Revisions to the Requirements for Authority To Manufacture and Distribute Postage Evidencing Systems, 23396 [2012-9396]
Download as PDF
23396
Federal Register / Vol. 77, No. 76 / Thursday, April 19, 2012 / Rules and Regulations
TABLE 1
1. Intrepid Air and Sea Museum Fireworks .............................................
Pier 90 Hudson River Safety Zone
33 CFR 165.160(5.4)
2. Heritage of Pride Fireworks ...............................................................
Pier 54 Hudson River Safety Zone
33 CFR 165.160(5.8)
3. Celebrate the Amboy’s Fireworks ......................................................
Raritan Bay Safety Zone
33 CFR 165.160(2.5)
Under the provisions of 33 CFR
165.160, a vessel may not enter the
regulated area unless given express
permission from the COTP or the
designated representative. Spectator
vessels may transit outside the regulated
area but may not anchor, block, loiter in,
or impede the transit of other vessels.
The Coast Guard may be assisted by
other Federal, State, or local law
enforcement agencies in enforcing this
regulation.
This notice is issued under authority
of 33 CFR 165.160(a) and 5 U.S.C.
552(a). In addition to this notice in the
Federal Register, the Coast Guard will
provide mariners with advanced
notification of enforcement periods via
the Local Notice to Mariners and marine
information broadcasts. If the COTP
determines that the regulated area need
not be enforced for the full duration
stated in this notice, a Broadcast Notice
to Mariners may be used to grant general
permission to enter the regulated area.
Dated: April 4, 2012.
L.L. Fagan,
Rear Admiral, U.S. Coast Guard, Captain of
the Port New York.
[FR Doc. 2012–9363 Filed 4–18–12; 8:45 am]
BILLING CODE 9110–04–P
DATES:
• Launch site: A barge located in approximate position 40°46′11.8″ N,
074°00′14.8″ W (NAD 1983), approximately 375 yards west of Pier
90, Manhattan, NY.
• Date: May 23, 2012.
• Rain Date: May 24, 2012.
• Time: 09:30 p.m.–10:42 p.m.
• Launch site: A barge located in approximate position 40°44′31″ N,
074°01′00″ W (NAD 1983), approximately 380 yards west of Pier 54,
Manhattan, NY.
• Date: June 24, 2012.
• Time: 10:00 p.m.–11:20 p.m.
• Launch site: A barge located in approximate position 40°30′04″ N
074°15′35″ W (NAD 1983), about 240 yards east of Raritan River
Cutoff Channel Buoy 2 (LLNR 36595).
• Date: July 3, 2012.
• Time: 8:45 p.m.–10:05 p.m.
This rule is effective May 21,
2012.
Mail or deliver written
comments to the Manager, Payment
Technology, U.S. Postal Service, 475
L’Enfant Plaza SW., Room 3436,
Washington, DC 20260–0911. Copies of
all written comments will be available
for inspection and photocopying
between 9 a.m. and 4 p.m., Monday
through Friday, at the Payment
Technology office.
FOR FURTHER INFORMATION CONTACT:
Marlo Kay Ivey, Business Programs
Specialist, Payment Technology, U.S.
Postal Service, at 202–268–7613.
SUPPLEMENTARY INFORMATION: Providers
currently must disclose all findings or
results of any testing concerning the
security or revenue protection features,
capabilities, or failings of any PES, as
well as all potential security weaknesses
or methods of tampering with the PES.
This rule applies the same standard to
cyber attacks against the provider’s
systems.
Stanley F. Mires,
Attorney, Legal Policy & Legislative Advice.
List of Subjects in 39 CFR Part 501
[FR Doc. 2012–9396 Filed 4–18–12; 8:45 am]
Postal Service.
Accordingly, for the reasons stated, 39
CFR Part 501 is amended as follows:
BILLING CODE 7710–12–P
ADDRESSES:
PART 501—AUTHORIZATION TO
MANUFACTURE AND DISTRIBUTE
POSTAGE EVIDENCING SYSTEMS
POSTAL SERVICE
39 CFR Part 501
(3) Cyber attacks that include, but are
not limited to, gaining unauthorized
access to digital systems for purposes of
misappropriating assets or sensitive
information, corrupting data, or causing
operational disruption. Cyber attacks
may also be carried out in a manner that
does not require gaining unauthorized
access, such as by causing denial-ofservice attacks on Web sites. Cyber
attacks may be carried out by third
parties or insiders using techniques that
range from highly sophisticated efforts
to electronically circumvent network
security or overwhelm Web sites to
more traditional intelligence gathering
and social engineering aimed at
obtaining information necessary to gain
access. Cyber security risk disclosures
reported must adequately describe the
nature of the material risks and specify
how each risk affects the Postage
Evidencing System.
*
*
*
*
*
1. The authority citation for 39 CFR
Part 501 continues to read as follows:
ENVIRONMENTAL PROTECTION
AGENCY
40 CFR Parts 52, 60 and 61
[FRL 9660–3]
■
srobinson on DSK4SPTVN1PROD with RULES
Revisions to the Requirements for
Authority To Manufacture and
Distribute Postage Evidencing
Systems
Postal Service TM.
ACTION: Final rule.
AGENCY:
This rule establishes the
responsibility of the providers of
Postage Evidencing Systems (PES) to
notify the U.S. Postal Service® of any
cyber attacks to their systems.
16:05 Apr 18, 2012
2. Section 501.11 is amended by
adding paragraph (b)(3) as follows:
■
SUMMARY:
VerDate Mar<15>2010
Authority: 5 U.S.C. 552(a); 39 U.S.C. 101,
401, 403, 404, 410, 2601, 2605, Inspector
General Act of 1978, as amended (Pub. L. 95–
452, as amended); 5 U.S.C. App. 3.
Jkt 226001
§ 501.11 Reporting Postage Evidencing
System security weaknesses.
*
PO 00000
*
*
(b) * * *
Frm 00024
*
Fmt 4700
*
Sfmt 4700
Change of Address for Region 4, State
and Local Agencies; Technical
Correction
Environmental Protection
Agency (EPA).
ACTION: Final rule; technical
amendment.
AGENCY:
EPA is amending its
regulations to reflect a change in
address for EPA’s Region 4 office as well
as the state agencies for Georgia,
SUMMARY:
E:\FR\FM\19APR1.SGM
19APR1
Agencies
[Federal Register Volume 77, Number 76 (Thursday, April 19, 2012)]
[Rules and Regulations]
[Page 23396]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2012-9396]
=======================================================================
-----------------------------------------------------------------------
POSTAL SERVICE
39 CFR Part 501
Revisions to the Requirements for Authority To Manufacture and
Distribute Postage Evidencing Systems
AGENCY: Postal Service TM.
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: This rule establishes the responsibility of the providers of
Postage Evidencing Systems (PES) to notify the U.S. Postal
Service[supreg] of any cyber attacks to their systems.
DATES: This rule is effective May 21, 2012.
ADDRESSES: Mail or deliver written comments to the Manager, Payment
Technology, U.S. Postal Service, 475 L'Enfant Plaza SW., Room 3436,
Washington, DC 20260-0911. Copies of all written comments will be
available for inspection and photocopying between 9 a.m. and 4 p.m.,
Monday through Friday, at the Payment Technology office.
FOR FURTHER INFORMATION CONTACT: Marlo Kay Ivey, Business Programs
Specialist, Payment Technology, U.S. Postal Service, at 202-268-7613.
SUPPLEMENTARY INFORMATION: Providers currently must disclose all
findings or results of any testing concerning the security or revenue
protection features, capabilities, or failings of any PES, as well as
all potential security weaknesses or methods of tampering with the PES.
This rule applies the same standard to cyber attacks against the
provider's systems.
List of Subjects in 39 CFR Part 501
Postal Service.
Accordingly, for the reasons stated, 39 CFR Part 501 is amended as
follows:
PART 501--AUTHORIZATION TO MANUFACTURE AND DISTRIBUTE POSTAGE
EVIDENCING SYSTEMS
0
1. The authority citation for 39 CFR Part 501 continues to read as
follows:
Authority: 5 U.S.C. 552(a); 39 U.S.C. 101, 401, 403, 404, 410,
2601, 2605, Inspector General Act of 1978, as amended (Pub. L. 95-
452, as amended); 5 U.S.C. App. 3.
0
2. Section 501.11 is amended by adding paragraph (b)(3) as follows:
Sec. 501.11 Reporting Postage Evidencing System security weaknesses.
* * * * *
(b) * * *
(3) Cyber attacks that include, but are not limited to, gaining
unauthorized access to digital systems for purposes of misappropriating
assets or sensitive information, corrupting data, or causing
operational disruption. Cyber attacks may also be carried out in a
manner that does not require gaining unauthorized access, such as by
causing denial-of-service attacks on Web sites. Cyber attacks may be
carried out by third parties or insiders using techniques that range
from highly sophisticated efforts to electronically circumvent network
security or overwhelm Web sites to more traditional intelligence
gathering and social engineering aimed at obtaining information
necessary to gain access. Cyber security risk disclosures reported must
adequately describe the nature of the material risks and specify how
each risk affects the Postage Evidencing System.
* * * * *
Stanley F. Mires,
Attorney, Legal Policy & Legislative Advice.
[FR Doc. 2012-9396 Filed 4-18-12; 8:45 am]
BILLING CODE 7710-12-P