CNSC Presentation to the Federal Agency for Nuclear Control

Size: px
Start display at page:

Download "CNSC Presentation to the Federal Agency for Nuclear Control"

Transcription

1 CNSC Presentation to the Federal Agency for Nuclear Control Canadian Experience in the Development and Implementation of Regulatory Requirements for the Security of Radioactive Sources Raphael Duguay, Security Advisor Nuclear Security Division Directorate of Security and Safeguards February 19, 2016 e-docs # nuclearsafety.gc.ca

2 Outline Who we are Enabling regulatory framework Context and application Development process Overview of security requirements Challenges faced Lessons learned CNSC safety/security interfaces 2

3 Mission to regulate the use of nuclear energy and materials to protect health, safety, security and the environment, and to implement Canada s international commitments on the peaceful use of nuclear energy; and to disseminate objective scientific, technical and regulatory information to the public Mandate to regulate the production, possession, use and transport of nuclear substances 3

4 Enabling Regulatory Framework Nuclear regulation is a federal responsibility Nuclear Safety and Control Act came into force in 2000 and provides modern framework for the regulation of Canada s nuclear sector The NSCA establishes the Canadian Nuclear Safety Commission (CNSC) as the Competent Authority Provides the CNSC with the powers to issue licences, make regulations, and conduct compliance and enforcement activities 4

5 Enabling Regulatory Framework (cont d) Elements of the Regulatory Framework Enabling Legislation Act Regulations Requirements Licences and Licence Conditions Handbooks, Certificates, Orders Regulatory Documents * Guidance Guidance *Includes any national or international standards referenced in Licences or Licence Conditions Handbooks 5

6 Enabling Regulatory Framework (cont d) Nuclear Safety and Control Act Gives authority to the CNSC to establish regulations respecting measures to ensure the maintenance of national security in the production, use, possession, packaging, transport, storage and disposal of nuclear substances Gives authority to the CNSC to issue licences for possession, transfer, import, export, use or abandonment of nuclear substances Gives authority to the CNSC to designate inspectors, to verify compliance with the act, regulations, or conditions of a licence, and to perform enforcement actions 6

7 Enabling Regulatory Framework (cont d) General Nuclear Safety and Control Regulations, subsection 12(1) Every licensee shall: (c) Take all reasonable precautions to maintain the security of nuclear facilities and of nuclear substances (g) Implement measures for alerting the licensee to the illegal use or removal of a nuclear substance (h) Implement measures for alerting the licensee to acts of sabotage or attempted sabotage anywhere at the site of licensed activity (j) Instruct the workers on the physical security program at the site of the licensed activity and on their obligations under that program 7

8 Enabling Regulatory Framework (cont d.) Licence condition 2490 The licensee shall implement the security measures for sealed sources as set out in REGDOC , Security of Nuclear Substances: Sealed Sources Other security provisions for nuclear facilities 8

9 Enabling Regulatory Framework (cont d) REGDOC , Security of Nuclear Substances: Sealed Sources Sets out the minimum security measures to prevent the loss, sabotage, illegal use, illegal possession or illegal removal of sealed sources Provides information and guidance on how to meet required security measures Combined performance-based and prescriptive approach 9

10 Enabling Regulatory Framework (cont d) Public consultation in early 2012 Published in May 2013 Transition periods: Category 1, 2 effective May 31, 2015 Category 3, 4, 5 effective May 31, 2018 Extensive licensee outreach and engagement Onsite compliance promotion/verification of security requirements conducted from May 2013 onwards Goal of ensuring high-risk licensees in compliance by May

11 The Canadian Context Domestically ~ 250 category 1 and 2 high-risk radioactive source licensees in Canada (approx. 500 inspectable locations) These high-risk radioactive sources are used in a wide variety of applications such as: oil well logging industrial radiography medical application and research (teletherapy, high-dose-rate brachytherapy, blood irradiation, gamma knives) industrial irradiators 11

12 Risk Categories of Radioactive Sealed Sources EXTREMELY DANGEROUS VERY DANGEROUS DANGEROUS UNLIKELY TO BE DANGEROUS VERY UNLIKELY TO BE DANGEROUS 12

13 Application Security measures for sealed sources: Applicable to transport by road and to storage within Canada Applicable to Category 1, 2 and 3 radioactive sealed sources Applicable to aggregate quantities Does not apply to radioactive sources within military or defence programs Provides guidance for Category 4 and 5 radioactive sealed sources 13

14 Category 1 Examples Pool-type irradiator Up to 37,000 TBq of cobalt-60 14

15 Category 1 Examples (cont d) Teletherapy medical treatment 555 TBq cobalt-60 Gammacell 3000 Blood irradiator 110 TBq cesium

16 Category 2 Examples Industrial radiography exposure devices 5.5 TBq Iridium-192 Category 2 High-dose-rate brachytherapy device Medical treatment device 370 GBq iridium

17 Category 3 Examples Logging source within transport container 600 GBq americium-241/beryllium Industrial fixed gauge used in industrial process control 370 GBq cesium

18 Category 4 and 5 Examples Portable gauges used in construction 370 MBq cesium-137 with 1480 MBq americium- 241/beryllium Category 4 Electron Capture Detector 1400 MBq nickel-63 Category 5 18

19 Development Process for Security Measures 1. Benchmarking with other Canadian regulators 2. Benchmarking with other countries 3. Review of IAEA recommendations and guidance documents 4. Internal CNSC review 5. Security awareness to inspectors and stakeholders 6. Public consultation - outreach 7. Presentation to the Commission and approval 19

20 Technical Security Measures Technical security measures include requirements and specific guidance for Access control Detection of unauthorized access Locking hardware and key control Physical barriers Alarm response protocol Inspection, maintenance and testing of security-related equipment Security officers (if they are employed by the licensee) 20

21 Technical Security Measures Category 1, 2 & 3 Sources Implement a minimum of two physical barriers Implement effective access control measures to ensure that only authorized persons have access Implement an effective means to detect and assess unauthorized access and unauthorized removal (e.g., monitored alarm system) 21

22 Technical Security Measures Category 1, 2 & 3 Sources (cont d) Implement an acceptable response protocol in case of a security alarm or incident Implement regular testing and maintenance of security systems and devices (alarm sensors), minimum every six months 22

23 Requirements for Administrative Security Measures - Category 1, 2 & 3 Sources Administrative security measures include requirements and specific guidance for: a site security plan a security awareness program personnel trustworthiness and reliability checks protection of prescribed and/or sensitive information inventory control of radioactive sources 23

24 Administrative Security Measures Implement a site (facility) security plan for each licensed site Implement security awareness training for employees Implement background verification for employees with unescorted access to sealed sources (e.g., criminal record name check) Maintain an up-to-date list of personnel authorized for unescorted access Source: 123rf 24

25 Administrative Security Measures Category 1, 2 & 3 Sources Implement measures/procedures to protect prescribed information and/or sensitive security-related information (ex: information related to security arrangements, equipment, systems and procedures). Implement inventory control 25

26 Requirement for Security during Transport Category 1, 2 & 3 Sources Security measures during transport includes instructions and specific requirements for: Vehicle security Security measures for sealed sources during transport Transport security plan 26

27 Security Measures during Transport Category 1, 2 & 3 Sources Use packages/containers that are robust enough to prevent unauthorized access Implement a vehicle disabling device to prevent unauthorized removal Install an effective intrusion detection system or an equivalent means to detect unauthorized access including regular testing and maintenance of the security system or device 27

28 Security Measures during Transport Category 1, 2 & 3 Sources (cont d) Implement background verifications for employees with unescorted access (e.g., criminal record name check) for drivers Licensees must ensure that commercial carriers meet CNSC transportation security measures Implement an acceptable response protocol in case of a security alarm or incident while in transport mode 28

29 Security Measures during Transport Category 1, 2 & 3 Sources (cont d) Specific transport security plan for category 1 sources Generic transport security plan for category 2 sources Includes describing proposed security measures, monitoring, routing, etc. 29

30 Category 4 and 5 Prudent Management Practices Physical barrier / intrusion detection system / access control Security of storage Response protocol Maintenance and testing Facility security plan Personal trustworthiness or background checks Information security Security awareness program Vehicle security Transportation security plan Source should be protected against unauthorized access and removal Should be stored in a secure container or location Source should be protected against unauthorized access and removal Maintenance and testing must be conducted at least every six months, and written records should be maintained Prudent management practice Reference, education and employment verification and criminal records name check (prudent management practice) All prescribed information must be protected and be shared on a need to know basis All authorized users, including staff who transport radioactive sources, must receive security awareness training on a regular basis Source should be protected against unauthorized access and removal Source should be protected against unauthorized access and removal 30

31 Effective Implementation of Security Measures: Challenges Responsibility functions Potential for duplication Cost Public access - hospitals and universities Remote locations Safety and security interface Sustainability 31

32 Operational Challenges Faced Inspection tools and procedures did not exist to perform combined safety/security inspections Defining roles and responsibilities for Inspectors and security specialists Development of expectations for new requirements Licensees not familiar with new inspection methodologies and requirements Development of training for inspectors 32

33 Effective Implementation of Security Measures: What Worked Stakeholder engagement (public and industry) Performance-based compliance activities Cost-effective solutions Security culture development through awareness promotion, training and guidance Enhancing safety and security interfaces 33

34 What works at the operational level Changes that were needed: Revision of inspection procedures to include security verifications Creation of a Protocol between Inspectors and security specialists to define responsibilities Creation of a working group Delivery of significant promotional outreach Additional security training for Inspectors to be provided as part of qualification program Drafting of new inspection worksheets to be used for security requirements 34

35 Safety / Security Interfaces Inspectors verify both safety and security regulatory requirements while onsite at defined frequencies more frequent basic security verifications more effective use of resources Communication protocol approved at the high level Clear roles and responsibilities defined and approved Internal working group on RSS Integration of security in the training and qualification of inspectors Shared tools to facilitate communication 35

36 Safety / Security Interfaces (cont d) Technical support provided by security specialists (NSD) Continue review of licensee security measures (security plans) Perform an initial verification to inspect the implementation of a high-risk licensee s security program Perform inspections of a licensee upon request by DNSR, DNCFR or DPRR Serve as a technical specialist available for inspectors to consult 36

37 Ongoing Implementation Publication in French and English Media release and public notice Outreach activities with inspectors and stakeholders Security awareness during annual workshops Closer coordination with licensees (Industry) Implementation strategy licence condition timing Sharing of best practices (domestically and internationally) 37

38 Conclusion Further to the requirements and obligations set forth in the NSCA and its regulations, this regulatory document provides a clear and consistent set of comprehensive requirements regarding security measures for sealed sources The incorporation of REGDOC in the various affected licences also serves to align CNSC regulations with the International Atomic Energy Agency s Code of Conduct and Nuclear Security Series documents 38

39 nuclearsafety.gc.ca facebook.com/canadiannuclearsafetycommission youtube.ca/cnscccsn CNSC Copyright 2015

Performance- Based Approach to the Security of Radioactive Sealed Sources: A Canadian Perspective

Performance- Based Approach to the Security of Radioactive Sealed Sources: A Canadian Perspective Performance- Based Approach to the Security of Radioactive Sealed Sources: A Canadian Perspective Abstract Raphaël Duguay, M.Sc., PSP Nuclear Security Division Canadian Nuclear Safety Commission, Canada

More information

IMPLEMENTATION OF REGDOC SECURITY OF NUCLEAR SUBSTANCES: SEALED SOURCES for category 3-5 licensees

IMPLEMENTATION OF REGDOC SECURITY OF NUCLEAR SUBSTANCES: SEALED SOURCES for category 3-5 licensees IMPLEMENTATION OF REGDOC-2.12.3 SECURITY OF NUCLEAR SUBSTANCES: SEALED SOURCES for category 3-5 licensees Craig Thompson Security Advisor Nuclear Security Division Canadian Nuclear Safety Commission Canadian

More information

Status of Cyber Security Implementation at Canadian NPPs

Status of Cyber Security Implementation at Canadian NPPs Status of Cyber Security Implementation at Canadian NPPs Chul Hwan Jung Technical Specialist Systems Engineering Division (CNSC) Korean Nuclear Society Conference Jeju, Korea, May 11 13, 2016 e-docs 4982091

More information

Improving the Security of Radioactive Sources in Industrial Radiography in South East Asia

Improving the Security of Radioactive Sources in Industrial Radiography in South East Asia Improving the Security of Radioactive Sources in Industrial Radiography in South East Asia Presented by Andrew Popp Regional Security of Radioactive Sources Project Andrew Popp, Allan Murray 13 th International

More information

Protecting Canada s Nuclear Industry THE

Protecting Canada s Nuclear Industry THE Protecting Canada s Nuclear Industry THE EVOLUTION OF NUCLEAR SECURITY AND ARMED RESPONSE FORCES AT DESIGNATED NUCLEAR FACILITIES Mr. Terry Jamieson Vice-President Technical Support Branch Canadian Nuclear

More information

IAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities

IAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities 59 th General Conference Senior Regulators Meeting Security Session 16 September 2015 IAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities Khammar Mrabit Director,

More information

International Atomic Energy Agency Meeting the Challenge of the Safety- Security Interface

International Atomic Energy Agency Meeting the Challenge of the Safety- Security Interface Meeting the Challenge of the Safety- Security Interface Rhonda Evans Senior Nuclear Security Officer, Division of Nuclear Security Department of Nuclear Safety and Security Outline Introduction Understanding

More information

nuclearsafety.gc.ca Implications of the Fukushima Daiichi Accidents for the New Builds Design Requirements in Canada

nuclearsafety.gc.ca Implications of the Fukushima Daiichi Accidents for the New Builds Design Requirements in Canada Implications of the Fukushima Daiichi Accidents for the New Builds Design Requirements in Canada R.P. Rulko () IAEA Technical Meeting on Evaluation of Nuclear Power Plant Design Safety in the Aftermath

More information

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

Joint ICTP-IAEA School of Nuclear Energy Management November 2012 2374-20 Joint ICTP- School of Nuclear Energy Management 5-23 November 2012 Establishing National Nuclear Security Infrastructure (Module 9 Topics 3 & 4) EVANS Rhonda International Atomic Energy Agency,

More information

Nuclear Security. Resolution adopted on 30 September 2016 during the tenth plenary meeting

Nuclear Security. Resolution adopted on 30 September 2016 during the tenth plenary meeting General Conference GC(60)/RES/10 Date: September 2016 General Distribution Original: English Sixtieth regular session Item 14 of the agenda (GC(60)/20) Nuclear Security Resolution adopted on 30 September

More information

OPG Comments on REGDOC-1.1.5, Licence Application Guide: Small Modular Reactor Facilities

OPG Comments on REGDOC-1.1.5, Licence Application Guide: Small Modular Reactor Facilities From: TRAIN David -NUCLEAR [mailto:david.train@opg.com] Sent: September-25-18 2:51 PM To: Consultation (CNSC/CCSN) Cc: MANLEY Robin -NUCLEAR; KHAN Saad -NUCLEAR Subject: OPG Comments on REGDOC-1.1.5, Licence

More information

Progress of the UAE Nuclear Power Program -Regulator s Perspective

Progress of the UAE Nuclear Power Program -Regulator s Perspective Progress of the UAE Nuclear Power Program -Regulator s Perspective INTERNATIONAL FRAMEWORK FOR NUCLEAR ENERGY COOPERATION INFRASTRUCTURE DEVELOPMENT WORKING GROUP WORKSHOP ON NEW CHALLENGES FACING NUCLEAR

More information

CNSC Management Response to CNSC Fukushima Task Force Recommendations INFO-0825

CNSC Management Response to CNSC Fukushima Task Force Recommendations INFO-0825 CNSC Management Response to CNSC Fukushima Task Force Recommendations INFO-0825 October 2011 CNSC Management Response to CNSC Fukushima Task Force Recommendations Minister of Public Works and Government

More information

Expert support and Reach back activities

Expert support and Reach back activities GICNT- Nuclear Detection Working Group Magic Maggiore Ispra 28 March 2017 Expert support and Reach back activities Thierry PELLETIER Nuclear Security Division Safety and Security department International

More information

OFFICIAL COMMISSIONING OF SECURITY SYSTEMS AND INFRASTRUCTURE

OFFICIAL COMMISSIONING OF SECURITY SYSTEMS AND INFRASTRUCTURE Title of document ONR GUIDE COMMISSIONING OF SECURITY SYSTEMS AND INFRASTRUCTURE Document Type: Unique Document ID and Revision No: Nuclear Security Technical Assessment Guide CNS-TAST-GD-4.4 Revision

More information

Nuclear security in France : role of cooperation to enhance security culture

Nuclear security in France : role of cooperation to enhance security culture EU High-level Event on "International cooperation to enhance a worldwide nuclear security culture" Nuclear security in France : role of cooperation to enhance security culture Dr. Frédéric Mariotte Deputy

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate. Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance

More information

uanacia 1+1 MARINE SECURITY OPERATIONS BULLETIN No:

uanacia 1+1 MARINE SECURITY OPERATIONS BULLETIN No: 1+1 MARINE SECURITY OPERATIONS BULLETIN No: 2014-001 CLARIFICATION OF TRANSPORT CANADA (TC) MARINE SECURITY MANDATORY THREAT, BREACH AND INCIDENT REPORTING REOUIREMENTS THIS MARINE SECURITY OPERATIONS

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Use of Controlled Substances in Research

Use of Controlled Substances in Research Use of Controlled Substances in Research A Tutorial on Regulatory Requirements and the Emory University Policy 7.25 Research Use of Controlled Substances Emory University, Office of Compliance Tutorial

More information

Nuclear Safety and Security in Brief

Nuclear Safety and Security in Brief Nuclear Safety and Security in Brief Elena Buglova Centre Head Incident and Emergency Centre (IEC) International Atomic Energy Agency Department of Nuclear Safety and Security: http://www-ns.iaea.org/default.asp

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

ENHANCING THE SAFETY AND SECURITY OF RADIOACTIVE MATERIAL

ENHANCING THE SAFETY AND SECURITY OF RADIOACTIVE MATERIAL ENHANCING THE SAFETY AND SECURITY OF RADIOACTIVE MATERIAL Frederick C. (Fritz) Sturz Sr. Safeguards Technical Analyst Office of Nuclear Security and Incident Response Division of Nuclear Security U.S.

More information

Texas A&M University Controlled Substances Guidelines Training Module. September 2017

Texas A&M University Controlled Substances Guidelines Training Module. September 2017 Texas A&M University Controlled Substances Guidelines Training Module September 2017 Applicability Guidelines for the purchase, storage, use, and disposal of controlled substances used in research and

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Chemical Facility Anti-Terrorism Standards (CFATS) Update for Roof Coatings Manufacturers

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

PREVENTIVE AND PROTECTIVE MEASURES AGAINST INSIDER THREATS

PREVENTIVE AND PROTECTIVE MEASURES AGAINST INSIDER THREATS NUCLEAR SECURITY SERIES NO. XX NST01 DRAFT, November 01 STEP : Submission to MS for comment Interface Document: NSGC, all SSCs PREVENTIVE AND PROTECTIVE MEASURES AGAINST INSIDER THREATS (REVISION OF NUCLEAR

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

Chemical Facility Anti- Terrorism Standards

Chemical Facility Anti- Terrorism Standards SATA Presentation Regarding Chemical Facility Anti- Terrorism Standards Joe Hartline, CHMM Rindt-McDuff Associates Marietta, Georgia October 6, 2007 Presentation Outline Introduction Rule Requirements

More information

IAEA Action Plan on Nuclear Safety

IAEA Action Plan on Nuclear Safety Action Plan on Nuclear Safety Presented to IEEE Nuclear Power Engineering Committee San Antonio, TX 2011 January 25 Gary Johnson International Atomic Energy Agency g.johnson@iaea.org International Atomic

More information

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program

More information

Global Nuclear Safety and Security Regime

Global Nuclear Safety and Security Regime TC Liaison Officers/Assistant and New Staff Members of Permanent Missions in Vienna Vienna,, 27-29 29 May, 2009 Global Nuclear Safety and Security Regime K. Mrabit Head, Safety and Security Section Department

More information

IAEA Division of Nuclear Security

IAEA Division of Nuclear Security IAEA Division of Nuclear Security Computer Security Activities Overview Donald Dudenhoeffer 25 May 2017 Computer and Information Security The Division of Nuclear Security (NSNS) seeks to support Member

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

The WINS Academy Security Certification Programme: The Route to Demonstrable Competence. Dr Roger Howsley, Executive Director

The WINS Academy Security Certification Programme: The Route to Demonstrable Competence. Dr Roger Howsley, Executive Director The WINS Academy Security Certification Programme: The Route to Demonstrable Competence. Dr Roger Howsley, Executive Director IAEA, 14 th May 2014 Key Messages The Nuclear Sector is a long way behind other

More information

Regulatory Measures on Organic Product Certification Management

Regulatory Measures on Organic Product Certification Management Regulatory Measures on Organic Product Certification Management NO. 155 MANUSCRIPT OF STATE GENERAL ADMINISTRATION OF QUALITY SUPERVISION, INSPECTION AND QUARANTINE Chapter I: General Provisions Article

More information

FIRE CODE ADMINISTRATOR PROGRAM

FIRE CODE ADMINISTRATOR PROGRAM DEPARTMENT OF FINANCIAL SERVICES Division of State Fire Marshal Bureau of Fire Standards & Training Release Date: December 2012 Revised Date: May 2017 FIRE CODE ADMINISTROR PROGRAM I. Program Overview

More information

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

R Delegation of Powers and Duties to the Executive Secretary. R Application for Certification.

R Delegation of Powers and Duties to the Executive Secretary. R Application for Certification. R311. Environmental Quality, Environmental Response and Remediation. R311-500. Illegal Drug Operations Site Reporting and Decontamination Act, Decontamination Specialist Certification Program. R311-500-1.

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

NDIS Quality and Safeguards Commission. Incident Management System Guidance

NDIS Quality and Safeguards Commission. Incident Management System Guidance NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

Critical Cyber Asset Identification Security Management Controls

Critical Cyber Asset Identification Security Management Controls Implementation Plan Purpose On January 18, 2008, FERC (or Commission ) issued Order. 706 that approved Version 1 of the Critical Infrastructure Protection Reliability Standards, CIP-002-1 through CIP-009-1.

More information

Terms of Participation

Terms of Participation National Construction Safety Officer (NCSO TM ) National Health and Safety Administrator (NHSA) Terms of Participation INTRODUCTION TO NCSO The primary objective of this program is to recognize individuals

More information

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS Accreditation is continuously gaining recognition as an important technical tool in the delivery of objectives across an increasing range of policy

More information

Transit Bus Safety and Security Program

Transit Bus Safety and Security Program Program Overview What is the Transit Bus Safety and Security Program? Founded on guidelines that were developed with input from the transit industry and national safety, security and emergency preparedness

More information

RPR CRITERIA AND FORMATS

RPR CRITERIA AND FORMATS RPR CRITERIA AND FORMATS PURPOSE This procedure establishes design criteria and standard formats for detailed procedures and records required for effective operations, communications and management of

More information

Public Safety Canada. Audit of the Business Continuity Planning Program

Public Safety Canada. Audit of the Business Continuity Planning Program Public Safety Canada Audit of the Business Continuity Planning Program October 2016 Her Majesty the Queen in Right of Canada, 2016 Cat: PS4-208/2016E-PDF ISBN: 978-0-660-06766-7 This material may be freely

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Chartered Membership: Professional Standards Framework

Chartered Membership: Professional Standards Framework Chartered Membership: Professional Standards Framework Foreword The Chartered Institute of Architectural Technologists (CIAT) is the lead professional body for Architectural Technology and the UK Competent

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Frequently Asked Question Regarding 201 CMR 17.00

Frequently Asked Question Regarding 201 CMR 17.00 Frequently Asked Question Regarding 201 CMR 17.00 What are the differences between this version of 201 CMR 17.00 and the version issued in February of 2009? There are some important differences in the

More information

GLOBAL THREAT REDUCTION INITIATIVE DOMESTIC SOURCE SECURITY OVERVIEW

GLOBAL THREAT REDUCTION INITIATIVE DOMESTIC SOURCE SECURITY OVERVIEW GLOBAL THREAT REDUCTION INITIATIVE DOMESTIC SOURCE SECURITY OVERVIEW GTRI Mission Mission: Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide Goals: Convert

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

Policies and Procedures Date: February 28, 2012

Policies and Procedures Date: February 28, 2012 No. 5200 Rev.: 1 Policies and Procedures Date: February 28, 2012 Subject: Information Technology Security Program 1. Purpose... 1 2. Policy... 1 2.1. Program Elements... 1 2.2. Applicability and Scope...

More information

Select IAEA Activities for Uranium Production Legacy Sites IAEA

Select IAEA Activities for Uranium Production Legacy Sites IAEA Select Activities for Uranium Production Legacy Sites Russel Edge Decommissioning and Remediation Unit Division of Radiation,Transport and Waste Safety International Atomic Energy Agency Worldwide Regulatory

More information

Federal Communication Commission (FCC) Office of Engineering and Technology (OET) Program Accreditation Procedure

Federal Communication Commission (FCC) Office of Engineering and Technology (OET) Program Accreditation Procedure PJLA offers third-party accreditation services to Conformity Assessment Bodies (i.e. Testing and/or Calibration Laboratories, Reference Material Producers, Field Sampling and Measurement Organizations

More information

HASS RECORD GUIDANCE. Version 1

HASS RECORD GUIDANCE. Version 1 HASS RECORD GUIDANCE Version 1 2013 1 General 1.1 This guidance is intended to help HASS holders make clear, accurate and consistent records, to make the necessary reports to SEPA and therefore allow SEPA

More information

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section.

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section. TITLE MOBILE WIRELESS DEVICES AND SERVICES SCOPE Provincial APPROVAL AUTHORITY Alberta Health Services Executive SPONSOR Information Technology PARENT DOCUMENT TITLE, TYPE AND NUMBER Not applicable DOCUMENT

More information

Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650

Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650 Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650 President Obama issued Executive Order (EO) 13650 - Improving Chemical

More information

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT AGREEMENT DATED [ ] BETWEEN: (1) SHELTERMANAGER LTD and (2) [ ] ( The Customer ) BACKGROUND (A) (B) (C) This Agreement is to ensure there is in place

More information

The Corporate Security Review (CSR) Program September 11, 2008

The Corporate Security Review (CSR) Program September 11, 2008 The Corporate Security Review (CSR) Program September 11, 2008 Transportation Sector Network Management Highway and Motor Carrier Security Division Corporate Security Review Background Spring 2003 TSA

More information

OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY

OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY MEMORANDUM OF UNDERSTANDING between the MINISTERIO DE ELECTRICIDAD Y ENERGIA RENOVABLE DEL ECUADOR and the INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY This Memorandum of Understanding

More information

CIP Standards Development Overview

CIP Standards Development Overview CIP Standards Development Overview CSSDTO706 Meeting with FERC Technical Staff July 28, 2011 Objectives Historical Timeline CIP-002-4 CIP-005-4 CIP Version 5 2 Project 2008-06 Overview FERC Order 706 SDT

More information

United Nations Environment Programme

United Nations Environment Programme UNITED NATIONS United Nations Environment Programme Distr. GENERAL UNEP/OzL.Pro/ExCom/81/41 21 May 2018 EP ORIGINAL: ENGLISH EXECUTIVE COMMITTEE OF THE MULTILATERAL FUND FOR THE IMPLEMENTATION OF THE MONTREAL

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions ISO 15189 Accreditation Program cap.org Contents ISO and the International Organization for Standardization What does ISO stand for? (page 3) What is the International Organization

More information

INTEGRATED REGULATORY REVIEW SERVICE (IRRS)

INTEGRATED REGULATORY REVIEW SERVICE (IRRS) IAEA-NS-IRRS-2011/12 ORIGINAL: English INTEGRATED REGULATORY REVIEW SERVICE (IRRS) MISSION TO THE UNITED ARAB EMIRATES Abu Dhabi, United Arab Emirates 5 to 14 December 2011 DEPARTMENT OF NUCLEAR SAFETY

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

EU Code of Conduct on Data Centre Energy Efficiency

EU Code of Conduct on Data Centre Energy Efficiency EUROPEAN COMMISSION DIRECTORATE-GENERAL JRC JOINT RESEARCH CENTRE Institute for Energy Renew able and Energy Efficiency Unit EU Code of Conduct on Data Centre Energy Efficiency Introductory guide for all

More information

EXECUTIVE ORDER Chemical Facility Safety and Security: Providing ProtecFon Reduces Risk

EXECUTIVE ORDER Chemical Facility Safety and Security: Providing ProtecFon Reduces Risk EXECUTIVE ORDER 13650 Chemical Facility Safety and Security: Providing ProtecFon Reduces Risk THE DAILY www.region6gazette.com - Since 2014 Executive Order (EO) 13650 signed August 1, 2013 - Result of

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Standard CIP 004 3a Cyber Security Personnel and Training

Standard CIP 004 3a Cyber Security Personnel and Training A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-3a 3. Purpose: Standard CIP-004-3 requires that personnel having authorized cyber or authorized unescorted physical access

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

IAEA. Radiation Detection & Response Approach & Strategy

IAEA. Radiation Detection & Response Approach & Strategy Radiation Detection & Response Approach & Strategy Section for Material Outside of Regulatory Controls Nuclear Security Division Department of Nuclear Safety and Security International Atomic Energy Agency

More information

RELIABILITY COMPLIANCE ENFORCEMENT IN ONTARIO

RELIABILITY COMPLIANCE ENFORCEMENT IN ONTARIO RELIABILITY COMPLIANCE ENFORCEMENT IN ONTARIO June 27, 2016 Training provided for Ontario market participants by the Market Assessment and Compliance Division of the IESO Module 1 A MACD training presentation

More information

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED.

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED. Assistant Deputy Minister (Review Services) Reviewed by in accordance with the Access to Information Act. Information UNCLASSIFIED. Security Audits: Management Action Plan Follow-up December 2015 1850-3-003

More information

Feasibility of Establishing a National Dose Register using RAIS in South Africa. Hazem Suman IAEA. Johannesburg, 20 August 2012

Feasibility of Establishing a National Dose Register using RAIS in South Africa. Hazem Suman IAEA. Johannesburg, 20 August 2012 Feasibility of Establishing a National Dose Register using RAIS in South Africa Johannesburg, 20 August 2012 Hazem Suman Division of Radiation, Transport and Waste Safety, International Atomic Energy Agency

More information

Wayne State University

Wayne State University Wayne State University Office of Environmental Health & Safety Controlled Substances Program Why is Wayne State doing this? In 2011, a survey of our laboratories revealed that some were not adhering to

More information

POSITION DESCRIPTION

POSITION DESCRIPTION UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS.

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS. When Recognition Matters WHITEPAPER ISO 28000 SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS www.pecb.com CONTENT 3 4 4 4 4 5 6 6 7 7 7 8 9 10 11 12 Introduction An overview of ISO 28000:2007 Key clauses of

More information

Compliance with ISPS and The Maritime Transportation Security Act of 2002

Compliance with ISPS and The Maritime Transportation Security Act of 2002 Mr. Melchor Becena Security Administrator Port Everglades SecurePort Conference Miami, Florida 25-27 27 February, 2004 Compliance with ISPS and The Maritime Transportation Security Act of 2002 Overview

More information

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV

More information

INFORMATION TECHNOLOGY POLICY

INFORMATION TECHNOLOGY POLICY COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF HUMAN SERVICES, INSURANCE AND AGING INFORMATION TECHNOLOGY POLICY Name Of Policy: Physical and Environmental Security Policy Domain: Security Date Issued: 06/09/11

More information

Code of Ethics Certification 2018 CHECKLIST

Code of Ethics Certification 2018 CHECKLIST Code of Ethics Certification 2018 CHECKLIST Medical technology companies (both AdvaMed members and non-members) may participate in this certification program. The certification affirms that the company

More information

PIPELINE SECURITY An Overview of TSA Programs

PIPELINE SECURITY An Overview of TSA Programs PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation

More information

INFCIRC/225/Rev 5 Implementation at a Facility Level: Common Issues and Best Practices. Oleg Bukharin U.S. Nuclear Regulatory Commission

INFCIRC/225/Rev 5 Implementation at a Facility Level: Common Issues and Best Practices. Oleg Bukharin U.S. Nuclear Regulatory Commission INFCIRC/225/Rev 5 Implementation at a Facility Level: Common Issues and Best Practices Oleg Bukharin U.S. Nuclear Regulatory Commission Why INFCIRC/225 facility-level evaluations? INFCIRC/225 is a recommendations

More information

Are You GHS Compliant or at RISK for FINES?

Are You GHS Compliant or at RISK for FINES? Are You GHS Compliant or at RISK for FINES? Newsletter Date 06/24/15, Issue 74 The Globally Harmonized System (GHS) of classifying and labeling chemicals is an internationally agreed-upon system, designed

More information

Nuclear Power Plant Security

Nuclear Power Plant Security Nuclear Power Plant Security Plant Security s Primary Mission Nuclear Plant Safety and Security All plants have comprehensive measures for safety and security Comprehensive emergency and security plans

More information

The Role of the American National Standards Institute (ANSI) Irwin Silverstein, Ph.D. IPEA

The Role of the American National Standards Institute (ANSI) Irwin Silverstein, Ph.D. IPEA The Role of the American National Standards Institute (ANSI) 1 ANSI Activities American National Standard: Excipient GMP Accreditation of Product Conformity Bodies Certification to Excipient GMP 2 IPEA

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information