Applications and Amendments to Facility Operating Licenses Involving Proposed No Significant Hazards Considerations and Containing Sensitive Unclassified Non-Safeguards Information and Order Imposing Procedures for Access to Sensitive Unclassified Non-Safeguards Information, 20377-20385 [2011-8453]
Download as PDF
Federal Register / Vol. 76, No. 70 / Tuesday, April 12, 2011 / Notices
NUCLEAR REGULATORY
COMMISSION
[NRC–2011–0068]
Applications and Amendments to
Facility Operating Licenses Involving
Proposed No Significant Hazards
Considerations and Containing
Sensitive Unclassified Non-Safeguards
Information and Order Imposing
Procedures for Access to Sensitive
Unclassified Non-Safeguards
Information
I. Background
Pursuant to section 189a.(2) of the
Atomic Energy Act of 1954, as amended
(the Act), the U.S. Nuclear Regulatory
Commission (the Commission or NRC)
is publishing this notice. The Act
requires the Commission to publish
notice of any amendments issued, or
proposed to be issued and grants the
Commission the authority to issue and
make immediately effective any
amendment to an operating license
upon a determination by the
Commission that such amendment
involves no significant hazards
consideration, notwithstanding the
pendency before the Commission of a
request for a hearing from any person.
This notice includes notices of
amendments containing sensitive
unclassified non-safeguards information
(SUNSI).
srobinson on DSKHWCL6B1PROD with NOTICES
Notice of Consideration of Issuance of
Amendments to Facility Operating
Licenses, Proposed No Significant
Hazards Consideration Determination,
and Opportunity for a Hearing
The Commission has made a
proposed determination that the
following amendment requests involve
no significant hazards consideration.
Under the Commission’s regulations in
Title 10 of the Code of Federal
Regulations (10 CFR), Section 50.92(c),
this means that operation of the facility
in accordance with the proposed
amendment would not (1) involve a
significant increase in the probability or
consequences of an accident previously
evaluated; (2) create the possibility of a
new or different kind of accident from
any accident previously evaluated; or
(3) involve a significant reduction in a
margin of safety. The basis for this
proposed determination for each
amendment request is shown below.
The Commission is seeking public
comments on this proposed
determination. Any comments received
within 30 days after the date of
publication of this notice will be
considered in making any final
determination.
VerDate Mar<15>2010
18:00 Apr 11, 2011
Jkt 223001
Normally, the Commission will not
issue the amendment until the
expiration of 60 days after the date of
publication of this notice. The
Commission may issue the license
amendment before expiration of the 60day period provided that its final
determination is that the amendment
involves no significant hazards
consideration. In addition, the
Commission may issue the amendment
prior to the expiration of the 30-day
comment period should circumstances
change during the 30-day comment
period such that failure to act in a
timely way would result, for example,
in derating or shutdown of the facility.
Should the Commission take action
prior to the expiration of either the
comment period or the notice period, it
will publish in the Federal Register a
notice of issuance. Should the
Commission make a final No Significant
Hazards Consideration Determination,
any hearing will take place after
issuance. The Commission expects that
the need to take this action will occur
very infrequently.
Written comments may be submitted
by mail to the Chief, Rules,
Announcements and Directives Branch
(RADB), TWB–05–B01M, Division of
Administrative Services, Office of
Administration, U.S. Nuclear Regulatory
Commission, Washington, DC 20555–
0001, and should cite the publication
date and page number of this Federal
Register notice. Written comments may
also be faxed to the RADB at 301–492–
3446. Documents may be examined,
and/or copied for a fee, at the NRC’s
Public Document Room (PDR), located
at One White Flint North, Public File
Area O1 F21, 11555 Rockville Pike (first
floor), Rockville, Maryland.
Within 60 days after the date of
publication of this notice, any person(s)
whose interest may be affected by this
action may file a request for a hearing
and a petition to intervene with respect
to issuance of the amendment to the
subject facility operating license.
Requests for a hearing and a petition for
leave to intervene shall be filed in
accordance with the Commission’s
‘‘Rules of Practice for Domestic
Licensing Proceedings’’ in 10 CFR Part
2. Interested person(s) should consult a
current copy of 10 CFR 2.309, which is
available at the Commission’s PDR,
located at One White Flint North, Public
File Area 01 F21, 11555 Rockville Pike
(first floor), Rockville, Maryland, or at
https://www.nrc.gov/reading-rm/doccollections/cfr/part002/part002–
0309.html. Publicly available records
will be accessible from the Agencywide
Documents Access and Management
System’s (ADAMS) Public Electronic
PO 00000
Frm 00073
Fmt 4703
Sfmt 4703
20377
Reading Room on the Internet at the
NRC Web site, https://www.nrc.gov/
reading-rm/adams.html. If a request for
a hearing or petition for leave to
intervene is filed within 60 days, the
Commission or a presiding officer
designated by the Commission or by the
Chief Administrative Judge of the
Atomic Safety and Licensing Board
Panel, will rule on the request and/or
petition; and the Secretary or the Chief
Administrative Judge of the Atomic
Safety and Licensing Board will issue a
notice of a hearing or an appropriate
order.
As required by 10 CFR 2.309, a
petition for leave to intervene shall set
forth with particularity the interest of
the petitioner in the proceeding, and
how that interest may be affected by the
results of the proceeding. The petition
should specifically explain the reasons
why intervention should be permitted
with particular reference to the
following general requirements: (1) The
name, address, and telephone number of
the requestor or petitioner; (2) the
nature of the requestor’s/petitioner’s
right under the Act to be made a party
to the proceeding; (3) the nature and
extent of the requestor’s/petitioner’s
property, financial, or other interest in
the proceeding; and (4) the possible
effect of any decision or order which
may be entered in the proceeding on the
requestor’s/petitioner’s interest. The
petition must also set forth the specific
contentions which the requestor/
petitioner seeks to have litigated at the
proceeding.
Each contention must consist of a
specific statement of the issue of law or
fact to be raised or controverted. In
addition, the requestor/petitioner shall
provide a brief explanation of the bases
for the contention and a concise
statement of the alleged facts or expert
opinion which support the contention
and on which the requestor/petitioner
intends to rely in proving the contention
at the hearing. The requestor/petitioner
must also provide references to those
specific sources and documents of
which the petitioner is aware and on
which the requestor/petitioner intends
to rely to establish those facts or expert
opinion. The petition must include
sufficient information to show that a
genuine dispute exists with the
applicant on a material issue of law or
fact. Contentions shall be limited to
matters within the scope of the
amendment under consideration. The
contention must be one which, if
proven, would entitle the requestor/
petitioner to relief. A requestor/
petitioner who fails to satisfy these
requirements with respect to at least one
E:\FR\FM\12APN1.SGM
12APN1
srobinson on DSKHWCL6B1PROD with NOTICES
20378
Federal Register / Vol. 76, No. 70 / Tuesday, April 12, 2011 / Notices
contention will not be permitted to
participate as a party.
Those permitted to intervene become
parties to the proceeding, subject to any
limitations in the order granting leave to
intervene, and have the opportunity to
participate fully in the conduct of the
hearing. If a hearing is requested, and
the Commission has not made a final
determination on the issue of no
significant hazards consideration, the
Commission will make a final
determination on the issue of no
significant hazards consideration. The
final determination will serve to decide
when the hearing is held. If the final
determination is that the amendment
request involves no significant hazards
consideration, the Commission may
issue the amendment and make it
immediately effective, notwithstanding
the request for a hearing. Any hearing
held would take place after issuance of
the amendment. If the final
determination is that the amendment
request involves a significant hazards
consideration, any hearing held would
take place before the issuance of any
amendment.
All documents filed in NRC
adjudicatory proceedings, including a
request for hearing, a petition for leave
to intervene, any motion or other
document filed in the proceeding prior
to the submission of a request for
hearing or petition to intervene, and
documents filed by interested
governmental entities participating
under 10 CFR 2.315(c), must be filed in
accordance with the NRC E-Filing rule
(72 FR 49139, August 28, 2007). The
E-Filing process requires participants to
submit and serve all adjudicatory
documents over the Internet, or in some
cases to mail copies on electronic
storage media. Participants may not
submit paper copies of their filings
unless they seek an exemption in
accordance with the procedures
described below.
To comply with the procedural
requirements of E-Filing, at least ten
(10) days prior to the filing deadline, the
participant should contact the Office of
the Secretary by e-mail at
hearing.docket@nrc.gov, or by telephone
at 301–415–1677, to request (1) a digital
ID certificate, which allows the
participant (or its counsel or
representative) to digitally sign
documents and access the E-Submittal
server for any proceeding in which it is
participating; and (2) advise the
Secretary that the participant will be
submitting a request or petition for
hearing (even in instances in which the
participant, or its counsel or
representative, already holds an NRCissued digital ID certificate). Based upon
VerDate Mar<15>2010
18:00 Apr 11, 2011
Jkt 223001
this information, the Secretary will
establish an electronic docket for the
hearing in this proceeding if the
Secretary has not already established an
electronic docket.
Information about applying for a
digital ID certificate is available on
NRC’s public Web site at https://
www.nrc.gov/site-help/e-submittals/
apply-certificates.html. System
requirements for accessing the
E-Submittal server are detailed in NRC’s
‘‘Guidance for Electronic Submission,’’
which is available on the agency’s
public Web site at https://www.nrc.gov/
site-help/e-submittals.html. Participants
may attempt to use other software not
listed on the Web site, but should note
that the NRC’s E-Filing system does not
support unlisted software, and the NRC
Meta System Help Desk will not be able
to offer assistance in using unlisted
software.
If a participant is electronically
submitting a document to the NRC in
accordance with the E-Filing rule, the
participant must file the document
using the NRC’s online, Web-based
submission form. In order to serve
documents through EIE, users will be
required to install a Web browser plugin from the NRC Web site. Further
information on the Web-based
submission form, including the
installation of the Web browser plug-in,
is available on the NRC’s public Web
site at https://www.nrc.gov/site-help/esubmittals.html.
Once a participant has obtained a
digital ID certificate and a docket has
been created, the participant can then
submit a request for hearing or petition
for leave to intervene. Submissions
should be in Portable Document Format
(PDF) in accordance with NRC guidance
available on the NRC public Web site at
https://www.nrc.gov/site-help/esubmittals.html. A filing is considered
complete at the time the documents are
submitted through the NRC’s E-Filing
system. To be timely, an electronic
filing must be submitted to the E-Filing
system no later than 11:59 p.m. Eastern
Time on the due date. Upon receipt of
a transmission, the E-Filing system
time-stamps the document and sends
the submitter an e-mail notice
confirming receipt of the document. The
E-Filing system also distributes an
e-mail notice that provides access to the
document to the NRC’s Office of the
General Counsel and any others who
have advised the Office of the Secretary
that they wish to participate in the
proceeding, so that the filer need not
serve the documents on those
participants separately. Therefore,
applicants and other participants (or
their counsel or representative) must
PO 00000
Frm 00074
Fmt 4703
Sfmt 4703
apply for and receive a digital ID
certificate before a hearing request/
petition to intervene is filed so that they
can obtain access to the document via
the E-Filing system.
A person filing electronically using
the agency’s adjudicatory E-Filing
system may seek assistance by
contacting the NRC Meta System Help
Desk through the ‘‘Contact Us’’ link
located on the NRC Web site at https://
www.nrc.gov/site-help/esubmittals.html, by e-mail at
MSHD.Resource@nrc.gov, or by a tollfree call at 866–672–7640. The NRC
Meta System Help Desk is available
between 8 a.m. and 8 p.m., Eastern
Time, Monday through Friday,
excluding government holidays.
Participants who believe that they
have a good cause for not submitting
documents electronically must file an
exemption request, in accordance with
10 CFR 2.302(g), with their initial paper
filing requesting authorization to
continue to submit documents in paper
format. Such filings must be submitted
by: (1) First class mail addressed to the
Office of the Secretary of the
Commission, U.S. Nuclear Regulatory
Commission, Washington, DC 20555–
0001, Attention: Rulemaking and
Adjudications Staff; or (2) courier,
express mail, or expedited delivery
service to the Office of the Secretary,
Sixteenth Floor, One White Flint North,
11555 Rockville Pike, Rockville,
Maryland, 20852, Attention:
Rulemaking and Adjudications Staff.
Participants filing a document in this
manner are responsible for serving the
document on all other participants.
Filing is considered complete by firstclass mail as of the time of deposit in
the mail, or by courier, express mail, or
expedited delivery service upon
depositing the document with the
provider of the service. A presiding
officer, having granted an exemption
request from using E-Filing, may require
a participant or party to use E-Filing if
the presiding officer subsequently
determines that the reason for granting
the exemption from use of E-Filing no
longer exists. Documents submitted in
adjudicatory proceedings will appear in
NRC’s electronic hearing docket which
is available to the public at https://
ehd1.nrc.gov/EHD/, unless excluded
pursuant to an order of the Commission,
or the presiding officer. Participants are
requested not to include personal
privacy information, such as social
security numbers, home addresses, or
home phone numbers in their filings,
unless an NRC regulation or other law
requires submission of such
information. With respect to
copyrighted works, except for limited
E:\FR\FM\12APN1.SGM
12APN1
Federal Register / Vol. 76, No. 70 / Tuesday, April 12, 2011 / Notices
excerpts that serve the purpose of the
adjudicatory filings and would
constitute a Fair Use application,
participants are requested not to include
copyrighted materials in their
submission.
Petitions for leave to intervene must
be filed no later than 60 days from the
date of publication of this notice. Nontimely filings will not be entertained
absent a determination by the presiding
officer that the petition or request
should be granted or the contentions
should be admitted, based on a
balancing of the factors specified in 10
CFR 2.309(c)(1)(i)–(viii).
For further details with respect to this
amendment action, see the application
for amendment which is available for
public inspection at the Commission’s
PDR, located at One White Flint North,
Public File Area 01 F21, 11555
Rockville Pike (first floor), Rockville,
Maryland. Publicly available records
will be accessible electronically from
the ADAMS Public Electronic Reading
Room on the Internet at the NRC Web
site, https://www.nrc.gov/reading-rm/
adams.html. If you do not have access
to ADAMS or if there are problems in
accessing the documents located in
ADAMS, contact the PDR Reference
staff at 1–800–397–4209, 301–415–4737,
or by e-mail to pdr.resource@nrc.gov.
Exelon Generation Company, LLC,
Docket Nos. STN 50–456 and STN 50–
457, Braidwood Station, Units 1 and 2,
Will County, Illinois
Exelon Generation Company, LLC,
Docket Nos. STN 50–454 and STN 50–
455, Byron Station, Units 1 and 2, Ogle
County, Illinois
Exelon Generation Company, LLC,
Docket No. 50–461, Clinton Power
Station, Unit 1, DeWitt County, Illinois
Exelon Generation Company, LLC,
Docket Nos. 50–237 and 50–249,
Dresden Nuclear Power Station, Units 2
and 3, Grundy County, Illinois
srobinson on DSKHWCL6B1PROD with NOTICES
Exelon Generation Company, LLC,
Docket Nos. 50–373 and 50–374, LaSalle
County Station, Units 1 and 2, LaSalle
County, Illinois
Exelon Generation Company, LLC,
Docket Nos. 50–352 and 50–353,
Limerick Generating Station, Units 1
and 2, Montgomery County,
Pennsylvania
Exelon Generation Company, LLC, et al.,
Docket No. 50–219, Oyster Creek
Nuclear Generating Station, Ocean
County, New Jersey Exelon Generation
Company, LLC, and PSEG Nuclear LLC,
Docket Nos. 50–277 and 50–278, Peach
Bottom Atomic Power Station, Units 2
VerDate Mar<15>2010
18:00 Apr 11, 2011
Jkt 223001
and 3, York and Lancaster Counties,
Pennsylvania
Exelon Generation Company, LLC,
Docket Nos. 50–254 and 50–265, Quad
Cities Nuclear Power Station, Units 1
and 2, Rock Island County, Illinois
Exelon Generation Company, LLC,
Docket No. 50–289, Three Mile Island
Nuclear Station, Unit 1 (TMI–1),
Dauphin County, Pennsylvania
Date of amendment request:
November 23, 2009, as supplemented by
letters dated January 15, July 23, August
18, November 18, September 24 and
December 21, 2010.
Description of amendment request:
This amendment request contains
sensitive unclassified non-safeguards
information (SUNSI). This proposed
amendment requests approval of the
Exelon Cyber Security Plan, provides an
Implementation Schedule, and adds a
sentence to the existing Facility
Operating License (FOL) Physical
Protection license condition to require
Exelon to fully implement and maintain
in effect all provisions of the approved
Cyber Security Plan. This proposed
amendment is intended to conform to
the model application contained in NEI
08–09, Revision 6, ‘‘Cyber Security Plan
for Nuclear Power Reactors.’’
Basis for proposed no significant
hazards consideration determination:
As required by 10 CFR 50.91(a), the
licensee has provided its analysis of the
issue of no significant hazards
consideration, which is presented
below:
(1) Does the proposed amendment involve
a significant increase in the probability or
consequences of an accident previously
evaluated?
Response: No.
The proposed amendment incorporates a
new requirement in the Facility Operating
License (FOL) to implement and maintain a
Cyber Security Plan as part of the facility’s
overall program for physical protection.
Inclusion of the Cyber Security Plan in the
FOL itself does not involve any modifications
to the safety-related structures, systems or
components (SSCs). Rather, the Cyber
Security Plan describes how the
requirements of 10 CFR 73.54 are to be
implemented to identify, evaluate, and
mitigate cyber attacks up to and including
the design basis cyber attack threat, thereby
achieving high assurance that the facility’s
digital computer and communications
systems and networks are protected from
cyber attacks. The Cyber Security Plan will
not alter previously evaluated Final Safety
Analysis Report (FSAR) design basis accident
analysis assumptions, add any accident
initiators, or affect the function of the plant
safety-related SSCs. Any plant modifications
or changes resulting from implementation of
the Cyber Security Plan will be evaluated per
10 CFR 50.59 to determine if a License
PO 00000
Frm 00075
Fmt 4703
Sfmt 4703
20379
Amendment is required. Changes will be
evaluated per 10 CFR 50.54(q) to determine
if the effectiveness of the site Emergency Plan
is reduced. Changes will be evaluated per 10
CFR 50.54(p) to determine if the effectiveness
of the site Security Plan is reduced. Prior
NRC approval will be obtained if required by
these evaluations.
In addition, an editorial change to correct
two typographical errors as part of the
Braidwood FOL revisions for Unit 1 and Unit
2 is administrative in nature and has no
impact on the probability or consequences of
an accident previously evaluated.
Therefore, the proposed amendment does
not involve a significant increase in the
probability or consequences of an accident
previously evaluated.
(2) Does the proposed amendment create
the possibility of a new or different kind of
accident from any accident previously
evaluated?
Response: No.
This proposed amendment provides
assurance that safety-related SSCs are
protected from cyber attacks. Implementation
of 10 CFR 73.54 and the inclusion of a plan
in the FOL do not result in the need for any
new or different FSAR design basis accident
analysis. It does not introduce new
equipment that could create a new or
different kind of accident, and no new
equipment failure modes are created. As a
result, no new accident scenarios, failure
mechanisms, or limiting single failures are
introduced as a result of this proposed
amendment. In addition, an editorial change
to correct two typographical errors as part of
the Braidwood FOL revisions for Unit 1 and
Unit 2 is administrative in nature and does
not create the possibility of a new or different
kind of accident.
Therefore, the proposed amendment does
not create a possibility for an accident of a
new or different type than those previously
evaluated.
(3) Does the proposed amendment involve
a significant reduction in a margin of safety?
Response: No.
The margin of safety is associated with the
confidence in the ability of the fission
product barriers (i.e., fuel cladding, reactor
coolant pressure boundary, and containment
structure) to limit the level of radiation to the
public. The proposed amendment would not
alter the way any safety-related SSC
functions and would not alter the way the
plant is operated. The amendment provides
assurance that safety-related SSCs are
protected from cyber attacks. The proposed
amendment would not introduce any new
uncertainties or change any existing
uncertainties associated with any safety
limit. The proposed amendment would have
no impact on the structural integrity of the
fuel cladding, reactor coolant pressure
boundary, or containment structure. In
addition, an editorial change to correct two
typographical errors as part of the Braidwood
FOL revisions for Unit 1 and Unit 2 is
administrative in nature and has no impact
on the margin of safety. Based on the above
considerations, the proposed amendment
would not degrade the confidence in the
ability of the fission product barriers to limit
the level of radiation to the public.
E:\FR\FM\12APN1.SGM
12APN1
20380
Federal Register / Vol. 76, No. 70 / Tuesday, April 12, 2011 / Notices
issue of no significant hazards
consideration, which is presented
below:
The NRC staff has reviewed the
licensee’s analysis and, based on this
review, it appears that the three
standards of 10 CFR 50.92(c) are
satisfied. Therefore, the NRC staff
proposes to determine that the
requested amendments involve no
significant hazards consideration.
Attorney for licensee: Mr. Bradley
Fewell, Associate General Counsel,
Exelon Generation Company, LLC, 4300
Winfield Road, Warrenville, IL 60555.
NRC Branch Chief: Robert D. Carlson.
srobinson on DSKHWCL6B1PROD with NOTICES
Therefore, the proposed change does not
involve a significant reduction in a margin of
safety.
(1) Does the proposed amendment involve
a significant increase in the probability or
consequences of an accident previously
evaluated?
Response: No.
The proposed amendment incorporates a
new requirement in the Renewed Facility
Operating License to implement and
maintain a Cyber Security Plan as part of the
facility’s overall program for physical
protection. Inclusion of the Cyber Security
Plan in the Renewed Facility Operating
License itself does not involve any
modifications to the safety-related structures,
systems, or components (SSCs). Rather, the
Cyber Security Plan describes how the
requirements of 10 CFR 73.54 are to be
implemented to identify, evaluate, and
mitigate cyber attacks up to and including
the design basis cyber attack threat, thereby
achieving high assurance that the facility’s
digital computer and communications
systems and networks are protected from
cyber attacks. The Cyber Security Plan will
not alter previously evaluated Final Safety
Analysis Report (FSAR) design basis accident
analysis assumptions, add any accident
initiators, or affect the function of the plant
safety-related SSCs as to how they are
operated, maintained, modified, tested, or
inspected.
Therefore, the proposed amendment does
not involve a significant increase in the
probability or consequences of an accident
previously evaluated.
(2) Does the proposed amendment create
the possibility of a new or different kind of
accident from any accident previously
evaluated?
Response: No.
This proposed amendment provides
assurance that safety-related SSCs are
protected from cyber attacks. Implementation
of 10 CFR 73.54 and the inclusion of a plan
in the Renewed Facility Operating License do
not result in the need of any new or different
FSAR design basis accident analysis. It does
not introduce new equipment that could
create a new or different kind of accident,
and no new equipment failure modes are
created. As a result, no new accident
scenarios, failure mechanisms, or limiting
single failures are introduced as a result of
this proposed amendment.
Therefore, the proposed amendment does
not create a possibility for an accident of a
new or different type than those previously
evaluated.
(3) Does the proposed amendment involve
a significant reduction in a margin of safety?
Response: No.
The proposed amendment would not alter
the way any safety-related SSC functions and
would not alter the way the plant is operated.
The amendment provides assurance that
safety-related SSCs are protected from cyber
attacks. The proposed amendment would not
introduce any new uncertainties or change
any existing uncertainties associated with
any safety limit. The proposed amendment
would have no impact on the structural
integrity of the fuel cladding, reactor coolant
NextEra Energy Point Beach, LLC,
Docket Nos. 50–266 and 50–301, Point
Beach Nuclear Plant (PBNP), Units 1
and 2, Town of Two Creeks, Manitowoc
County, Wisconsin
Date of amendment request: July 8,
2010, as supplemented by letters dated
September 28, November 12, and
November 23, 2010.
Description of amendment request:
This amendment request contains
Sensitive Unclassified Non-Safeguards
Information (SUNSI). The proposed
amendment includes three parts: The
proposed PBNP Cyber Security Plan, an
implementation schedule, and a
proposed sentence to be added to the
Renewed Facility Operating License
Physical Protection license condition for
NextEra Energy (the licensee) to fully
implement and maintain in effect all
provisions of the Commission-approved
PBNP Cyber Security Plan as required
by Title 10 of the Code of Federal
Regulations (10 CFR) Section 73.54. The
Federal Register notice dated March 27,
2009, issued the final rule that amended
10 CFR Part 73. The regulations in 10
CFR 73.54, ‘‘Protection of Digital
Computer and Communication Systems
and Networks’’, establish the
requirements for a Cyber Security
Program. This regulation specifically
requires each licensee currently
licensed to operate a nuclear power
plant under Part 50 to submit a Cyber
Security Plan that satisfies the
requirements of the Rule. The regulation
also requires that each submittal include
a proposed implementation schedule,
and the implementation of the licensee’s
Cyber Security Program must be
consistent with the approved schedule.
The background for this application is
addressed by the Nuclear Regulatory
Commission’s (NRC) Notice of
Availability published on March 27,
2009 (74 FR 13926).
Basis for proposed no significant
hazards consideration determination:
As required by 10 CFR 50.91(a), the
licensee has provided its analysis of the
VerDate Mar<15>2010
18:00 Apr 11, 2011
Jkt 223001
PO 00000
Frm 00076
Fmt 4703
Sfmt 4703
pressure boundary, or containment structure.
Based on the above considerations, the
proposed amendment would not degrade the
confidence in the ability of the fission
product barriers to limit the level of radiation
to the public.
Therefore, the proposed change does not
involve a significant reduction in a margin of
safety.
The NRC staff has reviewed the
licensee’s analysis and, based on this
review, it appears that the three
standards of 10 CFR 50.92(c) are
satisfied. Therefore, the NRC staff
proposes to determine that the
amendment request involves no
significant hazards consideration.
Attorney for licensee: William Blair,
Senior Attorney, NextEra Energy Point
Beach, LLC,. P. O. Box 14000, Juno
Beach, FL 33408–0420.
NRC Branch Chief: Robert J.
Pascarelli.
South Carolina Electric and Gas
Company, South Carolina Public
Service Authority, Docket No. 50–395,
Virgil C. Summer Nuclear Station
(VCSNS), Unit 1, Fairfield County,
South Carolina
Date of amendment request: August 5,
2010, as supplemented on November 30,
2010.
Description of amendment request:
This amendment request contains
sensitive unclassified non-safeguards
information (SUNSI). The proposed
change requests to incorporate a new
requirement into the facility operating
license (FOL) to implement and
maintain a cyber security plan (CSP).
The CSP describes how the
requirements of Title 10 of the Code of
Federal Regulations (10 CFR), Section
73.54 will be implemented in order to
protect the health and safety of the
public from radiological sabotage as a
result of a cyber attack. The plan
provides a description of how the
requirements of 10 CFR 73.54 will be
implemented at VCSNS Unit 1. The CSP
establishes the licensing basis for the
cyber security program for VCSNS Unit
1. The CSP establishes how to achieve
high assurance that nuclear power plant
digital computer and communication
systems and networks associated with
certain systems are adequately protected
against cyber attacks up to and
including the design basis threat.
Basis for proposed no significant
hazards consideration determination:
As required by 10 CFR 50.91(a), the
licensee has provided its analysis of the
issue of no significant hazards
consideration, which is presented
below:
E:\FR\FM\12APN1.SGM
12APN1
srobinson on DSKHWCL6B1PROD with NOTICES
Federal Register / Vol. 76, No. 70 / Tuesday, April 12, 2011 / Notices
Criterion 1: The Proposed Change Does Not
Involve a Significant Increase in the
Probability or Consequences of an Accident
Previously Evaluated
The proposed change incorporates a new
requirement, in the Operating License, to
implement and maintain a cyber security
plan as part of the facility’s overall program
for physical protection. The Cyber Security
Plan itself does not require any plant
modifications. Rather, the Cyber Security
Plan describes how the requirements of 10
CFR 73.54 are implemented in order to
identify, evaluate, and mitigate cyber attacks
up to and including the design basis threat,
thereby achieving high assurance that the
facility’s digital computer and
communications systems and networks are
protected from cyber attacks. The proposed
change requiring the implementation and
maintenance of a Cyber Security Plan does
not alter the plant configuration, require new
plant equipment to be installed, alter
accident analysis assumptions, add any
accident initiators, or affect the function of
plant systems or the manner in which
systems are operated, maintained, modified,
tested, or inspected.
Therefore, the inclusion of the Cyber
Security Plan as a part of the facility’s other
physical protection programs specified in the
facility’s operating license has no impact on
the probability or consequences of an
accident previously evaluated.
Criterion 2: The Proposed Change Does Not
Create the Possibility of a New or Different
Kind of Accident From Any Accident
Previously Evaluated
The proposed change incorporates a new
requirement, in the Operating License, to
implement and maintain a cyber security
plan as part of the facility’s overall program
for physical protection. The creation of the
possibility of a new or different kind of
accident requires creating one or more new
accident precursors. New accident precursors
may be created by modifications of the
plant’s configuration, including changes in
the allowable modes of operation. The Cyber
Security Plan itself does not require any
plant modifications, nor does the Cyber
Security Plan affect the control parameters
governing unit operation or the response of
plant equipment to a transient condition.
Because the proposed change does not
change or introduce any new equipment,
modes of system operation, or failure
mechanisms, no new accident precursors are
created.
Therefore, the proposed change does not
create the possibility of a new or different
kind of accident from any accident
previously evaluated.
Criterion 3: The Proposed Change Does Not
Involve a Significant Reduction in a Margin
of Safety
The proposed change incorporates a new
requirement, in the Operating License, to
implement and maintain a cyber security
plan as part of the facility’s overall program
for physical protection. Plant safety margins
are established through limiting Conditions
for Operation, Limiting Safety System
Settings, and Safety limits specified in the
Technical Specifications. Because the Cyber
VerDate Mar<15>2010
18:55 Apr 11, 2011
Jkt 223001
Security Plan itself does not require any
plant modifications and does not alter the
operation of plant equipment, the proposed
change does not change established safety
margins.
Therefore, the proposed change does not
involve a significant reduction in a margin of
safety.
The NRC staff has reviewed the
licensee’s analysis and, based on this
review, it appears that the three
standards of 10 CFR 50.92(c) are
satisfied. Therefore, the NRC staff
proposes to determine that the
amendment request involves no
significant hazards consideration.
Attorney for licensee: J. Hagood
Hamilton, Jr., South Carolina Electric &
Gas Company, Post Office Box 764,
Columbia, South Carolina 29218.
NRC Branch Chief: Gloria Kulesa.
Southern Nuclear Operating Company,
Inc. (SNC), Georgia Power Company,
Oglethorpe Power Corporation,
Municipal Electric Authority of Georgia,
City of Dalton, Georgia, Docket Nos. 50–
321 and 50–366, Edward I. Hatch
Nuclear Plant, Units 1 and 2, Appling
County, Georgia;
Southern Nuclear Operating Company,
Inc., Docket Nos. 50–348 and 50–364,
Joseph M. Farley Nuclear Plant, Units 1
and 2, Houston County, Alabama;
Southern Nuclear Operating Company,
Inc. Docket Nos. 50–424 and 50–425,
Vogtle Electric Generating Plant, Units 1
and 2, Burke County, Georgia.
Date of amendment request: July 16,
2010.
Description of amendment request:
This amendment request contains
sensitive unclassified non-safeguards
information (SUNSI). The license
amendment request (LAR) proposes a
revision to the Renewed Facility
Operating License (FOL) to require the
license to fully implement and maintain
in effect all provisions of a Nuclear
Regulatory Commission (NRC)-approved
cyber security plan (CSP). The LAR was
submitted pursuant to Section 73.54 of
Title 10 of the Code of Federal
Regulations (10 CFR) which requires
licensees currently licensed to operate a
nuclear power plant under 10 CFR Part
50 to submit a CSP for NRC review and
approval.
Basis for proposed no significant
hazards consideration determination:
As required by 10 CFR 50.91(a), the
licensee has provided its analysis of the
issue of no significant hazards
consideration, which is presented
below.
(1) Does the proposed amendment involve
a significant increase in the probability or
consequences of an accident previously
evaluated?
PO 00000
Frm 00077
Fmt 4703
Sfmt 4703
20381
Response: No
The SNC Cyber Security Plan generally
conforms to the template provided in
[Nuclear Energy Institute] NEI 08–09,
Revision 6, and provides a description of
how the requirements of § 73.54 will be
implemented at Hatch, Farley, and Vogtle.
[ * * *]. Accordingly, the SNC Cyber
Security Plan establishes the licensing basis
for the cyber security program for Hatch,
Farley, and Vogtle sites. The SNC Cyber
Security Plan provides high assurance that
nuclear power plant digital computer and
communication systems and networks
associated with the following are adequately
protected against cyber attacks up to and
including the design basis threat:
1. Safety-related and important-to-safety
functions;
2. Security functions;
3. Emergency preparedness functions,
including offsite communications; and
4. Support systems and equipment which,
if compromised, would adversely impact
safety, security, or emergency preparedness
functions. These systems include, in part, all
non-safety related balance of plant
equipment which if compromised, could
result in a reactor scram or actuation of a
safety-related system and therefore, impact
reactivity.
The SNC Cyber Security Plan itself does
not require any plant modifications.
However, the plan describes appropriate
configuration management requirements to
assure plant modifications involving digital
computer systems are reviewed to provide
adequate protection against cyber attacks, up
to and including the design basis threat as
defined in § 73.1. The proposed change does
not alter the plant configuration, involve the
installation of new plant equipment, alter
accident analysis assumptions, add any new
initiators, or affect the function of plant
systems or the manner in which systems are
operated, maintained, modified, tested, or
inspected. The SNC Cyber Security Plan is
designed to provide high assurance that the
systems within the scope of § 73.54 are
protected from cyber attacks and does not
impact the probability or consequences of an
accident previously evaluated.
In addition, the proposed change modifies
the existing FOL for each SNC-operated
facility to incorporate the SNC Cyber
Security Plan into the existing condition for
physical protection. This change is
administrative in nature and does not impact
the probability or consequences of an
accident previously evaluated.
Based on the above, the proposed change
does not involve a significant increase in the
probability or consequences of an accident
previously evaluated.
2. Does the proposed change create the
possibility of a new or different kind of
accident from any accident previously
evaluated?
Response: No
The SNC Cyber Security Plan generally
conforms to the template provided in NEI
08–09, Revision 6. [ * * * ]. Accordingly, the
SNC Cyber Security Plan provides high
assurance that digital computer and
communication systems and networks
associated with the following are adequately
E:\FR\FM\12APN1.SGM
12APN1
srobinson on DSKHWCL6B1PROD with NOTICES
20382
Federal Register / Vol. 76, No. 70 / Tuesday, April 12, 2011 / Notices
protected against cyber attacks up to and
including the design basis threat:
1. Safety-related and important-to-safety
functions;
2. Security functions;
3. Emergency preparedness functions,
including offsite communications; and,
4. Support systems and equipment which,
if compromised, would adversely impact
safety, security, or emergency preparedness
functions. These systems include, in part, all
non-safety related balance of plant
equipment which if compromised, could
result in a reactor scram or actuation of a
safety-related system and therefore, impact
reactivity.
The proposed SNC Cyber Security Plan
does not alter plant configuration, install new
plant equipment, alter accident analysis
assumptions, add any initiators, or affect the
function of plant systems or the manner in
which systems are operated, maintained,
tested, or inspected. The proposed SNC
Cyber Security Plan includes appropriate
configuration management controls to assure
modifications do not introduce vulnerability
to cyber attacks. The SNC Cyber Security
Plan provides high assurance that the
systems within the scope of § 73.54 are
adequately protected from cyber attacks.
Accordingly, the proposed change does not
create the possibility of a new or different
kind of accident from any previously
evaluated.
In addition, the proposed change modifies
the existing FOL for each SNC-operated
facility to incorporate the SNC Cyber
Security Plan by reference. This change is
administrative in nature and does not create
the possibility of a new or different kind of
accident previously evaluated.
3. Does the proposed amendment involve
a significant reduction in a margin of safety?
Response: No.
The SNC Cyber Security Plan generally
conforms to the template provided by NEI
08–09, Revision 6, and provides a description
of how the requirements of § 73.54 will be
implemented at Hatch, Farley, and Vogtle.
[ * * * ]. Accordingly, the SNC Cyber
Security Plan establishes the licensing basis
for the cyber security program for Hatch,
Farley, and Vogtle sites. The SNC Cyber
Security Plan provides high assurance that
nuclear power plant digital computer and
communication systems and networks
associated with the following are adequately
protected against cyber attacks up to and
including the design basis threat:
1. Safety-related and important-to-safety
functions;
2. Security functions;
3. Emergency preparedness functions,
including offsite communications; and
4. Support systems and equipment which,
if compromised, would adversely impact
safety, security, or emergency preparedness
functions. These systems include, in part, all
non-safety related balance of plant
equipment which if compromised, could
result in a reactor scram or actuation of a
safety-related system and therefore, impact
reactivity.
The proposed SNC Cyber Security Plan
does not alter plant configuration, install new
plant equipment, alter accident analysis
VerDate Mar<15>2010
18:00 Apr 11, 2011
Jkt 223001
assumptions, add any initiators, or affect the
function of plant systems or the manner in
which systems are operated, maintained,
tested, or inspected. Plant safety margins are
established through Limiting Conditions for
Operation, Limiting Safety System Settings
and Safety Limits specified in the Technical
Specifications. Because there is no change to
these established safety margins, the
proposed change does not involve a
reduction in a margin of safety.
In addition, the proposed change modifies
the existing FOL for each SNC-operated
facility to incorporate the SNC Cyber
Security Plan by reference. This change is
administrative in nature and does not involve
a reduction in margin of safety.
Based on the above, the proposed change
does not involve a significant reduction in a
margin of safety.
The NRC staff has reviewed the
licensee’s analysis and, based on this
review, it appears that the three
standards of 10 CFR 50.92(c) are
satisfied. Therefore, the NRC staff
proposes to determine that the
amendment request involves no
significant hazards consideration.
Attorney for licensee: Arthur H.
Domby, Troutman Sanders Nations
Bank Plaza, Suite 5200, 600 Peachtree
Street, NE., Atlanta, Georgia 30308–
2216.
NRC Branch Chief: Gloria Kulesa.
Order Imposing Procedures for Access
to Sensitive Unclassified NonSafeguards Information for Contention
Preparation
Exelon Generation Company, LLC,
Docket Nos. STN 50–456 and STN 50–
457, Braidwood Station, Will County,
Illinois
Exelon Generation Company, LLC,
Docket Nos. STN 50–454 and STN 50–
455, Byron Station, Units 1 and 2, Ogle
County, Illinois
Exelon Generation Company, LLC,
Docket No. 50–461, Clinton Power
Station, Unit 1, DeWitt County, Illinois
Exelon Generation Company, LLC,
Docket Nos. 50–237 and 50–249,
Dresden Nuclear Power Station, Units 2
and 3, Grundy County, Illinois
Exelon Generation Company, LLC,
Docket Nos. 50–373 and 50–374, LaSalle
County Station, Units 1 and 2, LaSalle
County, Illinois
Exelon Generation Company, LLC,
Docket Nos. 50–352 and 50–353,
Limerick Generating Station, Units 1
and 2, Montgomery County,
Pennsylvania
Exelon Generation Company, LLC, et al.,
Docket No. 50–219, Oyster Creek
Nuclear Generating Station, Ocean
County, New Jersey
PO 00000
Frm 00078
Fmt 4703
Sfmt 4703
Exelon Generation Company, LLC, and
PSEG Nuclear LLC, Docket Nos. 50–277
and 50–278, Peach Bottom Atomic
Power Station, Units 2 and 3, York and
Lancaster Counties, Pennsylvania
Exelon Generation Company, LLC,
Docket Nos. 50–254 and 50–265, Quad
Cities Nuclear Power Station, Units 1
and 2, Rock Island County, Illinois
Exelon Generation Company, LLC,
Docket No. 50–289, Three Mile Island
Nuclear Station, Unit 1 (TMI–1),
Dauphin County, Pennsylvania
NextEra Energy Point Beach, LLC,
Docket Nos. 50–266 and 50–301, Point
Beach Nuclear Plant (PBNP), Units 1
and 2, Town of Two Creeks, Manitowoc
County, Wisconsin
South Carolina Electric & Gas Company,
Docket No. 50–395, South Carolina
Public Service Authority, Virgil C.
Summer Nuclear Station (VCSNS), Unit
1, Fairfield County, South Carolina
Southern Nuclear Operating Company,
Inc. (SNC), Georgia Power Company,
Oglethorpe Power Corporation,
Municipal Electric Authority of Georgia,
City of Dalton, Georgia, Docket Nos. 50–
321 and 50–366, Edward I. Hatch
Nuclear Plant, Units 1 and 2, Appling
County, Georgia
Southern Nuclear Operating Company,
Inc., Docket Nos. 50–348 and 50–364,
Joseph M. Farley Nuclear Plant, Units 1
and 2, Houston County, Alabama
Southern Nuclear Operating Company,
Inc., Docket Nos. 50–424 and 50–425,
Vogtle Electric Generating Plant, Units 1
and 2, Burke County, Georgia
A. This Order contains instructions
regarding how potential parties to this
proceeding may request access to
documents containing Sensitive
Unclassified Non-Safeguards
Information (SUNSI).
B. Within 10 days after publication of
this notice of hearing and opportunity to
petition for leave to intervene, any
potential party who believes access to
SUNSI is necessary to respond to this
notice may request such access. A
‘‘potential party’’ is any person who
intends to participate as a party by
demonstrating standing and filing an
admissible contention under 10 CFR
2.309. Requests for access to SUNSI
submitted later than 10 days after
publication will not be considered
absent a showing of good cause for the
late filing, addressing why the request
could not have been filed earlier.
C. The requestor shall submit a letter
requesting permission to access SUNSI
to the Office of the Secretary, U.S.
Nuclear Regulatory Commission,
Washington, DC 20555–0001, Attention:
E:\FR\FM\12APN1.SGM
12APN1
Federal Register / Vol. 76, No. 70 / Tuesday, April 12, 2011 / Notices
Rulemakings and Adjudications Staff,
and provide a copy to the Associate
General Counsel for Hearings,
Enforcement and Administration, Office
of the General Counsel, Washington, DC
20555–0001. The expedited delivery or
courier mail address for both offices is:
U.S. Nuclear Regulatory Commission,
11555 Rockville Pike, Rockville,
Maryland 20852. The e-mail address for
the Office of the Secretary and the
Office of the General Counsel are
Hearing.Docket@nrc.gov and
OGCmailcenter@nrc.gov, respectively.1
The request must include the following
information:
(1) A description of the licensing
action with a citation to this Federal
Register notice;
(2) The name and address of the
potential party and a description of the
potential party’s particularized interest
that could be harmed by the action
identified in C.(1);
(3) The identity of the individual or
entity requesting access to SUNSI and
the requestor’s basis for the need for the
information in order to meaningfully
participate in this adjudicatory
proceeding. In particular, the request
must explain why publicly available
versions of the information requested
would not be sufficient to provide the
basis and specificity for a proffered
contention.
D. Based on an evaluation of the
information submitted under paragraph
C.(3) the NRC staff will determine
within 10 days of receipt of the request
whether:
(1) There is a reasonable basis to
believe the petitioner is likely to
establish standing to participate in this
NRC proceeding; and
(2) The requestor has established a
legitimate need for access to SUNSI.
E. If the NRC staff determines that the
requestor satisfies both D.(1) and D.(2)
above, the NRC staff will notify the
requestor in writing that access to
SUNSI has been granted. The written
notification will contain instructions on
how the requestor may obtain copies of
the requested documents, and any other
conditions that may apply to access to
those documents. These conditions may
include, but are not limited to, the
signing of a Non-Disclosure Agreement
or Affidavit, or Protective Order 2 setting
forth terms and conditions to prevent
the unauthorized or inadvertent
disclosure of SUNSI by each individual
who will be granted access to SUNSI.
F. Filing of Contentions. Any
contentions in these proceedings that
are based upon the information received
as a result of the request made for
SUNSI must be filed by the requestor no
later than 25 days after the requestor is
granted access to that information.
However, if more than 25 days remain
between the date the petitioner is
granted access to the information and
the deadline for filing all other
contentions (as established in the notice
of hearing or opportunity for hearing),
the petitioner may file its SUNSI
contentions by that later deadline.
G. Review of Denials of Access.
(1) If the request for access to SUNSI
is denied by the NRC staff either after
a determination on standing and need
for access, or after a determination on
trustworthiness and reliability, the NRC
staff shall immediately notify the
requestor in writing, briefly stating the
reason or reasons for the denial.
(2) The requestor may challenge the
NRC staff’s adverse determination by
filing a challenge within 5 days of
receipt of that determination with: (a)
The presiding officer designated in this
proceeding; (b) if no presiding officer
has been appointed, the Chief
Administrative Judge, or if he or she is
unavailable, another administrative
20383
judge, or an administrative law judge
with jurisdiction pursuant to 10 CFR
2.318(a); or (c) if another officer has
been designated to rule on information
access issues, with that officer.
H. Review of Grants of Access. A
party other than the requestor may
challenge an NRC staff determination
granting access to SUNSI whose release
would harm that party’s interest
independent of the proceeding. Such a
challenge must be filed with the Chief
Administrative Judge within 5 days of
the notification by the NRC staff of its
grant of access.
If challenges to the NRC staff
determinations are filed, these
procedures give way to the normal
process for litigating disputes
concerning access to information. The
availability of interlocutory review by
the Commission of orders ruling on
such NRC staff determinations (whether
granting or denying access) is governed
by 10 CFR 2.311.3
I. The Commission expects that the
NRC staff and presiding officers (and
any other reviewing officers) will
consider and resolve requests for access
to SUNSI, and motions for protective
orders, in a timely fashion in order to
minimize any unnecessary delays in
identifying those petitioners who have
standing and who have propounded
contentions meeting the specificity and
basis requirements in 10 CFR Part 2.
Attachment 1 to this Order summarizes
the general target schedule for
processing and resolving requests under
these procedures.
It is so ordered.
Dated at Rockville, Maryland, this 4th day
of April 2011.
For the Nuclear Regulatory Commission.
Annette L. Vietti-Cook,
Secretary of the Commission.
ATTACHMENT 1—GENERAL TARGET SCHEDULE FOR PROCESSING AND RESOLVING REQUESTS FOR ACCESS TO SENSITIVE UNCLASSIFIED NON-SAFEGUARDS INFORMATION IN
THIS PROCEEDING
Event/Activity
0 .......................
srobinson on DSKHWCL6B1PROD with NOTICES
Day
Publication of Federal Register notice of hearing and
opportunity to petition for leave to intervene, including
order with instructions for access requests.
1 While a request for hearing or petition to
intervene in this proceeding must comply with the
filing requirements of the NRC’s ‘‘E-Filing Rule,’’ the
initial request to access SUNSI under these
procedures should be submitted as described in this
paragraph.
VerDate Mar<15>2010
18:00 Apr 11, 2011
Jkt 223001
2 Any motion for Protective Order or draft NonDisclosure Affidavit or Agreement for SUNSI must
be filed with the presiding officer or the Chief
Administrative Judge if the presiding officer has not
yet been designated, within 30 days of the deadline
for the receipt of the written access request.
PO 00000
Frm 00079
Fmt 4703
Sfmt 4703
3 Requestors should note that the filing
requirements of the NRC’s E-Filing Rule (72 FR
49139; August 28, 2007) apply to appeals of NRC
staff determinations (because they must be served
on a presiding officer or the Commission, as
applicable), but not to the initial SUNSI request
submitted to the NRC staff under these procedures.
E:\FR\FM\12APN1.SGM
12APN1
20384
Federal Register / Vol. 76, No. 70 / Tuesday, April 12, 2011 / Notices
ATTACHMENT 1—GENERAL TARGET SCHEDULE FOR PROCESSING AND RESOLVING REQUESTS FOR ACCESS TO SENSITIVE UNCLASSIFIED NON-SAFEGUARDS INFORMATION IN
THIS PROCEEDING—Continued
Day
Event/Activity
10 .....................
Deadline for submitting requests for access to Sensitive
Unclassified Non-Safeguards Information (SUNSI)
with information: supporting the standing of a potential party identified by name and address; describing
the need for the information in order for the potential
party to participate meaningfully in an adjudicatory
proceeding.
Deadline for submitting petition for intervention containing: (i) Demonstration of standing; (ii) all contentions whose formulation does not require access to
SUNSI (+25 Answers to petition for intervention; +7
requestor/petitioner reply).
Nuclear Regulatory Commission (NRC) staff informs
the requestor of the staff’s determination whether the
request for access provides a reasonable basis to
believe standing can be established and shows need
for SUNSI. (NRC staff also informs any party to the
proceeding whose interest independent of the proceeding would be harmed by the release of the information.) If NRC staff makes the finding of need for
SUNSI and likelihood of standing, NRC staff begins
document processing (preparation of redactions or
review of redacted documents).
If NRC staff finds no ‘‘need’’ or no likelihood of standing, the deadline for requestor/petitioner to file a motion seeking a ruling to reverse the NRC staff’s denial
of access; NRC staff files copy of access determination with the presiding officer (or Chief Administrative
Judge or other designated officer, as appropriate). If
NRC staff finds ‘‘need’’ for SUNSI, the deadline for
any party to the proceeding whose interest independent of the proceeding would be harmed by the
release of the information to file a motion seeking a
ruling to reverse the NRC staff’s grant of access.
Deadline for NRC staff reply to motions to reverse NRC
staff determination(s).
(Receipt +30) If NRC staff finds standing and need for
SUNSI, deadline for NRC staff to complete information processing and file motion for Protective Order
and draft Non-Disclosure Affidavit. Deadline for applicant/licensee to file Non-Disclosure Agreement for
SUNSI.
If access granted: Issuance of presiding officer or other
designated officer decision on motion for protective
order for access to sensitive information (including
schedule for providing access and submission of
contentions) or decision reversing a final adverse determination by the NRC staff.
Deadline for filing executed Non-Disclosure Affidavits.
Access provided to SUNSI consistent with decision
issuing the protective order.
Deadline for submission of contentions whose development depends upon access to SUNSI. However, if
more than 25 days remain between the petitioner’s
receipt of (or access to) the information and the
deadline for filing all other contentions (as established in the notice of hearing or opportunity for hearing), the petitioner may file its SUNSI contentions by
that later deadline.
(Contention receipt +25) Answers to contentions whose
development depends upon access to SUNSI.
(Answer receipt +7) Petitioner/Intervenor reply to answers.
Decision on contention admission.
60 .....................
20 .....................
25 .....................
30 .....................
40 .....................
A .......................
A + 3 .................
srobinson on DSKHWCL6B1PROD with NOTICES
A + 28 ...............
A + 53 ...............
A + 60 ...............
>A + 60 ............
VerDate Mar<15>2010
18:00 Apr 11, 2011
Jkt 223001
PO 00000
Frm 00080
Fmt 4703
Sfmt 4703
E:\FR\FM\12APN1.SGM
12APN1
Federal Register / Vol. 76, No. 70 / Tuesday, April 12, 2011 / Notices
[FR Doc. 2011–8453 Filed 4–11–11; 8:45 am]
Week of May 23, 2011—Tentative
BILLING CODE 7590–01–P
Friday, May 27, 2011
9 a.m. Briefing on Results of the
Agency Action Review Meeting
(AARM) (Public Meeting). (Contact:
Rani Franovich, 301–415–1868).
This meeting will be webcast live at
the Web address https://www.nrc.gov.
NUCLEAR REGULATORY
COMMISSION
[NRC–2011–0006]
Sunshine Federal Register Notice
AGENCY HOLDING THE MEETINGS:
Nuclear
Regulatory Commission.
Weeks of April 11, 18, 25, May 2,
9, 16, 23, 30, June 6, 13, 2011.
PLACE: Commissioners’ Conference
Room, 11555 Rockville Pike, Rockville,
Maryland.
STATUS: Public and Closed.
DATE:
Week of April 11, 2011
There are no meetings scheduled for
the week of April 11, 2011.
Week of April 18, 2011—Tentative
Tuesday, April 19, 2011
9 a.m. Briefing on Source Security
Part 37 Rulemaking—Physical
Protection of Byproduct Material
(Public Meeting). (Contact: Merri
Horn, 301–415–8126).
This meeting will be webcast live at
the Web address—https://www.nrc.gov.
Week of April 25, 2011—Tentative
Thursday, April 28, 2011
9:30 a.m. Briefing on the Status of NRC
Response to Events in Japan and
Briefing on Station Blackout (Public
Meeting). (Contact: George Wilson,
301–415–1711).
This meeting will be webcast live at
the Web address https://www.nrc.gov.
Week of May 2, 2011—Tentative
Tuesday, May 3, 2011
9 a.m. Information Briefing on
Emergency Preparedness (Public
Meeting). (Contact: Robert Kahler,
301–415–7528).
This meeting will be webcast live at
the Web address https://www.nrc.gov.
Week of May 9, 2011—Tentative
srobinson on DSKHWCL6B1PROD with NOTICES
Thursday, May 12, 2011
9:30 a.m. Briefing on the Progress of
the Task Force Review of NRC
Processes and Regulations
Following the Events in Japan
(Public Meeting). (Contact: Nathan
Sanfilippo, 301–415–3951).
This meeting will be webcast live at
the Web address https://www.nrc.gov
Week of May 16, 2011—Tentative
There are no meetings scheduled for
the week of May 16, 2011.
VerDate Mar<15>2010
18:00 Apr 11, 2011
Jkt 223001
Week of May 30, 2011—Tentative
Thursday, June 2, 2011
9:30 a.m. Briefing on Human Capital
and Equal Employment
Opportunity (EEO) (Public Meeting)
(Contact: Susan Salter, 301–492–
2206).
This meeting will be webcast live at
the Web address https://www.nrc.go.
Week of June 6, 2011—Tentative
Monday, June 6, 2011
10 a.m. Meeting with the Advisory
Committee on Reactor Safeguards
(ACRS) (Public Meeting). (Contact:
Tanny Santos, 301–415–7270).
This meeting will be webcast live at
the Web address https://www.nrc.gov
Week of June 13, 2011—Tentative
Thursday, June 16, 2011
9:30 a.m. Briefing on the Progress of
the Task Force Review of NRC
Processes and Regulations
Following Events in Japan (Public
Meeting). (Contact: Nathan
Sanfilippo, 301–415–3951.)
This meeting will be webcast live at
the Web address https://www.nrc.gov.
*The schedule for Commission
meetings is subject to change on short
notice. To verify the status of meetings,
call (recording)—(301) 415–1292.
Contact person for more information:
Rochelle Bavol, (301) 415–1651.
The NRC Commission Meeting
Schedule can be found on the Internet
at: https://www.nrc.gov/public-involve/
public-meetings/schedule.html.
The NRC provides reasonable
accommodation to individuals with
disabilities where appropriate. If you
need a reasonable accommodation to
participate in these public meetings, or
need this meeting notice or the
transcript or other information from the
public meetings in another format (e.g.
braille, large print), please notify Bill
Dosch, Chief, Work Life and Benefits
Branch, at 301–415–6200, 301–415–
2100, or by e-mail at william.dosch@
nrc.gov. Determinations on requests for
reasonable accommodation will be
made on a case-by-case basis.
This notice is distributed
electronically to subscribers. If you no
longer wish to receive it, or would like
PO 00000
Frm 00081
Fmt 4703
Sfmt 4703
20385
to be added to the distribution, please
contact the Office of the Secretary,
Washington, DC 20555 (301–415–1969),
or send an e-mail to darlene.wright@
nrc.gov
Dated: April 7, 2011.
Rochelle C. Bavol,
Policy Coordinator, Office of the Secretary.
[FR Doc. 2011–8893 Filed 4–8–11; 4:15 pm]
BILLING CODE 7590–01–P
OFFICE OF SCIENCE AND
TECHNOLOGY POLICY
President’s Council of Advisors on
Science and Technology; Notice of
Meeting: Partially Closed Meeting of
the President’s Council of Advisors on
Science and Technology
ACTION:
Public Notice.
This notice sets forth the
schedule and summary agenda for a
partially closed meeting of the
President’s Council of Advisors on
Science and Technology (PCAST), and
describes the functions of the Council.
Notice of this meeting is required under
the Federal Advisory Committee Act
(FACA), 5 U.S.C., App.
DATES: May 19, 2011.
ADDRESSES: The meeting will be held at
the Marriott Metro Center, 775 12th
Street, NW., Ballroom Salon A,
Washington, DC.
Type of Meeting: Open and Closed.
Proposed Schedule and Agenda: The
President’s Council of Advisors on
Science and Technology (PCAST) is
scheduled to meet in open session on
May 19, 2011 from 9 a.m. to 12 p.m.
Open Portion of Meeting: During this
open meeting, PCAST is tentatively
scheduled to hear presentations on the
U.S. patent system. PCAST members
will also discuss reports they are
developing on the topics of advanced
manufacturing. Additional information
and the agenda will be posted at the
PCAST Web site at: https://
whitehouse.gov/ostp/pcast.
Closed Portion of the Meeting: PCAST
may hold a closed meeting of
approximately 1 hour with the President
on May 19, 2011, which must take place
in the White House for the President’s
scheduling convenience and to maintain
Secret Service protection. This meeting
will be closed to the public because
such portion of the meeting is likely to
disclose matters that are to be kept
secret in the interest of national defense
or foreign policy under 5 U.S.C.
552b(c)(1).
Public Comments: It is the policy of
the PCAST to accept written public
SUMMARY:
E:\FR\FM\12APN1.SGM
12APN1
Agencies
[Federal Register Volume 76, Number 70 (Tuesday, April 12, 2011)]
[Notices]
[Pages 20377-20385]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-8453]
[[Page 20377]]
=======================================================================
-----------------------------------------------------------------------
NUCLEAR REGULATORY COMMISSION
[NRC-2011-0068]
Applications and Amendments to Facility Operating Licenses
Involving Proposed No Significant Hazards Considerations and Containing
Sensitive Unclassified Non-Safeguards Information and Order Imposing
Procedures for Access to Sensitive Unclassified Non-Safeguards
Information
I. Background
Pursuant to section 189a.(2) of the Atomic Energy Act of 1954, as
amended (the Act), the U.S. Nuclear Regulatory Commission (the
Commission or NRC) is publishing this notice. The Act requires the
Commission to publish notice of any amendments issued, or proposed to
be issued and grants the Commission the authority to issue and make
immediately effective any amendment to an operating license upon a
determination by the Commission that such amendment involves no
significant hazards consideration, notwithstanding the pendency before
the Commission of a request for a hearing from any person.
This notice includes notices of amendments containing sensitive
unclassified non-safeguards information (SUNSI).
Notice of Consideration of Issuance of Amendments to Facility Operating
Licenses, Proposed No Significant Hazards Consideration Determination,
and Opportunity for a Hearing
The Commission has made a proposed determination that the following
amendment requests involve no significant hazards consideration. Under
the Commission's regulations in Title 10 of the Code of Federal
Regulations (10 CFR), Section 50.92(c), this means that operation of
the facility in accordance with the proposed amendment would not (1)
involve a significant increase in the probability or consequences of an
accident previously evaluated; (2) create the possibility of a new or
different kind of accident from any accident previously evaluated; or
(3) involve a significant reduction in a margin of safety. The basis
for this proposed determination for each amendment request is shown
below.
The Commission is seeking public comments on this proposed
determination. Any comments received within 30 days after the date of
publication of this notice will be considered in making any final
determination.
Normally, the Commission will not issue the amendment until the
expiration of 60 days after the date of publication of this notice. The
Commission may issue the license amendment before expiration of the 60-
day period provided that its final determination is that the amendment
involves no significant hazards consideration. In addition, the
Commission may issue the amendment prior to the expiration of the 30-
day comment period should circumstances change during the 30-day
comment period such that failure to act in a timely way would result,
for example, in derating or shutdown of the facility. Should the
Commission take action prior to the expiration of either the comment
period or the notice period, it will publish in the Federal Register a
notice of issuance. Should the Commission make a final No Significant
Hazards Consideration Determination, any hearing will take place after
issuance. The Commission expects that the need to take this action will
occur very infrequently.
Written comments may be submitted by mail to the Chief, Rules,
Announcements and Directives Branch (RADB), TWB-05-B01M, Division of
Administrative Services, Office of Administration, U.S. Nuclear
Regulatory Commission, Washington, DC 20555-0001, and should cite the
publication date and page number of this Federal Register notice.
Written comments may also be faxed to the RADB at 301-492-3446.
Documents may be examined, and/or copied for a fee, at the NRC's Public
Document Room (PDR), located at One White Flint North, Public File Area
O1 F21, 11555 Rockville Pike (first floor), Rockville, Maryland.
Within 60 days after the date of publication of this notice, any
person(s) whose interest may be affected by this action may file a
request for a hearing and a petition to intervene with respect to
issuance of the amendment to the subject facility operating license.
Requests for a hearing and a petition for leave to intervene shall be
filed in accordance with the Commission's ``Rules of Practice for
Domestic Licensing Proceedings'' in 10 CFR Part 2. Interested person(s)
should consult a current copy of 10 CFR 2.309, which is available at
the Commission's PDR, located at One White Flint North, Public File
Area 01 F21, 11555 Rockville Pike (first floor), Rockville, Maryland,
or at https://www.nrc.gov/reading-rm/doc-collections/cfr/part002/part002-0309.html. Publicly available records will be accessible from
the Agencywide Documents Access and Management System's (ADAMS) Public
Electronic Reading Room on the Internet at the NRC Web site, https://www.nrc.gov/reading-rm/adams.html. If a request for a hearing or
petition for leave to intervene is filed within 60 days, the Commission
or a presiding officer designated by the Commission or by the Chief
Administrative Judge of the Atomic Safety and Licensing Board Panel,
will rule on the request and/or petition; and the Secretary or the
Chief Administrative Judge of the Atomic Safety and Licensing Board
will issue a notice of a hearing or an appropriate order.
As required by 10 CFR 2.309, a petition for leave to intervene
shall set forth with particularity the interest of the petitioner in
the proceeding, and how that interest may be affected by the results of
the proceeding. The petition should specifically explain the reasons
why intervention should be permitted with particular reference to the
following general requirements: (1) The name, address, and telephone
number of the requestor or petitioner; (2) the nature of the
requestor's/petitioner's right under the Act to be made a party to the
proceeding; (3) the nature and extent of the requestor's/petitioner's
property, financial, or other interest in the proceeding; and (4) the
possible effect of any decision or order which may be entered in the
proceeding on the requestor's/petitioner's interest. The petition must
also set forth the specific contentions which the requestor/petitioner
seeks to have litigated at the proceeding.
Each contention must consist of a specific statement of the issue
of law or fact to be raised or controverted. In addition, the
requestor/petitioner shall provide a brief explanation of the bases for
the contention and a concise statement of the alleged facts or expert
opinion which support the contention and on which the requestor/
petitioner intends to rely in proving the contention at the hearing.
The requestor/petitioner must also provide references to those specific
sources and documents of which the petitioner is aware and on which the
requestor/petitioner intends to rely to establish those facts or expert
opinion. The petition must include sufficient information to show that
a genuine dispute exists with the applicant on a material issue of law
or fact. Contentions shall be limited to matters within the scope of
the amendment under consideration. The contention must be one which, if
proven, would entitle the requestor/petitioner to relief. A requestor/
petitioner who fails to satisfy these requirements with respect to at
least one
[[Page 20378]]
contention will not be permitted to participate as a party.
Those permitted to intervene become parties to the proceeding,
subject to any limitations in the order granting leave to intervene,
and have the opportunity to participate fully in the conduct of the
hearing. If a hearing is requested, and the Commission has not made a
final determination on the issue of no significant hazards
consideration, the Commission will make a final determination on the
issue of no significant hazards consideration. The final determination
will serve to decide when the hearing is held. If the final
determination is that the amendment request involves no significant
hazards consideration, the Commission may issue the amendment and make
it immediately effective, notwithstanding the request for a hearing.
Any hearing held would take place after issuance of the amendment. If
the final determination is that the amendment request involves a
significant hazards consideration, any hearing held would take place
before the issuance of any amendment.
All documents filed in NRC adjudicatory proceedings, including a
request for hearing, a petition for leave to intervene, any motion or
other document filed in the proceeding prior to the submission of a
request for hearing or petition to intervene, and documents filed by
interested governmental entities participating under 10 CFR 2.315(c),
must be filed in accordance with the NRC E-Filing rule (72 FR 49139,
August 28, 2007). The E-Filing process requires participants to submit
and serve all adjudicatory documents over the Internet, or in some
cases to mail copies on electronic storage media. Participants may not
submit paper copies of their filings unless they seek an exemption in
accordance with the procedures described below.
To comply with the procedural requirements of E-Filing, at least
ten (10) days prior to the filing deadline, the participant should
contact the Office of the Secretary by e-mail at
hearing.docket@nrc.gov, or by telephone at 301-415-1677, to request (1)
a digital ID certificate, which allows the participant (or its counsel
or representative) to digitally sign documents and access the E-
Submittal server for any proceeding in which it is participating; and
(2) advise the Secretary that the participant will be submitting a
request or petition for hearing (even in instances in which the
participant, or its counsel or representative, already holds an NRC-
issued digital ID certificate). Based upon this information, the
Secretary will establish an electronic docket for the hearing in this
proceeding if the Secretary has not already established an electronic
docket.
Information about applying for a digital ID certificate is
available on NRC's public Web site at https://www.nrc.gov/site-help/e-submittals/apply-certificates.html. System requirements for accessing
the E-Submittal server are detailed in NRC's ``Guidance for Electronic
Submission,'' which is available on the agency's public Web site at
https://www.nrc.gov/site-help/e-submittals.html. Participants may
attempt to use other software not listed on the Web site, but should
note that the NRC's E-Filing system does not support unlisted software,
and the NRC Meta System Help Desk will not be able to offer assistance
in using unlisted software.
If a participant is electronically submitting a document to the NRC
in accordance with the E-Filing rule, the participant must file the
document using the NRC's online, Web-based submission form. In order to
serve documents through EIE, users will be required to install a Web
browser plug-in from the NRC Web site. Further information on the Web-
based submission form, including the installation of the Web browser
plug-in, is available on the NRC's public Web site at https://www.nrc.gov/site-help/e-submittals.html.
Once a participant has obtained a digital ID certificate and a
docket has been created, the participant can then submit a request for
hearing or petition for leave to intervene. Submissions should be in
Portable Document Format (PDF) in accordance with NRC guidance
available on the NRC public Web site at https://www.nrc.gov/site-help/e-submittals.html. A filing is considered complete at the time the
documents are submitted through the NRC's E-Filing system. To be
timely, an electronic filing must be submitted to the E-Filing system
no later than 11:59 p.m. Eastern Time on the due date. Upon receipt of
a transmission, the E-Filing system time-stamps the document and sends
the submitter an e-mail notice confirming receipt of the document. The
E-Filing system also distributes an e-mail notice that provides access
to the document to the NRC's Office of the General Counsel and any
others who have advised the Office of the Secretary that they wish to
participate in the proceeding, so that the filer need not serve the
documents on those participants separately. Therefore, applicants and
other participants (or their counsel or representative) must apply for
and receive a digital ID certificate before a hearing request/petition
to intervene is filed so that they can obtain access to the document
via the E-Filing system.
A person filing electronically using the agency's adjudicatory E-
Filing system may seek assistance by contacting the NRC Meta System
Help Desk through the ``Contact Us'' link located on the NRC Web site
at https://www.nrc.gov/site-help/e-submittals.html, by e-mail at
MSHD.Resource@nrc.gov, or by a toll-free call at 866-672-7640. The NRC
Meta System Help Desk is available between 8 a.m. and 8 p.m., Eastern
Time, Monday through Friday, excluding government holidays.
Participants who believe that they have a good cause for not
submitting documents electronically must file an exemption request, in
accordance with 10 CFR 2.302(g), with their initial paper filing
requesting authorization to continue to submit documents in paper
format. Such filings must be submitted by: (1) First class mail
addressed to the Office of the Secretary of the Commission, U.S.
Nuclear Regulatory Commission, Washington, DC 20555-0001, Attention:
Rulemaking and Adjudications Staff; or (2) courier, express mail, or
expedited delivery service to the Office of the Secretary, Sixteenth
Floor, One White Flint North, 11555 Rockville Pike, Rockville,
Maryland, 20852, Attention: Rulemaking and Adjudications Staff.
Participants filing a document in this manner are responsible for
serving the document on all other participants. Filing is considered
complete by first-class mail as of the time of deposit in the mail, or
by courier, express mail, or expedited delivery service upon depositing
the document with the provider of the service. A presiding officer,
having granted an exemption request from using E-Filing, may require a
participant or party to use E-Filing if the presiding officer
subsequently determines that the reason for granting the exemption from
use of E-Filing no longer exists. Documents submitted in adjudicatory
proceedings will appear in NRC's electronic hearing docket which is
available to the public at https://ehd1.nrc.gov/EHD/, unless excluded
pursuant to an order of the Commission, or the presiding officer.
Participants are requested not to include personal privacy information,
such as social security numbers, home addresses, or home phone numbers
in their filings, unless an NRC regulation or other law requires
submission of such information. With respect to copyrighted works,
except for limited
[[Page 20379]]
excerpts that serve the purpose of the adjudicatory filings and would
constitute a Fair Use application, participants are requested not to
include copyrighted materials in their submission.
Petitions for leave to intervene must be filed no later than 60
days from the date of publication of this notice. Non-timely filings
will not be entertained absent a determination by the presiding officer
that the petition or request should be granted or the contentions
should be admitted, based on a balancing of the factors specified in 10
CFR 2.309(c)(1)(i)-(viii).
For further details with respect to this amendment action, see the
application for amendment which is available for public inspection at
the Commission's PDR, located at One White Flint North, Public File
Area 01 F21, 11555 Rockville Pike (first floor), Rockville, Maryland.
Publicly available records will be accessible electronically from the
ADAMS Public Electronic Reading Room on the Internet at the NRC Web
site, https://www.nrc.gov/reading-rm/adams.html. If you do not have
access to ADAMS or if there are problems in accessing the documents
located in ADAMS, contact the PDR Reference staff at 1-800-397-4209,
301-415-4737, or by e-mail to pdr.resource@nrc.gov.
Exelon Generation Company, LLC, Docket Nos. STN 50-456 and STN 50-457,
Braidwood Station, Units 1 and 2, Will County, Illinois
Exelon Generation Company, LLC, Docket Nos. STN 50-454 and STN 50-455,
Byron Station, Units 1 and 2, Ogle County, Illinois
Exelon Generation Company, LLC, Docket No. 50-461, Clinton Power
Station, Unit 1, DeWitt County, Illinois
Exelon Generation Company, LLC, Docket Nos. 50-237 and 50-249, Dresden
Nuclear Power Station, Units 2 and 3, Grundy County, Illinois
Exelon Generation Company, LLC, Docket Nos. 50-373 and 50-374, LaSalle
County Station, Units 1 and 2, LaSalle County, Illinois
Exelon Generation Company, LLC, Docket Nos. 50-352 and 50-353, Limerick
Generating Station, Units 1 and 2, Montgomery County, Pennsylvania
Exelon Generation Company, LLC, et al., Docket No. 50-219, Oyster Creek
Nuclear Generating Station, Ocean County, New Jersey Exelon Generation
Company, LLC, and PSEG Nuclear LLC, Docket Nos. 50-277 and 50-278,
Peach Bottom Atomic Power Station, Units 2 and 3, York and Lancaster
Counties, Pennsylvania
Exelon Generation Company, LLC, Docket Nos. 50-254 and 50-265, Quad
Cities Nuclear Power Station, Units 1 and 2, Rock Island County,
Illinois
Exelon Generation Company, LLC, Docket No. 50-289, Three Mile Island
Nuclear Station, Unit 1 (TMI-1), Dauphin County, Pennsylvania
Date of amendment request: November 23, 2009, as supplemented by
letters dated January 15, July 23, August 18, November 18, September 24
and December 21, 2010.
Description of amendment request: This amendment request contains
sensitive unclassified non-safeguards information (SUNSI). This
proposed amendment requests approval of the Exelon Cyber Security Plan,
provides an Implementation Schedule, and adds a sentence to the
existing Facility Operating License (FOL) Physical Protection license
condition to require Exelon to fully implement and maintain in effect
all provisions of the approved Cyber Security Plan. This proposed
amendment is intended to conform to the model application contained in
NEI 08-09, Revision 6, ``Cyber Security Plan for Nuclear Power
Reactors.''
Basis for proposed no significant hazards consideration
determination: As required by 10 CFR 50.91(a), the licensee has
provided its analysis of the issue of no significant hazards
consideration, which is presented below:
(1) Does the proposed amendment involve a significant increase
in the probability or consequences of an accident previously
evaluated?
Response: No.
The proposed amendment incorporates a new requirement in the
Facility Operating License (FOL) to implement and maintain a Cyber
Security Plan as part of the facility's overall program for physical
protection. Inclusion of the Cyber Security Plan in the FOL itself
does not involve any modifications to the safety-related structures,
systems or components (SSCs). Rather, the Cyber Security Plan
describes how the requirements of 10 CFR 73.54 are to be implemented
to identify, evaluate, and mitigate cyber attacks up to and
including the design basis cyber attack threat, thereby achieving
high assurance that the facility's digital computer and
communications systems and networks are protected from cyber
attacks. The Cyber Security Plan will not alter previously evaluated
Final Safety Analysis Report (FSAR) design basis accident analysis
assumptions, add any accident initiators, or affect the function of
the plant safety-related SSCs. Any plant modifications or changes
resulting from implementation of the Cyber Security Plan will be
evaluated per 10 CFR 50.59 to determine if a License Amendment is
required. Changes will be evaluated per 10 CFR 50.54(q) to determine
if the effectiveness of the site Emergency Plan is reduced. Changes
will be evaluated per 10 CFR 50.54(p) to determine if the
effectiveness of the site Security Plan is reduced. Prior NRC
approval will be obtained if required by these evaluations.
In addition, an editorial change to correct two typographical
errors as part of the Braidwood FOL revisions for Unit 1 and Unit 2
is administrative in nature and has no impact on the probability or
consequences of an accident previously evaluated.
Therefore, the proposed amendment does not involve a significant
increase in the probability or consequences of an accident
previously evaluated.
(2) Does the proposed amendment create the possibility of a new
or different kind of accident from any accident previously
evaluated?
Response: No.
This proposed amendment provides assurance that safety-related
SSCs are protected from cyber attacks. Implementation of 10 CFR
73.54 and the inclusion of a plan in the FOL do not result in the
need for any new or different FSAR design basis accident analysis.
It does not introduce new equipment that could create a new or
different kind of accident, and no new equipment failure modes are
created. As a result, no new accident scenarios, failure mechanisms,
or limiting single failures are introduced as a result of this
proposed amendment. In addition, an editorial change to correct two
typographical errors as part of the Braidwood FOL revisions for Unit
1 and Unit 2 is administrative in nature and does not create the
possibility of a new or different kind of accident.
Therefore, the proposed amendment does not create a possibility
for an accident of a new or different type than those previously
evaluated.
(3) Does the proposed amendment involve a significant reduction
in a margin of safety?
Response: No.
The margin of safety is associated with the confidence in the
ability of the fission product barriers (i.e., fuel cladding,
reactor coolant pressure boundary, and containment structure) to
limit the level of radiation to the public. The proposed amendment
would not alter the way any safety-related SSC functions and would
not alter the way the plant is operated. The amendment provides
assurance that safety-related SSCs are protected from cyber attacks.
The proposed amendment would not introduce any new uncertainties or
change any existing uncertainties associated with any safety limit.
The proposed amendment would have no impact on the structural
integrity of the fuel cladding, reactor coolant pressure boundary,
or containment structure. In addition, an editorial change to
correct two typographical errors as part of the Braidwood FOL
revisions for Unit 1 and Unit 2 is administrative in nature and has
no impact on the margin of safety. Based on the above
considerations, the proposed amendment would not degrade the
confidence in the ability of the fission product barriers to limit
the level of radiation to the public.
[[Page 20380]]
Therefore, the proposed change does not involve a significant
reduction in a margin of safety.
The NRC staff has reviewed the licensee's analysis and, based on
this review, it appears that the three standards of 10 CFR 50.92(c) are
satisfied. Therefore, the NRC staff proposes to determine that the
requested amendments involve no significant hazards consideration.
Attorney for licensee: Mr. Bradley Fewell, Associate General
Counsel, Exelon Generation Company, LLC, 4300 Winfield Road,
Warrenville, IL 60555.
NRC Branch Chief: Robert D. Carlson.
NextEra Energy Point Beach, LLC, Docket Nos. 50-266 and 50-301, Point
Beach Nuclear Plant (PBNP), Units 1 and 2, Town of Two Creeks,
Manitowoc County, Wisconsin
Date of amendment request: July 8, 2010, as supplemented by letters
dated September 28, November 12, and November 23, 2010.
Description of amendment request: This amendment request contains
Sensitive Unclassified Non-Safeguards Information (SUNSI). The proposed
amendment includes three parts: The proposed PBNP Cyber Security Plan,
an implementation schedule, and a proposed sentence to be added to the
Renewed Facility Operating License Physical Protection license
condition for NextEra Energy (the licensee) to fully implement and
maintain in effect all provisions of the Commission-approved PBNP Cyber
Security Plan as required by Title 10 of the Code of Federal
Regulations (10 CFR) Section 73.54. The Federal Register notice dated
March 27, 2009, issued the final rule that amended 10 CFR Part 73. The
regulations in 10 CFR 73.54, ``Protection of Digital Computer and
Communication Systems and Networks'', establish the requirements for a
Cyber Security Program. This regulation specifically requires each
licensee currently licensed to operate a nuclear power plant under Part
50 to submit a Cyber Security Plan that satisfies the requirements of
the Rule. The regulation also requires that each submittal include a
proposed implementation schedule, and the implementation of the
licensee's Cyber Security Program must be consistent with the approved
schedule. The background for this application is addressed by the
Nuclear Regulatory Commission's (NRC) Notice of Availability published
on March 27, 2009 (74 FR 13926).
Basis for proposed no significant hazards consideration
determination: As required by 10 CFR 50.91(a), the licensee has
provided its analysis of the issue of no significant hazards
consideration, which is presented below:
(1) Does the proposed amendment involve a significant increase
in the probability or consequences of an accident previously
evaluated?
Response: No.
The proposed amendment incorporates a new requirement in the
Renewed Facility Operating License to implement and maintain a Cyber
Security Plan as part of the facility's overall program for physical
protection. Inclusion of the Cyber Security Plan in the Renewed
Facility Operating License itself does not involve any modifications
to the safety-related structures, systems, or components (SSCs).
Rather, the Cyber Security Plan describes how the requirements of 10
CFR 73.54 are to be implemented to identify, evaluate, and mitigate
cyber attacks up to and including the design basis cyber attack
threat, thereby achieving high assurance that the facility's digital
computer and communications systems and networks are protected from
cyber attacks. The Cyber Security Plan will not alter previously
evaluated Final Safety Analysis Report (FSAR) design basis accident
analysis assumptions, add any accident initiators, or affect the
function of the plant safety-related SSCs as to how they are
operated, maintained, modified, tested, or inspected.
Therefore, the proposed amendment does not involve a significant
increase in the probability or consequences of an accident
previously evaluated.
(2) Does the proposed amendment create the possibility of a new
or different kind of accident from any accident previously
evaluated?
Response: No.
This proposed amendment provides assurance that safety-related
SSCs are protected from cyber attacks. Implementation of 10 CFR
73.54 and the inclusion of a plan in the Renewed Facility Operating
License do not result in the need of any new or different FSAR
design basis accident analysis. It does not introduce new equipment
that could create a new or different kind of accident, and no new
equipment failure modes are created. As a result, no new accident
scenarios, failure mechanisms, or limiting single failures are
introduced as a result of this proposed amendment.
Therefore, the proposed amendment does not create a possibility
for an accident of a new or different type than those previously
evaluated.
(3) Does the proposed amendment involve a significant reduction
in a margin of safety?
Response: No.
The proposed amendment would not alter the way any safety-
related SSC functions and would not alter the way the plant is
operated. The amendment provides assurance that safety-related SSCs
are protected from cyber attacks. The proposed amendment would not
introduce any new uncertainties or change any existing uncertainties
associated with any safety limit. The proposed amendment would have
no impact on the structural integrity of the fuel cladding, reactor
coolant pressure boundary, or containment structure. Based on the
above considerations, the proposed amendment would not degrade the
confidence in the ability of the fission product barriers to limit
the level of radiation to the public.
Therefore, the proposed change does not involve a significant
reduction in a margin of safety.
The NRC staff has reviewed the licensee's analysis and, based on
this review, it appears that the three standards of 10 CFR 50.92(c) are
satisfied. Therefore, the NRC staff proposes to determine that the
amendment request involves no significant hazards consideration.
Attorney for licensee: William Blair, Senior Attorney, NextEra
Energy Point Beach, LLC,. P. O. Box 14000, Juno Beach, FL 33408-0420.
NRC Branch Chief: Robert J. Pascarelli.
South Carolina Electric and Gas Company, South Carolina Public Service
Authority, Docket No. 50-395, Virgil C. Summer Nuclear Station (VCSNS),
Unit 1, Fairfield County, South Carolina
Date of amendment request: August 5, 2010, as supplemented on
November 30, 2010.
Description of amendment request: This amendment request contains
sensitive unclassified non-safeguards information (SUNSI). The proposed
change requests to incorporate a new requirement into the facility
operating license (FOL) to implement and maintain a cyber security plan
(CSP). The CSP describes how the requirements of Title 10 of the Code
of Federal Regulations (10 CFR), Section 73.54 will be implemented in
order to protect the health and safety of the public from radiological
sabotage as a result of a cyber attack. The plan provides a description
of how the requirements of 10 CFR 73.54 will be implemented at VCSNS
Unit 1. The CSP establishes the licensing basis for the cyber security
program for VCSNS Unit 1. The CSP establishes how to achieve high
assurance that nuclear power plant digital computer and communication
systems and networks associated with certain systems are adequately
protected against cyber attacks up to and including the design basis
threat.
Basis for proposed no significant hazards consideration
determination: As required by 10 CFR 50.91(a), the licensee has
provided its analysis of the issue of no significant hazards
consideration, which is presented below:
[[Page 20381]]
Criterion 1: The Proposed Change Does Not Involve a Significant
Increase in the Probability or Consequences of an Accident Previously
Evaluated
The proposed change incorporates a new requirement, in the
Operating License, to implement and maintain a cyber security plan
as part of the facility's overall program for physical protection.
The Cyber Security Plan itself does not require any plant
modifications. Rather, the Cyber Security Plan describes how the
requirements of 10 CFR 73.54 are implemented in order to identify,
evaluate, and mitigate cyber attacks up to and including the design
basis threat, thereby achieving high assurance that the facility's
digital computer and communications systems and networks are
protected from cyber attacks. The proposed change requiring the
implementation and maintenance of a Cyber Security Plan does not
alter the plant configuration, require new plant equipment to be
installed, alter accident analysis assumptions, add any accident
initiators, or affect the function of plant systems or the manner in
which systems are operated, maintained, modified, tested, or
inspected.
Therefore, the inclusion of the Cyber Security Plan as a part of
the facility's other physical protection programs specified in the
facility's operating license has no impact on the probability or
consequences of an accident previously evaluated.
Criterion 2: The Proposed Change Does Not Create the Possibility of a
New or Different Kind of Accident From Any Accident Previously
Evaluated
The proposed change incorporates a new requirement, in the
Operating License, to implement and maintain a cyber security plan
as part of the facility's overall program for physical protection.
The creation of the possibility of a new or different kind of
accident requires creating one or more new accident precursors. New
accident precursors may be created by modifications of the plant's
configuration, including changes in the allowable modes of
operation. The Cyber Security Plan itself does not require any plant
modifications, nor does the Cyber Security Plan affect the control
parameters governing unit operation or the response of plant
equipment to a transient condition. Because the proposed change does
not change or introduce any new equipment, modes of system
operation, or failure mechanisms, no new accident precursors are
created.
Therefore, the proposed change does not create the possibility
of a new or different kind of accident from any accident previously
evaluated.
Criterion 3: The Proposed Change Does Not Involve a Significant
Reduction in a Margin of Safety
The proposed change incorporates a new requirement, in the
Operating License, to implement and maintain a cyber security plan
as part of the facility's overall program for physical protection.
Plant safety margins are established through limiting Conditions for
Operation, Limiting Safety System Settings, and Safety limits
specified in the Technical Specifications. Because the Cyber
Security Plan itself does not require any plant modifications and
does not alter the operation of plant equipment, the proposed change
does not change established safety margins.
Therefore, the proposed change does not involve a significant
reduction in a margin of safety.
The NRC staff has reviewed the licensee's analysis and, based on
this review, it appears that the three standards of 10 CFR 50.92(c) are
satisfied. Therefore, the NRC staff proposes to determine that the
amendment request involves no significant hazards consideration.
Attorney for licensee: J. Hagood Hamilton, Jr., South Carolina
Electric & Gas Company, Post Office Box 764, Columbia, South Carolina
29218.
NRC Branch Chief: Gloria Kulesa.
Southern Nuclear Operating Company, Inc. (SNC), Georgia Power Company,
Oglethorpe Power Corporation, Municipal Electric Authority of Georgia,
City of Dalton, Georgia, Docket Nos. 50-321 and 50-366, Edward I. Hatch
Nuclear Plant, Units 1 and 2, Appling County, Georgia;
Southern Nuclear Operating Company, Inc., Docket Nos. 50-348 and 50-
364, Joseph M. Farley Nuclear Plant, Units 1 and 2, Houston County,
Alabama;
Southern Nuclear Operating Company, Inc. Docket Nos. 50-424 and 50-425,
Vogtle Electric Generating Plant, Units 1 and 2, Burke County, Georgia.
Date of amendment request: July 16, 2010.
Description of amendment request: This amendment request contains
sensitive unclassified non-safeguards information (SUNSI). The license
amendment request (LAR) proposes a revision to the Renewed Facility
Operating License (FOL) to require the license to fully implement and
maintain in effect all provisions of a Nuclear Regulatory Commission
(NRC)-approved cyber security plan (CSP). The LAR was submitted
pursuant to Section 73.54 of Title 10 of the Code of Federal
Regulations (10 CFR) which requires licensees currently licensed to
operate a nuclear power plant under 10 CFR Part 50 to submit a CSP for
NRC review and approval.
Basis for proposed no significant hazards consideration
determination: As required by 10 CFR 50.91(a), the licensee has
provided its analysis of the issue of no significant hazards
consideration, which is presented below.
(1) Does the proposed amendment involve a significant increase
in the probability or consequences of an accident previously
evaluated?
Response: No
The SNC Cyber Security Plan generally conforms to the template
provided in [Nuclear Energy Institute] NEI 08-09, Revision 6, and
provides a description of how the requirements of Sec. 73.54 will
be implemented at Hatch, Farley, and Vogtle. [ * * *]. Accordingly,
the SNC Cyber Security Plan establishes the licensing basis for the
cyber security program for Hatch, Farley, and Vogtle sites. The SNC
Cyber Security Plan provides high assurance that nuclear power plant
digital computer and communication systems and networks associated
with the following are adequately protected against cyber attacks up
to and including the design basis threat:
1. Safety-related and important-to-safety functions;
2. Security functions;
3. Emergency preparedness functions, including offsite
communications; and
4. Support systems and equipment which, if compromised, would
adversely impact safety, security, or emergency preparedness
functions. These systems include, in part, all non-safety related
balance of plant equipment which if compromised, could result in a
reactor scram or actuation of a safety-related system and therefore,
impact reactivity.
The SNC Cyber Security Plan itself does not require any plant
modifications. However, the plan describes appropriate configuration
management requirements to assure plant modifications involving
digital computer systems are reviewed to provide adequate protection
against cyber attacks, up to and including the design basis threat
as defined in Sec. 73.1. The proposed change does not alter the
plant configuration, involve the installation of new plant
equipment, alter accident analysis assumptions, add any new
initiators, or affect the function of plant systems or the manner in
which systems are operated, maintained, modified, tested, or
inspected. The SNC Cyber Security Plan is designed to provide high
assurance that the systems within the scope of Sec. 73.54 are
protected from cyber attacks and does not impact the probability or
consequences of an accident previously evaluated.
In addition, the proposed change modifies the existing FOL for
each SNC-operated facility to incorporate the SNC Cyber Security
Plan into the existing condition for physical protection. This
change is administrative in nature and does not impact the
probability or consequences of an accident previously evaluated.
Based on the above, the proposed change does not involve a
significant increase in the probability or consequences of an
accident previously evaluated.
2. Does the proposed change create the possibility of a new or
different kind of accident from any accident previously evaluated?
Response: No
The SNC Cyber Security Plan generally conforms to the template
provided in NEI 08-09, Revision 6. [ * * * ]. Accordingly, the SNC
Cyber Security Plan provides high assurance that digital computer
and communication systems and networks associated with the following
are adequately
[[Page 20382]]
protected against cyber attacks up to and including the design basis
threat:
1. Safety-related and important-to-safety functions;
2. Security functions;
3. Emergency preparedness functions, including offsite
communications; and,
4. Support systems and equipment which, if compromised, would
adversely impact safety, security, or emergency preparedness
functions. These systems include, in part, all non-safety related
balance of plant equipment which if compromised, could result in a
reactor scram or actuation of a safety-related system and therefore,
impact reactivity.
The proposed SNC Cyber Security Plan does not alter plant
configuration, install new plant equipment, alter accident analysis
assumptions, add any initiators, or affect the function of plant
systems or the manner in which systems are operated, maintained,
tested, or inspected. The proposed SNC Cyber Security Plan includes
appropriate configuration management controls to assure
modifications do not introduce vulnerability to cyber attacks. The
SNC Cyber Security Plan provides high assurance that the systems
within the scope of Sec. 73.54 are adequately protected from cyber
attacks. Accordingly, the proposed change does not create the
possibility of a new or different kind of accident from any
previously evaluated.
In addition, the proposed change modifies the existing FOL for
each SNC-operated facility to incorporate the SNC Cyber Security
Plan by reference. This change is administrative in nature and does
not create the possibility of a new or different kind of accident
previously evaluated.
3. Does the proposed amendment involve a significant reduction
in a margin of safety?
Response: No.
The SNC Cyber Security Plan generally conforms to the template
provided by NEI 08-09, Revision 6, and provides a description of how
the requirements of Sec. 73.54 will be implemented at Hatch,
Farley, and Vogtle. [ * * * ]. Accordingly, the SNC Cyber Security
Plan establishes the licensing basis for the cyber security program
for Hatch, Farley, and Vogtle sites. The SNC Cyber Security Plan
provides high assurance that nuclear power plant digital computer
and communication systems and networks associated with the following
are adequately protected against cyber attacks up to and including
the design basis threat:
1. Safety-related and important-to-safety functions;
2. Security functions;
3. Emergency preparedness functions, including offsite
communications; and
4. Support systems and equipment which, if compromised, would
adversely impact safety, security, or emergency preparedness
functions. These systems include, in part, all non-safety related
balance of plant equipment which if compromised, could result in a
reactor scram or actuation of a safety-related system and therefore,
impact reactivity.
The proposed SNC Cyber Security Plan does not alter plant
configuration, install new plant equipment, alter accident analysis
assumptions, add any initiators, or affect the function of plant
systems or the manner in which systems are operated, maintained,
tested, or inspected. Plant safety margins are established through
Limiting Conditions for Operation, Limiting Safety System Settings
and Safety Limits specified in the Technical Specifications. Because
there is no change to these established safety margins, the proposed
change does not involve a reduction in a margin of safety.
In addition, the proposed change modifies the existing FOL for
each SNC-operated facility to incorporate the SNC Cyber Security
Plan by reference. This change is administrative in nature and does
not involve a reduction in margin of safety.
Based on the above, the proposed change does not involve a
significant reduction in a margin of safety.
The NRC staff has reviewed the licensee's analysis and, based on
this review, it appears that the three standards of 10 CFR 50.92(c) are
satisfied. Therefore, the NRC staff proposes to determine that the
amendment request involves no significant hazards consideration.
Attorney for licensee: Arthur H. Domby, Troutman Sanders Nations
Bank Plaza, Suite 5200, 600 Peachtree Street, NE., Atlanta, Georgia
30308-2216.
NRC Branch Chief: Gloria Kulesa.
Order Imposing Procedures for Access to Sensitive Unclassified Non-
Safeguards Information for Contention Preparation
Exelon Generation Company, LLC, Docket Nos. STN 50-456 and STN 50-457,
Braidwood Station, Will County, Illinois
Exelon Generation Company, LLC, Docket Nos. STN 50-454 and STN 50-455,
Byron Station, Units 1 and 2, Ogle County, Illinois
Exelon Generation Company, LLC, Docket No. 50-461, Clinton Power
Station, Unit 1, DeWitt County, Illinois
Exelon Generation Company, LLC, Docket Nos. 50-237 and 50-249, Dresden
Nuclear Power Station, Units 2 and 3, Grundy County, Illinois
Exelon Generation Company, LLC, Docket Nos. 50-373 and 50-374, LaSalle
County Station, Units 1 and 2, LaSalle County, Illinois
Exelon Generation Company, LLC, Docket Nos. 50-352 and 50-353, Limerick
Generating Station, Units 1 and 2, Montgomery County, Pennsylvania
Exelon Generation Company, LLC, et al., Docket No. 50-219, Oyster Creek
Nuclear Generating Station, Ocean County, New Jersey
Exelon Generation Company, LLC, and PSEG Nuclear LLC, Docket Nos. 50-
277 and 50-278, Peach Bottom Atomic Power Station, Units 2 and 3, York
and Lancaster Counties, Pennsylvania
Exelon Generation Company, LLC, Docket Nos. 50-254 and 50-265, Quad
Cities Nuclear Power Station, Units 1 and 2, Rock Island County,
Illinois
Exelon Generation Company, LLC, Docket No. 50-289, Three Mile Island
Nuclear Station, Unit 1 (TMI-1), Dauphin County, Pennsylvania
NextEra Energy Point Beach, LLC, Docket Nos. 50-266 and 50-301, Point
Beach Nuclear Plant (PBNP), Units 1 and 2, Town of Two Creeks,
Manitowoc County, Wisconsin
South Carolina Electric & Gas Company, Docket No. 50-395, South
Carolina Public Service Authority, Virgil C. Summer Nuclear Station
(VCSNS), Unit 1, Fairfield County, South Carolina
Southern Nuclear Operating Company, Inc. (SNC), Georgia Power Company,
Oglethorpe Power Corporation, Municipal Electric Authority of Georgia,
City of Dalton, Georgia, Docket Nos. 50-321 and 50-366, Edward I. Hatch
Nuclear Plant, Units 1 and 2, Appling County, Georgia
Southern Nuclear Operating Company, Inc., Docket Nos. 50-348 and 50-
364, Joseph M. Farley Nuclear Plant, Units 1 and 2, Houston County,
Alabama
Southern Nuclear Operating Company, Inc., Docket Nos. 50-424 and 50-
425, Vogtle Electric Generating Plant, Units 1 and 2, Burke County,
Georgia
A. This Order contains instructions regarding how potential parties
to this proceeding may request access to documents containing Sensitive
Unclassified Non-Safeguards Information (SUNSI).
B. Within 10 days after publication of this notice of hearing and
opportunity to petition for leave to intervene, any potential party who
believes access to SUNSI is necessary to respond to this notice may
request such access. A ``potential party'' is any person who intends to
participate as a party by demonstrating standing and filing an
admissible contention under 10 CFR 2.309. Requests for access to SUNSI
submitted later than 10 days after publication will not be considered
absent a showing of good cause for the late filing, addressing why the
request could not have been filed earlier.
C. The requestor shall submit a letter requesting permission to
access SUNSI to the Office of the Secretary, U.S. Nuclear Regulatory
Commission, Washington, DC 20555-0001, Attention:
[[Page 20383]]
Rulemakings and Adjudications Staff, and provide a copy to the
Associate General Counsel for Hearings, Enforcement and Administration,
Office of the General Counsel, Washington, DC 20555-0001. The expedited
delivery or courier mail address for both offices is: U.S. Nuclear
Regulatory Commission, 11555 Rockville Pike, Rockville, Maryland 20852.
The e-mail address for the Office of the Secretary and the Office of
the General Counsel are Hearing.Docket@nrc.gov and
OGCmailcenter@nrc.gov, respectively.\1\ The request must include the
following information:
---------------------------------------------------------------------------
\1\ While a request for hearing or petition to intervene in this
proceeding must comply with the filing requirements of the NRC's
``E-Filing Rule,'' the initial request to access SUNSI under these
procedures should be submitted as described in this paragraph.
---------------------------------------------------------------------------
(1) A description of the licensing action with a citation to this
Federal Register notice;
(2) The name and address of the potential party and a description
of the potential party's particularized interest that could be harmed
by the action identified in C.(1);
(3) The identity of the individual or entity requesting access to
SUNSI and the requestor's basis for the need for the information in
order to meaningfully participate in this adjudicatory proceeding. In
particular, the request must explain why publicly available versions of
the information requested would not be sufficient to provide the basis
and specificity for a proffered contention.
D. Based on an evaluation of the information submitted under
paragraph C.(3) the NRC staff will determine within 10 days of receipt
of the request whether:
(1) There is a reasonable basis to believe the petitioner is likely
to establish standing to participate in this NRC proceeding; and
(2) The requestor has established a legitimate need for access to
SUNSI.
E. If the NRC staff determines that the requestor satisfies both
D.(1) and D.(2) above, the NRC staff will notify the requestor in
writing that access to SUNSI has been granted. The written notification
will contain instructions on how the requestor may obtain copies of the
requested documents, and any other conditions that may apply to access
to those documents. These conditions may include, but are not limited
to, the signing of a Non-Disclosure Agreement or Affidavit, or
Protective Order \2\ setting forth terms and conditions to prevent the
unauthorized or inadvertent disclosure of SUNSI by each individual who
will be granted access to SUNSI.
---------------------------------------------------------------------------
\2\ Any motion for Protective Order or draft Non-Disclosure
Affidavit or Agreement for SUNSI must be filed with the presiding
officer or the Chief Administrative Judge if the presiding officer
has not yet been designated, within 30 days of the deadline for the
receipt of the written access request.
---------------------------------------------------------------------------
F. Filing of Contentions. Any contentions in these proceedings that
are based upon the information received as a result of the request made
for SUNSI must be filed by the requestor no later than 25 days after
the requestor is granted access to that information. However, if more
than 25 days remain between the date the petitioner is granted access
to the information and the deadline for filing all other contentions
(as established in the notice of hearing or opportunity for hearing),
the petitioner may file its SUNSI contentions by that later deadline.
G. Review of Denials of Access.
(1) If the request for access to SUNSI is denied by the NRC staff
either after a determination on standing and need for access, or after
a determination on trustworthiness and reliability, the NRC staff shall
immediately notify the requestor in writing, briefly stating the reason
or reasons for the denial.
(2) The requestor may challenge the NRC staff's adverse
determination by filing a challenge within 5 days of receipt of that
determination with: (a) The presiding officer designated in this
proceeding; (b) if no presiding officer has been appointed, the Chief
Administrative Judge, or if he or she is unavailable, another
administrative judge, or an administrative law judge with jurisdiction
pursuant to 10 CFR 2.318(a); or (c) if another officer has been
designated to rule on information access issues, with that officer.
H. Review of Grants of Access. A party other than the requestor may
challenge an NRC staff determination granting access to SUNSI whose
release would harm that party's interest independent of the proceeding.
Such a challenge must be filed with the Chief Administrative Judge
within 5 days of the notification by the NRC staff of its grant of
access.
If challenges to the NRC staff determinations are filed, these
procedures give way to the normal process for litigating disputes
concerning access to information. The availability of interlocutory
review by the Commission of orders ruling on such NRC staff
determinations (whether granting or denying access) is governed by 10
CFR 2.311.\3\
---------------------------------------------------------------------------
\3\ Requestors should note that the filing requirements of the
NRC's E-Filing Rule (72 FR 49139; August 28, 2007) apply to appeals
of NRC staff determinations (because they must be served on a
presiding officer or the Commission, as applicable), but not to the
initial SUNSI request submitted to the NRC staff under these
procedures.
---------------------------------------------------------------------------
I. The Commission expects that the NRC staff and presiding officers
(and any other reviewing officers) will consider and resolve requests
for access to SUNSI, and motions for protective orders, in a timely
fashion in order to minimize any unnecessary delays in identifying
those petitioners who have standing and who have propounded contentions
meeting the specificity and basis requirements in 10 CFR Part 2.
Attachment 1 to this Order summarizes the general target schedule for
processing and resolving requests under these procedures.
It is so ordered.
Dated at Rockville, Maryland, this 4th day of April 2011.
For the Nuclear Regulatory Commission.
Annette L. Vietti-Cook,
Secretary of the Commission.
Attachment 1--General Target Schedule for Processing and Resolving Requests for Access to Sensitive Unclassified
Non-Safeguards Information in This Proceeding
----------------------------------------------------------------------------------------------------------------
Day Event/Activity
----------------------------------------------------------------------------------------------------------------
0............................... Publication of Federal Register notice of hearing and opportunity to petition
for leave to intervene, including order with instructions for access
requests.
[[Page 20384]]
10.............................. Deadline for submitting requests for access to Sensitive Unclassified Non-
Safeguards Information (SUNSI) with information: supporting the standing of a
potential party identified by name and address; describing the need for the
information in order for the potential party to participate meaningfully in
an adjudicatory proceeding.
60.............................. Deadline for submitting petition for intervention containing: (i)
Demonstration of standing; (ii) all contentions whose formulation does not
require access to SUNSI (+25 Answers to petition for intervention; +7
requestor/petitioner reply).
20.............................. Nuclear Regulatory Commission (NRC) staff informs the requestor of the staff's
determination whether the request for access provides a reasonable basis to
believe standing can be established and shows need for SUNSI. (NRC staff also
informs any party to the proceeding whose interest independent of the
proceeding would be harmed by the release of the information.) If NRC staff
makes the finding of need for SUNSI and likelihood of standing, NRC staff
begins document processing (preparation of redactions or review of redacted
documents).
25.............................. If NRC staff finds no ``need'' or no likelihood of standing, the deadline for
requestor/petitioner to file a motion seeking a ruling to reverse the NRC
staff's denial of access; NRC staff files copy of access determination with
the presiding officer (or Chief Administrative Judge or other designated
officer, as appropriate). If NRC staff finds ``need'' for SUNSI, the deadline
for any party to the proceeding whose interest independent of the proceeding
would be harmed by the release of the information to file a motion seeking a
ruling to reverse the NRC staff's grant of access.
30.............................. Deadline for NRC staff reply to motions to reverse NRC staff determination(s).
40.............................. (Receipt +30) If NRC staff finds standing and need for SUNSI, deadline for NRC
staff to complete information processing and file motion for Protective Order
and draft Non-Disclosure Affidavit. Deadline for applicant/licensee to file
Non-Disclosure Agreement for SUNSI.
A............................... If access granted: Issuance of presiding officer or other designated officer
decision on motion for protective order for access to sensitive information
(including schedule for providing access and submission of contentions) or
decision reversing a final adverse determination by the NRC staff.
A + 3........................... Deadline for filing executed Non-Disclosure Affidavits. Access provided to
SUNSI consistent with decision issuing the protective order.
A + 28.......................... Deadline for submission of contentions whose development depends upon access
to SUNSI. However, if more than 25 days remain between the petitioner's
receipt of (or access to) the information and the deadline for filing all
other contentions (as established in the notice of hearing or opportunity for
hearing), the petitioner may file its SUNSI contentions by that later
deadline.
A + 53.......................... (Contention receipt +25) Answers to contentions whose development depends upon
access to SUNSI.
A + 60.......................... (Answer receipt +7) Petitioner/Intervenor reply to answers.
>A + 60......................... Decision on contention admission.
----------------------------------------------------------------------------------------------------------------
[[Page 20385]]
[FR Doc. 2011-8453 Filed 4-11-11; 8:45 am]
BILLING CODE 7590-01-P