Power Reactor Security Requirements, 13926-13993 [E9-6102]
Download as PDF
13926
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
NUCLEAR REGULATORY
COMMISSION
10 CFR Parts 50, 52, 72, and 73
[NRC–2008–0019]
RIN 3150–AG63
Power Reactor Security Requirements
sroberts on PROD1PC70 with RULES
AGENCY: Nuclear Regulatory
Commission.
ACTION: Final rule.
SUMMARY: The Nuclear Regulatory
Commission (NRC) is amending its
security regulations and adding new
security requirements pertaining to
nuclear power reactors. This rulemaking
establishes and updates generically
applicable security requirements similar
to those previously imposed by
Commission orders issued after the
terrorist attacks of September 11, 2001.
Additionally, this rulemaking adds
several new requirements not derived
directly from the security order
requirements but developed as a result
of insights gained from implementation
of the security orders, review of site
security plans, implementation of the
enhanced baseline inspection program,
and NRC evaluation of force-on-force
exercises. This rulemaking also updates
the NRC’s security regulatory framework
for the licensing of new nuclear power
plants. Finally, it resolves three
petitions for rulemaking (PRM) that
were considered during the
development of the final rule.
DATES: Effective Date: This final rule is
effective on May 26, 2009. Compliance
Date: Compliance with this final rule is
required by March 31, 2010, for
licensees currently licensed to operate
under 10 CFR Part 50.
ADDRESSES: You can access publicly
available documents related to this
document using the following methods:
Federal e-Rulemaking Portal: Go to
https://www.regulations.gov and search
for documents filed under Docket ID
[NRC–2008–0019]. Address questions
about NRC Dockets to Carol Gallagher at
301–492–3668; e-mail
Carol.Gallagher@nrc.gov.
NRC’s Public Document Room (PDR):
The public may examine and have
copied for a fee publicly available
documents at the NRC’s PDR, Public
File Area O1 F21, One White Flint
North, 11555 Rockville Pike, Rockville,
Maryland.
NRC’s Agency Wide Documents
Access and Management System
(ADAMS): Publicly available documents
created or received at the NRC are
available electronically at the NRC’s
Electronic Reading Room at https://
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
www.nrc.gov/reading-rm/adams.html.
From this page, the public can gain
entry into ADAMS, which provides text
and image files of the NRC’s public
documents. If you do not have access to
ADAMS or if there are problems in
accessing the documents located in
ADAMS, contact the NRC’s PDR
reference staff at 1–800–397–4209, 301–
415–4737 or by e-mail to
pdr.resource@nrc.gov.
FOR FURTHER INFORMATION CONTACT: Ms.
Bonnie Schnetzler, Office of Nuclear
Security and Incident Response, U.S.
Nuclear Regulatory Commission,
Washington, DC 20555–0001; telephone
301–415–7883; e-mail:
Bonnie.Schnetzler@nrc.gov, or Mr.
Timothy Reed, Office of Nuclear Reactor
Regulation, U.S. Nuclear Regulatory
Commission, Washington, DC 20555–
0001; telephone 301–415–1462; e-mail:
Timothy.Reed@nrc.gov.
SUPPLEMENTARY INFORMATION:
I. Background
II. Petitions for Rulemaking
III. Discussion of Substantive Changes and
Responses to Significant Comments
IV. Section-by-Section Analysis
V. Guidance
VI. Criminal Penalties
VII. Availability of Documents
VIII. Voluntary Consensus Standards
IX. Finding of No Significant Environmental
Impact
X. Paperwork Reduction Act Statement
XI. Regulatory Analysis
XII. Regulatory Flexibility Certification
XIII. Backfit Analysis
XIV. Congressional Review Act
I. Background
A. Historical Background and Overview
Following the terrorist attacks on
September 11, 2001, the Commission
issued a series of orders to ensure that
nuclear power plants and other licensed
facilities continued to have effective
security measures in place given the
changing threat environment. Through
these orders, the Commission
supplemented the design basis threat
(DBT) as well as mandated specific
training enhancements, access
authorization enhancements, and
enhancements to defensive strategies,
mitigative measures, and integrated
response. Additionally, through generic
communications, the Commission
specified expectations for enhanced
notifications to the NRC for certain
security events or suspicious activities.
The four following security orders were
issued to licensees:
• EA–02–026, ‘‘Interim
Compensatory Measures (ICM) Order,’’
issued February 25, 2002 (March 4,
2002; 67 FR 9792);
PO 00000
Frm 00002
Fmt 4701
Sfmt 4700
• EA–02–261, ‘‘Access Authorization
Order,’’ issued January 7, 2003 (January
13, 2003; 68 FR 1643);
• EA–03–039, ‘‘Security Personnel
Training and Qualification
Requirements (Training) Order,’’ issued
April 29, 2003, (May 7, 2003; 68 FR
24514); and
• EA–03–086, ‘‘Revised Design Basis
Threat Order,’’ issued April 29, 2003,
(May 7, 2003; 68 FR 24517).
Nuclear power plant licensees revised
their physical security plans, access
authorization programs, training and
qualification plans, and safeguards
contingency plans in response to these
orders. The Commission completed its
review and approval of the revised
security plans on October 29, 2004.
These plans incorporated the
enhancements required by the orders.
While the specifics of these
enhancements are protected as
Safeguards Information consistent with
10 CFR 73.21, the enhancements
resulted in measures such as increased
patrols; augmented security forces and
capabilities; additional security posts;
additional physical barriers; vehicle
checks at greater standoff distances;
enhanced coordination with law
enforcement authorities; augmented
security and emergency response
training, equipment, and
communication; and more restrictive
site access controls for personnel
including expanded, expedited, and
more thorough employee background
investigations.
The Energy Policy Act of 2005 (EPAct
2005), signed into law on August 8,
2005, contained several provisions
relevant to security at nuclear power
plants. Section 653, for instance, added
Section 161A. to the Atomic Energy Act
of 1954, as amended (AEA). This
provision allows the Commission to
authorize certain licensees to use, as
part of their protective strategies, an
expanded arsenal of weapons including
machine guns and semi-automatic
assault weapons. Section 653 also
requires certain security personnel to
undergo a background check that
includes fingerprinting and a check
against the Federal Bureau of
Investigation’s (FBI) National Instant
Criminal Background Check System
(NICS) database. Section 161A,
however, is not effective until
guidelines are completed by the
Commission and approved by the
Attorney General. More information on
the NRC’s implementation of Section
161A can be found below.
B. The Proposed Rule
As noted to recipients of the postSeptember 11, 2001, orders, it was
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
always the Commission’s intent to
complete a thorough review of the
existing physical protection program
requirements and undertake a
rulemaking that would codify
generically-applicable security
requirements. This rulemaking would
be informed by the requirements
previously issued by orders and
includes an update of existing power
reactor security requirements, which
had not been significantly revised for
nearly 30 years. To that end, on October
26, 2006, the Commission issued the
proposed Power Reactor Security
rulemaking (71 FR 62663). The
proposed rule was originally published
for a 75-day public comment period. In
response to several requests for
extension, the comment period was
extended on two separate occasions
(January 5, 2005; 72 FR 480; and
February 28, 2007; 72 FR 8951),
eventually closing on March 26, 2007.
The Commission received 48 comment
letters. In addition, the Commission
held two public meetings to solicit
public comment in Rockville, MD on
November 15, 2006, and Las Vegas, NV
on November 29, 2006. The Commission
held a third public meeting in Rockville,
MD, on March 9, 2007, to facilitate
stakeholder understanding of the
proposed requirements, and thereby
result in more informed comments on
the proposed rule provisions.
In addition to proposing requirements
that were similar to those that had
previously been imposed by the various
orders, the proposed rule also contained
several new provisions that the
Commission determined would provide
additional assurance of licensee
capabilities to protect against the DBT.
These new provisions were identified
by the Commission during
implementation of the security orders
while reviewing the revised site security
plans that had been submitted by
licensees for Commission review and
approval, while conducting the
enhanced baseline inspection program,
and through evaluation of the results of
force-on-force exercises. As identified in
the proposed rule, these new provisions
included such measures as cyber
security requirements, safety/security
interface reviews, functional
equivalency of the central and
secondary alarm stations,
uninterruptable backup power for
detection and assessment equipment,
and video image recording equipment
(See 71 FR 62666–62667; October 26,
2006).
The Commission also published a
supplemental proposed rule on April
10, 2008, (73 FR 19443) seeking
additional stakeholder comment on two
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
provisions of the rule for which the
Commission had decided to provide
additional detail. The supplemental
proposed rule also proposed to move
these requirements from appendix C to
part 73 in the proposed rule to § 50.54
in the final rule. More detail on those
provisions and the comments received
is provided in section III of this
document.
Three petitions for rulemaking (PRM)
(PRM–50–80, PRM–73–11, PRM–73–13)
were also considered as part of this
rulemaking. Consideration of these
petitions is discussed in detail in
section II of this document.
C. Significant New Requirements in the
Final Rule
This final rulemaking amends the
security requirements for power
reactors. The following existing sections
and appendices in 10 CFR Part 73 have
been revised as a result:
• 10 CFR 73.55, Requirements for
physical protection of licensed activities
in nuclear power reactors against
radiological sabotage.
• 10 CFR 73.56, Personnel access
authorization requirements for nuclear
power plants.
• 10 CFR Part 73, appendix B, section
VI, Nuclear Power Reactor Training and
Qualification Plan for Personnel
Performing Security Program Duties.
• 10 CFR Part 73, appendix C,
Licensee Safeguards Contingency Plans.
The amendments also add two new
sections to part 73 and a new paragraph
to 10 CFR Part 50:
• 10 CFR 73.54, Protection of digital
computer and communication systems
and networks (i.e., cyber security
requirements).
• 10 CFR 73.58, Safety/security
interface requirements for nuclear
power reactors.
• 10 CFR 50.54(hh), Mitigative
strategies and response procedures for
potential or actual aircraft attacks.
Specifically, this rulemaking contains
a number of significant new
requirements listed as follows:
Safety/Security Interface
Requirements. These requirements are
located in new § 73.58. The safety/
security interface requirements
explicitly require licensees to manage
and assess the potential conflicts
between security activities and other
plant activities that could compromise
either plant security or plant safety. The
requirements direct licensees to assess
and manage these interactions so that
neither safety nor security is
compromised. These requirements
address, in part, PRM–50–80, which
requested the establishment of
regulations governing proposed changes
PO 00000
Frm 00003
Fmt 4701
Sfmt 4700
13927
to the facilities which could adversely
affect the protection against radiological
sabotage.
Mixed-Oxide (MOX) Fuel
Requirements. These requirements are
codified into new § 73.55(l) for reactor
licensees who propose to use MOX fuel
in concentrations of 20 percent or less.
These requirements provide
enhancements to the normal
radiological sabotage-based physical
security requirements by adding the
requirement that the MOX fuel be
protected from theft or diversion. These
requirements reflect the Commission’s
view that the application of security
requirements for the protection of
formula quantities of strategic special
nuclear material set forth in Part 73,
which would otherwise apply because
of the MOX fuel’s plutonium content, is,
in part, unnecessary to provide adequate
protection for this material because of
the weight and size of the MOX fuel
assemblies. The MOX fuel security
requirements are consistent with the
approach implemented at Catawba
Nuclear Station through the MOX lead
test assembly effort in 2004–2005.
Cyber Security Requirements. These
requirements are codified as new
§ 73.54 and designed to provide high
assurance that digital computer and
communication systems and networks
are adequately protected against cyber
attacks up to and including the design
basis threat as established by
§ 73.1(a)(1)(v). These requirements are
substantial improvements upon the
requirements imposed by the February
25, 2002 order. In addition to requiring
that all new applications for an
operating or combined license include a
cyber security plan, the rule will also
require currently operating licensees to
submit a cyber security plan to the
Commission for review and approval by
way of license amendment pursuant to
§ 50.90 within 180 days of the effective
date of this final rule. In addition,
applicants who have submitted an
application for an operating license or
combined license currently under
review by the Commission must amend
their applications to include a cyber
security plan. For both current and new
licensees, the cyber security plan will
become part of the licensee’s licensing
basis in the same manner as other
security plans.
Mitigative Strategies and Response
Procedures for Potential or Actual
Aircraft Attacks. These requirements
appear in new § 50.54(hh). Section
50.54(hh)(1) establishes the necessary
regulatory framework to facilitate
consistent application of Commission
requirements for preparatory actions to
be taken in the event of a potential or
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13928
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
actual aircraft attack and mitigation
strategies for loss of large areas due to
fire and explosions. Section 50.54(hh)(2)
requires licensees to develop guidance
and strategies for addressing the loss of
large areas of the plant due to
explosions or fires from a beyond-design
basis event through the use of readily
available resources and identification of
potential practicable areas for the use of
beyond-readily-available resources.
Requirements similar to these were
previously imposed under section B.5 of
the February 25, 2002, ICM order;
specifically, the ‘‘B.5.a’’ and the ‘‘B.5.b’’
provisions.
Access Authorization Enhancements.
Section 73.56 has been substantially
revised to incorporate lessons learned
from the Commission’s implementation
of the January 7, 2003 order
requirements and to improve the
integration of the access authorization
and security program requirements. The
final rule includes an increase in the
rigor for many elements of the preexisting access authorization program
requirements. In addition, the access
authorization requirements include new
requirements for individuals who have
electronic means to adversely impact
facility safety, security, or emergency
preparedness; enhancements to the
psychological assessments
requirements; requires information
sharing between reactor licensees;
expanded behavioral observation
requirements; requirements for
reinvestigations of criminal and credit
history records for all individuals with
unescorted access; and 5-year
psychological reassessments for certain
critical job functions.
Training and Qualification
Enhancements. These requirements are
set forth in appendix B to part 73 and
include modifications to training and
qualification program requirements
based on insights gained from
implementation of the security orders,
Commission reviews of site security
plans, implementation of the enhanced
baseline inspection program, and
insights gained from evaluations of
force-on-force exercises. These new
requirements include additional
requirements for unarmed security
personnel to assure these personnel
meet minimum physical requirements
commensurate with their duties. The
new requirements also include a
minimum age requirement of 18 years
for unarmed security officers, enhanced
minimal qualification scores for testing
required by the training and
qualification plan, enhanced
qualification requirements for security
trainers, armorer certification
requirements, program requirements for
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
on-the-job training, and qualification
requirements for drill and exercise
controllers.
Physical Security Enhancements. The
rule imposes new physical security
enhancements in the revised § 73.55
that were identified by the Commission
during implementation of the security
orders, reviews of site security plans,
implementation of the enhanced
baseline inspection program, and NRC
evaluations of force-on-force exercises.
Significant new requirements in § 73.55
include a requirement that the central
alarm station (CAS) and secondary
alarm station (SAS) have functionally
equivalent capabilities so that no single
act in accordance with the design basis
threat of radiological sabotage could
disable the key functions of both CAS
and SAS. Additions also include
requirements for new reactor licensees
to locate the SAS within a site’s
protected area, ensure that the SAS is
bullet resistant, and limit visibility into
the SAS from the perimeter of the
protected area. Revisions to § 73.55 also
include requiring uninterruptible
backup power supplies for detection
and assessment equipment, video image
recording capability, and new
requirements for protection of the
facility against waterborne vehicles.
D. Significant Changes in the Final Rule
A number of significant changes were
made to the proposed rule as a result of
public comments, and they are now
reflected in the final rule. Those
changes are outlined as follows:
Separation of Enhanced Weapons and
Firearms Background Check
Requirements. As noted previously,
Section 161A of the AEA permits the
Commission to authorize the use of
certain enhanced weapons in the
protective strategies of certain
designated licensees once guidelines are
developed by the Commission and
approved by the Attorney General. In
anticipation of the completion of those
guidelines and the Attorney General’s
approval, the Commission had included
in the proposed rule several provisions
that would implement its proposed
requirements concerning application for
and approval of the use of enhanced
weapons and firearms background
checks. However, because the
guidelines had not yet received the
approval of the Attorney General as the
final rule was submitted to the
Commission, the Commission decided
to address that portion of the proposed
rule in a separate rulemaking. Once the
final guidelines are approved by the
Attorney General and published in the
Federal Register, the Commission will
PO 00000
Frm 00004
Fmt 4701
Sfmt 4700
take appropriate action to codify the
Section 161A. authorities.
Cyber Security Requirements. Another
change to this final rulemaking is the
relocation of cyber security
requirements. Cyber security
requirements had been located in the
proposed rule in § 73.55(m). These
requirements are now placed in new
§ 73.54 as a separate section within part
73. These requirements were placed in
a stand-alone section to enable the cyber
security requirements to be made
applicable to other types of facilities
and applications through future
rulemakings.
Establishing these requirements as a
stand-alone section also necessitated
creating accompanying licensing
requirements. Because the cyber
security requirements were originally
proposed as part of the physical security
program and thus the physical security
plan, a licensee’s cyber security plan
under the proposed rule would have
been part of the license through that
licensing document. Once these
requirements were separated from
proposed § 73.55, the Commission
identified the need to establish separate
licensing requirements for the licensee’s
cyber security plan that would require
the plan to be part of a new application
for a license issued under part 50 or part
52, as well as continue to be a condition
of either type of license. Conforming
changes were therefore made to sections
§§ 50.34, 50.54, 52.79, and 52.80 to
address this consideration. As noted
previously and in § 73.54, for current
reactor licensees, the rule requires the
submission of a new cyber security plan
to the Commission for review and
approval within 180 days of the
effective date of the final rule. Current
licensees are required to submit their
cyber security plans by way of a license
amendment pursuant to 10 CFR § 50.90.
In addition, applicants for an operating
license or combined license who have
submitted their applications to the
Commission prior to the effective date
of the rule are required to amend their
applications to the extent necessary to
address the requirements of § 73.54.
Performance Evaluation Program
Requirements. The Performance
Evaluation Program requirements that
were in proposed appendix C to part 73,
are moved in their entirety to appendix
B to part 73 as these requirements
describe the development and
implementation of a training program
for training the security force in the
response to contingency events.
Mitigative Strategies and Response
Procedures for Potential or Actual
Aircraft Attacks. Another significant
change to this rulemaking is the
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
relocation of and the addition of
clarifying rule language to the beyonddesign basis mitigative measures and
potential aircraft threat notification
requirements that were previously
located in proposed part 73, appendix
C. Those requirements are now set forth
in 10 CFR 50.54(hh). This change was
made, in part, in response to
stakeholder comments that part 73,
appendix C, was not the appropriate
location for these requirements because
the requirements were not specific to
the licensee’s security organization. The
Commission agreed and relocated the
requirements accordingly and provided
more details to the final rule language
to ensure that the intent of these
requirements is clear. As noted
previously, the Commission issued a
supplemental proposed rule seeking
additional stakeholder comment on
these proposed changes to the rule.
More detail on this provision is
provided in Section III of this
document.
Section 73.71 and Appendix G to Part
73. The proposed power reactor security
rulemaking contained proposed
requirements for § 73.71 and appendix
G to part 73. Based on public comments,
the Commission intended to make few
changes to these regulations. However,
these provisions are not contained in
this final rulemaking. Because the
enhanced weapons rulemaking
(discussed previously) will include
potential changes to § 73.71 and
appendix G to part 73, the Commission
decided that revisions to these
regulations were better suited for that
rulemaking.
Security Plan Submittal
Requirements. The proposed rule would
have required current licensees to revise
their physical security plan, training
and qualification plans, and safeguards
contingency plan to incorporate the new
requirements and to submit these
security plans for Commission review
and approval. The final rule no longer
requires these security plans (with the
exception of the cyber security plan as
discussed previously) to be submitted
for prior Commission review and
approval and instead allows licensees to
make changes in accordance with
existing licensing provisions such as
§ 50.54(p) or § 50.90, as applicable. The
Commission determined that this was
an acceptable approach because most of
the requirements established by this
rule are substantially similar to the
requirements that had been imposed by
the security orders and because all
licensee security plans were recently
reviewed and approved by the
Commission in 2004 following issuance
of those orders. Additionally, many of
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
the additional requirements in the final
rule are already current practices that
were implemented following an
industry-developed, generic, security
plan template that was reviewed and
approved by the Commission. For the
requirements that go beyond current
practices, the Commission does not
expect that changes required by this rule
would result in a decrease of
effectiveness in a licensee’s security
plan. For implementation of those new
requirements, licensees should,
therefore, consider whether their plans
could be revised in accordance with the
procedures described in § 50.54(p).
However, if a licensee believes that a
plan change may reduce the
effectiveness of a security plan or if the
licensee desires Commission review and
approval of the plan change, then the
proposed plan revision should be
submitted to the NRC for review and
approval as a license amendment per
§ 50.90.
With respect to applicants who have
already submitted an application to the
Commission for an operating license or
combined license as of the effective date
of this rule, those applicants are
required by this rule to amend their
applications to the extent necessary to
address the requirements of the new
rule.
Implementation of the Final Rule. The
final rule is effective 30 days following
date of publication. This permits
applicability of the rule’s requirements
to new reactor applicants at the earliest
possible date. Current licensees are
required to be in compliance with the
rule requirements by March 31, 2010.
Definitions. The proposed rule
contained a number of definitions,
primarily related to the proposed
enhanced weapons requirements. As
noted previously, the enhanced
weapons provisions and firearms
backgrounds checks have been
separated into a separate rulemaking so
codifying those definitions is no longer
appropriate in this rulemaking.
Regarding the other proposed rule
definitions of safety/security interface,
security officer, and target sets, these
terms are addressed in guidance, and
accordingly the final rule does not
contain these definitions.
EPAct 2005 Provisions. As noted
above, the proposed rule contained a
number of proposed requirements that
were designed to address securityrelated provisions of the EPAct 2005.
With respect to Section 653 of the EPAct
2005, enhanced weapons and firearms
background check requirements have
been moved to a separate rulemaking.
The only other provisions of the EPAct
2005 that the Commission had
PO 00000
Frm 00005
Fmt 4701
Sfmt 4700
13929
considered during this rulemaking were
in Section 651, which concerns matters
related to the triennial Commissionevaluated, force-on-force exercises, the
NRC’s mitigation of potential conflicts
of interest in the conduct of such
exercises, and the submission of annual
reports by the NRC to Congress. Because
the statute requires the NRC to be
directly responsible for implementation
of those requirements, the Commission
has determined that there is no need for
them to be specifically reflected in the
NRC’s regulations. The NRC has fully
complied with all of the requirements of
Section 651 in its conduct of force-onforce evaluations since the EPAct 2005,
and has submitted three annual reports
to Congress during that time. Further
discussion of and the Commission’s
response to a comment on this issue are
provided below in Section III.
E. Conforming and Corrective Changes
Conforming changes to the
requirements listed below are made to
ensure that cross-referencing between
the various security regulations in part
73 is preserved, implement cyber
security plan submittal requirements,
and preserve requirements for licensees
who are not within the scope of this
final rule. The following requirements
contain conforming changes:
• Section 50.34, ‘‘Contents of
construction permit and operating
license applications; technical
information,’’ is revised to align the
application requirements with appendix
B to 10 CFR part 73, the addition of
§ 73.54 to part 73, and the addition of
§ 50.54(hh) to part 50.
• Section 50.54, ‘‘Conditions of
licenses,’’ is revised to conform with the
revisions to sections in appendix C to 10
CFR Part 73. In accordance with the
introductory text to § 50.54, revisions to
this section are also made applicable to
combined licenses issued under part 52.
• Section 52.79, ‘‘Contents of
applications; technical information in
the final safety analysis report,’’ is
revised to align the application
requirements with the revisions to
appendix C to 10 CFR Part 73 and the
addition of § 73.54 to Part 73.
• Section 52.80, ‘‘Contents of
applications; additional technical
information,’’ is revised to add the
application requirements for § 50.54(hh)
to part 50.
• Section 72.212, ‘‘Conditions of
general license issued under § 72.210,’’
is revised to reference the appropriate
revised paragraph designations in
§ 73.55.
• Section 73.8, ‘‘Information
collection requirements: OMB
approval,’’ is revised to add the new
E:\FR\FM\27MRR2.SGM
27MRR2
13930
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
requirements (§§ 73.54 and 73.58) to the
list of sections with Office of
Management and Budget (OMB)
information collection requirements. A
corrective revision to § 73.8 is made to
reflect OMB approval of existing
information collection requirements for
NRC Form 366 under existing § 73.71.
• Section 73.70, ‘‘Records,’’ is revised
to reference the appropriate revised
paragraph designations in § 73.55
regarding the need to retain a record of
the registry of visitors.
Additionally, § 73.81, ‘‘Criminal
penalties,’’ which sets forth the sections
within part 73 that are not subject to
criminal sanctions under the AEA,
remains unchanged because willful
violations of the new §§ 73.54 and 73.58
may be subject to criminal sanctions.
Appendix B to part 73 and appendix
C to part 73 require special treatment in
this final rule to preserve, with a
minimum of conforming changes, the
current requirements for licensees and
applicants who are not within the scope
of this final rule, such as Category I
strategic special nuclear material
licensees and research and test reactor
licensees. Accordingly, Sections I
through V of appendix B to part 73
remain unchanged to preserve the
current training and qualification
requirements for all applicants,
licensees, and certificate holders who
are not within the scope of this final
rule, and the new language for power
reactor security training and
qualification (revised in this final rule)
is added as Section VI. Part 73,
appendix C, is divided into two
sections, with Section I maintaining all
current requirements for licensees and
applicants not within the scope of this
final rule, and Section II containing all
new requirements related to power
reactor contingency response.
sroberts on PROD1PC70 with RULES
II. Petitions for Rulemaking
Three petitions for rulemaking were
considered during the development of
the final rule requirements consistent
with previous petition resolution and
closure process for these petitions (i.e.,
PRM–50–80, PRM–73–11, and PRM–73–
13). All three petitions are closed, and
the discussion that follows provides the
Commission’s consideration of the
issues raised in each petition as part of
the development of the final power
reactor security requirements.
A. PRM–50–80
PRM–50–80, submitted by the Union
of Concerned Scientists (UCS) and the
San Luis Obispo Mothers for Peace
(SLOMFP), was published for public
comment on June 16, 2003, (68 FR
35568). The petition requested that the
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
Commission take two actions. The first
action was to amend 10 CFR 50.54(p),
‘‘Conditions of licenses,’’ and 10 CFR
50.59, ‘‘Changes, tests, and
experiments,’’ to require licensees to
evaluate whether proposed changes,
tests, or experiments cause protection
against radiological sabotage to be
decreased and, if so, to conduct such
actions only with prior Commission
approval. The second action requested
that the Commission amend 10 CFR Part
50 to require licensees to evaluate their
facilities against specified aerial hazards
and make necessary changes to provide
reasonable assurance that the ability of
the facility to reach and maintain safe
shutdown would not be compromised
by an accidental or intentional aerial
assault. The second action (regarding
aerial hazards) was previously
considered and resolved as part of the
final design basis threat (DBT) (§ 73.1)
rulemaking (March 19, 2007; 72 FR
12705). On November 17, 2005, (70 FR
69690), the Commission decided to
consider the petitioner’s first request for
rulemaking (i.e., evaluation of proposed
changes, tests, or experiments to
determine whether radiological sabotage
protection is decreased). Proposed
language addressing the issues raised in
the petition was published as proposed
§ 73.58, ‘‘Safety/security interface
requirements for nuclear power
reactors.’’ This section remains in the
final rule. Refer to the section-by-section
analysis in this document, supporting
§ 73.58 for further discussion of the
safety/security interface requirements.
B. PRM–73–11
PRM–73–11, submitted by Scott
Portzline, Three Mile Island Alert, was
published for public comment on
November 2, 2001 (66 FR 55603). The
comment period closed on January 16,
2002. Eleven comment letters were
received. Of the 11 comments filed, 7
were from governmental organizations,
2 were from individuals, and 2 were
from industry organizations. The
majority of the comments support the
petitioner’s recommendation.
The petitioner requested that the NRC
regulations governing physical
protection of plants and materials be
amended to require NRC licensees to
post at least one armed guard at each
entrance to the ‘‘owner controlled
areas’’ (OCA) surrounding all U.S.
nuclear power plants. The petitioner
stated that this should be accomplished
by requiring the addition of armed site
protection officers (SPO) to the total
number of SPOs—not by simply shifting
SPOs from their protected area (PA)
posts to the OCA entrances. The
petitioner believes that the proposed
PO 00000
Frm 00006
Fmt 4701
Sfmt 4700
amendment would provide an
additional layer of security that would
complement existing measures against
radiological sabotage and would be
consistent with the long-standing
principle of defense-in-depth.
In a Federal Register Notice
published December 27, 2006 (72 FR
481), the Commission informed the
public that PRM–73–11 and the public
comments filed on the petition would
be considered in this final rule.
Consideration of PRM–73–11 and the
associated comments was undertaken as
part of the effort to finalize the
requirements governing security in the
OCA.
The Commission has concluded that
prescriptively requiring armed security
personnel in the OCA is not necessary.
Instead, the final physical security
requirements in § 73.55(k) allows
licensees the flexibility to determine the
need for armed security personnel in the
OCA, as a function of site-specific
considerations, such that the licensee
can defend against the DBT with high
assurance. In reaching this
determination, the Commission
recognized that the requirements
governing protective strategies must be
more performance-based to enable
licensees to adjust their strategies to
address the site-specific circumstances
and that a prescriptive requirement for
armed security personnel in the owner
controlled area may not always be the
most effective approach for every
licensee in defending against the DBT.
The Commission constructed the final
physical security requirements,
recognizing the range of site-specific
circumstances that exist, to put in place
the performance objectives that must be
met, and where possible, provided
flexibility to licensees to construct
strategies that meet the objectives.
C. PRM–73–13
PRM–73–13, submitted by David
Lochbaum, Union of Concerned
Scientists, was published for public
comment on April 9, 2007 (72 FR
17440) and the comment period closed
June 25, 2007.
The petitioner requested that the
Commission amend part 73 to require
that licensees implement procedures to
ensure that, when information becomes
known to a licensee about an individual
seeking access to the protected area that
would prevent that individual from
gaining unescorted access to the
protected area of a nuclear power plant,
the licensee will implement measures to
ensure the individual does not enter the
protected area, whether escorted or not.
Further, the petitioner requested that
the NRC’s regulations be amended to
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
require that, when sufficient
information is not available to a licensee
about an individual seeking access to
the protected area to determine whether
the criteria for unescorted access are
satisfied, the licensee will implement
measures to allow that individual to
enter the protected area only when
escorted at all times by an armed
member of the security force who
maintains communication with security
supervision.
The Commission determined that the
issues raised in PRM–73–13 were
appropriate for consideration and were
in fact issues already being considered
in the Power Reactor Security
Requirements rulemaking. Accordingly,
the issues raised by PRM–73–13 and the
public comments received were
considered as part of the effort to
finalize the requirements that govern
escort and access within the protected
area (refer to requirements in § 73.55(g)
and § 73.56(h) for the specific final rule
requirements).
The Nuclear Energy Institute (NEI)
commented on PRM–73–13, with 11
other industry organizations agreeing
(hereafter referred to collectively as
commenters). The commenters agreed
that the petitioner’s first request (with
regard to preventing an individual to
have access to the protected area when
derogatory information becomes known)
should be issued as a notice of proposed
rulemaking. Neither NEI nor any of the
other commenters commented on any of
the specific language proposed by the
petitioner. With regard to the second
provision proposed by the petitioner
(requiring armed escorts for certain
visitors), the commenters did not agree
with the proposal. The commenters
argued that the use of trained
individuals, though not necessarily
armed, in conjunction with search
equipment and techniques as well as the
limitation placed on visitors (i.e., that
visitors must have a ‘‘work-related
need’’ for entry into the PA) have
resulted in no incidents that warrant
imposing this new requirement.
The Commission has decided not to
adopt either proposal. Regarding the
petitioner’s second proposal, the
Commission agrees with the
commenters that the current protective
measures for escorted personnel are
sufficient to protect against the scenario
presented by the petitioner. Licensee
escorted access programs have been in
place for years without incident, and the
petitioner has not provided a basis that
raises questions about their sufficiency.
With respect to the petitioner’s first
proposal, the Commission does not
agree that the NRC’s unescorted access
requirements described in § 73.56 and
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
§ 73.57 need to contain prescriptive
disqualifiers for access. Licensees are
required by § 73.56(h) in this final rule
to consider all of the information
obtained in the background
investigation for determining whether
an individual is trustworthy and reliable
before granting unescorted access. With
the exception of individuals who have
been denied access to another facility,
the regulation does not specify types of
information obtained during a
background investigation that would
automatically disqualify an individual
from access. The final rule § 73.55(g)(7),
however, does have several restrictions
on escorted access (visitors) including
verification of identity, verification of
reason for business inside the protected
area, and collection of information
(visitor control register) pertaining to
the visitor. In addition, there are several
conditions that individuals who escort
the visitor must adhere to including
continuous monitoring of the visitor
while inside the protected area, having
a means of timely communication with
security, and having received training
on escort duties. Lastly, licensees may
not allow any individual who is
currently denied access at any other
facility to be a visitor.
Furthermore, the petitioner’s
suggested language that a licensee must
act to deny escorted access when such
information ‘‘becomes known to the
licensee’’ is unworkable from a
regulatory perspective. It is unclear
what the NRC could impose on
licensees as an enforceable standard for
such a scenario. In order to avoid
potential enforcement action, a licensee
would be put in a position to conduct
a full background investigation on a
visitor each time access is requested,
which would undermine the entire
purpose behind having the ability to
escort visitors on site, or, in accordance
with the petitioner’s second suggestion,
assign an armed security officer to
escort that individual. The Commission
does not have a basis to impose either
measure, and the petitioners have not
provided a basis in support of it. Section
73.55(g), however, does not allow
individuals currently denied access at
other facilities to be a visitor.
III. Discussion of Substantive Changes
and Responses to Significant Comments
A. Introduction
A detailed discussion of the public
comments submitted on the proposed
power reactor security rule and
supplemental proposed rule as well as
the Commission’s responses are
contained in a separate document (see
Section VII, ‘‘Availability of
PO 00000
Frm 00007
Fmt 4701
Sfmt 4700
13931
Documents,’’ of this document). This
section discusses the more significant
comments submitted on the proposed
power reactor security provisions and
the substantive changes made to
develop the final power reactor security
requirements.
The changes made to the power
reactor security requirements are
discussed by part, with changes to part
50 requirements being discussed first,
followed by the changes to part 73
requirements, and proceeding in
numerical order according to the section
number. General topics are discussed
first, followed by discussion of changes
to individual sections as necessary. In
addition to the substantive changes, rule
language was revised to make
conforming administrative changes,
correct typographic errors, adopt
consistent terminology, correct
grammar, and adopt plain English.
These changes are not discussed further.
Note that some of the final rule
requirements were relocated. An
example is the cyber security
requirements that were issued as
proposed § 73.55(m) and now reside in
§ 73.54.
Comments on the three PRMs are not
explicitly addressed in the detailed
comments response document, beyond
those discussed earlier in Section II of
this document, as this document
addresses only the comments submitted
on the proposed rule. However, the
petitioner’s comments were considered
as part of the Commission’s decisionmaking process and final determination
of the rule requirements for each of the
areas of concern.
Comments on the supporting
regulatory analysis of the proposed rule
are also contained in the detailed
comment response document. Revisions
to the final rule regulatory analysis were
made consistent with the comment
responses and these comments are not
addressed further in this section.
The Commission solicited public
comment on a number of specific issues
but received input on only one of these
specific issues. Specifically, the
Commission requested stakeholders to
provide insights and estimates on the
feasibility, costs, and time necessary to
implement the proposed rule changes to
existing alarm stations, supporting
systems, video systems, and cyber
security. A commenter stated that the
feasibility of establishing a cyber
security program for industrial control
systems has been demonstrated by
various electric utilities, chemical
plants, refineries, and other facilities
with systems similar, if not identical, to
those used in the balance-of-plant in
commercial nuclear plants. The
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13932
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
commenter stated that the time and cost
necessary to implement a cyber security
program is dependent on the scope and
discussed the technologies and
programmatic approaches that can be
pursued to augment current industryproposed generic recommendations.
The Commission focused significant
attention on the cyber requirements and
supporting guidance during
development of the final cyber security
requirements in § 73.54 as discussed
below.
In general, there was a range of
stakeholder views concerning this
rulemaking, some supporting the
rulemaking, others opposing the
rulemaking. Some stakeholders viewed
this rulemaking as an effort to codify the
insufficient status quo while others
described the new requirements as
going well beyond the post-September
11, 2001, order requirements. The
Commission believes that commenters
who suggested that the Commission had
no basis to go beyond the requirements
that were imposed by the security
orders misunderstood the relationship
of those orders and the rulemaking. The
security orders were issued based on the
specific knowledge and threat
information available to the
Commission at the time the orders were
issued. The Commission advised
licensees who received those orders that
the requirements were interim and that
the Commission would eventually
undertake a more comprehensive reevaluation of current safeguards and
security programs. As noted in the
proposed rule, there were a number of
objectives for the rulemaking beyond
simply making generically applicable
security requirements similar to those
that were imposed by Commission
orders. The Commission intended to
implement several new requirements
that resulted from insights it gained
from implementation of the security
orders, review of site security plans,
implementation of the enhanced
baseline inspection program, and
evaluation of force-on-force exercises.
These insights were obviously not
available to the Commission when it
issued the original security orders in
2002 and 2003.
In addition, another key objective of
this rulemaking was to update the
regulatory framework in preparation for
receiving license applications for new
reactors. The current security
regulations in part 73 have not been
substantially revised for nearly 30 years.
Before September 11, 2001, the NRC
staff had already undertaken an effort to
revise these dated requirements, but that
effort was delayed (See SECY–01–0101,
June 4, 2001). Thus, this rulemaking
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
addresses a broader context of security
issues than the focus of the security
orders of 2002 and 2003. One significant
issue in particular was the need for
clearly articulated security requirements
and a logical regulatory framework for
new reactor applicants. The revisions to
part 73 were also intended to provide it
with needed longevity and
predictability for current and future
licensees with a measured attempt to
anticipate future developments or needs
in physical protection.
B. Section 50.54(hh), Mitigative
Strategies and Response Procedures for
Potential or Actual Aircraft Attacks
As noted previously, a significant
change to this final rule is the relocation
of and provision of more detailed
requirements for the beyond-design
basis mitigative measures and potential
aircraft attack notification requirements
from proposed part 73, appendix C, to
10 CFR 50.54(hh). The Commission
received several stakeholder comments
that the proposed part 73, appendix C,
was not the appropriate location for
these requirements. During
consideration of these comments, the
Commission also decided to add
additional detail to the aircraft attack
notification portion of the requirements
now located in § 50.54(hh)(1). In
response, the Commission issued a
supplemental proposed rule seeking
additional stakeholder comment on
these proposed revisions on April 10,
2008, (73 FR 19443) for a 30 day
comment period. The Commission
received six sets of comments on the
supplemental proposed rule. The
responses to those comments are
discussed as follows.
The Commission revised the final rule
language for § 50.54(hh)(1)(ii) in
response to comments that the final rule
should only require periodic updates to
applicable entities or that
communications should be maintained
‘‘as necessary and as resources allow.’’
The Commission intended the
continuous communication requirement
to apply to licensees only with respect
to aircraft threat notification sources
and not to all offsite response or
government organizations. The Federal
Aviation Administration (FAA) local,
regional, or national offices; North
American Aerospace Defense Command
(NORAD); law enforcement
organizations; and the NRC
Headquarters Operations Center are
examples of threat notification sources
with which licensees would be required
to maintain a continuous
communication capability. If a licensee
encounters a situation in which
multiple threat notification sources
PO 00000
Frm 00008
Fmt 4701
Sfmt 4700
(e.g., FAA, NORAD, and NRC
Headquarters Operations Center) are
providing the same threat information,
the licensee would only be required to
maintain continuous communication
with the NRC Headquarters Operations
Center. Because licensees need to be
aware when they can cease or must
accelerate mitigative actions, it is
important that licensees do not lose
contact with aircraft threat notification
sources. Periodic updates to entities
other than threat notification sources are
permitted by this final rule.
In response to comments that
§§ 50.54(hh)(1)(iii), 50.54(hh)(1)(iv), and
50.54(hh)(1)(vi) requirements were
redundant to those found in the NRC’s
existing emergency preparedness rules,
the Commission revised the final rule
language for each of those paragraphs to
clarify the Agency’s intent and to
eliminate the appearance of redundant
`
requirements vis-a-vis the emergency
preparedness rules, which are also
currently being revised. The intent of
§ 50.54(hh)(1)(iii) is to ensure that
licensees contact offsite response
organizations as soon as possible after
receiving aircraft threat notifications.
There is no expectation that licensees
will complete and disseminate
notification forms as the previous rule
text implied. Section 50.54(hh)(1)(iv)
pertains to operational actions that
licensees can take to mitigate the
consequences of an aircraft impact; the
Commission did not intend this
requirement to include emergency
preparedness-related protective actions.
In § 50.54(hh)(1)(vi), the Commission
intended to require licensees to disperse
essential personnel and equipment to
pre-identified locations after receiving
aircraft threat notifications, but before
actual aircraft impacts, when possible.
Also, the requirement for licensees to
facilitate rapid entry into their protected
areas applies only to those onsite
personnel and offsite responders who
are necessary to mitigate the event and
not to everyone who was initially
evacuated from the protected areas.
The Commission revised the
statements of consideration for
§ 50.54(hh)(1)(vi) in response to a
comment that meeting the rule might
require licensees to suspend security
measures under 10 CFR 50.54(x). The
Commission elaborated on the specific
intent of the protected area evacuation
timeline assessment and validation,
which is to require licensees to establish
a decision-making tool for use by shift
operations personnel to assist them in
determining the appropriate onsite
protective action for site personnel for
various warning times and site
population conditions. The Commission
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
expects that licensees will incorporate
this tool into applicable site procedures
to reduce the need to make improvised
decisions that would necessitate a
suspension of safeguards measures
during the pre-event notification period.
However, the Commission wishes to
make clear that the suspension of
security measures to protect the health
and safety of security force personnel
during emergencies is now governed by
§ 73.55(p)(1)(i) as codified in this final
rule. Previously, there was no specific
provision in the Commission’s
regulations that would have permitted
such a departure, because under
§ 50.54(x), licensees are only permitted
to suspend security measures if the
health and safety of the public was at
risk. Note that, in a § 50.54(hh) scenario,
either §§ 50.54(x) or 73.55(p) could be
applicable depending on the
circumstances.
The Commission revised the final rule
requirements in § 50.54(hh) in response
to a comment that the final rule should
include an applicability statement that
removes the requirements of § 50.54(hh)
from reactor facilities currently in
decommissioning and for which the
certifications required under
§ 50.82(a)(1) have been submitted. The
commenter indicated that it is
inappropriate that § 50.54(hh) should
apply to a permanently shutdown and
defueled reactor where the fuel was
removed from the site or moved to an
independent spent fuel storage
installation (ISFSI). The NRC agrees
with this comment and revised the final
requirements in § 50.54(hh) so they do
not apply to facilities for which
certifications have been filed under
§ 50.82(a)(1) or § 52.110(a)(1). The
Commission notes that § 50.54(hh) does
not apply to any current
decommissioning reactor facilities that
have already satisfied the § 50.82(a)
requirements.
The Commission requested
stakeholder feedback on two questions
in the supplemental proposed rule.
Regarding the first question in the
supplemental proposed rule notice
where the Commission requested input
on whether there should be additional
language added to the proposed
§ 50.54(hh) requirements that would
limit the scope of the regulation (i.e.,
language that would constrain the
requirements to a subset of beyonddesign basis events such as beyonddesign basis security events),
commenters indicated that the
Commission should constrain the
requirements to a subset of beyonddesign basis events; namely beyond
design basis security events. The
feedback suggested that, by limiting the
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
rule requirements to strategies that
address a generic set of beyond-design
basis security events, the strategies
could then be developed and
proceduralized to focus on the
restoration capabilities needed to
mitigate the effects from these events.
After careful consideration, the
Commission decided to maintain the
language from the supplemental
proposed rule that recognizes that the
mitigative strategies can address losses
of large areas of a plant and the related
losses of plant equipment from a variety
of causes including aircraft impacts and
beyond-design basis security events.
The Commission also requested
comments on whether applicants
should include, as part of a combined
license or operating license application,
the § 50.54(hh) procedures, guidance,
and strategies. Commenters indicated
that this information will not be needed
until fuel load, when an aircraft threat
would be present. The most appropriate
and efficient process for the
Commission is to review these
procedures as part of the review of
operations procedures and beyonddesign basis guidelines. The
Commission views the mitigative
strategies as similar to those operational
programs for which a description of the
program is provided and reviewed by
the Commission as part of the combined
license application and subsequently
the more detailed procedures are
implemented by the applicant and
inspected by the NRC before plant
operation. Because the Commission
finds that the most effective approach is
for the mitigative strategies, at least at
the programmatic level, to be developed
before construction and reviewed and
approved during licensing, a
requirement for information has been
added to § 52.80, ‘‘Contents of
applications; additional technical
information,’’ and § 50.34, ‘‘Contents of
construction permit and operating
license applications; technical
information.’’
C. Section 73.2, Definitions
The proposed rule contained a
number of definitions, primarily related
to the proposed enhanced weapons
requirements. As noted earlier, the
enhanced weapons provisions and
firearms backgrounds checks have been
separated into a separate rulemaking, so
codifying those definitions is no longer
appropriate here. Regarding the other
definitions of safety/security interface,
security officer, and target sets; the
Commission has determined that those
terms are better defined through
guidance.
PO 00000
Frm 00009
Fmt 4701
Sfmt 4700
13933
D. Section 73.54, Protection of Digital
Computer and Communication Systems
and Networks
General Comments. Proposed
§ 73.55(m) is relocated in the final rule
to a stand-alone section (10 CFR 73.54).
The Commission received several
comments that the inclusion of a cyber
security program within the proposed
§ 73.55(m) is not appropriate because
cyber security is not implemented by
physical security personnel. The
Commission agrees that the cyber
security program would not necessarily
be implemented by security personnel
and recognizes that a uniquely
independent technical expertise and
knowledge is required to effectively
implement the cyber security program.
Additionally, these requirements were
placed into a stand alone section to
enable the cyber security requirements
to be made applicable to other types of
facilities and applications through
future rulemakings. The rule now
requires that these requirements apply
to nuclear power plant licensees in the
same manner as the access authorization
program required by § 73.56; the cyber
security plan is subject to the same
licensing requirements as the licensee’s
physical security, training and
qualification, and safeguards
contingency plans. In relocating these
requirements, the Commission
concluded that certain administrative
requirements, otherwise applied by
inclusion in § 73.55, must be brought
forward for consistency. As a result,
conforming changes were made to the
pre-existing §§ 50.34(c) and 50.34(e) to
establish the appropriate regulatory
framework for Commission review and
approval of the cyber security plan
required by § 73.54(e). These
conforming changes require nuclear
power reactor applicants to provide a
cyber security plan as part of the
security plans currently required by
§§ 50.34(c) or 52.79(a)(36), as
applicable. Additionally, conforming
changes were made to § 50.54(p),
applicable to both operating and
combined licensees, to require a cyber
security plan as a condition of the
license. Conforming changes were also
made to §§ 50.34(e) and 52.79(a)(36) to
require applicants to review this plan
against the criteria for Safeguards
Information established in § 73.21.
Consistent with § 73.54(b)(3), the cyber
security program is a part of the
physical protection program subject to
the same review and approval
mechanisms as the physical security
plan, training and qualification plan,
and safeguards contingency plan.
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13934
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
The Commission has also added three
(3) administrative requirements to the
final rule (§§ 73.54(f), 73.54(g), and
73.54(h)) to require written policies and
procedures, program review, and
records retention, respectively.
In addition to the previously
mentioned conforming changes, the
Commission added an undesignated
paragraph at the beginning of this
section to require current licensees
subject to § 73.54 to submit a cyber
security plan and implementation
schedule for Commission review and
approval. The licensee’s cyber security
plan must be submitted by way of a
license amendment pursuant to 10 CFR
50.90.
Section 73.54(a), Protection. The
Commission received a comment
suggesting that the term ‘‘emergency
preparedness,’’ as it appears in the
proposed § 73.55(m)(1), should be
replaced with the term ‘‘emergency
response.’’ In the final rule, the term
‘‘emergency preparedness’’ is replaced
with the more generic term ‘‘emergency
preparedness functions.’’ The
equipment embodied within these
preparedness functions as described in
10 CFR Part 50, appendix E, usually
includes a wide variety of plant
monitoring systems, protection systems,
and the onsite and offsite emergency
communications systems used during
an emergency event.
The term ‘‘emergency response’’
suggested by the commenter is used
more specifically to refer only to the
‘‘emergency response data system’’ or
ERDS, which provides a data link that
transmits key plant parameters.
Therefore, using the term ‘‘emergency
preparedness functions’’ is considered
the most appropriate term as it
holistically addresses the equipment
used during an emergency.
The Commission revised the proposed
§ 73.55(m)(1) which is renumbered in
the final rule as § 73.54(a). This
paragraph has been expanded to provide
a more detailed list of the types of
systems and networks that are intended
to be included consistent with the
proposed rule. The language in
§ 73.54(a)(1)(ii) is revised to clarify that
‘‘digital computer and communications
systems and networks’’ must be
considered for protection. It is
important to note that the Commission
does not intend that CAS or SAS
operators be responsible for cyber
security detection and response but
rather that this function will be
performed by technically trained and
qualified personnel.
Section 73.54(b), Analysis of Digital
Computer and Communication Systems
and Networks. The requirement to
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
document a site-specific analysis that
identifies site-specific conditions has
been brought forward from § 73.55(b)(4).
The rule is clarified to require that each
licensee analyze the digital computer
and communication systems and
networks in use at their facility to
identify those assets that require
protection against the design basis
threat.
The proposed § 73.55(m)(1)
requirement to establish, implement,
and maintain a cyber security program
is renumbered in the final rule as
§ 73.54(b)(2). The rule requires that the
cyber security program will include
measures for the adequate protection of
the digital computer and
communication systems and networks
identified by the licensee through the
required site-specific analysis stated in
§ 73.54(b)(1).
The proposed § 73.55(m)(1)(ii) is
renumbered in the final rule as
§ 73.54(b)(3). The Commission received
several comments that the cyber
security program is not appropriate for
incorporation into the physical security
program and, therefore, should not be
implemented through the security
organization. The Commission agrees in
part. Cyber security, like physical
security, focuses on the protection of
equipment and systems against attacks
by those individuals or organizations
that would seek to cause harm, damage,
or adversely affect the functions
performed by such systems and
networks. Cyber security and physical
security programs are intrinsically
linked and must be integrated to satisfy
the physical protection program design
criteria of § 73.55(b). The Commission
recognizes that a uniquely independent
technical expertise and knowledge is
required to implement the cyber
security program effectively, and
therefore, the specific training and
qualification requirements for the
program must focus on ensuring that the
personnel are trained, qualified, and
equipped to perform their unique duties
and responsibilities.
Section 73.54(c), Cyber Security
Program. The proposed
§ 73.55(m)(1)(iii) is renumbered in the
final rule as § 73.54(c) and (c)(1), and is
revised to clarify appropriate design
requirements for the cyber security
program. The cyber security program
must be designed to implement security
controls to protect the digital assets
identified by the paragraph (b)(1)
analysis. To accomplish this, the final
rule § 73.54(c)(2), (3), and (4) are added
to clarify the performance criteria to be
met through implementation of the
cyber security program.
PO 00000
Frm 00010
Fmt 4701
Sfmt 4700
The Commission received a comment
that the term ‘‘protected computer
system’’ in the proposed
§ 73.55(m)(1)(iii) is not defined and
urged a more specific description. The
Commission has deleted the term
‘‘protected computer system’’ from the
final rule and provided a more detailed
description of digital computer and
communication systems and networks
in § 73.54(a)(1).
The Commission received a comment
that the high assurance requirement of
the proposed § 73.55(m)(1) does not
allow a licensee to implement measures
designed to ensure continued
functionality. Section 73.54(c)(4) has
been revised to require the cyber
security program to be designed to
ensure that the intended function of the
assets identified by § 73.54(b)(1) are
maintained.
The proposed § 73.55(m)(5) is
renumbered in the final rule as
§ 73.54(c)(2). The Commission received
a comment to the proposed
§ 73.55(m)(5) that questioned whether
the phrase ‘‘defense-in-depth’’ in
computer terminology was intended to
include real-time backup data. The
Commission concluded that defense-indepth for digital computer and
communication systems and networks
includes technical and administrative
controls that are integrated and used to
mitigate threats from identified risks.
The need to back-up data as part of a
defense-in-depth program is dependent
upon the nature of the data relative to
its use within the facility or system.
Defense-in-depth is achieved when (1)
a layered defensive model exists that
allows for detection and containment of
non-authorized activities occurring
within each layer, (2) each defensive
layer is protected from adjacent layers,
(3) protection mechanisms used for
isolation between layers employ diverse
technologies to mitigate common cause
failures, (4) the design and configuration
of the security architecture and
associated countermeasures creates the
capability to sufficiently delay the
advance of an adversary in order for
preplanned response actions to occur,
(5) no single points of failure exist
within the security strategy or design
that would render the entire security
solution invalid or ineffective, and (6)
effective disaster recovery capabilities
exist for protected assets.
The commenter also questioned how
this requirement impacts the video
image recording system, which is a
computer system required by
§ 73.55(e)(7)(i)(C). Based upon the
licensee’s site-specific analysis, the
video image recording system may be
subject to this requirement if it meets
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
the criteria stipulated in § 73.54(a)(2),
but it is not required to be included by
the final rule.
Section 73.54(d), Cyber-Related
Training, Risk, and Modification
Management. The Commission has
consolidated the proposed requirements
from §§ 73.55(m)(2), (m)(6), and (m)(7)
into one paragraph of the § 73.54(d) to
require the development,
implementation, and maintenance of
supporting programs within the cyber
security program. The Commission has
moved proposed § 73.54(m)(6) to
§ 73.54(d)(3) and clarified it to require
that an evaluation be performed prior to
modifications to protected digital assets
to ensure that the cyber performance
objectives of § 73.54 are maintained.
The Commission received a comment
to the proposed rule § 73.55(m)(2)
requesting clarification of what is meant
by ‘‘assessment.’’ The term
‘‘assessment’’ has been removed from
the final rule. To ensure that the
measures used to protect digital
computer and communication systems
and networks remain effective and
continue to meet high assurance
expectations, the cyber security program
must evaluate and manage cyber risks.
Licensees must evaluate changes to
systems and networks when (1)
modifications are proposed for
previously analyzed systems and (2)
new technology-related vulnerabilities,
not previously analyzed in the original
analysis, that would act to reduce the
cyber security environment of the
system are identified.
Section 73.54(e), Cyber Security Plan.
The proposed § 73.55(m)(1)(i) is
renumbered in the final rule as
§ 73.54(e). The Commission added a
new § 73.54(e)(1) generically addressing
the content of the cyber security plan.
The plan must describe and account for
any site-specific conditions that affect
how Commission requirements are
implemented.
The proposed § 73.55(m)(4)(ii) is
deleted from the final rule. Consistent
with the removal of this section from
the proposed § 73.55(m), the
Commission concluded that it is
appropriate to address the cyber
security incident response and recovery
plan in the cyber security plan required
by this section. The rule requires that
the cyber security incident response and
recovery plan will be part of the cyber
security plan which in turn will be a
component of the physical security
program.
The proposed §§ 73.55(m)(4)(i) and
(m)(4)(iii) are combined and
renumbered to the final rule
§ 73.54(e)(2). The Commission received
a comment to the proposed
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
§ 73.54(m)(4)(i) that there should be a
rule requirement prescribing the
timeframe in which a licensee must
determine that a cyber attack is
occurring or has occurred and suggested
that it be within minutes of the attack.
The Commission agrees with the
commenter’s concerns. The proposed
§ 3.54(m)(4)(iii) is renumbered in the
final rule as § 73.54(e)(2)(i) and is
revised to require a description in the
cyber plan of how the licensee will
maintain the capability for timely
detection and response to cyber attacks.
Licensees are required to develop,
implement, and maintain a
methodology for detecting cyber attacks;
however, they are not required to meet
deterministic time limits for discovery
of a cyber attack. The cyber security
program must be designed to ensure that
cyber attacks are detected and an
appropriate response is initiated to
prevent the attack from adversely
affecting the systems and networks that
must be protected. The Commission has
concluded that the § 73.54 performancecriteria and requirements ensure that
detection and response are appropriate.
Section 73.54(f), Policies and
Procedures. The proposed § 73.55(m)(3)
is renumbered in the final rule as
§ 73.54(f). The Commission added
§ 73.54(f) to clarify that policies,
implementing procedures, site-specific
analysis, and other supporting technical
information used by the licensee need
not be submitted for Commission review
and approval as part of the cyber
security plan. However, this information
must be made available upon request by
an authorized representative of the
Commission.
Section 73.54(g), Reviews. The
Commission added the final rule
§ 73.54(g). The requirement for the
review of the cyber security program is
subject to the same processes stipulated
in § 73.55(m), ‘‘Security program
reviews.’’
Section 73.54(h), Records. The
Commission added the final rule
§ 73.54(h). Consistent with establishing
§ 73.54 as a stand-alone 10 CFR section,
this requirement for the retention of the
cyber security program records is
brought forward from the final rule
§ 73.55(q), ‘‘Records.’’ The expectation
is that each licensee will maintain the
technical information associated with
the assets identified by the final rule
§ 73.54(b)(1) that is pertinent to
compliance with § 73.54.
PO 00000
Frm 00011
Fmt 4701
Sfmt 4700
13935
E. Section 73.55, Requirements for
Physical Protection of Licensed
Activities in Nuclear Power Reactors
Against Radiological Sabotage
General Comments. The Commission
received several general comments
which stated that the proposed § 73.55
does not include requirements for
protection against aircraft attacks. As
the Commission recently stated in the
final design basis threat rulemaking (72
FR 12705; March 19, 2007), the
protection of NRC-regulated facilities
against aircraft attacks is beyond the
scope of a licensee’s obligations.
Accordingly, requiring specific
measures for the protection against
aircraft attacks is beyond the scope of
the requirements presented in this
section and, therefore, is not addressed.
The Commission nevertheless notes that
there are requirements in this
rulemaking that address licensee actions
that are required to minimize the
potential consequences of an aircraft
impact on a nuclear power plant. As
noted previously, those requirements
are now located in § 50.54(hh) as
conditions of license.
Section 73.55(a), Introduction. The
proposed § 73.55(a) would have
required each licensee to submit, in
their entirety, a revised physical
security plan, training and qualification
plan, and safeguards contingency plan
for NRC review and approval within 180
days after the effective date of the final
rule. The Commission received several
comments stating that 180 days is not
sufficient time to review and
understand the modifications that may
be required for compliance with the
amended rule and to revise and submit
amended security plans. In response to
the comments, the Commission
determined that, with the exception of
the cyber security plan required by the
new § 73.54, the majority of plan
changes needed for compliance with the
amended requirements of this section
are likely to be minimal and are not
anticipated to decrease the effectiveness
of any particular licensee’s current
security plan. Because the current NRCapproved security plans already address
the Commission’s orders and preexisting 10 CFR requirements, the
greatest impact of this final rule will be
focused primarily on those changes to
plans and procedures needed to satisfy
the requirements that are identified as
‘‘new.’’ The rule requires that by March
31, 2010, each currently operating
reactor licensee must evaluate, on a sitespecific basis, what security plan
changes are needed to comply with the
amended requirements of the rule.
Those changes must be incorporated
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13936
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
into their security plans, as necessary,
by March 31, 2010. In doing so,
licensees are expected to follow the
appropriate change processes described
currently in §§ 50.54(p), 50.90, or 73.5.
The Commission acknowledges that
based on site-specific conditions, a
limited number of plan changes may
require Commission review and
approval before implementation and
must be made through a license
amendment pursuant to 10 CFR § 50.90
or a request for an exemption per 10
CFR 73.5.
The Commission deleted the
proposed requirements in § 73.55(a)(2)
and (a)(3) for consistency with the
determination that revised plans need
not be submitted to the Commission for
review and approval.
The Commission added a requirement
in § 73.55(a)(2) that licensees must
identify, describe, and account for sitespecific conditions that affect the
licensee’s ability to satisfy the
requirements of this section in the NRCapproved security plans. This
requirement is added for consistency
with revisions made to § 73.55(b)(4)
which requires each licensee to conduct
a site-specific analysis to identify such
conditions.
The proposed § 73.55(a)(4) is
renumbered in the final rule as
§ 73.55(a)(3) with minor revision to
delete reference to Commission orders.
One commenter asked the NRC to
clarify its position with respect to the
‘‘legally-controlling document’’ once it
approves a licensee security plan. Once
a licensee has an approved security
plan, both the licensee’s security plan
and the Commission’s regulations are
legally controlling. Regulations are
legally controlling to the extent that
they set forth the regulatory framework
and general performance objectives of a
licensee’s security plan. The NRCapproved security plan, in contrast,
describes a licensee’s method of
complying with those regulations
including exemptions and approved
alternatives. However, that the NRC
specifically approved a licensee’s
security plan does not relieve the
licensee from compliance with
regulations.
To the extent that there are
differences in a licensee’s security plan
and the regulatory requirements, the
Commission expects that those
differences would be specifically
approved by the NRC, either in the form
of an NRC-granted exemption, or an
NRC-approved ‘‘alternative measure’’ as
set forth in § 73.55(r). The NRC
recognizes that generic regulations
cannot always account for site-specific
conditions. Some degree of regulatory
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
flexibility is necessary to ensure that
each licensee is capable of meeting the
general performance objective of
§ 73.55(b)(1) to provide ‘‘high
assurance’’ of public health and safety
and common defense and security
despite site specific conditions or
situations that may interfere with or
prevent the effective implementation of
a given NRC requirement. Therefore,
these regulations provide several
mechanisms through which the NRC
may approve a licensee’s plan to
implement alternative measures or
exempt a licensee from compliance with
any one or more NRC requirements,
provided the licensee documents and
submits sufficient justification. Once
those exemptions or alternative
measures are specifically reviewed and
approved by the NRC and are
incorporated into the licensee’s security
plan, they then become legally binding
through the licensee’s security plan
required as a condition of its license.
In the rare situation in which a
licensee’s security plan conflicts with
NRC regulations and the NRC has not
reviewed and approved the conflicting
measures, the Commission expects that
the staff would work with the licensee
to ensure that the security plan is
revised to comply with the regulatory
requirement. That the security plan may
have been approved with a deficiency
does not excuse the licensee from
compliance with the Commission’s
regulations.
Section 73.55(a)(4) establishes when
an applicant’s physical protection
program must be implemented. The
Commission concluded that the receipt
of special nuclear material (SNM) in the
form of fuel assemblies onsite, i.e. in the
licensee’s protected area, is the event
that subjects a licensee to the
requirements of § 73.55. It is the
responsibility of the applicant/licensee
to implement an effective physical
protection program before SNM in the
form of fuel assemblies is received in
the protected area.
The Commission has added a new
requirement in § 73.55(a)(5) to address
the Tennessee Valley Authority (TVA)
facility at Watts Bar. TVA is in
possession of a current construction
permit for Watts Bar Nuclear Plant, Unit
2, and is treated as a current licensee for
purposes of satisfying the requirements
of this rule. These requirements reflect
Commission support of a licensing
review approach for Watts Bar Nuclear
Plant, Unit 2, that employs the current
licensing basis for Unit 1 as the
reference basis for review and licensing
of Unit 2, as stated in a July 25, 2007,
Staff Requirements Memorandum
(ML072060688).
PO 00000
Frm 00012
Fmt 4701
Sfmt 4700
The Commission has revised the final
rule § 73.55(a)(6) to clarify that certain
requirements in this section apply only
to applicants for an operating license
under the provisions of 10 CFR part 50
of this chapter, or holders of a combined
license under the provisions of 10 CFR
part 52 of this chapter. Specifically, the
requirements to design, construct, and
equip both the CAS and SAS to the
same standards are addressed in the
final rule as § 73.55(i)(4)(iii). The
Commission views this as a prudent
safety enhancement for future nuclear
power plants but not an enhancement
that is necessary for the adequate
protection of pre-existing operating
reactors. Unless otherwise specifically
approved by the Commission, preexisting power reactor licensees
choosing to construct a new reactor
inside an existing protected area are
subject to the new CAS/SAS
requirements in § 73.55(i)(4)(iii).
Section 73.55(b), General
Performance Objective and
Requirements. The Commission
received several comments requesting
that the term ‘‘radiological sabotage’’ be
used in lieu of the phrase ‘‘significant
core damage’’ and ‘‘spent fuel sabotage’’
because the term ‘‘radiological
sabotage’’ is defined in § 73.2. The
Commission agrees in part and has
revised the final rule in § 73.55(b)(2) to
clearly retain, without modification, the
pre-existing requirement for licensees to
provide protection against the design
basis threat of radiological sabotage and
has revised § 73.55(b)(3) to clarify that
the design of the physical protection
program must ensure the capability to
prevent ‘‘significant core damage’’ and
‘‘spent fuel sabotage.’’ It was not the
Commission’s intent in the proposed
rule to delete the requirement for
protection against radiological sabotage
but rather to establish the prevention of
significant core damage and spent fuel
sabotage as the criteria to measure a
licensee’s performance to protect against
‘‘radiological sabotage.’’ The final rule
has been revised to reflect this intent.
The achievement of ‘‘significant core
damage’’ and ‘‘spent fuel sabotage’’ can
be measured by the licensee through
accepted engineering standards, and the
use of these terms provides measurable
performance criteria that are essential to
understanding the definition of
radiological sabotage. Additionally, the
Commission believes that continued use
of the terms ‘‘significant core damage’’
and ‘‘spent fuel sabotage’’ to enhance
the understanding of radiological
sabotage is warranted because these
terms are now well established and have
been used consistently by the
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
Commission and industry relative to
force-on-force testing before and after
September 11, 2001.
The Commission received several
comments regarding the proposed rule
§ 73.55(b)(2), the introduction of six
performance-criteria: detect, assess,
intercept, challenge, delay, and
neutralize. Upon consideration, the
Commission concluded that the four
terms, ‘‘detect, assess, interdict, and
neutralize,’’ more concisely represent
the intended performance-criteria and
this change has been made throughout
the final rule. The terms ‘‘intercept,
challenge, and delay’’ are subsumed in
the term ‘‘interdict.’’
The Commission received a comment
that the proposed rule § 73.55(b)(3)
delineation of requirements for the
design of the physical protection
program should be clarified. The
Commission agrees and § 73.55(b)(3) has
been revised to clarify Commission
expectations. The requirement for the
protection of personnel, equipment, and
systems against the design basis threat
vehicle bomb assault is addressed in the
§ 73.55(e)(10)(i)(A). The requirement for
protection against a single act, within
the capabilities of the design basis threat
of radiological sabotage, is based upon
the pre-existing § 73.55(e) and is
addressed in the final rule
§ 73.55(i)(4)(i). Section 73.55(i)(4)(i)
requires licensees to protect either the
CAS or SAS against a single act by
ensuring the survival of at least one
alarm station in order to maintain the
ability to perform required functions.
Section 73.55(b)(4) is renumbered in
the final rule as § 73.55(b)(3)(ii). The
Commission received a comment that
the scope of the proposed § 73.55(b)(4)
regarding the term ‘‘defense-in-depth’’
was not clearly understood. Section
73.55(b)(3)(ii) is revised to clarify that
defense-in-depth is accomplished
through the integration of systems,
technologies, programs, equipment,
supporting processes, and implementing
procedures as needed to ensure the
overall effectiveness of the physical
protection program.
Section 73.55(b)(4) is added to
specifically require that each licensee
perform a site-specific analysis for the
purpose of identifying and analyzing
site-specific conditions that affect the
design of the onsite physical protection
program. Commission regulations are
generic and cannot in all instances
account for site-specific conditions, and
therefore, it is the licensee’s
responsibility to identify and account
for site-specific conditions relative to
meeting Commission requirements,
subject to NRC inspection.
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
Section 73.55(b)(8) is added to require
the development and maintenance of a
cyber security program that meets the
performance objectives of the new
§ 73.54. Section 73.54 incorporates the
proposed § 73.55(m) in its entirety, and
the associated public comments were
addressed previously within the new
§ 73.54.
Section 73.55(b)(10) is revised to
clarify the Commission’s expectation
that each licensee will enter physical
protection program findings and
deficiencies into the site corrective
action program so that they can be
tracked, trended, corrected, and
prevented from recurring.
Section 73.55(b)(11) is repeated from
the pre-existing appendix C to part 73,
‘‘Introduction,’’ to delineate the
Commission’s expectation that security
plans and implementing procedures
must be complementary to other site
plans and procedures.
Section 73.55(c), Security Plans. The
Commission received several comments
stating that the requirements in
§ 73.55(c) are redundant to the
requirements in § 50.34(c) and (d). The
Commission disagrees. While these
requirements appear to be redundant,
conforming changes have been made to
§ 50.34(c) and (e) to include cyber
security plans and training and
qualification plans. In addition, § 73.55
establishes a paragraph dedicated to
security plans to consolidate the
regulatory framework for each plan,
describe the general content of each
plan, and clarify the relationship
between Commission regulations, NRCapproved security plans, and sitespecific implementing procedures. The
primary focus of the security plans is to
describe how the licensee will satisfy
Commission requirements including
how site-specific conditions affect the
measures needed at each site to ensure
that the physical protection program is
effective.
The Commission received a comment
that the proposed § 73.55(c)(2) appeared
to require that all security plans be
protected as Safeguards Information
(SGI). The Commission disagrees with
the comment. Licensees are required by
§ 73.55(c)(2) only to review the
information contained in the security
plans against the criteria contained in
§ 73.21 to determine the existence of
SGI and to protect that information
appropriately.
The Commission has added a
conforming requirement to
§§ 73.55(c)(6) and 50.34(c) for licensees
to provide a cyber security plan in
accordance with the new § 73.54 for
Commission review and approval.
PO 00000
Frm 00013
Fmt 4701
Sfmt 4700
13937
The proposed §§ 73.55(c)(3)(ii),
73.55(c)(4)(ii), and 73.55(c)(5)(ii) are
deleted from the final rule. The
Commission’s expectation is that each
licensee will address Commission
requirements in their approved plans
and implementing procedures and,
where the Commission requires a
specific detail to be included in the
plans, that requirement is stated in
applicable paragraphs of the final rule.
Section 73.55(d), Security
Organization. The Commission received
several comments that the proposed
requirement of § 73.55(d)(1) to provide
‘‘early detection, assessment, and
response to unauthorized activities
within any area of the facility’’ was too
broad and could result in unnecessary
regulatory burden. The Commission
agrees with the comment and has
deleted these terms and revised the
language to clarify the primary
responsibility of the security
organization. The intent is that the
security organization will focus upon
the effective implementation of the
physical protection program which in
turn is designed to protect the facility
from the design basis threat of
radiological sabotage with high
assurance.
The Commission received a comment
that proposed § 73.55(d)(3) was not
clearly understood as it appeared this
requirement may pertain to any
individual within the security
organization. The Commission agrees,
and the final rule text in § 73.55(d)(3) is
revised to clarify that individuals
assigned to perform physical protection
and/or contingency response duties
must be trained, equipped, and
qualified in accordance with appendix
B to part 73 to perform those assigned
duties and responsibilities whether that
individual is a member of the security
organization or not. This clarification is
made to account for those instances
where the licensee uses facility
personnel other than members of the
security organization to perform duties
within the physical protection program,
such as a vehicle escort or warehouse
personnel inspecting/searching
deliveries. The rule requires that facility
personnel who are not members of the
security organization will be trained and
qualified for the specific physical
protection duties that they are assigned,
which includes possessing the
knowledge, skills, abilities, and the
minimum physical qualifications such
as sight, hearing, and the general health
needed to perform the assigned duties
effectively.
The proposed § 73.55(d)(4) is deleted
from the final rule because the reference
to meeting the requirements of § 73.56
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13938
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
(Access authorization program) is
redundant.
The Commission received several
comments indicating that the
requirements in the proposed
§ 73.55(d)(5) pertaining to contracted
security forces were redundant to other
requirements addressed in the proposed
rule. The Commission agrees. These
requirements were retained from preexisting requirements for the licensee to
explicitly include these requirements as
written statements in contracts between
the licensee and a contract security
force. Upon review, the Commission has
determined that specifying these
requirements in written contracts is
unnecessary. The enforceability of NRC
regulatory requirements is not
dependent on whether they are
implemented by the licensee or by a
licensee contractor; therefore,
specifically requiring the contract
between these parties to contain these
requirements is unnecessary. The
Commission has, however, retained the
requirement in the final rule
§ 73.55(q)(3), ‘‘Records,’’ (formally
described in proposed § 73.55(d)(5)) that
a copy of the contract be retained by the
licensee. Additionally, the requirement
in the proposed § 73.55(d)(5)(vi) that
‘‘any license for possession and
ownership of enhanced weapons will
reside with the licensee’’ has been
deleted from this section. The
Commission intends, however, that this
requirement will be reflected in its
regulations codifying requirements
related to the use of enhanced weapons.
The Commission’s plan for that
rulemaking was stated previously in this
document. The remaining proposed
requirements of § 73.55(d)(5) are deleted
from this paragraph and are retained in
other paragraphs of the final rule.
Section 73.55(e), Physical Barriers.
The Commission received several
comments that the proposed § 73.55(e)
would result in unnecessary regulatory
burden by expanding protected area
physical barrier requirements into the
owner controlled area (OCA). The
Commission agrees in part and
§ 73.55(e) is revised to clarify the
generic and specific requirements for
the design, construction, placement, and
function of each physical barrier.
Section 73.55(e)(6) specifically
addresses requirements for physical
barriers in the OCA. Physical barriers
can be used to fulfill many functions
within the physical protection program,
and therefore, each physical barrier
must be designed and constructed to
serve its predetermined function within
the physical protection program.
Consistent with § 73.55(b) for design of
the physical protection program, the
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
rule requires that each licensee will
analyze site-specific conditions to
determine the specific use, type,
function, construction, and placement
of physical barriers needed for the
implementation of the physical
protection program.
The Commission received comments
on the proposed § 73.55(e)(3)(i), which
would have required the delineation of
the boundaries of areas for which the
physical barrier provides protection,
requesting that this provision be deleted
because it lacked performance criteria.
The Commission agrees, and the
requirement is deleted from the final
rule because it is more appropriate to be
specified in regulatory guidance.
The proposed § 73.55(e)(3)(ii) is
renumbered in the final rule as
§ 73.55(e)(3)(i) and is broken into
subparagraphs § 73.55(e)(3)(i)(A)
through (C). The Commission received a
comment to clarify the proposed rule
statements of consideration pertaining
to the performance criteria for physical
barriers. The Commission agrees in part.
The pre-existing § 73.55(c)(8)
introduced design goals relative to the
use of vehicle barriers but did not
address other physical barriers. The
statements of consideration in the
proposed rule attempted to incorporate
other physical barriers and explain that
the generic performance-criteria for
physical barriers are not limited to
vehicle barriers. The criterion for
physical barriers is that ‘‘each barrier be
designed to satisfy the function it is
intended to perform.’’ The Commission
agrees with the comment stating that the
performance of all three functions (i.e.,
visual deterrence, delay, and support
access control measures) is not always
required of each barrier, and the final
rule addresses the barrier design
requirements generically in
§ 73.55(e)(3)(i)(A) through (C).
The Commission received several
comments requesting clarification of the
proposed rule § 73.55(e)(4) for physical
protection measures in the OCA. The
proposed § 73.55(e) attempted to
establish a generic requirement for the
design, construction, placement, and
function of physical barriers based on a
site specific analysis. This generic
requirement was misunderstood to
mean that PA barriers were now
required in the OCA. As such, the
Commission revised the proposed
§ 73.55(e) and (e)(6) to clarify the scope
and intent of this requirement.
Consistent with the final rule
§ 73.55(b)(4), it is the responsibility of
each licensee to identify, analyze, and
account for site-specific conditions in
the design and implementation of its
physical protection program. Section
PO 00000
Frm 00014
Fmt 4701
Sfmt 4700
73.55(e)(6) is revised to clarify that the
application of physical barriers in the
OCA is determined by each licensee
through site-specific analysis and must
satisfy the physical protection program
design requirements of § 73.55(b). The
rule requires that the licensee will
design and construct appropriate
barriers in those areas to meet the
identified site-specific need.
The Commission received comments
requesting clarification of the term
‘‘unobstructed observation’’ as used in
§ 73.55(e)(5)(i)(A). The Commission
agrees that this term can be
misunderstood, and therefore,
§ 73.55(e)(7)(i)(A) is revised to delete the
term ‘‘unobstructed.’’ This term was
used to emphasize that a clear field of
observation be provided in the isolation
zone. However, the Commission’s
expectation is not the complete
elimination of obstruction but that the
licensee implement measures needed to
negate the effects of any obstructions
such as the relocation of non-permanent
objects or the strategic placement of
cameras to enable observation around
an obstruction.
The Commission received several
comments to clarify the proposed
§ 73.55(e)(5)(ii) pertaining to the
performance of isolation zone
assessment equipment and agrees that
clarification is necessary. The proposed
§ 73.55(e)(5)(ii) is renumbered in the
final rule as § 73.55(e)(7)(i)(C) and
provides a performance-based
description for specific isolation zone
assessment equipment. The Commission
has concluded that the requirement for
this equipment is consistent with
current licensee practices, therefore, it is
an appropriate update for this final rule.
The proposed § 73.55(e)(5)(iii) is
renumbered in the final rule as
§ 73.55(e)(7)(ii). The Commission
received a comment that this
requirement would preclude the use of
areas inside the protected area as
equipment lay-down/staging areas. The
Commission agrees in part. The final
rule does not preclude the use of laydown areas/staging areas. However, this
requirement does explicitly preclude
such activities where the action
constitutes an obstruction that prevents
observation on either side of the
protected area perimeter. This rule
requires the licensee to take appropriate
actions to negate any adverse effects that
lay-down/staging areas may have to
prevent observation on either side of the
protected area perimeter.
The Commission received several
comments to clarify the proposed
requirement in § 73.55(e)(6)(i) to secure
penetrations through the protected area
barrier. The Commission agrees that
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
clarification is necessary. The proposed
requirement is separated and
renumbered as § 73.55(e)(8)(ii). Section
73.55(e)(8)(ii) is revised to clarify that
penetrations must be secured and
monitored to prevent exploitation.
Where the size of an opening in any
barrier is large enough to be exploited
or otherwise defeat the intended
function of that barrier, then such
openings must be secured and
monitored to prevent or detect
attempted or actual exploitation.
The proposed § 73.55(e)(6)(v) is
renumbered to § 73.55(e)(5). The
Commission received several comments
to clarify the term ‘‘bullet-resisting.’’
The Commission agrees in part that
additional clarification is needed but
does not believe that such clarification
is necessary in the rule text. The
Commission has determined that it is
not appropriate to publicly reference
site specific bullet-resisting standards in
the rule because such specificity may
lead to the identification of specific
vulnerabilities. Specific bullet resisting
standards that meet the requirements in
§ 73.55(e)(5) are described in regulatory
guidance and would be further reflected
in a licensee’s NRC-approved security
plans. The Commission acknowledges,
however, that in addition to
manufactured bullet-resisting materials,
a level of bullet-resistance that meets
the intent of this regulation might be
provided by distances and angles
combined with standard construction
materials and designs.
The proposed § 73.55(e)(6)(vi) is
renumbered in the final rule as
§ 73.55(e)(8)(v). The Commission
received several comments requesting
that the NRC delete the word ‘‘all’’ with
respect to its modification of the term
‘‘exterior areas.’’ The Commission
agrees that clarification is necessary.
Section 73.55(e)(8)(v) retains and
updates the pre-existing requirement in
§ 73.55(c)(4) to periodically check all
exterior areas within the protected area
but has revised the requirement to
clarify that some areas may be excepted
from this requirement where safety
concerns prevent the licensee from
physically checking that area. The
Commission’s expectation is that
licensee procedures will account for
these areas by another means that
ensures the safety of personnel while
assuring the integrity of the area and the
requirement is met.
Section § 73.55(e)(9)(v)(D) is added to
include the SAS among the types of
areas and equipment that must be
afforded protection as a vital area/
equipment the same as the CAS, only
for applicants for new reactor licenses.
Current licensees are not subject to this
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
requirement as they have been found to
provide adequate protection within
current configurations. The requirement
to treat SAS as a vital area is an
enhancement that provides equivalency
and redundancy for the alarm stations.
The Commission received a comment
that proposed § 73.55(e)(7)(iii),
renumbered to the final rule as
§ 73.55(e)(9)(vi)(A), expands the
requirement for secondary power
systems from just ‘‘alarm annunciator
equipment’’ to all ‘‘intrusion detection
and assessment equipment’’ and that
this is a significant expansion that is not
explained or supported by NRC forceon-force inspections. The Commission
agrees that the scope of the proposed
paragraph appears to have been
expanded to require all intrusion
detection and assessment equipment
employed by the licensee to be
connected to a secondary power supply
and for all secondary power supplies to
be treated as vital areas. Section
73.55(e)(9)(vi)(A) is revised to retain the
pre-existing § 73.55(e)(1) to locate the
secondary power supply for alarm
annunciation equipment in a vital area.
The Commission has added
§ 73.55(i)(3)(vii) to address
uninterruptible power supplies for
intrusion detection and assessment
equipment at the protected area
perimeter. The uninterruptible power
supply discussed in § 73.55(i)(3)(vii) is
not required to be located in a vital area
because it is a short-term measure
utilized to provide service until
secondary power sources are operable
and the Commission recognizes that
uninterruptible power supplies are
physically dispersed across the site.
Making each uninterruptable power
supply a vital area is considered a safety
enhancement and implementation
would be an unnecessary regulatory
burden on the licensee based on the
level of protection that would be
provided versus the cost.
The Commission has determined that
the proposed § 73.55(e)(7)(iv) was
redundant to § 73.58 and has deleted
this requirement from the final rule to
avoid unintended duplication and
impact beyond current requirements.
The Commission received multiple
comments stating that the proposed
§ 73.55(e)(8) significantly expands the
requirements for controlling vehicles
inside the OCA. The pre-existing
§ 73.55(c)(7) requires the licensee to
provide vehicle control measures,
including vehicle barrier systems, to
protect against use of a land vehicle as
a means of transportation to gain
unauthorized proximity to vital areas.
The Commission’s intent is not to
expand the requirements for controlling
PO 00000
Frm 00015
Fmt 4701
Sfmt 4700
13939
vehicles in the OCA and has revised and
consolidated the proposed rule
§ 73.55(e)(8) to clarify scope and intent
of this requirement. The proposed
§ 73.55(e)(8) is renumbered in the final
rule as § 73.55(e)(10) and provides
general vehicle control requirements. In
addition, the rule requires that licensees
implement security measures to prevent
unauthorized access to the protected
area by rail.
The Commission received several
comments on proposed § 73.55(e)(8)(ii)
that to control vehicle approach routes
is broader in scope than protecting
against vehicle bomb attacks and
preventing vehicle use as a means of
adversary transportation as was stated
in the proposed rule. In lieu of a specific
requirement to control vehicle approach
routes, § 73.55(e)(10) provides general
vehicle control requirements. The
Commission acknowledges that the
control of vehicle approach routes is
generally accomplished through the
establishment of vehicle control
measures such as a vehicle barrier
system designed for protection against
vehicle bomb assaults or a protected
area barrier that prevents unauthorized
personnel from gaining proximity to
protected areas or vital areas.
The proposed § 73.55(e)(8)(iii) is
modified and renumbered as
§ 73.55(e)(10)(i)(A). The Commission
received several comments to clarify
protection requirements against land
vehicle bombs and the protection of
personnel, systems, and equipment. The
Commission agrees, and
§ 73.55(e)(10)(i)(A) is revised to clarify
the protection of personnel, systems,
and equipment relative to land vehicle
bomb assaults rather than the design
basis threat in its entirety. This
requirement does not include an
obligation to protect all plant personnel
from such an attack but rather focuses
on the protection of those personnel
whose job functions make them
necessary to prevent significant core
damage and spent fuel sabotage through
the implementation of the protective
strategy.
The proposed § 73.55(e)(8)(v) is
renumbered as § 73.55(e)(10)(i)(B). The
Commission received a comment to
clarify whether loss of power testing is
subject to this requirement. The
Commission concluded that specific
testing criteria and periodicity are sitespecific and must be addressed in
procedures. The rule requires that each
licensee will develop and implement
procedures that will ensure that active
vehicle barriers can be electronically,
manually, or mechanically placed in the
denial position to perform their
intended function for protection against
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13940
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
the vehicle bomb in the event of a
power failure.
The proposed § 73.55(e)(8)(vi) is
renumbered as § 73.55(e)(10)(i)(C). The
Commission received several comments
that if the proposed § 73.55(e)(8)(vi) is
intended to address tampering then the
term ‘‘tampering’’ should be used. The
Commission agrees and
§ 73.55(e)(10)(i)(C) is revised to remove
the term ‘‘integrity,’’ and clarified to
require that the licensee implement
measures to identify indications of
tampering with vehicle barriers and
barrier systems and to ensure that
barriers are not degraded. The rule
requires that the licensee will
implement appropriate surveillance and
observation measures for vehicle
barriers, barrier systems, and railway
barriers.
Section 73.55(e)(10)(i)(D) was
specifically added, based on a comment,
to address vehicle control measures for
sites that have rail access to the
protected area.
The proposed § 73.55(e)(9) is
renumbered as § 73.55(e)(10)(ii). Section
73.55(e)(10)(ii)(B) is revised to require
licensees to provide periodic
surveillance and observation of
waterway approaches and adjacent
areas. Section 73.55(e)(10)(ii) is also
revised to delete reference to early
detection, assessment, and response,
consistent with revisions made to the
proposed § 73.55(d)(1).
The proposed § 73.55(e)(10) is
deleted. The Commission received
several comments that this provision is
inconsistent with the existing
regulations and associated regulatory
guidance for openings in the protected
or vital areas. The Commission agrees
and furthermore determined that
‘‘Unattended Openings’’ are adequately
addressed in regulatory guidance and,
therefore, need only be addressed
through a more generic requirement
within this rulemaking. Section
73.55(e)(8)(ii) and § 73.55(i)(5)(iii)
generically address penetrations
through the PA barrier and unattended
openings that intersect a security
boundary. The rule requires that such
penetrations and unattended openings
will be secured and monitored
consistent with the intended function of
the barrier to ensure the penetration or
unattended opening can not be
exploited.
Section 73.55(f), Target Sets. The
Commission received multiple
comments that the NRC should require
licensees to identify certain bridges as
‘‘targets.’’ The commenter stated in part,
that certain bridges, if lost, would
adversely affect or even negate the
offsite responders’ capabilities and
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
because numerous emergency scenarios
rely upon offsite responder’s capability
to cross these bridges to gain access to
the facility during an emergency. The
Commission disagrees. The
requirements of this section focus on the
physical protection of target set
equipment against the design basis
threat of radiological sabotage. Target
sets include, in part, the combination of
equipment or operator actions which, if
all are prevented from performing their
intended safety function or prevented
from being accomplished, would likely
result in significant core damage barring
extraordinary action by plant operators.
Clearly, geographical features such as
bridges or other ingress or egress routes
are not included in this concept of target
set equipment. Further, a licensee’s
ability to defend against the design basis
threat of radiological sabotage is not
dependent on the availability of offsite
responders.
The Commission received a comment
that proposed § 73.55(f)(1) which would
have required licensees to document
their target set development process in
‘‘site procedures’’ is not appropriate
because other site documents (e.g.,
engineering calculations) are used to
document this process. The Commission
agrees and final rule § 73.55(f)(1) is
revised to generically require that this
information be documented, rather than
written into site procedures, to provide
the necessary regulatory flexibility. The
word ‘‘maintain’’ is added to ensure
availability of this information upon
request by an authorized representative
of the NRC. The specific information
needed to satisfy this requirement may
be contained in engineering records or
other documents.
The Commission received two
comments pertaining to the proposed
requirement § 73.55(f)(2) which stated
that the requirement for licensees to
consider the effects of cyber attacks on
target sets is not appropriate. The
Commission disagrees, concluding that
§ 73.55(f)(2) is appropriate and
consistent with Commission
requirements for protection against the
design basis threat of radiological
sabotage stated in § 73.1 and the cyber
security requirements stated in the new
§ 73.54.
The Commission received a comment
that the proposed § 73.55(f)(3)
requirement to list target set equipment
or elements that are not within a
protected or vital area in the approved
security plan is an unnecessary
regulatory burden that could require
plan changes whenever site-conditions
change. The Commission agrees that
targets sets must be adjusted consistent
with changes to site-specific conditions,
PO 00000
Frm 00016
Fmt 4701
Sfmt 4700
and therefore, § 73.55(f)(3) is revised to
require that target set elements not
contained in a protected or vital area be
identified through the documentation
required in § 73.55(f)(1) rather than
security plans to ensure that they can be
appropriately updated and modified to
account for changes to site-specific
conditions without prior Commission
approval.
The Commission received comments
that the proposed § 73.55(f)(4), which
would have required implementation of
a program to ensure that changes to the
configuration of equipment that was
identified as target set equipment in the
licensee’s security plan, was not
appropriate due to the increased burden
of oversight identified by the
requirement. The Commission agrees in
part. Section 73.55(f)(4) is revised to
clarify the Commission’s expectation
that each licensee implement a process
for the oversight of target set equipment,
systems, and configurations using
existing processes. This requirement
ensures that changes made to the
configuration of target set equipment
and modes of operation are considered
in the licensee’s protective strategy.
Reference to ‘‘significant core damage
and spent fuel sabotage’’ is deleted to
clarify that the focus of this requirement
is on the licensee’s process to identify
changes made to such equipment that
could potentially affect the
implementation of the protective
strategy. The licensee is expected to
periodically review target sets for
completeness and continued
applicability consistent with the
requirements in the final rule
§ 73.55(m), ‘‘Security program reviews.’’
The Commission has determined that
such reviews are needed to ensure target
sets are complete and accurate at all
times.
Section 73.55(g), Access Controls. The
Commission received a comment that
the proposed § 73.55(g) does not close a
dangerous loophole in current search
requirements for law enforcement
personnel and security officers which
allows bona fide Federal, State, and
local law enforcement personnel on
official duty and licensee security
personnel who have exited the
protected area (PA) to reenter the PA
without being searched for firearms. The
commenter argued that such exceptions
could provide insiders or corrupt law
enforcement personnel collaborating
with adversaries with significant
opportunities to introduce contraband,
silencers, ammunition, or other
unauthorized equipment that could be
used in an attack. The commenter stated
that this practice should be explicitly
forbidden in the rules except under
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
extraordinary circumstances. The
Commission disagrees with this
comment. On-duty law enforcement
personnel may be granted access by
licensees when there is a need for such
access and are escorted while inside the
PA. With respect to licensee security
personnel, they are searched for
firearms, explosives, and incendiary
devices upon reporting for duty and are
under the observation of other security
personnel who are subject to the
licensee’s continuous behavioral
observation program when performing
duties. Upon assuming their duties,
armed security officers must continue to
be subject to the search criteria for
explosives and incendiary devices upon
re-entry to the PA. Both law
enforcement personnel and licensee
armed security personnel have been
determined, through rigorous
background investigations, to be
trustworthy and reliable before being
issued a firearm as part of their assigned
duties. The Commission concluded that
this exception to the required search
criteria is necessary and appropriate to
avoid unnecessary regulatory burden
associated with these operating
conditions.
The proposed rule attempted to
address all access controls equally
without addressing specific
implementing differences for access to
the owner controlled area, PA, or vital
areas (VA). The Commission received
several comments to clarify these
differences in access controls for each
area regarding processing of materials,
personnel, and vehicles. The
Commission agrees and the final rule is
revised to address access control
requirements for each area. The
Commission also revised
§ 73.55(g)(1)(ii), (A), (B), and (C) to
clarify generic control measures for
controlling vehicle access through a
vehicle barrier. Section 73.55(g)(2) is
revised to specifically address PA access
controls, and § 73.55(g)(4) is revised to
specifically address VA access controls.
The proposed § 73.55(g)(1)(iv) to
monitor and ensure the integrity of the
licensee’s access control systems is
deleted from the final rule because it is
sufficiently addressed by
§§ 73.55(n)(1)(i) and (g)(1)(i)(C). The
rule requires that the licensee will
ensure that all access controls are
working as intended and have not been
compromised such that a person,
vehicle, or material is able to gain
unauthorized access beyond a barrier.
The proposed § 73.55(g)(5) is
renumbered as § 73.55(g)(3). The
Commission received a comment that
the proposed § 73.55(g)(3)(ii) would
have relaxed the requirement for armed
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
security escorts for all vehicles inside a
nuclear power plant’s PA or VAs, unless
the vehicle was specifically designated
for use in such areas. The commenter
further stated that the provision
provides no explanation for the
proposed change to this requirement,
particularly given that there appears to
have been no change in the threat
environment that might warrant this
change in security.
The Commission disagrees that
requirements for control of vehicles
inside the PA are relaxed by this
requirement. The pre-existing
requirement § 73.55(d)(4) did not
require an armed escort for all vehicles
but rather required only that the escort
be a member of the security organization
who may have been an unarmed
watchman. The requirement has been
revised, however, to permit the use of
non-security-organization personnel as
escorts for vehicles except that armed
security personnel must escort vehicles
containing hazardous materials and
unsearched bulk items. Vehicle escorts,
however, must be trained in accordance
with the licensee’s training and
qualification plan as required by
§ 73.55(g)(8)(iii).
The pre-existing requirement for
licensees to designate certain vehicles
for use inside the PA has been deleted
from the final rule. The Commission
concluded that simply designating a
vehicle for use inside the PA is an
unnecessary regulatory burden and,
therefore, is not necessary. Section
73.55(g)(3)(iii) requires that vehicle use
inside the PA must be limited to plant
functions or emergencies and that keys
must be removed or the vehicle
otherwise disabled when not in use. All
vehicles and personnel must be
searched before entering the PA.
Vehicles operated by individuals who
are authorized unescorted access to the
PA are not required to be escorted.
The proposed § 73.55(g)(4)(ii)(C),
which would have required licensees to
implement procedures during an
emergency to ensure that the licensee’s
capability to prevent significant core
damage and spent fuel sabotage was
maintained, is deleted because it is
sufficiently addressed by § 73.55(b)(3).
The proposed § 73.55(g)(4)(iii) is
subsumed by §§ 73.55(g)(5)(ii) and
73.55(b)(11). These provisions require
that consideration be given to how
access to and egress from the site will
be controlled during an emergency,
which is a function assigned to the
security organization consistent with
site emergency procedures.
The Commission received comments
that passwords are not access control
devices and, therefore, are not
PO 00000
Frm 00017
Fmt 4701
Sfmt 4700
13941
appropriate for the requirements of the
proposed § 73.55(g)(6). The Commission
disagrees. The Commission has
determined that in physical security,
passwords are a form of access control
device because they are used to control
access to security computer or
electronic systems and may be used to
control access to secured areas. The rule
requires that the licensee will control
passwords/passcodes used for security
computers, electronic systems, or
secured areas.
Section 73.55(g)(7)(i)(F) is added to
require the licensee to deny access
(escorted or unescorted) to any
individual for whom access is currently
denied at another NRC-licensed nuclear
power reactor facility.
The Commission received several
comments that the requirements
described in proposed § 73.55(g)(7)(ii)
regarding the specific information to be
included on photo-identification badges
issued to non-employee personnel who
require frequent or extended unescorted
access to a facility are an unnecessary
regulatory burden. The Commission
agrees in part, and § 73.55(g)(7)(ii) is
revised to retain only the requirement
for badges to visually reflect that the
individual is a non-employee and that
no escort is required. The proposed
§§ 73.55(g)(7)(ii)(B) through (D) are
deleted. The Commission’s expectation
is for licensees to electronically record
the individual’s access level, period of
unescorted access, and employer within
security databases. The Commission
concluded that current badge
technology is predicated upon
computerized access control
methodologies that store much of this
information electronically on badges or
keycards and in associated databases.
Therefore, the need to visually display
such information on badges is
unnecessary. The proposed
§ 73.55(g)(7)(ii)(E) requirement for the
designation of assigned assembly areas
on badges is also deleted as it is
determined to be an unnecessary
regulatory burden.
The Commission received a comment
to clarify the proposed § 73.55(g)(8)
relative to the training of personnel
assigned to perform escort duties. The
rule requires that all escorts will be
trained to perform escort duties and that
this training may be accomplished
through existing processes such as the
General Employee Training (personnel
escort) and/or the security Training and
Qualification Plan (vehicle escorts).
This training requirement ensures that
any individual assigned to escort duties
understands their responsibilities and
the activities the person(s) to be
escorted are authorized to perform. For
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13942
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
those instances where the licensee uses
facility personnel other than a member
of the security organization to perform
escort duties within the physical
protection program, such as a vehicle
escort, these individuals must be
trained, equipped, and qualified in
accordance with the security Training
and Qualification Plan to perform this
specific duty. The rule requires that
facility personnel who are not members
of the security organization will be
trained and qualified for the specific
physical protection duties that they are
assigned which includes possessing the
knowledge, skills, abilities, and the
minimum physical qualifications such
as sight, hearing, and their general
health needed to perform the assigned
duties effectively.
The Commission received another
comment that the proposed § 73.55(g)(8)
allows escorts to take multiple visitors
with no background checks into PAs
and VAs, but does not require that the
escorts meet even minimal physical and
visual capabilities. The commenter
stated that, unlike the proposed new
requirement in Part 73, appendix B,
paragraph B.2.a(2) that unarmed
members of the security organization
meet specified physical capabilities, the
proposed regulations in § 73.55(g)(8)
would not prevent licensees from
assigning blind, deaf, and mute persons
as escorts. The commenter urged that
the regulation define minimally
acceptable physical attributes for
escorts. The Commission disagrees with
this comment. The final rule does not
require personnel escorts to be subjected
to medical qualifications to perform
escort duties but does require escorts to
meet the requirements of § 73.55(g)(8),
which establishes training and
qualification requirements for personnel
escorts. Further, personnel escorts are
required to be capable of performing the
assigned duty and maintain
communication with the security
organization when performing escort
duties to summon assistance if needed.
The NRC has never imposed minimum
physical qualifications on licensee
personnel escorts and the commenter
has supplied no basis to impose such
requirements now.
Section § 73.55(g)(8)(i) through (v)
updates pre-existing requirements
consistent with Commission
expectations and current licensee
practices for performing escort duties.
The Commission received several
comments that the proposed
§ 73.55(g)(8)(ii), which would have
required that individuals assigned
escort duties be provided a means of
‘‘timely communication,’’ was without
basis because current communications
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
capabilities at facilities are sufficient for
escorts to make notifications or requests
for assistance. Therefore, the commenter
asserted that the NRC should delete this
provision from the final rule. The
Commission disagrees. The rule requires
that escorts be able to call for assistance
when needed. The ‘‘timely
communication’’ language in the final
rule does not require a specific form of
communication media. It is the
responsibility of each licensee to
determine the appropriate
communication media for their site
which may or may not include the use
of hand-held radios, public address
systems, intercoms, etc. The
Commission has concluded that timely
communication capability is an
appropriate update to pre-existing
requirements and current licensee
practices. Therefore, the Commission
retains this requirement in
§ 73.55(g)(8)(ii).
The Commission received several
comments that the proposed
§ 73.55(g)(8)(iii) for continuous
communication is a new requirement
without basis. The Commission
disagrees. Section 73.55(g)(8)(iii) is an
appropriate update to the pre-existing
requirement described in § 73.55(f)(1),
which required security personnel to
maintain continuous communication
capability with the central and
secondary alarm stations and the preexisting § 73.55(d)(4) which required
vehicles to be escorted by security
personnel while inside the PA. Section
73.55(g)(3)(ii) relieves the licensee from
the pre-existing § 73.55(d)(4) and
allowed non-security personnel, who
are trained and qualified in accordance
with the security Training and
Qualification Plan, to escort vehicles
inside the PA. In providing this relief,
the Commission concluded that it is
prudent to ‘‘retain’’ the pre-existing
§ 73.55(f)(1) requirement for vehicle
escorts to maintain a continuous
communication capability that was
otherwise present through the use of
security personnel escorting vehicles. It
is also important to note that
§ 73.55(g)(8)(iii) is revised to permit
vehicle escorts to directly contact
members of the security organization
other than the CAS or SAS for
assistance. The proposed requirement
would have limited this communication
to only the CAS or SAS.
The Commission received a comment
that the proposed § 73.55(g)(8)(iv)
phrase ‘‘knowledgeable of those
activities that are authorized to be
performed within the areas’’ is broad
and impracticable and that escorts
should only be responsible for observing
obvious indications of inappropriate
PO 00000
Frm 00018
Fmt 4701
Sfmt 4700
behavior. The Commission agrees in
part and revised § 73.55(g)(8)(iv) to
clarify that the level of knowledge
required is general and that general
knowledge of authorized activities is a
fundamental requirement for an
effective escort.
The Commission received comments
that proposed § 73.55(g)(8)(v), which
described minimum visitor to escort
ratios in protected and vital areas,
would not have provided sufficient
protection against the possibility that
visitors could attempt to commit or
facilitate acts of radiological sabotage.
The Commission disagrees that the
requirements reflected in the proposed
rule are not sufficient to ensure that
visitor activities are adequately
controlled, and they are, therefore,
reflected in the final rule. The rule
requires each licensee to implement
visitor observation and control measures
that are consistent with the physical
protection program design requirements
in § 73.55(b) including specific
requirements for searches of personnel,
escorting of personnel, and escort
communications. The Commission has
concluded that the visitor control
measures required by this paragraph
provide an appropriate level of
protection and prescribing specific
visitor-to-escort ratios is unnecessary.
Visitor-to-escort ratios should be
specific to each site and visitor based on
site conditions and the rationale for the
visit. Therefore, § 73.55(g)(8)(v) is
revised to delete the proposed visitor-toescort ratios (10 to 1 in the PA and 5 to
1 in VAs) as these ratios are addressed
in regulatory guidance and required to
be delineated in the licensee’s NRCapproved security plans.
Section 73.55(h), Search Programs.
The Commission received several
comments that search requirements
should be addressed according to
facility area (i.e., owner controlled area
(OCA) and PA). The Commission agrees,
and § 73.55(h) has been revised to
address search requirements by area.
This revision is necessary to clarify the
differences of search requirements and
implementation for owner controlled
and protected areas.
The Commission received several
comments to clarify the proposed
§ 73.55(h)(1) and (1)(i) regarding
searches and that searches should be
conducted at each physical barrier only
for those items that must be excluded
beyond the barrier. The Commission
agrees that clarification is warranted
and has combined and renumbered the
proposed § 73.55(h)(1) and (h)(1)(i) as
§ 73.55(h)(1). Consistent with
§ 73.55(b)(4), each licensee must analyze
their site-specific conditions to
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
determine what personnel, vehicles, and
materials must be prevented from
gaining access to specific areas of the
facility and will search the personnel,
vehicles, and materials to satisfy the
design requirements of § 73.55(b).
The proposed § 73.55(h)(5) is
renumbered as § 73.55(h)(2)(iii). Section
73.55(h)(2)(iii) is revised to specify
implementing details for the conduct of
vehicle searches within the OCA
including to the number of personnel
required and the duties to be performed
by each. The search process applied in
the OCA must be performed by two
personnel at least one of which must be
armed and positioned to observe the
search to provide an immediate
response if needed. The rule
requirement for searches conducted at
vehicle checkpoints within the OCA is
that one individual will conduct the
search function, a second armed
individual will be physically located at
the checkpoint to provide an immediate
armed response if needed, and a third
individual, in accordance with § 73.55
(h)(2)(v), will monitor the search
function via video equipment at a
location from which that individual can
initiate an additional response.
The proposed § 73.55(h)(8) through
(h)(8)(iii) are renumbered as
§ 73.55(h)(3)(v) through (h)(3)(viii). The
Commission received a comment that
Commission approval of exceptions to
search requirements through licensee
security plans is unreasonable and
unnecessary. The Commission agrees in
part, and § 73.55(h)(3)(v) is revised to
clarify the rule requirement that a
general description of the types of
exceptions must be stated in the
licensee security plans rather than a
specific listing of individual exceptions
which must be captured in procedures.
The proposed § 73.55(h)(8)(i) is
renumbered as § 73.55(h)(3)(vii). The
Commission received a comment that
the requirement for an armed escort is
not applicable in all cases. The
Commission agrees in part and has
revised § 73.55(h)(3)(vii). The rule
requires that bulk items excepted from
the search required for access into the
PA will be escorted by an armed
member of the security organization to
ensure that unsearched bulk items are
controlled until they can be offloaded
and the absence of contraband can be
verified to the extent practicable.
The proposed § 73.55(h)(1)(iii) is
subsumed in the final rule in appendix
B of part 73.
The proposed §§ 73.55(h)(2)(i) and
73.55(h)(2)(ii) regarding clearly
identifying items during a search are
subsumed as §§ 73.55(h)(2)(iv) and
73.55(h)(3)(i).
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
Section 73.55(i), Detection and
Assessment Systems. Several
requirements from proposed
§§ 73.55(i)(7) and 73.55(i)(10) have been
consolidated, revised, relocated, and/or
deleted to eliminate redundancy and
provide clarification for alarm
annunciation and video assessment
equipment in both alarm stations and
have been designated as § 73.55(i)(2)
and (3).
The proposed §§ 73.55(i)(4),
73.55(i)(4)(i), and 73.55(b)(3) are
combined and renumbered as
§ 73.55(i)(4)(i). The Commission
received a comment that the
requirements set forth in the proposed
§ 73.55(i)(4) were significant highimpact requirements that exceed the
existing requirements without basis and
whose exact scope and impact could not
be assessed with the current language.
The Commission agrees that further
clarification of the intent and scope of
these requirements is necessary. In the
final rule, the pre-existing requirement
in § 73.55(e)(1) for protection of at least
one alarm station against a single act is
retained. Section 73.55(i)(4)(i) of the
final rule clarifies the functions that
must survive from a single act by
requiring licensees to ensure the
survivability of either alarm station to
maintain the ability to perform the
following four functions: Detection and
assessment of alarms, initiation and
coordination of an adequate response to
alarms, summoning offsite assistance,
and providing effective command and
control. The proposed § 73.55(b)(3),
which generally addressed the
protection of personnel, systems, and
equipment from a single act bounded by
the design basis threat, is now reflected
as § 73.55(e)(10)(i)(A), which generally
describes licensee measures for
protection against the design basis
threat land vehicle bomb assault. A
single act does not refer to the number
of acts committed during a security
contingency event; rather it pertains to
any one act that alone could remove the
licensee’s capability to retain at least
one alarm station and/or its functions as
required. An example of a single act
against which this regulation requires
protection would be destruction of
security equipment not specifically
accounted for in the licensee protective
strategy that is accessible from the PA
perimeter and that its destruction would
remove the capability to retain one
alarm station and/or its required
functions.
The proposed § 73.55(i)(4)(ii) is
renumbered as § 73.55(i)(3)(vii). The
Commission received several comments
that proposed § 73.55(i)(4)(ii), which
would have required uninterruptable
PO 00000
Frm 00019
Fmt 4701
Sfmt 4700
13943
backup power for all alarm station
functions, would be a significant highimpact requirement that would exceed
the existing requirements without a
basis and that the exact scope and
impact of the requirement cannot be
assessed with the current language. The
Commission agrees in part, and has
revised § 73.55(i)(3)(vii) to clarify the
scope of equipment to which this
requirement applies. The Commission
recognizes that because the transfer to
secondary power is not an
instantaneous event, the maintenance of
continuous power to some equipment
essential to the initiation of licensees’
protective strategies may not be possible
and could result in a period of degraded
performance. In light of this potential
vulnerability, the rule requires
uninterrupted power supplies for
detection and assessment equipment at
the PA perimeter to ensure continued
operability in the event of the loss of
normal power during the transition
between normal power and initiation of
secondary power. The Commission
determined that a licensee’s capability
to detect and assess a threat at the PA
perimeter is an essential function for all
sites, and as such, the equipment
needed to satisfy the requirement in
§ 73.55(i)(1) must remain operable
through an uninterruptible power
supply. Based on each licensee’s site
specific considerations, detection and
assessment equipment subject to this
requirement may, for example, include
alarm annunciators and sensors,
lighting, closed circuit televisions, and
video image recording necessary to
provide detection and assessment at the
protected area perimeter. However,
under this rule, each license must
identify which detection and
assessment equipment it relies on to
initiate its protective strategy. This
requirement is based on the pre-existing
§ 73.55(e)(1), the evaluation of
information gained through enhanced
baseline inspections and force-on-force
exercises.
Section 73.55(i)(4)(ii)(E) is added to
ensure that licensees address events
(e.g., trespassing) that may not require a
response in accordance with the
protective strategy but may require the
employment of elements within the
licensee’s force continuum and legal
authority as permitted under applicable
State law.
Section § 73.55(i)(4)(ii)(G) is added for
consistency with § 73.55(i)(4)(ii)(F) to
ensure that operators in both alarm
stations are knowledgeable of the final
disposition of all alarms, thus
minimizing the possibility of
assessment errors.
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13944
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
The proposed §§ 73.55(a)(6),
73.55(a)(6)(i), and 73.55(a)(6)(ii) are
consolidated and re-numbered as
§ 73.55(i)(4)(iii). The Commission
received several comments to clarify the
applicability and scope of the proposed
§ 73.55(a)(6) and to relocate this
requirement to § 73.55(i). The
Commission agrees that additional
clarity is needed but declines to relocate
the applicability language in
§ 73.55(a)(6). Sections 73.55(a)(6) and
73.55(i)(4)(iii) specify that the
requirement to construct, locate, protect,
and equip both the central and
secondary alarm stations (CAS and SAS)
is applicable to only applicants for an
operating license under the provision of
part 50 or holders of a combined license
under the provisions of part 52 that is
issued after the effective date of this
rule. The rule requires that both alarm
stations for new reactors will be equal
and redundant and will meet
construction standards previously
applied only to the CAS. Specifically,
the Commission has deleted the preexisting provision that otherwise
permitted the SAS to be located offsite.
Operating power reactors licensed
before the effective date of this final rule
and the Tennessee Valley Authority’s
Watts Bar Nuclear Plant need not
renovate their existing alarm stations to
meet this requirement. Applicants for a
new operating license or combined
license for a reactor that would be
constructed inside an existing PA must
construct both the CAS and SAS to the
requirements of § 73.55 for CAS, unless
otherwise exempted through established
licensing processes.
The proposed §§ 73.55(i)(5), (i)(6), and
(i)(7)(i) related to detection and
assessment capabilities are deleted
because they are subsumed as
§ 73.55(i)(1) which provides a general
description of detection and assessment
requirements.
The proposed §§ 73.55(i)(9)(ii), (ii)(A),
and (ii)(B) are combined and
renumbered as § 73.55(i)(5)(ii). The
Commission received a comment that
the NRC should delineate the
requirements of each of the three areas
(OCA, PA, and VA) in the final rule and
clarify what is meant by the proposed
‘‘integrity of physical barriers or other
components.’’ The Commission agrees
and the final rule is revised to clarify
that this requirement applies to the
OCA. The term ‘‘integrity’’ is retained
and is meant to refer to the ability of the
barrier to perform its function and that
it has not been tampered with.
The proposed § 73.55(i)(9)(iv) is
renumbered as § 73.55(i)(5)(iii). The
Commission received several comments
to clarify the proposed § 73.55(i)(9)(iv),
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
which concerned licensee obligations
for observation of unattended
unmonitored openings. The
Commission agrees that clarification is
needed, and § 73.55(i)(5)(iii) is revised
to clarify that this requirement focuses
on monitoring unattended openings,
such as underground pathways, that can
be exploited to circumvent the intent of
a barrier or otherwise defeat its required
function.
The proposed § 73.55(i)(9)(iii)(B) has
been divided and renumbered as
§ 73.55(i)(5)(v) and (vi). The
Commission received a request for
clarification of the intent of the
proposed requirement specific to
‘‘random intervals.’’ The Commission
agrees and § 73.55(i)(5)(vi) is revised to
clarify the scope of patrols relative to
PAs, VAs, and target sets. The term
‘‘random’’ as used in the final rule is not
intended to describe the periodicity of
the patrols but to describe the manner
in which the patrol is conducted to
prevent predictability.
The proposed § 73.55(i)(9)(iii)(C) is
renumbered as § 73.55(i)(5)(vii). The
Commission received several comments
to add the word ‘‘obvious’’ before the
word tampering because security
personnel generally do not possess the
level of specific knowledge that might
be necessary to detect the types of
tampering that could have been
included within the scope of the rule.
These commenters noted that other
licensee operations personnel who
possess detailed engineering knowledge
also provide observation of target set
equipment and additional assurances
that tampering would be identified. The
Commission agrees and § 73.55(i)(5)(vii)
is revised to include the term ‘‘obvious’’
consistent with the level of knowledge
that security personnel possess
regarding plant operations based on
training that is provided to them.
The proposed §§ 73.55(i)(10) and
(i)(10)(i) are deleted from the final rule
because this proposed requirement to
maintain video equipment in operable
condition is redundant to §§ 73.55(b)(3)
and 73.55(n)(1)(i).
The proposed § 73.55(i)(10)(iii) is
deleted from the final rule. The NRC
received a comment that ensuring
personnel assigned to monitor video
equipment are alert and able to perform
their assigned duties is a licensee
management responsibility. The
Commission agrees. Fitness-for-duty,
fatigue, and work-hour controls are
covered in 10 CFR part 26.
The proposed § 73.55(i)(11)(i) is
renumbered as § 73.55(i)(6). The
Commission received several comments
to clarify this lighting requirement. The
Commission agrees and § 73.55(i)(6) is
PO 00000
Frm 00020
Fmt 4701
Sfmt 4700
revised to clarify the lighting
requirements and identify acceptable
alternatives. The reference to the OCA is
removed from this paragraph as it is
duplicative to the reference in
§ 73.55(b).
The proposed § 73.55(i)(11)(ii) is
renumbered as § 73.55(i)(6)(ii). The
Commission received several comments
to clarify the pre-existing requirement
for 0.2-foot-candle illumination and the
application of low-light technology.
Consistent with the proposed rule, the
current 0.2-foot-candle illumination
requirement is explicitly retained as the
minimum standard for illumination
levels at nuclear power reactor facilities.
However, § 73.55(i)(6)(ii) is revised to
clarify and introduce the use of lowlight technology to supplement the
facility lighting scheme and to provide
the flexibility needed for licensees to
use low-light technology. The rule
requires that licensees will ensure that
lighting levels either meet the 0.2-footcandle requirement, or employ low-light
technology to ensure the protective
strategy can be implemented effectively.
Section 73.55(j), Communication
Requirements. The Commission has
made no significant changes to
§ 73.55(j). The Commission received a
comment that proposed § 73.55(j)(1),
which would require the maintenance
of continuous communication with
offsite resources, was without a basis.
The commenter argued that the ability
to maintain such communication is
beyond the ability of licensees. The
Commission disagrees. This
requirement is retained from the preexisting § 73.55(f)(3) and remains
unchanged. The rule requires that each
licensee security organization maintains
continuous communication with local
law enforcement authorities and onsite
personnel.
The Commission received a comment
that proposed § 73.55(j)(4)(iii), regarding
the licensee’s communication system, is
not appropriate for escorts. The
Commission agrees and § 73.55(j) is
revised to address the specific
communication requirements of
personnel or entities requiring
communications and communication
systems to be employed to meet the
requirement. The rule requires that
vehicle escorts are provided by the
licensee with the appropriate means to
call for assistance when needed. The
final rule does not require a specific
form of communication media, and
therefore, it is the responsibility of each
licensee to determine the appropriate
communication media for their site
which may or may not include the use
of hand-held radios, public address
systems, intercoms, etc.
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
The Commission received a comment
that proposed § 73.55(j)(6), which would
have required the licensee to identify
and establish alternative
communication methods for areas of its
facility where communication could be
interrupted or not maintained, was
without a basis, and would be virtually
impossible to implement given a power
plant’s reinforced concrete construction
and trip sensitive equipment. The
Commission disagrees and believes that
the commenter misinterpreted the
Commission’s intent. A condition as
described in the rule, if present at a site,
must be identified and accounted for to
satisfy the pre-existing § 73.55(f)(1)
requirement for continuous
communication. However, the
Commission does not intend to require
that such conditions be ‘‘fixed’’ but
rather that the licensee compensate for
this condition as needed and
appropriate for their site-specific
considerations.
Section 73.55(k), Response
Requirements. The proposed
§§ 73.55(k)(1)(ii) and (iii), regarding the
training and qualification of armed
responders and the availability of
certain equipment, are deleted from the
final rule. These requirements are
sufficiently addressed in the final rule
in appendix B to part 73 and appendix
C to part 73 and, therefore, are
redundant.
The proposed § 73.55(k)(1)(iv),
regarding training for assigned weapons,
is renumbered as § 73.55(k)(2). The
Commission determined that the
proposed § 73.55(k)(3)(iv) is redundant
to this requirement and has revised
§ 73.55(k)(2) to clarify performance
criteria.
The proposed requirement in
§ 73.55(k)(1)(v) regarding weapons
training and qualification of armed
responders is deleted from the final rule
because it is redundant to the
requirements set forth in appendix B to
part 73.
The proposed § 73.55(k)(3) is
renumbered as § 73.55(k)(4). The final
rule § 73.55(k)(4) is clarified to delineate
the duties of armed responders and
armed security officers. Section
73.55(k)(5) is added to retain the preexisting requirement, described in
former § 73.55(h)(3), for the minimum
number of armed responders required to
be immediately available at the facility
to fulfill response requirements. The
rule requires that each licensee will
determine the specific minimum
number of armed responders needed to
protect their facility and that under no
circumstances will that minimum
number be less than 10 inside the PA
and available at all times.
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
The proposed § 73.55(k)(3)(iii) and
(iv) are deleted from the final rule. The
Commission concluded that these
proposed requirements are redundant to
the final rule appendix B to part 73 and
§ 73.55(n)(1)(i), respectively.
The proposed § 73.55(k)(6) regarding
licensee personnel being trained to
understand their roles during security
incidents, is deleted from the final rule.
The Commission has determined that
this requirement is more appropriate for
site procedures and has deleted it from
the final rule.
The proposed § 73.55(k)(7)(iv) is
renumbered as § 73.55(k)(8)(iii). The
Commission received a comment that it
does not have a basis to require licensee
notification of offsite agencies other
than local law enforcement upon receipt
of an alarm or other threat notification.
The Commission generally agrees that
the requirement is not necessary.
Section 73.55(k)(8)(iii) is revised to
specify that licensees must notify local
law enforcement only in accordance
with their site procedures. However, as
noted below, some licensees have
established liaison with non-local law
enforcement agencies including State or
Federal. To the extent that these
arrangements are noted in those
licensees’ site procedures, the rule
would require their notification.
The proposed § 73.55(k)(8) is
renumbered as § 73.55(k)(9). The
Commission received a comment that it
does not have a basis to require
licensees to obtain liaison agreements
with agencies other than local law
enforcement. The Commission disagrees
with this comment but has clarified the
rule. In some instances, licensees have
arrangements with agencies not
considered ‘‘local law enforcement’’
such as Federal or State law
enforcement agencies. It is, therefore, an
appropriate update to the regulatory
framework to include the possibility of
State and Federal law enforcement
agencies as well as local law
enforcement to account for sites whose
local law enforcement are State or
Federal agencies. However, such
agreements are not required by the rule.
Further, the Commission acknowledges
that in some cases a local, State, or
Federal law enforcement agency cannot
or will not enter into a written
agreement with a licensee, and in such
cases the Commission’s expectation is
that the licensee will make a reasonable
effort to pursue liaison with these
agencies to the extent practicable and
that this liaison is documented.
The proposed appendix C to part 73,
section II, paragraph (k), ‘‘Threat
Warning System,’’ paragraph (k)(1),
(k)(2), and (k)(3) are moved and
PO 00000
Frm 00021
Fmt 4701
Sfmt 4700
13945
renumbered as § 73.55(k)(10), paragraph
(k)(10)(i), and paragraph (k)(10)(ii). The
Commission concluded that these
requirements are better presented in the
regulatory framework for the physical
protection program. The rule requires
that the licensee will pre-plan specific
enhancements to their physical
protection program to be taken upon
notification by the NRC of a heightened
threat environment.
Section 73.55(l), Facilities Using
Mixed-Oxide (MOX) Fuel Assemblies
Containing up to 20 Weight Percent
Plutonium Dioxide (PuO2). The
Commission received a comment that
through this proposed rulemaking, the
NRC is ignoring the Atomic Safety and
Licensing Board’s (ASLB) decision in
the Catawba case. The commenter stated
that, in that case, the ASLB added
security conditions to Duke Energy’s
proposed security plan at Catawba and
that one of the ASLB’s conditions is not
in the proposed rule. The Commission
disagrees with this assertion. In fact, the
Commission specifically rejected the
ASLB’s imposition of additional license
conditions for the use of MOX fuel and
affirmed the staff’s conclusion that the
additional security measures provided
by the licensee would provide
reasonable assurance of the protection
of public health and safety in light of
the theft risk presented by the use of
MOX fuel (Duke Energy Corp. (Catawba
Nuclear Stations, Units 1 and 2), CLI–
05–14, 61 NRC 359 (2005)). The
Catawba license amendments were
issued on March 3, 2005 (70 FR 11711;
March 9, 2005). The requirements
described in § 73.55(l) are consistent
with the physical protection program
enhancements that were applied to the
Catawba facility. Section 73.55(l) is
revised to clarify that those licensees
choosing to use MOX fuel assemblies
must implement additional measures
designed to prevent theft or diversion of
un-irradiated MOX fuel assemblies in
addition to protecting the power reactor
facility against the design basis threat of
radiological sabotage.
The Commission received a comment
that the NRC did not define MOX fuel
in the proposed rule (with regard to
concentration, weight, or any other
physical property), and suggested that
this is necessary. The Commission
agrees, and § 73.55(l) is revised to
specify the maximum percent weight of
plutonium dioxide allowed within a
MOX fuel assembly and that the use of
MOX fuel assemblies with percent
weights greater than 20 weight percent
plutonium dioxide require unique and
separate approval from the Commission.
In such cases, licensees would be
required to submit a license amendment
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13946
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
request, and the Commission would
consider additional security measures as
necessary. Section 73.55(l)(3)(v)(B) is
also revised to clarify the number of
physical barriers required for protection
of un-irradiated MOX fuel assemblies.
Physical protection of un-irradiated
MOX fuel assemblies requires three
physical barriers of which the water
contained within the spent fuel pool is
the third barrier.
Finally, the commenter disagreed
with the fact that the proposed rule
language did not make a distinction
between the security applied to a small
number of MOX lead test assemblies
and the security applied to a large
number of assemblies. The Commission
disagrees that such a distinction is
necessary in the rule. Because the
Commission considers only one part of
one assembly to be the goal quantity of
a theft scenario and because theft of
only a portion of the fuel in one
assembly would be considered failure,
no additional protection would be
added by distinguishing between
multiple additional assemblies. The
physical protection program
requirements specified in § 73.55(l) are
appropriate for any quantity of
unirradiated MOX fuel assemblies that
are less than or equal to 20 weight
percent plutonium dioxide and may be
on-site at any time.
Section 73.55(m), Security Program
Reviews. The proposed § 73.55(m) for
‘‘Digital computer and communication
systems and networks’’ is relocated to a
stand-alone section (10 CFR 73.54). The
Commission has determined that these
requirements are best addressed as a
stand-alone section similar to the
requirements for an access authorization
program.
The proposed § 73.55(n) is
renumbered as § 73.55(m) to account for
the renumbering of the proposed
§ 73.55(m) as 10 CFR 73.54.
The proposed §§ 73.55(n)(1) and
(n)(1)(ii) are combined and renumbered
as § 73.55(m)(1). The Commission
received a comment to clarify the
periodicity of audits and reviews
required by proposed § 73.55(n)(1).
Section 73.55(m)(1) is revised to clarify
periodicity. The rule requires that each
licensee will review their physical
protection program to determine if the
programmatic requirements established
are being implemented. The rule also
requires that each licensee will review
the physical protection program to
determine if the physical protection
program effectively meets Commission
requirements. The licensee must ensure
that all components or elements of the
physical protection program are
reviewed at intervals no less than every
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
24 months. However, the Commission
has concluded that licensees must also
review individual components or
elements of the physical protection
program no later than 12 months
following a significant change to sitespecific conditions, equipment,
personnel, or other performance
indicators.
The proposed §§ 73.55(n)(3) and (4)
are deleted because these requirements
are redundant to the requirement to
review the physical protection program
at intervals not to exceed 24 months.
The proposed § 73.55(n)(5) is deleted
because it is redundant to the final rule
Part 73, appendix B, Section VI, for the
performance evaluation program.
The proposed § 73.55(n)(8) is deleted
because the requirements for the site
corrective action program as stated in
§ 73.55(b)(10) address all issues, not just
findings from reviews, audits, etc. as
stated in the proposed rule.
The proposed § 73.55(n)(9) is deleted
because this provision does not apply to
reviews and audits addressed herein
and is limited to only the conduct of
training program requirements
addressed in part 73, appendix B,
Section VI.
Section 73.55(n), Maintenance,
Testing, and Calibration. The proposed
§ 73.55(o) is renumbered as § 73.55(n) to
account for the renumbering of the
proposed § 73.55(m) to a stand-alone
section (10 CFR 73.54).
The proposed § 73.55(o)(1)(i) is
renumbered as § 73.55(n)(1)(i). The
Commission received a comment asking
who determines the ‘‘predetermined
intervals’’ in which testing and
maintenance are required. The
predetermined intervals for
maintenance, calibration, and
performance testing of equipment are
specified by manufacturer specifications
and the NRC. The Commission has
concluded that specific, pre-determined
intervals for operability testing are
required to ensure that certain
equipment is capable of performing its
intended function.
Section 73.55(o), Compensatory
Measures. The proposed § 73.55(p) is
renumbered as § 73.55(o) to account for
the renumbering of proposed § 73.55(m)
for cyber security requirements to a
stand-alone § 73.54.
Section 73.55(p), Suspension of
Security Measures. The proposed
§ 73.55(q) is renumbered as § 73.55(p) to
account for the renumbering of
proposed § 73.55(m) for cyber security
requirements to a stand-alone § 73.54.
The Commission received a comment
that proposed § 73.55(q)(1)(ii) requires
that a licensed senior operator approve
the suspension of safeguards measures.
PO 00000
Frm 00022
Fmt 4701
Sfmt 4700
The commenter suggested that approval
from a licensed senior operator was
excessive and that the rule should be
revised to permit approval by the ‘‘on
shift operations manager.’’ The
Commission disagrees and finds that
approval by a licensed senior operator is
appropriate for all suspensions of
security measures pursuant to
§ 73.55(p). The allowance for
suspensions of security measures for
severe weather conditions is based on
the pre-existing §§ 50.54(x) and (y)
which explicitly requires, at a
minimum, approval by a licensed senior
operator. Under this provision, the
security supervisor recommends when
security measures must be suspended;
and, consistent with the pre-existing
§§ 50.54(x) and (y), a licensed senior
operator must, at minimum, approve
that decision to ensure that other
operational and safety concerns have
been fully considered and that there
will be no adverse affects or undue risk
to the public health and safety as a
result of the suspension. Refer to NRC
Regulatory Issue Summary 2008–26
‘‘Clarified Requirements of Title 10 of
the Code of Federal Regulations (10
CFR) Section 50.54(y) When
Implementing 10 CFR Section 50.54(x)
to Depart from a License Condition or
Technical Specification,’’ dated October
29, 2008 (ML080590124), for further
discussion of the requirements
associated with which licensee
personnel may approve licensee
departures from license conditions or
technical specifications.
The proposed § 73.55(q)(4) is deleted
because the requirement to report the
suspension of safeguards measures is
redundant to § 73.71 and is sufficiently
addressed in § 73.55(p)(3).
Section 73.55(q), Records. The
proposed § 73.55(r) is renumbered as
§ 73.55(q) to account for the renumber of
proposed § 73.55(m) for cyber security
requirements to a stand-alone section
(10 CFR 73.54). The proposed
§ 73.55(d)(5) is renumbered as
§ 73.55(q)(3) to retain the requirement
for retention of security force contracts
as a record for the duration of the
contract and retention of superseded
portions for three years following
changes to that contract.
Section 73.55(r), Alternative
Measures. The proposed § 73.55(s) is
deleted because it is redundant to
§ 73.58. The Commission has
determined that safety/security interface
is a stand-alone section, the
applicability of which is adequately
addressed in § 73.58 and need not be
referenced in § 73.55 to ensure clarity or
applicability.
E:\FR\FM\27MRR2.SGM
27MRR2
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
sroberts on PROD1PC70 with RULES
The proposed § 73.55(t) is
renumbered as § 73.55(r) to account for
the renumbering of the proposed
§ 73.55(m) for cyber security
requirements to a stand-alone section
(10 CFR 73.54) and the deletion of
proposed § 73.55(s) ‘‘Safety/security
interface.’’ Section 73.55(r) represents
the same set of requirements that were
described in former § 73.55(a), which
stated, in part, ‘‘the Commission may
authorize an applicant or licensee to
provide measures for protection against
radiological sabotage other than those
required by this section * * *.’’ That
provision had been known as the
‘‘alternative measures’’ provision
although that specific phrase did not
appear in the rule text. The final rule
codifies that phrase as it relates to this
process, but the requirements of seeking
and obtaining approval for an
‘‘alternative measure’’ essentially
remains as it had been set forth in the
existing rule.
F. Section 73.56, Personnel Access
Authorization Requirements for Nuclear
Power Plants
General Comments. Section 10 CFR
73.56, the Commission has revised the
proposed rule text and associated
statement of considerations to (1)
address over 180 pages of the comments
received on the proposed rule, (2)
provide additional clarifications and
specifications, and (3) correct errors.
The following provides a brief
explanation of the significant changes to
the proposed rule and the Commission’s
responses to the comments.
The Commission received numerous
comments on the proposed rule as a
result of unclear descriptions or
inconsistent use of the roles and
responsibilities of licensees, applicants,
and contractors or vendors and the
phrases ‘‘grant unescorted access’’ and
‘‘authorize unescorted access
authorization.’’
In response to the comments received
and suggestions implicit in the
comments received on various
provisions in the proposed rule, the
Commission improved the clarity and
precision of the final rule by providing
the following clarification in the
statement of consideration for § 73.56(a).
First, the Commission replaced the
phrases ‘‘unescorted access
authorization’’ and ‘‘access
authorization’’ with the phrases
‘‘unescorted access’’ and/or ‘‘unescorted
access authorization’’ to correct misuse
and misinterpretation of the rule.
Second, the Commission replaced the
term ‘‘grant’’ associated with
‘‘unescorted access authorization’’ and
‘‘access authorization’’ with the terms
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
‘‘grant’’ and/or ‘‘certify.’’ Finally, the
Commission made several revisions in
order to provide clarification and/or
specifications on the roles and
responsibilities of licensees, applicants,
and contractors or vendors.
Additionally, the Commission revised
paragraphs (a)(4) and deleted (a)(5) in
the final rule to define and to provide
clarification and specification on the
roles and responsibilities of licensees,
applicants, and contractors or vendors.
Throughout the final rule, the
Commission revised the proposed rule
text to reflect the above clarifications
and specifications.
Throughout the proposed rule text,
the Commission received comments that
some of its statements in the proposed
rule regarding the accessibilities and
capabilities of the information-sharing
mechanism that the industry is
currently using to comply with the
Commission’s requirements were
incorrect. Specifically, commenters
noted that the information-sharing
mechanism used by the industry does
not contain records, but rather it
contains data representative of the
records that are accessed and controlled
by licensees, applicants, and certain
contractors or vendors. The Commission
agrees with the received comments and
revised the final rule to clarify that use
of an information-sharing mechanism is
not a requirement; rather it is the
sharing of specific access authorization
information with the other licensees
subject to this section that is required in
accordance with § 73.56(o)(6).
Section 73.56(a), Introduction. The
Commission deleted proposed
paragraphs (a)(2) and (a)(3) pertaining to
the submission of access authorization
program amendments for Commission
approval and the continued
implementation of the access
authorization program under current
requirements in the final rule as those
requirements have been incorporated in
§ 73.56(a)(1).
Section 73.56(b), Individuals Subject
to the Access Authorization Program.
Commenters stated that proposed
paragraph (b)(1)(ii) does not contain a
necessary provision that allows for
short-term escorted digital access and
addresses access authorization
requirements for an individual
accessing emergency response
components that include commercial
facilities that are not subject to access
authorization requirements. The
Commission disagrees with the
recommended rule requirements. The
Commission finds that these comments
are beyond the scope of this rule
because this section specifically
provides for requirements for
PO 00000
Frm 00023
Fmt 4701
Sfmt 4700
13947
unescorted access and unescorted
access authorization for protected and
vital areas of nuclear power plants and
to these entities only. This section does
not cover escorted digital access;
however, cyber security requirements
are covered in § 73.54. Therefore, the
NRC did not make any revision to the
rule text.
Section 73.56(c), General Performance
Objective. The Commission received
comments that the requirements set
forth in proposed § 73.56(d)(3) regarding
identity verification requirements, did
not properly consider the North
America Free Trade Agreement, which
allows Canadian citizens performing
certain services to enter the United
States without either an alien
registration or an I–94 Form. The
commenters also stated that the
proposed rule text incorrectly allowed
contractors or vendors to evaluate the
results of fingerprinting required under
§ 73.57. The Commission agrees with
the received comments and revised the
proposed rule text to allow licensees
and applicants to use an alien
registration or an I–94 Form to verify the
identity of a foreign national.
Additionally, the NRC deleted the
requirement that required contractors or
vendors to evaluate the results of
fingerprinting required under § 73.57,
and now only licensees or applicants
may do so.
The Commission received comments
that the phrase, ‘‘full credit history
evaluation’’ stated in proposed
§ 73.56(d)(5) needs additional
clarification and specification by
providing a time period for credit
history. The comments also stated that
fraud check should be deleted from
credit history checks and that credit
history checks, or other financial
documentation, should be required for
foreign nationals in the final rule. The
Commission agrees in part and disagrees
in part with the comments. The
Commission disagrees with specifying
the time period for a credit history
evaluation and deleting fraud checks
from the credit history check as the
Commission notes that the requirements
set forth in this paragraph are consistent
with the requirements set forth in the
2003 order and with current industry
practice. Further, the full credit history
evaluation requirements reflect the
Commission’s intent that all financial
information available through creditreporting agencies is to be obtained and
evaluated because it has the potential to
provide highly pertinent information.
However, the Commission agrees with
the commenter that the requirement
should address credit history checks of
foreign nationals. The Commission
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13948
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
recognizes that certain foreign nationals’
host countries may not have routinely
accepted credit reporting mechanisms,
and therefore, the Commission revised
the final rule text to allow multiple
sources of credit history that could
potentially provide information about a
foreign national’s financial record and
responsibility, not limited to routinely
accepted credit reporting mechanisms.
The Commission revised proposed
§ 73.56(d)(7) to distinguish the criminal
history records check requirements for
those individuals who are expected to
have unescorted access or unescorted
access authorization. Individuals who
are expected to have unescorted access
must have a criminal history records
check in accordance with the
requirements of 10 CFR 73.57. However,
the NRC cannot obtain a criminal
history records check in accordance
with § 73.57 for individuals not
expected to have unescorted access
because Section 149 of the AEA limits
the NRC’s ability to obtain fingerprints
from those individuals. Instead, a
criminal history records check of those
individuals not expected to have
unescorted access will be obtained in
accordance with § 73.56(k)(1)(ii).
Section 73.56(e), Psychological
Assessment. The Commission received
comments that the term ‘‘clinical’’
should be removed from the phrase ‘‘a
licensed clinical psychologist or
psychiatrist’’ in proposed § 73.56(e)(1)
pertaining to qualifications for
psychologists or psychiatrists who
conduct psychological assessments for
trustworthiness and reliability. The
commenter stated that psychologists or
psychiatrists are licensed by states.
However, some states might not issue
licenses using the term ‘‘clinical’’
psychologists or psychiatrists. The
Commission agrees with the comment
and deleted the term ‘‘clinical’’ because
the focus is on a psychologist or
psychiatrist who has adequate
experience, and that focus should not be
limited by a particular term that some
states may not use in their licensing
procedures.
The Commission received comments
that because proposed § 73.56(e)(2)
would have required psychologists and
psychiatrists to follow the ethical
principles established by the American
Psychological Association or American
Psychiatric Association, the proposed
regulation would limit the pool of
available licensed and qualified
psychologists and psychiatrists who can
perform the required psychological
assessments because these ethical
principles might deviate from the
ethical principles established by the
states that license them and conflict
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
with the requirements in proposed
§ 73.56(e)(3), which requires licensed
psychologists and psychiatrists to have
a face-to-face interview with an
individual only after the individual
surpasses predetermined thresholds on
a psychological test. The commenter
stated that § 73.56(e)(3) is, therefore, in
conflict with the (e)(2) requirement to
follow accepted ethical principles since
part of the American Psychological
Association’s Ethical Principles and
Code of Conduct mandates that
psychologists interview in light of the
research on or evidence of the
usefulness of interviewing and would
deviate from the ethical principles
established by the American
Psychological Association or American
Psychiatric Association if it requires a
psychological assessment that is not
supported by research and for which the
assessors are not properly trained.
The Commission disagrees with these
comments. For the first comment, the
Commission noted that the ethical
principles established by the American
Psychological Association or American
Psychiatric Association specifically
address the issues raised. These ethical
standards require psychologists and
psychiatrists to comply with the
requirements of laws, regulations
(including the requirements in section
73.56), or other governing legal
authorities. Thus, the requirements set
forth in this section do not deviate from
the States’ licensing requirements.
In response to the second comment,
the Commission disagrees that
§§ 73.56(e)(2) and (e)(4) are
contradictory because Section 1.02 of
‘‘Ethical Principle of Psychologists and
Code of Conduct’’ addresses this issue
and states that, if a psychologist’s
ethical responsibilities conflict with
law, regulations, or other governing
legal authority, psychologists would
have to take steps to resolve the conflict
but must in any event adhere to the
requirements of the law, regulations, or
other governing legal authority.
In response to the third comment
regarding sufficient demonstrated
ability of psychological tests to help in
the trustworthiness and reliability
determination, the Commission directed
the commenter to the considerable
bodies of research in this area and
pointed out a long track record of
intelligence and other agencies that
have used the Minnesota Multiphasic
Personality Inventory—2 (MMPI–2) as
well as other personality tests for this
purpose. Additionally, the Commission
noted that a psychological assessment is
only one of many access authorization
program elements that licensees and
applicants use for determining an
PO 00000
Frm 00024
Fmt 4701
Sfmt 4700
individual’s trustworthiness and
reliability.
However, agreeing in part with the
last comment, the Commission revised
proposed § 73.56(e)(1) in the final rule
to require psychologists or psychiatrists
to be appropriately trained. Finally, the
Commission is confident that the results
of psychological testing, combined with
the results of other access authorization
program elements, will yield high
assurance regarding an individual’s
trustworthiness and reliability.
The commenters stated that proposed
§ 73.56(e)(3) should be revised to allow
psychiatrists or psychologists to
establish predetermined thresholds
appropriate to the test and the target
population that would be applied in
interpreting the results to identify
whether an individual shall be
interviewed under § 73.56(e)(4)(i) of this
section and interview the individual
without administering the psychological
test.
However, another commenter stated
that establishing predetermined
thresholds for the psychological test is
not sufficient for establishing
consistency among these psychological
assessments. That commenter stated
that psychologists or psychiatrists who
perform psychological assessments must
be properly trained. The Commission
agrees with the first comment and
revised the final rule to state that
psychiatrists or psychologists shall
establish the predetermined thresholds
for each scale to determine whether an
individual shall be interviewed. The
Commission notes that it is appropriate
and consistent with current professional
practice for psychiatrists or
psychologists, rather than the industry,
to establish these threshold levels.
However, the Commission disagrees
with the second comment because the
established thresholds for each scale
must be applied equally and fairly to all
individuals subject to the psychological
assessment requirement, so a
psychiatrist or psychologist may not
waive this requirement in favor of an
interview. Finally, the Commission
agrees in part with the last comment
and revised § 73.56(e)(1) to require that
psychologists and psychiatrists be
properly trained to ensure consistency
among assessments.
The Commission received comments
that proposed § 73.56(e)(5) would be too
limiting and prescriptive in that it
would make the reviewing official the
focal point of a medical evaluation
when licensees or applicants discover
pertinent medical-related information
about an individual who is being
evaluated during an initial
psychological assessment. One
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
commenter recommended that the
Commission revise the proposed
paragraph to avoid premature
involvement of reviewing officials and
therefore allow knowledgeable
professionals to complete their
evaluations and develop
recommendations regarding the
individual before involving the
reviewing official. The Commission
agrees with the commenters and revised
the final rule to allow evaluation of the
discovered medical information before
reporting to the reviewing official.
While developing a response to the
comments received in item 11 above,
the Commission added § 73.56(e)(6) to
address situations during a
psychological reassessment where a
psychologist or psychiatrist discovers
any information, including a medical
condition, that could adversely impact
the fitness for duty, trustworthiness, or
reliability of those individuals who are
granted unescorted access or certified
unescorted access authorization. The
psychologist or psychiatrist must
promptly inform the reviewing official,
or the appropriate medical personnel, of
this discovery to ensure that
information is evaluated to determine
that each person is trustworthy and
reliable.
Section 73.56(f), Behavioral
Observation. The Commission received
comments that proposed §§ 73.56(f)(3)
and (g) should be revised to allow
individuals to report any concerns
arising from a behavioral observation
program or reportable legal actions to
the reviewing official, the individual’s
supervisor or other management
personnel designated in their site
procedures. The Commission agrees.
The Commission finds that individuals
should be given options, with minimal
restrictions, regarding to whom they can
report any concerns that arise from a
behavioral observation program or
reportable legal actions by allowing an
individual to report to the reviewing
official, the individual’s supervisor or
other management personnel. However,
if the recipient of the report is someone
other than the reviewing official, that
person must promptly convey the report
to the reviewing official, who shall
determine whether to maintain,
administratively withdraw, or
unfavorably terminate the reported
individual’s unescorted access or
unescorted access authorization status.
Section 73.56(h), Granting Unescorted
Access and Certifying Unescorted
Access Authorization. To increase
clarity in the organizational structure of
the requirements set forth in § 73.56(h),
the Commission reorganized
§§ 73.56(h)(1), (h)(2), (h)(8), (h)(9), and
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
(h)(10) to (h)(5), (h)(6), (h)(1), (h)(2), and
(h)(3), respectively, in the final rule.
Additionally, the Commission
incorporated proposed §§ 73.56(h)(3),
(h)(4), (h)(5), (h)(6), and (h)(7) into
§ 73.56(h)(4). The NRC has added the
last two sentences in § 73.56(h)(4)(ii) to
correct errors in proposed § 73.56(h)(3),
which incorrectly listed reinstatement
requirements for those individuals who
last held unescorted access or
unescorted access authorization that
was terminated under favorable
conditions within the past 30 days.
The Commission received two
comments that proposed § 73.56(h)(8),
stipulating the determination basis,
needs to be revised to allow licensees to
deny unescorted access to an individual
as soon as the reviewing official receives
information that would warrant such a
decision even if the reviewing official
has at that point not acquired all the
information required by proposed
§ 73.56. The Commission agrees with
the comment and revised
§ 73.56(h)(1)(ii) to reduce unnecessary
regulatory burden by providing
licensees and applicants the flexibility
to terminate the process upon receipt of
disqualifying information.
The Commission received two
comments that proposed § 73.56(h)(10)
should be revised to require the initial
access authorization process for
assessing individuals who have been in
an access-denied status and prevent
licensees who possess derogatory
information about individuals from
allowing those individuals any access,
whether unescorted or escorted, to their
protected areas.
The Commission agrees with the first
comment and revised the final rule to
delete reference to a re-instatement
procedure by the licensee and to require
that the initial access authorization
process be used for adjudicating the
access denied status consistent with
current licensee practices. The
Commission disagrees with the second
comment. The Commission’s unescorted
access requirements do not contain
specific prescriptive disqualifiers for
access; nor does the Commission believe
it is prudent to add any. Licensees are
required by § 73.56(h) to consider all of
the information obtained in the
background investigation as a whole in
determining whether an individual is
trustworthy and reliable before granting
unescorted access. There is no
particular piece of information that
would automatically disqualify an
individual from access. Furthermore,
the commenter’s suggestion that when
licensees ‘‘possess’’ or ‘‘come across’’
such derogatory information the
individual should be prevented from
PO 00000
Frm 00025
Fmt 4701
Sfmt 4700
13949
having any access is unworkable from a
regulatory perspective. In order to avoid
potential enforcement action, a licensee
would be put in a position to conduct
a full background investigation on an
individual, which would undermine the
entire purpose behind having the ability
to escort visitors on site. The
Commission does not see a basis to
impose such a measure. The
Commission has concluded that the
requirements set forth in this section
sufficiently address denial of unescorted
access or unescorted access
authorization based upon receipt of
disqualifying information. The
requirements for granting escorted
access to visitors are sufficiently
addressed in 10 CFR 73.55.
Section 73.56(i), Maintaining
Unescorted Access or Unescorted
Access Authorization. The Commission
received three comments that proposed
§ 73.56(i)(1)(iv) should be revised.
Commenters indicated that the
Commission made improper reference
to licensees’ and applicants’ Physical
Security Plan for details about the
Behavior Observation Program, should
replace the term ‘‘interview’’ with the
term ‘‘review’’ when referring to the
‘‘annual supervisory review’’ under
which all individuals must undergo,
and should use an ‘‘annual’’ supervisory
review period rather than the phrase
‘‘nominal 12 months.’’
The Commission agrees with the first
comment and revised the final rule to
replace reference to the Physical
Security Plan with reference to a
licensee’s Behavior Observation
Program because details about the
Behavior Observation Program, such as
the annual supervisory review, are not
found in the Physical Security Plan but
rather in the licensee’s Behavior
Observation Program documents. The
Commission agrees in part with the
second comment regarding the use of
the annual supervisory review or
interview, when applicable. All
individuals must be subject to an annual
supervisory review, and the
Commission added the requirement that
an individual be subject to a supervisory
interview if his/her supervisor has not
had frequent interaction with and
observation of the individual
throughout the review period. The
Commission notes that not all
supervisors have sufficient information
about all of their employees due to
current workforce practices and trends
making close interaction between
supervisors and their employees less
common and difficult to achieve.
Therefore, the Commission added the
interview requirement to ensure that
supervisors have an adequate basis to
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13950
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
make an informed and reasoned opinion
regarding an individual’s behavior,
trustworthiness, and reliability. Finally,
the Commission agrees that the term
‘‘annual’’ should be used instead of
‘‘nominal 12-month’’ supervisor review
as ‘‘annual’’ is the established
component of industry practice.
The Commission received comments
that the 5-year psychological
reassessment requirements for
individuals who are granted unescorted
access or certified unescorted
authorization in the proposed
§ 73.56(i)(1)(v)(A) deviates from current
practice and imposes significant cost to
the licensee with minimal benefits. The
Commission agrees in part regarding the
proposed 5-year psychological
reassessments. The Commission agrees
that requiring a psychological reevaluation as part of the 5-year review
for all individuals maintaining
unescorted access or unescorted access
authorization status will add significant
and unnecessary costs, deviates from
pre-existing requirements, and provides
minimal benefits. Therefore, the
Commission revised the final rule to
limit the group of individuals who are
subjected to 5-year psychological
reassessments to those individuals who
perform the job functions described in
§ 73.56(i)(1)(v)(B). The Commission
believes these individuals should have
a re-assessment on a periodic basis.
The Commission received comments
that the requirement set forth in
proposed § 73.56(i)(1)(v)(B), requiring
the reviewing official to complete an
evaluation of the criminal history
update, credit history re-evaluation,
psychological re-assessment, and the
supervisory review within 30 calendar
days of initiating any one of these
elements, deviates from current practice
as industry does not conduct these
evaluations concurrently. The
Commission agrees in part with the
comment and revised § 73.56(i)(1)(v)(C)
in the final rule to state that only the
credit history review and the criminal
history review are to be completed
within 30 calendar days of each other to
be consistent with current industry
practice. Because the purpose of the reevaluation is to provide a re-assessment
based on a collective review of data at
a point in time and because a credit
history review and a criminal history
review can be completed collectively
within a small number of days, the
Commission has retained this 30
calendar day requirement.
Section 73.56(k), Background
Screeners. The Commission received
comments that § 73.56(k)(2)(ii),
regarding criminal history checks for
access authorization program screening
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
personnel, should be revised to allow
licensees and applicants to use the
criminal history check required by
proposed § 73.56(d)(7) in lieu of a local
criminal history review. The
Commission agrees with the comments
and revised the proposed rule text in the
final rule to allow the flexibility of using
either criminal history check process for
individuals who are subject to the
requirement because of a need for
unescorted access or unescorted access
authorization.
Section 73.56(m), Protection of
Information. The Commission received
comments that proposed § 73.56(m)(3),
pertaining to providing information on
denial or unfavorable termination of
access determinations to authorized
personnel, did not describe a means for
licensees (1) to verify whether a
representative who requests the reasons
for denying its client’s unescorted
access is legitimate and (2) to protect the
sources of the derogatory information.
The Commission agrees with the
received comments and revised
§ 73.56(m)(2) of the final rule to specify
that representatives must be designated
by the individual in writing and that
personal privacy information, including
information pertaining to the source,
may be redacted. The Commission
concluded that these requirements are
necessary to provide the regulatory
framework to ensure the protection of
personal information.
Section 73.56(n), Audits and
Corrective Action. The Commission
received comments that proposed
§ 73.56(n)(5), which would have
required the audit team to include a
person who is knowledgeable and
practiced with meeting access
authorization program performance
objectives, is not appropriate for
contractors or vendors. The commenters
stated that the contractor or vendor
audit team may not have such a person
who is knowledgeable of and practiced
with meeting authorization program
performance objectives and
requirements. The Commission
disagrees. This requirement applies to
licensees and applicants who are
responsible for meeting the
requirements of this section. The rule
requires that licensees and applicants
will perform audits of their access
authorization program to include those
program elements that are provided by
contractors and vendors.
The Commission received comments
on proposed § 73.56(n)(6) that it would
not be consistent with appendix B to 10
CFR part 50 of this chapter, regarding
who should receive the audit report.
The Commission agrees and revised the
final rule § 73.56(n)(6) to require that
PO 00000
Frm 00026
Fmt 4701
Sfmt 4700
audit results be provided to senior
management having responsibility in
the area audited and to management
responsible for the access authorization
program to ensure proper disposition
and oversight of issues identified during
the conduct of audits.
G. Section 73.58, Safety/Security
Interface Requirements for Nuclear
Power Reactors
The Commission did not make
substantial changes to the final rule
requirements for § 73.58. In response to
comments, the Commission clarified the
supporting section-by-section analysis
for § 73.58. The principal concern
expressed by stakeholders was that the
proposed § 73.58 provisions appeared to
require implementation of broad new
programmatic requirements, and that it
did not appear that the NRC had
sufficiently credited existing
Commission required programs. It is not
the intent of this new requirement to
impose new programmatic requirements
on licensees. If current programs and
procedures are in place to enable the
safety/security interface to be assessed
and managed, the Commission expects
that licensees would make maximum
use of such programs. The Commission
does not believe it is necessary to credit
these existing programs in the rule.
Instead, it intends to address the
crediting of existing programs in
supporting regulatory guidance. In
response to public comment that
expressed confusion as to the
Commission’s basis for imposing the
new § 73.58 requirements, the
Commission clarified the final rule
section-by-section analysis for § 73.58 to
indicate that the new requirement is
being added to part 73 as a costjustified, substantial, safety
enhancement per § 50.109(a)(3) and in
response to PRM–50–80.
H. Appendix B to Part 73, General
Criteria for Security Personnel
The Commission received comments
on the proposed title of appendix B,
section VI, which indicated that the title
did not specify the applicability of this
appendix to security personnel. The
Commission agrees. The title of section
VI of this appendix is revised to
‘‘Nuclear Power Reactor Training and
Qualification Plan for Personnel
Performing Security Program Duties’’ in
the final rule to reflect the members of
the security organization and other
facility personnel that may be trained
and qualified to perform security-related
duties at an NRC-licensed nuclear
power reactor facility.
Appendix B, Section VI.A.I. The
Commission received comments on this
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
paragraph that stated the proposed
requirement could be broadly
interpreted to apply to many varied
licensee positions. The Commission
agrees. The final rule is revised to
clarify that the intent of this
requirement is to ensure that all
individuals who perform physical
protection and/or contingency response
duties within the security program meet
the minimum training and qualification
requirements for their assigned duties as
specified within this appendix and the
Commission-approved training and
qualification plan. The word
‘‘individuals’’ is used to capture
members of the security organization as
well as those facility personnel who are
assigned to perform physical protection
and/or contingency response duties
within the security program. Facility
personnel performing physical
protection duties such as vehicle escort
and materials search are included in the
context of this paragraph and the
paragraphs throughout this appendix
where the word ‘‘individuals’’ is used,
and is not preceded or followed by
phrasing that specifically identifies
members of the security organization.
Facility personnel performing physical
protection duties need only meet the
minimum training and qualification
requirements for the specific duty
assigned in accordance with this
appendix and the Commissionapproved training and qualification
plan. Where requirements of this
appendix specifically apply to members
of the security organization, the
language explicitly identifies this
applicability.
Appendix B, Section VI.A.3. The
language in this paragraph, and
paragraphs B.2.a(2), B.2.a(4), B.3.c,
B.5.a, B.5.b, D.1.a, D.2.a, is revised from
‘‘members of the security organization’’
to ‘‘individuals.’’ This revision is
necessary to include facility personnel
who are not members of the security
organization but have been trained and
qualified in accordance with this
appendix and the Commissionapproved training and qualification plan
and who are assigned to perform
physical protection duties such as
vehicle escort or material search.
Appendix B, Section VI.B.1.a(3). The
language in this paragraph is revised to
remove the phrase ‘‘an unarmed
individual assigned to the security
organization’’ as the applicability of this
requirement is previously specified in
section B.1.a.
Appendix B, Section VI.B.1.a(4).
During development of the final
regulations implementing the firearms
background checks required under
section 161A of the AEA (42 U.S.C.
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
2201a), the Commission recognized that
the proposed suitability requirements
for security personnel found in
appendix B to part 73, criteria VI.B.1,
were not inclusive of the list of
disqualifying criteria found under the
Gun Control Act of 1968 (GCA) (see 18
U.S.C. 922(g) and (n)). The GCA
mandates that it is unlawful for
individuals who meet these
disqualifying criteria to possess firearms
or ammunition. During development of
the guidelines required by section 161A
of the EPAct (discussed previously in
section I.D.(a)), the NRC discussed this
issue with the U.S. Bureau of Alcohol,
Tobacco, Firearms, and Explosive (ATF)
which has responsibility for regulatory
oversight of this statute. The ATF’s
relevant regulation on these provisions
is found in 27 CFR 478.32.
During these discussions, ATF
advised the NRC that it interprets ‘‘any
person’’ under 18 U.S.C. 922(d) very
broadly and that the prohibition under
this paragraph would apply to NRC
licensees and certificate holders.
Furthermore, the ATF indicated that
this prohibition would apply to typical
licensee or certificate holder security
practices involving the temporary
possession of firearms and ammunition.
For example, instances in which a
licensee issues firearms and
ammunition to a security officer at the
beginning of the officer’s duty shift and
the officer then returns the firearms and
ammunition to the licensee at the end
of the officer’s duty shift would fall
under the restrictions of 18 U.S.C.
922(d).
Consequently, the Commission has
revised the language in Criteria VI.B.1 to
remind licensees of their obligation to
comply with this statutory requirement
by adding a criterion to the licensee’s
employment suitability program for
armed security officers. However, to
account for the possibility that the law
may change, or future laws may be
enacted affecting this obligation, the
final rule is written generically to
maintain flexibility and reduce the
potential need to revise this requirement
in future rulemakings. The Commission
is not imposing additional investigatory
requirements on licensees. The
Commission’s intent is for licensees to
consider information collected as a
result of the individual’s background
investigation for identification of GCA
disqualifying criteria.
In the proposed rule the Commission
had set forth proposed requirements for
a firearms background check under
§ 73.18. However, and as discussed
elsewhere in this document, the
Commission is separating the provisions
implementing section 161A of the
PO 00000
Frm 00027
Fmt 4701
Sfmt 4700
13951
EPAct 2005, into a separate rulemaking
and intends to relocate the firearms
background check provisions to § 73.19.
Consequently, because that rule may not
be issued before this rule or because a
licensee may not otherwise be subject to
the firearms background check
requirement, this rule permits a licensee
to satisfy the firearms background check
requirement by comparing information
obtained during their access
authorization background investigation
process with the disqualifying criteria
under the GCA to evaluate whether an
individual could be prohibited from
possessing firearms and ammunition.
The Commission notes that a final
determination on whether an individual
is, or is not, disqualified from
possessing firearms and ammunition
can be made via a Federal firearms
background check or an applicable State
firearms check. Furthermore, because
this same issue also exists in criteria
I.A.1 of appendix B for armed security
personnel at other classes of NRC
licensees and NRC certificate holders,
the NRC also is making a conforming
change in criteria I.A.1 of this appendix
similar to that made to criteria VI.B.1 of
this appendix.
Appendix B, Section VI.B.1.b. The
Commission received comments on this
proposed paragraph that stated this
blanket addition of having a qualified
training instructor document the
qualifications of individuals assigned to
perform physical protection and/or
contingency response duties will create
a huge administrative burden and add
additional cost as processes overseen by
other organizations (such as medical)
would now require administration by a
qualified training instructor. The NRC
disagrees with this comment. The intent
of this requirement is for the qualified
training instructor to be responsible for
the final documentation of each security
critical task qualification as outlined in
the Commission-approved training and
qualification plan that is performed by
individuals who are assigned physical
protection and/or contingency response
duties within the security program.
Appendix B, Section VI.B.2.a(1). The
Commission received a comment
recommending that the phrase ‘‘of
assigned security job duties and
responsibilities’’ be added to the end of
this provision in the final rule to allow
the use of personnel in a limited duty
position. The Commission agrees, and
this paragraph is revised in the final
rule to add the phrase ‘‘of assigned
security duties and responsibilities’’ to
the end of this provision to enable
members of the security organization
who are medically disqualified from
performing contingency response duties
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13952
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
or specific physical protection duties for
a period of time to perform other
physical protection duties that would
not be affected by the medical
disqualification.
Appendix B, Section VI.B.2.a(4). The
Commission received comments on this
proposed paragraph requesting further
clarification as it appears that this
requirement for armed and unarmed
individuals who are assigned security
duties and responsibilities identified in
Commission-approved security plans
and licensee protective strategy and
implementing procedures (to meet the
minimum physical requirements
identified in this appendix) is more
stringent than the existing requirement.
The commenter specifically expressed
the concern that personnel performing
in day-to-day security operations but
having little to no responsibility in an
actual response to contingency events
should not be required to meet an
increased physical standard. The
Commission disagrees with this
comment. The physical standards
associated with this requirement are
identified in paragraphs B.2.b through
B.2.f of this appendix within the final
rule and reflect the basic physical
requirements to ensure that an
individual possesses the standard acuity
levels associated with vision and
hearing and that the individual does not
have a medical condition that is
detrimental to the individual’s health or
the performance of assigned duties. The
standards identified in paragraphs B.2.b
through B.2.f are applicable to all
individuals who are assigned to perform
physical protection and/or contingency
response duties within the security
program to include non-security
organization personnel assigned to
perform physical protection duties such
as vehicle escort or material search.
Appendix B, Section VI.B.4.a. The
Commission received comments on this
proposed paragraph which stated that
this requirement for armed members of
the security organization to be subject to
a medical examination before
participating in the physical fitness test
is redundant to the requirement of
paragraph B.2.a(2). The NRC agrees in
part. The physical examination
discussed in paragraph B.2.a(2) of this
appendix may be used to fulfill this
requirement. The rule requires that an
individual’s current health status be
verified before engaging in the physical
fitness test and that there is no existing
medical condition that would be
detrimental to the individual’s health
when placed under the physical stress
induced by the physical fitness test.
Scheduling the physical fitness test for
each armed individual as soon as
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
possible after the date of the physical
examination required by paragraph
B.2.a(2) provides the verification of the
individual’s current health status
minimizes the possibility of the
individual incurring a medical
condition from the time of examination
to the time that the physical fitness test
is administered.
Appendix B, Section VI.B.4.b(4). The
Commission received comments that
this proposed requirement for a
qualified training instructor to
document the physical fitness
qualifications of the armed members of
the security organization should allow
for the use of a trained medical
professional to attest to the physical
fitness qualification. The Commission
disagrees with the comment. The
licensed medical professional is
required to conduct the medical
examination before the physical fitness
test being administered. The purpose of
the examination is to verify that the
individual’s current health status is
sufficient to engage in the physical
exertion of the test without being
detrimental to the individual’s health.
The licensed medical professional
provides a certification of the
individual’s health before the test but is
neither required to administer the
physical fitness test nor to document or
attest to the successful completion of
the test. The rule requires that a
qualified training instructor documents
the successful completion of the
physical fitness test in the individual’s
training record and that the
documentation of the completed
requirement be attested to by a security
supervisor. The physical fitness test is a
performance-based test that is designed
to demonstrate an individual’s physical
ability to perform assigned security
duties during a contingency event. The
test consists of performing physical
activities associated with contingency
response duties that replicate site
specific conditions that would be
encountered in the contingency
response environment.
Appendix B, Section VI.C.2. The
Commission received comments
requesting clarification of the scope of
the on-the-job training requirements.
The Commission agrees that the scope
of this requirement should be clarified
and has revised this paragraph to
describe the implementation of on-thejob training. The requirement for on-thejob training is added to ensure that
individuals assigned duties to
implement the physical security plan
and safeguards contingency plan
possess practical hands-on knowledge,
skills and abilities needed to perform
their assigned duties. Beyond the on-
PO 00000
Frm 00028
Fmt 4701
Sfmt 4700
the-job training for daily security
program duties, the Commission
requires an additional 40 hours of onthe-job training specific to response to
contingency events. The rule requires
that individuals (e.g. response team
leaders, alarm station operators, armed
responders, and armed security officers
designated as a component of the
protective strategy) assigned duties and
responsibilities to implement the
safeguards contingency plan complete a
minimum of 40 hours of on-the-job
training specifically related to the
licensee’s protective strategy to
demonstrate their ability to apply the
knowledge, skills, and abilities required
to effectively perform assigned
contingency duties and responsibilities
before assuming those duties.
Appendix B, Section VI.C.3. The
Commission received various comments
requesting the relocation of the
performance evaluation program
requirements from the proposed part 73,
appendix C, section II to part 73,
appendix B, section VI. The
Commission agrees, and the final rule is
revised to include the performance
evaluation program requirements that
were contained in the proposed part 73,
appendix C, section II.
Due to the merging of requirements
within this section of this appendix,
many requirements have changed
location and are renumbered. The
following proposed rule paragraphs are
removed from the performance
evaluation program: the paragraph
formerly identified as appendix C,
section II.(l)(6)(iv): ‘‘Licensees shall
ensure that scenarios used for required
drills and exercises are not repeated
within any twelve (12) month period for
drills and three (3) years for exercises,’’
is removed to provide licensees the
flexibility to repeat scenarios in
conducting tactical response drills and
force-on-force exercises. The paragraph
formerly identified as appendix B,
section VI, C.3.b(2): ‘‘Tabletop exercises
may be used to supplement tactical
response drills and support force-onforce exercises to accomplish desired
training goals and objectives,’’ is more
appropriate for regulatory guidance,
therefore, is removed from this
appendix.
The paragraph formerly identified as
appendix C, paragraph (l)(5), stating that
‘‘members of the mock adversary force
used for NRC-observed exercises shall
be independent of both the security
program management and personnel
who have direct responsibility for
implementation of the security program,
including contractors, to avoid the
possibility for a conflict of interest’’ has
been deleted. As noted in the statements
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
of consideration to the proposed rule,
the intent of adding this provision to the
rule was to address Section 651 of the
EPAct 2005. (71 FR 62837) However, as
noted above, the NRC does not normally
subject itself to its own regulatory
requirements codified in the Code of
Federal Regulations. Section 651
imposes an obligation on the NRC to
implement the requirements of Section
651, which it has done. Licensees are
not responsible for this requirement. In
light of this, the Commission has
determined that removing this provision
from the final rule is necessary and is
therefore deleted.
Appendix B, Section VI.C.3(a). The
Commission received a comment on this
paragraph that stated that the
requirements in appendix B, section VI,
C.3 do not address Section 651 of the
EPAct 2005, which requires that not less
often than once every 3 years, the
Commission shall conduct security
evaluations (to include force-on-force
exercises) at each licensed facility that
is part of a class of licensed facilities, as
the Commission considers to be
appropriate, to assess the ability of a
private security force of a licensed
facility to defend against any applicable
design basis threat. Additionally, the
commenter stated that this paragraph is
not consistent with the current
regulations, specifically § 73.46(b)(9) for
Category I fuel cycle facilities which
clearly states the requirement for a
Commission role in the force-on-force
exercise program. The Commission
disagrees. Although the Commission has
the discretion to issue regulations that
govern its own practices (e.g. 10 CFR
part 2), the Commission is not required
to reflect a requirement in the form of
its own regulations. If the NRC were
required to implement an obligation in
a particular way in a regulation, then
direction would come from Congress in
the authorizing statute. Unlike some
other provisions of the EPAct 2005 (see,
e.g., Section 170E requiring the NRC to
conduct a rulemaking to revise the
design basis threat), the EPAct 2005 did
not require the Commission to
implement the requirements of Section
651 by any particular method. In light
of this, the Commission has the
discretion to implement its statutory
obligations as it sees fit.
The commenter references paragraph
§ 73.46(b)(9) (regarding force-on-force
exercises for Category I strategic special
nuclear material (SSNM) fuel cycle
facilities) as an example of a regulation
that imposes an obligation on the NRC
to conduct force-on-force evaluations,
and the commenter argues that the
power reactor regulations should take a
consistent approach. Section
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
73.46(b)(9), however, does not reflect
the proposition claimed by the
commenter. This provision requires
that, during each 12-month period
commencing on the anniversary of the
date specified in § 73.46(i)(2)(ii) of this
section, an exercise must be carried out
at least every 4 months for each shift,
one third of which are to be force-onforce and that during each of the 12month periods, the NRC shall observe
one of the force-on-force exercises.
Thus, the regulation imposes an
obligation on the licensee to organize
and conduct a force-on-force exercise to
meet the requirement and for the
licensee to coordinate with the NRC
who would ‘‘observe’’ one of those
exercises. In contrast, the NRC is
responsible for the conduct of force-onforce exercises for power reactor
licenses mandated by Section 651 of the
EPAct 2005. That this requirement is
not specifically reflected in a regulation
is therefore not inconsistent with the
requirements of § 73.46 and is
consistent with the agency’s longestablished practices.
The Commission notes, however, that
it has strictly complied with the
requirements of Section 651. Since the
enactment of Section 651, which added
Section 170D of the AEA, the NRC has
conducted over 80 force-on-force
inspections at nuclear power plants. In
addition, the NRC has submitted three
annual reports to Congress describing
the results of its security inspections, as
required by Section 170D.e of the AEA.
(See, e.g., the Commission’s second
annual report to Congress, available at
https://www.nrc.gov/security/2006report-to-congress.pdf). The
Commission is, therefore, in full
compliance with Section 170D of the
AEA and does not see the need to codify
requirements to impose an obligation on
itself to meet this obligation.
Appendix B, Section VI.C.3.b. This
proposed paragraph is revised to reflect
the overall program scope that is the
basis for its design, and the content of
the necessary implementing procedures
to conduct tactical response drills and
force-on-force exercises. The periodicity
requirement for the conduct of tactical
response drills and force-on-force
exercises is removed from this
paragraph as it is specified in paragraph
C.3.l(1) of this appendix.
Appendix B, Section VI.C.3.c. A
commenter stated this section does not
comply with the EPAct 2005 because
this section does not state whether these
exercises will be evaluated by NRC or
even if the results of the drills will be
required to be submitted to the NRC. As
noted earlier, the Commission does not
agree that it is appropriate to place a
PO 00000
Frm 00029
Fmt 4701
Sfmt 4700
13953
requirement on the NRC in this rule
text. This proposed requirement
(formerly paragraph C.3.b of this
appendix) is renumbered and moved to
the performance evaluation program
section of this appendix. The text
within this paragraph, as well as all of
the other paragraphs within this
appendix that include the specific text
of ‘‘tactical response team drills and
exercises,’’ has been changed to
‘‘tactical response drills and force-onforce exercises’’ for accuracy and
consistency of language.
Appendix B, Section VI.C.3.d. The
proposed paragraph C.3.b(1) was
renumbered and moved to the
performance evaluation program section
of this appendix. The Commission
received comments that stated that, in
the context of this paragraph, the rule
language should focus on the scope of
drills and exercises and not solely on
the performance of individual
participants. The Commission agrees
and the final rule text was revised to
address both the scope of conducting
tactical response drills and force-onforce exercises as well as the importance
of individual performance by the
members of the security response
organization.
Appendix B, Section VI.D.1.b. The
Commission received comments which
requested that this paragraph, pertaining
to the annual written exam and
performance demonstrations, be revised
to be consistent with the current
regulatory requirements. The
Commission also received a comment
recommending that the requirement for
the annual written exam be relocated to
paragraph F.7 of this appendix as it
applies to armed security officers. The
Commission agrees in part and has
revised the requirement by replacing the
phrase ‘‘annual written exam’’ with the
phrase ‘‘written exams’’ to cover all
written exams that may be administered
to armed and unarmed individuals to
demonstrate their proficiency. The
requirement for the annual written exam
is now addressed in paragraph D.1.b(3)
and identifies the specific applicability
of the annual written exam to armed
members of the security organization.
Appendix B, Section VI.D.1.b(3). This
paragraph is added to provide
clarification on the specific applicability
of the requirement for an annual written
exam to be administered to armed
members of the security organization.
Appendix B, Section VI.E.1.d. The
Commission received comments
requesting that the list of prescribed
proficiency standards be revised so that
it remains consistent with the standards
outlined in the April 2003 training and
qualification order (EA–03–039). The
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13954
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
Commission disagrees that a revision is
necessary. Most of the elements in this
requirement are retained from the preexisting rule and reflect new elements
that had been imposed by Commission
orders. The additional items listed were
not intended to be bound solely by the
elements contained in the pre-existing
list of order EA–03–039. The additions
to the list reflect the Commission’s
expectation for training and the
experience gained through nearly 30
years of security program inspections
and observations. It is the Commission’s
view that these proficiency standards
represent the minimal common firearms
practices that must be followed to
ensure the safe handling, operation, and
appropriate training and qualification is
achieved for weapons employed by a
licensee. Nonetheless, this requirement
has been revised to reflect accurate
language consistent to what is used in
the firearms community for the
performance elements identified.
Appendix B, Section VI.F.1.c. The
Commission received comments that
recommended deleting the proposed
requirement for individuals to be
requalified annually as it is duplicative
of the requirement stated in paragraph
F.5 (proposed rule paragraph F.6). The
Commission agrees and this
requirement is removed in the final rule.
Appendix B, Section VI.F.2. The
proposed rule paragraph F.2 is removed
as the requirements for firearms
qualification courses are clearly
identified in paragraphs F.2, F.3, and
F.4 (proposed rule paragraphs F.3, F.4,
and F.5) of this appendix.
Appendix B, Section VI.F.3.a. This
requirement has been renumbered due
to the removal of other requirements
under this paragraph. The Commission
received comments on proposed rule
paragraph F.4.a stating that the
requirement for daytime shotgun
proficiency has increased by 20 percent
above the current requirement with no
rationale provided. The Commission
disagrees. The shotgun qualification
score was upgraded from 50 percent in
the current rule to a score of 70 percent
to demonstrate an acceptable level of
proficiency which is now reflected in
this appendix. The Commission found
70 percent to be a professionally
accepted minimum qualification score
for daytime shotgun proficiency in the
firearms training community (local,
State, and Federal law enforcement,
National Rifle Association (NRA),
International Association of Law
Enforcement Firearms Instructors
(IALEFI), etc.).
Appendix B, Section VI.F.3.b. This
requirement has been renumbered from
proposed rule paragraph F.4.b due to
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
the removal of other requirements under
this paragraph. The Commission
received comments that stated nighttime
shotgun proficiency has increased by 20
percent above the current requirement
with no rationale provided. The
Commission disagrees. The Commission
found 70 percent to be a professionally
accepted minimum qualification score
for nighttime shotgun proficiency in the
firearms training community (local,
State, and Federal law enforcement,
NRA, IALEFI, etc.). The ‘‘night fire’’
requirement is upgraded from being an
element of familiarization fire in the
current rule to a qualification
requirement in the final rule. This
upgrade is necessary to ensure armed
members of the security organization
possess and maintain a standard level of
proficiency during nighttime
conditions. A score of 70 percent for
handgun and shotgun and 80 percent for
the semi-automatic rifle and/or machine
gun must be achieved to demonstrate an
acceptable level of proficiency.
Appendix B, Section VI.F.5. The NRC
received comments on proposed rule
paragraphs F.5.a(2), F.5.b(2), F.5.c(2),
and F.5.d(2) that recommended deleting
these requirements as they are
duplicative of the requirements in
paragraphs F.3.a, b, and c (formerly
paragraphs F.4.a, b, and c). The
Commission agrees that these
requirements are duplicative and has
therefore removed them from the final
rule. The minimum qualification score
for these weapons are stated in the renumbered paragraphs F.3.a and F.3.b of
this appendix.
Appendix B, Section VI.F.5.a. The
Commission received a comment on
proposed rule paragraph F.6.a that
recommended adding the phrase ‘‘and
the results documented and retained as
a record’’ to the end of the provision.
The Commission agrees and this
requirement is revised to include the
recommended phrase. The rule requires
licensees to document the successful
completion of qualifications for each
weapon system fired and that records of
qualifications be maintained.
Appendix B, Section VI.G.2.b. The
Commission received a comment stating
that the rule should not require that
security officers carry body armor with
them but rather that body armor be
readily available should the security
officers choose to wear it. The
commenter also noted that every
security officer is already required to
have access to body armor. The
commenter, therefore, suggested that the
rule be revised to permit the pre-staging
of body armor at assigned response
positions as appropriate. The
commenter also noted that duress
PO 00000
Frm 00030
Fmt 4701
Sfmt 4700
alarms are not personal equipment
required for security officers and should
not be listed as such. The Commission
agrees with the commenter and has
revised this paragraph in the final rule
to clarify the specific applicability of the
required equipment listing to those
armed security personnel who are
responsible for the implementation of
the safeguards contingency plan,
protective strategy, and associated
implementing procedures. This revision
permits a licensee to pre-stage
equipment (such as body armor) at
designated locations consistent with
their protective strategy. The required
equipment listing under this paragraph
is also revised to remove ‘‘(4) Duress
alarms’’ as this piece of equipment is
not personal equipment associated with
the specific duties of armed security
personnel. It is added, however, to
paragraph G.2.c as an optional piece of
equipment that may be made available
for use in accordance with the
protective strategy and implementing
procedures.
Appendix B, Section VI.G.2.c. The
Commission received a comment that
the listing of personal equipment should
not prescriptively identify particular
pieces of equipment as either optional
or required but rather the rule should
permit licensees to designate required
personal equipment based on individual
protective strategy requirements. The
commenter recommended that the term
‘‘as appropriate’’ be inserted after the
text ‘‘should provide’’ within the
paragraph. The Commission agrees in
part, and this paragraph is revised in the
final rule to include the recommended
phrase to further clarify the suggested
employment and distribution of the
identified equipment that should be
provided in accordance with licensee
policy and implementing procedures.
The equipment listing under this
paragraph is revised to include ‘‘duress
alarms’’ as the equipment identified in
this listing is based upon what may be
deemed by the licensee as appropriate
to fulfill specific physical protection
and/or contingency response duties as
well as provide enhanced capabilities to
the security organization during day-today security operations and contingency
events.
Appendix B, Section VI.G.3.a. The
NRC received a comment that the
requirement for armorer certification is
new and not well-defined by the
proposed rule. The commenter believes
that the requirement that the armorer be
certified is unnecessary because it limits
licensee flexibility to use experienced
but uncertified personnel. The
Commission disagrees. The rule requires
that only those individuals who are
E:\FR\FM\27MRR2.SGM
27MRR2
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
sroberts on PROD1PC70 with RULES
certified by the weapons manufacturer
or a contractor working on behalf of the
manufacturer shall be used to perform
maintenance and repair of licensee
firearms. Licensees may use a
manufacturer’s armorer and certification
process or use a contractor certified by
the manufacturer as an armorer to
perform maintenance and repair of
licensee firearms. The proposed
language of this requirement is
maintained in the final rule text.
H. Appendix C to Part 73, Licensee
Safeguards Contingency Plans
General. The Commission received
comments on this appendix that the
proposed changes would expand focus
of the safeguards contingency plan
(SCP) by requiring specifics on nonsecurity response efforts to prevent
significant core damage. In addition, the
commenters stated that the level of
detail that would be required in the SCP
would be inappropriately increased.
The Commission agrees in part. It is the
Commission’s intent that licensee’s SCP
focus on the predetermined actions of
the site security force, and the final rule
has been revised to clarify this focus.
The intent is not to incorporate other
site emergency plans into the SCP but
to ensure that the licensee has
considered these other plans to avoid
potential conflict. To accomplish this,
the NRC retained rule language in a
format similar to the current regulation,
included requirements similar to those
that had been imposed by the
Commission orders, reorganized the
requirements, and modified the
language for a more concise
understanding.
Appendix C, Section II.B Contents of
the Plan. The Commission received
comments that the proposed appendix C
inappropriately included a licensee’s
entire integrated response for all
postulated events including those
beyond the DBT. The commenters were
also concerned that portions of these
requirements were not security related
and, therefore, should not be included
in the security rule. The Commission
agrees in part with these comments and
has revised the final rule accordingly.
Appendix C, section II has been revised
to more clearly reflect what the
Commission expects to be included in a
licensee’s SCP. The following proposed
rule categories of information have been
moved to the licensee’s planning basis:
(5) ‘‘Primary Security Functions,’’ (6)
‘‘Response Capabilities,’’ and (7)
‘‘Protective Strategy.’’
The proposed rule category of
information (8) ‘‘Integrated Response
Plan’’ is also removed from this
appendix. The requirements associated
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
with this paragraph have been removed,
modified, and/or relocated to other
applicable areas within this appendix to
reduce confusion related to the
redundancy and duplication of
information. In addition, the proposed
rule category of information (9) ‘‘Threat
Warning System’’ is removed from this
appendix and included in 10 CFR
73.55(k)(10). The proposed rule category
of information (9) requirement regarding
‘imminent threat’ is relocated to new 10
CFR 50.54(hh)(1).
The Commission received comments
that the requirements of the
performance evaluation program be
moved to part 73, appendix B. As
explained earlier, the Commission
agrees. The proposed rule category of
information (10) ‘‘Performance
Evaluation Program’’ is removed from
this appendix in its entirety and has
been incorporated in part 73, appendix
B, as these requirements describe the
development and implementation of a
training program for the security force
in response to contingency events.
IV. Section-by-Section Analysis
A. Introduction
The purpose of this section is to
identify what sections are being affected
by this final rulemaking and to provide
explanations of the purpose, scope, and
intent of each section.
B. Section 50.34, Contents of
Construction Permit and Operating
License Applications; Technical
Information
Paragraph (c) of § 50.34 is revised to
require applicants for an operating
license to submit a training and
qualification plan (in accordance with
appendix B to part 73) and a cyber
security plan (in accordance with the
criteria in § 73.54). These plans are in
addition to the licensee’s physical
security plan. Paragraph (c) is revised
such that the submittal requirements for
applicants for licenses that are subject to
§§ 73.50 and 73.60 remain unchanged.
Paragraph (d) of § 50.34 is revised to
require applicants for an operating
license to submit a safeguards
contingency plan in accordance with
section II of appendix C to part 73.
Section II of appendix C is revised to
contain the requirements limited to
power reactor licensees. Additionally,
paragraph (d) is revised so that the
safeguards contingency plan submittal
requirements for applicants for licenses
that are subject to §§ 73.50 and 73.60
remain unchanged by requiring that
these applicants follow section I of
appendix C to part 73.
PO 00000
Frm 00031
Fmt 4701
Sfmt 4700
13955
Paragraph (e) of § 50.34 is revised to
require the cyber security plan, which is
a new plan required by this rulemaking
and which contains Safeguards
Information, to be protected against
unauthorized disclosure consistent with
§ 73.21.
Paragraph (i) is added to § 50.34 to
require submittal of a description and
plans for implementation of the
guidance and strategies intended to
maintain or restore core cooling,
containment, and spent fuel pool
cooling capabilities under the
circumstances associated with the loss
of large areas of the plant due to
explosions or fire as required by
§ 50.54(hh)(2). Regarding the
requirements of § 50.54(hh)(2), the NRC
views the mitigative strategies as similar
to those operational programs for which
a description of the program is provided
as part of the license application and
that will be implemented before plant
operation. The Commission plans to
review the program description
provided in the application as part of
the licensing process and perform
subsequent inspections of procedures
and plant hardware to verify
implementation. Because the
Commission finds that the most
effective approach is for the mitigative
strategies, at least at the programmatic
level, to be developed before
construction and reviewed and
approved during licensing, a
requirement for information has been
added to §§ 50.34 and 52.80.
C. Section 50.54, Conditions of Licenses
Section 50.54(p)(1) is revised to add
the cyber security plan to the list of
plans for which the plan changes need
to be controlled by § 50.54(p).
D. Section 50.54(hh), Mitigative
Strategies and Response Procedures for
Potential or Actual Aircraft Attacks
The mitigative strategies and response
procedure requirements for potential or
actual aircraft attacks are located in new
§ 50.54(hh) so that these requirements
are a condition of an operating or
combined license. This approach was
chosen to ensure consistency with the
method by which the 2002 ICM order
B.5.b mitigative strategies requirements
have been implemented for currently
operating reactors. (See Orders
Modifying Licenses, 71 FR 36554; June
27, 2006).
Section 50.54(hh)(1) establishes the
necessary regulatory framework and
clarifies current expectations to
facilitate consistent application of
Commission requirements for
preparatory actions to be taken in the
event of a potential aircraft threat to a
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13956
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
nuclear power reactor facility. Because
aircraft threats are significant, rapidly
evolving events and because licensees
may only receive threat notifications a
short time before potential onsite
impacts, the NRC has determined that it
is not prudent for licensees to attempt
to identify and accomplish ad hoc
mitigative actions in the midst of such
circumstances and employing a reactive
approach would significantly limit the
effectiveness of onsite and offsite
responses. To cope effectively with
potential aircraft threats, the rule
requires licensees to develop specific
procedures, whether in a single
procedure or among several procedures,
that describe the pre-identified actions
licensees intend to take when they are
provided with pre-event notification.
These pre-event preparations provide
the most effective responses possible to
aircraft threats and demonstrate
systematic onsite and offsite planning,
coordination, communication, and
testing.
To the extent possible, the rule
requires licensees to develop,
implement, and maintain procedures for
verifying the authenticity of aircraft
threat notifications to avoid taking
actions in response to hoaxes that may
adversely impact licensees or the health
and safety of the public. Depending on
the source of a threat notification,
licensees may or may not be able to
establish contact with appropriate
entities to confirm the accuracy of the
threat information received.
Consequently, if the threat information
is not received from the NRC
Headquarters Operations Center,
licensees are required to at least contact
the NRC Headquarters Operations
Center for assistance with verifying
callers’ identities or the veracity of
threat information.
The national protocol for dealing with
aircraft threats is designed to be
proactive with respect to threat
identifications and notifications.
However, threat information sources
may not be able to identify specific
targets, and given the dynamic nature of
potential aircraft threats, any associated
notifications to licensees may
necessarily be reactive in nature.
Additionally, licensees must rely on
sources which are external to their
control rooms for potential aircraft
threat notifications and updates when
available. As a result, the rule requires
licensees to develop, implement, and
maintain procedures for the
maintenance of continuous
communication with threat notification
sources because it is imperative that
licensees establish and maintain this
capability throughout the duration of
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
the pre-event notification period. With
such a capability, licensees will be able
to receive accurate and timely threat
information upon which to base
decisions concerning the most effective
actions that need to be taken. For
example, licensees would be aware that
they may be able to cease mitigative
actions if it is determined a threat no
longer exists, or licensees may
accelerate their protective actions if the
threat notification sources relate the
aircraft may impact sooner than
originally projected. The local, regional
or national FAA offices; NORAD; law
enforcement organizations; and the NRC
Headquarters Operations Center are
examples of threat notification sources
with which licensees would be required
to maintain a continuous
communication capability. If a licensee
encounters a situation where multiple
entities are providing the same threat
information (e.g., FAA, NORAD and
NRC Headquarters Operations Center),
the licensee would only be required to
maintain continuous communication
with the NRC Headquarters Operations
Center. The goal is to communicate
pertinent information to licensees and
not to unnecessarily burden their
personnel with redundant requirements.
The rule also requires that licensees
develop, implement, and maintain
procedures for contacting all onsite
personnel and appropriate offsite
response organizations (e.g., fire
departments, ambulance services,
emergency operations centers) in a
timely manner following the receipt of
potential aircraft threat notifications.
These notifications ensure that onsite
personnel have as much time as
possible to execute established
procedures and provide offsite response
organizations the opportunity to
perform the following:
• Initiate, where possible, mutual aid
assistance agreements based on the
perceived threat;
• Commence the near-site mustering
of offsite fire-fighting and medical
assistance for sites where these
organizations are not proximately
located; or
• Mobilize personnel for volunteer
organizations or hospital staffs when
appropriate.
Licensees are expected to provide
periodic updates to offsite response
organizations during the pre-event
notification period as appropriate.
During the pre-event notification period,
the rule requires licensees to develop
procedures to continuously assess plant
conditions and take effective actions to
mitigate the consequences of an aircraft
impact. Examples include maximizing
makeup water source inventories,
PO 00000
Frm 00032
Fmt 4701
Sfmt 4700
isolating appropriate plant areas and
systems, ceasing fuel-handling
operations and equipment testing,
starting appropriate electrical generation
equipment, and charging fire-service
piping headers. By taking these actions,
licensees can better posture their sites to
minimize the potential public health
and safety effects of an aircraft crash at
their facilities.
The rule also requires licensees to
develop, implement, and maintain
procedures for making site-specific
determinations of the amount of lighting
required to be extinguished, if any, to
prevent or reduce visual discrimination
of sites relative to their immediate
surroundings and distinction of
individual buildings within protected
areas. For example, it may make sense
to turn off all the lights at an isolated
site but not for a site situated in an
industrial area where ambient lighting
from surrounding industries is sufficient
for target discrimination. Licensees are
expected to use centralized lighting
controls or develop prioritized routes
that allow personnel to turn off different
sets of lights depending on available
time when appropriate.
The safety of licensee personnel and
contractors is paramount to the
successful response and implementation
of mitigative measures after an onsite
aircraft impact. To the maximum extent
possible after an imminent aircraft
threat notification, the rule also requires
licensees to develop, implement, and
maintain procedures for dispersing
appropriate personnel and equipment
(e.g., survey vehicles and emergency
kits) to locations throughout their sites.
Such actions will increase the chance
that critical personnel and equipment
will be available to address the
consequences of an onsite aircraft
impact and reduce the need to make
improvised decisions during the preevent notification period. The decision
whether to shelter the remaining
personnel in-place or evacuate them in
response to an imminent aircraft threat
should be based on the physical layout
of the site and the time available to
conduct an effective evacuation. It is
expected that licensees will conduct an
analysis and develop a decision-making
tool for use by shift operations
personnel to assist them in determining
the appropriate onsite protective action
for site personnel for various warning
times and site population conditions
(e.g., normal hours, off normal hours,
and outages). This decision-making tool
shall be incorporated into appropriate
site procedures. It is expected that this
tool will be routinely used in drills and
exercises and that any deficiencies or
weaknesses identified will be corrected
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
in accordance with § 50.47(b)(14) and
appendix E to part 50, section IV.F.2.g.
Depending upon the methodology used
to determine evacuation times, it may
not be necessary for a licensee to
suspend security measures under
§§ 50.54(x) or 73.55(p), as applicable.
Licensees are required to develop
procedures to facilitate the rapid entry
of appropriate onsite personnel as well
as offsite responders into their protected
areas to deal with the consequences of
an aircraft impact.
Because the most well-considered
plans and procedures do not guarantee
that critical on-shift personnel will
survive an aircraft impact, the rule
requires licensees to develop,
implement, and maintain procedures for
an effective recall process for
appropriate off-shift personnel. Those
procedures shall describe the licensee’s
process for initiating off-shift recalls
during the pre-event notification period
and for directing responding licensee
personnel to pre-identified assembly
areas outside the site protected areas.
When possible, the assembly area
locations should be coordinated with
offsite response organizations to
facilitate offsite response plans and to
ensure that off-shift licensee personnel
will not be delayed access to the site
onsite when needed.
Section 50.54(hh)(2) requires
licensees to develop guidance and
strategies for addressing the loss of large
areas of the plant due to explosions or
fires from a beyond-design basis event
through the use of readily available
resources and by identifying potential
practicable areas for the use of beyondreadily-available resources. These
strategies are to address a licensee’s
responses to events that are beyond the
design basis of the facility. The
requirements in the final rule are based
on similar requirements originally
found in the ICM order of 2002.
Ultimately, these mitigative strategies
were further developed and refined
through extensive interactions with
licensees and industry. The NRC
recognizes that these mitigative
strategies are beneficial for the
mitigation of all beyond-design basis
events that result in the loss of large
areas of the plant due to explosions or
fires. Current reactor licensees comply
with these requirements through the use
of the following 14 strategies that have
been required through an operating
license condition. These strategies fall
into the three general areas identified by
§§ 50.54(hh)(2)(i), (ii), and (iii). The firefighting response strategy reflected in
§ 50.54(hh)(2)(i) encompasses the
following elements:
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
1. Pre-defined coordinated fire
response strategy and guidance.
2. Assessment of mutual aid fire
fighting assets.
3. Designated staging areas for
equipment and materials.
4. Command and control.
5. Training of response personnel.
The operations to mitigate fuel
damage provision in § 50.54(hh)(2)(ii)
includes consideration of the following:
1. Protection and use of personnel
assets.
2. Communications.
3. Minimizing fire spread.
4. Procedures for implementing
integrated fire response strategy.
5. Identification of readily-available,
pre-staged equipment.
6. Training on integrated fire response
strategy.
7. Spent fuel pool mitigation
measures.
The actions to minimize radiological
release provision in § 50.54(hh)(2)(iii)
includes consideration of the following:
1. Water spray scrubbing.
2. Dose to onsite responders.
The Commission considered
specifically including these 14 strategies
in § 50.54(hh)(2). However, the
Commission decided that the more
general performance-based language in
§ 50.54(hh)(2) was a better approach to
account for future reactor facility
designs that may contain features that
preclude the need for some of these
strategies. New reactor licensees are
required to employ the same strategies
as current reactor licensees to address
core cooling, spent fuel pool cooling,
and containment integrity. The
mitigative strategies employed by new
reactors as required by this rule would
also need to account for, as appropriate,
the specific features of the plant design,
or any design changes made as a result
of an aircraft assessment that would be
performed in accordance with the
proposed Aircraft Impact Assessment
rule (72 FR 56287; October 3, 2007).
Section 50.54(hh) is applicable to
both current reactor licensees and new
applicants for and holders of reactor
operating licenses under either part 50
or part 52. Current reactor licensees
have already developed and
implemented procedures that comply
with the § 50.54(hh)(2) requirements,
and do not require any additional action
to comply with these rule provisions.
New applicants for, and new holders of,
operating licenses under part 50 and
combined licenses under part 52 are
required to develop and implement
procedures that employ mitigative
strategies similar to those now
employed by current licensees to
maintain or restore core cooling,
PO 00000
Frm 00033
Fmt 4701
Sfmt 4700
13957
containment, and spent fuel pool
cooling capabilities under the
circumstances associated with loss of
large areas of the plant due to
explosions or fire. The requirements
described in § 50.54(hh) relate to the
development of procedures for
addressing certain events that are the
cause of large fires and explosions that
affect a substantial portion of the
nuclear power plant and are not limited
or directly linked to an aircraft impact.
The rule contemplates that the initiating
event for such larges fires and
explosions could be any number of
beyond-design basis events. In addition,
the Commission regards § 50.54(hh) as
necessary for reasonable assurance of
adequate protection to public health and
safety and common defense and
security; this is consistent with the
NRC’s designation of the orders on
which § 50.54(hh) is based as being
necessary for reasonable assurance of
adequate protection.
As discussed previously, the
Commission has proposed in a separate
rulemaking to require designers of new
nuclear power plants (e.g., applicants
for standard design certification under
part 52, and applicants for combined
licenses under part 52) to conduct an
assessment of the effects of the impact
of a large commercial aircraft on a
nuclear power plant. Based upon the
insights gained from this assessment,
the applicant will be expected to
include a description and evaluation of
design features and functional
capabilities to avoid or mitigate, to the
extent practical and with reduced
reliance upon operator actions, the
effects of the aircraft impact. New
reactor applicants would be subject to
both the requirements of the aircraft
impact rule and the requirements
§ 50.54(hh). The overall objective of the
Commission with both rulemakings is to
enhance a nuclear power plant’s
capabilities to withstand the effects of a
large fire or explosion, whether caused
by an aircraft impact or other event,
from the standpoints of both design and
operation. The impact of a large aircraft
on the nuclear power plant is regarded
as a beyond-design basis event. In light
of the Commission’s view that effective
mitigation of the effects of events
causing large fires and explosions
(including the impact of a large
commercial aircraft) should be provided
through operational actions, the
Commission believes that the mitigation
of the effects of such impacts through
design should be regarded as a safety
enhancement which is not necessary for
adequate protection. Therefore, the
aircraft impact rule—unlike the
E:\FR\FM\27MRR2.SGM
27MRR2
13958
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
§ 50.54(hh)—is regarded as a safety
enhancement which is not necessary for
adequate protection.
The Commission regards the two
rulemakings to be complementary in
scope and objectives. The aircraft
impact rule will focus on enhancing the
design of future nuclear power plants to
withstand large commercial aircraft
impacts, with reduced reliance on
human activities (including operator
actions). Section 50.54(hh)(2) focuses on
ensuring that the nuclear power plant’s
licensees will be able to implement
effective mitigative measures for large
fires and explosions including (but not
explicitly limited to) those caused by
the impacts of large commercial aircraft.
Thus, these revisions to the
Commission’s regulatory framework for
future nuclear power plants provide
more regulatory certainty, stability, and
increased public confidence.
Section 50.54(hh) requirements do not
apply to decommissioning facilities for
which the certifications required under
§ 50.82(a)(1) or § 52.110(a)(1) have been
submitted. The NRC believes that it is
inappropriate that § 50.54(hh) should
apply to a permanently shutdown
defueled reactor where the fuel was
removed from the site or moved to an
ISFSI. The Commission notes that the
§ 50.54(hh) do not apply to any current
decommissioning facilities that have
already satisfied the § 50.82(a)
requirements.
The Commission issued guidance
(Safeguards Information) to current
reactor licensees on February 25, 2005,
and additionally endorsed NEI 06–12,
Revision 2, by letter dated December 22,
2006, as an acceptable method for
current reactor licensees to comply with
the mitigative strategies requirement.
These two sources of guidance provide
an acceptable means for developing and
implementing the mitigative strategies.
The Commission is currently
developing a draft regulatory guide that
consolidates this guidance and
addresses new reactor designs.
sroberts on PROD1PC70 with RULES
E. Section 52.79, Contents of
Applications; Technical Information in
Final Safety Analysis Report
Section 52.79(a)(36) is revised to
require the cyber security plan,
developed in accordance with the
criteria set forth in § 73.54, to be
included amongst the security plans
that are required to be included in the
final safety analysis report for a
combined license under part 52. In
addition, the cyber security plan is
added to the list of plans which must be
handled as Safeguards Information in
accordance with § 73.21.
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
F. Section 52.80, Contents of
Applications; Additional Technical
Information
Section 52.80(d) is added to § 52.80 to
require a combined license applicant to
submit a description and plans for
implementation of the guidance and
strategies intended to maintain or
restore core cooling, containment, and
spent fuel pool cooling capabilities
under the circumstances associated with
the loss of large areas of the plant due
to explosions or fire as required by
§ 50.54(hh)(2) of this chapter. The
Commission views the mitigative
strategies required by § 50.54(hh)(2) as
similar to those operational programs
for which a description of the program
is provided as part of the combined
license application and subsequently
implemented before plant operation.
The Commission reviews the program
description provided in the application
as part of the licensing process and
performs subsequent inspections of
procedures and plant hardware to verify
implementation.
G. Section 72.212, Conditions of General
License Issued Under § 72.210
Conforming changes were made to
§ 72.212 to reference the appropriate
revised paragraph designations in
§ 73.55. No change to the substantive
requirements of this section is intended.
Conforming changes were made to
preserve the current requirements for
general licenses issued per § 72.210 for
the storage of spent fuel in an ISFSI. The
Commission has initiated a separate
rulemaking to revise the requirements
for the security of ISFSIs and thus
prefers to maintain the current
regulatory structure until that
rulemaking is completed. Section
72.212(b)(5) requires that spent fuel
stored in an ISFSI be protected against
the design basis threat of radiological
sabotage with conditions and
exceptions. The changes made to
§ 72.212 are intended to preserve those
conditions and exceptions since these
ISFSI licensees are not the subject of the
rulemaking. Specifically,
§ 72.212(b)(5)(ii) is revised to reference
§ 73.55(e) because § 73.55(e) provides
the protected area criteria, within which
the spent fuel must be stored, while
preserving the exception that spent fuel
is not required to be within a separate
vital area.
Section 72.212(b)(5)(iii) is revised to
reference § 73.55(h) because § 73.55(h)
provides the personnel search criteria
for § 72.212. Section 72.212 provides an
exception allowing a physical pat-down
search of persons to be performed in
lieu of the use of firearms and
PO 00000
Frm 00034
Fmt 4701
Sfmt 4700
explosives detection equipment. Section
72.212(b)(5)(iv) is revised to reference
§ 73.55(i)(3) since § 73.55(i)(3) provides
the intrusion detection and assessment
requirements for which § 72.212
provides an exception allowing a guard
or watchman on patrol to provide this
observational capability. Section
72.212(b)(5)(v) is revised to exempt
ISFSI licensees from the requirements in
§ 73.55 to interdict and neutralize
threats preserving this exception. Due to
the restructuring of § 73.55, a specific
reference to a paragraph in § 73.55 was
no longer possible, and a more general
exception was written into § 72.212. The
Commission intends for the same
exception to continue.
H. Section 73.8, Information Collection
Requirements: OMB Approval
Section 73.8 is revised to add § 73.54
and § 73.58 to the list of part 73
sections, which contain collection
requirements that have been approved
by the Office of Management and
Budget.
I. Section 73.54, Protection of Digital
Computer and Communication Systems
and Networks
This new section describes the
requirements for nuclear power plant
licensees to establish a cyber security
program.
Section 73.54, General. This section
requires current nuclear power plant
licensees to submit a cyber security plan
within 180 days of the effective date of
the rule for NRC review and approval.
The cyber security plan must be
submitted to the NRC as a license
amendment pursuant to § 50.90. Current
applicants for an operating license or
combined license who have submitted
their applications to the NRC prior to
the effective date of this rule are
required to amend their applications to
include a cyber security plan consistent
with this rule.
Section 73.54(a), Protection. This
paragraph establishes the regulatory
framework and requirements for the
cyber security program in meeting the
requirement for protection against the
design basis threat of cyber attack
identified in § 73.1. This paragraph has
been expanded from the proposed rule
to provide a more detailed list of the
types of systems and networks that are
intended to be protected.
Section 73.54(b), Analysis of Digital
Computer and Communication Systems
and Networks. This paragraph
establishes requirements for an analysis.
The rule requires that each licensee will
analyze the digital computer and
communication systems and networks
in use at their facility to identify those
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
assets that require protection and that
the licensee’s cyber security program
will include measures for the protection
of the digital computer and
communication systems and networks
identified by the licensee through the
required analysis. Cyber security, like
physical security, focuses on the
protection of equipment, systems, and
networks against attacks by those
individuals or organizations that would
seek to cause harm, damage, or
adversely affect the functions performed
by such equipment, systems, and
networks. Cyber security and physical
security programs are intrinsically
linked and must be integrated to satisfy
the physical protection program design
criteria of § 73.55(b). The Commission
recognizes that a uniquely independent
technical expertise and knowledge is
required to effectively implement the
cyber security program, and therefore,
the specific training and qualification
requirements for the program must
focus on ensuring that the personnel
who implement the cyber security
program are trained, qualified, and
equipped to perform their unique duties
and responsibilities.
Section 73.54(c), Cyber Security
Program. This paragraph describes the
design components of the cyber security
program including controls, prevention,
defense-in-depth, and system
functionality. The cyber security
program must be designed to implement
security controls for protected digital
assets; apply and maintain defense-indepth protective strategies to ensure the
capability to detect, respond, and
recover from cyber attacks; and ensure
the functions of protected digital assets
are not adversely impacted due to cyber
attacks. With regard to § 73.54(c)(4), the
NRC requires that the cyber security
program be designed to ensure that the
intended function of the assets
identified by § 73.54(a)(1) and the
analysis required by § 73.54(b)(1) are
maintained.
With regard to § 73.54(c)(2), defensein-depth for digital computer and
communication systems and networks
includes technical and administrative
controls that are integrated and used to
mitigate threats from identified risks.
The need to back up data as part of a
defense-in-depth program is dependent
upon the nature of the data relative to
its use within the facility or system.
Defense-in-depth is achieved when (1)
a layered defensive model exists that
allows for detection and containment of
non-authorized activities occurring
within each layer, (2) each defensive
layer is protected from adjacent layers,
(3) protection mechanisms used for
isolation between layers employ diverse
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
technologies to mitigate common cause
failures, (4) the design and configuration
of the security architecture and
associated countermeasures creates the
capability to sufficiently delay the
advance of an adversary in order for
preplanned response actions to occur,
(5) no single points of failure exist
within the security strategy or design
that would render the entire security
solution invalid or ineffective, and (6)
effective disaster recovery capabilities
exist for protected systems.
The Commission’s intent for a
licensee’s cyber security program is that
a licensee or applicant implements
operational elements to address the
requirements of this rule but not
necessarily address such requirements
through the design of its facility.
However, as with other elements of a
licensee’s physical security program, an
applicant or licensee could consider
how these requirements could be
addressed through the design of its
facility, to the extent practicable, but
this is not required by the rule.
Section 73.54(d), Cyber-Related
Training, Risk and Modification
Management. This paragraph requires
licensees to develop, implement, and
maintain supporting programs within
the cyber security program. The
Commission requires licensees to
perform an analysis as identified in
§ 73.54(b)(1) for any newly installed
digital computer and communication
systems and network equipment
whether the new equipment is standalone or is installed to replace outdated
equipment.
To ensure that the measures used to
protect digital computer and
communication systems and networks
remain effective and continue to meet
high assurance expectations, the
licensee’s cyber security program must
evaluate and manage cyber risks.
Licensees must evaluate changes to
systems and networks when
modifications are proposed for
previously assessed systems and new
technology-related vulnerabilities not
previously analyzed in the original
baseline or periodic assessments that
would act to reduce the cyber security
environment of the system are
identified.
Section 73.54(e), Cyber Security Plan.
This paragraph establishes the
requirements for a written cyber
security plan that outlines the licensee’s
implementation of their program to
include incident response and recovery,
detection, response, mitigation,
vulnerabilities, and restoration. The
plan must describe how the
Commission requirements of this
section are implemented and must
PO 00000
Frm 00035
Fmt 4701
Sfmt 4700
13959
account for site-specific conditions that
affect implementation. Applicants for
combined license under part 52 of this
chapter should have sufficient
information available to prepare and
submit a plan as required by § 52.79.
Such plans will likely require updates
and revisions in accordance with
§ 50.54(p) as digital networks and
systems are better defined during a
plant’s specific design and construction.
The rule requires that the cyber security
incident response and recovery
measures will be part of the cyber
security plan.
Section 73.54(f), Policies and
Procedures. This paragraph establishes
requirements for licensees to have and
maintain written policies and
procedures for the implementation of
the cyber security plan. The
Commission does not intend for
licensees to submit policies,
implementing procedures, site-specific
analysis, and other supporting technical
information used by the licensee in
development of their cyber security
plan; however, such information must
be made available upon request by an
authorized representative of the NRC.
Section 73.54(g), Reviews. This
paragraph establishes the licensee
review requirements for the cyber
security program. The rule requires that
the cyber security program be reviewed
by the licensee on a periodic basis in
accordance with § 73.55(m).
Section 73.54(h), Records. This
paragraph establishes record retention
requirements for the cyber security
program. The rule requires that each
licensee will retain the technical
information associated with the assets
identified by § 73.54(b)(1) pertinent to
compliance with § 73.54.
J. Section 73.55, Requirements for
Physical Protection of Licensed
Activities in Nuclear Power Reactors
Against Radiological Sabotage
Section 73.55(a), Introduction. This
paragraph outlines the implementation,
plans, program, scope and applicability
of this section. The rule requires that
each licensee shall evaluate the security
plan changes needed to comply with the
amended requirements of the final rule.
Licensees are expected to make any
changes necessary to comply with the
final rule by March 31, 2010. It is up to
the licensee to determine the
appropriate mechanism to make those
changes whether it be as a change under
§ 50.54(p) or as a license amendment
pursuant to § 50.90. As noted earlier, it
is the Commission’s view that current
licensees are largely already in
compliance with the requirements in
this rule, and any changes that would be
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13960
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
necessitated by this final rule would not
decrease the effectiveness of current
licensee security plans, so in most
instances a change under § 50.54(p)
would be appropriate. However, the
Commission also acknowledges that,
based on site-specific conditions, a
limited number of plan changes might
require Commission review and
approval before implementation. In
such instances, licensees would be
expected to submit security plan
changes through license amendments or
requests for exemptions under § 73.5.
With respect to applicants who have
already submitted an application to the
Commission for an operating license or
combined license as of the effective date
of this rule, those applicants are
required to amend their applications to
the extent necessary to address the
requirements in this section.
Licensees are responsible for
maintaining physical protection in
accordance with Commission
regulations through the approved
security plans. Any departures from the
Commission’s regulations must be
specifically approved by the
Commission in accordance with
§§ 73.55(r) or 73.5. Upon the
Commission’s written approval, the
approved alternative measure or
exemption becomes legally binding as a
license condition in lieu of the specific
10 CFR requirement.
This paragraph establishes when an
applicant’s physical protection program
must be implemented. The receipt of
special nuclear material (SNM) in the
form of fuel assemblies onsite, (i.e. ,
within the licensee’s protected area) is
the event that subjects a licensee or
applicant to the requirements of this
rule, and it is the responsibility of the
applicant or licensee to complete the
preliminary and preparatory actions
required to implement an effective
physical protection program at the time
SNM is received onsite (within the
protected area).
Section 73.55(b), General
Performance Objective and
Requirements. This paragraph outlines
the general performance objective and
design requirements of the licensee
physical protection program. Licensees
are required to provide protection
against the design basis threat of
radiological sabotage. To accomplish
this, the physical protection program is
designed to prevent significant core
damage and spent fuel sabotage.
Significant core damage and spent fuel
sabotage can be measured through
accepted engineering standards, and
provide measurable performance criteria
that are essential to understanding the
definition of radiological sabotage. The
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
design requirement of this section also
requires licensees to conduct a sitespecific analysis that accounts for site
conditions and utilizes the integration
of systems, technologies, programs,
equipment, supporting processes, and
implementing procedures. The physical
protection program is supported by the
access authorization, cyber security, and
insider mitigation programs to meet the
performance object of this section. The
effectiveness of the physical protection
program specific to the licensee
protective strategy is measured through
implementation of the performance
evaluation program.
Section 73.55(c), Security plans. This
paragraph outlines the requirements for,
contents of, and protection of security
plans and implementing procedures.
The primary focus of the security plans
is to describe how the licensee will
satisfy Commission requirements to
include how site-specific conditions
affect the measures needed at each site
to ensure that the physical protection
program is effective. Security plans
include the physical security plan,
training and qualification plan,
safeguards contingency plan, and cyber
security plan. The cyber security plan is
subject to the same review and approval
process as the physical security plan,
training and qualification plan, and
safeguards contingency plan.
Section 73.55(d), Security
Organization. This paragraph outlines
the requirements for the composition,
equipping, and training of the security
organization. The intent is that the
security organization will focus upon
the effective implementation of the
physical protection program.
Individuals assigned to perform
physical protection or contingency
response duties must be trained,
equipped, and qualified in accordance
with appendix B to perform those
assigned duties and responsibilities
whether that individual is a member of
the security organization or not. The
rule requires that facility personnel,
who are not members of the security
organization, will be trained and
qualified for the specific physical
protection duties that they are assigned
which includes possessing the
knowledge, skills, abilities, and the
minimum physical qualifications.
Section 73.55(e), Physical Barriers.
This paragraph outlines the generic and
specific requirements for the design,
construction, placement, and function
of physical barriers. Physical barriers
are used to fulfill many functions within
the physical protection program, and
therefore, each physical barrier must be
designed and constructed to serve its
predetermined function within the
PO 00000
Frm 00036
Fmt 4701
Sfmt 4700
physical protection program. The rule
requires that each licensee will analyze
site-specific conditions to determine the
specific use, type, function,
construction, location, and placement of
physical barriers needed for the
implementation of the physical
protection program. This paragraph also
describes the requirements to maintain
the integrity of physical barriers through
the implementation of maintenance and
observation measures.
Section 73.55(f), Target Sets. This
paragraph provides requirements for the
development, documentation, and
periodic re-evaluation of target sets.
Target sets are a minimum combination
of equipment or operator actions which,
if prevented from performing their
intended safety function or prevented
from being accomplished, would likely
result in significant core damage (e.g. ,
non-incipient, non-localized fuel
melting, and/or core destruction) or a
loss of coolant and exposure of spent
fuel barring extraordinary actions by
plant operators. Credit for operator
actions will be given only if the
following criteria are met: (1) sufficient
time is available to implement these
actions, (2) environmental conditions
allow access where needed, (3)
adversary interference is precluded, (4)
any equipment needed to complete
these actions is available and ready for
use, (5) approved procedures exist
which have entering conditions outside
of severe accident mitigation guidelines
(SAMG) or equivalent, and (6) training
is conducted on the existing procedures
under conditions similar to the scenario
assumed. This rule requires each
licensee to implement a process for the
oversight of target set equipment,
systems, and configurations using
existing processes. This ensures that
changes made to the configuration of
target set equipment and modes of
operation are considered in the
licensee’s protective strategy. Target set
requirements include consideration of
the effects of cyber attacks and is
consistent with Commission
requirements for protection against the
design basis threat of radiological
sabotage stated in § 73.1.
Section 73.55(g), Access Controls.
This paragraph outlines the
requirements regarding access control
systems, devices, processes, and
procedures for personnel, vehicles, and
materials during normal and emergency
conditions. Access controls relative to
the owner controlled area, protected
area, and vital areas are specifically
addressed within this paragraph
including visitor and escort
requirements. The rule requires that the
licensee will ensure that all access
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
controls are performing as intended and
have not been compromised such that
no person, vehicle, or material is able to
gain unauthorized access beyond a
barrier.
With regard to escorts, the rule
requires that all escorts will be trained
to perform escort duties and that this
training may be accomplished through
existing processes, such as the General
Employee Training (personnel escort)
and/or the security Training and
Qualification Plan (vehicle escorts).
Personnel escorts are required to
maintain timely communication with
the security organization when
performing escort duties to summon
assistance if needed. Vehicle escorts are
required to maintain continuous
communication with the security
organization when performing escort
duties to summon assistance if needed.
Section 73.55(h), Search Programs.
This paragraph prescribes the search
requirements of personnel, vehicles, and
materials before granting access to the
owner controlled and protected areas
during normal and emergency
conditions. The rule requires that a
general description of the broad
categories of material that will be
excepted will be stated in the licensee
security plans with detailed
descriptions being identified in
implementation procedures.
Section 73.55(i), Detection and
Assessment Systems. This paragraph
delineates the requirements for
detection and assessment for operating
reactors and applicants as applied to the
physical protection program. Detection
and assessment are addressed together
as a consequence of their importance for
ensuring that an adequate response can
be initiated and completed as a result of
an alarm or through surveillance
observation and monitoring by security
personnel. Alarm stations are required
to possess the equipment needed for
detection, assessment, and
communication or otherwise implement
the protective strategy and maintain
these capabilities through
uninterruptible and secondary power
sources. In addition, the survivability
requirements for alarm stations
pertaining to a single act within the
capabilities of the design basis threat are
addressed in this paragraph. The
requirement to construct, locate, protect,
and equip both the central and
secondary alarm stations is applicable to
only applicants for an operating or
combined license that is issued after the
effective date of this final rule. The rule
requires that both alarms stations at
future facilities will be equal and
redundant.
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
Section 73.55(j), Communication
Requirements. This paragraph stipulates
the communication requirements for the
security organization during normal and
emergency conditions. The rule requires
that the licensee security organization
possesses and maintains the capability
for continuous communication with
internal security personnel, vehicle
escorts, local law enforcement
authorities, and the control room.
Section 73.55(k), Response
Requirements. This paragraph outlines
the provisions regarding the security
response organization’s structure,
liaison with local law enforcement
authorities, and measures to increase
the security posture under heightened
threat conditions. The rule requires that
each licensee will determine the
specific minimum number of armed
responders and armed security officers
needed to protect their facility and will
document this minimum number in
security plans. The threat warning
system is intended to provide preplanned enhancements to the licensee
physical protection program to be taken
upon notification by the NRC of a
heightened threat. The specific details
regarding response requirements are
addressed in appendix C of this part.
Section 73.55(l), Facilities Using
Mixed-Oxide (MOX) Fuel Assemblies
Containing Up to 20 Weight Percent
Plutonium Dioxide (PuO2). This
paragraph establishes the requirements
for the physical protection of MOX used
at nuclear power reactor facilities in
addition to the physical protection
program requirements addressed by this
section. These protective measures are
necessary to account for the type of
special nuclear material contained in
MOX fuel assemblies. These additional
requirements include measures for the
search and inspection of MOX fuel
assemblies, storage MOX fuel
assemblies, material control and
accounting, and controls for the use of
fuel handling equipment used for the
movement of MOX fuel assemblies.
Section 73.55(m), Security Program
Reviews. This paragraph establishes
requirements for the licensee’s review of
its physical protection programs. The
rule requires that each licensee will
review the physical protection program,
in its entirety, at least every 24 months
or less when significant changes are
made. The conduct of reviews, to
include audits is intended to provide a
level of assurance that each element of
the physical protection program is
performing as intended to satisfy
Commission requirements. Reviews also
ensure that any changes to site specific
conditions do not adversely impact the
capability of a given element to perform
PO 00000
Frm 00037
Fmt 4701
Sfmt 4700
13961
the intended function within the
physical protection program.
Section 73.55(n), Maintenance,
Testing, and Calibration. This paragraph
establishes requirements for the
maintenance, testing, and calibration
security equipment required to
implement the physical protection
program. The rule requires that each
licensee will perform maintenance,
testing, and calibration activities at
intervals required to ensure the
equipment is operating as intended. The
conduct of maintenance, testing, and
calibration activities is intended to
provide a level of assurance that
security equipment is performing within
acceptable parameters established to
support the physical protection program
and satisfy Commission requirements.
Specific intervals for maintenance,
testing, and calibration are determined
by the NRC and manufacturer
specifications.
Section 73.55(o), Compensatory
Measures. This paragraph establishes
requirements for the actions to be taken
by a licensee in response to a failure or
degradation of security equipment to
perform intended functions within the
physical protection program. The rule
requires that the licensee will identify
conditions where security equipment
has failed or is not operating as required
and initiates timely actions that ensure
the failure or degradation cannot be
exploited.
Section 73.55(p), Suspension of
Security Measures. This paragraph
establishes requirements for the
suspension of security measures in
response to emergency and
extraordinary conditions. Section
73.55(p)(1)(i) represents no change from
the previous suspension provision that
was described in former § 73.55(a). The
requirements of this paragraph are
intended to provide flexibility to a
licensee for taking reasonable actions
that depart from an approved security
plan in an emergency when such
actions are immediately needed to
protect the public health and safety and
no action consistent with license
conditions and technical specifications
that can provide adequate or equivalent
protection is immediately apparent in
accordance with § 50.54(x) and (y).
Therefore, the focus of § 73.55(p)(1)(i) is
on the suspension of security measures
for the protection of the public health
and safety.
In contrast, § 73.55(p)(1)(ii) has been
added to provide similar flexibility for
situations, such as during severe
weather incidents like hurricanes,
tornados, or floods when these actions
are immediately needed to protect the
personal health and safety of security
E:\FR\FM\27MRR2.SGM
27MRR2
13962
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
force personnel when no action
consistent with the license condition is
immediately apparent. Formerly,
suspensions of security measures to
protect security force personnel during
severe weather incidents would not
have been permitted by the regulations.
However, the same control mechanisms
apply to suspension invoked under
§ 73.55(p)(1)(ii) as described in
§ 50.54(y), including approval of, at a
minimum, a licensed senior operator.
Section 73.55(q), Records. This
paragraph establishes requirements for
the retention of documentation (reports,
records, and documents) associated
with licensee actions to satisfy
Commission requirements.
Section 73.55(r), Alternative
Measures. This paragraph establishes
provisions that allow the licensee the
ability to develop measures for the
protection against radiological sabotage
other than those specifically stated in
Commission requirements. Licensee
requests to employ such alternative
measures must be submitted to the
Commission for review and approval as
a license amendment in accordance
with § 50.90.
sroberts on PROD1PC70 with RULES
K. Section 73.56, Personnel Access
Authorization Requirements for Nuclear
Power Plants
Section 73.56 (a), Introduction. This
paragraph outlines the implementation,
scope and applicability of the access
authorization program and requires that
this program be described in the
licensee’s physical security plan.
Current licensees must be in compliance
with the requirements described in this
rule by March 31, 2010, including
updating their site-specific security
plans as applicable. Current licensees
should update their plans using one of
the processes described in 10 CFR
50.54(p), 10 CFR 50.90, or 10 CFR 73.5
as applicable. In addition, current
applicants for an operating license or
combined license as of the effective date
of this rule must update their
applications, as appropriate, to address
the requirements of this section. Section
73.56 retains the intent of the preexisting requirements that licensees
have the authority to grant or deny an
individual unescorted access, certify or
deny an individual unescorted access
authorization, or permit an individual to
maintain or terminate unescorted access
or unescorted access authorization.
Additionally, the Commission allows
applicants to certify or deny an
individual unescorted access
authorization status prior to receiving
its operating license under part 50 of
this chapter or before the Commission
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
makes its finding under 10 CFR
52.103(g).
A licensee or applicant may allow a
contractor or vendor to maintain certain
elements of the licensee’s or applicant’s
access authorization program if the
contractor or vendor complies with the
requirements of this section.
Additionally, a licensee or applicant
may permit a contractor or vendor to
maintain an individual’s unescorted
access authorization status if the
contractor’s or vendor’s access
authorization program includes the
licensee’s or applicant’s approved
behavioral observation program.
However, licensees and applicants are
responsible for meeting all of the
requirements set forth in this section
before granting an individual
unescorted access or certifying an
individual unescorted access
authorization.
Applicants for an operating license or
a combined license must incorporate
their access authorization program in
their physical security plan and
implement the access authorization
program before the receipt of special
nuclear material in the form of fuel
assemblies on site (i.e., within the
licensee’s protected area.)
Section 73.56(b), Individuals Subject
to the Access Authorization Program.
This paragraph identifies individuals
who shall be subject to the requirements
of an access authorization program to
ensure that each person granted
unescorted access and/or certified
unescorted access authorization is
trustworthy and reliable. The rule
requires that any individual who has
unescorted access to nuclear power
plant protected and vital areas shall be
subject to an access authorization
program that meets the requirements of
this section.
Section 73.56(c), General Performance
Objective. This paragraph stipulates that
the licensee’s or applicant’s access
authorization program must provide
high assurance that the individuals
subject to this section are trustworthy
and reliable such that they do not
constitute an unreasonable risk to
public health and safety or the common
defense and security including the
potential to commit radiological
sabotage.
Section 73.56(d), Background
Investigation. This paragraph outlines
the responsibilities and elements of the
background investigation process
including consent; personal,
employment, credit, and criminal
history; identity verification; and
character evaluation. As addressed with
respect to § 73.56(h)(5) and (h)(6), the
Commission permits licensees and
PO 00000
Frm 00038
Fmt 4701
Sfmt 4700
applicants to meet the requirements of
this section by relying on certain
background investigation elements,
psychological assessments, and
behavioral observation training
conducted by other licensees,
applicants, or contractor access
programs.
This provision reduces regulatory
burden by eliminating the need to
replicate access authorization program
elements that are still current according
to the time conditions specified in
§§ 73.56(h) and (i)(1).
Additionally, this paragraph requires
individuals to disclose personal history
information pertaining to the access
authorization program and associated
processes and requires licensees,
applicants, and contractors or vendors
to take steps to access information from
reliable sources to ensure that the
personal identifying information the
individual has provided is authentic
and accurate.
The rule requires licensees,
applicants, and contractors or vendors
to make available and disclose
information that they have collected if
contacted by another licensee,
applicant, or contractor or vendor who
has a release signed by the individual
who is applying for unescorted access or
unescorted access authorization.
Section 149 of the AEA provides the
Commission authority to require
individuals to be fingerprinted and to
obtain the FBI criminal history records
of only those individuals who are
seeking unescorted access to protected
or vital areas of a nuclear power plant.
For other individuals, the Commission
expects licensees and applicants to
obtain those individual’s criminal
records in accordance with
requirements set forth in
§ 73.56(k)(1)(ii).
Section 73.56(e), Psychological
Assessment. This paragraph outlines
requirements within the access
authorization program for conducting
psychological assessments on
individuals seeking unescorted access
or unescorted access authorization. The
purpose of the paragraph is to evaluate
the implications of an individual’s
psychological character on his or her
trustworthiness and reliability. The rule
requires that Individuals who are
applying for initial unescorted access or
unescorted access authorization, or who
have not maintained unescorted access
or unescorted access authorization for
greater than 365 days, be subjected to a
psychological assessment.
This paragraph establishes
requirements, standards, roles, and
responsibilities for individuals who
perform psychological assessments. A
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
licensed psychologist or psychiatrist
with proper clinical training and
experience must conduct the
psychological assessment in accordance
with the American Psychological
Association or the American Psychiatric
Association standards. This paragraph
establishes the responsibilities of those
conducting psychological assessments
to report the discovery of any
information, including a medical
condition, which could adversely
impact the fitness for duty or
trustworthiness and reliability of the
individual being accessed.
Section 73.56(f), Behavioral
Observation. This paragraph outlines
the roles and responsibilities of
licensees, applicants, contractors,
vendors, and individuals under the
behavioral observation program. The
purpose of the behavioral observation
program is to increase the likelihood
that potentially adverse behavior
patterns and actions are detected,
communicated, and evaluated before
there is an opportunity for such
behavior patterns or acts to result in
detrimental consequences. The rule
requires individuals under this program
to be trained to identify and report
questionable behavior patterns or
activities to his or her supervisor, other
management personnel, or the
reviewing official as designated in site
procedures and that this report be
promptly conveyed to the reviewing
official for evaluation.
Section 73.56(g), Self-Reporting of
Legal Actions. This paragraph outlines
the responsibilities for individuals to
self-report legal actions taken by a law
enforcement authority or court of law to
which the individual has been subject
that could result in incarceration or a
court order or that requires a court
appearance. This paragraph requires the
recipient of the report, if the recipient
is not the reviewing official, to promptly
convey the report to the reviewing
official who will then evaluate the
implications of those actions with
respect to the individual’s
trustworthiness and reliability.
Section 73.56(h), Granting Unescorted
Access and Certifying Unescorted
Access Authorization. This paragraph
defines the regulatory standard that
must be used by a licensee or applicant
for a determination of granting or
certifying unescorted access or
unescorted access authorization as well
as for reinstatement of unescorted
access or unescorted access
authorization. The requirements in this
paragraph, in part, are based upon
whether an individual has previously
been granted unescorted access or
certified unescorted access
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
authorization under a program subject
to the requirements of § 73.56 and the
elapsed time since the individual’s
unescorted access or unescorted access
authorization status was last favorably
terminated. Additionally, this paragraph
provides requirements for reestablishing trustworthiness and
reliability of those individuals whose
unescorted access or unescorted access
authorization was denied or terminated
unfavorably. Sections 73.56(h)(5) and
(6) permit licensees and applicants to
rely on other access authorization
programs that meet the requirements of
this section. In addition, these
provisions eliminate redundancies in
the steps required for granting
unescorted access or certifying
unescorted access authorization or
maintaining unescorted access or
unescorted access authorization.
Section 73.56(i), Maintaining
Unescorted Access or Unescorted
Access Authorization. This paragraph
delineates the conditions and
requirements for maintaining
unescorted access or unescorted access
authorization status. Important elements
of maintaining unescorted access or
unescorted access authorization status
are the behavioral observation program,
the reevaluation of criminal history and
credit history, and, for select
individuals who perform specific job
functions identified in § 73.56(i)(1)(B), a
psychological assessment.
To confirm each individual’s
continued trustworthiness and
reliability determination, the rule
requires licensees and applicants to
conduct updates and reevaluations
every five (5) years for individuals
granted unescorted access or certified
unescorted access authorization and
every three (3) years for selected
individuals. For selected individuals,
the rule requires licensees and
applicants to conduct psychological
reassessments every five (5) years.
Additionally, all individuals are
required to be subject to the licensee’s
behavioral observation program on a
daily basis to detect an individual’s
abnormal emotional and/or
psychological state through monitoring
and/or supervisory evaluation.
Section 73.56(j), Access to Vital
Areas. This paragraph requires that
access to vital areas be controlled
through the use of access authorization
lists to ensure that no one may enter
these vital areas without having a workrelated need and, when the need no
longer exists, access to the vital areas is
terminated.
The rule requires that access
authorization lists will be updated at
least every 31 days to minimize insider
PO 00000
Frm 00039
Fmt 4701
Sfmt 4700
13963
threats by ensuring that personnel listed
have a continued need to access vital
areas to perform their official duties and
not just a possibility of needing access
sometime in the future.
Section 73.56(k), Background
Screeners. This paragraph outlines
requirements to ensure that individuals
who collect, process, or have access to
sensitive personal information required
under this section are trustworthy and
reliable.
Background checks for these
individuals must be conducted in
accordance with the requirements of
this paragraph. The Commission
recognizes that licensees and applicants
may not, under Section 149 of the AEA,
obtain a fingerprint-based FBI criminal
history records check for an individual
who does not have or is not expected to
have unescorted access. In such cases,
local criminal history information about
the individual will be obtained from the
State or local court system to satisfy this
requirement.
Section 73.56(l), Review Procedures.
This paragraph outlines requirements
for responding to an individual’s
request for review of a determination to
deny unescorted access or unescorted
access authorization or unfavorable
termination of an individual’s
unescorted access or unescorted access
authorization.
Section 73.56(m), Protection of
Information. This paragraph outlines
requirements for the protection and
release of personal information
collected by a licensee, applicant,
contractor, or vendor to authorized
personnel. The rule requires that the
licensee, applicant, contractor, or
vendor possessing personal records will
promptly provide personal information
as authorized by the individual’s signed
consent. This may include an
individual’s representative and other
licensees or applicants. With regard to
revealing the sources of the information,
the rule requires that licensees,
applicants, contractors, and vendors
will maintain confidentiality of sources.
Section 73.56(n), Audits and
Corrective Action. This paragraph
outlines requirements for audits and
corrective action to confirm compliance
with the requirements of this section
and that comprehensive corrective
actions are taken in response to any
violations of the requirements of this
section identified from an audit. The
rule requires that licensees and
applicants will perform an audit of their
access authorization program at
intervals nominally every 24 months.
With regard to § 73.56(n)(1), the
Commission uses the term ‘‘nominally’’
which allows a 25 percent margin
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13964
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
consistent with the definition of
nominal in § 26.5, which provides
limited flexibility in meeting the
scheduled due date for completing this
recurrent activity. Completing a
recurrent activity at a nominal
frequency means that the activity may
be completed within a period that is 25
percent longer (30 months) or shorter
(18 months) than the period required,
with the next scheduled due date no
later than the current scheduled due
date plus the required frequency for
completing the activity.
With regard to the independence of
audit team members, the rule requires
that at least one person on an audit team
possess the requisite knowledge to
evaluate the holistic implications of
individual requirements or the
complexities associated with meeting
the final rule’s performance objective
and, therefore, can adequately evaluate
program effectiveness and is
independent of management having
responsibility for day-to-day operation
of the access authorization program.
In regard to § 73.56(n)(7), the rule
permits licensees and other entities to
jointly conduct audits as well as to rely
on one another’s audits, if the audits
upon which they are relying address the
services obtained from the contractor or
vendor by each of the sharing licensees
or applicants. The rule requires that
licensees, applicants, and contractors or
vendors relying on a shared audit to
ensure that all services and elements
upon which they rely have been
adequately audited and to make clear
that the licensees, applicants, and
contractors or vendors are responsible
for ensuring that an adequate audit is
conducted of any services or elements
upon which they rely that are not
adequately covered by the shared audit.
Section 73.56(o), Records. This
paragraph outlines requirements for the
retention, storage, and protection of
records required by this section.
Licensees, applicants, contractors, and
vendors must retain, store, and protect
records to ensure their availability and
integrity. In addition, this paragraph
provides requirements for how long the
licensee shall retain these records
according to the type of record or until
the completion of legal proceedings that
may arise as a result of an adjudication
of an application for unescorted access,
whichever is later. These requirements
also allow contractors and vendors to
retain records for which they are
responsible. Upon termination of a
contract between a contractor and a
licensee or applicant, the licensee or
applicant must retrieve all relevant
records that were accumulated by the
contractor throughout the period of the
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
contract. The rule requires that
corrected or new information will be
actively communicated by the recipient
to other licensees.
L. Section 73.58, Safety/Security
Interface Requirements for Nuclear
Power Reactors
Section 73.58 is a new requirement
added to part 73. This requirement
makes explicit, what was previously
implicitly required by the regulations
including that plant activities should
not adversely affect security activities
and that security activities should not
adversely affect plant safety (otherwise
licensees would fail to comply with the
governing requirements in the
applicable area). The new section is
added as a cost-justified, safety
enhancement per § 50.109(a)(3). As
discussed previously in Section II of
this document, the new requirements
were developed in response to a petition
for rulemaking (PRM–50–80) submitted
by the Union of Concerned Scientists
and the San Luis Obispo Mothers for
Peace that requested, in part, that the
Commission promulgate requirements
for licensees to evaluate proposed
changes, tests, or experiments to
determine whether such changes cause
a decrease in the protection against
radiological sabotage and to require
prior Commission approval for such
situations. Additionally, it stems from
the Commission’s comprehensive
review of its safeguards and security
programs and requirements and from
the Commission’s awareness that the
increased complexity of licensee
security measures now required in the
post September 11, 2001, security
environment could potentially increase
adverse interactions between safety and
security. Additionally, it is based on
plant events discussed in Commission
Information Notice 2005–33, ‘‘Managing
the Safety/Security Interface,’’ that
demonstrated that changes made to a
facility, its security plan, or
implementation of the plan can have
adverse effects if the changes are not
adequately assessed and managed. The
regulations, prior to § 73.58, did not
explicitly require communication about
the implementation and timing of
facility changes. The Commission
believes that § 73.58 promotes an
increased awareness of the effects of
changing conditions and results in
appropriate assessment and response.
The introductory text indicates this
section applies to power reactors
licensed under 10 CFR parts 50 or 52.
Paragraph (b) of this section requires
licensees to assess proposed changes to
plant configurations, facility conditions,
or security to identify potential adverse
PO 00000
Frm 00040
Fmt 4701
Sfmt 4700
effects on the capability of the licensee
to maintain either safety or security
before implementing those changes. The
assessment would be qualitative or
quantitative. If a potential adverse effect
is identified, the licensee is required to
take appropriate measures to manage
the potential adverse effect. Managing
the potential adverse effect is further
described in paragraph (d). The
requirements of § 73.58 are in addition
to requirements to assess proposed
changes and to manage potential
adverse effects contained in other
Commission regulations, and are not
intended to substitute for them. The
Commission recognizes that
implementation of § 73.58 would rely to
some extent on these existing programs
that manage facility changes and
configuration, and expects licensees to
incorporate § 73.58 into this structure.
The primary function of this rule is to
explicitly require that licensees consider
the potential for changes to cause
adverse interaction between security
and safety and to appropriately manage
any adverse results. Documentation of
assessments performed per paragraph
(b) is not required so as not to delay
plant or security actions unnecessarily.
Section 73.58(c) requires changes
identified by either planned or emergent
activities to be assessed by the licensee.
This requirement is not intended to
require licensees to assess all the dayto-day activities that are controlled by
facility work processes and
configuration management processes.
The Commission expects that licensees
would instead revise these processes to
preclude, to the extent practicable,
potential adverse interactions.
Paragraph (c) of this section provides a
description of typical activities for
which changes must be assessed and for
which resultant adverse interactions
must be managed.
Section 73.58(d) requires that, when
potential adverse interactions are
identified, licensees communicate the
potential adverse interactions to
appropriate licensee personnel. The
licensee is also required to take
appropriate compensatory and
mitigative actions to maintain safety and
security consistent with the applicable
Commission requirements. The
compensatory and/or mitigative actions
taken must be consistent with existing
requirements for the affected activity.
M. Part 73, Appendix B, General Criteria
for Protection
The title of this appendix reflects
training and qualification requirements
for the members of the security
organization and other facility
personnel who perform security related
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
duties at a nuclear power reactor
facility. The rule requires that
individuals who perform security
functions are trained and qualified prior
to performing security-related duties
and the training and qualification is
documented.
Part 73, Appendix B, Section VI.A,
General Requirements and Introduction.
This paragraph highlights the minimum
employment suitability and training and
qualification program requirements for
individuals selected to perform security
related functions. All individuals who
perform physical protection and/or
contingency response duties within the
security program must meet the
minimum training and qualification
requirements for their assigned duties as
specified within this appendix and the
Commission approved training and
qualification plan. The word
‘‘individuals’’ is used to identify
members of the security organization
and those facility personnel who are
assigned to perform physical protection
or contingency response duties within
the security program. Facility personnel
performing physical protection duties
need only meet the minimum training
and qualification requirements specified
within this appendix and the
Commission approved training and
qualification plan for the specific duty
assigned. Where requirements under
this appendix specifically apply to
members of the security organization
the language explicitly identifies this
applicability.
Part 73, Appendix B, Section VI.B,
Employment Suitability and
Qualification. This paragraph outlines
the minimum criteria that must be
evaluated by licensees for individuals
being considered for and performing
security-related duties. The minimum
criteria include education, criminal
history, and physical and psychological
standards.
The physical standards associated
with this paragraph reflect the basic
physical requirements that ensure an
individual possesses the standard acuity
levels associated with vision and
hearing and that the individual does not
have a medical condition that is
detrimental to the individual’s health or
the performance of assigned duties. The
standards posed are applicable to all
individuals who are assigned to perform
physical protection or contingency
response duties within the security
program, to include non-security
personnel assigned to perform physical
protection duties (such as vehicle escort
or material search). A licensed medical
professional is required to conduct a
medical examination before the
assignment of individuals to perform
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
security duties and/or the physical
fitness test being administered.
The physical fitness test, which is
required for armed individuals
implementing the contingency response
plan, is a performance-based test that
must be designed to demonstrate an
individual’s physical ability to perform
assigned security duties during
contingency events. Before engaging in
the physical fitness test, the individual’s
current health status must be verified by
the licensee. The licensee is also
required to confirm that there are no
existing medical conditions which
would be detrimental to the individual’s
health when placed under the physical
stress induced by the physical fitness
test. The licensed medical professional
provides a certification of the
individual’s health before the test, but is
not required to administer the physical
fitness test or document or attest to the
successful completion of the test.
Scheduling the physical fitness test for
each armed individual as soon as
possible after the date of the physical
examination required by paragraph
B.2.a(2) minimizes the possibility of the
individual incurring a medical
condition from the time of examination
to the time that the physical fitness test
is administered.
The Commission recognized that the
proposed suitability requirements for
security personnel found in appendix B
to part 73, criterion VI.B.1, were not
inclusive of the disqualifying criteria
found under the Gun Control Act of
1968 (GCA) (see 18 U.S.C. 922(g) and
(n)). This section describes a licensee’s
obligations to take those prohibitions
into account prior to permitting an
individual to serve as an armed security
officer.
The rule requires that a qualified
training instructor is responsible for the
final documentation of each security
critical task qualification that is
performed by individuals who are
assigned physical protection and/or
contingency response duties within the
security program. This paragraph also
enables members of the security
organization who are medically
disqualified from performing
contingency response duties or specific
physical protection duties for a period
of time, to perform other physical
protection duties that would not be
affected by the medical disqualification.
Part 73, Appendix B, Section VI.C,
Duty Training. This paragraph outlines
duty training and on-the-job training
requirements and focuses on the
knowledge, skills, and abilities needed
by individuals selected to perform
security duties. On the job training for
daily security duties may be conducted
PO 00000
Frm 00041
Fmt 4701
Sfmt 4700
13965
as a part of basic qualification training
that provides the individual with the
basic knowledge, skills and abilities of
assigned securities duties. In addition to
the on-the-job training previously
described, this paragraph describes the
development and implementation of 40
hours of on-the-job training to train the
security force in the response to
contingency events. It also captures both
the scope of conducting tactical
response drills and force-on-force
exercises as well as the importance of
individual performance by the members
of the security response organization.
The requirement is added to ensure that
individuals implementing the
safeguards contingency plan possess
first-hand knowledge of individual and
team response duties in accordance
with the licensee protective strategy.
Part 73, Appendix B, Section VI.C.3,
Performance Evaluation Program. This
paragraph outlines the establishment of
the performance evaluation program
including individual and group
requirements for security personnel
participation. The Commission’s intent
is that the licensee’s performance
evaluation program be evaluated during
the conduct of NRC security baseline
inspections including force-on-force
evaluations. The rule allows force-onforce exercises conducted to satisfy the
NRC triennial evaluation requirement to
be used to satisfy the annual force-onforce requirement for the personnel that
participate in the capacity of the
security response organization.
Part 73, Appendix B, Section VI.D,
Duty Qualification and Re-qualification.
This paragraph outlines the
qualification, re-qualification, and
periodicity requirements for armed and
unarmed individuals performing
security duties. The rule requires that
qualifications include written exams,
hands-on performance demonstrations,
and annual written exams where
applicable.
Part 73, Appendix B, Section VI.E,
Weapons Training. This paragraph
outlines the requirements for firearms
training, firearms instructor
qualifications, firearms familiarization
training, training program elements,
deadly force instruction, and weapons
training periodicity. The Commission’s
intent is to make generically applicable
requirements similar to those that were
contained in the 2003 training and
qualification order (EA–03–039) and
experience gained through security
program inspections and observations
and to apply language consistent with
the professional firearms community
more accurately. Additionally, a list of
common firearms practices are provided
to ensure appropriate weapons training
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13966
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
and qualification, safe handling, and
operations are achieved.
Part 73, Appendix B, Section VI.F,
Weapons Qualification and
Requalification Program. This
paragraph outlines the requirements for
general and tactical weapons
qualification, the types of qualification
courses, courses of fire, and firearms
requalification. These requirements are
substantially similar to the weapons
proficiency requirements that were
stipulated in the 2002 training and
qualification order and the commonlyaccepted minimum qualification scores
found in the firearms training
community for shotguns, hand guns,
semi-automatic and/or enhanced
weapons during both day and night
courses of fire.
Part 73, Appendix B, Section VI.G,
Weapons, Personal Equipment, and
Maintenance. This paragraph outlines
the weapons, as well as required and
optional personal equipment, for
individuals performing security-related
duties. The rule requires that the
equipment required by paragraph G.2.b
be readily accessible. The Commission
does not intend that the required
equipment necessarily be carried or
worn but intends that it be readily
available should the security officer
choose to wear it during a safeguards
contingency event. The Commission’s
intent is that the optional equipment
listed in paragraph G.2.c be considered
for implementation consistent with the
licensee’s protective strategy. The
paragraph also discusses the weapons
maintenance program and certified
armorer requirements. The armorer
must be certified by the weapons
manufacturer (or a contractor working
on behalf of the manufacturer) to
perform maintenance and repair of
licensee firearms. Licensees may use a
manufacturer’s armorer and certification
process or use a contractor certified by
the manufacturer as an armorer to
perform maintenance and repair of
licensee firearms.
Part 73, Appendix B, Section VI.H,
Records. This paragraph outlines the
documentation and records retention
requirements for security-related
training. The Commission’s intent is to
be consistent with the record keeping
and documentation requirements set
forth in § 73.55(r).
Part 73, Appendix B, Section VI.I,
Reviews. This paragraph outlines the
required reviews of security-related
training as set forth in § 73.55(n).
Part 73, Appendix B, Section VI.J,
Definitions. This paragraph is consistent
with the terms and definitions outlined
in parts 50, 70, and 73.
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
N. Part 73, Appendix C, Section II,
Nuclear Power Plant Safeguards
Contingency Plans
This section is revised to address
nuclear power reactor safeguards
contingency plan requirements without
impacting other licensees who are also
required to maintain safeguards
contingency plans (SCP).
Part 73, Appendix C, Section II.A
Introduction. This paragraph describes
the content of the SCP for nuclear power
reactors. Licensees must complete the
coordination of the predetermined
security force actions and non-security
response efforts to ensure that the
predetermined actions of the security
force can be effectively implemented
without conflict with the actions of
other onsite or offsite support agencies
responding to a safeguards contingency
event. The scope of the SCP is specific
to the security organization. However,
the safeguards contingency plan must be
integrated with other onsite and offsite
response plans and procedures. It is not
the Commission’s intent for the security
organization to be responsible for the
integrated response plan but rather to
ensure coordination with the integrated
response plan and other licensee
organizational elements.
Part 73, Appendix C, Section II.B,
Contents of the Plan. This paragraph
specifies the categories of information
required in a safeguards contingency
plan to be consistent with and
complement the requirements of
§ 50.34(d). The intent is to build a
common approach to documenting SCP
requirements and to improve the
usefulness and applicability of the SCP,
and to ensure that the SCP is
coordinated with non-security response
plans. The Commission does not intend
that the SCP include the details of other
site plans but rather intends to ensure
that the licensee has considered these
other plans and that potential conflicts
have been identified and resolved.
Part 73, Appendix C, Section II.B.1,
Background. This category of
information requires licensees to
identify perceived dangers, purpose,
scope, and general information in the
development and implementation of the
SCP. The intent is to document the
types of incidents that the plan covers,
goals and objectives of the plan for each
event, the physical protection elements
that support the plan, and the
coordination of response efforts by local
law enforcement agencies. The NRC
does not intend to expand the security
organization’s role or responsibilities to
encompass the functions of other
organizational elements. Planning
functions and responsibilities of other
PO 00000
Frm 00042
Fmt 4701
Sfmt 4700
licensee organizational elements are
addressed in §§ 50.54(gg), 50.47, and
part 50, appendix E.
Part 73, Appendix C, Section II.B.2,
Generic Planning Base. This category of
information establishes the criteria for
initiating and terminating responses to
safeguards contingency events. The
generic planning base must define
specific decisions, actions, expectations,
and supporting information needed to
respond to each type of incident. This
requirement focuses on the types of
actions or information that will prompt
the licensee to initiate and/or terminate
response activities as a result of an
actual or perceived threat to the facility.
Part 73, Appendix C, Section II.B.3,
Licensee Planning Base. This category of
information focuses on factors that
affect safeguards contingency planning
specific to each facility. The licensee
planning base must document the sitespecific organizational structure of the
security response organization, site
physical layout considerations,
safeguards systems, the protective
strategy, law enforcement assistance,
policy constraints and assumptions and
administrative and logistical
considerations that could have bearing
on the implementation of the licensee’s
SCP. While implementing details are
appropriate for procedures and need not
be included in the SCP, licensees are
expected to provide a sufficient level of
detail in the SCP for the information to
be meaningful. Within this category of
information, licensees must document
coordination with off-site entities and
explain how the level of protection
required by § 73.55(b) during safeguards
contingency events will be maintained.
In addition, licensees must ensure that
§ 73.58 information regarding safety and
security interface is considered in
contingency response planning.
Part 73, Appendix C, Section II.B.4,
Responsibility Matrix. This category of
information documents responsibilities
and specific actions to be taken by
licensee organizations and/or personnel
in response to safeguards contingency
events. The responsibility matrix must
document who will perform what
actions and make what decisions during
responses to safeguards contingency
events. The licensee SCP’s must discuss
how the matrix is incorporated into site
implementing procedures.
Part 73, Appendix C, Section II.B.5,
Implementing Procedures. This category
of information provides specific
guidance and operating details that
identify the actions to be taken and
decisions to be made by each member
of the security organization who is
assigned duties and responsibilities
required for the effective
E:\FR\FM\27MRR2.SGM
27MRR2
13967
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
implementation of the SCP. The
procedures must reflect detailed
information that supports the
implementation of the SCP. The
implementing procedures must contain
the tabulated responsibility matrix that
addresses each safeguards contingency
event outlined in the licensee’s generic
planning base.
Part 73, Appendix C, Section II.C,
Records and Reviews. This category of
information requires licensees to
maintain records and to conduct
reviews in accordance with the
requirements of § 73.55(n).
V. Guidance
The Commission is preparing new
regulatory guides that will contain
detailed guidance on the
implementation of the rule
requirements. These regulatory guides,
currently under development or already
issued in draft form for comment will
consolidate and update or eliminate
previous guidance that was used to
develop, review, and approve the power
reactor security plans that licensees
revised in response to the post-
September 11, 2001, security orders.
Development of the regulatory guides is
ongoing and the publication of the final
regulatory guides is planned shortly
after the publication of this final rule.
Some of these regulatory guides contain
Safeguards Information (SGI) or Official
Use Only—Security Related Information
(OUO–SRI) and will only be available to
those individuals with a need-to-know
and who are qualified to have access to
SGI or OUO–SRI as applicable. Where
appropriate, the requirements in this
final rule are adjusted to account for the
lack of final guidance (e.g., if the
guidance is needed to support a licensee
or applicant submittal, then the
submittal requirements are adjusted to
account for the lack of final guidance).
VI. Criminal Penalties
For the purposes of Section 223 of the
Atomic Energy Act of 1954, as amended
(AEA), the Commission is amending 10
CFR parts 50, 52, 72, and 73 under
Sections 161b, 161i, or 161o of the AEA.
Criminal penalties, as they apply to
regulations in part 50, are discussed in
§ 50.111. Criminal penalties, as they
apply to regulations in part 52, are
discussed in § 52.303. Criminal
penalties, as they apply to regulations in
part 73, are discussed in § 73.81. The
new §§ 50.54(hh), 73.54, and 73.58 are
issued under Sections 161b, 161i, or
161o of the AEA, and are not included
in § § 50.111, 52.303, and 73.81(b) as
applicable.
VII. Availability of Documents
The NRC is making the documents
identified below available to interested
persons through one or more of the
following methods:
Public Document Room (PDR). The
NRC Public Document Room is located
at 11555 Rockville Pike, Rockville,
Maryland.
Regulations.gov (Web). These
documents may be viewed and
downloaded electronically through the
Federal eRulemaking Portal https://
www.Regulations.gov, Dockets NRC–
2006–0016 and NRC–2008–0019.
NRC’s Electronic Reading Room
(ERR). The NRC’s public electronic
reading room is located at www.nrc.gov/
reading-rm.html.
Document
PDR
Web
ERR (ADAMS)
Environmental Assessment ...........................................................................................................................
Regulatory Analysis .......................................................................................................................................
Regulatory Analysis—appendices .................................................................................................................
Information Collection Analysis ......................................................................................................................
Comment Response document .....................................................................................................................
EA–03–086, ‘‘Revised Design Basis Threat Order,’’ issued April 29, 2003 (68 FR 24517; May 7, 2003)
[withheld as SGI and not publicly available.]*.
EA–02–026, (Interim Compensatory Measures (ICM) Order, ( issued February 25, 2002 (67 FR 9792;
March 4, 2002) [withheld as SGI and not publicly available.]*.
EA–02–261, (Issuance of Order for Compensatory Measures Related to Access Authorization, (issued
January 7, 2003 (68 FR 1643; January 13, 2003) [withheld as SGI and not publicly available.]*.
EA–03–039, (Issuance of Order for Compensatory Measures Related to Training Enhancements on Tactical and Firearms Proficiency and Physical Fitness Applicable to Armed Nuclear Power Plant Security
Force Personnel,’’ issued April 29, 2003 (68 FR 24514; May 7, 2003) [withheld as SGI and not publicly available.]*.
X
X
X
X
X
X
X
X
X
X
X
X
ML081640161
ML083390372
ML081680090
ML083530022
ML083390333
ML030740002
X
X
ML020520754
X
X
ML030060360
X
X
ML030980015
* The NRC references these documents only for purposes of the backfitting discussion in this rule.
sroberts on PROD1PC70 with RULES
VIII. Voluntary Consensus Standards
The National Technology Transfer
and Advancement Act of 1995, Public
Law 104–113, requires that Federal
agencies use technical standards that are
developed or adopted by voluntary
consensus standards bodies unless
using such a standard is inconsistent
with applicable law or is otherwise
impractical. The NRC is not aware of
any voluntary consensus standard that
could be used instead of the regulatory
guidance currently under development.
The NRC will consider using a
voluntary consensus standard if an
appropriate standard is identified.
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
IX. Finding of No Significant
Environmental Impact
The Commission has determined
under the National Environmental
Policy Act of 1969, as amended, and the
Commission’s regulations in Subpart A
of 10 CFR part 51, that this rule is not
a major Federal action significantly
affecting the quality of the human
environment, and therefore, an
environmental impact statement is not
required.
The determination of this
environmental assessment is that there
will be no significant offsite impact to
the public as a result of this action. The
NRC requested comment on the
environmental assessment. There were
no comments received. Availability of
PO 00000
Frm 00043
Fmt 4701
Sfmt 4700
the environmental assessment is
provided in section VII of this
document.
X. Paperwork Reduction Act Statement
This rule imposes new or amended
information collection requirements
contained in 10 CFR parts 50, 52, 72,
and 73, that are subject to the
Paperwork Reduction Act of 1995 (44
U.S.C. 3501, et seq.). These
requirements were approved by the
Office of Management and Budget,
approval numbers 3150–0011, 3150–
0151, 3150–0132, and 3150–0002.
The burden to the public for these
information collections is estimated to
average 4.38 hours per response. This
includes the time for reviewing
instructions, searching existing data
E:\FR\FM\27MRR2.SGM
27MRR2
13968
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
sources, gathering and maintaining the
data needed, and completing and
reviewing the information collection.
Send comments on any aspect of these
information collections, including
suggestions for reducing the burden, to
the Records and FOIA/Privacy Services
Branch (T–5–F53), U.S. Nuclear
Regulatory Commission, Washington,
DC 20555–0001, or by Internet
electronic mail to
INFOCOLLECTS.Resource@NRC.GOV;
and to the Desk Officer, Office of
Information and Regulatory Affairs,
NEOB–10202, (3150–0011; 3150–0151;
3150–0132; and 3150–0002), Office of
Management and Budget, Washington,
DC 20503 or by internet electronic mail
to Nathan J. Frey@omb.eop.gov.
XI. Regulatory Analysis
The Commission has prepared a
regulatory analysis of this regulation.
The analysis examines the costs and
benefits of the alternatives considered
by the Commission. Availability of the
regulatory analysis is provided in
Section VII of this document.
XII. Regulatory Flexibility Certification
In accordance with the Regulatory
Flexibility Act (5 U.S.C. 605(b)), the
Commission certifies that this rule does
not have a significant economic impact
on a substantial number of small
entities. This rule affects only the
licensing and operation of nuclear
power plants. The companies that own
these plants do not fall within the scope
of the definition of ‘‘small entities’’ set
forth in the Regulatory Flexibility Act or
the size standards established by the
NRC (10 CFR 2.810).
sroberts on PROD1PC70 with RULES
XIII. Backfit Analysis
With regard to the governing criteria
in § 50.109, this rulemaking contains
two different sets of requirements. The
first set of requirements in this
rulemaking are requirements similar to
those that were previously imposed
under one of the following orders issued
after September 11, 2001:
• EA–02–026, ‘‘Interim
Compensatory Measures (ICM) Order,’’
issued February 25, 2002 (March 4,
2002; 67 FR 9792);
• EA–02–261, ‘‘Access Authorization
Order,’’ issued January 7, 2003 (January
13, 2003; 68 FR 1643);
• EA–03–039, ‘‘Security Personnel
Training and Qualification
Requirements (Training) Order,’’ issued
April 29, 2003 (May 7, 2003; 68 FR
24514); and
• EA–03–086, ‘‘Revised Design Basis
Threat Order,’’ issued April 29, 2003
(May 7, 2003; 68 FR 24517).
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
For this first set of requirements, the
NRC has determined that they are not
backfitting as defined by § 50.109(a)(1),
and therefore, a backfit analysis is
unnecessary for these requirements.
Section 50.109(a)(1) defines backfitting
as ‘‘the modification or addition to
systems, structures, components or
design of a facility * * * or the
procedures or organization required to
design, construct or operate a facility;
any of which may result from a new or
amended provision in the Commission
rules * * *.’’ This first set of
requirements in the final rule contains
numerous requirements substantially
similar to those previously imposed by
the orders identified above. In some
cases, more specific detail may have
been provided in this final rule for a
particular requirement that corresponds
with a requirement that had previously
been in an order. The provisions in this
first set impose requirements that are
substantially similar to those previously
imposed to current licensees under the
orders and are consistent with the
implementing guidance that has been
issued to licensees subsequent to the
orders. Therefore, the first set of
requirements do not constitute backfits
as defined by the rule because they
would not result in a modification or
addition to any systems, structures,
components or design of an affected
facility, or the procedures or
organization required to design,
construct, or operate an affected facility.
In any event, the Commission has also
determined that the requirements
represented in this first set are those
necessary to ensure that these facilities
provide adequate protection to the
health and safety of the public and are
in accord with common defense and
security. Therefore, no backfit analysis
has been prepared with respect to these
requirements.
The second set of requirements in this
rulemaking are additions that do
constitute backfits. The NRC evaluated
the second set of requirements in the
aggregate in accordance with § 50.109 to
determine if the costs of implementing
the rule would be justified by a
substantial increase in public health and
safety or common defense and security.
The NRC finds that qualitative safety
benefits of the provisions that qualify as
backfits in this rulemaking, considered
in the aggregate, would constitute a
substantial increase in protection to
public health and safety and the
common defense and security and that
the costs of this rule would be justified
in view of the increase in protection to
safety and security provided by the
backfits embodied in the proposed rule.
PO 00000
Frm 00044
Fmt 4701
Sfmt 4700
The backfit analysis is contained within
section 4.2 of the regulatory analysis.
Availability of the regulatory analysis is
provided in section VII of this
document.
XIV. Congressional Review Act
Under the Congressional Review Act
of 1996, the NRC has determined that
this action is a major rule and has
verified this determination with the
Office of Information and Regulatory
Affairs of the Office of Management and
Budget.
List of Subjects
10 CFR Part 50
Antitrust, Classified information,
Criminal penalties, Fire protection,
Intergovernmental relations, Nuclear
power plants and reactors, Radiation
protection, Reactor siting criteria,
Reporting and recordkeeping
requirements.
10 CFR Part 52
Administrative practice and
procedure, Antitrust, Backfitting,
Combined license, Early site permit,
Emergency planning, Fees, Inspection,
Limited work authorization, Nuclear
power plants and reactors, Probabilistic
risk assessment, Prototype, Reactor
siting criteria, Redress of site, Reporting
and recordkeeping requirements,
Standard design, Standard design
certification.
10 CFR Part 72
Administrative practice and
procedure, Criminal penalties,
Manpower training programs, Nuclear
materials, Occupational safety and
health, Penalties, Radiation protection,
Reporting and recordkeeping
requirements, Security measures, Spent
fuel, Whistleblowing.
10 CFR Part 73
Criminal penalties, Export, Hazardous
materials transportation, Import,
Nuclear materials, Nuclear power plants
and reactors, Reporting and
recordkeeping requirements, Security
measures.
For the reasons set out in the
preamble and under the authority of the
AEA, as amended; the Energy
Reorganization Act of 1974, as
amended; 5 U.S.C. 552 and 5 U.S.C. 553;
the NRC is adopting the following
amendments to 10 CFR parts 50, 52, 72,
and 73.
■
E:\FR\FM\27MRR2.SGM
27MRR2
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
PART 50—DOMESTIC LICENSING OF
PRODUCTION AND UTILIZATION
FACILITIES
1. The authority citation for part 50
continues to read as follows:
■
Authority: Secs. 102, 103, 104, 105, 161,
182, 183, 186, 189, 68 Stat. 936, 937, 938,
948, 953, 954, 955, 956, as amended, sec.
234, 83 Stat. 444, as amended (42 U.S.C.
2132, 2133, 2134, 2135, 2201, 2232, 2233,
2236, 2239, 2282); secs. 201, as amended,
202, 206, 88 Stat. 1242, as amended, 1244,
1246 (42 U.S.C. 5841, 5842, 5846); sec. 1704,
112 Stat. 2750 (44 U.S.C. 3504 note); Energy
Policy Act of 2005, Public Law 109–58, 119
Stat. 194 (2005). Section 50.7 also issued
under Public Law 95–601, sec. 10, 92 Stat.
2951 as amended by Public Law 102–486,
sec. 2902, 106 Stat. 3123 (42 U.S.C. 5841).
Section 50.10 also issued under secs. 101,
185, 68 Stat. 955, as amended (42 U.S.C.
2131, 2235); sec. 102, Public Law 91–190, 83
Stat. 853 (42 U.S.C. 4332). Sections 50.13,
50.54(dd), and 50.103 also issued under sec.
108, 68 Stat. 939, as amended (42 U.S.C.
2138).
Sections 50.23, 50.35, 50.55, and 50.56 also
issued under sec. 185, 68 Stat. 955 (42 U.S.C.
2235). Sections 50.33a, 50.55a and appendix
Q also issued under sec. 102, Public Law 91–
190, 83 Stat. 853 (42 U.S.C. 4332). Sections
50.34 and 50.54 also issued under sec. 204,
88 Stat. 1245 (42 U.S.C. 5844). Sections
50.58, 50.91, and 50.92 also issued under
Public Law 97–415, 96 Stat. 2073 (42 U.S.C.
2239). Section 50.78 also issued under sec.
122, 68 Stat. 939 (42 U.S.C. 2152). Sections
50.80–50.81 also issued under sec. 184, 68
Stat. 954, as amended (42 U.S.C. 2234).
Appendix F also issued under sec. 187, 68
Stat. 955 (42 U.S.C. 2237).
2. In § 50.34, footnote 9 is removed
and reserved, paragraphs (c), (d) and (e)
are revised, and paragraph (i) is added
to read as follows:
■
§ 50.34 Contents of construction permit
and operating license applications;
technical information.
sroberts on PROD1PC70 with RULES
*
*
*
*
*
(c) Physical security plan. (1) Each
applicant for an operating license for a
production or utilization facility that
will be subject to §§ 73.50 and 73.60 of
this chapter must include a physical
security plan.
(2) Each applicant for an operating
license for a utilization facility that will
be subject to the requirements of § 73.55
of this chapter must include a physical
security plan, a training and
qualification plan in accordance with
the criteria set forth in appendix B to
part 73 of this chapter, and a cyber
security plan in accordance with the
criteria set forth in § 73.54 of this
chapter.
(3) The physical security plan must
describe how the applicant will meet
the requirements of part 73 of this
chapter (and part 11 of this chapter, if
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
applicable, including the identification
and description of jobs as required by
§ 11.11(a) of this chapter, at the
proposed facility). Security plans must
list tests, inspections, audits, and other
means to be used to demonstrate
compliance with the requirements of 10
CFR parts 11 and 73, if applicable.
(d) Safeguards contingency plan. (1)
Each application for a license to operate
a production or utilization facility that
will be subject to §§ 73.50 and 73.60 of
this chapter must include a licensee
safeguards contingency plan in
accordance with the criteria set forth in
section I of appendix C to part 73 of this
chapter. The ‘‘implementation
procedures’’ required per section I of
appendix C to part 73 of this chapter do
not have to be submitted to the
Commission for approval.
(2) Each application for a license to
operate a utilization facility that will be
subject to § 73.55 of this chapter must
include a licensee safeguards
contingency plan in accordance with
the criteria set forth in section II of
appendix C to part 73 of this chapter.
The ‘‘implementing procedures’’
required in section II of appendix C to
part 73 of this chapter do not have to be
submitted to the Commission for
approval.
(e) Protection against unauthorized
disclosure. Each applicant for an
operating license for a production or
utilization facility, who prepares a
physical security plan, a safeguards
contingency plan, a training and
qualification plan, or a cyber security
plan, shall protect the plans and other
related Safeguards Information against
unauthorized disclosure in accordance
with the requirements of § 73.21 of this
chapter.
*
*
*
*
*
(i) A description and plans for
implementation of the guidance and
strategies intended to maintain or
restore core cooling, containment, and
spent fuel pool cooling capabilities
under the circumstances associated with
the loss of large areas of the plant due
to explosions or fire as required by
§ 50.54(hh)(2) of this chapter.
■ 3. In § 50.54, paragraph (p)(1) is
revised and paragraph (hh) is added to
read as follows:
§ 50.54
Conditions of licenses.
*
*
*
*
*
(p)(1) The licensee shall prepare and
maintain safeguards contingency plan
procedures in accordance with
appendix C of part 73 of this chapter for
affecting the actions and decisions
contained in the Responsibility Matrix
of the safeguards contingency plan. The
licensee may not make a change which
PO 00000
Frm 00045
Fmt 4701
Sfmt 4700
13969
would decrease the effectiveness of a
physical security plan, or guard training
and qualification plan, or cyber security
plan prepared under § 50.34(c) or
§ 52.79(a), or part 73 of this chapter, or
of the first four categories of information
(Background, Generic Planning Base,
Licensee Planning Base, Responsibility
Matrix) contained in a licensee
safeguards contingency plan prepared
under § 50.34(d) or § 52.79(a), or part 73
of this chapter, as applicable, without
prior approval of the Commission. A
licensee desiring to make such a change
shall submit an application for
amendment to the licensee’s license
under § 50.90.
*
*
*
*
*
(hh) (1) Each licensee shall develop,
implement and maintain procedures
that describe how the licensee will
address the following areas if the
licensee is notified of a potential aircraft
threat:
(i) Verification of the authenticity of
threat notifications;
(ii) Maintenance of continuous
communication with threat notification
sources;
(iii) Contacting all onsite personnel
and applicable offsite response
organizations;
(iv) Onsite actions necessary to
enhance the capability of the facility to
mitigate the consequences of an aircraft
impact;
(v) Measures to reduce visual
discrimination of the site relative to its
surroundings or individual buildings
within the protected area;
(vi) Dispersal of equipment and
personnel, as well as rapid entry into
site protected areas for essential onsite
personnel and offsite responders who
are necessary to mitigate the event; and
(vii) Recall of site personnel.
(2) Each licensee shall develop and
implement guidance and strategies
intended to maintain or restore core
cooling, containment, and spent fuel
pool cooling capabilities under the
circumstances associated with loss of
large areas of the plant due to
explosions or fire, to include strategies
in the following areas:
(i) Fire fighting;
(ii) Operations to mitigate fuel
damage; and
(iii) Actions to minimize radiological
release.
(3) This section does not apply to a
nuclear power plant for which the
certifications required under § 50.82(a)
or § 52.110(a)(1) of this chapter have
been submitted.
E:\FR\FM\27MRR2.SGM
27MRR2
13970
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
PART 52—LICENSES,
CERTIFICATIONS, AND APPROVALS
FOR NUCLEAR POWER PLANTS
4. The authority citation for part 52
continues to read as follows:
■
Authority: Secs. 103, 104, 161, 182, 183,
186, 189, 68 Stat. 936, 948, 953, 954, 955,
956, as amended, sec. 234, 83 Stat. 444, as
amended (42 U.S.C. 2133, 2201, 2232, 2233,
2236, 2239, 2282); secs. 201, 202, 206, 88
Stat. 1242, 1244, 1246, as amended (42 U.S.C.
5841, 5842, 5846); sec. 1704, 112 Stat. 2750
(44 U.S.C. 3504 note), Energy Policy Act of
2005, Public Law No. 109–58, 119 Stat. 594
(2005).
5. In § 52.79, paragraphs (a)(36)(iii)
and (iv) are redesignated as paragraphs
(a)(36)(iv) and (v), respectively, and
revised, and a new paragraph (a)(36)(iii)
is added to read as follows:
■
§ 52.79 Contents of applications; technical
information in final safety analysis report.
(a) * * *
(36) * * *
(iii) A cyber security plan in
accordance with the criteria set forth in
§ 73.54 of this chapter;
(iv) A description of the
implementation of the safeguards
contingency plan, training and
qualification plan, and cyber security
plan; and
(v) Each applicant who prepares a
physical security plan, a safeguards
contingency plan, a training and
qualification plan, or a cyber security
plan, shall protect the plans and other
related Safeguards Information against
unauthorized disclosure in accordance
with the requirements of § 73.21 of this
chapter.
*
*
*
*
*
■ 6. In § 52.80, paragraph (d) is added to
read as follows:
§ 52.80 Contents of applications;
additional technical information.
*
*
*
*
(d) A description and plans for
implementation of the guidance and
strategies intended to maintain or
restore core cooling, containment, and
spent fuel pool cooling capabilities
under the circumstances associated with
the loss of large areas of the plant due
to explosions or fire as required by
§ 50.54(hh)(2) of this chapter.
sroberts on PROD1PC70 with RULES
*
PART 72—LICENSING
REQUIREMENTS FOR THE
INDEPENDENT STORAGE OF SPENT
NUCLEAR FUEL, HIGH-LEVEL
RADIOACTIVE WASTE, AND
REACTOR-RELATED GREATER THAN
CLASS C WASTE
7. The authority citation for part 72
continues to read as follows:
■
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
Authority: Secs. 51, 53, 57, 62, 63, 65, 69,
81, 161, 182, 183, 184, 186, 187, 189, 68 Stat.
929, 930, 932, 933, 934, 935, 948, 953, 954,
955, as amended, sec. 234, 83 Stat. 444, as
amended (42 U.S.C. 2071, 2073, 2077, 2092,
2093, 2095, 2099, 2111, 2201, 2232, 2233,
2234, 2236, 2237, 2238, 2282); sec. 274,
Public Law 86–373, 73 Stat. 688, as amended
(42 U.S.C. 2021); sec. 201, as amended, 202,
206, 88 Stat. 1242, as amended, 1244, 1246
(42 U.S.C. 5841, 5842, 5846); Public Law 95–
601, sec. 10, 92 Stat. 2951 as amended by
Public Law 102–486, sec. 7902, 106 Stat.
3123 (42 U.S.C. 5851); sec. 102, Public Law
91–190, 83 Stat. 853 (42 U.S.C. 4332); secs.
131, 132, 133, 135, 137, 141, Public Law 97–
425, 96 Stat. 2229, 2230, 2232, 2241, sec. 148,
Public Law 100–203, 101 Stat. 1330–235 (42
U.S.C. 10151, 10152, 10153, 10155, 10157,
10161, 10168); sec. 1704, 112 Stat. 2750 (44
U.S.C. 3504 note); Energy Policy Act of 2005,
Public Law 109–58, 119 Stat. 549 (2005).
Section 72.44(g) also issued under secs.
142(b) and 148(c), (d), Public Law 100–203,
101 Stat. 1330–232, 1330–236 (42 U.S.C.
10162(b), 10168(c), (d)). Section 72.46 also
issued under sec. 189, 68 Stat. 955 (42 U.S.C.
2239); sec. 134, Public Law 97–425, 96 Stat.
2230 (42 U.S.C. 10154). Section 72.96(d) also
issued under sec. 145(g), Public Law 100–
203, 101 Stat. 1330–235 (42 U.S.C. 10165(g)).
Subpart J also issued under secs. 2(2), 2(15),
2(19), 117(a), 141(h), Public Law 97–425, 96
Stat. 2202, 2203, 2204, 2222, 2224 (42 U.S.C.
10101, 10137(a), 10161(h)).
Subparts K and L are also issued under sec.
133, 98 Stat. 2230 (42 U.S.C. 10153) and sec.
218(a), 96 Stat. 2252 (42 U.S.C. 10198).
8. In § 72.212, paragraphs (b)(5)(ii),
(b)(5(iii), (b)(5)(iv), and (b)(5)(v) are
revised to read as follows:
■
§ 72.212 Conditions of general license
issued under § 72.210.
*
*
*
*
*
(b) * * *
(5) * * *
(ii) Storage of spent fuel must be
within a protected area, in accordance
with § 73.55(e) of this chapter, but need
not be within a separate vital area.
Existing protected areas may be
expanded or new protected areas added
for the purpose of storage of spent fuel
in accordance with this general license.
(iii) For purposes of this general
license, personnel searches required by
§ 73.55(h) of this chapter before
admission to a new protected area may
be performed by physical pat-down
searches of persons in lieu of firearms
and explosives detection equipment.
(iv) The observational capability
required by § 73.55(i)(3) of this chapter
as applied to a new protected area may
be provided by a guard or watchman on
patrol in lieu of video surveillance
technology.
(v) For the purpose of this general
license, the licensee is exempt from
requirements to interdict and neutralize
threats in § 73.55 of this chapter.
*
*
*
*
*
PO 00000
Frm 00046
Fmt 4701
Sfmt 4700
PART 73—PHYSICAL PROTECTION OF
PLANTS AND MATERIALS
9. The authority citation for part 73
continues to read as follows:
■
Authority: Secs. 53, 161, 149, 68 Stat. 930,
948, as amended, sec. 147, 94 Stat. 780 (42
U.S.C. 2073, 2167, 2169, 2201): sec. 201, as
amended, 204, 88 Stat. 1242, as amended,
1245, sec. 1701, 106 Stat. 2951, 2952, 2953
(42 U.S.C. 5841, 5844, 2297f); sec.1704, 112
Stat. 2750 (44 U.S.C. 3504 note): Energy
Policy Act of 2005, Public Law 109–58, 119
Stat. 594 (2005).
Section 73.1 also issued under sec. 135,
141, Public Law 97–425, 96 Stat. 2232, 2241
(42 U.S.C, 10155, 10161). Section 73.37(f)
also issued under sec. 301, Public Law 96–
295, 94 Stat.789 (42 U.S.C. 5841 note).
Section 73.57 is issued under sec. 606, Public
Law 99–399, 100 Stat. 876 (42 U.S.C. 2169).
10. In § 73.8, paragraph (b) is revised
and paragraph (c) is added to read as
follows:
■
§ 73.8 Information collection
requirements: OMB approval.
*
*
*
*
*
(b) The approved information
collection requirements contained in
this part appear in §§ 73.5, 73.20, 73.21,
73.24, 73.25, 73.26, 73.27, 73.37, 73.40,
73.45, 73.46, 73.50, 73.54, 73.55, 73.56,
73.57, 73.58, 73.60, 73.67, 73.70, 73.71,
73.72, 73.73, 73.74, and Appendices B,
C, and G to this part.
(c) This part contains information
collection requirements in addition to
those approved under the control
number specified in paragraph (a) of
this section. The information collection
requirement and the control numbers
under which it is approved are as
follows:
(1) In § 73.71, NRC Form 366 is
approved under control number 3150–
0104.
(2) [Reserved]
■ 11. Section 73.54 is added to read as
follows:
§ 73.54 Protection of digital computer and
communication systems and networks.
By November 23, 2009 each licensee
currently licensed to operate a nuclear
power plant under part 50 of this
chapter shall submit, as specified in
§ 50.4 and § 50.90 of this chapter, a
cyber security plan that satisfies the
requirements of this section for
Commission review and approval. Each
submittal must include a proposed
implementation schedule.
Implementation of the licensee’s cyber
security program must be consistent
with the approved schedule. Current
applicants for an operating license or
combined license who have submitted
their applications to the Commission
prior to the effective date of this rule
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
must amend their applications to
include a cyber security plan consistent
with this section.
(a) Each licensee subject to the
requirements of this section shall
provide high assurance that digital
computer and communication systems
and networks are adequately protected
against cyber attacks, up to and
including the design basis threat as
described in § 73.1.
(1) The licensee shall protect digital
computer and communication systems
and networks associated with:
(i) Safety-related and important-tosafety functions;
(ii) Security functions;
(iii) Emergency preparedness
functions, including offsite
communications; and
(iv) Support systems and equipment
which, if compromised, would
adversely impact safety, security, or
emergency preparedness functions.
(2) The licensee shall protect the
systems and networks identified in
paragraph (a)(1) of this section from
cyber attacks that would:
(i) Adversely impact the integrity or
confidentiality of data and/or software;
(ii) Deny access to systems, services,
and/or data; and
(iii) Adversely impact the operation of
systems, networks, and associated
equipment.
(b) To accomplish this, the licensee
shall:
(1) Analyze digital computer and
communication systems and networks
and identify those assets that must be
protected against cyber attacks to satisfy
paragraph (a) of this section,
(2) Establish, implement, and
maintain a cyber security program for
the protection of the assets identified in
paragraph (b)(1) of this section; and
(3) Incorporate the cyber security
program as a component of the physical
protection program.
(c) The cyber security program must
be designed to:
(1) Implement security controls to
protect the assets identified by
paragraph (b)(1) of this section from
cyber attacks;
(2) Apply and maintain defense-indepth protective strategies to ensure the
capability to detect, respond to, and
recover from cyber attacks;
(3) Mitigate the adverse affects of
cyber attacks; and
(4) Ensure that the functions of
protected assets identified by paragraph
(b)(1) of this section are not adversely
impacted due to cyber attacks.
(d) As part of the cyber security
program, the licensee shall:
(1) Ensure that appropriate facility
personnel, including contractors, are
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
aware of cyber security requirements
and receive the training necessary to
perform their assigned duties and
responsibilities.
(2) Evaluate and manage cyber risks.
(3) Ensure that modifications to
assets, identified by paragraph (b)(1) of
this section, are evaluated before
implementation to ensure that the cyber
security performance objectives
identified in paragraph (a)(1) of this
section are maintained.
(e) The licensee shall establish,
implement, and maintain a cyber
security plan that implements the cyber
security program requirements of this
section.
(1) The cyber security plan must
describe how the requirements of this
section will be implemented and must
account for the site-specific conditions
that affect implementation.
(2) The cyber security plan must
include measures for incident response
and recovery for cyber attacks. The
cyber security plan must describe how
the licensee will:
(i) Maintain the capability for timely
detection and response to cyber attacks;
(ii) Mitigate the consequences of cyber
attacks;
(iii) Correct exploited vulnerabilities;
and
(iv) Restore affected systems,
networks, and/or equipment affected by
cyber attacks.
(f) The licensee shall develop and
maintain written policies and
implementing procedures to implement
the cyber security plan. Policies,
implementing procedures, site-specific
analysis, and other supporting technical
information used by the licensee need
not be submitted for Commission review
and approval as part of the cyber
security plan but are subject to
inspection by NRC staff on a periodic
basis.
(g) The licensee shall review the cyber
security program as a component of the
physical security program in accordance
with the requirements of § 73.55(m),
including the periodicity requirements.
(h) The licensee shall retain all
records and supporting technical
documentation required to satisfy the
requirements of this section as a record
until the Commission terminates the
license for which the records were
developed, and shall maintain
superseded portions of these records for
at least three (3) years after the record
is superseded, unless otherwise
specified by the Commission.
■ 12. Section 73.55 is revised to read as
follows:
PO 00000
Frm 00047
Fmt 4701
Sfmt 4700
13971
§ 73.55 Requirements for physical
protection of licensed activities in nuclear
power reactors against radiological
sabotage.
(a) Introduction. (1) By March 31,
2010, each nuclear power reactor
licensee, licensed under 10 CFR part 50,
shall implement the requirements of
this section through its Commissionapproved Physical Security Plan,
Training and Qualification Plan,
Safeguards Contingency Plan, and Cyber
Security Plan referred to collectively
hereafter as ‘‘security plans.’’ Current
applicants for an operating license
under 10 CFR part 50, or combined
license under 10 CFR part 52 who have
submitted their applications to the
Commission prior to the effective date
of this rule must amend their
applications to include security plans
consistent with this section.
(2) The security plans must identify,
describe, and account for site-specific
conditions that affect the licensee’s
capability to satisfy the requirements of
this section.
(3) The licensee is responsible for
maintaining the onsite physical
protection program in accordance with
Commission regulations through the
implementation of security plans and
written security implementing
procedures.
(4) Applicants for an operating license
under the provisions of part 50 of this
chapter or holders of a combined license
under the provisions of part 52 of this
chapter, shall implement the
requirements of this section before fuel
is allowed onsite (protected area).
(5) The Tennessee Valley Authority
Watts Bar Nuclear Plant, Unit 2, holding
a current construction permit under the
provisions of part 50 of this chapter,
shall meet the revised requirements in
paragraphs (a) through (r) of this section
as applicable to operating nuclear power
reactor facilities.
(6) Applicants for an operating license
under the provisions of part 50 of this
chapter, or holders of a combined
license under the provisions of part 52
of this chapter that do not reference a
standard design certification or
reference a standard design certification
issued after May 26, 2009 shall meet the
requirement of § 73.55(i)(4)(iii).
(b) General performance objective and
requirements. (1) The licensee shall
establish and maintain a physical
protection program, to include a
security organization, which will have
as its objective to provide high
assurance that activities involving
special nuclear material are not inimical
to the common defense and security and
do not constitute an unreasonable risk
to the public health and safety.
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13972
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
(2) To satisfy the general performance
objective of paragraph (b)(1) of this
section, the physical protection program
must protect against the design basis
threat of radiological sabotage as stated
in § 73.1.
(3) The physical protection program
must be designed to prevent significant
core damage and spent fuel sabotage.
Specifically, the program must:
(i) Ensure that the capabilities to
detect, assess, interdict, and neutralize
threats up to and including the design
basis threat of radiological sabotage as
stated in § 73.1, are maintained at all
times.
(ii) Provide defense-in-depth through
the integration of systems, technologies,
programs, equipment, supporting
processes, and implementing
procedures as needed to ensure the
effectiveness of the physical protection
program.
(4) The licensee shall analyze and
identify site-specific conditions,
including target sets, that may affect the
specific measures needed to implement
the requirements of this section and
shall account for these conditions in the
design of the physical protection
program.
(5) Upon the request of an authorized
representative of the Commission, the
licensee shall demonstrate the ability to
meet Commission requirements through
the implementation of the physical
protection program, including the
ability of armed and unarmed personnel
to perform assigned duties and
responsibilities required by the security
plans and licensee procedures.
(6) The licensee shall establish,
maintain, and implement a performance
evaluation program in accordance with
appendix B to this part, to demonstrate
and assess the effectiveness of armed
responders and armed security officers
to implement the licensee’s protective
strategy.
(7) The licensee shall establish,
maintain, and implement an access
authorization program in accordance
with § 73.56 and shall describe the
program in the Physical Security Plan.
(8) The licensee shall establish,
maintain, and implement a cyber
security program in accordance with
§ 73.54.
(9) The licensee shall establish,
maintain, and implement an insider
mitigation program and shall describe
the program in the Physical Security
Plan.
(i) The insider mitigation program
must monitor the initial and continuing
trustworthiness and reliability of
individuals granted or retaining
unescorted access authorization to a
protected or vital area, and implement
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
defense-in-depth methodologies to
minimize the potential for an insider to
adversely affect, either directly or
indirectly, the licensee’s capability to
prevent significant core damage and
spent fuel sabotage.
(ii) The insider mitigation program
must contain elements from:
(A) The access authorization program
described in § 73.56;
(B) The fitness-for-duty program
described in part 26 of this chapter;
(C) The cyber security program
described in § 73.54; and
(D) The physical protection program
described in this section.
(10) The licensee shall use the site
corrective action program to track,
trend, correct and prevent recurrence of
failures and deficiencies in the physical
protection program.
(11) Implementation of security plans
and associated procedures must be
coordinated with other onsite plans and
procedures to preclude conflict during
both normal and emergency conditions.
(c) Security plans. (1) Licensee
security plans must describe:
(i) How the licensee will implement
requirements of this section through the
establishment and maintenance of a
security organization, the use of security
equipment and technology, the training
and qualification of security personnel,
the implementation of predetermined
response plans and strategies, and the
protection of digital computer and
communication systems and networks.
(ii) Site-specific conditions that affect
how the licensee implements
Commission requirements.
(2) Protection of Security Plans. The
licensee shall protect the security plans
and other security-related information
against unauthorized disclosure in
accordance with the requirements of
§ 73.21.
(3) Physical Security Plan. The
licensee shall establish, maintain, and
implement a Physical Security Plan
which describes how the performance
objective and requirements set forth in
this section will be implemented.
(4) Training and Qualification Plan.
The licensee shall establish, maintain,
and implement, and follow a Training
and Qualification Plan that describes
how the criteria set forth in appendix B,
to this part, ‘‘General Criteria for
Security Personnel,’’ will be
implemented.
(5) Safeguards Contingency Plan. The
licensee shall establish, maintain, and
implement a Safeguards Contingency
Plan that describes how the criteria set
forth in appendix C, to this part,
‘‘Licensee Safeguards Contingency
Plans,’’ will be implemented.
PO 00000
Frm 00048
Fmt 4701
Sfmt 4700
(6) Cyber Security Plan. The licensee
shall establish, maintain, and
implement a Cyber Security Plan that
describes how the criteria set forth in
§ 73.54 ‘‘Protection of Digital Computer
and Communication systems and
Networks’’ of this part will be
implemented.
(7) Security implementing
procedures.
(i) The licensee shall have a
management system to provide for the
development, implementation, revision,
and oversight of security procedures
that implement Commission
requirements and the security plans.
(ii) Implementing procedures must
document the structure of the security
organization and detail the types of
duties, responsibilities, actions, and
decisions to be performed or made by
each position of the security
organization.
(iii) The licensee shall:
(A) Provide a process for the written
approval of implementing procedures
and revisions by the individual with
overall responsibility for the security
program.
(B) Ensure that revisions to security
implementing procedures satisfy the
requirements of this section.
(iv) Implementing procedures need
not be submitted to the Commission for
approval, but are subject to inspection
by the Commission.
(d) Security organization. (1) The
licensee shall establish and maintain a
security organization that is designed,
staffed, trained, qualified, and equipped
to implement the physical protection
program in accordance with the
requirements of this section.
(2) The security organization must
include:
(i) A management system that
provides oversight of the onsite physical
protection program.
(ii) At least one member, onsite and
available at all times, who has the
authority to direct the activities of the
security organization and who is
assigned no other duties that would
interfere with this individual’s ability to
perform these duties in accordance with
the security plans and the licensee
protective strategy.
(3) The licensee may not permit any
individual to implement any part of the
physical protection program unless the
individual has been trained, equipped,
and qualified to perform their assigned
duties and responsibilities in
accordance with appendix B to this part
and the Training and Qualification Plan.
Non-security personnel may be assigned
duties and responsibilities required to
implement the physical protection
program and shall:
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
(i) Be trained through established
licensee training programs to ensure
each individual is trained, qualified,
and periodically re-qualified to perform
assigned duties.
(ii) Be properly equipped to perform
assigned duties.
(iii) Possess the knowledge, skills, and
abilities, to include physical attributes
such as sight and hearing, required to
perform their assigned duties and
responsibilities.
(e) Physical barriers. Each licensee
shall identify and analyze site-specific
conditions to determine the specific use,
type, function, and placement of
physical barriers needed to satisfy the
physical protection program design
requirements of § 73.55(b).
(1) The licensee shall:
(i) Design, construct, install and
maintain physical barriers as necessary
to control access into facility areas for
which access must be controlled or
denied to satisfy the physical protection
program design requirements of
paragraph (b) of this section.
(ii) Describe in the security plan,
physical barriers, barrier systems, and
their functions within the physical
protection program.
(2) The licensee shall retain, in
accordance with § 73.70, all analyses
and descriptions of the physical barriers
and barrier systems used to satisfy the
requirements of this section, and shall
protect these records in accordance with
the requirements of § 73.21.
(3) Physical barriers must:
(i) Be designed and constructed to:
(A) Protect against the design basis
threat of radiological sabotage;
(B) Account for site-specific
conditions; and
(C) Perform their required function in
support of the licensee physical
protection program.
(ii) Provide deterrence, delay, or
support access control.
(iii) Support effective implementation
of the licensee’s protective strategy.
(4) Consistent with the stated function
to be performed, openings in any barrier
or barrier system established to meet the
requirements of this section must be
secured and monitored to prevent
exploitation of the opening.
(5) Bullet Resisting Physical Barriers.
The reactor control room, the central
alarm station, and the location within
which the last access control function
for access to the protected area is
performed, must be bullet-resisting.
(6) Owner controlled area. The
licensee shall establish and maintain
physical barriers in the owner
controlled area as needed to satisfy the
physical protection program design
requirements of § 73.55(b).
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
(7) Isolation zone.
(i) An isolation zone must be
maintained in outdoor areas adjacent to
the protected area perimeter barrier. The
isolation zone shall be:
(A) Designed and of sufficient size to
permit observation and assessment of
activities on either side of the protected
area barrier;
(B) Monitored with intrusion
detection equipment designed to satisfy
the requirements of § 73.55(i) and be
capable of detecting both attempted and
actual penetration of the protected area
perimeter barrier before completed
penetration of the protected area
perimeter barrier; and
(C) Monitored with assessment
equipment designed to satisfy the
requirements of § 73.55(i) and provide
real-time and play-back/recorded video
images of the detected activities before
and after each alarm annunciation.
(ii) Obstructions that could prevent
the licensee’s capability to meet the
observation and assessment
requirements of this section must be
located outside of the isolation zone.
(8) Protected area.
(i) The protected area perimeter must
be protected by physical barriers that
are designed and constructed to:
(A) Limit access into the protected
area to only those personnel, vehicles,
and materials required to perform
official duties;
(B) Channel personnel, vehicles, and
materials to designated access control
portals; and
(C) Be separated from any other
barrier designated as a vital area
physical barrier, unless otherwise
identified in the Physical Security Plan.
(ii) Penetrations through the protected
area barrier must be secured and
monitored in a manner that prevents or
delays, and detects the exploitation of
any penetration.
(iii) All emergency exits in the
protected area must be alarmed and
secured by locking devices that allow
prompt egress during an emergency and
satisfy the requirements of this section
for access control into the protected
area.
(iv) Where building walls or roofs
comprise a portion of the protected area
perimeter barrier, an isolation zone is
not necessary provided that the
detection and, assessment requirements
of this section are met, appropriate
barriers are installed, and the area is
described in the security plans.
(v) All exterior areas within the
protected area, except for areas that
must be excluded for safety reasons,
must be periodically checked to detect
and deter unauthorized personnel,
vehicles, and materials.
PO 00000
Frm 00049
Fmt 4701
Sfmt 4700
13973
(9) Vital areas.
(i) Vital equipment must be located
only within vital areas, which must be
located within a protected area so that
access to vital equipment requires
passage through at least two physical
barriers, except as otherwise approved
by the Commission and identified in the
security plans.
(ii) The licensee shall protect all vital
area access portals and vital area
emergency exits with intrusion
detection equipment and locking
devices that allow rapid egress during
an emergency and satisfy the vital area
entry control requirements of this
section.
(iii) Unoccupied vital areas must be
locked and alarmed.
(iv) More than one vital area may be
located within a single protected area.
(v) At a minimum, the following shall
be considered vital areas:
(A) The reactor control room;
(B) The spent fuel pool;
(C) The central alarm station; and
(D) The secondary alarm station in
accordance with § 73.55(i)(4)(iii).
(vi) At a minimum, the following
shall be located within a vital area:
(A) The secondary power supply
systems for alarm annunciation
equipment; and
(B) The secondary power supply
systems for non-portable
communications equipment.
(10) Vehicle control measures.
Consistent with the physical protection
program design requirements of
§ 73.55(b), and in accordance with the
site-specific analysis, the licensee shall
establish and maintain vehicle control
measures, as necessary, to protect
against the design basis threat of
radiological sabotage vehicle bomb
assault.
(i) Land vehicles. Licensees shall:
(A) Design, construct, install, and
maintain a vehicle barrier system, to
include passive and active barriers, at a
stand-off distance adequate to protect
personnel, equipment, and systems
necessary to prevent significant core
damage and spent fuel sabotage against
the effects of the design basis threat of
radiological sabotage land vehicle bomb
assault.
(B) Periodically check the operation of
active vehicle barriers and provide a
secondary power source, or a means of
mechanical or manual operation in the
event of a power failure, to ensure that
the active barrier can be placed in the
denial position to prevent unauthorized
vehicle access beyond the required
standoff distance.
(C) Provide periodic surveillance and
observation of vehicle barriers and
barrier systems adequate to detect
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13974
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
indications of tampering and
degradation or to otherwise ensure that
each vehicle barrier and barrier system
is able to satisfy the intended function.
(D) Where a site has rail access to the
protected area, install a train derailer,
remove a section of track, or restrict
access to railroad sidings and provide
periodic surveillance of these measures.
(ii) Waterborne vehicles. Licensees
shall:
(A) Identify areas from which a
waterborne vehicle must be restricted,
and where possible, in coordination
with local, State, and Federal agencies
having jurisdiction over waterway
approaches, deploy buoys, markers, or
other equipment.
(B) In accordance with the sitespecific analysis, provide periodic
surveillance and observation of
waterway approaches and adjacent
areas.
(f) Target sets. (1) The licensee shall
document and maintain the process
used to develop and identify target sets,
to include the site-specific analyses and
methodologies used to determine and
group the target set equipment or
elements.
(2) The licensee shall consider cyber
attacks in the development and
identification of target sets.
(3) Target set equipment or elements
that are not contained within a
protected or vital area must be
identified and documented consistent
with the requirements in § 73.55(f)(1)
and be accounted for in the licensee’s
protective strategy.
(4) The licensee shall implement a
process for the oversight of target set
equipment and systems to ensure that
changes to the configuration of the
identified equipment and systems are
considered in the licensee’s protective
strategy. Where appropriate, changes
must be made to documented target sets.
(g) Access controls. (1) Consistent
with the function of each barrier or
barrier system, the licensee shall control
personnel, vehicle, and material access,
as applicable, at each access control
point in accordance with the physical
protection program design requirements
of § 73.55(b).
(i) To accomplish this, the licensee
shall:
(A) Locate access control portals
outside of, or concurrent with, the
physical barrier system through which it
controls access.
(B) Equip access control portals with
locking devices, intrusion detection
equipment, and surveillance equipment
consistent with the intended function.
(C) Provide supervision and control
over the badging process to prevent
unauthorized bypass of access control
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
equipment located at or outside of the
protected area.
(D) Limit unescorted access to the
protected area and vital areas, during
non-emergency conditions, to only
those individuals who require
unescorted access to perform assigned
duties and responsibilities.
(E) Assign an individual the
responsibility for the last access control
function (controlling admission to the
protected area) and isolate the
individual within a bullet-resisting
structure to assure the ability of the
individual to respond or summon
assistance.
(ii) Where vehicle barriers are
established, the licensee shall:
(A) Physically control vehicle barrier
portals to ensure only authorized
vehicles are granted access through the
barrier.
(B) Search vehicles and materials for
contraband or other items which could
be used to commit radiological sabotage
in accordance with paragraph (h) of this
section.
(C) Observe search functions to ensure
a response can be initiated if needed.
(2) Before granting access into the
protected area, the licensee shall:
(i) Confirm the identity of individuals.
(ii) Verify the authorization for access
of individuals, vehicles, and materials.
(iii) Confirm, in accordance with
industry shared lists and databases that
individuals are not currently denied
access to another licensed facility.
(iv) Search individuals, vehicles, and
materials in accordance with paragraph
(h) of this section.
(3) Vehicles in the protected area.
(i) The licensee shall exercise control
over all vehicles inside the protected
area to ensure that they are used only
by authorized persons and for
authorized purposes.
(ii) Vehicles inside the protected area
must be operated by an individual
authorized unescorted access to the
area, or must be escorted by an
individual as required by paragraph
(g)(8) of this section.
(iii) Vehicle use inside the protected
area must be limited to plant functions
or emergencies, and keys must be
removed or the vehicle otherwise
disabled when not in use.
(iv) Vehicles transporting hazardous
materials inside the protected area must
be escorted by an armed member of the
security organization.
(4) Vital Areas.
(i) Licensees shall control access into
vital areas consistent with access
authorization lists.
(ii) In response to a site-specific
credible threat or other credible
information, implement a two-person
PO 00000
Frm 00050
Fmt 4701
Sfmt 4700
(line-of-sight) rule for all personnel in
vital areas so that no one individual is
permitted access to a vital area.
(5) Emergency conditions.
(i) The licensee shall design the
access control system to accommodate
the potential need for rapid ingress or
egress of authorized individuals during
emergency conditions or situations that
could lead to emergency conditions.
(ii) To satisfy the design criteria of
paragraph (g)(5)(i) of this section during
emergency conditions, the licensee shall
implement security procedures to
ensure that authorized emergency
personnel are provided prompt access to
affected areas and equipment.
(6) Access control devices.
(i) The licensee shall control all keys,
locks, combinations, passwords and
related access control devices used to
control access to protected areas, vital
areas and security systems to reduce the
probability of compromise. To
accomplish this, the licensee shall:
(A) Issue access control devices only
to individuals who have unescorted
access authorization and require access
to perform official duties and
responsibilities.
(B) Maintain a record, to include
name and affiliation, of all individuals
to whom access control devices have
been issued, and implement a process to
account for access control devices at
least annually.
(C) Implement compensatory
measures upon discovery or suspicion
that any access control device may have
been compromised. Compensatory
measures must remain in effect until the
compromise is corrected.
(D) Retrieve, change, rotate,
deactivate, or otherwise disable access
control devices that have been or may
have been compromised or when a
person with access to control devices
has been terminated under less than
favorable conditions.
(ii) The licensee shall implement a
numbered photo identification badge
system for all individuals authorized
unescorted access to the protected area
and vital areas.
(A) Identification badges may be
removed from the protected area only
when measures are in place to confirm
the true identity and authorization for
unescorted access of the badge holder
before allowing unescorted access to the
protected area.
(B) Except where operational safety
concerns require otherwise,
identification badges must be clearly
displayed by all individuals while
inside the protected area and vital areas.
(C) The licensee shall maintain a
record, to include the name and areas to
which unescorted access is granted, of
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
all individuals to whom photo
identification badges have been issued.
(iii) Access authorization program
personnel shall be issued passwords
and combinations to perform their
assigned duties and may be excepted
from the requirement of paragraph
(g)(6)(i)(A) of this section provided they
meet the background requirements of
§ 73.56.
(7) Visitors.
(i) The licensee may permit escorted
access to protected and vital areas to
individuals who have not been granted
unescorted access in accordance with
the requirements of § 73.56 and part 26
of this chapter. The licensee shall:
(A) Implement procedures for
processing, escorting, and controlling
visitors.
(B) Confirm the identity of each
visitor through physical presentation of
a recognized identification card issued
by a local, State, or Federal government
agency that includes a photo or contains
physical characteristics of the
individual requesting escorted access.
(C) Maintain a visitor control register
in which all visitors shall register their
name, date, time, purpose of visit,
employment affiliation, citizenship, and
name of the individual to be visited
before being escorted into any protected
or vital area.
(D) Issue a visitor badge to all visitors
that clearly indicates an escort is
required.
(E) Escort all visitors, at all times,
while inside the protected area and vital
areas.
(F) Deny escorted access to any
individual who is currently denied
access in industry shared data bases.
(ii) Individuals not employed by the
licensee but who require frequent or
extended unescorted access to the
protected area and/or vital areas to
perform duties and responsibilities
required by the licensee at irregular or
intermittent intervals, shall satisfy the
access authorization requirements of
§ 73.56 and part 26 of this chapter, and
shall be issued a non-employee photo
identification badge that is easily
distinguished from other identification
badges before being allowed unescorted
access to the protected and vital areas.
Non-employee photo identification
badges must visually reflect that the
individual is a non-employee and that
no escort is required.
(8) Escorts. The licensee shall ensure
that all escorts are trained to perform
escort duties in accordance with the
requirements of this section and site
training requirements.
(i) Escorts shall be authorized
unescorted access to all areas in which
they will perform escort duties.
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
(ii) Individuals assigned to visitor
escort duties shall be provided a means
of timely communication with security
personnel to summon assistance when
needed.
(iii) Individuals assigned to vehicle
escort duties shall be trained and
qualified in accordance with appendix
B of this part and provided a means of
continuous communication with
security personnel to ensure the ability
to summon assistance when needed.
(iv) When visitors are performing
work, escorts shall be generally
knowledgeable of the activities to be
performed by the visitor and report
behaviors or activities that may
constitute an unreasonable risk to the
health and safety of the public and
common defense and security,
including a potential threat to commit
radiological sabotage, consistent with
§ 73.56(f)(1).
(v) Each licensee shall describe visitor
to escort ratios for the protected area
and vital areas in physical security
plans. Implementing procedures shall
provide necessary observation and
control requirements for all visitor
activities.
(h) Search programs. (1) The objective
of the search program is to detect, deter,
and prevent the introduction of
firearms, explosives, incendiary devices,
or other items which could be used to
commit radiological sabotage. To
accomplish this the licensee shall
search individuals, vehicles, and
materials consistent with the physical
protection program design requirements
in paragraph (b) of this section, and the
function to be performed at each access
control point or portal before granting
access.
(2) Owner controlled area searches.
(i) Where the licensee has established
physical barriers in the owner
controlled area, the licensee shall
implement search procedures for access
control points in the barrier.
(ii) For each vehicle access control
point, the licensee shall describe in
implementing procedures areas of a
vehicle to be searched, and the items for
which the search is intended to detect
and prevent access. Areas of the vehicle
to be searched must include, but are not
limited to, the cab, engine compartment,
undercarriage, and cargo area.
(iii) Vehicle searches must be
performed by at least two (2) trained
and equipped security personnel, one of
which must be armed. The armed
individual shall be positioned to
observe the search process and provide
immediate response.
(iv) Vehicle searches must be
accomplished through the use of
equipment capable of detecting
PO 00000
Frm 00051
Fmt 4701
Sfmt 4700
13975
firearms, explosives, incendiary devices,
or other items which could be used to
commit radiological sabotage, or
through visual and physical searches, or
both, to ensure that all items are
identified before granting access.
(v) Vehicle access control points must
be equipped with video surveillance
equipment that is monitored by an
individual capable of initiating a
response.
(3) Protected area searches. Licensees
shall search all personnel, vehicles and
materials requesting access to protected
areas.
(i) The search for firearms, explosives,
incendiary devices, or other items
which could be used to commit
radiological sabotage shall be
accomplished through the use of
equipment capable of detecting these
items, or through visual and physical
searches, or both, to ensure that all
items are clearly identified before
granting access to protected areas. The
licensee shall subject all persons except
official Federal, state, and local law
enforcement personnel on official duty
to these searches upon entry to the
protected area. Armed security officers
who are on duty and have exited the
protected area may re-enter the
protected area without being searched
for firearms.
(ii) Whenever search equipment is out
of service, is not operating satisfactorily,
or cannot be used effectively to search
individuals, vehicles, or materials, a
visual and physical search shall be
conducted.
(iii) When an attempt to introduce
firearms, explosives, incendiary devices,
or other items which could be used to
commit radiological sabotage has
occurred or is suspected, the licensee
shall implement actions to ensure that
the suspect individuals, vehicles, and
materials are denied access and shall
perform a visual and physical search to
determine the absence or existence of a
threat.
(iv) For each vehicle access portal, the
licensee shall describe in implementing
procedures areas of a vehicle to be
searched before access is granted. Areas
of the vehicle to be searched must
include, but are not limited to, the cab,
engine compartment, undercarriage, and
cargo area.
(v) Exceptions to the protected area
search requirements for materials may
be granted for safety or operational
reasons provided the design criteria of
§ 73.55(b) are satisfied, the materials are
clearly identified, the types of
exceptions to be granted are described
in the security plans, and the specific
security measures to be implemented for
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13976
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
excepted items are detailed in site
procedures.
(vi) To the extent practicable,
excepted materials must be positively
controlled, stored in a locked area, and
opened at the final destination by an
individual familiar with the items.
(vii) Bulk material excepted from the
protected area search requirements must
be escorted by an armed member of the
security organization to its final
destination or to a receiving area where
the excepted items are offloaded and
verified.
(viii) To the extent practicable, bulk
materials excepted from search shall not
be offloaded adjacent to a vital area.
(i) Detection and assessment systems.
(1) The licensee shall establish and
maintain intrusion detection and
assessment systems that satisfy the
design requirements of § 73.55(b) and
provide, at all times, the capability to
detect and assess unauthorized persons
and facilitate the effective
implementation of the licensee’s
protective strategy.
(2) Intrusion detection equipment
must annunciate and video assessment
equipment shall display concurrently,
in at least two continuously staffed
onsite alarm stations, at least one of
which must be protected in accordance
with the requirements of the central
alarm station within this section.
(3) The licensee’s intrusion detection
and assessment systems must be
designed to:
(i) Provide visual and audible
annunciation of the alarm.
(ii) Provide a visual display from
which assessment of the detected
activity can be made.
(iii) Ensure that annunciation of an
alarm indicates the type and location of
the alarm.
(iv) Ensure that alarm devices to
include transmission lines to
annunciators are tamper indicating and
self-checking.
(v) Provide an automatic indication
when the alarm system or a component
of the alarm system fails, or when the
system is operating on the backup
power supply.
(vi) Support the initiation of a timely
response in accordance with the
security plans, licensee protective
strategy, and associated implementing
procedures.
(vii) Ensure intrusion detection and
assessment equipment at the protected
area perimeter remains operable from an
uninterruptible power supply in the
event of the loss of normal power.
(4) Alarm stations.
(i) Both alarm stations required by
paragraph (i)(2) of this section must be
designed and equipped to ensure that a
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
single act, in accordance with the design
basis threat of radiological sabotage
defined in § 73.1(a)(1), cannot disable
both alarm stations. The licensee shall
ensure the survivability of at least one
alarm station to maintain the ability to
perform the following functions:
(A) Detect and assess alarms;
(B) Initiate and coordinate an
adequate response to an alarm;
(C) Summon offsite assistance; and
(D) Provide command and control.
(ii) Licensees shall:
(A) Locate the central alarm station
inside a protected area. The interior of
the central alarm station must not be
visible from the perimeter of the
protected area.
(B) Continuously staff each alarm
station with at least one trained and
qualified alarm station operator. The
alarm station operator must not be
assigned other duties or responsibilities
which would interfere with the ability
to execute the functions described in
§ 73.55(i)(4)(i) of this section.
(C) Not permit any activities to be
performed within either alarm station
that would interfere with an alarm
station operator’s ability to execute
assigned duties and responsibilities.
(D) Assess and initiate response to all
alarms in accordance with the security
plans and implementing procedures.
(E) Assess and initiate response to
other events as appropriate.
(F) Ensure that an alarm station
operator cannot change the status of a
detection point or deactivate a locking
or access control device at a protected
or vital area portal, without the
knowledge and concurrence of the
alarm station operator in the other alarm
station.
(G) Ensure that operators in both
alarm stations are knowledgeable of
final disposition of all alarms.
(H) Maintain a record of all alarm
annunciations, the cause of each alarm,
and the disposition of each alarm.
(iii) Applicants for an operating
license under the provisions of part 50
of this chapter, or holders of a combined
license under the provisions of part 52
of this chapter, shall construct, locate,
protect, and equip both the central and
secondary alarm stations to the
standards for the central alarm station
contained in this section. Both alarm
stations shall be equal and redundant,
such that all functions needed to satisfy
the requirements of this section can be
performed in both alarm stations.
(5) Surveillance, observation, and
monitoring.
(i) The physical protection program
must include surveillance, observation,
and monitoring as needed to satisfy the
design requirements of § 73.55(b),
PO 00000
Frm 00052
Fmt 4701
Sfmt 4700
identify indications of tampering, or
otherwise implement the site protective
strategy.
(ii) The licensee shall provide
continuous surveillance, observation,
and monitoring of the owner controlled
area as described in the security plans
to detect and deter intruders and ensure
the integrity of physical barriers or other
components and functions of the onsite
physical protection program.
Continuous surveillance, observation,
and monitoring responsibilities may be
performed by security personnel during
continuous patrols, through use of video
technology, or by a combination of both.
(iii) Unattended openings that
intersect a security boundary such as
underground pathways must be
protected by a physical barrier and
monitored by intrusion detection
equipment or observed by security
personnel at a frequency sufficient to
detect exploitation.
(iv) Armed security patrols shall
periodically check external areas of the
protected area to include physical
barriers and vital area portals.
(v) Armed security patrols shall
periodically inspect vital areas to
include the physical barriers used at all
vital area portals.
(vi) The licensee shall provide
random patrols of all accessible areas
containing target set equipment.
(vii) Security personnel shall be
trained to recognize obvious indications
of tampering consistent with their
assigned duties and responsibilities.
(viii) Upon detection of tampering, or
other threats, the licensee shall initiate
response in accordance with the
security plans and implementing
procedures.
(6) Illumination.
(i) The licensee shall ensure that all
areas of the facility are provided with
illumination necessary to satisfy the
design requirements of § 73.55(b) and
implement the protective strategy.
(ii) The licensee shall provide a
minimum illumination level of 0.2 footcandles, measured horizontally at
ground level, in the isolation zones and
appropriate exterior areas within the
protected area. Alternatively, the
licensee may augment the facility
illumination system by means of lowlight technology to meet the
requirements of this section or
otherwise implement the protective
strategy.
(iii) The licensee shall describe in the
security plans how the lighting
requirements of this section are met
and, if used, the type(s) and application
of low-light technology.
(j) Communication requirements. (1)
The licensee shall establish and
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
maintain continuous communication
capability with onsite and offsite
resources to ensure effective command
and control during both normal and
emergency situations.
(2) Individuals assigned to each alarm
station shall be capable of calling for
assistance in accordance with the
security plans and the licensee’s
procedures.
(3) All on-duty security force
personnel shall be capable of
maintaining continuous communication
with an individual in each alarm
station, and vehicle escorts shall
maintain continuous communication
with security personnel. All personnel
escorts shall maintain timely
communication with the security
personnel.
(4) The following continuous
communication capabilities must
terminate in both alarm stations
required by this section:
(i) Radio or microwave transmitted
two-way voice communication, either
directly or through an intermediary, in
addition to conventional telephone
service between local law enforcement
authorities and the site.
(ii) A system for communication with
the control room.
(5) Non-portable communications
equipment must remain operable from
independent power sources in the event
of the loss of normal power.
(6) The licensee shall identify site
areas where communication could be
interrupted or cannot be maintained,
and shall establish alternative
communication measures or otherwise
account for these areas in implementing
procedures.
(k) Response requirements. (1) The
licensee shall establish and maintain, at
all times, properly trained, qualified and
equipped personnel required to
interdict and neutralize threats up to
and including the design basis threat of
radiological sabotage as defined in
§ 73.1, to prevent significant core
damage and spent fuel sabotage.
(2) The licensee shall ensure that all
firearms, ammunition, and equipment
necessary to implement the site security
plans and protective strategy are in
sufficient supply, are in working
condition, and are readily available for
use.
(3) The licensee shall train each
armed member of the security
organization to prevent or impede
attempted acts of radiological sabotage
by using force sufficient to counter the
force directed at that person, including
the use of deadly force when the armed
member of the security organization has
a reasonable belief that the use of deadly
force is necessary in self-defense or in
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
the defense of others, or any other
circumstances as authorized by
applicable State or Federal law.
(4) The licensee shall provide armed
response personnel consisting of armed
responders which may be augmented
with armed security officers to carry out
armed response duties within
predetermined time lines specified by
the site protective strategy.
(5) Armed responders.
(i) The licensee shall determine the
minimum number of armed responders
necessary to satisfy the design
requirements of § 73.55(b) and
implement the protective strategy. The
licensee shall document this number in
the security plans.
(ii) The number of armed responders
shall not be less than ten (10).
(iii) Armed responders shall be
available at all times inside the
protected area and may not be assigned
other duties or responsibilities that
could interfere with their assigned
response duties.
(6) Armed security officers.
(i) Armed security officers, designated
to strengthen onsite response
capabilities, shall be onsite and
available at all times to carry out their
assigned response duties.
(ii) The minimum number of armed
security officers designated to
strengthen onsite response capabilities
must be documented in the security
plans.
(7) The licensee shall have procedures
to reconstitute the documented number
of available armed response personnel
required to implement the protective
strategy.
(8) Protective strategy. The licensee
shall establish, maintain, and
implement a written protective strategy
in accordance with the requirements of
this section and part 73, appendix C,
Section II. Upon receipt of an alarm or
other indication of a threat, the licensee
shall:
(i) Determine the existence and level
of a threat in accordance with preestablished assessment methodologies
and procedures.
(ii) Initiate response actions to
interdict and neutralize the threat in
accordance with the requirements of
part 73, appendix C, section II, the
safeguards contingency plan, and the
licensee’s response strategy.
(iii) Notify law enforcement agencies
(local, State, and Federal law
enforcement agencies (LLEA)), in
accordance with site procedures.
(9) Law enforcement liaison. To the
extent practicable, licensees shall
document and maintain current
agreements with applicable law
enforcement agencies to include
PO 00000
Frm 00053
Fmt 4701
Sfmt 4700
13977
estimated response times and
capabilities.
(10) Heightened security. Licensees
shall establish, maintain, and
implement a threat warning system
which identifies specific graduated
protective measures and actions to be
taken to increase licensee preparedness
against a heightened security threat.
(i) Licensees shall ensure that the
specific protective measures and actions
identified for each threat level are
consistent with the security plans and
other emergency plans and procedures.
(ii) Upon notification by an
authorized representative of the
Commission, licensees shall implement
the specific threat level indicated by the
Commission representative.
(l) Facilities using mixed-oxide (MOX)
fuel assemblies containing up to 20
weight percent plutonium dioxide
(PuO2). (1) Commercial nuclear power
reactors licensed under 10 CFR parts 50
or 52 and authorized to use special
nuclear material in the form of MOX
fuel assemblies containing up to 20
weight percent PuO2 shall, in addition
to meeting the requirements of this
section, protect un-irradiated MOX fuel
assemblies against theft or diversion as
described in this paragraph.
(2) Commercial nuclear power
reactors authorized to use MOX fuel
assemblies containing up to 20 weight
percent PuO2 are exempt from the
requirements of §§ 73.20, 73.45, and
73.46 for the onsite physical protection
of un-irradiated MOX fuel assemblies.
(3) Administrative controls.
(i) The licensee shall describe in the
security plans the operational and
administrative controls to be
implemented for the receipt, inspection,
movement, storage, and protection of
un-irradiated MOX fuel assemblies.
(ii) The licensee shall implement the
use of tamper-indicating devices for unirradiated MOX fuel assembly transport
and shall verify their use and integrity
before receipt.
(iii) Upon receipt of un-irradiated
MOX fuel assemblies, the licensee shall:
(A) Inspect un-irradiated MOX fuel
assemblies for damage.
(B) Search un-irradiated MOX fuel
assemblies for unauthorized materials.
(iv) The licensee may conduct the
required inspection and search
functions simultaneously.
(v) The licensee shall ensure the
proper placement and control of unirradiated MOX fuel assemblies as
follows:
(A) At least one armed security officer
shall be present during the receipt and
inspection of un-irradiated MOX fuel
assemblies. This armed security officer
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13978
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
shall not be an armed responder as
required by paragraph (k) of this section.
(B) The licensee shall store unirradiated MOX fuel assemblies only
within a spent fuel pool, located within
a vital area, so that access to the unirradiated MOX fuel assemblies requires
passage through at least two physical
barriers and the water barrier combined
with the additional measures detailed in
this section.
(vi) The licensee shall implement a
material control and accountability
program that includes a predetermined
and documented storage location for
each un-irradiated MOX fuel assembly.
(4) Physical controls.
(i) The licensee shall lock, lockout, or
disable all equipment and power
supplies to equipment required for the
movement and handling of unirradiated MOX fuel assemblies when
movement activities are not authorized.
(ii) The licensee shall implement a
two-person, line-of-sight rule within the
spent fuel pool area whenever control
systems or equipment required for the
movement or handling of un-irradiated
MOX fuel assemblies must be accessed.
(iii) The licensee shall conduct
random patrols of areas containing unirradiated MOX fuel assemblies to
identify indications of tampering and
ensure the integrity of barriers and
locks.
(iv) Locks, keys, and any other access
control device used to secure equipment
and power sources required for the
movement of un-irradiated MOX fuel
assemblies, or openings to areas
containing un-irradiated MOX fuel
assemblies, must be controlled by the
security organization.
(v) Removal of locks used to secure
equipment and power sources required
for the movement of un-irradiated MOX
fuel assemblies or openings to areas
containing un-irradiated MOX fuel
assemblies must require approval by
both the on-duty security shift
supervisor and the operations shift
manager.
(A) At least one armed security officer
shall be present to observe activities
involving the movement of unirradiated MOX fuel assemblies before
the removal of the locks and providing
power to equipment required for the
movement or handling of un-irradiated
MOX fuel assemblies.
(B) At least one armed security officer
shall be present at all times until power
is removed from equipment and locks
are secured.
(C) Security officers shall be
knowledgeable of authorized and
unauthorized activities involving unirradiated MOX fuel assemblies.
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
(5) At least one armed security officer
shall be present and shall maintain
constant surveillance of un-irradiated
MOX fuel assemblies when the
assemblies are not located in the spent
fuel pool or reactor.
(6) The licensee shall maintain at all
times the capability to detect, assess,
interdict and neutralize threats to unirradiated MOX fuel assemblies in
accordance with the requirements of
this section.
(7) MOX fuel assemblies containing
greater than 20 weight percent PuO2.
(i) Requests for the use of MOX fuel
assemblies containing greater than 20
weight percent PuO2 shall be reviewed
and approved by the Commission before
receipt of MOX fuel assemblies.
(ii) Additional measures for the
physical protection of un-irradiated
MOX fuel assemblies containing greater
than 20 weight percent PuO2 shall be
determined by the Commission on a
case-by-case basis and documented
through license amendment in
accordance with 10 CFR 50.90.
(m) Security program reviews. (1) As
a minimum the licensee shall review
each element of the physical protection
program at least every 24 months.
Reviews shall be conducted:
(i) Within 12 months following initial
implementation of the physical
protection program or a change to
personnel, procedures, equipment, or
facilities that potentially could
adversely affect security.
(ii) As necessary based upon sitespecific analyses, assessments, or other
performance indicators.
(iii) By individuals independent of
those personnel responsible for program
management and any individual who
has direct responsibility for
implementing the onsite physical
protection program.
(2) Reviews of the security program
must include, but not be limited to, an
audit of the effectiveness of the physical
security program, security plans,
implementing procedures, cyber
security programs, safety/security
interface activities, the testing,
maintenance, and calibration program,
and response commitments by local,
State, and Federal law enforcement
authorities.
(3) The results and recommendations
of the onsite physical protection
program reviews, management’s
findings regarding program
effectiveness, and any actions taken as
a result of recommendations from prior
program reviews, must be documented
in a report to the licensee’s plant
manager and to corporate management
at least one level higher than that having
responsibility for day-to-day plant
PO 00000
Frm 00054
Fmt 4701
Sfmt 4700
operation. These reports must be
maintained in an auditable form,
available for inspection.
(4) Findings from onsite physical
protection program reviews must be
entered into the site corrective action
program.
(n) Maintenance, testing, and
calibration. (1) The licensee shall:
(i) Establish, maintain, and implement
a maintenance, testing and calibration
program to ensure that security systems
and equipment, including secondary
and uninterruptible power supplies, are
tested for operability and performance
at predetermined intervals, maintained
in operable condition, and are capable
of performing their intended functions.
(ii) Describe the maintenance, testing
and calibration program in the physical
security plan. Implementing procedures
must specify operational and technical
details required to perform
maintenance, testing, and calibration
activities to include, but not limited to,
purpose of activity, actions to be taken,
acceptance criteria, and the intervals or
frequency at which the activity will be
performed.
(iii) Identify in procedures the criteria
for determining when problems,
failures, deficiencies, and other findings
are documented in the site corrective
action program for resolution.
(iv) Ensure that information
documented in the site corrective action
program is written in a manner that
does not constitute safeguards
information as defined in 10 CFR 73.21.
(v) Implement compensatory
measures that ensure the effectiveness
of the onsite physical protection
program when there is a failure or
degraded operation of security-related
component or equipment.
(2) The licensee shall test each
intrusion alarm for operability at the
beginning and end of any period that it
is used for security, or if the period of
continuous use exceeds seven (7) days.
The intrusion alarm must be tested at
least once every seven (7) days.
(3) Intrusion detection and access
control equipment must be performance
tested in accordance with the security
plans and implementing procedures.
(4) Equipment required for
communications onsite must be tested
for operability not less frequently than
once at the beginning of each security
personnel work shift.
(5) Communication systems between
the alarm stations and each control
room, and between the alarm stations
and local law enforcement agencies, to
include backup communication
equipment, must be tested for
operability at least once each day.
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
(6) Search equipment must be tested
for operability at least once each day
and tested for performance at least once
during each seven (7) day period.
(7) A program for testing or verifying
the operability of devices or equipment
located in hazardous areas must be
specified in the implementing
procedures and must define alternate
measures to be taken to ensure the
timely completion of testing or
maintenance when the hazardous
condition or other restrictions are no
longer applicable.
(8) Security equipment or systems
shall be tested in accordance with the
site maintenance, testing and calibration
procedures before being placed back in
service after each repair or inoperable
state.
(o) Compensatory measures. (1) The
licensee shall identify criteria and
measures to compensate for degraded or
inoperable equipment, systems, and
components to meet the requirements of
this section.
(2) Compensatory measures must
provide a level of protection that is
equivalent to the protection that was
provided by the degraded or inoperable,
equipment, system, or components.
(3) Compensatory measures must be
implemented within specific time
frames necessary to meet the
requirements stated in paragraph (b) of
this section and described in the
security plans.
(p) Suspension of security measures.
(1) The licensee may suspend
implementation of affected
requirements of this section under the
following conditions:
(i) In accordance with §§ 50.54(x) and
50.54(y) of this chapter, the licensee
may suspend any security measures
under this section in an emergency
when this action is immediately needed
to protect the public health and safety
and no action consistent with license
conditions and technical specifications
that can provide adequate or equivalent
protection is immediately apparent.
This suspension of security measures
must be approved as a minimum by a
licensed senior operator before taking
this action.
(ii) During severe weather when the
suspension of affected security
measures is immediately needed to
protect the personal health and safety of
security force personnel and no other
immediately apparent action consistent
with the license conditions and
technical specifications can provide
adequate or equivalent protection. This
suspension of security measures must
be approved, as a minimum, by a
licensed senior operator, with input
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
from the security supervisor or manager,
before taking this action.
(2) Suspended security measures must
be reinstated as soon as conditions
permit.
(3) The suspension of security
measures must be reported and
documented in accordance with the
provisions of § 73.71.
(q) Records. (1) The Commission may
inspect, copy, retain, and remove all
reports, records, and documents
required to be kept by Commission
regulations, orders, or license
conditions, whether the reports, records,
and documents are kept by the licensee
or a contractor.
(2) The licensee shall maintain all
records required to be kept by
Commission regulations, orders, or
license conditions, until the
Commission terminates the license for
which the records were developed, and
shall maintain superseded portions of
these records for at least three (3) years
after the record is superseded, unless
otherwise specified by the Commission.
(3) If a contracted security force is
used to implement the onsite physical
protection program, the licensee’s
written agreement with the contractor
must be retained by the licensee as a
record for the duration of the contract.
(4) Review and audit reports must be
maintained and available for inspection,
for a period of three (3) years.
(r) Alternative measures. (1) The
Commission may authorize an applicant
or licensee to provide a measure for
protection against radiological sabotage
other than one required by this section
if the applicant or licensee demonstrates
that:
(i) The measure meets the same
performance objectives and
requirements specified in paragraph (b)
of this section; and
(ii) The proposed alternative measure
provides protection against radiological
sabotage or theft of un-irradiated MOX
fuel assemblies, equivalent to that
which would be provided by the
specific requirement for which it would
substitute.
(2) The licensee shall submit
proposed alternative measure(s) to the
Commission for review and approval in
accordance with §§ 50.4 and 50.90 of
this chapter before implementation.
(3) In addition to fully describing the
desired changes, the licensee shall
submit a technical basis for each
proposed alternative measure. The basis
must include an analysis or assessment
that demonstrates how the proposed
alternative measure provides a level of
protection that is at least equal to that
which would otherwise be provided by
the specific requirement of this section.
PO 00000
Frm 00055
Fmt 4701
Sfmt 4700
13979
(4) Alternative vehicle barrier
systems. In the case of vehicle barrier
systems required by § 73.55(e)(10), the
licensee shall demonstrate that:
(i) The alternative measure provides
protection against the use of a vehicle as
a means of transportation to gain
proximity to vital areas;
(ii) The alternative measure provides
protection against the use of a vehicle as
a vehicle bomb; and
(iii) Based on comparison of the costs
of the alternative measures to the costs
of meeting the Commission’s
requirements using the essential
elements of 10 CFR 50.109, the costs of
fully meeting the Commission’s
requirements are not justified by the
protection that would be provided.
■ 13. Section 73.56 is revised to read as
follow:
§ 73.56 Personnel access authorization
requirements for nuclear power plants.
(a) Introduction. (1) By March 31,
2010, each nuclear power reactor
licensee, licensed under 10 CFR part 50,
shall implement the requirements of
this section through revisions to its
Commission-approved Physical Security
Plan.
(2) The licensee shall establish,
implement and maintain its access
authorization program in accordance
with the requirements of this section.
(3) Each applicant for an operating
license under the provisions of part 50
of this chapter, and each holder of a
combined license under the provisions
of part 52 of this chapter, shall
implement the requirements of this
section before fuel is allowed on site
(protected area).
(4) The licensee or applicant may
accept, in part or whole, an access
authorization program implemented by
a contractor or vendor to satisfy
appropriate elements of the licensee’s
access authorization program in
accordance with the requirements of
this section. Only a licensee shall grant
an individual unescorted access.
Licensees and applicants shall certify
individuals’ unescorted access
authorization and are responsible to
maintain, deny, terminate, or withdraw
unescorted access authorization.
(b) Applicability. (1) The following
individuals shall be subject to an access
authorization program:
(i) Any individual to whom a licensee
intends to grant unescorted access to
nuclear power plant protected or vital
areas or any individual for whom a
licensee or an applicant intends to
certify unescorted access authorization;
(ii) Any individual whose duties and
responsibilities permit the individual to
take actions by electronic means, either
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13980
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
on site or remotely, that could adversely
impact the licensee’s or applicant’s
operational safety, security, or
emergency preparedness;
(iii) Any individual who has
responsibilities for implementing a
licensee’s or applicant’s protective
strategy, including, but not limited to,
armed security force officers, alarm
station operators, and tactical response
team leaders; and
(iv) The licensee or applicant access
authorization program reviewing official
or contractor or vendor access
authorization program reviewers.
(2) Other individuals, at the licensee’s
or applicant’s discretion, including
employees of a contractor or a vendor
who are designated in access
authorization program procedures, are
subject to an access authorization
program that meets the requirements of
this section.
(c) General performance objective.
The licensee’s or applicant’s access
authorization program must provide
high assurance that the individuals who
are specified in paragraph (b)(1), and, if
applicable, paragraph (b)(2) of this
section are trustworthy and reliable,
such that they do not constitute an
unreasonable risk to public health and
safety or the common defense and
security, including the potential to
commit radiological sabotage.
(d) Background investigation. In order
to grant an individual unescorted access
to the protected area or vital area of a
nuclear power plant or certify an
individual unescorted access
authorization, licensees, applicants and
contractors or vendors shall ensure that
the individual has been subject to a
background investigation. The
background investigation must include,
but is not limited to, the following
elements:
(1) Informed consent. Licensees,
applicants, and contractors or vendors
shall not initiate any element of a
background investigation without the
informed and signed consent of the
subject individual. This consent shall
include authorization to share personal
information with appropriate entities.
The licensee or applicant to whom the
individual is applying for unescorted
access and unescorted access
authorization, respectively, or the
contractors or vendors supporting the
licensee or applicant shall inform the
individual of his or her right to review
information collected to assure its
accuracy, and provide the individual
with an opportunity to correct any
inaccurate or incomplete information
that is developed by licensees,
applicants, or contractors or vendors
about the individual.
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
(i) The subject individual may
withdraw his or her consent at any time.
Licensees, applicants, and contractors or
vendors shall inform the individual
that:
(A) Withdrawal of his or her consent
will remove the individual’s application
for access authorization under the
licensee’s or applicant’s access
authorization program or contractor or
vendor access authorization program;
and
(B) Other licensees and applicants
shall have access to information
documenting the withdrawal.
Additionally, the contractors or vendors
may have the same access to the
information, if such information is
necessary for assisting licensees or
applicants complying with requirements
set forth in this section.
(ii) If an individual withdraws his or
her consent, licensees, applicants, and
contractors or vendors may not initiate
any elements of the background
investigation that were not in progress
at the time the individual withdrew his
or her consent, but shall complete any
background investigation elements that
are in progress at the time consent is
withdrawn. The licensee or applicant
shall record the status of the
individual’s application for unescorted
access or unescorted access
authorization, respectively. Contractors
or vendors may record the status of the
individual’s application for unescorted
access or unescorted access
authorization for licensees or
applicants. Additionally, licensees,
applicants, or contractors or vendors
shall collect and maintain the
individual’s application for unescorted
access or unescorted access
authorization; his or her withdrawal of
consent for the background
investigation; the reason given by the
individual for the withdrawal; and any
pertinent information collected from the
background investigation elements that
were completed. This information must
be shared with other licensees in
accordance with paragraph (o)(6) of this
section.
(iii) Licensees, applicants, and
contractors or vendors shall inform, in
writing, any individual who is applying
for unescorted access or unescorted
access authorization that the following
actions are sufficient cause for denial or
unfavorable termination of unescorted
access or unescorted access
authorization status:
(A) Refusal to provide a signed
consent for the background
investigation;
(B) Refusal to provide, or the
falsification of, any personal history
information required under this section,
PO 00000
Frm 00056
Fmt 4701
Sfmt 4700
including the failure to report any
previous denial or unfavorable
termination of unescorted access or
unescorted access authorization;
(C) Refusal to provide signed consent
for the sharing of personal information
with other licensees, applicants, or the
contractor or vendors under paragraph
(d)(4)(v) of this section; or
(D) Failure to report any arrests or
legal actions specified in paragraph (g)
of this section.
(2) Personal history disclosure.
(i) Any individual who is applying for
unescorted access or unescorted access
authorization shall disclose the personal
history information that is required by
the licensee’s or applicant’s access
authorization program, including any
information that may be necessary for
the reviewing official to make a
determination of the individual’s
trustworthiness and reliability.
(ii) Licensees, applicants, and
contractors or vendors shall not require
an individual to disclose an
administrative withdrawal of
unescorted access or unescorted access
authorization under the requirements of
§ 73.56(g), (h)(7), or (i)(1)(v) of this
section. However, the individual must
disclose this information if the
individual’s unescorted access or
unescorted access authorization is
administratively withdrawn at the time
he or she is seeking unescorted access
or unescorted access authorization, or
the individual’s unescorted access or
unescorted access authorization was
subsequently denied or terminated
unfavorably by a licensee, applicant, or
contractor or vendor.
(3) Verification of true identity.
Licensees, applicants, and contractors or
vendors shall verify the true identity of
an individual who is applying for
unescorted access or unescorted access
authorization in order to ensure that the
applicant is the person that he or she
has claimed to be. At a minimum,
licensees, applicants, and contractors or
vendors shall validate that the social
security number that the individual has
provided is his or hers, and, in the case
of foreign nationals, validate the
claimed non-immigration status that the
individual has provided is correct. In
addition, licensees and applicants shall
also determine whether the results of
the fingerprinting required under
§ 73.57 confirm the individual’s claimed
identity, if such results are available.
(4) Employment history evaluation.
Licensees, applicants, and contractors or
vendors shall ensure that an
employment history evaluation has been
completed on a best effort basis, by
questioning the individual’s present and
former employers, and by determining
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
the activities of the individual while
unemployed.
(i) For the claimed employment
period, the individual must provide the
reason for any termination, eligibility
for rehire, and other information that
could reflect on the individual’s
trustworthiness and reliability.
(ii) If the claimed employment was
military service the individual shall
provide a characterization of service,
reason for separation, and any
disciplinary actions that could affect a
trustworthiness and reliability
determination.
(iii) If education is claimed in lieu of
employment, the individual shall
provide any information related to the
claimed education that could reflect on
the individual’s trustworthiness and
reliability and, at a minimum, verify
that the individual was registered for
the classes and received grades that
indicate that the individual participated
in the educational process during the
claimed period.
(iv) If a previous employer,
educational institution, or any other
entity with which the individual claims
to have been engaged fails to provide
information or indicates an inability or
unwillingness to provide information
within 3 business days of the request,
the licensee, applicant, or contractor or
vendor shall:
(A) Document this refusal or
unwillingness in the licensee’s,
applicant’s, or contractor’s or vendor’s
record of the investigation; and
(B) Obtain a confirmation of
employment, educational enrollment
and attendance, or other form of
engagement claimed by the individual
from at least one alternate source that
has not been previously used.
(v) When any licensee, applicant,
contractor, or vendor is seeking the
information required for an unescorted
access or unescorted access
authorization decision under this
section and has obtained a signed
release from the subject individual
authorizing the disclosure of such
information, other licensees, applicants,
contractors and vendors shall make
available the personal or access
authorization information requested
regarding the denial or unfavorable
termination of unescorted access or
unescorted access authorization.
(vi) In conducting an employment
history evaluation, the licensee,
applicant, contractor, or vendor may
obtain information and documents by
electronic means, including, but not
limited to, telephone, facsimile, or email. Licensees, applicants, contractors,
or vendors shall make a record of the
contents of the telephone call and shall
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
retain that record, and any documents
or electronic files obtained
electronically, in accordance with
paragraph (o) of this section.
(5) Credit history evaluation.
Licensees, applicants, contractors and
vendors shall ensure that the full credit
history of any individual who is
applying for unescorted access or
unescorted access authorization is
evaluated. A full credit history
evaluation must include, but is not
limited to, an inquiry to detect potential
fraud or misuse of social security
numbers or other financial identifiers,
and a review and evaluation of all of the
information that is provided by a
national credit-reporting agency about
the individual’s credit history. For
individuals including foreign nationals
and United States citizens who have
resided outside the United States and do
not have established credit history that
covers at least the most recent seven
years in the United States, the licensee,
applicant, contractor or vendor must
document all attempts to obtain
information regarding the individual’s
credit history and financial
responsibility from some relevant entity
located in that other country or
countries.
(6) Character and reputation
evaluation. Licensees, applicants,
contractors, and vendors shall ascertain
the character and reputation of an
individual who has applied for
unescorted access or unescorted access
authorization by conducting reference
checks. Reference checks may not be
conducted with any person who is
known to be a close member of the
individual’s family, including but not
limited to, the individual’s spouse,
parents, siblings, or children, or any
individual who resides in the
individual’s permanent household. The
reference checks must focus on the
individual’s reputation for
trustworthiness and reliability.
(7) Criminal history review. The
licensee’s or applicant’s reviewing
official shall evaluate the entire criminal
history record of an individual who is
applying for unescorted access or
unescorted access authorization to
determine whether the individual has a
record of criminal activity that may
adversely impact his or her
trustworthiness and reliability. A
criminal history record must be
obtained in accordance with the
requirements of § 73.57. For individuals
who do not have or are not expected to
have unescorted access, a criminal
history record of the individual shall be
obtained in accordance with the
requirements set forth in paragraph
(k)(1)(ii) of this section.
PO 00000
Frm 00057
Fmt 4701
Sfmt 4700
13981
(e) Psychological assessment. In order
to assist in determining an individual’s
trustworthiness and reliability,
licensees, applicants, contractors or
vendors shall ensure that a
psychological assessment has been
completed before the individual is
granted unescorted access or certified
unescorted access authorization.
Individuals who are applying for initial
unescorted access or unescorted access
authorization, or who have not
maintained unescorted access or
unescorted access authorization for
greater than 365 days, shall be subject
to a psychological assessment. The
psychological assessment must be
designed to evaluate the possible
adverse impact of any noted
psychological characteristics on the
individual’s trustworthiness and
reliability.
(1) A licensed psychologist or
psychiatrist with the appropriate
training and experience shall conduct
the psychological assessment.
(2) The psychological assessment
must be conducted in accordance with
the applicable ethical principles for
conducting such assessments
established by the American
Psychological Association or American
Psychiatric Association.
(3) At a minimum, the psychological
assessment must include the
administration and interpretation of a
standardized, objective, professionallyaccepted psychological test that
provides information to identify
indications of disturbances in
personality or psychopathology that
may have adverse implications for an
individual’s trustworthiness and
reliability. A psychiatrist or
psychologist specified in paragraph (e)
of this section shall establish the
predetermined thresholds for each scale,
in accordance with paragraph (e)(2) of
this section, that must be applied in
interpreting the results of the
psychological test to determine whether
an individual must be interviewed by a
licensed psychiatrist or psychologist,
under § 73.56(e)(4)(i) of this section.
(4) The psychological assessment
must include a clinical interview:
(i) If an individual’s scores on the
psychological test in paragraph (e)(3) of
this section identify indications of
disturbances in personality or
psychopathology that may have
implications for an individual’s
trustworthiness and reliability; or
(ii) If the individual is a member of
the population that performs one or
more job functions that are critical to
the safe and secure operation of the
licensee’s facility, as defined in
paragraph (i)(1)(v)(B) of this section.
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13982
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
(5) In the course of conducting a
psychological assessment for those
individuals who are specified in
paragraph (h) of this section for initial
unescorted access or unescorted access
authorization category, if the licensed
psychologist or psychiatrist identifies or
discovers any information, including a
medical condition, that could adversely
impact the individual’s fitness for duty
or trustworthiness and reliability, the
licensee, applicant, or contractor or
vendor shall ensure that the
psychologist or psychiatrist contact
appropriate medical personnel to obtain
further information as need for a
determination. The results of the
evaluation and a recommendation shall
be provided to the licensee’s or
applicant’s reviewing official.
(6) During psychological
reassessments, if the licensed
psychologist or psychiatrist identifies or
discovers any information, including a
medical condition, that could adversely
impact the fitness for duty or
trustworthiness and reliability of those
individuals who are currently granted
unescorted access or certified
unescorted access authorization status,
he or she shall inform (1) the reviewing
official of the discovery within 24 hours
of the discovery and (2) the medical
personnel designated in the site
implementing procedures, who shall
ensure that an appropriate evaluation of
the possible medical condition is
conducted under the requirements of
part 26 of this chapter. The results of the
evaluation and a recommendation shall
be provided to the licensee’s or
applicant’s reviewing official.
(f) Behavioral observation. (1)
Licensee and applicant access
authorization programs must include a
behavioral observation program that is
designed to detect behaviors or
activities that may constitute an
unreasonable risk to the health and
safety of the public and common
defense and security, including a
potential threat to commit radiological
sabotage. Licensees, applicants and
contractors or vendors must ensure that
the individuals specified in paragraph
(b)(1) and, if applicable, (b)(2) of this
section are subject to behavioral
observation.
(2) Each person subject to the
behavior observation program shall be
responsible for communicating to the
licensee or applicant observed behaviors
of individuals subject to the
requirements of this section. Such
behaviors include any behavior of
individuals that may adversely affect
the safety or security of the licensee’s
facility or that may constitute an
unreasonable risk to the public health
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
and safety or the common defense and
security, including a potential threat to
commit radiological sabotage.
(i) Licensees, applicants, and
contractors or vendors shall ensure that
individuals who are subject to this
section also successfully complete
initial behavioral observation training
and requalification behavior observation
training as required in paragraphs
(f)(2)(ii) and (iii) of this section.
(ii) Behavioral observation training
must be:
(A) Completed before the licensee
grants unescorted access or certifies
unescorted access authorization or an
applicant certifies unescorted access
authorization, as defined in paragraph
(h)(4)(ii) of this section,
(B) Current before the licensee grants
unescorted access update or
reinstatement or licensee or applicant
certifies unescorted access authorization
reinstatement as defined in paragraph
(h)(4)(ii) of this section, and
(C) Maintained in a current status
during any period of time an individual
possesses unescorted access or
unescorted access authorization in
accordance with paragraph (f)(2)(iv) of
this section.
(iii) For initial behavioral observation
training, individuals shall demonstrate
completion by passing a comprehensive
examination that addresses the
knowledge and abilities necessary to
detect behavior or activities that have
the potential to constitute an
unreasonable risk to the health and
safety of the public and common
defense and security, including a
potential threat to commit radiological
sabotage. Remedial training and retesting are required for individuals who
fail to satisfactorily complete the
examination.
(iv) Individuals shall complete
refresher training on a nominal 12month frequency, or more frequently
where the need is indicated. Individuals
may take and pass a comprehensive
examination that meets the
requirements of paragraph (f)(2)(iii) of
this section in lieu of completing annual
refresher training.
(v) Initial and refresher training may
be delivered using a variety of media,
including, but not limited to, classroom
lectures, required reading, video, or
computer-based training systems. The
licensee, applicant, or contractor or
vendor shall monitor the completion of
training.
(3) Individuals who are subject to an
access authorization program under this
section shall at a minimum, report any
concerns arising from behavioral
observation, including, but not limited
to, concerns related to any questionable
PO 00000
Frm 00058
Fmt 4701
Sfmt 4700
behavior patterns or activities of others
to the reviewing official, his or her
supervisor, or other management
personnel designated in their site
procedures. The recipient of the report
shall, if other than the reviewing
official, promptly convey the report to
the reviewing official, who shall
reassess the reported individual’s
unescorted access or unescorted access
authorization status. The reviewing
official shall determine the elements of
the reassessment based on the
accumulated information of the
individual. If the reviewing official has
a reason to believe that the reported
individual’s trustworthiness or
reliability is questionable, the reviewing
official shall either administratively
withdraw or terminate the individual’s
unescorted access or unescorted access
authorization while completing the reevaluation or investigation. If the
reviewing official determines from the
information provided that there is cause
for additional action, the reviewing
official may inform the supervisor of the
reported individual.
(g) Self-reporting of legal actions. (1)
Any individual who has applied for
unescorted access or unescorted access
authorization or is maintaining
unescorted access or unescorted access
authorization under this section shall
promptly report to the reviewing
official, his or her supervisor, or other
management personnel designated in
site procedures any legal action(s) taken
by a law enforcement authority or court
of law to which the individual has been
subject that could result in incarceration
or a court order or that requires a court
appearance, including but not limited to
an arrest, an indictment, the filing of
charges, or a conviction, but excluding
minor civil actions or misdemeanors
such as parking violations or speeding
tickets. The recipient of the report shall,
if other than the reviewing official,
promptly convey the report to the
reviewing official. On the day that the
report is received, the reviewing official
shall evaluate the circumstances related
to the reported legal action(s) and redetermine the reported individual’s
unescorted access or unescorted access
authorization status.
(2) The licensee or applicant shall
inform the individual of this obligation,
in writing, prior to granting unescorted
access or certifying unescorted access
authorization.
(h) Granting unescorted access and
certifying unescorted access
authorization. Licensees and applicants
shall implement the requirements of
this paragraph for granting or certifying
initial or reinstated unescorted access or
unescorted access authorization. The
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
investigatory information collected to
satisfy the requirements of this section
for individuals who are being
considered for unescorted access or
unescorted access authorization shall be
valid for a trustworthiness and
reliability determination by a licensee or
applicant for 30 calendar days.
(1) Determination basis.
(i) The licensee’s or applicant’s
reviewing official shall determine
whether to grant, certify, deny,
unfavorably terminate, maintain, or
administratively withdraw an
individual’s unescorted access or
unescorted access authorization status,
based on an evaluation of all of the
information required by this section.
(ii) The licensee’s or applicant’s
reviewing official may not grant
unescorted access or certify unescorted
access authorization status to an
individual until all of the information
required by this section has been
evaluated by the reviewing official and
the reviewing official has determined
that the accumulated information
supports a determination of the
individual’s trustworthiness and
reliability. However, the reviewing
official may deny or terminate
unescorted access or unescorted access
authorization of any individual based
on disqualifying information even if not
all the information required by this
section has been collected or evaluated.
(2) Unescorted access for NRCcertified personnel. Licensees and
applicants shall grant unescorted access
to any individual who has been certified
by the Nuclear Regulatory Commission
as suitable for such access.
(3) Access denial. Licensees or
applicants may not permit an
individual, who is identified as having
an access-denied status by another
licensee subject to this section, or has an
access authorization status other than
favorably terminated, to enter any
nuclear power plant protected area or
vital area, under escort or otherwise, or
take actions by electronic means that
could adversely impact the licensee’s or
applicant’s safety, security, or
emergency response or their facilities,
under supervision or otherwise, except
upon completion of the initial
unescorted access authorization process.
(4) Granting unescorted access and
certifying unescorted access
authorization.
(i) Initial unescorted access or
unescorted access authorization. In
satisfying the requirements of paragraph
(h)(1) of this section, for individuals
who have never held unescorted access
or unescorted access authorization
status or whose unescorted access or
unescorted access authorization status
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
has been interrupted for a period of 3
years or more, the licensee, applicant, or
contractor or vendor shall satisfy the
requirements of paragraphs (d), (e), (f),
and (g) of this section. In meeting
requirements set forth in paragraph
(d)(4) of this section, the licensee,
applicant, or contractor or vendor shall
evaluate the 3 years before the date on
which the application for unescorted
access was submitted, or since the
individual’s eighteenth birthday,
whichever is shorter. For the 1-year
period proceeding the date upon which
the individual applies for unescorted
access or unescorted access
authorization, the licensee, applicant or
contractor or vendor shall ensure that
the employment history evaluation is
conducted with every employer,
regardless of the length of employment.
For the remaining 2-year period, the
licensee, applicant, or contractor or
vendor shall ensure that the
employment history evaluation is
conducted with the employer by whom
the individual claims to have been
employed the longest within each
calendar month.
(ii) Reinstatement of Unescorted
Access. In satisfying the requirements of
paragraph (h)(1) of this section, for
individuals who have previously been
granted unescorted access or unescorted
access authorization, but whose access
had been terminated under favorable
conditions, licensees, applicants or
contractors or vendors shall satisfy the
requirements of paragraphs (d), (e), (f),
and (g) of this section, with
consideration of the specific
requirements for periods of interruption
described below in paragraphs
(h)(4)(ii)(A) or (h)(4)(ii)(B) of this
section, as applicable. However, for
individuals whose unescorted access or
unescorted access authorization was
interrupted for less than or equal to 30
calendar days, licensees, applicants, or
contractors or vendors must only satisfy
the requirements set forth in paragraphs
(d)(1), (d)(2), and (d)(3) of this section.
The applicable periods of interruption
are determined by the number of
calendar days between the day after the
individual’s access was terminated and
the day upon which the individual
applies for unescorted access or
unescorted access authorization.
(A) For individuals whose last
unescorted access or unescorted access
authorization status has been
interrupted for more than 30 calendar
days but less than or equal to 365
calendar days, the licensee, applicant or
contractor or vendor shall complete the
individual’s employment history
evaluation in accordance with the
requirements of paragraph (d)(4) of this
PO 00000
Frm 00059
Fmt 4701
Sfmt 4700
13983
section, within 5 business days after
reinstatement. The licensee, applicant,
or contractor or vendor shall ensure that
the employment history evaluation has
been conducted with the employer by
whom the individual claims to have
been employed the longest within the
calendar month. However, if the
employment history evaluation is not
completed within 5 business days of
reinstatement due to circumstances that
are outside of the licensee’s, applicant’s,
or contractor’s or vendor’s control and
the licensee or applicant, contractor or
vendor is not aware of any potentially
disqualifying information regarding the
individual within the past 5 years, the
licensee may extend the individual’s
unescorted access an additional 5
business days. If the employment
history evaluation is not completed
within this extended 5 business days,
the licensee shall administratively
withdraw unescorted access and
complete the employment history
evaluation in accordance with
§ 73.56(d)(4) of this section. For recertification of unescorted access
authorization, prior to re-certification of
unescorted access authorization status
of an individual, the licensee or
applicant shall complete all the
elements stated above including drug
screening and employment evaluation.
(B) For individuals whose last
unescorted access or unescorted access
authorization status has been
interrupted for greater than 365 calendar
days but fewer than 3 years the licensee,
applicant or contractor or vendor shall
evaluate the period of time since the
individual last held unescorted access
or unescorted access authorization
status, up to and including the day the
individual applies for re-instated
unescorted access authorization. For the
1-year period proceeding the date upon
which the individual applies for
unescorted access authorization, the
licensee, applicant, or contractor or
vendor shall ensure that the
employment history evaluation is
conducted with every employer,
regardless of the length of employment.
For the remaining period, the licensee,
applicant or contractor or vendor shall
ensure that the employment history
evaluation is conducted with the
employer by whom the individual
claims to have been employed the
longest within each calendar month. In
addition, the individual shall be subject
to the psychological assessment
required in § 73.56(e).
(5) Accepting unescorted access
authorization from other access
authorization programs. Licensees who
are seeking to grant unescorted access or
certify unescorted access authorization
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13984
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
or applicants who are seeking to certify
unescorted access authorization to an
individual who is subject to another
access authorization program or another
access authorization program that
complies with this section may rely on
those access authorization programs or
access authorization program elements
to comply with the requirements of this
section. However, the licensee who is
seeking to grant unescorted access or the
licensee or applicant who is seeking to
certify unescorted access authorization
shall ensure that the program elements
to be accepted have been maintained
consistent with the requirements of this
section by the other access authorization
program.
(6) Information sharing. To meet the
requirements of this section, licensees,
applicants, and contractors or vendors
may rely upon the information that
other licensees, applicants, and
contractors or vendors who are also
subject to this section, have gathered
about individuals who have previously
applied for unescorted access or
unescorted access authorization, and
developed about individuals during
periods in which the individuals
maintained unescorted access or
unescorted access authorization status.
(i) Maintaining unescorted access or
unescorted access authorization.
(1) Individuals may maintain
unescorted access or unescorted access
authorization status under the following
conditions:
(i) The individual remains subject to
a behavioral observation program that
complies with the requirements of
§ 73.56(f) of this section.
(ii) The individual successfully
completes behavioral observation
refresher training or testing on the
nominal 12-month frequency required
in § 73.56(f)(2)(ii) of this section.
(iii) The individual complies with the
licensee’s or applicant’s access
authorization program policies and
procedures to which he or she is
subject, including the self-reporting of
legal actions responsibility specified in
paragraph (g) of this section.
(iv) The individual is subject to an
annual supervisory review conducted in
accordance with the requirements of the
licensee’s or applicant’s behavioral
observation program. The individual
shall be subject to a supervisory
interview in accordance with the
requirements of the licensee’s or
applicant’s behavioral observation
program, if the supervisor does not have
the frequent interaction with the
individual throughout the review period
needed to form an informed and
reasonable opinion regarding the
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
individual’s behavior, trustworthiness,
and reliability.
(v) The licensee’s or applicant’s
reviewing official determines that the
individual continues to be trustworthy
and reliable. This determination must,
at a minimum, be based on the
following:
(A) A criminal history update and
credit history re-evaluation for any
individual with unescorted access. The
criminal history update and credit
history re-evaluation must be completed
within 5 years of the date on which
these elements were last completed.
(B) For individuals who perform one
or more of the job functions described
in this paragraph, the trustworthiness
and reliability determination must be
based on a criminal history update and
credit history re-evaluation within three
years of the date on which these
elements were last completed, or more
frequently, based on job assignment as
determined by the licensee or applicant,
and a psychological re-assessment
within 5 years of the date on which this
element was last completed:
(1) Individuals who have extensive
knowledge of defensive strategies and
design and/or implementation of the
plant’s defense strategies, including—
(i) Site security supervisors;
(ii) Site security managers;
(iii) Security training instructors; and
(iv) Corporate security managers;
(2) Individuals in a position to grant
an applicant unescorted access or
unescorted access authorization,
including site access authorization
managers;
(3) Individuals assigned a duty to
search for contraband or other items that
could be used to commit radiological
sabotage (i.e., weapons, explosives,
incendiary devices);
(4) Individuals who have access,
extensive knowledge, or administrative
control over plant digital computer and
communication systems and networks
as identified in § 73.54, including—
(i) Plant network systems
administrators;
(ii) IT personnel who are responsible
for securing plant networks; or
(5) Individuals qualified for and
assigned duties as: armed security
officers, armed responders, alarm
station operators, response team leaders,
and armorers as defined in the
licensee’s or applicant’s Physical
Security Plan; and reactor operators,
senior reactor operators and nonlicensed operators. Non-licensed
operators include those individuals
responsible for the operation of plant
systems and components, as directed by
a reactor operator or senior reactor
operator. A non-licensed operator also
PO 00000
Frm 00060
Fmt 4701
Sfmt 4700
includes individuals who monitor plant
instrumentation and equipment and
principally perform their duties outside
of the control room.
(C) The criminal history update and
the credit history re-evaluation shall be
completed within 30 calendar days of
each other.
(vi) If the criminal history update,
credit history re-evaluation,
psychological re-assessment, if required,
and supervisory review and interview, if
applicable, have not been completed
and the information evaluated by the
reviewing official within the time frame
specified under paragraph (v) of this
section, the licensee or applicant shall
administratively withdraw the
individual’s unescorted access or
unescorted access authorization until
these requirements have been met.
(2) If an individual who has
unescorted access or unescorted access
authorization status is not subject to an
access authorization program that meets
the requirements of this part for more
than 30 continuous days, then the
licensee or applicant shall terminate the
individual’s unescorted access or
unescorted access authorization status
and the individual shall meet the
requirements in this section, as
applicable, to regain unescorted access
or unescorted access authorization.
(j) Access to vital areas. Licensees or
applicants shall establish, implement,
and maintain a list of individuals who
are authorized to have unescorted
access to specific nuclear power plant
vital areas during non-emergency
conditions. The list must include only
those individuals who have a continued
need for access to those specific vital
areas in order to perform their duties
and responsibilities. The list must be
approved by a cognizant licensee or
applicant manager or supervisor who is
responsible for directing the work
activities of the individual who is
granted unescorted access to each vital
area, and updated and re-approved no
less frequently than every 31 days.
(k) Trustworthiness and reliability of
background screeners and access
authorization program personnel.
Licensees, applicants, and contractors or
vendors shall ensure that any individual
who collects, processes, or has access to
personal information that is used to
make unescorted access or unescorted
access authorization determinations
under this section has been determined
to be trustworthy and reliable.
(1) Background screeners. Licensees,
applicants, and contractors or vendors
who rely on individuals who are not
directly under their control to collect
and process information that will be
used by a reviewing official to make
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
unescorted access or unescorted access
authorization determinations shall
ensure that a trustworthiness and
reliability evaluation of such
individuals has been completed to
support a determination that such
individuals are trustworthy and reliable.
At a minimum, the following checks are
required:
(i) Verify the individual’s true identity
as specified in paragraph (d)(3) of this
section;
(ii) A local criminal history review
and evaluation based on information
obtained from an appropriate State or
local court or agency in which the
individual resided;
(iii) A credit history review and
evaluation;
(iv) An employment history review
and evaluation covering the past 3
years; and
(v) An evaluation of character and
reputation.
(2) Access authorization program
personnel. Licensees, applicants, and
contractors or vendors shall ensure that
any individual who evaluates personal
information for the purpose of
processing applications for unescorted
access or unescorted access
authorization, including but not limited
to a psychologist or psychiatrist who
conducts psychological assessments
under § 73.56(e), has access to the files,
records, and personal information
associated with individuals who have
applied for unescorted access or
unescorted access authorization, or is
responsible for managing any databases
that contain such files, records, and
personal information has been
determined to be trustworthy and
reliable, as follows:
(i) The individual is subject to an
access authorization program that meets
the requirements of this section; or
(ii) The licensee, applicant, and
contractor or vendor determines that the
individual is trustworthy and reliable
based upon an evaluation that meets the
requirements of § 73.56(d)(1) through
(d)(6) and (e) and either a local criminal
history review and evaluation as
specified in § 73.56(k)(1)(ii) or a
criminal history check that meets the
requirements of § 73.56(d)(7).
(l) Review procedures. Each licensee
and applicant shall include a procedure
for the notification of individuals who
are denied unescorted access,
unescorted access authorization, or who
are unfavorably terminated.
Additionally, procedures must include
provisions for the review, at the request
of the affected individual, of a denial or
unfavorable termination of unescorted
access or unescorted access
authorization that may adversely affect
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
employment. The procedure must
contain a provision to ensure the
individual is informed of the grounds
for the denial or unfavorable
termination and allow the individual an
opportunity to provide additional
relevant information and an opportunity
for an objective review of the
information upon which the denial or
unfavorable termination of unescorted
access or unescorted access
authorization was based. The procedure
must provide for an impartial and
independent internal management
review. Licensees and applicants shall
not grant unescorted access or certify
unescorted access authorization, or
permit the individual to maintain
unescorted access or unescorted access
authorization during the review process.
(m) Protection of information. Each
licensee, applicant, contractor, or
vendor shall establish and maintain a
system of files and procedures to ensure
personal information is not disclosed to
unauthorized persons.
(1) Licensees, applicants and
contractors or vendors shall obtain
signed consent from the subject
individual that authorizes the disclosure
of any information collected and
maintained under this section before
disclosing the information, except for
disclosures to the following individuals:
(i) The subject individual or his or her
representative, when the individual has
designated the representative in writing
for specified unescorted access
authorization matters;
(ii) NRC representatives;
(iii) Appropriate law enforcement
officials under court order;
(iv) A licensee’s, applicant’s, or
contractor’s or vendor’s representatives
who have a need to have access to the
information in performing assigned
duties, including determinations of
trustworthiness and reliability and
audits of access authorization programs;
(v) The presiding officer in a judicial
or administrative proceeding that is
initiated by the subject individual;
(vi) Persons deciding matters under
the review procedures in paragraph (k)
of this section; or
(vii) Other persons pursuant to court
order.
(2) All information pertaining to a
denial or unfavorable termination of the
individual’s unescorted access or
unescorted access authorization shall be
promptly provided, upon receipt of a
written request by the subject individual
or his or her designated representative
as designated in writing. The licensee or
applicant may redact the information to
be released to the extent that personal
privacy information, including the name
PO 00000
Frm 00061
Fmt 4701
Sfmt 4700
13985
of the source of the information is
withheld.
(3) A contract with any individual or
organization who collects and maintains
personal information that is relevant to
an unescorted access or unescorted
access authorization determination must
require that such records be held in
confidence, except as provided in
paragraphs (m)(1) through (m)(2) of this
section.
(4) Licensees, applicants, or
contractors or vendors and any
individual or organization who collects
and maintains personal information on
behalf of a licensee, applicant, or
contractor or vendor, shall establish,
implement, and maintain a system and
procedures for the secure storage and
handling of the information collected.
(n) Audits and corrective action. Each
licensee and applicant shall be
responsible for the continuing
effectiveness of the access authorization
program, including access authorization
program elements that are provided by
the contractors or vendors, and the
access authorization programs of any of
the contractors or vendors that are
accepted by the licensee or applicant.
Each licensee, applicant, and contractor
or vendor shall ensure that access
authorization programs and program
elements are audited to confirm
compliance with the requirements of
this section and those comprehensive
actions are taken to correct any nonconformance that is identified.
(1) Each licensee and applicant shall
ensure that its entire access
authorization program is audited
nominally every 24 months. Licensees,
applicants and contractors or vendors
are responsible for determining the
appropriate frequency, scope, and depth
of additional auditing activities within
the nominal 24-month period based on
the review of program performance
indicators, such as the frequency,
nature, and severity of discovered
problems, personnel or procedural
changes, and previous audit findings.
(2) Access authorization program
services that are provided to a licensee
or applicant by contractor or vendor
personnel who are off site or are not
under the direct daily supervision or
observation of the licensee’s or
applicant’s personnel must be audited
by the licensee or applicant on a
nominal 12-month frequency. In
addition, any access authorization
program services that are provided to
contractors or vendors by subcontractor
personnel who are off site or are not
under the direct daily supervision or
observation of the contractor’s or
vendor’s personnel must be audited by
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13986
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
the licensee or applicant on a nominal
12-month frequency.
(3) Licensee’s and applicant’s
contracts with contractors or vendors
must reserve the licensee’s or
applicant’s right to audit the contractors
or vendors and the contractor’s or
vendor’s subcontractors providing
access authorization program services at
any time, including at unannounced
times, as well as to review all
information and documentation that is
reasonably relevant to the performance
of the program.
(4) Licensee’s and applicant’s
contracts with the contractors or
vendors, and contractors’ or vendors’
contracts with subcontractors, must also
require that the licensee or applicant
shall be provided access to and be
permitted to take away copies of any
documents or data that may be needed
to assure that the contractor or vendor
and its subcontractors are performing
their functions properly and that staff
and procedures meet applicable
requirements.
(5) Audits must focus on the
effectiveness of the access authorization
program or program element(s), as
appropriate. At least one member of the
licensee or applicant audit team shall be
a person who is knowledgeable of and
practiced with meeting the performance
objectives and requirements of the
access authorization program or
program elements being audited. The
individuals performing the audit of the
access authorization program or
program element(s) shall be
independent from both the subject
access authorization programs’
management and from personnel who
are directly responsible for
implementing the access authorization
program or program elements being
audited.
(6) The results of the audits, along
with any recommendations, must be
documented in the site corrective action
program in accordance with
§ 73.55(b)(10) and reported to senior
management having responsibility in
the area audited and to management
responsible for the access authorization
program. Each audit report must
identify conditions that are adverse to
the proper performance of the access
authorization program, the cause of the
condition(s), and, when appropriate,
recommended corrective actions, and
corrective actions taken. The licensee,
applicant, or contractor or vendor shall
review the audit findings and take any
additional corrective actions, to include
re-auditing of the deficient areas where
indicated, to preclude repetition of the
condition.
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
(7) Licensees and applicants may
jointly conduct audits, or may accept
audits of the contractors or vendors that
were conducted by other licensees and
applicants who are subject to this
section, if the audit addresses the
services obtained from the contractor or
vendor by each of the sharing licensees
and applicants. The contractors or
vendors may jointly conduct audits, or
may accept audits of its subcontractors
that were conducted by other licensees,
applicants, or contractors or vendors
who are subject to this section, if the
audit addresses the services obtained
from the subcontractor by each of the
sharing licensees, applicants, and the
contractors or vendors.
(i) Licensees, applicants, and
contractors or vendors shall review
audit records and reports to identify any
areas that were not covered by the
shared or accepted audit and ensure that
authorization program elements and
services upon which the licensee,
applicant, or contractor or vendor relies
are audited, if the program elements and
services were not addressed in the
shared audit.
(ii) Sharing licensees and applicants
need not re-audit the same contractor or
vendor for the same time. Sharing
contractors or vendors need not re-audit
the same subcontractor for the same
time.
(iii) Sharing licensees, applicants, and
contractors or vendors shall maintain a
copy of the shared audits, including
findings, recommendations, and
corrective actions.
(o) Records. Licensee, applicants, and
contractors or vendors shall maintain
the records that are required by the
regulations in this section for the period
specified by the appropriate regulation.
If a retention period is not otherwise
specified, these records must be
retained until the Commission
terminates the facility’s license,
certificate, or other regulatory approval.
(1) Records may be stored and
archived electronically, provided that
the method used to create the electronic
records meets the following criteria:
(i) Provides an accurate representation
of the original records;
(ii) Prevents unauthorized access to
the records;
(iii) Prevents the alteration of any
archived information and/or data once it
has been committed to storage; and
(iv) Permits easy retrieval and recreation of the original records.
(2) Licensees and applicants who are
subject to this section shall retain the
following records:
(i) Records of the information that
must be collected under paragraphs (d)
and (e) of this section that results in the
PO 00000
Frm 00062
Fmt 4701
Sfmt 4700
granting of unescorted access or rtifying
of unescorted access authorization for at
least 5 years after the licensee or
applicant terminates or denies an
individual’s unescorted access or
unescorted access authorization or until
the completion of all related legal
proceedings, whichever is later;
(ii) Records pertaining to denial or
unfavorable termination of unescorted
access or unescorted access
authorization and related management
actions for at least 5 years after the
licensee or applicant terminates or
denies an individual’s unescorted
access or unescorted access
authorization or until the completion of
all related legal proceedings, whichever
is later; and
(iii) Documentation of the granting
and termination of unescorted access or
unescorted access authorization for at
least 5 years after the licensee or
applicant terminates or denies an
individual’s unescorted access or
unescorted access authorization or until
the completion of all related legal
proceedings, whichever is later.
Contractors or vendors may maintain
the records that are or were pertinent to
granting, certifying, denying, or
terminating unescorted access or
unescorted access authorization that
they collected for licensees or
applicants. If the contractors or vendors
maintain the records on behalf of a
licensee or an applicant, they shall
follow the record retention requirement
specified in this section. Upon
termination of a contract between the
contractor and vendor and a licensee or
applicant, the contractor or vendor shall
provide the licensee or applicant with
all records collected for the licensee or
applicant under this chapter.
(3) Licensees, applicants, and
contractors or vendors shall retain the
following records for at least 3 years or
until the completion of all related
proceedings, whichever is later:
(i) Records of behavioral observation
training conducted under paragraph
(f)(2) of this section; and
(ii) Records of audits, audit findings,
and corrective actions taken under
paragraph (n) of this section.
(4) Licensees, applicants, and
contractors or vendors shall retain
written agreements for the provision of
services under this section, for three
years after termination or completion of
the agreement, or until completion of all
proceedings related to a denial or
unfavorable termination of unescorted
access or unescorted access
authorization that involved those
services, whichever is later.
(5) Licensees, applicants, and
contractors or vendors shall retain
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
records of the background
investigations, psychological
assessments, supervisory reviews, and
behavior observation program actions
related to access authorization program
personnel, conducted under paragraphs
(d) and (e) of this section, for the length
of the individual’s employment by or
contractual relationship with the
licensee, applicant, or the contractor or
vendor and three years after the
termination of employment, or until the
completion of any proceedings relating
to the actions of such access
authorization program personnel,
whichever is later.
(6) Licensees, applicants, and the
contractors or vendors who have been
authorized to add or manipulate data
that is shared with licensees subject to
this section shall ensure that data linked
to the information about individuals
who have applied for unescorted access
or unescorted access authorization,
which is specified in the licensee’s or
applicant’s access authorization
program documents, is retained.
(i) If the shared information used for
determining individual’s
trustworthiness and reliability changes
or new or additional information is
developed about the individual, the
licensees, applicants, and the
contractors or vendors that acquire this
information shall correct or augment the
data and ensure it is shared with
licensees subject to this section. If the
changed, additional or developed
information has implications for
adversely affecting an individual’s
trustworthiness and reliability, the
licensee, applicant, or the contractor or
vendor who discovered or obtained the
new, additional or changed information,
shall, on the day of discovery, inform
the reviewing official of any licensee or
applicant access authorization program
under which the individual is
maintaining his or her unescorted
access or unescorted access
authorization status of the updated
information.
(ii) The reviewing official shall
evaluate the shared information and
take appropriate actions, which may
include denial or unfavorable
termination of the individual’s
unescorted access authorization. If the
notification of change or updated
information cannot be made through
usual methods, licensees, applicants,
and the contractors or vendors shall take
manual actions to ensure that the
information is shared as soon as
reasonably possible. Records
maintained in any database(s) must be
available for NRC review.
(7) If a licensee or applicant
administratively withdraws an
VerDate Nov<24>2008
20:00 Mar 26, 2009
Jkt 217001
13987
individual’s unescorted access or
unescorted access authorization status
caused by a delay in completing any
portion of the background investigation
or for a licensee or applicant initiated
evaluation, or re-evaluation that is not
under the individual’s control, the
licensee or applicant shall record this
administrative action to withdraw the
individual’s unescorted access or
unescorted access authorization with
other licensees subject to this section.
However, licensees and applicants shall
not document this administrative
withdrawal as denial or unfavorable
termination and shall not respond to a
suitable inquiry conducted under the
provisions of 10 CFR parts 26, a
background investigation conducted
under the provisions of this section, or
any other inquiry or investigation as
denial nor unfavorable termination.
Upon favorable completion of the
background investigation element that
caused the administrative withdrawal,
the licensee or applicant shall
immediately ensure that any matter that
could link the individual to the
administrative action is eliminated from
the subject individual’s access
authorization or personnel record and
other records, except if a review of the
information obtained or developed
causes the reviewing official to
unfavorably terminate or deny the
individual’s unescorted access.
■ 14. Section 73.58 is added to read as
follows:
applicable Commission regulations,
requirements, and license conditions.
■ 15. In appendix B to part 73:
■ a. Add a new section heading VI to the
Table of Contents.
■ b. Amend the Introduction by adding
a new paragraph to the beginning of the
text, and
■ c. Add section VI to the end of the
appendix to read as follows:
§ 73.58 Safety/security interface
requirements for nuclear power reactors.
VI. Nuclear Power Reactor Training and
Qualification Plan for Personnel Performing
Security Program Duties
A. General Requirements and Introduction
1. The licensee shall ensure that all
individuals who are assigned duties and
responsibilities required to prevent
significant core damage and spent fuel
sabotage, implement the Commissionapproved security plans, licensee response
strategy, and implementing procedures, meet
minimum training and qualification
requirements to ensure each individual
possesses the knowledge, skills, and abilities
required to effectively perform the assigned
duties and responsibilities.
2. To ensure that those individuals who are
assigned to perform duties and
responsibilities required for the
implementation of the Commission-approved
security plans, licensee response strategy,
and implementing procedures are properly
suited, trained, equipped, and qualified to
perform their assigned duties and
responsibilities, the Commission has
developed minimum training and
qualification requirements that must be
implemented through a Commissionapproved training and qualification plan.
3. The licensee shall establish, maintain,
and follow a Commission-approved training
and qualification plan, describing how the
(a) Each operating nuclear power
reactor licensee with a license issued
under part 50 or 52 of this chapter shall
comply with the requirements of this
section.
(b) The licensee shall assess and
manage the potential for adverse effects
on safety and security, including the site
emergency plan, before implementing
changes to plant configurations, facility
conditions, or security.
(c) The scope of changes to be
assessed and managed must include
planned and emergent activities (such
as, but not limited to, physical
modifications, procedural changes,
changes to operator actions or security
assignments, maintenance activities,
system reconfiguration, access
modification or restrictions, and
changes to the security plan and its
implementation).
(d) Where potential conflicts are
identified, the licensee shall
communicate them to appropriate
licensee personnel and take
compensatory and/or mitigative actions
to maintain safety and security under
PO 00000
Frm 00063
Fmt 4701
Sfmt 4700
Appendix B to Part 73—General Criteria for
Security Personnel
Table of Contents
*
*
*
*
*
VI. Nuclear Power Reactor Training and
Qualification Plan for Personnel Performing
Security Program Duties
A. General Requirements and Introduction
B. Employment Suitability and Qualification
C. Duty Training
D. Duty Qualification and Requalification
E. Weapons Training
F. Weapons Qualification and Requalification
Program
G. Weapons, Personal Equipment and
Maintenance
H. Records
I. Reviews
J. Definitions
Introduction
Applicants and power reactor licensees
subject to the requirements of § 73.55 shall
comply only with the requirements of section
VI of this appendix. All other licensees,
applicants, or certificate holders shall
comply only with sections I through V of this
appendix.
*
E:\FR\FM\27MRR2.SGM
*
*
27MRR2
*
*
sroberts on PROD1PC70 with RULES
13988
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
minimum training and qualification
requirements set forth in this appendix will
be met, to include the processes by which all
individuals, will be selected, trained,
equipped, tested, and qualified.
4. Each individual assigned to perform
security program duties and responsibilities
required to effectively implement the
Commission-approved security plans,
licensee protective strategy, and the licensee
implementing procedures, shall demonstrate
the knowledge, skills, and abilities required
to effectively perform the assigned duties and
responsibilities before the individual is
assigned the duty or responsibility.
5. The licensee shall ensure that the
training and qualification program simulates,
as closely as practicable, the specific
conditions under which the individual shall
be required to perform assigned duties and
responsibilities.
6. The licensee may not allow any
individual to perform any security function,
assume any security duties or
responsibilities, or return to security duty,
until that individual satisfies the training and
qualification requirements of this appendix
and the Commission-approved training and
qualification plan, unless specifically
authorized by the Commission.
7. Annual requirements must be scheduled
at a nominal twelve (12) month periodicity.
Annual requirements may be completed up
to three (3) months before or three (3) months
after the scheduled date. However, the next
annual training must be scheduled twelve
(12) months from the previously scheduled
date rather than the date the training was
actually completed.
B. Employment Suitability and Qualification
1. Suitability.
(a) Before employment, or assignment to
the security organization, an individual shall:
(1) Possess a high school diploma or pass
an equivalent performance examination
designed to measure basic mathematical,
language, and reasoning skills, abilities, and
knowledge required to perform security
duties and responsibilities;
(2) Have attained the age of 21 for an armed
capacity or the age of 18 for an unarmed
capacity; and
(3) Not have any felony convictions that
reflect on the individual’s reliability.
(4) Individuals in an armed capacity,
would not be disqualified from possessing or
using firearms or ammunition in accordance
with applicable state or Federal law, to
include 18 U.S.C. 922. Licensees shall use
information that has been obtained during
the completion of the individual’s
background investigation for unescorted
access to determine suitability. Satisfactory
completion of a firearms background check
for the individual under 10 CFR 73.19 of this
part will also fulfill this requirement.
(b) The qualification of each individual to
perform assigned duties and responsibilities
must be documented by a qualified training
instructor and attested to by a security
supervisor.
2. Physical qualifications.
(a) General physical qualifications.
(1) Individuals whose duties and
responsibilities are directly associated with
the effective implementation of the
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
Commission-approved security plans,
licensee protective strategy, and
implementing procedures, may not have any
physical conditions that would adversely
affect their performance of assigned security
duties and responsibilities.
(2) Armed and unarmed individuals
assigned security duties and responsibilities
shall be subject to a physical examination
designed to measure the individual’s
physical ability to perform assigned duties
and responsibilities as identified in the
Commission-approved security plans,
licensee protective strategy, and
implementing procedures.
(3) This physical examination must be
administered by a licensed health
professional with the final determination
being made by a licensed physician to verify
the individual’s physical capability to
perform assigned duties and responsibilities.
(4) The licensee shall ensure that both
armed and unarmed individuals who are
assigned security duties and responsibilities
identified in the Commission-approved
security plans, the licensee protective
strategy, and implementing procedures, meet
the following minimum physical
requirements, as required to effectively
perform their assigned duties.
(b) Vision.
(1) For each individual, distant visual
acuity in each eye shall be correctable to 20/
30 (Snellen or equivalent) in the better eye
and
20/40 in the other eye with eyeglasses or
contact lenses.
(2) Near visual acuity, corrected or
uncorrected, shall be at least 20/40 in the
better eye.
(3) Field of vision must be at least 70
degrees horizontal meridian in each eye.
(4) The ability to distinguish red, green,
and yellow colors is required.
(5) Loss of vision in one eye is
disqualifying.
(6) Glaucoma is disqualifying, unless
controlled by acceptable medical or surgical
means, provided that medications used for
controlling glaucoma do not cause
undesirable side effects which adversely
affect the individual’s ability to perform
assigned security duties, and provided the
visual acuity and field of vision requirements
stated previously are met.
(7) On-the-job evaluation must be used for
individuals who exhibit a mild color vision
defect.
(8) If uncorrected distance vision is not at
least 20/40 in the better eye, the individual
shall carry an extra pair of corrective lenses
in the event that the primaries are damaged.
Corrective eyeglasses must be of the safety
glass type.
(9) The use of corrective eyeglasses or
contact lenses may not interfere with an
individual’s ability to effectively perform
assigned duties and responsibilities during
normal or emergency conditions.
(c) Hearing.
(1) Individuals may not have hearing loss
in the better ear greater than 30 decibels
average at 500 Hz, 1,000 Hz, and 2,000 Hz
with no level greater than 40 decibels at any
one frequency.
(2) A hearing aid is acceptable provided
suitable testing procedures demonstrate
PO 00000
Frm 00064
Fmt 4701
Sfmt 4700
auditory acuity equivalent to the hearing
requirement.
(3) The use of a hearing aid may not
decrease the effective performance of the
individual’s assigned security duties during
normal or emergency operations.
(d) Existing medical conditions.
(1) Individuals may not have an
established medical history or medical
diagnosis of existing medical conditions
which could interfere with or prevent the
individual from effectively performing
assigned duties and responsibilities.
(2) If a medical condition exists, the
individual shall provide medical evidence
that the condition can be controlled with
medical treatment in a manner which does
not adversely affect the individual’s fitnessfor-duty, mental alertness, physical
condition, or capability to otherwise
effectively perform assigned duties and
responsibilities.
(e) Addiction. Individuals may not have
any established medical history or medical
diagnosis of habitual alcoholism or drug
addiction, or, where this type of condition
has existed, the individual shall provide
certified documentation of having completed
a rehabilitation program which would give a
reasonable degree of confidence that the
individual would be capable of effectively
performing assigned duties and
responsibilities.
(f) Other physical requirements. An
individual who has been incapacitated due to
a serious illness, injury, disease, or operation,
which could interfere with the effective
performance of assigned duties and
responsibilities shall, before resumption of
assigned duties and responsibilities, provide
medical evidence of recovery and ability to
perform these duties and responsibilities.
3. Psychological qualifications.
(a) Armed and unarmed individuals shall
demonstrate the ability to apply good
judgment, mental alertness, the capability to
implement instructions and assigned tasks,
and possess the acuity of senses and ability
of expression sufficient to permit accurate
communication by written, spoken, audible,
visible, or other signals required by assigned
duties and responsibilities.
(b) A licensed psychologist, psychiatrist, or
physician trained in part to identify
emotional instability shall determine
whether armed members of the security
organization and alarm station operators in
addition to meeting the requirement stated in
paragraph (a) of this section, have no
emotional instability that would interfere
with the effective performance of assigned
duties and responsibilities.
(c) A person professionally trained to
identify emotional instability shall determine
whether unarmed individuals in addition to
meeting the requirement stated in paragraph
(a) of this section, have no emotional
instability that would interfere with the
effective performance of assigned duties and
responsibilities.
4. Medical examinations and physical
fitness qualifications.
(a) Armed members of the security
organization shall be subject to a medical
examination by a licensed physician, to
determine the individual’s fitness to
participate in physical fitness tests.
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
(1) The licensee shall obtain and retain a
written certification from the licensed
physician that no medical conditions were
disclosed by the medical examination that
would preclude the individual’s ability to
participate in the physical fitness tests or
meet the physical fitness attributes or
objectives associated with assigned duties.
(b) Before assignment, armed members of
the security organization shall demonstrate
physical fitness for assigned duties and
responsibilities by performing a practical
physical fitness test.
(1) The physical fitness test must consider
physical conditions such as strenuous
activity, physical exertion, levels of stress,
and exposure to the elements as they pertain
to each individual’s assigned security duties
for both normal and emergency operations
and must simulate site specific conditions
under which the individual will be required
to perform assigned duties and
responsibilities.
(2) The licensee shall describe the physical
fitness test in the Commission-approved
training and qualification plan.
(3) The physical fitness test must include
physical attributes and performance
objectives which demonstrate the strength,
endurance, and agility, consistent with
assigned duties in the Commission-approved
security plans, licensee protective strategy,
and implementing procedures during normal
and emergency conditions.
(4) The physical fitness qualification of
each armed member of the security
organization must be documented by a
qualified training instructor and attested to
by a security supervisor.
5. Physical requalification.
(a) At least annually, armed and unarmed
individuals shall be required to demonstrate
the capability to meet the physical
requirements of this appendix and the
licensee training and qualification plan.
(b) The physical requalification of each
armed and unarmed individual must be
documented by a qualified training instructor
and attested to by a security supervisor.
C. Duty Training
1. Duty training and qualification
requirements. All personnel who are
assigned to perform any security-related duty
or responsibility shall be trained and
qualified to perform assigned duties and
responsibilities to ensure that each
individual possesses the minimum
knowledge, skills, and abilities required to
effectively carry out those assigned duties
and responsibilities.
(a) The areas of knowledge, skills, and
abilities that are required to perform assigned
duties and responsibilities must be identified
in the licensee’s Commission-approved
training and qualification plan.
(b) Each individual who is assigned duties
and responsibilities identified in the
Commission-approved security plans,
licensee protective strategy, and
implementing procedures shall, before
assignment:
(1) Be trained to perform assigned duties
and responsibilities in accordance with the
requirements of this appendix and the
Commission-approved training and
qualification plan.
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
(2) Meet the minimum qualification
requirements of this appendix and the
Commission-approved training and
qualification plan.
(3) Be trained and qualified in the use of
all equipment or devices required to
effectively perform all assigned duties and
responsibilities.
2. On-the-job training.
(a) The licensee training and qualification
program must include on-the-job training
performance standards and criteria to ensure
that each individual demonstrates the
requisite knowledge, skills, and abilities
needed to effectively carry-out assigned
duties and responsibilities in accordance
with the Commission-approved security
plans, licensee protective strategy, and
implementing procedures, before the
individual is assigned the duty or
responsibility.
(b) In addition to meeting the requirement
stated in paragraph C.2.(a) of this appendix,
before assignment, individuals (e.g. response
team leaders, alarm station operators, armed
responders, and armed security officers
designated as a component of the protective
strategy) assigned duties and responsibilities
to implement the Safeguards Contingency
Plan shall complete a minimum of 40 hours
of on-the-job training to demonstrate their
ability to effectively apply the knowledge,
skills, and abilities required to effectively
perform assigned contingency duties and
responsibilities in accordance with the
approved safeguards contingency plan, other
security plans, licensee protective strategy,
and implementing procedures. On-the-job
training must be documented by a qualified
training instructor and attested to by a
security supervisor.
(c) On-the-job training for contingency
activities and drills must include, but is not
limited to, hands-on application of
knowledge, skills, and abilities related to:
(1) Response team duties.
(2) Use of force.
(3) Tactical movement.
(4) Cover and concealment.
(5) Defensive positions.
(6) Fields-of-fire.
(7) Re-deployment.
(8) Communications (primary and
alternate).
(9) Use of assigned equipment.
(10) Target sets.
(11) Table top drills.
(12) Command and control duties.
(13) Licensee Protective Strategy.
3. Performance Evaluation Program.
(a) Licensees shall develop, implement and
maintain a Performance Evaluation Program
that is documented in procedures which
describes how the licensee will demonstrate
and assess the effectiveness of their onsite
physical protection program and protective
strategy, including the capability of the
armed response team to carry out their
assigned duties and responsibilities during
safeguards contingency events. The
Performance Evaluation Program and
procedures shall be referenced in the
licensee’s Training and Qualifications Plan.
(b) The Performance Evaluation Program
shall include procedures for the conduct of
tactical response drills and force-on-force
PO 00000
Frm 00065
Fmt 4701
Sfmt 4700
13989
exercises designed to demonstrate and assess
the effectiveness of the licensee’s physical
protection program, protective strategy and
contingency event response by all
individuals with responsibilities for
implementing the safeguards contingency
plan.
(c) The licensee shall conduct tactical
response drills and force-on-force exercises
in accordance with Commission-approved
security plans, licensee protective strategy,
and implementing procedures.
(d) Tactical response drills and force-onforce exercises must be designed to challenge
the site protective strategy against elements
of the design basis threat and ensure each
participant assigned security duties and
responsibilities identified in the
Commission-approved security plans, the
licensee protective strategy, and
implementing procedures demonstrate the
requisite knowledge, skills, and abilities.
(e) Tactical response drills, force-on-force
exercises, and associated contingency
response training shall be conducted under
conditions that simulate, as closely as
practicable, the site-specific conditions under
which each member will, or may be, required
to perform assigned duties and
responsibilities.
(f) The scope of tactical response drills
conducted for training purposes shall be
determined by the licensee and must address
site-specific, individual or programmatic
elements, and may be limited to specific
portions of the site protective strategy.
(g) Each tactical response drill and forceon-force exercise shall include a documented
post-exercise critique in which participants
identify failures, deficiencies or other
findings in performance, plans, equipment or
strategies.
(h) Licensees shall document scenarios and
participants for all tactical response drills
and annual force-on-force exercises
conducted.
(i) Findings, deficiencies and failures
identified during tactical response drills and
force-on-force exercises that adversely affect
or decrease the effectiveness of the protective
strategy and physical protection program
shall be entered into the licensee’s corrective
action program to ensure that timely
corrections are made to the appropriate
program areas.
(j) Findings, deficiencies and failures
associated with the onsite physical
protection program and protective strategy
shall be protected as necessary in accordance
with the requirements of 10 CFR 73.21.
(k) For the purpose of tactical response
drills and force-on-force exercises, licensees
shall:
(1) Use no more than the total number of
armed responders and armed security officers
documented in the security plans.
(2) Minimize the number and effects of
artificialities associated with tactical
response drills and force-on-force exercises.
(3) Implement the use of systems or
methodologies that simulate the realities of
armed engagement through visual and
audible means, and reflect the capabilities of
armed personnel to neutralize a target though
the use of firearms.
(4) Ensure that each scenario used provides
a credible, realistic challenge to the
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13990
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
protective strategy and the capabilities of the
security response organization.
(l) The Performance Evaluation Program
must be designed to ensure that:
(1) Each member of each shift who is
assigned duties and responsibilities required
to implement the safeguards contingency
plan and licensee protective strategy
participates in at least one (1) tactical
response drill on a quarterly basis and one
(1) force-on-force exercise on an annual basis.
Force-on-force exercises conducted to satisfy
the NRC triennial evaluation requirement can
be used to satisfy the annual force-on-force
requirement for the personnel that participate
in the capacity of the security response
organization.
(2) The mock adversary force replicates, as
closely as possible, adversary characteristics
and capabilities of the design basis threat
described in 10 CFR 73.1(a)(1), and is capable
of exploiting and challenging the licensees
protective strategy, personnel, command and
control, and implementing procedures.
(3) Protective strategies can be evaluated
and challenged through the conduct of
tactical response tabletop demonstrations.
(4) Drill and exercise controllers are
trained and qualified to ensure that each
controller has the requisite knowledge and
experience to control and evaluate exercises.
(5) Tactical response drills and force-onforce exercises are conducted safely and in
accordance with site safety plans.
(m) Scenarios.
(1) Licensees shall develop and document
multiple scenarios for use in conducting
quarterly tactical response drills and annual
force-on-force exercises.
(2) Licensee scenarios must be designed to
test and challenge any components or
combination of components, of the onsite
physical protection program and protective
strategy.
(3) Each scenario must use a unique target
set or target sets, and varying combinations
of adversary equipment, strategies, and
tactics, to ensure that the combination of all
scenarios challenges every component of the
onsite physical protection program and
protective strategy to include, but not limited
to, equipment, implementing procedures,
and personnel.
D. Duty Qualification and Requalification
1. Qualification demonstration.
(a) Armed and unarmed individuals shall
demonstrate the required knowledge, skills,
and abilities to carry out assigned duties and
responsibilities as stated in the Commissionapproved security plans, licensee protective
strategy, and implementing procedures.
(b) This demonstration must include
written exams and hands-on performance
demonstrations.
(1) Written Exams. The written exams must
include those elements listed in the
Commission-approved training and
qualification plan and shall require a
minimum score of 80 percent to demonstrate
an acceptable understanding of assigned
duties and responsibilities, to include the
recognition of potential tampering involving
both safety and security equipment and
systems.
(2) Hands-on Performance Demonstrations.
Armed and unarmed individuals shall
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
demonstrate hands-on performance for
assigned duties and responsibilities by
performing a practical hands-on
demonstration for required tasks. The handson demonstration must ensure that theory
and associated learning objectives for each
required task are considered and each
individual demonstrates the knowledge,
skills, and abilities required to effectively
perform the task.
(3) Annual Written Exam. Armed
individuals shall be administered an annual
written exam that demonstrates the required
knowledge, skills, and abilities to carry out
assigned duties and responsibilities as an
armed member of the security organization.
The annual written exam must include those
elements listed in the Commission-approved
training and qualification plan and shall
require a minimum score of 80 percent to
demonstrate an acceptable understanding of
assigned duties and responsibilities.
(c) Upon request by an authorized
representative of the Commission, any
individual assigned to perform any securityrelated duty or responsibility shall
demonstrate the required knowledge, skills,
and abilities for each assigned duty and
responsibility, as stated in the Commissionapproved security plans, licensee protective
strategy, or implementing procedures.
2. Requalification.
(a) Armed and unarmed individuals shall
be requalified at least annually in accordance
with the requirements of this appendix and
the Commission-approved training and
qualification plan.
(b) The results of requalification must be
documented by a qualified training instructor
and attested by a security supervisor.
E. Weapons Training
1. General firearms training.
(a) Armed members of the security
organization shall be trained and qualified in
accordance with the requirements of this
appendix and the Commission-approved
training and qualification plan.
(b) Firearms instructors.
(1) Each armed member of the security
organization shall be trained and qualified by
a certified firearms instructor for the use and
maintenance of each assigned weapon to
include but not limited to, marksmanship,
assembly, disassembly, cleaning, storage,
handling, clearing, loading, unloading, and
reloading, for each assigned weapon.
(2) Firearms instructors shall be certified
from a national or state recognized entity.
(3) Certification must specify the weapon
or weapon type(s) for which the instructor is
qualified to teach.
(4) Firearms instructors shall be recertified
in accordance with the standards recognized
by the certifying national or state entity, but
in no case shall recertification exceed three
(3) years.
(c) Annual firearms familiarization. The
licensee shall conduct annual firearms
familiarization training in accordance with
the Commission-approved training and
qualification plan.
(d) The Commission-approved training and
qualification plan shall include, but is not
limited to, the following areas:
PO 00000
Frm 00066
Fmt 4701
Sfmt 4700
(1) Mechanical assembly, disassembly,
weapons capabilities and fundamentals of
marksmanship.
(2) Weapons cleaning and storage.
(3) Combat firing, day and night.
(4) Safe weapons handling.
(5) Clearing, loading, unloading, and
reloading.
(6) Firing under stress.
(7) Zeroing duty weapon(s) and weapons
sighting adjustments.
(8) Target identification and engagement.
(9) Weapon malfunctions.
(10) Cover and concealment.
(11) Weapon familiarization.
(e) The licensee shall ensure that each
armed member of the security organization is
instructed on the use of deadly force as
authorized by applicable state law.
(f) Armed members of the security
organization shall participate in weapons
range activities on a nominal four (4) month
periodicity. Performance may be conducted
up to five (5) weeks before, to five (5) weeks
after, the scheduled date. The next scheduled
date must be four (4) months from the
originally scheduled date.
F. Weapons Qualification and Requalification
Program
1. General weapons qualification
requirements.
(a) Qualification firing must be
accomplished in accordance with
Commission requirements and the
Commission-approved training and
qualification plan for assigned weapons.
(b) The results of weapons qualification
and requalification must be documented and
retained as a record.
2. Tactical weapons qualification. The
licensee Training and Qualification Plan
must describe the firearms used, the firearms
qualification program, and other tactical
training required to implement the
Commission-approved security plans,
licensee protective strategy, and
implementing procedures. Licensee
developed tactical qualification and requalification courses must describe the
performance criteria needed to include the
site specific conditions (such as lighting,
elevation, fields-of-fire) under which
assigned personnel shall be required to carryout their assigned duties.
3. Firearms qualification courses. The
licensee shall conduct the following
qualification courses for each weapon used.
(a) Annual daylight qualification course.
Qualifying score must be an accumulated
total of 70 percent with handgun and
shotgun, and 80 percent with semiautomatic
rifle and/or enhanced weapons, of the
maximum obtainable target score.
(b) Annual night fire qualification course.
Qualifying score must be an accumulated
total of 70 percent with handgun and
shotgun, and 80 percent with semiautomatic
rifle and/or enhanced weapons, of the
maximum obtainable target score.
(c) Annual tactical qualification course.
Qualifying score must be an accumulated
total of 80 percent of the maximum
obtainable score.
4. Courses of fire.
(a) Handgun. Armed members of the
security organization, assigned duties and
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
responsibilities involving the use of a
revolver or semiautomatic pistol shall qualify
in accordance with standards established by
a law enforcement course, or an equivalent
nationally recognized course.
(b) Semiautomatic rifle. Armed members of
the security organization, assigned duties and
responsibilities involving the use of a
semiautomatic rifle shall qualify in
accordance with the standards established by
a law enforcement course, or an equivalent
nationally recognized course.
(c) Shotgun. Armed members of the
security organization, assigned duties and
responsibilities involving the use of a
shotgun shall qualify in accordance with
standards established by a law enforcement
course, or an equivalent nationally
recognized course.
(d) Enhanced weapons. Armed members of
the security organization, assigned duties and
responsibilities involving the use of any
weapon or weapons not described previously
shall qualify in accordance with applicable
standards established by a law enforcement
course or an equivalent nationally recognized
course for these weapons.
5. Firearms requalification.
(a) Armed members of the security
organization shall be re-qualified for each
assigned weapon at least annually in
accordance with Commission requirements
and the Commission-approved training and
qualification plan, and the results
documented and retained as a record.
(b) Firearms requalification must be
conducted using the courses of fire outlined
in paragraphs F.2, F.3, and F.4 of this section.
G. Weapons, Personal Equipment and
Maintenance
1. Weapons. The licensee shall provide
armed personnel with weapons that are
capable of performing the function stated in
the Commission-approved security plans,
licensee protective strategy, and
implementing procedures.
2. Personal equipment.
(a) The licensee shall ensure that each
individual is equipped or has ready access to
all personal equipment or devices required
for the effective implementation of the
Commission-approved security plans,
licensee protective strategy, and
implementing procedures.
(b) The licensee shall provide armed
security personnel, required for the effective
implementation of the Commission-approved
Safeguards Contingency Plan and
implementing procedures, at a minimum, but
is not limited to, the following:
(1) Gas mask, full face.
(2) Body armor (bullet-resistant vest).
(3) Ammunition/equipment belt.
(4) Two-way portable radios, 2 channels
minimum, 1 operating and 1 emergency.
(c) Based upon the licensee protective
strategy and the specific duties and
responsibilities assigned to each individual,
the licensee should provide, as appropriate,
but is not limited to, the following.
(1) Flashlights and batteries.
(2) Baton or other non-lethal weapons.
(3) Handcuffs.
(4) Binoculars.
(5) Night vision aids (e.g., goggles, weapons
sights).
(6) Hand-fired illumination flares or
equivalent.
VerDate Nov<24>2008
19:52 Mar 26, 2009
Jkt 217001
(7) Duress alarms.
3. Maintenance.
(a) Firearms maintenance program. Each
licensee shall implement a firearms
maintenance and accountability program in
accordance with the Commission regulations
and the Commission-approved training and
qualification plan. The program must
include:
(1) Semiannual test firing for accuracy and
functionality.
(2) Firearms maintenance procedures that
include cleaning schedules and cleaning
requirements.
(3) Program activity documentation.
(4) Control and accountability (weapons
and ammunition).
(5) Firearm storage requirements.
(6) Armorer certification.
H. Records
1. The licensee shall retain all reports,
records, or other documentation required by
this appendix in accordance with the
requirements of § 73.55(r).
2. The licensee shall retain each
individual’s initial qualification record for
three (3) years after termination of the
individual’s employment and shall retain
each re-qualification record for three (3) years
after it is superseded.
3. The licensee shall document data and
test results from each individual’s suitability,
physical, and psychological qualification and
shall retain this documentation as a record
for three (3) years from the date of obtaining
and recording these results.
I. Reviews
The licensee shall review the Commissionapproved training and qualification program
in accordance with the requirements of
§ 73.55(n).
J. Definitions
Terms defined in parts 50, 70, and 73 of
this chapter have the same meaning when
used in this appendix.
16. In appendix C to part 73, the
heading for appendix C is revised as set
out below, a heading for section I and
a new introductory paragraph are added
before the Introduction section, and
section II is added at the end of the
appendix to read as follows:
■
Appendix C to Part 73—Nuclear Power
Plant Safeguards Contingency Plans
I. Safeguards Contingency Plan
Licensee, applicants, and certificate
holders, with the exception of those who are
subject to the requirements of § 73.55 shall
comply with the requirements of this section.
*
*
*
*
*
II. Nuclear Power Plant Safeguards
Contingency Plans
A. Introduction
The safeguards contingency plan is a
documented plan that describes how licensee
personnel implement their physical
protection program to defend against threats
to their facility, up to and including the
design basis threat of radiological sabotage.
The goals of licensee safeguards contingency
plans are:
PO 00000
Frm 00067
Fmt 4701
Sfmt 4700
13991
(1) To organize the response effort at the
licensee level;
(2) To provide predetermined, structured
response by licensees to safeguards
contingencies;
(3) To ensure the integration of the licensee
response by other entities; and
(4) To achieve a measurable performance
in response capability.
Licensee safeguards contingency planning
should result in organizing the licensee’s
resources in such a way that the participants
will be identified, their responsibilities
specified, and the responses coordinated.
The responses should be timely, and include
personnel who are trained and qualified to
respond in accordance with a documented
training and qualification program.
The evaluation, validation, and testing of
this portion of the program shall be
conducted in accordance with appendix B of
this part, General Criteria for Security
Personnel. The licensee’s safeguards
contingency plan is intended to maintain
effectiveness during the implementation of
emergency plans developed under appendix
E to part 50 of this chapter.
B. Contents of the Plan
Each safeguards contingency plan shall
include five (5) categories of information:
(1) Background.
(2) Generic planning base.
(3) Licensee planning base.
(4) Responsibility matrix.
(5) Implementing procedures.
Although the implementing procedures
(the fifth category of plan information) are
the culmination of the planning process, and
are an integral and important part of the
safeguards contingency plan, they entail
operating details subject to frequent changes.
They need not be submitted to the
Commission for approval, but are subject to
inspection by NRC staff on a periodic basis.
1. Background. This category of
information shall identify the perceived
dangers and incidents that the plan will
address and a general description of how the
response is organized.
a. Perceived Danger—Consistent with the
design basis threat specified in § 73.1(a)(1),
licensees shall identify and describe the
perceived dangers, threats, and incidents
against which the safeguards contingency
plan is designed to protect.
b. Purpose of the Plan—Licensees shall
describe the general goals, objectives and
operational concepts underlying the
implementation of the approved safeguards
contingency plan.
c. Scope of the Plan—A delineation of the
types of incidents covered by the plan.
(i) How the onsite response effort is
organized and coordinated to effectively
respond to a safeguards contingency event.
(ii) How the onsite response for safeguards
contingency events has been integrated in
other site emergency response procedures.
d. Definitions—A list of terms and their
definitions used in describing operational
and technical aspects of the approved
safeguards contingency plan.
2. Generic Planning Base. Licensees shall
define the criteria for initiation and
E:\FR\FM\27MRR2.SGM
27MRR2
sroberts on PROD1PC70 with RULES
13992
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
termination of responses to security events to
include the specific decisions, actions, and
supporting information needed to respond to
each type of incident covered by the
approved safeguards contingency plan. To
achieve this result the generic planning base
must:
a. Identify those events that will be used
for signaling the beginning or aggravation of
a safeguards contingency event according to
how they are perceived initially by licensee’s
personnel. Licensees shall ensure detection
of unauthorized activities and shall respond
to all alarms or other indications signaling a
security event, such as penetration of a
protected area, vital area, or unauthorized
barrier penetration (vehicle or personnel);
tampering, bomb threats, or other threat
warnings—either verbal, such as telephoned
threats, or implied, such as escalating civil
disturbances.
b. Define the specific objective to be
accomplished relative to each identified
safeguards contingency event. The objective
may be to obtain a level of awareness about
the nature and severity of the safeguards
contingency to prepare for further responses;
to establish a level of response preparedness;
or to successfully nullify or reduce any
adverse safeguards consequences arising
from the contingency.
c. Identify the data, criteria, procedures,
mechanisms and logistical support necessary
to achieve the objectives identified.
3. Licensee Planning Base. This category of
information shall include factors affecting
safeguards contingency planning that are
specific for each facility. To the extent that
the topics are treated in adequate detail in
the licensee’s approved physical security
plan, they may be incorporated by reference
in the Safeguards Contingency Plan. The
following topics must be addressed:
a. Organizational Structure. The safeguards
contingency plan must describe the
organization’s chain of command and
delegation of authority during safeguards
contingency events, to include a general
description of how command and control
functions will be coordinated and
maintained.
b. Physical Layout. The safeguards
contingency plan must include a site map
depicting the physical structures located on
the site, including onsite independent spent
fuel storage installations, and a description of
the structures depicted on the map. Plans
must also include a description and map of
the site in relation to nearby towns,
transportation routes (e.g., rail, water, and
roads), pipelines, airports, hazardous
material facilities, and pertinent
environmental features that may have an
effect upon coordination of response
activities. Descriptions and maps must
indicate main and alternate entry routes for
law enforcement or other offsite response and
support agencies and the location for
marshaling and coordinating response
activities.
c. Safeguards Systems. The safeguards
contingency plan must include a description
of the physical security systems that support
and influence how the licensee will respond
to an event in accordance with the design
basis threat described in § 73.1(a). The
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
licensee’s description shall begin with onsite
physical protection measures implemented at
the outermost facility perimeter, and must
move inward through those measures
implemented to protect target set equipment.
(i) Physical security systems and security
systems hardware to be discussed include
security systems and measures that provide
defense in depth, such as physical barriers,
alarm systems, locks, area access, armaments,
surveillance, and communications systems.
(ii) The specific structure of the security
response organization to include the total
number of armed responders and armed
security officers documented in the approved
security plans as a component of the
protective strategy and a general description
of response capabilities shall also be
included in the safeguards contingency plan.
(iii) Licensees shall ensure that individuals
assigned duties and responsibilities to
implement the safeguards contingency plan
are trained and qualified in those duties
according to the Commission approved
security plans, training and qualification
plans, and the performance evaluation
program.
(iv) Armed responders shall be available to
respond from designated areas inside the
protected area at all times and may not be
assigned any other duties or responsibilities
that could interfere with assigned armed
response team duties and responsibilities.
(v) Licensees shall develop, implement,
and maintain a written protective strategy to
be documented in procedures that describe
in detail the physical protection measures,
security systems and deployment of the
armed response team relative to site specific
conditions, to include but not be limited to,
facility layout, and the location of target set
equipment and elements. The protective
strategy should support the general goals,
operational concepts, and performance
objectives identified in the licensee’s
safeguards contingency plan. The protective
strategy shall:
(1) Be designed to meet the performance
objectives of § 73.55(a) through (k).
(2) Identify predetermined actions, areas of
responsibility and timelines for the
deployment of armed personnel.
(3) Contain measures that limit the
exposure of security personnel to possible
attack, including incorporation of bullet
resisting protected positions.
(4) Contain a description of the physical
security systems and measures that provide
defense in depth such as physical barriers,
alarm systems, locks, area access, armaments,
surveillance, and communications systems.
(5) Describe the specific structure and
responsibilities of the armed response
organization to include:
The authorized minimum number of armed
responders, available at all times inside the
protected area.
The authorized minimum number of armed
security officers, available onsite at all times.
The total number of armed responders and
armed security officers documented in the
approved security plans as a component of
the protective strategy.
(6) Provide a command and control
structure, to include response by off-site law
enforcement agencies, which ensures that
PO 00000
Frm 00068
Fmt 4701
Sfmt 4700
decisions and actions are coordinated and
communicated in a timely manner to
facilitate response.
d. Law Enforcement Assistance. Provide a
listing of available law enforcement agencies
and a general description of their response
capabilities and their criteria for response
and a discussion of working agreements or
arrangements for communicating with these
agencies.
e. Policy Constraints and Assumptions.
The safeguards contingency plan shall
contain a discussion of State laws, local
ordinances, and company policies and
practices that govern licensee response to
incidents and must include, but is not
limited to, the following.
(i) Use of deadly force.
(ii) Recall of off-duty employees.
(iii) Site jurisdictional boundaries.
(iv) Use of enhanced weapons, if
applicable.
f. Administrative and Logistical
Considerations. Descriptions of licensee
practices which influence how the security
organization responds to a safeguards
contingency event to include, but not limited
to, a description of the procedures that will
be used for ensuring that equipment needed
to facilitate response will be readily
accessible, in good working order, and in
sufficient supply.
4. Responsibility Matrix. This category of
information consists of the detailed
identification of responsibilities and specific
actions to be taken by licensee organizations
and/or personnel in response to safeguards
contingency events.
a. Licensees shall develop site procedures
that consist of matrixes detailing the
organization and/or personnel responsible for
decisions and actions associated with
specific responses to safeguards contingency
events. The responsibility matrix and
procedures shall be referenced in the
licensee’s safeguards contingency plan.
b. Responsibility matrix procedures shall
be based on the events outlined in the
licensee’s Generic Planning Base and must
include the following information:
(i) The definition of the specific objective
to be accomplished relative to each identified
safeguards contingency event. The objective
may be to obtain a level of awareness about
the nature and severity of the safeguards
contingency to prepare for further responses,
to establish a level of response preparedness,
or to successfully nullify or reduce any
adverse safeguards consequences arising
from the contingency.
(ii) A tabulation for each identified
initiating event and each response entity
which depicts the assignment of
responsibilities for decisions and actions to
be taken in response to the initiating event.
(iii) An overall description of response
actions and interrelationships specifically
associated with each responsible entity must
be included.
c. Responsibilities shall be assigned in a
manner that precludes conflict of duties and
responsibilities that would prevent the
execution of the safeguards contingency plan
and emergency response plans.
d. Licensees shall ensure that
predetermined actions can be completed
under the postulated conditions.
E:\FR\FM\27MRR2.SGM
27MRR2
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Rules and Regulations
sroberts on PROD1PC70 with RULES
5. Implementing Procedures.
(i) Licensees shall establish and maintain
written implementing procedures that
provide specific guidance and operating
details that identify the actions to be taken
and decisions to be made by each member of
the security organization who is assigned
duties and responsibilities required for the
effective implementation of the security
plans and the site protective strategy.
(ii) Licensees shall ensure that
implementing procedures accurately reflect
the information contained in the
Responsibility Matrix required by this
VerDate Nov<24>2008
17:52 Mar 26, 2009
Jkt 217001
appendix, the security plans, and other site
plans.
(iii) Implementing procedures need not be
submitted to the Commission for approval
but are subject to inspection.
C. Records and Reviews
1. Licensees shall review the safeguards
contingency plan in accordance with the
requirements of § 73.55(n).
2. The safeguards contingency plan audit
must include a review of applicable elements
of the Physical Security Plan, Training and
Qualification Plan, implementing procedures
and practices, the site protective strategy, and
PO 00000
Frm 00069
Fmt 4701
Sfmt 4700
13993
response agreements made by local, State,
and Federal law enforcement authorities.
3. Licensees shall retain all reports,
records, or other documentation required by
this appendix in accordance with the
requirements of § 73.55.
Dated at Rockville, Maryland, this 13th day
of March 2009.
For the Nuclear Regulatory Commission.
Annette L. Vietti-Cook,
Secretary of the Commission.
[FR Doc. E9–6102 Filed 3–26–09; 8:45 am]
BILLING CODE 7590–01–P
E:\FR\FM\27MRR2.SGM
27MRR2
Agencies
[Federal Register Volume 74, Number 58 (Friday, March 27, 2009)]
[Rules and Regulations]
[Pages 13926-13993]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E9-6102]
[[Page 13925]]
-----------------------------------------------------------------------
Part III
Nuclear Regulatory Commission
-----------------------------------------------------------------------
10 CFR Parts 50, 52, 72 et al.
-----------------------------------------------------------------------
Power Reactor Security Requirements; Final Rule
Federal Register / Vol. 74 , No. 58 / Friday, March 27, 2009 / Rules
and Regulations
[[Page 13926]]
-----------------------------------------------------------------------
NUCLEAR REGULATORY COMMISSION
10 CFR Parts 50, 52, 72, and 73
[NRC-2008-0019]
RIN 3150-AG63
Power Reactor Security Requirements
AGENCY: Nuclear Regulatory Commission.
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: The Nuclear Regulatory Commission (NRC) is amending its
security regulations and adding new security requirements pertaining to
nuclear power reactors. This rulemaking establishes and updates
generically applicable security requirements similar to those
previously imposed by Commission orders issued after the terrorist
attacks of September 11, 2001. Additionally, this rulemaking adds
several new requirements not derived directly from the security order
requirements but developed as a result of insights gained from
implementation of the security orders, review of site security plans,
implementation of the enhanced baseline inspection program, and NRC
evaluation of force-on-force exercises. This rulemaking also updates
the NRC's security regulatory framework for the licensing of new
nuclear power plants. Finally, it resolves three petitions for
rulemaking (PRM) that were considered during the development of the
final rule.
DATES: Effective Date: This final rule is effective on May 26, 2009.
Compliance Date: Compliance with this final rule is required by March
31, 2010, for licensees currently licensed to operate under 10 CFR Part
50.
ADDRESSES: You can access publicly available documents related to this
document using the following methods:
Federal e-Rulemaking Portal: Go to https://www.regulations.gov and
search for documents filed under Docket ID [NRC-2008-0019]. Address
questions about NRC Dockets to Carol Gallagher at 301-492-3668; e-mail
Carol.Gallagher@nrc.gov.
NRC's Public Document Room (PDR): The public may examine and have
copied for a fee publicly available documents at the NRC's PDR, Public
File Area O1 F21, One White Flint North, 11555 Rockville Pike,
Rockville, Maryland.
NRC's Agency Wide Documents Access and Management System (ADAMS):
Publicly available documents created or received at the NRC are
available electronically at the NRC's Electronic Reading Room at https://www.nrc.gov/reading-rm/adams.html. From this page, the public can gain
entry into ADAMS, which provides text and image files of the NRC's
public documents. If you do not have access to ADAMS or if there are
problems in accessing the documents located in ADAMS, contact the NRC's
PDR reference staff at 1-800-397-4209, 301-415-4737 or by e-mail to
pdr.resource@nrc.gov.
FOR FURTHER INFORMATION CONTACT: Ms. Bonnie Schnetzler, Office of
Nuclear Security and Incident Response, U.S. Nuclear Regulatory
Commission, Washington, DC 20555-0001; telephone 301-415-7883; e-mail:
Bonnie.Schnetzler@nrc.gov, or Mr. Timothy Reed, Office of Nuclear
Reactor Regulation, U.S. Nuclear Regulatory Commission, Washington, DC
20555-0001; telephone 301-415-1462; e-mail: Timothy.Reed@nrc.gov.
SUPPLEMENTARY INFORMATION:
I. Background
II. Petitions for Rulemaking
III. Discussion of Substantive Changes and Responses to Significant
Comments
IV. Section-by-Section Analysis
V. Guidance
VI. Criminal Penalties
VII. Availability of Documents
VIII. Voluntary Consensus Standards
IX. Finding of No Significant Environmental Impact
X. Paperwork Reduction Act Statement
XI. Regulatory Analysis
XII. Regulatory Flexibility Certification
XIII. Backfit Analysis
XIV. Congressional Review Act
I. Background
A. Historical Background and Overview
Following the terrorist attacks on September 11, 2001, the
Commission issued a series of orders to ensure that nuclear power
plants and other licensed facilities continued to have effective
security measures in place given the changing threat environment.
Through these orders, the Commission supplemented the design basis
threat (DBT) as well as mandated specific training enhancements, access
authorization enhancements, and enhancements to defensive strategies,
mitigative measures, and integrated response. Additionally, through
generic communications, the Commission specified expectations for
enhanced notifications to the NRC for certain security events or
suspicious activities. The four following security orders were issued
to licensees:
EA-02-026, ``Interim Compensatory Measures (ICM) Order,''
issued February 25, 2002 (March 4, 2002; 67 FR 9792);
EA-02-261, ``Access Authorization Order,'' issued January
7, 2003 (January 13, 2003; 68 FR 1643);
EA-03-039, ``Security Personnel Training and Qualification
Requirements (Training) Order,'' issued April 29, 2003, (May 7, 2003;
68 FR 24514); and
EA-03-086, ``Revised Design Basis Threat Order,'' issued
April 29, 2003, (May 7, 2003; 68 FR 24517).
Nuclear power plant licensees revised their physical security
plans, access authorization programs, training and qualification plans,
and safeguards contingency plans in response to these orders. The
Commission completed its review and approval of the revised security
plans on October 29, 2004. These plans incorporated the enhancements
required by the orders. While the specifics of these enhancements are
protected as Safeguards Information consistent with 10 CFR 73.21, the
enhancements resulted in measures such as increased patrols; augmented
security forces and capabilities; additional security posts; additional
physical barriers; vehicle checks at greater standoff distances;
enhanced coordination with law enforcement authorities; augmented
security and emergency response training, equipment, and communication;
and more restrictive site access controls for personnel including
expanded, expedited, and more thorough employee background
investigations.
The Energy Policy Act of 2005 (EPAct 2005), signed into law on
August 8, 2005, contained several provisions relevant to security at
nuclear power plants. Section 653, for instance, added Section 161A. to
the Atomic Energy Act of 1954, as amended (AEA). This provision allows
the Commission to authorize certain licensees to use, as part of their
protective strategies, an expanded arsenal of weapons including machine
guns and semi-automatic assault weapons. Section 653 also requires
certain security personnel to undergo a background check that includes
fingerprinting and a check against the Federal Bureau of
Investigation's (FBI) National Instant Criminal Background Check System
(NICS) database. Section 161A, however, is not effective until
guidelines are completed by the Commission and approved by the Attorney
General. More information on the NRC's implementation of Section 161A
can be found below.
B. The Proposed Rule
As noted to recipients of the post-September 11, 2001, orders, it
was
[[Page 13927]]
always the Commission's intent to complete a thorough review of the
existing physical protection program requirements and undertake a
rulemaking that would codify generically-applicable security
requirements. This rulemaking would be informed by the requirements
previously issued by orders and includes an update of existing power
reactor security requirements, which had not been significantly revised
for nearly 30 years. To that end, on October 26, 2006, the Commission
issued the proposed Power Reactor Security rulemaking (71 FR 62663).
The proposed rule was originally published for a 75-day public comment
period. In response to several requests for extension, the comment
period was extended on two separate occasions (January 5, 2005; 72 FR
480; and February 28, 2007; 72 FR 8951), eventually closing on March
26, 2007. The Commission received 48 comment letters. In addition, the
Commission held two public meetings to solicit public comment in
Rockville, MD on November 15, 2006, and Las Vegas, NV on November 29,
2006. The Commission held a third public meeting in Rockville, MD, on
March 9, 2007, to facilitate stakeholder understanding of the proposed
requirements, and thereby result in more informed comments on the
proposed rule provisions.
In addition to proposing requirements that were similar to those
that had previously been imposed by the various orders, the proposed
rule also contained several new provisions that the Commission
determined would provide additional assurance of licensee capabilities
to protect against the DBT. These new provisions were identified by the
Commission during implementation of the security orders while reviewing
the revised site security plans that had been submitted by licensees
for Commission review and approval, while conducting the enhanced
baseline inspection program, and through evaluation of the results of
force-on-force exercises. As identified in the proposed rule, these new
provisions included such measures as cyber security requirements,
safety/security interface reviews, functional equivalency of the
central and secondary alarm stations, uninterruptable backup power for
detection and assessment equipment, and video image recording equipment
(See 71 FR 62666-62667; October 26, 2006).
The Commission also published a supplemental proposed rule on April
10, 2008, (73 FR 19443) seeking additional stakeholder comment on two
provisions of the rule for which the Commission had decided to provide
additional detail. The supplemental proposed rule also proposed to move
these requirements from appendix C to part 73 in the proposed rule to
Sec. 50.54 in the final rule. More detail on those provisions and the
comments received is provided in section III of this document.
Three petitions for rulemaking (PRM) (PRM-50-80, PRM-73-11, PRM-73-
13) were also considered as part of this rulemaking. Consideration of
these petitions is discussed in detail in section II of this document.
C. Significant New Requirements in the Final Rule
This final rulemaking amends the security requirements for power
reactors. The following existing sections and appendices in 10 CFR Part
73 have been revised as a result:
10 CFR 73.55, Requirements for physical protection of
licensed activities in nuclear power reactors against radiological
sabotage.
10 CFR 73.56, Personnel access authorization requirements
for nuclear power plants.
10 CFR Part 73, appendix B, section VI, Nuclear Power
Reactor Training and Qualification Plan for Personnel Performing
Security Program Duties.
10 CFR Part 73, appendix C, Licensee Safeguards
Contingency Plans.
The amendments also add two new sections to part 73 and a new
paragraph to 10 CFR Part 50:
10 CFR 73.54, Protection of digital computer and
communication systems and networks (i.e., cyber security requirements).
10 CFR 73.58, Safety/security interface requirements for
nuclear power reactors.
10 CFR 50.54(hh), Mitigative strategies and response
procedures for potential or actual aircraft attacks.
Specifically, this rulemaking contains a number of significant new
requirements listed as follows:
Safety/Security Interface Requirements. These requirements are
located in new Sec. 73.58. The safety/security interface requirements
explicitly require licensees to manage and assess the potential
conflicts between security activities and other plant activities that
could compromise either plant security or plant safety. The
requirements direct licensees to assess and manage these interactions
so that neither safety nor security is compromised. These requirements
address, in part, PRM-50-80, which requested the establishment of
regulations governing proposed changes to the facilities which could
adversely affect the protection against radiological sabotage.
Mixed-Oxide (MOX) Fuel Requirements. These requirements are
codified into new Sec. 73.55(l) for reactor licensees who propose to
use MOX fuel in concentrations of 20 percent or less. These
requirements provide enhancements to the normal radiological sabotage-
based physical security requirements by adding the requirement that the
MOX fuel be protected from theft or diversion. These requirements
reflect the Commission's view that the application of security
requirements for the protection of formula quantities of strategic
special nuclear material set forth in Part 73, which would otherwise
apply because of the MOX fuel's plutonium content, is, in part,
unnecessary to provide adequate protection for this material because of
the weight and size of the MOX fuel assemblies. The MOX fuel security
requirements are consistent with the approach implemented at Catawba
Nuclear Station through the MOX lead test assembly effort in 2004-2005.
Cyber Security Requirements. These requirements are codified as new
Sec. 73.54 and designed to provide high assurance that digital
computer and communication systems and networks are adequately
protected against cyber attacks up to and including the design basis
threat as established by Sec. 73.1(a)(1)(v). These requirements are
substantial improvements upon the requirements imposed by the February
25, 2002 order. In addition to requiring that all new applications for
an operating or combined license include a cyber security plan, the
rule will also require currently operating licensees to submit a cyber
security plan to the Commission for review and approval by way of
license amendment pursuant to Sec. 50.90 within 180 days of the
effective date of this final rule. In addition, applicants who have
submitted an application for an operating license or combined license
currently under review by the Commission must amend their applications
to include a cyber security plan. For both current and new licensees,
the cyber security plan will become part of the licensee's licensing
basis in the same manner as other security plans.
Mitigative Strategies and Response Procedures for Potential or
Actual Aircraft Attacks. These requirements appear in new Sec.
50.54(hh). Section 50.54(hh)(1) establishes the necessary regulatory
framework to facilitate consistent application of Commission
requirements for preparatory actions to be taken in the event of a
potential or
[[Page 13928]]
actual aircraft attack and mitigation strategies for loss of large
areas due to fire and explosions. Section 50.54(hh)(2) requires
licensees to develop guidance and strategies for addressing the loss of
large areas of the plant due to explosions or fires from a beyond-
design basis event through the use of readily available resources and
identification of potential practicable areas for the use of beyond-
readily-available resources. Requirements similar to these were
previously imposed under section B.5 of the February 25, 2002, ICM
order; specifically, the ``B.5.a'' and the ``B.5.b'' provisions.
Access Authorization Enhancements. Section 73.56 has been
substantially revised to incorporate lessons learned from the
Commission's implementation of the January 7, 2003 order requirements
and to improve the integration of the access authorization and security
program requirements. The final rule includes an increase in the rigor
for many elements of the pre-existing access authorization program
requirements. In addition, the access authorization requirements
include new requirements for individuals who have electronic means to
adversely impact facility safety, security, or emergency preparedness;
enhancements to the psychological assessments requirements; requires
information sharing between reactor licensees; expanded behavioral
observation requirements; requirements for reinvestigations of criminal
and credit history records for all individuals with unescorted access;
and 5-year psychological reassessments for certain critical job
functions.
Training and Qualification Enhancements. These requirements are set
forth in appendix B to part 73 and include modifications to training
and qualification program requirements based on insights gained from
implementation of the security orders, Commission reviews of site
security plans, implementation of the enhanced baseline inspection
program, and insights gained from evaluations of force-on-force
exercises. These new requirements include additional requirements for
unarmed security personnel to assure these personnel meet minimum
physical requirements commensurate with their duties. The new
requirements also include a minimum age requirement of 18 years for
unarmed security officers, enhanced minimal qualification scores for
testing required by the training and qualification plan, enhanced
qualification requirements for security trainers, armorer certification
requirements, program requirements for on-the-job training, and
qualification requirements for drill and exercise controllers.
Physical Security Enhancements. The rule imposes new physical
security enhancements in the revised Sec. 73.55 that were identified
by the Commission during implementation of the security orders, reviews
of site security plans, implementation of the enhanced baseline
inspection program, and NRC evaluations of force-on-force exercises.
Significant new requirements in Sec. 73.55 include a requirement that
the central alarm station (CAS) and secondary alarm station (SAS) have
functionally equivalent capabilities so that no single act in
accordance with the design basis threat of radiological sabotage could
disable the key functions of both CAS and SAS. Additions also include
requirements for new reactor licensees to locate the SAS within a
site's protected area, ensure that the SAS is bullet resistant, and
limit visibility into the SAS from the perimeter of the protected area.
Revisions to Sec. 73.55 also include requiring uninterruptible backup
power supplies for detection and assessment equipment, video image
recording capability, and new requirements for protection of the
facility against waterborne vehicles.
D. Significant Changes in the Final Rule
A number of significant changes were made to the proposed rule as a
result of public comments, and they are now reflected in the final
rule. Those changes are outlined as follows:
Separation of Enhanced Weapons and Firearms Background Check
Requirements. As noted previously, Section 161A of the AEA permits the
Commission to authorize the use of certain enhanced weapons in the
protective strategies of certain designated licensees once guidelines
are developed by the Commission and approved by the Attorney General.
In anticipation of the completion of those guidelines and the Attorney
General's approval, the Commission had included in the proposed rule
several provisions that would implement its proposed requirements
concerning application for and approval of the use of enhanced weapons
and firearms background checks. However, because the guidelines had not
yet received the approval of the Attorney General as the final rule was
submitted to the Commission, the Commission decided to address that
portion of the proposed rule in a separate rulemaking. Once the final
guidelines are approved by the Attorney General and published in the
Federal Register, the Commission will take appropriate action to codify
the Section 161A. authorities.
Cyber Security Requirements. Another change to this final
rulemaking is the relocation of cyber security requirements. Cyber
security requirements had been located in the proposed rule in Sec.
73.55(m). These requirements are now placed in new Sec. 73.54 as a
separate section within part 73. These requirements were placed in a
stand-alone section to enable the cyber security requirements to be
made applicable to other types of facilities and applications through
future rulemakings.
Establishing these requirements as a stand-alone section also
necessitated creating accompanying licensing requirements. Because the
cyber security requirements were originally proposed as part of the
physical security program and thus the physical security plan, a
licensee's cyber security plan under the proposed rule would have been
part of the license through that licensing document. Once these
requirements were separated from proposed Sec. 73.55, the Commission
identified the need to establish separate licensing requirements for
the licensee's cyber security plan that would require the plan to be
part of a new application for a license issued under part 50 or part
52, as well as continue to be a condition of either type of license.
Conforming changes were therefore made to sections Sec. Sec. 50.34,
50.54, 52.79, and 52.80 to address this consideration. As noted
previously and in Sec. 73.54, for current reactor licensees, the rule
requires the submission of a new cyber security plan to the Commission
for review and approval within 180 days of the effective date of the
final rule. Current licensees are required to submit their cyber
security plans by way of a license amendment pursuant to 10 CFR Sec.
50.90. In addition, applicants for an operating license or combined
license who have submitted their applications to the Commission prior
to the effective date of the rule are required to amend their
applications to the extent necessary to address the requirements of
Sec. 73.54.
Performance Evaluation Program Requirements. The Performance
Evaluation Program requirements that were in proposed appendix C to
part 73, are moved in their entirety to appendix B to part 73 as these
requirements describe the development and implementation of a training
program for training the security force in the response to contingency
events.
Mitigative Strategies and Response Procedures for Potential or
Actual Aircraft Attacks. Another significant change to this rulemaking
is the
[[Page 13929]]
relocation of and the addition of clarifying rule language to the
beyond-design basis mitigative measures and potential aircraft threat
notification requirements that were previously located in proposed part
73, appendix C. Those requirements are now set forth in 10 CFR
50.54(hh). This change was made, in part, in response to stakeholder
comments that part 73, appendix C, was not the appropriate location for
these requirements because the requirements were not specific to the
licensee's security organization. The Commission agreed and relocated
the requirements accordingly and provided more details to the final
rule language to ensure that the intent of these requirements is clear.
As noted previously, the Commission issued a supplemental proposed rule
seeking additional stakeholder comment on these proposed changes to the
rule. More detail on this provision is provided in Section III of this
document.
Section 73.71 and Appendix G to Part 73. The proposed power reactor
security rulemaking contained proposed requirements for Sec. 73.71 and
appendix G to part 73. Based on public comments, the Commission
intended to make few changes to these regulations. However, these
provisions are not contained in this final rulemaking. Because the
enhanced weapons rulemaking (discussed previously) will include
potential changes to Sec. 73.71 and appendix G to part 73, the
Commission decided that revisions to these regulations were better
suited for that rulemaking.
Security Plan Submittal Requirements. The proposed rule would have
required current licensees to revise their physical security plan,
training and qualification plans, and safeguards contingency plan to
incorporate the new requirements and to submit these security plans for
Commission review and approval. The final rule no longer requires these
security plans (with the exception of the cyber security plan as
discussed previously) to be submitted for prior Commission review and
approval and instead allows licensees to make changes in accordance
with existing licensing provisions such as Sec. 50.54(p) or Sec.
50.90, as applicable. The Commission determined that this was an
acceptable approach because most of the requirements established by
this rule are substantially similar to the requirements that had been
imposed by the security orders and because all licensee security plans
were recently reviewed and approved by the Commission in 2004 following
issuance of those orders. Additionally, many of the additional
requirements in the final rule are already current practices that were
implemented following an industry-developed, generic, security plan
template that was reviewed and approved by the Commission. For the
requirements that go beyond current practices, the Commission does not
expect that changes required by this rule would result in a decrease of
effectiveness in a licensee's security plan. For implementation of
those new requirements, licensees should, therefore, consider whether
their plans could be revised in accordance with the procedures
described in Sec. 50.54(p). However, if a licensee believes that a
plan change may reduce the effectiveness of a security plan or if the
licensee desires Commission review and approval of the plan change,
then the proposed plan revision should be submitted to the NRC for
review and approval as a license amendment per Sec. 50.90.
With respect to applicants who have already submitted an
application to the Commission for an operating license or combined
license as of the effective date of this rule, those applicants are
required by this rule to amend their applications to the extent
necessary to address the requirements of the new rule.
Implementation of the Final Rule. The final rule is effective 30
days following date of publication. This permits applicability of the
rule's requirements to new reactor applicants at the earliest possible
date. Current licensees are required to be in compliance with the rule
requirements by March 31, 2010.
Definitions. The proposed rule contained a number of definitions,
primarily related to the proposed enhanced weapons requirements. As
noted previously, the enhanced weapons provisions and firearms
backgrounds checks have been separated into a separate rulemaking so
codifying those definitions is no longer appropriate in this
rulemaking. Regarding the other proposed rule definitions of safety/
security interface, security officer, and target sets, these terms are
addressed in guidance, and accordingly the final rule does not contain
these definitions.
EPAct 2005 Provisions. As noted above, the proposed rule contained
a number of proposed requirements that were designed to address
security-related provisions of the EPAct 2005. With respect to Section
653 of the EPAct 2005, enhanced weapons and firearms background check
requirements have been moved to a separate rulemaking. The only other
provisions of the EPAct 2005 that the Commission had considered during
this rulemaking were in Section 651, which concerns matters related to
the triennial Commission-evaluated, force-on-force exercises, the NRC's
mitigation of potential conflicts of interest in the conduct of such
exercises, and the submission of annual reports by the NRC to Congress.
Because the statute requires the NRC to be directly responsible for
implementation of those requirements, the Commission has determined
that there is no need for them to be specifically reflected in the
NRC's regulations. The NRC has fully complied with all of the
requirements of Section 651 in its conduct of force-on-force
evaluations since the EPAct 2005, and has submitted three annual
reports to Congress during that time. Further discussion of and the
Commission's response to a comment on this issue are provided below in
Section III.
E. Conforming and Corrective Changes
Conforming changes to the requirements listed below are made to
ensure that cross-referencing between the various security regulations
in part 73 is preserved, implement cyber security plan submittal
requirements, and preserve requirements for licensees who are not
within the scope of this final rule. The following requirements contain
conforming changes:
Section 50.34, ``Contents of construction permit and
operating license applications; technical information,'' is revised to
align the application requirements with appendix B to 10 CFR part 73,
the addition of Sec. 73.54 to part 73, and the addition of Sec.
50.54(hh) to part 50.
Section 50.54, ``Conditions of licenses,'' is revised to
conform with the revisions to sections in appendix C to 10 CFR Part 73.
In accordance with the introductory text to Sec. 50.54, revisions to
this section are also made applicable to combined licenses issued under
part 52.
Section 52.79, ``Contents of applications; technical
information in the final safety analysis report,'' is revised to align
the application requirements with the revisions to appendix C to 10 CFR
Part 73 and the addition of Sec. 73.54 to Part 73.
Section 52.80, ``Contents of applications; additional
technical information,'' is revised to add the application requirements
for Sec. 50.54(hh) to part 50.
Section 72.212, ``Conditions of general license issued
under Sec. 72.210,'' is revised to reference the appropriate revised
paragraph designations in Sec. 73.55.
Section 73.8, ``Information collection requirements: OMB
approval,'' is revised to add the new
[[Page 13930]]
requirements (Sec. Sec. 73.54 and 73.58) to the list of sections with
Office of Management and Budget (OMB) information collection
requirements. A corrective revision to Sec. 73.8 is made to reflect
OMB approval of existing information collection requirements for NRC
Form 366 under existing Sec. 73.71.
Section 73.70, ``Records,'' is revised to reference the
appropriate revised paragraph designations in Sec. 73.55 regarding the
need to retain a record of the registry of visitors.
Additionally, Sec. 73.81, ``Criminal penalties,'' which sets forth
the sections within part 73 that are not subject to criminal sanctions
under the AEA, remains unchanged because willful violations of the new
Sec. Sec. 73.54 and 73.58 may be subject to criminal sanctions.
Appendix B to part 73 and appendix C to part 73 require special
treatment in this final rule to preserve, with a minimum of conforming
changes, the current requirements for licensees and applicants who are
not within the scope of this final rule, such as Category I strategic
special nuclear material licensees and research and test reactor
licensees. Accordingly, Sections I through V of appendix B to part 73
remain unchanged to preserve the current training and qualification
requirements for all applicants, licensees, and certificate holders who
are not within the scope of this final rule, and the new language for
power reactor security training and qualification (revised in this
final rule) is added as Section VI. Part 73, appendix C, is divided
into two sections, with Section I maintaining all current requirements
for licensees and applicants not within the scope of this final rule,
and Section II containing all new requirements related to power reactor
contingency response.
II. Petitions for Rulemaking
Three petitions for rulemaking were considered during the
development of the final rule requirements consistent with previous
petition resolution and closure process for these petitions (i.e., PRM-
50-80, PRM-73-11, and PRM-73-13). All three petitions are closed, and
the discussion that follows provides the Commission's consideration of
the issues raised in each petition as part of the development of the
final power reactor security requirements.
A. PRM-50-80
PRM-50-80, submitted by the Union of Concerned Scientists (UCS) and
the San Luis Obispo Mothers for Peace (SLOMFP), was published for
public comment on June 16, 2003, (68 FR 35568). The petition requested
that the Commission take two actions. The first action was to amend 10
CFR 50.54(p), ``Conditions of licenses,'' and 10 CFR 50.59, ``Changes,
tests, and experiments,'' to require licensees to evaluate whether
proposed changes, tests, or experiments cause protection against
radiological sabotage to be decreased and, if so, to conduct such
actions only with prior Commission approval. The second action
requested that the Commission amend 10 CFR Part 50 to require licensees
to evaluate their facilities against specified aerial hazards and make
necessary changes to provide reasonable assurance that the ability of
the facility to reach and maintain safe shutdown would not be
compromised by an accidental or intentional aerial assault. The second
action (regarding aerial hazards) was previously considered and
resolved as part of the final design basis threat (DBT) (Sec. 73.1)
rulemaking (March 19, 2007; 72 FR 12705). On November 17, 2005, (70 FR
69690), the Commission decided to consider the petitioner's first
request for rulemaking (i.e., evaluation of proposed changes, tests, or
experiments to determine whether radiological sabotage protection is
decreased). Proposed language addressing the issues raised in the
petition was published as proposed Sec. 73.58, ``Safety/security
interface requirements for nuclear power reactors.'' This section
remains in the final rule. Refer to the section-by-section analysis in
this document, supporting Sec. 73.58 for further discussion of the
safety/security interface requirements.
B. PRM-73-11
PRM-73-11, submitted by Scott Portzline, Three Mile Island Alert,
was published for public comment on November 2, 2001 (66 FR 55603). The
comment period closed on January 16, 2002. Eleven comment letters were
received. Of the 11 comments filed, 7 were from governmental
organizations, 2 were from individuals, and 2 were from industry
organizations. The majority of the comments support the petitioner's
recommendation.
The petitioner requested that the NRC regulations governing
physical protection of plants and materials be amended to require NRC
licensees to post at least one armed guard at each entrance to the
``owner controlled areas'' (OCA) surrounding all U.S. nuclear power
plants. The petitioner stated that this should be accomplished by
requiring the addition of armed site protection officers (SPO) to the
total number of SPOs--not by simply shifting SPOs from their protected
area (PA) posts to the OCA entrances. The petitioner believes that the
proposed amendment would provide an additional layer of security that
would complement existing measures against radiological sabotage and
would be consistent with the long-standing principle of defense-in-
depth.
In a Federal Register Notice published December 27, 2006 (72 FR
481), the Commission informed the public that PRM-73-11 and the public
comments filed on the petition would be considered in this final rule.
Consideration of PRM-73-11 and the associated comments was undertaken
as part of the effort to finalize the requirements governing security
in the OCA.
The Commission has concluded that prescriptively requiring armed
security personnel in the OCA is not necessary. Instead, the final
physical security requirements in Sec. 73.55(k) allows licensees the
flexibility to determine the need for armed security personnel in the
OCA, as a function of site-specific considerations, such that the
licensee can defend against the DBT with high assurance. In reaching
this determination, the Commission recognized that the requirements
governing protective strategies must be more performance-based to
enable licensees to adjust their strategies to address the site-
specific circumstances and that a prescriptive requirement for armed
security personnel in the owner controlled area may not always be the
most effective approach for every licensee in defending against the
DBT. The Commission constructed the final physical security
requirements, recognizing the range of site-specific circumstances that
exist, to put in place the performance objectives that must be met, and
where possible, provided flexibility to licensees to construct
strategies that meet the objectives.
C. PRM-73-13
PRM-73-13, submitted by David Lochbaum, Union of Concerned
Scientists, was published for public comment on April 9, 2007 (72 FR
17440) and the comment period closed June 25, 2007.
The petitioner requested that the Commission amend part 73 to
require that licensees implement procedures to ensure that, when
information becomes known to a licensee about an individual seeking
access to the protected area that would prevent that individual from
gaining unescorted access to the protected area of a nuclear power
plant, the licensee will implement measures to ensure the individual
does not enter the protected area, whether escorted or not. Further,
the petitioner requested that the NRC's regulations be amended to
[[Page 13931]]
require that, when sufficient information is not available to a
licensee about an individual seeking access to the protected area to
determine whether the criteria for unescorted access are satisfied, the
licensee will implement measures to allow that individual to enter the
protected area only when escorted at all times by an armed member of
the security force who maintains communication with security
supervision.
The Commission determined that the issues raised in PRM-73-13 were
appropriate for consideration and were in fact issues already being
considered in the Power Reactor Security Requirements rulemaking.
Accordingly, the issues raised by PRM-73-13 and the public comments
received were considered as part of the effort to finalize the
requirements that govern escort and access within the protected area
(refer to requirements in Sec. 73.55(g) and Sec. 73.56(h) for the
specific final rule requirements).
The Nuclear Energy Institute (NEI) commented on PRM-73-13, with 11
other industry organizations agreeing (hereafter referred to
collectively as commenters). The commenters agreed that the
petitioner's first request (with regard to preventing an individual to
have access to the protected area when derogatory information becomes
known) should be issued as a notice of proposed rulemaking. Neither NEI
nor any of the other commenters commented on any of the specific
language proposed by the petitioner. With regard to the second
provision proposed by the petitioner (requiring armed escorts for
certain visitors), the commenters did not agree with the proposal. The
commenters argued that the use of trained individuals, though not
necessarily armed, in conjunction with search equipment and techniques
as well as the limitation placed on visitors (i.e., that visitors must
have a ``work-related need'' for entry into the PA) have resulted in no
incidents that warrant imposing this new requirement.
The Commission has decided not to adopt either proposal. Regarding
the petitioner's second proposal, the Commission agrees with the
commenters that the current protective measures for escorted personnel
are sufficient to protect against the scenario presented by the
petitioner. Licensee escorted access programs have been in place for
years without incident, and the petitioner has not provided a basis
that raises questions about their sufficiency.
With respect to the petitioner's first proposal, the Commission
does not agree that the NRC's unescorted access requirements described
in Sec. 73.56 and Sec. 73.57 need to contain prescriptive
disqualifiers for access. Licensees are required by Sec. 73.56(h) in
this final rule to consider all of the information obtained in the
background investigation for determining whether an individual is
trustworthy and reliable before granting unescorted access. With the
exception of individuals who have been denied access to another
facility, the regulation does not specify types of information obtained
during a background investigation that would automatically disqualify
an individual from access. The final rule Sec. 73.55(g)(7), however,
does have several restrictions on escorted access (visitors) including
verification of identity, verification of reason for business inside
the protected area, and collection of information (visitor control
register) pertaining to the visitor. In addition, there are several
conditions that individuals who escort the visitor must adhere to
including continuous monitoring of the visitor while inside the
protected area, having a means of timely communication with security,
and having received training on escort duties. Lastly, licensees may
not allow any individual who is currently denied access at any other
facility to be a visitor.
Furthermore, the petitioner's suggested language that a licensee
must act to deny escorted access when such information ``becomes known
to the licensee'' is unworkable from a regulatory perspective. It is
unclear what the NRC could impose on licensees as an enforceable
standard for such a scenario. In order to avoid potential enforcement
action, a licensee would be put in a position to conduct a full
background investigation on a visitor each time access is requested,
which would undermine the entire purpose behind having the ability to
escort visitors on site, or, in accordance with the petitioner's second
suggestion, assign an armed security officer to escort that individual.
The Commission does not have a basis to impose either measure, and the
petitioners have not provided a basis in support of it. Section
73.55(g), however, does not allow individuals currently denied access
at other facilities to be a visitor.
III. Discussion of Substantive Changes and Responses to Significant
Comments
A. Introduction
A detailed discussion of the public comments submitted on the
proposed power reactor security rule and supplemental proposed rule as
well as the Commission's responses are contained in a separate document
(see Section VII, ``Availability of Documents,'' of this document).
This section discusses the more significant comments submitted on the
proposed power reactor security provisions and the substantive changes
made to develop the final power reactor security requirements.
The changes made to the power reactor security requirements are
discussed by part, with changes to part 50 requirements being discussed
first, followed by the changes to part 73 requirements, and proceeding
in numerical order according to the section number. General topics are
discussed first, followed by discussion of changes to individual
sections as necessary. In addition to the substantive changes, rule
language was revised to make conforming administrative changes, correct
typographic errors, adopt consistent terminology, correct grammar, and
adopt plain English. These changes are not discussed further.
Note that some of the final rule requirements were relocated. An
example is the cyber security requirements that were issued as proposed
Sec. 73.55(m) and now reside in Sec. 73.54.
Comments on the three PRMs are not explicitly addressed in the
detailed comments response document, beyond those discussed earlier in
Section II of this document, as this document addresses only the
comments submitted on the proposed rule. However, the petitioner's
comments were considered as part of the Commission's decision-making
process and final determination of the rule requirements for each of
the areas of concern.
Comments on the supporting regulatory analysis of the proposed rule
are also contained in the detailed comment response document. Revisions
to the final rule regulatory analysis were made consistent with the
comment responses and these comments are not addressed further in this
section.
The Commission solicited public comment on a number of specific
issues but received input on only one of these specific issues.
Specifically, the Commission requested stakeholders to provide insights
and estimates on the feasibility, costs, and time necessary to
implement the proposed rule changes to existing alarm stations,
supporting systems, video systems, and cyber security. A commenter
stated that the feasibility of establishing a cyber security program
for industrial control systems has been demonstrated by various
electric utilities, chemical plants, refineries, and other facilities
with systems similar, if not identical, to those used in the balance-
of-plant in commercial nuclear plants. The
[[Page 13932]]
commenter stated that the time and cost necessary to implement a cyber
security program is dependent on the scope and discussed the
technologies and programmatic approaches that can be pursued to augment
current industry-proposed generic recommendations. The Commission
focused significant attention on the cyber requirements and supporting
guidance during development of the final cyber security requirements in
Sec. 73.54 as discussed below.
In general, there was a range of stakeholder views concerning this
rulemaking, some supporting the rulemaking, others opposing the
rulemaking. Some stakeholders viewed this rulemaking as an effort to
codify the insufficient status quo while others described the new
requirements as going well beyond the post-September 11, 2001, order
requirements. The Commission believes that commenters who suggested
that the Commission had no basis to go beyond the requirements that
were imposed by the security orders misunderstood the relationship of
those orders and the rulemaking. The security orders were issued based
on the specific knowledge and threat information available to the
Commission at the time the orders were issued. The Commission advised
licensees who received those orders that the requirements were interim
and that the Commission would eventually undertake a more comprehensive
re-evaluation of current safeguards and security programs. As noted in
the proposed rule, there were a number of objectives for the rulemaking
beyond simply making generically applicable security requirements
similar to those that were imposed by Commission orders. The Commission
intended to implement several new requirements that resulted from
insights it gained from implementation of the security orders, review
of site security plans, implementation of the enhanced baseline
inspection program, and evaluation of force-on-force exercises. These
insights were obviously not available to the Commission when it issued
the original security orders in 2002 and 2003.
In addition, another key objective of this rulemaking was to update
the regulatory framework in preparation for receiving license
applications for new reactors. The current security regulations in part
73 have not been substantially revised for nearly 30 years. Before
September 11, 2001, the NRC staff had already undertaken an effort to
revise these dated requirements, but that effort was delayed (See SECY-
01-0101, June 4, 2001). Thus, this rulemaking addresses a broader
context of security issues than the focus of the security orders of
2002 and 2003. One significant issue in particular was the need for
clearly articulated security requirements and a logical regulatory
framework for new reactor applicants. The revisions to part 73 were
also intended to provide it with needed longevity and predictability
for current and future licensees with a measured attempt to anticipate
future developments or needs in physical protection.
B. Section 50.54(hh), Mitigative Strategies and Response Procedures for
Potential or Actual Aircraft Attacks
As noted previously, a significant change to this final rule is the
relocation of and provision of more detailed requirements for the
beyond-design basis mitigative measures and potential aircraft attack
notification requirements from proposed part 73, appendix C, to 10 CFR
50.54(hh). The Commission received several stakeholder comments that
the proposed part 73, appendix C, was not the appropriate location for
these requirements. During consideration of these comments, the
Commission also decided to add additional detail to the aircraft attack
notification portion of the requirements now located in Sec.
50.54(hh)(1). In response, the Commission issued a supplemental
proposed rule seeking additional stakeholder comment on these proposed
revisions on April 10, 2008, (73 FR 19443) for a 30 day comment period.
The Commission received six sets of comments on the supplemental
proposed rule. The responses to those comments are discussed as
follows.
The Commission revised the final rule language for Sec.
50.54(hh)(1)(ii) in response to comments that the final rule should
only require periodic updates to applicable entities or that
communications should be maintained ``as necessary and as resources
allow.'' The Commission intended the continuous communication
requirement to apply to licensees only with respect to aircraft threat
notification sources and not to all offsite response or government
organizations. The Federal Aviation Administration (FAA) local,
regional, or national offices; North American Aerospace Defense Command
(NORAD); law enforcement organizations; and the NRC Headquarters
Operations Center are examples of threat notification sources with
which licensees would be required to maintain a continuous
communication capability. If a licensee encounters a situation in which
multiple threat notification sources (e.g., FAA, NORAD, and NRC
Headquarters Operations Center) are providing the same threat
information, the licensee would only be required to maintain continuous
communication with the NRC Headquarters Operations Center. Because
licensees need to be aware when they can cease or must accelerate
mitigative actions, it is important that licensees do not lose contact
with aircraft threat notification sources. Periodic updates to entities
other than threat notification sources are permitted by this final
rule.
In response to comments that Sec. Sec. 50.54(hh)(1)(iii),
50.54(hh)(1)(iv), and 50.54(hh)(1)(vi) requirements were redundant to
those found in the NRC's existing emergency preparedness rules, the
Commission revised the final rule language for each of those paragraphs
to clarify the Agency's intent and to eliminate the appearance of
redundant requirements vis-[agrave]-vis the emergency preparedness
rules, which are also currently being revised. The intent of Sec.
50.54(hh)(1)(iii) is to ensure that licensees contact offsite response
organizations as soon as possible after receiving aircraft threat
notifications. There is no expectation that licensees will complete and
disseminate notification forms as the previous rule text implied.
Section 50.54(hh)(1)(iv) pertains to operational actions that licensees
can take to mitigate the consequences of an aircraft impact; the
Commission did not intend this requirement to include emergency
preparedness-related protective actions. In Sec. 50.54(hh)(1)(vi), the
Commission intended to require licensees to disperse essential
personnel and equipment to pre-identified locations after receiving
aircraft threat notifications, but before actual aircraft impacts, when
possible. Also, the requirement for licensees to facilitate rapid entry
into their protected areas applies only to those onsite personnel and
offsite responders who are necessary to mitigate the event and not to
everyone who was initially evacuated from the protected areas.
The Commission revised the statements of consideration for Sec.
50.54(hh)(1)(vi) in response to a comment that meeting the rule might
require licensees to suspend security measures under 10 CFR 50.54(x).
The Commission elaborated on the specific intent of the protected area
evacuation timeline assessment and validation, which is to require
licensees to establish a decision-making tool for use by shift
operations personnel to assist them in determining the appropriate
onsite protective action for site personnel for various warning times
and site population conditions. The Commission
[[Page 13933]]
expects that licensees will incorporate this tool into applicable site
procedures to reduce the need to make improvised decisions that would
necessitate a suspension of safeguards measures during the pre-event
notification period. However, the Commission wishes to make clear that
the suspension of security measures to protect the health and safety of
security force personnel during emergencies is now governed by Sec.
73.55(p)(1)(i) as codified in this final rule. Previously, there was no
specific provision in the Commission's regulations that would have
permitted such a departure, because under Sec. 50.54(x), licensees are
only permitted to suspend security measures if the health and safety of
the public was at risk. Note that, in a Sec. 50.54(hh) scenario,
either Sec. Sec. 50.54(x) or 73.55(p) could be applicable depending on
the circumstances.
The Commission revised the final rule requirements in Sec.
50.54(hh) in response to a comment that the final rule should include
an applicability statement that removes the requirements of Sec.
50.54(hh) from reactor facilities currently in decommissioning and for
which the certifications required under Sec. 50.82(a)(1) have been
submitted. The commenter indicated that it is inappropriate that Sec.
50.54(hh) should apply to a permanently shutdown and defueled reactor
where the fuel was removed from the site or moved to an independent
spent fuel storage installation (ISFSI). The NRC agrees with this
comment and revised the final requirements in Sec. 50.54(hh) so they
do not apply to facilities for which certifications have been filed
under Sec. 50.82(a)(1) or Sec. 52.110(a)(1). The Commission notes
that Sec. 50.54(hh) does not apply to any current decommissioning
reactor facilities that have already satisfied the Sec. 50.82(a)
requirements.
The Commission requested stakeholder feedback on two questions in
the supplemental proposed rule. Regarding the first question in the
supplemental proposed rule notice where the Commission requested input
on whether there should be additional language added to the proposed
Sec. 50.54(hh) requirements that would limit the scope of the
regulation (i.e., language that would constrain the requirements to a
subset of beyond-design basis events such as beyond-design basis
security events), commenters indicated that the Commission should
constrain the requirements to a subset of beyond-design basis events;
namely beyond design basis security events. The feedback suggested
that, by limiting the rule requirements to strategies that address a
generic set of beyond-design basis security events, the strategies
could then be developed and proceduralized to focus on the restoration
capabilities needed to mitigate the effects from these events. After
careful consideration, the Commission decided to maintain the language
from the supplemental proposed rule that recognizes that the mitigative
strategies can address losses of large areas of a plant and the related
losses of plant equipment from a variety of causes including aircraft
impacts and beyond-design basis security events. The Commission also
requested comments on whether applicants should include, as part of a
combined license or operating license application, the Sec. 50.54(hh)
procedures, guidance, and strategies. Commenters indicated that this
information will not be needed until fuel load, when an aircraft threat
would be present. The most appropriate and efficient process for the
Commission is to review these procedures as part of the review of
operations procedures and beyond-design basis guidelines. The
Commission views the mitigative strategies as similar to those
operational programs for which a description of the program is provided
and reviewed by the Commission as part of the combined license
application and subsequently the more detailed procedures are
implemented by the applicant and inspected by the NRC before plant
operation. Because the Commission finds that the most effective
approach is for the mitigative strategies, at least at the programmatic
level, to be developed before construction and reviewed and approved
during licensing, a requirement for information has been added to Sec.
52.80, ``Contents of applications; additional technical information,''
and Sec. 50.34, ``Contents of construction permit and operating
license applications; technical information.''
C. Section 73.2, Definitions
The proposed rule contained a number of definitions, primarily
related to the proposed enhanced weapons requirements. As noted
earlier, the enhanced weapons provisions and firearms backgrounds
checks have been separated into a separate rulemaking, so codifying
those definitions is no longer appropriate here. Regarding the other
definitions of safety/security interface, security officer, and target
sets; the Commission has determined that those terms are better defined
through guidance.
D. Section 73.54, Protection of Digital Computer and Communication
Systems and Networks
General Comments. Proposed Sec. 73.55(m) is relocated in the final
rule to a stand-alone section (10 CFR 73.54). The Commission received
several comments that the inclusion of a cyber security program within
the proposed Sec. 73.55(m) is not appropriate because cyber security
is not implemented by physical security personnel. The Commission
agrees that the cyber security program would not necessarily be
implemented by security personnel and recognizes that a uniquely
independent technical expertise and knowledge is required to
effectively implement the cyber security program. Additionally, these
requirements were placed into a stand alone section to enable the cyber
security requirements to be made applicable to other types of
facilities and applications through future rulemakings. The rule now
requires that these requirements apply to nuclear power plant licensees
in the same manner as the access authorization program required by
Sec. 73.56; the cyber security plan is subject to the same licensing
requirements as the licensee's physical security, training and
qualification, and safeguards contingency plans. In relocating these
requirements, the Commission concluded that certain administrative
requirements, otherwise applied by inclusion in Sec. 73.55, must be
brought forward for consistency. As a result, conforming changes were
made to the pre-existing Sec. Sec. 50.34(c) and 50.34(e) to establish
the appropriate regulatory framework for Commission review and approval
of the cyber security plan required by Sec. 73.54(e). These conforming
changes require nuclear power reactor applicants to provide a cyber
security plan as part of the security plans currently required by
Sec. Sec. 50.34(c) or 52.79(a)(36), as applicable. Additionally,
conforming changes were made to Sec. 50.54(p), applicable to both
operating and combined licensees, to require a cyber security plan as a
condition of the license. Conforming changes were also made to
Sec. Sec. 50.34(e) and 52.79(a)(36) to require applicants to review
this plan against the criteria for Safeguards Information established
in Sec. 73.21. Consistent with Sec. 73.54(b)(3), the cyber security
program is a part of the physical protection program subject to the
same review and approval mechanisms as the physical security plan,
training and qualification plan, and safeguards contingency plan.
[[Page 13934]]
The Commission has also added three (3) administrative requirements
to the final rule (Sec. Sec. 73.54(f), 73.54(g), and 73.54(h)) to
require written policies and procedures, program review, and records
retention, respectively.
In addition to the previously mentioned conforming changes, the
Commission added an undesignated paragraph at the beginning of this
section to require current licensees subject to Sec. 73.54 to submit a
cyber security plan and implementation schedule for Commission review
and approval. The licensee's cyber security plan must be submitted by
way of a license amendment pursuant to 10 CFR 50.90.
Section 73.54(a), Protection. The Commission received a comment
suggesting that the term ``emergency preparedness,'' as it appears in
the proposed Sec. 73.55(m)(1), should be replaced with the term
``emergency response.'' In the final rule, the term ``emergency
preparedness'' is replaced with the more generic term ``emergency
preparedness functions.'' The equipment embodied within these
preparedness functions as described in 10 CFR Part 50, appendix E,
usually includes a wide variety of plant monitoring systems, protection
systems, and the onsite and offsite emergency communications systems
used during an emergency event.
The term ``emergency response'' suggested by the commenter is used
more specifically to refer only to the ``emergency response data
system'' or ERDS, which provides a data link that transmits key plant
parameters. Therefore, using the term ``emergency preparedness
functions'' is considered the most appropriate term as it holistically
addresses the equipment used during an emergency.
The Commission revised the proposed Sec. 73.55(m)(1) which is
renumbered in the final rule as Sec. 73.54(a). This paragraph has been
expanded to provide a more detailed list of the types of systems and
networks that are intended to be included consistent with the proposed
rule. The language in Sec. 73.54(a)(1)(ii) is revised to clarify that
``digital computer and communications systems and networks'' must be
considered for protection. It is important to note that the Commission
does not intend that CAS or SAS operators be responsible for cyber
security detection and response but rather that this function will be
performed by technically trained and qualified personnel.
Section 73.54(b), Analysis of Digital Computer and Communication
Systems and Networks. The requirement to document a site-specific
analysis that identifies site-specific conditions has been brought
forward from Sec. 73.55(b)(4). The rule is clarified to require that
each licensee analyze the digital computer and communication systems
and networks in use at their facility to identify those assets that
require protection against the design basis threat.
The proposed Sec. 73.55(m)(1) requirement to establish, implement,
and maintain a cyber security program is renumbered in the final rule
as Sec. 73.54(b)(2). The rule requires that the cyber security program
will include measures for the adequate protection of the digital
computer and communication systems and networks identified by the
licensee through the required site-specific analysis stated in Sec.
73.54(b)(1).
The proposed Sec. 73.55(m)(1)(ii) is renumbered in the final rule
as Sec. 73.54(b)(3). The Commission received several comments that the
cyber security program is not appropriate for incorporation into the
physical security program and, therefore, should not be implemented
through the security organization. The Commission agrees in part. Cyber
security, like physical security, focuses on the protection of
equipment and systems against attacks by those individuals or
organizations that would seek to cause harm, damage, or adversely
affect the functions performed by such systems and networks. Cyber
security and physical security programs are intrinsically linked and
must be integrated to satisfy the physical protection program design
criteria of Sec. 73.55(b). The Commission recognizes that a uniquely
independent technical expertise and knowledge is required to implement
the cyber security program effectively, and therefore, the specific
training and qualification requirements for the program must focus on
ensuring that the personnel are trained, qualified, and equipped to
perfor