Revisions to the Requirements for Authority To Manufacture and Distribute Postage Evidencing Systems, 23396 [2012-9396]

Download as PDF 23396 Federal Register / Vol. 77, No. 76 / Thursday, April 19, 2012 / Rules and Regulations TABLE 1 1. Intrepid Air and Sea Museum Fireworks ............................................. Pier 90 Hudson River Safety Zone 33 CFR 165.160(5.4) 2. Heritage of Pride Fireworks ............................................................... Pier 54 Hudson River Safety Zone 33 CFR 165.160(5.8) 3. Celebrate the Amboy’s Fireworks ...................................................... Raritan Bay Safety Zone 33 CFR 165.160(2.5) Under the provisions of 33 CFR 165.160, a vessel may not enter the regulated area unless given express permission from the COTP or the designated representative. Spectator vessels may transit outside the regulated area but may not anchor, block, loiter in, or impede the transit of other vessels. The Coast Guard may be assisted by other Federal, State, or local law enforcement agencies in enforcing this regulation. This notice is issued under authority of 33 CFR 165.160(a) and 5 U.S.C. 552(a). In addition to this notice in the Federal Register, the Coast Guard will provide mariners with advanced notification of enforcement periods via the Local Notice to Mariners and marine information broadcasts. If the COTP determines that the regulated area need not be enforced for the full duration stated in this notice, a Broadcast Notice to Mariners may be used to grant general permission to enter the regulated area. Dated: April 4, 2012. L.L. Fagan, Rear Admiral, U.S. Coast Guard, Captain of the Port New York. [FR Doc. 2012–9363 Filed 4–18–12; 8:45 am] BILLING CODE 9110–04–P DATES: • Launch site: A barge located in approximate position 40°46′11.8″ N, 074°00′14.8″ W (NAD 1983), approximately 375 yards west of Pier 90, Manhattan, NY. • Date: May 23, 2012. • Rain Date: May 24, 2012. • Time: 09:30 p.m.–10:42 p.m. • Launch site: A barge located in approximate position 40°44′31″ N, 074°01′00″ W (NAD 1983), approximately 380 yards west of Pier 54, Manhattan, NY. • Date: June 24, 2012. • Time: 10:00 p.m.–11:20 p.m. • Launch site: A barge located in approximate position 40°30′04″ N 074°15′35″ W (NAD 1983), about 240 yards east of Raritan River Cutoff Channel Buoy 2 (LLNR 36595). • Date: July 3, 2012. • Time: 8:45 p.m.–10:05 p.m. This rule is effective May 21, 2012. Mail or deliver written comments to the Manager, Payment Technology, U.S. Postal Service, 475 L’Enfant Plaza SW., Room 3436, Washington, DC 20260–0911. Copies of all written comments will be available for inspection and photocopying between 9 a.m. and 4 p.m., Monday through Friday, at the Payment Technology office. FOR FURTHER INFORMATION CONTACT: Marlo Kay Ivey, Business Programs Specialist, Payment Technology, U.S. Postal Service, at 202–268–7613. SUPPLEMENTARY INFORMATION: Providers currently must disclose all findings or results of any testing concerning the security or revenue protection features, capabilities, or failings of any PES, as well as all potential security weaknesses or methods of tampering with the PES. This rule applies the same standard to cyber attacks against the provider’s systems. Stanley F. Mires, Attorney, Legal Policy & Legislative Advice. List of Subjects in 39 CFR Part 501 [FR Doc. 2012–9396 Filed 4–18–12; 8:45 am] Postal Service. Accordingly, for the reasons stated, 39 CFR Part 501 is amended as follows: BILLING CODE 7710–12–P ADDRESSES: PART 501—AUTHORIZATION TO MANUFACTURE AND DISTRIBUTE POSTAGE EVIDENCING SYSTEMS POSTAL SERVICE 39 CFR Part 501 (3) Cyber attacks that include, but are not limited to, gaining unauthorized access to digital systems for purposes of misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks may also be carried out in a manner that does not require gaining unauthorized access, such as by causing denial-ofservice attacks on Web sites. Cyber attacks may be carried out by third parties or insiders using techniques that range from highly sophisticated efforts to electronically circumvent network security or overwhelm Web sites to more traditional intelligence gathering and social engineering aimed at obtaining information necessary to gain access. Cyber security risk disclosures reported must adequately describe the nature of the material risks and specify how each risk affects the Postage Evidencing System. * * * * * 1. The authority citation for 39 CFR Part 501 continues to read as follows: ENVIRONMENTAL PROTECTION AGENCY 40 CFR Parts 52, 60 and 61 [FRL 9660–3] ■ srobinson on DSK4SPTVN1PROD with RULES Revisions to the Requirements for Authority To Manufacture and Distribute Postage Evidencing Systems Postal Service TM. ACTION: Final rule. AGENCY: This rule establishes the responsibility of the providers of Postage Evidencing Systems (PES) to notify the U.S. Postal Service® of any cyber attacks to their systems. 16:05 Apr 18, 2012 2. Section 501.11 is amended by adding paragraph (b)(3) as follows: ■ SUMMARY: VerDate Mar<15>2010 Authority: 5 U.S.C. 552(a); 39 U.S.C. 101, 401, 403, 404, 410, 2601, 2605, Inspector General Act of 1978, as amended (Pub. L. 95– 452, as amended); 5 U.S.C. App. 3. Jkt 226001 § 501.11 Reporting Postage Evidencing System security weaknesses. * PO 00000 * * (b) * * * Frm 00024 * Fmt 4700 * Sfmt 4700 Change of Address for Region 4, State and Local Agencies; Technical Correction Environmental Protection Agency (EPA). ACTION: Final rule; technical amendment. AGENCY: EPA is amending its regulations to reflect a change in address for EPA’s Region 4 office as well as the state agencies for Georgia, SUMMARY: E:\FR\FM\19APR1.SGM 19APR1

Agencies

[Federal Register Volume 77, Number 76 (Thursday, April 19, 2012)]
[Rules and Regulations]
[Page 23396]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2012-9396]


=======================================================================
-----------------------------------------------------------------------

POSTAL SERVICE

39 CFR Part 501


Revisions to the Requirements for Authority To Manufacture and 
Distribute Postage Evidencing Systems

AGENCY: Postal Service TM.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: This rule establishes the responsibility of the providers of 
Postage Evidencing Systems (PES) to notify the U.S. Postal 
Service[supreg] of any cyber attacks to their systems.

DATES: This rule is effective May 21, 2012.

ADDRESSES: Mail or deliver written comments to the Manager, Payment 
Technology, U.S. Postal Service, 475 L'Enfant Plaza SW., Room 3436, 
Washington, DC 20260-0911. Copies of all written comments will be 
available for inspection and photocopying between 9 a.m. and 4 p.m., 
Monday through Friday, at the Payment Technology office.

FOR FURTHER INFORMATION CONTACT: Marlo Kay Ivey, Business Programs 
Specialist, Payment Technology, U.S. Postal Service, at 202-268-7613.

SUPPLEMENTARY INFORMATION: Providers currently must disclose all 
findings or results of any testing concerning the security or revenue 
protection features, capabilities, or failings of any PES, as well as 
all potential security weaknesses or methods of tampering with the PES. 
This rule applies the same standard to cyber attacks against the 
provider's systems.

List of Subjects in 39 CFR Part 501

    Postal Service.

    Accordingly, for the reasons stated, 39 CFR Part 501 is amended as 
follows:

PART 501--AUTHORIZATION TO MANUFACTURE AND DISTRIBUTE POSTAGE 
EVIDENCING SYSTEMS

0
1. The authority citation for 39 CFR Part 501 continues to read as 
follows:

    Authority:  5 U.S.C. 552(a); 39 U.S.C. 101, 401, 403, 404, 410, 
2601, 2605, Inspector General Act of 1978, as amended (Pub. L. 95-
452, as amended); 5 U.S.C. App. 3.


0
2. Section 501.11 is amended by adding paragraph (b)(3) as follows:


Sec.  501.11  Reporting Postage Evidencing System security weaknesses.

* * * * *
    (b) * * *
    (3) Cyber attacks that include, but are not limited to, gaining 
unauthorized access to digital systems for purposes of misappropriating 
assets or sensitive information, corrupting data, or causing 
operational disruption. Cyber attacks may also be carried out in a 
manner that does not require gaining unauthorized access, such as by 
causing denial-of-service attacks on Web sites. Cyber attacks may be 
carried out by third parties or insiders using techniques that range 
from highly sophisticated efforts to electronically circumvent network 
security or overwhelm Web sites to more traditional intelligence 
gathering and social engineering aimed at obtaining information 
necessary to gain access. Cyber security risk disclosures reported must 
adequately describe the nature of the material risks and specify how 
each risk affects the Postage Evidencing System.
* * * * *

Stanley F. Mires,
Attorney, Legal Policy & Legislative Advice.
[FR Doc. 2012-9396 Filed 4-18-12; 8:45 am]
BILLING CODE 7710-12-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.