Transportation Worker Identification Credential (TWIC) Implementation in the Maritime Sector; Hazardous Materials Endorsement for a Commercial Driver's License, 29396-29462 [06-4508]

Download as PDF 29396 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration 49 CFR Parts 1515, 1570, 1572 Coast Guard 33 CFR Parts 101, 103, 104, 105, 106, 125; 46 CFR Parts 10, 12, 15 [Docket Nos. TSA–2006–24191; USCG– 2006–24196] RIN 1652–AA41 Transportation Worker Identification Credential (TWIC) Implementation in the Maritime Sector; Hazardous Materials Endorsement for a Commercial Driver’s License Transportation Security Administration; United States Coast Guard, DHS. ACTION: Notice of proposed rulemaking (NPRM). sroberts on PROD1PC70 with PROPOSALS AGENCY: SUMMARY: This is a notice of proposed rulemaking by the Department of Homeland Security, specifically by the Transportation Security Administration and the United States Coast Guard. If promulgated, this rule would implement the Transportation Worker Identification Credential program in the maritime sector. Under this program, merchant mariners holding an active License, Merchant Mariner Document, or Certificate of Registry and workers who require unescorted access to secure areas at maritime facilities or on vessels must undergo a security threat assessment, and, if found to not pose a security threat, obtain a Transportation Worker Identification Credential. Persons without Transportation Worker Identification Credentials will not be granted unescorted access to secure areas at affected maritime facilities or on vessels. Under this proposed rule, the Coast Guard seeks to amend its regulations on vessel and facility security to require the use of the Transportation Worker Identification Credential as an access control measure. It is also proposing to amend its regulations covering merchant mariners to incorporate the requirement to obtain a Transportation Worker Identification Credential. In a separate rulemaking action published elsewhere in this edition of the Federal Register, the Coast Guard also is proposing to consolidate existing licensing and documentation regulations to minimize duplicative or redundant identification or background check requirements. VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 The Transportation Security Administration proposes amending its security threat assessment standards that currently apply to commercial drivers authorized to transport hazardous materials in commerce to also apply to merchant mariners and workers who require unescorted access to secure areas on vessels and at port facilities. These proposed amendments also relate to the notification an employer receives when an employee who holds a hazardous materials endorsement or a Transportation Worker Identification Credential is determined to pose a security threat. The Transportation Security Administration also is proposing regulations dealing with the enrollment of port workers into the Transportation Worker Identification Credential program. In addition, the Transportation Security Administration is proposing a fee, as authorized under the Department of Homeland Security Appropriations Act of 2004, to pay for the costs related to the issuance of the Transportation Worker Identification Credentials under this rule. This rulemaking would enhance the security of ports by requiring background checks on persons and establishing a biometric access control system to prevent those who pose a security threat from gaining unescorted access to secure areas of ports. This rulemaking implements the Maritime Transportation Security Act of 2002, which requires that credentialed merchant mariners and workers with unescorted access to secured areas of vessels and facilities be subject to a security threat assessment and receive a biometric credential needed to access secured areas. Comments and related material must reach the Docket Management Facility on or before July 6, 2006. Comments sent to the Office of Management and Budget (OMB) on collection of information must reach OMB on or before July 6, 2006. Public Meetings: TSA and the Coast Guard will hold four public meetings as follows: Wednesday, May 31, 2006 in Newark, NJ; Thursday, June 1 in Tampa, FL; Wednesday, June 6 in St. Louis, MO; and Thursday, June 7 in Long Beach, CA. Interested individuals are invited to attend, provide comments and ask questions about the proposed rule. TSA and Coast Guard will provide exact locations and other additional information about the meetings in another document to be published in the Federal Register. DATES: PO 00000 Frm 00002 Fmt 4701 Sfmt 4702 You may submit comments identified by TSA docket number TSA– 2006–24191 or Coast Guard docket number USCG–2006–24196 to the Docket Management Facility at the U.S. Department of Transportation. To avoid duplication, please use only one of the following methods: (1) Web site: https://dms.dot.gov. (2) Mail: Docket Management Facility, U.S. Department of Transportation, Room Plaza 401, 400 Seventh Street SW., Washington, DC 20590–0001. (3) Fax: 202–493–2251. (4) Delivery: Room PL–401 on the Plaza level of the Nassif Building, 400 Seventh Street SW., Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. The telephone number is 202–366– 9329. (5) Federal eRulemaking Portal: https://www.regulations.gov. You must mail comments on collection of information to the Office of Information and Regulatory Affairs, Office of Management and Budget, 725 17th Street NW, Washington, DC 20503, ATTN: Desk Officer, United States Coast Guard. See SUPPLEMENTARY INFORMATION for format and other information about comment submissions. FOR FURTHER INFORMATION CONTACT: For questions related to TSA’s proposed standards: Rick Collins, Transportation Security Administration, 601 South 12th Street, Arlington, VA 22202–4220, TWIC Program, 571–227–3515; e-mail: credentialing@dhs.gov. For legal questions: Christine Beyer, TSA–2, Transportation Security Administration, 601 South 12th Street, Arlington, VA 22202–4220; telephone (571) 227–2657; facsimile (571) 571 1380; e-mail Christine.Beyer@dhs.gov. For questions concerning the Coast Guard provisions of this proposed rule: LCDR Jonathan Maiorine, Commandant (G–PCP–2), United States Coast Guard, 2100 Second Street, SW., Washington, DC 20593; telephone 1–877–687–2243. For questions concerning viewing or submitting material to the docket: Renee V. Wright, Program Manager, Docket Management System, U.S. Department of Transportation, Room Plaza 401, 400 Seventh Street, SW., Washington, DC 20590–0001; telephone (202) 493–0402. SUPPLEMENTARY INFORMATION: ADDRESSES: Public Participation and Request for Comments We encourage you to participate in this rulemaking by submitting comments and related materials. All comments received will be posted, without change, to https://dms.dot.gov E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules sroberts on PROD1PC70 with PROPOSALS and will include any personal information you have provided. We have an agreement with the Department of Transportation (DOT) to use the Docket Management Facility. Please see DOT’s ‘‘Privacy Act’’ paragraph below. Submitting comments: If you submit a comment, please include your name and address, identify the docket number for this rulemaking (TSA–2006–24191 or USCG–2006–24196), indicate the specific section of this document to which each comment applies, and give the reason for each comment. Please send comments on the TSA portions of the proposed rule to the TSA docket (TSA–2006–24191), and send comments on the Coast Guard portions of the proposed rule to the Coast Guard docket (USCG–2006–24196). You may submit your comments and material by electronic means, mail, fax, or delivery to the Docket Management Facility at the address under ADDRESSES; but please submit your comments and material by only one means. If you submit them by mail or delivery, submit them in an unbound format, no larger than 81⁄2 by 11 inches, suitable for copying and electronic filing. If you submit them by mail and would like us to acknowledge receipt, please enclose a stamped, self-addressed postcard or envelope. We will consider all comments and material received during the comment period. We may change this proposed rule in view of them. Handling of Confidential or Proprietary Information and Sensitive Security Information (SSI) Submitted in Public Comments: Do not submit comments that include trade secrets, confidential commercial or financial information, or sensitive security information (SSI) 1 to the public regulatory docket. Please submit such comments separately from other comments on the rulemaking. Comments containing this type of information should be appropriately marked as containing such information and submitted by mail to the TSA legal point of contact listed in the FOR FURTHER INFORMATION CONTACT section. Upon receipt of such comments, TSA will not place the comments in the public docket and will handle them in accordance with applicable safeguards and restrictions on access. TSA will hold them in a separate file to which the public does not have access, and place 1 ‘‘Sensitive Security Information’’ or ‘‘SSI’’ is informaton obtained or developed int he conduct of security activities, the disclosure of which would constitute an unwarranted invasion of privacy, reveal trade secrets or privileged or confidential information, or be detrimental tot he security of transportation. The protection of SSI is governed by 49 CFR part 1520. VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 a note in the public docket that TSA has received such materials from the commenter. If TSA receives a request to examine or copy this information, TSA will treat it as any other request under the Freedom of Information Act (FOIA) (5 U.S.C. 552) and the Department of Homeland Security’s FOIA regulation found in 6 CFR part 5. Viewing comments and documents: To view comments, as well as documents mentioned in this preamble as being available in the docket, go to https://dms.dot.gov at any time, click on ‘‘Simple Search,’’ enter the last five digits of the docket number for this rulemaking, and click on ‘‘Search.’’ You may also visit the Docket Management Facility in Room PL–401 on the Plaza level of the Nassif Building, 400 Seventh Street, SW., Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. Privacy Act: Anyone can search the electronic form of all comments received into any of our dockets by the name of the individual submitting the comment (or signing the comment, if submitted on behalf of an association, business, labor union, etc.). You may review the Department of Transportation’s Privacy Act Statement in the Federal Register published on April 11, 2000 (65 FR 19477), or you may visit https://dms.dot.gov. Abbreviations and Terms Used in This Document AMS—Area Maritime Security ASP—Alternative Security Program ATSA—Aviation and Transportation Security Act ATF—Bureau of Alcohol, Tobacco, Firearms, and Explosives CDC—Certain Dangerous Cargo CDL—Commercial drivers license CDLIS—Commercial drivers license information system CHRC—Criminal history records check CJIS—Criminal Justice Information Services Division COR—Certificate of Registry COTP—Captain of the Port DHS—Department of Homeland Security DOJ—Department of Justice DMV—Department of Motor Vehicles DOT—Department of Transportation FBI—Federal Bureau of Investigation FIPS 201—Federal Information Processing Standards Publication 201 FMCSA—Federal Motor Carrier Safety Administration FMSC—Federal Maritime Security Coordinator FSP—Facility Security Plan HME—Hazardous materials endorsement HSA—Homeland Security Act PO 00000 Frm 00003 Fmt 4701 Sfmt 4702 29397 HSPD 12—Homeland Security Presidential Directive 12 ICC—Integrated Circuit Chip MARSEC—Maritime Security MMD—Merchant Mariner Document MSC—Marine Safety Center MTSA—Maritime Transportation Security Act OCS—Outer Continental Shelf REC—Regional Exam Center SAFETEA–LU—Safe, Accountable, Flexible, Efficient Transportation Equity Act—A Legacy for Users STCW—International Convention on Standards of Training, Certification, and Watchkeeping for Seafarers, 1978, as amended TSA—Transportation Security Administration TWIC—Transportation Worker Identification Credential USA PATRIOT Act—Uniting and Strengthening America by Providing AppropriateTools Required to Intercept and Obstruct Terrorism Act VSP—Vessel Security Plan Table of Contents I. Background and Purpose II. Development of TWIC Process III. Proposed Rule A. Coast Guard B. TSA 1. TWIC Process a. Pre-Enrollment and Enrollment b. Adjudication of Security Threat Assessment c. Credential Production d. Credential Activation e. Using TWIC in an Access Control System f. Lost, Damaged or Stolen TWICs g. Renewal h. Call Center i. Notifying Employers of Threat Determination 2. Fee 3. TWIC in Other Modes of Transportation IV. Advisory Committee Participation V. Section-by-Section Analysis of United States Coast Guard Proposed Rule General Introduction 33 CFR Part 101 33 CFR 101.105 Definitions. 33 CFR 101.121 Alternative Security Programs—TWIC Addendum. 33 CFR 101.514 TWIC Requirement. 33 CFR 101.515 Personal identification. 33 CFR Part 103 33 CFR 103.305 Composition of an Area Maritime Security (AMS) Committee. 33 CFR 103.505 Elements of the Area Maritime Security (AMS) Plan and 103.510 Area Maritime Security (AMS) Plan review and approval. 33 CFR Part 104 33 CFR 104.105 Applicability. 33 CFR 104.106 Passenger Access Area. 33 CFR 104.115 Compliance dates. 33 CFR 104.120 Compliance documentation. 33 CFR 104.200 Owner or Operator/ 104.210 Company Security Officer E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS 29398 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules (CSO)/104.215 Vessel Security Officer (VSO)/104.220 Company or vessel personnel with security duties/104.225 Security training for all other personnel. 33 CFR 104.235 Vessel recordkeeping requirements. 33 CFR 104.265 Security measures for access control. 33 CFR 104.290 Security incident procedures. 33 CFR 104.295 Additional requirements—cruise ships. 33 CFR 104.405 Format of the Vessel Security Plan (VSP). New Subpart E (33 CFR 104.500–104.510). 33 CFR Part 105 33 CFR 105.115 Compliance dates. 33 CFR 105.120 Compliance documentation. 33 CFR 105.200 Owner or operator/ 105.205 Facility Security Officer (FSO)/ 105.210 Facility personnel with security duties/105.215 Security training for all other facility personnel. 33 CFR 105.225 Facility recordkeeping requirements. 33 CFR 105.255 Security measures for access control. 33 CFR 105.280 Security incident procedures. 33 CFR 105.285 Additional requirementspassenger and ferry facilities. 33 CFR 105.290 Additional requirementscruise ship terminals. 33 CFR 105.295 Additional requirementsCertain Dangerous Cargo (CDC) facilities. 33 CFR 105.296 Additional requirementsbarge fleeting facilities. 33 CFR 105.405 Format and content of the Facility Security Plan (FSP). New Subpart E (33 CFR 105.500–105.510). 33 CFR Part 106 33 CFR 106.110 Compliance dates. 33 CFR 106.115 Compliance documentation. 33 CFR 106.200 Owner or operator/ 106.205 Company Security Officer (CSO)/106.210 OCS Facility Security Officer (FSO)/106.215 Company or OCS Facility personnel with security duties/ 106.220 Security training for all other OCS facility personnel. 33 CFR 106.230 OCS facility recordkeeping requirements. 33 CFR 106.260 Security measures for access control. 33 CFR 106.280 Security incident procedures. 33 CFR 106.405 Format and content of the Facility Security Plan (FSP). New Subpart E (33 CFR 106.500–106.510). Miscellaneous Items 33 CFR 101.305 (Reporting requirements). 33 CFR 101.400 (Enforcement) 33 CFR 104.130, 105.130, and 106.125 (Waivers). 33 CFR Subpart C Parts 104, 105, and 106 (Security Assessments). 46 CFR Parts 10, 12, and 15. VI. Section-by-Section Analysis of TSA Proposed Rule 49 CFR Part 1515 Appeal and Waiver Procedures for Security Threat Assessments for Individuals. 49 CFR 1515.1 Scope. 49 CFR 1515.3 Terms used in this part. VerDate Aug<31>2005 20:38 May 19, 2006 Jkt 208001 49 CFR 1515.5 Appeal procedures. 49 CFR 1515.7 Waiver Procedures. 49 CFR Part 1570 Land Transportation Security: General Rules. 49 CFR 1570.3 Terms used in this part. 49 CFR Part 1572 Credentialing and Background Checks for Land Transportation Security. 49 CFR 1572.5 Scope and standards for hazardous materials. 49 CFR 1572.7 Waivers of security threat assessment standards. 49 CFR 1572.9 Applicant information required for security threat assessment for a hazardous materials endorsement. 49 CFR 1572.11 Applicant responsibilities for a security threat assessment for a hazardous materials endorsement. 49 CFR 1572.13 State responsibilities for issuance of hazardous materials endorsement. 49 CFR 1572.15 Procedures for security threat assessment for an HME. 49 CFR 1572.17 Applicant information required for the security threat assessment for TWIC. 49 CFR 1572.19 Applicant responsibilities for a security threat assessment for TWIC. 49 CFR 1572.21 Procedures for security threat assessment for a TWIC. 49 CFR 1572.23 Conforming Equipment; Incorporation by reference. 49 CFR 1572.24–40 [Reserved] 49 CFR 1572.41 Compliance, inspection and enforcement. 49 CFR 1572.101 Scope. 49 CFR 1572.103 Disqualifying Criminal Offenses. 49 CFR 1572.105 Immigration status. 49 CFR 1572.107 Other analyses. 49 CFR 1572.109 Mental capacity. Subpart E—Fees for Transportation Worker Identification Credential A. TWIC Maritime Population Estimation Methodology 1. Recurring population 2. Five-year population B. Proposed Fee 1. Information Collection/Credential Issuance 2. Threat Assessment/Credential Production 3. FBI Fee 4. Total Fees C. Section 1572.501 Fee Collection VII. Rulemaking Analyses and Notices A. Executive Order 12866 (Regulatory Planning and Review) B. Small Entities C. Assistance for Small Entities D. Collection of Information E. Federalism F. Unfunded Mandates Reform Act G. Taking of Private Property H. Civil Justice Reform I. Protection of Children J. Indian Tribal Governments K. Energy Effects L. Technical Standards M. Environment I. Background and Purpose Under this rule, the Department of Homeland Security (DHS), through the PO 00000 Frm 00004 Fmt 4701 Sfmt 4702 United States Coast Guard (Coast Guard) and the Transportation Security Administration (TSA), proposes to require that all merchant mariners holding an active License, Mechant Mariner Document, or Certificate of Registry and all persons who need unescorted access to secure areas of a regulated facility or vessel must obtain a Transportation Worker Identification Credential (TWIC). In order to obtain a TWIC, individuals will be required to undergo a security threat assessment conducted by TSA. TSA, in conducting those security threat assessments, will use the procedures and standards established by TSA for commercial motor vehicle drivers licensed to transport hazardous materials within the United States. The implementation of the TWIC program in the maritime sector builds upon existing Coast Guard credentialing requirements and security programs for port facilities and vessels. In a separate rulemaking action published in this issue of the Federal Register, Coast Guard also proposes consolidating existing merchant mariner licensing and documentation requirements to avoid duplicative credentials and background checks and to avoid interruption in commerce and reduce the burden on mariners. The TWIC program is a DHS initiative, with joint participation of the Coast Guard and TSA. The program is supported by several statutory and regulatory authorities and presidential directives. The principal statutory authority is the Maritime Transportation Security Act (MTSA), Pub. L. 107–295, 116 Stat. 2064 (November 25, 2002) (46 U.S.C. 70105). Section 102 of MTSA requires the Secretary of Homeland Security to issue a biometric transportation security credential to merchant mariners ‘‘issued a license, certificate of registry, or merchant mariners document’’ and individuals who require unescorted access to secure areas of vessels and facilities.2 These individuals also must undergo a security threat assessment to determine that they do not pose a security threat prior to receiving the biometric credential and authority to access the secure areas without escort. Id. The security threat assessment must include a review of criminal, immigration, and 2 46 U.S.C. 70105. Section 102 of MTSA defines ‘‘Secretary’’ to mean ‘‘the Secretary of the department in which the Coast Guard is operating.’’ Under the Homeland Security Act of 2002, the Coast Guard became part of DHS, thus the Secretary of Homeland Security is authorized to implement the credential requirements for mariners and persons seeking access to secure port facilities under MTSA. E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules pertinent intelligence records in determining whether the individual poses a threat, and individuals must have the opportunity to appeal an adverse determination or apply for a waiver of the standards. Specifically, an individual cannot be denied the transportation security credential required under MTSA unless the individual— (A) Has been convicted within the preceding 7-year period of a felony or found not guilty by reason of insanity of a felony— (i) that the Secretary believes could cause the individual to be a terrorism security risk to the United States; or (ii) for causing a severe transportation security incident; (B) Has been released from incarceration within the preceding 5year period for committing a felony described in subparagraph (A); (C) May be denied admission to the United States or removed from the United States under the Immigration and Nationality Act (8 U.S.C. 1101 et seq.); or (D) Otherwise poses a terrorism security risk to the United States.46 U.S.C. 70105(c). Following the enactment of MTSA in November 2002, the Coast Guard issued a series of general regulations for maritime security. See, 33 CFR parts 101–106. The MTSA regulations set out specific requirements for owners and operators (henceforth ‘‘owners/ operators’’) of vessels, facilities, and Outer Continental Shelf (OCS) facilities that had been identified by the Secretary of Homeland Security as posing a high risk of being involved in a transportation security incident. Under MTSA and the Coast Guard’s MTSA regulations, owners/operators of these vessels and facilities were required to conduct security assessments of their respective vessels and facilities, create security plans specific to their needs, and submit the plans for approval to the Coast Guard by December 31, 2003. All affected vessels and facilities are required to have been operating in accordance with their respective plans since July 1, 2004, and are required to resubmit plans every 5 years. Each plan requires owners/operators to address specific vulnerabilities identified pursuant to their individual security assessments, including controlling access to their respective vessels and facilities. The MTSA regulations require owners/operators to implement security measures to ensure that an identification system was established for checking the identification of vessel and facility VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 personnel or other persons seeking access to the vessel or facility. In establishing the system, owners/ operators were directed to accept identification only if it: (1) Was laminated or otherwise secure against tampering; (2) contained the individual’s full name; (3) contained a photo that accurately depicted that individual’s current facial appearance; and (4) bore the name of the issuing authority. See, 33 CFR 101.515. The issuing authority must be a government authority or organization authorized to act on behalf of the government authority, or the individual’s employer, union, or trade association. There was no requirement that the identification be issued pursuant to a security threat assessment because there was no existing credential and supporting structure that could fulfill the needs specific to the maritime environment. In addition to the regulation of ports and facilities, the Coast Guard has a long history of regulating the merchant marine. Under the current Coast Guard regulatory scheme, the Coast Guard may issue a mariner any combination of 4 credentials: (1) Merchant Mariner Document (MMD); (2) License; (3) Certificate of Registry (COR); or (4) International Convention on Standards of Training, Certification, and Watchkeeping (STCW) Endorsement. An MMD serves as a mariner’s identification credential and is issued to mariners who are employed on merchant vessels of 100 gross register tons or more, except for those vessels employed exclusively in trade on the navigable waters of the U.S. Licenses are qualification certificates that are issued to officers. CORs are qualification certificates that are issued to medical personnel and pursers. STCW Endorsements are qualification certificates issued to mariners who meet international standards and serve aboard vessels to which STCW applies. The License, COR, and STCW Endorsement are qualification credentials only. Only the MMD is an identity document, and none of the current mariner credentials contain the biometric information required under MTSA. TSA currently administers several programs involving security threat assessments of individuals engaged in the transportation industry, including certain airport and aircraft operator employees, and alien flight school students. Section 1012 of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act) Pub. L. 107–56, 115 Stat. 272 (October 25, 2001) PO 00000 Frm 00005 Fmt 4701 Sfmt 4702 29399 provides that a State cannot issue a hazardous materials endorsement (HME) to a commercial driver who poses a security threat. TSA implemented its security threat assessment processes under this provision. TSA first issued regulations to implement security threat assessment standards for HME applicants (TSA’s hazmat rule) in May 2003 and subsequently amended those regulations based on comments received from the States, employers and affected drivers. (A more detailed discussion and regulatory history of the hazmat regulations can be found at 68 FR 23852 (May 5, 2003); 68 FR 63033 (November 7, 2003); 69 FR 17696 (April 6, 2004); and 69 FR 68720 (November 24, 2004). These standards are codified at 49 CFR part 1572, where many of the standards we propose for TWIC under this rule also will reside. TSA’s hazmat regulations establish standards concerning criminal history, immigration status, mental capacity, and terrorist activity to determine whether a driver poses a security threat and is qualified to hold an HME.3 Drivers who have been convicted or found not guilty by reason of insanity for certain crimes in the preceding 7 years, or have been released from incarceration for those crimes in the preceding 5 years, are deemed to pose a security threat and are not authorized to hold an HME. 49 CFR 1572.103. Drivers convicted of certain particularly heinous crimes, such as espionage, treason, terrorist-related offenses, or severe transportation security incidents, are permanently banned from holding an HME. Id. In addition, drivers who have been involuntarily committed to a mental institution or adjudicated as mentally incapacitated are considered to pose a security threat that warrants disqualification from holding an HME. 49 CFR 1572.109. Aliens are not prohibited from obtaining an HME. The hazmat rule permits individuals who are in the United States lawfully and are authorized under applicable immigration laws to work in the United States to hold an HME upon completion of a satisfactory TSA security threat assessment. 49 CFR 1572.105. TSA reviews a driver’s immigration status to determine if the applicant for an HME is authorized to be present and work in the United States under applicable 3 In developing the hazmat regulations, TSA sought to harmonize, to the extent possible, the background check and eligibility criteria requirements of both MTSA and the USA PATRIOT Act and thus adopts privisions from both statutes where appropriate. See 68 FR at 23853. E:\FR\FM\22MYP2.SGM 22MYP2 29400 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules sroberts on PROD1PC70 with PROPOSALS immigration laws. In addition, as set forth in the hazmat rules, TSA conducts a security check of international databases through Interpol or other appropriate means. 49 CFR 1572.107. TSA’s hazmat regulations also include appeal and waiver procedures to ensure that no driver is wrongfully determined to pose a threat, to provide individuals who are disqualified from holding an HME the opportunity to show rehabilitation, where applicable, and to maintain consistency with other credentialing or background check requirements among transportation workers, such as those in the maritime industry covered by MTSA and this TWIC rulemaking. See e.g., 49 CFR parts 1572.141 and 143. II. Development of TWIC Process In 2002, TSA established the TWIC program in response to identity management shortcomings and vulnerabilities identified in the transportation system. In some segments of the transportation system, it is not possible to positively identify individuals entering secure areas or assess the threat they may pose due to a lack of pertinent background information. Also, existing identity credentials are often vulnerable to fraud. To mitigate these weaknesses, TSA determined that an integrated, credential-based, identity management system for all transportation workers who need unescorted access to secure areas of the nation’s transportation system would be necessary. Homeland Security Presidential Directive 12 (HSPD 12) requires Federal agencies to improve secure identification processes for Federal employees and contractors. The objectives of the directive are to ensure that the credentialing processes are administered by accredited providers; are based on sound criteria for verifying an individual’s identity; include a credential that is resistant to fraud, tampering, counterfeiting and terrorist exploitation, and can be authenticated quickly and electronically. As designed and proposed in this rule, TWIC does not contradict the control objectives of HSPD 12. The U.S. Department of Commerce published guidance on the standards and methods by which Agencies could reach compliance with HSPD 12. In February 2005, the Department of Commerce issued the Federal Information Processing Standards Publication 201 (FIPS 201), Personal Identification Verification of Federal Employees and Contractors in response to HSPD 12. FIPS 201 is divided into Personal Identification Verification VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 (PIV) Parts I and II. Part I addresses the control and security objectives, particularly the personal identity proofing process. Part II provides detailed technical specifications that must be met to ensure interoperability of PIV-compliant credentials in personal authentication, access control, and credential management systems throughout the Federal government. The development of FIPS 201 occurred concurrently with the design of TWIC. TSA and its contractors closely monitored the development of FIPS 201 and individuals working on FIPS 201 followed the design of TWIC. TSA recognized that there are many benefits to designing TWIC in alignment with FIPS 201: Leveraging the TWIC infrastructure to support other DHS or government credentialing programs; avoiding obsolescence by using the latest technology; securing critical facilities with the same process used by Federal agencies; having interoperability during an emergency; and demonstrating the functionality of FIPS 201. All of the significant components of the TWIC system align with FIPS 201. As tested in the maritime environment and planned in this NPRM, TWIC is an identification credential containing numerous technologies to make it secure and tamper-proof. TWIC is a ‘‘smart’’ credential containing two electronic chips on which encoded data is stored to allow all subsequent TWIC functions to be performed. TWIC is designed to ensure that the identity of each TWIC holder has been verified; that a threat assessment has been completed on that identity; and that each credential issued is positively linked to the rightful holder through the use of biometric technology. Facility and vessel owners/ operators subject to this rule will then determine which TWIC holders will be granted unescorted access to secure areas of their facility. Prototype The TWIC program has been developed in three phases. Phases I, Planning, and II, Technology Evaluation, were completed in 2003, and Phase III, Prototype, was completed in 2005. In the technology evaluation, TSA tested and evaluated a range of credential-based systems in use at transportation facilities. In Prototype, TSA tested a comprehensive credentialing system, which included enrollment, threat assessments, biometric security, credential production, and credential issuance. Prototype was conducted at twentyeight facilities beginning November 4, PO 00000 Frm 00006 Fmt 4701 Sfmt 4702 2004 in various modes of the transportation system, including air, rail, and maritime. The Prototype Phase came to an end in the summer of 2005. During Prototype, the participating facilities and associated transportation workers voluntarily provided biographical and biometric identifiers. Participants provided appropriate identity verification documentation, such as a birth certificate, driver’s license, government photo identification, or similar document. TSA conducted a name-based threat assessment using the biographic information provided, and utilized the biometric information to verify identity and determine whether an applicant had previously enrolled in the program. TSA did not use biometric information to complete a security threat assessment.4 TSA will be using both biographic and biometric information to conduct the security threat assessment once TSA implements the full program. To verify an individual’s identity during Prototype, TSA followed the U.S. Citizenship and Immigration Services Employment Eligibility Verification (Form I–9) process, commonly used by the federal government and industry in the hiring process. TSA tested the TWIC as positive identification for access to secure areas of participating transportation facilities. By testing the integration of these components, TSA was able to assess the system’s performance prior to deciding how the program should be implemented. Consequently, some processes that were tested in Prototype, such as ‘‘employer sponsorship,’’ are not being proposed in this rule based on TSA’s determination that the process did not add sufficient value or created operational difficulties that could not be resolved. III. Proposed Rule A. Coast Guard In order to integrate TWIC into already existing security programs in the maritime environment, the Coast Guard must amend its maritime security regulations, found in 33 CFR Subchapter H. These changes will set performance standards for owners/ operators of vessels, facilities, and Outer Continental Shelf facilities to meet 4 Florida law requires persons seeking access to certain port facilities within that State to submit fingerprints and other information to obtain a Stateissued credential. During Prototype conducted in Florida, therefore, participants submitted fingerprints as required under State law and the State completed a fingerprint-based criminal history records check. TSA did not use biometric information collected from Florida participants to conduct a security threat assessment. E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules sroberts on PROD1PC70 with PROPOSALS when incorporating TWIC into their existing security programs. The Coast Guard also must amend its regulations governing merchant mariners, found in 46 CFR parts 10, 12, and 15, in order to add the statutory mandate that they hold a TWIC. In a separate rulemaking, published in today’s Federal Register, the Coast Guard is proposing to consolidate qualifications credentials and streamline its mariner regulations, which would ensure that no mariner is required to undergo (or pay for) more than one security threat assessment and identity verification. Coast Guard emphasizes that possession of the TWIC credential is not intended to constitute an automatic access right to any facility. The owner/ operator continues to have the ultimate authority as to access control decisions, and although holding a duly-issued TWIC is required before an individual is eligible to be granted unescorted access, the individual must also have a need for access in accordance with the approved security plan. The owner/operator’s right to refuse admittance to any individual, regardless of whether he or she holds an authenticated TWIC, remains unchanged. B. TSA TSA’s role in implementing the TWIC program in the maritime sector will be to conduct security threat assessments of credentialed merchant mariners and individuals with unescorted access to secure areas, providing an appeal and waiver process for applicants who receive an adverse determination, and performing related functions in the enrollment and credential issuance process. In this rule, TSA proposes changes to its regulations to extend the current processes for conducting security threat assessments for HMEs to persons seeking to obtain TWICs. On August 10, 2005, the Safe, Accountable, Flexible, Efficient Transportation Equity Act—A Legacy for Users (SAFETEA–LU), Pub. L. 109– 59, 119 Stat. 1144 (August 10, 2005) was enacted. Section 7105 of SAFETEA–LU (49 U.S.C. 5103a(g)(1)(B)(i)) requires TSA to initiate a rulemaking to determine which background checks required by Federal law and applicable to transportation workers are equivalent to or less stringent than the security threat assessment TSA requires for HME drivers. In addition, SAFETEA–LU requires TSA to develop a process for notifying employers of the results of a threat assessment conducted on an HME applicant. Under this rule, TSA is proposing a fee to cover the cost of the TWIC threat VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 assessment, appeals of TSA decisions during the process, and the issuance of the credential as required under Section 520 of the Homeland Security Appropriations Act of 2004 (2004 DHS Appropriations Act), Pub. L. 108–90 (October 2003). TSA also is inviting comments from the transportation industry at large on the processes proposed under this rule as TSA and DHS are considering extending the TWIC program to other areas in the transportation industry outside of the maritime sector. 1. TWIC Process As proposed in this rule, the purpose of the TWIC program is to ensure that only authorized personnel who have successfully completed a security threat assessment have unescorted access to secure areas of maritime facilities and vessels. The credential will include a reference biometric—fingerprints—that positively links the credential holder to the identity of the individual who was issued the credential. TWIC holders may be asked to confirm, by providing a fingerprint, that they are the rightful owner of the credential at any time. Access control procedures and systems at facilities and vessels will recognize the credential and the information encrypted on it, so that the overall maritime network will be interoperable. In addition, an individual’s credential can be deactivated or revoked by TSA if disqualifying information is discovered by or presented to TSA or other DHS entity, or the credential is lost or stolen, so that the credential can no longer be used to obtain unescorted access to secure areas. TSA has designed the TWIC process to maintain strict privacy controls so that a holder’s biographic and biometric information cannot be compromised. The TWIC process proposed in this rule is described below from the perspective of an applicant. a. Pre-Enrollment and Enrollment TWIC enrollment will be conducted by TSA (or TSA’s agent operating under TSA’s direction). All enrollment personnel must successfully complete a TSA security threat assessment and receive a TWIC before they will be authorized to access documents, systems, or secure areas. Facility and vessel owners/operators must notify workers of their responsibility to enroll, as well as the deadline for doing so. (The proposed implementation plan for enrollment is discussed in greater detail below.) Owners/operators must provide applicants enough lead time to enroll so that TSA has sufficient time to complete PO 00000 Frm 00007 Fmt 4701 Sfmt 4702 29401 the security threat assessment and issue the credential before the access control procedures go into effect. Generally, owners/operators should give individuals at least 60 days notice to begin the process. TSA cannot guarantee that any threat assessment can be completed in less than 30 days, and therefore, owners/operators and applicants should make every effort to initiate enrollment in a timely fashion to prevent workers being denied access for non-compliance. TSA will provide owners/operators with locations for enrollment that they can then pass on to the workers (hereinafter referred to as applicants). For purposes of the NPRM, a list of potential enrollment center locations is provided on the TSA Web site (www.tsa.gov) to provide prospective owner/operators and applicants a general idea of the enrollment plan. This list is subject to change and TSA invites comment from affected parties on the potential enrollment locations. Applicants will be able to ‘‘preenroll’’ online to reduce the time needed to complete the entire enrollment process at an enrollment center. For pre-enrollment, applicants need a computer with internet access. The applicant can access the TWIC Web site to provide personal information required for enrollment and select an enrollment center at which to complete enrollment. Data submitted by applicants via the Internet will be sent using Internet security protocols (i.e., SSL). All information provided is then stored in the TSA system, which encrypts and protects the data from unauthorized access. Applicants may schedule an appointment while on-line to complete the enrollment process, although appointments are not required at enrollment centers. The Web site will list the documents the applicant must bring to the enrollment center to verify identity. The convenience of preenrollment is a significant benefit for applicants and reduces strain on the enrollment centers. Applicants who preenroll must appear at enrollment centers to verify their identity, confirm that the information provided during preenrollment is correct, provide biometrics, and sign the enrollment documents. At the enrollment center, applicants will receive a privacy notice and consent form, by which they agree to provide personal information for the security threat assessment and credential. (For applicants who preenroll, the privacy notice is provided with the application online, but the applicants must acknowledge receipt of the notice in writing at the enrollment E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS 29402 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules center.) If an applicant fails to sign the consent form or does not have the required documents to authenticate identity, enrollment will not proceed. During Prototype, 96 percent of applicants appeared for enrollment with suitable identity verification documents. As TWIC is implemented, TSA and Coast Guard will make information available to affected workers in advance of enrollment so that all are aware of what to bring to the enrollment center. This information will also be posted on the TSA/TWIC Web site at www.tsa.gov. All information collected at the enrollment center or during the preenrollment process, including the signed privacy consent form and identity documents are scanned into the TSA system for storage. All information is encrypted or stored using methods that protect the information from unauthorized retrieval or use. At the enrollment centers, applicants must provide ten fingerprints and sit for a digital photograph. The fingerprints and photograph will be electronically captured at the enrollment center for use on the credential. Individuals must provide ten fingerprint images for use in completing the security threats assessment process. The credential itself will store two fingerprint templates, one of which is used as a reference biometric to verify identity. The entire enrollment record (including the 10 fingerprints) will be stored in the TSA system, encrypted and segmented to prevent unauthorized use. TSA will provide alternative procedures for enrollment centers to use for situations in which an applicant is unable to provide fingerprints. The TWIC fee, which covers the complete cost of enrollment, threat assessment, and credential production and delivery, must be collected from the applicant at the enrollment center prior to the enrollment record being transmitted to the TSA system. The TWIC enrollment fee will be nonrefundable, even if the threat assessment results in a TWIC not being issued. Once all data and the fee are collected, the enrollment record is encrypted and electronically transmitted to the TSA system. The TSA system acknowledges receipt of the enrollment record, at which time all enrollment data is automatically deleted from the enrollment workstation. Once the enrollment record is transmitted to the TSA system, personal information is stored only in the TSA system, and personal data is encrypted to very high standards before it is transferred or stored. If an enrollment center temporarily loses its internet connection, the enrollment data is VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 encrypted and stored on the enrollment workstation, but only until an internet connection is restored. During Prototype, the average time needed for an applicant who preenrolled to complete enrollment was 10 minutes, 21 seconds. It is expected that it will take approximately fifteen minutes to complete enrollment of applicants who do not pre-enroll. TSA and Coast Guard currently envision a phased enrollment process based on risk assessment and cost/ benefit analysis. Locations that are considered critical and provide the greatest number of individual applicants will be among the earliest enrollment sites. There are approximately 125 locations covering approximately 300 ports where TSA plans to enroll applicants, and we are in the process of rating each location against a variety of factors to assess criticality, population, and infrastructure. TSA and Coast Guard will work closely with the maritime industry to ensure that owners/operators and workers are given as much notice as is possible when a definitive enrollment schedule is selected. TSA and Coast Guard also are contemplating implementing a more flexible rollout, with anticipated dates to be announced by notices published in the Federal Register. (See the discussion of § 1572.19 below for additional information on timing of enrollment.) TSA plans to use a combination of fixed and mobile enrollment stations to make the enrollment process as efficient as possible for applicants and owners/ operators. b. Adjudication of Security Threat Assessment Following enrollment, the TSA system sends pertinent parts of the record to various sources so that appropriate terrorist threat, criminal history, and immigration checks can be performed. When the checks are completed, TSA makes a determination on whether or not to issue a TWIC to the applicant and notifies the applicant. If disqualifying information is discovered, TSA issues an Initial Determination of Security Threat to the applicant with information on how the applicant can appeal an adverse decision or apply for a waiver of the standards. If the applicant does not respond to the Initial Determination within a specified period, it converts to a Final Determination of Security Threat and the applicant does not receive a TWIC. If the applicant proceeds with an appeal or application for waiver and is successful, the applicant is notified accordingly and the credential PO 00000 Frm 00008 Fmt 4701 Sfmt 4702 production process begins. (The appeal and waiver processes are discussed in greater detail below in the section-bysection analysis.) TSA may provide some of the notifications to applicants via email, if an applicant provides an email address on the application for the TWIC. We invite comment from prospective applicants about the substitution of email notification for a paper process. c. Credential Production If the applicant is qualified to receive a TWIC, the TSA system generates an order to produce a credential. It is produced at a government credential production facility and securely shipped to the center at which the applicant enrolled. The applicant will be notified that the TWIC is ready to be retrieved and activated for use. The face of the TWIC credential contains the applicant’s photograph, name, TWIC expiration date, and a unique credential number. In addition, the credential will store finger minutia templates of 2 fingers, finger pattern templates of 2 fingers, a personal identification number, and a Federal Agency Smart Credential number. The data is securely stored and protected in accordance with FIPS 201 in the various technologies used in the credential, such as magnetic stripe, contact chip, and contactless chip. The fingerprint data, the reference biometric, is used to match the credential to the person who enrolled. The TWIC system contains many feedback mechanisms to validate the transmission and receipt of data at key points in the process. The status of each transmission is recorded within the system. Credentials are electronically locked prior to shipment to the enrollment center so that the data cannot be accessed. Once the credentials are electronically locked, they cannot be used for access to any vessel or facility until they are activated by the TWIC enrollment station. d. Credential Activation The applicant is notified when the enrollment center has received the credential. The applicant then returns to the enrollment site at his or her convenience to activate the credential. At the enrollment center, the applicant’s credential is retrieved from secure storage and the photograph and name on it are compared to the applicant and the identity documents the applicant uses to authenticate identity. The applicant places a designated finger on a reader to generate a biometric match against the biometric stored on the credential and in the TSA E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules system. Upon successful biometric match, the TWIC is activated and the applicant selects a Personal Identification Number (PIN) that also is stored on the credential. The PIN can subsequently be used as an additional factor in proving one’s identity and authorized use of the credential, or as the primary verification tool if the biometric is inoperative for some reason. The TWIC security threat assessment and credential are valid for five years, unless derogatory information is discovered and TSA revokes the credential. The process outlined above for credential activation is the same process TSA tested in Prototype, which worked well for owner/operators and employees who enroll. However, implementation of the program nationwide involving employees that are not stationary at one facility or port may impact applicants and owner/operators differently. TSA is concerned that requiring an applicant to return to the enrollment center to activate the credential may be onerous for workers who travel a great deal and may not know where they will be when the credential is ready for pick-up. TSA is considering the security and operational impacts of alternative procedures, on which we invite comment. TSA is considering an amendment to the process that would allow a worker to designate a specific enrollment center for credential pick up and activation. The card production facility would send the credential to that location rather than the location where the applicant enrolled. This is a change that can be accomplished, but this was not tested in Prototype and a variety of software changes may be needed, which could increase costs and affect the timing of implementation. Moreover, applicants will not know the exact date on which their credential will be ready and so those who work at a variety of ports across the country may not be able to designate a specific activation location on the enrollment application. During Prototype, the entire process from enrollment to card production was complete in fewer than 10 days. However, that process differed from the full program we plan to implement with this rule in a few significant ways. First, nearly all of the employees who volunteered for Prototype worked at the same location every day and the enrollment center was located on that site. Second, TSA did not complete fingerprint-based criminal history records checks, and so there was no time needed to adjudicate and provide redress for criminal activity. For threat assessment programs that are currently VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 in place nationally in which applicants are not stationary and TSA conducts a fingerprint-based CHRC, the threat assessment is generally completed in less than 30 days. The time needed to complete the threat assessment varies depending on whether the database searches produce adverse information that must be investigated, and whether the applicant files an appeal or requests a waiver. These conditions will exist for the TWIC program and therefore, TSA will not be able to predict or establish a specific date on which the threat assessment and card production process will be complete. DHS invites comment on this option, and any other proposals that would make it easier logistically, without sacrificing security, for the public to receive and activate TWIC cards. e. Using TWIC in an Access Control System Once the enrollment process is complete and the credential is activated, the credential is ready to be used as an access control tool. Possession of a TWIC does not guarantee access to secure areas because the owner/operator controls the individuals who are given unescorted access to the facility or vessel. Rather, TWIC is a secure, verified credential that can be used in conjunction with the owner/operator’s risk-based security plan and as required by the Coast Guard security regulations. As envisioned in this NPRM, owners/ operators will determine an individual’s need for unescorted access to secure areas and then grant access using a TWIC program. The access control administrator of the vessel or facility verifies that the individual holding the TWIC matches the biometric stored on the TWIC by conducting a 1-to-1 match with the individual’s finger and the fingerprint template stored on the chip in the TWIC. The owner/operator verifies that an individual’s TWIC is valid, either by directly interfacing with the TSA system or by using a list of invalid credentials downloaded from TSA. Either method provides owners/operators pertinent information concerning the validity of the credential. TSA will invalidate credentials that are reported as lost, stolen, damaged, retired, or issued to an applicant that TSA subsequently determines may pose a security threat. When the invalidation is for cause, that is, due to a security threat, TSA will revoke the credential. Invalidated credentials cannot be used or honored for unescorted access to secure areas. Cardholders who report the credential as lost, stolen, or damaged must go to PO 00000 Frm 00009 Fmt 4701 Sfmt 4702 29403 the enrollment center for resolution, and/or re-issuance of a new credential. After the individual has been granted access to the facility, the owner/operator may opt to notify the TSA system that access privileges have been granted to this worker at that facility. If the owner/ operator invokes this option, the owner/ operator also assumes responsibility for informing the TSA system if the owner/ operator subsequently denies the individual access privileges. f. Lost, Damaged, or Stolen TWICs Replacement TWICs are available if a credential is lost, stolen, or damaged. As soon as the applicant is aware that the credential is missing or damaged, he or she calls the Call Center and the Center follows a standard process to invalidate the credential. The applicant then travels to an enrollment center to receive a new credential. During Prototype, the card production facility printed and shipped the new credentials within 24 hours of receiving the information. Applicants must pay a fee of $36 to cover the cost of lost/damage/ stolen credential invalidation, new credential production, reissuance, shipping, and other appropriate program costs. No new TSA threat assessment-specific or enrollment costs are factored into this replacement fee. g. Renewal TWICs issued under this rule will expire after five years unless renewed. TSA does not plan to notify TWIC holders when their credential is about to expire because the expiration date will be displayed on the face of the credential. To renew a TWIC, the holder must appear at any enrollment center, starting up to 90 days before the expiration date of the credential, to initiate the renewal process. However, mariners are allowed and encouraged to initiate renewal 180 days prior to expiration to allow sufficient time for TSA to conduct the security threat assessment and the Coast Guard to complete any review necessary to renew any required mariner credentials. During renewal, applicants must provide the same biographic and biometric information required in the initial enrollment and pay the associated fees. A new credential is issued upon renewal. h. Call Center Upon publication of the final rule, TSA will refer the public to a Call Center to assist with questions about the TWIC program. An automated telephone line, listing options for the caller to select, will direct the caller to the TWIC Help Desk or the TSA/TWIC Web site. E:\FR\FM\22MYP2.SGM 22MYP2 29404 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules Callers will be able to discuss questions about the program and final standard, the status of their security threat assessment, the location and time of operation of enrollment centers, and online applications and educational materials. TSA has used the Call Center when implementing other new programs and believes it will be very useful to owners/operators and applicants. i. Notifying Employers of Threat Determinations TSA is proposing to modify the rule text applicable to HME applicants concerning employer notification and apply the proposed changes to the TWIC applicants. As discussed above, SAFETEA–LU established several mandates concerning the threat assessment process. One of the provisions requires TSA to invite comment on and develop a process to notify employers of HME applicants of the results of the threat assessment. Specifically, section 7105 states that— sroberts on PROD1PC70 with PROPOSALS Within 90 days of enactment, TSA, after receiving comments from interested parties, must develop and implement a process for notifying employers designated by applicants for a HAZMAT license of the results of the applicant’s background check if (1) such notification is appropriate considering the potential security implications and (2) the Director determines in a final notification of threat assessment served on the applicant that he or she does not meet the standards for granting a license. In the November 24, 2004 hazmat rule, TSA discussed employer notification, noting that actual criminal history or other dispositive records must be maintained confidentially by TSA. See 69 FR at 68726. TSA may inform an employer that an employee is disqualified from holding an HME, or has had an HME revoked, so that the employer knows that the employee is not authorized to transport hazardous materials. TSA, however, generally cannot disclose the basis for the determination result of the threat assessment due to prohibitions on disclosure of such information under the Privacy Act, or other pertinent privacy laws or law enforcement or security regulations. See e.g., 5 U.S.C. 552a (as amended); 46 U.S.C. 70105(e); 28 CFR 50.12. In the hazmat rule, TSA noted that if it believes an immediate threat exists, TSA may provide additional information to the employer to help prevent a security incident. In the November hazmat rule, TSA requested comment on methods to notify an employer that a particular driver’s HME is revoked or the VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 application for an HME is denied. TSA anticipated that it would be difficult to locate a driver’s employer because drivers tend to change employers frequently and may work for several employers at one time. Also, many drivers are self-employed as owners/ operators and notification in these cases would be unnecessary. TSA proposed requiring each employer to maintain a current list of hazmat-endorsed driver employees on a secure Web site that TSA could access for notification purposes and employers could amend as employees change jobs. This list would minimize the chance that TSA would erroneously notify a previous employer of a disqualification. Also, the list would prevent the loss of time and resources needed to locate an employer for notification. Similar procedures are in place with respect to aviation workers who have airport security identification display area authority. 49 CFR 1542.211. TSA received no comments on this proposal or suggestions for an alternative plan, although some employers stated that they would like notification of all employee disqualifications. Currently, when TSA determines that a driver is not qualified to hold an HME, TSA applies the following policy: (1) TSA notifies the employer only in cases where TSA determines that an imminent security threat may exist. (2) TSA notifies the employer listed in the driver’s HME application. (3) TSA limits the information provided to the employer to the fact that the driver’s HME is being revoked or denied, but does not provide the reason for the action. TSA developed this process to address two primary concerns. First, TSA is concerned about sharing disqualification information with incorrect employers and that the likelihood of such notifications would rise if TSA made notifications in all disqualification cases. For the many drivers who change employers frequently or are self-employed, TSA would expend considerable resources trying to determine with certainty an applicant’s current employer(s). Second, for actions in which there is not an imminent threat, employers of hazmat drivers have other procedures in place to verify whether a driver has an HME. Carriers currently are required to determine if a driver employee has been issued an HME, by checking State driver records. The Federal Motor Carrier Safety Administration (FMCSA) requires carriers to check the driver’s status in the first 30 days of employment by contacting the licensing State. After that, the carrier must make PO 00000 Frm 00010 Fmt 4701 Sfmt 4702 an inquiry with the State at least once annually to ensure that the driver is authorized to transport hazardous materials. 49 CFR 391.25. Additionally, FMCSA requires carriers to review an employee’s driving record during the three years preceding employment with the carrier, in every State in which the driver was licensed. The carriers also must investigate the driver’s employment record during the preceding three years. 49 CFR 391.23. These investigations reveal whether the driver’s HME has been revoked. In light of the employer notification requirement in SAFETEA–LU, and upon further analysis, TSA proposes to amend the rule text concerning employer notification generally and apply the following proposed changes to HME and TWIC applicants. First, TSA proposes to add a statement to the application for an HME or TWIC acknowledging that TSA may notify the applicant’s employer if TSA determines that the applicant poses a security threat. The applicant must acknowledge receipt of this statement. Second, TSA proposes to amend the rule text to state that TSA will notify an applicant’s employer, where appropriate, when issuing final determinations of threat assessment or immediate revocations. Aside from the employer notification issue, with TWIC applicants, TSA also proposes to notify the Federal Maritime Security Coordinator (FMSC), the chief governmental security official at the port, of revocations. The FMSC also is the Captain of the Port (COTP). 33 CFR 101.105. TSA will notify the Coast Guard concerning the outcome of threat assessments of merchant mariners because a mariner credential may not be issued by Coast Guard if TSA denies or revokes a TWIC for the mariner. TSA invites comment on these proposed requirements for notifying employers of employee disqualifications. TSA also invites suggestions for improving this system and methods by which a current employer/employee list can be available to TSA when employer notification is necessary. TSA may change its requirements based on these comments. 2. Fee Section 520 of the 2004 DHS Appropriations Act requires TSA to collect reasonable fees for providing credentialing and background investigations in the field of transportation. Fees may be collected to pay for the costs of the: (1) Conducting or obtaining a criminal history records check (CHRC); (2) reviewing available law enforcement databases, commercial databases, and records of other E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules sroberts on PROD1PC70 with PROPOSALS governmental and international agencies; (3) reviewing and adjudicating requests for waivers and appeals of TSA decisions; and (4) other costs related to performing the security threat assessment or providing the credential or performing the background records check. Section 520 requires that any fee collected must be available only to pay for the costs incurred in providing services in connection with performing the security threat assessment or providing the credential or performing the background records check. The fee may remain available until expended. TSA establishes these fees in accordance with the criteria in 31 U.S.C. 9701 (General User Fee Statute), which requires fees to be fair and based on: (1) Costs to the government, (2) the value of the service or thing to the recipient, (3) public policy or interest served, and (4) other relevant facts. In this rule, TSA proposes to establish new user fees: (1) The Information Collection and Credential Issuance fee, estimated to range from $45–$65; (2) the Threat Assessment and Credential Production fee, which will be $62, or $50 for applicants who have already received a comparable threat assessment from DHS, including those for a Merchant Mariner License (MML), Merchant Mariners Document (MMD), Hazardous Materials Endorsement (HME), and Free and Secure Trade (FAST) card holders; and (3) the fee for replacement of a lost, damaged, or stolen TWIC, which will be $36 for all TWIC holders. In addition, TSA will collect the FBI Fee for the criminal history records checks in the TWIC threat assessment process and forward the fee to the FBI. The current FBI Fee is $22.00. If the FBI increases that fee in the future, TSA will collect the increased fee. Therefore, total TWIC fees are expected to range from $95 (MML, HME, and FAST card holders already vetted by DHS) to $149 for all other applicants. 3. TWIC in Other Modes of Transportation This rule proposes standards for the maritime environment and consequently the security threat assessment standards primarily impact merchant mariners and port workers. However, there are a variety of individuals who work in other modes of transportation that may be subject to the security threat assessment requirement proposed here. For instance, many ports include railroad operations. Rail employees may be required to obtain a TWIC depending on whether the railroad operations are situated in the secure areas. Commercial truck drivers VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 delivering or retrieving goods at the port typically have unescorted access to secure areas and so they would be required to have a TWIC. As envisioned and currently proposed in this rule, commercial drivers that hold an HME and have completed TSA’s security threat assessment under 49 CFR part 1572 would not be required to undergo a new threat assessment for TWIC until their HME threat assessment expires. These drivers would be required to provide a biometric for use on the TWIC and pay for enrollment services, credential costs, and appropriate program support costs. TSA is considering whether to incorporate the TWIC system into all modes of transportation. Therefore, TSA requests comments from all of the transportation industry—rail, mass transit, pipeline, and aviation—not just those affected immediately by these specific proposed maritime rules. TSA invites ideas on how this security threat assessment and credentialing system can be used to its full potential in each of these areas. Each mode of transportation brings its own set of challenges to the philosophy of creating secure areas and access control procedures that provide a high level of security, protect privacy, and do not interfere with commerce. TSA welcomes the views of all interested parties as we continue to improve transportation security with TWIC and other programs. IV. Advisory Committee Participation In drafting the TWIC regulations, the Coast Guard drew upon the expertise of the National Maritime Security Advisory Committee (NMSAC), which is composed of a cross-section of maritime industries and port and waterway stakeholders; including, but not limited to: Shippers, carriers, port authorities, and facility operators. NMSAC advises, consults with, and makes recommendations to, the Secretary of Homeland Security via the Commandant of the Coast Guard on matters affecting maritime security. In response, NMSAC formed a Credentialing Work Group (CWG), which was comprised of a significant number of NMSAC members and approximately 25 other members from the public who represented various geographic cross-sections and different elements of the maritime industry. NMSAC provided the Coast Guard and TSA with specific industry sponsored comments and recommendations for consideration in developing this proposed rule. TSA and Coast Guard summarized these comments and provide their joint responses below. PO 00000 Frm 00011 Fmt 4701 Sfmt 4702 29405 A. Access Control Comment: NMSAC recommended that ‘‘secure area’’ be defined to coincide with the access control area determined by the facility operator in its security plan. Response: We agree with this recommendation and, for all of the reasons discussed in this NPRM, are including it in the Coast Guard’s proposed definition of secure area. Comment: NMSAC also recommended that when vessels are moored at MTSA regulated facilities, they should be allowed to rely on the facility’s TWIC procedures and not be required to read an individual’s TWIC again when he or she required unescorted access to the vessel from the facility. Response: We agree with this recommendation in part. Nothing in the proposed rule prohibits vessels and facilities from agreeing to share the management of access control on a caseby-case or recurring basis to facilitate operations, subject to approval by the cognizant COTP. In keeping with the intent of MTSA, facilities and vessels will still retain ultimate responsibility for their own access control measures. In the interest of preserving layered security, we also anticipate there will be situations where persons seeking unescorted access should be required to follow access control procedures again—when moving from a vessel to a facility and vice versa—even if this requires repeating access control procedures. Comment: NMSAC believes that TWIC should serve as the baseline requirement for unescorted access to a facility or vessel, allowing owners or operators to adopt additional measures. Response: We agree with this recommendation. Nothing in this NPRM prevents an owner/operator from instituting additional requirements before granting access. Comment: NMSAC also felt that possession of a TWIC should not guarantee access to a facility or vessel, or to a specific location within the site. Response: We agree. Owners and operators decide who, among the TWIC holders, may have unescorted access to the facility or vessel. Comment: NMSAC also recommended that access to Outer Continental Shelf facilities as defined in part 106, where access is limited and can be controlled by having the TWIC credential read at the point of embarkation. Response: This arrangement is currently allowed under the existing regulations and could continue under the provisions of this NPRM. E:\FR\FM\22MYP2.SGM 22MYP2 29406 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules B. Location of Reader Points Comment: NMSAC recommends that the regulation not stipulate specific reader locations. Response: We agree. Reader locations are not specified in the proposed rule. Owners/operators determine where readers are located, based on the security plan and the performance standards established in the NPRM. Comment: NMSAC recommends that screening points should be placed far from critical areas and placement should be determined by owners/ operators. Response: Screening locations are not specified in the proposed rule. Owners/ operators determine where screening points are located, based on the security plan and the performance standards established in the NPRM. sroberts on PROD1PC70 with PROPOSALS C. Sponsorship Comment: A majority of NMSAC opposed employer sponsorship as a requirement of the TWIC application process. Many members believe sponsorship introduced several complex components, including privacy concerns, increased bureaucracy associated with approving and monitoring sponsors, and employer liability issues. Response: After careful consideration, we agree that sponsorship, as originally conceived, is a challenge for the maritime TWIC program. Many of the individuals who will require a TWIC, such as truck drivers and casual laborers entering the port, would not be able to list or obtain a sponsor. Making accommodations to the sponsorship process for these workers would greatly reduce its value. Under the NPRM, applicants are asked to provide information on their employer if applicable, and to certify that they have a need to obtain a TWIC. D. Waiver Process/Alternative Security Arrangements Comment: NMSAC recommended that we use the list of disqualifying offenses currently used for hazmat drivers for establishing disqualifying offenses, with some qualifications and concerns. The primary concern centered on the waiver requirements found in MTSA, which require employer involvement. NMSAC believes that employer involvement in the waiver process is inconsistent with MTSA’s prohibition against disclosure of details of why an applicant is denied a TWIC. NMSAC recommended that the TWIC regulations rely upon the existing waiver procedures that apply to hazmat drivers. Response: We agree. We have proposed using the same list of crimes VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 currently in place under the hazmat regulations when making determinations regarding TWIC eligibility. Additionally, the NPRM contains the waiver procedures that currently apply to hazmat drivers. Comment: NMSAC also expressed concerns about individuals currently employed in the maritime industry who might be denied a TWIC due to previous criminal activity. NMSAC believes existing employees should not be denied a TWIC and possibly lose their jobs unless TSA determines the individual to pose a risk based on the entire threat assessment. NMSAC recommended a ‘‘limited term waiver’’ that would allow an individual who is employed on the date of TWIC implementation, and is not otherwise determined to be a security threat, to obtain a TWIC. Response: A ‘‘limited term waiver’’ is not being proposed. As in the hazmat rule, language in the waiver provisions of the NPRM allow individuals to request a waiver of all but four disqualifying offenses. These pertain to espionage, sedition, treason, and terrorism. In accordance with MTSA and the NPRM, individuals with immigration violations would also be ineligible for the TWIC. Under the hazmat program, the majority of workers with disqualifying offenses, other than those listed above, who have applied for a waiver have been successful in obtaining their endorsement through the existing waiver process. In addition, the time between publication of the final rule and the date an individual is required to obtain a TWIC will provide existing employees ample time to apply for a waiver. Comment: NMSAC believes that the fingerprint data provided by applicants should be used to search all relevant federal databases. In addition, NMSAC suggested that TSA check against criminal databases in the applicant’s State of residence. NMSAC also recommended that a nolo contendere plea be treated as a conviction. Response: We intend to use an applicant’s fingerprints to search the criminal databases that require fingerprints to gain access. However, there are some databases pertinent to security that are accessed by name and therefore, we must use name and other biographic information to use these databases. Currently, we do not plan to check each State criminal database in addition to the FBI criminal databases. The administrative cost and time associated with such an undertaking would greatly increase the user fee and make adjudication of all applicant records overwhelming. Under this PO 00000 Frm 00012 Fmt 4701 Sfmt 4702 proposal, a nolo contendere plea constitutes a conviction. Comment: NMSAC proposed that the regulations be consistent nationwide. NMSAC was concerned that if individual states are allowed to enact legislation that established standards different than the federal standard, it would result in additional costs and delays to the industry. NMSAC also believed that varied state background checks could result in venue shopping by applicants. Response: We agree that the TWIC should be nationally consistent and that states do not have the authority to modify the federal TWIC program. However, States, when acting in their capacity as an owner or operator, retain the right of any owner or operator to impose additional security measures at their ports and facilities, as they see fit, including additional measures for access control beyond the TWIC requirements. In addition, States retain their sovereign police powers to impose statutes and regulations to protect their citizens from all manner of threats, and ensure public welfare. In that capacity, a State may impose additional measures at ports, facilities and vessels within its jurisdiction that are directed against reducing all types of crime, so long as those measures do not conflict with any existing Federal regulatory program or frustrate a Federal purpose, including the TWIC. Therefore, while the process for obtaining and maintaining a TWIC will be uniform across the country, access control measures may vary across States, and even from facility to facility, which is in keeping with the recommendations of the NMSAC and the intent of this rulemaking. E. Type of Biometric To Be Used, Other Than Fingerprints Comment: NMSAC recommended that the applicant’s digital photograph be stored on the integrated circuit chip (ICC) on the TWIC. Its format and technological standards should conform to other national and international programs, such as US–VISIT and FAST. NMSAC recommended that we reevaluate the use of fingerprint biometrics for access control after completion of Prototype to address procedures for individuals who cannot provide fingerprints. Response: Regarding the first comment, we agree and are proposing that the applicant’s digital photograph be stored within the TWIC’s ICC. We agree with the second comment and are proposing a credential that meets or exceeds HSPD 12 and FIPS 201 technical standards, which are the baseline for all federal identification E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules credentials. We also agree with the third comment and are proposing that the digital photograph be used as the alternate biometric for individuals who are unable to provide fingerprints at the time of issuance. sroberts on PROD1PC70 with PROPOSALS F. Federally-Managed vs. FederallyRegulated Comment: NMSAC strongly supports a federally-managed approach to TWIC implementation, as opposed to a federally-regulated approach. NMSAC believes that a federally managed program would protect collective bargaining agreements, promote uniformity of process and technology, ensure appropriate auditing and oversight, protect the sensitivity of the biographic and biometric information required for application, and limit the potential for security compromises or other integrity issues. It also states that there would be significant cost savings if TWIC is implemented in a centralized, federally managed program. Response: We agree and the NPRM reflects this approach. G. Enrollment Comment: In the interest of time, NMSAC recommended that TSA provide as many enrollment centers as practical during the initial enrollment period, staffed either by DHS personnel or trained trusted agents. NMSAC believes that enrollment personnel should be subject to a higher level of scrutiny than TWIC applicants, including financial and credit screening. NMSAC recommended that TSA streamline the enrollment process by allowing pre-enrollment through secure Internet connections, dedicated kiosks, or existing facilities. NMSAC had reservations about allowing non-safety related agencies or organizations becoming involved in this process. They also recommend DHS first look to its own agencies, such as Coast Guard License Issuing Centers, or other federal, state or local public safety offices to process enrollments before seeking partnerships with agencies with nonsecurity missions. Response: We agree with most of the NMSAC recommendations. The current rollout strategy is phased enrollment over a period of time to accommodate the majority of the maritime population centers and then geographically expands to cover all ports/facilities with mobile enrollment centers. All enrollment centers will be staffed by trained trusted agents who will be subject to a thorough threat assessment. The NPRM allows for pre-enrollment through secure Internet connections and dedicated kiosks. VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 H. Costs Comment: NMSAC stated that the fee should be collected at the time of application from the applicant. Any potential employer reimbursements or other business relationships should not be defined in the regulation. Individuals who have already been screened to an equal or higher standard than the TWIC, such as the assessment done for a hazmat endorsement, should not have to pay for duplicate applications, credential issuance, and background records check. TSA should collect only the costs of the program, and the cost for TWIC should be standardized at all enrollment centers. Response: We agree. The NPRM states that the fee is collected from the applicant at the time of enrollment and does not require any reimbursement arrangements. Also, we propose comparability standards so that agencies with similar checks can apply to TSA for a comparability determination. As for hazmat drivers, the check they must complete to get a hazmat endorsement is the same as the standard for TWIC. Therefore, drivers are not required to complete both checks, but must pay a reduced fee for TWIC enrollment and credential production because it was not included in the hazmat fee or process. I. Term of Validity Comment: The TWIC should be valid for a period of five years, unless revoked for cause. This recommendation assumes there is continual check on applicants. Response: We agree and propose a 5year period of validity for the TWIC unless revoked for cause. TSA repeats portions of the check throughout the 5year term. J. Roll-Out Strategy Comment: NMSAC supported a phased in regional implementation. A timeline and deadline should be identified by TSA, and the final implementation/compliance date should be consistent across the country and provide sufficient advance lead time to allow stakeholders to prepare. To accommodate U.S. mariners, NMSAC proposed that DHS allow enrollment centers be set up at foreign facilities with a Coast Guard presence. Response: We agree and § 1572.19 proposes the implementation timeline for applicants to enroll for a TWIC. Regarding oversees enrollment of U.S. mariners, we recognize that is an issue in need of resolution. As credentialed U.S. mariners pose less of a security risk due to the successful completion of security and safety background checks, PO 00000 Frm 00013 Fmt 4701 Sfmt 4702 29407 they have been identified as a population who could potentially be lower on the priority list for receipt of the TWIC. In the meantime, options such as setting up TWIC enrollment stations within existing Coast Guard overseas facilities is being explored. K. TWIC Requirement for Access to Sensitive Security Information Comment: NMSAC recommended that TWIC be used as identification credential alone, and not affect access to SSI. Response: The statute requires ‘‘individuals with access to security sensitive information as determined by the Secretary’’ to hold a TWIC. We agree that requiring all individuals with access to SSI to also hold a TWIC may be impractical. We have interpreted the language of the statute to allow that only certain individuals who will require access to SSI hold a TWIC, if they have not already been subject to an equivalent check. These individuals are clearly identified by position in the NPRM. L. Miscellaneous Issues Comment: NMSAC strongly urges TSA and Coast Guard to gather industry input in the TWIC rulemaking. Response: In developing the TWIC program, we have benefited from the expertise and assistance of industry and government stakeholders. Our work with the NMSAC has produced several outstanding recommendations and solutions to potential challenges. Additionally, we are planning four public meetings on this NPRM, in order to engage industry and gather comments before a final rule is in place. Comment: NMSAC urged TSA and Coast Guard to coordinate TWIC with other federal programs to avoid duplication and conflicts. It also urged that Merchant Mariner Licenses and Documents be merged with TWIC to the greatest extent possible to minimize the number of credentials mariners are required to carry. Response: The Coast Guard National Maritime Center has expressed similar concerns over adding yet another credential to the list of those required for mariners. In a separate rulemaking published in today’s Federal Register, the Coast Guard has proposed combining all merchant mariner credentials into a single form, in order to minimize the number of credentials a mariner must carry. That proposal would merge the existing mariner documents, consisting of the License, Merchant Mariner Document, STCW Endorsement, and Certificate of Registry, into one. The TWIC would E:\FR\FM\22MYP2.SGM 22MYP2 29408 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules remain the identification credential and separate from these other credentials, at least for the time being. The consolidated mariner form would document the mariner’s professional skills and capabilities and the TWIC would document the mariner’s identity. M. Procedures for Replacement of Lost or Stolen Credentials, and Penalties for Persons Who Fraudulently Obtain or Use/Attempt to Use a TWIC Comment: NMSAC expressed concerns about the procedures to address lost or stolen credentials, and the penalty for persons who fraudulently obtain or use/attempt to use a TWIC. Response: We agree that procedures for lost or stolen credentials are essential services. Applicants will be given an 800-number to call in the event they lose the TWIC or it is stolen. The applicant must return to an enrollment center to activate a new TWIC. This will not require a full enrollment process unless the biometric or biographic information has changed since the time of the initial enrollment and the period of validity of the TWIC will be the same as the lost or stolen credential it is replacing. As the NPRM states, applicants who fraudulently obtain or attempt to use a TWIC may be prosecuted criminally and/or through administrative action. N. On-Site TWIC Implementation Comment: NMSAC expressed concern about the possibility for delay at points of entry due to implementation of theTWIC program. Response: During TSA’s Prototype, possession of a TWIC ultimately accelerated access for individuals when they were entered into the local access control system. We anticipate similar results when TWIC is fully operational. As proposed, this rule would permit owners/operators to determine the details of the access control system, and so resolving access problems would largely be managed at the facility or vessel. However, we welcome industry feedback and insight on ways that we may be able to improve the proposed requirements without compromising either security or function. sroberts on PROD1PC70 with PROPOSALS V. Section-by-Section Analysis of United States Coast Guard Proposed Rule General Introduction The following discussion highlights the changes being made to the Coast Guard regulations and address some miscellaneous effects that these changes will have on unamended sections of the VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 regulations. The discussion is divided into parts and sections within those parts, which will enable the reader to skip to those regulations that affect him/ her. In order to allow for this, some explanations are repeated from part to part (for example, the explanation for proposed amendments to the recordkeeping requirement sections in parts 104, 105, and 106, are identical). 33 CFR Part 101 33 CFR 101.105 Coast Guard proposes amending § 101.105 by adding new definitions for escorting, personal identification number (PIN), recurring unescorted access, secure area, TWIC, TWIC program, and unescorted access. These terms would be introduced by the amendments discussed below, and their definitions are self-explanatory. 33 CFR 101.121 Coast Guard proposes adding § 101.121 to require those organizations that have approved Alternative Security Programs (ASPs) to submit a TWIC Addendum to their ASP. This TWIC Addendum should explain how the TWIC requirements proposed in parts 104, 105, and 106 (as applicable) would be implemented in the ASP. The TWIC Addendum would be submitted to the Coast Guard for approval and, once approved, would be given the same expiration date as the overall ASP. When it is time for the overall ASP to be reapproved, the TWIC Addendum would be incorporated into the overall ASP, resulting in a single document. Any organization not submitting the TWIC Addendum by the given deadline would have their ASP declared invalid. 33 CFR 101.514 Coast Guard proposes adding § 101.514. This new section contains the requirement that all persons requiring unescorted access to secure areas of vessels, facilities, and OCS facilities regulated by parts 104, 105, or 106 of subchapter H possess a TWIC before such access is granted. Federal officials would not be required to use a TWIC, but rather would be required to use their HSPD 12-compliant agency credential. These HSPD 12-compliant, biometrically-enabled credentials will be built according to the same technical standards as the TWIC, ensuring comparable levels of security. Coast Guard has also included a provision allowing for State and local officials to voluntarily obtain a TWIC when their office or duty station falls within, or where they require recurring unescorted access to, a secure area of a vessel, PO 00000 Frm 00014 Fmt 4701 Sfmt 4702 facility, or an OCS facility. Coast Guard would not, at this time, require these officials to obtain a TWIC, but we may revisit this in the future. Coast Guard also would allow for voluntary compliance with TWIC for those maritime facilities and vessels that would otherwise not be required to comply. Any owner or operator who would like to voluntarily comply with TWIC requirements would first be required to contact their cognizent COTP, who will forward the request, along with the COTP’s recommendation, to TSA. Once the Coast Guard and TSA determine that use of the TWIC by the facility or vessel would benefit and improve overall maritime security, the owner/operator would receive authorization to have employees enroll at TSA enrollment centers and establish a TWIC program at their facility. Coast Guard requests that those owner/ operators who would like to voluntarily comply under this provision please submit a comment. 33 CFR 101.515 Coast Guard proposes amending § 101.515 to limit its application only to those persons seeking escorted access to a secure area. This amendment would require that anyone, other than law enforcement officers in performance of their official duties, seeking access to a vessel, facility, or OCS facility provide personal identification meeting the standards listed in this section. It also would require that these individuals be escorted at all times in a secure area. 33 CFR Part 103 33 CFR 103.305 Coast Guard proposes amending § 103.305 to require that all Area Maritime Security (AMS) Committee members hold a TWIC or have passed a comparable security background investigation, as determined by the FMSC, with the exception of credentialed Federal, state and local officials. Coast Guard would omit credentialed Federal, state, and local officials from the requirement to hold a TWIC because the majority of these individuals undergo a security threat assessment prior to beginning their job, and because (as explained above) the Federal officials will all be issued HSPD 12-compliant, biometric identification credentials, and it is hoped that states and local entities will follow suit. 33 CFR 103.505 and 103.510 Coast Guard proposes amending §§ 103.505 and 103.510 to require that all AMS plans address biometric access programs within the port, and to require E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules that all AMS plans be updated to reflect this consideration. 33 CFR Part 104 sroberts on PROD1PC70 with PROPOSALS 33 CFR 104.105 Coast Guard proposes amending § 104.105 to exempt foreign vessels from the TWIC requirements. Currently foreign vessels entering U.S. ports that carry a valid International Ship and Port Facility (ISPS) certificate are deemed to be in compliance with part 104, except for §§ 104.240, 104.255, 104.292, and 104.295. However, there are a small number of foreign vessels who are not required to comply with the International Convention for Safety of Life at Sea (SOLAS) or with the ISPS Code, and therefore must submit security plans in accordance with this part. Without the proposed language, these vessels would be required to comply with the TWIC provisions. The crew of these vessels would primarily consist of foreign mariners. While not explicitly exempt from the TWIC requirements by the language of 46 U.S.C. 70105, the particular situation of foreign mariners makes it impractical to issue this population TWICs, and it has been determined that it is inappropriate to this rulemaking. Thus, the small number of foreign vessels who would otherwise be required to comply with part 104, as well as all other foreign vessels, have been exempted from complying with the TWIC provisions of this part since none of their crew would hold a TWIC. Nothing in this proposed exemption should affect the existing requirements that owners or operators have procedures in place for allowing seafarers to traverse facilities for the purpose of completing crew changes or taking shore leave. 33 CFR 104.106 Coast Guard proposes adding § 104.106 to provide for passenger access areas on board passenger vessels, ferries, and cruise ships. Implementation of the TWIC credential would have a significant impact on the way that owners and operators make access control decisions. The proposed rule would introduce the concept of a ‘‘secure area,’’ defined as the area over which an owner or operator chooses to exercise access control as set forth in § 104.265, essentially making the entire vessel a secure area. In non-passenger vessels, this is not problematic; for those that carry passengers, however, it presents difficulties. Since the law requires that no one be allowed unescorted access to secure areas unless they carry a TWIC, passenger vessels, ferries, and cruise ships would have had VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 to either require passengers to obtain TWICs or ensure that passengers were ‘‘escorted’’ at all times while on the vessel. To avoid either outcome, Coast Guard proposes creating the ‘‘passenger access area,’’ which will allow vessel owners/operators to carve out areas within the secure areas aboard their vessels where passengers are free to move about unescorted. These passenger access areas would work in a manner similar to the already existing ‘‘public access areas’’ in part 105. 33 CFR 104.115 In § 104.115, Coast Guard proposes using the same roll-out and implementation model for TWIC as was used for vessel security plans. Vessels would have six (6) months from the date that the final rule is published to submit a TWIC addendum to the Marine Safety Center. They would be required to be operating according to the addendum between twelve (12) and eighteen (18) months following the date that the final rule is published, depending on whether enrollment for the port in which the vessel is operating has been completed. 33 CFR 104.120 The proposed amendment to § 104.120 would require that a copy of the approved TWIC addendum be kept on board the vessel, along with the already approved Vessel Security Plan (VSP) (already required to be on board). Coast Guard has included provisions for scenarios in which the TWIC addendum has been submitted to the Marine Safety Center (MSC) but not yet approved, and for vessels operating under an approved alternative security program. 33 CFR 104.200, 104.210, 104.215, 104.220, and 104.225 Coast Guard proposes amending these sections to require that all individuals with security duties, including the company security officer (CSO), acquire and maintain a TWIC. Coast Guard requests comment on whether owners/ operators should also be required to obtain a TWIC, based on their access to sensitive security information (SSI). Coast Guard also proposes amending these sections to add knowledge requirements and responsibilities pertaining to TWIC to those already assigned to owners/operators, company security officers, vessel security officers, vessel employees with security duties, and all vessel employees. At this time, there are no formal training requirements proposed in order to meet the TWIC knowledge requirements. It is important that owners/operators and those with security duties be familiar PO 00000 Frm 00015 Fmt 4701 Sfmt 4702 29409 with the technologies on the credential that make it resistant to tampering and forgery. Persons who will be examining TWICs at access control points should be familiar enough with its physical appearance such that variations or alterations are easily recognized. It is important that security personnel at the access points to the vessel be familiar with alternate ways to reliably verify an individual’s identity and his or her credential should the individual be unsuccessful using the primary means of verification (e.g., fingerprint match). Personnel who will be required to resolve an individual’s failure to electronically verify his or her identity should be familiar with all the possible reasons for the failure. For example, an individual may not be able to verify his identity against the biometric stored on the credential due to wear on the integrated circuit chip (ICC) itself, problems with the reader, wear on the individual’s fingerprints, or because the individual is an imposter. Alternate procedures for addressing failures of an individual to verify his fingerprint against the information stored on the credential should be reasonably designed to discern between a legitimate user and an imposter. All other employees should be familiar with the TWIC topology, as well as the steps to take should their own TWIC become lost or stolen. The heaviest burden has been placed on the owner/operator, who would be required to ensure that the TWIC program is implemented on board the vessel in accordance with the proposed regulations. This would include a new requirement that the owner/operator ensure that someone on the vessel know who is on the vessel at all times. It would also include a requirement that the owner/operator ensure that computer and access control systems and hardware are secure. The Coast Guard has placed a sample document in its docket (located at the places listed in the ADDRESSES section above) for this NPRM that outlines the proper standard of care to be used to protect these systems and hardware. We request comment on this standard of care, as well as on any associated costs to implement it. 33 CFR 104.235 Coast Guard proposes adding a new record-keeping requirement, mandating that owners/operators maintain records for two years of all persons who are granted access to secure areas of the vessel, including when they disembark the vessel. The requirement does not distinguish between those who were granted unescorted access because they E:\FR\FM\22MYP2.SGM 22MYP2 29410 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules sroberts on PROD1PC70 with PROPOSALS carried a TWIC and those who were granted escorted access. For those who are granted recurring unescorted access, such as permanently attached crew or other employees, owners/operators would be required to record the span over which the individual’s access privileges endured. For individuals who were granted escorted access, the owners/operators would be required to record each date that the individual is escorted, and identify his escort. 33 CFR 104.265 Coast Guard proposes amending this section to require the use of TWIC in the vessel’s access control measures. This section would show the greatest changes as a result of TWIC implementation, and reflects a difficult compromise of many competing concerns, including our desire to preserve as much of the performance-based standard as possible so that vessels could tailor implementation to suit their individual operational needs while preserving the security enhancements provided by the TWIC credential. TWIC provides for implementing graduated security measures by relying upon the three factor authentication process for establishing a person’s identity. This process consists of identifying: (1) Something the person has—a TWIC credential; (2) something the person knows—a PIN, stored securely on the ICC in the credential; and (3) something the person is—in the case of the TWIC, that will be the individual’s fingerprint, which also is stored on the ICC of the credential. By requiring one or all of these factors before allowing access, owners/ operators can make increasingly more secure decisions regarding individuals who are requesting to board the vessel. Currently, most access control decisions are made relying on a ‘‘flash pass.’’ Individuals requesting entry are required to show identification that conforms to § 101.515 of subchapter H, which currently encompasses a broad spectrum of credentials, including driver’s licenses from all 50 states. Many of these credentials are easily forged or altered, and the sheer diversity of appearances hampers security personnel’s ability to recognize a forged or altered credential when it is presented. Even when used as a flash pass, the TWIC provides greater reliability than the existing system because it presents a uniform appearance with embedded features on the face of the credential that make it difficult to forge or alter. When presented with a TWIC, security personnel familiar with its security features are immediately able to notice VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 any absence or destruction of these features. Nevertheless, our intent was to discourage the use of the TWIC as a flash pass for several reasons. While security personnel can reliably detect changes to the appearance of the credential or missing features, he or she cannot know whether or not the credential has been revoked by TSA, or other competent authority, merely by examining the surface of the credential. Furthermore, comparing the individual to the photo on the credential requires focused examination that is likely to suffer when security personnel are distracted or during particularly busy periods. This is the time that an unauthorized individual is most likely to attempt entry, and is most likely to breach a system that relies solely on the flash pass system. Finally, allowing owners/operators to rely solely on the flash pass system is unreasonable in light of the additional cost of the credential, and the available security enhancements that the increased cost represents. Thus, Coast Guard proposes to require owners/operators to use at least one of the technical enhancements on the credential to electronically verify a person’s identity and also requires verification that the credential remains valid, and has not been altered or counterfeited. Implementation of the TWIC program will require that the owner/operator use different processes for identifying persons, depending on whether or not the individual is requesting unescorted access. If the individual is requesting, or will require, unescorted access as part of his or her job responsibilities, the individual must have and maintain a TWIC. On an owner/operator’s first encounter with an individual seeking or requiring unescorted access to the vessel, we would require that all of TWIC’s security features be used to verify both the individual’s claimed identity and that the credential remained valid. Thus, when presented with an individual’s TWIC for the first time, an owner or operator would be required to electronically verify that the individual’s fingerprint matches the data stored on the ICC, and that the individual can correctly enter the PIN that is also stored on the ICC. Both of these processes will require that the individual have the TWIC in his/her possession, thus satisfying all three factors of the authentication process. In addition, the owner or operator would have to confirm that the TWIC remains valid. In order to know that the TWIC has not been revoked, some regular PO 00000 Frm 00016 Fmt 4701 Sfmt 4702 contact with TSA will be necessary. Coast Guard has not specified how this contact should be made so as to provide as much flexibility as possible. These steps performed together will detect to the highest degree of certainty whether the individual is the rightful bearer of the TWIC he or she holds, and whether or not it was duly issued and remains valid. After the initial encounter, there is as much flexibility as possible for the owner/operator so that the TWIC would provide a valuable security enhancement without unnecessarily burdening daily operations. Coast Guard recognized that, particularly for smaller vessels such as towing vessels, the value by the daily validation of an individual’s personal identity is less than for facilities, which generally interact with greater numbers of vendors, visitors, and facility employees. We assumed that the crew of most vessels, excluding cruise ships, would be a relatively small number of people who would quickly become familiar enough with one another so as to be able to readily identify fellow crew members and notice strangers. Thus, there is more emphasis on ensuring that the credential remains valid. Accordingly, Coast Guard has identified specific intervals, according to the Maritime Security (MARSEC) level, when a vessel owner/operator must routinely check that the credential remains valid. As a result of this desire to provide flexibility, we propose the concept of ‘‘recurring unescorted access,’’ which is intended to allow an individual to enter on a continual basis, without repeating the personal identity verification piece. The decision to grant recurring access privileges should be based on two considerations: (1) The relationship of the individual to the vessel, or how well ‘‘known’’ he or she is; and (2) the individual’s need to have frequent and unimpeded access to the vessel. No vessel is required to grant any individual recurring unescorted access; it is intended as a tool by which owners/operators can allow persons who are well known to them to move in and out of secure areas on a repetitive basis without having to electronically verify the individual’s identity each time. The credential verification requirement would remain, and owners/ operators would be responsible to check the validity of the TWIC belonging to any person to whom is granted recurring unescorted access according to the identified specific interval, based on the MARSEC level. Frequent vendors and other visitors, such as union and seafarer representatives, could seek and, at the E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules identification systems that best suits their individual operational needs. If, however, owners/operators choose to rely solely on the TWIC as their badging system, the system should include a means for identifying non-TWIC holders. If owners/operators choose to use a separate badging system, it must be coordinated with the TWIC requirements in this part such that notification to the owner/operator of changes in the individual’s TWIC status are also reflected in the separate badging system. Other existing regulatory requirements that we thought were important to preserve related to coordinating access control measures and the TWIC implementation with facilities whenever possible, particularly as that would facilitate the ready access of frequent vendors, and union and seafarer representatives to the vessel, as appropriate. Coast Guard anticipates that these individuals will also obtain a TWIC. Any coordination must be outlined in the TWIC addendum. In keeping with the longstanding tradition that seafarers keep their mariner credentials and other important documents on the bridge, or stored in a secure place, this rule does not propose that vessel crew be required to display or maintain their TWIC on their person at all times. Instead, anyone granted unescorted access to the secure areas of the vessel under this proposed rule is expected to produce his or her TWIC for inspection if so required by a competent authority. Thus, persons assigned to the vessel can keep the credential stored securely on the vessel with their other important documents. However, mariners will have to take the TWIC with them when they leave the vessel in order to gain unescorted access through the facility. owner/operator’s discretion, be granted recurring unescorted access. If granted, it would allow these individuals, identified by the vessel security officer, or other qualified personnel, to be entered onto the vessel’s rolls of TWIC holders whose TWIC must be checked on a regular basis to ensure it remains unrevoked by TSA. The infrequent visitor or vendor who bears a TWIC and seeks unescorted access, would be required to electronically verify his or her identity by matching the biometric information stored on the ICC. The credential’s validity would also have to be verified to ensure that it has not been revoked since issuance by TSA. Coast Guard acknowledges that maintaining this connectivity with TSA will be a challenge for vessel owners and operators. However, TSA has indicated that it will be able to maintain an updated list of all invalid credentials which can be downloaded over a secure connection with the TSA Web site, and vessel owners/operators would be able to verify the validity of credentials from infrequent visitors against this list. Furthermore, Coast Guard has assumed that vessels which could not establish access to TSA via a secure Web site from time to time could obtain updated versions of the list from its agent or home office. Persons presenting for entry who do not hold a TWIC would still be required to show an acceptable form of identification, as set forth in § 101.515 and 104.265(e)(3), and would be required to be escorted if they are granted access to secure areas. Owners/ operators are not required by the proposed changes to use the TWIC as their primary badging system. As much as practical, Coast Guard has retained the performance-based standards from the existing regulations that allows owners/operators to establish 29411 Owners/operators are required to devise backup processes for making access control decisions when any part of the TWIC system fails, with particular attention paid to not creating greater vulnerabilities that can be leveraged by a failure of the system due to deliberate efforts. Of particular concern is the occasion when an individual may not be able to match his or her biometric against the information stored on the ICC. While this could mean the person is not who he says he is, it is also possible that wear and tear on the reader, the ICC, or the person’s fingerprint itself have caused the failure. In resolving these kinds of failures, security personnel should be well informed as to other reliable means of verifying identity, such as comparing the image of the individual that is electronically stored on the ICC to the person him or herself, or by having other authorized personnel vouch for his identity. In keeping with the graduated scheme of the MTSA regulations, this rule proposes requiring increased use of TWIC security features at higher MARSEC levels. At MARSEC level 1, the owner/operator would be required to ensure that the validity of TWIC credentials is verified against the latest information available from TSA on a weekly basis. At MARSEC level 2, the owner/operator would be required to ensure that the validity of TWIC credentials is verified against the latest information available from TSA on a daily basis. At MARSEC level 3, all personnel seeking unescorted access would be required to verify their identity biometrically and using their PIN at each entry to a secure area of the vessel. The requirements at each MARSEC level are laid out in the table that follows. Vessels Recurring unescorted access sroberts on PROD1PC70 with PROPOSALS MARSEC 1 ...... VerDate Aug<31>2005 Non-recurring unescorted access Facilities OCS facilities U.S. flagged cruise ships Facial recognition minimum each entry; card validity checked weekly with information ≤1 week old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤ 1 week old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤1 week old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤1 week old; recheck those continuously aboard weekly with most current information available from TSA. 1 to 1 biometric match at each entry; card validity checked at each entry with most current information available from TSA. 19:33 May 19, 2006 Jkt 208001 PO 00000 Frm 00017 Fmt 4701 Sfmt 4702 E:\FR\FM\22MYP2.SGM 22MYP2 29412 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules Vessels Recurring unescorted access Non-recurring unescorted access Facilities OCS facilities U.S. flagged cruise ships MARSEC 2 ...... Facial recognition minimum each entry; card validity checked daily with the most current information available from TSA. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤1 day old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤1 day old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤1 day old; recheck those continuously aboard daily with most current information available from TSA. 1 to 1 biometric match + PIN at each entry; card validity checked at each entry with most current information available from TSA. MARSEC 3 ...... 1 to 1 biometric match + PIN at each entry; card validity checked at each entry with information ≤1 day old. 1 to 1 biometric match + PIN at each entry; card validity checked at each entry with information ≤1 day old. 1 to 1 biometric match + PIN at each entry; card validity checked at each entry with information ≤1 day old; recheck those aboard continuously daily. 1 to 1 biometric match + PIN at each entry; card validity checked at each entry with most current information available from TSA. 33 CFR 104.290 Coast Guard proposes amending this section to require owners/operators to have the records of persons who have been granted access to the vessel (See, § 104.235, discussed above) available after a security incident. sroberts on PROD1PC70 with PROPOSALS 33 CFR 104.295 Coast Guard proposes amending § 104.295 to impose higher burdens on U.S. cruise ships. The same assumptions regarding crew size and connectivity (discussed in the proposed changes to § 104.265 above) do not apply to these large, sophisticated vessels whose potential to be the impetus of a transportation security incident (TSI) is much greater than other vessels. As a result, TWIC requirements more closely resemble those for facilities. Coast Guard proposes requiring that an individual’s identity be checked against their TWIC at each entry to the vessel, and that the validity of the TWIC be verified with TSA at a higher rate than for other vessels. 33 CFR 104.405 Coast Guard proposes amending this section to require that when each vessel security plan is reviewed and resubmitted for approval upon its 5 year anniversary date, it incorporates the TWIC Addendum into all appropriate sections of the VSP. Most of these changes should be reflected in the plan’s section on access control. New Subpart E (33 CFR 104.500– 104.510) Proposed § 104.500–104.510 are new and are intended to be temporary measures that will be phased out as VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 existing plans are renewed according to their expiration date. Rather than require owners/operators to resubmit their entire plan with the TWIC measures incorporated within, Coast Guard proposes requiring a temporary TWIC addendum to be submitted. The addendum should be drafted in conjunction with the existing plan, reflecting all modifications that the TWIC rules require. Once approved, it should be attached to and maintained as part of the entire plan, and will be given the same expiration date as the existing plan. Upon expiration, the TWIC addendum should be seamlessly incorporated into the full plan when it is renewed in accordance with the regulations in place at the time of renewal. Owners/operators may opt to resubmit their entire plan, with a list of sections amended, as their TWIC Addendum, but once approved it will carry the same expiration date as it had prior to amendment. Owners/operators are encouraged to submit the addendum via Homeport (https:// homeport.uscg.mil). 33 CFR Part 105 33 CFR 105.115 In § 105.115, Coast Guard proposes using the same roll-out and implementation model for TWIC as was used for MTSA security plans. Facilities would have six (6) months from the date that the final rule is effective to submit a TWIC addendum to their cognizant Captain of the Port (COTP) and would be required to be operating according to the addendum between twelve (12) and eighteen (18) months following the effective date, depending on whether PO 00000 Frm 00018 Fmt 4701 Sfmt 4702 enrollment has been completed at the port where the facility is located. 33 CFR 105.120 In the proposed amendment to § 105.120, Coast Guard would require that the facility keep a copy of the approved TWIC addendum on-site, along with the already approved facility security plan (FSP) (already required to be on site). Coast Guard has included provisions for scenarios in which the TWIC addendum has been submitted to the COTP but not yet approved, and for facilities operating under an approved alternative security program. 33 CFR 105.200, 105.205, 105.210, and 105.215 Coast Guard proposes amending these sections to require that all individuals with security duties acquire and maintain a TWIC. Coast Guard requests comment on whether owners/operators should also be required to obtain a TWIC, based on their access to sensitive security information (SSI). Coast Guard also proposes adding knowledge requirements and responsibilities pertaining to TWIC to those already assigned to owners/operators, facility security officers, facility employees with security duties, and all facility employees. There are no formal training requirements in order to meet the TWIC knowledge requirements proposed at this time. It is important that owners/ operators and those with security duties be familiar with the technologies on the credential, particularly the imbedded features that make the credential resistant to tampering and forgery. Persons who will be examining TWICs at access control points should be familiar enough with its physical E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules sroberts on PROD1PC70 with PROPOSALS appearance such that variations or alterations are easily recognized. It is important that security personnel at the access points to the facility be familiar with alternate ways to reliably verify an individual’s identity and his or her credential should the individual be unsuccessful using the primary means of verification (e.g., fingerprint match). For example, an individual may not be able to verify his identity against the biometric stored on the credential due to wear on the ICC itself, problems with the reader, wear on the individual’s fingerprints, or because the individual is an imposter. Alternate procedures for addressing failures of an individual to verify his fingerprint against the information stored on the credential should be reasonably designed to discern between a legitimate user and an imposter. All other employees should be familiar with the TWIC topology, as well as the steps to take should their own TWIC become lost or stolen. The heaviest burden has been placed on the owner/operator, who would be required to ensure that the TWIC program is implemented on board the facility in accordance with the proposed regulations. This would include a new requirement that the owner/operator ensure that someone on the facility know who is on the facility at all times. It would also include a requirement that the owner/operator ensure that computer and access control systems and hardware are secure. The Coast Guard has placed a sample document in its docket (located at the places listed in the ADDRESSES section above) for this NPRM that outlines the proper standard of care to be used to protect these systems and hardware. We request comment on this standard of care, as well as on any associated costs to implement it. 33 CFR 105.225 Coast Guard proposes adding a new record-keeping requirement, mandating that owners/operators maintain records for two years of all persons who are granted access to the facility. The requirement does not distinguish between those who were granted unescorted access because they carried a TWIC and those who were granted escorted access. For individuals who were granted escorted access, the owners/operators would be required to record each date that the individual is escorted, and identify his escort. 33 CFR 105.255 Coast Guard proposes amending this section to require the use of TWIC in the facility’s access control measures. This VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 section would show the greatest changes as a result of TWIC implementation, and reflects a difficult compromise of many competing concerns, including our desire to preserve as much of the performance-based standard as possible so that facilities could tailor implementation to suit their individual operational needs while preserving the security enhancements provided by the TWIC credential. TWIC provides graduated increases in security by relying upon the three factor authentication process for establishing a person’s identity. This process consists of identifying: (1) Something the person has—a TWIC credential; (2) something the person knows—a Personal Identification Number (PIN), stored on the integrated circuit chip (ICC) in the credential; and (3) something the person is—in the case of the TWIC, it will be the individual’s fingerprint, which is also stored on the ICC of the credential. By requiring one or all of these factors before allowing access, owners/ operators can make increasingly more secure decisions regarding individuals who are requesting to enter the facility. Currently, most access control decisions are made relying on a ‘‘flash pass.’’ Individuals requesting entry are required to show identification that conforms to § 101.515 of subchapter H, which currently encompasses a broad spectrum of credentials, including driver’s licenses from all 50 states. Many of these credentials are easily forged or altered, and the sheer diversity of appearances hampers security personnel’s ability to recognize a forged or altered credential when it is presented. Even when used as a flash pass, the TWIC provides greater reliability than the existing system because it presents a uniform appearance with embedded features on the face of the credential that make it difficult to forge or alter. When presented with a TWIC, security personnel familiar with its security features are immediately able to notice any absence or destruction of these features. Nevertheless, our intent was to discourage the use of the TWIC as a flash pass for several reasons. While security personnel can reliably detect changes to the appearance of the credential or missing features, he or she cannot know whether or not the credential has been revoked by TSA, or other competent authority, merely by examining the surface of the credential. Furthermore, comparing the individual to the photo on the credential requires focused examination that is likely to suffer when security personnel are distracted or during particularly busy PO 00000 Frm 00019 Fmt 4701 Sfmt 4702 29413 periods. This is the time that an unauthorized individual is most likely to attempt entry, and is most likely to breach a system that relies solely on the flash pass system. Finally, allowing owners/operators to rely solely on the flash pass system is unreasonable in light of the additional cost of the credential, and the available security enhancements that the increased cost represents. Thus, Coast Guard proposes to require owners/operators to use at least one of the technical enhancements on the credential to electronically verify a person’s identity and also requires verification that the credential remains valid, and has not been altered or counterfeited. Implementation of TWIC will require that the owner/operator use different processes for identifying persons depending on whether or not the individual is requesting unescorted access. If the individual is requesting unescorted access, or will require unescorted access as part of his or her job responsibilities, the individual must have and maintain a TWIC. Individuals requesting unescorted access to secure areas of the facility must present a valid TWIC prior to entry and electronically verify his or her identity by matching his or her biometric against the information stored on the credential. In addition, the owner or operator would have to confirm that the TWIC remains valid. In order to know that the TWIC has not been revoked, some regular contact with TSA will be necessary. (See, discussion of ‘‘using TWIC in an access control system’’ above.) No particular method has been prescribed for contacting TSA to verify the validity of credentials so as to provide as much flexibility to owners/ operators as possible. Persons presenting for entry who do not hold a TWIC would still be required to show an acceptable form of identification, as set forth in §§ 101.515 and 104.265(e)(3), and will be required to be escorted if they are granted access to secure areas. Owners/operators are not required by the proposed changes to use the TWIC as their primary badging system. As much as practical, the rule proposed to retain the performancebased standards from the existing rule that allows owners/operators to establish identification systems that best suit their individual operational needs. If, however, owners/operators choose to rely solely on the TWIC as their badging system, the system should include a means for identifying non-TWIC holders. If owners/operators choose to use a separate badging system, it must E:\FR\FM\22MYP2.SGM 22MYP2 29414 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules deliberately causing a failure of the system. Of particular concern is the occasion when an individual may not be able to match his or her biometric against the information stored on the ICC. While this could mean the person is not who he says he is, it is also possible that wear and tear on the reader, the ICC, or the person’s fingerprint itself have caused the failure. In resolving these kinds of failures, security personnel should be well informed as to other reliable means of verifying identity, such as comparing the image of the individual that is electronically stored on the ICC to the person him or herself, or by having other authorized personnel vouch for his identity. In keeping with the graduated scheme of the MTSA regulations, Coast Guard be coordinated with the TWIC requirements in this part. Other provisions that are important to preserve are related to coordinating access control measures and the TWIC implementation with vessels whenever possible, particularly as that would facilitate the ready access of frequent vendors, and union and seafarer representatives to the vessel and crew as appropriate. Facility personnel are required to have their TWIC readily available for inspection if so required by a competent authority. Coast Guard proposes that owners/ operators be required to devise backup processes for making access control decisions should any part of the TWIC system fail, with particular attention paid to not creating greater vulnerabilities that can be leveraged by proposes requiring increased use of the TWIC at higher MARSEC levels. At MARSEC level 1, the owner/operator would be required to ensure the validity of the TWIC credentials is verified against the latest information available from TSA on a weekly basis. At MARSEC level 2, the owner/operator would be required to ensure that the validity of TWIC credentials is verified against the latest information available from TSA on a daily basis, as well as ensure all TWIC-enabled access gates are manned. At MARSEC level 3, Coast Guard would require verification of an individual’s PIN at each entry to the secure area. The requirements at each MARSEC level are laid out in the table that follows. Vessels Non-recurring unescorted access Facilities OCS facilities U.S. flagged cruise ships MARSEC 1 ...... Facial recognition minimum each entry; card validity checked weekly with information ≤ 1 week old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤ 1 week old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤ 1 week old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤ 1 week old; recheck those continuously aboard weekly with most current information available from TSA. 1 to 1 biometric match at each entry; card validity checked at each entry with most current information available from TSA. MARSEC 2 ...... Facial recognition minimum each entry; card validity checked daily with most current information available from TSA. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤ 1 day old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤ 1 day old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤ 1 day old; recheck those continuously aboard daily with most current information available from TSA. 1 to 1 biometric match + PIN at each entry; card validity checked at each entry with most current information available from TSA. MARSEC 3 ...... sroberts on PROD1PC70 with PROPOSALS Recurring unescorted access 1 to 1 biometric match + PIN at each entry; card validity checked at each entry with information ≤ 1 day old. 1 to 1 biometric match 1 to 1 biometric match + PIN at each entry; + PIN at each entry; card validity checked card validity checked at each entry with inat each entry with information ≤ 1 day old. formation ≤ 1 day old; recheck those aboard continuously daily. 1 to 1 biometric match + PIN at each entry; card validity checked at each entry with information available from TSA. 33 CFR 105.290 This section would be amended to require owners/operators to have the records of persons who have been granted access to the facility (See § 105.225, discussed above) available after a security incident. 33 CFR 105.285 This section would be amended to clarify that passengers must be escorted within secure and restricted areas of the facility. VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 33 CFR 105.295 This section would be amended to clarify which activities must be done within the facility’s secure area, to clarify the identifications to be checked before granting individuals entry to the facility, and to clarify that passengers must be escorted within secure and restricted areas of the facility. Coast Guard proposes making a change to clarify that persons not holding TWICs must be escorted within Certain Dangerous Cargo (CDC) facilities. Coast Guard asks for comment as to whether there should be more stringent TWIC program requirements at these facilities, and what those requirements should be. PO 00000 Frm 00020 Fmt 4701 Sfmt 4702 E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules 33 CFR 105.296 Coast Guard proposes amending § 105.296 to require that owners/ operators of barge fleeting facilities take responsibility for ensuring that anyone seeking unescorted access to barges within the fleeting facility hold a TWIC. 33 CFR 105.405 This section would be amended to require that when each facility security plan is reviewed and resubmitted for approval upon its 5-year anniversary date, it incorporate the TWIC Addendum into all appropriate sections of the FSP. Most of these changes should be reflected in the plan’s section on access control. New Subpart E (33 CFR 105.500– 105.510) Proposed §§ 105.500–105.510 are new and are intended to be temporary measures that will be phased out as existing plans are renewed according to the existing plan’s expiration date. Rather than require owners/operators to resubmit their entire plan with the TWIC measures incorporated within, we propose requiring a temporary TWIC addendum to be submitted. The addendum should be drafted in conjunction with the existing plan, reflecting all modifications that the TWIC rules require. Once approved, it should be attached to and maintained as part of the entire plan, and will be given the same expiration date as the existing plan. Upon expiration, the TWIC addendum should be seamlessly incorporated into the plan when it is renewed in accordance with the regulations in place at the time of renewal. Owners/operators may opt to resubmit their entire plan, with a list of sections amended, as their TWIC Addendum, but once approved it will carry the same expiration date as it had prior to amendment. Owners/operators are encouraged to submit the addendum via Homeport (https:// homeport.uscg.mil). sroberts on PROD1PC70 with PROPOSALS 33 CFR Part 106 33 CFR 106.110 In § 106.110, Coast Guard proposes using the same roll-out and implementation model for TWIC as was used for MTSA security plans. OCS facilities would have six (6) months from the date that the final rule is published to submit a TWIC addendum to their cognizant District Commander and would be required to be operating according to the addendum between twelve (12) and eighteen (18) months following the publication date, depending on whether enrollment has VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 been completed at the port where the facility is located. 33 CFR 106.115 The proposed amendment to § 106.115 would require that the OCS facility keep a copy of the approved TWIC addendum on site, along with the already approved OCS FSP (already required to be on site). This proposed rule includes provisions for scenarios in which the TWIC addendum has been submitted to the District Commander but not yet approved, and for OCS facilities operating under an approved alternative security program. 33 CFR 106.200, 106.205, 106.210, 106.215, and 106.220 These sections would be amended to require that all individuals with security duties, including the CSO, acquire and maintain a TWIC. Coast Guard requests comment on whether owners/operators should also be required to obtain a TWIC, based on their access to sensitive security information (SSI). This proposal would also amend these sections to add knowledge requirements and responsibilities pertaining to TWIC to those already assigned to owners/ operators, company security officers, OCS facility security officers, OCS facility employees with security duties, and all OCS facility employees. There are no formal training requirements in order to meet the TWIC knowledge requirements at this time. It is important that owners/operators and those with security duties be familiar with the technologies on the credential, particularly the imbedded features that make the credential resistant to tampering and forgery. Persons who will be examining TWICs at access control points should be familiar enough with its physical appearance such that variations or alterations are easily recognized. It is important that security personnel at the access points to the OCS facility be familiar with alternate ways to reliably verify an individual’s identity and his or her credential should the individual be unsuccessful using the primary means of verification (e.g., fingerprint match). Personnel who will be required to resolve an individual’s failure to electronically verify his or her identity should be familiar with all the possible reasons for the failure. For example, an individual may not be able to verify his identity against the biometric stored on the credential due to wear on the ICC itself, problems with the reader, wear on the individual’s fingerprints, or because the individual is an imposter. Alternate procedures for addressing failures of an individual to PO 00000 Frm 00021 Fmt 4701 Sfmt 4702 29415 verify his fingerprint against the information stored on the credential should be reasonably designed to discern between a legitimate user and an imposter. All other employees should be familiar with the TWIC topology, as well as the steps to take should their own TWIC become lost or stolen. The heaviest burden has been placed on the owner/operator, who would be required to ensure that the TWIC program is implemented on board the OCS facility in accordance with the proposed regulations. This would include a new requirement that the owner/operator ensure that someone on the OCS facility know who is on the OCS facility at all times. It would also include a requirement that the owner/ operator ensure that computer and access control systems and hardware are secure. The Coast Guard has placed a sample document in its docket (located at the places listed in the ADDRESSES section above) for this NPRM that outlines the proper standard of care to be used to protect these systems and hardware. We request comment on this standard of care, as well as on any associated costs to implement it. 33 CFR 106.230 Coast Guard proposes adding a new record-keeping requirement, mandating that owners/operators maintain records for two years of all persons who are granted access to the OCS facility. The requirement does not distinguish between those who were granted unescorted access because they carried a TWIC and those who were granted escorted access. 33 CFR 106.260 Coast Guard proposes amending this section to require the use of TWIC in the OCS facility’s access control measures. This section would show the greatest changes as a result of TWIC implementation, and reflects a difficult compromise of many competing concerns, including our desire to preserve as much of the performance based standard as possible so that OCS facilities could tailor implementation to suit their individual operational needs while preserving the security enhancements provided by the TWIC credential. TWIC provides for implementing graduated security measures by relying upon the three factor identification process for establishing a person’s identity. This process consists of identifying (1) something the person has—a TWIC credential; (2) something the person knows—a Personal Identification Number (PIN), stored on E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS 29416 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules the integrated circuit chip (ICC) in the credential; and (3) something the person is—in the case of the TWIC, it will be the individual’s fingerprint, which is also stored on the ICC of the credential. By requiring one or all of these factors before allowing access, owners/ operators can make increasingly more secure decisions regarding individuals who are requesting access to the OCS facility. Currently, most access control decisions are made relying on a ‘‘flash pass.’’ Individuals requesting entry are required to show identification that conforms to § 101.515 of subchapter H, which currently encompasses a broad spectrum of credentials, including driver’s licenses from all 50 states. Many of these credentials are easily forged or altered, and the sheer diversity of appearances hampers security personnel’s ability to recognize a forged or altered credential when it is presented. Even when used as a flash pass, the TWIC provides greater reliability than the existing system because it presents a uniform appearance with embedded features on the face of the credential that make it difficult to forge or alter. When presented with a TWIC, security personnel familiar with its security features are immediately able to notice any absence or destruction of these features. Nevertheless, our intent was to discourage the use of the TWIC as a flash pass for several reasons. While security personnel can reliably detect changes to the appearance of the credential or missing features, he or she cannot know whether or not the credential has been revoked by TSA, or other competent authority, merely by examining the surface of the credential. Furthermore, comparing the individual to the photo on the credential requires focused examination that is likely to suffer when security personnel are distracted or during particularly busy periods. This is the time that an unauthorized individual is most likely to attempt entry, and is most likely to breach a system that relies solely on the flash pass system. Finally, allowing owners/operators to rely solely on the flash pass system is unreasonable in light of the additional cost of the credential, and the available security enhancements that the increased cost represents. Thus, Coast Guard proposes to require owners/operators to use at least one of the technical enhancements on the VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 credential to electronically verify a person’s identity and also requires verification that the credential remains valid, and has not been altered or counterfeited. Implementation of TWIC will require that the owner/operator use different processes for identifying persons depending on whether or not the individual is requesting unescorted access. If the individual is requesting unescorted access, or will require it as part of their job responsibilities, the individual must have and maintain a TWIC. For OCS facilities, Coast Guard proposes requiring uniformly that all of TWIC’s security features be used to verify both the individual’s claimed identity and that the credential remains valid each time an individual seeks unescorted access to the OCS facility. Thus, an owner/operator must ensure some means for completing an electronic verification that the individual’s fingerprint is matched to the data stored on the ICC each time an individual seeks unescorted access to the OCS facility. This process will require that the individual have the TWIC in his/her possession, thus satisfying all three factors of the three factor authentication process. In addition, the owner/operator will have to confirm that the TWIC remains valid. In order to know that the TWIC has not been revoked, some regular contact with TSA is required. The rule would not specify, however, how this contact shall be made, so as to leave as many options open as possible. (See discussion of ‘‘using TWIC in an access control system’’ above.) These steps performed together will detect to the highest degree of certainty whether the individual is the rightful bearer of the TWIC he or she holds, and whether or not it was duly issued and remains valid. Persons presenting for entry who do not hold a TWIC would still be required to show an acceptable form of identification, as set forth in §§ 101.515 and 106.260(d), and would be required to be escorted if they are granted access to secure areas. Owners/operators are not required by the proposed changes to use the TWIC as their primary badging system. As much as practical, the rule proposes to retain the performancebased standards from the existing rule that allows owners/operators to establish identification systems that best suit their individual operational needs. If, however, owners/operators choose to PO 00000 Frm 00022 Fmt 4701 Sfmt 4702 rely solely on the TWIC as their badging system, the system should include a means for identifying non-TWIC holders. If owners and operators choose to use a separate badging system, it must be coordinated with the TWIC requirements in this part. Other provisions that we thought were important to preserve related to coordinating access control measures and the TWIC implementation with vessels whenever possible, particularly as that would facilitate the movement of OCS facility employees using offshore supply vessels to gain access to the OCS facility. Any coordination must be outlined in the TWIC addendum. Owners/operators are required to devise backup processes for making access control decisions when any part of the TWIC system fails, with particular attention paid to not creating greater vulnerabilities that can be leveraged by deliberately causing a failure of the system. Of particular concern is the occasion when an individual may not be able to match his or her biometric against the information stored on the ICC. While this could mean the person is not who he says he is, it is also possible that wear and tear on the reader, the ICC, or the person’s fingerprint itself have caused the failure. In resolving these kinds of failures, security personnel should be well informed as to other reliable means of verifying identity, such as comparing the image of the individual that is electronically stored on the ICC to the person him or herself, or by having other authorized personnel vouch for his identity. In keeping with the graduated scheme of the MTSA regulations, this NPRM proposes requiring increased use of the TWIC at higher MARSEC levels. At MARSEC level 1, the owner/operator would be required to ensure that the validity of TWIC credentials is verified against the latest information available from TSA on a weekly basis. At MARSEC level 2, the owner/operator would be required to ensure that the validity of TWIC credentials is verified against the latest information available from TSA on a daily basis. At MARSEC level 3, Coast Guard would require verification of an individual’s PIN at each entry to the secure area. The requirements at each MARSEC level are laid out in the table that follows. E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules 29417 Vessels Recurring unescorted access Non-recurring unescorted access Facilities OCS facilities U.S. flagged cruise ships MARSEC 1 ...... Facial recognition minimum each entry; card validity checked weekly with information ≤1 week old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤1 week old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤1 week old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤1 week old; recheck those continuously aboard weekly with most current information available from TSA. 1 to 1 biometric match at each entry; card validity checked at each entry with most current information available from TSA. MARSEC 2 ...... Facial recognition minimum each entry; card validity checked daily with most current information available from TSA. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤ 1 day old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤ 1 day old. 1 to 1 biometric match at each entry; card validity checked at each entry with information ≤ 1 day old; recheck those continuously aboard daily with most current information available from TSA. 1 to 1 biometric match + PIN at each entry; card validity checked at each entry with most current information available from TSA. MARSEC 3 ...... 1 to 1 biometric match + PIN at each entry; card validity checked at each entry with information ≤ 1 day old. 1 to 1 biometric match 1 to 1 biometric match + PIN at each entry; + PIN at each entry; card validity checked card validity checked at each entry with inat each entry with information ≤ 1 day old. formation ≤ 1 day old; recheck those aboard continuously daily. 1 to 1 biometric match + PIN at each entry; card validity checked at each entry with most current information available from TSA. 33 CFR 106.280 This section would be amended to require owners/operators to have the records of persons who have been granted access to the OCS facility (See § 106.230, discussed above) available after a security incident. 33 CFR 106.405 This section would be amended to require that when each OCS facility security plan (FSP) is reviewed and resubmitted for approval upon its 5-year anniversary date, it must incorporate the TWIC Addendum into all appropriate sections of the OCS FSP. Most of these changes should be reflected in the plan’s section on access control. sroberts on PROD1PC70 with PROPOSALS New Subpart E (33 CFR 106.500– 106.510) Proposed §§ 106.500–106.510 are new and are intended to be temporary measures that will be phased out as existing plans are renewed according to the existing plan’s expiration date. Rather than require owners/operators to resubmit their entire plan with the TWIC measures incorporated within, the rule would require a temporary TWIC addendum to be submitted. The addendum should be drafted in conjunction with the existing plan, reflecting all modifications that the VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 Miscellaneous Items The proposed changes outlined above would affect other sections within 33 CFR subchapter H, even though these sections would not be changed. Some of the greatest impacts are summarized below: an invalid TWIC (one that has been revoked or one that is counterfeit) may qualify as suspicious activity, even if that individual was denied access. Circumstance that trigger the reporting requirement in 101.305(a), are highly fact-specific and difficult to define comprehensively, but the general language found within that section (‘‘activities that may result in a transportation security incident’’) is a good guide. If an owner/operator, or any other individual holding a TWIC, knows of a reason that an individual who holds a TWIC should have that TWIC revoked, the owner/operator should treat this as suspicious activity and report it as required in 101.305(a). The owner/ operator may also deny the TWICholder access in this situation. Additionally, finding an individual who does not have a valid TWIC within a secure area would qualify as a breach of security, and should be reported as such pursuant to 101.305(b). 33 CFR 101.305 There are no proposed amendments to this section, but certain incidents involving TWICs would need to be reported as either a suspicious activity or breach of security. For example, under certain circumstances an individual’s attempt to gain entry using 33 CFR 101.400 TSA, as the DHS entity responsible for conducting security threat assessments and issuing credentials under this rule, will have principal enforcement authority in regard to an individual’s TWIC status for the misuse of a TWIC, including forgery, TWIC rules require. Once approved, it should be attached to and maintained as part of the entire plan, and will be given the same expiration date as the existing plan. Upon expiration, the TWIC addendum should be seamlessly incorporated into the plan when it is renewed in accordance with the regulations in place at the time of renewal. Owners/operators may opt to resubmit their entire plan, with a list of sections amended, as their TWIC Addendum, but once approved it will carry the same expiration date as it had prior to amendment. Owners/operators are encouraged to submit the addendum via Homeport (https:// homeport.uscg.mil). PO 00000 Frm 00023 Fmt 4701 Sfmt 4702 E:\FR\FM\22MYP2.SGM 22MYP2 29418 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules counterfeiting, alteration or use of a TWIC by an unauthorized individual. The Coast Guard will work with TSA where abuses of the TWIC program are identified in the maritime sector. In addition, individuals who try to enter a facility or vessel using a stolen, forged, counterfeit, altered or otherwise unauthorized TWIC, and who are detected and turned away by the facility, may be subject to Coast Guard enforcement actions under 33 CFR 101.415 or other applicable Coast Guard authority, including, but not limited to, civil or criminal penalties. An owner/operator is required to deny unescorted access to an individual who attempts to access a facility with a TWIC that has been revoked by TSA. Coast Guard is not asking owners/ operators to take any additional steps, beyond current requirements, with respect to individuals who attempt unauthorized access to a facility. In such circumstances (e.g., where an individual presents for entry at a facility with a TWIC that has been revoked by TSA or with a TWIC which the owner/ operator has reason to believe is invalid due to forgery, adulteration, counterfeiting or possession by an unauthorized individual), however, the owner/operator is required to immediately report the matter to the Coast Guard and/or local law enforcement as required under 101.305. sroberts on PROD1PC70 with PROPOSALS 33 CFR 104.130, 105.130, and 106.125 There are no proposed amendments to these sections. However, note that owners/operators of vessels, facilities and OCS facilities, regulated under parts 104, 105, or 106, respectively, may use the above-cited provisions to apply for waivers from the TWIC requirements. They also may suggest equivalents, under § 101.130. These requests should be made in accordance with the relevant provisions of parts 104, 105, or 106. The Coast Guard, however, will not be responsible for making determinations of requests for waivers from individuals required to obtain a TWIC. TSA is the only agency that may waive the requirement that an individual pass a security threat assessment. No one will be waived from the requirement to actually obtain a TWIC. 33 CFR Subpart C, Parts 104, 105, and 106 When it is time for a vessel, facility, or OCS facility to redo a security assessment, in concert with an update to a security plan, consideration of TWIC implementation must be part of the assessment. The TWIC program implemented by the vessel, facility, or OCS facility becomes part of the VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 baseline security analyzed by the assessment. 46 CFR Parts 10, 12, and 15 In order to implement the MTSA mandate that all credentialed merchant mariners hold a TWIC, the Coast Guard is proposing to amend parts 10, 12, and 15 of title 46 to the CFR to require that any individual holding or working under an MMD or a license also hold a TWIC. Coast Guard, in a separate rulemaking published in today’s issue of the Federal Register, is proposing to consolidate merchant mariner credentials to minimize duplicate or redundant identification or background check requirements. VI. Section-by-Section Analysis of TSA Proposed Rule TSA proposes to amend and redesignate its existing hazmat regulations to apply those processes to a person who is eligible to obtain a TWIC. TSA does not reiterate substantive analyses of the hazmat provisions below if the standard is not changing, but instead directs the public to the section-by-section analysis of those sections contained in the interim final rule implementing the hazmat regulations at 69 FR 68720. Where standards that formerly applied only to HME applicants now apply to TWIC applicants, however, TSA provides substantive analyses below for the convenience of potential TWIC applicants. The following is a discussion of the proposed changes to sections in title 49 of the CFR. 49 CFR Part 1515 Appeal and Waiver Procedures for Security Threat Assessments for Individuals 49 CFR 1515.1 Scope TSA is proposing to redesignate §§ 49 CFR 1572.141 and 143 as new part 1515, Appeal and Waiver Procedures for Land and Maritime Workers to Subchapter A—Administrative and Procedural Rules. TSA developed the appeal and waiver procedures in part 1572 that currently apply to commercial drivers applying for an HME for additional transportation workers who may be subject to the security threat assessment requirement. These are the procedures TSA proposes to apply to TWIC applicants. In addition, TSA may use these procedures for other security threat assessments. For instance, TSA published a proposed rule on air cargo security that included security threat assessment requirements for certain individuals and an appeal procedure that is used currently for HME PO 00000 Frm 00024 Fmt 4701 Sfmt 4702 applicants. 69 FR 65258 (November 10, 2004). It makes more sense, organizationally, to place the appeal rules in a general section of the regulations. The scope section states that the standards in part 1515 apply to an applicant who undergoes a security threat assessment and wishes to appeal an adverse decision or file a waiver request. 49 CFR 1515.3 Terms Used in This Part This section lists definitions of terms that apply specifically to the appeal and waiver process. The term ‘‘applicant’’ is amended to include individuals applying for a TWIC, as well as individuals applying for an HME. The terms ‘‘date of service’’ and ‘‘day’’ are currently listed in the definition section of part 1572, and TSA proposes to move them to § 1515.3 without any change. ‘‘Date of service’’ means the date of personal delivery; the mailing date shown on a certificate of service; 10 days from the date of mailing, if there is no certificate of service; another mailing date shown by other evidence if there is no certificate of service or postmark; or the date of an electronic transmission showing when the document was sent. TSA created this definition with mobile workers in mind, to accommodate the use of email or facsimile, and to provide a 10-day period from the date of mailing, rather than 5 or 7 days. The mariners, commercial truck drivers, train crew members, and other workers subject to the threat assessment requirements may travel from the East Coast to the West Coast on a regular basis, or be stationed away from home for days, weeks, or months at a time. We believe this definition makes the appeal process more reasonable for the group of workers affected. The term ‘‘day’’ used in the NPRM means calendar day and is the same definition being used in part 1572 now. 49 CFR 1515.5 Appeal Procedures TSA is proposing to use the substantive appeal standards that currently appear in 49 CFR 1572.141 for HME applicants for TWIC applicants, and proposes to expand the suspense deadlines. TSA has found in implementing the HME program that individuals making a good faith effort to comply with the timelines set forth in 1572.141 have difficulty doing so. Thirty days may not be adequate for workers who travel for extended periods during the month. Therefore, TSA proposes to extend response deadlines E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules from 30 to 60 days in the appeal process. An individual may appeal an Initial Determination of Threat Assessment if he asserts that he meets all standards for the security threat assessment. For example, if the Initial Determination was based on information indicating the applicant is not lawfully present in the United States, but the applicant is a lawful permanent resident, he can appeal the Determination and provide TSA proof of lawful presence. Paragraph (b) of this section sets forth the basic mechanics of the appeal process. An applicant initiates an appeal by providing TSA with a written request for the releasable materials upon which the Initial Determination was based, or by serving TSA with a written reply to the Initial Determination. Currently, if an applicant wishes to receive copies of the releasable material upon which the Initial Determination was based, he must serve TSA with a written request within 30 days after the date of service of the Initial Determination. TSA proposes to change this to 60 days after the date of service of the Initial Determination. Under the current provisions, TSA’s response is due within 30 days. We propose to change this requirement so that the response would be due in 60 days. In response, TSA cannot provide any classified information, as defined under 6 CFR part 7 (DHS Classified National Security Information), or under E.O.s 12958, as amended by E.O. 13292 (68 FR 15315(Mar. 28, 2003)), and 12968, or any other information or material protected from disclosure by law. If an applicant wishes to reply to the Initial Determination, we propose that he or she must provide TSA with a written reply within 60 days after the date of service of the Initial Determination or the date of service of TSA’s response to the applicant’s request for materials. The applicant should explain why he or she is appealing the Initial Determination and provide evidence that the Initial Determination was incorrect. In an applicant’s reply, TSA will consider only material that is relevant to whether he or she meets the standards for the security threat assessment. If an applicant does not dispute or reply to the Initial Determination, the Initial Determination becomes a Final Determination of Threat Assessment. Under paragraph (b)(3) of this section, an applicant has the opportunity to correct a record on which an adverse decision is based. As long as the record is not classified or protected by law from release, TSA will notify the applicant of the adverse information VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 and provide a copy of the record. If the applicant wishes to correct the inaccurate information, he or she must provide written proof that the record is inaccurate. The applicant should contact the jurisdiction responsible for the inaccurate information to complete or correct the information contained in the record. The applicant must provide TSA with the revised record or a certified true copy of the information from the appropriate entity before TSA can reach a determination that the applicant does not pose a security threat. The Director makes the Final Determination on appeals that involve disqualifying criminal offenses, mental capacity, and immigration status. However, in a case where an Initial Determination of Threat Assessment is based on the applicant’s connection to terrorist activity or similar threat under § 1572.107, the Assistant Secretary of TSA reviews the appeal and makes the Final Determination. TSA has the Assistant Secretary review these cases to provide additional scrutiny because these cases will likely involve a review of classified information that the applicant cannot see. In addition, these applicants are not eligible for waivers if the Initial Determination stands. TSA believes that the review by the Assistant Secretary for these cases provides an additional protection that the agency’s Final Determination of Threat is sound. In considering an appeal, the Director or Assistant Secretary reviews the Initial Determination, the materials upon which the Initial Determination is based, the applicant’s reply and other materials or information available to TSA. The Director or Assistant Secretary may affirm the Initial Determination by concluding that an individual poses a security threat. If this occurs, TSA serves a Final Determination of Threat Assessment on the applicant. Also, for cases involving mariners applying for a TWIC, TSA would provide the Coast Guard with the Final Determination. In cases involving HME applicants, TSA serves the licensing State with the Final Determination. For all TWIC applicants, TSA serves FMSC (who is also the Captain of the Port) with Final Determinations of Threat Assessment. DHS believes that the FMSC, as the chief Federal security officer at the port, should be aware of individuals who are denied a TWIC. The Final Determination includes a statement that the Director or Assistant Secretary has reviewed the Initial Determination, the materials upon which the Initial Determination was based, the reply, if any, and other available information and has PO 00000 Frm 00025 Fmt 4701 Sfmt 4702 29419 determined that the applicant poses a security threat. There is no administrative appeal of the Final Determination of Threat Assessment. However, as explained below, an applicant may apply for a waiver under certain circumstances. For purposes of judicial review, the Final Determination of Threat Assessment constitutes a final TSA order. Paragraph (e) sets forth the procedures to follow if TSA determines that the applicant does not pose a security threat. TSA serves a Withdrawal of the Initial Determination on the applicant and a Determination of No Security Threat on the issuing State for an HME applicant and on the Coast Guard when it involves a mariner applying for a TWIC. Paragraph (f) provides that TSA cannot disclose to the applicant classified information, as defined in section 1.1(c) of E.O. 12958, as amended by E.O. 13292, and section 1.1(d) of E.O. 12968. See also, 6 CFR part 7. TSA reserves the right not to disclose any other information or material not warranting disclosure or protected from disclosure under law, such as Sensitive Security Information (SSI); sensitive law enforcement and intelligence information; sources, methods, means, and application of intelligence techniques; and identities of confidential informants, undercover operatives, and material witnesses. For determinations under § 1572.107, the finding that an individual poses a security threat will be based, in large part, on classified national security information, unclassified information designated as SSI, or other information that is protected from disclosure by law. Classified national security information is information that the President or another authorized Federal official has determined, pursuant to E.O.s 12958, as amended, and 12968, must be protected against unauthorized disclosure to safeguard the security of American citizens, the country’s democratic institutions, and America’s participation within the community of nations. See 60 FR 19825 (April 20, 1995). E.O.s 12958, as amended, and 12968 prohibit Federal employees from disclosing classified information to individuals who have not been cleared to have access to such information under the requirements of that E.O. See also, 6 CFR part 7. If the Director determines that an applicant who is appealing the intelligence-related check is requesting classified materials, the applicant will not be able to access classified national security information. The denial of access to classified information under these circumstances E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS 29420 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules is consistent with the treatment of classified information under the Freedom of Information Act (FOIA), which specifically exempts such information from the general requirement under FOIA that government documents are subject to public disclosure. 5 U.S.C. 552(b)(1). SSI is unclassified information that is subject to disclosure limitations under statute and TSA regulations. See 49 U.S.C. 114(s); 49 CFR part 1520 as amended by 69 FR 28066 (May 18, 2004). Under 49 U.S.C. 114(s), the Assistant Secretary of TSA may designate categories of information as SSI if release of the information would be detrimental to the security of transportation. Information that is designated as SSI must only be disclosed to people with a need to know, such as those needing to carry out regulatory security duties. 49 CFR 1520.11 as added by 69 FR 28084–5. The Assistant Secretary has defined information concerning threats against transportation as SSI by regulation. See 49 CFR 1520.5. Thus, information that TSA obtains indicating that an applicant poses a security threat, including the source of such information and the methods through which the information was obtained, will commonly be designated SSI or classified information. The purpose of designating this information as SSI is to ensure that those who seek to do harm to the transportation system and their associates do not obtain access to information that will enable them to evade the government’s efforts to detect and prevent their activities. Disclosure of this information, especially to an applicant specifically suspected of posing a threat to the transportation system, is precisely the type of harm that Congress sought to avoid by authorizing the Assistant Secretary to define and protect SSI. Other pieces of information also are protected from disclosure by law due to their sensitivity in law enforcement and intelligence. In some instances, the release of information about a particular individual or his or her supporters or associates could have a substantial adverse impact on security matters. The release by TSA of the identities or other information regarding individuals related to a security threat determination could jeopardize sources and methods of the intelligence community, the identities of confidential sources, and techniques and procedures for law enforcement investigations or prosecution. See 5 U.S.C. 552(b)(7)(D), (E). Release of such information also could have a substantial adverse impact on ongoing VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 investigations being conducted by Federal law enforcement agencies, by revealing the course and progress of an investigation. In certain instances, release of information could alert coconspirators to the extent of the Federal investigation and the imminence of their own detection, thus provoking flight. For the reasons discussed above, TSA will not provide any classified information to an applicant, and TSA reserves the right to withhold SSI or other sensitive material protected from disclosure under law. As noted above, TSA expects that information will be withheld only for determinations based on § 1572.107, which involve databases that list indicators of potential terrorist activity or threats. When the determination is based on the individual’s criminal records, TSA expects that appropriate supporting records most likely can be disclosed to the applicant upon a written request to TSA. With respect to disqualifications based on immigration status, TSA will provide the applicant with the reason for a denial, but may not be able to provide specific documentation on the applicant’s alien status. TSA has the discretion to extend due dates both for an applicant and for the agency during the appeal process. An applicant must provide a written statement of good cause for extending the due date, within a reasonable time prior to the due date at issue. This is consistent with the rules of civil procedure. TSA anticipates that if an applicant is attempting to correct erroneous records or gather documents in support of a waiver request, the individual may need additional time for the appropriate governmental agency or entity to produce the documents. As long as the applicant provides a sufficient explanation of these problems, TSA will extend the time needed to complete the process. There are a variety of reasons or events that might require an extension of time, and TSA will review these requests liberally to give applicants as much time as is necessary to provide the correct information. Family needs and emergencies, business travel, extreme weather conditions, and lost documents are all considered legitimate reasons on which TSA would grant an extension of time to an applicant. In addition, an applicant’s extension request does not have to be a formal document. A handwritten request for an extention of time in a letter to TSA is all that is required. The appeal process is designed for applicants to use without legal counsel and so informal written materials are always accepted. PO 00000 Frm 00026 Fmt 4701 Sfmt 4702 There are also reasons for which TSA may need to extend a response date, particularly where an applicant is the subject of an ongoing investigation by another agency. This has been a rare circumstance with the hazmat threat assessment process, but it has occurred and undoubtedly will occur with TWIC applicants. TSA is not required under the hazmat rule or in this proposed rule, to provide notice to an applicant that TSA’s response may be late. However, applicants may contact TSA to determine the status of an appeal. In the hazmat threat assessment process, TSA has an 800-number for drivers to call to ask questions about the appeal procedures and the status of a particular threat assessment. Typically, TSA is able to provide the requested information within one business day. This process will also be available for TWIC applicants. Paragraph (i) of this section describes the procedure for appealing an immediate revocation of an HME under § 1572.13(a) or immediate invalidation of a TWIC under § 1572.21(d)(3). Immediate revocation occurs where TSA determines during the course of conducting a security threat assessment that sufficient factual and legal grounds exist to warrant immediate revocation of the HME. For a hazmat driver under these circumstances, the applicant must surrender the endorsement and cease transporting hazardous materials prior to initiating an appeal. For a TWIC, TSA would invalidate the TWIC in the TSA system. TSA understands that removing the individual from service without an opportunity to correct the record may have adverse consequences, but this mechanism will be used only in cases where the risk of imminent danger is significant and the adverse information is highly reliable. This procedure will also be used where an applicant should have surrendered the endorsement or TWIC and/or applied for a waiver, but failed to do so. The individual may appeal this decision, include all supporting documentation when he or she submits the appeal, and may request releasable documents from TSA. 49 CFR 1515.7 Waiver Procedures This section applies to applicants who have been disqualified from holding or obtaining an HME or TWIC due to a disqualifying criminal offense or mental incapacity. The current standard, § 1572.143, applies to HME applicants and provides that an applicant with certain disqualifying offenses or issues of mental competence may apply for a waiver. In this NPRM, TSA proposes to use the same waiver procedures for TWIC applicants. We are E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules providing a discussion of this section to inform TWIC applicants, most of whom did not need to participate in the hazmat rulemaking where these sections were first discussed. Waivers are offered because an applicant may be rehabilitated to the point that he or she can be trusted in sensitive or potentially dangerous work or has been declared mentally competent. The existing standard and this NPRM provide criteria that TSA considers if the individual does not meet the criminal history standards. TSA believes that these factors are good indicators that an individual may be rehabilitated to the point that a waiver is advisable. The factors are: (1) The circumstances of the disqualifying act or offense; (2) restitution made by the individual; (3) Federal or State mitigation remedies; (4) court records indicating that the individual has been declared mentally competent; and (5) other factors TSA believes bear on the potential security threat posed by an individual. Many of these factors are set forth in MTSA, at 46 U.S.C. 70105(c)(2). TSA has concluded that some crimes, such as espionage, treason, sedition, a terrorist act, and a crime involving a transportation security incident, are so highly indicative of a security threat that individuals convicted of them pose an ongoing, unacceptable risk to transportation security. Most likely, these individuals will be incarcerated for a very long term, but the rule now makes clear that convictions for these crimes disqualify an individual for life, with no opportunity to apply for a waiver. Individuals who are disqualified due to mental incompetence are eligible for a waiver. To support the waiver request TSA will accept a court order or official medical declaration showing that an individual previously declared incompetent is now competent. Generally, TSA will not grant waivers on the basis of a letter from a treating physician stating that the individual is capable of maintaining a job, because these submissions tend to be very subjective and vague. The standard in the rule states that an applicant is mentally incompetent if a court declares it or he or she is involuntarily committed to a mental hospital. Official documents that reverse these findings are necessary for TSA to grant a waiver. TSA, however, does not grant waivers from the standards concerning immigration status or information discovered during a search under § 1572.107. With respect to immigration violations and findings under § 1572.107, individuals may appeal an Initial Determination based on VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 assertions that the underlying records are incorrect, the applicant’s identity is mistaken, or TSA’s analysis of the records is not correct. However, if TSA finds that the Initial Determination is accurate, the individual is ineligible for a waiver. After reviewing an individual’s application for a waiver, TSA sends a written decision to the individual. If the waiver is granted, TSA sends a Determination of No Security Threat to the licensing State or Coast Guard within 60 days after the date of the individual’s waiver application. TSA proposes to add new requirements to paragraph (c) of this section to apply to HME and TWIC applicants. As originally conceived, HME applicants who know they have a disqualifying criminal conviction could apply to TSA for a waiver without initiaing the HME threat assessment process. Therefore, the applicants did not provide all of the biographic information or fingerprints required to conduct a full background check under Part 1572 or pay the full fee for the HME background check. However, in practice TSA would conduct a full background check in order to assess the waiver application properly. Under these conditions, TSA would not possess the best information about the applicant on which to base a waiver decision and did not recover the cost of completing the background check from the applicant. To ameliorate this situation, we propose to require all applicants who know they will be disqualified under the standards in Subpart B of part 1572 and want to apply for a waiver to undergo a full threat assessment for the HME or TWIC and pay all fees associated with the complete security threat assessment. TSA will be able to review all available information in considering an application for a waiver. TSA reviews these materials to ensure that the waiver applicant is being truthful concerning past criminal history and other pertinent activity before determining whether a waiver request should be granted. By requiring the fee and critical biographical information in the waiver submission, TSA will complete waiver evaluations more quickly and effectively. Otherwise, TSA must contact the waiver applicant to request additional information, wait for the information to be submitted and run the risk of missing critical information. Finally, if legislation is enacted after publication of this proposed rule that would require TSA to adopt a program in which Administrative Law Judges may be used to review cases in which TSA has denied a waiver request, or other changes that would impact the PO 00000 Frm 00027 Fmt 4701 Sfmt 4702 29421 waiver process, TSA will amend the final rule as appropriate to address such statutory mandates. 49 CFR Part 1570 Land Transportation Security: General Rules 49 CFR 1570.3 Terms Used in This Part TSA proposes to move the definitions of the terms used for the security threat assessment standards from part 1572, Credentialing and Background Checks for Land Transportation Security to part 1570, Land Transportation Security: General Rules. Most of the terms have been through notice and comment in the hazmat rulemaking. TSA proposes to add definitions for terms used in the TWIC standards and amend some of the terms first promulgated in the hazmat rule. We propose to change the definition of ‘‘applicant’’ to cover individuals who apply for any security threat assessment described in Subchapter D, rather than just individuals who apply for an HME. The term ‘‘Determination of No Security Threat’’ is amended to clarify that such determinations apply both to the authorization to transport hazardous materials and to unescorted access to secure areas of maritime facilities and vessels. Also, TSA is amending the definition to add that TSA will notify the Coast Guard when issuing a Determination of No Security Threat for a mariner applying for a TWIC. The definition for ‘‘explosive or explosive device’’ was published in the current hazmat rule at § 1572.3. TSA proposes to move the definition to § 1572.103 to make clear that the definition applies only to the term as it is used in the list of disqualifying criminal offenses. After publishing the hazmat rule in November 2004, TSA received comments asserting that the definition created confusion between the ‘‘explosives’’ that are hazardous materials under the federal hazardous material regulations and require placarding in transportation, and the crimes that involve explosives and are disqualifying. To resolve these questions, the definition now clearly applies only to § 1572.103, disqualifying criminal offenses. The kind of explosives offenses that are disqualifying are in 18 U.S.C. 232(5), 841(c)–(f), and 844(j), and a destructive device is defined in 18 U.S.C. 921(a)(4) and 26 U.S.C. 5845(f). The explosive material that requires placarding and triggers the requirement to obtain an HME continues to be defined in regulations issued by the U.S. Department of Transportation. 49 CFR 172.101. E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS 29422 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules TSA proposes to amend ‘‘Final Determination of Threat Assessment’’ to add that TSA will notify the Coast Guard when TSA determines that a mariner applying for a TWIC does not meet the security threat assessment standards. A Final Determination may not be administratively appealed. TSA proposes to amend ‘‘Initial Determination of Threat Assessment’’ to also apply to issuance of a TWIC. An Initial Determination may be administratively appealed. TSA proposes to amend ‘‘Initial Determination of Threat Assessment and Immediate Revocation’’ to extend it to the TWIC threat assessment process. This is an initial administrative determination that an applicant poses an imminent security threat and immediate revocation of an HME or TWIC is necessary. Applicants may appeal the determination after revocation has occurred. TSA issues an Immediate Revocation only where we believe the driver may pose an imminent threat to transportation, national security, or other individuals. This definition is provided to distinguish the notification documents used in an immediate revocation from the more common Initial Determination process. ‘‘Invalidate’’ means the action TSA takes when a TWIC is reported as lost, stolen, damaged, no longer necessary, or TSA determines the holder poses a security threat. This action makes the credential inoperative in access control systems. TSA proposes to definition for the term ‘‘owner/operator’’ to refer to the maritime facilities and vessels subject to MTSA. TSA proposes to delete the term ‘‘pilot state’’ from the definitions section because the process in which it was used is no longer in effect. The definition for ‘‘revoke’’ or ‘‘revocation’’ is being amended to apply to the TWIC process as well as the HME process. It is the action TSA or a State takes to cancel, rescind, suspend, or deactivate an HME or TWIC when TSA determines that an applicant does not meet the security threat assessment standards set forth in § 1572.5. TSA proposes to add a new term, ‘‘secure area,’’ which means the area on a vessel, maritime facility, or outer continental shelf facility where security measures have been implemented in a security plan approved by the Coast Guard. For purposes of TWIC, the secure area is the area in which a TWIC is required, unless under escort. We propose to add a new term, ‘‘sensitive security information’’ to the definition section. This term means VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 information that is described in and must be managed pursuant to the requirements codified at 49 CFR part 1520. TSA is adding language to the definition of ‘‘transportation security incident’’ to reflect a new requirement in SAFETEA–LU. The statute requires TSA to make clear that a transportation security incident does not include work stoppage or other nonviolent action taken in an employee/employer dispute. Therefore, employees or employers who participate in a strike or other labor/ management activity cannot be deemed to have committed a disqualifying offense under § 1572.103. TSA is also moving the definition to § 1572.103 to help clarify the kind of crime that is considered disqualifying. TSA proposes to add a new definition for ‘‘transportation worker identification credential.’’ The TWIC is a Federallyissued biometric credential that TSA issues to an individual who has successfully completed a security threat assessment. TSA proposes to add a new definition for ‘‘TSA system’’ to explain the electronic program used to sort, store, and send security threat assessment information to the appropriate database or enrollment center. 49 CFR 1572 Credentialing and Background Checks for Land and Transportation Security 49 CFR 1572.5 Scope and Standards for Hazardous Materials Endorsement Security Threat Assessment This section describes the individuals and entities subject to the requirements in Subpart A and the standards they must meet. In addition, the general standards TSA uses to assess an individual in a security threat assessment. Subpart A applies to State agencies responsible for issuing commercial drivers licenses and HMEs, applicants who hold or apply for an HME, and applicants who hold or apply for a TWIC. The security threat assessment standards TSA applies to HME applicants and proposes to apply to TWIC applicants are established by statute. The USA PATRIOT Act and MTSA require TSA to review relevant criminal history, immigration status, and other watch lists and databases that TSA believes appropriate to make an informed security assessment. An applicant poses a security threat if convicted of certain serious crimes, is not lawfully present in the United States, has a connection to terrorist activity, or has been adjudicated as PO 00000 Frm 00028 Fmt 4701 Sfmt 4702 lacking mental capacity. The specific criteria TSA reviews to determine whether an applicant poses a security threat is described in Subpart B and is discussed in detail below. We are proposing to add paragraph (d) to this section to establish a process by which TSA can determine if a security threat assessment completed by another government entity is comparable to the assessment required in part 1572. As noted above, SAFETEA–LU established several mandates for TSA concerning security threat assessment, one of which we address in this section. TSA must initiate a rulemaking to address the comparability of Federal background checks and eliminate redundant checks. TSA proposes to consider checks conducted by Federal, State, and local governmental bodies in the comparability assessment. TSA will evaluate all aspects of the agency threat assessment, including checks of relevant criminal history databases, immigration status, relevant intelligence and international databases, duration, identity verification and authentication, and the use of biometrics for credentialing. It is important to note that TSA must adhere to its own security standards in evaluating other threat assessments. TSA intends to make a determination of comparability only where it is clear that the threat assessment of the agency applying for the determination includes all of the critical components of TSA’s check. Many governmental bodies focus on factors that relate specifically to the work done by the agency when conducting a background check and therefore would not necessarily include a check of intelligence data or immigration status. Similarly, local and State agencies might not have conducted terrorist database checks. TSA most likely cannot issue a positive comparability determination in these cases. The age of the threat assessment is another area that TSA will review carefully. For purposes of the threat assessment standards set forth in part 1572, a new threat assessment is required every five years. If TSA determines that another security threat assessment is comparable to part 1572 checks, then we must determine how long the check remains valid. For the most part, all checks would have to be renewed every five years. However, there may be circumstances under which the check would remain valid for a longer or shorter term, depending on other factors surrounding the breath of the threat assessment, such as whether perpetual checks are part of the assessment. E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules TSA plans to establish a verification process between TSA and participating agencies to ensure that only employees who have successfully completed a threat assessment through another agency are approved under TSA’s comparability determination. TSA will strive to automate the verification process to reduce costs and processing time. TSA will establish rules governing the exchange of information between TSA and the participating agency, including appropriate Interface Control Documents (ICD). TSA may enter into Memoranda of Understanding (MOU) with other agencies if necessary. TSA plans to notify the public of any determinations of comparability, unless otherwise prohibited by law or such a disclosure would reveal sensitive security information. TSA considered proposing that individuals, rather than agencies, could apply for a comparability determination, but has determined that the costs would increase substantially and the reliability of the information exchanged could be questionable. TSA proposes to notify the public when comparability determinations are made, to make certain that all individuals who are eligible are aware of the determination. An applicant who completes a threat assessment that TSA determines to be comparable to the assessment set forth in part 1572, and wishes to apply for a TWIC to gain unescorted access to a secure area of a facility or vessel, would have to complete the enrollment process required for a TWIC and pay the corresponding fee to cover the cost of information collection and issuance of the credential. However, because a duplicate threat assessment would not be required, the applicant would not have to pay a threat assessment fee. In making comparability determinations, TSA proposes to ‘‘grandfather’’ the comparable threat assessment for the period of time remaining before that threat assessment would expire. For instance, if an HME holder completed the threat assessment under part 1572 in October 2005 and applies for a TWIC in October 2006, TSA would issue the TWIC for the period of time remaining before the HME threat assessment expires. Therefore, the TWIC would show an expiration date of October 2010—five years from the date of the HME threat assessment. TSA proposes to announce comparability determinations in this NPRM. First, an applicant who successfully completes the security threat assessment required for an HME would be deemed to have completed the threat assessment for a TWIC. The VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 standards and period of validity are the same for an HME and a TWIC. However, if an HME holder wishes to apply for the TWIC credential to have unescorted access to secure areas of a facility or vessel, the applicant would complete the TWIC enrollment process and provide the biometric information for issuance of the credential. Second, TSA deems the security threat assessment required to obtain a FAST card, as part of the Free and Secure Trade program administered by U.S. Customs and Border Protection (CBP), an agency within DHS, to be comparable to the security threat assessment set forth in part 1572. FAST is a cooperative effort among CBP and the governments of Canada and Mexico. Applicants from Canada, Mexico, and the United States may volunteer to undergo a background records check and if they complete it successfully, may receive expedited entrance privileges at the northern and southern borders, subject to other requirements. CBP conducts a fingerprint-based criminal history records check, namebased checks of pertinent intelligence databases, and a personal interview. Canada conducts a similar check for Canadian citizens. The FAST card and background check are valid for five years. TSA invites comment on paragraph (d) from all interested parties. TSA invites other agencies and workers who may be affected by this section to propose different or additional standards to make this process as efficient and effective as possible. TSA urges all agencies interested in obtaining a comparability determination to contact TSA, not only with comments to the proposed rule, but also to inform TSA of the interest in seeking the determination. Please contact Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment Program, TSA–19, TSA, 611 South 12th Street, Arlington, VA 22202. 49 CFR 1572.7 Waivers of Security Threat Assessment Standards This section describes the TWIC applicants who TSA proposes may apply for a waiver of the threat assessment standards. As we do with HME applicants, TSA proposes that TWIC applicants who have been convicted of certain criminal offenses and those who have been declared mentally incompetent in the past may apply for a waiver. Individuals convicted of treason, sedition, espionage, a crime involving a transportation security incident, and a crime of terrorism are not eligible for a waiver from TSA. TSA believes this is PO 00000 Frm 00029 Fmt 4701 Sfmt 4702 29423 appropriate given the severity and level of risk these crimes reflect. For applicants who do not meet the immigration standards in § 1572.105, there is no circumstance or set of facts under which TSA would wish to suspend the application of the lawful immigration categories listed to issue a waiver. Additionally, if a TWIC applicant is disqualified under § 1572.107, the applicant should not be eligible for a waiver. Granting a waiver to an individual determined to pose a security threat would undermine the purpose of this rule and the statutes that gave rise to it. 49 CFR 1572.9 Applicant Information Required for Security Threat Assessment for a Hazardous Materials Endorsement This section describes all of the identifying information an HME applicant must provide in order for TSA to complete the fingerprint- and intelligence-related checks. TSA is proposing one change in paragraph (g) relating to employer notification of adverse threat determinations. TSA proposes to add a statement to the application process, informing the applicant that TSA may notify the applicant’s employer if TSA determines that he or she poses a security threat. TSA believes that applicants should be fully aware of TSA’s authority and responsibility to provide employer notifications at the time of the threat assessment application. 49 CFR 1572.11 Applicant Responsibilities for a Security Threat Assessment for a Hazardous Materials Endorsement This section describes the standards with which each HME applicant must comply and the actions the applicant must take in order to hold an HME. TSA is not proposing any changes to this section. 49 CFR 1572.13 State Responsibilities for Issuance of Hazardous Materials Endorsement This section lists all of the responsibilities that the States must perform in order to ensure that only individuals who meet the security threat assessment standards receive a hazmat endorsement. TSA is not proposing any substantive changes to this section, except to remove sunset provisions. Former paragraph (b) included compliance dates that have passed and so are not necessary to reference in rule text. Former paragraph (c) permitted a State to apply to be a ‘‘Pilot State’’ prior to January 31, 2005 and is no longer necessary. Former paragraph (f) required E:\FR\FM\22MYP2.SGM 22MYP2 29424 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules States to submit a declaration by December 27, 2004 if the State wanted to conduct fingerprint collection, and is no longer necessary. 49 CFR 1572.15 Procedures for Security Threat Assessment for an HME TSA is not proposing to make any changes to this section. This section describes the security threat assessment process in detail, and provides that no State can issue an HME unless the steps outlined in this section have been completed. 49 CFR 1572.17 Applicant Information Required for the Security Threat Assessment for TWIC TSA is proposing this new section to require TWIC applicants to provide biographic and biometric information necessary for TSA to conduct a comprehensive security threat assessment. This proposed section is nearly identical to § 1572.9, Applicant information required for the security threat assessment for an HME. However, in this section, TSA proposes to require the applicant to explain his or her need for a TWIC. Paragraph (a)(10) states that the applicant must provide his or her job description and the facility, vessel, or port where the applicant requires unescorted access, if it is known. Paragraph (a)(11) asks for information concerning the applicant’s employer, if known. Paragraph (f) proposes to require each TWIC applicant to certify that he or she needs unescorted access to secure areas of maritime facilities as part of their employment duties, or that he or she is a merchant mariner. TSA is proposing these requirements to limit TWIC to individuals with a legitimate need to enter secure areas of maritime facilities. First, TSA has authority to conduct threat assessments on individuals only in furtherance of its transportation security authorities. We cannot conduct security threat assessments on persons who have no such nexus. This principle is consistent with security standards in other modes of transportation. For instance, in aviation, each airport operator determines which individuals need unescorted access to the secure area of the airport, and the airport conducts a background check and provides a credential to those individuals. TSA has no employment or business relationship with the TWIC applicant and so we propose to obtain a minimum level of information from the applicant to avoid conducting security threat assessments and providing a tool for accessing facilities to any individual who may have a criminal motive or casual interest Start date sroberts on PROD1PC70 with PROPOSALS Group 1 Group 2 Group 3 Effective date of rule ...... After Group 1 .................. After Group 2 .................. 20:38 May 19, 2006 49 CFR 1572.19 Applicant Responsibilities for a Security Threat Assessment for TWIC In this section, we propose the basic duties a TWIC applicant must comply with to satisfy the rule. Paragraphs (a) and (b) propose a timeline for enrollment for TWIC applicants. As currently envisioned, enrollment of the current population subject to this rule will be accomplished three phases: End date Not later than 10 months after effective date of rule. Not later than 15 months after effective date of rule. Not later than 18 months after effective date of rule. We believe that a staggered rollout is the most efficient way to implement a program of this size and complexity. TSA and the Coast Guard plan to focus resources consistent with the schedule above and complete each grouping as quickly as possible. The length of the enrollment period at each port will vary depending on port population, with the requirement that enrollment at all regulated facilities and vessels must be completed within 18 months after the effective date of the final rule. TSA and Coast Guard also are contemplating implementing a more flexible rollout, with anticipated dates to be announced by notices published in the Federal Register. The timetable proposed in the rule does not include actual credential issuance. Once the enrollment process is complete for an applicant, the time required to complete the threat assessment and have the credential ready to issue will typically be 30 days. As proposed, each FMSC, with input from the AMS Committee, would establish his/her own plan for VerDate Aug<31>2005 in the facility. Ultimately, the facility owner controls the individuals that are given unescorted access through the access control system, but TSA believes some sort of minimal filter is advisable to restrict TWIC to those who have a need for it. TSA also believes this may prevent an unscrupulous employer who has no connection to a facility or vessel from using the TWIC threat assessment process as a free suitability assessment in making hiring decisions. TSA does not intend for this provision to adversely impact an employee who is seeking employment in the maritime industry and applies for a TWIC to increase his or her marketability. These applicants should be able to articulate the facility, vessel or port where they may seek employment, which would satisfy paragraph (a)(10). Jkt 208001 scheduling enrollment to ensure a steady flow of enrollees, prevent long lines, and avoid disrupting commerce. TSA plans to establish enrollment times that are consistent with normal port operations. To allow flexibility and service the maritime population effectively, TSA will deploy permanent and mobile enrollment centers. Enrollment workstations will be fielded at larger ports in sufficient quantity to complete the enrollments within the required timeframe, assuming reasonably steady enrollment rates. The strategic placement of the enrollment stations will accommodate port management and operational requirements, and satisfy new enrollments and replacement of lost or stolen credentials. Paragraph (b) of this section discusses the enrollment of mariners. Mariners who hold an MMD or License can enroll in TWIC pursuant to the schedule in paragraph (a). However, these applicants are not required to undergo the criminal history records portion of PO 00000 Frm 00030 Fmt 4701 Sfmt 4702 the TWIC security threat assessment if they received an MMD after February 3, 2003 or a License after February 13, 2006. These applicants must provide the information necessary for enrollment, including biometric information, and obtain the credential. These MMD and License applicants have completed a full security background check performed by the Coast Guard, including review of criminal records for all crimes listed in 46 CFR 10.201 or 46 CFR 12.02–4. These include terrorism offenses, acts of sabotage, and espionage. In addition, the Coast Guard safety and security evaluation analyzes several data sources that contain intelligence information and includes a verification of immigration status. We have agreed to eliminate the requirement for a criminal history records check for this portion of the merchant mariner population to prevent redundancy and reduce costs for applicants and the government. Mariners who have already had their background fully vetted by the Coast E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules sroberts on PROD1PC70 with PROPOSALS Guard are not required to undergo the full TWIC security threat assessment described in part 1572 for their first TWIC, as long as their MMD or License is current. TWICs issued in accordance with these procedures will expire five (5) years after the date of the Coast Guard security threat assessment, and align with the expiration date of the MMD or license, as applicable. Although a mariner may opt to undergo the full security vetting and be issued a TWIC that is valid for the full 5-year period, this is not required for the mariner population who have an MMD issued after February 3, 2003 or a License issued after January 13, 2006. In paragraphs (c)–(e) we propose the same standards that currently apply to HME applicants. TWIC holders would be required to surrender the TWIC to TSA if TSA determines that the holder poses a security threat, and have a continuing obligation to report a disqualifying event to TSA. In addition, TWIC applicants would be required to submit the biometric and biographic information required in § 1572.17 and the security threat assessment fee to TSA once every five years. Paragraph (f) addresses lost, stolen, or damaged credentials. To minimize fraud and prevent unauthorized individuals from entering the secure areas, TWIC holders must report lost or stolen credentials to TSA as soon as the holder loses possession of the credential. TSA would then invalidate the credential number in the TSA system to prevent it from being used in an access control system. Employees will pay a fee for the cost of the replacement credential, but we do not currently plan to require a new threat assessment. The expiration date on the replacement credential will be the same as the expiration date on the original card. If a TWIC holder finds that the credential no longer operates as intended in the access control system, he or she should report it and go to an enrollment center to determine the cause of the malfunction. Unless there is an inherent defect in the credential, the holder will be charged a fee of $36 for a replacement credential. 49 CFR 1572.21 Procedures for Security Threat Assessment for a TWIC This section outlines the procedures TSA, applicants, and owners/operators would follow in completing the security threat assessment. These procedures are nearly identical to the procedures followed in the HME process. However, where TSA notifies a State of a Final Determination of Threat Assessment, Determination of No Security Threat, or an Immediate Revocation in an action VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 involving an HME, TSA would notify the Coast Guard with respect to a TWIC applicant who is a mariner. TSA provides this information to the Coast Guard because TSA’s final determination bears on the mariner’s credential. If the mariner is not eligible for a TWIC, the Coast Guard will not issue the mariner credential. Also, TSA will notify the FMSC of TWIC revocations and denials. As the chief governmental security officer at a port, the FMSC should be aware of an applicant who is denied a TWIC or has a TWIC that has been revoked. 49 CFR 1572.23 Conforming Equipment; Incorporation by Reference Each owner/operator required to have access control systems and equipment, including card readers, in conjunction with TWIC, must meet TSA-approved standards. These readers shall conform to referenced industry standards employed by TSA for secure identity credentials. TSA plans to incorporate these standards by reference in the final rule. These standards are listed in proposed § 1572.23. Copies of these standards may be obtained through the Web sites and addresses listed in proposed § 1572.23. 49 CFR 1572.24–40 [Reserved] 49 CFR 1572.41 Compliance, Inspection and Enforcement In this section, TSA proposes standards requiring owners/operators to permit TSA personnel to enter the secure areas of maritime facilities to evaluate, inspect, and test for compliance with the standards in part 1572. These proposals are standard and necessary for TSA to exercise its oversight and enforcement responsibilities over trusted agents, the enrollment process, and the performance of the credential in a variety of circumstances. TSA will be subject to audits and reporting requirements on the TWIC threat assessment and credentialing system that require visual and operational assessments that necessitate access to facilities and vessels. TSA will work cooperatively with owners/operators to minimize adverse impacts on normal operations. 49 CFR 1572.101 Scope TSA is amending this section to add TWIC applicants to the group of individuals subject to the threat assessment standards. Also, TSA is adding paragraph (a) to this section to acknowledge that hazmat drivers are subject to additional standards issued by the Federal Motor Carrier Safety PO 00000 Frm 00031 Fmt 4701 Sfmt 4702 29425 Administration and the State that issues the commercial driver’s license, including safety requirements, immigration status and criminal history standards. 49 CFR 1572.103 Disqualifying Criminal Offenses TSA proposes to adopt the list of criminal acts that disqualify an applicant from holding an HME under 49 CFR 1572.103 for TWIC applicants. In addition, TSA proposes to make one substantive and several administrative changes to this section, as it applies to HME and TWIC applicants. TSA is moving the definitions of ‘‘explosive,’’ ‘‘firearm,’’ and ‘‘transportation security incident’’ from § 1572.3 to § 1572.103, where the terms are used. This should help to eliminate uncertainty about the crimes that are disqualifying. In addition, TSA is adding clarifying language concerning the kind of activity that constitutes a ‘‘transportation security incident.’’ As required in SAFETEA–LU, the definition now makes clear that nonviolent labormanagement activity is not considered a disqualifying offense. TSA also adds paragraph (a)(1) to the scope of this section acknowledging that hazmat drivers are subject to other standards issued by the Federal Motor Carrier Safety Administration and the State that issues the driver’s commercial license and hazmat endorsement. TSA is proposing a substantive change to this section concerning the crimes of treason, sedition, espionage, and terrorism listed in § 1572.103(a), which are permanently disqualifying. Applicants convicted of these crimes are not eligible for a waiver. TSA is adding conspiracy to commit these crimes to the list of crimes that are not subject to a waiver request. TSA has determined that a conviction of conspiracy to commit espionage, treason, sedition, or terrorism are indicative of a serious, ongoing, unacceptable risk to security and should not be waived under any circumstances. This change applies to HME and TWIC applicants. Paragraph (d) describes how an arrest with no indication of a conviction, plea, sentence or other information indicative of a final disposition must be handled. TSA proposes to change the time allowed for an applicant to provide correct records from 30 days to 60 days. The individual must provide TSA with written proof that the arrest did not result in a conviction of a disqualifying criminal offense within 60 days after the date TSA notifies the individual. If TSA does not receive such proof in 60 days, TSA notifies the applicant that the he or E:\FR\FM\22MYP2.SGM 22MYP2 29426 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules sroberts on PROD1PC70 with PROPOSALS she is disqualified from holding an HME or a TWIC. TSA is considering whether to change the list of disqualifying criminal offenses and invites comment on this matter. TSA received comments on this list following publication of the November 2004 hazmat rule, particularly concerning crimes with explosives. Commenters suggested that possession of explosives should not be disqualifying if the conviction results from previous criminal activity, perhaps nonviolent, that makes any subsequent possession of an explosive or firearm a felony. Also, commenters suggested that explosives convictions should be disqualifying only when the crime involves explosives in the amount and packaging that require placarding in transportation. Even assuming TSA agrees with these suggested changes, the current criminal recordation system does not include the level of detail these distinctions require. Often, criminal rap sheets list only the statute violated, which may or may not include ‘‘explosives’’ in the title. Rarely, if ever, would a rap sheet include specific facts about the amount or type of explosive involved, or whether the conviction is based on a previous underlying conviction that prohibits contact with explosives. These are the kind of facts TSA can and does evaluate during a request for a waiver, where the applicant provides background information surrounding the conviction and any mitigating information. TSA invites comment on this and any other issue related to disqualifying criminal offenses, in which the public believes TSA can improve the process. TSA may amend § 1572.103 as it applies to TWIC and HME applicants. Any amendment to the list of disqualifying crimes will apply equally to TWIC and HME applicants. 49 CFR 1572.105 Immigration Status The immigration standards in this section currently apply to HME applicants, with the exception of paragraph (a)(2)(iv), which is a new proposal. TSA now proposes to apply the entire section to TWIC applicants. TSA proposes to add a new paragraph to permit certain drivers licensed in Canada or Mexico who frequently deliver goods to facilities and vessels to meet the immigration standards for holding a TWIC. These drivers are admitted to the United States under a North American Free Trade Agreement (NAFTA) implementation visa category. 8 CFR 214.2(b)(4)(i)(E). These drivers are lawful non-immigrants, doing business in the United States, but are not ‘‘working in’’ the United States for VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 purposes of the immigration laws. These individuals do not possess (nor are they required to possess under this particular visa category) specific documentation authorizing them to work in the United States for a specified time, as is required of other lawful nonimmigrants applying for a TWIC under paragraph 1572.105(a)(3)(i)-(iii). This proposed paragraph is intended to cover the significant number of commercial drivers regularly entering the United States to deliver food and other products to a port or vessel. Requiring these drivers to enter the access control portion of the port under escort would interfere with normal port operations and could potentially adversely affect other businesses on the port. This proposal would not have any impact on existing requirements that must be met to receive a visa under 8 CFR 214.2(b)(4)(i)(E). TSA invites comment on this proposal from all interested parties. 49 CFR 1572.107 Other Analyses This section of TSA’s HME rule currently applies to HME applicants and we are proposing to apply it to TWIC applicants. MTSA requires that TSA disqualify an individual that ‘‘poses a terrorism security risk to the United States.’’ For checks under this section for the HME process, TSA accesses relevant international databases, such as Interpol-U.S. National Central Bureau, and other appropriate sources of information on terrorists and terrorist activity, violent gangs, fugitives from justice, and international criminal records. These sources are also appropriate for TWIC applicants. Paragraph (c) states that TSA may determine that an individual poses a security threat if TSA’s search reveals an extensive or very serious domestic or foreign criminal history, conviction for serious crimes not listed in § 1572.103, or an extensive period of imprisonment, foreign or domestic, exceeding 365 consecutive days. TSA placed this language in the hazmat rule to clarify the full application of this section and to provide sufficient notice to the public that there may be cases in which an applicant’s criminal record includes convictions for serious crimes that are not specifically listed in § 1572.103, but may be disqualifying. Also, if an applicant has been imprisoned for more than a year, which is generally indicative of a serious offense or a long history of criminal activity, TSA may determine that the applicant poses an unacceptable security threat. As TSA noted in the hazmat rulemaking, we cannot possibly list all of the offenses or other information that PO 00000 Frm 00032 Fmt 4701 Sfmt 4702 may be relevant to determining whether an individual poses a security threat that warrants denial of an HME. TSA has discretion to carry out the intent of MTSA and the USA PATRIOT Act and assess threats to transportation and the Nation, where the intelligence and threats are so dynamic. TSA understands that the flexibility this language provides must be used cautiously and on the basis of compelling information that can withstand judicial review. TSA invites comment on this section. 49 CFR 1572.109 Mental Capacity The explosives laws prohibit individuals who have been adjudicated as lacking mental capacity from transporting explosives. The hazmat rule currently provides that any person who has been determined to lack mental capacity does not meet the standards for a security threat assessment. We propose to extend this qualification standard to TWIC applicants. An individual lacks mental capacity, for purposes of this NPRM, if he or she has been committed to a mental health facility or has been adjudicated as lacking mental capacity. An individual is adjudicated as lacking mental capacity if a court or other appropriate authority determines that the individual is a danger to himself or herself, or lacks the mental capacity to manage his or her affairs. An individual is ‘‘committed to a mental health facility’’ if formally committed by a court; this term does not refer to voluntary admissions to a mental institution or hospital. Subpart E—Fees for Transportation Worker Identification Credential A. TWIC Maritime Population Estimation Methodology TSA conducted an analysis of the maritime population to determine the necessary fee level for the TWIC threat assessment, including enrollment; adjudication, appeals and waivers; and issuance of the credential. TSA estimates that during initial rollout of the program, it will issue TWIC credentials to approximately 750,000 workers requiring regular, unescorted access to secure areas of MTSAregulated facilities. This figure is the product of survey and analysis work by TSA and Coast Guard personnel, using information provided by individual ports, public and private-sector data sources, interviews with sector subjectmatter experts, and extrapolation from survey responses. In developing this estimate, TSA first identified a wide array of worker categories at MTSA-regulated facilities E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules sroberts on PROD1PC70 with PROPOSALS that would most likely to be required to carry a TWIC. This list evolved during the course of TSA’s rulemaking process, both to reflect new information as well as consultations with Coast Guard and maritime industry representatives. The list of major port-related personnel subject to TWIC requirements is as follows: • Cruise Workers (Land-Based Only) • Liquid Bulk Refining/Processing Workers • Longshoremen • Merchant Mariner Document or License Holders • Off-Shore Liquid Bulk Workers (i.e. MODUs) • Rail Workers • Shipyard Workers • Site Management/Administration Workers • Truck Drivers • Vessel Operations/Port Support Workers • Contractors/Other The 750,000 figure was derived from analyzing each of these employment segments using a number of approaches and resources. First, TSA and Coast Guard conducted a maritime population survey during late 2004 and early 2005. TSA and Coast Guard interviewed management officials from 45 ports across the United States, covering many of the nation’s largest cargo operations.5 We asked senior port managers and security officers to estimate the number of workers requiring regular unescorted access to their ports, subdivided into distinct employment categories. To enable comparisons between ports and estimate the range of labor required to load/unload/transport a specific volume of freight, port officials also estimated tonnage and twenty-foot equivalent units (TEU) statistics by cargo type for their ports, such as container, liquid bulk, dry bulk, and roll-on/roll-off (‘‘roro’’). This data was utilized to generate four geographically-diverse extrapolation scenarios, each approximating the nationwide distribution of different cargo types.6 TSA and Coast Guard used this approach to minimize the impact of the significant variation it found in labor intensiveness across ports, and to incorporate a broader array of port data in TSA’s calculations. TSA and Coast Guard believe that this method yielded reliable port worker population estimates in the following categories: • Site Management/Administration (70,000) • Vessel Operations/Port Support (50,000) • Rail (10,000) • Contractors/Other (70,000) TSA and Coast Guard also used industry-based employee research to complement the maritime population survey. The agencies believe that the survey did not produce sufficiently accurate worker counts for longshoremen and port truckers in particular, because employees in these classes sometimes work at multiple facilities and thus were likely doublecounted in the TSA/Coast Guard survey data. For this reason, industry-wide estimates of port truckers and longshoremen were substituted for the agencies’ initial survey data involving these sectors. The total longshoremen estimate (60,000) was reached by aggregating data from labor unions and port management organizations.7 The port trucker estimate (110,000) was developed using the 2002 (latest available) Vehicle Inventory and Use Survey (VIUS) of the U.S. Census Bureau, isolating respondent populations with common port 5 Ports surveyed (in whole or in part) include: Baltimore, Beaumont, Boston, Brownsville, Brunswick, Burns Harbor, Charleston, Cleveland, Duluth-Superior, Gulfport, Houston, Jacksonville, Lake Charles, Long Beach, Los Angeles, Miami, Milwaukee, Mobile, Morehead City, New Orleans, New York/New Jersey, Oakland, Palm Beach, Panama City, Pascagoula, Pensacola, Philadelphia, Port Arthur, Port Canaveral, Port Hueneme, Port Manatee, Portland (ME), San Diego, San Francisco, Savannah, Seattle, South Louisiana, Tampa, Texas City, Toledo, Virginia Ports (Newport News, Norfolk, Portsmouth), Wilmington (DE), and Wilmington (NC). 7 Sources consulted by TSA include the Pacific Maritime Association, United States Maritime Alliance, International Longshoreman’s Association, and International Longshoremen and Warehouse Union. 8 Sources consulted by TSA include (but are not limited to) the American Trucking Association, Owner-Operator Independent Drivers Association, International Brotherhood of Teamsters (Port Division), and academic subject-matter experts from the University of Michigan, University of Minnesota-Morris, and California State University at Long Beach. 9 According to subject-matter experts consulted by TSA, the vast majority of port truckers (∼80%) drive containers. Thus, TSA estimated noncontainer port truckers to be 20% of the total population. Common characteristics of this sector include: independent owner-operator status, forhire employment basis, high proportion of short hauls (less than 100 miles). 10 Based on sector data provided by American Waterways Operators. 6 The TSA Office of Revenue and MARAD representatives jointly cooperated on a cargo type interpretation of U.S. Army Corps of Engineers Waterborne Commerce data, producing a single normalized basis for extrapolation projections: 49% liquid bulk, 9% container, 41% dry bulk/break bulk, 1% ro-ro. VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 PO 00000 Frm 00033 Fmt 4701 Sfmt 4702 29427 container trucker characteristics. Additionally, an estimate for noncontainer drivers was based on a consensus percentage of the total VIUS survey data from trucking subject-matter expert interviews.8 9 TSA and the Coast Guard also conducted employment category research with leading maritime associations and other relevant organizations to account for MTSAregulated maritime population segments that the agencies believe were either not represented or under-represented in its maritime population survey. These segments include: • Barge Operators (30,000) 10 • Land-Based Cruise Personnel (15,000) 11 • Liquid Bulk Refining/Processing (80,000) 12 • MODU/Offshore Liquid Bulk (30,000)13 • Shipyard (55,000) 14 Finally, TSA and the Coast Guard integrated the Coast Guard’s operational data for merchant mariners. The National Maritime Center (NMC)— which provides credentialing, training, and certification services to all merchant mariners—lists 204,835 domestic MMD and MML holders.15 While no reliable data exists on the overlap between MMD holders and active land-based port workers, representatives of NMC and TSA arrived at a rough estimate of 35,000. Thus, the net active estimate for MMDs who will require TWICs is ∼170,000 (205,000– 35,000 overlapping MMDs counted among other categories). The aggregate results of TSA/Coast Guard maritime employment population research are summarized in the table below: 11 Extrapolation based on Maritime Population Survey population data and International Council on Cruise Lines (ICCL) market share information. 12 MTSA-regulated refinery estimate (35,000– 40,000) reflects National Petrochemical and Refiners Association (NPRA) Injuries and Illness Survey data. Other liquid bulk numbers are extrapolations based on MTSA-regulated facility population data in the EPA Risk Management Database. 13 Based on sector data provided by the Minerals Management Services of the U.S. Department of Interior. Only MTSA-regulated offshore facilities are included. 14 Based on data provided by MARAD’s Office of Shipbuilding and Marine Technology. Sources consulted by TSA include (but are not limited to) the American Shipbuilding Association and Shipbuilders Council of America. Only MTSAregulated shipyards are included. 15 Date is as of June 2005. Includes both MMDs and other license holders to be covered by TWIC. E:\FR\FM\22MYP2.SGM 22MYP2 29428 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules TSA/Coast Guard population estimate 1 Maritime employment sector MMD and License Holders .................................................................................................................................................................. MMD/License Overlap with Other Worker Categories ........................................................................................................................ Port Truck Drivers ................................................................................................................................................................................ Liquid Bulk Refining/Processing .......................................................................................................................................................... Site Management/Administration ......................................................................................................................................................... Contractors/Other ................................................................................................................................................................................ Longshoremen ..................................................................................................................................................................................... Shipyards ............................................................................................................................................................................................. Vessel Operations/Port Support .......................................................................................................................................................... MODU/Offshore Liquid Bulk ................................................................................................................................................................ Barge Operators .................................................................................................................................................................................. Land-Based Cruise .............................................................................................................................................................................. Rail Workers ........................................................................................................................................................................................ 205,000 ¥35,000 110,000 80,000 70,000 70,000 60,000 55,000 50,000 30,000 30,000 15,000 10,000 Total TWIC Initial Maritime Population ............................................................................................................................................ 750,000 1 Population estimate is for those persons requiring regular unescorted access to secure areas of MTSA-regulated facilities. TSA and Coast Guard have set an 18month TWIC enrollment period for MTSA-regulated facilities and vessels beginning in the final month of FY06, with the majority of enrollments occurring in FY07 and completion by mid FY08. The enrollment plan assumes that workers at the largest U.S. ports are enrolled first, and those at small and rural locations will be completed toward the end of this cycle. TSA estimates a 1% population growth per year, not including worker turnover, in which individuals leave the port worker population and are replaced by new port workers.16 Accounting for this annual population growth net of turnover, (or ‘‘net population growth’’), results in an 18-month initial enrollment population of approximately 758,000. sroberts on PROD1PC70 with PROPOSALS 1. Recurring Population TSA estimates that approximately 12 percent of port workers will leave the port labor force every year and thus will be replaced by new workers who will require a TWIC. This estimate is derived from TSA and Coast Guard’s informal port population survey efforts and related anecdotal evidence. Given that the port population segments discussed above are extremely diverse in operations and demographics, TSA expects this annual turnover will not be consistent across all categories or locations. Assuming a 12 percent annual rate and 1 percent net population growth per year, TSA estimates a fiveyear total turnover of approximately 410,000. 16 Population growth estimate derived from the Bureau of Labor Statistics’ (BLS) National Employment Matrix, which estimates growth in the ‘‘Transportation and Warehousing’’ sector of the economy at 1.1 percent VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 TSA also estimates that 8 percent of port workers will lose or damage their TWIC credentials each year. This estimate is derived from anecdotal evidence from other Federal credentialing programs. Assuming an 8 percent annual rate and 1 percent net population growth per year, TSA estimates five-year lost/damaged credential totals of some 273,000. 2. Five-Year Enrollment Population Based on these calculations, TSA estimates total five-year TWIC enrollments (initial enrollments, including annual net population growth, plus job turnover enrollments), of approximately 1,168,000. This estimate does not include the lost/ damaged card replacement estimate of 273,000 over five years. B. Proposed Fee To comply with the mandates of Section 520 of the 2004 DHS Appropriations Act, TSA proposes to establish user fees for individuals who apply for or renew a TWIC, and thus are required to undergo a security threat assessment in accordance with 49 CFR part 1572. TSA proposes to establish a new user fee (with two components), separate from the fee the FBI charges to check its criminal history records databases.17 First, TSA proposes an Information Collection/Credential Issuance Fee to cover the costs of collecting the biometric and biographic information, transmitting the information to the 17 The FBI is authorized to establish and collect fees to process fingerprint identification records and name checks for non-criminal justice, non-law enforcement employment and licensing purposes that may be used for salaries and other expenses incurred in providing these services. See Title II of Pub. L. 101–515, November 5, 1990, 104 Stat. 2112, codified in a note to 28 U.S.C. 534. PO 00000 Frm 00034 Fmt 4701 Sfmt 4702 appropriate process or location, and issuing the credential. Second, TSA proposes a Threat Assessment/ Credential Production Fee to cover TSA’s costs to perform and adjudicate security threat assessments; administer the appeal and waiver process; conduct program oversight; and produce the credential. Third, TSA proposes a fee to cover the cost of creating a new credential to replace a lost, stolen, or damaged credential. Based on the information currently available to the agency, TSA proposes the following fees: an Information Collection/ Credential Issuance Fee ranging from $45–$65; a Threat Assessment/ Credential Production Fee of $50–$62; and a Credential Replacement Fee of $36. The FBI currently charges a fee of $22 for the criminal history records check, which is also collected whenever a security threat assessment is required. Pursuant to the Chief Financial Officers Act of 1990, DHS/TSA is required to review these fees no less than every two years. 31 U.S.C. 3512. Upon review, if it is found that the fees are either too high (i.e., total fees exceed the total cost to provide the services) or too low (i.e., total fees do not cover the total costs to provide the services), the fee will be adjusted. In addition, TSA may increase or decrease the fees described in this regulation for inflation following publication of the final rule. If TSA increases or decreases the fees for this reason, TSA will publish a Notice in the Federal Register notifying the public of the change. 1. Information Collection/Credential Issuance The security threat assessment process requires all applicants who apply for or renew a TWIC to submit their fingerprints and biographic E:\FR\FM\22MYP2.SGM 22MYP2 29429 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules information at a TSA-approved enrollment facility. The same enrollment facility will handle credential issuance to the applicant after successful completion of the threat assessment process. TSA will hire a contractor agent to provide these services. Based on TSA’s research of the costs of both commercial and Government fingerprint and information collection services, as well as a prior competitive bidding and acquisition process for similar (but less extensive) services in support of TSA’s HME program, TSA estimates that the per applicant cost to collect and transmit fingerprints and other required data electronically is likely to be between $45 and $65. This fee also includes the costs for related administrative support, help desk services, quality control, credential distribution and related logistics. 2. Threat Assessment/Credential Production For the TSA security threat assessment and credential production process, each applicant’s information will be checked against multiple databases and other information sources so that TSA can determine whether the applicant poses a security threat that warrants denial of a TWIC. The threat assessment includes an appeal process for individuals who believe the records upon which TSA bases its determination are incorrect. In addition, TSA will administer a waiver process for applicants denied a TWIC due to criminal activity or mental incompetence. TSA must implement and maintain the appropriate systems, resources, and personnel to ensure that fingerprints and applicant information are appropriately linked, and that TSA can receive and act on the results of the security threat assessment. TSA must have the necessary resources—including labor, equipment, database access, and overhead—to complete the security threat assessment process. TSA estimates that the total cost of threat assessment services will be $24.1 million over five years. This estimate includes $4.6 million for all information systems expenses, including the modification and sustainment of TSA’s Screening Gateway. The Screening Gateway is an information system platform that allows TSA to submit, receive, and integrate security threat assessment information from a variety of Federal, State, and other sources in order to help make security threat assessment determinations. Upon successful completion of the threat assessment process, the applicant’s enrollment record is sent to the TSA-approved credential production facility. The production facility initiates the TWIC credential personalization process, which includes printing and magnetic stripe and chip encoding. Before the credentials are shipped back to the enrollment center, the credential production facility employees perform quality control inspections. TWIC credentials are then securely packaged and shipped to the designated enrollment center. The credential production process will be administered by a TSA-approved federal credential production facility. It will require expenditures for the following items: card stock, customization materials (i.e., contactless chips, laminates), biennial credential redesign, production equipment and maintenance, production labor, and shipping costs. TSA estimates that the total cost of credentialing production and management will be $17.5 million over five years. TSA representatives will manage the operation and integration of the TWIC programs, including coordination of a nationwide credentialing rollout program. The Agency will also be responsible for ensuring compliance at all TWIC enrollment facilities. These tasks will require the assignment of permanent TSA personnel and temporary contract labor for program support. Contractors will also certify and accredit TWIC systems on a periodic basis. Support costs will include program travel and office supplies. TSA has also developed an electronic network (the TSA system) to facilitate applicant information collection, coordination, credential production, applicant notification and the extensive access control activities of all TWIC cardholders and regulated facilities over time. While the majority of the TSA system development costs were financed in prior years with funds appropriated to TSA, system modification costs and recurring operational costs are included in the five-year program costs. TSA estimates that the total for program support will be $36.1 million over five years. Table Five details the major cost components TSA expects to incur over the next five years to implement the TWIC program. TABLE 5.—YEAR TSA COSTS FOR TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL PROGRAM Operational year Start-up sroberts on PROD1PC70 with PROPOSALS Estimated Annual New Applicants and Turnover ............ Estimated Annual Lost/Damaged Credential Replacement Applicants ............................................................ Cost Components* Threat Assessment Costs: Personnel to conduct name-based threat assessments ..................................................................... Personnel to conduct redress operations (waivers and appeals) ......................................................... Adjudication labor ..................................................... Screening Gateway development ............................. Screening Gateway operations, maintenance & disaster recovery ....................................................... Document management system ............................... Threat Assessment Costs—Subtotal ................ Card Production Costs: Card materials .......................................................... Card production equipment and labor ...................... Production system design ........................................ Card re-design .......................................................... VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 PO 00000 1st Year 2nd Year 3rd Year 4th Year 5th Year 15,000 708,000 164,000 93,000 94,000 95,000 50 27,876 58,003 61,818 62,436 63,061 $70,000 $1,687,000 $2,014,000 $2,200,000 $2,387,000 $2,576,000 $45,000 $136,000 $300,000 $537,000 $3,350,000 .................... $269,000 $1,208,000 .................... $269,000 $824,000 .................... $269,000 $828,000 .................... $269,000 $831,000 .................... $247,000 $42,000 $993,000 $504,000 $513,000 $360,000 $513,000 $240,000 $513,000 $240,000 $513,000 $240,000 $840,000 $7,071,000 $4,364,000 $4,046,000 $4,237,000 $4,429,000 $1,750,000 $909,000 $250,000 .................... $5,250,000 $1,261,000 .................... .................... $1,750,000 $937,000 .................... $100,000 $1,750,000 $707,000 $100,000 .................... $1,750,000 $707,000 .................... $100,000 $1,750,000 $707,000 .................... .................... E:\FR\FM\22MYP2.SGM 22MYP2 Frm 00035 Fmt 4701 Sfmt 4702 29430 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules TABLE 5.—YEAR TSA COSTS FOR TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL PROGRAM—Continued Operational year Start-up 1st Year 2nd Year 3rd Year 4th Year 5th Year $7,000 $331,000 $100,000 $70,000 $70,000 $71,000 Card Production Costs—Subtotal ..................... Identity Management System (IDMS) Costs: IDMS labor, O&M, and help desk ............................ IDMS hardware, software, and technology refresh .. IDMS disaster recovery ............................................ $2,916,000 $6,842,000 $2,887,000 $2,627,000 $2,627,000 $2,528,000 $2,850,000 $188,000 $500,000 $3,600,000 $945,000 $100,000 $1,800,000 $885,000 $100,000 $1,680,000 $825,000 $100,000 $1,680,000 $825,000 $100,000 $1,680,000 $825,000 $100,000 IDMS Costs—Subtotal ....................................... Program Support: Personnel for program support—federal and contract ....................................................................... Information systems security certification and accreditation .............................................................. Program travel .......................................................... Interagency systems and communications infrastructure ................................................................ Office supplies and miscellaneous program costs ... Fee processing & analysis ....................................... $3,538,000 $4,645,000 $2,785,000 $2,605,000 $2,605,000 $2,605,000 $1,624,000 $2,584,000 $2,614,000 $2,614,000 $2,614,000 $2,614,000 $600,000 $48,000 $250,000 $144,000 $250,000 $112,000 $500,000 $112,000 $250,000 $112,000 $500,000 $112,000 $481,000 $35,000 $17,000 $1,085,000 $60,000 $100,000 $659,000 $60,000 $100,000 $633,000 $60,000 $100,000 $630,000 $60,000 $100,000 $647,000 $60,000 $100,000 Program Support—Subtotal .............................. Enrollment Management and Compliance: Personnel and operational expenses for enrollment compliance ............................................................ $2,805,000 $4,223,000 $3,795,000 $4,019,000 $3,766,000 $4,033,000 $12,000 $584,000 $135,000 $76,000 $77,000 $78,000 Enrollment Management and Compliance—Subtotal $12,000 $584,000 $135,000 $76,000 $77,000 $78,000 Grand Totals ...................................................... sroberts on PROD1PC70 with PROPOSALS Shipping .................................................................... $10,111,000 $23,365,000 $13,966,000 $13,373,000 $13,312,000 $13,673,000 Threat Assessment/Credential Production Calculation TSA will charge a fee to recover its threat assessment, credentialing, and other program management and oversight costs associated with the implementation of this rule. TSA notes that since it received appropriated funds for the development of the TWIC program prototype and start-up operations, these costs will not be recovered in the fee charges. Substantially all costs TSA will have incurred before the beginning of program operations are considered startup costs for calculation of the Threat Assessment/Credential Production fee. Based on the estimated costs in Table Five, TSA has calculated the per applicant Threat Assessment/Credential Production fee as follows: threat assessment cost estimate of $24.1 million over five years is added to credentialing and program expenses of $53.6 million. These total costs are then divided by 1,441,000 total estimated applicants for a TWIC—both new and lost/damaged replacement card applicants—over the first five years. The resulting applicant charges will range from $50–$62 per applicant, as fees will vary based on the services provided to each population. Individuals requiring a complete security threat assessment will pay $62. Applicants who have completed a fingerprint-based criminal history VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 records check that TSA deems equivalent to the TWIC check, such as MMD, MML, HME, and FAST credential holders, will not be charged for TSA’s adjudication expenses associated with this portion of the threat assessment and will be assessed $50. Individuals who lose, damage, or have their credential stolen will not be assessed any threat assessment costs but will be charged $36 for a replacement credential. No new TSA threat assessment-specific or enrollment costs are factored into this replacement fee. 3. FBI Fee As part of the security threat assessment, TSA submits fingerprints to the FBI to obtain any criminal history records that correspond to the fingerprints. The FBI is authorized to establish and collect fees to process fingerprint identification records. See Title II of Pub. L. 101–515, November 5, 1990, 104 Stat. 2112, codified in a note to 28 U.S.C. 534. Pursuant to Criminal Justice Information Services (CJIS) Information Letter 93–3 (October 8, 1993), this fee is currently set at $22. If the FBI increases or decreases its fee to complete the criminal history records check, the increase or decrease will apply to this regulation on the date that the new FBI fee becomes effective. PO 00000 Frm 00036 Fmt 4701 Sfmt 4702 4. Total Fees TSA proposes the following fees for TWIC applicants who submit fingerprints and applicant information to a TSA agent: (1) Information Collection/Credential Issuance: $45–$65. (2) Threat Assessment/Credential Production: $50–$62. (3) Credential Replacement: $36. (4) FBI: $22. The total fees for TWIC applicants would be between $95 and $149, depending on threat assessment services provided. TSA will continue to work to minimize all costs and will finalize final fee charges in the final rule. TSA may increase or decrease the fees described in this regulation for inflation following publication of the final rule. TSA will publish a notice in the Federal Register notifying the public of the change. C. Section 1572.501 Fee Collection Section 1572.501 provides that when TSA collects fingerprints and applicant information under 49 CFR part 1572, TSA will collect fees for TWIC, in accordance with the procedures in § 1572.503. Section 1572.503 describes the procedures that TSA and a TWIC applicant will follow. Paragraph 1572.503(a) list the specific fees: $45–65 for information collection/credential issuance; $50–62 for the threat assessment/credential production; $36 E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules for a replacement credential; and $22 for the FBI. Paragraph 1572.503(b) states that the fees must be provided in U.S. currency, and in check, money order, wire, or another method approved by TSA. Paragraph 1572.503(c) states that TSA will not issue refunds and paragraph 1572.503(d) states that applications would be processed only upon receipt of all applicable fees. Paragraph 1572.503(e) states that TSA may adjust the fees annually after October 1, 2007 because of inflation, and any adjustment will be announced by notice in the Federal Register. Any increase would be a composite of the Federal civilian pay raise percentage and non-pay inflation factor for the current fiscal year. These figures are issued by the Office of Management and Budget. Paragraph (f) of this section relates to any amendments the FBI may make to its fee for the criminal history records check. The change to the fee for TWIC applicants will become effective on the date that the FBI fee increase or decrease became effective. VII. Rulemaking Analyses and Notices A. Executive Order 12866 (Regulatory Planning and Review) This proposed rule is a ‘‘significant regulatory action’’ under section 3(f) of E.O. 12866, Regulatory Planning and Review and therefore has been reviewed by the Office of Management and Budget. E.O. 12866 requires an assessment of potential costs and benefits under section 6(a)(3) of that Order. A draft Assessment is available in both the TSA and Coast Guard dockets where indicated under the ‘‘Public Participation and Request for Comments’’ section of this preamble. A summary of the Assessment follows: sroberts on PROD1PC70 with PROPOSALS Regulatory Evaluation Summary Proposed changes to Federal regulations must undergo several economic analyses. First, E.O. 12866 directs each Federal agency to propose or adopt a regulation only if the agency makes a reasoned determination that the benefits of the intended regulation justify its costs. Second, the Regulatory Flexibility Act of 1980 requires agencies to analyze the economic impact of regulatory changes on small entities. Third, the Trade Agreements Act (19 U.S.C. 2531–2533) prohibits agencies from setting standards that create unnecessary obstacles to the foreign commerce of the United States. In developing U.S. standards, this Trade Act requires agencies to consider international standards and where VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 appropriate, as the basis of U.S. standards. Fourth, the Unfunded Mandates Reform Act of 1995 (Public Law 104–4) requires agencies to prepare a written assessment of the costs, benefits and other effects of proposed or final rules that include a Federal mandate likely to result in the expenditure by State, local or tribal governments, in the aggregate, or by the private sector, of $100 million or more annually (adjusted for inflation). The mandatory OMB A–4 Accounting Statement is located in the separate detailed regulatory evaluation. In conducting these preliminary analyses, TSA and the USCG are proposing that this rule: 1. Is a ‘‘significant regulatory action’’ as defined in the E.O. 2. Has a yet to be determined impact on small business. We have provided an Initial Regulatory Flexibility Analysis (IRFA) for comment. 3. Imposes no significant barriers to international trade. 4. Does not impose an unfunded mandate on State, local, or tribal governments, but does on the private sector as there are two years with undiscounted costs in excess of the inflation adjusted $100 million threshold. This regulatory evaluation is a joint effort of TSA and USCG. For ease of reading, the agencies decided to use the term ‘‘we’’ to represent both DHS components even for issues which might be directly related to proposed rule actions of only one agency. We believe this simplification will be less of a burden to the public in trying to understand and comment on the evaluation. The reader is cautioned that we did not attempt to replicate precisely the regulatory language in this discussion of the proposed rule; the regulatory text, not the text of this evaluation, is legally binding. A copy of the detailed regulatory evaluation document is available on the dockets for each agency. TSA and the USCG invite comments on all aspects of the economic analysis. We will attempt to evaluate and address all regulatory evaluation comments submitted by the public; however, those comments with specific data sources or detailed information will be more useful in improving the impact analysis. Comments may be placed on either docket as directed in the rule preamble; although there is no prohibition of submitting the evaluation comments to both dockets, duplicate submissions will be treated as a single issue submission. If possible, evaluation comments should be clearly identified with the evaluation issue or section. PO 00000 Frm 00037 Fmt 4701 Sfmt 4702 29431 Including page numbers or figure references with your comments will expedite the process and insure the issue is addressed by the most appropriate agency experts. Impact Summary Section 102 of the Maritime Transportation Security Act requires a regulation regarding the issue of a biometric security card to individuals with unescorted access to secure areas of vessels and facilities. Under this authority, DHS has developed this proposed rule, and this summary provides a synopsis of the costs and benefits of the proposed rule. Benefits of the Proposed Rule The proposed rule would facilitate commerce and, most importantly, increase security at vessels, facilities, and OCS facilities regulated by 33 CFR chapter I, subchapter H. Security The proposed rule would increase security at vessels, facilities, and OCS facilities regulated by 33 CFR chapter I, subchapter H. It would accomplish this by: (1) Reducing the number of high-risk individuals with unescorted access to secure areas of vessels, facilities, and OCS facilities through the use of robust background checks; (2) enhancing the security of the credential through the use of a highly tamper-resistant card and the implementation of a strong identity-verification process to guard against fraud; and (3) increasing the stringency of access control measures throughout the maritime transportation sector. Commerce Although not the primary impetus for regulation, this NPRM would enhance the flow of commerce by streamlining the number of credentials and access control procedures, eliminating the need for several port credentialing offices and systems, and creating an interoperable credential recognizable across the maritime environment. During the TWIC Phase III Prototype, TSA learned that many individuals underwent multiple background checks, paid redundant fees, and endured long lines and short hours of operation at local credentialing offices. We anticipate this NPRM would eliminate some of these inefficient practices. Economic Costs We conclude that the primary estimate of economic costs over a 10 year period for this rule are $1,028 million undiscounted, $918.5 million with a 3 percent discount rate, and E:\FR\FM\22MYP2.SGM 22MYP2 29432 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules $802.8 million at a 7 percent discount rate. In preparing estimates, we considered ranges for some values. No statistical confidence interval is associated with this range. These ranges provide an upper estimate of $1,062 million undiscounted and a lower range of $995.0 million undiscounted. The full list of scenarios and discounted values are displayed in the following charts and figures. TEN YEAR COSTS Primary ....................................................................................... High ............................................................................................ sroberts on PROD1PC70 with PROPOSALS Timing of Costs The startup costs plus initial enrollments cause roughly 40 percent of expenses to occur in the first program year. Because credentials must be VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 7% Discount Rate ..................................................................... 3% Discount Rate ..................................................................... Undiscounted ............................................................................ 7% Discount Rate ..................................................................... 3% Discount Rate ..................................................................... Undiscounted ............................................................................ 7% Discount Rate ..................................................................... 3% Discount Rate ..................................................................... Undiscounted ............................................................................ renewed after five years, there is another spike in enrollments and, therefore, expenses at year six. This spike is not as large as the initial enrollment because there is movement in and out of the PO 00000 Frm 00038 Fmt 4701 Sfmt 4702 $777,040,010 888,602,138 994,986,264 802,830,101 918,517,801 1,028,754,087 828,620,192 948,433,464 1,062,521,911 labor force over those five years. This increase in enrollments in year six represents approximately 15 percent of the total costs. The other eight program years are similar in costs. E:\FR\FM\22MYP2.SGM 22MYP2 EP22MY06.000</GPH> Minimum ..................................................................................... 29433 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules TOTAL TEN-YEAR COSTS—PRIMARY ESTIMATE [$ millions] Discount Rate/Yr 7% Discount Rate ...... 3% Discount Rate ...... Undiscounted ............. 1 2 $383.6 398.5 410.4 3 4 5 $74.0 79.9 84.7 $36.7 41.1 44.9 $34.2 39.8 44.8 $32.2 38.9 45.1 Distribution of Costs The fee setting section of the NPRM and supporting documents in the docket provide details of the distribution of impacts. By category, almost 39 percent 6 $105.7 132.9 158.7 of the costs are facility costs, 11 percent enrollment contract costs, while the smallest category of costs is related to Outer Continental Shelf facilities at less than 0.1 percent of the total costs. The following series of figures summarizes 7 8 9 10 Total $45.7 59.7 73.4 $32.2 43.7 55.4 $30.1 42.4 55.3 $28.4 41.6 55.9 $802.8 918.5 1,028.8 the 11 categories for the range of costs discounted at 7 percent, categorical percentage share of total costs, and share differences between the primary estimate and each of the other two scenarios. COSTS BY CATEGORY AND SCENARIO, DISCOUNTED 7% Component Low Primary High $71.8 91.9 57.9 27.4 5.7 29.5 89.0 41.0 312.1 75.8 0.7 $71.8 91.9 57.9 27.4 5.7 29.5 89.0 41.0 325.1 88.4 0.8 777.0 802.8 828.6 VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 PO 00000 Frm 00039 Fmt 4701 Sfmt 4702 E:\FR\FM\22MYP2.SGM 22MYP2 EP22MY06.001</GPH> $71.8 91.9 57.9 27.4 5.7 29.5 89.0 41.0 299.0 63.1 0.6 Total .............................................................................................................................................................. sroberts on PROD1PC70 with PROPOSALS Enrollment Opportunity Costs .............................................................................................................................. Enrollment Contract Costs ................................................................................................................................... Security Threat Assessments .............................................................................................................................. TSA System Costs .............................................................................................................................................. Appeals and Waivers Opportu ............................................................................................................................ Card Production ................................................................................................................................................... Issuance Opportunity Costs ................................................................................................................................ Program Office Support ....................................................................................................................................... Facilities ............................................................................................................................................................... Vessels ................................................................................................................................................................ OCS Facilities ...................................................................................................................................................... 29434 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules Percent cost share by category and scenario Difference from primary estimate Primary (percent) High (percent) Low (percent) High (percent) Enrollment Opportunity Costs ...................................................................................... Enrollment Contract Costs ........................................................................................... Security Threat Assessments ...................................................................................... TSA System Costs ....................................................................................................... Appeals and Waivers Opportunity ............................................................................... Card Production ........................................................................................................... Issuance Opportunity Costs ......................................................................................... Program Office Support ............................................................................................... Facilities ....................................................................................................................... Vessels ......................................................................................................................... OCS Facilities .............................................................................................................. 9.2 11.8 7.5 3.5 0.7 3.8 11.5 5.3 38.5 8.1 0.1 8.9 11.4 7.2 3.4 0.7 3.7 11.1 5.1 38.9 9.4 0.1 8.7 11.1 7.0 3.3 0.7 3.6 10.7 5.0 39.2 10.7 0.1 0.3 0.4 0.2 0.1 0.0 0.1 0.4 0.2 ¥0.4 ¥1.3 0.0 ¥0.3 ¥0.4 ¥0.2 ¥0.1 ¥0.0 ¥0.1 ¥0.3 ¥0.2 0.4 1.2 0.0 Total ...................................................................................................................... 100.0 100.0 100.0 ................ ¥ sroberts on PROD1PC70 with PROPOSALS B. Small Entities Under the Regulatory Flexibility Act (5 U.S.C. 601–612), we have considered whether this proposed rule would have a significant economic impact on a substantial number of small entities. The term ‘‘small entities’’ comprises small businesses, not-for-profit organizations that are independently owned and operated and are not dominant in their fields, and governmental jurisdictions with populations of less than 50,000. Individuals are not considered small VerDate Aug<31>2005 20:38 May 19, 2006 Jkt 208001 entities for the purposes of the Regulatory Flexibility Act. At this time, we have not determined if this proposed rule would have a significant economic impact on a substantial number of small entities. We request comment on the full Initial Regulatory Flexibility Analysis, which is located on the docket. A brief summary of this analysis appears below. With certain exceptions, the proposed rule would impact vessels, facilities, and OCS facilities presently regulated by 33 CFR chapter I, subchapter H. TSA and USCG estimated the proposed rule PO 00000 Frm 00040 Fmt 4701 Sfmt 4702 would cover 10,785 vessels, 3,492 facilities, and 42 OCS facilities. TSA and USCG concluded that most vessels and some facilities may be owned by small businesses, but no small businesses, as defined by the Regulatory Flexibility Act, currently operate OCS facilities. The proposed rule would require affected vessels, facilities and OCS facilities to implement increased security measures. Because many of the proposed measures are based on performance standards, the proposed rule affords covered businesses E:\FR\FM\22MYP2.SGM 22MYP2 EP22MY06.002</GPH> Low (percent) Component 29435 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules flexibility in complying with the requirements. Due to this flexibility, we foresee small entities complying with the proposed rule in a number of ways. We therefore used a range of estimates when characterizing the potential impacts to small entities. The following table displays this range. Initial costs Recurring costs Requirement Low Primary High Low Primary High Smart Card Reader Purchase ................................................................. Smart Card Reader Software .................................................................. Smart Card Reader Installation ............................................................... Creating TWIC Addendum ....................................................................... Knowledge Requirements ........................................................................ Recordkeeping ......................................................................................... TWIC Validation ....................................................................................... $2,000 1,000 200 1,693 2,709 1,303 ................ $3,500 1,000 200 1,691 2,709 1,303 ................ $5,000 1,000 200 1,691 2,709 1,303 ................ ................ ................ ................ ................ ................ ................ $391 ................ ................ ................ ................ ................ ................ $391 ................ ................ ................ ................ ................ ................ $391 Total .................................................................................................. 8,906 10,403 11,903 391 391 391 C. Assistance for Small Entities Under section 213(a) of the Small Business Regulatory Enforcement Fairness Act of 1996 (Pub. L. 104–121), we want to assist small entities in understanding this proposed rule so that they can better evaluate its effects on them and participate in the rulemaking. If the rule would affect your small business, organization, or governmental jurisdiction and you have questions concerning its provisions or options for compliance, please consult LCDR Jonathan Maiorine, Commandant (G– PCP–2), United States Coast Guard, 2100 Second Street, SW., Washington, DC 20593; telephone 1 (877) 687–2243. DHS will not retaliate against small entities that question or complain about this rule or any policy or action of DHS. Small businesses may send comments on the actions of Federal employees who enforce, or otherwise determine compliance with, Federal regulations to the Small Business and Agriculture Regulatory Enforcement Ombudsman and the Regional Small Business Regulatory Fairness Boards. The Ombudsman evaluates these actions annually and rates each agency’s responsiveness to small business. If you wish to comment on actions by employees of TSA or of the Coast Guard, call 1–888–REG–FAIR (1–888–734– 3247). sroberts on PROD1PC70 with PROPOSALS D. Collection of Information This proposed rule would call for a collection of information under the Paperwork Reduction Act of 1995 (44 U.S.C. 3501–3520). As defined in 5 CFR 1320.3(c), ‘‘collection of information’’ comprises reporting, recordkeeping, monitoring, posting, labeling, and other, similar actions. The title and description of the information collections, a description of those who must collect the information, and an estimate of the total annual burden follow. The estimate covers the time for VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 reviewing instructions, searching existing sources of data, gathering and maintaining the data needed, and completing and reviewing the collection. Title: Transportation Worker Identification Credential (TWIC) Program. Summary of the Collection of Information: Need for Information: TSA has developed the Transportation Worker Identification Credential (TWIC) as an identification tool that encompasses the authorities of the Aviation and Transportation Security Act of 2001(ATSA) (Pub. L. 107–71, Sec.106), and the Maritime Transportation Security Act of 2002 (MTSA) (Pub. L. 107–295, Sec. 102) to perform background checks and issue credentials to workers within the national transportation system. The data to be collected is that biographic and biometric information necessary for TSA to complete the required security threat assessment on individuals who will seek unescorted access to secure areas of vessels and maritime facilities through the use of a TWIC. TWIC cards, when issued, will contain biographic and biometric data necessary to prove identity of the cardholder and to interoperate with access control systems on vessels and at facilities nationwide. Proposed Use of Information: TSA will use the information to verify the identity of the individual applying for a TWIC and to verify that the person poses no security threat that would preclude issuance of a TWIC. Description of the Respondents: The respondents to this collection of information will be workers within the national transportation system, specifically individuals who require unescorted access to secure areas of vessels or maritime facilities. Number of Respondents: Although the number of respondents will vary over three years, TSA estimates that the PO 00000 Frm 00041 Fmt 4701 Sfmt 4702 annualized number of total respondents will be approximately 317,400. Based on research conducted by TSA and the USCG, the total estimated base population that will be affected by TWIC is 750,000. However, TSA estimates that more than seventy percent of the base maritime worker population will enroll in the program in the first year, and the remainder will enroll in year two. Turnover and growth within the affected population is expected to result in another 202,257 respondents. Frequency of Response: Because renewals for the TWIC will be on a five year basis, for purposes of the Paperwork Reduction Act, to apply for a TWIC, each respondent will be required to respond once to the enrollment collection. TSA estimates an additional response from the estimated two percent of respondents who will appeal decisions made by the agency with respect to security threat assessments or ask for a waiver from disqualifying offenses. Thus, TSA estimates the number of total annual responses to be approximately 323,800. Burden of Response: TSA estimates the annual hour burden for enrollment to be 476,129, or one and one half hour per respondent. TSA estimates the annual hour burden for appeals and waiver to be approximately 38,100. TSA has determined that the information collection and card issuance portion of the TWIC fee will be between $45 and $65 per respondent. The exact fee will be determined in the final rulemaking. This portion of the fee accounts for more than the actual cost of the information collection as it includes cost of the enrollment process, system operations and maintenance, and TWIC card distribution. Estimate of Total Annual Burden: TSA estimates the total annual hour burden as a result of this collection of information to be approximately 514,200. Because the TWIC fee may E:\FR\FM\22MYP2.SGM 22MYP2 29436 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules sroberts on PROD1PC70 with PROPOSALS change over time as actual costs are determined and annualized, TSA estimates total annual fee for respondents to be between $14,283,855 and $20,632,235. As required by the Paperwork Reduction Act of 1995 (44 U.S.C. 3507(d)), we have submitted a copy of this proposed rule to the Office of Management and Budget (OMB) for its review of the collection of information. We ask for public comment on the proposed collection of information to help us determine how useful the information is; whether it can help us perform our functions better; whether it is readily available elsewhere; how accurate our estimate of the burden of collection is; how valid our methods for determining burden are; how we can improve the quality, usefulness, and clarity of the information; and how we can minimize the burden of collection. If you submit comments on the collection of information, submit them both to OMB and to the Docket Management Facility where indicated under ADDRESSES, by the date under DATES. You need not respond to a collection of information unless it displays a currently valid control number from OMB. Before the requirements for this collection of information become effective, we will publish notice in the Federal Register of OMB’s decision to approve, modify, or disapprove the collection. E. Federalism A rule has implications for federalism under E.O. 13132, Federalism, if it has a substantial direct effect on State or local governments and would either preempt State law or impose a substantial direct cost of compliance on them. TSA and Coast Guard have analyzed this proposed rule under that Order and have determined that it has implications for federalism, for the same reasons that we found Federalism impacts for the Coast Guard’s previously published MTSA regulations. 68 FR at 60468–9. A summary of the impacts on federalism in this proposed rule follows. This proposed rule would have a substantial direct effect on States, local governments, or political subdivisions under section 1(a) of the Order when those states owning vessels/facilities are required to submit a TWIC Addendum and implement a TWIC program. It would also preempt State law under section 6(c) of the Order by: Continuing to prevent States from regulating mariners; and continuing to prevent the States from requiring security plans. It would impose substantial direct costs of compliance on States or local VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 governments under section 6(b) of the Order, by requiring the submission of a TWIC Addendum and the implementation of TWIC on State owned vessels or facilities. Regulations already issued by the Coast Guard under other sections of the MTSA of 2002 cited the need for national standards of security, claimed preemption, and received comments in support of such a scheme. See 68 FR 60448, 60468–60469. (October 23, 2003). The law is well-settled that States may not regulate in categories expressly reserved for regulation by the Coast Guard. The law also is well-settled that all of the categories covered in 46 U.S.C. 3306, 3703, 7101, and 8101 (design, construction, alteration, repair, maintenance, operation, equipping, personnel qualification, and manning of vessels), as well as the reporting of casualties and any other category in which Congress intended the Coast Guard to be the sole source of a vessel’s obligations, are within the field foreclosed from regulation by the States. See United States v. Locke and Intertanko v. Locke, 529 U.S. 89, 120 S.Ct. 1135 (Mar. 6, 2000). Since portions of this proposed rule involve the manning of U.S. vessels and the licensing of merchant mariners, it relates to personnel qualifications. Because the states may not regulate within this category, these portions of this proposed rule do not present new preemption issues under E.O. 13132. We are only asserting field preemption in those areas where federal regulations have historically dominated the field, such as merchant mariner regulations, or where we are amending regulations that we have previously asserted preempt state regulation, such as the Marine Transportation Security Act Regulations found in 33 CFR chapter I, subchapter H. States would not be preempted from instituting their own background checks or badging systems in addition to the TWIC. We are asking for comments specifically on the issue of preemption. F. Unfunded Mandates Reform Act The Unfunded Mandates Reform Act of 1995 (2 U.S.C. 1531–1538) requires Federal agencies to assess the effects of their discretionary regulatory actions. In particular, the Act addresses actions that may result in the expenditure by a State, local, or tribal government, in the aggregate, or by the private sector of $100,000,000 or more in any one year. This proposed rule would result in such an expenditure, and we discuss the effects of this rule in the Draft Regulatory Evaluation, which is PO 00000 Frm 00042 Fmt 4701 Sfmt 4702 summarized in the E.O. 12866 section above. G. Taking of Private Property This proposed rule would not affect a taking of private property or otherwise have taking implications under E.O. 12630, Governmental Actions and Interference with Constitutionally Protected Property Rights. H. Civil Justice Reform This proposed rule meets applicable standards in sections 3(a) and 3(b)(2) of E.O. 12988, Civil Justice Reform, to minimize litigation, eliminate ambiguity, and reduce burden. I. Protection of Children We have analyzed this proposed rule under E.O. 13045, Protection of Children from Environmental Health Risks and Safety Risks. While this rule is an economically significant rule, it would not create an environmental risk to health or risk to safety that might disproportionately affect children. J. Indian Tribal Governments This proposed rule does not have tribal implications under E.O. 13175, Consultation and Coordination with Indian Tribal Governments, because it would not have a substantial direct effect on one or more Indian tribes, on the relationship between the Federal Government and Indian tribes, or on the distribution of power and responsibilities between the Federal Government and Indian tribes. K. Energy Effects We have analyzed this proposed rule under E.O. 13211, Actions Concerning Regulations That Significantly Affect Energy Supply, Distribution, or Use. We have determined that it is not a ‘‘significant energy action’’ under that order. While it is a ‘‘significant regulatory action’’ under E.O. 12866, it is not likely to have a significant adverse effect on the supply, distribution, or use of energy. The Administrator of the Office of Information and Regulatory Affairs has not designated it as a significant energy action. Therefore, a Statement of Energy Effects is not required for this rule under E.O. 13211. L. Technical Standards The National Technology Transfer and Advancement Act (NTTAA) (15 U.S.C. 272 note) directs agencies to use voluntary consensus standards in their regulatory activities unless the agency provides Congress, through the Office of Management and Budget, with an explanation of why using these E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules sroberts on PROD1PC70 with PROPOSALS standards would be inconsistent with applicable law or otherwise impractical. Voluntary consensus standards are technical standards (e.g., specifications of materials, performance, design, or operation; test methods; sampling procedures; and related management systems practices) that are developed or adopted by voluntary consensus standards bodies. This rulemaking will incorporate standards for TWIC readers and card technology. These standards have been developed by the Federal government; there are no voluntary consensus standards that could be used in their place. M. Environment This Transportation Worker Identification Credential (TWIC) proposal contains a program of activities to improve the safety and security of vessels, facilities, Outer Continental Shelf facilities, and U.S. ports. It proposes requirements for developing application forms, collecting and processing forms, application evaluation criteria, and issuing determinations on applications. It also updates the training, qualifying, licensing, and disciplining of maritime personnel and proposes amendments to security plans that will contribute to a higher level of marine safety and security for vessels, facilities, Outer Continental Shelf facilities, and U.S. ports. Implementation of this proposal will involve establishing ‘‘enrollment stations’’ inside existing port facilities to collect TWIC applications. The enrollment stations will include a small office, using existing utilities, located in space made available in existing port facilities or other available space within a 25 mile radius of the port facility. If a location does not have a port facility, or enough space, a temporary unit will be provided until either sufficient permanent space is available or the need for the enrollment station no longer exists. To meet the initial surge of enrollments expected when the rule is final, 138 stations (permanent and mobile/temporary) are expected to be operating nationwide. The on-going/ maintenance phase will involve approximately 134 stations. The provisions of this proposed rule have been analyzed under the Department of Homeland Security (DHS) Management Directive (MD) 5100.1, Environmental Planning Program, which is the DHS policy and procedures for implementing the National Environmental Policy Act (NEPA), and related E.O.s and requirements. The implementation of this rule is expected to be categorically VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 29437 excluded under the following categorical exclusions (CATEX) listed in MD 5100.1, Appendix A, Table 1: CATEX A1 (personnel, fiscal, management and administrative activities); CATEX A3 (promulgation of rules, issuance of rulings or interpretations); and CATEX A4 (information gathering, data analysis and processing, information dissemination, review, interpretation and development of documents). CATEX B3 (proposed activities and operations conducted in an existing structure that would be compatible with and similar in scope to ongoing functional uses) is also applicable. Additionally, we have determined that there are no extraordinary circumstances presented by this rule that would limit the use of a CATEX under MD 5100.1, Appendix A, paragraph 3.2. 46 CFR Part 15 Reporting and recordkeeping requirements, Seamen, Vessels. List of Subjects 49 CFR Part 1572 Appeals, Commercial drivers license, Criminal history background checks, Explosives, Facilities, Hazardous materials, Incorporation by reference, Maritime security, Motor carriers, Motor vehicle carriers, Ports, Seamen, Security measures, Security threat assessment, Vessels, Waivers. 33 CFR Part 101 Harbors, Maritime security, Reporting and recordkeeping requirements, Security measures, Vessels, Waterways. 33 CFR Part 103 Facilities, Harbors, Maritime security, Ports, Reporting and recordkeeping requirements, Security measures, Vessels, Waterways. 33 CFR Part 104 Incorporation by reference, Maritime security, Reporting and recordkeeping requirements, Security measures, Vessels. 49 CFR Part 1515 Appeals, Commercial drivers license, Criminal history background checks, Explosives, Facilities, Hazardous materials, Incorporation by reference, Maritime security, Motor carriers, Motor vehicle carriers, Ports, Seamen, Security measures, Security threat assessment, Vessels, Waivers. 49 CFR Part 1570 Appeals, Commercial drivers license, Criminal history background checks, Explosives, Facilities, Hazardous materials, Incorporation by reference, Maritime security, Motor carriers, Motor vehicle carriers, Ports, Seamen, Security measures, Security threat assessment, Vessels, Waivers. The Amendments For the reasons listed in the preamble, the Coast Guard proposes to amend 33 CFR parts 101, 103, 104, 105, 106, 125; and 46 CFR parts 10, 12, and 15 and the Transportation Security Administration proposes to add or amend 49 CFR parts 1515, 1570, and 1572 as follows: 33 CFR Part 105 Title 33—Navigation and Navigable Waters Facilities, Maritime security, Reporting and recordkeeping requirements, Security measures. Chapter I—Coast Guard 33 CFR Part 106 Facilities, Maritime security, Outer Continental Shelf, Reporting and recordkeeping requirements, Security measures. 33 CFR Part 125 Administrative practice and procedure, Harbors, Reporting and recordkeeping requirements, Security measures, Vessels. 46 CFR Part 10 Penalties, Reporting and recordkeeping requirements, Schools, Seamen. Fmt 4701 Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50 U.S.C. 191, 192; Executive Order 12656, 3 CFR 1988 Comp., p. 585; 33 CFR 1.05–1, 6.04–11, 6.14, 6.16, and 6.19; Department of Homeland Security Delegation No. 0170.1. 2. In § 101.105 add, in alphabetical order, definitions for the terms escorting, personal identification number (PIN), recurring unescorted access, secure area, TWIC, TWIC program, and unescorted access, to read as follows: Definitions. * Penalties, Reporting and recordkeeping requirements, Seamen. Frm 00043 1. The authority citation for part 101 continues to read as follows: § 101.105 46 CFR Part 12 PO 00000 PART 101—MARITIME SECURITY: GENERAL Sfmt 4702 * * * * Escorting means ensuring that the escorted individual is continuously E:\FR\FM\22MYP2.SGM 22MYP2 29438 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules accompanied or monitored while within a secure area in a manner sufficient to identify whether the escorted individual is engaged in activities other than those for which escorted access was granted. * * * * * Personal Identification Number (PIN) means a personally selected number stored electronically on the individual’s TWIC. * * * * * Recurring unescorted access means authorization to enter a vessel on a continual basis after an initial personal identity and credential verification, as outlined in the vessel security plan. * * * * * Secure Area means the area on board a vessel or at a facility or outer continental shelf facility over which the owner/operator has implemented security measures for access control, as defined by a Coast Guard approved security plan. It does not include passenger access areas or public access areas, as those terms are defined in §§ 104.106 and 105.106 of this subchapter. * * * * * TWIC means a valid, non-revoked transportation worker identification credential, as defined and explained in 49 CFR part 1572. TWIC Program means those procedures and systems, detailed in an approved security plan, that a vessel, facility, or outer continental shelf facility must implement in order to assess and validate TWICs when maintaining access control. * * * * * Unescorted access means having the authority to enter and move about a secure area without escort. * * * * * 3. From [effective date of the final rule] to [effective date of final rule + 5 years], add § 101.121 to read as follows: sroberts on PROD1PC70 with PROPOSALS § 101.121 Alternative Security Programs— TWIC Addendum. (a) Submitters of Alternative Security Programs that have been approved by the Commandant (G–PC) under section 101.120 of this part, must submit a TWIC Addendum by [date six months after date of publication of final rule], or else their Alternative Security Plan is invalid. The TWIC Addendum should include an explanation of how the ASP addresses the requirements for a TWIC program contained in parts 104, 105 and 106 of this subchapter, as applicable. (b) The Commandant (G–PC) will examine each TWIC Addendum for compliance with this part and either: (1) Approve it and specify any conditions of approval, returning to the VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 submitter a letter stating its approval and any conditions; (2) Return it for revision, returning a copy to the submitter with brief descriptions of the required revisions; or (3) Disapprove it, returning a copy to the submitter with a brief statement of the reasons for disapproval. (c) The ASP TWIC Addendum will be given the same expiration date as the ASP. (d) Upon gaining approval of the TWIC Addendum, the submitter of the ASP must incorporate the approved TWIC Addendum into their ASP when it is due for reapproval in accordance with § 101.120 of this subpart. 4. Add § 101.514 to read as follows: § 101.514 TWIC requirement. (a) All persons requiring unescorted access to secure areas of vessels, facilities, and OCS facilities regulated by parts 104, 105 or 106 of this subchapter must possess a TWIC before such access is granted, except as otherwise noted in this section. A TWIC must be obtained via the procedures established by TSA in 49 CFR part 1572. (b) Federal officials are not required to obtain or possess a TWIC. Except in cases of emergencies or other exigent circumstances, in order to gain unescorted access to a secure area of a vessel, facility, or OCS facility regulated by parts 104, 105 or 106 of this subchapter, he/she must verify his identity at a TWIC reader using his/her agency issued, HSPD 12 compliant, credential. Until each agency issues its HSPD 12 compliant cards, Federal officials may gain unescorted access by using their agency’s official credential. The COTP will advise facilities and vessels within his area of responsibility as agencies come into compliance with HSPD 12. (c) Law enforcement officials at the State or local level are not required to obtain or possess a TWIC to gain unescorted access to secure areas. They may, however, voluntarily obtain a TWIC where their offices fall within or where they desire recurring unescorted access to a secure area of a vessel, facility or OCS facility. (d) Owners and/or operators of any vessel or maritime facility that is not required to comply with parts 104, 105, or 106 of this subchapter, respectively, who would like to implement a TWIC Program for their vessel or facility must contact their cognizant COTP to gain authorization. If approved, the Coast Guard will contact TSA, who will provide the authorization to enroll the vessel or facility employees at a TWIC enrollment center. 5. Revise § 101.515 to read as follows: PO 00000 Frm 00044 Fmt 4701 Sfmt 4702 § 101.515 TWIC/Personal identification. (a) Persons not described in § 101.514 of this part shall be required to present personal identification in order to gain entry to a vessel, facility, and OCS facility regulated by parts 104, 105 or 106 of this subchapter. These individuals must be escorted at all times while in a secure area. This personal identification must, at a minimum, meet the following requirements: (1) Be laminated or otherwise secure against tampering; (2) Contain the individual’s full name (full first and last names, middle initial is acceptable); (3) Contain a photo that accurately depicts that individual’s current facial appearance; and (4) Bear the name of the issuing authority. (b) The issuing authority in paragraph (a)(4) of this section must be: (1) A government authority, or an organization authorized to act of behalf of a government authority; or (2) The individual’s employer, union, or trade association. (c) Vessel, facility, and OCS facility owners and operators must permit law enforcement officials, in the performance of their official duties, who present proper identification in accordance with this section and § 101.514 of this part to enter or board that vessel, facility, or OCS facility at any time, without delay or obstruction. Law enforcement officials, upon entering or boarding a vessel, facility, or OCS facility, will, as soon as practicable, explain their mission to the Master, owner, or operator, or their designated agent. PART 103—MARITIME SECURITY: AREA MARITIME SECURITY 6. The authority citation for part 103 continues to read as follows: Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. 70102, 70103, 70104, 70112; 50 U.S.C. 191; 33 CFR 1.05–1, 6.04–11, 6.14, 6.16, and 6.19; Department of Homeland Security Delegation No. 0170.1. 7. Revise § 103.305(c) to read as follows: § 103.305 Composition of an Area Maritime Security (AMS) Committee. * * * * * (c) Members appointed under this section serve for a term of not more than 5 years. In appointing members, the FMSC should consider the skills required by § 103.410 of this part. With the exception of credentialed Federal, state and local officials, all AMS Committee members shall hold a TWIC, or have passed a comparable security E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules threat assessment, as determined by the FMSC. 8. In § 103.505, revise paragraph (n) to read as follows: § 103.505 Elements of the Area Maritime Security (AMS) plan. * * * * * (n) Security measures designed to ensure the effective security of infrastructure, special events, vessels, passengers, cargo, and cargo handling equipment at facilities within the port not otherwise covered by a Vessel or Security Plan, approved under part 104, 105, or 106 of this subchapter. This includes the use of a TWIC program. * * * * * 9. In § 103.510, designate the existing text as paragraph (a) and add paragraph (b) to read as follows: § 103.510 Area Maritime Security (AMS) Plan review and approval. * * * * * (b) From [effective date of the final rule] to [effective date of the final rule + 5 years], this paragraph (b) shall apply. Each AMS Plan shall be updated to include the implementation of the TWIC program. PART 104—MARITIME SECURITY: VESSELS 10. The authority citation for part 104 continues to read as follows: Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50 U.S.C. 191; 33 CFR 1.05–1, 6.04–11, 6.14, 6.16, and 6.19; Department of Homeland Security Delegation No, 0170.1. 11. Amend § 104.105 by redesignating paragraph (d) as paragraph (e) and adding a new paragraph (d) to read as follows: § 104.105 Applicability. * * * * * (d) The TWIC requirements found in this part do not apply to foreign vessels. * * * * * 12. Add § 104.106 to read as follows: sroberts on PROD1PC70 with PROPOSALS § 104.106 Passenger access area. (a) A ferry, passenger vessel, or cruise ship may designate areas within the vessel as passenger access areas. Any such areas must be specified in the VSP. (b) A passenger access area is a defined space within the access control area of a ferry or passenger vessel that is open to passengers. It is not a secure area and does not require a TWIC for unescorted access. 13. From [effective date of the final rule] to [effective date of final rule + 5 years], amend § 104.115 by adding paragraph (d) to read as follows: VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 § 104.115 Compliance dates. * * * * * (d) Vessel owners or operators subject to paragraph (b) of this section and not excluded by § 104.105(d) or this part must: (1) Submit a TWIC Addendum to the Commanding Officer, Marine Safety Center, to cover each vessel they own or operate subject to this part on or before [date 6 months after publication of the final rule]; and (2) Be operating in accordance with the TWIC provisions found within this part, as outlined in their TWIC Addendum, between [date 1 year after publication of the final rule] and [date 18 months after publication of the final rule], depending on whether enrollment has been completed in the port in which the vessel is operating, in accordance with 49 CFR 1572.19. 14. From [effective date of the final rule] to [effective date of final rule + 5 years], amend § 104.120 by adding paragraph (c) to read as follows: § 104.120 Compliance documentation. * * * * * (c) Each vessel owner or operator subject to this part must ensure, before [date one year after publication of the final rule] that copies of the following documentation are carried on board the vessel and are made available to the Coast Guard upon request: (1) The approved TWIC addendum and any approved revisions or amendments thereto, and a letter of approval from the Commanding Officer, Marine Safety Center (MSC) dated within the last 5 years; (2) The TWIC Addendum submitted for approval and current written acknowledgment from the Commanding Officer, MSC, stating that the Coast Guard is currently reviewing the TWIC Addendum submitted for approval and that the vessel may continue to operate; or (3) For vessels operating under a Coast Guard-approved Alternative Security Program as provided in § 104.140, a copy of the Alternative Security Program the vessel is using, including a vessel specific security assessment report generated under the Alternative Security Program, as specified in § 101.120(b)(3) of this subchapter, and a letter signed by the vessel owner or operator, stating which Alternative Security Program the vessel is using and certifying that the vessel is in full compliance with that program, as it has been amended pursuant to § 101.121 of this subchapter. PO 00000 Frm 00045 Fmt 4701 Sfmt 4702 29439 Subpart B—Vessel Security Requirements 15. Revise § 104.200(b) to read as follows: § 104.200 Owner or operator. * * * * * (b) For each vessel, the vessel owner or operator must: (1) Define the security organizational structure for each vessel and provide all personnel exercising security duties or responsibilities within that structure with the support needed to fulfill security obligations; (2) Designate, in writing, by name or title, a Company Security Officer (CSO), a Vessel Security Officer (VSO) for each vessel, and identify how those officers can be contacted at any time; (3) Ensure personnel receive training, drills, and exercises enabling them to perform their assigned security duties; (4) Inform vessel personnel of their responsibility to apply for and maintain a TWIC, including the deadlines and methods for such applications, and of their obligation to inform TSA of any event that would render them ineligible for a TWIC, or which would invalidate their existing TWIC; (5) Ensure vessel security records are kept; (6) Ensure that adequate coordination of security issues takes place between vessels and facilities; this includes the execution of a Declaration of Security (DoS); (7) Ensure coordination of shore leave, transit, or crew change-out for vessel personnel, as well as access through the facility of visitors to the vessel (including representatives of seafarers’ welfare and labor organizations), with facility operators in advance of a vessel’s arrival. Vessel owners or operators may refer to treaties of friendship, commerce, and navigation between the U.S. and other nations in coordinating such leave. The text of these treaties can be found at https:// www.marad.dot.gov/Programs/ treaties.html; (8) Ensure security communication is readily available; (9) Ensure coordination with and implementation of changes in Maritime Security (MARSEC) Level; (10) Ensure that security systems and equipment are installed and maintained, including at least one TWIC reader that meets the standard incorporated by TSA at 49 CFR 1572.23, and that computer and access control systems and hardware are secure; (11) Ensure that vessel access, including the embarkation of persons and their effects, are controlled; E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS 29440 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules (12) Ensure that TWIC procedures are implemented as set forth in this part, including; (i) Ensuring that only individuals who hold a TWIC and are authorized to be in secure areas in accordance with the VSP are permitted to escort; and (ii) Identifying what action is to be taken by an escort, or other authorized individual, should individuals under escort engage in activities other than those for which escorted access was granted. (13) Ensure that restricted areas are controlled and TWIC provisions are coordinated, if applied to such restricted areas; (14) Ensure that protocols are in place for responding to TWIC holders presenting for entry who cannot electronically verify a match between themselves and the information stored on the credential’s ICC. These must include interim alternative security measures for an individual who cannot electronically verify his identity. Such provisions should take into account measures appropriate for occasional failures to verify and for persistent problems with verification such that a person may require a new credential; (15) Ensure that protocols are in place for responding to TWIC holders presenting for entry whose cards have been revoked by TSA, and provisions for individuals requiring access who report a lost or stolen TWIC; (16) Ensure there are alternate provisions in case of equipment or power failures that affect TWIC readers and other validation equipment. (17) Ensure that appropriate personnel know who is on the vessel at all times; (18) Ensure that cargo and vessel stores and bunkers are handled in compliance with this part; (19) Ensure restricted areas, deck areas, and areas surrounding the vessel are monitored; (20) Provide the Master, or for vessels on domestic routes only, the CSO, with the following information: (i) Parties responsible for appointing vessel personnel, such as vessel management companies, manning agents, contractors, concessionaires (for example, retail sales outlets, casinos, etc.); (ii) Parties responsible for deciding the employment of the vessel, including time or bareboat charters or any other entity acting in such capacity; and (iii) In cases when the vessel is employed under the terms of a charter party, the contract details of those documents, including time or voyage charters; and VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 (21) Give particular consideration to the convenience, comfort, and personal privacy of vessel personnel and their ability to maintain their effectiveness over long periods. 16. Amend § 104.210 by adding paragraphs (a)(5), (b)(2)(xv) and (c)(15) to read as follows: § 104.210 Company Security Officer (CSO). (a) * * * (5) The CSO must maintain a valid TWIC. (b) * * * (2) * * * (xv) Knowledge of TWIC. (c) * * * (15) Ensure the TWIC program is being properly implemented. 17. Amend § 104.215 by adding paragraphs (a)(6), (b)(7) and (c)(12) to read as follows: § 104.215 Vessel Security Officer (VSO). (a) * * * (6) The VSO must maintain a valid TWIC. (b) * * * (7) TWIC. (c) * * * (12) Ensure TWIC programs are in place and implemented appropriately. 18. Amend § 104.220 by revising the introductory paragraph and adding paragraph (n) to read as follows: § 104.220 Company or vessel personnel with security duties. Company and vessel personnel responsible for security duties must maintain a valid TWIC, and must have knowledge, through training or equivalent job experience, in the following, as appropriate: * * * * * (n) Relevant aspects of the TWIC program and how to carry them out. 19. Amend § 104.225 by adding paragraph (f) to read as follows: § 104.225 Security training for all other vessel personnel. * * * * * (f) Relevant aspects of the TWIC program and how to carry them out. 20. Amend § 104.235 by redesignating paragraphs (b)(1) through (b)(8) as (b)(2) through (b)(9), respectively, and add new paragraph (b)(1) to read as follows: § 104.235 Vessel recordkeeping requirements. * * * * * (b) * * * (1) Access. Records of those individuals who are granted access to secure areas of the vessel, including records of when these individuals disembark the vessel and, in the case of individuals who are escorted, the PO 00000 Frm 00046 Fmt 4701 Sfmt 4702 identification of the individual who escorted or the method by which the individual was escorted; * * * * * 21. Revise § 104.265 to read as follows: § 104.265 control. Security measures for access (a) General. The vessel owner or operator must ensure the implementation of security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices, including any device intended to damage or destroy persons, vessels, facilities, or ports; (2) Secure dangerous substances and devices that are authorized by the owner or operator to be on board; (3) Control access to the vessel; and (4) Prevent an unescorted individual from entering an area of the vessel that is designated as a secure area unless the individual holds a duly issued TWIC and is authorized to be in the area in accordance with the vessel security plan. (b) The vessel owner or operator must ensure that the following are specified: (1) The locations providing means of access to the vessel where access restrictions or prohibitions are applied for each Maritime Security (MARSEC) Level, including those points where a TWIC reader is or will be deployed. ‘‘Means of access’’ include, but are not limited, to all: (i) Access ladders; (ii) Access gangways; (iii) Access ramps; (iv) Access doors, side scuttles, windows, and ports; (v) Mooring lines and anchor chains; and (vi) Cranes and hoisting gear; (2) The identification of the types of restriction or prohibition to be applied and the means of enforcing them; (3) The means used to establish the identity of individuals not in possession of a TWIC and procedures for escorting, in accordance with § 101.515 of this subchapter; and (4) Procedures for identifying authorized and unauthorized persons at any MARSEC level. (c) The vessel owner or operator must ensure that a TWIC program is implemented as follows: (1) Determine whether recurring unescorted access will be used and, prior to granting any individual recurring unescorted access (as defined in § 101.105 of this subchapter) to secure areas of the vessel, ensure that the individual being granted recurring access privileges has a TWIC and verify the individual’s identity. The identity E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules verification procedure must electronically verify a match between the individual and the biometric information stored on the TWIC’s ICC, including a verification of the individual’s personal identification number (PIN). The validity of the TWIC itself shall also be verified at this time; (2) After granting recurring unescorted access, verify the individual’s identity at each entry to the secure area of the vessel. This identity verification procedure must be outlined in the approved VSP and should at a minimum include visual facial recognition; (3) Ensure that any individual granted unescorted access to secure areas of the vessel is able to produce his or her TWIC upon request; (4) Ensure that the identity of any individual not granted recurring unescorted access and seeking unescorted access to the vessel is verified by matching the individual to the biometric information stored on the TWIC’s ICC at every entry. The validity of the TWIC itself shall also be verified at this time; (5) Includes disciplinary measures to prevent fraud and abuse; (6) Allows certain long-term, frequent vendor representatives and visitors, including seafarers’ chaplains and union representatives who hold a TWIC to be eligible for recurring unescorted access; (7) Allows for temporary access if alternative security measures are implemented due to a failure of the TWIC system, and the individual can meet or pass those alternative security measures; (8) Is coordinated, when practicable, with identification and TWIC systems at facilities used by the vessel; and (9) Periodically verifies the validity of TWICs as outlined in paragraphs (f)(1), (g)(1) and (h)(1) of this section. (d) If the vessel owner or operator uses a separate identification system, ensure that it complies and is coordinated with TWIC provisions in this part. (e) The vessel owner or operator must establish in the approved Vessel Security Plan (VSP) the frequency of application of any security measures for access control, particularly if these security measures are applied on a random or occasional basis. (f) MARSEC Level 1. The vessel owner or operator must ensure security measures in this paragraph are implemented to: (1) Employ TWIC as set out in paragraph (c) of this section. The validity of a TWIC presented for unescorted access shall be verified using VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 information that is no more than seven (7) days old. The validity of a TWIC held by a person previously granted recurring unescorted access shall be verified weekly, using the most current information available from TSA. (2) Screen persons, baggage (including carry-on items), personal effects, and vehicles for dangerous substances and devices at the rate specified in the approved Vessel Security Plan (VSP), except for government-owned vehicles on official business when government personnel present identification credentials for entry; (3) Conspicuously post signs that describe security measures currently in effect and clearly state that: (i) Boarding the vessel is deemed valid consent to screening or inspection; and (ii) Failure to consent or submit to screening or inspection will result in denial or revocation of authorization to board; (4) Check the identification of any person not holding a TWIC and seeking to board the vessel, including vessel passengers, vendors, personnel duly authorized by the cognizant government authorities, and visitors. This check includes confirming the reason for boarding by examining at least one of the following: (i) Joining instructions; (ii) Passenger tickets; (iii) Boarding passes; (iv) Work orders, pilot orders, or surveyor orders; (v) Government identification; or (vi) Visitor badges issued in accordance with an identification system implemented under paragraph (d) of this section. (5) Deny or revoke a person’s authorization to be on board if the person is unable or unwilling, upon the request of vessel personnel, to establish his or her identity in accordance with this part or to account for his or her presence on board. Any such incident must be reported in compliance with this part; (6) Deter unauthorized access to the vessel; (7) Identify access points that must be secured or attended to deter unauthorized access; (8) Lock or otherwise prevent access to unattended spaces that adjoin areas to which passengers and visitors have access; (9) Provide a designated area on board, within the secure area, or in liaison with a facility, for conducting inspections and screening of people, baggage (including carry-on items), personal effects, vehicles and the vehicle’s contents; PO 00000 Frm 00047 Fmt 4701 Sfmt 4702 29441 (10) Ensure vessel personnel are not subjected to screening, of the person or of personal effects, by other vessel personnel, unless security clearly requires it. Any such screening must be conducted in a way that takes into full account individual human rights and preserves the individual’s basic human dignity; (11) Ensure the screening of all unaccompanied baggage; (12) Ensure checked persons and their personal effects are segregated from unchecked persons and their personal effects; (13) Ensure embarking passengers are segregated from disembarking passengers; (14) Ensure, in liaison with the facility, a defined percentage of vehicles to be loaded aboard passenger vessels are screened prior to loading at the rate specified in the approved VSP; (15) Ensure, in liaison with the facility, all unaccompanied vehicles to be loaded on passenger vessels are screened prior to loading; and (16) Respond to the presence of unauthorized persons on board, including repelling unauthorized boarders. (g) MARSEC Level 2. In addition to the security measures required for MARSEC Level 1 in this section, at MARSEC Level 2, the vessel owner or operator must: (1) Verify the validity of a TWIC presented for unescorted access using information that is no more than one (1)day old, and verify the validity of TWIC credentials presented by persons granted recurring unescorted access to the vessel daily, using the most current information available from TSA; and (2) Ensure the implementation of additional security measures, as specified for MARSEC Level 2 in the approved VSP. These additional security measures may include: (i) Increasing the frequency and detail of screening of people, personal effects, and vehicles being embarked or loaded onto the vessel as specified for MARSEC Level 2 in the approved VSP, except for government-owned vehicles on official business when government personnel present identification credentials for entry; (ii) X-ray screening of all unaccompanied baggage; (iii) Assigning additional personnel to patrol deck areas during periods of reduced vessel operations to deter unauthorized access; (iv) Limiting the number of access points to the vessel by closing and securing some access points; (v) Denying access to visitors who do not have a verified destination; E:\FR\FM\22MYP2.SGM 22MYP2 29442 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules (vi) Deterring waterside access to the vessel, which may include, in liaison with the facility, providing boat patrols; and (vii) Establishing a restricted area on the shore side of the vessel, in close cooperation with the facility. (h) MARSEC Level 3. In addition to the security measures required for MARSEC Level 1 and MARSEC Level 2, the vessel owner or operator must: (1) Require all persons, including those granted recurring unescorted access to secure areas of the vessel in accordance with paragraph (c)(1) of this section, to verify their identity at each entry to a secure area by electronically matching the individual to the biometric information stored on the TWIC, including a verification of the individual’s PIN; (2) Ensure the implementation of additional security measures, as specified for MARSEC Level 3 in the approved VSP. The additional security measures may include: (i) Screening all persons, baggage, and personal effects for dangerous substances and devices; (ii) Performing one or more of the following on unaccompanied baggage: (A) Screen unaccompanied baggage more extensively, for example, x-raying from two or more angles; (B) Prepare to restrict or suspend handling unaccompanied baggage; or (C) Refuse to accept unaccompanied baggage on board; (iii) Being prepared to cooperate with responders and facilities; (iv) Limiting access to the vessel to a single, controlled access point; (v) Granting access to only those responding to the security incident or threat thereof; (vi) Suspending embarkation and/or disembarkation of personnel; (vii) Suspending cargo operations; (viii) Evacuating the vessel; (ix) Moving the vessel; or (x) Preparing for a full or partial search of the vessel. 22. Amend § 104.290 by redesignating paragraphs (a)(1) through (a)(5) as (a)(2) through (a)(6), respectively, and adding new paragraph (a)(1) to read as follows: § 104.290 Security incident procedures. sroberts on PROD1PC70 with PROPOSALS * * * * * (a) * * * (1) Providing a list of all individuals who have been granted access to the vessel, as maintained pursuant to § 104.235 of this part; * * * * * 23. Revise § 104.295 to read as follows: VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 § 104.295 ships. Additional requirements—cruise (a) The owner or operator of a U.S.flagged cruise ship must ensure the following: (1) At all MARSEC levels: (i) Each crewmember or employee’s identity and TWIC must be verified prior to allowing the individual to board the vessel at each entry to the vessel. The TWIC validation procedure must rely upon the most current information available from TSA. The identity verification procedure must electronically verify a match between the individual and the biometric information stored on the TWIC’s ICC. (ii) All persons, baggage, and personal effects must be screened for dangerous substances and devices; (iii) The identification of all persons seeking to board the vessel must be checked. Persons holding a TWIC shall be checked as set forth in paragraph (a)(1) of this section. For persons not holding a TWIC, this check includes confirming the reason for boarding by examining passenger tickets, boarding passes, government identification or visitor badges, or work orders; (iv) Security patrols must be performed; and (v) Selected areas must be searched prior to embarking passengers and prior to sailing. (2) At MARSEC Level 2, in addition to the requirements of paragraph (a)(1)(i), above the owner or operator of a U.S.-flagged cruise ship must ensure that each crewmember or employee seeking to board the vessel is required to enter his or her correct PIN prior to being allowed to board. (3) At MARSEC Level 3, the owner or operator of a U.S.-flagged cruise ship must ensure that security briefs to passengers about the specific threat are provided. (b) The owner or operator of a foreignflagged cruise ship must ensure the following: (1) At all MARSEC Levels: (i) All persons, baggage, and personal effects must be screened for dangerous substances and devices; (ii) The identification of all persons seeking to board the vessel must be checked, and must include confirming the reason for boarding by examining joining instructions, passenger tickets, boarding passes, government identification or visitor badges, or work orders; (iii) Perform security patrols; and (iv) Search selected areas prior to embarking passengers and prior to sailing. (2) At MARSEC Level 3, the owner or operator of a foreign cruise ship must PO 00000 Frm 00048 Fmt 4701 Sfmt 4702 ensure that security briefs to passengers about the specific threat are provided. Subpart D—Vessel Security Plan (VSP) 24. Revise § 104.405(a)(10) to read as follows: § 104.405 Format of the Vessel Security Plan (VSP). (a) * * * (10) Security measures for access control, including designated passenger access areas and TWIC implementation; * * * * * 25. From [effective date of the final rule] to [effective date of final rule + 5 years], add Subpart E—TWIC Addendum to read as follows: Subpart E—TWIC Addendum Sec. 104.500 General. 104.505 Submission and approval. 104.510 Integration of TWIC Addendum into full VSP. Subpart E—TWIC Addendum § 104.500 General. A vessel owner or operator must ensure the completion of a TWIC Addendum. The TWIC Addendum must outline the security measures to be used on the vessel in order to implement a TWIC program as discussed in § 104.265 of this part, including the alternate procedures to be used. § 104.505 Submission and approval. (a) In accordance with § 104.115, on or before [date six months after publication of the final rule], each vessel owner or operator not operating under an ASP must submit one copy of their TWIC Addendum, in English, for review and approval to the Commanding Officer, Marine Safety Center (MSC) and a letter certifying that their TWIC Addendum meets applicable requirements of this part. (b) Owners or operators of vessels not in service on or before [date of publication of final rule] must comply with § 104.510 and submit a complete VSP that includes details regarding the implementation of a TWIC program. (c) The Commanding Officer, MSC, will examine each submission for compliance with this subpart and either: (1) Approve it and specify any conditions of approval, returning to the submitter a letter stating its acceptance and any conditions; (2) Return it for revision, returning a letter to the submitter with brief descriptions of the required revisions; or (3) Disapprove it, returning a letter to the submitter with a brief statement of the reasons for disapproval. E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules (d) A TWIC Addendum may be submitted and approved to cover more than one vessel where the vessel design and operations are similar. (e) Each company or vessel owner or operator that submits one TWIC Addendum to cover two or more vessels of similar design and operation must address vessel-specific information that includes the physical and operational characteristics of each vessel. (f) A TWIC Addendum will be given the same expiration date as the vessel’s full VSP. § 104.510 Integration of TWIC Addendum into full VSP. Upon gaining approval for the TWIC Addendum, the vessel owner or operator must incorporate the approved TWIC Addendum into the VSP when the vessel’s VSP is due for reapproval in accordance with Subpart D of this part. PART 105—MARITIME SECURITY: FACILITIES 26. The authority citation for part 105 continues to read as follows: Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. 70103; 50 U.S.C. 191; 33 CFR 1.05–1, 6.04– 11, 6.14, 6.16, and 6.19; Department of Homeland Security Delegation No, 0170.1. 27. From [effective date of the final rule] to [effective date of final rule + 5 years], amend § 105.115 by adding paragraph (c) to read as follows: § 105.115 Compliance dates. sroberts on PROD1PC70 with PROPOSALS * * * * * (c) Facility owners or operators must: (1) Submit a TWIC Addendum to their COTP to cover each facility they own or operate subject to this part on or before [date 6 months after publication of final rule]; and (2) Be operating in accordance with the TWIC provisions found within this part, as outlined in their TWIC Addendum, between [date 1 year after publication of the final rule] and [date 18 months after publication of the final rule], depending on whether enrollment has been completed in the port where the facility is operating, in accordance with 49 CFR 1572.19. 28. Amend § 105.120 by: a. Designating the undesignated text as paragraph (a); b. Redesignating paragraphs (a), (b), and (c) as (a)(1), (a)(2), and (a)(3), respectively; and c. Adding paragraph (b) to read as follows: § 105.120 Compliance documentation. * * * * * (b) From [effective date of final rule] to [effective date of the final rule + 5 years], this paragraph (b) shall apply. VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 Each facility owner or operator subject to this part must ensure, before [date one year after publication of final rule] that a copies of the following documentation are available at the facility and are made available to the Coast Guard upon request: (1) The approved TWIC addendum and any approved revisions or amendments thereto, and a letter of approval from the cognizant COTP dated within the last 5 years; (2) The TWIC Addendum submitted for approval and current written acknowledgment from the cognizant COTP, stating that the Coast Guard is currently reviewing the TWIC Addendum submitted for approval and that the facility may continue to operate; or (3) For facilities operating under a Coast Guard-approved Alternative Security Program as provided in § 105.140, a copy of the Alternative Security Program the facility is using, including a facility specific security assessment report generated under the Alternative Security Program, as specified in § 101.120(b)(3) of this subchapter, and a letter signed by the facility owner or operator, stating which Alternative Security Program the facility is using and certifying that the facility is in full compliance with that program, as it has been amended pursuant to § 101.121 of this subchapter. Subpart B—Facility Security Requirements 29. Revise § 105.200(b) to read as follows: § 105.200 Owner or operator. * * * * * (b) For each facility, the facility owner or operator must: (1) Define the security organizational structure and provide each person exercising security duties and responsibilities within that structure the support needed to fulfill those obligations; (2) Designate, in writing, by name or by title, a Facility Security Officer (FSO) and identify how the officer can be contacted at any time; (3) Ensure that a Facility Security Assessment (FSA) is conducted; (4) Ensure the development and submission for approval of a Facility Security Plan (FSP); (5) Ensure that the facility operates in compliance with the approved FSP; (6) Ensure that the TWIC program is properly implemented as set forth in this part, including; (i) Ensuring that only individuals who hold a TWIC and are authorized to be PO 00000 Frm 00049 Fmt 4701 Sfmt 4702 29443 in the area in accordance with the FSP are permitted to escort; (ii) Identifying what action is to be taken by an escort, or other authorized individual, should individuals under escort engage in activities other than those for which escorted access was granted; and (iii) Ensuring that security systems and equipment are installed and maintained, including at least one TWIC reader that meets the standard incorporated by TSA in 49 CFR 1572.23, and that computer and access control systems and hardware are secure; (7) Ensure that restricted areas are controlled and TWIC provisions are coordinated, if applied to such restricted areas; (8) Ensure that adequate coordination of security issues takes place between the facility and vessels that call on it, including the execution of a Declaration of Security (DoS) as required by this part; (9) Ensure coordination of shore leave for vessel personnel or crew change-out, as well as access through the facility for visitors to the vessel (including representatives of seafarers’ welfare and labor organizations), with vessel operators in advance of a vessel’s arrival. In coordinating such leave, facility owners or operators may refer to treaties of friendship, commerce, and navigation between the U.S. and other nations. The text of these treaties can be found at https://www.marad.dot.gov/ Programs/treaties.html; (10) Ensure, within 12 hours of notification of an increase in MARSEC Level, implementation of the additional security measures required for the new MARSEC Level; (11) Ensure security for unattended vessels moored at the facility; (12) Ensure the report of all breaches of security and transportation security incidents to the National Response Center in accordance with part 101 of this chapter; (13) Ensure consistency between security requirements and safety requirements; (14) Inform facility personnel of their responsibility to apply for and maintain a TWIC, including the deadlines and methods for such applications, and of their obligation to inform TSA of any event that would render them ineligible for a TWIC, or which would invalidate their existing TWIC; (15) Ensure that protocols are in place for responding to TWIC holders presenting for entry who cannot electronically verify a match between themselves and the information stored on the credential’s ICC. These must include interim alternative security E:\FR\FM\22MYP2.SGM 22MYP2 29444 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules measures for an individual who cannot electronically verify his identity. Such provisions should take into account measures appropriate for occasional failures to verify and for persistent problems with verification such that a person may require a new credential; (16) Ensure that protocols are in place for responding to TWIC holders presenting for entry whose cards have been revoked by TSA, or other appropriate authority, or otherwise reported as invalid, and provisions for individuals requiring access who report a lost or stolen TWIC; (17) Ensure there are alternate provisions in case of equipment or power failures that affect TWIC readers and other validation equipment; and (18) Ensure that appropriate personnel know who is on the facility at all times. 30. Amend § 105.205 by adding paragraphs (a)(4), (b)(2)(xv) and (c)(19) to read as follows: § 105.205 Facility Security Officer (FSO). (a) * * * (4) The FSO must maintain a valid TWIC. (b) * * * (2) * * * (xv) Knowledge of TWIC. (c) * * * (19) Ensure the TWIC program is being properly implemented. 31. Amend § 105.210 by revising the introductory paragraph and adding paragraph (n) to read as follows: § 105.210 duties. Facility personnel with security Facility personnel responsible for security duties must maintain a valid TWIC, and must have knowledge, through training or equivalent job experience, in the following, as appropriate: * * * * * (n) Familiar with all relevant aspects of the TWIC program and how to carry them out. 32. Amend § 105.215 by adding paragraph (f) to read as follows: § 105.215 Security training for all other facility personnel. * * * * (f) Familiar with all relevant aspects of the TWIC program and how to carry them out. 33. Amend § 105.225 by adding paragraph (b)(9) to read as follows: sroberts on PROD1PC70 with PROPOSALS * § 105.225 Facility recordkeeping requirements. * * * * * (b) * * * (9) Records of those individuals who are granted access to the secure areas of VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 the facility, including records of when these individuals exit the facility and, in the case of individuals who are escorted, the identification of the individual who escorted or the method by which the individual was escorted. * * * * * 34. Revise § 105.255 to read as follows: § 105.255 control. Security measures for access (a) General. The facility owner or operator must ensure the implementation of security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices, including any device intended to damage or destroy persons, vessels, facilities, or ports; (2) Secure dangerous substances and devices that are authorized by the owner or operator to be on the facility; (3) Control access to the facility; and (4) Prevent an unescorted individual from entering an area of the facility that is designated as a secure area unless the individual holds a duly issued TWIC and is authorized to be in the area in accordance with the facility security plan. (b) The facility owner or operator must ensure that the following are specified: (1) The locations where restrictions or prohibitions that prevent unauthorized access are applied for each MARSEC Level, including those points where a TWIC reader is or will be deployed. Each location allowing means of access to the facility must be addressed; (2) The types of restrictions or prohibitions to be applied and the means of enforcing them; (3) The means used to establish the identity of individuals not in possession of a TWIC, in accordance with § 101.515 of this subchapter, and procedures for escorting them; (4) Procedures for identifying authorized and unauthorized persons at any MARSEC level; and (5) The locations where persons, personal effects and vehicle screenings are to be conducted. The designated screening areas should be covered to provide for continuous operations regardless of the weather conditions. (c) The facility owner or operator must ensure that a TWIC program is implemented as follows: (1) Prior to granting any individual unescorted access to secure areas of the facility, ensure that the individual being granted access privileges has a TWIC and verify the individual’s identity. The identity verification procedure must electronically verify a match between the individual and the biometric PO 00000 Frm 00050 Fmt 4701 Sfmt 4702 information stored on the TWIC’s ICC. The validity of the TWIC itself shall also be verified at this time; (2) Ensure that any individual granted unescorted access to secure areas of the facility is able to produce his or her TWIC upon request; (3) Uses disciplinary measures to prevent fraud and abuse; (4) Allows for temporary access if alternative security measures are implemented due to a failure of the TWIC system, and the individual can meet or pass those alternative security measures; (5) Is coordinated, when practicable, with identification and TWIC systems of vessels or other transportation conveyances that use the facility; and (6) Periodically verifies the validity of TWICs as outlined in paragraphs (f)(1), (g)(1) and (h)(1) of this section. (d) If the facility owner or operator uses a separate identification system, ensure that it complies and is coordinated with TWIC provisions in this part. (e) The facility owner or operator must establish in the approved Facility Security Plan (FSP) the frequency of application of any access controls, particularly if they are to be applied on a random or occasional basis. (f) MARSEC Level 1. The facility owner or operator must ensure the following security measures are implemented at the facility: (1) Implement TWIC as set out in paragraph (c) of this section. The validity of a TWIC presented for unescorted access shall be verified using information that is no more than seven (7) days old; (2) Screen persons, baggage (including carry-on items), personal effects, and vehicles, for dangerous substances and devices at the rate specified in the approved FSP, excluding governmentowned vehicles on official business when government personnel present identification credentials for entry; (3) Conspicuously post signs that describe security measures currently in effect and clearly state that: (i) Entering the facility is deemed valid consent to screening or inspection; and (ii) Failure to consent or submit to screening or inspection will result in denial or revocation of authorization to enter; (4) Check the identification of any person not holding a TWIC and seeking entry to the facility, including vessel passengers, vendors, personnel duly authorized by the cognizant government authorities, and visitors. This check shall include confirming the reason for E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules boarding by examining at least one of the following: (i) Joining instructions; (ii) Passenger tickets; (iii) Boarding passes; (iv) Work orders, pilot orders, or surveyor orders; (v) Government identification; or (vi) Visitor badges issued in accordance with an identification system implemented under paragraph (d) of this section; (5) Deny or revoke a person’s authorization to be on the facility if the person is unable or unwilling, upon the request of facility personnel, to establish his or her identity in accordance with this part or to account for his or her presence. Any such incident must be reported in compliance with this part; (6) Designate restricted areas and provide appropriate access controls for these areas; (7) Identify access points that must be secured or attended to deter unauthorized access; (8) Deter unauthorized access to the facility and to designated restricted areas within the facility; (9) Screen by hand or device, such as x-ray, all unaccompanied baggage prior to loading onto a vessel; and (10) Secure unaccompanied baggage after screening in a designated restricted area and maintain security control during transfers between the facility and a vessel. (g) MARSEC Level 2. In addition to the security measures required for MARSEC Level 1 in this section, at MARSEC Level 2, the facility owner or operator must: (1) Verify the validity of TWIC credentials presented by all persons, using information that is no more than one (1) day old, and ensure that all TWIC enabled gates are manned; and (2) Ensure the implementation of additional security measures, as specified for MARSEC Level 2 in their approved FSP. These additional security measures may include: (i) Increasing the frequency and detail of the screening of persons, baggage, and personal effects for dangerous substances and devices entering the facility; (ii) X-ray screening of all unaccompanied baggage; (iii) Assigning additional personnel to guard access points and patrol the perimeter of the facility to deter unauthorized access; (iv) Limiting the number of access points to the facility by closing and securing some access points and providing physical barriers to impede movement through the remaining access points; VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 (v) Denying access to visitors who do not have a verified destination; (vi) Deterring waterside access to the facility, which may include, using waterborne patrols to enhance security around the facility; or (vii) Except for government-owned vehicles on official business when government personnel present identification credentials for entry, screening vehicles and their contents for dangerous substances and devices at the rate specified for MARSEC Level 2 in the approved FSP. (h) MARSEC Level 3. In addition to the security measures required for MARSEC Level 1 and MARSEC Level 2, at MARSEC level 3, the facility owner or operator must ensure that each person holding a TWIC and seeking unescorted access to a secure area is required to enter his or her correct PIN prior to being allowed to enter that area, and must ensure the implementation of additional security measures, as specified for MARSEC Level 3 in their approved FSP. These additional security measures may include: (1) Screening all persons, baggage, and personal effects for dangerous substances and devices; (2) Performing one or more of the following on unaccompanied baggage: (i) Screen unaccompanied baggage more extensively; for example, x-raying from two or more angles; (ii) Prepare to restrict or suspend handling unaccompanied baggage; or (iii) Refuse to accept unaccompanied baggage; (3) Being prepared to cooperate with responders and facilities; (4) Granting access to only those responding to the security incident or threat thereof; (5) Suspending access to the facility; (6) Suspending cargo operations; (7) Evacuating the facility; (8) Restricting pedestrian or vehicular movement on the grounds of the facility; or (9) Increasing security patrols within the facility. 35. Amend § 105.280 by adding paragraph (f) to read as follows: § 105.280 Security incident procedures. * * * * * (f) Provide a list of all persons granted access to the facility, as required to be maintained in § 105.225. 36. Amend § 105.285 by revising paragraph (a)(4) to read as follows: § 105.285 Additional requirementspassenger and ferry facilities. (a) * * * (4) Deny passenger access to secure and restricted areas unless escorted by PO 00000 Frm 00051 Fmt 4701 Sfmt 4702 29445 authorized facility security personnel; and * * * * * 37. Revise § 105.290 to read as follows: § 105.290 Additional requirements-cruise ship terminals. At all MARSEC Levels, in coordination with a vessel moored at the facility, the facility owner or operator must ensure the following security measures: (a) Screen all persons, baggage, and personal effects for dangerous substances and devices; (b) Check the identification of all persons seeking to enter the facility. Persons holding a TWIC shall be checked as set forth in this part. For persons not holding a TWIC, this check includes confirming the reason for boarding by examining passenger tickets, boarding passes, government identification or visitor badges, or work orders; (c) Designate holding, waiting, or embarkation areas within the facility’s secure area to segregate screened persons and their personal effects awaiting embarkation from unscreened persons and their personal effects; (d) Provide additional security personnel to designated holding, waiting, or embarkation areas within the facility’s secure area; and (e) Deny individuals not holding a TWIC access to secure and restricted areas unless escorted. 38. Amend § 105.295 by revising paragraph (a)(1) to read as follows: § 105.295 Additional requirements-Certain Dangerous Cargo (CDC) facilities. (a) * * * (1) Escort all non-TWIC holders at all times while on the facility; * * * * * 39. Amend § 105.296 by adding paragraph (a)(4) to read as follows: § 105.296 Additional requirements-barge fleeting facilities. (a) * * * (4) Control access to the barges once tied to the fleeting area by implementing TWIC as described in § 105.255 of this part. * * * * * Subpart D—Facility Security Plan (FSP) 40. Revise § 105.405(a)(10) to read as follows: § 105.405 Format and content of the Facility Security Plan (FSP). (a) * * * E:\FR\FM\22MYP2.SGM 22MYP2 29446 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules (10) Security measures for access control, including designated public access areas and TWIC implementation; * * * * * 41. From [effective date of the final rule] to [effective date of final rule + 5 years], add Subpart E—TWIC Addendum to read as follows: Subpart E—TWIC Addendum Sec. 105.500 General. 105.505 Submission and approval. 105.510 Integration of TWIC Addendum into full FSP. § 105.510 Integration of TWIC Addendum into full FSP. Subpart E—TWIC Addendum § 105.500 * General. A facility owner or operator must ensure the completion of a TWIC Addendum. The TWIC Addendum must outline the security measures to be used on the facility in order to implement a TWIC program as discussed in § 105.255 of this part, including the alternate procedures to be used. sroberts on PROD1PC70 with PROPOSALS § 105.505 Submission and approval. (a) In accordance with § 105.115, on or before [date six months after publication of the final rule], each facility owner or operator must either: (1) Submit one copy of their TWIC Addendum, in English, for review and approval to the cognizant COTP and a letter certifying that their TWIC Addendum meets applicable requirements of this part; or (2) If operating under a Coast Guardapproved Alternative Security Program (ASP), a letter signed by the facility owner or operator stating which approved ASP the owner or operator is using, and affirming that any new provisions of that ASP regarding TWIC have been implemented. (b) Owners or operators of facilities not in service on or before [date of publication of the final rule] must comply with § 105.510 and submit a complete FSP that includes details regarding the implementation of a TWIC program. (c) The cognizant COTP will examine each submission for compliance with this subpart and either: (1) Approve it and specify any conditions of approval, returning to the submitter a letter stating its acceptance and any conditions; (2) Return it for revision, returning a copy to the submitter with brief descriptions of the required revisions; or (3) Disapprove it, returning a copy to the submitter with a brief statement of the reasons for disapproval. (d) A TWIC Addendum may be submitted and approved to cover more than one facility where they share VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 similarities in design and operations, if authorized and approved by each cognizant COTP. (e) Each facility owner or operator that submits one TWIC Addendum to cover two or more facilities of similar design and operation must address facility-specific information that includes the design and operational characteristics of each facility. (f) A TWIC Addendum will be given the same expiration date as the facility’s full FSP. * * * * Upon gaining approval for the TWIC Addendum, the facility owner or operator must incorporate the approved TWIC Addendum into the FSP when the facility’s FSP is due for reapproval in accordance with Subpart D of this part. PART 106—MARITIME SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES 42. The authority citation for part 106 continues to read as follows: Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50 U.S.C. 191; 33 CFR 1.05–1, 6.04–11, 6.14, 6.16, and 6.19; Department of Homeland Security Delegation No, 0170.1. 43. From [effective date of the final rule] to [effective date of final rule + 5 years] amend § 106.110 by adding paragraph (d) to read as follows: § 106.110 Compliance dates. (d) OCS facility owners and operators must: (1) Submit a TWIC Addendum to the cognizant District Commander to cover each facility they own or operate subject to this part on or before [date 6 months after publication of final rule]; and (2) Be operating in accordance with the TWIC provisions found within this part, as outlined in their TWIC Addendum, between [date 1 year after publication of the final rule] and [date 18 months after publication of the final rule], depending on whether enrollment has been completed in the port where the facility is operating, in accordance with 49 CFR 1572.19. 44. Amend § 106.115 by: a. Designating the undesignated text as paragraph (a); b. Redesignating paragraphs (a), (b), and (c) as (a)(1), (a)(2), and (a)(3), respectively; and c. Adding paragraph (b) to read as follows: § 106.115 Compliance documentation. * * * * * (b) From [effective date of final rule] to [effective date of final rule + 5 years], PO 00000 Frm 00052 Fmt 4701 Sfmt 4702 this paragraph (b) shall apply. Each OCS facility owner or operator subject to this part must ensure, before [date one year after publication of final rule] that a copies of the following documentation are available at the OCS facility and are made available to the Coast Guard upon request: (1) The approved TWIC addendum and any approved revisions or amendments thereto, and a letter of approval from the cognizant District Commander dated within the last 5 years; (2) The TWIC Addendum submitted for approval and current written acknowledgment from the cognizant District Commander, stating that the Coast Guard is currently reviewing the TWIC Addendum submitted for approval and that the OCS facility may continue to operate; or (3) For OCS facilities operating under a Coast Guard-approved Alternative Security Program as provided in § 106.135, a copy of the Alternative Security Program the OCS facility is using, including a facility specific security assessment report generated under the Alternative Security Program, as specified in § 101.120(b)(3) of this subchapter, and a letter signed by the OCS facility owner or operator, stating which Alternative Security Program the OCS facility is using and certifying that the OCS facility is in full compliance with that program, as it has been amended pursuant to § 101.121 of this subchapter. 45. Revise § 106.200(b) to read as follows: § 106.200 Owner or operator. * * * * * (b) For each OCS facility, the OCS facility owner or operator must: (1) Define the security organizational structure for each OCS Facility and provide each person exercising security duties or responsibilities within that structure the support needed to fulfill those obligations; (2) Designate in writing, by name or title, a Company Security Officer (CSO) and a Facility Security Officer (FSO) for each OCS Facility and identify how those officers can be contacted at any time; (3) Ensure that a Facility Security Assessment (FSA) is conducted; (4) Ensure the development and submission for approval of a Facility Security Plan (FSP); (5) Ensure that the OCS facility operates in compliance with the approved FSP; (6) Ensure that the TWIC program is properly implemented as set forth in this part, including: E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules (i) Ensuring that only individuals who hold a TWIC and are authorized to be in the area in accordance with the OCS FSP are permitted to escort; (ii) Identifying what action is to be taken by an escort, or other authorized individual, should individuals under escort engage in activities other than those for which escorted access was granted; and (iii) Ensuring that security systems and equipment are installed and maintained, including at least one TWIC reader that meets the standard incorporated by TSA in 49 CFR 1572.23, and that computer and access control systems and hardware are secure; (7) Ensure that adequate coordination of security issues takes place between OCS facilities and vessels, including the execution of a Declaration of Security (DoS) as required by this part; (8) Ensure, within 12 hours of notification of an increase in MARSEC Level, implementation of the additional security measures required by the FSP for the new MARSEC Level; (9) Ensure all breaches of security and security incidents are reported in accordance with part 101 of this subchapter; (10) Ensure consistency between security requirements and safety requirements; (11) Inform OCS facility personnel of their responsibility to apply for and maintain a TWIC, including the deadlines and methods for such applications, and of their obligation to inform TSA of any event that would render them ineligible for a TWIC, or which would invalidate their existing TWIC; (12) Ensure that protocols are in place for responding to TWIC holders presenting for entry who cannot electronically verify a match between themselves and the biometric information stored on the credential’s ICC. These must include interim alternative security measures for an individual who cannot electronically identify his identity. Such provisions should take into account measures appropriate for occasional failures to verify and for persistent problems with verification such that a person may require a new credential; (13) Ensure that protocols are in place for responding to TWIC holders presenting for entry whose cards have been revoked by TSA, or other appropriate authority, or otherwise reported as invalid, and provisions for individuals requiring access who report a lost or stolen TWIC; (14) Ensure there are alternate provisions in case of equipment or VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 power failures that affect TWIC readers and other validation equipment; and (15) Ensure that appropriate personnel know who is on the OCS facility at all times. 46. Amend § 106.205 by adding paragraphs (a)(4), (c)(13) and (d)(13) to read as follows: § 106.205 Company Security Officer (CSO). (a) * * * (4) The CSO must maintain a valid TWIC. * * * * * (c) * * * (13) Knowledge of TWIC. (d) * * * (13) Ensure the TWIC program is being properly implemented. 47. Amend § 106.210 by adding paragraphs (a)(4) and (c)(15) to read as follows: § 106.210 (FSO). OCS Facility Security Officer (a) * * * (4) The FSO must maintain a valid TWIC. * * * * * (c) * * * (15) Ensure the TWIC programs is properly implemented. 48. Amend § 106.215 by revising the introductory paragraph and redesignating paragraphs (k) and (l) as (l) and (m), respectively, and adding new paragraph (k) to read as follows: § 106.215 Company of OCS facility personnel with security duties. Company and OCS facility personnel responsible for security duties must maintain a valid TWIC, and must have knowledge, through training or equivalent job experience, in the following, as appropriate: * * * * * (k) Familiarity with all relevant aspects of the TWIC program and how to carry them out; * * * * * 49. Amend § 106.220 by adding paragraph (f) to read as follows: § 106.220 Security training for all other OCS personnel. * * * * * (f) Familiarity with all relevant aspects of the TWIC program and how to carry them out. 50. Revise § 106.230 by adding paragraph (b)(9) to read as follows: § 106.230 OCS facility recordkeeping requirements. * * * * * (b) * * * (9) Records of those individuals who are granted access to the secure area of PO 00000 Frm 00053 Fmt 4701 Sfmt 4702 29447 the OCS facility, including records of when these individuals exit the OCS facility and, in the case of individuals who are escorted, the identification of the individual who escorted or the method by which the individual was escorted. 51. Revise § 106.260 to read as follows: § 106.260 control. Security measures for access (a) General. The OCS facility owner or operator must ensure the implementation of security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices, including any device intended to damage or destroy persons, vessels, or the OCS facility; (2) Secure dangerous substances and devices that are authorized by the OCS facility owner or operator to be on board; (3) Control access to the OCS facility; and (4) Prevent an unescorted individual from entering the OCS facility unless the individual holds a duly issued TWIC and is authorized to be on the OCS facility in accordance with the OCS facility security plan. (b) The OCS facility owner or operator must ensure that the following are specified: (1) All locations providing means of access to the OCS facility where access restrictions or prohibitions are applied for each security level to prevent unauthorized access, including those points where a TWIC reader is or will be deployed; (2) The identification of the types of restriction or prohibition to be applied and the means of enforcing them; (3) The means used to establish the identity of individuals not in possession of a TWIC and the means by which they will be allowed access to the OCS facility; and (4) Procedures for identifying authorized and unauthorized persons at any MARSEC level. (c) The OCS facility owner or operator must ensure that a TWIC program is implemented as follows: (1) Prior to granting any individual unescorted access to the OCS facility, ensure that the individual has a TWIC and verify the individual’s identity. The identity verification procedure must electronically verify a match between the individual and the biometric information stored on the TWIC’s ICC. The validity of the TWIC itself must also be verified at this time; (2) Ensure that any individual granted unescorted access to the OCS facility is able to produce his or her TWIC upon request; E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS 29448 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules (3) Uses disciplinary measures to prevent fraud and abuse; (4) Allows for temporary access if alternative security measures are implemented due to a failure of the TWIC system, and the individual can meet or pass those alternative security measures; and (5) Periodically verifies the validity of TWICs, using the latest information available from TSA, as outlined in paragraphs (f)(1), (g)(1) and (h)(1) of this section. (d) If the OCS facility owner or operator uses a separate identification system, ensure that it is coordinated with identification and TWIC systems in place on vessels conducting operations with the OCS facility. (e) The OCS facility owner or operator must establish in the approved Facility Security Plan (FSP) the frequency of application of any access controls, particularly if they are to be applied on a random or occasional basis. (f) MARSEC Level 1. The OCS facility owner or operator must ensure the following security measures are implemented at the facility: (1) Implement TWIC as set out in paragraph (c) of this section. The validity of a TWIC presented for unescorted access shall be verified using information that is no more than seven (7) days old. The validity of a TWIC held by a person already granted access to the OCS facility shall be verified weekly, using the most current information available from TSA; (2) Screen persons and personal effects going aboard the OCS facility for dangerous substances and devices at the rate specified in the approved FSP; (3) Conspicuously post signs that describe security measures currently in effect and clearly stating that: (i) Boarding an OCS facility is deemed valid consent to screening or inspection; and (ii) Failure to consent or submit to screening or inspection will result in denial or revocation of authorization to be on board; (4) Check the identification of any person seeking to board the OCS facility, including OCS facility employees, passengers and crews of vessels interfacing with the OCS facility, vendors, and visitors and ensure that non-TWIC holders are denied unescorted access to the OCS facility; (5) Deny or revoke a person’s authorization to be on board if the person is unable or unwilling, upon the request of OCS facility personnel, to establish his or her identity in accordance with this part or to account for his or her presence on board. Any VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 such incident must be reported in compliance with this part; (6) Deter unauthorized access to the OCS facility; (7) Identify access points that must be secured or attended to deter unauthorized access; (8) Lock or otherwise prevent access to unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS facility personnel are not required to engage in or be subjected to screening, of the person or of personal effects, by other OCS facility personnel, unless security clearly requires it; (10) Provide a designated secure area on board, or in liaison with a vessel interfacing with the OCS facility, for conducting inspections and screening of people and their personal effects; and (11) Respond to the presence of unauthorized persons on board. (g) MARSEC Level 2. In addition to the security measures required for MARSEC Level 1 in this section, at MARSEC Level 2, the OCS facility owner or operator must: (1) Verify the validity of a TWIC presented for unescorted access shall be verified using information that is no more than one (1) day old, and verify the validity of a TWIC held by a person already granted access to the OCS facility daily, using the most current information available from TSA; (2) Ensure the implementation of additional security measures, as specified for MARSEC Level 2 in the approved FSP. These additional security measures may include: (i) Increasing the frequency and detail of screening of people and personal effects embarking onto the OCS facility as specified for MARSEC Level 2 in the approved FSP; (ii) Assigning additional personnel to patrol deck areas during periods of reduced OCS facility operations to deter unauthorized access; (iii) Limiting the number of access points to the OCS facility by closing and securing some access points; or (iv) Deterring waterside access to the OCS facility, which may include, providing boat patrols. (h) MARSEC Level 3. In addition to the security measures required for MARSEC Level 1 and MARSEC Level 2, at MARSEC level 3, the facility owner or operator must ensure that each person holding a TWIC and seeking unescorted access to a secure area is required to enter his or her correct PIN prior to being allowed to enter that area, and must ensure the implementation of additional security measures, as specified for MARSEC Level 3 in their PO 00000 Frm 00054 Fmt 4701 Sfmt 4702 approved FSP. The additional security measures may include: (1) Screening all persons and personal effects for dangerous substances and devices; (2) Being prepared to cooperate with responders; (3) Limiting access to the OCS facility to a single, controlled access point; (4) Granting access to only those responding to the security incident or threat thereof; (5) Suspending embarkation and/or disembarkation of personnel; (6) Suspending the loading of stores or industrial supplies; (7) Evacuating the OCS facility; or (8) Preparing for a full or partial search of the OCS facility. 52. Amend § 106.280 by adding paragraph (g) to read as follows: § 106.280 Security incident procedures. * * * * * (g) Provide a list of all persons granted access to the OCS facility, as required to be maintained in § 106.230. Subpart D—Outer Continental Shelf (OCS) Facility Security Plan (FSP) 53. Revise § 106.405(a)(10) to read as follows: § 106.405 Format of the Facility Security Plan (FSP). (a) * * * (10) Security measures for access control, including TWIC implementation; * * * * * 54. From [effective date of the final rule] to [effective date of final rule + 5 years], add Subpart E—TWIC Addendum to read as follows: Subpart E—TWIC Addendum Sec. 106.500 General. 106.505 Submission and approval. 106.510 Integration of TWIC Addendum into full FSP. Subpart E—TWIC Addendum § 106.500 General. An OCS facility owner or operator must ensure the completion of a TWIC Addendum. The TWIC Addendum must outline the security measures to be used on the OCS facility in order to implement a TWIC program as discussed in § 106.260 of this part, including the alternate procedures to be used. § 106.505 Submission and approval. (a) In accordance with § 106.115, on or before [date six months after date of publication of final rule], each OCS facility owner or operator must either: E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules (1) Submit one copy of their TWIC Addendum, in English, for review and approval to the cognizant District Commander and a letter certifying that their TWIC Addendum meets applicable requirements of this part; or (2) If operating under a Coast Guardapproved Alternative Security Program (ASP), a letter signed by the OCS facility owner or operator stating which approved ASP the owner or operator is using, and affirming that any new provisions of that ASP regarding TWIC have been implemented. (b) Owners or operators of OCS facilities not in service on or before [date of publication of final rule] must comply with § 106.510 and submit a complete FSP that includes details regarding the implementation of a TWIC program. (c) The cognizant District Commander will examine each submission for compliance with this subpart and either: (1) Approve it and specify any conditions of approval, returning to the submitter a letter stating its acceptance and any conditions; (2) Return it for revision, returning a copy to the submitter with brief descriptions of the required revisions; or (3) Disapprove it, returning a copy to the submitter with a brief statement of the reasons for disapproval. (d) A TWIC Addendum may be submitted and approved to cover more than one facility where they share similarities in physical characteristics, location, and operations. (e) Each OCS facility owner or operator that submits one TWIC Addendum to cover two or more OCS facilities of similar design, location, and operation must address OCS facilityspecific information that includes the physical and operational characteristics of each OCS facility. (f) A TWIC Addendum will be given the same expiration date as the OCS facility’s full FSP. Authority: R.S. 4517, 4518, secs. 19, 2, 23 Stat. 58, 118, sec. 7, 49 Stat. 1936, sec. 1, 40 Stat. 220; 46 U.S.C. 570’572, 2, 689, and 70105; 50 U.S.C. 191, EO 10173, EO 10277, EO 10352, 3 CFR, 1949—1953 Comp. pp. 356, 778, 873. § 106.510 Integration of TWIC Addendum into full FSP. Authority: 31 U.S.C. 9701; 46 U.S.C. 2101, 2103, 2110, 7301, 7302, 7503, 7505, 7701, and 70105; Department of Homeland Security Delegation No. 0170.1. sroberts on PROD1PC70 with PROPOSALS Upon gaining approval for the TWIC Addendum, the OCS facility owner or operator must incorporate the approved TWIC Addendum into the FSP when the OCS facility’s FSP is due for reapproval in accordance with Subpart D of this part. PART 125—IDENTIFICATION CREDENTIALS FOR PERSONS REQUIRING ACCESS TO WATERFRONT FACILITIES OR VESSELS 55. The authority citation for part 125 is revised to read as follows: VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 56. In § 125.09, revise paragraph (f) and add paragraph (g) to read as follows: § 125.09 Identification credentials. * * * * * (f) Transportation Worker Identification Credential. (g) Such other identification as may be approved by the Commandant from time to time. Title 46—Shipping Chapter I—Coast Guard PART 10—LICENSING OF MARITIME PERSONEL 57. The authority citation for part 10 continues to read as follows: Authority: 14 U.S.C. 633; 31 U.S.C. 9701; 46 U.S.C. 2101, 2103, and 2110; 46 U.S.C. chapter 71; 46 U.S.C. 7502, 7505, 7701, and 8906; Executive Order 10173; Department of Homeland Security Delegation No. 0170.1. Section 11.107 is also issued under the authority of 44 U.S.C. 3507. 58. Add new § 10.113 to read as follows: § 10.113 Transportation Worker Identification Credential In accordance with the implementation schedule contained in 49 CFR 1572.19, all mariners holding an active License, Certificate of Registry or STCW endorsement issued under this Part must hold a valid Transportation Worker Identification Credential (TWIC) issued by the Transportation Security Administration under title 49 CFR part 1572. PART 12—CERTIFICATION OF SEAMEN 59. The authority citation for part 12 is revised to read as follows: 60. Add new § 12.01–11 to read as follows: § 12.01–11 Transportation Worker Identification Credential. In accordance with the implementation schedule contained in 49 CFR 1572.19, all mariners holding a Merchant Mariner’s Document or STCW endorsement issued under this Part must hold a valid Transportation Worker Identification Credential (TWIC) issued by the Transportation Security Administration under 49 CFR part 1572. PO 00000 Frm 00055 Fmt 4701 Sfmt 4702 29449 PART 15—MANNING REQUIREMENTS 61. The authority citation for part 15 is revised to read as follows: Authority: 46 U.S.C. 2101, 2103, 3306, 3703, 8101, 8102, 8104, 8105, 8301, 8304, 8502, 8503, 8701, 8702, 8901, 8902, 8903, 8904, 8905(b), 8906, 9102, and 70105; and Department of Homeland Security Delegation No. 0170.1. 62. Add new § 15.415 to read as follows: § 15.415 Transportation Worker Identification Credential. In accordance with the implementation schedule contained in 49 CFR 1572.19, a person may not employ or engage an individual, and an individual may not serve in a position in which an individual is required by law or regulation to hold an active License, Merchant Mariner Document, Certificate of Registry or STCW endorsement, unless the individual holds a valid Transportation Security Identification Credential (TWIC). All mariners holding an active License, Merchant Mariner Document, Certificate of Registry or STCW endorsement issued by the Coast Guard must hold a valid TWIC issued by the Transportation Security Administration under 49 CFR part 1572. Title 49—Transportation Chapter XII—Transportation Security Administration Subchapter A—Administrative and Procedural Rules 63. Add a new part 1515 to subchapter A to read as follows: PART 1515—APPEAL AND WAIVER PROCEDURES FOR SECURITY THREAT ASSESSMENTS FOR INDIVIDUALS Sec. 1515.1 1515.3 1515.5 1515.7 Scope. Terms used in this part. Appeal procedures. Waiver procedures. Authority: 46 U.S.C. 70105; 49 U.S.C. 114, 5103a, 40113, and 46105; 18 U.S.C. 842, 845; 6 U.S.C. 469. § 1515.1 Scope. This part applies to applicants who undergo one of the following security threat assessments and wish to appeal an Initial Determination of Threat Assessment or an Initial Determination of Threat Assessment and Immediate Revocation or apply for a waiver: (a) For a hazardous materials endorsement (HME) as described in 49 CFR part 1572. E:\FR\FM\22MYP2.SGM 22MYP2 29450 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules (b) For a Transportation Worker Identification Credential (TWIC) as described in 49 CFR part 1572. § 1515.3 Terms used in this part. The terms used in 49 CFR parts 1500, 1540, 1570, and 1572 also apply in this part. In addition, the following terms are used in this part: Applicant means a person who has applied for one of the security threat assessments identified in § 1515.1. Date of service means— (1) In the case of personal service, the date of personal delivery to the residential address listed on the application; (2) In the case of mailing with a certificate of service, the date shown on the certificate of service; (3) In the case of mailing and there is no certificate of service, 10 days from the date mailed to the address designated on the application as the mailing address; (4) In the case of mailing with no certificate of service or postmark, the date mailed to the address designated on the application as the mailing address shown by other evidence; or (5) The date on which an electronic transmission occurs. Day means calendar day. Security threat assessment means the threat assessment for which the applicant has applied, as described in § 1515.1. sroberts on PROD1PC70 with PROPOSALS § 1515.5 Appeal procedures. (a) Scope. This section applies to appeals from an Initial Determination of Threat— (1) For a hazardous materials endorsement (HME) as described in 49 CFR 1572.15. (2) For a Transportation Worker Identification Credential (TWIC) as described in 49 CFR 1572.15. (b) Grounds for appeal. An applicant may appeal an Initial Determination of Threat Assessment if the applicant is asserting that he or she meets the standards for the security threat assessment for which he or she is applying. (c) Appeal—(1) Initiating an appeal. An applicant initiates an appeal by submitting a written reply to TSA or written request for materials from TSA. If the applicant does not initiate an appeal within 60 days of receipt, the Initial Determination of Threat Assessment becomes final. TSA then serves a Final Determination of Threat Assessment on the applicant. (i) In the case of an HME, TSA also serves a Final Determination of Threat Assessment on the licensing State. (ii) In the case of a mariner applying for TWIC, TSA also serves a Final VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 Determination of Threat Assessment on the Coast Guard. (2) Request for materials. Within 60 days of the date of service of the Initial Determination of Threat Assessment, the applicant may serve upon TSA a written request for copies of the materials upon which the Initial Determination was based. (3) TSA response. (i) Within 60 days of receiving the applicant’s request for materials, TSA serves copies of the releasable materials upon the applicant on which the Initial Determination was based. TSA will not include any classified information or other protected information described in paragraph (f) of this section. (ii) Within 60 days of receiving the applicant’s request for materials or written reply, TSA may request additional information or documents from the applicant that TSA believes are necessary to make a Final Determination. (4) Correction of records. If the Initial Determination of Threat Assessment was based on a record that the applicant believes is erroneous, the applicant may correct the record, as follows: (i) The applicant contacts the jurisdiction or entity responsible for the information and attempts to correct or complete information contained in his or her record. (ii) The applicant provides TSA with the revised record, or a certified true copy of the information from the appropriate entity, before TSA determines that the applicant meets the standards for the security threat assessment. (5) Reply. (i) The applicant may serve upon TSA a written reply to the Initial Determination of Threat Assessment within 60 days of service of the Initial Determination, or 60 days after the date of service of TSA’s response to the applicant’s request for materials under paragraph (b)(1) of this section, if the applicant served such request. The reply must include the rationale and information on which the applicant disputes TSA’s Initial Determination. (ii) In an applicant’s reply, TSA will consider only material that is relevant to whether the applicant meets the standards described in 49 CFR 1572.5(a). (6) Final determination. Within 60 days after TSA receives the applicant’s reply, TSA serves a Final Determination of Threat Assessment or a Withdrawal of the Initial Determination as provided in paragraphs (c) or (d) of this section. (d) Final Determination of Threat Assessment. (1) If the Director concludes that the applicant does not meet the standards described in 49 CFR PO 00000 Frm 00056 Fmt 4701 Sfmt 4702 1572.5(a)(1), (a)(2), or (a)(4) following an appeal, TSA serves a Final Determination of Threat Assessment upon the applicant. In addition— (i) In the case of an HME, TSA serves a Final Determination of Threat Assessment on the licensing State. (ii) In the case of a mariner applying for TWIC, TSA serves a Final Determination of Threat Assessment on the Coast Guard. (iii) In the case of a TWIC, TSA serves a Final Determination of Threat Assessment on the Federal Maritime Security Coordinator (FMSC). (2) If the Assistant Secretary concludes that the applicant does not meet the security threat assessment standards described in 49 CFR 1572.5(a)(3) following an appeal, TSA serves a Final Determination of Threat Assessment upon the applicant. In addition— (i) In the case of an HME, TSA serves a Final Determination of Threat Assessment on the licensing State. (ii) In the case of a mariner applying for TWIC, TSA serves a Final Determination of Threat Assessment on the Coast Guard. (iii) In the case of a TWIC, TSA serves a Final Determination of Threat Assessment on the FMSC. (3) The Final Determination includes a statement that the Director or Assistant Secretary has reviewed the Initial Determination, the applicant’s reply and any accompanying information, and any other materials or information available to him or her, and has determined that the applicant poses a security threat warranting denial of the security threat assessment for which the applicant has applied. (e) Withdrawal of Initial Determination. If the Director or Assistant Secretary concludes that the applicant does not pose a security threat, TSA serves a Withdrawal of the Initial Determination upon the applicant. (f) Nondisclosure of certain information. In connection with the procedures under this section, TSA does not disclose classified information to the applicant, as defined in Executive Order 12968 section 1.1(d), and reserves the right not to disclose any other information or material not warranting disclosure or protected from disclosure under law. (g) Extension of time. TSA may grant an applicant an extension of time of the limits described in this section for good cause shown. An applicant’s request for an extension of time must be in writing and be received by TSA within a reasonable time before the due date to E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules be extended. TSA may grant itself an extension of time for good cause. (h) Judicial review. For purposes of judicial review, the Final Determination of Threat Assessment constitutes a final TSA order in accordance with 49 U.S.C. 46110. (i) Appeal of immediate revocation. If TSA directs an immediate revocation, the applicant may appeal this determination by following the appeal procedures described in paragraph (b) of this section. This applies to— (1) If TSA directs a State to revoke an HME pursuant to 49 CFR 1572.13(a). (2) If TSA invalidates a TWIC by issuing an Initial Determination of Threat Assessment and Immediate Revocation pursuant to 49 CFR 1572.21(d)(3). sroberts on PROD1PC70 with PROPOSALS § 1515.7 Waiver procedures. (a) Scope. This section applies if an applicant does not meet certain standards for a security threat assessment but wishes to obtain a waiver of those standards, for— (1) For a hazardous materials endorsement (HME) as described in 49 CFR part 1572. (2) For a Transportation Worker Identification Credential (TWIC) as described in 49 CFR part 1572. (b) Grounds for waiver. TSA may issue a waiver of certain standards and grant an HME or TWIC, if TSA determines that an applicant no longer poses a security threat based on a review of information described in paragraph (c) of this section. An applicant disqualified for the reasons described in paragraphs (b)(1) through (b)(3) of this section may apply for a waiver of the standards. (1) A disqualifying criminal offense described in 49 CFR 1572.103(a)(5) through (a)(9), and § 1572.103(a)(10), if the underlying criminal offense is in §§ 1572.103 (a)(5) through (a)(9); or (2) A disqualifying criminal offense described in 49 CFR 1572.103(b); or (3) Mental incapacity as described in 49 CFR 1572.109. (c) Initiating waiver. (1) An applicant initiates a waiver request by— (i) Providing the information required in 49 CFR 1572.9 for an HME or 49 CFR 1572.17 for a TWIC; (ii) Paying the fees required in 49 CFR 1572.405 (a)(1) through (a)(3) for an HME or in 49 CFR 1572.503(a)(1)(i) through (a)(1)(iii) for a TWIC; and (iii) Sending a written request to TSA for a waiver at any time, but not later than 60 days after the date of service of the Final Determination of Threat Assessment. (2) In determining whether to grant a waiver, TSA will consider the following factors: VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 (i) The circumstances of the disqualifying act or offense. (ii) Restitution made by the applicant. (iii) Any Federal or State mitigation remedies. (iv) Court records or official medical release documents indicating that the individual no longer lacks mental capacity. (v) Other factors that indicate the applicant does not pose a security threat warranting denial of the HME or TWIC. (d) Grant or denial of waivers. (1) The Director will send a written decision granting or denying the waiver to the applicant within 60 days of service the applicant’s request for a waiver, or longer period as TSA may determine for good cause. (2) In the case of an HME, if the Director grants the waiver, the Director will send a Determination of No Security Threat to the licensing State within 60 days of service the applicant’s request for a waiver, or longer period as TSA may determine for good cause. (3) In the case of a mariner applying for TWIC, if the Director grants the waiver, the Director will send a Determination of No Security Threat to the Coast Guard within 60 days of service the applicant’s request for a waiver, or longer period as TSA may determine for good cause. (e) Extension of time. TSA may grant an applicant an extension of time of the limits described in paragraph (b) and (c) of this section for good cause shown. An applicant’s request for an extension of time must be in writing and be received by TSA within a reasonable time before the due date to be extended. TSA may grant itself an extension of time for good cause. Subchapter D—Maritime and Land Transportation Security 64. Revise part 1570 to read as follows: PART 1570—GENERAL RULES Sec. 1570.1 Scope. 1570.3 Terms used in this subchapter. 1570.5 Fraud and intentional falsification of records. Authority: 46 U.S.C. 70105; 49 U.S.C. 114, 5103a, 40113, and 46105; 18 U.S.C. 842, 845; 6 U.S.C. 469. § 1570.1 Scope. This part applies to any person involved in land or maritime transportation as specified in this part. § 1570.3 Terms used in this subchapter. For purposes of this subchapter: Adjudicate means to make an administrative determination of whether PO 00000 Frm 00057 Fmt 4701 Sfmt 4702 29451 an applicant meets the standards in this subchapter, based on the merits of the issues raised. Alien means any person not a citizen or national of the United States. Alien registration number means the number issued by the U.S. Department of Homeland Security to an individual when he or she becomes a lawful permanent resident of the United States or attains other lawful, non-citizen status. Applicant means a person who has applied for one of the security threat assessments identified in this subchapter. Assistant Secretary means Assistant Secretary for Homeland Security, Transportation Security Administration (Assistant Secretary), the highest ranking TSA official, or his or her designee, and who is responsible for making the final determination on the appeal of an intelligence-related check under this part. Commercial drivers license (CDL) is used as defined in 49 CFR 383.5. Convicted means any plea of guilty or nolo contendere, or any finding of guilt, except when the finding of guilt is subsequently overturned on appeal, pardoned, or expunged. For purposes of this subchapter, a conviction is expunged when the conviction is removed from the individual’s criminal history record and there are no legal disabilities or restrictions associated with the expunged conviction, other than the fact that the conviction may be used for sentencing purposes for subsequent convictions. In addition, where an individual is allowed to withdraw an original plea of guilty or nolo contendere and enter a plea of not guilty and the case is subsequently dismissed, the individual is no longer considered to have a conviction for purposes of this subchapter. Determination of No Security Threat means an administrative determination by TSA that an individual does not pose a security threat warranting denial of an HME or a TWIC. Director means the officer designated by the Assistant Secretary to administer the appeal and waiver programs described in this part, except where the Assistant Secretary is specifically designated in this part to administer the appeal or waiver program. The Director may appoint a designee to assume his or her duties. Federal Maritime Security Coordinator (FMSC) has the same meaning as defined in 46 U.S.C. 70103(a)(2)(G); is the Captain of the Port (COTP) exercising authority for the COTP zones described in 33 CFR part 3, and is the Port Facility Security Officer E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS 29452 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules as described in the International Ship and Port Facility Security (ISPS) Code, part A. Final Determination of Threat Assessment means a final administrative determination by TSA, including the resolution of related appeals, that an individual poses a security threat warranting denial of an HME or a TWIC. Hazardous materials endorsement (HME) means the authorization for an individual to transport hazardous materials in commerce, an indication of which must be on the individual’s commercial driver’s license, as provided in the Federal Motor Carrier Safety Administration (FMCSA) regulations in 49 CFR part 383. Imprisoned or imprisonment means confined to a prison, jail, or institution for the criminally insane, on a full-time basis, pursuant to a sentence imposed as the result of a criminal conviction or finding of not guilty by reason of insanity. Time spent confined or restricted to a half-way house, treatment facility, or similar institution, pursuant to a sentence imposed as the result of a criminal conviction or finding of not guilty by reason of insanity, does not constitute imprisonment for purposes of this rule. Incarceration means confined or otherwise restricted to a jail-type institution, half-way house, treatment facility, or another institution, on a full or part-time basis, pursuant to a sentence imposed as the result of a criminal conviction or finding of not guilty by reason of insanity. Initial Determination of Threat Assessment means an initial administrative determination by TSA that an individual poses a security threat warranting denial of an HME or a TWIC. Initial Determination of Threat Assessment and Immediate Revocation means an initial administrative determination that an individual poses a security threat that warrants immediate revocation of an HME or invalidation of a TWIC. In the case of an HME, the State must immediately revoke the HME if TSA issues an Initial Determination of Threat Assessment and Immediate Revocation. In the case of a TWIC, TSA invalidates the TWIC when TSA issues an Initial Determination of Threat Assessment and Immediate Revocation. Invalidate means the action TSA takes to make a credential inoperative when it is reported as lost, stolen, damaged, no longer needed, or when TSA determines an applicant does not meet the security threat assessment standards of 49 CFR part 1572. VerDate Aug<31>2005 20:38 May 19, 2006 Jkt 208001 Lawful permanent resident means an individual, lawfully admitted to the United States for permanent residence, as defined in 8 U.S.C. 1101. Maritime facility has the same meaning as ‘‘facility’’ together with ‘‘OCS facility’’ (Outer Continental Shelf facility), as defined in 33 CFR 101.105. Mental health facility means a mental institution, mental hospital, sanitarium, psychiatric facility, and any other facility that provides diagnoses by licensed professionals of mental retardation or mental illness, including a psychiatric ward in a general hospital. Owner/operator with respect to a maritime facility or a vessel has the same meaning as defined in 33 CFR 101.105. Revocation means the termination, deactivation, rescission, invalidation, cancellation, or withdrawal of the privileges and duties conferred by an HME or TWIC, when TSA determines an applicant does not meet the security threat assessment standards of 49 CFR part 1572. Secure area means the area on board a vessel or at a facility or outer continental shelf facility, over which the owner/operator has implemented security measures for access control, as defined by a Coast Guard approved security plan. It does not include passenger access areas or public access areas, as those terms are defined in 33 CFR 104.106 and 105.106 respectively. Security threat means an individual whom TSA determines or suspects of posing a threat to national security; to transportation security; or of terrorism. Sensitive security information (SSI) means information that is described in, and must be managed in accordance with, 49 CFR part 1520. State means a State of the United States and the District of Columbia. Transportation Worker Identification Credential (TWIC) means a Federal biometric credential, issued to an individual, when TSA determines that the individual does not pose security threat. Withdrawal of Initial Determination of Threat Assessment is the document that TSA issues after issuing an Initial Determination of Security Threat, when TSA determines that an individual does not pose a security threat, warranting denial of an HME or TWIC. § 1570.5 Fraud and intentional falsification of records. No person may make, or cause to be made, any of the following: (a) Any fraudulent or intentionally false statement in any record or report that is kept, made, or used to show compliance with the subchapter, or PO 00000 Frm 00058 Fmt 4701 Sfmt 4702 exercise any privileges under this subchapter. (b) Any reproduction or alteration, for fraudulent purpose, of any record, report, security program, access medium, or identification medium issued under this subchapter or pursuant to standards in this subchapter. 65. Revise part 1572 to read as follows: PART 1572—CREDENTIALING AND SECURITY THREAT ASSESSMENTS Subpart A—Procedures and General Standards Sec. 1572.1 Applicability. 1572.3 Scope. 1572.5 Standards for security threat assessments. 1572.7 Waiver of security threat assessment standards. 1572.9 Applicant information required for HME security threat assessment. 1572.11 Applicant responsibilities for HME security threat assessment. 1572.13 State responsibilities for issuance of hazardous materials endorsement. 1572.15 Procedures for HME security threat assessment. 1572.17 Applicant information required for TWIC security threat assessment. 1572.19 Applicant responsibilities for a TWIC security threat assessment. 1572.21 Procedures for TWIC security threat assessment. 1572.23 Conforming equipment; Incorporation by reference. 1572.24–1572.40 [Reserved] 1572.41 Compliance, inspection, and enforcement. Subpart B—Qualification Standards for Security Threat Assessments 1572.101 Scope. 1572.103 Disqualifying criminal offenses. 1572.105 Immigration status. 1572.107 Other analyses. 1572.109 Mental incapacity. 1572.111–1572.139 [Reserved] Subpart C—Transportation of Explosives From Canada to the United States 1572.201 Via commercial motor vehicle. 1572.203 Via railroad carrier. Subpart D—[Reserved] Subpart E—Fees for Security Threat Assessments for Hazmat Drivers 1572.400 Scope and definitions. 1572.401 Fee collection options. 1572.403 Procedures for collection by States. 1572.405 Procedures for collection by TSA. Subpart F—Fees for Security Threat Assessments for Transportation Worker Identification Credential (TWIC) 1572.500 Scope. 1572.501 Fee collection. 1572.503 Fee procedures for collection by TSA or its agent. E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules Authority: 46 U.S.C. 70105; 49 U.S.C. 114, 5103a, 40113, and 46105; 18 U.S.C. 842, 845; 6 U.S.C. 469. Subpart A—Procedures and General Standards § 1572.1 Applicability. This part establishes regulations for credentialing and security threat assessments for certain maritime and land transportation workers. § 1572.3 Scope. This part applies to— (a) State agencies responsible for issuing a hazardous materials endorsement (HME); and (b) An applicant who— (1) Is qualified to hold a commercial driver’s license under 49 CFR parts 383 and 384, and is applying to obtain, renew, or transfer an HME; or (2) Is applying to obtain or renew a TWIC in accordance with 33 CFR parts 104 through 106 or 46 CFR part 10; sroberts on PROD1PC70 with PROPOSALS § 1572.5 Standards for security threat assessments. (a) Standards. TSA determines that an applicant poses a security threat warranting denial of an HME or TWIC, if— (1) The applicant has a disqualifying criminal offense described in § 1572.103; (2) The applicant does not meet the immigration status requirements described in § 1572.105; (3) TSA conducts the analyses described in § 1572.107 and determines that the applicant poses a security threat; or (4) The applicant has been adjudicated as lacking mental capacity or committed to a mental health facility, as described in § 1572.109. (b) Immediate revocation/ invalidation. TSA may invalidate a TWIC or direct a State to revoke an HME immediately, if TSA determines during the security threat assessment that an applicant poses an immediate threat to transportation security, national security, or of terrorism. (c) Violation of FMCSA standards. The regulations of the Federal Motor Carrier Safety Administration (FMCSA) provide that an applicant is disqualified from operating a commercial motor vehicle for specified periods, if he or she has an offense that is listed in the FMCSA rules at 49 CFR 383.51. If records indicate that an applicant has committed an offense that would disqualify the applicant from operating a commercial motor vehicle under 49 CFR 383.51, TSA will not issue a Determination of No Security Threat until the State or the FMCSA determine VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 that the applicant is not disqualified under that section. (d) Comparability of other security threat assessment standards. TSA may determine that security threat assessments conducted by other governmental agencies are comparable to the threat assessment described in this part, which TSA conducts for HME and TWIC applicants. (1) In making a comparability determination, TSA will consider— (i) The minimum standards used for the security threat assessment; (ii) The frequency of the threat assessment; (iii) The date of the most recent threat assessment; and (iv) Whether the threat assessment includes biometric identification and a biometric credential. (2) To apply for a comparability determination, the agency seeking the determination must contact the Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment Program, Transportation Security Administration, 601 South 12th Street, Arlington, VA 22202–4220. (3) TSA will notify the public when a comparability determination is made. (4) An applicant, who has completed a security threat assessment that is determined to be comparable under this section to the threat assessment described in this part, must complete the enrollment process and provide biometric information to obtain a TWIC, if the applicant seeks unescorted access to a secure area of a vessel or facility. The applicant must pay the fee listed in § 1572.503 for information collection/ credential issuance. (5) TSA has determined that the security threat assessment for an HME under this part is comparable to the security threat assessment for TWIC. (6) TSA has determined that the security threat assessment for a FAST card, under the Free and Secure Trade program administered by the U.S. Customs and Border Protection, is comparable to the security threat assessment described in this part. § 1572.7 Waiver of security threat assessment standards. (a) An applicant may apply to TSA for a waiver of the standards described in § 1572.5, if the applicant— (1) Has a disqualifying criminal offense described in § 1572.103(a)(5) through (a)(9), and § 1572.103 (a)(10), if the underlying criminal offense is in § 1572.103 (a)(5) through (a)(9); or (2) Has a disqualifying criminal offense described in § 1572.103(b); or (3) Has a history of mental incapacity described in § 1572.109. PO 00000 Frm 00059 Fmt 4701 Sfmt 4702 29453 (b) HME and TWIC applicants must follow the procedures described in 49 CFR 1515.7 when applying for a waiver. § 1572.9 Applicant information required for HME security threat assessment. An applicant must supply the information required in this section, in a form acceptable to TSA, when applying to obtain or renew an HME. When applying to transfer an HME from one State to another, § 1572.13(e) applies. (a) The applicant must provide the following identifying information: (1) Legal name, including first, middle, and last; any applicable suffix; and any other name used previously. (2) Current and previous mailing address, current residential address if it differs from the current mailing address, and email address. (3) Date of birth. (4) Social security number. Providing the social security number is voluntary; however, failure to provide it will delay and may prevent completion of the threat assessment. (5) Gender. (6) Height, weight, hair color, and eye color. (7) City, state, and country of birth. (8) Immigration status and, if the applicant is a naturalized citizen of the United States, the date of naturalization. (9) Alien registration number, if applicable. (10) The State of application, CDL number, and type of HME(s) held. (11) Name, telephone number, facsimile number, and address of the applicant’s current employer(s), if the applicant’s work for the employer(s) requires an HME. (b) The applicant must provide a statement, signature, and date of signature that he or she— (1) Was not convicted, or found not guilty by reason of insanity, of a disqualifying crime listed in § 1572.103(b), in a civilian or military jurisdiction, during the seven years before the date of the application; (2) Was not released from incarceration, in a civilian or military jurisdiction, for committing a disqualifying crime listed in § 1572.103(b), during the five years before the date of the application; (3) Is not wanted, or under indictment, in a civilian or military jurisdiction, for a disqualifying criminal offense identified in § 1572.103; (4) Was not convicted, or found not guilty by reason of insanity, of a disqualifying criminal offense identified in § 1572.103(a), in a civilian or military jurisdiction; E:\FR\FM\22MYP2.SGM 22MYP2 29454 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules (5) Has not been adjudicated as lacking mental capacity or committed to a mental health facility involuntarily; (6) Meets the immigration status requirements described in § 1572.105; (7) Has or has not served in the military, and if so, the branch in which he or she served, the date of discharge, and the type of discharge; and (8) Has been informed that Federal regulations, under § 1572.11, impose a continuing obligation on the HME holder to disclose to the State if he or she is convicted, or found not guilty by reason of insanity, of a disqualifying crime, adjudicated as lacking mental capacity, or committed to a mental health facility. (c) The applicant must certify and date receipt the following statement: Privacy Act Notice: Authority: The authority for collecting this information is 49 U.S.C. 114, 40113, and 5103a. Purpose: This information is needed to verify your identity and to conduct a security threat assessment to evaluate your suitability for a hazardous materials endorsement for a commercial driver’s license. Furnishing this information, including your SSN or alien registration number, is voluntary; however, failure to provide it will delay and may prevent completion of your security threat assessment. Routine Uses: Routine uses of this information include disclosure to the FBI to retrieve your criminal history record; to TSA contractors or other agents who are providing services relating to the security threat assessments; to appropriate governmental agencies for licensing, law enforcement, or security purposes, or in the interests of national security; and to foreign and international governmental authorities in accordance with law and international agreement. (d) The applicant must certify and date receipt the following statement, immediately before the signature line: The information I have provided on this application is true, complete, and correct, to the best of my knowledge and belief, and is provided in good faith. I understand that a knowing and willful false statement, or an omission of a material fact on this application can be punished by fine or imprisonment or both (See section 1001 of Title 18 United States Code), and may be grounds for denial of a hazardous materials endorsement. (e) The applicant must certify the following statement in writing: sroberts on PROD1PC70 with PROPOSALS I acknowledge that if the Transportation Security Administration determines that I pose a security threat, my employer, as listed on this application, may be notified. § 1572.11 Applicant responsibilities for HME security threat assessment. (a) Surrender of HME. If an individual is disqualified from holding an HME under § 1572.5(c), he or she must surrender the HME to the licensing VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 State. Failure to surrender the HME to the State may result in immediate revocation under § 1572.13(a) and/or civil penalties. (b) Continuing responsibilities. An individual who holds an HME must surrender the HME as required in paragraph (a) of this section within 24 hours, if the individual— (1) Is convicted of, wanted, under indictment or complaint, or found not guilty by reason of insanity, in a civilian or military jurisdiction, for a disqualifying criminal offense identified in § 1572.103; or (2) Is adjudicated as lacking mental capacity, or committed to a mental health facility, as described in § 1572.109; or (3) Renounces or loses U.S. citizenship or status as a lawful permanent resident; or (4) Violates his or her immigration status, and/or is ordered removed from the United States. (c) Submission of fingerprints and information. (1) An HME applicant must submit fingerprints and the information required in § 1572.9, in a form acceptable to TSA, when so notified by the State, or when the applicant applies to obtain or renew an HME. The procedures outlined in § 1572.13(e) apply to HME transfers. (2) When submitting fingerprints and the information required in § 1572.9, the fee described in § 1572.503 must be remitted to TSA. for 90 days, if TSA has not provided a Determination of No Security Threat or a Final Determination of Threat Assessment before the expiration date. Any additional extension must be approved in advance by TSA. (d) Within 15 days of receipt of a Determination of No Security Threat or Final Determination of Threat Assessment from TSA, the State must— (1) Update the applicant’s permanent record to reflect: (i) The results of the security threat assessment; (ii) The issuance or denial of an HME; and (iii) The new expiration date of the HME. (2) Notify the Commercial Drivers License Information System operator of the results of the security threat assessment. (3) Revoke or deny the applicant’s HME if TSA serves the State with a Final Determination of Threat Assessment. (e) For applicants who apply to transfer an existing HME from one State to another, the second State will not require the applicant to undergo a new security threat assessment until the security threat assessment renewal period established in the preceding issuing State, not to exceed five years, expires. (f) Each State must retain the application and information required in § 1572.9, for at least one year, in paper or electronic form. § 1572.13 State responsibilities for issuance of hazardous materials endorsement. § 1572.15 Procedures for HME security threat assessment. Each State must revoke an individual’s HME immediately, if TSA informs the State that the individual does not meet the standards for security threat assessment in § 1572.5 and issues an Initial Determination of Threat Assessment and Immediate Revocation. (a) No State may issue or renew an HME for a CDL, unless the State receives a Determination of No Security Threat from TSA. (b) Each State must notify each individual holding an HME issued by that State that he or she will be subject to the security threat assessment described in this part as part of an application for renewal of the HME, at least 60 days prior to the expiration date of the individual’s HME. The notice must inform the individual that he or she may initiate the security threat assessment required by this section at any time after receiving the notice, but no later than 60 days before the expiration date of the individual’s HME. (c) The State that issued an HME may extend the expiration date of the HME (a) Contents of security threat assessment. The security threat assessment TSA completes includes a fingerprint-based criminal history records check, an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint-based criminal history records check, the following procedures must be completed: (1) The State notifies the applicant that he or she will be subject to the security threat assessment at least 60 days prior to the expiration of the applicant’s HME, and that the applicant must begin the security threat assessment no later than 30 days before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and applicant information, the State— (i) Collects fingerprints and applicant information required in § 1572.9; (ii) Provides the applicant information to TSA electronically, unless otherwise authorized by TSA; PO 00000 Frm 00060 Fmt 4701 Sfmt 4702 E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules (iii) Transmits the fingerprints to the FBI/Criminal Justice Information Services (CJIS), in accordance with the FBI/CJIS fingerprint submission standards; and (iv) Retains the signed application, in paper or electronic form, for one year and provides it to TSA, if requested. (3) Where the State elects to have a TSA agent collect fingerprints and applicant information— (i) TSA provides a copy of the signed application to the State; (ii) The State retains the signed application, in paper or electronic form, for one year and provides it to TSA, if requested; and (iii) TSA transmits the fingerprints to the FBI/CJIS, in accordance with the FBI/CJIS fingerprint submission standards. (4) TSA receives the results from the FBI/CJIS and adjudicates the results of the check, in accordance with § 1572.103 and, if applicable, § 1572.107. (c) Intelligence-related check. To conduct an intelligence-related check, TSA completes the following procedures: (1) Reviews the applicant information required in § 1572.9. (2) Searches domestic and international Government databases described in §§ 1572.105, 1572.107, and 1572.109. (3) Adjudicates the results of the check in accordance with §§ 1572.103, 1572.105, 1572.107, and 1572.109. (d) Final disposition. Following completion of the procedures described in paragraphs (b) and/or (c) of this section, the following procedures apply, as appropriate: (1) TSA serves a Determination of No Security Threat on the State in which the applicant is authorized to hold an HME, if TSA determines that an applicant meets the security threat assessment standards described in § 1572.5. (2) TSA serves an Initial Determination of Threat Assessment on the applicant, if TSA determines that the applicant does not meet the security threat assessment standards described in § 1572.5. The Initial Determination of Threat Assessment includes— (i) A statement that TSA has determined that the applicant poses a security threat warranting denial of the HME; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the determination, as described in 49 CFR 1515.5; and (iv) A statement that if the applicant chooses not to appeal TSA’s determination within 60 days of receipt VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 of the Initial Determination, or does not request an extension of time within 60 days of receipt of the Initial Determination in order to file an appeal, the Initial Determination becomes a Final Determination of Security Threat Assessment. (3) TSA serves an Initial Determination of Threat Assessment and Immediate Revocation on the applicant, the applicant’s employer where appropriate, and the State, if TSA determines that the applicant does not meet the security threat assessment standards described in § 1572.5 and may pose an imminent threat to transportation or national security, or of terrorism. The Initial Determination of Threat Assessment and Immediate Revocation includes— (i) A statement that TSA has determined that the applicant poses a security threat warranting immediate revocation of an HME; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the determination, as described in 49 CFR 1515.5(h); and (iv) A statement that if the applicant chooses not to appeal TSA’s determination within 60 days of receipt of the Initial Determination and Immediate Revocation, the Initial Determination and Immediate Revocation becomes a Final Determination of Threat Assessment. (4) TSA serves a Final Determination of Threat Assessment on the State in which the applicant applied for the HME, the applicant’s employer where appropriate, and on the applicant, if the appeal of the Initial Determination results in a finding that the applicant poses a security threat. (5) TSA serves a Withdrawal of the Initial Determination of Threat Assessment or a Withdrawal of Final Determination of Threat Assessment on the applicant, and a Determination of No Security Threat on the State and the employer if appropriate, if the appeal results in a finding that the applicant does not pose a security threat, or if TSA grants the applicant a waiver pursuant to 49 CFR 1515.7. § 1572.17 Applicant information required for TWIC security threat assessment. An applicant must supply the information required in this section, in a form acceptable to TSA, when applying to obtain or renew a TWIC. (a) The applicant must provide the following identifying information: (1) Legal name, including first, middle, and last; any applicable suffix; and any other name used previously. (2) Current and previous mailing address, current residential address if it PO 00000 Frm 00061 Fmt 4701 Sfmt 4702 29455 differs from the current mailing address, and email address if available. (3) Date of birth. (4) Social security number. Providing the social security number is voluntary; however, failure to provide it will delay and may prevent completion of the threat assessment. (5) Gender. (6) Height, weight, hair color, and eye color. (7) City, state, and country of birth. (8) Immigration status and, if the applicant is a naturalized citizen of the United States, the date of naturalization. (9) Alien registration number, if applicable. (10) The reason that the applicant requires a TWIC, including the applicant’s job description and the primary facility, vessel, or port location(s) where the applicant will most likely require unescorted access, if known. This statement does not limit access to other facilities, vessels, or ports, but establishes eligibility for a TWIC. (11) The name, telephone number, and address of the applicant’s current employer(s), if working for the employer requires a TWIC. An applicant whose current employer does not require possession of a TWIC, does not have a single employer, or is self-employed, must provide the primary vessel or port location(s) where the applicant requires unescorted access, if known. This statement does not limit access to other facilities, vessels, or ports, but establishes eligibility for a TWIC. (b) The applicant must provide a statement, signature, and date of signature that he or she— (1) Was not convicted, or found not guilty by reason of insanity, of a disqualifying crime listed in § 1572.103(b), in a civilian or military jurisdiction, during the seven years before the date of the application; (2) Was not released from incarceration, in a civilian or military jurisdiction, for committing a disqualifying crime listed in § 1572.103(b), during the five years before the date of the application; (3) Is not wanted, or under indictment, in a civilian or military jurisdiction, for a disqualifying criminal offense identified in § 1572.103; (4) Was not convicted, or found not guilty by reason of insanity, of a disqualifying criminal offense identified in § 1572.103(a), in a civilian or military jurisdiction; (5) Has not been adjudicated as lacking mental capacity, or committed to a mental health facility involuntarily; (6) Meets the immigration status requirements described in § 1572.105; E:\FR\FM\22MYP2.SGM 22MYP2 29456 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules (7) Has, or has not, served in the military, and if so, the branch in which he or she served, the date of discharge, and the type of discharge; and (8) Has been informed that Federal regulations under § 1572.19 impose a continuing obligation on the TWIC holder to disclose to TSA if he or she is convicted, or found not guilty by reason of insanity, of a disqualifying crime, adjudicated as lacking mental capacity, or committed to a mental health facility. (c) Applicants, applying to obtain or renew a TWIC, must submit biometric information to be used for identity verification purposes. If an individual cannot provide the selected biometric, TSA will collect an alternative biometric identifier. (d) The applicant must certify and date receipt the following statement: Privacy Act Notice: Authority: The authority for collecting this information is 49 U.S.C. 114, 40113, and 5103a. Purpose: This information is needed to verify your identity and to conduct a security threat assessment to evaluate your suitability for a Transportation Worker Identification Credential. Furnishing this information, including your SSN or alien registration number, is voluntary; however, failure to provide it will delay and may prevent completion of your security threat assessment. Routine Uses: Routine uses of this information include disclosure to the FBI to retrieve your criminal history record; to TSA contractors or other agents who are providing services relating to the security threat assessments; to appropriate governmental agencies for licensing, law enforcement, or security purposes, or in the interests of national security; and to foreign and international governmental authorities in accordance with law and international agreement. (e) The applicant must certify the following statement in writing: As part of my employment duties, I am required to have unescorted access to secure areas of maritime facilities or vessels in which a Transportation Worker Identification Credential is required; or I am now, or I am applying to be, a credentialed merchant mariner. (f) The applicant must certify and date receipt the following statement, immediately before the signature line: The information I have provided on this application is true, complete, and correct, to the best of my knowledge and belief, and is provided in good faith. I understand that a knowing and willful false statement, or an omission of a material fact on this application, can be punished by fine or imprisonment or both (see section 1001 of Title 18 United States Code), and may be grounds for denial of a Transportation Worker Identification Credential. (g) The applicant must certify the following statement in writing: I acknowledge that if the Transportation Security Administration determines that I pose a security threat, my employer, as listed on this application, may be notified. § 1572.19 Applicant responsibilities for a TWIC security threat assessment. (a) Implementation schedule. Except as provided in paragraph (b) of this section, applicants must provide the information required in § 1572.17, when so directed by the owner/operator and consistent with table 1 to this paragraph. The Group Numbers are listed in table 1. TABLE 1 TO PARAGRAPH (A)—IMPLEMENTATION SCHEDULE Start date sroberts on PROD1PC70 with PROPOSALS Group 1 Group 2 Group 3 End date Effective Date of rule ...... After Group 1 .................. After Group 2 .................. Not later than 10 months after effective date of rule, unless otherwise authorized by TSA. Not later than 15 months after effective date of rule, unless otherwise authorized by TSA. Not later than 18 months after effective date of rule, unless otherwise authorized by TSA. (b) Implementation schedule for certain mariners. An applicant, who holds a Merchant Mariner Document (MMD) issued after February 3, 2003, and before [the effective date of this rule], or a Merchant Marine License (License) issued after January 13, 2006, and before [the effective date of this rule], must submit the information required in this section, but is not required to undergo the security threat assessment described in this part. (c) Surrender of TWIC. If an individual is disqualified from holding a TWIC under § 1572.5, he or she must surrender the TWIC to TSA. Failure to surrender the TWIC to TSA may result in immediate revocation under § 1572.5(b) and/or civil penalties. (d) Continuing responsibilities. An individual who holds a TWIC must surrender the TWIC, as required in paragraph (a) of this section, within 24 hours if the individual— (1) Is convicted of, wanted, under indictment or complaint, or found not guilty by reason of insanity, in a civilian or military jurisdiction, for a disqualifying criminal offense identified in § 1572.103; or VerDate Aug<31>2005 20:38 May 19, 2006 Jkt 208001 (2) Is adjudicated as lacking mental capacity or committed to a mental health facility, as described in § 1572.109; or (3) Renounces or loses U.S. citizenship or status as a lawful permanent resident; or (4) Violates his or her immigration status and/or is ordered removed from the United States. (e) Submission of fingerprints and information. (1) TWIC applicants must submit fingerprints and the information required in § 1572.17, in a form acceptable to TSA, to obtain or renew a TWIC. (2) When submitting fingerprints and the information required in § 1572.17, the fee required in § 1572.503 must be remitted to TSA. (f) Lost or stolen credentials. If a TWIC holder loses possession of the credential, he or she must notify TSA immediately. § 1572.21 Procedures for TWIC security threat assessment. (a) Contents of security threat assessment. The security threat assessment TSA conducts includes a fingerprint-based criminal history PO 00000 Frm 00062 Fmt 4701 Sfmt 4702 records check, an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprintbased criminal history records check: (1) Consistent with the implementation schedule described in § 1572.19(a) and (b), and as required in 33 CFR 104.200, 105.200, or 106.200, applicants are notified (2) During enrollment, TSA— (i) Collects fingerprints, applicant information, and the fee required in § 1572.17; (ii) Transmits the fingerprints to the FBI/CJIS in accordance with the FBI/ CJIS fingerprint submission standards. (iii) Receives and adjudicates the results of the check from FBI/CJIS, in accordance with § 1572.103 and, if applicable, § 1572.107. (c) Intelligence-related check. To conduct an intelligence-related check, TSA completes the following procedures: (1) Reviews the applicant information required in § 1572.17; (2) Searches domestic and international Government databases required to determine if the applicant E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules meets the requirements of §§ 1572.105, 1572.107, and 1572.109; (3) Adjudicates the results of the check in accordance with §§ 1572.103, 1572.105, 1572.107, and 1572.109. (d) Final disposition. Following completion of the procedures described in paragraphs (b) and/or (c) of this section, the following procedures apply, as appropriate: (1) TSA serves a Determination of No Security Threat on the applicant if TSA determines that the applicant meets the security threat assessment standards described in § 1572.5. In the case of a mariner, TSA also serves a Determination of No Security Threat on the Coast Guard. (2) TSA serves an Initial Determination of Threat Assessment on the applicant if TSA determines that the applicant does not meet the security threat assessment standards described in § 1572.5. The Initial Determination of Threat Assessment includes— (i) A statement that TSA has determined that the applicant poses a security threat warranting denial of the TWIC; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the determination, as described in 49 CFR 1515.5; and (iv) A statement that if the applicant chooses not to appeal TSA’s determination within 60 days of receipt of the Initial Determination, or does not request an extension of time within 60 days of receipt of the Initial Determination in order to file an appeal, the Initial Determination becomes a Final Determination of Security Threat Assessment. (3) TSA serves an Initial Determination of Threat Assessment and Immediate Revocation on the applicant, the applicant’s employer where appropriate, the FMSC, and in the case of a mariner applying for a TWIC, on the Coast Guard, if TSA determines that the applicant does not meet the security threat assessment standards described in § 1572.5 and may pose an imminent security threat. The Initial Determination of Threat Assessment and Immediate Revocation includes— (i) A statement that TSA has determined that the applicant poses a security threat warranting immediate revocation of a TWIC and unescorted access to secure areas; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the determination, as described in 49 CFR 1515.5(h); and (iv) A statement that if the applicant chooses not to appeal TSA’s determination within 60 days of receipt VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 of the Initial Determination and Immediate Revocation, the Initial Determination and Immediate Revocation becomes a Final Determination of Threat Assessment. (4) TSA serves a Final Determination of Threat Assessment on the applicant, the applicant’s employer where appropriate, the FMSC, and in the case of a mariner applying for a TWIC, on the Coast Guard, if the appeal of the Initial Determination results in a finding that the applicant poses a security threat. (5) TSA serves a Withdrawal of the Initial Determination of Threat Assessment on the applicant. TSA serves a Withdrawal of Final Determination of Threat Assessment or a Determination of No Security Threat on the applicant, the applicant’s employer where appropriate, and in the case of a mariner applying for a TWIC, the Coast Guard, if the appeal results in a finding that the applicant does not pose a security threat, or if TSA grants the applicant a waiver pursuant to 49 CFR 1515.7. (e) Expiration date for a TWIC. A TWIC expires five years after it was issued, at the end of the month in which it was issued. § 1572.23 Conforming equipment; Incorporation by reference. Each owner/operator required to have access control systems and equipment, including card readers, in conjunction with TWIC, must meet TSA-approved standards. The standards are set forth in FIPS–201–1 Personal Identity Verification (PIV) of Federal Employees and Contractors, March, 2006, by the National Institute of Standards and Technology, U.S. Department of Commerce; Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems, Version 2.3, 2006, by the Physical Access Interagency Interoperability Working Group, approved by the Government Smart Card Interagency Advisory Board; and the TWIC Smart Card Reader Specification, Version 0.6, August 25, 2005. TSA plans to incorporate these standards by reference in the final rule. The Director of the Federal Register approves this incorporation by reference in accordance with 5 U.S.C. 552(a) and 1 CFR part 51. You may obtain copies from the Credentialing Program Office (Attn: TWIC Program), TSA–19, Transportation Security Administration, 601 South 12th Street, Arlington, VA 22202–4220; e-mail: credentialing@dhs.gov. You may inspect or make copies at: TSA’s Docket No. TSA–2006–24191, at https://dms.dot.gov, or by visiting the Docket Management Facility, U.S. Department of PO 00000 Frm 00063 Fmt 4701 Sfmt 4702 29457 Transportation, Room Plaza 401, 400 Seventh Street SW., Washington, DC 20590–0001; accessing the ‘‘Industry Standards of TWIC’’ portion of the Industry Partners/TSA Pilots & Programs section of TSA’s Web site at https://www.tsa.gov/public/; or at the National Archives and Records Administration (NARA). For information on the availability of this material at NARA, call 202–741–6030, or go to https://www.archives.gov/ federal_register/ code_of_federal_regulations/ ibr_locations.html. § 1572.24–1572.40 [Reserved] § 1572.41 Compliance, inspection, and enforcement. (a) Each owner/operator must allow TSA, at any time or place, to make any inspections or tests, including copying records, to determine compliance of an owner/operator with— (1) This subchapter and part 1520 of this chapter; and (2) 46 U.S.C. 70105 and 49 U.S.C. 114. (b) At the request of TSA, each owner/ operator must provide evidence of compliance with this part, including copies of records. Subpart B—Qualification Standards for Security Threat Assessments § 1572.101 Scope. This subpart applies to applicants who hold or are applying to obtain, renew, or transfer an HME or TWIC. Applicants for an HME are subject to safety requirements issued by the Federal Motor Carrier Safety Administration under 49 CFR part 383 and by the State issuing the HME, including additional immigration status and criminal history standards. § 1572.103 Disqualifying criminal offenses. (a) Permanent disqualifying criminal offenses. An applicant has a permanent disqualifying offense, if convicted, or found not guilty by reason of insanity, in a civilian or military jurisdiction of any of the following felonies: (1) Espionage or conspiracy to commit espionage. (2) Sedition, or conspiracy to commit sedition. (3) Treason, or conspiracy to commit treason. (4) A crime listed in 18 U.S.C. Chapter 113B—Terrorism, or a State law that is comparable, or conspiracy to commit such crime. (5) A crime involving a transportation security incident. A transportation security incident is a security incident resulting in a significant loss of life, environmental damage, transportation E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS 29458 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules system disruption, or economic disruption in a particular area, as defined in 46 U.S.C. 70101. A work stoppage, or other nonviolent employeerelated action, resulting from an employer-employee dispute is not a transportation security incident. (6) Improper transportation of a hazardous material under 49 U.S.C. 5124, or a State law that is comparable. (7) Unlawful possession, use, sale, distribution, manufacture, purchase, receipt, transfer, shipping, transporting, import, export, storage of, or dealing in an explosive or explosive device. An explosive or explosive device includes, but is not limited to, an explosive or explosive material as defined in 18 U.S.C. 232(5), 841(c) through 841(f), and 844(j); and a destructive device, as defined in 18 U.S.C. 921(a)(4) and 26 U.S.C. 5845(f). (8) Murder. (9) Conspiracy or attempt to commit the crimes in paragraphs (a)(5) through (a)(8). (10) Violations of the Racketeer Influenced and Corrupt Organizations Act, 18 U.S.C. 1961, et seq., or a State law that is comparable, where one of the predicate acts found by a jury or admitted by the defendant, consists of one of the offenses listed in paragraphs (a)(4) or (a)(8) of this section. (b) Interim disqualifying criminal offenses. The felonies listed in paragraphs (b)(1) through (b)(14) of this section are disqualifying, if either the applicant was convicted, or found not guilty by reason of insanity, of the crime in a civilian or military jurisdiction, within the seven years preceding the date of application; or the applicant was released from incarceration for the crime, within the five years preceding the date of application. (1) Assault with intent to murder. (2) Kidnapping or hostage taking. (3) Rape or aggravated sexual abuse. (4) Unlawful possession, use, sale, manufacture, purchase, distribution, receipt, transfer, shipping, transporting, delivery, import, export of, or dealing in a firearm or other weapon. A firearm or other weapon includes, but is not limited to, firearms as defined in 18 U.S.C. 921(a)(3) or 26 U.S.C.5 845(a), or items contained on the U.S. Munitions Import List at 27 CFR 447.21. (5) Extortion. (6) Dishonesty, fraud, or misrepresentation, including identity fraud. (7) Bribery. (8) Smuggling. (9) Immigration violations. (10) Violations of the Racketeer Influenced and Corrupt Organizations Act, 18 U.S.C. 1961, et seq., or a State VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 law that is comparable, other than the violations listed in paragraph (a)(10) of this section. (11) Robbery. (12) Distribution of, possession with intent to distribute, or importation of a controlled substance. (13) Arson. (14) Conspiracy or attempt to commit the crimes in this paragraph (b). (c) Under want or warrant. An applicant who is wanted, or under indictment in any civilian or military jurisdiction for a felony listed in this section, is disqualified until the want or warrant is released. (d) Determination of arrest status. (1) When a fingerprint-based check discloses an arrest for a disqualifying crime listed in this section without indicating a disposition, TSA will so notify the applicant and provide instructions on how the applicant must clear the disposition, in accordance with paragraph (d)(2) of this section. (2) The applicant must provide TSA with written proof that the arrest did not result in a disqualifying criminal offense, within 60 days after the service date of the notification in paragraph (d)(1) of this section. If TSA does not receive proof in that time, TSA will notify the applicant that he or she is disqualified. In the case of an HME, TSA will notify the State that the applicant is disqualified, and in the case of a mariner applying for TWIC, TSA will notify the Coast Guard that the applicant is disqualified. § 1572.105 Immigration status. (a) An applicant applying for a security threat assessment for a TWIC or HME must be— (1) A citizen of the United States who has not renounced or lost his or her U.S. citizenship; (2) A lawful permanent resident of the United States, as defined in § 101(a)(20) of the Immigration and Nationality Act (8 U.S.C. 1101); or (3) An individual who is— (i) In lawful nonimmigrant status, and possesses valid evidence of unrestricted employment authorization; (ii) A refugee admitted under 8 U.S.C. 1157, and possessing valid evidence of unrestricted employment authorization; (iii) An alien granted asylum under 8 U.S.C. 1158, and possessing valid evidence of unrestricted employment authorization; or (iv) A commercial driver licensed by Canada or Mexico, who is admitted to the United States, under 8 CFR 214.2(b)(4)(i)(E), to conduct business in the United States. (b) To determine an applicant’s immigration status, TSA checks relevant PO 00000 Frm 00064 Fmt 4701 Sfmt 4702 Federal databases and may perform other checks, including verifying the validity of the applicant’s social security number or alien registration number. § 1572.107 Other analyses. (a) TSA checks the following databases, and analyzes the resulting information, to determine whether applicant poses a security threat: (1) Interpol and other international databases, as appropriate. (2) Terrorist watchlists and related databases. (3) Any other databases relevant to determining whether an applicant poses, or is suspected of posing, a security threat, or that confirm an applicant’s identity. (b) TSA may determine that an applicant poses a security threat, if the search conducted under this part reveals extensive foreign or domestic criminal convictions, a conviction for a serious crime not listed in § 1572.103, or a period of foreign or domestic imprisonment that exceeds 365 consecutive days. § 1572.109 Mental incapacity. (a) An applicant has mental incapacity, if he or she has been— (1) Adjudicated as lacking mental capacity; or (2) Committed to a mental health facility. (b) An applicant is adjudicated as lacking mental capacity, if— (1) A court, board, commission, or other lawful authority has determined that the applicant, as a result of marked subnormal intelligence, mental illness, incompetence, condition, or disease, is a danger to him- or herself or others, or lacks the mental capacity to conduct or manage his or her own affairs. (2) This includes a finding of insanity by a court in a criminal case and a finding of incompetence to stand trial; or a finding of not guilty by reason of lack of mental responsibility, by any court, or pursuant to articles 50a and 76b of the Uniform Code of Military Justice (10 U.S.C. 850a and 876b). (c) An applicant is committed to a mental health facility, if he or she is formally committed to a mental health facility by a court, board, commission, or other lawful authority, including involuntary commitment and commitment for lacking mental capacity, mental illness, and drug use. This does not include commitment to a mental health facility for observation or voluntary admission to a mental health facility. E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules §§ 1572.111–1572.139 [Reserved] Subpart C—Transportation of Explosives From Canada to the United States sroberts on PROD1PC70 with PROPOSALS § 1572.201 Via commercial motor vehicle. (a) Applicability. This section applies to carriers that carry explosives from Canada to the United States, using a driver who is not a U.S. citizen or lawful permanent resident alien of the United States. (b) Terms used in this section. For purposes of this section: Carrier means any ‘‘motor carrier’’ or ‘‘motor private carrier’’, as defined in 49 U.S.C. 13102(12) and (13), respectively. Customs Service means the U.S. Customs Service. Explosive means a material that has been examined by the Associate Administrator for Hazardous Materials Safety, Research and Special Programs Administration, in accordance with 49 CFR 173.56, and determined to meet the definition for a Class 1 material in 49 CFR 173.50. Known carrier means a person that has been determined by the Governments of Canada and the United States to be a legitimate business, operating in accordance with all applicable laws and regulations governing the transportation of explosives. Known driver means a driver of a motor vehicle who has been determined by the Governments of Canada and the United States to present no known security concern. Known offeror means an offeror that has been determined by the Governments of Canada and the United States to be a legitimate business, operating in accordance with all applicable laws and regulations governing the transportation of explosives. Lawful permanent resident alien means a lawful permanent resident alien of the United States, as defined by 8 U.S.C. 1101(a)(2). Offeror means the person offering a shipment to the carrier for transportation from Canada to the United States, and may also be known as the ‘‘consignor’’ in Canada. (c) Prior approval of carrier, offeror, and driver. (1) No carrier may transport in commerce any explosive into the United States from Canada via motor vehicle, if the driver of the vehicle is a not a U. S. citizen or lawful permanent resident alien, unless the carrier, offeror, and driver are identified on a TSA list as a known carrier, known offeror, and known driver, respectively. (2) The carrier must ensure that it, its offeror, and its driver have been VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 determined to be a known carrier, known offeror, and known driver, respectively. If any has not been so determined, the carrier must submit the following information to Transport Canada: (i) The carrier must provide its— (A) Official name; (B) Business number; (C) Any trade names; and (D) Address. (ii) The following information about any offeror of explosives whose shipments it will carry: (A) Official name. (B) Business number. (C) Address. (iii) The following information about any driver the carrier may use to transport explosives into the United States from Canada, who is neither a U.S. citizen nor lawful permanent resident alien of the United States: (A) Full name. (B) Canada Commercial Driver’s License number. (C) Both current and most recent prior residential addresses. (3) Transport Canada will determine that the carrier and offeror are legitimately doing business in Canada, and will also determine that the drivers are properly licensed and present no known problems for purposes of this section. Transport Canada will notify TSA of these determinations by forwarding to TSA lists of known carriers, offerors, and drivers and their identifying information. (4) TSA will update and maintain the list of known carriers, offerors, and drivers and forward the list to the Customs Service. (5) Once included on the list, the carriers, offerors, and drivers need not obtain prior approval for future transport of explosives under this section. (d) TSA checks. TSA may periodically check the data on the carriers, offerors, and drivers to confirm their continued eligibility, and may remove from the list any that TSA determines is not known or is a threat to security. (e) At the border—(1) Driver who is not a U.S. citizen or lawful permanent resident alien. Upon arrival at the border, and prior to entry into the United States, the driver must provide a valid Canadian commercial driver’s license to the Customs Service. (2) Driver who is a U.S. citizen or lawful permanent resident alien. If the Customs Service cannot verify that the driver is on the list, and if the driver is a U.S. citizen or lawful permanent resident alien, the driver may be cleared by the Customs Service upon providing— PO 00000 Frm 00065 Fmt 4701 Sfmt 4702 29459 (i) A valid U.S. passport; or (ii) One or more other document(s), including a form of U.S. Federal or State Government-issued identification with photograph, acceptable to the Customs Service. (3) Compliance. If a carrier attempts to enter the United States without having complied with this section, the Customs Service will deny entry of the explosives and may take other appropriate action. § 1572.203 Via railroad carrier. (a) Applicability. This section applies to railroad carriers that carry explosives from Canada to the United States, using a train crew member who is not a U.S. citizen or lawful permanent resident alien of the United States. (b) Terms under this section. For purposes of this section: Customs Service means the U.S. Customs Service. Explosive means a material that has been examined by the Associate Administrator for Hazardous Materials Safety, Research and Special Programs Administration, in accordance with 49 CFR 173.56, and determined to meet the definition for a Class 1 material in 49 CFR 173.50. Known railroad carrier means a person that has been determined by the Governments of Canada and the United States to be a legitimate business, operating in accordance with all applicable laws and regulations governing the transportation of explosives. Known offeror means an offeror that has been determined by the Governments of Canada and the United States to be a legitimate business, operating in accordance with all applicable laws and regulations governing the transportation of explosives. Known train crew member means an individual used to transport explosives from Canada to the United States, who has been determined by the Governments of Canada and the United States to present no known security concern. Lawful permanent resident alien means a lawful permanent resident alien of the United States, as defined by 8 U.S.C. 1101(a)(2). Offeror means the person offering a shipment to the railroad carrier for transportation from Canada to the United States, and may also be known as the ‘‘consignor’’ in Canada. Railroad carrier means ‘‘railroad carrier’’, as defined in 49 U.S.C. 20102. (c) Prior approval of railroad carrier, offeror, and train crew member. (1) No railroad carrier may transport in E:\FR\FM\22MYP2.SGM 22MYP2 sroberts on PROD1PC70 with PROPOSALS 29460 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules commerce any explosive into the United States from Canada, via a train operated by a crew member who is not a U.S. citizen or lawful permanent resident alien, unless the railroad carrier, offeror, and train crew member are identified on a TSA list as a known railroad carrier, known offeror, and known train crew member, respectively. (2) The railroad carrier must ensure that it, its offeror, and each of its crew members have been determined to be a known railroad carrier, known offeror, and known train crew member, respectively. If any has not been so determined, the railroad carrier must submit the following information to Transport Canada: (i) The railroad carrier must provide its— (A) Official name; (B) Business number; (C) Any trade names; and (D) Address. (ii) The following information about any offeror of explosives whose shipments it will carry: (A) Official name. (B) Business number. (C) Address. (iii) The following information about any train crew member the railroad carrier may use to transport explosives into the United States from Canada, who is neither a U.S. citizen nor lawful permanent resident alien: (A) Full name. (B) Both current and most recent prior residential addresses. (3) Transport Canada will determine that the railroad carrier and offeror are legitimately doing business in Canada and will also determine that the train crew members present no known problems for purposes of this section. Transport Canada will notify TSA of these determinations by forwarding to TSA lists of known railroad carriers, offerors, and train crew members and their identifying information. (4) TSA will update and maintain the list of known railroad carriers, offerors, and train crew members and forward the list to the Customs Service. (5) Once included on the list, the railroad carriers, offerors, and train crew members need not obtain prior approval for future transport of explosives under this section. (d) TSA checks. TSA may periodically check the data on the railroad carriers, offerors, and train crew members to confirm their continued eligibility, and may remove from the list any that TSA determines is not known or is a threat to security. (e) At the border—(1) Train crew members who are not U.S. citizens or lawful permanent resident aliens. Upon VerDate Aug<31>2005 20:38 May 19, 2006 Jkt 208001 arrival at a point designated by the Customs Service for inspection of trains crossing into the United States, the train crew members of a train transporting explosives must provide sufficient identification to the Customs Service to enable that agency to determine if each crew member is on the list of known train crew members maintained by TSA. (2) Train crew members who are U.S. citizens or lawful permanent resident aliens. If the Customs Service cannot verify that the crew member is on the list and the crew member is a U.S. citizen or lawful permanent resident alien, the crew member may be cleared by the Customs Service upon providing— (i) A valid U.S. passport; or (ii) One or more other document(s), including a form of U.S. Federal or state Government-issued identification with photograph, acceptable to the Customs Service. (3) Compliance. If a carrier attempts to enter the U.S. without having complied with this section, the Customs Service will deny entry of the explosives and may take other appropriate action. Subpart D—[Reserved] Subpart E—Fees for Security Threat Assessments for Hazmat Drivers § 1572.400 Scope and definitions. (a) Scope. This part applies to— (1) States that issue an HME for a commercial driver’s license; (2) Individuals who apply to obtain or renew an HME for a commercial driver’s license and must undergo a security threat assessment under 49 CFR part 1572; and (3) Entities who collect fees from such individuals on behalf of TSA. (b) Terms. As used in this part: Commercial driver’s license (CDL) is used as defined in 49 CFR 383.5. Day means calendar day. FBI Fee means the fee required for the cost of the Federal Bureau of Investigation (FBI) to process fingerprint identification records and name checks. Information Collection Fee means the fee required, in this part, for the cost of collecting and transmitting fingerprints and other applicant information under 49 CFR part 1572. Threat Assessment Fee means the fee required, in this part, for the cost of TSA adjudicating security threat assessments, appeals, and waivers under 49 CFR part 1572. TSA agent means an entity approved by TSA to collect and transmit fingerprints and applicant information, in accordance with 49 CFR part 1572, and fees in accordance with this part. PO 00000 Frm 00066 Fmt 4701 Sfmt 4702 § 1572.401 Fee collection options. (a) State collection and transmission. If a State collects fingerprints and applicant information under 49 CFR part 1572, the State must collect and transmit to TSA the Threat Assessment Fee, in accordance with the requirements of § 1572.403. The State also must collect and remit the FBI Fee, in accordance with established procedures. (b) TSA agent collection and transmission. If a TSA agent collects fingerprints and applicant information under 49 CFR part 1572, the agent must— (1) Collect the Information Collection Fee, Threat Assessment Fee, and FBI Fee, in accordance with procedures approved by TSA; (2) Transmit to TSA the Threat Assessment Fee, in accordance with procedures approved by TSA; and (3) Transmit to TSA the FBI Fee, in accordance with procedures approved by TSA and the FBI. § 1572.403 States. Procedures for collection by This section describes the procedures that a State, which collects fingerprints and applicant information under 49 CFR part 1572; and the procedures an individual who applies to obtain or renew an HME, for a CDL in that State, must follow for collection and transmission of the Threat Assessment Fee and the FBI Fee. (a) Imposition of fees. (1) The following Threat Assessment Fee is required for TSA to conduct a security threat assessment, under 49 CFR part 1572, for an individual who applies to obtain or renew an HME: $34. (2) The following FBI Fee is required for the FBI to process fingerprint identification records and name checks required under 49 CFR part 1572: the fee collected by the FBI under 28 U.S.C. 534. (3) An individual who applies to obtain or renew an HME, or the individual’s employer, must remit to the State the Threat Assessment Fee and the FBI Fee, in a form and manner approved by TSA and the State, when the individual submits the application for the HME to the State. (b) Collection of fees. (1) A State must collect the Threat Assessment Fee and FBI Fee, when an individual submits an application to the State to obtain or renew an HME. (2) Once TSA receives an application from a State for a security threat assessment under 49 CFR part 1572, the State is liable for the Threat Assessment Fee. E:\FR\FM\22MYP2.SGM 22MYP2 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules sroberts on PROD1PC70 with PROPOSALS (3) Nothing in this subpart prevents a State from collecting any other fees that a State may impose on an individual who applies to obtain or renew an HME. (c) Handling of fees. (1) A State must safeguard all Threat Assessment Fees, from the time of collection until remittance to TSA. (2) All Threat Assessment Fees are held in trust by a State for the beneficial interest of the United States in paying for the costs of conducting the security threat assessment, required by 49 U.S.C. 5103a and 49 CFR part 1572. A State holds neither legal nor equitable interest in the Threat Assessment Fees, except for the right to retain any accrued interest on the principal amounts collected pursuant to this section. (3) A State must account for Threat Assessment Fees separately, but may commingle such fees with other sources of revenue. (d) Remittance of fees. (1) TSA will generate and provide an invoice to a State on a monthly basis. The invoice will indicate the total fee dollars (number of applicants times the Threat Assessment Fee) that are due for the month. (2) A State must remit to TSA full payment for the invoice, within 30 days after TSA sends the invoice. (3) TSA accepts Threat Assessment Fees only from a State, not from an individual applicant for an HME. (4) A State may retain any interest that accrues on the principal amounts collected between the date of collection and the date the Threat Assessment Fee is remitted to TSA, in accordance with paragraph (d)(2) of this section. (5) A State may not retain any portion of the Threat Assessment Fee to offset the costs of collecting, handling, or remitting Threat Assessment Fees. (6) Threat Assessment Fees, remitted to TSA by a State, must be in U.S. currency and made payable to the ‘‘Transportation Security Administration.’’ (7) Threat Assessment Fees must be remitted by check, money order, wire, or any other payment method acceptable to TSA. (8) TSA will not issue any refunds of Threat Assessment Fees. (9) If a State does not remit the Threat Assessment Fees for any month, TSA may decline to process any HME applications from that State. § 1572.405 TSA. Procedures for collection by This section describes the procedures that an individual, who applies to obtain or renew an HME for a CDL, must follow if a TSA agent collects and transmits the Information Collection VerDate Aug<31>2005 19:33 May 19, 2006 Jkt 208001 Fee, Threat Assessment Fee, and FBI Fee. (a) Imposition of fees. (1) The following Information Collection Fee is required for a TSA agent to collect and transmit fingerprints and applicant information, in accordance with 49 CFR part 1572: $38. (2) The following Threat Assessment Fee is required for TSA to conduct a security threat assessment, under 49 CFR part 1572, for an individual who applies to obtain or renew an HME: $34. (3) The following FBI Fee is required for the FBI to process fingerprint identification records and name checks required under 49 CFR part 1572: The fee collected by the FBI under 28 U.S.C. 534. (4) An individual who applies to obtain or renew an HME, or the individual’s employer, must remit to the TSA agent the Information Collection Fee, Threat Assessment Fee, and FBI Fee, in a form and manner approved by TSA, when the individual submits the application required under 49 CFR part 1572. (b) Collection of fees. A TSA agent will collect the fees required under this section, when an individual submits an application to the TSA agent, in accordance with 49 CFR part 1572. (c) Remittance of fees. (1) Fees required under this section, which are remitted to a TSA agent, must be made in U.S. currency and made payable to the ‘‘Transportation Security Administration.’’ (2) Fees required under this section must be remitted by check, money order, wire, or any other payment method acceptable to TSA. (3) TSA will not issue any refunds of fees required under this section. (4) Applications, submitted in accordance with 49 CFR part 1572, will be processed only upon receipt of all applicable fees under this section. Subpart F—Fees for Security Threat Assessments for Transportation Worker Identification Credential (TWIC) § 1572.500 Scope. This subpart applies to individuals who apply for, or renew, a Transportation Worker Identification Credential and must undergo a security threat assessment under 49 CFR part 1572. § 1572.501 Fee collection. When TSA collects fingerprints and applicant information under 49 CFR 1572.17, TSA will collect the Information Collection Fee, Threat Assessment Fee, and FBI Fee, in accordance with procedures approved by TSA. PO 00000 Frm 00067 Fmt 4701 Sfmt 4702 29461 § 1572.503 Fee procedures for collection by TSA or its agent. (a) When an individual submits the application, required under 49 CFR 1572.17, to obtain or renew a TWIC, the fee must be remitted to TSA or its approved agent in a form and manner approved by TSA. (1) The fee to obtain or renew a TWIC, other than for those identified in paragraph (a)(2) of this section, is $95– 149, depending on the services provided to the regulated party, plus any increase in the FBI Fee that may be made. This fee is made up of the total of the following component fees: (i) The Information Collection/ Credential Issuance Fee covers the cost for TSA or its agent to enroll applicants and is $45–$65. (ii) The Threat Assessment/Credential Production Fee covers the cost for TSA or its agent to conduct a security threat assessment and is $50–$62. (iii) The FBI Fee is collected by the FBI under 28 U.S.C. 534 to process fingerprint identification records and name checks, which is $22, plus any increase that the FBI may make. (2) The fee to obtain a TWIC when the applicant has undergone a comparable threat assessment in connection with an HME, a FAST card, or other threat assessment, as provided in § 1572.5(d); or holds an MMD or License as provided in § 1572.19(b), is $50. This fee is made up of the Information Collection/Credential Issuance Fee and a reduced fee for the Threat Assessment/Credential Production Fee. Such applicants are not charged the FBI Fee. (3) The fee to replace a credential that has been lost, stolen, or damaged is $36. (b) Form of fees. (1) Fees, required under this section, must be made in U.S. currency, and made payable to the ‘‘Transportation Security Administration.’’ (2) Fees, required under this section, must be remitted by check, money order, wire, or any other payment method acceptable to TSA. (c) TSA will not issue any refunds of fees required under this section. (d) Applications, submitted in accordance with 49 CFR 1572.17, will be processed only upon receipt of all applicable fees. (e) The fees prescribed in paragraphs (a)(1)(i) and (a)(1)(ii) of this section may be adjusted annually on or after October 1, 2007, by publication of an inflation adjustment. A final rule in the Federal Register will announce the inflation adjustment. The adjustment shall be a composite of the Federal civilian pay raise assumption and non-pay inflation factor for that fiscal year issued by the E:\FR\FM\22MYP2.SGM 22MYP2 29462 Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed Rules Office of Management and Budget for agency use in implementing OMB Circular A–76, weighted by the pay and non-pay proportions of total funding for that fiscal year. If Congress enacts a different Federal civilian pay raise percentage than the percentage issued by OMB for Circular A–76, the Department of Homeland Security may adjust the fees to reflect the enacted level. The required fee shall be the amount prescribed in paragraphs (a)(1)(i) and (a)(1)(ii), plus the latest inflation adjustment. (f) Any FBI Fee amendment that increases or decreases its fees to process fingerprint identification records and name checks will apply to the FBI fees identified in this regulation effective on the date of the FBI increase or decrease. Dated: May 10, 2006. Thomas H. Collins, Commandant, United States Coast Guard. Kip Hawley, Assistant Secretary, Transportation Security Administration. [FR Doc. 06–4508 Filed 5–12–06; 12:25 pm] DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Parts 1, 20, 70, 95, 101, 110, 125, 141, 155, 156, 160, 162, 163, 164, and 165 46 CFR Parts 1, 4, 5, 10, 11, 12, 13, 14, 15, 16, 26, 28, 30, 31, 35, 42, 58, 61, 78, 97, 98, 105, 114, 115, 122, 125, 131, 151, 166, 169, 175, 176, 185, 196, 199, 401 and 402 [Docket No. USCG–2006–24371] RIN 1625–AB02 Consolidation of Merchant Mariner Qualification Credentials United States Coast Guard, DHS. sroberts on PROD1PC70 with PROPOSALS ACTION: Notice of proposed rulemaking. SUMMARY: The Coast Guard proposes to streamline the existing merchant mariner credentialing process to minimize redundant requirements and simplify the credentialing program. This proposed rule works in tandem with the joint Notice of Proposed Rulemaking published by the Coast Guard and the Transportation Security Administration (TSA) entitled ‘‘Transportation Worker Identification Credential (TWIC) Implementation in the Maritime Sector; Hazardous Materials Endorsement for a Commercial Driver’s License’’ published VerDate Aug<31>2005 19:33 May 19, 2006 You may submit comments identified by USCG docket number USCG–2006–24371 to the Docket Management Facility at the U.S. Department of Transportation. To avoid duplication, please use only one of the following methods: (1) Web site: https://dms.dot.gov. (2) Mail: Docket Management Facility, U.S. Department of Transportation, 400 Seventh Street SW., Room PL–401, Washington, DC 20590–0001. (3) Fax: 202–493–2251. (4) Delivery: Room PL–401 on the Plaza level of the Nassif Building, 400 Seventh Street SW., Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. The telephone number is 202–366– 9329. (5) Federal eRulemaking Portal: https://www.regulations.gov. See SUPPLEMENTARY INFORMATION for format and other information about comment submissions. FOR FURTHER INFORMATION CONTACT: For questions concerning this proposed rule, call Mr. Luke Harden (G–PSO–1), United States Coast Guard, 2100 Second Street, SW., Washington, DC 20593; telephone 1–877–687–2243. For questions concerning viewing or submitting material to the docket, call Renee V. Wright, Program Manager, Docket Management System, U.S. Department of Transportation, Room Plaza 401, 400 Seventh Street SW., Washington, DC 20590–0001; telephone (202) 493–0402. SUPPLEMENTARY INFORMATION: ADDRESSES: BILLING CODE 4910–15–P AGENCY: elsewhere in the Federal Register today. It proposes to combine the individual Merchant Mariner’s Document, License, Certificate of Registry, and STCW Endorsement into a single certificate termed the Merchant Mariner Credential (MMC), which will be endorsed to reflect a mariner’s qualifications. The Coast Guard also proposes to streamline the application process for the MMC by removing the requirement that all mariners appear at least once at one of 17 Regional Exam Centers (RECs). Instead, the information previously submitted by the applicant at the REC would be submitted to TSA through the TWIC enrollment process and shared with the Coast Guard by TSA. DATES: Comments and related material must reach the Docket Management Facility on or before July 6, 2006. We will hold public meetings on Wednesday, May 31, 2006 in Newark, NJ; Thursday, June 1 in Tampa, FL; Wednesday, June 6 in St. Louis, MO; and Thursday, June 7 in Long Beach, CA. Jkt 208001 PO 00000 Frm 00068 Fmt 4701 Sfmt 4702 I. Public Participation and Request for Comments We encourage you to participate in this rulemaking by submitting comments and related materials. All comments received will be posted, without change, to https://dms.dot.gov and will include any personal information you have provided. We have an agreement with the Department of Transportation (DOT) to use the Docket Management Facility. Please see DOT’s ‘‘Privacy Act’’ paragraph below. Submitting comments: If you submit a comment, please include your name and address, identify the docket number for this rulemaking (USCG–2006–24371), indicate the specific section of this document to which each comment applies, and give the reason for each comment. You may submit your comments and material by electronic means, mail, fax, or delivery to the Docket Management Facility at the address under ADDRESSES; but please submit your comments and material by only one means. If you submit them by mail or delivery, submit them in an unbound format, no larger than 81⁄2 by 11 inches, suitable for copying and electronic filing. If you submit them by mail and would like the Coast Guard to acknowledge receipt, please enclose a stamped, self-addressed postcard or envelope. We will consider all comments and material received during the comment period. We may change this proposed rule in view of them. Viewing comments and documents: To view comments, as well as documents mentioned in this preamble as being available in the docket, go to https://dms.dot.gov at any time, click on ‘‘Simple Search,’’ enter the last five digits of the docket number for this rulemaking, and click on ‘‘Search.’’ You may also visit the Docket Management Facility in Room PL–401 on the Plaza level of the Nassif Building, 400 Seventh Street SW., Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. Privacy Act: Anyone can search the electronic form of all comments received into any of our dockets by the name of the individual submitting the comment (or signing the comment, if submitted on behalf of an association, business, labor union, etc.). You may review the Department of Transportation’s Privacy Act Statement in the Federal Register published on April 11, 2000 (65 FR 19477), or you may visit https://dms.dot.gov. Public Meetings: TSA and the Coast Guard will hold four public meetings as follows: Wednesday, May 31, 2006 in Newark, NJ; Thursday, June 1 in Tampa, E:\FR\FM\22MYP2.SGM 22MYP2

Agencies

[Federal Register Volume 71, Number 98 (Monday, May 22, 2006)]
[Proposed Rules]
[Pages 29396-29462]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 06-4508]



[[Page 29395]]

-----------------------------------------------------------------------

Part II





Department of Homeland Security





-----------------------------------------------------------------------



Coast Guard



-----------------------------------------------------------------------



Transportation Security Administration



-----------------------------------------------------------------------



33 CFR Parts 1, 20 et al.; 46 CFR Parts 10, 12, and 15

49 CFR Parts 1515, 1570, and 1572



Transportation Worker Identification Credential (TWIC) Implementation 
in the Maritime Sector; Proposed Rules

Federal Register / Vol. 71, No. 98 / Monday, May 22, 2006 / Proposed 
Rules

[[Page 29396]]


-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Transportation Security Administration

49 CFR Parts 1515, 1570, 1572

Coast Guard

33 CFR Parts 101, 103, 104, 105, 106, 125; 46 CFR Parts 10, 12, 15

[Docket Nos. TSA-2006-24191; USCG-2006-24196]
RIN 1652-AA41


Transportation Worker Identification Credential (TWIC) 
Implementation in the Maritime Sector; Hazardous Materials Endorsement 
for a Commercial Driver's License

AGENCY: Transportation Security Administration; United States Coast 
Guard, DHS.

ACTION: Notice of proposed rulemaking (NPRM).

-----------------------------------------------------------------------

SUMMARY: This is a notice of proposed rulemaking by the Department of 
Homeland Security, specifically by the Transportation Security 
Administration and the United States Coast Guard. If promulgated, this 
rule would implement the Transportation Worker Identification 
Credential program in the maritime sector. Under this program, merchant 
mariners holding an active License, Merchant Mariner Document, or 
Certificate of Registry and workers who require unescorted access to 
secure areas at maritime facilities or on vessels must undergo a 
security threat assessment, and, if found to not pose a security 
threat, obtain a Transportation Worker Identification Credential. 
Persons without Transportation Worker Identification Credentials will 
not be granted unescorted access to secure areas at affected maritime 
facilities or on vessels.
    Under this proposed rule, the Coast Guard seeks to amend its 
regulations on vessel and facility security to require the use of the 
Transportation Worker Identification Credential as an access control 
measure. It is also proposing to amend its regulations covering 
merchant mariners to incorporate the requirement to obtain a 
Transportation Worker Identification Credential. In a separate 
rulemaking action published elsewhere in this edition of the Federal 
Register, the Coast Guard also is proposing to consolidate existing 
licensing and documentation regulations to minimize duplicative or 
redundant identification or background check requirements.
    The Transportation Security Administration proposes amending its 
security threat assessment standards that currently apply to commercial 
drivers authorized to transport hazardous materials in commerce to also 
apply to merchant mariners and workers who require unescorted access to 
secure areas on vessels and at port facilities. These proposed 
amendments also relate to the notification an employer receives when an 
employee who holds a hazardous materials endorsement or a 
Transportation Worker Identification Credential is determined to pose a 
security threat. The Transportation Security Administration also is 
proposing regulations dealing with the enrollment of port workers into 
the Transportation Worker Identification Credential program.
    In addition, the Transportation Security Administration is 
proposing a fee, as authorized under the Department of Homeland 
Security Appropriations Act of 2004, to pay for the costs related to 
the issuance of the Transportation Worker Identification Credentials 
under this rule.
    This rulemaking would enhance the security of ports by requiring 
background checks on persons and establishing a biometric access 
control system to prevent those who pose a security threat from gaining 
unescorted access to secure areas of ports. This rulemaking implements 
the Maritime Transportation Security Act of 2002, which requires that 
credentialed merchant mariners and workers with unescorted access to 
secured areas of vessels and facilities be subject to a security threat 
assessment and receive a biometric credential needed to access secured 
areas.

DATES: Comments and related material must reach the Docket Management 
Facility on or before July 6, 2006. Comments sent to the Office of 
Management and Budget (OMB) on collection of information must reach OMB 
on or before July 6, 2006.
    Public Meetings: TSA and the Coast Guard will hold four public 
meetings as follows: Wednesday, May 31, 2006 in Newark, NJ; Thursday, 
June 1 in Tampa, FL; Wednesday, June 6 in St. Louis, MO; and Thursday, 
June 7 in Long Beach, CA. Interested individuals are invited to attend, 
provide comments and ask questions about the proposed rule. TSA and 
Coast Guard will provide exact locations and other additional 
information about the meetings in another document to be published in 
the Federal Register.

ADDRESSES: You may submit comments identified by TSA docket number TSA-
2006-24191 or Coast Guard docket number USCG-2006-24196 to the Docket 
Management Facility at the U.S. Department of Transportation. To avoid 
duplication, please use only one of the following methods:
    (1) Web site: https://dms.dot.gov.
    (2) Mail: Docket Management Facility, U.S. Department of 
Transportation, Room Plaza 401, 400 Seventh Street SW., Washington, DC 
20590-0001.
    (3) Fax: 202-493-2251.
    (4) Delivery: Room PL-401 on the Plaza level of the Nassif 
Building, 400 Seventh Street SW., Washington, DC, between 9 a.m. and 5 
p.m., Monday through Friday, except Federal holidays. The telephone 
number is 202-366-9329.
    (5) Federal eRulemaking Portal: https://www.regulations.gov.
    You must mail comments on collection of information to the Office 
of Information and Regulatory Affairs, Office of Management and Budget, 
725 17th Street NW, Washington, DC 20503, ATTN: Desk Officer, United 
States Coast Guard.
    See SUPPLEMENTARY INFORMATION for format and other information 
about comment submissions.

FOR FURTHER INFORMATION CONTACT: For questions related to TSA's 
proposed standards: Rick Collins, Transportation Security 
Administration, 601 South 12th Street, Arlington, VA 22202-4220, TWIC 
Program, 571-227-3515; e-mail: credentialing@dhs.gov.
    For legal questions: Christine Beyer, TSA-2, Transportation 
Security Administration, 601 South 12th Street, Arlington, VA 22202-
4220; telephone (571) 227-2657; facsimile (571) 571 1380; e-mail 
Christine.Beyer@dhs.gov.
    For questions concerning the Coast Guard provisions of this 
proposed rule: LCDR Jonathan Maiorine, Commandant (G-PCP-2), United 
States Coast Guard, 2100 Second Street, SW., Washington, DC 20593; 
telephone 1-877-687-2243.
    For questions concerning viewing or submitting material to the 
docket: Renee V. Wright, Program Manager, Docket Management System, 
U.S. Department of Transportation, Room Plaza 401, 400 Seventh Street, 
SW., Washington, DC 20590-0001; telephone (202) 493-0402.

SUPPLEMENTARY INFORMATION:

Public Participation and Request for Comments

    We encourage you to participate in this rulemaking by submitting 
comments and related materials. All comments received will be posted, 
without change, to https://dms.dot.gov

[[Page 29397]]

and will include any personal information you have provided. We have an 
agreement with the Department of Transportation (DOT) to use the Docket 
Management Facility. Please see DOT's ``Privacy Act'' paragraph below.
    Submitting comments: If you submit a comment, please include your 
name and address, identify the docket number for this rulemaking (TSA-
2006-24191 or USCG-2006-24196), indicate the specific section of this 
document to which each comment applies, and give the reason for each 
comment. Please send comments on the TSA portions of the proposed rule 
to the TSA docket (TSA-2006-24191), and send comments on the Coast 
Guard portions of the proposed rule to the Coast Guard docket (USCG-
2006-24196). You may submit your comments and material by electronic 
means, mail, fax, or delivery to the Docket Management Facility at the 
address under ADDRESSES; but please submit your comments and material 
by only one means. If you submit them by mail or delivery, submit them 
in an unbound format, no larger than 8\1/2\ by 11 inches, suitable for 
copying and electronic filing. If you submit them by mail and would 
like us to acknowledge receipt, please enclose a stamped, self-
addressed postcard or envelope. We will consider all comments and 
material received during the comment period. We may change this 
proposed rule in view of them.
    Handling of Confidential or Proprietary Information and Sensitive 
Security Information (SSI) Submitted in Public Comments: Do not submit 
comments that include trade secrets, confidential commercial or 
financial information, or sensitive security information (SSI) \1\ to 
the public regulatory docket. Please submit such comments separately 
from other comments on the rulemaking. Comments containing this type of 
information should be appropriately marked as containing such 
information and submitted by mail to the TSA legal point of contact 
listed in the FOR FURTHER INFORMATION CONTACT section.
---------------------------------------------------------------------------

    \1\ ``Sensitive Security Information'' or ``SSI'' is informaton 
obtained or developed int he conduct of security activities, the 
disclosure of which would constitute an unwarranted invasion of 
privacy, reveal trade secrets or privileged or confidential 
information, or be detrimental tot he security of transportation. 
The protection of SSI is governed by 49 CFR part 1520.
---------------------------------------------------------------------------

    Upon receipt of such comments, TSA will not place the comments in 
the public docket and will handle them in accordance with applicable 
safeguards and restrictions on access. TSA will hold them in a separate 
file to which the public does not have access, and place a note in the 
public docket that TSA has received such materials from the commenter. 
If TSA receives a request to examine or copy this information, TSA will 
treat it as any other request under the Freedom of Information Act 
(FOIA) (5 U.S.C. 552) and the Department of Homeland Security's FOIA 
regulation found in 6 CFR part 5.
    Viewing comments and documents: To view comments, as well as 
documents mentioned in this preamble as being available in the docket, 
go to https://dms.dot.gov at any time, click on ``Simple Search,'' enter 
the last five digits of the docket number for this rulemaking, and 
click on ``Search.'' You may also visit the Docket Management Facility 
in Room PL-401 on the Plaza level of the Nassif Building, 400 Seventh 
Street, SW., Washington, DC, between 9 a.m. and 5 p.m., Monday through 
Friday, except Federal holidays.
    Privacy Act: Anyone can search the electronic form of all comments 
received into any of our dockets by the name of the individual 
submitting the comment (or signing the comment, if submitted on behalf 
of an association, business, labor union, etc.). You may review the 
Department of Transportation's Privacy Act Statement in the Federal 
Register published on April 11, 2000 (65 FR 19477), or you may visit 
https://dms.dot.gov.

Abbreviations and Terms Used in This Document

AMS--Area Maritime Security
ASP--Alternative Security Program
ATSA--Aviation and Transportation Security Act
ATF--Bureau of Alcohol, Tobacco, Firearms, and Explosives
CDC--Certain Dangerous Cargo
CDL--Commercial drivers license
CDLIS--Commercial drivers license information system
CHRC--Criminal history records check
CJIS--Criminal Justice Information Services Division
COR--Certificate of Registry
COTP--Captain of the Port
DHS--Department of Homeland Security
DOJ--Department of Justice
DMV--Department of Motor Vehicles
DOT--Department of Transportation
FBI--Federal Bureau of Investigation
FIPS 201--Federal Information Processing Standards Publication 201
FMCSA--Federal Motor Carrier Safety Administration
FMSC--Federal Maritime Security Coordinator
FSP--Facility Security Plan
HME--Hazardous materials endorsement
HSA--Homeland Security Act
HSPD 12--Homeland Security Presidential Directive 12
ICC--Integrated Circuit Chip
MARSEC--Maritime Security
MMD--Merchant Mariner Document
MSC--Marine Safety Center
MTSA--Maritime Transportation Security Act
OCS--Outer Continental Shelf
REC--Regional Exam Center
SAFETEA-LU--Safe, Accountable, Flexible, Efficient Transportation 
Equity Act--A Legacy for Users
STCW--International Convention on Standards of Training, Certification, 
and Watchkeeping for Seafarers, 1978, as amended
TSA--Transportation Security Administration
TWIC--Transportation Worker Identification Credential
USA PATRIOT Act--Uniting and Strengthening America by Providing 
AppropriateTools Required to Intercept and Obstruct Terrorism Act
VSP--Vessel Security Plan

Table of Contents

I. Background and Purpose
II. Development of TWIC Process
III. Proposed Rule
    A. Coast Guard
    B. TSA
    1. TWIC Process
    a. Pre-Enrollment and Enrollment
    b. Adjudication of Security Threat Assessment
    c. Credential Production
    d. Credential Activation
    e. Using TWIC in an Access Control System
    f. Lost, Damaged or Stolen TWICs
    g. Renewal
    h. Call Center
    i. Notifying Employers of Threat Determination
    2. Fee
    3. TWIC in Other Modes of Transportation
IV. Advisory Committee Participation
V. Section-by-Section Analysis of United States Coast Guard Proposed 
Rule

General Introduction

33 CFR Part 101
    33 CFR 101.105 Definitions.
    33 CFR 101.121 Alternative Security Programs--TWIC Addendum.
    33 CFR 101.514 TWIC Requirement.
    33 CFR 101.515 Personal identification.
33 CFR Part 103
    33 CFR 103.305 Composition of an Area Maritime Security (AMS) 
Committee.
    33 CFR 103.505 Elements of the Area Maritime Security (AMS) Plan 
and 103.510 Area Maritime Security (AMS) Plan review and approval.
33 CFR Part 104
    33 CFR 104.105 Applicability.
    33 CFR 104.106 Passenger Access Area.
    33 CFR 104.115 Compliance dates.
    33 CFR 104.120 Compliance documentation.
    33 CFR 104.200 Owner or Operator/104.210 Company Security 
Officer

[[Page 29398]]

(CSO)/104.215 Vessel Security Officer (VSO)/104.220 Company or 
vessel personnel with security duties/104.225 Security training for 
all other personnel.
    33 CFR 104.235 Vessel recordkeeping requirements.
    33 CFR 104.265 Security measures for access control.
    33 CFR 104.290 Security incident procedures.
    33 CFR 104.295 Additional requirements--cruise ships.
    33 CFR 104.405 Format of the Vessel Security Plan (VSP).
    New Subpart E (33 CFR 104.500-104.510).
33 CFR Part 105
    33 CFR 105.115 Compliance dates.
    33 CFR 105.120 Compliance documentation.
    33 CFR 105.200 Owner or operator/105.205 Facility Security 
Officer (FSO)/105.210 Facility personnel with security duties/
105.215 Security training for all other facility personnel.
    33 CFR 105.225 Facility recordkeeping requirements.
    33 CFR 105.255 Security measures for access control.
    33 CFR 105.280 Security incident procedures.
    33 CFR 105.285 Additional requirements-passenger and ferry 
facilities.
    33 CFR 105.290 Additional requirements-cruise ship terminals.
    33 CFR 105.295 Additional requirements-Certain Dangerous Cargo 
(CDC) facilities.
    33 CFR 105.296 Additional requirements-barge fleeting 
facilities.
    33 CFR 105.405 Format and content of the Facility Security Plan 
(FSP).
    New Subpart E (33 CFR 105.500-105.510).
33 CFR Part 106
    33 CFR 106.110 Compliance dates.
    33 CFR 106.115 Compliance documentation.
    33 CFR 106.200 Owner or operator/106.205 Company Security 
Officer (CSO)/106.210 OCS Facility Security Officer (FSO)/106.215 
Company or OCS Facility personnel with security duties/106.220 
Security training for all other OCS facility personnel.
    33 CFR 106.230 OCS facility recordkeeping requirements.
    33 CFR 106.260 Security measures for access control.
    33 CFR 106.280 Security incident procedures.
    33 CFR 106.405 Format and content of the Facility Security Plan 
(FSP).
    New Subpart E (33 CFR 106.500-106.510).

Miscellaneous Items

    33 CFR 101.305 (Reporting requirements).
    33 CFR 101.400 (Enforcement)
    33 CFR 104.130, 105.130, and 106.125 (Waivers).
    33 CFR Subpart C Parts 104, 105, and 106 (Security Assessments).
46 CFR Parts 10, 12, and 15.
VI. Section-by-Section Analysis of TSA Proposed Rule
    49 CFR Part 1515 Appeal and Waiver Procedures for Security 
Threat Assessments for Individuals.
    49 CFR 1515.1 Scope.
    49 CFR 1515.3 Terms used in this part.
    49 CFR 1515.5 Appeal procedures.
    49 CFR 1515.7 Waiver Procedures.
    49 CFR Part 1570 Land Transportation Security: General Rules.
    49 CFR 1570.3 Terms used in this part.
    49 CFR Part 1572 Credentialing and Background Checks for Land 
Transportation Security.
    49 CFR 1572.5 Scope and standards for hazardous materials.
    49 CFR 1572.7 Waivers of security threat assessment standards.
    49 CFR 1572.9 Applicant information required for security threat 
assessment for a hazardous materials endorsement.
    49 CFR 1572.11 Applicant responsibilities for a security threat 
assessment for a hazardous materials endorsement.
    49 CFR 1572.13 State responsibilities for issuance of hazardous 
materials endorsement.
    49 CFR 1572.15 Procedures for security threat assessment for an 
HME.
    49 CFR 1572.17 Applicant information required for the security 
threat assessment for TWIC.
    49 CFR 1572.19 Applicant responsibilities for a security threat 
assessment for TWIC.
    49 CFR 1572.21 Procedures for security threat assessment for a 
TWIC.
    49 CFR 1572.23 Conforming Equipment; Incorporation by reference.
    49 CFR 1572.24-40 [Reserved]
    49 CFR 1572.41 Compliance, inspection and enforcement.
    49 CFR 1572.101 Scope.
    49 CFR 1572.103 Disqualifying Criminal Offenses.
    49 CFR 1572.105 Immigration status.
    49 CFR 1572.107 Other analyses.
    49 CFR 1572.109 Mental capacity.

Subpart E--Fees for Transportation Worker Identification Credential

    A. TWIC Maritime Population Estimation Methodology
    1. Recurring population
    2. Five-year population
    B. Proposed Fee
    1. Information Collection/Credential Issuance
    2. Threat Assessment/Credential Production
    3. FBI Fee
    4. Total Fees
    C. Section 1572.501 Fee Collection
VII. Rulemaking Analyses and Notices
    A. Executive Order 12866 (Regulatory Planning and Review)
    B. Small Entities
    C. Assistance for Small Entities
    D. Collection of Information
    E. Federalism
    F. Unfunded Mandates Reform Act
    G. Taking of Private Property
    H. Civil Justice Reform
    I. Protection of Children
    J. Indian Tribal Governments
    K. Energy Effects
    L. Technical Standards
    M. Environment

I. Background and Purpose

    Under this rule, the Department of Homeland Security (DHS), through 
the United States Coast Guard (Coast Guard) and the Transportation 
Security Administration (TSA), proposes to require that all merchant 
mariners holding an active License, Mechant Mariner Document, or 
Certificate of Registry and all persons who need unescorted access to 
secure areas of a regulated facility or vessel must obtain a 
Transportation Worker Identification Credential (TWIC). In order to 
obtain a TWIC, individuals will be required to undergo a security 
threat assessment conducted by TSA. TSA, in conducting those security 
threat assessments, will use the procedures and standards established 
by TSA for commercial motor vehicle drivers licensed to transport 
hazardous materials within the United States.
    The implementation of the TWIC program in the maritime sector 
builds upon existing Coast Guard credentialing requirements and 
security programs for port facilities and vessels. In a separate 
rulemaking action published in this issue of the Federal Register, 
Coast Guard also proposes consolidating existing merchant mariner 
licensing and documentation requirements to avoid duplicative 
credentials and background checks and to avoid interruption in commerce 
and reduce the burden on mariners.
    The TWIC program is a DHS initiative, with joint participation of 
the Coast Guard and TSA. The program is supported by several statutory 
and regulatory authorities and presidential directives. The principal 
statutory authority is the Maritime Transportation Security Act (MTSA), 
Pub. L. 107-295, 116 Stat. 2064 (November 25, 2002) (46 U.S.C. 70105). 
Section 102 of MTSA requires the Secretary of Homeland Security to 
issue a biometric transportation security credential to merchant 
mariners ``issued a license, certificate of registry, or merchant 
mariners document'' and individuals who require unescorted access to 
secure areas of vessels and facilities.\2\ These individuals also must 
undergo a security threat assessment to determine that they do not pose 
a security threat prior to receiving the biometric credential and 
authority to access the secure areas without escort. Id. The security 
threat assessment must include a review of criminal, immigration, and

[[Page 29399]]

pertinent intelligence records in determining whether the individual 
poses a threat, and individuals must have the opportunity to appeal an 
adverse determination or apply for a waiver of the standards. 
Specifically, an individual cannot be denied the transportation 
security credential required under MTSA unless the individual--
---------------------------------------------------------------------------

    \2\ 46 U.S.C. 70105. Section 102 of MTSA defines ``Secretary'' 
to mean ``the Secretary of the department in which the Coast Guard 
is operating.'' Under the Homeland Security Act of 2002, the Coast 
Guard became part of DHS, thus the Secretary of Homeland Security is 
authorized to implement the credential requirements for mariners and 
persons seeking access to secure port facilities under MTSA.
---------------------------------------------------------------------------

    (A) Has been convicted within the preceding 7-year period of a 
felony or found not guilty by reason of insanity of a felony--
    (i) that the Secretary believes could cause the individual to be a 
terrorism security risk to the United States; or
    (ii) for causing a severe transportation security incident;
    (B) Has been released from incarceration within the preceding 5-
year period for committing a felony described in subparagraph (A);
    (C) May be denied admission to the United States or removed from 
the United States under the Immigration and Nationality Act (8 U.S.C. 
1101 et seq.); or
    (D) Otherwise poses a terrorism security risk to the United 
States.46 U.S.C. 70105(c).
    Following the enactment of MTSA in November 2002, the Coast Guard 
issued a series of general regulations for maritime security. See, 33 
CFR parts 101-106. The MTSA regulations set out specific requirements 
for owners and operators (henceforth ``owners/operators'') of vessels, 
facilities, and Outer Continental Shelf (OCS) facilities that had been 
identified by the Secretary of Homeland Security as posing a high risk 
of being involved in a transportation security incident.
    Under MTSA and the Coast Guard's MTSA regulations, owners/operators 
of these vessels and facilities were required to conduct security 
assessments of their respective vessels and facilities, create security 
plans specific to their needs, and submit the plans for approval to the 
Coast Guard by December 31, 2003. All affected vessels and facilities 
are required to have been operating in accordance with their respective 
plans since July 1, 2004, and are required to resubmit plans every 5 
years.
    Each plan requires owners/operators to address specific 
vulnerabilities identified pursuant to their individual security 
assessments, including controlling access to their respective vessels 
and facilities. The MTSA regulations require owners/operators to 
implement security measures to ensure that an identification system was 
established for checking the identification of vessel and facility 
personnel or other persons seeking access to the vessel or facility.
    In establishing the system, owners/operators were directed to 
accept identification only if it: (1) Was laminated or otherwise secure 
against tampering; (2) contained the individual's full name; (3) 
contained a photo that accurately depicted that individual's current 
facial appearance; and (4) bore the name of the issuing authority. See, 
33 CFR 101.515. The issuing authority must be a government authority or 
organization authorized to act on behalf of the government authority, 
or the individual's employer, union, or trade association. There was no 
requirement that the identification be issued pursuant to a security 
threat assessment because there was no existing credential and 
supporting structure that could fulfill the needs specific to the 
maritime environment.
    In addition to the regulation of ports and facilities, the Coast 
Guard has a long history of regulating the merchant marine. Under the 
current Coast Guard regulatory scheme, the Coast Guard may issue a 
mariner any combination of 4 credentials: (1) Merchant Mariner Document 
(MMD); (2) License; (3) Certificate of Registry (COR); or (4) 
International Convention on Standards of Training, Certification, and 
Watchkeeping (STCW) Endorsement. An MMD serves as a mariner's 
identification credential and is issued to mariners who are employed on 
merchant vessels of 100 gross register tons or more, except for those 
vessels employed exclusively in trade on the navigable waters of the 
U.S. Licenses are qualification certificates that are issued to 
officers. CORs are qualification certificates that are issued to 
medical personnel and pursers. STCW Endorsements are qualification 
certificates issued to mariners who meet international standards and 
serve aboard vessels to which STCW applies. The License, COR, and STCW 
Endorsement are qualification credentials only. Only the MMD is an 
identity document, and none of the current mariner credentials contain 
the biometric information required under MTSA.
    TSA currently administers several programs involving security 
threat assessments of individuals engaged in the transportation 
industry, including certain airport and aircraft operator employees, 
and alien flight school students. Section 1012 of the Uniting and 
Strengthening America by Providing Appropriate Tools Required to 
Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act) Pub. L. 
107-56, 115 Stat. 272 (October 25, 2001) provides that a State cannot 
issue a hazardous materials endorsement (HME) to a commercial driver 
who poses a security threat. TSA implemented its security threat 
assessment processes under this provision.
    TSA first issued regulations to implement security threat 
assessment standards for HME applicants (TSA's hazmat rule) in May 2003 
and subsequently amended those regulations based on comments received 
from the States, employers and affected drivers. (A more detailed 
discussion and regulatory history of the hazmat regulations can be 
found at 68 FR 23852 (May 5, 2003); 68 FR 63033 (November 7, 2003); 69 
FR 17696 (April 6, 2004); and 69 FR 68720 (November 24, 2004). These 
standards are codified at 49 CFR part 1572, where many of the standards 
we propose for TWIC under this rule also will reside.
    TSA's hazmat regulations establish standards concerning criminal 
history, immigration status, mental capacity, and terrorist activity to 
determine whether a driver poses a security threat and is qualified to 
hold an HME.\3\ Drivers who have been convicted or found not guilty by 
reason of insanity for certain crimes in the preceding 7 years, or have 
been released from incarceration for those crimes in the preceding 5 
years, are deemed to pose a security threat and are not authorized to 
hold an HME. 49 CFR 1572.103. Drivers convicted of certain particularly 
heinous crimes, such as espionage, treason, terrorist-related offenses, 
or severe transportation security incidents, are permanently banned 
from holding an HME. Id. In addition, drivers who have been 
involuntarily committed to a mental institution or adjudicated as 
mentally incapacitated are considered to pose a security threat that 
warrants disqualification from holding an HME. 49 CFR 1572.109.
---------------------------------------------------------------------------

    \3\ In developing the hazmat regulations, TSA sought to 
harmonize, to the extent possible, the background check and 
eligibility criteria requirements of both MTSA and the USA PATRIOT 
Act and thus adopts privisions from both statutes where appropriate. 
See 68 FR at 23853.
---------------------------------------------------------------------------

    Aliens are not prohibited from obtaining an HME. The hazmat rule 
permits individuals who are in the United States lawfully and are 
authorized under applicable immigration laws to work in the United 
States to hold an HME upon completion of a satisfactory TSA security 
threat assessment. 49 CFR 1572.105. TSA reviews a driver's immigration 
status to determine if the applicant for an HME is authorized to be 
present and work in the United States under applicable

[[Page 29400]]

immigration laws. In addition, as set forth in the hazmat rules, TSA 
conducts a security check of international databases through Interpol 
or other appropriate means. 49 CFR 1572.107.
    TSA's hazmat regulations also include appeal and waiver procedures 
to ensure that no driver is wrongfully determined to pose a threat, to 
provide individuals who are disqualified from holding an HME the 
opportunity to show rehabilitation, where applicable, and to maintain 
consistency with other credentialing or background check requirements 
among transportation workers, such as those in the maritime industry 
covered by MTSA and this TWIC rulemaking. See e.g., 49 CFR parts 
1572.141 and 143.

II. Development of TWIC Process

    In 2002, TSA established the TWIC program in response to identity 
management shortcomings and vulnerabilities identified in the 
transportation system. In some segments of the transportation system, 
it is not possible to positively identify individuals entering secure 
areas or assess the threat they may pose due to a lack of pertinent 
background information. Also, existing identity credentials are often 
vulnerable to fraud. To mitigate these weaknesses, TSA determined that 
an integrated, credential-based, identity management system for all 
transportation workers who need unescorted access to secure areas of 
the nation's transportation system would be necessary.
    Homeland Security Presidential Directive 12 (HSPD 12) requires 
Federal agencies to improve secure identification processes for Federal 
employees and contractors. The objectives of the directive are to 
ensure that the credentialing processes are administered by accredited 
providers; are based on sound criteria for verifying an individual's 
identity; include a credential that is resistant to fraud, tampering, 
counterfeiting and terrorist exploitation, and can be authenticated 
quickly and electronically. As designed and proposed in this rule, TWIC 
does not contradict the control objectives of HSPD 12.
    The U.S. Department of Commerce published guidance on the standards 
and methods by which Agencies could reach compliance with HSPD 12. In 
February 2005, the Department of Commerce issued the Federal 
Information Processing Standards Publication 201 (FIPS 201), Personal 
Identification Verification of Federal Employees and Contractors in 
response to HSPD 12. FIPS 201 is divided into Personal Identification 
Verification (PIV) Parts I and II. Part I addresses the control and 
security objectives, particularly the personal identity proofing 
process. Part II provides detailed technical specifications that must 
be met to ensure interoperability of PIV-compliant credentials in 
personal authentication, access control, and credential management 
systems throughout the Federal government.
    The development of FIPS 201 occurred concurrently with the design 
of TWIC. TSA and its contractors closely monitored the development of 
FIPS 201 and individuals working on FIPS 201 followed the design of 
TWIC. TSA recognized that there are many benefits to designing TWIC in 
alignment with FIPS 201: Leveraging the TWIC infrastructure to support 
other DHS or government credentialing programs; avoiding obsolescence 
by using the latest technology; securing critical facilities with the 
same process used by Federal agencies; having interoperability during 
an emergency; and demonstrating the functionality of FIPS 201. All of 
the significant components of the TWIC system align with FIPS 201.
    As tested in the maritime environment and planned in this NPRM, 
TWIC is an identification credential containing numerous technologies 
to make it secure and tamper-proof. TWIC is a ``smart'' credential 
containing two electronic chips on which encoded data is stored to 
allow all subsequent TWIC functions to be performed. TWIC is designed 
to ensure that the identity of each TWIC holder has been verified; that 
a threat assessment has been completed on that identity; and that each 
credential issued is positively linked to the rightful holder through 
the use of biometric technology. Facility and vessel owners/operators 
subject to this rule will then determine which TWIC holders will be 
granted unescorted access to secure areas of their facility.

Prototype

    The TWIC program has been developed in three phases. Phases I, 
Planning, and II, Technology Evaluation, were completed in 2003, and 
Phase III, Prototype, was completed in 2005. In the technology 
evaluation, TSA tested and evaluated a range of credential-based 
systems in use at transportation facilities. In Prototype, TSA tested a 
comprehensive credentialing system, which included enrollment, threat 
assessments, biometric security, credential production, and credential 
issuance.
    Prototype was conducted at twenty-eight facilities beginning 
November 4, 2004 in various modes of the transportation system, 
including air, rail, and maritime. The Prototype Phase came to an end 
in the summer of 2005. During Prototype, the participating facilities 
and associated transportation workers voluntarily provided biographical 
and biometric identifiers. Participants provided appropriate identity 
verification documentation, such as a birth certificate, driver's 
license, government photo identification, or similar document. TSA 
conducted a name-based threat assessment using the biographic 
information provided, and utilized the biometric information to verify 
identity and determine whether an applicant had previously enrolled in 
the program. TSA did not use biometric information to complete a 
security threat assessment.\4\ TSA will be using both biographic and 
biometric information to conduct the security threat assessment once 
TSA implements the full program. To verify an individual's identity 
during Prototype, TSA followed the U.S. Citizenship and Immigration 
Services Employment Eligibility Verification (Form I-9) process, 
commonly used by the federal government and industry in the hiring 
process. TSA tested the TWIC as positive identification for access to 
secure areas of participating transportation facilities.
---------------------------------------------------------------------------

    \4\ Florida law requires persons seeking access to certain port 
facilities within that State to submit fingerprints and other 
information to obtain a State-issued credential. During Prototype 
conducted in Florida, therefore, participants submitted fingerprints 
as required under State law and the State completed a fingerprint-
based criminal history records check. TSA did not use biometric 
information collected from Florida participants to conduct a 
security threat assessment.
---------------------------------------------------------------------------

    By testing the integration of these components, TSA was able to 
assess the system's performance prior to deciding how the program 
should be implemented. Consequently, some processes that were tested in 
Prototype, such as ``employer sponsorship,'' are not being proposed in 
this rule based on TSA's determination that the process did not add 
sufficient value or created operational difficulties that could not be 
resolved.

III. Proposed Rule

A. Coast Guard

    In order to integrate TWIC into already existing security programs 
in the maritime environment, the Coast Guard must amend its maritime 
security regulations, found in 33 CFR Subchapter H. These changes will 
set performance standards for owners/operators of vessels, facilities, 
and Outer Continental Shelf facilities to meet

[[Page 29401]]

when incorporating TWIC into their existing security programs.
    The Coast Guard also must amend its regulations governing merchant 
mariners, found in 46 CFR parts 10, 12, and 15, in order to add the 
statutory mandate that they hold a TWIC. In a separate rulemaking, 
published in today's Federal Register, the Coast Guard is proposing to 
consolidate qualifications credentials and streamline its mariner 
regulations, which would ensure that no mariner is required to undergo 
(or pay for) more than one security threat assessment and identity 
verification.
    Coast Guard emphasizes that possession of the TWIC credential is 
not intended to constitute an automatic access right to any facility. 
The owner/operator continues to have the ultimate authority as to 
access control decisions, and although holding a duly-issued TWIC is 
required before an individual is eligible to be granted unescorted 
access, the individual must also have a need for access in accordance 
with the approved security plan. The owner/operator's right to refuse 
admittance to any individual, regardless of whether he or she holds an 
authenticated TWIC, remains unchanged.

B. TSA

    TSA's role in implementing the TWIC program in the maritime sector 
will be to conduct security threat assessments of credentialed merchant 
mariners and individuals with unescorted access to secure areas, 
providing an appeal and waiver process for applicants who receive an 
adverse determination, and performing related functions in the 
enrollment and credential issuance process. In this rule, TSA proposes 
changes to its regulations to extend the current processes for 
conducting security threat assessments for HMEs to persons seeking to 
obtain TWICs.
    On August 10, 2005, the Safe, Accountable, Flexible, Efficient 
Transportation Equity Act--A Legacy for Users (SAFETEA-LU), Pub. L. 
109-59, 119 Stat. 1144 (August 10, 2005) was enacted. Section 7105 of 
SAFETEA-LU (49 U.S.C. 5103a(g)(1)(B)(i)) requires TSA to initiate a 
rulemaking to determine which background checks required by Federal law 
and applicable to transportation workers are equivalent to or less 
stringent than the security threat assessment TSA requires for HME 
drivers. In addition, SAFETEA-LU requires TSA to develop a process for 
notifying employers of the results of a threat assessment conducted on 
an HME applicant.
    Under this rule, TSA is proposing a fee to cover the cost of the 
TWIC threat assessment, appeals of TSA decisions during the process, 
and the issuance of the credential as required under Section 520 of the 
Homeland Security Appropriations Act of 2004 (2004 DHS Appropriations 
Act), Pub. L. 108-90 (October 2003). TSA also is inviting comments from 
the transportation industry at large on the processes proposed under 
this rule as TSA and DHS are considering extending the TWIC program to 
other areas in the transportation industry outside of the maritime 
sector.
1. TWIC Process
    As proposed in this rule, the purpose of the TWIC program is to 
ensure that only authorized personnel who have successfully completed a 
security threat assessment have unescorted access to secure areas of 
maritime facilities and vessels. The credential will include a 
reference biometric--fingerprints--that positively links the credential 
holder to the identity of the individual who was issued the credential. 
TWIC holders may be asked to confirm, by providing a fingerprint, that 
they are the rightful owner of the credential at any time. Access 
control procedures and systems at facilities and vessels will recognize 
the credential and the information encrypted on it, so that the overall 
maritime network will be interoperable. In addition, an individual's 
credential can be deactivated or revoked by TSA if disqualifying 
information is discovered by or presented to TSA or other DHS entity, 
or the credential is lost or stolen, so that the credential can no 
longer be used to obtain unescorted access to secure areas.
    TSA has designed the TWIC process to maintain strict privacy 
controls so that a holder's biographic and biometric information cannot 
be compromised. The TWIC process proposed in this rule is described 
below from the perspective of an applicant.
a. Pre-Enrollment and Enrollment
    TWIC enrollment will be conducted by TSA (or TSA's agent operating 
under TSA's direction). All enrollment personnel must successfully 
complete a TSA security threat assessment and receive a TWIC before 
they will be authorized to access documents, systems, or secure areas.
    Facility and vessel owners/operators must notify workers of their 
responsibility to enroll, as well as the deadline for doing so. (The 
proposed implementation plan for enrollment is discussed in greater 
detail below.) Owners/operators must provide applicants enough lead 
time to enroll so that TSA has sufficient time to complete the security 
threat assessment and issue the credential before the access control 
procedures go into effect. Generally, owners/operators should give 
individuals at least 60 days notice to begin the process. TSA cannot 
guarantee that any threat assessment can be completed in less than 30 
days, and therefore, owners/operators and applicants should make every 
effort to initiate enrollment in a timely fashion to prevent workers 
being denied access for non-compliance. TSA will provide owners/
operators with locations for enrollment that they can then pass on to 
the workers (hereinafter referred to as applicants). For purposes of 
the NPRM, a list of potential enrollment center locations is provided 
on the TSA Web site (www.tsa.gov) to provide prospective owner/
operators and applicants a general idea of the enrollment plan. This 
list is subject to change and TSA invites comment from affected parties 
on the potential enrollment locations.
    Applicants will be able to ``pre-enroll'' online to reduce the time 
needed to complete the entire enrollment process at an enrollment 
center. For pre-enrollment, applicants need a computer with internet 
access. The applicant can access the TWIC Web site to provide personal 
information required for enrollment and select an enrollment center at 
which to complete enrollment. Data submitted by applicants via the 
Internet will be sent using Internet security protocols (i.e., SSL). 
All information provided is then stored in the TSA system, which 
encrypts and protects the data from unauthorized access. Applicants may 
schedule an appointment while on-line to complete the enrollment 
process, although appointments are not required at enrollment centers. 
The Web site will list the documents the applicant must bring to the 
enrollment center to verify identity. The convenience of pre-enrollment 
is a significant benefit for applicants and reduces strain on the 
enrollment centers. Applicants who pre-enroll must appear at enrollment 
centers to verify their identity, confirm that the information provided 
during pre-enrollment is correct, provide biometrics, and sign the 
enrollment documents.
    At the enrollment center, applicants will receive a privacy notice 
and consent form, by which they agree to provide personal information 
for the security threat assessment and credential. (For applicants who 
pre-enroll, the privacy notice is provided with the application online, 
but the applicants must acknowledge receipt of the notice in writing at 
the enrollment

[[Page 29402]]

center.) If an applicant fails to sign the consent form or does not 
have the required documents to authenticate identity, enrollment will 
not proceed. During Prototype, 96 percent of applicants appeared for 
enrollment with suitable identity verification documents. As TWIC is 
implemented, TSA and Coast Guard will make information available to 
affected workers in advance of enrollment so that all are aware of what 
to bring to the enrollment center. This information will also be posted 
on the TSA/TWIC Web site at www.tsa.gov. All information collected at 
the enrollment center or during the pre-enrollment process, including 
the signed privacy consent form and identity documents are scanned into 
the TSA system for storage. All information is encrypted or stored 
using methods that protect the information from unauthorized retrieval 
or use.
    At the enrollment centers, applicants must provide ten fingerprints 
and sit for a digital photograph. The fingerprints and photograph will 
be electronically captured at the enrollment center for use on the 
credential. Individuals must provide ten fingerprint images for use in 
completing the security threats assessment process. The credential 
itself will store two fingerprint templates, one of which is used as a 
reference biometric to verify identity. The entire enrollment record 
(including the 10 fingerprints) will be stored in the TSA system, 
encrypted and segmented to prevent unauthorized use. TSA will provide 
alternative procedures for enrollment centers to use for situations in 
which an applicant is unable to provide fingerprints.
    The TWIC fee, which covers the complete cost of enrollment, threat 
assessment, and credential production and delivery, must be collected 
from the applicant at the enrollment center prior to the enrollment 
record being transmitted to the TSA system. The TWIC enrollment fee 
will be non-refundable, even if the threat assessment results in a TWIC 
not being issued.
    Once all data and the fee are collected, the enrollment record is 
encrypted and electronically transmitted to the TSA system. The TSA 
system acknowledges receipt of the enrollment record, at which time all 
enrollment data is automatically deleted from the enrollment 
workstation. Once the enrollment record is transmitted to the TSA 
system, personal information is stored only in the TSA system, and 
personal data is encrypted to very high standards before it is 
transferred or stored. If an enrollment center temporarily loses its 
internet connection, the enrollment data is encrypted and stored on the 
enrollment workstation, but only until an internet connection is 
restored.
    During Prototype, the average time needed for an applicant who pre-
enrolled to complete enrollment was 10 minutes, 21 seconds. It is 
expected that it will take approximately fifteen minutes to complete 
enrollment of applicants who do not pre-enroll.
    TSA and Coast Guard currently envision a phased enrollment process 
based on risk assessment and cost/benefit analysis. Locations that are 
considered critical and provide the greatest number of individual 
applicants will be among the earliest enrollment sites. There are 
approximately 125 locations covering approximately 300 ports where TSA 
plans to enroll applicants, and we are in the process of rating each 
location against a variety of factors to assess criticality, 
population, and infrastructure. TSA and Coast Guard will work closely 
with the maritime industry to ensure that owners/operators and workers 
are given as much notice as is possible when a definitive enrollment 
schedule is selected. TSA and Coast Guard also are contemplating 
implementing a more flexible rollout, with anticipated dates to be 
announced by notices published in the Federal Register. (See the 
discussion of Sec.  1572.19 below for additional information on timing 
of enrollment.) TSA plans to use a combination of fixed and mobile 
enrollment stations to make the enrollment process as efficient as 
possible for applicants and owners/operators.
b. Adjudication of Security Threat Assessment
    Following enrollment, the TSA system sends pertinent parts of the 
record to various sources so that appropriate terrorist threat, 
criminal history, and immigration checks can be performed. When the 
checks are completed, TSA makes a determination on whether or not to 
issue a TWIC to the applicant and notifies the applicant.
    If disqualifying information is discovered, TSA issues an Initial 
Determination of Security Threat to the applicant with information on 
how the applicant can appeal an adverse decision or apply for a waiver 
of the standards. If the applicant does not respond to the Initial 
Determination within a specified period, it converts to a Final 
Determination of Security Threat and the applicant does not receive a 
TWIC. If the applicant proceeds with an appeal or application for 
waiver and is successful, the applicant is notified accordingly and the 
credential production process begins. (The appeal and waiver processes 
are discussed in greater detail below in the section-by-section 
analysis.)
    TSA may provide some of the notifications to applicants via email, 
if an applicant provides an email address on the application for the 
TWIC. We invite comment from prospective applicants about the 
substitution of email notification for a paper process.
c. Credential Production
    If the applicant is qualified to receive a TWIC, the TSA system 
generates an order to produce a credential. It is produced at a 
government credential production facility and securely shipped to the 
center at which the applicant enrolled. The applicant will be notified 
that the TWIC is ready to be retrieved and activated for use. The face 
of the TWIC credential contains the applicant's photograph, name, TWIC 
expiration date, and a unique credential number. In addition, the 
credential will store finger minutia templates of 2 fingers, finger 
pattern templates of 2 fingers, a personal identification number, and a 
Federal Agency Smart Credential number. The data is securely stored and 
protected in accordance with FIPS 201 in the various technologies used 
in the credential, such as magnetic stripe, contact chip, and 
contactless chip. The fingerprint data, the reference biometric, is 
used to match the credential to the person who enrolled.
    The TWIC system contains many feedback mechanisms to validate the 
transmission and receipt of data at key points in the process. The 
status of each transmission is recorded within the system.
    Credentials are electronically locked prior to shipment to the 
enrollment center so that the data cannot be accessed. Once the 
credentials are electronically locked, they cannot be used for access 
to any vessel or facility until they are activated by the TWIC 
enrollment station.
d. Credential Activation
    The applicant is notified when the enrollment center has received 
the credential. The applicant then returns to the enrollment site at 
his or her convenience to activate the credential.
    At the enrollment center, the applicant's credential is retrieved 
from secure storage and the photograph and name on it are compared to 
the applicant and the identity documents the applicant uses to 
authenticate identity. The applicant places a designated finger on a 
reader to generate a biometric match against the biometric stored on 
the credential and in the TSA

[[Page 29403]]

system. Upon successful biometric match, the TWIC is activated and the 
applicant selects a Personal Identification Number (PIN) that also is 
stored on the credential. The PIN can subsequently be used as an 
additional factor in proving one's identity and authorized use of the 
credential, or as the primary verification tool if the biometric is 
inoperative for some reason. The TWIC security threat assessment and 
credential are valid for five years, unless derogatory information is 
discovered and TSA revokes the credential.
    The process outlined above for credential activation is the same 
process TSA tested in Prototype, which worked well for owner/operators 
and employees who enroll. However, implementation of the program 
nationwide involving employees that are not stationary at one facility 
or port may impact applicants and owner/operators differently. TSA is 
concerned that requiring an applicant to return to the enrollment 
center to activate the credential may be onerous for workers who travel 
a great deal and may not know where they will be when the credential is 
ready for pick-up. TSA is considering the security and operational 
impacts of alternative procedures, on which we invite comment.
    TSA is considering an amendment to the process that would allow a 
worker to designate a specific enrollment center for credential pick up 
and activation. The card production facility would send the credential 
to that location rather than the location where the applicant enrolled. 
This is a change that can be accomplished, but this was not tested in 
Prototype and a variety of software changes may be needed, which could 
increase costs and affect the timing of implementation. Moreover, 
applicants will not know the exact date on which their credential will 
be ready and so those who work at a variety of ports across the country 
may not be able to designate a specific activation location on the 
enrollment application.
    During Prototype, the entire process from enrollment to card 
production was complete in fewer than 10 days. However, that process 
differed from the full program we plan to implement with this rule in a 
few significant ways. First, nearly all of the employees who 
volunteered for Prototype worked at the same location every day and the 
enrollment center was located on that site. Second, TSA did not 
complete fingerprint-based criminal history records checks, and so 
there was no time needed to adjudicate and provide redress for criminal 
activity. For threat assessment programs that are currently in place 
nationally in which applicants are not stationary and TSA conducts a 
fingerprint-based CHRC, the threat assessment is generally completed in 
less than 30 days. The time needed to complete the threat assessment 
varies depending on whether the database searches produce adverse 
information that must be investigated, and whether the applicant files 
an appeal or requests a waiver. These conditions will exist for the 
TWIC program and therefore, TSA will not be able to predict or 
establish a specific date on which the threat assessment and card 
production process will be complete.
    DHS invites comment on this option, and any other proposals that 
would make it easier logistically, without sacrificing security, for 
the public to receive and activate TWIC cards.
e. Using TWIC in an Access Control System
    Once the enrollment process is complete and the credential is 
activated, the credential is ready to be used as an access control 
tool. Possession of a TWIC does not guarantee access to secure areas 
because the owner/operator controls the individuals who are given 
unescorted access to the facility or vessel. Rather, TWIC is a secure, 
verified credential that can be used in conjunction with the owner/
operator's risk-based security plan and as required by the Coast Guard 
security regulations.
    As envisioned in this NPRM, owners/operators will determine an 
individual's need for unescorted access to secure areas and then grant 
access using a TWIC program. The access control administrator of the 
vessel or facility verifies that the individual holding the TWIC 
matches the biometric stored on the TWIC by conducting a 1-to-1 match 
with the individual's finger and the fingerprint template stored on the 
chip in the TWIC.
    The owner/operator verifies that an individual's TWIC is valid, 
either by directly interfacing with the TSA system or by using a list 
of invalid credentials downloaded from TSA. Either method provides 
owners/operators pertinent information concerning the validity of the 
credential. TSA will invalidate credentials that are reported as lost, 
stolen, damaged, retired, or issued to an applicant that TSA 
subsequently determines may pose a security threat. When the 
invalidation is for cause, that is, due to a security threat, TSA will 
revoke the credential. Invalidated credentials cannot be used or 
honored for unescorted access to secure areas. Cardholders who report 
the credential as lost, stolen, or damaged must go to the enrollment 
center for resolution, and/or re-issuance of a new credential.
    After the individual has been granted access to the facility, the 
owner/operator may opt to notify the TSA system that access privileges 
have been granted to this worker at that facility. If the owner/
operator invokes this option, the owner/operator also assumes 
responsibility for informing the TSA system if the owner/operator 
subsequently denies the individual access privileges.
f. Lost, Damaged, or Stolen TWICs
    Replacement TWICs are available if a credential is lost, stolen, or 
damaged. As soon as the applicant is aware that the credential is 
missing or damaged, he or she calls the Call Center and the Center 
follows a standard process to invalidate the credential. The applicant 
then travels to an enrollment center to receive a new credential. 
During Prototype, the card production facility printed and shipped the 
new credentials within 24 hours of receiving the information. 
Applicants must pay a fee of $36 to cover the cost of lost/damage/
stolen credential invalidation, new credential production, reissuance, 
shipping, and other appropriate program costs. No new TSA threat 
assessment-specific or enrollment costs are factored into this 
replacement fee.
g. Renewal
    TWICs issued under this rule will expire after five years unless 
renewed. TSA does not plan to notify TWIC holders when their credential 
is about to expire because the expiration date will be displayed on the 
face of the credential. To renew a TWIC, the holder must appear at any 
enrollment center, starting up to 90 days before the expiration date of 
the credential, to initiate the renewal process. However, mariners are 
allowed and encouraged to initiate renewal 180 days prior to expiration 
to allow sufficient time for TSA to conduct the security threat 
assessment and the Coast Guard to complete any review necessary to 
renew any required mariner credentials. During renewal, applicants must 
provide the same biographic and biometric information required in the 
initial enrollment and pay the associated fees. A new credential is 
issued upon renewal.
h. Call Center
    Upon publication of the final rule, TSA will refer the public to a 
Call Center to assist with questions about the TWIC program. An 
automated telephone line, listing options for the caller to select, 
will direct the caller to the TWIC Help Desk or the TSA/TWIC Web site.

[[Page 29404]]

Callers will be able to discuss questions about the program and final 
standard, the status of their security threat assessment, the location 
and time of operation of enrollment centers, and online applications 
and educational materials. TSA has used the Call Center when 
implementing other new programs and believes it will be very useful to 
owners/operators and applicants.
i. Notifying Employers of Threat Determinations
    TSA is proposing to modify the rule text applicable to HME 
applicants concerning employer notification and apply the proposed 
changes to the TWIC applicants.
    As discussed above, SAFETEA-LU established several mandates 
concerning the threat assessment process. One of the provisions 
requires TSA to invite comment on and develop a process to notify 
employers of HME applicants of the results of the threat assessment. 
Specifically, section 7105 states that--

    Within 90 days of enactment, TSA, after receiving comments from 
interested parties, must develop and implement a process for 
notifying employers designated by applicants for a HAZMAT license of 
the results of the applicant's background check if (1) such 
notification is appropriate considering the potential security 
implications and (2) the Director determines in a final notification 
of threat assessment served on the applicant that he or she does not 
meet the standards for granting a license.

    In the November 24, 2004 hazmat rule, TSA discussed employer 
notification, noting that actual criminal history or other dispositive 
records must be maintained confidentially by TSA. See 69 FR at 68726. 
TSA may inform an employer that an employee is disqualified from 
holding an HME, or has had an HME revoked, so that the employer knows 
that the employee is not authorized to transport hazardous materials. 
TSA, however, generally cannot disclose the basis for the determination 
result of the threat assessment due to prohibitions on disclosure of 
such information under the Privacy Act, or other pertinent privacy laws 
or law enforcement or security regulations. See e.g., 5 U.S.C. 552a (as 
amended); 46 U.S.C. 70105(e); 28 CFR 50.12. In the hazmat rule, TSA 
noted that if it believes an immediate threat exists, TSA may provide 
additional information to the employer to help prevent a security 
incident.
    In the November hazmat rule, TSA requested comment on methods to 
notify an employer that a particular driver's HME is revoked or the 
application for an HME is denied. TSA anticipated that it would be 
difficult to locate a driver's employer because drivers tend to change 
employers frequently and may work for several employers at one time. 
Also, many drivers are self-employed as owners/operators and 
notification in these cases would be unnecessary. TSA proposed 
requiring each employer to maintain a current list of hazmat-endorsed 
driver employees on a secure Web site that TSA could access for 
notification purposes and employers could amend as employees change 
jobs. This list would minimize the chance that TSA would erroneously 
notify a previous employer of a disqualification. Also, the list would 
prevent the loss of time and resources needed to locate an employer for 
notification. Similar procedures are in place with respect to aviation 
workers who have airport security identification display area 
authority. 49 CFR 1542.211. TSA received no comments on this proposal 
or suggestions for an alternative plan, although some employers stated 
that they would like notification of all employee disqualifications.
    Currently, when TSA determines that a driver is not qualified to 
hold an HME, TSA applies the following policy:
    (1) TSA notifies the employer only in cases where TSA determines 
that an imminent security threat may exist.
    (2) TSA notifies the employer listed in the driver's HME 
application.
    (3) TSA limits the information provided to the employer to the fact 
that the driver's HME is being revoked or denied, but does not provide 
the reason for the action.
    TSA developed this process to address two primary concerns. First, 
TSA is concerned about sharing disqualification information with 
incorrect employers and that the likelihood of such notifications would 
rise if TSA made notifications in all disqualification cases. For the 
many drivers who change employers frequently or are self-employed, TSA 
would expend considerable resources trying to determine with certainty 
an applicant's current employer(s).
    Second, for actions in which there is not an imminent threat, 
employers of hazmat drivers have other procedures in place to verify 
whether a driver has an HME. Carriers currently are required to 
determine if a driver em
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.