFF Research Database (Denmark)

    Andreasen, Anders; Nieto, Marcos Zan; Borroni, Filippo

    2018-01-01

    sense of security. Often the vessel wall will be weakened by high temperatures, before the PRV relieving pressure is reached. In this article, a multiparameter study has been performed taking into consideration various vessel sizes, design pressures (implicitly vessel wall thickness), vessel operating...

  7. Field Office Contact Information for Application Developers

    Data.gov (United States)

    Social Security Administration — SSA provides a web service and downloadable file for SSA Field Office locations, telephone numbers, and hours of operation. (Note: If you think an office might be...

  8. Reactor vessel head permanent shield

    International Nuclear Information System (INIS)

    Hankinson, M.F.; Leduc, R.J.; Richard, J.W.; Malandra, L.J.

    1989-01-01

    A nuclear reactor is described comprising: a nuclear reactor pressure vessel closure head; control rod drive mechanisms (CRDMs) disposed within the closure head so as to project vertically above the closure head; cooling air baffle means surrounding the control rod drive mechanisms for defining cooling air paths relative to the control rod drive mechanisms; means defined within the periphery of the closure head for accommodating fastening means for securing the closure head to its associated pressure vessel; lifting lugs fixedly secured to the closure head for facilitating lifting and lowering movements of the closure head relative to the pressure vessel; lift rods respectively operatively associated with the plurality of lifting lugs for transmitting load forces, developed during the lifting and lowering movements of the closure head, to the lifting lugs; upstanding radiation shield means interposed between the cooling air baffle means and the periphery of the enclosure head of shielding maintenance personnel operatively working upon the closure head fastening means from the effects of radiation which may emanate from the control rod drive mechanisms and the cooling air baffle means; and connecting systems respectively associated with each one of the lifting lugs and each one of the lifting rods for connecting each one of the lifting rods to a respective one of each one of the lifting lugs, and for simultaneously connecting a lower end portion of the upstanding radiation shield means to each one of the respective lifting lugs

  9. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  10. 22 CFR 8.7 - Security.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the committee...

  11. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  12. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Alternative security program. 27.235 Section 27.235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered...

  13. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must... chemical facility security. (b) Except as provided in § 27.235, a covered facility must complete the Site...

  14. 78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-09-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...

  15. 33 CFR 105.210 - Facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and... effects, baggage, cargo, and vessel stores; and (m) The meaning and the consequential requirements of the...

  16. Reactor vessel supported by flexure member

    International Nuclear Information System (INIS)

    Crawford, J.D.; Pankow, B.

    1977-01-01

    According to the present invention there is provided an improved arrangement for supporting a reactor vessel within a containment structure against static and dynamic vertical loadings capable of being imposed as a result of a serious accident as well as during periods of normal plant operation. The support arrangement of the invention is, at the same time, capable of accommodating radial displacements that normally occur between the reactor vessel and the containment structure due to operational transients. The arrangement comprises a plurality of vertical columns connected between the reactor vessel and a support base within the containment structure. The columns are designed to accommodate relative displacements between the vessel and the containment structure by flexing. This eliminates the need for relative sliding movements and thus enables the columns to be securely fixed to the vessel. This elimination of a provision for relative sliding movements avoids the spaces or gaps between the retention members and the retained elements as occurred in prior art arrangements and, concomitantly, the danger of establishing impact forces on the retention members in the event of an accident is reduced. (author)

  17. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  18. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Ship Security Alert System (SSAS). 80.277... Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety..., “RTCM Standard 11020.0—Ship Security Alert Systems (SSAS) using the Cospas-Sarsat System,” Version 1.0...

  19. 75 FR 65511 - Employee Benefits Security Administration; Submission for OMB Review

    Science.gov (United States)

    2010-10-25

    ... DEPARTMENT OF LABOR Office of the Secretary Employee Benefits Security Administration; Submission...--Employee Benefits Security Administration (EBSA), Office of Management and Budget, Room 10235, Washington...: Employee Benefits Security Administration. Type of Review: Extension without change of a currently approved...

  20. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  1. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  2. 46 CFR 190.07-90 - Vessels contracted for prior to March 1, 1968.

    Science.gov (United States)

    2010-10-01

    ... considered satisfactory so long as they are maintained in good condition to the satisfaction of the Officer in Charge, Marine Inspection. Minor repairs and alterations may be made to the same standards as the... VESSELS CONSTRUCTION AND ARRANGEMENT Structural Fire Protection § 190.07-90 Vessels contracted for prior...

  3. 46 CFR 42.09-35 - Additional survey requirements for wood-hull vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Additional survey requirements for wood-hull vessels. 42.09-35 Section 42.09-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LOAD LINES... Additional survey requirements for wood-hull vessels. (a) In addition to the requirements in § 42.09-25, the...

  4. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  5. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    van Dongen Diana

    2011-11-01

    Full Text Available Abstract Background The amount of exposure to electromagnetic fields (EMF at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Methods Three occupational groups, the general Dutch working population (n = 567, airport security officers who work with metal detectors (n = 106, and MRI radiographers who work with MRI (n = 193, were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Results Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. Conclusions These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF.

  6. Emotional Exhaustion and Job Satisfaction in Airport Security Officers - Work-Family Conflict as Mediator in the Job Demands-Resources Model.

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners' job performance. The present study bridges this research gap by applying the job demands-resources (JD-R) model and using work-family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD-R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  7. 46 CFR 4.03-55 - Law enforcement officer.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Law enforcement officer. 4.03-55 Section 4.03-55 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE CASUALTIES AND INVESTIGATIONS Definitions § 4.03-55 Law enforcement officer. Law enforcement officer means a Coast Guard commissioned, warrant or petty officer...

  8. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...

  9. 12 CFR 326.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...

  10. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  11. Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course

    Directory of Open Access Journals (Sweden)

    Marcin Zyczkowski

    2017-06-01

    Full Text Available In this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that we can obtain quite acceptable results.

  12. 46 CFR 32.20-1 - Equipment installations on vessels during World War II-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Equipment installations on vessels during World War II-TB/ALL. 32.20-1 Section 32.20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL REQUIREMENTS Equipment Installations § 32.20-1 Equipment installations on vessels during World War II—TB/ALL....

  13. 12 CFR 563g.20 - Form for securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Form for securities sale report. 563g.20 Section 563g.20 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.20 Form for securities sale report. Office of Thrift Supervision, 1700 G Street, NW...

  14. 8 CFR 3.0 - Executive Office for Immigration Review

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Executive Office for Immigration Review 3.0 Section 3.0 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY GENERAL PROVISIONS EXECUTIVE OFFICE FOR IMMIGRATION REVIEW § 3.0 Executive Office for Immigration Review Regulations of the Executive Office for...

  15. 33 CFR 135.401 - Access to vessel, Certificates of Financial Responsibility.

    Science.gov (United States)

    2010-07-01

    ... HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Access, Denial, and Detention § 135.401 Access to vessel, Certificates of...

  16. 78 FR 63235 - Tank Vessel Oil Transfers

    Science.gov (United States)

    2013-10-23

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2013-0522] Tank Vessel Oil Transfers... that it is considering new measures to reduce the risks of oil spills in oil transfer operations from...), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200 New Jersey Avenue...

  17. 46 CFR 2.01-50 - Persons other than crew on towing, oyster, or fishing steam vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Persons other than crew on towing, oyster, or fishing steam vessels. 2.01-50 Section 2.01-50 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES... than crew on towing, oyster, or fishing steam vessels. (a) A steam vessel engaged in towing, oyster...

  18. 8 CFR 103.1 - Delegations of authority; designation of immigration officers.

    Science.gov (United States)

    2010-01-01

    ... immigration officers. 103.1 Section 103.1 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION... immigration officers. (a) Delegations of authority. Delegations of authority to perform functions and exercise authorities under the immigration laws may be made by the Secretary of Homeland Security as provided by § 2.1...

  19. Federal Bureau of Investigation (FBI) Field Office Jurisdiction/Divisions

    Data.gov (United States)

    Department of Homeland Security — This dataset represents the FBI (Federal Bureau of Investigations) national field office jurisdiction/divisional boundary locations. The field offices are centrally...

  20. 78 FR 261 - Moving Security Zone Around Escorted Vessels on the Lower Mississippi River

    Science.gov (United States)

    2013-01-03

    ... provides for enhanced protection of escorted vessels while causing little if any disruption to other routine navigation since most vessels will be allowed to transit within the outer 250 yards of the...

  1. 20 CFR 404.1212 - Police officers and firefighters.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Police officers and firefighters. 404.1212... May Be Covered § 404.1212 Police officers and firefighters. (a) General. For Social Security coverage purposes under section 218 of the Act, a police officer's or firefighter's position is any position so...

  2. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  3. 76 FR 34761 - Classified National Security Information

    Science.gov (United States)

    2011-06-14

    ... MARINE MAMMAL COMMISSION Classified National Security Information [Directive 11-01] AGENCY: Marine... Commission's (MMC) policy on classified information, as directed by Information Security Oversight Office... of Executive Order 13526, ``Classified National Security Information,'' and 32 CFR part 2001...

  4. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis.

    Science.gov (United States)

    van Dongen, Diana; Smid, Tjabe; Timmermans, Daniëlle R M

    2011-11-09

    The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. © 2011 van Dongen et al; licensee BioMed Central Ltd.

  5. 75 FR 18755 - Security Zone; Calcasieu River and Ship Channel, LA

    Science.gov (United States)

    2010-04-13

    ...The Coast Guard is disestablishing the permanent safety zone at Trunkline LNG in Lake Charles, LA and replacing it with a security zone with new boundaries. The Coast Guard is also establishing two additional permanent security zones on the waters of the Calcasieu River for the mooring basins at Cameron LNG in Hackberry, LA and PPG Industries in Lake Charles, LA. The Coast Guard is also disestablishing the Calcasieu River ship channel moving safety zone and replacing it with a moving security zone. The revised moving security zone extends channel edge to channel edge on the Calcasieu Channel and shoreline to shoreline on the Calcasieu River, 2 miles ahead and 1 mile astern of certain designated vessels while in transit on the Calcasieu Channel or Calcasieu River. Meeting, crossing or overtaking situations are not permitted within the security zone unless specifically authorized by the Captain of the Port. The moving security zone may commence at any point while certain vessels are transiting the Calcasieu Channel or Calcasieu River on U.S. territorial waters (12 nautical miles) in the Captain of the Port (COTP) Port Arthur zone. These security zones are needed to protect vessels, waterfront facilities, the public, and other surrounding areas from destruction, loss, or injury caused by sabotage, subversive acts, accidents, or other actions of a similar nature. Unless exempted under this rule, entry into or movement within these security zones is prohibited without permission from the Captain of the Port or a designated representative.

  6. 46 CFR 10.214 - Security Check.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...

  7. Security and Office Administration Coordinator | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Under the supervision of the Manager, Local Operations (MLO), the Security and ... Sees to the continuous updating and relevance of the Business Continuity Plan ... BCP to local management (Manager and Regional Director) and to the Head ...

  8. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  9. Emotional Exhaustion and Job Satisfaction in Airport Security Officers − Work−Family Conflict as Mediator in the Job Demands–Resources Model

    Directory of Open Access Journals (Sweden)

    Sophie eBaeriswyl

    2016-05-01

    Full Text Available The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners. Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD−R model and using work–family conflict (WFC as an intervening variable to study relationships between work characteristics (workload and supervisor support, emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a supervisor support as a major job resource predicted job satisfaction among screeners; (b workload as a major job demand predicted their emotional exhaustion; and (c WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  10. Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD–R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed. PMID:27242581

  11. Repairing method for shroud in reactor pressure vessel

    International Nuclear Information System (INIS)

    Watanabe, Yusuke.

    1996-01-01

    The present invention provides a method of repairing a shroud disposed in a pressure vessel of a BWR type reactor. Namely, a baffle plate is disposed on the outer surface of the lower portion of the shroud supported by a shroud support of the pressure vessel. The baffle plate is connected with a lug for securing a shroud head bolt disposed on the outer surface of an upper portion of the shroud by reinforcing members. With such a constitution, when crackings are caused in the shroud, the development of the crackings can be prevented without losing the function of securing the shroud head bolt. Further, if a material having thermal expansion coefficient lower than that of austenite stainless steel is used for the material of the reinforcing member, clamping load to be applied upon attaching the auxiliary member can be reduced. As a result, operation for the attachment is facilitated. (I.S.)

  12. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  13. Renovation of the sealing planes of WWER-400 reactors pressure vessel

    International Nuclear Information System (INIS)

    Jablonicky, P.; Pilat, P.

    2007-01-01

    An article describes technical solution for renovation of the sealing planes of WWER-440 reactor's pressure vessel. Four nickel sealing rings placed in four concentric grooves are providing hermetic sealing between the vessel and the lid of this type of the reactor. Impeccable seal of the reactor's pressure vessel, where the fission reaction takes place, represents a basic security factor for safe electric energy production. Principle of renovation of the reactor's pressure vessel and lid sealing planes is based on mechanical enlargement of defective grooves and following cladding of the new material by TIG welding. Final step for renovation includes machining of new grooves according to geometrical and surface quality requirements (Authors)

  14. Maritime Training Serbian Autonomous Vessel Protection Detachment

    Directory of Open Access Journals (Sweden)

    Šoškić Svetislav D.

    2014-06-01

    Full Text Available The crisis in Somalia has caused appearance of piracy at sea in the Gulf of Aden and the Western Indian Ocean. Somali pirates have become a threat to economic security of the world because almost 30 percent of world oil and 20 percent of global trade passes through the Gulf of Aden. Solving the problem of piracy in this part of the world have included international organizations, institutions, military alliances and the states, acting in accordance with international law and UN Security Council resolutions. The European Union will demonstrate the application of a comprehensive approach to solving the problem of piracy at sea and the crisis in Somalia conducting naval operation — EU NAVFOR Atalanta and operation EUTM under the Common Security and Defense Policy. The paper discusses approaches to solving the problem of piracy in the Gulf of Aden and the crisis in Somalia. Also, the paper points to the complexity of the crisis in Somalia and dilemmas correctness principles that are applied to solve the problem piracy at sea. One of goals is protections of vessels of the World Food Programme (WFP delivering food aid to displaced persons in Somalia. Republic of Serbia joined in this mission and trained and sent one a autonomous team in this military operation for protection WFP. This paper consist the problem of modern piracy, particularly in the area of the Horn of Africa became a real threat for the safety of maritime ships and educational process of Serbian Autonomous vessel protection detachment. Serbian Military Academy adopted and developed educational a training program against piracy applying all the provisions and recommendations of the IMO conventions and IMO model courses for Serbian Autonomous vessel protection detachment.

  15. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Science.gov (United States)

    2010-05-10

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; National Security... June 23, 2010, from 8 a.m. to 12:30 p.m. ADDRESSES: The meeting will be held at the National Security.... Kevin Gormley, Program Officer, National Security Education Program, 1101 Wilson Boulevard, Suite 1210...

  16. Vacuum vessel for plasma devices

    International Nuclear Information System (INIS)

    Yamada, Masao; Taguchi, Masami.

    1975-01-01

    Object: To permit effective utility of the space in the inner and outer sides of the container wall and also permit repeated assembly for use. Structure: Vacuum vessel wall sections are sealed together by means of welding bellows, and also flange portions formed at the end of the wall sections are coupled together by bolts and are sealed together with a seal ring and a seal cap secured by welding. (Nakamura, S.)

  17. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  18. 48 CFR 1339.107-70 - Information security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...

  19. Assessment of the integrity of WWER type reactor pressure vessels

    International Nuclear Information System (INIS)

    Brumovsky, M.

    1995-01-01

    Procedures are given for the assessment of the residual lifetime of reactor pressure vessels with respect to a sudden failure, the lifetime of vessels with defects disclosed during in-service inspections, and the fatigue or corrosion-mechanical lifetime. Also outlined are the ways of assessing the effects of major degradation mechanisms, i.e. radiation embrittlement, thermal aging, and fatigue damage, including the use of calculated values and experimental examination, by means of surveillance specimens in particular. All results of assessment performed so far indicate that the life of reactor pressure vessels at the Dukovany, Jaslovske Bohunice, and Temelin nuclear power plants is well secured. 7 figs., 3 refs

  20. Office of Personnel Management (OPM)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for the Office of Personnel Management. OPM will use the SSN verifications in its investigative...

  1. Solar Energy Technologies Office Fact Sheet

    Energy Technology Data Exchange (ETDEWEB)

    Solar Energy Technologies Office

    2018-03-13

    The U.S. Department of Energy Solar Energy Technologies Office (SETO) supports early-stage research and development to improve the affordability, reliability, and performance of solar technologies on the grid. The office invests in innovative research efforts that securely integrate more solar energy into the grid, enhance the use and storage of solar energy, and lower solar electricity costs.

  2. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-05-24

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), DoD. ACTION: Meeting notice. SUMMARY: Under the... announces that the following Federal advisory committee meeting of the National Security Education Board...

  3. Device for supporting the vacuum vessel of a thermonuclear device

    International Nuclear Information System (INIS)

    Sato, Hiroshi.

    1980-01-01

    Purpose: To hold a vacuum vessel securely at a predetermined position. Constitution: A vacuum vessel is supported on its one side to the standard mounting location of a support frame by way of a pin junction. The vacuum vessel is provided at its upper and lower positions with movable mounting portions, which are connected by way of connecting rods to fixed mounting locations on the upper and lower frames. The fixed mounting locations are disposed on a vertical plane including the axis of the torus center. This arrangement enables to hold even a large vacuum vessel at an exact predetermined position even under high temperature conditions without limiting the container's thermal expansion relative to the changes in temperature, thereby providing an extremely high rigidity against electromagnetic forces, earthquakes, etc. (Furukawa, Y.)

  4. The Analysis of the Causes of Emergencies on the Vessels

    Directory of Open Access Journals (Sweden)

    Alicja Mrozowska

    2017-12-01

    Full Text Available The article discusses the results of research conducted on the vessels, covering a wide spectrum of issues relating to the exploitation of vessels of various flags, as well as operating security and safety systems on board. The main aim of the study was to collect numbers of data directly from the crew, for examples: indicate by the crew marine areas with the greatest probability of occurrence of casualties and incidents, trying to the definition the causes of their occurrence, prevention actions used on board and analyses operating safety systems used on the various type of vessels. The analysis of research became the basis to identify strengths and weaknesses areas of the vessel operation. The author proposes a solution to be implemented on board and emphasizes meaning of safety management system.

  5. 12 CFR 208.61 - Bank security procedures.

    Science.gov (United States)

    2010-01-01

    ... procedures for opening and closing for business and for the safekeeping of all currency, negotiable...; the cost of the security devices; other security measures in effect at the banking office; and the... directors on the implementation, administration, and effectiveness of the security program. (e) Reserve...

  6. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Science.gov (United States)

    2012-06-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... of the National Security Education Board. This meeting was to be held on June 20, 2012, from 8:30 a.m. to 2 p.m. at Defense Language and National Security Education Office, 1101 Wilson Boulevard, Suite...

  7. 33 CFR 165.1409 - Security Zones; Hawaii, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Hawaii, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1409 Security Zones; Hawaii..., Hawaii. All waters extending 100 yards in all directions from each large passenger vessel in Hilo Harbor...

  8. 76 FR 13111 - Compassionate Allowances for Autoimmune Disease, Office of the Commissioner; Hearing

    Science.gov (United States)

    2011-03-10

    [email protected] ; or Mail to Jamillah Jackson, Deputy Director, Office of Compassionate Allowances and....gov . You may also mail inquiries about this hearing to Jamillah Jackson, Deputy Director, Office of... Security--Disability Insurance; 96.006, Supplemental Security Income.) Dated: March 3, 2011. Michael J...

  9. 33 CFR 96.370 - What are the requirements for vessels of countries not party to Chapter IX of SOLAS?

    Science.gov (United States)

    2010-07-01

    ... vessel, or self-propelled mobile offshore drilling unit of 500 gross tons or more, operated in U.S... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS How Will Safety Management Systems Be Certificated and...

  10. 76 FR 7757 - Hull Identification Numbers for Recreational Vessels

    Science.gov (United States)

    2011-02-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2007-29236] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Follow-up to request for... expanded hull identification number (HIN). The Coast Guard's decision-making process included consideration...

  11. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  12. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45... SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45 Information Security Program Review. (a) The Director, OSTP, shall require an annual formal review of the OSTP...

  13. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  14. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    Science.gov (United States)

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  15. Twilight Policing. Private Security in Durban, South Africa

    NARCIS (Netherlands)

    Diphoorn, T.G.

    2013-01-01

    This ethnography analyses the everyday policing practices of armed response officers in Durban, South Africa. Armed response officers are private security officers who patrol communities in vehicles and respond to distress calls from clients. This study considers their interactions with other

  16. 78 FR 47716 - Final Guidance Regarding Voluntary Inspection of Vessels for Compliance With the Maritime Labour...

    Science.gov (United States)

    2013-08-06

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-1066] Final Guidance Regarding Voluntary Inspection of Vessels for Compliance With the Maritime Labour Convention, 2006 AGENCY: Coast Guard... procedures regarding the inspection of U.S. vessels for voluntary compliance with the Maritime Labour...

  17. 49 CFR 176.4 - Port security and safety regulations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Port security and safety regulations. 176.4... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS CARRIAGE BY VESSEL General § 176.4 Port security and safety regulations. (a) Each carrier, master, agent, and charterer of a...

  18. 4 CFR 83.9 - Social Security number.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Social Security number. 83.9 Section 83.9 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.9 Social Security number. (a) GAO may not require individuals to disclose their Social Security Number (SSN) unless...

  19. 76 FR 15368 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-03-21

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... security devices and procedures to discourage robberies, burglaries, and larcenies, and to assist in the...

  20. 77 FR 59575 - Hull Identification Numbers for Recreational Vessels

    Science.gov (United States)

    2012-09-28

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2012-0843] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Request for public comments... requirement to indicate a boat's model year as part of the 12-character Hull Identification Number (HIN...

  1. 6 CFR 5.31 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security of systems of records. 5.31 Section 5.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each component...

  2. Maritime Security Fleet: Factors to Consider before Deciding to Select Participants Competitively

    National Research Council Canada - National Science Library

    1997-01-01

    The Maritime Security Act established the Maritime Security Fleet (MSF) program, authorizing MARAD to enter into agreements with maritime shipping companies to provide DOD access to commercial vessels operating under U.S...

  3. 6 CFR 27.204 - Minimum concentration by security issue.

    Science.gov (United States)

    2010-01-01

    ... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...

  4. 76 FR 30243 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-05-24

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures.... Title of Proposal: Minimum Security Devices and Procedures. OMB Number: 1550-0062. Form Number: N/A... respect to the installation, maintenance, and operation of security devices and procedures to discourage...

  5. 8 CFR 287.5 - Exercise of power by immigration officers.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Exercise of power by immigration officers. 287.5 Section 287.5 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS FIELD OFFICERS; POWERS AND DUTIES § 287.5 Exercise of power by immigration officers. (a) Power and...

  6. Nuclear security. Improving correction of security deficiencies at DOE's weapons facilities

    International Nuclear Information System (INIS)

    Wells, James E.; Cannon, Doris E.; Fenzel, William F.; Lightner, Kenneth E. Jr.; Curtis, Lois J.; DuBois, Julia A.; Brown, Gail W.; Trujillo, Charles S.; Tumler, Pamela K.

    1992-11-01

    The US nuclear weapons research, development, and production are conducted at 10 DOE nuclear weapons facilities by contractors under the guidance and oversight of 9 DOE field offices. Because these facilities house special nuclear materials used in making nuclear weapons and nuclear weapons components, DOE administers a security program to protect (1) against theft, sabotage, espionage, terrorism, or other risks to national security and (2) the safety and health of DOE employees and the public. DOE spends almost $1 billion a year on this security program. DOE administers the security program through periodic inspections that evaluate and monitor the effectiveness of facilities' safeguards and security. Security inspections identify deficiencies, instances of noncompliance with safeguards and security requirements or poor performance of the systems being evaluated, that must be corrected to maintain adequate security. The contractors and DOE share responsibility for correcting deficiencies. Contractors, in correcting deficiencies, must comply with several DOE orders. The contractors' performances were not adequate in conducting four of the eight procedures considered necessary in meeting DOE's deficiency correction requirements. For 19 of the 20 deficiency cases we reviewed, contractors could not demonstrate that they had conducted three critical deficiency analyses (root cause, risk assessment, and cost-benefit) required by DOE. Additionally, the contractors did not always adequately verify that corrective actions taken were appropriate, effective, and complete. The contractors performed the remaining four procedures (reviewing deficiencies for duplication, entering deficiencies into a data base, tracking the status of deficiencies, and preparing and implementing a corrective action plan) adequately in all 20 cases. DOE's oversight of the corrective action process could be improved in three areas. The computerized systems used to track the status of security

  7. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    Science.gov (United States)

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  8. 33 CFR 125.11 - Form of Coast Guard Port Security Card.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Form of Coast Guard Port Security... WATERFRONT FACILITIES OR VESSELS § 125.11 Form of Coast Guard Port Security Card. The Coast Guard Port... data. ...

  9. 12 CFR 563g.12 - Securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Securities sale report. 563g.12 Section 563g.12 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.12 Securities sale report. (a) Within 30 days after the first sale of the securities, every six...

  10. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  11. 33 CFR 101.125 - Approved Alternative Security Programs.

    Science.gov (United States)

    2010-07-01

    ... 106 of this subchapter, as applicable: (a) American Gaming Association Alternative Security Program..., and Towboats and Barges, dated September 24, 2003. (c) Passenger Vessel Association Industry Standards...

  12. Analysis of aging mechanism and management for HTR-PM reactor pressure vessel

    International Nuclear Information System (INIS)

    Sun Yunxue; Shao Jin

    2015-01-01

    Reactor pressure vessel is an important part of the reactor pressure boundary, its important degree ranks high in ageing management and life assessment of nuclear power plant. Carrying out systematic aging management to ensure reactor pressure vessel keeping enough safety margins and executing design functions is one of the key factors to guarantee security and stability operation for nuclear power plant during the whole lifetime and prolong life. This paper briefly introduces the structure and aging mechanism of reactor pressure vessel in pressurized water reactor nuclear power plant, and introduces the design principle and structure characteristics of HTR-PM. At the same time, this paper carries out preliminary analysis and exploration. and discusses aging management of HTR-PM reactor pressure vessel. Finally, the advice of carring out aging management for HTR-PM reactor pressure vessel is proposed. (authors)

  13. The Land Component Role in Maritime Security

    Science.gov (United States)

    2016-12-31

    nations for resources. They must also confront maritime threats, which include piracy , armed robbery, damage to the marine environment (i.e. pollution...such as an armed attack from a military vessel. Most definitions also usually include security from crimes at sea, such as piracy , armed robbery...security through stability operations, one must accept that any effective government must focus on basic governmental functions – providing for the

  14. Office of Personnel Management (OPM) Earnings

    Data.gov (United States)

    Social Security Administration — Each year the Office of Personnel Management (OPM) sends SSA a file to be verified and matched against the Master Earnings File (MEF) and Employer Information File...

  15. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  16. Multi-Level Secure Local Area Network

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...

  17. 46 CFR 35.25-5 - Repairs of boilers and unfired pressure vessels and reports of repairs or accidents by chief...

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Repairs of boilers and unfired pressure vessels and..., DEPARTMENT OF HOMELAND SECURITY TANK VESSELS OPERATIONS Engine Department § 35.25-5 Repairs of boilers and... any repairs to boilers or unfired pressure vessels, the chief engineer shall submit a report covering...

  18. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Karen L. Neuman, (202) 343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974... Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...

  19. 78 FR 69653 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-20

    ... Allies and Partner personnel during Maritime Interception or Security Operations, vessel boardings... Federal Register Liaison Officer, Department of Defense. NM03800-1 System name: Naval Global Maritime... activity or piracy in the maritime sector; crew and passengers of maritime vessels defined by the...

  20. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  1. 19 CFR 101.2 - Authority of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Authority of Customs officers. 101.2 Section 101.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL PROVISIONS § 101.2 Authority of Customs officers. (a) Supremacy of delegated authority...

  2. 33 CFR Appendix B to Part 155 - Determining and Evaluating Required Response Resources for Vessel Response Plans

    Science.gov (United States)

    2010-07-01

    ... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR VESSELS Pt. 155, App. B Appendix B to Part 155—Determining and... environment. For example, vessels moving from the ocean to a river port must identify appropriate equipment...

  3. 33 CFR 165.114 - Safety and Security Zones: Escorted Vessels-Boston Harbor, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.114 Safety and Security Zones: Escorted Vessels—Boston Harbor, Massachusetts. (a...

  4. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  5. 76 FR 30227 - On behalf of the Accessibility Committee of the Federal Chief Information Officers Council...

    Science.gov (United States)

    2011-05-24

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0041] On behalf of the Accessibility Committee of the Federal Chief Information Officers Council; Listening Session Regarding Improving the Accessibility of Government Information AGENCY: Federal Chief Information Officers Council, Social Security...

  6. 77 FR 17081 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-03-23

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... FOR FURTHER INFORMATION CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0082] Information Collection Requests to...

  7. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  8. 10 CFR 95.19 - Changes to security practices and procedures.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Changes to security practices and procedures. 95.19 Section 95.19 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND..., also to the Director, Division of Security Operations, Office of Nuclear Security and Incident Response...

  9. 46 CFR 11.522 - Service requirements for assistant engineer (limited oceans) of steam and/or motor vessels.

    Science.gov (United States)

    2010-10-01

    ... oceans) of steam and/or motor vessels. 11.522 Section 11.522 Shipping COAST GUARD, DEPARTMENT OF HOMELAND... Requirements for Engineer Officer § 11.522 Service requirements for assistant engineer (limited oceans) of... assistant engineer (limited oceans) of steam and/or motor vessels is three years of service in the...

  10. 20 CFR 416.1443 - Responsibilities of the adjudication officer.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Responsibilities of the adjudication officer. 416.1443 Section 416.1443 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... disagreement and refer the claim to the administrative law judge for further proceedings. At this point, the...

  11. 46 CFR 32.50-25 - Cargo pumps and piping on tank vessels constructed prior to November 10, 1936-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Cargo pumps and piping on tank vessels constructed prior... SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL REQUIREMENTS Pumps, Piping, and Hose for Cargo Handling § 32.50-25 Cargo pumps and piping on tank vessels constructed prior to November 10, 1936—TB/ALL...

  12. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Science.gov (United States)

    2010-03-10

    ... 20472. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management Agency System of Records AGENCY: Privacy Office...

  13. 78 FR 77694 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-12-24

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and...-7710. FOR FURTHER INFORMATION: Contact Mr. Anthony Smith, Office of Information Management, telephone... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0949] Information Collection Requests to...

  14. 78 FR 19502 - Information Collection Requests to Office of Management and Budget.

    Science.gov (United States)

    2013-04-01

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... FURTHER INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0164] Information Collection Requests to...

  15. 78 FR 12083 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-02-21

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and..., Washington, DC 20593-7101. FOR FURTHER INFORMATION CONTACT: Anthony Smith, Office of Information Management... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0037] Information Collection Request to...

  16. 78 FR 65351 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-10-31

    ... Information Collection Request (ICRs) to the Office of Management and Budget (OMB), Office of Information and..., DC 20593-7710. FOR FURTHER INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0861] Information Collection Request to...

  17. Wireless Sensor Buoys for Perimeter Security of Military Vessels and Seabases

    Science.gov (United States)

    2015-12-01

    two decades have demonstrated that attacks of this type are indeed possible, and that current security measures may not be sufficient to mitigate such...attack by small surface crafts. The past two decades have demonstrated that attacks of this type are indeed possible, and that current security measures ...xiii LIST OF ACRONYMS AND ABBREVIATIONS ADAPT AP ARA AT/FP COTS DARPA DOD DODINST EF-21 GPS GUI IEEE ISR LCS LiDAR LTE MAC MAGTF

  18. 12 CFR 563g.19 - Approval of the security.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Approval of the security. 563g.19 Section 563g.19 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.19 Approval of the security. Any securities of a savings association which are not exempt under...

  19. 76 FR 28960 - National Security Education Board Members Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  20. 77 FR 49439 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-08-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Secretary of Defense concerning requirements established by the David L. Boren National Security Education...

  1. 77 FR 27739 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-05-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  2. The Need for an Implant Identification Card at Airport Security Check.

    Science.gov (United States)

    Ali, Erden; Kosuge, Dennis; MacDowell, Andrew

    2017-06-01

    Joint replacement surgery is having an increasing demand as national healthcare systems confront an ever ageing population. Surgical complications associated with lower limb arthroplasty are well known but less investigation has been performed examining its effect on air travel, more specifically, unwanted and significant inconvenience caused to travelers going through airport security. In lower limb arthroplasty clinics, 50 patients who met our selection criteria were given questionnaires. Ten airport security officers from 4 international airports (London Stansted, London Gatwick, London Heathrow, and Amsterdam Schiphol International Airport) were also given a separate questionnaire. The opinion of the Civil Aviation Authority was also sought. All 50 patients (mean age, 70.4 years; range, 55 to 84 years) who were presenting in lower limb arthroplasty clinics and who met our selection criteria volunteered to enter the study. Twenty-eight of these patients were female (mean age, 69.1 years; range, 55 to 84 years) and 22 were male (mean age, 71.2 years; range, 58 to 81 years). Of the patients, 14% stated that their joint replacements did not set off the airport security alarm. Responses were received from 10 airport security officers as well. Six airport security officers were male and 4 were female. All of the airport officers were aware of some form of implant identification card with 90% stating that these were useful to them at airport security. Eight-four percent of the patients stated that an implant identification card outlining what joint replacement they possessed and when this had been done would be very useful. Sixteen percent of the patients did not think a card would be beneficial since all of them had set off the airport alarm system only once or less in their lifetime. It is the opinion of airport security officers and patients that joint replacement implant identification cards streamline airport security checks and decrease the need for more

  3. Wireless local area network for the dental office.

    Science.gov (United States)

    Mupparapu, Muralidhar

    2004-01-01

    Dental offices are no exception to the implementation of new and advanced technology, especially if it enhances productivity. In a rapidly transforming digital world, wireless technology has a special place, as it has truly "retired the wire" and contributed to the ease and efficient access to patient data and other software-based applications for diagnosis and treatment. If the office or the clinic is networked, access to patient management software, imaging software and treatment planning tools is enhanced. Access will be further enhanced and unrestricted if the entire network is wireless. As with any new, emerging technology, there will be issues that should be kept in mind before adapting to the wireless environment. Foremost is the network security involved in the installation and use of these wireless networks. This short, technical manuscript deals with standards and choices in wireless technology currently available for implementation within a dental office. The benefits of each network security protocol available to protect patient data and boost the efficiency of a modern dental office are discussed.

  4. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    International Nuclear Information System (INIS)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  5. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-06-12

    ... cybersecurity awareness, education, talent management, and professional development and training. NICCS Portal... Education Office, will submit the following Information Collection Request (ICR) to the Office of Management... contemplated: Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. 3546; Homeland Security...

  6. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  7. Weatherization and Intergovernmental Programs Office Fact Sheet

    Energy Technology Data Exchange (ETDEWEB)

    None

    2018-02-01

    One of the Department of Energy’s (DOE) primary forums for helping state and local governments implement costeffective and productive energy systems for American homes, communities, businesses, and industries is the Weatherization and Intergovernmental Programs Office (WIP). WIP is part of DOE’s Office of Energy Efficiency and Renewable Energy’s “all of the above” national energy strategy to create greater energy affordability, security and resiliency.

  8. 77 FR 40624 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-07-10

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0598] Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and...

  9. 78 FR 19504 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-01

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0133] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...

  10. 78 FR 54666 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-09-05

    ... Information Collection Request (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0782] Information Collection Request to...

  11. 77 FR 16044 - Information Collection Requests to Office of Management and Budget.

    Science.gov (United States)

    2012-03-19

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0149] Information Collection Requests to...

  12. 77 FR 5816 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-02-06

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0016] Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  13. 77 FR 53899 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-09-04

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0733] Information Collection Request to...

  14. 78 FR 42535 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-07-16

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax 202... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0519] Information Collection Requests to...

  15. 77 FR 6132 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-02-07

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... Tyler, Office of Information Management, telephone (202) 475-3652, or fax (202) 475- 3929, for questions... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0029] Information Collection Request to...

  16. 78 FR 77693 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-12-24

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Contact Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532, or... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0896] Information Collection Requests to...

  17. 76 FR 46824 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-08-03

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0710] Information Collection Requests to...

  18. 76 FR 58529 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-09-21

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0869] Information Collection Requests to...

  19. 76 FR 62426 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-10-07

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0902] Information Collection Request to...

  20. 77 FR 27472 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-05-10

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0231] Information Collection Request to...

  1. 77 FR 32657 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-06-01

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0472] Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  2. 78 FR 5192 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-01-24

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-1006] Information Collection Requests to...

  3. 78 FR 74155 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-12-10

    ... Information Collection Request (ICRs) to the Office of Management and Budget (OMB), Office of Information and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0950] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  4. 77 FR 18253 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-03-27

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0173] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...

  5. 6 CFR 27.240 - Review and approval of security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of security vulnerability assessments. 27.240 Section 27.240 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval...

  6. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  7. Report to the Congress on the need for, and the feasibility of, establishing a security agency within the Office of Nuclear Material Safety and Safeguards

    International Nuclear Information System (INIS)

    1976-08-01

    In response to the Congressional mandate Section 204(b)-(2) (C) of the Energy Reorganization Act of 1974, the Director of the Office of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory Commission (NRC) has assessed the need for and the feasibility of establishing a security agency within that office for the performance of safeguards functions. The study assessed guard force effectiveness, and addressed public policy, administrative and legal issues. The study concluded that creation of a special security force within NRC would not result in a higher degree of guard force effectiveness than can be achieved through the use of private guards who have been properly trained and certified. Disparate gun laws in various states, it concluded, restrict arms possessed by both private and federal guards and private and federal transportation guards would require legislation authorizing them to bear the necessary weapons to protect nuclear material in transit. The role of reaction forces was also addressed and it was concluded that primary reliance at fixed sites should be placed on onsite protection systems; for material in transit, on invulnerability of vehicles and containers and on guard forces accompanying shipments

  8. 6 CFR 27.245 - Review and approval of site security plans.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  9. 76 FR 5815 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-02-02

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0016; OMB Control numbers: 1625-0005, 1625-0024, 1625-0036 and 1625-0061] Information Collection Request to Office of Management and Budget AGENCY... (ICRs) to the Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA...

  10. 76 FR 35228 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-06-16

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and..., Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on these... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0494] Information Collection Request to...

  11. 76 FR 61369 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-10-04

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and..., Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on these... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0914] Information Collection Request to...

  12. 77 FR 9951 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-02-21

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0077] Information Collection Requests to...

  13. 78 FR 19503 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-01

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...: Contact Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0045] Information Collection Request to...

  14. 76 FR 63626 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-10-13

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0955] Information Collection Requests to...

  15. 19 CFR 12.62 - Enforcement; duties of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Enforcement; duties of Customs officers. 12.62 Section 12.62 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...; duties of Customs officers. (a) In accordance with the authority contained in sections 10 and 12 of the...

  16. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  17. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Science.gov (United States)

    2010-07-01

    ... for National Security, who shall refer such questions to the Office of Legal Counsel, as appropriate... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security...

  18. Evaluation of Agency Non-Code Layered Pressure Vessels (LPVs)

    Science.gov (United States)

    Prosser, William H.

    2014-01-01

    In coordination with the Office of Safety and Mission Assurance and the respective Center Pressure System Managers (PSMs), the NASA Engineering and Safety Center (NESC) was requested to formulate a consensus draft proposal for the development of additional testing and analysis methods to establish the technical validity, and any limitation thereof, for the continued safe operation of facility non-code layered pressure vessels. The PSMs from each NASA Center were asked to participate as part of the assessment team by providing, collecting, and reviewing data regarding current operations of these vessels. This report contains the outcome of the assessment and the findings, observations, and NESC recommendations to the Agency and individual NASA Centers.

  19. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  20. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    Science.gov (United States)

    Kuhn, D. R.; Tracy, Miles C.; Frankel, Sheila E.

    2002-08-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. This document is not intended to provide a mandatory framework for telecommuting or home office broadband communication environments, but rather to present suggested approaches to the topic.

  1. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  2. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Science.gov (United States)

    2010-01-01

    ... chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information regarding security risk for a chemical facility. (a) Information to determine security risk. In order to...

  3. 78 FR 1586 - Unified Agenda of Federal Regulatory and Deregulatory Actions

    Science.gov (United States)

    2013-01-08

    ...: Jeremy F. Olson, Senior Procurement Analyst, Department of Homeland Security, Office of the Chief... oil spill response plans. The Federal Water Pollution Control Act defines nontank vessels as self..., carry oil of any kind as fuel for main propulsion, and are not tank vessels. The NPRM proposed to...

  4. 75 FR 733 - Implementation of the Executive Order, ``Classified National Security Information''

    Science.gov (United States)

    2010-01-05

    ... of the Executive Order, ``Classified National Security Information'' Memorandum for the Heads of... Security Information'' (the ``order''), which substantially advances my goals for reforming the security... classified information shall provide the Director of the Information Security Oversight Office (ISOO) a copy...

  5. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  6. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  7. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Science.gov (United States)

    2010-02-23

    ... privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  8. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  9. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  10. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  11. 15 CFR 744.7 - Restrictions on certain exports to and for the use of certain foreign vessels or aircraft.

    Science.gov (United States)

    2010-01-01

    ... be registered in the case of a vessel or aircraft under construction, and (3) To the country... Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF... operating vessel or aircraft or one under construction, located in any port including a Canadian port...

  12. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  13. 49 CFR 1544.221 - Carriage of prisoners under the control of armed law enforcement officers.

    Science.gov (United States)

    2010-10-01

    ... Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.221 Carriage... custody of an armed law enforcement officer aboard an aircraft for which screening is required unless, in...

  14. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  15. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  16. 75 FR 65404 - Security Savings Bank, FSB; Olathe, KS; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-10-22

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Security Savings Bank, FSB; Olathe, KS... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision (OTS) has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Security Savings Bank, FSB, Olathe...

  17. 75 FR 8431 - Carbon Dioxide Fire Suppression Systems on Commercial Vessels

    Science.gov (United States)

    2010-02-24

    ... and nonsubstantive style, format, or wording changes that we are proposing solely to improve the... 1. The authority citation for Part 25 continues to read as follows: Authority: 33 U.S.C. 1903(b); 46... Commanding Officer, U.S. Coast Guard Marine Safety Center. PART 27--TOWING VESSELS 3. The authority citation...

  18. 75 FR 67989 - Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure...

    Science.gov (United States)

    2010-11-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0084] Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure Protection Stakeholder Input Project--Generic... comments; New Information Collection Request: 1670-NEW. SUMMARY: The Department of Homeland Security...

  19. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    Biometrics security technology uses the physiological and ... verification and authentication methodology to verify how facial screening explores the different ... mouth, nose etc and stores the bio-information extracted from the face of every ...

  20. 75 FR 12250 - Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to the United...

    Science.gov (United States)

    2010-03-15

    ..., 2010. ADDRESSES: This notice will be available for inspection and copying at the Docket Management... conducted pursuant to the provisions of 46 U.S.C. 70108 and the International Ship and Port Facility... five port calls. Vessels must: Implement measures per the ship's security plan equivalent to ``Security...

  1. 46 CFR 32.55-5 - Ventilation of tank vessels constructed between November 10, 1936, and July 1, 1951-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... actuated gas ejectors or blowers or ventilators fitted with heads for natural ventilation, will be approved... 46 Shipping 1 2010-10-01 2010-10-01 false Ventilation of tank vessels constructed between November... HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL REQUIREMENTS Ventilation and Venting...

  2. 33 CFR 1.01-20 - Officer in Charge, Marine Inspection.

    Science.gov (United States)

    2010-07-01

    ... that they comply with the applicable laws, rules, and regulations relating to safe construction... action in cases of misconduct, negligence, or incompetence of merchant marine officers or seamen; and the enforcement of vessel inspection, navigation, and seamen's laws in general. Specific procedures for appealing...

  3. Special report. New products that improve officer performance, safety.

    Science.gov (United States)

    1991-12-01

    The need for products that improve performance of security officers is counterbalanced these days by budgetary constraints. While this may limit major investments in security systems and personnel, less costly improvements or innovations might be worth considering. In this report, we will discuss four advances that may be valuable not only in hospital security, but in other industries as well. One of them, a smoke filter, was originally developed for the hotel industry. Another, a drug detection device, may replace the use of undercover agents or drug-sniffing' dogs in certain circumstances. The third new product is an economical patrol vehicle for parking facilities which might replace more costly vehicles such as golf carts or cars. The fourth product, a roving CCTV camera, is actually being tested at a Midwest medical center and may allow you to monitor areas of parking garages with cameras instead of officers on patrol.

  4. 15 CFR 2008.18 - Information Security Oversight Committee.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Information Security Oversight Committee. 2008.18 Section 2008.18 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF...

  5. 12 CFR 792.68 - Use and collection of Social Security numbers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Use and collection of Social Security numbers... Act § 792.68 Use and collection of Social Security numbers. The head of each NCUA Office shall take... furnish Social Security numbers, and that individuals who are requested to provide Social Security numbers...

  6. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2012-03-14

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice...

  7. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day notice. SUMMARY: This notice...

  8. 77 FR 47440 - Office of the Assistant Secretary for Office of Disability Employment Program National Center on...

    Science.gov (United States)

    2012-08-08

    ... Opportunity Description The U.S. Department of Labor (DOL or Department), Office of Disability Employment... of policy by performing, upon request, rapid response to policy analysis and policy implementation... strategies to both individual job seekers and the systems that assist them in securing, retaining, and...

  9. Amplifying Security Education in the Laboratory

    National Research Council Canada - National Science Library

    Irvine, Cynthia

    1999-01-01

    Computer and network security have become concerns for enterprises ranging from sole proprietorships run from home offices to global corporations and government agencies with hundred of thousands of employees...

  10. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  11. Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety

    Science.gov (United States)

    1998-05-01

    Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...

  12. Evaluation of Agency Non-Code Layered Pressure Vessels (LPVs) . Volume 2; Appendices

    Science.gov (United States)

    Prosser, William H.

    2014-01-01

    In coordination with the Office of Safety and Mission Assurance and the respective Center Pressure System Managers (PSMs), the NASA Engineering and Safety Center (NESC) was requested to formulate a consensus draft proposal for the development of additional testing and analysis methods to establish the technical validity, and any limitation thereof, for the continued safe operation of facility non-code layered pressure vessels. The PSMs from each NASA Center were asked to participate as part of the assessment team by providing, collecting, and reviewing data regarding current operations of these vessels. This document contains the appendices to the main report.

  13. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  14. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  15. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  16. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  17. DOE Office of Environmental Management, 2016 Year in Review

    Energy Technology Data Exchange (ETDEWEB)

    None

    2016-12-01

    2016 accomplishments and primary areas of focus for the Department of Energy's (DOE's) Office of Environmental Management and EM sites are presented. For DOE EM, these include Focusing on the Field, Teaming with Cleanup Partners, Developing New Technology, and Maximizing Cleanup Dollars. Major 2016 achievements are highlighted for EM, Richland Operations Office, Office of River Protection, Savannah River Site, Oak Ridge, Idaho, Waste Isolation Pilot Plant, Los Alamos, Portsmouth, Paducah, West Valley Demonstration Project, and the Nevada National Security Site,

  18. 46 CFR 193.50-90 - Vessels contracted for prior to March 1, 1968.

    Science.gov (United States)

    2010-10-01

    ...-10(a). Minor modifications may be made to the same standard as the original installation: Provided... service so long as they are maintained in good condition to the satisfaction of the Officer in Charge... VESSELS FIRE PROTECTION EQUIPMENT Hand Portable Fire Extinguishers and Semiportable Fire Extinguishing...

  19. Investigation of vessel exterior air cooling for a HLMC reactor

    International Nuclear Information System (INIS)

    Sienicki, J. J.; Spencer, B. W.

    2000-01-01

    The Secure Transportable Autonomous Reactor (STAR) concept under development at Argonne National Laboratory provides a small (300 MWt) reactor module for steam supply that incorporates design features to attain proliferation resistance, heightened passive safety, and improved cost competitiveness through extreme simplification. Examples are the achievement of 100%+ natural circulation heat removal from the low power density/low pressure drop ultra-long lifetime core and utilization of lead-bismuth eutectic (LBE) coolant enabling elimination of main coolant pumps as well as the need for an intermediate heat transport circuit. It is required to provide a passive means of removing decay heat and effecting reactor cooldown in the event that the normal steam generator heat sink, including its normal shutdown heat removal mode, is postulated to be unavailable. In the present approach, denoted as the Reactor Exterior Cooling System (RECS), passive decay heat removal is provided by cooling the outside of the containment/guard vessel with air. RECS is similar to the Reactor Vessel Auxiliary Cooling System (RVACS) incorporated into the PRISM design. However, to enhance the heat removal, RECS incorporates fins on the containment vessel exterior to enhance heat transfer to air as well as removable steel venetian conductors that provide a conduction heat transfer path across the reactor vessel-containment vessel gap to enhance heat transfer between the vessels. The objective of the present work is to investigate the effectiveness of air cooling in removing heat from the vessel and limiting the coolant temperature increase following a sudden complete loss of the steam generator heat sink

  20. Report: Fiscal Year 2010 Federal Information Security Management Act Report

    Science.gov (United States)

    Report #11-P-0017, November 16, 2010. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2010 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  1. Punishment in School: The Role of School Security Measures

    Directory of Open Access Journals (Sweden)

    Thomas J Mowen

    2014-09-01

    Full Text Available Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001, perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010, and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004; Kupchik, 2010, few studies have sought to explore the impacts of these measures on suspension rates. Using data from the Educational Longitudinal Study (2002, I explore the relationship between security measures and in-school, out-of-school, and overall suspension rates. Results indicate schools with a security officer experience higher rates of in-school suspensions but have no difference in rates of out-of-school or overall suspensions compared to schools without a security officer. No other measure of security was related to higher suspension rates. As prior literature suggests, schools with greater proportions of black students experienced significantly higher rates of all suspension types. Finally, different types of parental involvement correlated with both higher and lower suspension rates.

  2. 20 CFR 726.106 - Type of security.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Type of security. 726.106 Section 726.106... Authorization of Self-Insurers § 726.106 Type of security. (a) The Office shall determine the type or types of... which the surety on any such bond is a surety company, such company must be one approved by the U.S...

  3. Positioning means for circumferentially locating inspection apparatus in a nuclear reactor vessel

    International Nuclear Information System (INIS)

    Burns, D.C.

    1980-01-01

    There is provided for a reactor vessel inspection device a support ring sized to accommodate the circular path defined by three or more guide studs extending upwardly from the vessel. The support ring has at least three movably mounted guide stud bushings which can be positionally adjusted to align each bushing with one of the studs. When engaged, the guide studs and bushings yield a coarse positioning of the inspection device relative to the reactor vessel. Also provided are three support legs which are clamped to the support ring and dimensioned to an appropriate length. Two of the support legs have shoes clamped thereto, configured to rest on an internal circumferential flange within the reactor vessel. The third support leg is provided with a specially adapted shoe configured to engage a locating element, the exact position of which is known, within the vessel to achieve fine positioning of the inspection device relative to the reactor vessel. The support ring is additionally provided with an annular key which runs longitudinally about its outer periphery. Clamping means utilized to secure the guide stud bushings and the support legs to the support ring are provided with keyways to insure automatic self-alignment when fully tightened. (auth)

  4. 78 FR 3906 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-01-17

    ... intends to submit an Information Collection Request (ICR) to the Office of Management and Budget (OMB... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-1096] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  5. [General practitioners' commitment to treating excessive alcohol consumption: A question of role security in treating affected patients?].

    Science.gov (United States)

    Fankhänel, Thomas; Rascher, Anja; Thiel, Carolin; Schulz, Katrin; Klement, Andreas

    2016-01-01

    Only a few general practitioners (GPs) are committed to screen their patients for alcohol consumption and, in case of excessive alcohol consumption conduct by a brief intervention according to WHO recommendations. Apart from inadequate compensation and work load, another barrier identified by the GPs was their uncertainty about how to deal with affected patients. Most German universities presently spend no more than 90minutes lecture time on addiction medicine teaching. Our research aims to investigate the question whether medical studies and advanced medical education increases the role security of medical students and physicians and their commitment to implementing alcohol screening and brief intervention. Moreover, we will explore whether lack of therapeutic commitment can be related to lack of role security. Questionnaires were administered to pre-clinical and clinical medical students as well as senior house officers. Role security and therapeutic commitment of students and senior house officers were assessed using the Alcohol and Alcohol Problems Questionnaire (SAAPPQ) subscales "Role Security" and "Therapeutic Commitment". Analysis was based on 367 questionnaires. As expected, senior house officers reported more Role Security than clinical medical students who showed a higher level of Role Security than pre-clinical medical students. No differences could be found for Therapeutic Commitment. An association between Role Security and Therapeutic Commitment was only revealed for clinical medical students. Medical studies and advanced medical education can increase students' and senior house officers' Role Security to treat patients with excessive alcohol consumption, but not Therapeutic Commitment. Moreover, no association between Role Security and Therapeutic Commitment could be found for senior house officers. Hence, it may be assumed that educational activities aiming to increase Role Security do not promote the development of motivational aspects such as

  6. 13 CFR 102.35 - Use and collection of Social Security Numbers.

    Science.gov (United States)

    2010-01-01

    ... § 102.35 Use and collection of Social Security Numbers. Each Program/Support Office Head or designee... their social security numbers, unless: (1) The collection is authorized either by a statute; or (2) The social security numbers are required under statute or regulation adopted prior to 1975 to verify the...

  7. 75 FR 43492 - Federal Advisory Committee; National Security Education Board; Charter Renewal

    Science.gov (United States)

    2010-07-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; National Security... Department of Defense gives notice that it is renewing the charter for the National Security Education Board... awards that favors individuals expressing an interest in national security issues or pursuing a career in...

  8. 77 FR 43100 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-009...

    Science.gov (United States)

    2012-07-23

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Mary Ellen Callahan (703) 235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0097] Privacy Act of... Assistance Grant Programs System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system...

  9. 76 FR 58226 - Waiver of Citizenship Requirements for Crewmembers on Commercial Fishing Vessels; Correction

    Science.gov (United States)

    2011-09-20

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 46 CFR Part 28 [Docket No. USCG-2011-0887] RIN 1625-AB61 Waiver of Citizenship Requirements for Crewmembers on Commercial Fishing Vessels; Correction... August 18, 2011, entitled ``Waiver of Citizenship Requirements for Crewmembers on Commercial Fishing...

  10. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    Science.gov (United States)

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  11. 17 CFR 200.19c - Director of the Office of Compliance Inspections and Examinations.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Director of the Office of Compliance Inspections and Examinations. 200.19c Section 200.19c Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organizatio...

  12. 33 CFR 6.18-1 - Violations.

    Science.gov (United States)

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL PROTECTION AND SECURITY..., officer, or person in charge, or any member of the crew of any such vessel fails to comply with any..., furniture, and equipment, shall be subject to seizure and forfeiture to the United States in the same manner...

  13. 33 CFR 165.110 - Safety and Security Zone; Liquefied Natural Gas Carrier Transits and Anchorage Operations, Boston...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone... Limited Access Areas First Coast Guard District § 165.110 Safety and Security Zone; Liquefied Natural Gas.... The following areas are safety and security zones: (1) Vessels underway. All navigable waters of the...

  14. 78 FR 23573 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-19

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... Information Management, telephone 202-475-3532, or fax 202-475-3929, for questions on these documents. Contact... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0233] Information Collection Request to...

  15. 78 FR 54667 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-09-05

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... Information Management, telephone 202-475-3532, or fax 202-475-3929, for questions on these documents. Contact... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0779] Information Collection Requests to...

  16. 76 FR 46827 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-08-03

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on these documents. Contact... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0728] Information Collection Request to...

  17. 77 FR 74686 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-12-17

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on these documents. Contact... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-1047] Information Collection Request to...

  18. 78 FR 26798 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-05-08

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... Information Management, telephone 202-475-3532, or fax 202-475-3929, for questions on these documents. Contact... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0222] Information Collection Request to...

  19. Feasibility study for CPR1000 incore measurement instrumentation educed from the reactor pressure vessel upper head

    International Nuclear Information System (INIS)

    Guang Jianwei; Liu Qian; Li Wenhong; Duan Yuangang

    2010-01-01

    The article discusses about the feasibility of in-core measurement instrumentation educed from the reactor pressure vessel (RPV) upper head. Incore instrumentation educed from the reactor pressure vessel upper head is one of advanced technology in the third generation nuclear power plant. This technology can reduce the manufacture problem of RPV; decrease the manufacture time effectively. Furthermore, this technology can get rid of the trouble for loss of water caused by many penetrations in the RPV bottom head, can increase security of nuclear power plant. By the description of structure analysis, comparison, maturity for four type incore instrumentation detectors, the incore instrumentation can be educed from RPV upper head, which can increase reactor's security, reduce the manufacture time, decrease group dose in refueling period. The core design ability can be enhanced through this study. (authors)

  20. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Science.gov (United States)

    2011-04-05

    ... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need the Social Security Number of the... request (ICR) 3206-0144, We Need the Social Security Number of the Person Named Below, RI 38-45. As... Operations, Retirement Services, Office of Personnel Management. Title: We Need the Social Security Number of...

  1. 13 CFR 102.33 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Security of systems of records....33 Security of systems of records. (a) Each Program/Support Office Head or designee shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent...

  2. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  3. TRAINING OF DEVELOPMENT OF SKILLS OF PROFESSIONAL COMMUNICATION THE SECURITY OFFICER OF THE CRIMINAL INVESTIGATION DEPARTMENT OF THE INTERNAL AFFAIRS

    Directory of Open Access Journals (Sweden)

    Yuliya Leonidovna Lampusova

    2015-08-01

    Full Text Available Training is a form of active learning that is aimed at developing knowledge, skills, and attitudes. To improve operational security officers of Internal Affairs Agencies activity, we have schemed out training for the development of communication skills. This paper presents the exercises focusing on the professional communication skills of employees of the Criminal Investigation Department of the Interior development. Eight exercises are described, the main objectives of them are: learning to navigate the feelings of the partner, the ability to change the position of the interlocutor, the formation of the ability to listen to the end and not to interrupt, developing the ability to talk, improving the communicative competence and the development of the ability to accurately convey information.

  4. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  5. 76 FR 30374 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-25

    ... http://www.regulations.gov on or before July 25, 2011 or reach the Docket Management Facility by that... that occur on the vessel, and provide law enforcement officials in the course and scope of an... industry best practices for placement and retention of video recording devices exist? If yes, please...

  6. Security Police Officer Utilization Field, AFSCs 8111, 8116, 8121, and 8124.

    Science.gov (United States)

    1981-06-01

    STATEMENT A M C Approved for public release 82 0 4 26Distribution Unlimited C=DCC=D= APS 8 1 X CECI I CODING INSTRUCTIONS -- -- -" Print the booklet copy...m == NAME (Last, First, Middle Initial) DATE OF BIRTH SEX YR NO DAY (MALE -"(11-34) (3s-5- rayo (41) PRESENT GRADE: SOCIAL SECURITY ACCOUNT NUMBER...Branch - 11. OIC Missile Support Branch - __m 12. OIC Weapons Systems Security , 4 8 CODE 99 X ~.t ! AFS 81XX -mmm -C - . .’ .9 - =, BACKGROUND

  7. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Science.gov (United States)

    2010-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of the...

  8. Professionalization of the Senior Chinese Officer Corps Trends and Implications

    National Research Council Canada - National Science Library

    Mulvenon, James

    1997-01-01

    ... consequences for longer-term U.S. national security interests. Specifically, this report evaluates demographic and cohort changes in the officer corps of the Chinese People's Liberation Army (PLA...

  9. Information security governance simplified from the boardroom to the keyboard

    CERN Document Server

    Fitzgerald, Todd

    2011-01-01

    Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security d

  10. Business processes in the RFID-equipped restricted access administrative office

    Directory of Open Access Journals (Sweden)

    Robert Waszkowski

    2016-01-01

    Full Text Available The paper presents business processes in the RFID-equipped restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. The presented models include the fact that the facilities in the secret office (cabinet, sluice, photocopier, desks are equipped with the RFID reader, which allows to immediately read the documents that are within their reach.

  11. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  12. US statutes of general interest to safeguards and security officers

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1988-09-01

    This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)

  13. Primo vessel inside a lymph vessel emerging from a cancer tissue.

    Science.gov (United States)

    Lee, Sungwoo; Ryu, Yeonhee; Cha, Jinmyung; Lee, Jin-Kyu; Soh, Kwang-Sup; Kim, Sungchul; Lim, Jaekwan

    2012-10-01

    Primo vessels were observed inside the lymph vessels near the caudal vena cava of a rabbit and a rat and in the thoracic lymph duct of a mouse. In the current work we found a primo vessel inside the lymph vessel that came out from the tumor tissue of a mouse. A cancer model of a nude mouse was made with human lung cancer cell line NCI-H460. We injected fluorescent nanoparticles into the xenografted tumor tissue and studied their flow in blood, lymph, and primo vessels. Fluorescent nanoparticles flowed through the blood vessels quickly in few minutes, and but slowly in the lymph vessels. The bright fluorescent signals of nanoparticles disappeared within one hour in the blood vessels but remained much longer up to several hours in the case of lymph vessels. We found an exceptional case of lymph vessels that remained bright with fluorescence up to 24 hours. After detailed examination we found that the bright fluorescence was due to a putative primo vessel inside the lymph vessel. This rare observation is consistent with Bong-Han Kim's claim on the presence of a primo vascular system in lymph vessels. It provides a significant suggestion on the cancer metastasis through primo vessels and lymph vessels. Copyright © 2012. Published by Elsevier B.V.

  14. Using perforators as recipient vessels (supermicrosurgery) for free flap reconstruction of the knee region.

    Science.gov (United States)

    Hong, Joon Pio; Koshima, Isao

    2010-03-01

    The purpose of this article is to evaluate the feasibility of a perforator as a recipient vessel to reconstruct soft tissue defects of the knee region.From December of 2006 to August of 2008, total of 25 patients underwent reconstructive procedure using either an anterolateral thigh or an upper medial thigh perforator flap. The flaps were anastomosed in a perforator to perforator manner using supermicrosurgery technique.Minimum of 3 perforators were traced around the knee defect. All flaps survived attached to a recipient perforator with artery diameter ranging from 0.4 to 0.9 mm and accompanying veins ranging from 0.4 to 1.2 mm. This approach allowed reduction in time for pedicle and recipient vessel dissection and minimized the trauma involved during isolation of the vessels.Using the perforator as recipient vessel allows an increase in selection for choice of recipient. By using a perforator as recipient, less time is consumed to secure the vessel, does not need long pedicles for flap, is not bound by the condition of major arteries, and minimizes any risk for major vessel injury while having acceptable flap survival.

  15. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  16. [Key vessels assessment and operation highlights in laparoscopic extended right hemicolectomy].

    Science.gov (United States)

    Wang, Hao; Zhao, Quanquan

    2018-03-25

    Laparoscopic radical colectomies have been more widely used gradually, among which laparoscopic extended right hemicolectomy is considered as the most difficult procedure. The difficulty of extended right hemicolectomy lies in the need to dissect lymph nodes along the superior mesenteric vein (SMV) and disconnect numerous and possible aberrant vessels. To address this problem, we emphasize two points in key vessel assessment: getting familiar with the anatomy along the medial-to-lateral approach and having a good understanding about the preoperative imaging presentations. An accurately preoperative imaging assessment by abdominal enhanced CT can help the surgeon understand the relative position of the key vessels to be dealt with during operation and the situation of the possible aberrant vessels so as to guide the procedure more effectively and facilitate the prevention and management of the intraoperative complications. During operation, the operator should pay special attention to the management of the vessels in the ileocolic vessel region, Henle's trunk and middle colon vessels. The operation highlights of the key vessels are as follows: (1) The ileocolic vessels: identifying the Toldt's gap correctly and opening the vascular sheath of the SMV securely; making sure that the duodenum is well protected. (2) Henle's trunk: dissecting along the surface of the Henle's trunk; preserving the anterior superior pancreaticoduodenal vein (ASPDV) and main trunk of the Henle's trunk; disconnecting the roots of the right colic vein (RCV) and right gastroepiploic vein (RGEV), and then dissecting lymph nodes along the surface of the pancreas. (3) The middle colon vessels: identifying the root of the middle colon vessel along the lower edge of the pancreas; avoiding entering behind the pancreas; mobilizing the transverse mesocolon sufficiently along the surface of the pancreas. Finally, we discuss and analyze the disputes currently existing in laparoscopic extended right

  17. Fine-grained visual marine vessel classification for coastal surveillance and defense applications

    Science.gov (United States)

    Solmaz, Berkan; Gundogdu, Erhan; Karaman, Kaan; Yücesoy, Veysel; Koç, Aykut

    2017-10-01

    The need for capabilities of automated visual content analysis has substantially increased due to presence of large number of images captured by surveillance cameras. With a focus on development of practical methods for extracting effective visual data representations, deep neural network based representations have received great attention due to their success in visual categorization of generic images. For fine-grained image categorization, a closely related yet a more challenging research problem compared to generic image categorization due to high visual similarities within subgroups, diverse applications were developed such as classifying images of vehicles, birds, food and plants. Here, we propose the use of deep neural network based representations for categorizing and identifying marine vessels for defense and security applications. First, we gather a large number of marine vessel images via online sources grouping them into four coarse categories; naval, civil, commercial and service vessels. Next, we subgroup naval vessels into fine categories such as corvettes, frigates and submarines. For distinguishing images, we extract state-of-the-art deep visual representations and train support-vector-machines. Furthermore, we fine tune deep representations for marine vessel images. Experiments address two scenarios, classification and verification of naval marine vessels. Classification experiment aims coarse categorization, as well as learning models of fine categories. Verification experiment embroils identification of specific naval vessels by revealing if a pair of images belongs to identical marine vessels by the help of learnt deep representations. Obtaining promising performance, we believe these presented capabilities would be essential components of future coastal and on-board surveillance systems.

  18. Protecting nuclear power plants. Chapter 2. On the importance of the security and safety of the reactor pressure vessel to external threats

    International Nuclear Information System (INIS)

    Ballesteros, A.; Gonzalez, J.; Debarberis, L.

    2006-01-01

    Nuclear power plants have blong been recognized as potential targets of terrorist attacks, and critics have long questioned the adequacy of the existing measures to defend against such attacks. The 11-S 2001, 11-M 2004 and 7-J 2005 attacks in USA, Spain and UK illustrated the deadly intention and abilities of modern terrorist groups. These attacks also brought to surface long standing concerns about the vulnerability of nuclear installations to possible terrorist attacks. Commercial nuclear reactors contain large inventory of radioactive fission products which, if dispersed, could pose a direct radiation hazard on the population. The reactor pressure vessel (RPV), which contains the nuclear fuel, is the most critical component of the plant. This paper shows that small amount of explosive material can produce irreversible damage in the RPV and the release of radioactive material. Therefor, access of working personal to the vicinity of the RPV during the refuelling outage should be stricktly limited. It should be considered a high priority security issue

  19. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Amended Record of Decision... National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of... Manager, Office of Fissile Materials Disposition, National Nuclear Security Administration, U.S...

  20. Lethal stakes: rig-hand killings show rising security risks abroad

    Energy Technology Data Exchange (ETDEWEB)

    Lorenz, A

    1999-05-03

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards.

  1. Lethal stakes: rig-hand killings show rising security risks abroad

    International Nuclear Information System (INIS)

    Lorenz, A.

    1999-01-01

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards

  2. Securing IoT Devices at CERN

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    CERN has more than 1000 Internet of Things (IoT) devices, which are connected to the office network. We have been doing the research to find all vulnerable IoT devices in CERN and mitigated them. We are currently working on detecting IoT devices automatically and, moreover, identifying the manufacturer, model and the running firmware version. This will help the CERN Computer Security Team to spot vulnerable devices and to show the security risks associated with them.

  3. Task team approach to safeguards and security designs

    International Nuclear Information System (INIS)

    Zack, N.R.; Wilkey, D.D.

    1991-01-01

    In 1987, a U.S. department of Energy (DOE) supported task team was organized at the request of the DOE Idaho Field Office (DOE-ID) to provide support for safeguards and security (S and S) designs of the Special Isotope Separation (SIS) facility. Prior to deferral of the project, the SIS facility was to be constructed at the Idaho National Engineering Laboratory (INEL) to produce weapons grade plutonium from DOE owned fuel grade plutonium. The task team was assembled to provide the resources necessary to assure that S and S considerations were included as an integral part of the design of the facility, and that SIS designs would take advantage of available technology in the areas of physical security, measurements, accountability, and material and personnel tracking. The task team included personnel from DOE/Office of Safeguards and Security (DOE-OSS), DOE-ID, DOE contractors, and the national laboratories providing a wide range of expertise and experience. This paper reports that the team reviewed proposed designs and provided recommendations for safeguards and security features in each stage of the design process. The value of this approach to safeguards and security designs will be discussed with respect to benefits, lessons learned, and recommendations for future applications

  4. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Science.gov (United States)

    2010-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  5. Scoping Study of Airlift Circulation Technologies for Supplemental Mixing in Pulse Jet Mixed Vessels

    Energy Technology Data Exchange (ETDEWEB)

    Schonewill, Philip P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Berglin, Eric J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Boeringa, Gregory K. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Buchmiller, William C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burns, Carolyn A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Minette, Michael J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-04-07

    At the request of the U.S. Department of Energy Office of River Protection, Pacific Northwest National Laboratory (PNNL) conducted a scoping study to investigate supplemental technologies for supplying vertical fluid motion and enhanced mixing in Waste Treatment and Immobilization Plant (WTP) vessels designed for high solids processing. The study assumed that the pulse jet mixers adequately mix and shear the bottom portion of a vessel. Given that, the primary function of a supplemental technology should be to provide mixing and shearing in the upper region of a vessel. The objective of the study was to recommend a mixing technology and configuration that could be implemented in the 8-ft test vessel located at Mid-Columbia Engineering (MCE). Several mixing technologies, primarily airlift circulator (ALC) systems, were evaluated in the study. This technical report contains a review of ALC technologies, a description of the PNNL testing and accompanying results, and recommended features of an ALC system for further study.

  6. Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  7. Office of Child Support and Enforcement (OCSE) State Wage Alerts

    Data.gov (United States)

    Social Security Administration — The OCSE State Wage Alert is a quarterly match which detects SSI overpayments by identifying unreported wage and unemployment data provided to the Office of Child...

  8. Spent nuclear fuel assembly storage vessel

    International Nuclear Information System (INIS)

    Yagishita, Takuya

    1998-01-01

    The vessel of the present invention promotes an effect of removing after heat of spent nuclear fuel assemblies so as not to give force to the storage vessel caused by expansion of heat removing partitioning plates. Namely, the vessel of the present invention comprises a cylinder body having closed upper and lower portions and a plurality of heat removing partitioning cylinders disposed each at a predetermined interval in the circumferential direction of the above-mentioned cylinder body. The heat removing partitioning cylinders comprises (1) first heat removing partitioning plates extended in the radial direction of the cylinder body and opposed at a predetermined gap in the circumferential direction of the cylinder body, and having the base ends on the side of the inner wall of the cylinder body being secured to the inner wall of the cylinder body and (2) a second heat removing plate for connecting the top ends of both opposed heat removing partitioning plates on the central side of the cylinder body with each other. Spent nuclear fuel assemblies are contained in a plurality of closed spaces surrounded by the first heat removing partitioning plates and the second heat removing partitioning plate. With such constitution, since after heat is partially transferred from the heat removing partitioning plates to the cylindrical body directly by heat conduction, the heat removing effect can be promoted compared with the prior art. (I.S.)

  9. 7 CFR 2.91 - Director, Office of Operations.

    Science.gov (United States)

    2010-01-01

    ..., excess property pool, resource recovery, shipping and receiving, forms, labor services, issuing of... maintaining the security of physical facilities, self-protection, and warden services, in the Washington, DC..., Office of Operations: (1) Provide services for Department headquarters in the Washington, DC metropolitan...

  10. 15 CFR 730.9 - Organization of the Bureau of Industry and Security.

    Science.gov (United States)

    2010-01-01

    ... Enforcement Analysis and the Office of Antiboycott Compliance. The roles of these units are described on BIS's...-units: the Office of Nonproliferation and Treaty Compliance, the Office of National Security and... Operating Committee are described in § 750.4(f)(1) of the EAR. The roles of the other units are described on...

  11. Preliminary structural evaluations of the STAR-LM reactor vessel and the support design

    International Nuclear Information System (INIS)

    Koo, Gyeong-Hoi; Sienicki, James J.; Moisseytsev, Anton

    2007-01-01

    In this paper, preliminary structural evaluations of the reactor vessel and support design of the STAR-LM (The Secure, Transportable, Autonomous Reactor - Liquid Metal variant), which is a lead-cooled reactor, are carried out with respect to an elevated temperature design and seismic design. For an elevated temperature design, the structural integrity of a direct coolant contact to the reactor vessel is investigated by using a detail structural analysis and the ASME-NH code rules. From the results of the structural analyses and the integrity evaluations, it was found that the design concept of a direct coolant contact to the reactor vessel cannot satisfy the ASME-NH rules for a given design condition. Therefore, a design modification with regards to the thermal barrier is introduced in the STAR-LM design. For a seismic design, detailed seismic time history response analyses for a reactor vessel with a consideration of a fluid-structure interaction are carried out for both a top support type and a bottom support type. And from the results of the hydrodynamic pressure responses, an investigation of the minimum thickness design of the reactor vessel is tentatively carried out by using the ASME design rules

  12. Security culture: One for all, and all for one

    International Nuclear Information System (INIS)

    Gaspar, Milos

    2016-01-01

    Preventing the theft of nuclear material and attacks and sabotage against nuclear installations is a challenge that governments, nuclear regulators and operators around the world are increasingly facing. “Terrorism is a real threat that exists around the world and also in Indonesia. And it can affect nuclear security,” said Khairul Khairul, a senior nuclear security officer at Indonesia’s National Nuclear Energy Agency (BATAN), which operates three research reactors. “We need to strengthen the notion of nuclear security in our entire workforce by developing a strong nuclear security culture.”

  13. Nevada National Security Site Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  14. Emergency retraction mechanism for the manipulator arm of a nuclear reactor vessel inspection apparatus

    International Nuclear Information System (INIS)

    1980-01-01

    Nuclear reactor vessels are made using numerous welds. These have to be inspected, often using ultrasonic transducers mounted on a manipulator arm. This invention seeks to solve the problem of retracting the manipulator arm should an emergency occur while it is fully extended, particularly within one of the reactor vessel nozzles. Of specific concern is the situation where power fails with the manipulator arm so extended. Details are given of an emergency retraction mechanism for use in reactor vessel inspection apparatus. A manual retraction means is used; the manipulator arm is slidably mounted within a frame. This comprises a member mounted on the arm for looping engagement by a cable, the cable being fixed at one end of the arm frame and engaging the member, and a clamp for detachably securing the cable at its other end to the arm frame at a point which is accessible from above the vessel. (U.K.)

  15. Lawrence Livermore National Laboratory Safeguards and Security quarterly progress report ending March 31, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Davis, B.; Davis, G.; Johnson, D.; Mansur, D.L.; Ruhter, W.D.; Strait, R.S.

    1996-04-01

    LLNL carries out safeguards and security activities for DOE Office of Safeguards and Security (OSS) and other organizations within and outside DOE. LLNL is supporting OSS in 6 areas: safeguards technology, safeguards and materials accountability, computer security--distributed systems, complex-wide access control, standardization of security systems, and information technology and security center. This report describes the activities in each of these areas.

  16. NEAR REAL-TIME AUTOMATIC MARINE VESSEL DETECTION ON OPTICAL SATELLITE IMAGES

    Directory of Open Access Journals (Sweden)

    G. Máttyus

    2013-05-01

    Full Text Available Vessel monitoring and surveillance is important for maritime safety and security, environment protection and border control. Ship monitoring systems based on Synthetic-aperture Radar (SAR satellite images are operational. On SAR images the ships made of metal with sharp edges appear as bright dots and edges, therefore they can be well distinguished from the water. Since the radar is independent from the sun light and can acquire images also by cloudy weather and rain, it provides a reliable service. Vessel detection from spaceborne optical images (VDSOI can extend the SAR based systems by providing more frequent revisit times and overcoming some drawbacks of the SAR images (e.g. lower spatial resolution, difficult human interpretation. Optical satellite images (OSI can have a higher spatial resolution thus enabling the detection of smaller vessels and enhancing the vessel type classification. The human interpretation of an optical image is also easier than as of SAR image. In this paper I present a rapid automatic vessel detection method which uses pattern recognition methods, originally developed in the computer vision field. In the first step I train a binary classifier from image samples of vessels and background. The classifier uses simple features which can be calculated very fast. For the detection the classifier is slided along the image in various directions and scales. The detector has a cascade structure which rejects most of the background in the early stages which leads to faster execution. The detections are grouped together to avoid multiple detections. Finally the position, size(i.e. length and width and heading of the vessels is extracted from the contours of the vessel. The presented method is parallelized, thus it runs fast (in minutes for 16000 × 16000 pixels image on a multicore computer, enabling near real-time applications, e.g. one hour from image acquisition to end user.

  17. Near Real-Time Automatic Marine Vessel Detection on Optical Satellite Images

    Science.gov (United States)

    Máttyus, G.

    2013-05-01

    Vessel monitoring and surveillance is important for maritime safety and security, environment protection and border control. Ship monitoring systems based on Synthetic-aperture Radar (SAR) satellite images are operational. On SAR images the ships made of metal with sharp edges appear as bright dots and edges, therefore they can be well distinguished from the water. Since the radar is independent from the sun light and can acquire images also by cloudy weather and rain, it provides a reliable service. Vessel detection from spaceborne optical images (VDSOI) can extend the SAR based systems by providing more frequent revisit times and overcoming some drawbacks of the SAR images (e.g. lower spatial resolution, difficult human interpretation). Optical satellite images (OSI) can have a higher spatial resolution thus enabling the detection of smaller vessels and enhancing the vessel type classification. The human interpretation of an optical image is also easier than as of SAR image. In this paper I present a rapid automatic vessel detection method which uses pattern recognition methods, originally developed in the computer vision field. In the first step I train a binary classifier from image samples of vessels and background. The classifier uses simple features which can be calculated very fast. For the detection the classifier is slided along the image in various directions and scales. The detector has a cascade structure which rejects most of the background in the early stages which leads to faster execution. The detections are grouped together to avoid multiple detections. Finally the position, size(i.e. length and width) and heading of the vessels is extracted from the contours of the vessel. The presented method is parallelized, thus it runs fast (in minutes for 16000 × 16000 pixels image) on a multicore computer, enabling near real-time applications, e.g. one hour from image acquisition to end user.

  18. 75 FR 23212 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA

    Science.gov (United States)

    2010-05-03

    ... reason: Vessel traffic can pass safely around the security zone. If you think that your business... its effects on them and participate in the rulemaking. If the rule would affect your small business... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0021] RIN 1625...

  19. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  20. On the Adequacy of API 521 Relief-Valve Sizing Method for Gas-Filled Pressure Vessels Exposed to Fire

    Directory of Open Access Journals (Sweden)

    Anders Andreasen

    2018-03-01

    Full Text Available In this paper, the adequacy of the legacy API 521 guidance on pressure relief valve (PRV sizing for gas-filled vessels subjected to external fire is investigated. Multiple studies show that in many cases, the installation of a PRV offers little or no protection—therefore provides an unfounded sense of security. Often the vessel wall will be weakened by high temperatures, before the PRV relieving pressure is reached. In this article, a multiparameter study has been performed taking into consideration various vessel sizes, design pressures (implicitly vessel wall thickness, vessel operating pressure, fire type (pool fire or jet fire by applying the methodology presented in the Scandpower guideline. A transient thermomechanical response analysis has been carried out to accurately determine vessel rupture times. It is demonstrated that only vessels with relatively thick walls, as a result of high design pressures, benefit from the presence of a PRV, while for most cases no appreciable increase in the vessel survival time beyond the onset of relief is observed. For most of the cases studied, vessel rupture will occur before the relieving pressure of the PRV is reached.

  1. Cardiology office computer use: primer, pointers, pitfalls.

    Science.gov (United States)

    Shepard, R B; Blum, R I

    1986-10-01

    An office computer is a utility, like an automobile, with benefits and costs that are both direct and hidden and potential for disaster. For the cardiologist or cardiovascular surgeon, the increasing power and decreasing costs of computer hardware and the availability of software make use of an office computer system an increasingly attractive possibility. Management of office business functions is common; handling and scientific analysis of practice medical information are less common. The cardiologist can also access national medical information systems for literature searches and for interactive further education. Selection and testing of programs and the entire computer system before purchase of computer hardware will reduce the chances of disappointment or serious problems. Personnel pretraining and planning for office information flow and medical information security are necessary. Some cardiologists design their own office systems, buy hardware and software as needed, write programs for themselves and carry out the implementation themselves. For most cardiologists, the better course will be to take advantage of the professional experience of expert advisors. This article provides a starting point from which the practicing cardiologist can approach considering, specifying or implementing an office computer system for business functions and for scientific analysis of practice results.

  2. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Science.gov (United States)

    2010-08-16

    ... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security... Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... System Operator Security Information. Type of Request: New collection. OMB Control Number: Not yet...

  3. Hearing Office Dispositions Per ALJ Per Day Rate Ranking Report

    Data.gov (United States)

    Social Security Administration — A ranking of ODAR hearing offices by the average number of hearings dispositions per ALJ per day. The average shown will be a combined average for all ALJs working...

  4. 75 FR 74123 - Office of the Commissioner; Cost-of-Living Increase and Other Determinations for 2011; Correction

    Science.gov (United States)

    2010-11-30

    ... claiming benefits, call 1-800-772- 1213, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0054] Office of the Commissioner; Cost-of-Living Increase and Other Determinations for 2011; Correction AGENCY: Social Security Administration...

  5. A methodology for performing computer security reviews

    International Nuclear Information System (INIS)

    Hunteman, W.J.

    1991-01-01

    DOE Order 5637.1, ''Classified Computer Security,'' requires regular reviews of the computer security activities for an ADP system and for a site. Based on experiences gained in the Los Alamos computer security program through interactions with DOE facilities, we have developed a methodology to aid a site or security officer in performing a comprehensive computer security review. The methodology is designed to aid a reviewer in defining goals of the review (e.g., preparation for inspection), determining security requirements based on DOE policies, determining threats/vulnerabilities based on DOE and local threat guidance, and identifying critical system components to be reviewed. Application of the methodology will result in review procedures and checklists oriented to the review goals, the target system, and DOE policy requirements. The review methodology can be used to prepare for an audit or inspection and as a periodic self-check tool to determine the status of the computer security program for a site or specific ADP system. 1 tab

  6. A methodology for performing computer security reviews

    International Nuclear Information System (INIS)

    Hunteman, W.J.

    1991-01-01

    This paper reports on DIE Order 5637.1, Classified Computer Security, which requires regular reviews of the computer security activities for an ADP system and for a site. Based on experiences gained in the Los Alamos computer security program through interactions with DOE facilities, the authors have developed a methodology to aid a site or security officer in performing a comprehensive computer security review. The methodology is designed to aid a reviewer in defining goals of the review (e.g., preparation for inspection), determining security requirements based on DOE policies, determining threats/vulnerabilities based on DOE and local threat guidance, and identifying critical system components to be reviewed. Application of the methodology will result in review procedures and checklists oriented to the review goals, the target system, and DOE policy requirements. The review methodology can be used to prepare for an audit or inspection and as a periodic self-check tool to determine the status of the computer security program for a site or specific ADP system

  7. 75 FR 43579 - Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and...

    Science.gov (United States)

    2010-07-26

    ... the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of Management and... safeguards for disclosure of Social Security benefit information to OPM via direct computer link for the... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  8. 78 FR 3474 - Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and...

    Science.gov (United States)

    2013-01-16

    ... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  9. 33 CFR 165.552 - Security Zone; Oyster Creek Generation Station, Forked River, Ocean County, New Jersey.

    Science.gov (United States)

    2010-07-01

    ... Generation Station, Forked River, Ocean County, New Jersey. 165.552 Section 165.552 Navigation and Navigable... Coast Guard District § 165.552 Security Zone; Oyster Creek Generation Station, Forked River, Ocean... part. (2) No person or vessel may enter or navigate within this security zone unless authorized to do...

  10. 46 CFR 27.205 - What are the requirements for internal communication systems on towing vessels?

    Science.gov (United States)

    2010-10-01

    ... systems on towing vessels? 27.205 Section 27.205 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... fitted with a communication system between the engine room and the operating station that— (1) Consists... required to have internal communication systems. (c) When the operating-station's engine controls and the...

  11. 76 FR 17158 - Assumption Buster Workshop: Distributed Data Schemes Provide Security

    Science.gov (United States)

    2011-03-28

    ... national security systems, is seeking expert participants in a day-long workshop on the pros and cons of... AGENCY: The National Coordination Office (NCO) for the Networking and Information Technology Research and... Office for the Networking and Information Technology Research and Development (NITRD) Program on behalf...

  12. Security and the 2015 elections: issues and perspectives | Attoh Ph ...

    African Journals Online (AJOL)

    Politics is the quest for power, influence and authority and for the simple reason that political office aids the allocation of resources in transition states it is often viewed as warfare with attendant security implications. Security which is the freedom from danger or damage whether physical or emotional is imperative in the ...

  13. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Science.gov (United States)

    2010-02-23

    ... Policy, U.S. Department of Homeland Security, Washington, DC 20528. For privacy issues please contact... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0040] Privacy Act of... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY...

  14. Affairs of State: The Interagency and National Security

    National Research Council Canada - National Science Library

    Marcella, Gabriel

    2008-01-01

    The war colleges of the United States are a unique national asset. They are centers of academic excellence for preparing military and civilian officers for higher positions in the national security system...

  15. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-04-06

    ... issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program Records System of Records AGENCY: Privacy Office...

  16. 17 CFR 200.13b - Director of the Office of Public Affairs, Policy Evaluation, and Research.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Director of the Office of Public Affairs, Policy Evaluation, and Research. 200.13b Section 200.13b Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General...

  17. Evaluation for In-Vessel Retention Capabilities with In-Vessel Injection and External Reactor Vessel Cooling

    International Nuclear Information System (INIS)

    Lee, Jeong Seong; Ryu, In Chul; Moon, Young Tae

    2016-01-01

    If the accident has not progressed to the point of substantial changes in the core geometry, establishing adequate cooling is as straightforward as re-establishing flow through the reactor core. However, if the accident has progressed to the point where the core geometry is substantially altered as a result of material melting and relocation, as was the case in the TMI-2 accident, the means of cooling the debris are not as straightforward. From this time on, the reactor core was either completely or nearly covered by water, with high pressure injection flow initiated shortly after three hours into the accident. However, the core debris was not coolable in this configuration and a substantial quantity of molten core material drained into the bypass region, with approximately twenty metric tons of molten debris draining into the reactor pressure vessel (RPV) lower head. Hence, the core configuration developed at approximately three hours into the accident was not coolable, even submerged in water. The purpose of this paper is to evaluate in-vessel retention capabilities with in-vessel injection (IVI) and external reactor vessel cooling (ERVC) available in a reactor application by using the integrated severe accident analysis code. The MAAP5 models were improved to facilitate evaluation of the in-vessel retention capability of APR1400. In-vessel retention capabilities have been analyzed for the APR1400 using the MAAP5.03 code. The results show that in-vessel retention is feasible when in-vessel injection is initiated within a relatively short time frame under the simulation condition used in the present study

  18. Evaluation for In-Vessel Retention Capabilities with In-Vessel Injection and External Reactor Vessel Cooling

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Seong; Ryu, In Chul; Moon, Young Tae [KEPCO Engineering and Construction Co. Ltd., Deajeon (Korea, Republic of)

    2016-10-15

    If the accident has not progressed to the point of substantial changes in the core geometry, establishing adequate cooling is as straightforward as re-establishing flow through the reactor core. However, if the accident has progressed to the point where the core geometry is substantially altered as a result of material melting and relocation, as was the case in the TMI-2 accident, the means of cooling the debris are not as straightforward. From this time on, the reactor core was either completely or nearly covered by water, with high pressure injection flow initiated shortly after three hours into the accident. However, the core debris was not coolable in this configuration and a substantial quantity of molten core material drained into the bypass region, with approximately twenty metric tons of molten debris draining into the reactor pressure vessel (RPV) lower head. Hence, the core configuration developed at approximately three hours into the accident was not coolable, even submerged in water. The purpose of this paper is to evaluate in-vessel retention capabilities with in-vessel injection (IVI) and external reactor vessel cooling (ERVC) available in a reactor application by using the integrated severe accident analysis code. The MAAP5 models were improved to facilitate evaluation of the in-vessel retention capability of APR1400. In-vessel retention capabilities have been analyzed for the APR1400 using the MAAP5.03 code. The results show that in-vessel retention is feasible when in-vessel injection is initiated within a relatively short time frame under the simulation condition used in the present study.

  19. 78 FR 9709 - Draft Guidance Regarding Voluntary Inspection of Vessels for Compliance With the Maritime Labour...

    Science.gov (United States)

    2013-02-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-1066] Draft Guidance Regarding Voluntary Inspection of Vessels for Compliance With the Maritime Labour Convention, 2006 AGENCY: Coast Guard... Labour Convention, 2006 (Convention), which enters into force on August 20, 2013. The NVIC will provide...

  20. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0102] Privacy Act of... Data System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to...

  1. Low Emissions Alternative Power (LEAP) Project Office Business Team of the Aeropropulsion Research Program Office (ARPO) Org. 0140

    Science.gov (United States)

    Buttler, Jennifer A.

    2004-01-01

    The program for which I am working at this summer is Propulsion and Power/Low Emissions Alternative Power (P&P/LEAP). It invests in a fundamental TRL 1-6 research and technology portfolio that will enable the future of: Alternative fuels and/or alternative propulsion systems, non-combustion (electric) propulsion systems. P&P/LEAP will identify and capitalize on the highest potential concepts generated both internal and external to the Agency. During my 2004 summer at NASA Glenn Research Center, I worked with my mentor Barbara Mader, in the Project Office with the Business Team completing various tasks for the project and personnel. The LEAP project is a highly matrixed organization. The Project Office is responsible for the goals advocacy and dollar (budget) of the LEAP project. The objectives of the LEAP Project are to discover new energy sources and develop unconventional engines and power systems directed towards greatly reduced emissions, enable new vehicle concepts for public mobility, new science missions and national security. The Propulsion and PowerLow Emissions Alternative Power directly supports the environmental, mobility, national security objectives of the Vehicle Systems Program and the Aeronautics Technology Theme. Technology deliverables include the demonstration through integrated ground tests, a constant volume combustor in an engine system, and UAV/small transport aircraft all electric power system. My mentor serves as a key member of the management team for the Aeropropulsion Research Program Office (ARPO). She has represented the office on numerous occasions, and is a member of a number of center-wide panels/teams, such as the Space management Committee and is chair to the Business Process Consolidation Team. She is responsible for the overall coordination of resources for the Propulsion and Power Project - from advocacy to implementation. The goal for my summer at NASA was to document processes and archive program documents from the past

  2. 75 FR 21012 - Extension of Agency Information Collection Activity Under OMB Review: Highway Corporate Security...

    Science.gov (United States)

    2010-04-22

    ... Information Collection Activity Under OMB Review: Highway Corporate Security Review (CSR) AGENCY... (ICR), OMB control number 1652-0036, abstracted below to the Office of Management and Budget (OMB) for... collection to the Office of Information and Regulatory Affairs, Office of Management and Budget. Comments...

  3. 12 CFR 563g.16 - Delayed or continuous offering and sale of securities.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Delayed or continuous offering and sale of securities. 563g.16 Section 563g.16 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.16 Delayed or continuous offering and sale of securities. Any offer or...

  4. Field Office Telephone Service - Monthly National Answer Rate and Busy Rate

    Data.gov (United States)

    Social Security Administration — This dataset provides information at the national level by month for federal fiscal year 2013 onward for answer rate and busy rate for calls to our field offices....

  5. 76 FR 39887 - Extension of Agency Information Collection Activity Under OMB Review: Highway Corporate Security...

    Science.gov (United States)

    2011-07-07

    ... Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of Management... industry by way of its Highway Corporate Security Review (CSR) Program, which encompasses site visits and... the site visit, TSA personnel complete the CSR form, which asks security-related questions. This...

  6. 77 FR 25686 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Science.gov (United States)

    2012-05-01

    ... Director of the Office of Management and Budget, and the Director of NIST on security and privacy issues... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB...

  7. Multiple shell pressure vessel

    International Nuclear Information System (INIS)

    Wedellsborg, B.W.

    1988-01-01

    A method is described of fabricating a pressure vessel comprising the steps of: attaching a first inner pressure vessel having means defining inlet and outlet openings to a top flange, placing a second inner pressure vessel, having means defining inlet and outlet opening, concentric with and spaced about the first inner pressure vessel and attaching the second inner pressure vessel to the top flange, placing an outer pressure vessel, having inlet and outlet openings, concentric with and spaced apart about the second inner pressure vessel and attaching the outer pressure vessel to the top flange, attaching a generally cylindrical inner inlet conduit and a generally cylindrical inner outlet conduit respectively to the inlet and outlet openings in the first inner pressure vessel, attaching a generally cylindrical outer inlet conduit and a generally cylindrical outer outlet conduit respectively to the inlet and outlet opening in the second inner pressure vessel, heating the assembled pressure vessel to a temperature above the melting point of a material selected from the group, lead, tin, antimony, bismuth, potassium, sodium, boron and mixtures thereof, filling the space between the first inner pressure vessel and the second inner pressure vessel with material selected from the group, filling the space between the second inner pressure vessel and the outer pressure vessel with material selected from the group, and pressurizing the material filling the spaces between the pressure vessels to a predetermined pressure, the step comprising: pressurizing the spaces to a pressure whereby the wall of the first inner pressure vessel is maintained in compression during steady state operation of the pressure vessel

  8. Device for the simultaneous operation of the closing valve of a vessel and the closing valve of a transport container

    International Nuclear Information System (INIS)

    Tellier, Claude; Surriray, Michel.

    1982-01-01

    This device includes mechanisms for unlatching the closing valve of the vessel and securing it to the closing valve of the transport container and other mechanisms for vertically raising the assembly of valves, pivoting it and bringing it into a vertical position in a bulge provided in the bottom of the transport container. For example the first containment is a nuclear reactor vessel and the transport container is used for carrying an item from the vessel to an external area (for instance, a defective pump to the repair area) and for the return transport operation [fr

  9. 12 CFR 559.12 - How may a subsidiary of a savings association issue securities?

    Science.gov (United States)

    2010-01-01

    ... issue securities? 559.12 Section 559.12 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF... may a subsidiary of a savings association issue securities? (a) A subsidiary may issue, either...”) may issue. The subsidiary must not state or imply that the securities it issues are covered by federal...

  10. Cost-Benefit Analysis Methodology: Install Commercially Compliant Engines on National Security Exempted Vessels?

    Science.gov (United States)

    2015-11-05

    environment track record. Commercial compliance measures are checked to ensure the vessel can meet all intact and damage stability (center of gravity...From NAVSEA, the authors would like to thank Mr. Abe Boughner (NAVSEA 05D4); and Mr. Philip McCormick and Mr. Brittany Basilone, [NAVSEA 05C...sourceapportionmentbpttsd.pdf US EPA, 40 CFR 94 (Title 40—Protection of Environment , Chapter I – EPA, Subchapter C – Air Programs, Part 94 – Control

  11. RELIGION, PEACE AND SECURITY IN NIGERIA Osaji, Jacob ...

    African Journals Online (AJOL)

    HP

    2005-02-07

    Feb 7, 2005 ... (modern) state faces justify an assessment of the role of religion in sustaining .... fortress and refuge, thus, God becomes his Chief security officer, a .... Houses and other places of financial mismanagement, corruption, money.

  12. Reputational Penalties and the Merits of Class-Action Securities Litigation

    OpenAIRE

    Helland, Eric

    2006-01-01

    If private securities class actions alleging fraudulent behavior by officers or directors of a company are meritorious, directors and officers should pay a reputational penalty when they sit on a board of a company whose officers and directors are accused of fraud. I find little evidence of a negative effect associated with allegations of fraud. Using various definitions of board positions as a proxy for the reputation of directors who are accused of fraud, I find that the net number of board...

  13. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Science.gov (United States)

    2013-07-22

    ... titled, ``Department of Homeland Security/Federal Emergency Management Agency--006 Citizen Corps Database... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0049] Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency--006 Citizen Corps Program...

  14. Prison officers' views about hepatitis C testing and treatment: a qualitative enquiry.

    Science.gov (United States)

    Jack, Kathryn; Islip, Natalie; Linsley, Paul; Thomson, Brian; Patterson, Anne

    2017-07-01

    To explore the views of prison officers in an English category B male prison about people in prison being tested and treated for hepatitis C. Hepatitis C testing and treatment in English prisons remain low with the reasons being poorly understood. Prison officers are in continuous contact with prisoners so might observe factors that may influence people in prisons' choice in whether to accept hepatitis C testing and treatment. A qualitative design within an interpretative framework was employed. Semistructured interviews were conducted with 10 prison officers at an English male category B prison. The interviews were audiorecorded and transcribed at the prison. Four themes emerged Safeguarding, Stigma, Confidentiality and Education. Hepatitis C testing and treatment were supported in principle but if a person in prison poses a threat to the overall security of a prison, any health issues that are not immediately life threatening will be overridden, irrespective of the financial or health consequences. The prison officers respected people in prisons' confidentiality regarding health matters, but this could be compromised during violent incidents. All of the prison officers displayed limited knowledge about hepatitis C. This qualitative enquiry illustrates that prison security transcends health. This suggests that health providers may need to offer greater flexibility and collaboration across the network of National Health Service hospitals to maintain continuity in treatment if a prisoner is moved to a different establishment or liberated. This study introduces the notion that prison security staff may have a potential role in promoting or discouraging hepatitis C testing and treatment by the ways in which their knowledge impacts on their interactions with people in prison. Engaging this staff group in educational opportunities should be a component of commissioned hepatitis service delivery in prisons. © 2016 John Wiley & Sons Ltd.

  15. Variable mounting assembly for transducers employed in nuclear reactor vessel inspection apparatus

    International Nuclear Information System (INIS)

    Elsner, H.J.; Antol, R.F.; Castner, R.P.

    1979-01-01

    A positionally variable mounting assembly for transducers used to interrogate a nuclear reactor vessel is disclosed. Means are provided for clamping each transducer of an array about its flange in a central restraining block. The central restraining block is, in turn, pivotally mounted in a yoke. The yoke is movable secured to bars or rails bolted to the transducer plate and, by loosening appropriate bolts, can be moved along the ways or pivoted about one of them. Further, the restraining block can be removed from the yoke and pivotally clamped in a different orientation to upstanding brackets attached to the transducer array plate, or rotated through 90 0 and then secured again in the yoke

  16. 78 FR 31962 - Collection of Information Under Review by Office of Management and Budget

    Science.gov (United States)

    2013-05-28

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-1066] Collection of Information... Labour Convention (MLC) Navigation and Vessel Inspection Circular (NVIC). The Coast Guard will publish a... Maritime Labour Convention, 2006. The Coast Guard plans to establish a voluntary inspection program for...

  17. 20 CFR 404.943 - Responsibilities of the adjudication officer.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Responsibilities of the adjudication officer. 404.943 Section 404.943 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS... disagreement and refer the claim to the administrative law judge for further proceedings. At this point, the...

  18. 77 FR 57639 - Privacy Act; System of Records: Records of the Office of White House Liaison, State-34

    Science.gov (United States)

    2012-09-18

    ..., background and security clearance information received from Executive Offices and Bureau of Human Resources... the provisions of the Privacy Act of 1974, as amended (5 U.S.C.552a) and Office of Management and... Liaison Office for the consideration, review, clearance and appointment of an individual to a non-career...

  19. 48 CFR 352.239-72 - Security requirements for Federal information technology resources.

    Science.gov (United States)

    2010-10-01

    ..., Security Self-Assessment Guide for Information Technology Systems and FIPS 200, on an annual basis. (C) HHS... basis, the Contractor shall provide to the Contracting Officer verification that the IT-SP remains valid... Contracting Officer verification that the IT-SC&A remains valid. Evidence of a valid system accreditation...

  20. ICT-Based Framework for Improved Food Security in Nigeria ...

    African Journals Online (AJOL)

    The six regional decision support systems in this model is a comprehensive database ... from research findings and innovations, inputs from agricultural extension officers, ... Keywords: Food Security, Interactive websites, National Internet host, ...

  1. Data flow between RFID devices in a modern restricted access administrative office

    Directory of Open Access Journals (Sweden)

    Robert Waszkowski

    2016-01-01

    Full Text Available The paper presents models of data flow between RFID devices in a modern restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. The presented models include the fact that the facilities in the secret office (cabinet, sluice, photocopier, desks are equipped with the RFID reader, which allows to immediately read the documents that are within their reach.

  2. 76 FR 68809 - Bureau of International Security and Nonproliferation; Termination of Chemical and Biological...

    Science.gov (United States)

    2011-11-07

    ..., Office of Missile, Biological, and Chemical Nonproliferation, Bureau of International Security and... DEPARTMENT OF STATE [Public Notice: 7678] Bureau of International Security and Nonproliferation; Termination of Chemical and Biological Weapons (CBW) Proliferation Sanctions Against a Foreign Person AGENCY...

  3. Evaluation of Agency Non-Code Layered Pressure Vessels (LPVs). Corrected Copy, Aug. 25, 2014

    Science.gov (United States)

    Prosser, William H.

    2014-01-01

    In coordination with the Office of Safety and Mission Assurance and the respective Center Pressure System Managers (PSMs), the NASA Engineering and Safety Center (NESC) was requested to formulate a consensus draft proposal for the development of additional testing and analysis methods to establish the technical validity, and any limitation thereof, for the continued safe operation of facility non-code layered pressure vessels. The PSMs from each NASA Center were asked to participate as part of the assessment team by providing, collecting, and reviewing data regarding current operations of these vessels. This report contains the outcome of the assessment and the findings, observations, and NESC recommendations to the Agency and individual NASA Centers.

  4. 76 FR 28315 - Security Zone; Portland Rose Festival on Willamette River

    Science.gov (United States)

    2011-05-17

    ... Zone; Portland Rose Festival on Willamette River AGENCY: Coast Guard, DHS. ACTION: Notice of enforcement of regulation. SUMMARY: The Coast Guard will enforce the Portland Rose Festival Security Zone in... River during the Portland Rose festival. During the enforcement period, no person or vessel may enter or...

  5. 12 CFR 1700.2 - Organization of the Office of Federal Housing Enterprise Oversight.

    Science.gov (United States)

    2010-01-01

    ... regulatory issues, securities and corporate law principles, and administrative and general legal matters... developments in Enterprise activities, housing finance and financial regulation. The Office also prepares data...

  6. Vessel Operator System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Operator cards are required for any operator of a charter/party boat and or a commercial vessel (including carrier and processor vessels) issued a vessel permit from...

  7. Comprehending the structure of a vacuum vessel and in-vessel components of fusion machines. 1. Comprehending the vacuum vessel structure

    International Nuclear Information System (INIS)

    Onozuka, Masanori; Nakahira, Masataka

    2006-01-01

    The functions, conditions and structure of vacuum vessel using tokamak fusion machines are explained. The structural standard and code of vacuum vessel, process of vacuum vessel design, and design of ITER vacuum vessel are described. Production and maintenance of ultra high vacuum, confinement of radioactive materials, support of machines in vessel and electromagnetic force, radiation shield, plasma vertical stability, one-turn electric resistance, high temperature baking heat and remove of nuclear heat, reduce of troidal ripple, structural standard, features of safety of nuclear fusion machines, subjects of structural standard of fusion vacuum vessel, design flow of vacuum vessel, establishment of radial build, selections of materials, baking and cooling method, basic structure, structure of special parts, shield structure, and of support structure, and example of design of structure, ITER, are stated. (S.Y.)

  8. 78 FR 42149 - Privacy Act; System of Records: State-53, Office of Inspector General Investigation Management...

    Science.gov (United States)

    2013-07-15

    ... media. RETRIEVABILITY: Name, Social Security number or case number. SAFEGUARDS: All Office of Inspector... may contain names, dates of birth, passport numbers, Social Security numbers, account numbers and... response to a subpoena issued by an independent Federal agency having the power to subpoena records of...

  9. Research Awards: Agriculture and Food Security program Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... HEAD OFFICE / SIÈGE : 150 Kent Street / 150, rue Kent PO Box ... to pursue their research goals in a dynamic team environment in ... You should have an interest in agriculture, food security, nutrition, rural livelihoods, and.

  10. 76 FR 12609 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0051] Privacy Act of 1974: Implementation of Exemptions... Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  11. 7 CFR 1951.230 - Transfer of security and assumption of loans.

    Science.gov (United States)

    2010-01-01

    ... reflected in Finance Office records. (2) If the loan is evidenced and secured by a bond, procedures will be... of the borrower's counsel and OGC. The interest rate will be the rate currently reflected in Finance... Public Law 103-354 office), and will be added to the basic fee. (ii) Transfer fees will be deposited in...

  12. Privacy, Security, & Compliance: Strange Bedfellows or a Marriage Made in Heaven?

    Science.gov (United States)

    Corn, Michael; Rosenthal, Jane

    2013-01-01

    Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…

  13. 19 CFR 4.76 - Procedures and responsibilities of carriers filing outbound vessel manifest information via the AES.

    Science.gov (United States)

    2010-04-01

    ... PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY VESSELS IN FOREIGN AND DOMESTIC... (available on the Customs internet web site (www.customs.gov)). Carriers and their agents are responsible for..., participant carriers will be responsible for submitting those SEDs to Customs within four (4) business days...

  14. 78 FR 13691 - Guidance Regarding Inspection and Certification of Vessels Under the Maritime Security Program

    Science.gov (United States)

    2013-02-28

    ...-level approach would enable the Coast Guard to apply traditional inspection methods to newly reflagged... enrolled MSP vessels would continue to be inspected by the Coast Guard in a manner similar to traditional... oversight, and evaluations of Authorized Class Society (ACS) survey activities. We received eight public...

  15. Conjugate heat transfer analysis for in-vessel retention with external reactor vessel cooling

    International Nuclear Information System (INIS)

    Park, Jong-Woon; Bae, Jae-ho; Song, Hyuk-Jin

    2016-01-01

    Highlights: • A conjugate heat transfer analysis method is applied for in-vessel corium retention. • 3D heat diffusion has a formidable effect in alleviating focusing heat load from metallic layer. • The focusing heat load is decreased by about 2.5 times on the external surface. - Abstract: A conjugate heat transfer analysis method for the thermal integrity of a reactor vessel under external reactor vessel cooling conditions is developed to resolve light metal layer focusing effect issue for in-vessel retention. The method calculates steady-state three-dimensional temperature distribution of a reactor vessel using coupled conjugate heat transfer between in-vessel three-layered stratified corium (metallic pool, oxide pool and heavy metal and polar-angle dependent boiling heat transfer at the outer surface of a reactor vessel). The three-layer corium heat transfer model is utilizing lumped-parameter thermal-resistance circuit method. For the ex-vessel boiling boundary conditions, nucleate, transition and film boiling are considered. The thermal integrity of a reactor vessel is addressed in terms of heat flux at the outer-most nodes of the vessel and remaining thickness profile. The vessel three-dimensional heat conduction is validated against a commercial code. It is found that even though the internal heat flux from the metal layer goes far beyond critical heat flux (CHF) the heat flux from the outermost nodes of the vessel may be maintained below CHF due to massive vessel heat diffusion. The heat diffusion throughout the vessel is more pronounced for relatively low heat generation rate in an oxide pool. Parametric calculations are performed considering thermal conditions such as peak heat flux from a light metal layer, heat generation in an oxide pool and external boiling conditions. The major finding is that the most crucial factor for success of in-vessel retention is not the mass of the molten light metal above the oxide pool but the heat generation rate

  16. New government to make social security cutbacks

    NARCIS (Netherlands)

    Grünell, M.

    2003-01-01

    In May 2003, a new coalition government of the Christian Democrats and two liberal parties, VVD and D66, took office in the Netherlands. The parties' coalition agreement provides for major cutbacks in public spending, largely targeted on social security expenditure. The trade unions are fiercely

  17. 75 FR 29588 - Office of New Reactors: Proposed NUREG-0800; Standard Review Plan Section 13.6.6, Draft Revision...

    Science.gov (United States)

    2010-05-26

    ...; Standard Review Plan Section 13.6.6, Draft Revision 0 on Cyber Security Plan AGENCY: Nuclear Regulatory... Plants,'' on a proposed Standard Review Plan (SRP) Section 13.6.6 on ``Cyber Security Plan'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML093560837). The Office of Nuclear Security...

  18. 75 FR 36126 - Office of New Reactors; Proposed Revision to Standard Review Plan Section 13.6.1, Revision 1 on...

    Science.gov (United States)

    2010-06-24

    ... Standard Review Plan Section 13.6.1, Revision 1 on Physical Security--Combined License and Operating...), Section 13.6.1 on ``Physical Security--Combined License and Operating Reactors,'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML100350158). The Office of Nuclear Security and...

  19. Guns, guards, gates and geeks: Romania strengthens computer security at nuclear installations

    International Nuclear Information System (INIS)

    Gil, Laura

    2016-01-01

    A cyberattack could swipe all the information stored on your computer or even prevent it from working. That’s bad enough. But a cyberattack on a nuclear power plant could lead to sabotage or theft of nuclear material. Computer security, concerned with the protection of digital data and the defence of systems and networks against malicious acts, is a critical component of nuclear security. “The advance of computers and their use in all aspects of nuclear operations has changed the security paradigm,” said Donald Dudenhoeffer, Information Technology Security Officer at the IAEA. “Information and computer security must be considered as components in the overall nuclear security plan.”

  20. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  1. 48 CFR 1352.237-70 - Security processing requirements-high or moderate risk contracts.

    Science.gov (United States)

    2010-10-01

    ... background inquiries pertaining to verification of name, physical description, marital status, present and... undergo security processing by the Department's Office of Security before being eligible to work on the.... citizens must have: (1) Official legal status in the United States; (2) Continuously resided in the United...

  2. 78 FR 17939 - Announcement of Funding Awards; Capital Fund Safety and Security Grants; Fiscal Year 2012

    Science.gov (United States)

    2013-03-25

    ...; Capital Fund Safety and Security Grants; Fiscal Year 2012 AGENCY: Office of the Assistant Secretary for... availability of the Safety and Security funds with PIH Notice 2012-38 (Notice), which was issued September 7... Fund Safety and Security grant program. FOR FURTHER INFORMATION CONTACT: For questions concerning the...

  3. 78 FR 56728 - Announcement of Funding Awards; Capital Fund Safety and Security Grants; Fiscal Year 2013

    Science.gov (United States)

    2013-09-13

    ...; Capital Fund Safety and Security Grants; Fiscal Year 2013 AGENCY: Office of the Assistant Secretary for... availability of the Safety and Security funds with PIH Notice 2013-10 (Notice), which was issued May 3, 2013... Fund Safety and Security grant program. FOR FURTHER INFORMATION CONTACT: For questions concerning the...

  4. 77 FR 23492 - Announcement of Funding Awards; Capital Fund Safety and Security Grants; Fiscal Year 2011

    Science.gov (United States)

    2012-04-19

    ...; Capital Fund Safety and Security Grants; Fiscal Year 2011 AGENCY: Office of the Assistant Secretary for... notified of the availability of the Safety and Security funds with PIH Notice 2011-56 (Notice), which was... award recipients under the Capital Fund Safety and Security grant program. FOR FURTHER INFORMATION...

  5. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  6. 46 CFR 11.518 - Service requirements for chief engineer (limited oceans) of steam and/or motor vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Service requirements for chief engineer (limited oceans... Requirements for Engineer Officer § 11.518 Service requirements for chief engineer (limited oceans) of steam... engineer (limited oceans) of steam and/or motor vessels is five years total service in the engineroom of...

  7. Automated method for identification and artery-venous classification of vessel trees in retinal vessel networks.

    Science.gov (United States)

    Joshi, Vinayak S; Reinhardt, Joseph M; Garvin, Mona K; Abramoff, Michael D

    2014-01-01

    The separation of the retinal vessel network into distinct arterial and venous vessel trees is of high interest. We propose an automated method for identification and separation of retinal vessel trees in a retinal color image by converting a vessel segmentation image into a vessel segment map and identifying the individual vessel trees by graph search. Orientation, width, and intensity of each vessel segment are utilized to find the optimal graph of vessel segments. The separated vessel trees are labeled as primary vessel or branches. We utilize the separated vessel trees for arterial-venous (AV) classification, based on the color properties of the vessels in each tree graph. We applied our approach to a dataset of 50 fundus images from 50 subjects. The proposed method resulted in an accuracy of 91.44% correctly classified vessel pixels as either artery or vein. The accuracy of correctly classified major vessel segments was 96.42%.

  8. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Science.gov (United States)

    2010-04-01

    ... the amount fixed by the Office, or deposit negotiable securities under §§ 703.306 and 703.307 in that... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Filing of Agreement and Undertaking; deposit... REGULATIONS Authorization of Self-Insurers § 703.304 Filing of Agreement and Undertaking; deposit of security...

  9. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  10. 78 FR 79241 - Assessment Framework and Organizational Restatement Regarding Preemption for Certain Regulations...

    Science.gov (United States)

    2013-12-27

    .... Protection of Children J. Indian Tribal Governments K. Energy Effects L. Technical Standards M. Environment I... Guard and the officer's parent agency of safety and security zones promulgated pursuant to PWSA Title I..., unfired pressure vessels, piping, electric installations, accommodations for passengers and crew, sailing...

  11. Positioning calibration apparatus for transducers employed in nuclear reactor vessel inspection apparatus

    International Nuclear Information System (INIS)

    Elsner, H.J.

    1979-01-01

    Calibration apparatus for verifying the position and orientation of transducers used in nuclear reactor vessel inspection apparatus is disclosed. A tank, filled with water, the operating inspection medium, is fitted with a movable mounting assembly adapted to securely accommodate a transducer and the mounting assembly in which it is normally secured during an inspection procedure. The tank is also provided with a slidably mounted target positioned therein at a predetermined distance from the target which is selected to avoid the distortion effects in the near field of the transducer response. The calibration apparatus can be used to check the normal transducer mounting for either perpendicularity or angular orientation by moving the tank's mounting assembly via a lead screw with which it is threadingly engaged. 6 claims

  12. Don't Drop Your Guard: Securing Nuclear Facilities

    International Nuclear Information System (INIS)

    Lööf, Susanna

    2013-01-01

    You're never quite finished with nuclear security. ''Even the most advanced security system for radioactive or nuclear material needs to be continuously updated to ensure that it remains effective,'' says Arvydas Stadalnikas, an IAEA Senior Nuclear Security Officer. ''Security can always be improved. Even if you think you have the best system for today, it may require enhancements because of the changing environment,'' he said. To help States with this daunting task, the IAEA offers support through its International Physical Protection Advisory Service (IPPAS) which includes in-depth analysis of the physical protection and nuclear security followed by expert advice. The IAEA has carried out 58 missions to 37 countries since the IPPAS programme was launched in 1996, helping States translate international conventions, codes and guidance on nuclear security into practice. Although each mission focuses on improving the security in a specific country, ''the programme has benefits that reach far beyond the recipient State's national borders,'' Stadalnikas noted. ''Each IPPAS mission helps improve global nuclear security because enhanced security in one country means that you improve globally. Deficiencies in one country could open the way for malicious acts, which can have worldwide effects,'' he said

  13. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Determination that a chemical facility âpresents... SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.205 Determination that a chemical facility “presents a high level of security risk.” (a...

  14. Education and the Degree of Data Security

    Science.gov (United States)

    Spears, Phillip Dewitt

    2013-01-01

    New technology development has researchers inundated with a plethora of data security issues linked to cyber attacks and hackers' ability to transmogrify their techniques. The present research focused on the information technology managing officers' (ITMOs') level of education, size of organization, organization's industry, and effect they have on…

  15. 77 FR 64819 - New Agency Information Collection Activity Under OMB Review: Office of Law Enforcement/Federal...

    Science.gov (United States)

    2012-10-23

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the new Information Collection Request (ICR) abstracted below to the Office of Management and Budget (OMB) for review and approval under the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of the following collection of information on June 20, 2012, 77 FR 37062. The collection involves the reimbursement of expenses incurred by airport operators for the provision of law enforcement officers (LEOs) to support airport security checkpoint screening.

  16. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  17. Predicting malicious behavior tools and techniques for ensuring global security

    CERN Document Server

    Jackson, Gary M

    2012-01-01

    A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates ava

  18. Business of Nuclear Safety Analysis Office, Nuclear Technology Test Center

    International Nuclear Information System (INIS)

    Hayakawa, Masahiko

    1981-01-01

    The Nuclear Technology Test Center established the Nuclear Safety Analysis Office to execute newly the works concerning nuclear safety analysis in addition to the works related to the proving tests of nuclear machinery and equipments. The regulations for the Nuclear Safety Analysis Office concerning its organization, business and others were specially decided, and it started the business formally in August, 1980. It is a most important subject to secure the safety of nuclear facilities in nuclear fuel cycle as the premise of developing atomic energy. In Japan, the strict regulation of safety is executed by the government at each stage of the installation, construction, operation and maintenance of nuclear facilities, based on the responsibility for the security of installers themselves. The Nuclear Safety Analysis Office was established as the special organ to help the safety examination related to the installation of nuclear power stations and others by the government. It improves and puts in order the safety analysis codes required for the cross checking in the safety examination, and carries out safety analysis calculation. It is operated by the cooperation of the Science and Technology Agency and the Agency of Natural Resources and Energy. The purpose of establishment, the operation and the business of the Nuclear Safety Analysis Office, the plan of improving and putting in order of analysis codes, and the state of the similar organs in foreign countries are described. (Kako, I.)

  19. Plant Operations. OSHA on Campus: Campus Safety Officers Discuss Problems and Potentials

    Science.gov (United States)

    Kuchta, Joseph F.; And Others

    1973-01-01

    The Occupation Safety and Health Act (OSHA) has presented campus safety officers with new problems, but it is also offering them new potentials, which were explored at the recent national conference on Campus Security. (Editor)

  20. Pressure vessel for nuclear reactor plant consisting of several pre-stressed cast pressure vessels

    International Nuclear Information System (INIS)

    Bodmann, E.

    1984-01-01

    Several cylindrical pressure vessel components made of pressure castings are arranged on a sector of a circle around the cylindrical cast pressure vessel for accommodating the helium cooled HTR. Each component pressure vessel is connected to the reactor vessel by a horizontal gas duct. The contact surfaces between reactor and component pressure vessel are in one plane. In the spaces between the individual component pressure vessels, there are supporting blocks made of cast iron, which are hollow and also have flat surfaces. With the reactor vessel and the component pressure vessels they form a disc-shaped connecting part below and above the gas ducts. (orig./PW)

  1. Safeguards and security deficiencies fulfilled through technology development

    International Nuclear Information System (INIS)

    Smoot, W.

    1996-01-01

    The Office of Safeguards and Security (OSS) sponsors research and development activities based on identified field and headquarters customer requirements. Annually, a formal solicitation of safeguards and security user needs is conducted. Currently, there are over 300 valid safeguards and security deficiencies that have been identified. These user needs serve as the basis for formulating the OSS Technology Development Program (TDP). Due to budget constraints, the TDP can only address approximately 47% of these needs in FY 1996. This paper will discuss, in a general sense, the current deficiencies and how the TDP is responding to each. Specifically, the paper will highlight technologies in the areas of Material Control and Accounting, Physical Security, and Information Security. A brief discussion of unfulfilled user requirements will also be presented as a catalyst for leveraging available or developing technologies from other similar programs or from private industry

  2. 20 CFR 703.205 - Filing of Agreement and Undertaking; deposit of security.

    Science.gov (United States)

    2010-04-01

    ...— (1) Deposit with the Branch indemnity bonds or letters of credit in the amount fixed by the Office... and payable from the proceeds of the deposited security; (b) Give security in the amount fixed in the... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Filing of Agreement and Undertaking; deposit...

  3. Report: Improvements Needed in Key EPA Information System Security Practices

    Science.gov (United States)

    Report #10-P-0146, June 15, 2010. Williams Adley found that EPA program offices lacked evidence that they planned and executed tests of information system security controls as required by federal requirements.

  4. A fracture mechanics and reliability based method to assess non-destructive testings for pressure vessels

    International Nuclear Information System (INIS)

    Kitagawa, Hideo; Hisada, Toshiaki

    1979-01-01

    Quantitative evaluation has not been made on the effects of carrying out preservice and in-service nondestructive tests for securing the soundness, safety and maintainability of pressure vessels, spending large expenses and labor. Especially the problems concerning the time and interval of in-service inspections lack the reasonable, quantitative evaluation method. In this paper, the problems of pressure vessels are treated by having developed the analysis method based on reliability technology and probability theory. The growth of surface cracks in pressure vessels was estimated, using the results of previous studies. The effects of nondestructive inspection on the defects in pressure vessels were evaluated, and the influences of many factors, such as plate thickness, stress, the accuracy of inspection and so on, on the effects of inspection, and the method of evaluating the inspections at unequal intervals were investigated. The analysis of reliability taking in-service inspection into consideration, the evaluation of in-service inspection and other affecting factors through the typical examples of analysis, and the review concerning the time of inspection are described. The method of analyzing the reliability of pressure vessels, considering the growth of defects and preservice and in-service nondestructive tests, was able to be systematized so as to be practically usable. (Kako, I.)

  5. Probabilistic retinal vessel segmentation

    Science.gov (United States)

    Wu, Chang-Hua; Agam, Gady

    2007-03-01

    Optic fundus assessment is widely used for diagnosing vascular and non-vascular pathology. Inspection of the retinal vasculature may reveal hypertension, diabetes, arteriosclerosis, cardiovascular disease and stroke. Due to various imaging conditions retinal images may be degraded. Consequently, the enhancement of such images and vessels in them is an important task with direct clinical applications. We propose a novel technique for vessel enhancement in retinal images that is capable of enhancing vessel junctions in addition to linear vessel segments. This is an extension of vessel filters we have previously developed for vessel enhancement in thoracic CT scans. The proposed approach is based on probabilistic models which can discern vessels and junctions. Evaluation shows the proposed filter is better than several known techniques and is comparable to the state of the art when evaluated on a standard dataset. A ridge-based vessel tracking process is applied on the enhanced image to demonstrate the effectiveness of the enhancement filter.

  6. Detection of small surface vessels in near, medium, and far infrared spectral bands

    Science.gov (United States)

    Dulski, R.; Milewski, S.; Kastek, M.; Trzaskawka, P.; Szustakowski, M.; Ciurapinski, W.; Zyczkowski, M.

    2011-11-01

    Protection of naval bases and harbors requires close co-operation between security and access control systems covering land areas and those monitoring sea approach routes. The typical location of naval bases and harbors - usually next to a large city - makes it difficult to detect and identify a threat in the dense regular traffic of various sea vessels (i.e. merchant ships, fishing boats, tourist ships). Due to the properties of vessel control systems, such as AIS (Automatic Identification System), and the effectiveness of radar and optoelectronic systems against different targets it seems that fast motor boats called RIB (Rigid Inflatable Boat) could be the most serious threat to ships and harbor infrastructure. In the paper the process and conditions for the detection and identification of high-speed boats in the areas of ports and naval bases in the near, medium and far infrared is presented. Based on the results of measurements and recorded thermal images the actual temperature contrast delta T (RIB / sea) will be determined, which will further allow to specify the theoretical ranges of detection and identification of the RIB-type targets for an operating security system. The data will also help to determine the possible advantages of image fusion where the component images are taken in different spectral ranges. This will increase the probability of identifying the object by the multi-sensor security system equipped additionally with the appropriate algorithms for detecting, tracking and performing the fusion of images from the visible and infrared cameras.

  7. ITER vacuum vessel design and electromagnetic analysis on in-vessel components

    International Nuclear Information System (INIS)

    Ioki, K.; Johnson, G.; Shimizu, K.; Williamson, D.; Iizuka, T.

    1995-01-01

    Major functional requirements for the vacuum vessel are to provide the first safety barrier and to support electromagnetic loads due to plasma disruptions and vertical displacement events, and to withstand plausible accidents without losing confinement. A double wall structure concept has been developed for the vacuum vessel due to its beneficial characteristics from the viewpoints of structural integrity and electrical continuity. An electromagnetic analysis of the blanket modules and the vacuum vessel has been performed to investigate force distributions on in-vessel components. According to the vertical displacement events (VDE) scenario, which assumes a critical q-value of 1.5, the total downward vertical force, induced by coupling between the eddy current and external fields, is about 110 MN. We have performed a stress analysis for the vacuum vessel using the VDE disruption forces acting on the blankets, and a maximum stress intensity of 112 MPa was obtained in the vicinity of the lower support of the vessel. (orig.)

  8. An automated vessel segmentation of retinal images using multiscale vesselness

    International Nuclear Information System (INIS)

    Ben Abdallah, M.; Malek, J.; Tourki, R.; Krissian, K.

    2011-01-01

    The ocular fundus image can provide information on pathological changes caused by local ocular diseases and early signs of certain systemic diseases, such as diabetes and hypertension. Automated analysis and interpretation of fundus images has become a necessary and important diagnostic procedure in ophthalmology. The extraction of blood vessels from retinal images is an important and challenging task in medical analysis and diagnosis. In this paper, we introduce an implementation of the anisotropic diffusion which allows reducing the noise and better preserving small structures like vessels in 2D images. A vessel detection filter, based on a multi-scale vesselness function, is then applied to enhance vascular structures.

  9. 78 FR 79298 - Securities Exempted; Distribution of Shares by Registered Open-End Management Investment Company...

    Science.gov (United States)

    2013-12-30

    ...] Securities Exempted; Distribution of Shares by Registered Open- End Management Investment Company...) 551-6792, Investment Company Rulemaking Office, Division of Investment Management, U.S. Securities and... Distribution of shares by registered open-end management investment company. * * * * * (g) If a plan covers...

  10. Research vessels

    Digital Repository Service at National Institute of Oceanography (India)

    Rao, P.S.

    The role of the research vessels as a tool for marine research and exploration is very important. Technical requirements of a suitable vessel and the laboratories needed on board are discussed. The history and the research work carried out...

  11. Application of an Autonomous/Unmanned Survey Vessel (ASV/USV in Bathymetric Measurements

    Directory of Open Access Journals (Sweden)

    Specht Cezary

    2017-09-01

    Full Text Available The accuracy of bathymetric maps, especially in the coastal zone, is very important from the point of view of safety of navigation and transport. Due to the continuous change in shape of the seabed, these maps are fast becoming outdated for precise navigation. Therefore, it is necessary to perform periodical bathymetric measurements to keep them updated on a current basis. At present, none of the institutions in Poland (maritime offices, Hydrographic Office of the Polish Navy which are responsible for implementation of this type of measurements has at their disposal a hydrographic vessel capable of carrying out measurements for shallow waters (at depths below 1 m. This results in emergence of large areas for which no measurement data have been obtained and, consequently, the maps in the coastal zones are rather unreliable.

  12. 46 CFR 190.20-1 - Application.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Application. 190.20-1 Section 190.20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS CONSTRUCTION AND ARRANGEMENT Accomodations for Officers, Crew, and Scientific Personnel § 190.20-1 Application. (a) Except as...

  13. 46 CFR 14.407 - Reports.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Reports. 14.407 Section 14.407 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN SHIPMENT AND DISCHARGE OF MERCHANT MARINERS Oceanographic Research Vessels § 14.407 Reports. (a) The owner, charterer, managing operator...

  14. 46 CFR 185.220 - Records of a voyage resulting in a marine casualty.

    Science.gov (United States)

    2010-10-01

    ....220 Section 185.220 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) OPERATIONS Marine Casualties and Voyage Records § 185.220 Records of a... officer, or person responsible for the custody thereof, shall make these records available upon request...

  15. 46 CFR 190.20-15 - Construction.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Construction. 190.20-15 Section 190.20-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS CONSTRUCTION AND ARRANGEMENT Accomodations for Officers, Crew, and Scientific Personnel § 190.20-15 Construction. All crew...

  16. 33 CFR 165.761 - Security Zones; Port of Palm Beach, Port Everglades, Port of Miami, and Port of Key West, Florida.

    Science.gov (United States)

    2010-07-01

    ... of the law enforcement boats and cruise ship tenders which will mark a transit lane in channel. (ii... east of the law enforcement vessels and cruise ship tenders, which will mark a transit lane in the..., tug boats and contracted security vessels may assist the Coast Guard Captain of the Port under the...

  17. 75 FR 32833 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-06-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  18. Integration of ITER in-vessel diagnostic components in the vacuum vessel

    International Nuclear Information System (INIS)

    Encheva, A.; Bertalot, L.; Macklin, B.; Vayakis, G.; Walker, C.

    2009-01-01

    The integration of ITER in-vessel diagnostic components is an important engineering activity. The positioning of the diagnostic components must correlate not only with their functional specifications but also with the design of the major parts of ITER torus, in particular the vacuum vessel, blanket modules, blanket manifolds, divertor, and port plugs, some of which are not yet finally designed. Moreover, the recently introduced Edge Localised Mode (ELM)/Vertical Stability (VS) coils mounted on the vacuum vessel inner wall call for not only more than a simple review of the engineering design settled down for several years now, but also for a change in the in-vessel distribution of the diagnostic components and their full impact has yet to be determined. Meanwhile, the procurement arrangement (a document defining roles and responsibilities of ITER Organization and Domestic Agency(s) (DAs) for each in-kind procurement including technical scope of work, quality assurance requirements, schedule, administrative matters) for the vacuum vessel must be finalized. These make the interface process even more challenging in terms of meeting the vacuum vessel (VV) procurement arrangement's deadline. The process of planning the installation of all the ITER diagnostics and integrating their installation into the ITER Integrated Project Schedule (IPS) is now underway. This paper covers the progress made recently on updating and issuing the interfaces of the in-vessel diagnostic components with the vacuum vessel, outlines the requirements for their attachment and summarises the installation sequence.

  19. FFTF and CRBRP reactor vessels

    International Nuclear Information System (INIS)

    Morgan, R.E.

    1977-01-01

    The Fast Flux Test Facility (FFTF) reactor vessel and the Clinch River Breeder Reactor Plant (CRBRP) reactor vessel each serve to enclose a fast spectrum reactor core, contain the sodium coolant, and provide support and positioning for the closure head and internal structure. Each vessel is located in its reactor cavity and is protected by a guard vessel which would ensure continued decay heat removal capability should a major system leak develop. Although the two plants have significantly different thermal power ratings, 400 megawatts for FFTF and 975 megawatts for CRBRP, the two reactor vessels are comparable in size, the CRBRP vessel being approximately 28% longer than the FFTF vessel. The FFTF vessel diameter was controlled by the space required for the three individual In-Vessel Handling Machines and Instrument Trees. Utilization of the triple rotating plug scheme for CRBRP refueling enables packaging of the larger CRBRP core in a vessel the same diameter as the FFTF vessel

  20. Process and device for changing a filter located in a vessel without breaking the confinement of the contaminated area

    International Nuclear Information System (INIS)

    Mueller, Georges.

    1982-01-01

    From the non contaminated area, the filter is enclosed in a leak tight bag which is affixed to the outside periphery of a supporting frame. The filter is placed in the bottom of the bag which is then welded in two places, a cut is then made between the two welds to achieve a sealed membrane separating the two halves of the vessel. An additional supporting frame is then placed on the frame. The new filter is secured in place and the sealed membrane is withdrawn from the contaminated part of the vessel [fr