In the Matter of Louisiana Energy Services L.P. (National Enrichment Facility) and All Other Persons Who Seek or Obtain Access to Safeguards Information Described Herein; Order Imposing Requirements for the Protection of Safeguards Information and Access to New Safeguards Information (Effective Immediately), 54845-54849 [06-7742]
Download as PDF
Federal Register / Vol. 71, No. 181 / Tuesday, September 19, 2006 / Notices
Accumulation on PWR Sump
Performance (Public Meeting) (Contact:
Michael L. Scott, 301–415–0565).
This meeting will be webcast live at
the Web address—https://www.nrc.gov
*The schedule for Commission
meetings is subject to change on short
notice. To verify the status of meetings
call (recording)—(301)–415–1292.
Contact person for more information:
Michelle Schroll, (301) 415–1662.
*
*
*
*
*
The NRC Commission Meeting
Schedule can be found on the Internet
at: https://www.nrc.gov/what-we-do/
policy-making/schedule.html.
*
*
*
*
*
The NRC provides reasonable
accommodation to individuals with
disabilities where appropriate. If you
need a reasonable accommodation to
participate in these public meetings or
need this meeting notice or the
transcript or other information from the
public meetings in another format (e.g.
braille, large print), please notify the
NRC’s Disability Program Coordinator,
Deborah Chan, at 301–415–7041, TDD:
301–415–2100, or by e-mail at
DLC@nrc.gov. Determinations on
requests for reasonable accommodation
will be made on a case-by-case basis.
*
*
*
*
*
This notice is distributed by mail to
several hundred subscribers; if you no
longer wish to receive it, or would like
to be added to the distribution, please
contact the Office of the Secretary,
Washington, DC 20555 (301–415–1969).
In addition, distribution of this meeting
notice over the Internet system is
available. If you are interested in
receiving this Commission meeting
scheduled electronically, please send an
electronic message to dkw@nrc.gov.
Dated: September 14, 2006.
R. Michelle Schroll
Office of the Secretary.
[FR Doc. 06–7765 Filed 9–15–06; 10:01 am]
pwalker on PRODPC60 with NOTICES
16:49 Sep 18, 2006
[EA–06–193]
In the Matter of Louisiana Energy
Services L.P. (National Enrichment
Facility) and All Other Persons Who
Seek or Obtain Access to Safeguards
Information Described Herein; Order
Imposing Requirements for the
Protection of Safeguards Information
and Access to New Safeguards
Information (Effective Immediately)
I
Louisiana Energy Services, L.P., (LES
or the Licensee) holds a license, issued
in accordance with the Atomic Energy
Act (AEA) of 1954, by the U.S. Nuclear
Regulatory Commission (NRC or
Commission) authorizing it to construct
and operate a uranium enrichment
facility in Lea County, New Mexico. On
March 19, 2004, in accordance with
Commission direction in Staff
Requirements Memorandum SECY–03–
0083, NRC provided LES, for its
information, copies of Orders issued to
Category III facilities on interim
measures to enhance physical security
at those facilities. Those Orders
contained Safeguards Information 1. In
addition, in the future, the Commission
may issue the Licensee additional
Orders that require compliance with
specific Additional Security Measures
to enhance the security. These Orders
are also expected to contain Safeguards
Information, which cannot be released
to the public and must be protected
from unauthorized disclosure.
Therefore, the Commission is imposing
the requirements, as set forth in
Attachments A and B of this Order, so
that the Licensee can receive these
documents. This Order also imposes
requirements for the protection of
Safeguards Information in the hands of
any person,2 whether or not a licensee
of the Commission, who produces,
receives, or acquires Safeguards
Information.
1 Safeguards
Information is a form of sensitive,
unclassified, security-related information that the
Commission has the authority to designate and
protect under section 147 of the AEA.
2 Person means: (1) any individual, corporation,
partnership, firm, association, trust, estate, public
or private institution, group, government agency
other than the Commission or the Department of
Energy, except that the Department of Energy shall
be considered a person with respect to those
facilities of the Department specified in section 202
of the Energy Reorganization Act of 1974 (88 Stat.
1244), any State or any political subdivision of, or
any political entity within a State, any foreign
government or nation or any political subdivision
of any such government or nation, or other entity;
and (2) any legal successor, representative, agent, or
agency of the foregoing.
BILLING CODE 7590–01–M
VerDate Aug<31>2005
NUCLEAR REGULATORY
COMMISSION
Jkt 208001
PO 00000
Frm 00051
Fmt 4703
Sfmt 4703
54845
On August 8, 2005, the Energy Policy
Act of 2005 (EPAct) was enacted.
Section 652 of the EPAct amended
Section 149 of the AEA to require
fingerprinting and a Federal Bureau of
Investigation (FBI) identification and
criminal history records check of any
person who is to be permitted to have
access to Safeguards Information. The
NRC’s implementation of this
requirement cannot await the
completion of the Safeguards
Information rulemaking, which is under
way, because the EPAct fingerprinting
and criminal history check requirements
for access to Safeguards Information
were immediately effective upon
enactment of the EPAct. Although the
EPAct permits the Commission by rule
to except certain categories of
individuals from the fingerprinting
requirement, which the Commission has
done (see 10 CFR 73.59, 71 FR 33989
(June 13, 2006)), it is unlikely that many
Licensee employees are excepted from
the fingerprinting requirement by the
‘‘fingerprinting relief’’ rule. Individuals
relieved from the fingerprinting and
criminal history checks under the relief
rule include Federal, State, and local
officials and law enforcement
personnel; Agreement State inspectors,
who conduct security inspections on
behalf of the NRC; members of Congress
and certain employees of members of
Congress or Congressional Committees;
representatives of the International
Atomic Energy Agency or certain
foreign government organizations. In
addition, individuals who have active
Federal security clearances and have
satisfied the EPAct fingerprinting
requirement need not be fingerprinted
again. Therefore, in accordance with
Section 149 of the AEA, as amended by
the EPAct, the Commission is imposing
additional requirements, as set forth by
this Order, for access to new Safeguards
Information 3 by any person, from any
person, whether or not a Licensee,
Applicant, or Certificate Holder of the
Commission or Agreement States.
II
The Commission has broad statutory
authority to protect Safeguards
Information and prohibit its
unauthorized disclosure. Section 147 of
the AEA, as amended, grants the
Commission explicit authority to
‘‘* * * issue such orders, as necessary
3 ‘‘New Safeguards Information’’ means
Safeguards Information generated subsequent to
August 8, 2005, the date of enactment of the EPAct.
‘‘New Safeguards Information’’ also means any
Safeguards Information, regardless of when it was
generated, that is being accessed by an individual
who has never been previously granted access to
Safeguards Information.
E:\FR\FM\19SEN1.SGM
19SEN1
pwalker on PRODPC60 with NOTICES
54846
Federal Register / Vol. 71, No. 181 / Tuesday, September 19, 2006 / Notices
to prohibit the unauthorized disclosure
of safeguards information * * *’’
Furthermore, Section 652 of the EPAct
amended Section 149 of the AEA to
require fingerprinting and an FBI
identification and a criminal history
records check of each individual who
seeks access to Safeguards Information.
Licensees and all persons who produce,
receive, or acquire Safeguards
Information must ensure proper
handling and protection of Safeguards
Information, to avoid unauthorized
disclosure, in accordance with the
specific requirements for the protection
of Safeguards Information contained in
Attachments A and B. The Commission
hereby provides notice that it intends to
treat violations of the requirements
contained in Attachments A and B,
applicable to the handling and
unauthorized disclosure of Safeguards
Information, as serious breaches of
adequate protection of the public health
and safety and the common defense and
security of the United States. Access to
Safeguards Information is limited to
those persons who have established a
need-to-know the information, and are
considered to be trustworthy and
reliable, and who satisfy the
fingerprinting and criminal history
records check required by the EPAct
and this Order. A ‘‘need-to-know’’
means a determination by a person
having responsibility for protecting
Safeguards Information that a proposed
recipient’s access to Safeguards
Information is necessary in the
performance of official, contractual, or
licensee duties of employment. The
Licensee and all other persons who
obtain Safeguards Information must
ensure that they develop, maintain, and
implement strict policies and
procedures for the proper handling of
Safeguards Information, to prevent
unauthorized disclosure, in accordance
with the requirements in Attachments A
and B. The Licensee must ensure that all
contractors whose employees may have
access to Safeguards Information either
adhere to the Licensee’s policies and
procedures on Safeguards Information
or develop, maintain, and implement
their own acceptable policies and
procedures. The Licensee remains
responsible for the conduct of its
contractors. The policies and
procedures necessary to ensure
compliance with applicable
requirements contained in Attachments
A and B must address, at a minimum,
the following: (1) The general
performance requirement that each
person who produces, receives, or
acquires Safeguards Information shall
ensure that Safeguards Information is
VerDate Aug<31>2005
16:49 Sep 18, 2006
Jkt 208001
protected against unauthorized
disclosure; (2) protection of Safeguards
Information at fixed sites, in use and in
storage, and while in transit; (3)
correspondence containing Safeguards
Information; (4) access to Safeguards
Information; (5) preparation, marking,
reproduction, and destruction of
documents; (6) external transmission of
documents; (7) use of automatic data
processing systems; and (8) removal of
the Safeguards Information category.
To provide assurance that the
Licensee is implementing appropriate
measures to achieve a consistent level of
protection to prohibit the unauthorized
disclosure of new Safeguards
Information, the Licensee shall
implement the fingerprinting and
criminal history check requirements for
access to new Safeguards Information in
this Order, as well as the requirements
in Attachments A and B of this Order.
In addition, pursuant to 10 CFR 2.202,
I find that in light of the common
defense and security matters identified
above, which warrant the issuance of
this Order, the public health, safety, and
interest require that this Order be
effective immediately.
III
Accordingly, pursuant to Sections 53,
62, 63, 81, 147, 149, 161b, 161i, 161o,
182, and 186 of the Atomic Energy Act
of 1954, as amended, and the
Commission’s regulations in 10 CFR
2.202, 10 CFR part 30, 10 CFR part 40,
and 10 CFR part 70, it is hereby ordered,
effective immediately, that licensee and
all other persons who produce, receive,
or acquire the additional security
measures identified above (whether
draft or final), or who seek or obtain
access to new safeguards information,
shall comply with the requirements set
forth in this Order, including the
requirements in Attachments A and B.
A. No person may have access to new
Safeguards Information unless that
person has a need-to-know the new
Safeguards Information, has been
fingerprinted and undergone an FBI
identification and criminal history
records check, which has been favorably
decided, and satisfies all other
applicable requirements for access to
Safeguards Information. Fingerprinting
and the FBI identification and criminal
history records check are not required,
however, for any person who is relieved
from that requirement by 10 CFR 73.59
(71 FR 33989 (June 13, 2006)) or who
has an active Federal security clearance.
B. No person may provide new
Safeguards Information to any other
person except in accordance with
condition III.A above. Prior to sharing
new Safeguards Information with any
PO 00000
Frm 00052
Fmt 4703
Sfmt 4703
other person, a copy of this Order shall
be provided to that person.
IV
The Director, Office of Nuclear
Material Safety and Safeguards, may, in
writing, relax or rescind any of the
above conditions, on demonstration of
good cause by the Licensee. In
accordance with 10 CFR 2.202, the
Licensee must, and any other person
adversely affected by this Order may,
submit an answer to this Order, and
may request a hearing on this Order,
within twenty (20) days of the date of
this Order. Where good cause is shown,
consideration will be given to extending
the time to request a hearing. A request
for extension of time in which to submit
an answer or request a hearing must be
made in writing to the Director, Office
of Nuclear Material Safety and
Safeguards, U.S. Nuclear Regulatory
Commission, Washington, DC 20555,
and include a statement of good cause
for the extension. The answer may
consent to this Order. Unless the answer
consents to this Order, the answer shall,
in writing and under oath or
affirmation, specifically set forth the
matters of fact and law on which the
Licensee or other person adversely
affected relies, and the reasons as to
why the Order should not have been
issued. Any answer or request for a
hearing shall be submitted to the
Secretary, Office of the Secretary, U.S.
Nuclear Regulatory Commission, ATTN:
Rulemakings and Adjudications Staff,
Washington, DC 20555. Copies also
shall be sent to the Director, Office of
Nuclear Material Safety and Safeguards,
U.S. Nuclear Regulatory Commission,
Washington, DC 20555; to the Assistant
General Counsel for Materials Litigation
and Enforcement, at the same address;
and to the Licensee, if the answer or
hearing request is by a person other than
the Licensee. Because of possible delays
in delivery of mail to United States
Government offices, it is requested that
answers and requests for hearing be
transmitted to the Secretary of the
Commission, either by means of
facsimile transmission, to 301–415–
1101, or by e-mail, to
hearingdocket@nrc.gov; and also to the
Office of the General Counsel, either by
means of facsimile transmission, to 301–
415–3725, or by e-mail, to
OGCMailCenter@nrc.gov. If a person
other than the Licensee requests a
hearing, that person shall set forth with
particularity the manner in which their
interest is adversely affected by this
Order and shall address the criteria set
forth in 10 CFR 2.309.
If a hearing is requested by the
Licensee or a person whose interest is
E:\FR\FM\19SEN1.SGM
19SEN1
Federal Register / Vol. 71, No. 181 / Tuesday, September 19, 2006 / Notices
adversely affected, the Commission will
issue an Order designating the time and
place of any hearing. If a hearing is held,
the issue to be considered at such
hearing shall be whether this Order
should be sustained.
Pursuant to 10 CFR 2.202(c)(2)(i), the
Licensee may, in addition to demanding
a hearing, at the time the answer is filed
or sooner, move the presiding officer to
set aside the immediate effectiveness of
the Order on the grounds that the Order,
including the need for immediate
effectiveness, is not based on adequate
evidence, but on mere suspicion,
unfounded allegations, or error. In the
absence of any request for hearing, or
written approval of an extension of time
in which to request a hearing, the
provisions specified in Section III above
shall be final twenty (20) days from the
date of this Order, without further order
or proceedings. If an extension of time
for requesting a hearing has been
approved, the provisions specified in
Section III shall be final when the
extension expires, if a hearing request
has not been received.
An answer or a request for hearing
shall not stay the immediate
effectiveness of this Order.
Dated at Rockville, Maryland this 28th day
of August 2006.
For the Nuclear Regulatory Commission.
Jack R. Strosnider,
Director, Office of Nuclear Material Safety
and Safeguards.
Attachment A—Modified Handling
Requirements for the Protection of
Certain Safeguards Information (SGI–
M)
pwalker on PRODPC60 with NOTICES
General Requirement
Information and material that the U.S.
Nuclear Regulatory Commission (NRC)
determines are safeguards information
must be protected from unauthorized
disclosure. In order to distinguish
information needing modified
protection requirements from the
safeguards information for reactors and
fuel cycle facilities that require a higher
level of protection, the term ‘‘Safeguards
Information-Modified Handling’’ (SGI–
M) is being used as the distinguishing
marking for certain materials licensees.
Each person who produces, receives, or
acquires SGI–M shall ensure that it is
protected against unauthorized
disclosure. To meet this requirement,
licensees and persons shall establish
and maintain an information protection
system that includes the measures
specified below. Information protection
procedures employed by state and local
police forces are deemed to meet these
requirements.
VerDate Aug<31>2005
16:49 Sep 18, 2006
Jkt 208001
Persons Subject to These Requirements
Any person, whether or not a licensee
of the NRC, who produces, receives, or
acquires SGI–M is subject to the
requirements (and sanctions) of this
document. Firms and their employees
that supply services or equipment to
materials licensees fall under this
requirement if they possess SGI–M. A
licensee must inform contractors and
suppliers of the existence of these
requirements and the need for proper
protection. (See more under Conditions
for Access)
State or local police units who have
access to SGI–M are also subject to these
requirements. However, these
organizations are deemed to have
adequate information protection
systems. The conditions for transfer of
information to a third party, i.e., needto-know, would still apply to the police
organization as would sanctions for
unlawful disclosure. Again, it would be
prudent for licensees who have
arrangements with local police to advise
them of the existence of SGI–M
requirements.
Criminal and Civil Sanctions
The Atomic Energy Act of 1954, as
amended, explicitly provides that any
person, ‘‘whether or not a licensee of the
Commission, who violates any
regulations adopted under this section
shall be subject to the civil monetary
penalties of section 234 of this Act.’’
Furthermore, willful violation of any
regulation or order governing safeguards
information is a felony subject to
criminal penalties in the form of fines
or imprisonment, or both. See sections
147b. and 223 of the Act.
Conditions for Access
Access to SGI–M beyond the initial
recipients of the order will be governed
by the background check requirements
imposed by the order. Access to SGI–M
by licensee employees, agents, or
contractors must include both an
appropriate need-to-know
determination by the licensee, as well as
a determination concerning the
trustworthiness of individuals having
access to the information. Employees of
an organization affiliated with the
licensee’s company, e.g., a parent
company, may be considered as
employees of the licensee for access
purposes.
Need-to-Know
Need-to-know is defined as a
determination by a person having
responsibility for protecting SGI–M that
a proposed recipient’s access to SGI–M
is necessary in the performance of
official, contractual, or licensee duties
PO 00000
Frm 00053
Fmt 4703
Sfmt 4703
54847
of employment. The recipient must be
made aware that the information is SGI–
M and those having access to it are
subject to these requirements as well as
criminal and civil sanctions for
mishandling the information.
Occupational Groups
Dissemination of SGI–M is limited to
individuals who have an established
need-to-know and who are members of
certain occupational groups. These
occupational groups are:
1. An employee, agent, or contractor
of an applicant, a licensee, the
Commission, or the United States
Government;
2. A member of a duly authorized
committee of the Congress;
3. The Governor of a State or his
designated representative;
4. A representative of the
International Atomic Energy Agency
(IAEA) engaged in activities associated
with the U.S./IAEA Safeguards
Agreement who has been certified by
the NRC;
5. A member of a state or local law
enforcement authority that is
responsible for responding to requests
for assistance during safeguards
emergencies;
6. A person to whom disclosure is
ordered pursuant to Section 2.744(e) of
Part 2 of part 10 of the Code of Federal
Regulations; or
7. State Radiation Control Program
Directors (and State Homeland Security
Directors) or their designees.
In a generic sense, the individuals
described above in (A) through (G) are
considered to be trustworthy by virtue
of their employment status. For nongovernmental individuals in group (A)
above, a determination of reliability and
trustworthiness is required. Discretion
must be exercised in granting access to
the individuals in group (A). If there is
any indication that the recipient would
be unwilling or unable to provide
proper protection for the SGI–M, they
are not authorized to receive SGI–M.
Information Considered for Safeguards
Information Designation
Information deemed SGI–M is
information the disclosure of which
could reasonably be expected to have a
significant adverse effect on the health
and safety of the public or the common
defense and security by significantly
increasing the likelihood of theft,
diversion, or sabotage of materials or
facilities subject to NRC jurisdiction.
SGI–M identifies safeguards
information which is subject to these
requirements. These requirements are
necessary in order to protect quantities
of nuclear material significant to the
E:\FR\FM\19SEN1.SGM
19SEN1
54848
Federal Register / Vol. 71, No. 181 / Tuesday, September 19, 2006 / Notices
health and safety of the public or
common defense and security.
The overall measure for consideration
of SGI–M is the usefulness of the
information (security or otherwise) to an
adversary in planning or attempting a
malevolent act. The specificity of the
information increases the likelihood
that it will be useful to an adversary.
Protection While in Use
While in use, SGI–M shall be under
the control of an authorized individual.
This requirement is satisfied if the SGI–
M is attended by an authorized
individual even though the information
is in fact not constantly being used.
SGI–M, therefore, within alarm stations,
continuously manned guard posts or
ready rooms need not be locked in file
drawers or storage containers.
Under certain conditions the general
control exercised over security zones or
areas would be considered to meet this
requirement. The primary consideration
is limiting access to those who have a
need-to-know. Some examples would
be:
Alarm stations, guard posts and guard
ready rooms; Engineering or drafting
areas if visitors are escorted and
information is not clearly visible; Plant
maintenance areas if access is restricted
and information is not clearly visible;
Administrative offices (e.g., central
records or purchasing) if visitors are
escorted and information is not clearly
visible.
pwalker on PRODPC60 with NOTICES
Protection While in Storage
While unattended, SGI–M shall be
stored in a locked file drawer or
container. Knowledge of lock
combinations or access to keys
protecting SGI–M shall be limited to a
minimum number of personnel for
operating purposes who have a ‘‘needto-know’’ and are otherwise authorized
access to SGI–M in accordance with
these requirements. Access to lock
combinations or keys shall be strictly
controlled so as to prevent disclosure to
an unauthorized individual.
Transportation of Documents and Other
Matter
Documents containing SGI–M when
transmitted outside an authorized place
of use or storage shall be enclosed in
two sealed envelopes or wrappers. The
inner envelope or wrapper shall contain
the name and address of the intended
recipient, and be marked both sides, top
and bottom with the words ‘‘Safeguards
Information—Modified Handling.’’ The
outer envelope or wrapper must be
addressed to the intended recipient,
must contain the address of the sender,
and must not bear any markings or
VerDate Aug<31>2005
16:49 Sep 18, 2006
Jkt 208001
indication that the document contains
SGI–M.
SGI–M may be transported by any
commercial delivery company that
provides nationwide overnight service
with computer tracking features, U.S.
first class, registered, express, or
certified mail, or by any individual
authorized access pursuant to these
requirements.
Within a facility, SGI–M may be
transmitted using a single opague
envelope. It may also be transmitted
within a facility without single or
double wrapping, provided adequate
measures are taken to protect the
material against unauthorized
disclosure. Individuals transporting
SGI–M should retain the documents in
their personal possession at all times or
ensure that the information is
appropriately wrapped and also secured
to preclude compromise by an
unauthorized individual.
Preparation and Marking of Documents
While the NRC is the sole authority
for determining what specific
information may be designated as ‘‘SGI–
M,’’ originators of documents are
responsible for determining whether
those documents contain such
information. Each document or other
matter that contains SGI–M shall be
marked ‘‘Safeguards InformationModified Handling’’ in a conspicuous
manner on the top and bottom of the
first page to indicate the presence of
protected information. The first page of
the document must also contain (i) the
name, title, and organization of the
individual authorized to make a SGI–M
determination, and who has determined
that the document contains SGI–M, (ii)
the date the document was originated or
the determination made, (iii) an
indication that the document contains
SGI–M, and (iv) an indication that
unauthorized disclosure would be
subject to civil and criminal sanctions.
Each additional page shall be marked in
a conspicuous fashion at the top and
bottom with letters denoting
‘‘Safeguards Information-Modified
Handling.’’
In addition to the ‘‘Safeguards
Information-Modified Handling’’
markings at the top and bottom of page,
transmittal letters or memoranda which
do not in themselves contain SGI–M
shall be marked to indicate that
attachments or enclosures contain SGI–
M but that the transmittal does not (e.g.,
‘‘When separated from SGI–M
enclosure(s), this document is
decontrolled’’).
In addition to the information
required on the face of the document,
each item of correspondence that
PO 00000
Frm 00054
Fmt 4703
Sfmt 4703
contains SGI–M shall, by marking or
other means, clearly indicate which
portions (e.g., paragraphs, pages, or
appendices) contain SGI–M and which
do not. Portion marking is not required
for physical security and safeguards
contingency plans.
All documents or other matter
containing SGI–M in use or storage shall
be marked in accordance with these
requirements. A specific exception is
provided for documents in the
possession of contractors and agents of
licensees that were produced more than
one year prior to the effective date of the
order. Such documents need not be
marked unless they are removed from
file drawers or containers. The same
exception applies to old documents
stored away from the facility in central
files or corporation headquarters.
Since information protection
procedures employed by state and local
police forces are deemed to meet NRC
requirements, documents in the
possession of these agencies need not be
marked as set forth in this document.
Removal From SGI–M Category
Documents containing SGI–M shall be
removed from the SGI–M category
(decontrolled) only after the NRC
determines that the information no
longer meets the criteria of SGI–M.
Licensees have the authority to make
determinations that specific documents
which they created no longer contain
SGI–M information and may be
decontrolled. Consideration must be
exercised to ensure that any document
decontrolled shall not disclose SGI–M
in some other form or be combined with
other unprotected information to
disclose SGI–M.
The authority to determine that a
document may be decontrolled may be
exercised only by, or with the
permission of, the individual (or office)
who made the original determination.
The document shall indicate the name
and organization of the individual
removing the document from the SGI–
M category and the date of the removal.
Other persons who have the document
in their possession should be notified of
the decontrolling of the document.
Reproduction of Matter Containing SGI–
M
SGI–M may be reproduced to the
minimum extent necessary consistent
with need without permission of the
originator. Newer digital copiers which
scan and retain images of documents
represent a potential security concern. If
the copier is retaining any information
in memory, the copier cannot be
connected to a network. It should also
be placed in a location that is cleared
E:\FR\FM\19SEN1.SGM
19SEN1
Federal Register / Vol. 71, No. 181 / Tuesday, September 19, 2006 / Notices
and controlled for the authorized
processing of SGI–M information.
Different copiers have different
capabilities, including some which
come with features that allow the
memory to be erased. Each copier would
have to be examined from a physical
security perspective.
Use of Automatic Data Processing (ADP)
Systems
SGI–M may be processed or produced
on an ADP system provided that the
system is assigned to the licensee’s or
contractor’s facility and requires the use
of an entry code/password for access to
stored information. Licensees must
process this information in a computing
environment that has adequate
computer security controls in place to
prevent unauthorized access to the
information. An ADP system is defined
here as a data processing system having
the capability of long term storage of
information. Word processors such as
typewriters are not subject to the
requirements as long as they do not
transmit information off-site. (Note: If
SGI–M is produced on a typewriter, the
ribbon must be removed and stored in
the same manner as other SGI–M
information or media.) The basic
objective of these restrictions is to
prevent access and retrieval of stored
SGI–M by unauthorized individuals,
particularly from remote terminals.
Specific files containing SGI–M will be
password protected to preclude access
by an unauthorized individual. SGI–M
files may be transmitted over a network
if the file is encrypted. In such cases,
the licensee will select a commercially
available encryption system that NIST
has validated as conforming to Federal
Information Processing Standards
(FIPS). SGI–M files shall be properly
labeled as ‘‘Safeguards Information—
Modified Handling’’ and saved to
removable media and stored in a locked
file drawer or cabinet. The National
Institute of Standards and Technology
(NIST) maintains a listing of all
validated encryption systems at https://
csrc.nist.gov/cryptval/140-1/
1401val.htm.
pwalker on PRODPC60 with NOTICES
Telecommunications
SGI–M may not be transmitted by
unprotected telecommunications
circuits except under emergency or
extraordinary conditions. For the
purpose of this requirement, emergency
or extraordinary conditions are defined
as any circumstances that require
immediate communications in order to
report, summon assistance for, or
respond to a security event (or an event
that has potential security significance).
VerDate Aug<31>2005
16:49 Sep 18, 2006
Jkt 208001
This restriction applies to telephone,
telegraph, teletype, facsimile circuits,
and to radio. Routine telephone or radio
transmission between site security
personnel, or between the site and local
police, should be limited to message
formats or codes that do not disclose
facility security features or response
procedures. Similarly, call-ins during
transport should not disclose
information useful to a potential
adversary. Infrequent or non-repetitive
telephone conversations regarding a
physical security plan or program are
permitted provided that the discussion
is general in nature.
Individuals should use care when
discussing SGI–M at meetings or in the
presence of others to ensure that the
conversation is not overheard by
persons not authorized access.
Transcripts, tapes or minutes of
meetings or hearings that contain SGI–
M shall be marked and protected in
accordance with these requirements.
Destruction
Documents containing SGI–M must be
destroyed when no longer needed. They
may be destroyed by tearing into small
pieces, burning, shredding or any other
method that precludes reconstruction by
means available to the public at large.
Piece sizes one-half inch or smaller
composed of several pages or
documents and thoroughly mixed are
considered completely destroyed.
Attachment B—Trustworthiness and
Reliability Requirements for
Individuals Handling Safeguards
Information
Licensees shall document the basis for
concluding that there is reasonable
assurance that individuals granted
access to safeguards information or who
are placed in positions where they
could facilitate access to the regulated
material are trustworthy and reliable,
and do not constitute an unreasonable
risk for malevolent use of the regulated
material.
The trustworthiness, reliability, and
verification of an individual’s true
identity shall be determined based on a
background investigation. The
background investigation shall address
at least the past three (3) years, and, as
a minimum, include a local criminal
history check (unless local or State laws
prohibit local criminal history checks of
current employees), verification of
employment history, education,
employment eligibility, and personal
references. If an individual’s
employment has been less than the
required three (3) year period,
educational references may be used in
lieu of employment history.
PO 00000
Frm 00055
Fmt 4703
Sfmt 4703
54849
The licensee’s background
investigation requirements may be
satisfied for an individual that has an
active Federal security clearance.
[FR Doc. 06–7742 Filed 9–18–06; 8:45 am]
BILLING CODE 7590–01–P
OFFICE OF PERSONNEL
MANAGEMENT
Federal Salary Council
Office of Personnel
Management.
AGENCY:
ACTION:
Notice of meeting.
SUMMARY: The Federal Salary Council
will meet at the time and location
shown below. The Council is an
advisory body composed of
representatives of Federal employee
organizations and experts in the fields
of labor relations and pay policy. The
Council makes recommendations to the
President’s Pay Agent (the Secretary of
Labor and the Directors of the Office of
Management and Budget and the Office
of Personnel Management) about the
locality pay program for General
Schedule employees under section 5304
of title 5, United States Code. The
Council’s recommendations cover the
establishment or modification of locality
pay areas, the coverage of salary
surveys, the process of comparing
Federal and non-Federal rates of pay,
and the level of comparability payments
that should be paid.
The Council will review the results of
pay comparisons and formulate its
recommendations to the President’s Pay
Agent on pay comparison methods,
locality pay rates, and locality pay area
boundaries for 2008. The Council
anticipates it will complete its work for
this year at this meeting and has not
scheduled any additional meetings for
2006. The public may submit written
materials about the locality pay program
to the Council at the address shown
below. The meeting is open to the
public.
October 12, 2006, at 10 a.m.
Location: Office of Personnel
Management, 1900 E Street NW., Room
1350, Washington, DC.
DATES:
FOR FURTHER INFORMATION CONTACT:
Jerome D. Mikowicz, Acting Deputy
Associate Director for Pay and
Performance Policy, Office of Personnel
Management, 1900 E Street NW., Room
7H31, Washington, DC 20415–8200.
Phone (202) 606–2838; FAX (202) 606–
4264; or e-mail at
pay-performance-policy@opm.gov.
E:\FR\FM\19SEN1.SGM
19SEN1
Agencies
[Federal Register Volume 71, Number 181 (Tuesday, September 19, 2006)]
[Notices]
[Pages 54845-54849]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 06-7742]
-----------------------------------------------------------------------
NUCLEAR REGULATORY COMMISSION
[EA-06-193]
In the Matter of Louisiana Energy Services L.P. (National
Enrichment Facility) and All Other Persons Who Seek or Obtain Access to
Safeguards Information Described Herein; Order Imposing Requirements
for the Protection of Safeguards Information and Access to New
Safeguards Information (Effective Immediately)
I
Louisiana Energy Services, L.P., (LES or the Licensee) holds a
license, issued in accordance with the Atomic Energy Act (AEA) of 1954,
by the U.S. Nuclear Regulatory Commission (NRC or Commission)
authorizing it to construct and operate a uranium enrichment facility
in Lea County, New Mexico. On March 19, 2004, in accordance with
Commission direction in Staff Requirements Memorandum SECY-03-0083, NRC
provided LES, for its information, copies of Orders issued to Category
III facilities on interim measures to enhance physical security at
those facilities. Those Orders contained Safeguards Information \1\. In
addition, in the future, the Commission may issue the Licensee
additional Orders that require compliance with specific Additional
Security Measures to enhance the security. These Orders are also
expected to contain Safeguards Information, which cannot be released to
the public and must be protected from unauthorized disclosure.
Therefore, the Commission is imposing the requirements, as set forth in
Attachments A and B of this Order, so that the Licensee can receive
these documents. This Order also imposes requirements for the
protection of Safeguards Information in the hands of any person,\2\
whether or not a licensee of the Commission, who produces, receives, or
acquires Safeguards Information.
---------------------------------------------------------------------------
\1\ Safeguards Information is a form of sensitive, unclassified,
security-related information that the Commission has the authority
to designate and protect under section 147 of the AEA.
\2\ Person means: (1) any individual, corporation, partnership,
firm, association, trust, estate, public or private institution,
group, government agency other than the Commission or the Department
of Energy, except that the Department of Energy shall be considered
a person with respect to those facilities of the Department
specified in section 202 of the Energy Reorganization Act of 1974
(88 Stat. 1244), any State or any political subdivision of, or any
political entity within a State, any foreign government or nation or
any political subdivision of any such government or nation, or other
entity; and (2) any legal successor, representative, agent, or
agency of the foregoing.
---------------------------------------------------------------------------
On August 8, 2005, the Energy Policy Act of 2005 (EPAct) was
enacted. Section 652 of the EPAct amended Section 149 of the AEA to
require fingerprinting and a Federal Bureau of Investigation (FBI)
identification and criminal history records check of any person who is
to be permitted to have access to Safeguards Information. The NRC's
implementation of this requirement cannot await the completion of the
Safeguards Information rulemaking, which is under way, because the
EPAct fingerprinting and criminal history check requirements for access
to Safeguards Information were immediately effective upon enactment of
the EPAct. Although the EPAct permits the Commission by rule to except
certain categories of individuals from the fingerprinting requirement,
which the Commission has done (see 10 CFR 73.59, 71 FR 33989 (June 13,
2006)), it is unlikely that many Licensee employees are excepted from
the fingerprinting requirement by the ``fingerprinting relief'' rule.
Individuals relieved from the fingerprinting and criminal history
checks under the relief rule include Federal, State, and local
officials and law enforcement personnel; Agreement State inspectors,
who conduct security inspections on behalf of the NRC; members of
Congress and certain employees of members of Congress or Congressional
Committees; representatives of the International Atomic Energy Agency
or certain foreign government organizations. In addition, individuals
who have active Federal security clearances and have satisfied the
EPAct fingerprinting requirement need not be fingerprinted again.
Therefore, in accordance with Section 149 of the AEA, as amended by the
EPAct, the Commission is imposing additional requirements, as set forth
by this Order, for access to new Safeguards Information \3\ by any
person, from any person, whether or not a Licensee, Applicant, or
Certificate Holder of the Commission or Agreement States.
---------------------------------------------------------------------------
\3\ ``New Safeguards Information'' means Safeguards Information
generated subsequent to August 8, 2005, the date of enactment of the
EPAct. ``New Safeguards Information'' also means any Safeguards
Information, regardless of when it was generated, that is being
accessed by an individual who has never been previously granted
access to Safeguards Information.
---------------------------------------------------------------------------
II
The Commission has broad statutory authority to protect Safeguards
Information and prohibit its unauthorized disclosure. Section 147 of
the AEA, as amended, grants the Commission explicit authority to ``* *
* issue such orders, as necessary
[[Page 54846]]
to prohibit the unauthorized disclosure of safeguards information * *
*'' Furthermore, Section 652 of the EPAct amended Section 149 of the
AEA to require fingerprinting and an FBI identification and a criminal
history records check of each individual who seeks access to Safeguards
Information. Licensees and all persons who produce, receive, or acquire
Safeguards Information must ensure proper handling and protection of
Safeguards Information, to avoid unauthorized disclosure, in accordance
with the specific requirements for the protection of Safeguards
Information contained in Attachments A and B. The Commission hereby
provides notice that it intends to treat violations of the requirements
contained in Attachments A and B, applicable to the handling and
unauthorized disclosure of Safeguards Information, as serious breaches
of adequate protection of the public health and safety and the common
defense and security of the United States. Access to Safeguards
Information is limited to those persons who have established a need-to-
know the information, and are considered to be trustworthy and
reliable, and who satisfy the fingerprinting and criminal history
records check required by the EPAct and this Order. A ``need-to-know''
means a determination by a person having responsibility for protecting
Safeguards Information that a proposed recipient's access to Safeguards
Information is necessary in the performance of official, contractual,
or licensee duties of employment. The Licensee and all other persons
who obtain Safeguards Information must ensure that they develop,
maintain, and implement strict policies and procedures for the proper
handling of Safeguards Information, to prevent unauthorized disclosure,
in accordance with the requirements in Attachments A and B. The
Licensee must ensure that all contractors whose employees may have
access to Safeguards Information either adhere to the Licensee's
policies and procedures on Safeguards Information or develop, maintain,
and implement their own acceptable policies and procedures. The
Licensee remains responsible for the conduct of its contractors. The
policies and procedures necessary to ensure compliance with applicable
requirements contained in Attachments A and B must address, at a
minimum, the following: (1) The general performance requirement that
each person who produces, receives, or acquires Safeguards Information
shall ensure that Safeguards Information is protected against
unauthorized disclosure; (2) protection of Safeguards Information at
fixed sites, in use and in storage, and while in transit; (3)
correspondence containing Safeguards Information; (4) access to
Safeguards Information; (5) preparation, marking, reproduction, and
destruction of documents; (6) external transmission of documents; (7)
use of automatic data processing systems; and (8) removal of the
Safeguards Information category.
To provide assurance that the Licensee is implementing appropriate
measures to achieve a consistent level of protection to prohibit the
unauthorized disclosure of new Safeguards Information, the Licensee
shall implement the fingerprinting and criminal history check
requirements for access to new Safeguards Information in this Order, as
well as the requirements in Attachments A and B of this Order. In
addition, pursuant to 10 CFR 2.202, I find that in light of the common
defense and security matters identified above, which warrant the
issuance of this Order, the public health, safety, and interest require
that this Order be effective immediately.
III
Accordingly, pursuant to Sections 53, 62, 63, 81, 147, 149, 161b,
161i, 161o, 182, and 186 of the Atomic Energy Act of 1954, as amended,
and the Commission's regulations in 10 CFR 2.202, 10 CFR part 30, 10
CFR part 40, and 10 CFR part 70, it is hereby ordered, effective
immediately, that licensee and all other persons who produce, receive,
or acquire the additional security measures identified above (whether
draft or final), or who seek or obtain access to new safeguards
information, shall comply with the requirements set forth in this
Order, including the requirements in Attachments A and B.
A. No person may have access to new Safeguards Information unless
that person has a need-to-know the new Safeguards Information, has been
fingerprinted and undergone an FBI identification and criminal history
records check, which has been favorably decided, and satisfies all
other applicable requirements for access to Safeguards Information.
Fingerprinting and the FBI identification and criminal history records
check are not required, however, for any person who is relieved from
that requirement by 10 CFR 73.59 (71 FR 33989 (June 13, 2006)) or who
has an active Federal security clearance.
B. No person may provide new Safeguards Information to any other
person except in accordance with condition III.A above. Prior to
sharing new Safeguards Information with any other person, a copy of
this Order shall be provided to that person.
IV
The Director, Office of Nuclear Material Safety and Safeguards,
may, in writing, relax or rescind any of the above conditions, on
demonstration of good cause by the Licensee. In accordance with 10 CFR
2.202, the Licensee must, and any other person adversely affected by
this Order may, submit an answer to this Order, and may request a
hearing on this Order, within twenty (20) days of the date of this
Order. Where good cause is shown, consideration will be given to
extending the time to request a hearing. A request for extension of
time in which to submit an answer or request a hearing must be made in
writing to the Director, Office of Nuclear Material Safety and
Safeguards, U.S. Nuclear Regulatory Commission, Washington, DC 20555,
and include a statement of good cause for the extension. The answer may
consent to this Order. Unless the answer consents to this Order, the
answer shall, in writing and under oath or affirmation, specifically
set forth the matters of fact and law on which the Licensee or other
person adversely affected relies, and the reasons as to why the Order
should not have been issued. Any answer or request for a hearing shall
be submitted to the Secretary, Office of the Secretary, U.S. Nuclear
Regulatory Commission, ATTN: Rulemakings and Adjudications Staff,
Washington, DC 20555. Copies also shall be sent to the Director, Office
of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory
Commission, Washington, DC 20555; to the Assistant General Counsel for
Materials Litigation and Enforcement, at the same address; and to the
Licensee, if the answer or hearing request is by a person other than
the Licensee. Because of possible delays in delivery of mail to United
States Government offices, it is requested that answers and requests
for hearing be transmitted to the Secretary of the Commission, either
by means of facsimile transmission, to 301-415-1101, or by e-mail, to
hearingdocket@nrc.gov; and also to the Office of the General Counsel,
either by means of facsimile transmission, to 301-415-3725, or by e-
mail, to OGCMailCenter@nrc.gov. If a person other than the Licensee
requests a hearing, that person shall set forth with particularity the
manner in which their interest is adversely affected by this Order and
shall address the criteria set forth in 10 CFR 2.309.
If a hearing is requested by the Licensee or a person whose
interest is
[[Page 54847]]
adversely affected, the Commission will issue an Order designating the
time and place of any hearing. If a hearing is held, the issue to be
considered at such hearing shall be whether this Order should be
sustained.
Pursuant to 10 CFR 2.202(c)(2)(i), the Licensee may, in addition to
demanding a hearing, at the time the answer is filed or sooner, move
the presiding officer to set aside the immediate effectiveness of the
Order on the grounds that the Order, including the need for immediate
effectiveness, is not based on adequate evidence, but on mere
suspicion, unfounded allegations, or error. In the absence of any
request for hearing, or written approval of an extension of time in
which to request a hearing, the provisions specified in Section III
above shall be final twenty (20) days from the date of this Order,
without further order or proceedings. If an extension of time for
requesting a hearing has been approved, the provisions specified in
Section III shall be final when the extension expires, if a hearing
request has not been received.
An answer or a request for hearing shall not stay the immediate
effectiveness of this Order.
Dated at Rockville, Maryland this 28th day of August 2006.
For the Nuclear Regulatory Commission.
Jack R. Strosnider,
Director, Office of Nuclear Material Safety and Safeguards.
Attachment A--Modified Handling Requirements for the Protection of
Certain Safeguards Information (SGI-M)
General Requirement
Information and material that the U.S. Nuclear Regulatory
Commission (NRC) determines are safeguards information must be
protected from unauthorized disclosure. In order to distinguish
information needing modified protection requirements from the
safeguards information for reactors and fuel cycle facilities that
require a higher level of protection, the term ``Safeguards
Information-Modified Handling'' (SGI-M) is being used as the
distinguishing marking for certain materials licensees. Each person who
produces, receives, or acquires SGI-M shall ensure that it is protected
against unauthorized disclosure. To meet this requirement, licensees
and persons shall establish and maintain an information protection
system that includes the measures specified below. Information
protection procedures employed by state and local police forces are
deemed to meet these requirements.
Persons Subject to These Requirements
Any person, whether or not a licensee of the NRC, who produces,
receives, or acquires SGI-M is subject to the requirements (and
sanctions) of this document. Firms and their employees that supply
services or equipment to materials licensees fall under this
requirement if they possess SGI-M. A licensee must inform contractors
and suppliers of the existence of these requirements and the need for
proper protection. (See more under Conditions for Access)
State or local police units who have access to SGI-M are also
subject to these requirements. However, these organizations are deemed
to have adequate information protection systems. The conditions for
transfer of information to a third party, i.e., need-to-know, would
still apply to the police organization as would sanctions for unlawful
disclosure. Again, it would be prudent for licensees who have
arrangements with local police to advise them of the existence of SGI-M
requirements.
Criminal and Civil Sanctions
The Atomic Energy Act of 1954, as amended, explicitly provides that
any person, ``whether or not a licensee of the Commission, who violates
any regulations adopted under this section shall be subject to the
civil monetary penalties of section 234 of this Act.'' Furthermore,
willful violation of any regulation or order governing safeguards
information is a felony subject to criminal penalties in the form of
fines or imprisonment, or both. See sections 147b. and 223 of the Act.
Conditions for Access
Access to SGI-M beyond the initial recipients of the order will be
governed by the background check requirements imposed by the order.
Access to SGI-M by licensee employees, agents, or contractors must
include both an appropriate need-to-know determination by the licensee,
as well as a determination concerning the trustworthiness of
individuals having access to the information. Employees of an
organization affiliated with the licensee's company, e.g., a parent
company, may be considered as employees of the licensee for access
purposes.
Need-to-Know
Need-to-know is defined as a determination by a person having
responsibility for protecting SGI-M that a proposed recipient's access
to SGI-M is necessary in the performance of official, contractual, or
licensee duties of employment. The recipient must be made aware that
the information is SGI-M and those having access to it are subject to
these requirements as well as criminal and civil sanctions for
mishandling the information.
Occupational Groups
Dissemination of SGI-M is limited to individuals who have an
established need-to-know and who are members of certain occupational
groups. These occupational groups are:
1. An employee, agent, or contractor of an applicant, a licensee,
the Commission, or the United States Government;
2. A member of a duly authorized committee of the Congress;
3. The Governor of a State or his designated representative;
4. A representative of the International Atomic Energy Agency
(IAEA) engaged in activities associated with the U.S./IAEA Safeguards
Agreement who has been certified by the NRC;
5. A member of a state or local law enforcement authority that is
responsible for responding to requests for assistance during safeguards
emergencies;
6. A person to whom disclosure is ordered pursuant to Section
2.744(e) of Part 2 of part 10 of the Code of Federal Regulations; or
7. State Radiation Control Program Directors (and State Homeland
Security Directors) or their designees.
In a generic sense, the individuals described above in (A) through
(G) are considered to be trustworthy by virtue of their employment
status. For non-governmental individuals in group (A) above, a
determination of reliability and trustworthiness is required.
Discretion must be exercised in granting access to the individuals in
group (A). If there is any indication that the recipient would be
unwilling or unable to provide proper protection for the SGI-M, they
are not authorized to receive SGI-M.
Information Considered for Safeguards Information Designation
Information deemed SGI-M is information the disclosure of which
could reasonably be expected to have a significant adverse effect on
the health and safety of the public or the common defense and security
by significantly increasing the likelihood of theft, diversion, or
sabotage of materials or facilities subject to NRC jurisdiction.
SGI-M identifies safeguards information which is subject to these
requirements. These requirements are necessary in order to protect
quantities of nuclear material significant to the
[[Page 54848]]
health and safety of the public or common defense and security.
The overall measure for consideration of SGI-M is the usefulness of
the information (security or otherwise) to an adversary in planning or
attempting a malevolent act. The specificity of the information
increases the likelihood that it will be useful to an adversary.
Protection While in Use
While in use, SGI-M shall be under the control of an authorized
individual. This requirement is satisfied if the SGI-M is attended by
an authorized individual even though the information is in fact not
constantly being used. SGI-M, therefore, within alarm stations,
continuously manned guard posts or ready rooms need not be locked in
file drawers or storage containers.
Under certain conditions the general control exercised over
security zones or areas would be considered to meet this requirement.
The primary consideration is limiting access to those who have a need-
to-know. Some examples would be:
Alarm stations, guard posts and guard ready rooms; Engineering or
drafting areas if visitors are escorted and information is not clearly
visible; Plant maintenance areas if access is restricted and
information is not clearly visible; Administrative offices (e.g.,
central records or purchasing) if visitors are escorted and information
is not clearly visible.
Protection While in Storage
While unattended, SGI-M shall be stored in a locked file drawer or
container. Knowledge of lock combinations or access to keys protecting
SGI-M shall be limited to a minimum number of personnel for operating
purposes who have a ``need-to-know'' and are otherwise authorized
access to SGI-M in accordance with these requirements. Access to lock
combinations or keys shall be strictly controlled so as to prevent
disclosure to an unauthorized individual.
Transportation of Documents and Other Matter
Documents containing SGI-M when transmitted outside an authorized
place of use or storage shall be enclosed in two sealed envelopes or
wrappers. The inner envelope or wrapper shall contain the name and
address of the intended recipient, and be marked both sides, top and
bottom with the words ``Safeguards Information--Modified Handling.''
The outer envelope or wrapper must be addressed to the intended
recipient, must contain the address of the sender, and must not bear
any markings or indication that the document contains SGI-M.
SGI-M may be transported by any commercial delivery company that
provides nationwide overnight service with computer tracking features,
U.S. first class, registered, express, or certified mail, or by any
individual authorized access pursuant to these requirements.
Within a facility, SGI-M may be transmitted using a single opague
envelope. It may also be transmitted within a facility without single
or double wrapping, provided adequate measures are taken to protect the
material against unauthorized disclosure. Individuals transporting SGI-
M should retain the documents in their personal possession at all times
or ensure that the information is appropriately wrapped and also
secured to preclude compromise by an unauthorized individual.
Preparation and Marking of Documents
While the NRC is the sole authority for determining what specific
information may be designated as ``SGI-M,'' originators of documents
are responsible for determining whether those documents contain such
information. Each document or other matter that contains SGI-M shall be
marked ``Safeguards Information-Modified Handling'' in a conspicuous
manner on the top and bottom of the first page to indicate the presence
of protected information. The first page of the document must also
contain (i) the name, title, and organization of the individual
authorized to make a SGI-M determination, and who has determined that
the document contains SGI-M, (ii) the date the document was originated
or the determination made, (iii) an indication that the document
contains SGI-M, and (iv) an indication that unauthorized disclosure
would be subject to civil and criminal sanctions. Each additional page
shall be marked in a conspicuous fashion at the top and bottom with
letters denoting ``Safeguards Information-Modified Handling.''
In addition to the ``Safeguards Information-Modified Handling''
markings at the top and bottom of page, transmittal letters or
memoranda which do not in themselves contain SGI-M shall be marked to
indicate that attachments or enclosures contain SGI-M but that the
transmittal does not (e.g., ``When separated from SGI-M enclosure(s),
this document is decontrolled'').
In addition to the information required on the face of the
document, each item of correspondence that contains SGI-M shall, by
marking or other means, clearly indicate which portions (e.g.,
paragraphs, pages, or appendices) contain SGI-M and which do not.
Portion marking is not required for physical security and safeguards
contingency plans.
All documents or other matter containing SGI-M in use or storage
shall be marked in accordance with these requirements. A specific
exception is provided for documents in the possession of contractors
and agents of licensees that were produced more than one year prior to
the effective date of the order. Such documents need not be marked
unless they are removed from file drawers or containers. The same
exception applies to old documents stored away from the facility in
central files or corporation headquarters.
Since information protection procedures employed by state and local
police forces are deemed to meet NRC requirements, documents in the
possession of these agencies need not be marked as set forth in this
document.
Removal From SGI-M Category
Documents containing SGI-M shall be removed from the SGI-M category
(decontrolled) only after the NRC determines that the information no
longer meets the criteria of SGI-M. Licensees have the authority to
make determinations that specific documents which they created no
longer contain SGI-M information and may be decontrolled. Consideration
must be exercised to ensure that any document decontrolled shall not
disclose SGI-M in some other form or be combined with other unprotected
information to disclose SGI-M.
The authority to determine that a document may be decontrolled may
be exercised only by, or with the permission of, the individual (or
office) who made the original determination. The document shall
indicate the name and organization of the individual removing the
document from the SGI-M category and the date of the removal. Other
persons who have the document in their possession should be notified of
the decontrolling of the document.
Reproduction of Matter Containing SGI-M
SGI-M may be reproduced to the minimum extent necessary consistent
with need without permission of the originator. Newer digital copiers
which scan and retain images of documents represent a potential
security concern. If the copier is retaining any information in memory,
the copier cannot be connected to a network. It should also be placed
in a location that is cleared
[[Page 54849]]
and controlled for the authorized processing of SGI-M information.
Different copiers have different capabilities, including some which
come with features that allow the memory to be erased. Each copier
would have to be examined from a physical security perspective.
Use of Automatic Data Processing (ADP) Systems
SGI-M may be processed or produced on an ADP system provided that
the system is assigned to the licensee's or contractor's facility and
requires the use of an entry code/password for access to stored
information. Licensees must process this information in a computing
environment that has adequate computer security controls in place to
prevent unauthorized access to the information. An ADP system is
defined here as a data processing system having the capability of long
term storage of information. Word processors such as typewriters are
not subject to the requirements as long as they do not transmit
information off-site. (Note: If SGI-M is produced on a typewriter, the
ribbon must be removed and stored in the same manner as other SGI-M
information or media.) The basic objective of these restrictions is to
prevent access and retrieval of stored SGI-M by unauthorized
individuals, particularly from remote terminals. Specific files
containing SGI-M will be password protected to preclude access by an
unauthorized individual. SGI-M files may be transmitted over a network
if the file is encrypted. In such cases, the licensee will select a
commercially available encryption system that NIST has validated as
conforming to Federal Information Processing Standards (FIPS). SGI-M
files shall be properly labeled as ``Safeguards Information--Modified
Handling'' and saved to removable media and stored in a locked file
drawer or cabinet. The National Institute of Standards and Technology
(NIST) maintains a listing of all validated encryption systems at
https://csrc.nist.gov/cryptval/140-1/1401val.htm.
Telecommunications
SGI-M may not be transmitted by unprotected telecommunications
circuits except under emergency or extraordinary conditions. For the
purpose of this requirement, emergency or extraordinary conditions are
defined as any circumstances that require immediate communications in
order to report, summon assistance for, or respond to a security event
(or an event that has potential security significance).
This restriction applies to telephone, telegraph, teletype,
facsimile circuits, and to radio. Routine telephone or radio
transmission between site security personnel, or between the site and
local police, should be limited to message formats or codes that do not
disclose facility security features or response procedures. Similarly,
call-ins during transport should not disclose information useful to a
potential adversary. Infrequent or non-repetitive telephone
conversations regarding a physical security plan or program are
permitted provided that the discussion is general in nature.
Individuals should use care when discussing SGI-M at meetings or in
the presence of others to ensure that the conversation is not overheard
by persons not authorized access. Transcripts, tapes or minutes of
meetings or hearings that contain SGI-M shall be marked and protected
in accordance with these requirements.
Destruction
Documents containing SGI-M must be destroyed when no longer needed.
They may be destroyed by tearing into small pieces, burning, shredding
or any other method that precludes reconstruction by means available to
the public at large. Piece sizes one-half inch or smaller composed of
several pages or documents and thoroughly mixed are considered
completely destroyed.
Attachment B--Trustworthiness and Reliability Requirements for
Individuals Handling Safeguards Information
Licensees shall document the basis for concluding that there is
reasonable assurance that individuals granted access to safeguards
information or who are placed in positions where they could facilitate
access to the regulated material are trustworthy and reliable, and do
not constitute an unreasonable risk for malevolent use of the regulated
material.
The trustworthiness, reliability, and verification of an
individual's true identity shall be determined based on a background
investigation. The background investigation shall address at least the
past three (3) years, and, as a minimum, include a local criminal
history check (unless local or State laws prohibit local criminal
history checks of current employees), verification of employment
history, education, employment eligibility, and personal references. If
an individual's employment has been less than the required three (3)
year period, educational references may be used in lieu of employment
history.
The licensee's background investigation requirements may be
satisfied for an individual that has an active Federal security
clearance.
[FR Doc. 06-7742 Filed 9-18-06; 8:45 am]
BILLING CODE 7590-01-P