Transportation Worker Identification Credential (TWIC)-Reader Requirements, 57651-57713 [2016-19383]

Download as PDF Vol. 81 Tuesday, No. 163 August 23, 2016 Part II Department of Homeland Security sradovich on DSK3GMQ082PROD with RULES2 Coast Guard 33 CFR Parts 101, 103, 104, et al. Transportation Worker Identification Credential (TWIC)—Reader Requirements; Final Rule VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 PO 00000 Frm 00001 Fmt 4717 Sfmt 4717 E:\FR\FM\23AUR2.SGM 23AUR2 57652 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations For information about this document, call or email LCDR Kevin McDonald, Coast Guard; telephone 202–372–1168, email Kevin.J.Mcdonald2@uscg.mil. SUPPLEMENTARY INFORMATION: FOR FURTHER INFORMATION CONTACT: DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Parts 101, 103, 104, 105 and 106 Table of Contents for Preamble [Docket No. USCG–2007–28915] RIN 1625–AB21 Transportation Worker Identification Credential (TWIC)—Reader Requirements Coast Guard, DHS. Final rule. AGENCY: ACTION: The Coast Guard is issuing a final rule to require owners and operators of certain vessels and facilities regulated by the Coast Guard to conduct electronic inspections of Transportation Worker Identification Credentials (TWICs) as an access control measure. This final rule also implements recordkeeping requirements and security plan amendments that would incorporate these TWIC requirements. The TWIC program, including the electronic inspection requirements in this final rule, is an important component of the Coast Guard’s multilayered system of access control requirements designed to enhance maritime security. This rulemaking action builds upon existing regulations designed to ensure that only individuals who hold a valid TWIC are granted unescorted access to secure areas of Coast Guard-regulated vessels and facilities. The Coast Guard and the Transportation Security Administration have already promulgated regulations pursuant to the Maritime Transportation Security Act that require mariners and other individuals to hold a TWIC prior to gaining unescorted access to a secure area. By requiring certain high-risk vessels and facilities to perform electronic TWIC inspections, this rule enhances security at those locations. This rule also implements the Security and Accountability For Every Port Act of 2006 electronic reader requirements. DATES: This final rule is effective August 23, 2018. ADDRESSES: Comments and materials received from the public, as well as documents mentioned in this preamble as being available in the docket, are part of docket USCG–2007–28915 and are available using the Federal eRulemaking Portal. You can find this docket on the Internet by going to https:// www.regulations.gov, entering ‘‘USCG– 2007–28915’’ and then clicking ‘‘Search.’’ sradovich on DSK3GMQ082PROD with RULES2 SUMMARY: VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 I. Abbreviations II. Regulatory History and Information III. Executive Summary A. Basis and Purpose B. Summary of Costs and Benefits IV. Background V. Discussion of Comments and Changes to the Final Rule A. General Matters Relating to TWIC 1. Purpose and Efficacy of the TWIC Program 2. Risk Analysis Methodology B. Electronic TWIC Inspection 1. Electronic TWIC Inspection Does Not Necessarily Require a TWIC Reader 2. Integrating Electronic TWIC Inspection Into a PACS a. List of Acceptable TWIC Readers b. PIN Pads and Biometric Input Methods 3. Comments Related to Troubleshooting TWIC a. Lost, Stolen, or Damaged TWIC i. Vessels and Facilities Using a PACS ii. Vessels and Facilities Using TWIC Readers b. Transportation Worker Forgets to Bring TWIC to Work Site c. Inaccessible Biometrics d. Malfunctioning Access Control Systems e. Requirements for Varying MARSEC Levels 4. Recordkeeping Requirements C. When to Conduct Electronic TWIC Inspection 1. Secure, Restricted, Public Access, Passenger Access, and Employee Access Areas a. ‘‘Prior to Each Entry’’ for Risk Group A Facilities b. Recurring Unescorted Access 2. Risk Group A Vessels 3. Risk Groups B and C 4. Miscellaneous Questions Regarding the Locations of Electronic TWIC Inspection D. Determination of Risk Groups 1. Risk Group A Facilities a. Alternative Security Programs b. Determining Risk Group A Facilities 2. The Crewmember Exemption Does Not Apply to Facilities 3. The Low Number of Crewmembers Exemption 4. Calculating the Total Number of TWICholding Crewmembers 5. Threshold for the Crewmember Exemption of Vessels 6. Outer Continental Shelf Facilities 7. Vessels and Facilities Not in Risk Group A 8. Barge Fleeting Facilities 9. Switching Risk Groups E. Responses to Economic Comments 1. Costs of TWIC Readers 2. Number of TWIC Readers at Vessels and Facilities 3. Transaction Times 4. Security Personnel PO 00000 Frm 00002 Fmt 4701 Sfmt 4700 5. Other Cost Comments 6. Costs Exceeding Benefits, Costeffectiveness, and Risk Reduction 7. Cumulative Costs of Security-related Rulemakings 8. Small Business Impact F. Other Issues 1. The GAO Report and the TWIC Pilot Program 2. Additional Comments a. General Comments on the TWIC Program b. Clarification of Specific Items c. Comments Outside the Scope of this Rulemaking VI. Regulatory Analyses A. Regulatory Planning and Review B. Small Entities C. Assistance for Small Entities D. Collection of Information E. Federalism F. Unfunded Mandates Reform Act G. Taking of Private Property H. Civil Justice Reform I. Protection of Children J. Indian Tribal Governments K. Energy Effects L. Technical Standards M. Environment I. Abbreviations AHP—Analytical Hierarchy Process ANPRM—Advanced Notice of Proposed Rulemaking ASP—Alternative Security Program CCA—Certificate for Card Authentication CCL—Canceled Card List CCTV—Closed-Circuit Television CDC—Certain Dangerous Cargoes CFR—Code of Federal Regulations CHUID—Card Holder Unique Identifier COI—Certificate of Inspection DHS—Department of Homeland Security DRAA—Designated Recurring Access Area E.O.—Executive Order FASC—N Federal Agency Smart Credential— Number FR—Federal Register FSP—Facility Security Plan ICE—Initial Capability Evaluation MARSEC—Maritime Security MISLE—Marine Information for Safety and Law Enforcement MSRAM—Maritime Security Risk Analysis Model MTSA—Maritime Transportation Security Act of 2002 NIST—National Institute of Standards and Technology NPRM—Notice of Proposed Rulemaking NTTAA—National Technology Transfer and Advancement Act NVIC—Navigation and Vessel Inspection Circular OCS—Outer Continental Shelf OMB—Office of Management and Budget PAC—Policy Advisory Council PACS—Physical Access Control System PVA—Passenger Vessel Association PII—Personal Identifying Information PIN—Personal Identification Number Pub. L.—Public Law QTL—Qualified Technology List RA—Regulatory Analysis RUA—Recurring Unescorted Access SAFE—Port Act Security and Accountability For Every Port Act of 2006 E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations SBA—Small Business Administration SSI—Sensitive Security Information TSA—Transportation Security Administration TSAC—Towing Safety Advisory Committee TSI—Transportation Security Incident TWIC—Transportation Worker Identification Credential U.S.C.—United States Code VSP—Vessel Security Plan II. Regulatory History and Information On May 22, 2006, the Coast Guard and the Transportation Security Administration (TSA) jointly published a Notice of Proposed Rulemaking (NPRM) entitled ‘‘Transportation Worker Identification Credential (TWIC) Implementation in the Maritime Sector; Hazardous Materials Endorsement for a Commercial Driver’s License.’’ 1 On January 25, 2007, the Coast Guard and TSA published the final rule, also entitled ‘‘Transportation Worker Identification Credential (TWIC) Implementation in the Maritime Sector; Hazardous Materials Endorsement for a Commercial Driver’s License.’’ 2 Although the May 22, 2006 NPRM proposed certain TWIC reader requirements, after reviewing the public comments, the Coast Guard decided to remove the proposed TWIC reader requirements from the January 25, 2007 final rule, address them in a separate rulemaking, and conducted a pilot program to address the feasibility of reader requirements before issuing a final rule.3 For a detailed discussion of those public comments and Coast Guard responses, please refer to the January 25, 2007 final rule.4 On March 27, 2009, the Coast Guard published an Advanced Notice of Proposed Rulemaking (ANPRM) for this rulemaking.5 On March 22, 2013, the Coast Guard published the NPRM for this rulemaking.6 Additionally, we held four public meetings across the country in 2013. III. Executive Summary A. Basis and Purpose In accordance with the Maritime Transportation Security Act of 2002 (MTSA) and the Security and Accountability For Every Port Act of 2006 (SAFE Port Act), the Coast Guard is establishing rules requiring electronic readers for use at high-risk vessels and sradovich on DSK3GMQ082PROD with RULES2 1 71 FR 29396. FR 3492. 3 The TWIC Reader Pilot was established pursuant to Section 104 of the Security and Accountability For Every Port Act of 2006 (SAFE Port Act) (P.L. 109–347), which was codified at 46 U.S.C. 70105 (k)(4). 4 72 FR 3511. 5 74 FR 13360. 6 78 FR 17782. 2 72 VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 at facilities. These rules will ensure that prior to being granted unescorted access to a designated secure area, an individual will have his or her TWIC authenticated, the status of that credential validated against an up-todate list maintained by the TSA, and the individual’s identity confirmed by comparing his or her biometric (i.e. fingerprint) with a biometric template stored on the credential. By promulgating these rules, the Coast Guard is complying with the statutory requirement in the SAFE Port Act, improving security at the highest risk maritime transportation-related vessels and facilities, and making full use of the electronic and biometric security features integrated into the TWIC and mandated by Congress in MTSA. The TWIC is currently being used as a visual identity badge on many vessels and facilities. Essentially, DHS requires that a security guard examines the security features (hologram and watermark) embedded on the surface of the credential, checks the expiration date listed on the card, and compares the photograph to the person presenting the credential. While this system of ‘‘visual TWIC inspection’’ provides some benefits, it does not address all security concerns, nor does it make full use of the security features contained in the TWIC. For example, if a TWIC is stolen or lost, an unauthorized individual could make use of the credential, and provided that individual resembles the picture on the TWIC, could gain access to a secure area. Additionally, if a TWIC is revoked because the individual has committed a disqualifying offense, such as the theft of explosives, there is no way for security officers on a vessel or at a facility to determine that fact from the face of the TWIC. Finally, a sophisticated adversary could forge a realistic replica of a credential. It is also worth noting that since a TWIC-holder is required to renew his or her credential every 5 years, the TWICholder’s resemblance to the picture on the TWIC may decrease over time, rendering visual inspection a somewhat less accurate means to confirm identity. Through the process of ‘‘electronic TWIC inspection,’’ by which TWICs are authenticated, validated, and the individual’s identity confirmed biometrically, all of these scenarios would be thwarted or mitigated. In this rulemaking process, the Coast Guard published an ANPRM, published an NPRM, hosted a series of public meetings around the country to solicit public input, and worked with the Transportation Security Administration to conduct a pilot program. As a result PO 00000 Frm 00003 Fmt 4701 Sfmt 4700 57653 of this input, the Coast Guard made a number of changes and clarifications in this final rule that we believe provide a robust system that improves security, addresses industry, labor, and Congressional concerns, and clarifies numerous issues relating to the operational nature of the electronic TWIC inspection program. Primarily, this rule allows for an even more flexible implementation of the electronic TWIC inspection requirements than the proposed rule that will allow new systems to be integrated into existing security and access control systems. We believe that this flexibility will provide robust security without causing unnecessary costs or significantly disrupting business operations. A brief summary of the main changes from the proposed rule to the final rule follows. • This final rule provides additional flexibility with regard to the purchase, installation, and use of electronic readers. Instead of requiring the use of a TWIC reader on the TSA’s Qualified Technology List (QTL), owners and operators can choose to fully integrate electronic TWIC inspection and biometric matching into a new or existing Physical Access Control System (PACS). • We clarify that this final rule only affects Risk Group A vessels and facilities, and that no changes to the existing business practices of other MTSA-regulated vessels and facilities are required. • This final rule eliminates the distinction between Risk Groups B and C for both vessels and facilities. If and when a requirement for electronic TWIC inspection may be considered for MTSA-regulated vessels and facilities not currently in Risk Group A, we will provide an updated analysis of the costs and benefits of such an action and define new Risk Groups accordingly. • This final rule clarifies that for Risk Group A facilities, electronic TWIC inspection is required each time a person is granted unescorted access to a secure area (a limited exception is permitted for Recurring Unescorted Access, or RUA). For Risk Group A vessels, electronic TWIC inspection is only required when boarding the vessel, even if only parts of the vessel are considered secure areas. • This final rule eliminates the special requirement that barge fleeting facilities that handle or receive barges carrying Certain Dangerous Cargoes (CDC) in bulk be classified as Risk Group A. Barge fleeting facilities are instead classified the same as all other facilities. This change will effectively eliminate most isolated barge facilities E:\FR\FM\23AUR2.SGM 23AUR2 57654 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations from the electronic TWIC inspection requirements due to a lack of a secure area. • This final rule increases the exemption from electronic TWIC inspection requirements to vessels with 20 or fewer TWIC-holding crewmembers and defines that number as the minimum manning requirement specified on a vessel’s Certificate of Inspection. • This final rule provides additional flexibility for ferries and other vessels that use dedicated terminals in Risk Group A to integrate their electronic TWIC inspection programs with their terminals’ programs. B. Summary of Costs and Benefits Of the approximately 13,825 vessels, 3,270 facilities, and 56 Outer Continental Shelf (OCS) facilities regulated by MTSA, this final rule impacts only certain ‘‘Risk Group A’’ vessels and facilities, which currently number 1 vessel 7 and 525 facilities under the revised applicability definitions for the final rule. No OCS facilities are affected by this final rule. We estimate the annualized cost of this final rule to be approximately $22.5 million, while the 10-year cost is $157.9 million, discounted at 7 percent. The main cost drivers of this rule are the acquisition, installation, and integration of TWIC readers into access control systems. Annual costs will be driven by costs associated with updates of the list of cancelled TWICs, recordkeeping, training, system maintenance, and opportunity costs associated with failed TWIC reader transactions. The estimated annualized cost of this final rule discounted at 7 percent is approximately $5.1 million less than the estimated cost of the NPRM. The benefits of this final rule include the enhancement of the security of vessels, ports, and other facilities by ensuring that only individuals who hold TWICs are granted unescorted access to secure areas at those locations. The main benefit of this regulation, decreased risk of a Transportation Security Incident (TSI), cannot be quantified given current data limitations. We used a risk-based approach to apply these regulatory requirements to less than 5 percent of the MTSA-regulated population, which represents approximately 80 percent of the potential consequences of a TSI. The provisions in this final rule target the highest risk entities while maximizing the net benefits of the rule. Table 1 provides the estimated costs and functional benefits associated with the requirements of the TWIC reader. TABLE 1—ESTIMATED COSTS AND FUNCTIONAL BENEFITS OF TWIC READER REQUIREMENTS Category Final Rule Applicability ............................................................................................... High-risk MTSA-regulated facilities and high risk MTSA-regulated vessels with greater than 20 TWIC-holding crewmembers. 1 vessel. 525 facilities. $22.5 (annualized). $157.9 (10-year). Time to retrieve or replace lost PINs for use with TWICs. Enhanced access control and security at U.S. maritime facilities and on board U.S.-flagged vessels. Reduction of human error when checking identification and manning access points. Affected Population .................................................................................. Costs ($ millions, 7% discount rate) ........................................................ Costs (Qualitative) .................................................................................... Benefits (Qualitative) ................................................................................ IV. Background The MTSA provides a multi-layered approach to maritime security which includes measures to consider broader security issues at U.S. ports and waterways, the coastal zone, the open ocean, and foreign ports. Under this multi-layered system, the Coast Guard is authorized to regulate vessels and facilities, and owners and operators of MTSA-regulated vessels or facilities are required to submit for Coast Guard approval a comprehensive security plan detailing the access control and other security policies and procedures implemented on each vessel and facility. Security plans must identify and mitigate vulnerabilities by detailing the following items: (1) Security organization of the vessel or facility; (2) personnel training; (3) drills and exercises; (4) records and documentation; (5) response to changes in Maritime Security (MARSEC) Level; (6) procedures for interfacing with other facilities and/or vessels; (7) Declarations of Security; (8) communications; (9) security systems and equipment maintenance; (10) security measures for access control; (11) security measures for restricted areas; (12) security measures for handling cargo; (13) security measures regarding vessel stores and bunkers; (14) security measures for monitoring; (15) security incident procedures; (16) audits and security plan amendments; (17) Security Assessment Reports and other security reports; and (18) TWIC procedures.8 7 We note that the number of vessels affected by the provision is low, as most ‘‘Risk Group A’’ vessels are exempt from the electronic TWIC inspection requirements due to a low crewmember count. 8 See 33 CFR 104.405 and 33 CFR 105.405. sradovich on DSK3GMQ082PROD with RULES2 For a more detailed discussion of costs and benefits, see the full Final Regulatory Analysis and Final Regulatory Flexibility Analysis available in the online docket for this rulemaking. Appendix G of that document outlines the costs by provision and also discusses the complementary nature of the provisions. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 PO 00000 Frm 00004 Fmt 4701 Sfmt 4700 For the purposes of MTSA, the term ‘‘facility’’ means ‘‘any structure or facility of any kind located in, on, under, or adjacent to any waters subject to the jurisdiction of the United States.’’ 9 For the purposes of MTSA, the term ‘‘vessel’’ includes ‘‘every description of watercraft or other artificial contrivance used, or capable of being used, as a means of transportation on water.’’ 10 Coast Guard regulations implementing MTSA with respect to vessels 11 apply to: Mobile Offshore Drilling Units, cargo vessels, or passenger vessels subject to the International Convention for Safety of Life at Sea, 1974 (SOLAS), chapter XI– 1 or Chapter XI–2; foreign cargo vessels greater than 100 gross register tons; generally, self-propelled U.S. cargo vessels greater than 100 gross tons; offshore supply vessels; vessels subject to the Coast Guard’s regulations regarding passenger vessels; passenger 9 46 U.S.C. 70101(2). U.S.C. 115; 1 U.S.C. 3. 11 See 33 CFR 104.105(a). 10 46 E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations vessels certificated to carry more than 150 passengers; passenger vessels carrying more than 12 passengers engaged on an international voyage; barges carrying, in bulk, cargoes regulated under the Coast Guard’s regulations regarding tank vessels or CDC; 12 barges carrying CDC or cargo and miscellaneous vessels engaged on an international voyage; tank ships; and generally, towing vessels greater than 8 meters in register length engaged in towing barges. TWIC requirements in those regulations do not apply to: Foreign vessels; mariners employed aboard vessels moored at U.S. facilities only when they are working immediately adjacent to their vessels in the conduct of vessel activities; except pursuant to international treaty, convention, or agreement to which the U.S. is a party, to any foreign vessel that is not destined for, or departing from, a port or place subject to the jurisdiction of the U.S. and that is either (a) in innocent passage through the territorial sea of the U.S., or (b) in transit through the navigable waters of the U.S. that form a part of an international strait.13 Coast Guard regulations implementing MTSA with respect to facilities 14 apply to: waterfront facilities handling dangerous cargoes (as generally defined in 49 CFR parts 170 through 179); waterfront facilities handling liquefied natural gas and liquefied hazardous gas; facilities transferring oil or hazardous materials in bulk; facilities that receive vessels certificated to carry more than 150 passengers; facilities that receive vessels subject to SOLAS, Chapter XI; facilities that receive foreign cargo vessels greater than 100 gross register tons; generally, facilities that receive U.S. cargo and miscellaneous vessels greater than 100 gross register tons; barge fleeting facilities that receive barges carrying, in bulk, cargoes regulated under the Coast Guard’s regulations regarding tank vessels or CDC; and fixed or floating facilities operating on the OCS for the purposes of engaging in the exploration, development, or production of oil, natural gas, or mineral resources. Those regulations do not apply to: A facility owned or operated by the U.S. that is used primarily for military purposes; an oil and natural gas production, exploration, or development facility regulated by 33 CFR parts 126 or 154 if (a) the facility 12 The term ‘‘Certain Dangerous Cargoes’’ is defined in 33 CFR 101.105 by reference to 33 CFR 160.204, which lists all of the covered substances. 13 See 33 CFR 104.105(d)–(f). 14 See 33 CFR 105.105 and 106.105. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 is engaged solely in the exploration, development, or production of oil and natural gas, and (b) the facility does not meet or exceed the operating conditions in 33 CFR 106.105; a facility that supports the production, exploration, or development of oil and natural gas regulated by 33 CFR parts 126 or 154 if (a) the facility is engaged solely in the support of exploration, development, or production of oil and natural gas and transports or stores quantities of hazardous materials that do not meet or exceed those specified in 49 CFR 172.800(b)(1) through (b)(6), or (b) the facility stores less than 42,000 gallons of cargo regulated by 33 CFR part 154; a mobile facility regulated by 33 CFR part 154; or an isolated facility that receives materials regulated by 33 CFR parts 126 or 154 by vessel due to the lack of road access to the facility and does not distribute the material through secondary marine transfers.15 Additionally, the TWIC requirements in those regulations do not apply to mariners employed aboard vessels moored at U.S. facilities only when they are working immediately adjacent to their vessels in the conduct of vessel activities.16 This rulemaking applies to the abovedescribed vessels and facilities regulated by the Coast Guard pursuant to the authority granted in MTSA, and will further increase the security value of TWIC to the nation by making use of the statutorily-mandated biometric identification function and other security features. A complete statutory and regulatory history of this rulemaking can be found in Section III.B of the NPRM published on March 22, 2013.17 The TWIC program falls under the access control requirements as one component of MTSA. Since April 15, 2009, the TWIC has been used throughout the maritime sector for access to secure areas of MTSAregulated facilities and vessels. Its purpose is to ensure a vetted maritime workforce by establishing securityrelated eligibility criteria, and by requiring each TWIC-holder to undergo a security threat assessment from the TSA as part of the process of applying for and obtaining a TWIC. In addition to its visible security features, the TWIC stores two electronically readable reference biometric templates (i.e., fingerprint templates), a PIN, a digital facial image, authentication certificates, and a Federal Agency Smart Credential15 See 33 CFR 105.105(c). 33 CFR 105.105(d) and 106.105(b). 17 78 FR 17789. 16 See PO 00000 Frm 00005 Fmt 4701 Sfmt 4700 57655 Number (FASC–N). These features enable the TWIC to be used in different ways for (1) card authentication, (2) card validation, and (3) identity verification. Card authentication ensures that the TWIC is not counterfeit. Security personnel can authenticate a TWIC by visually inspecting the security features on the card. An electronic reader provides enhanced authentication by performing a challenge/response protocol using the Certificate for Card Authentication (CCA) and the associated card authentication private key stored in the TWIC. The electronic reader will read the CCA from the TWIC and send a command to the TWIC requesting the card authentication private key be used to sign a random block of data (created and known to the electronic reader). The electronic reader software will use the public key embedded in the CCA to verify that the signature of the random data block returned by the TWIC is valid. If the signature is valid, the electronic reader will trust the TWIC submitted and will then pull the FASC–N and other information from the card for further processing. The CCA contains the FASC–N and a certificate expiration date harmonized to the TWIC expiration date. This minimizes the need for the electronic reader to pull more information from the TWIC (unless required for additional checking). The card validity check ensures that the TWIC has not expired or been cancelled by TSA, or reported as lost, stolen, or damaged. Security personnel can validate whether a TWIC has expired by visually checking the TWIC’s expiration date. Currently, a TSAcanceled TWIC is placed on TSA’s official CCL, which is updated daily. TSA’s CCL is available online at: https://universalenroll.dhs.gov/. Currently, the process of TWIC visual inspection does not require the security guard to compare the cardholder’s name to the CCL and therefore facilities do not know when specific card holders have had their credentials cancelled and may continue to grant access unknowingly. Using an electronic reader, card validity is further confirmed by finding no match on the CCL and electronically checking the expiration date on the TWIC. Checks against the CCL may be performed electronically by downloading the list onto a TWIC reader or integrated PACS. Identity verification entails comparing the individual presenting the TWIC to the same person to whom the TWIC was issued. Identity can be verified by visually comparing the photo on the TWIC to the TWIC-holder. Using an electronic reader, identity can be E:\FR\FM\23AUR2.SGM 23AUR2 57656 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 verified by matching one of the biometric templates stored in the TWIC to the TWIC-holder’s live sample biometric, matching to the PACS enrolled reference biometrics linked to the FASC–N of the TWIC, or requiring the TWIC-holder to place the TWIC into a TWIC reader (currently a PIN can only be accessed using a TWIC reader with a contact interface) and entering their PIN to release the digital facial image from the TWIC. This avoids the vulnerabilities of visual inspection by using the biometric capabilities mandated by Congress. V. Discussion of Comments and Changes to the Final Rule In response to publication of the March 22, 2013 NPRM, the Coast Guard received over 100 comment letters, consisting of over 1,200 unique comments. Commenters provided numerous opinions, arguments, questions, and recommendations regarding the proposed TWIC reader requirements. In this section, we describe the comments received, as well as how they influenced the decisions made in this final rule. Overall, we have grouped our discussion into five sections, as discussed below. In Section A, we address comments relating to the TWIC program generally, and electronic TWIC inspection specifically. This section includes comments relating to what the program’s purpose is, how it affects security, and how it is tailored to achieve these goals in the most costeffective and least-burdensome manner. We also discuss the risk analysis methodology in this section, in order to address comments relating to the specific types of threats the electronic TWIC inspection program is designed to combat. Sections B through D of this discussion respond to comments relating to the operational aspects of the electronic TWIC inspection program. Most comments received were of a practical nature, especially those asking for clarifications on exactly how the regulations would apply in a large variety of specific situations. Section B addresses the specific nature of what an ‘‘electronic TWIC inspection’’ is, including what must be carried out, how such an inspection can be carried out using a PACS, recordkeeping requirements arising from electronic TWIC inspections, and how specific problems, such as a misplaced TWIC, would be addressed in the regulations. Section C addresses when an electronic TWIC inspection must take place, including the specific locations on a facility or vessel where electronic VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 readers must be located, and the parameters of an RUA configuration. Section D responds to comments relating to the classification of vessels and facilities into Risk Groups, including questions relating to barge fleeting facilities, shifting Risk Groups, and the exemption from electronic TWIC inspection requirements for vessels with a low number of crewmembers. Items relating to the economic issues of electronic TWIC inspection are addressed in Section E. Comments on these issues related to the costs of TWIC readers, throughput times for TWIC transactions, and potential changes in security staffing needs. Finally, Section F addresses several miscellaneous issues. Primary among these issues are comments relating to the TWIC Pilot Program and the Government Accountability Office (GAO) report on TWIC readers, issued in 2013 shortly before publication of the NPRM and accompanying analysis.18 Additionally, this section addresses all other comments and questions that were not included in other sections. A. General Matters Relating to TWIC In response to the NPRM, the Coast Guard received a large variety of comments relating to the TWIC program. In this section, we begin with those comments that address the TWIC program as a whole. Multiple commenters expressed dissatisfaction with the TWIC program as a whole and suggested that it be dismantled. Many of these commenters noted that specific facilities or vessels had not been targeted by terrorists, and argued that the costs of the program were unnecessary. For a variety of reasons described extensively throughout this document, we believe that the targeted measures established in this final rule provide a cost-effective mitigation of various threats that could result in a TSI. For example, in the Regulatory Analysis (RA), we describe three hypothetical yet plausible scenarios in which an individual could gain access to a vessel or facility using a forged or stolen TWIC,19 threats that could specifically be reduced by electronic TWIC inspection. Congress has mandated, and we agree, that preventing unauthorized individuals from accessing secure areas of the nation’s transportation infrastructure is part of a necessary security program. While we also agree with many commenters who 18 ‘‘Transportation Worker Identification Credential: Card Reader Pilot Results Are Unreliable; Security Benefits Need to Be Reassessed’’ (GAO–13–198). 19 RA, p. 88. PO 00000 Frm 00006 Fmt 4701 Sfmt 4700 suggested that it does not prevent every possible security threat, that is not the purpose of this final rule. The purpose of this final rule is to improve security at the highest risk maritime transportation-related vessels and facilities through the use of an electronic reader. One commenter criticized the Maritime Security Risk Analysis Model (MSRAM) threat analysis methodology, because it did not address the security issues raised by cargo containers, which include the potential for concealed threats within the containers. While we note that MSRAM does include scenarios associated with threats from cargo containers, for the purposes of the current analysis of electronic TWIC inspection, we limited our consideration to attack scenarios that require physical proximity to the intended target and for which access control would affect the ability to conduct an attack. Controlling access to a target is an essential component of security from such attacks because access control helps to detect and perhaps interdict or at least delay the attackers before they reach the target. TWIC readers enhance the reliability of access control measures, thereby increasing the likelihood of identifying and denying/delaying access to an individual or group attempting nefarious acts. For this reason, our analysis in this final rule focuses on threats that could be prevented or mitigated through use of electronic TWIC inspection. Concealed items or persons smuggled inside cargo containers are not attack scenarios that transportation worker identity verification (and electronic TWIC inspection in particular) addresses. Therefore, analyzing those scenarios would not be useful for this rule. Coast Guard regulations address security measures for those attack scenarios in other ways. Vessel and facility security plans must describe in detail how they meet all relevant security requirements, including the security measures in place for handling cargo.20 Multiple commenters expressed concern over the application process for obtaining a new or renewal TWIC, stating that delays have saddled workers with an undue burden. The Coast Guard understands the challenges encountered during the initial implementation of TWIC, and during the more recent surge of renewals. We note the progress that has been made in the TWIC application process since publication of the NPRM. 20 See 33 CFR 104.405; 33 CFR 105.405; 33 CFR part 104, subpart B; and 33 CFR part 105, subpart B. E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations Furthermore, we note that comments relating to the card application process are outside the scope of this rulemaking, which pertains to electronic TWIC inspection requirements only. One commenter sought clarification as to why the TWIC was not an acceptable form of identification for entry to U.S. Navy or Coast Guard bases, and stated that the TWIC should be recognized by the agency that is requiring its use within the maritime sector. This comment is also outside the scope of this rulemaking as it does not address TWIC readers or their application to maritime rather than Federal facilities (e.g., Coast Guard or Navy military bases). One commenter expressed concern with requiring electronic readers on vessels, stating that anyone boarding a vessel would need to first pass through a facility. The same commenter stated that seafarers should not be prevented from taking shore leave, and suggested that additional regulations be put in place to avoid unlawful charges to seafarers to transit facilities for shore leave. The Coast Guard understands these concerns and has applied this rulemaking to those vessels presenting the highest risk and to those vessels which, in most cases, will regularly visit international ports not regulated under MTSA. Additionally, Congress mandated seafarers’ access in section 811 of the Coast Guard Authorization Act of 2010. This mandate requires each Facility Security Plan to ‘‘provide a system for seamen assigned to a vessel at that facility, pilots, and representatives of seamen’s welfare and labor organizations to board and depart the vessel through the facility in a timely manner at no cost to the individual.’’ 21 The Coast Guard is currently conducting a separate rulemaking to implement section 811.22 Several commenters requested more flexibility within this final rule rather than a ‘‘one size fits all’’ approach. This final rule incorporates additional flexibility for vessel and facility operators in direct response to comments in which specific requests for flexibility were made. The Coast Guard wholly agrees that there is no ‘‘one size fits all’’ approach for maritime security given the vast range of facility and vessel operations which, in many cases, overlap or occur in close proximity to each other. This final rule moves to a 21 See the Seafarers’ Access to Maritime Facilities Notice of Proposed Rulemaking (79 FR 77981, 77985 (Dec. 29, 2014)). 22 The docket for the Seafarers’ Access rulemaking is available online at www.regulations.gov by entering ‘‘USCG–2013– 1087’’ in the Search box. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 more performance-based approach by defining the criteria for electronic inspection requirements that meet the TWIC access control measures. Additionally, this rule sets flexible baseline requirements for electronic reader implementation for those vessels and facilities. We believe that the increased flexibility will decrease the burden on industry by allowing the use of existing systems with minor modifications, increasing the pool of available electronic reader technology, and allowing the individual operators to determine the approach to meet the regulatory requirement that best facilitates their business needs. Some commenters suggested that the TWIC should be a standardized credential that can be used at multiple facilities, and that having this Federal credential should be a standard credential, rather than requiring truck drivers and others who need access to secure areas to obtain individual sitespecific badges. The commenters argued that the use of the credential could alleviate redundant and overlapping background checks for workers, such as drivers, that access multiple facilities. We partially agree with this argument, but believe we should elaborate more closely on the role that TWIC and other identification credentials play in ensuring security at maritime facilities. We disagree with the suggestion that the TWIC should be used as an ‘‘all-access’’ credential that would override the property rights and security responsibilities of vessel and facility owners. We believe (like many other commenters), that possession of TWIC should not automatically grant an individual access to secure areas because the mere possession of a TWIC does not entitle the holder to access another person’s property. The decision to grant access to a secure area of a vessel or facility appropriately lies with the owner or operator of that vessel or facility. We expect vessel and facility operators to limit access to their secure spaces to those who need such access, and to ensure that only those with a valid TWIC are granted unescorted access. However, we note that controlling access to facilities can be carried out in several ways. For example, a facility may grant unescorted access to employees who enter the facility multiple times per day on a regular basis, and also grant access to truck or bus drivers who may only enter the facility on an occasional basis. Such a facility may use different ways to control access, and ensure that all individuals granted unescorted access possess a valid TWIC. The facility may PO 00000 Frm 00007 Fmt 4701 Sfmt 4700 57657 vary how it does this depending on the operator’s business needs and on the reasons why different individuals are requesting unescorted access. In this example, the facility might have one entrance for employees who use a PACS card to enter secure areas of the facility, and have another entrance for truck or bus drivers, who would present a TWIC for inspection. A single access point could also contain both a PACS reader and a TWIC reader, the latter for use by contractors or visitors who may not have been issued a facility-specific access card. In this final rule we have granted flexibility that allows operators to use a variety of means to grant unescorted access, including the use of the TWIC as a means of identification. However, this final rule does not require operators to grant unescorted access to any TWICholder. As is currently the case, access to any vessel or facility is granted by the owner or operator, who has the authority and responsibility to determine if the individual requesting access has a legitimate business purpose. 1. Purpose and Efficacy of the TWIC Program Several commenters questioned the overall efficacy of the TWIC program, questioning whether the program, with or without electronic readers, does anything to improve security. The Coast Guard understands that there have been many challenges with the implementation of the TWIC program, but does believe that TWIC has improved access control at vessels and at maritime facilities across the country. The TWIC program’s single standard and nationwide recognition is intended to ensure a secure, consistent biometrically enabled credential, and facilitate an efficient, resilient, mobile transportation workforce during routine and emergency situations. However, an individual successfully obtaining a TWIC is only the first half of a two-part process. First, vessel and facility security personnel must determine that an individual possesses a valid TWIC, meaning that they have been vetted. Second, they must verify the individual’s authorization for entering a vessel or facility before granting the person unescorted access. As mentioned above, the mere possession of a valid TWIC alone is not sufficient to gain the holder of that credential access to secure areas on vessels or facilities across the country. The TWIC provides a means by which a vessel or facility security officer can determine that an individual has been vetted to an established and accepted standard. This determination E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 57658 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations helps inform the vessel or facility security officer’s decision to grant unescorted access to an individual. Vessel and facility personnel may then evaluate a TWIC-holder’s authorization and determine whether the TWICholder should be granted unescorted access. One commenter took issue with a statement in the NPRM that read ‘‘TWIC readers will not help identify valid cards that were obtained via fraudulent means, e.g., through unreported theft or the use of fraudulent IDs.’’ 23 The commenter stated that TWIC readers can identify cards that were obtained through unreported theft of the TWIC card by performing biometric identification of the TWIC-holder. We believe the commenter misunderstood the statement in the NPRM, which referred to the use of fake or stolen (but unreported) identification documents, such as drivers licences and birth certificates, to fraudulently obtain an authentic TWIC from the TSA. The use of such fraudulently acquired, but genuine TWICs was one issue highlighted by the GAO and by several commenters as a shortcoming in the TWIC program, and we acknowledge that the use of electronic TWIC inspection will not address that particular scenario. However, we agree with the commenter that if a valid TWIC was stolen after it was produced, electronic TWIC inspection would help to identify such a card if an unauthorized person attempted to use it. Although visual TWIC inspection could also detect such unauthorized use, electronic TWIC inspection would do so more effectively by using the TWIC’s biometric and other security features. Some commenters argued that visual TWIC inspection does not provide ‘‘adequate security,’’ and that electronic TWIC inspection should be the standard procedure for all TWIC inspections, rather than used only for high-risk vessels and facilities. The commenter made several arguments as to why visual TWIC inspection should not be used. The commenter quoted guidance from the National Institute of Standards and Technology (NIST), issued with regard to identification for Federal employees when entering Federal facilities, which stated that visual inspection of an identification card offers little to no assurance that the claimed identity of the individual matches the identification. The commenter stated that visual inspection is a weak authentication mechanism and does not provide the level of assurance that an electronic inspection 23 78 FR 17787. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 can provide. Another commenter cited the 2011 GAO report on the TWIC program, which stated that visual TWIC inspection was not a particularly effective means of identity verification.24 While we agree that electronic TWIC inspection provides a more reliable means of identity verification than visual TWIC inspection, we disagree with the assertion that the visual inspection provides no security benefit. Many industries rely on photographic identification cards to verify a cardholder’s identity before granting access to accounts or locations. Some situations may require, and justify the cost of, additional layers of security. For example, the heightened risk at Risk Group A vessels and facilities warrant the greater security afforded by electronic TWIC inspection, along with the attendant costs. As explained in this preamble and the accompanying RA, we do not believe such costs are justified for vessels and facilities outside of Risk Group A at this time. The commenter made several other arguments relating to visual TWIC inspection. First, the commenter noted that there is no way for visual TWIC inspection to determine if a TWIC has been cancelled. While we agree that visual TWIC inspection will not perform an electronic check against the TSA’s list of cancelled TWICs, we disagree with the suggestion that visual inspection has no value in performing the card validity check. Security personnel perform the basic card validity check to ensure that a TWIC has not expired by checking the card’s expiration date. A TWIC reader does the same validity check electronically, but will further confirm card validity by finding no match on the list of cancelled TWICs. We explain in the RA that the costs associated with this added layer of security are warranted only for Risk Group A vessels and facilities. The commenter also stated visual TWIC inspection creates vulnerability because it relies on a ‘‘repetitive human process,’’ where the staff may become distracted or less attentive. While we agree generally that electronic TWIC inspection is more reliable than visual TWIC inspection, we disagree with the suggestion that visual TWIC inspection is unreliable. We are requiring TWIC readers for Risk Group A, in part, due to the potentially reduced human error that TWIC readers afford. As explained in the RA, that added benefit does not outweigh the costs associated with requiring TWIC readers outside of Risk Group A at this time. One commenter stated that the background check does not ensure that facilities are protected from crime. The Coast Guard agrees that crimes can still be committed despite background checks, although we note that MTSA specifically prohibits certain persons with extensive criminal histories from receiving TWICs.25 However, the purpose of requiring electronic TWIC inspection is not to prevent all crime, but to prevent TSIs at high-risk vessels and maritime facilities. In that regard, we believe that TWIC is a critical part of the layered approach to port security because it establishes a minimum, uniform vetting and threat assessment process for mariners and port workers across the country aimed at preventing a TSI. The existing TWIC Program ensures that workers needing routine, unescorted access to secure areas of facilities and vessels undergo lawful status checks (for non-U.S. citizens) and that they are vetted against a specific list in statute of terrorism associations and criminal convictions.26 It provides a standard baseline for determining an individual’s suitability to enter the secure area of a vessel or facility regulated under the MTSA. We note that the program does not exclude everyone with a criminal record and that most, but not all, of the permanent disqualifying crimes for a TWIC can be waived in extraordinary circumstances.27 However, there are aggressive procedures to remove a TWIC from any TWIC-holder found to have committed one of these crimes after receiving their TWIC, or to remove a TWIC from a TWIC-holder who is later added to any of the terrorism associated databases. Multiple commenters suggested that the risk analysis for the NPRM did not adequately address cargo containers and the related cargo container facilities. One commenter suggested that container terminals were the primary focus of the enactment of the MTSA and SAFE Port Act, yet they are not subject to the highest level of TWIC scrutiny. The Coast Guard disagrees that container terminals were the primary focus of the Acts, noting that there was substantial discretion permitted by the statutory language to implement electronic TWIC inspection requirements. We reiterate that with regard to threats carried within cargo 24 GAO–11–657, ‘‘Transportation Worker Identification Credential: Internal Control Weaknesses Need to Be Corrected to Help Achieve Security Objectives’’ 25 See 46 U.S.C. 70105(c) for the list of disqualifying criminal offenses. 26 46 U.S.C. 70105 and 49 CFR 1572.103. 27 46 U.S.C. 70105 and 49 CFR part 1515. PO 00000 Frm 00008 Fmt 4701 Sfmt 4700 E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations containers, electronic TWIC inspection is not particularly effective for threat mitigation since scenarios involving container contents (e.g., weapons, personnel) in an attack in the United States do not require access to the container inside the secure area. The risk analysis evaluated the consequence of an attack on the maritime facilities themselves, deeming it reasonable to confine attack scenarios to the facility because offsite scenarios (e.g., transfer of container contents) are not mitigated by TWIC, but are instead the focus of additional layers of protections in the larger MTSA regulatory regime. Based on the MSRAM calculations relating to the effect of an attack on a cargo container facility, the efficacy of electronic TWIC inspections in disrupting such attacks, and considering the costs of requiring electronic TWIC inspections, we arrived at the conclusion that it would not be the most cost-effective approach to improving public safety to require electronic TWIC inspection at these facilities at this time. We would refer interested parties to the accompanying RA for a detailed discussion of alternative regulatory approaches considered in this rulemaking. Furthermore, we note that under existing guidance, any facility not covered by this final rule may implement electronic TWIC inspection on a voluntary basis for any reason. One commenter stated that the classification for large general cargo container terminals was counterintuitive, because disruption to any one of these facilities could have significant negative consequences for the nation’s economy. We understand the commenter’s perspective. However, for this rule, as part of the MSRAM analysis, we evaluated the risk of a TSI that (1) occurs at cargo container facilities and (2) would be less likely to occur through TWIC reader implementation, and for these scenarios, the likelihood of long-term disruptions to the nation’s economy is assessed to be minimal. One commenter suggested that not placing container terminals in Risk Group A, and thus not requiring electronic TWIC inspection, would threaten the supply chain by allowing TWIC-holders, who have subsequently been determined by the TSA to be a security threat to the United States, to have unescorted access to the nation’s critical infrastructure with impunity. We disagree that not placing container facilities in Risk Group A is tantamount to exposing those facilities to security threats. We note that the general TWIC requirements located in § 101.515, which prohibit those who do not hold VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 a valid TWIC from receiving unescorted access to a secure area, is still effective for these facilities. Container facilities may voluntarily institute requirements for electronic verification, for example, for business reasons. Furthermore, such facilities are subject to spot checks by the U.S. Coast Guard where such invalidated TWIC-holders could be discovered through the use of portable TWIC readers by Coast Guard personnel. One commenter suggested that terrorists might use a small facility to transport a weapon, thus bypassing electronic TWIC inspection programs. Pursuant to existing requirements, unescorted access to a secure area of any MTSA-regulated maritime facility requires a TWIC, so all workers seeking unescorted access, not just those at high-risk facilities, are subject to background checks. However, we note that electronic TWIC inspection is not designed to directly protect against smuggling, including the smuggling of terrorist weapons. Electronic TWIC inspection is designed to ensure that unauthorized persons, who have not been provided a TWIC, are not provided unescorted access to high-risk vessels and facilities. Many, if not most, smuggling scenarios do not require adversary access to secure areas for success, and thus the enhanced access control afforded by electronic TWIC inspection does little to reduce the risk for these scenarios. One commenter added that facilities are poor targets for terrorist attacks and thus, screening workers on those facilities adds little value. We disagree, and note that we have tailored this rule to specifically encompass only those maritime facilities where the dangers of a TSI are heightened, such as those that handle or receive vessels carrying CDC in bulk. We have determined that the facilities in Risk Group A could be attractive targets for terrorist attacks due to the substantial loss of life and environmental effects that could result from a TSI. Furthermore, we tailored the requirements to only require electronic TWIC inspection when such inspection would have a substantial effect on reducing the likelihood of such an attack (the ‘‘TWIC utility’’ prong of the risk analysis, described in detail in the NPRM). See 78 FR 17791. 2. Risk Analysis Methodology Multiple commenters expressed concern with the risk analysis for this rulemaking. While we have considered the commenters’ concerns, our risk analysis model remains unchanged from that proposed in the NPRM. We believe that the existing risk analysis model, which considered a wide range of PO 00000 Frm 00009 Fmt 4701 Sfmt 4700 57659 targets, attacks, and consequences, remains the most comprehensive and logical means available to implement the electronic TWIC inspection program. In this process, the Coast Guard analyzed 68 distinct types of vessels and facilities using the MSRAM database based on their purposes or operational descriptions. The Coast Guard initially separated this list of vessels and facilities into proposed Risk Groups A, B, and C in the ANPRM and have ultimately used this baseline to inform the classification of Risk Group A vessels and facilities in this final rule. We identify these vessels and facilities as those that can best be protected by electronic TWIC inspection. The risk analysis methodology used in this rulemaking consists of three distinct analytical factors. The first factor, which we described in the NPRM as the ‘‘maximum consequences to [a] vessel or facility resulting from a terrorist attack,’’ is the direct consequence of a type of attack that could be prevented or mitigated by use of electronic TWIC inspection. This factor was assessed for each class of vessel and facility. The second factor, which we described as the ‘‘criticality to the nation’s health, economy, and national security,’’ considered the impact of the loss of a vessel or facility beyond the direct consequences, taking into consideration regional or national impact on health and security. Finally, we considered TWIC utility, which we describe as the effectiveness of the TWIC program in reducing a vessel or facility’s vulnerability to a terrorist attack.’’ It is important to note that the electronic TWIC inspection program is not the only security measure protecting vessels and maritime facilities, and is not designed to counter every conceivable threat to them. In the preliminary RA, we explained that there were three specific attack scenarios most likely to be mitigated by electronic TWIC inspection, and thus used in our analysis. These scenarios were: (1) A truck bomb, (2) a terrorist assault team, and (3) an explosive attack carried out by a passenger or passerby (with the specific caveat that the terrorist is not an ‘‘insider’’).28 While several commenters criticized certain aspects of the TWIC program for not countering additional threats, we note that benefits outside the scope of the above threats were not considered to be likely successes of the TWIC program and were not considered in our analysis. One commenter suggested that the truck bomb scenario was unrealistic, as it would be easier to 28 Preliminary E:\FR\FM\23AUR2.SGM 23AUR2 RA, p.72. sradovich on DSK3GMQ082PROD with RULES2 57660 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations place a bomb in a container itself. We note that these are two distinct scenarios, and that the risk identified in the latter scenario is one that is not mitigated by electronic TWIC inspection. The first factor of the analysis was the most comprehensive, which was to determine the direct primary and secondary consequences of the total loss of a vessel or facility. To conduct this stage of the analysis, we used MSRAM data. MSRAM collects data from a wide variety of vessels and facilities and includes calculations of damages for each individual vessel or facility. The damages incorporated into the MSRAM analysis include: (1) Death and serious injuries; (2) direct property damage and the costs of business interruptions; (3) environmental consequences; (4) national security consequences; and (5) secondary economic consequences, such as damage done to the supply chain.29 To finish the first stage of analysis, we aggregated the MSRAM data from the individual vessels and facilities into averages for each of the 68 identified classes. The second factor in the analysis considered the impact of the total loss of the vessel or facility beyond the immediate local consequences. This involved examining the regional and national effects of such a loss on the state of human health, the economy, and national security. The third factor in the analysis focused on the effectiveness of the TWIC program in actually reducing the vessel or facility class’ vulnerability to a terrorist attack. In instances where electronic TWIC inspection would substantially reduce the effect or likelihood of an attack, this factor was assigned a greater value. Once the three analytical factors were determined, the Coast Guard combined the scores using the Analytic Hierarchy Process (AHP), developing a total score that combined the severity of an attack and the effectiveness of the TWIC program in countering that attack for each of the classes of vessels and facilities. These overall rankings were then used to determine the Risk Groups used in developing this rulemaking. We believe that this approach used in this risk analysis methodology is highly effective, and represents the best method available for assessing the benefits of the electronic TWIC inspection program to the specific vessels and facilities under consideration. One commenter suggested that the Coast Guard should not finalize this rule, and that a panel of private industry 29 Preliminary VerDate Sep<11>2014 RA, p.75. 19:12 Aug 22, 2016 Jkt 238001 representatives should be included in an objective review of where the risks and vulnerabilities are in order to develop the best tool for mitigation. The Coast Guard has taken a collaborative approach toward developing this final rule, and has considered information from numerous stakeholders in this rulemaking, including the large number of comments on both the ANPRM and NPRM. As a result, the Coast Guard has amended this final rule, targeting the affected population to those vessels for which the use of electronic TWIC inspection provides the greatest benefit at minimum cost. This would not have been possible without the extensive public input received. One commenter suggested that previous risk assessments of their operation had never identified a scenario in which rogue employees played a role. We do not agree with the commenter that this weakens the case for the implementation of electronic TWIC inspection requirements. We note that ‘‘rogue employees’’ (no precise definition of this term was supplied, but we assume it means an employee who intends to carry out a TSI) are unlikely to be a threat mitigated by this final rule. This final rule is primarily designed to identify and intercept those adversaries who are not employees, but are attempting to use a stolen or otherwise invalid card to gain access to a secure area. A ‘‘rogue employee’’ with a valid TWIC would not be intercepted by electronic TWIC inspection. The ‘‘rogue employee’’ scenario is partially addressed by the security threat assessment that each employee must undergo before obtaining a TWIC, and is also addressed by other layers of security. For example, 33 CFR 104.285 and 105.275 require owners and operators to have the capability to continuously monitor their vessels and facilities through the use of lighting, security guards, waterborne patrols, automatic intrusion devices, or surveillance equipment. The same commenter asserted that there are no facts, objective risk assessments, or examples provided to support how a TWIC reader would enhance security absent a known risk or vulnerability. Additionally, the commenter broadly suggested that an owner or operator should be allowed to self-assess and determine its own risk group category after taking into account the security measures already in place at their own location. We disagree with both comments. MSRAM is a fact-based, objective tool for assessing TSI risk in the maritime domain. MSRAM incorporates specific examples of vessels and facility types and various PO 00000 Frm 00010 Fmt 4701 Sfmt 4700 attack modes. As explained in great detail in the ANPRM, NPRM, and elsewhere in this preamble, MSRAM is an analysis tool designed to estimate risk for potential terrorist targets. We consider MSRAM to be the best available tool for determining which vessels and facilities should be considered high-risk for the purpose of TWIC reader requirements. Because electronic TWIC inspection is generally more reliable than visual TWIC inspection, TWIC readers enhance access control more than visual inspection, increasing the likelihood of identifying an aggressor and denying access to secure areas. While the above rationale applies generally to Risk Group A, the Coast Guard also recognizes that the nature or operating conditions of certain vessels and facilities may warrant a waiver from certain regulatory requirements. The existing regulations in 33 CFR 104.130 and 105.130 provide that owners and operators may apply for a waiver of any requirement of the security regulations in 33 CFR parts 104 and 105 (including the TWIC reader requirements) in appropriate circumstances and where the waiver will not reduce overall security. Several commenters noted that while the Coast Guard used the MSRAM data to conduct its risk analysis, a number of TWIC Pilot Program participants were not contacted during this assessment. They argued that these participants could have provided local knowledge to produce supportable conclusions relative to risks and risk mitigation strategies in particular locations. We believe that these commenters misunderstand how MSRAM data were used. The Coast Guard carefully reviewed the pilot project in writing this final rule. MSRAM datawere used to help determine the consequences of a TSI. This was one factor used in determining the overall risk to the various classes of facilities analyzed in the Coast Guard’s risk analysis. The Coast Guard uses MSRAM in a variety of risk analysis applications and does not engage in discussion with each participant every time the data are utilized. Some commenters also argued that they were the subject of several counterterrorism studies, and that these studies had not identified TWIC as risk mitigation tool, nor had they identified a scenario in which an employee bringing harm to a ferry was an identified vulnerability. These studies were not provided by the commenter but, from their descriptions, seem to have focused on risks other than those posed by persons impersonating E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations employees. We note that while previous studies may not have identified TWIC as a risk mitigation tool, we have considered various scenarios in which electronic TWIC inspection would mitigate risk, and used them as the basis for our risk analysis. Furthermore, we note that electronic TWIC inspection is not designed to prevent a valid and cleared employee from bringing harm to a vessel or facility. Instead, it is specifically designed to prevent access to a secure area by an unauthorized person who is attempting to gain access by using a stolen or counterfeited TWIC. We believe that electronic TWIC inspection is an appropriate and costeffective tool to mitigate such risks. sradovich on DSK3GMQ082PROD with RULES2 B. Electronic TWIC Inspection Electronic TWIC inspection is the process by which the TWIC is authenticated, validated, and the individual presenting the TWIC is matched to the stored biometric template. This process consists of three discrete parts: (1) Card authentication, in which the TWIC at issue is identified as an authentic card issued by the TSA; (2) the card validity check, in which the TWIC is compared to the TSA-supplied list of cancelled TWICs 30 to ascertain that it has not been revoked, and is not expired; and (3) identity verification, in which the TWIC is matched to the person presenting identification through use of a biometric template stored on the TWIC. The purpose of electronic TWIC inspection is to improve the inspection of TWICs, as compared to visual TWIC inspection. We note that visual TWIC inspection accomplishes the same three 30 We note that at this time, this list is the Cancelled Card List (CCL). However, there are also several specific Certificate Revocation Lists maintained by TSA, which differ from the CCL. In order to provide a regulation that is flexible in terms of future technology adaptations, in this final rule, we have described the list in the regulatory requirement generically as the ‘‘list of cancelled TWICs.’’ See sections 101.520(b) and 101.525 of the final rule regulatory text. This allows TSA to continue to use the CCL, but will also allow additions from various Certificate Revocation Lists if and when that becomes feasible and efficient. Any such change in the list of cancelled TWICs would be a ‘‘back end’’ change on TSA’s part and would not impact the burdens or operations of private parties, who would still only be required to check a TWIC against the list as part of the card validity check. In this document, we generally refer to the ‘‘list of cancelled TWICs’’ when referring to the regulatory requirements in the final rule, while still using the ‘‘CCL’’ terminology when discussing comments on the Cancelled Card List or discussions in the NPRM that used that terminology. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 tasks as electronic TWIC inspection, but in different ways, and generally not as thoroughly or reliably as electronic TWIC inspection. Visual card authentication is accomplished by visually inspecting the security features on the card (such as the watermark). A visual card validity check is accomplished by checking the expiration date on the face of the card, although there is no way to visually check if the TWIC has been revoked by the TSA since it was issued. Finally, visual identity verification is conducted by comparing the photograph on the TWIC with the individual’s face. Electronic TWIC inspection improves upon the visual inspection checks, and adds two additional benefits. In electronic TWIC inspection, the authenticity of the card is verified by issuing a challenge/response to the TWIC’s unique electronic identifier, called a Card Holder Unique Identifier (CHUID). The card’s validity is determined by checking the TWIC against the most recently updated list of cancelled TWICs. Finally, the identity of the TWIC-holder is verified by matching the biometric template stored on the TWIC to the individual’s biometrics. Each of these methods is an improvement upon visual TWIC inspection as the electronic TWIC inspection uses methods of validation that are not easily manipulated through means such as counterfeiting or altering the surface of the TWIC. Additionally, electronic TWIC inspection ensures that the card being presented has not been invalidated by a means other than being expired, such as the card having been reported lost, or the TWIC being revoked due to a criminal conviction. TWIC inspection, either electronic or visual, provides a baseline of information to determine who may be provided unescorted access to secure areas of MTSA-regulated vessels and facilities. While not every TWIC-holder is authorized unescorted access, the TWIC ensures that facility security personnel do not grant unescorted access to individuals that have not been vetted or have been adjudicated unfit for access to secure areas. Several commenters suggested that the sole purpose of TWIC is for a worker to be vetted through security and criminal checks, and that access control is not a purpose of the TWIC program. We disagree with this description of a fundamental principle of the TWIC PO 00000 Frm 00011 Fmt 4701 Sfmt 4700 57661 program. The controlling statute, 46 U.S.C. 70105(a)(1) reads, in part, ‘‘[t]he Secretary shall prescribe regulations to prevent an individual from entering an area of a vessel or facility that is designated as a secure area . . . unless the individual holds a transportation security card issued under this section. . .’’. This is a clear mandate for an access control program. We have implemented this mandate by requiring maritime workers to obtain a TWIC, and by requiring owners and operators to inspect each individual’s TWIC prior to granting access to secure areas. Using the biometric template, TWIC provides a highly secure means for security personnel to verify the identity of an individual seeking access to a secure vessel or facility and implementing this core requirement of the MTSA. In this final rule, we are revising the regulatory text to add flexibility and more accurately reflect the electronic TWIC inspection process. In the NPRM, we did not describe the process as ‘‘electronic TWIC inspection,’’ but stated in proposed § 101.520(a) that ‘‘all persons must present their TWICs for inspection using a TWIC reader, with or without a . . . PACS. . .’’. 31 In this final rule, we are modifying the process from presentation of a TWIC to a TWIC reader to the concept of electronic TWIC inspection. As stated below, and as defined in section 101.105 of this final rule, ‘‘Electronic TWIC inspection’’ means the process by which the TWIC is authenticated, validated, and the individual presenting the TWIC is matched to the stored biometric template. In doing so, we have laid out the exact requirements for this process in revised § 101.520. In this section, we address the comments and concerns submitted in response to the NPRM, and describe in detail how electronic TWIC inspection will work in a wide variety of operational situations. Table 2 provides a summary of the acceptable implementation options for owners and operators to perform electronic TWIC inspection. The owner or operator of a vessel or facility must ensure the options chosen to meet the electronic TWIC inspection requirements perform the required card authentication, card validity, and identity verification required in revised § 101.520. 31 78 E:\FR\FM\23AUR2.SGM FR 17829. 23AUR2 57662 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations TABLE 2—IMPLEMENTATION OPTIONS Option Description TWIC Reader (QTL) ............. Owner/operator uses a TWIC reader listed on TSA’s QTL. To gain entry to a secure area, employee presents TWIC and biometric for electronic inspection. Owner/operator uses a TWIC reader that adequately performs the three required electronic checks (card authentication, card validity check, identity verification). To gain entry to a secure area, employee presents TWIC and biometric for electronic inspection. Similar to non-QTL TWIC reader, except the Transparent Reader does not independently perform card validation, card authentication, and identity verification. Instead, the Transparent Reader transmits information from the employee’s TWIC and biometric to a back end system containing software that performs the TWIC check. Once the TWIC check is complete, the back end system shall perform what processes are required to either grant or deny access. Employee is issued a facility access card after initially registering employee’s TWIC and biometric into the facility’s access control database. To gain entry to a secure area, employee presents facility access card and biometric for electronic inspection to match against employee’s record in the facility’s database. Employee’s TWIC and biometric are initially registered into the facility’s access control database. To gain entry to a secure area, employee presents biometric (e.g., fingerprint) for electronic inspection to match against employee’s record in the facility’s database. TWIC Reader (non-QTL) ..... Transparent Reader ............. PACS (with facility access card). PACS (with biometric only) .. 1. Electronic TWIC Inspection Does Not Necessarily Require a TWIC Reader sradovich on DSK3GMQ082PROD with RULES2 Many commenters expressed concerns regarding the costs of purchasing, installing, and using TWIC readers that have been approved by the TSA. They argued that the costs of the TWIC readers were high, and that there were problems with the reliability of TWIC readers and cards. Many commenters requested that the Coast Guard extend guidance issued in Navigation and Vessel Inspection Circular (NVIC) 03–07 and Policy Advisory Council (PAC) Decision 08– 09, change 1, in which we outlined how an existing PACS could be used in lieu of a TWIC reader until the TWIC final rule was issued. In NVIC 03–07, we described how TWIC could be incorporated into an access control system even if the person accessing the secure area did not physically use the TWIC as an access control card. We stated that: Example: A facility employee who possesses a valid TWIC is registered into the facility’s access control database and is issued a facility access card after the TWIC is verified visually as described in 3.3 a. (7) [of NVIC 03–07]. To gain entry into a secure area, the employee inserts or scans his/her facility access card at a card reader, which verifies the access card as a valid card for the facility. The TWIC does not need to be used as a visual identity badge at each entry once the facility-specific card is issued. The card reader then verifies the individual by matching the facility access card to the individual’s record in the facility database and allows access to secure areas as dictated by the permissions established by the owner/ operator in the access control system. By virtue of the fact that the employee would not be issued a vessel or facility-specific card without first having a TWIC, the requirement VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 to possess a TWIC for unescorted access to secure areas is met.32 Many commenters noted, and we are aware that, the proposed regulatory text in the NPRM was worded in such a way that rendered this method of compliance impossible. The proposed regulatory text in § 101.520(a)(1) stated ‘‘Prior to each entry, all persons must present their TWICs for inspection using a TWIC reader, with or without a physical access control system (PACS), before being granted unescorted access to secure areas.’’ 33 Similarly, proposed §§ 101.525 and 101.530 required visual inspections of TWICs before permitting access. Many commenters took issue with the change in approach from current requirements as described in the NVIC. In this final rule, we are revising the regulatory text to allow electronic TWIC inspection to be conducted by either a TWIC reader or a PACS at vessels and facilities. This regulatory language will supersede previous guidance documents such as PAC 08–09, change 1 and NVIC 03–07. Under the new language in revised section 101.520 we are providing greater flexibility on the type of equipment used, as long as the three parts of electronic TWIC inspection are performed satisfactorily. Multiple commenters discussed the scenario where an owner or operator has a PACS which cross-checks successful electronic TWIC inspections against employment records and other internal security systems and records to verify that the cardholder works for the company, holds current certifications, and should be allowed into the facility. As explained in this document in 32 Enclosure (3) to NVIC 03–07, p. 1515 (Available in the docket by following the instructions in the ADDRESSES section of this preamble). 33 78 FR 17829. PO 00000 Frm 00012 Fmt 4701 Sfmt 4700 Section V.B., such a system could meet the requirements for electronic TWIC inspection as revised for this final rule. Two commenters at a public meeting suggested that if a facility could prove its PACS is superior to the TWIC requirements, then the facility should be exempt from them. Similarly, other commenters suggested alternatives the Coast Guard could require, including a color-coded system analogous to the former Homeland Security Advisory System. In this final rule, we are not providing a generalized exemption from electronic TWIC inspection requirements as suggested by the commenters. However, as explained, such requirements can be performed by a PACS, thus potentially eliminating the need for these particular commenters to purchase entirely new equipment or the need for an exemption from the electronic TWIC inspection requirements. Multiple commenters stated that it would be more cost effective in some cases to purchase one or two stationary TWIC readers, but also to purchase several portable TWIC readers for multiple temporary gates or entrances. One commenter asked whether the final rule requires fixed card readers at every point of access, even a temporary or infrequently used one. The same commenter asked whether portable TWIC readers would meet the TWIC reader requirements on an OCS facility. We clarify that neither the NPRM nor final rule required stationary TWIC readers. The final rule, as described above, allows for flexibility in terms of equipment. The arrangements the commenters suggested could all be accommodated by this final rule. In this final rule, we are removing prescriptive requirements regarding the permanence, type, and placement of electronic readers. If a E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 vessel or facility has an existing access control system, of any variety, whose electronic readers perform the requirements of the electronic TWIC inspection (including identity verification), and are approved under the relevant security plan, then the PACS is permissible. In response to the many comments we received on this issue, in this final rule, we are substantially altering the TWIC reader requirements to accomplish the goals set out by the TWIC reader program, but in a manner that provides more flexibility in terms of how those goals are met. The requirements in this final rule are designed to allow as much flexibility in design of an access control system as possible while still achieving the goals of the TWIC reader program. We believe that the increased flexibility offered by the revised, performance-based regulations is responsive to the many commenters who described existing access control systems that they believe are better suited for their individual vessels and facilities than those proposed in the NPRM. Under these final regulations, a system that accomplishes the goals of the TWIC program and uses the three electronic checks mandated by the regulation will be considered by the Coast Guard when reviewing the security plans. As long as the Coast Guard agrees that the proposed security plan accomplishes the goals in a robust fashion, we will not limit the choices of the means to do so. 2. Integrating Electronic TWIC Inspection Into a PACS NVIC 03–07 and PAC 08–09 change 1 explain that they are valid guidance until a TWIC reader final rule is issued, but many commenters requested that these documents remain valid even after the final rule becomes effective. Because this final rule significantly changes the TWIC inspection process for Risk Group A vessels and facilities, the TWICspecific guidance provided in those documents will not continue to apply to Risk Group A. However, because we are not making any changes to the TWIC requirements for those vessels and facilities not in Risk Group A, the guidance documents still retain their validity with regard to those entities. We will update and post these guidance documents online at https:// homeport.uscg.mil/ prior to the effective date of this final rule. In this final rule, we no longer require facility and vessel operators to use a TWIC reader listed on the QTL each time a person is granted unescorted access to a secure area. Instead, we are permitting multiple options as VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 previously described, including the use of a PACS approved in the required Facility Security Plan (FSP) or Vessel Security Plan (VSP), if the PACS can perform the electronic TWIC inspection requirements. Example: A facility employee who possesses a valid TWIC is registered into the facility’s access control database and is issued a facility access card after the TWIC is verified in accordance with 33 CFR 101.530. After the TWIC and holder of the TWIC are validated to ensure the TWIC is issued by TSA and the holder of the TWIC is bound to the TWIC, a biometric template of the employee is taken and stored on the facility access control system. To gain entry into a secure area, the employee inserts or scans his or her facility access card at a card reader, which verifies the access card as a valid card for the facility. The card reader then matches the facility access card to the employee’s record in the facility database. A biometric sample from the employee is taken and matched to the associated biometric template stored on the facility’s access control system. The facility’s access control system then checks the TWIC’s CHUID to assure that the TWIC is still valid (unexpired) as well as checks the list of cancelled TWICs to ensure that it has not been cancelled for any other reason. Upon verification that the TWIC is valid and the employee’s biometric matches the associated template, the facility access control system allows access to secure areas as dictated by the permissions established by the owner or operator in the access control system. By virtue of the fact that the employee would not be issued a facility-specific card without first having a TWIC, the requirement to possess a TWIC for unescorted access to secure areas is met. The requirement for a biometric match of the employee is met through the performance of a match to the biometric template stored on the facility access control system. We note that the requirement for electronic TWIC inspection can be met even without the use of any sort of card reader, so long as the three parts of the electronic TWIC inspection are met. Such a system could be designed to use an individual’s biometric check as a means of identification, such as described below. Example: A facility employee who possesses a valid TWIC is registered into the facility’s access control database and a biometric template of the employee is taken and stored on the facility access system. (We note that this is done after the TWIC and holder of the TWIC are validated to ensure the TWIC is issued by TSA and the holder of the TWIC is bound to the TWIC). To gain entry into a secure area, the employee presents a biometric (e.g., fingerprint) to a biometric reader connected to the facility’s access control system. The access control system identifies the employee from the fingerprint and then matches it to the biometric template and the employee’s TWIC information in the facility database. The facility’s access control system then checks PO 00000 Frm 00013 Fmt 4701 Sfmt 4700 57663 the TWIC’s CHUID to assure that the TWIC is still valid (unexpired) as well as checks the list of cancelled TWICs to ensure that it has not been revoked for any other reason. Upon verification that that the TWIC is valid and the employee’s biometric matches the associated template, the facility access control system allows access to secure areas as dictated by the permissions established by the owner or operator in the access control system. By virtue of the fact that the employee would not be entered into the facility’s access control system without first having an authenticated TWIC, the requirement to possess a TWIC for unescorted access to secure areas is met. The requirement for a biometric match of the employee is met through the performance of a match to the biometric template, in this case a fingerprint stored on the facility access control system. Additionally, we note that although a biometric template is the particular biometric measurement used in the TWIC application process, an alternative biometric may be used to perform the identity verification check required by the regulations so long as the method is approved in the security plan. For example, as two commenters suggested, a vascular scan could be stored on a facility’s access control system instead of a fingerprint, which could be useful in situations where some employees have difficult-to-read fingerprints. a. List of Acceptable TWIC Readers In the NPRM, the Coast Guard proposed that only certain TWIC readers would be permitted to be used for purposes of electronic TWIC inspection. As stated above, proposed § 101.520(a)(1) read, ‘‘[p]rior to each entry, all persons must present their TWICs for inspection using a TWIC reader, . . .’’. The term ‘‘TWIC reader’’ was defined in proposed § 101.105 as ‘‘an electronic device listed on TSA’s Qualified Technology List . . .’’. Thus, by operation of the proposed regulatory text, TWIC readers listed on the QTL would be required at access points to secure areas on facilities and at the entrances to vessels requiring electronic TWIC inspection. TSA had not published the QTL at the time of publication of the NPRM. Thus, in its discussion regarding the types of approved TWIC readers, the NPRM reiterated guidance from PAC–D 01–11 regarding the use of TWIC readers to meet the existing regulatory requirements for effective identity verification, card validity, and card authentication.34 Specifically, in that guidance document, we stated that: In accordance with 33 CFR 101.130, the Coast Guard determines that a biometric 34 78 E:\FR\FM\23AUR2.SGM FR 17805. 23AUR2 57664 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 match using a TWIC reader from the TSA list of readers that have passed the Initial Capability Evaluation (ICE) Test (available at: https://www.tsa.gov/assets/pdf/twic_ice_ list.pdf) to confirm that the biometric template stored on the TWIC matches the fingerprint of the individual presenting the TWIC meets or exceeds the effectiveness of the identity verification check. The NPRM also noted that, in accordance with the guidance, ‘‘TWIC readers allowed pursuant to PAC–D 01– 11 may no longer be valid after promulgation of a TWIC reader final rule, and DHS will not fund replacement of TWIC readers.’’ 35 In recognition of advancing technology and standards, and to provide further flexibility to the end user that may meet business specific needs, this final rule does not require a TWIC reader from the TSA’s QTL, accessible online at https://www.tsa.gov/ stakeholders/reader-qualifiedtechnology-list-qtl. Instead, the Coast Guard is permitting multiple options for the implementation of electronic TWIC inspection. The first option for meeting these needs within this final rule remains the mechanism proposed in the NPRM, which is the use of TWIC readers listed on the QTL. These TWIC readers are defined as ‘‘Qualified Readers.’’ We believe that this option is most appropriate for vessels or facilities that currently do not conduct electronic TWIC inspection and are seeking a TWIC reader determined to be in conformance with the TWIC Reader Hardware and Card Application Specification, available in the online docket for this rulemaking. The QTL continues to remain useful for this and other purposes. A similar option would be to use a TWIC reader that is not on the QTL. While such electronic readers are not prohibited by this rule, they must still meet the performance requirements of § 101.520. This performance-oriented option is intended to provide more options to users to meet their individual needs while still relying on the TWIC as an access control credential. Another option would be to use an electronic reader or combination of separate devices—such as proximity readers, biometric readers, and PIN pads—that would transmit the information from the TWIC and individual seeking access to software that performs the card authentication, card validity check, and biometric identification functions required in § 101.520. We refer to this arrangement as a ‘‘Transparent Reader.’’ In this case, for example, a Transparent Reader 35 78 36 We have also included the current version of the list in the docket USCG–2007–28915. FR 17805. VerDate Sep<11>2014 19:12 Aug 22, 2016 would read the information from the TWIC along with the biometric sample provided by the individual and transmit it to a back end system containing software that performs the TWIC check. Once the TWIC check is complete, the back end system would perform what processes are required to either grant or deny access. This option may be highly popular with facilities that have already invested in electronic reader infrastructure and high tech software systems that may not be on the QTL. In this case, much as a situation with a PACS, the operator may have to add a biometric component, if not already in place, and modify software to include TWIC compatibility, but would not have to replace the entire system. The last option, described in detail above, would be the use of an existing PACS, with the inclusion of biometrics, with a facility-specific access card that uses the TWIC as the baseline credential. This is purely a performance requirement, and would not require the use of government-approved equipment. In this case, the PACS would be required to match the TWIC against the list of cancelled TWICs and, if positively matched, automatically cancel the facility access card so as to not allow unescorted access to secure areas of the facility. Several commenters provided comments that addressed the specific types of approved card readers, but we believe that many of the concerns raised by commenters are resolved by the Coast Guard moving to a more flexible series of options for conducting electronic TWIC inspection. One commenter in a public meeting expressed concern that there was not an approved card reader which he could use for cost estimates. We note that the TSA now has a list of approved TWIC readers, which is available on the Coast Guard’s Homeport site.36 One commenter suggested that this rule was not in alignment with the TSA’s Request for Information regarding development of the QTL. We disagree, and note that the Coast Guard and TSA worked closely in developing and implementing the electronic TWIC inspection requirements. Furthermore, we note that with the additional flexibility afforded by this final rule, equipment to conduct electronic TWIC inspections is available at a wide variety of prices, depending on the manner in which electronic TWIC inspection is conducted. Additional information on cost Jkt 238001 PO 00000 Frm 00014 Fmt 4701 Sfmt 4700 estimates is provided in the final RA accompanying this final rule. Additionally, one commenter requested that software be included on the QTL. We note that the list of TWIC readers on the QTL includes TWIC reader and software pairings. Beyond the physical aspects of TWIC reader testing in terms of environmental or drop testing, a large portion of what is tested in the QTL process is the software. Other commenters suggested that, based on the TWIC Pilot Program, TWIC reader technology is still not ready for requiring TWIC readers at facilities, and requested that this final rule be delayed. Similarly, one commenter recommended that the Coast Guard only proceed with the rule if it was confident in the reliability of existing TWIC readers. We believe that not only has technology continued to improve, but also additional flexibility has been afforded in this final rule, both of which should alleviate problems with specific TWIC readers used in the pilot. Vessels and facilities required to conduct electronic TWIC inspection can choose from a wide variety of means so as to meet their budget and operational needs. Furthermore, the flexibility built into this final rule allows for future advancement of both card and reader technologies in a manner that will provide for further reductions in impact on business operations of the maritime industry. b. PIN Pads and Biometric Input Methods One issue raised in the ANPRM was the use of PINs as part of the identification process. We note that upon getting a TWIC, each TWIC-holder is required to remember a PIN. As proposed in the NPRM, under most circumstances, the TWIC-holder would not be required to provide the PIN when seeking access to secure areas, except as a backup measure when the TWICholder’s biometric template is unreadable. For this reason, there is no requirement that access control systems have the capability to accept a PIN. Comments relating to the use of PINs were generally negative. Several commenters specifically argued against the use of PINs. Some commenters stated that because the PINs are rarely used, they are seldom remembered by TWIC-holders. We agree that rarely-used PINs will likely be forgotten, and thus the only people who would likely remember their PINs are those who use them regularly, such as those with impaired biometrics. Similarly, one commenter stated that 100 percent of cardholders would need to visit one of E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 the TWIC enrollment centers to reset or establish a new PIN in the event that the Coast Guard required PIN entry, implying that without regular use of PINs, they are quickly forgotten. PINs would not be required or permitted as a substitute for biometric identification of most users. Instead, this rule provides that PINs are available as an alternative only for individuals whose biometrics can not be read. The Coast Guard recognizes that for some people, taking a biometric read can be problematic. For example, people with severely injured fingers are often unable to have their fingerprints read. For such cases, the final rule provides an alternative means to ensure identity verification. As stated in § 101.520(c)(2), the use of a PIN plus a visual TWIC inspection is an acceptable alternative to a biometric match for individuals who are unable to have their biometric template captured at enrollment or who have unreadable biometrics due to injury after enrollment. For that reason, owners and operators may find it expedient to include an electronic reader with a PIN pad in at least some of their access control locations to accommodate people with unreadable biometrics. 3. Comments Related to Troubleshooting TWIC This section elaborates on certain programmatic issues relating to electronic TWIC inspection, specifically, how to address problems arising if either the electronic reader or access card malfunctions. In this section, we elaborate and expand on the provisions described in the NPRM as well as address issues raised by commenters. In the NPRM, the Coast Guard proposed regulations in § 101.535 that laid out requirements for TWIC inspection in special circumstances where a malfunction in the TWIC inspection system has occurred. In paragraph (a), we described how access could be granted in the event of a lost, stolen, or damaged TWIC card. In paragraph (b), we proposed how access could be granted in the event that a person’s biometric template could not be read due to either technology malfunction or the inability of an individual to provide a biometric template. In paragraph (c), we proposed that in the event of a TWIC reader malfunction, an individual could still be granted unescorted access to secure areas for a period not to exceed 7 days, provided that individual has been granted such unescorted access in the past and is known to possess a TWIC. We note that the period in paragraph (c) VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 was extended to 37 days in CG–FAC Policy Letter 12–04. Because the final rule, as written, sets forth a requirement for electronic TWIC inspection rather than specifically requiring that a TWIC be read by a TWIC reader, the text of this section needs some alterations to account for the new flexibility. We have integrated these alterations into the final regulatory text as detailed in the sections below. Furthermore, we have considered the requests and arguments of various commenters, and we are integrating many of the ideas presented into the final rule. Finally, we have attempted to modify and clarify the regulations where appropriate. a. Lost, Stolen, or Damaged TWIC The NPRM proposed that if an individual cannot present a TWIC because it has been lost, damaged, or stolen, the individual could be granted unescorted access for a period of up to seven days if various conditions were met. The conditions include the individual previously having been granted unescorted access, being known to have had a TWIC, being able to present alternative identification, and having reported the TWIC as lost, stolen, or damaged to the TSA. This proposed language was derived from existing requirements in 33 CFR parts 104 through 106. Additionally, in CG– FAC Policy Letter 12–04, the Coast Guard allowed an individual to be granted unescorted access for an additional 30 days (for a total of 37 days of unescorted access), if the individual provided proof that a replacement TWIC had been ordered. Policy Letter 12–04 also allowed unescorted access to those individuals with expired TWICs who had applied for a TWIC renewal prior to expiration. i. Vessels and Facilities Using a PACS Because the final rule provides more flexibility for electronic TWIC inspection beyond presenting a TWIC for access control purposes, some of the issues addressed in § 101.535 are significantly different if using a PACS to perform the electronic TWIC inspection. For example, if an employee’s TWIC is stolen and the theft is reported to the TSA, the affected TWIC will be placed on the list of cancelled TWICs, but the employee will still be registered in the facility’s PACS. However, upon attempting to gain access to a secure area, during the card validity check, the affected TWIC will appear on the list of cancelled TWICs, and thus fail the check. The revised final regulations are designed to allow a procedure where the employee can still be granted PO 00000 Frm 00015 Fmt 4701 Sfmt 4700 57665 unescorted access until he or she can obtain a replacement TWIC and update his or her profile in the facility access control system with the information from the new TWIC. In this final rule, we have added § 101.550(b), which allows unescorted access to secure areas to be granted by a facility operator for a period of up to 30 days if the TWIC appears on the list of cancelled TWICs if the individual is known to have had a TWIC and to have reported it lost, damaged, or stolen. Example: An individual who works at a facility where the PACS has been linked to a TWIC card reports his or her TWIC as lost. When presenting his or her facility access card to the PACS, the card validity check will return a TWIC on the list of cancelled TWICs because the TWIC has been reported lost. The FSO confirms that the TWIC was reported as lost. In that instance, the PACS will recognize the status of the TWIC as cancelled, but can still grant unescorted access to secure areas to the individual for a period of up to 30 days. If, after 30 days, the individual has not linked their facility access card to a valid TWIC, the PACS would have to deny unescorted access to secure areas to that individual. ii. Vessels and Facilities Using TWIC Readers We proposed in § 101.535 that vessel or facility operators using TWIC readers allow for temporary access in the case of a lost, stolen, or damaged TWIC. Specifically, the Coast Guard proposed that if a person is known to have had a TWIC, has previously been granted unescorted access, and can present another form of acceptable identification, and there are no other suspicious circumstances, then the operator may grant that person access for 30 days so that they can be issued a new TWIC. We received a wide variety of comments relating to the issue of lost or stolen TWICs. One commenter argued that any allowance for malfunctioning TWICs undermines the point of having the card at all. We disagree, and note that the procedure is necessary to ensure smooth operation of the TWIC system, and believe it contains enough safeguards so as not to function as a loophole in security. One commenter recommended splitting the CCL into separate categories, including categories of TWICs invalidated for ‘‘administrative reasons.’’ We disagree, because the list of cancelled TWICs is intended to help screen out invalid cards regardless of the reason. Many commenters argued that the 7day period proposed in § 101.535(a) is too short, and that the period should be extended, with a significant number of E:\FR\FM\23AUR2.SGM 23AUR2 57666 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 these commenters referring to the 30day extension of the 7-day period permitted by CG–FAC Policy Letter 12– 04. Based upon the comments received, which indicated that it can take longer than 7 days to be issued a new TWIC, we have decided to include a 30-day period for this situation in section 101.550(b) of the final rule. We believe that this provides ample time to be issued a new TWIC, without presenting an undue security risk. When effective, this regulation will supersede the current guidance in CG–FAC Policy Letter 12–04, which allowed for a total of 37 days. b. Transportation Worker Forgets To Bring TWIC To Work Site The existing regulations in 33 CFR parts 104 through 106, the policy arrangements in CG–FAC Policy Letter 12–04, as well as the proposed regulations in § 101.535, only grant unescorted access to those individuals whose TWICs have expired or have reported their TWIC as lost, stolen, or damaged to the TSA. For all other individuals who fail to present a TWIC, unescorted access would be denied under proposed § 101.535(d). Thus, under the proposed regulation, an employee who forgot his or her TWIC at home would not be permitted unescorted access to the facility, whereas an employee whose TWIC was stolen would be permitted unescorted access for a limited period of time. We received one comment relating to the issue of forgotten TWICs from a commenter who described such a situation in their submission to the docket for this rulemaking. This commenter suggested that we add an allowance for persons who forgot their TWIC at home. After reviewing comments on the proposed rule, we reiterate our existing position that persons who cannot present a valid TWIC, and have not reported their TWIC as lost, stolen, or damaged to the TSA, may not be granted unescorted access to a vessel or facility. We believe that providing an exemption for forgotten TWICs creates a potential degradation in security and additional risks that outweigh the benefits. Unlike the situation where a TWIC has been reported as stolen or lost to the TSA and is therefore no longer valid which can be verified by checking the list of cancelled TWICs, a claim of a forgotten TWIC cannot be validated. Instead, we reiterate that under current regulation at § 101.514(a), unless exempted from the TWIC requirements by § 101.514(b), (c), or (d), all persons must physically possess a TWIC, or undergo electronic TWIC inspection, VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 prior to being granted unescorted access to a secure area of a vessel or facility. Persons who do not physically present a TWIC or undergo electronic TWIC inspection, and have not reported their TWIC as lost, stolen, or damaged to the TSA, may not be granted unescorted access. c. Inaccessible Biometrics In the NPRM, we proposed two secondary authentication procedures that could be followed in the event that a person’s biometric template could not be read by a TWIC reader or PACS due to a technology malfunction or low quality biometric template. These alternatives were listed in proposed § 101.535(b), and allowed either the input of a PIN or the use of an alternative biometric that has been incorporated into the PACS. Given the change from requiring a TWIC reader to requiring electronic TWIC inspection, some changes to this section are needed as well. We discuss changes to this section and comments received below. One commenter suggested that people with unreadable biometric templates should be allowed to use a PACS card in addition to a PIN or alternate biometric. We agree, and note that under the final regulations, given that input of biometric information (including alternatives to fingerprints) into a PACS reader may now be a common manner of completing identification verification, the use of a PACS card in conjunction with an alternative biometric will be an accepted regular way to conduct an electronic TWIC inspection. However, upon consideration, we do not believe that the input of a PIN alone is equivalent to biometric identification. Biometric identification allows the facility to ascertain with a high degree of certainty whether the individual requesting access is the TWIC-holder. On the other hand, commenters noted that other methods of identification verification will not detect counterfeit, stolen, or borrowed TWICs. Similarly, the use of a PIN alone will not detect a borrowed TWIC or PACS card or, potentially, a stolen TWIC or PACS card, if the PIN has been illicitly obtained. Nonetheless, the Coast Guard believes that a method for accommodating persons with unreadable biometrics is important. In such cases, we believe that visual TWIC inspection, when combined with the PIN, provides enough certainty as to be an acceptable alternative to biometric identification. Combining visual identification with the PIN will help to ensure that stolen and borrowed cards are difficult to use. PO 00000 Frm 00016 Fmt 4701 Sfmt 4700 Thus, in this final rule, we are modifying the provision in proposed § 101.535(b), which allowed for PINs to be used in lieu of biometric matching, to include a requirement for visual identification in addition to the PIN. The new provision is located in § 101.550(c) of this final rule. We believe that this provision would present few problems, as people could use their TWICs for visual identification. Alternatively, if a PACS PIN is assigned and stored in the access control system, an employee with unreadable biometrics could enter his or her PIN and present a PACS card or driver’s license to conduct a visual identification check. d. Malfunctioning Access Control Systems In the NPRM, we proposed a mechanism by which persons could be granted unescorted access to secure areas if a TWIC reader malfunctioned. Specifically, proposed § 101.535(c) allowed owners and operators to use visual checks for a period of 7 days if a TWIC reader malfunctioned. In light of the change in this final rule from the required use of TWIC readers to the more flexible requirement for electronic TWIC inspection for Risk Group A vessels and facilities, we are making some conforming changes and clarifications to this procedure. We received several comments on the matter, which are addressed below. Upon consideration of this policy, we believe that a clause automatically allowing the use of visual TWIC inspections in lieu of biometric matching presents a serious security concern. As one commenter argued, any allowance for malfunctioning TWICs undermines the point of having the card at all. The Coast Guard agrees, and believes that allowing the use of visual TWIC inspections in lieu of biometric matching degrades security. This final rule represents a concerted effort to significantly upgrade the security at a relatively small group of high-risk vessels and facilities. Given the importance of security, we would not expect vessels or facilities to have only a single TWIC reader, but expect some redundancy in the system, and note that two commenters strongly echoed the view that redundancy is needed in any critical system. We would agree that, as a practical matter, the minimum number of electronic readers (either dedicated TWIC readers or those integrated into a PACS) at a facility or onboard a vessel would be two, in case one malfunctioned. As discussed in the RA, using the TWIC pilot data we estimated the average number of electronic readers E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations required by this final rule by facility and vessel types at a minimum 2 per vessel and 4 per facility (Tables 4.3 and 4.4 of the RA). While the TWIC readers on the QTL have been tested to ensure a degree of reliability, there are many factors external to the testing process that could cause any one individual electronic reader to fail. The immediate availability of a backup electronic reader should one fail (as documented in the relevant security plan) would allow a vessel or facility to maintain the appropriate level of security for access control and continue operating without further burden. Due to the security concerns discussed in this paragraph, we are removing from the final rule the proposed provision in § 101.535 that would have permitted automatic transition to visual TWIC inspections in the event of an electronic reader malfunction. As stated above, based on discussions with industry we expect that owners and operators will have an additional functioning electronic reader to use in those instances in case of equipment failures or malfunctions (§§ 104.260(c) and 105.250(c)). If the owners and operators plan for malfunctions as existing regulations require, there should be no significant disruption of operations. Further, in the unlikely event that both primary and redundant electronic readers malfunction, the owner or operator could obtain permission from the Captain of the Port (COTP) to continue operating. Two commenters suggested changing the language in proposed § 101.535(c) from a ‘‘reader malfunction’’ to ‘‘in the event of an access control system failure,’’ noting that many other systems (such as the software or electricity) could fail, thus rendering an electronic reader inoperable. As we are deleting this exemption in this final rule, the language question is no longer at issue. Commenters also suggested that 7 days is not sufficient to correct all problems that can result in a TWIC malfunction. They noted that it might take longer to procure parts, especially after a major regional disaster or holiday, and that a 15-day period where visual TWIC inspection is permitted would be more reasonable. On the other hand, one commenter suggested that it should take only hours to repair a malfunctioning TWIC reader. In this final rule, we are removing this provision. Thus, restoration of an access control system will be handled in accordance with the procedures for the reporting requirements for noncompliance in §§ 104.125, 105.125, and 106.125, which require the owner or operator to notify the cognizant Captain VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 of the Port and either suspend operations or request and receive permission from the COTP to continue operating. Similarly, in the event of a total system collapse or regional disaster, the COTP will work with the affected organization to restore an access control system as expeditiously as possible. The following examples provide illustrations relating to scenarios involving the failure of an access control system: Example: A facility using TWIC readers at five access points suffers equipment failure of TWIC readers at two of those access points. The facility would still be able to permit unescorted access through the remaining three access points. Unescorted access could also be granted using portable TWIC readers at the two affected access points immediately in accordance with the FSP. The facility would be required to notify the COTP that this equipment failure took place but could continue operations using the remaining TWIC readers. Example: A computer virus causes a facility’s PACS to become completely inoperable, but the FSP contains an alternative where access is controlled through the use of portable TWIC readers, compliant with § 101.520, at each access point to secure areas. The facility would be required to notify the COTP that such a failure of the PACS had occurred, but could continue operations uninterrupted by using the portable TWIC readers. Example: A computer virus causes a facility’s PACS to become completely inoperable, and the FSP does not contain an alternative means of conducting electronic TWIC inspection. The owner or operator could request permission from the COTP to conduct visual TWIC inspections for a limited time until the PACS is operational. Grants of unescorted access to secure areas would have to be suspended until such permission was granted by the COTP. Multiple commenters suggested that in the event that a TWIC reader malfunctions, a facility should be immediately able to continue to process workers using an alternative means defined in a security plan, rather than requesting approval from the COTP to do so. One commenter also suggested that an after-the-fact review by the Coast Guard could be used in such circumstances. We note that the proposed text of § 101.535(c) in the NPRM did not propose to require COTP authorization to allow continuing operation for a period of 7 days, so we are unsure of the provision to which the commenter may be referring. Nonetheless, the final regulatory text allows a facility to immediately continue to process workers using an alternative means as defined in an approved security plan as required by PO 00000 Frm 00017 Fmt 4701 Sfmt 4700 57667 §§ 104.260(c) and 105.250(c) without additional COTP approval. One commenter suggested that the Facility Security Officer (FSO) should be able to determine if there are mitigating circumstances that need to be implemented for a temporary time frame. In such a case, the commenter suggested that the facility would conduct visual identification verification in lieu of electronic TWIC inspection. We disagree with this suggestion, for the reasons described above. The commenter also requested that the COTP be able to waive TWIC requirements in certain circumstances. We note that the COTP has the power to waive requirements or impose alternative equivalent measures generally. One commenter requested clarification on procedures to be used if TSA’s Web site is inaccessible and they are unable to access updates to the CCL. In general, the owner or operator of an access control system is required to download the TSA-supplied list of cancelled TWICs (currently, the CCL) periodically, depending on the MARSEC level, pursuant to § 101.525 of this final rule. However, if the problem with downloading the list is out of the operator’s control, such as the TSA Web site being down for an extended period of time, we would consider it acceptable to continue to operate the access control system by using the most recent version of the list available. e. Requirements for Varying MARSEC Levels In the NPRM, we proposed requirements for Risk Group A vessels and facilities that would vary based on the MARSEC level. MARSEC levels are set to reflect the prevailing threat environment of the maritime transportation system, including ports, vessels, facilities, and critical assets and infrastructure located on or adjacent to waters subject to the jurisdiction of the United States. Specifically, we proposed to require that at MARSEC Level 1, during the card validation process, a TWIC must be checked against a version of the list of cancelled TWICs that is no more than 7 days old. However, at higher MARSEC levels, we proposed that the version of the list used to conduct the card validity check be no more than one day old. Several commenters responded to this issue, and offered remarks relating to the use of MARSEC levels overall. One commenter agreed with the Coast Guard’s proposal to require, at a minimum, weekly updates of the CCL at MARSEC Level 1 and daily updates of the CCL at higher MARSEC levels. E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 57668 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations Another commenter stated that we did not adequately clarify how different MARSEC levels would interact with Risk Groups A, B, and C. In response, we note that vessels and facilities that were proposed to be classified as Risk Groups B or C are not affected by this final rule, and that MARSEC interacts with Risk Group A as described in § 101.525. We have moved the MARSEC level requirements to this separate section to improve clarity. Several commenters suggested that electronic TWIC inspection should only consist of card validation and card authentication at MARSEC Level 1, and that the Coast Guard should provide the flexibility for them to use electronic TWIC inspection for biometric matching purposes at higher MARSEC levels, or require it only at those levels. Other commenters recommended that electronic TWIC inspection should only be required once per day at MARSEC Level 1, with additional measures, such as full electronic TWIC inspection or random spot checks, implemented only at higher MARSEC levels. One commenter recommended that electronic TWIC inspection be used only at higher MARSEC levels, with visual TWIC inspections performed the rest of the time. We disagree with these suggestions. We believe that Risk Group A vessels and facilities should be secured at all times, not just at rare moments of heightened alert, and that biometric identification, one of the TWIC’s strongest security features, should be used regularly. Based on the experience with the pilot, we also believe that consistency in electronic TWIC inspection processes is important, as varying use of security features can create confusion that can hinder operations. One commenter suggested that the CCL should be updated daily at all MARSEC levels, not just at MARSEC Levels 2 and 3. Similarly, one commenter stated that the CCL should be continually updated at all times. The commenter stated that once an automated method is established to do this, there is no additional cost associated with the increased frequency. While we do agree that, if automated, it is simple to update the list of cancelled TWICs, we note that not all operators use an automated system at this time. While we realize that some larger operations can set up automatic updates of the list, other operations may need to conduct such updates manually. In our RA, we calculated that it takes 30 minutes to update the CCL. For that reason, we have only required in 33 CFR 101.525 that the list of cancelled TWICs be updated daily during periods of VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 heightened risk according to the specified MARSEC level. We note that the required periods to update the list are considered minimum requirements, but operators are free to update more often if desired. One commenter asked if electronic TWIC inspection requirements should be applied to Risk Groups B and C at higher MARSEC levels. We do not believe it should. This would require those vessels and facilities to purchase and install equipment for electronic TWIC inspection for use during those periods of heightened alert, dramatically increasing the costs of the rule for what we believe is, at this time, comparatively little corresponding benefit. Furthermore, changing electronic TWIC inspection procedures at irregular and long-spaced intervals can cause confusion that could impair operations. 4. Recordkeeping Requirements In the NPRM, the Coast Guard proposed specific recordkeeping requirements relating to the use of TWIC readers in vessels and facilities. These proposals, in proposed §§ 104.235(b)(9) and 105.225(b)(9), specified that owners or operators must keep records of each individual granted unescorted access to a secure area, which would include the FASC–N, date and time that unescorted access was granted, and the individual’s name (if captured). The NPRM also proposed to require that owners or operators keep documentation demonstrating that they had updated the CCL with the required frequency. The NPRM proposed a 2-year minimum retention time for such records, and specified that TWIC reader and PACS readers were sensitive security information (SSI), protected under 49 CFR 1520. We received several comments on the subject of recordkeeping, which are discussed below. Many commenters suggested that the 2-year recordkeeping requirement was too long. One commenter supported the 2-year recordkeeping requirement, although noted that a shorter period would not be objectionable if the 2-year requirement was deemed overly burdensome or unnecessary. Another commenter suggested the period was an issue of concern, and that the Coast Guard should provide the rationale behind the requirement to retain records for 2 years rather than any other amount of time. The same commenter added that the argument for consistency with other recordkeeping requirements did not justify the burden of a 2-year requirement, although the commenter did not suggest an alternative PO 00000 Frm 00018 Fmt 4701 Sfmt 4700 timeframe. One commenter recommended that the records be retained for only 30 days, noting that this would be less burdensome. In this final rule, as explained in more detail below, we are maintaining the 2year timeframe for record retention as we do not believe it is unduly burdensome or unnecessary. We also disagree with the commenter that consistency with all other MTSA-related records is an insufficient rationale for requiring records to be kept for a 2-year period. We believe that if differing records were required to be kept for varying amounts of time, it would needlessly complicate the storage of those records and potentially add additional expenses. One commenter stated that the 2-year retention period presents opportunities for the information to be mishandled or misused, and thus should be shorter, although no specific timeframe was suggested. While we realize that storing data for any period of time can result in misuse or mishandling, we note that the information is protected as SSI, and thus is subject to comparatively strict usage and storage controls. We believe that the risk of misuse or mishandling of the information is far outweighed by the security value of collecting and storing the data for use in security investigations. The commenter also stated that a shorter window would provide law enforcement sufficient data to assist in security investigation, but no alternative window was suggested nor supporting information supplied. Without additional information, we are not deviating from the 2-year period proposed in the NPRM and used in all other MTSA-related recordkeeping requirements. This commenter also stated that 46 U.S.C. 70105(e) implies that information gathered by a TWIC reader from a worker’s card must not be shared with an employer or otherwise publicly released. We do not believe that this characterization is correct. 46 U.S.C. 70105(e)(1) reads as follows: ‘‘Information obtained by the Attorney General or the Secretary under this section may not be made available to the public, including the individual’s employer.’’ This restriction only applies to information obtained by the Attorney General or the Secretary, and includes information received by the Coast Guard. The information generated by electronic TWIC inspection is obtained by a private entity (the facility or vessel owner or operator) to whom the restriction in 46 U.S.C. 70105(e)(1) does not apply. However, and as the commenter noted, some information collected by E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations the TWIC reader or PACS is considered SSI, and is thus protected from unauthorized disclosure under 49 CFR part 1520. The commenter recommended that the Coast Guard consider all electronic reader records, whether of an individual or of an aggregated group, be restricted to security use only and explicitly forbidden to be used in labormanagement issues (such as establishing hours worked or reporting criminal activity). Not all electronic reader records qualify as SSI and thus some information concurrently collected during electronic TWIC inspection can appropriately be used by an owner/ operator for non-security but still legitimate purposes without violating 49 CFR 1520. The preamble of the NPRM contains clear guidance regarding the treatment of certain information collected by electronic TWIC inspection. In that document, we clearly stated that ‘‘[w]e consider a TWICholder’s name and FASC–N to be SSI under 49 CFR 15.5.’’ We went on to explain that ‘‘to the extent that a PACS contains personal identity [including the FASC–N] and biometric information, it contains SSI, which must be protected in accordance with 49 CFR part 15.’’ 37 However, an important aspect of this final rule is that it allows electronic TWIC inspection to be integrated with a facility’s PACS, which serves many other purposes beyond security and contains non-SSI information. For example, PACSs are legitimately used to restrict access for non-security purposes (such as private or dangerous areas) and to help establish the hours worked by employees. Owners and operators of facilities have valid uses for the nonprivate information not covered in the SSI regulations but still collected by a PACS regarding the location of personnel on their property. One commenter requested specific information regarding the requirements established for owners or operators to secure the privacy of individual cardholders. We note that we have not established any new requirements in this rule for such safeguarding because the SSI requirements are already sufficiently comprehensive. See 49 CFR part 15 for regulations covering restrictions on disclosure, persons with a need to know, marking, consequences of unauthorized disclosure, and proper destruction of SSI. The Coast Guard weighed privacy and security concerns in the development of this requirement. To minimize the amount of personally-identifiable information transferred from the TWIC to the TWIC reader, TWIC readers are specifically designed to only collect the minimum amount of information necessary to assist in access control and maritime security. Owners and operators who collect and maintain protected data from electronic TWIC inspections cannot share this information outside of their vessel or facility. The only allowable sharing is back to the TSA or to the Coast Guard for auditing or law enforcement purposes, or to assist with customer redress.38 Owners and operators are also bound by the restrictions on disclosure of SSI.39 Unauthorized disclosure of SSI is grounds for a civil penalty and other enforcement or corrective action by DHS, and appropriate personnel actions for Federal employees. Corrective action may include the issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure, or of an order to cease future unauthorized disclosure. Two commenters suggested that SSI requirements should not apply to electronic TWIC inspection records if no personally-identifiable information is recorded (i.e., only the FASC–N, date, and time of the transaction is recorded). We note that pursuant to 49 CFR 1520.5(b)(11)(i)(A), SSI includes identifying information of certain transportation security personnel, which includes ‘‘Lists of the names or other identifying information that identify persons as . . . having unescorted access to . . . a secure or restricted area of a maritime facility, port area, or vessel.’’ This information is specifically addressed in the recordkeeping requirements of this final rule. For example, § 105.225(b)(9) states that the TWIC Reader or PACS system must capture the ‘‘FASC–N, date and time that unescorted access was granted; and, if captured, the individual’s name.’’ If such information was captured, it would be considered SSI. Commenters also suggested additional information that could be collected during electronic TWIC inspection. One commenter suggested that an electronic TWIC reader transaction should also include an identifier for the specific electronic reader device, and if it is a portable electronic reader, an identifier for the operator of the device. The commenter suggested that this information would enhance the usefulness of an audit trail. While we see that there could be some value in having this information recorded, we 38 See 37 78 FR 17806–7. VerDate Sep<11>2014 19:12 Aug 22, 2016 39 See Jkt 238001 PO 00000 49 CFR part 1520. 49 CFR 15.9(a)(1). Frm 00019 Fmt 4701 Sfmt 4700 57669 believe that it would be overly complex to add this information into the suite of recorded information at this time, and the value of such information would not be worth the additional cost. We note that such information might be gathered from other sources even without a requirement to collect it in this final rule. Nonetheless, should we reconsider the scope of data collection for electronic TWIC inspection in future rulemakings, we will consider this suggestion. Two commenters recommended that recordkeeping requirements should be extended to situations where an electronic TWIC inspection is not used, such as visual TWIC inspections, RUA, and escorted access. One commenter suggested that without recordkeeping requirements for visual TWIC inspection, there is no incentive—other than avoiding the consequences of being caught—to actually conduct visual TWIC inspections. We disagree with these comments. A recordkeeping requirement for visual TWIC inspections would mean that each owner or operator would need to record information on each TWIC inspection. We would need to demonstrate that the cost of such a requirement is justified before imposing it on the regulated population. In that regard, we note that in 2013, the Coast Guard conducted 12,171 inspections at MTSA-regulated facilities for compliance with the regulations in 33 CFR part 105. As part of those inspections, Coast Guard personnel spot-checked 52,708 TWICs, finding a validity rate of greater than 97 percent. In light of the high validity rate, we do not believe that a recordkeeping requirement for visual TWIC inspections is appropriate or necessary. One commenter also suggested that there should be recordkeeping requirements for when a person is granted unescorted access through the ‘‘special circumstances,’’ described in § 101.550 of the final rule, such as if he or she had reported their TWIC as lost or stolen. In the NPRM, we did not propose any requirements that records be kept for transactions that do not make use of electronic TWIC inspection. While such a suggestion is outside the scope of this final rule, we will consider it in future regulatory actions. Furthermore, we are not creating new requirements for visual inspections in this final rule, including any recordkeeping requirements. This final rule pertains to requirements for electronic TWIC inspection. Requirements pertaining to other means of access, including access granted through visual TWIC inspection or escorted access to a secure area, are E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 57670 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations outside the scope of the final rule. We do note that electronic TWIC inspection is a prerequisite for RUA, and thus a record is created when that transaction occurs. However, due to the nature of RUA, no additional records are kept outside of the electronic TWIC inspection transactions. Such recordkeeping would be burdensome and defeat the purpose of RUA. One commenter suggested that the lack of criteria or specificity as to what the required records should contain severely limits their efficacy. We believe that the NPRM was clear on what records are required to be kept, but we will discuss them here in greater length. Specifically, a record should be kept of each instance in which a person is granted unescorted access to a secure area. This record must contain the FASC–N of the TWIC issued to the person granted unescorted access. If the TWIC reader or PACS captures the individual’s name, the name associated with the TWIC must also be part of the record. Finally, the record must include the date and time the person was granted unescorted access (the time can be rounded to the nearest minute; it is not required that the precise second that access was granted be captured, although it is acceptable to be more precise). As noted in the NPRM, ‘‘we allow individual regulated parties to determine the best method and manner of complying with the recordkeeping requirements.’’ 40 The commenter also requested additional justification for the 2-year period, stating that neither the argument for consistency nor the argument for law enforcement justify the length of time to hold records. As stated in the NPRM, the timeframe was designed, in part, for consistency with existing securityrelated and other recordkeeping requirements applicable to vessels and facilities, and we note that all other security recordkeeping requirements in the affected sections are subject to a 2year retention period. In response to the commenters who requested additional justification, we would add that investigations of TSIs can involve analysis of data that stretches back for that amount of time, and we want to ensure that any historical data that could be useful is available. We believe that a 2-year period is an appropriate amount of time to ask owner operators to store data to ensure that no investigation is limited due to the unavailability of relevant data. We continue to believe that a uniform timeframe for recordkeeping requirements, when practicable, 40 78 FR 17806. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 provides the most efficient regulatory system, and that the costs of storing data are minor compared to the security benefits provided. The commenter also referred to the 2013 GAO report, noting its concern that the TWIC Pilot Program had difficulties collecting accurate, consistent data from the pilot sites.41 While we are aware of the GAO’s criticisms of the TWIC Pilot Program, we do not believe those data collection concerns are relevant to the data collection proposed by the implemented electronic TWIC inspection regulations. Beyond the fact that both involved data collections, the nature and uses of the data collected in the two programs are very dissimilar. For example, among many other items that related to the overall operation of the facilities at issue, the Pilot Program collected data on the number of people using TWIC readers, the amount of time taken per transaction, and the failure rates for transactions. These are very different data than collected by electronic TWIC inspection, which collects items such as the FASC–N. The data collected by electronic TWIC inspection is narrowly tailored to assist the Coast Guard and other law enforcement agencies in investigating TSIs, and the criticisms of data collection on the Pilot Report are not analogous. One commenter stated that the recordkeeping requirements proposed in the NPRM would create a large amount of data and may need to be stored in a media that is not immediately accessible. The commenter requested that the final rule allow a reasonable amount of time to retrieve and produce the electronic records when requested. We agree with the commenter that a reasonable amount of time will be permitted to produce any requested records. This final rule deals only with recordkeeping requirements; it does not specify a timeframe for record retrieval. One commenter requested clarification of a specific situation: a Port Authority operates a cruise terminal which uses an FSP, but when a cruise ship is in port, the cruise security line operates under its own FSP. The commenter asked who would be responsible for maintaining the records. Based on the information described in this situation, the owner or operator of the TWIC reader or PACS system conducting the electronic TWIC inspection would be responsible for 41 ‘‘Transportation Worker Identification Credential: Card Reader Pilot Results Are Unreliable; Security Benefits Need to Be Reassessed’’ (GAO–13–198) is available in the docket by following the instructions in the ADDRESSES section of this preamble. PO 00000 Frm 00020 Fmt 4701 Sfmt 4700 maintaining the required records of those transactions. However, we note that recordkeeping requirements for any particular facility would be described in the FSP and that different situations may yield different results, but that these issues would be resolved during approval of the FSP. Similarly, another commenter described a scenario where a private security company and a public entity share a facility. The commenter asked if the entities would need to share records. In response, we note that there is no requirement to share records, and that the owner or operator of the TWIC reader or PACS conducting the electronic TWIC inspections is the entity required to keep the records. Which entity is responsible for recordkeeping should also be addressed in the FSPs. One commenter requested that, if a non-Risk Group A facility were to use electronic TWIC inspection on a voluntary basis, they should not be subject to the electronic recordkeeping requirements in proposed § 105.225(b)(9) and (c). Assuming that a facility is using electronic TWIC inspection on a voluntary basis to replace visual TWIC inspection, pursuant to the guidance in PAC 01–11, we disagree. If replacing security personnel with electronic TWIC inspection, then all elements of such an inspection, including recordkeeping requirements, would have to be met. Maintaining the electronic records as required provides additional security and information in case of a security breach in the future. Visual inspection programs are not required to maintain this type of information due to the large amount of time needed to manually enter the same information. C. When To Conduct Electronic TWIC Inspection One of the areas in which the Coast Guard received the most comments on the proposed rule was the issue of when a TWIC must be read. Specifically, the NPRM used language that stated, ‘‘prior to each entry, all persons seeking unescorted access to secure areas [must] present their [TWIC] for inspection before being granted such unescorted access’’ (this language was used in proposed §§ 101.520(a)(1), 101.525 introductory text, and 101.530 introductory text). Many commenters asked for clarification regarding this language, specifically relating to issues of where TWIC readers should be located, and to what specifically ‘‘prior to each entry’’ referred. Despite using identical language in the proposed regulatory E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 text, the requirement for when to perform electronic TWIC inspection is very different for vessels than it is for facilities. With regard to vessels, we stated in the NPRM that ‘‘for vessels, this NPRM proposes to require TWIC readers at the access points to the vessel itself, regardless of whether the secure area encompasses the entire vessel.’’ 42 On the other hand, with regard to facilities, we stated that ‘‘this NPRM proposes to require TWIC readers at the access points to each secure area,’’ 43 which could necessitate a large number of TWIC readers in facilities like passenger facilities, many of which have multiple access points to secure areas within the facility. Similarly, the NPRM RA reflected this information, estimating that each facility might use a number of TWIC readers (passenger facilities, with many access points to secure areas, were estimated to require an average of 16 TWIC readers each), whereas each vessel might only be equipped with one or two, reflecting the fact that they would only be deployed at the entrances to the vessels, not at each access point to a secure area within the vessel. Nonetheless, we recognize the confusion brought on by the proposed language. One commenter, for example, requested a clarification of the reference to ‘‘each entry’’ to a facility or vessel secure area. The commenter noted that passenger vessels and facilities included restricted areas, employee access areas, and passenger areas, and it was unclear from the NPRM where the electronic TWIC inspection requirements would be applied. In this final rule, we have used language that we believe more clearly describes the specific requirements of the rule. We broke the language down into two separate paragraphs, one for vessels (see § 101.535(a)), and one for facilities (see § 101.535(b)), using slightly different language for each. The final regulatory text for facilities now states, ‘‘Prior to each entry into a secure area of the facility,’’ while the final regulatory text for vessels now states, ‘‘Prior to each boarding of the vessel.’’ While the language is slightly modified, we believe it more clearly implements the proposed requirements in the NPRM. 1. Secure, Restricted, Public Access, Passenger Access, and Employee Access Areas In terms of clarifying that an electronic TWIC inspection must be performed prior to each entry into a secure area (for facilities), we believe 42 78 43 78 FR 17803. FR 17803. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 that it is important to clarify the term ‘‘secure area,’’ as well as explain the differences between secure areas and other types of areas on MTSA-regulated vessels and facilities. Many commenters asked questions that indicated the difference between secure areas, restricted areas, employee access areas, public access areas, and passenger access areas was not entirely clear. In this section, we discuss the definitions of these types of areas, given their definitions in 33 CFR part 101, as well as the additional explanation offered in NVIC 03–07 and other documents. The statutory requirement for TWIC readers, stated in 46 U.S.C. 70105(a)(1), requires that anyone granted unescorted access to a secure area of a vessel or facility maintain a valid TWIC. Secure areas are defined in 33 CFR 101.105. The relevant portion of the definition states that ‘‘Secure area means the area on board a vessel or at a facility over which the owner/operator has implemented security measures for access control in accordance with a Coast Guard approved security plan. It does not include passenger access areas, employee access areas, or public access areas.’’ The concept of a secure area is explained in more detail in NVIC 03–07, enclosure (3). Section 3.3b of that document explains that ‘‘for facilities, the secure area is the entire area within the outer-most access control perimeter of the facility, with the exception of public access areas, and encompasses all restricted areas.’’ Similarly, ‘‘for vessels and OCS facilities, the secure area encompasses the entirety of a vessel or OCS facility, with the exception of passenger or employee access areas for vessels.’’ Existing regulations distinguish between the secure area and areas designated as ‘‘restricted.’’ The term restricted area, as defined in existing 33 CFR 101.105, means ‘‘the infrastructures or locations identified in an area, vessel, or facility security assessment or by the operator that require limited access and a higher degree of security protection [than secure areas].’’ NVIC 03–07 also goes into detail explaining the difference between secure and restricted areas, noting that by virtue of the fact that the secure area encompasses the entire facility or vessel (with the exclusion of public, passenger, and employee-access areas), restricted areas fall within this perimeter. Multiple commenters with facilities expressed concerns about the existence of multiple secure areas within any one facility, and what access control measures would be required by this final rule. Other commenters PO 00000 Frm 00021 Fmt 4701 Sfmt 4700 57671 represented both vessels and facilities, but had similar concerns with regard to the differences among secure, restricted, and public access areas. The definitions of secure and restricted areas have implications when determining where to locate electronic TWIC inspection locations on various facilities. These locations would be marked in an FSP or a VSP. Given the requirement that electronic TWIC inspection be conducted ‘‘prior to each entry’’ into a secure area (for facilities), we would anticipate that the inspection points at facilities would be located at the access points to secure areas. For example, in a chemical cargo facility the entire facility may be considered a secure area, as security measures for access control may surround the entire facility. Such a facility would likely only conduct electronic TWIC inspection at the entrance to the facility. Alternatively, a facility might categorize the parking lot as a ‘‘public access area’’ so that employees and visitors can park, and electronic TWIC inspection could be conducted at the access point from the parking lot into the secure area of the facility. We note that a second round of electronic TWIC inspection is not required when passing from a secure area to a restricted area, although we would anticipate other security measures to be in place. For passenger facilities, the majority of the areas may be designated ‘‘public access areas,’’ ‘‘passenger access areas,’’ or ‘‘employee access areas’’ (such as break rooms). In such an instance, electronic TWIC inspection points may only be located at entrances to secure areas such as the pier or FSO’s office. The Coast Guard acknowledges the confusion surrounding this issue, which is why we have included a clarifying revision to 33 CFR 103.505, Elements of the Area Maritime Security (AMS) Plan, in which a parenthetical reference to the TWIC program may create confusion regarding whether TWIC provides access control for secure or restricted areas. This final rule creates electronic TWIC inspection requirements for access to secure areas, and does not address requirements for access control to restricted areas. Finally, we note the concerns commenters had relating to secure areas on water. One commenter noted that the water where barge fleets are located is considered a secure area, but the area was only accessible by boat. The commenter questioned how electronic TWIC inspection could be conducted in such a situation. Similarly, another commenter requested that they be allowed to conduct electronic TWIC inspections on shore before entering E:\FR\FM\23AUR2.SGM 23AUR2 57672 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 barge fleeting areas, as otherwise there would be no way to conduct an electronic TWIC inspection. Another commenter noted that the only ‘‘access point’’ into such secure areas may be a towing vessel with the dedicated purpose of guarding the area. These commenters raise important issues as to how we would apply the electronic TWIC inspection process to secure areas on water, such as barge fleeting facilities. Upon consideration, we do not believe that requiring electronic TWIC inspection prior to entering such areas would be practical, as there is no particular access point to such an area that can be controlled by a TWIC reader. Electronic TWIC inspection would instead be required at the barge fleeting facility’s shore side location. Many commenters representing vessels were concerned about a situation involving a passenger vessel (potentially in Risk Groups B or C) with multiple secure areas and no one standing watch at the entrances to each secure area. We note that while the electronic TWIC inspection requirements are different for vessels than for facilities, the definitions of secure areas and restricted areas are similar. On non-passenger vessels, generally the entire vessel is considered a secure area. Certain areas within the vessel may have higher levels of security, and those would be considered restricted, which again are not impacted by this final rule. On passenger vessels, while security measures would still encompass the vessel, only certain areas would be considered secure, as passenger access areas and employee access areas are excluded from the definition of secure areas. As described below in Section V.C.2 of this preamble, because electronic TWIC inspection on vessels is only conducted when boarding the vessel, the exact location of secure and restricted areas on a vessel would not affect the placement of electronic TWIC inspection points. a. ‘‘Prior to Each Entry’’ for Risk Group A Facilities In this final rule, we are finalizing without change the proposed requirement that electronic TWIC inspection is required prior to each entry into a secure area of a Risk Group A facility. Similarly, we are finalizing the proposed requirement that electronic TWIC inspection is required prior to each entry onto a Risk Group A vessel. While some commenters objected to this policy, we believe that it represents the best balance of security and practicability at this time. Furthermore, we believe that many VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 objections to the policy expressed by industry are addressed by clarifying that the new requirements apply only to Risk Group A vessels and facilities, and that vessels and facilities not in this group have no new requirements in this final rule. In this section, we address comments specifically related to Risk Group A facilities. Questions for Risk Groups B and C, as well as questions for vessels, are discussed in other sections of this preamble. Several commenters requested guidance related to operations conducted under PAC 08–09, change 1. That document allows owners and operators of a vessel or facility to use a local access card to grant unescorted access to secure areas, assuming that the local access card is tied to a valid TWIC and that verification (visual or electronic) of the local access card is conducted each time access is granted to a secure area. Pursuant to PAC 08–09, TWICs needed only to be validated once every 24 hours. However, PAC 08–09 is only valid until the Coast Guard publishes a final rule requiring the use of TWIC readers as an access control measure.44 Because this final rule establishes electronic TWIC inspection as a requirement for Risk Group A facilities, the guidance in PAC 08–09 will no longer be valid with respect to those facilities upon the effective date of this rule. Because there are no electronic TWIC inspection requirements for Risk Groups B and C, PAC 08–09 remains in force for those facilities. We intend to update PAC 08–09 before the effective date of this final rule. We note that while PAC 08–09 will no longer be valid for Risk Group A facilities, the flexible performance requirements of this final rule will continue to allow access using local access or PACS cards, assuming the PACS is able to perform the electronic TWIC inspection requirements of biometric identification, the card validity check, and card authentication. While many commenters requested that Risk Group A facilities be permitted to continue to follow the guidance in PAC 08–09 (some of whom suggested that it could be augmented by a daily card validity check), we are not granting that request. Electronic TWIC inspection is a more secure system than that used under PAC 08–09 for a variety of reasons, but most distinctly because it performs a biometric identification each time a person is granted unescorted access to a secure area, whereas the system described in the PAC 08–09 does not. Biometric identification provides a higher level of certainty that an 44 PAC PO 00000 08–09, change 1, p. 2. Frm 00022 Fmt 4701 Sfmt 4700 individual is an approved TWIC-holder than visual identification. One commenter suggested that the purpose of TWIC is for a worker to be vetted, and that TWIC should not be used as an access control system, noting that it is up to the owner of the secure space to determine which TWIC-holders are granted unescorted access. While we agree that one of the benefits of TWIC is that it ensures an individual has undergone a background check, we disagree that vetting is the only purpose of a TWIC. Congress mandated that the TWIC contain the biometric identification of the TWIC-holder. Furthermore, Congress explicitly required that the Coast Guard ensure that only individuals who hold a TWIC be granted unescorted access to secure areas of MTSA-regulated facilities in 46 U.S.C. 70105(a)(1). We conclude, therefore, that it is the clear mandate of Congress for this biometric identification to be used to ensure that only TWIC-holders are granted unescorted access to secure areas of Risk Group A vessels and facilities. Using this function of the TWIC for identification verification purposes will enhance the security afforded by the TWIC program in the highest-risk areas. Other commenters expressed the opposite view, arguing that the Coast Guard was wrong to limit the requirement of electronic TWIC inspection to Risk Group A vessels and facilities only. Multiple commenters suggested that the proposal to limit the use of electronic TWIC inspection to Risk Group A vessels and facilities deviated from Congress’ intent in developing the TWIC program, and that to conform to the intent of Congress, we should have extended the mandate to perform electronic TWIC inspection to Risk Group B as well. Other commenters noted that in the ‘‘findings’’ section of the MTSA statute (Pub. L. 107–251, 101(11)), Congress found that ‘‘[b]iometric identification procedures for individuals having access to secure areas in port facilities are important tools to deter and prevent port cargo crimes, smuggling, and terrorist actions.’’ The commenter argued that to be responsive to Congress, TWIC cards should not be used primarily as a ‘‘flash pass,’’ but should be used more often as biometric identification tools. The Coast Guard believes that the requirement instituted in this final rule represents a reasoned implementation of electronic TWIC inspection. As analyzed in the NPRM and associated preliminary RA, we believe the vessels and facilities in Risk Group A are at much greater risk than other MTSAregulated vessels and facilities. E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations Electronic TWIC inspection has a high utility in deterring and mitigating certain threats to these targets. Given the costs in infrastructure and operational needs associated with electronic TWIC inspection, as shown in the TWIC Pilot Program and in the Coast Guard’s regulatory analyses, we do not believe that electronic TWIC inspection should be extended to other vessels or facilities at this time. Information and experience gained through the implementation of Risk Group A vessels and facilities will, however, help to determine whether and how the electronic TWIC inspection program should be expanded in the future. Several commenters argued that the requirement to undergo electronic TWIC inspection prior to each entry into a secure area of facility was overly burdensome and unnecessary. One commenter stated that the Coast Guard does not understand the day-to-day operations of passenger vessels and facilities, and that only small areas are secure and restricted, requiring a TWICholder to move in and out of these areas multiple times per day. We disagree with this statement, and note that the NPRM and the NPRM RA repeatedly affirmed that a TWIC reader would be required at each access point to a secure area in a Risk Group A facility. We acknowledge that in cases where employees of a passenger facility move repeatedly from a non-secure area (such as a passenger access area) to a secure area, they will likely have to undergo repeated electronic TWIC inspections. We also note that these facilities already use access control measures to prevent unauthorized persons, including vessel passengers, from entering secure areas, and that this requirement only involves incorporating electronic TWIC inspection into those existing access control measures. Other commenters also made suggestions that would allow for reduced numbers of electronic TWIC inspections for employees that enter and leave secure areas multiple times per day. Several commenters suggested that checking TWICs against the CCL multiple times per day is redundant, as the list is only updated, at most, once per day. These commenters suggested that at lower MARSEC levels, one electronic TWIC inspection per day would be enough, and then a visual TWIC inspection could be used for each subsequent entry into a secure area. We note that electronic TWIC inspection performs much more than just the card validity check, and that there is a need to check that the individual presenting the card is the correct individual presenting an authentic card each time VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 he or she is granted unescorted access to a secure area. For these reasons, a single electronic TWIC inspection should not allow repeated grants of unescorted access to secure areas in Risk Group A facilities. One commenter argued that its security needs would be better met through cross-checking TWICs via its employment, human resources, and internal security systems, and then issuing badges that it has control over. The commenter stated that in that situation, it would have the ability to verify and revoke access as necessary for the security of the facility. With the new flexibility for electronic TWIC inspection in this final rule, such crosschecking using facility-specific identification cards linked to a PACS is possible, as long as the facility’s PACS performs the biometric identification, card validity check, and card authentication procedures required in this final rule prior to each entry into a secure area. One commenter stated that the ‘‘prior to each entry’’ requirement is impracticable for cruise ship terminals. This commenter stated that dozens of porters, stevedores, and shore staff constantly move baggage in and out of secure areas using mechanical equipment such as forklifts and hand trucks, and that requiring electronic TWIC inspection at each entry would be potentially unsafe. We realize that there is a need to balance the requirement to ensure that only TWIC-holders are granted unescorted access to secure areas with the operational needs of a facility. In a situation such as that described by the commenter, an RUA plan could alleviate the burden of repeated and constant electronic TWIC inspections. The RUA option was designed primarily to address the needs of baggage handlers and stevedores, and was developed to facilitate operations such as those described by the commenter where persons must enter and exit a secure area on a continual basis. RUA is described in more detail in Section V.C of this preamble. Several commenters were concerned that the proposed requirement for permanently placed TWIC readers at the access points for Risk Group A facilities offered no flexibility, and could restrict the use of portable TWIC readers as an option at less heavily-trafficked access points. We first note that the NPRM did not specifically require a fixed TWIC reader at all access points, but we assumed that many facilities would use fixed TWIC readers over portable ones at fixed access points for the purposes of analysis. However, we agree with the commenter that the NPRM did not offer PO 00000 Frm 00023 Fmt 4701 Sfmt 4700 57673 enough flexibility, and thus this final rule adds another option for electronic TWIC inspection. Facilities will be able to use fixed electronic readers, portable electronic readers, or a PACS to conduct electronic TWIC inspection, depending on which works best considering their business operations. One commenter raised a concern that a requirement to present a TWIC prior to each entry into a secure area would mean that TWIC-holders would have to carry their cards at all times, thus exposing cards to being damaged in a harsh environment or lost. The commenter recommended that a system be utilized that would allow them to keep their workers’ TWICs in a safe and secure location where, upon request, the TWICs could be retrieved and inspected within a reasonable amount of time. We agree that this could be appropriate in many maritime environments, and thus the flexibility allowed by this final rule would permit such a system. A facility could control access to secure areas using a PACS to conduct the electronic TWIC inspection, thus allowing the TWICs themselves to be maintained in a safe, nearby location, where they could be inspected if necessary. One commenter requested clarification with regard to overall personnel accountability within secured areas. Specifically, the commenter asked if the Coast Guard would require TWICholders to record when they exited a secure area, and if a facility should know who is in a secured area, at all times. In this rulemaking, we did not propose to require personnel accountability in this fashion, nor does the final rule require TWIC-holders to record when they exit a secured area. Another commenter expressed support for not proposing such a requirement in the NPRM. The final rule only requires electronic TWC inspection upon entering a secure area of a Risk Group A facility. With regard to recordkeeping, as discussed above, this final rule only requires that records be kept of individuals that enter the secure area, and of when they entered. This final rule does not require that records be kept of individuals leaving a secure area, nor does it require that records be kept of who is in a secure area at any particular time. b. Recurring Unescorted Access Many commenters requested that the Coast Guard reinstate the concept of RUA that had originally been considered in the ANPRM, but was not proposed in the NPRM. As described in the ANPRM, as part of an RUA plan, the owner or operator of a vessel or facility would conduct an initial biometric E:\FR\FM\23AUR2.SGM 23AUR2 57674 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations match of the individual against his or her TWIC, either at hiring or upon the effective date of a final rule, whichever occurs later. This biometric match would include a verification of the authenticity and validity of the TWIC. Once this check is done, the TWIC would only be used as a visual identity badge, at a frequency to be approved by the Coast Guard in the amended security plan, so long as the validity of the TWIC is verified periodically, ranging from monthly to daily, depending upon Risk Group and MARSEC Level.45 RUA, as described in the ANPRM, would be limited to 14 TWIC-holders per vessel or facility, although it was not clear whether that meant an RUA regime would only be approved if the vessel or facility crew were limited to 14 TWIC-holders, or if 14 people per vessel or facility would be exempted from electronic TWIC inspection procedures that would still be in place for other employees or persons seeking access. The Coast Guard opted not to include RUA in the proposed regulatory text in the NPRM, despite the fact that many ANPRM commenters supported various versions of RUA procedures. In the NPRM, we explained that ‘‘RUA was previously proposed [in the ANPRM] to introduce flexibility and provide relief to vessels otherwise required to use TWIC readers, based on the familiarity that exists between a relatively small number of crewmembers.’’ 46 However, by limiting electronic TWIC inspection requirements to Risk Group A vessels only, and including the vessel crewmember exemption in the TWIC applicability section, we believed we had rendered the need for RUA as a mechanism for regulatory relief unnecessary. One commenter requested clarification about whether the proposed RUA mechanism would apply to facilities as well, or just vessels. While the NPRM did not explicitly discuss the use of RUA for facilities, we did not consider such plans viable. Unlike vessels, facilities regularly receive unfamiliar personnel, such as 45 See sradovich on DSK3GMQ082PROD with RULES2 46 See 74 FR 13362. 78 FR 17804. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 visitors, contractors, and deliveries, and must have a means to ensure those visitors are valid TWIC-holders, regardless of the size of the regular staff. We received several comments in response to the decision in the NPRM not to include an RUA provision. Most commenters recommended that some sort of RUA provision be included in the final rule, although they differed in their interpretations of what, exactly, an RUA plan would entail. Furthermore, multiple commenters laid out specific examples of how RUA could improve operations in several scenarios. These comments are described below. One commenter suggested that an RUA plan for vessel and facility operations, including operations at facilities that service passenger vessels, would require that a TWIC-holder undergo electronic TWIC inspection once when he or she reports for work each day. It was unclear from these comments specifically how this plan would be implemented. If RUA were limited to certain crewmembers or employees, it is unclear how those crewmembers would differentiate themselves from other TWIC-holders who would still be required to undergo electronic TWIC inspection prior to each entry into the vessel or into a secure area of the facility. Furthermore, unless all crewmembers or employees were subject to the RUA plan, it is unclear how such a system would reduce costs, as access control measures would still need to be in place that would need to differentiate between TWIC-holders and non-TWIC-holders, but also differentiate between those TWIC-holders granted RUA and those subject to repeated electronic TWIC inspection. These questions, along with the exemption from electronic TWIC inspection requirements for vessels with low numbers of crewmembers, are the reason that the RUA plan was not proposed in the NPRM, despite being raised in the ANPRM, and we still do not have clear answers to these issues. Several commenters raised the issue of RUA with regard to certain port workers who repeatedly enter and leave secure areas, such as baggage porters at cruise terminals or workers such as PO 00000 Frm 00024 Fmt 4701 Sfmt 4700 stevedores transferring cargo into a secure area. Similarly, one commenter expressed concern about how porters would be able to do their jobs if required to conduct electronic TWIC inspection at each entry into the baggage area. Some commenters suggested that in order to permit workers to efficiently perform their jobs, which may entail entering and leaving a secure area several times an hour, biometric checks should be limited to the beginning of a shift and after extended breaks. The commenter stated that it is not operationally practical to have these workers undergo electronic TWIC inspection repeatedly. We agree that, for narrow classes of vessel or facility employees such as baggage porters, the electronic TWIC inspection requirements could prove particularly burdensome, and that these workers could be accommodated using a limited form of RUA as suggested by the commenter. Some scenarios where this may prove useful include, for example, porters who carry baggage from a curbside check-in area (unsecure) to a baggage storage area (secure) for cruise customers, or forklift operators who transport packages from a loading area (unsecure) to a secure storage area on a vessel or facility. These persons need to travel back and forth across the secure-unsecure boundary repeatedly, and repeated electronic TWIC inspections can be both cumbersome and redundant in these situations. Therefore, to accommodate these situations without compromising security, we have added a limited form of RUA into this rule as § 101.555. The system would operate as follows: a vessel or facility would designate an area as a ‘‘Designated Recurring Access Area (DRAA)’’ in its security plan. As shown in Figures 1 and 2, the DRAA would consist of adjoining secure and unsecure areas, as well as the access gates between them. As long as a TWICholder stayed inside the designated area, he or she could pass between the unsecure and secure portions of the DRAA without having to undergo an electronic TWIC inspection each time he or she entered the secure portion. BILLING CODE 9110–04–P E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations 57675 Figure 1: Designated Recurring Access Area (DRAA): Facility PIER FACE SECURE AREA WITHIN THE FACILITY DESIGNATED RECURRING ACCESS AREA (DRAAI VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 PO 00000 Frm 00025 Fmt 4701 Sfmt 4725 E:\FR\FM\23AUR2.SGM 23AUR2 ER23AU16.000</GPH> sradovich on DSK3GMQ082PROD with RULES2 DELIVERY TRUCK ACCESS Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 BILLING CODE 9110–04–C We have considered the problem of differentiating between those persons granted recurring access and those who must undergo electronic TWIC inspection prior to each entry. Certain restrictions and conditions would be applied to ensure that no unauthorized persons gain access to the secure area through the DRAA. In order to allow recurring access, the Coast Guard is requiring that security personnel be present at the access points to the secure areas where recurring access is used. Although electronic devices, such as TWIC readers or a PACS reader, can be used to control access at other entrances, in an RUA situation the VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 TWIC (or a linked PACS card) is not presented at each entry to the secure area. Instead, the presence of security personnel is necessary to properly control access while allowing the known DRAA participants to pass through repeatedly. An additional requirement for a DRAA is that the entire unsecured area must be visible at all times to the on-site security personnel. This requirement is necessary to ensure that all recurring access participants have undergone the necessary electronic TWIC inspection before entering a secure area. We believe that without this requirement, it might be possible for a non-TWIC-holder to ‘‘talk their way’’ into a secure area by PO 00000 Frm 00026 Fmt 4701 Sfmt 4700 claiming they had already undergone a TWIC inspection, and had merely returned from an authorized break. We note that among various GAO criticisms of the maritime security program, this was one of the means by which GAO investigators were able to bypass security measures. We agree with one commenter that suggested electronic TWIC inspection should be repeated once returning from a break. By requiring recurring access participants to stay within sight of the security personnel or undergo a new electronic TWIC inspection, we can ensure that these types of incidents do not happen. To gain recurring access, a TWICholder would need to undergo E:\FR\FM\23AUR2.SGM 23AUR2 ER23AU16.001</GPH> 57676 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 electronic TWIC inspection, including biometric matching, the first time the TWIC-holder entered the secure portion of a DRAA. This would of course happen at the beginning of a work shift, but would also happen after each time the TWIC-holder left the DRAA for any reason, including administrative reasons, lunch breaks, or even to use the restroom. We have also added a provision that requires at least one electronic TWIC inspection per change of security personnel in order to account for shift changes. We have attempted to make the RUA policy as flexible as possible while still maintaining security. We note that the use of a DRAA is a wholly voluntary option, and that access to secure areas of a vessel or facility may always be accomplished through the procedures in §§ 101.535 and 101.550. Even within a DRAA, only access points that are used for recurring access must be manned by security personnel, so there can be other access points controlled by unmanned means (such as a lock connected to a TWIC reader) for employees who do not need recurring access. Furthermore, an area can be designated a DRAA at certain times. For example, at a cruise ship terminal, a curbside area could be designated a DRAA only during boarding times. This would allow the access points to be secured by unmanned means during other periods when recurring access is not necessary. We also note that a DRAA may be incorporated in a Joint Vessel and Facility Security Plan, allowing an area where employees can cross from a pier to a vessel repeatedly without having to undergo electronic TWIC inspection each time. This can facilitate the loading or unloading of vessels considered secure areas. 2. Risk Group A Vessels We received fewer comments regarding the requirements for electronic TWIC inspection for Risk Group A vessels than for vessels in other Risk Groups. In the NPRM, we discussed the TWIC reader requirements as applied to the Risk Group A vessel population in Section IV.L, ‘‘Physical Placement of TWIC Readers.’’ In that section, we stated that ‘‘[w]e propose to amend 33 CFR 104.265(a)(4) by requiring a vessel owner or operator to place TWIC readers at the vessel’s access points only, regardless of whether the secure area encompasses the entire vessel.’’ 47 We realize that this sentence may have been confusing, as the only proposed modification to § 104.265(a)(4) was to add the sentence 47 78 48 78 FR 17830–17831, Amendatory Instruction 16a 49 We note that the language cited is actually from proposed § 101.520(a)(1), not § 104.265(a). FR 17816 VerDate Sep<11>2014 ‘‘Depending on a vessel’s Risk Group, TWICs must be checked either visually or electronically using a TWIC reader or as integrated into a PACS at the locations where TWIC-holders embark the vessel’’ to the existing requirement that the owners or operator of a vessel must ensure that only authorized TWICholders are granted unescorted access to secure areas of the vessel.48 A clearer citation would have been to § 101.514(a)(1), which contained the proposed requirement that prior to each entry, all persons seeking unescorted access to secure areas in Risk Group A vessels and facilities must present a TWIC. The regulatory text was also unclear about what ‘‘prior to each entry’’ meant, and many commenters believed that it meant prior to each entry into a secure area of the vessel, which was contrary to the stated intent of the preamble. As stated above, in this final rule, we are modifying the electronic TWIC inspection requirements so that they are both more flexible and more performance-oriented than described in the NPRM. In this final rule, we require electronic TWIC inspection rather than the presentation of a TWIC. Furthermore, again as stated above, we are clarifying the language relating to the locations of electronic TWIC inspection. The new language, contained in § 101.535(a), ‘‘Requirements for Risk Group A Vessels,’’ reads ‘‘prior to each boarding of the vessel.’’ We believe that this change should improve the clarity of the regulatory text. The Passenger Vessel Association (PVA) noted the confusion between the preamble and regulatory text, noting in its comments that ‘‘The proposed rule states (proposed § 104.265(a) 49), ‘Prior to each entry, all persons must present their TWICs for inspection using a TWIC reader.’’’ The PVA argued that ‘‘[t]he Coast Guard’s explanatory material in the Federal Register suggesting otherwise cannot override the very clear language of the proposed regulation.’’ We agree that the language is confusing, and have clarified it appropriately. The commenter also recommended that the Coast Guard adopt a version of RUA that would allow a single verification of the TWIC status when the TWIC-holder reports to the secure area for the first time each day. While this was not what RUA, as proposed in the ANPRM, was intended to do, we note that the clarified 19:12 Aug 22, 2016 Jkt 238001 PO 00000 Frm 00027 Fmt 4701 Sfmt 4700 57677 electronic TWIC inspection requirements in this final rule will result in far fewer inspections on vessels than the commenter anticipated. One commenter, who operates as a combined ferry/terminal operator, discussed methodologies to improve security through a ‘‘Combined Security Plan’’ that allowed them to effectively identify risk while allowing their employees to perform their duties in a secure and efficient manner. The commenter suggested that its ferries have multiple points of access from the terminal to the ferry as well as multiple points of access to secure areas within the ferry. The Coast Guard agrees that insofar as security measures between a terminal and ferry can be combined, a combined plan can produce a more effective and efficient security regime than separate plans. Furthermore, secure areas within terminals can be connected to the entrances of ferries. In those instances, where TWIC-holders pass directly from a secure area of the terminal onto a ferry, an additional electronic TWIC inspection is unnecessary. For that reason, we interpret the phrase ‘‘prior to each boarding of the vessel’’ in § 101.535(a)(1) to include the situation in which an electronic TWIC inspection has been carried out prior to boarding a ferry, and the TWIC-holder has not entered an unsecure area in the interim. We believe that such an allowance will reduce the costs of compliance with the electronic TWIC inspection program for combined ferry/terminal operators without compromising security. Several commenters posed questions relating to a situation in which a Risk Group A vessel, such as a ferry, has multiple secure areas separated by unsecure areas, but sole control of its terminal facilities. These commenters asked whether it would be possible to have only one TWIC reader at each terminal facility for both vessel and facility workers. As explained below, such a system could meet the requirements for electronic TWIC inspection. If a worker is granted unescorted access to a secure area of a Risk Group A facility, and remains in the secure area, he or she may board a Risk Group A vessel without a second electronic TWIC inspection. We note that once on board a Risk Group A vessel, a worker does not need to undergo additional electronic TWIC inspections when entering secure areas. One commenter stated that vessels at sea should be required to update the CCL if there are separate and distinct secure areas on board the vessel. We disagree, and note that the requirement for Risk Group A vessels is that E:\FR\FM\23AUR2.SGM 23AUR2 57678 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 electronic TWIC inspections are only performed when the personnel are boarding the vessel, not, like facilities, at each entry into a secure area. Therefore updating the CCL while at sea would not serve any functional purpose. 3. Risk Groups B and C In this final rule, we are completely removing any mention of additional TWIC requirements for vessels and facilities other than those covered under § 101.535, ‘‘Electronic TWIC inspection Requirements for Risk Group A.’’ Many commenters noted the apparent differences between the language on Risk Groups B and C in the NPRM preamble and the proposed regulatory text in §§ 101.525 and 101.530, which pertained to Risk Groups B and C respectively. In the preamble of the NPRM, we stated that we were making no changes to either of those groups. For example, in Section III.E.7.b of the NPRM, ‘‘Risk Group B TWIC Reader Requirements,’’ we stated that ‘‘proposing requirements for Risk Group A only in this NPRM is indicative of our desire to minimize highest risks first. . . .’’ 50 Likewise, in Section III.E.8.b, ‘‘Risk Group C TWIC Requirements,’’ we noted that ‘‘Under current regulations (which would not change under this NPRM) for vessels and facilities categorized in this NPRM Risk Group C, security personnel must visually inspect the TWIC of each person seeking unescorted access to secure areas.’’ 51 Our preliminary RA echoed this language. In that document, we did not include any cost analyses relating to vessels or facilities in Risk Groups B or C. However, as commenters noted, in proposed §§ 101.525 and 101.530, we included language from the ANPRM that contradicted the statements in the preamble that no new requirements were being proposed for Risk Groups B and C. The proposed regulatory text would have required vessels and facilities in Risk Groups B and C to undergo visual TWIC inspection prior to each entry into a secure area. Thus, the practical effect of such a requirement would have been to require security personnel be posted at each entry point, which many commenters argued would dramatically increase the compliance costs for MTSA-regulated vessels and facilities in Risk Groups B and C, contrary to the stated intent of the regulation. The specific comments are described in greater detail below. We received a large number of comments from the owners and operators of passenger vessels that would have been categorized as Risk Groups B and C. These individuals suggested that the proposed regulatory text would impose severe burdens on their operations, burdens that would be extremely costly and produce relatively little in the way of security benefits. The PVA’s comment summed up many of its members’ statements, noting that ‘‘Group B and C passenger vessels and facilities have multiple and widely separated secure areas with large public access areas in between. TWIC-holders move regularly in and out of those spaces multiple times during the day. As a practical matter, this means that in those vessels and facilities, there must be some other person stationed in or outside of each secure area to visually inspect the TWIC and presumably bar the holder from entry if the visual inspection is unsatisfactory.’’ 52 We agree with the PVA that, with regard to passenger facilities, the wording of the proposed regulatory text could have had this effect, but these concerns are moot because we removed the proposed provisions on Risk Groups B and C. Many operators of passenger vessels argued that the requirement to visually inspect TWICs at each entry point into a secure area would be enormously expensive, impracticable, and provide little security benefit. One commenter suggested that the use of existing access control systems on vessels could be used in place of visual TWIC inspection on vessels. One commenter wrote, ‘‘we do not have enough berthing to add 2 additional people that would do nothing but sit at the galley door on opposite shifts and request to see the TWIC card of [the] same person multiple times per day.’’ 53 Another commenter wrote that requiring a visual TWIC inspection at each entry to a secure area on a vessel ‘‘is a bit like asking your brother who lives in your household for his ID whenever he needs to use the restroom.’’ 54 Commenters also argued that needing to present a TWIC to enter an unmanned engine room space could hinder access in an emergency. Many other commenters echoed the substance of these remarks. In this final rule, we hope to clarify that: (1) With regard to Risk Group A vessels, the requirement to undergo electronic TWIC inspection applies only upon boarding the vessel, and (2) there are no new requirements, for either visual or electronic TWIC inspection, or anything else applicable to vessels or facilities outside of Risk Group A in this final rule. The existing 52 USCG–2007–28915–0190, 50 78 FR 17802. 51 78 FR 17803. VerDate Sep<11>2014 19:12 Aug 22, 2016 p. 12. 53 USCG–2007–28915–0139. 54 USCG–2007–28915–0215, Jkt 238001 PO 00000 Frm 00028 Fmt 4701 p. 3. Sfmt 4700 visual TWIC inspection requirements in 33 CFR Chapter I, Subchapter H continue to apply to vessels and facilities outside of Risk Group A. We received similar comments pertaining to Risk Group B and C facilities. Many commenters requested that the final rule should state that approved FSPs using PAC 08–09 practices continued to be allowed for Risk Group B and C facilities. We reiterate that this final rule imposes no changes on the operation of Risk Group B or C facilities; accordingly, such practices will continue to be allowed. One commenter suggested that the guidance permitting voluntary use of TWIC readers, contained in PAC 01–11, be continued for Risk Group B and C facilities. While that guidance is rendered obsolete by this final rule, we note that its contents have been largely incorporated into the final rule as § 101.540, which permits non-Risk Group A facilities to use electronic TWIC inspection procedures in lieu of visual TWIC inspection on a voluntary basis. One commenter recommended that language be added to proposed § 101.525 (Risk Group B) that would allow a PACS card to be used in place of a TWIC at each entry to a secure area. Some commenters noted that the PAC 08–09 practices are significantly less costly than inspecting a TWIC at each entry into a secure area. While the rule imposes no new TWIC inspection requirements on Risk Groups B or C, we follow this suggestion with regard to Risk Group A facilities in the form of increased flexibility for electronic TWIC inspection. One commenter added that this could be coupled with a periodic TWIC check to ensure it is still valid. We note that Coast Guard inspections, conducted at Risk Group B and C facilities, accomplish exactly this check. 4. Miscellaneous Questions Regarding the Locations of Electronic TWIC Inspection In this section, we address certain questions raised by commenters on issues related to the locations where electronic TWIC inspections must take place. Several similar comments asked us to clarify what an ‘‘access point’’ to a secure area is. The commenter provided an example of an alarmed fire escape door that leads to a pier, which is designated as a secure area. In response, we would clarify that an ‘‘access point’’ is any location where personnel access from a non-secure area to a secure area is permitted, in any circumstance, by a facility’s security plan. However, we agree with the commenter that requiring an electronic E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 TWIC inspection in the event of a fire would be unwise. For that reason, we are including language in § 101.535(e), allowing an exemption from electronic TWIC inspection requirements for emergency situations. We believe that this exemption will protect against unauthorized access to secure areas without compromising safety in the event of an emergency response. The commenter also provided an example of a roll-up baggage door, where the porters bring in luggage they collect from guests at the curb in front of a cruise ship terminal. Next to the roll-up door is ‘‘a typical personnel door.’’ The commenter asked if the two doors count as a single access point, or if they are two separate access points, where each door requires its own TWIC reader. Again we note that in this final rule, we are not requiring the installation of TWIC readers; instead the requirement is that prior to being granted unescorted access to a secure area, an individual must undergo electronic TWIC inspection. Thus, two doors to a secure area could be controlled by a single TWIC reader or PACS reader, if permitted in the FSP. The commenter also asked about an area that switches between being secure and non-secure based on the operations taking place there at a given time. In such an instance (and permitted, we assume, by the FSP), when the area is designated secure, persons would need to undergo electronic TWIC inspection before being granted unescorted access. At times when the area was designated non-secure, there would be no such requirement. We would expect the relevant FSP to contain more detail on how such an area would operate. D. Determination of Risk Groups The third major area of comments related to the determination of which vessels and facilities should be placed into which Risk Groups. In §§ 104.263 and 105.253 of the NPRM, we proposed three different Risk Groups, A, B, and C, although there were no differences between the requirements for Risk Groups B and C. The proposed Risk Groups were as follows: Risk Group A: • Vessels certificated to carry more than 1,000 passengers; • Vessels that carry CDC in bulk; • Vessels engaged in towing another Risk Group A vessel; • Facilities that handle CDC in bulk; • Facilities that receive vessels certificated to carry more than 1,000 passengers; and • Barge fleeting facilities that receive barges carrying CDC in bulk. Risk Group B: VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 • Vessels that carry hazardous materials, other than CDC, in bulk; • Vessels subject to 46 CFR chapter I, subchapter D, that carry any flammable or combustible liquid cargoes or residues; • Vessels certificated to carry 500 to 1,000 passengers; • Vessels engaged in towing a Risk Group B vessels; • Facilities that receive vessels that carry hazardous materials, other than CDC, in bulk; • Facilities that receive vessels subject to 46 CFR chapter I, subchapter D, that carry any flammable or combustible liquid cargoes or residues; • Facilities that receive vessels certificated to carry between 500 and 1,000 passengers; • Facilities that receive vessels subject to 46 CFR chapter I, subchapter D, that carry any flammable or combustible liquid cargoes or residues; • Facilities that receive a vessel engaged in towing a Risk Group B vessel; and • All OCS facilities subject to 33 CFR part 106. Risk Group C: • Vessels carrying non-hazardous cargoes that are required to have a VSP; • Vessels certificated to carry fewer than 500 passengers; • Vessels engaged in towing a Risk Group C vessel; • Facilities that receive vessels carrying non-hazardous cargoes; • Facilities that receive vessels certificated to carry fewer than 500 passengers; and • Facilities that receive vessels towing a Risk Group C vessel. Most comments were related to the categorization of vessels and facilities in Risk Group A, with many commenters requesting clarification on how to classify their own facilities, or offering rationales for why vessels and facilities should be categorized differently. As stated in previous parts of this discussion, the NPRM did not propose any additional requirements for Risk Groups B or C, and thus, for purposes of the electronic TWIC inspection requirements, whether or not a vessel or facility is classified as Risk Group A is the only relevant distinction. In this final rule, we have made a number of modifications to the classification of facilities and vessels in response to the comments. The major changes are summarized as follows: • We have changed the crewmember exemption cutoff for vessels from 14 crewmembers to 20 crewmembers, as well as clarified how to calculate the number of crewmembers to apply this exemption. PO 00000 Frm 00029 Fmt 4701 Sfmt 4700 57679 • We have removed the specific reference to barge fleeting facilities from the Risk Group A classification, and now treat barge fleeting facilities like all other MTSA-regulated facilities. • We have eliminated the distinction between Risk Groups B and C. Vessels and facilities are now classified as either Risk Group A or non-Risk Group A. 1. Risk Group A Facilities In the NPRM, we defined Risk Group A facilities in proposed § 105.253(a) as: (1) Facilities that handle CDC in bulk; (2) Facilities that receive vessels certificated to carry more than 1,000 passengers; and (3) Barge fleeting facilities that receive barges carrying CDC in bulk. We developed Risk Group A, along with the other Risk Groups, using a risk-based analysis system that identified which types of facilities were exposed to the most risk in the event of a TSI. This system used the MSRAM to derive a numeric ‘‘consequence’’ for a class of facilities. Once the potential risk to a class of facilities was ascertained, we then determined whether a program of electronic TWIC inspection would provide utility in alleviating that risk. This analysis is described in far greater detail in the ANPRM 55 and the NPRM,56 and we refer interested parties to those documents for a detailed discussion. Several commenters raised issues relating to the fundamental nature of our analysis, arguing that certain factors, such as the geographic location of a facility or its proximity to higher-risk facilities should have been incorporated into our analysis. After considering the comments, we have decided to largely retain the overall structure of how Risk Group A is structured. The basis for the analysis is discussed in Section V.A, above. Several commenters suggested that the MSRAM analysis used by the Coast Guard to determine Risk Group A was flawed, and that a different methodology to determine the Risk Groups should have been employed that would bring more facilities into the Risk Group A category. Many of these commenters recommended that the Coast Guard adopt a risk analysis approach that focuses on area risks or geography, rather than the risks associated with classes of facilities. For example, one commenter recommended that the risk analysis should have included the risk to port operations where the port has minimum channel depth, or for petrochemical facilities that would create a significant impact to 55 74 56 78 E:\FR\FM\23AUR2.SGM FR 13363. FR 17810. 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 57680 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations commodity supplies, or chemical facilities where an attack could have significant environmental consequences. Other commenters recommended that the Coast Guard consider the geographic area surrounding a facility as the most important factor in determining the appropriate Risk Group. Similarly, another commenter stated that the Coast Guard should expand the risk-based concept and aggregate risks to the port area first, before using MSRAM to determine specific risks. In response, the Coast Guard considered a broad range of factors, including geographic location, when determining the Risk Groups. The totality of that analysis identifies the highest risk vessels and facilities. One commenter stated that the Port of New York is the nation’s highest-risk port, suggesting that TWIC inspection should also be used to mitigate risks associated with criminal activity such as drug trafficking, cargo theft, and alien contraband smuggling. The commenter suggested that TWIC readers should be required at more facilities in that port than are required under this rule. We are not requiring electronic TWIC inspection as a crime prevention measure, and we reiterate that the primary purpose of requiring electronic TWIC inspection is not to prevent crime, but to prevent TSIs at high-risk vessels and maritime facilities. One commenter stated that MSRAM does not contain any data that identifies TWIC readers as a threat mitigation tool, and that assumptions must have been made that would connect the MSRAM data with mitigation scenarios based on TWIC readers. In response, as emphasized throughout this preamble, an electronic TWIC reader is a threat mitigation tool because it provides identity verification, card authentication, and card validity checks more effectively than visual TWIC inspection. In the MSRAM context, a target’s ‘‘vulnerability’’ is defined as the probability that an attack will be successful. MSRAM measures target vulnerability as a product of three factors: (1) Achievability, which assumes the absence of all security measures and then factors in the degree of difficulty delivering an attack on a target; (2) Target Hardness, which considers the probability that the attack focal point would fail to withstand the attack; and (3) System Security, which considers the probability of a security strategy in place to successfully thwart an attack before it occurs. Electronic TWIC inspection is a component of System Security. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 Some commenters argued that the relative locations of Risk Group A and B facilities should factor into the risk analysis. One commenter stated that the NPRM did not consider a scenario where a Risk Group B facility is immediately adjacent to a Risk Group A facility. The commenter suggested that a terrorist could use a counterfeit TWIC to gain access to the Risk Group B facility (which would conduct only a visual TWIC inspection), and then use the location to mount an attack on the adjacent Risk Group A facility. Other commenters echoed the sentiment, stating that a Risk Group B facility that is immediately adjacent to a Risk Group A facility should not automatically have less stringent requirements that could become a threat vector. While we agree that this specific scenario was not used in our analysis, we also do not believe that it would be appropriate to consider. We note that in this scenario, all the counterfeit TWIC accomplishes is to allow the adversary to get to the perimeter of the Risk Group A facility. If the Risk Group B facility was not located in the adjacent location, then it would be even easier for the terrorist to get to the aforementioned perimeter. Electronic TWIC inspection is designed to thwart access to the secure area of Risk Group A facility, not to prevent access to the secure perimeter. One commenter recommended that large container terminals should not be classified as Risk Group B, but rather as Risk Group A. The commenter stated that a disruption of operations at any one of these facilities could have a significant impact on the economy, and that the Coast Guard should have used secondary consequences in its economic analysis. While we agree that a disruption of a large container terminal could have significant economic impacts, we disagree with the suggestion that container facilities should be automatically classified in Risk Group A. As stated elsewhere in this preamble, MSRAM considers scenarios associated with threats to container facilities. However, for the purpose analyzing electronic TWIC inspection, we limited our consideration to attack scenarios that require physical proximity to the intended target. Controlling access to a target is an essential component of security from such attack scenarios because access control helps to detect and perhaps delay the attackers before they reach the target. Threats to cargo containers are typically not attack scenarios that require physical proximity to the intended target. Accordingly, electronic TWIC PO 00000 Frm 00030 Fmt 4701 Sfmt 4700 inspection would not mitigate such threats. Such threats are addressed in existing Coast Guard regulations (33 CFR 104.275 and 105.265) that specifically require owners and operators to implement detailed security measures relating to cargo handling on vessels and at facilities. a. Alternative Security Programs One commenter, representing the American Gaming Association, recommended that instead of the risk categorization approach proposed in the NPRM, the Coast Guard should adopt a case-by-case approach to classification of facilities participating in its Alternative Security Program (ASP). This commenter noted that the security measures adopted on these vessels and facilities can be more restrictive than Coast Guard regulations require, and that those vessels and facilities should not be required to use TWIC readers. Furthermore, the commenter stated that the TWIC reader technology may be duplicative with systems onboard gaming vessels. We disagree, for the reasons stated above, with using a caseby-case approach to risk categorization rather than the Risk Group system proposed in the ANPRM and NPRM. However, we note that several suggestions that the commenter made are permitted by this final rule. If the existing security system on a vessel or facility is duplicative of a TWIC reader (i.e., is capable of conducting a card authentication, card validity check, and biometric match), then a dedicated TWIC reader would not be required. We believe that a PACS can be modified to meet these requirements with relatively little additional costs, as discussed in the accompanying RA. Similarly, several commenters stated that the combined vessel and facility security plan, as adopted in the PVA ASP, should permit facilities to be exempt from electronic TWIC inspection requirements if the vessels they service are exempt. For reasons discussed below, we disagree. We note that all ASPs, including the PVA ASP, can be used to integrate security between passenger terminals and vessels, but that the ASP must meet all electronic TWIC inspection requirements in this final rule. b. Determining Risk Group A Facilities Several commenters asked questions or requested clarifications of issues related to whether certain facilities would be classified as Risk Group A facilities. Our thoughts on these specific questions are below: One commenter requested clarification regarding a cruise terminal E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations that handles general cargo (presumably not including bulk CDC) when cruise ships are not present. The commenter asked whether a Risk Group A classification would only apply to a facility when a passenger vessel certificated to carry 1,000 or more passengers was at the facility. In such an instance, movement between Risk Groups would be permissible, if detailed in the FSP in accordance with 33 CFR 105.253(b). One commenter suggested that allowing movement between Risk Groups would be unfair to those facilities that have installed electronic TWIC inspection technology. We disagree, and note that when subject to Risk Group A electronic TWIC inspection requirements, a facility would have to make full and complete use of such technology, and would incur all the costs of installing the technology. One commenter requested clarification that a facility would not be classed as a Risk Group A facility if it handles multiple passenger vessels not in Risk Group A simultaneously. This is correct, a facility (assuming, of course, that does not handle or receive vessels carrying CDC in bulk) would only be classified as Risk Group A if it handles one or more vessels certificated to carry over 1,000 passengers. The relevant risk factor is the presence at the facility of a vessel certificated to carry more than 1,000 passengers. The relevant risk factor is not the mere presence on the facility of more than 1,000 people, which would be a transient event driven by simultaneous arrivals. Several commenters requested clarification of the use of the word ‘‘handle.’’ Proposed § 105.253(a)(1) categorizes facilities that handle CDC in bulk as Risk Group A facilities, but commenters had questions about how to interpret this phrase. These commenters requested clarification on how a facility would be classified if a vessel carrying CDC in bulk were to stop at a facility, but not transfer any of the bulk CDC cargo there. After considering the comments, and to clarify risk groups, we have determined that any facility that handles or receives vessels carrying CDC in bulk will be classified as Risk Group A. While moored at a facility, a vessel must rely on the facility’s security program to adequately secure the interface between the facility and vessel and mitigate the threat of a TSI. For that reason, the facility should conduct electronic TWIC inspection to meet the security needs associated with handling or receiving vessels that carry CDC in bulk. Discussions at public meetings prompted the Coast Guard to clarify the VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 term ‘‘handle’’ as it related to nonmaritime commerce. Specifically, the question was raised whether a facility would be classified as Risk Group A if it was used to transfer CDC in bulk through rail or other non-maritime means. In this situation, such a facility would be considered to ‘‘handle CDC in bulk’’ and would be classified as Risk Group A. This is because the bulk CDC would be on the premises of a MTSAregulated facility, and thus the facility’s access control system would need to be used to mitigate the risk of a TSI. We note that there are provisions where non-maritime activities of a facility can be located outside of the facility’s MTSA footprint. In that situation, where the bulk CDC is not a part of the maritime transportation activities, it may be that a facility could define its MTSA footprint in such a way as to exclude that area. In such a case, the TWIC reader requirements that are being implemented in this final rule would not apply in that area. Several commenters also requested clarification of the term ‘‘in bulk.’’ The term ‘‘bulk’’ or ‘‘in bulk’’ is defined in the Coast Guard’s existing MTSA regulations (33 CFR 101.105) as meaning ‘‘. . . a commodity that is loaded or carried on board a vessel without containers or labels, and that is received and handled without mark or count.’’ Additionally, the term ‘‘bulk’’ is defined in 33 CFR 126.3 as ‘‘. . . without mark or count and directly loaded or unloaded to or from a hold or tank on a vessel without the use of containers or break-bulk packaging.’’ To clarify, the use of hoses and conveyor or vacuum systems would be considered direct loading or unloading and thus involve ‘‘bulk.’’ We have added such language to the definition of ‘‘bulk’’ in § 101.105 to improve clarity. We have also removed the phrase ‘‘on board a vessel’’ from the definition of ‘‘bulk or in bulk’’ to avoid confusion. Specifically, as stated above, a MTSAregulated facility would be classified as Risk Group A if it handled bulk CDC offloaded by a train or other nonmaritime means. A MTSA-regulated facility that handles or receives bulk CDC is determined to be Risk Group A whether or not the facility accepted the bulk CDC from a vessel. Finally, one commenter requested clarification that container terminals do not carry CDC in bulk. While we can clarify that CDC shipped in containers would not be considered bulk CDC, we note that some container facilities may also handle CDC in bulk. Some commenters requested clarification of the term ‘‘receive,’’ in regards to what the requirements would PO 00000 Frm 00031 Fmt 4701 Sfmt 4700 57681 be if a Risk Group A vessel were received by a Risk Group B facility. The term ‘‘receive’’ is used in this final rule only in § 105.253(a)(2), which states that ‘‘facilities that receive vessels certificated to carry more than 1,000 passengers’’ are considered Risk Group A. In this instance, the word ‘‘receive’’ means that the vessel moors or transfers passengers to or from the facility. If there is a need for such a passenger vessel to moor up or transfer passengers at a non-Risk Group A facility, the COTP would need to be contacted to ensure that proper security measures are in place. One commenter asked how Strategic Ports would be classified. A Strategic Port designation, which means the location is used by the military to load equipment, has no direct impact on the electronic TWIC inspection requirements. Individual vessels and facilities will be required to comply with the applicable parts of this regulation based on their specific operations. One commenter asked if facilities that receive vessels certificated to carry more than 1,000 passengers would be classified as Risk Group A if all the vessels the facility received are exempted from the electronic TWIC inspection requirements by virtue of having fewer than 14 crewmembers. The commenter further stated that it is rare that the vessels certificated to carry more than 1,000 passengers ever carry that many, and that there are rarely 1,000 passengers in the facility. Regardless of this fact, pursuant to § 105.253(a)(2), such a facility would be required to conduct an electronic TWIC inspection prior to each entry into a secure area of the facility. We note that neither condition the commenter discussed is grounds for classifying the facility as anything other than Risk Group A. The fact that the vessels are exempt from the electronic TWIC inspection requirement due to their low manning requirement does not grant a TWIC exemption to the facility, for reasons discussed in greater detail below. Furthermore, the fact that the ferries at issue ‘‘rarely’’ carry the number of passengers they are certificated to carry does not change the status of the facility either. Our analysis has shown that the class of facilities that receive large passenger vessels present a heightened risk of a TSI, and that the use of electronic TWIC inspection in such facilities is an effective means to mitigate that danger. We believe that the access control requirements in this rule represent a good balance between costs and security. E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 57682 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations Several commenters were concerned that the dichotomy between electronic TWIC inspections on vessels and facilities could present problems for mariners. One commenter called a situation ‘‘absurd’’ where a ferry terminal, servicing ferries certificated to carry over 1,000 passengers, would be required to meet electronic TWIC inspection requirements, while the ferries themselves would be exempt from those requirements due to their low crew size. We disagree with the commenter’s characterization of the regulations. Ferry terminals that handle large ferries present a risk of a largeconsequence TSI, so much so that we believe that requiring a biometric identification before granting an individual access to the non-passenger areas of the ferry terminal is a warranted security burden. On the other hand, we do not believe that electronic TWIC inspection is necessary to gain access to the ferries themselves, considering that non-TWIC-holding passengers will also have access to the same vessels. Contrary to the commenter’s assertion, we believe it is quite reasonable to only require electronic TWIC inspections when the TWIC-holder is accessing an area where non-TWIC-holders are excluded. As we stated previously, the electronic TWIC inspection requirements are designed in such a way as to only require a burden where the security benefits will be tangible and substantial, which is why they apply as they do. Some commenters suggested that where the presence of, and access to, CDC in bulk can be isolated from areas not containing these products within a large MTSA footprint, the facility should be allowed to limit elevated security measures to the higher-risk area only. This is a subject that was also raised in the NPRM.57 Upon consideration, and given the general flexibility accorded by this final rule, we believe that this suggestion is appropriate. If bulk CDC is contained in a discrete area of the facility, it may be possible to isolate that area from other areas of the facility. Any areas where bulk CDC is transferred, passed through, or stored (permanently or temporarily) would be subject to the electronic TWIC inspection access control requirements. If the owner or operator of a facility were to take this approach, we would still consider the facility a Risk Group A facility. However, the owner or operator would be permitted to delineate in the FSP a portion of the facility as not subject to the electronic TWIC inspection requirements. The FSP 57 78 FR 17797. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 would also have to contain details of how unescorted access to other secure areas is still limited to TWIC-holders. Finally, many commenters presented examples of specific situations where they believed that electronic TWIC inspection in parts or in all of their facilities was inefficient or redundant. With regard to those situations, we reiterate that an owner or operator may apply for a waiver of any requirement the owner or operator considers unnecessary, as provided in 33 CFR 104.130 and 105.130, as appropriate. We have endeavored to tailor these requirements to be as effective as possible, but certain situations must be dealt with on an individualized basis. One commenter in a public meeting asked the Coast Guard to consider an exemption for LNG/LPG facilities not conducting transfer operations. Similarly, this commenter and others requested an exemption for cruise ship terminals when vessels are not present at the terminal. Without specific information, we cannot comment on the likelihood of a waiver, but note that in certain circumstances, facilities can change Risk Groups depending on operational needs. One commenter in a public meeting stated that container facilities should not be considered CDC facilities, and would therefore not be in Risk Group A. Given the definition of ‘‘in bulk’’ provided in 33 CFR 101.105, any CDC being transported in a container (including tank containers) would be considered packaged and thus would not cause the facility to be classified as Risk Group A. We note that if a container facility were also used to transfer or store bulk CDC, it would be considered a Risk Group A facility and thus subject to electronic TWIC inspection requirements. 2. The Crewmember Exemption Does Not Apply to Facilities Many commenters supported the Coast Guard’s proposal to exempt vessels with 14 or fewer crewmembers, but felt that a similar exemption should be applied to facilities with 14 or fewer employees as well. For the reasons described below, we disagree with this concept and are not including an exemption for small facilities similar to the exemption for low-crew vessels. One reason not to expand the electronic TWIC inspection exemption to facilities is due to the specific language of the SAFE Port Act. As stated above, the vessel exemption is predicated on Section 104 of the SAFE Port Act, codified in 46 U.S.C. 70105(m)(1), which prohibits the Coast Guard from requiring the placement of PO 00000 Frm 00032 Fmt 4701 Sfmt 4700 an electronic reader on a vessel unless the vessel has more individuals on the crew that are required to have a TWIC than the number we determine warrants such a reader. No similar mandate exists regarding facilities. Secondly, we believe that the nature of access to facilities is fundamentally different from the nature of access to vessels, and thus the rationale that justifies an exemption for vessels with a low crew count does not transfer to facilities with a low employee count. As stated elsewhere in this preamble, the TWIC serves fundamentally different roles with regard to facilities and vessels, due to the nature of the respective populations. On vessels (with the exception of passenger vessels), everyone on the vessel is generally known to one another, and new persons are generally not introduced to the vessel population while at sea. For this reason, the electronic TWIC inspection requirements for vessels, when applied, require only that the electronic TWIC inspection occur when boarding the vessel, not prior to each entry into a secure area of the vessel (such as an engine room). Conversely, at facilities, the entrance, exit, and egress of persons who are not employees is a regular occurrence; drivers, contractors, pedestrians, mariners, and other nonemployees are on facility grounds regularly. Indeed, truck drivers make up one of the largest populations of TWICholders. For this reason, there are many persons on facility grounds that are not ‘‘known’’ to facility employees, and so additional security measures must be employed to ensure that unescorted access to the secure areas of a facility is granted only to TWIC-holders. For Risk Group A facilities, we believe that the appropriate level of security is to conduct an electronic TWIC inspection of each individual before granting them such access. That is why electronic TWIC inspection at facilities is required ‘‘prior to each entry into a secure area,’’ rather than only at the perimeter of the facility,58 as is the case with vessels. Due to the differences in electronic TWIC inspection requirements, we do not believe an exemption from the electronic TWIC inspection requirements based on a low number of employees is appropriate for Risk Group A facilities. One commenter, in addition to requesting the extension of the low crewmember exemption to facilities, specifically requested that barge fleeting facilities with 14 or fewer people be excluded as well. In this final rule, barge fleeting facilities are no longer a 58 See E:\FR\FM\23AUR2.SGM § 101.535(b)(1). 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations separate class of facilities specifically subject to electronic TWIC inspection requirements. However, barge fleeting facilities are treated as facilities, and are subject to the same electronic TWIC inspection requirements as other facilities. sradovich on DSK3GMQ082PROD with RULES2 3. The Low Number of Crewmembers Exemption The NPRM proposed that, unlike facilities, vessels in Risk Group A are exempt from the electronic TWIC inspection requirements unless they have more than 14 TWIC-holding crewmembers. This exemption was based, in part, on the statutory limit imposed in the SAFE Port Act, 46 U.S.C. 70105(m)(1), which prohibits the Coast Guard from requiring the placement of an electronic reader on a vessel unless the vessel has more individuals on the crew that are required to have a TWIC than the number we determine warrants such a reader. In the ANPRM and the NPRM, we tentatively proposed that this number would be 14 crewmembers, basing our recommendation on an analysis conducted by the Towing Safety Advisory Committee (TSAC). For the final rule, factoring in comments received and assumed risks, we have increased this number to 20 crewmembers. We received numerous comments on the proposal to exempt all vessels with 14 or fewer TWIC-holding crewmembers from the electronic TWIC inspection requirements. In the NPRM, we requested that commenters explain any alternative suggestions and provide available data to support their comments. Comments we received generally fell into two categories. Many commenters suggested different numbers for the exemption threshold, with a fair majority supporting a larger number, thus exempting more vessels from the electronic TWIC inspection requirement. The other main group of commenters requested clarification on how, specifically, we would calculate the crew size of any particular vessel to determine whether a Risk Group A vessel would be exempt from the electronic TWIC inspection requirements. Both items are discussed below. 4. Calculating the Total Number of TWIC-Holding Crewmembers Several commenters raised questions as to how, specifically, the Coast Guard would calculate the number of TWICholding crewmembers on a vessel to determine whether the vessel would be exempt from the electronic TWIC inspection requirements. Upon review, we found that there was some degree of VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 confusion with regard to how this number is determined. We have identified two approaches to calculating the exemption number that may have led to this confusion. One approach would be to calculate the number by counting the total number of persons employed as crewmembers on the vessel. The NPRM’s original determination of 14 crewmembers was calculated using this approach. That number included the Master, Chief Engineer, and three four-person rotating crews. We counted the total number of persons employed as crew, whether or not all of them would serve together simultaneously. The other approach would be to calculate the number by referring to a vessel’s Certificate of Inspection (COI) regarding crew size, which does not contain information regarding multiple crew rotations, but rather just the manning requirements for the vessel. Using that methodology, the same vessel described above, with a Master, Chief Engineer, and several four-person rotating crews would actually have had six crewmembers. As explained more fully below, this final rule adopts the latter approach. Commenters also put forth a number of detailed issues relating to how the number of crewmembers would be determined. One commenter noted that while at any given time during a shift, the total number of required TWICholders aboard will generally be 14 or fewer, during shift changes the number will swell to more than 14. The commenter went on to question the definition of the term ‘‘crewmember,’’ noting that there may be TWIC-holders on board, such as security personnel, who are not members of the marine crew required under the vessel’s COI. The commenter requested that the Coast Guard clarify the scope of the 14crewmember exemption with regard to TWIC-holders who are not members of the marine crew. Similarly, several commenters specifically requested that the Coast Guard clarify that the 14-crewmember threshold only includes the required number listed on the vessel’s COI, and does not include ‘‘persons in addition to the crew,’’ industrial workers, etc. Some commenters recommended that for uninspected vessels, ‘‘required crew’’ should include all personnel assigned to the vessel performing navigation, safety, and security functions. Commenters also asked whether crewmembers included additional individuals such as company representatives, cadets, and contractors. One commenter stated that 46 U.S.C. 2101(21) excludes certain company representatives from being PO 00000 Frm 00033 Fmt 4701 Sfmt 4700 57683 counted as passengers, so they could be counted as crew. Also, in situations where a vessel is forced to carry persons other than crew, such as emergency responders, commenters asked if they would still be subject to the exemption from the electronic TWIC inspection requirement. In response to these comments, the Coast Guard is providing additional detail and explanation regarding this exemption. Based on our own analysis, and on the comments received, we agree with the commenters who suggested that ‘‘crewmembers’’ should include all personnel required to hold a TWIC in the required manning section of the COI (and we note that there are no uninspected vessels subject to MTSA requirements). Other persons in the crew section and the ‘‘persons in addition to the crew’’ section of the COI do not count towards the calculation for total number of TWIC-holding crewmembers. We reached this decision for the following reasons. First, whether a vessel is subject to electronic TWIC inspection requirements should not vary based on transient circumstances, such as whether a company representative is on board, or a crew change causes the number of TWIC-holders on the vessel to temporarily swell and exceed the threshold. Electronic TWIC inspection programs must be incorporated into a security plan and followed consistently. We believe that the stability from having a consistent electronic TWIC inspection process will help serve the goals of the inspection requirements while minimizing the burden on vessels and facilities in Risk Group A. Second, establishing the minimum manning requirement as the threshold number helps to ensure that other manning decisions are not affected by the electronic TWIC inspection requirements. For example, if it were based on the total number of employed crew, irrespective of whether that crew was required for manning the vessel, then some owners or operators of vessels might choose to lower their staffing requirements rather than introduce the new procedures. We received several comments suggesting that certain companies might choose to eliminate staff rather than comply with electronic TWIC inspection requirements. Tying the electronic TWIC inspection requirements to the minimum manning requirements will significantly reduce the risk of this occurring. The minimum manning requirements of a vessel are tied to the intrinsic nature of the vessel, and are not nearly as elastic as the other crewing needs of the vessel. E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 57684 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations 5. Threshold for the Crewmember Exemption Based on the TSAC recommendation, we proposed in the NPRM that the cutoff number of crewmembers that make a vessel exempt from the electronic TWIC inspection requirement should be 14. We specifically requested comments from the public on whether 14 is an appropriate cutoff number, and requested explanations and available data to support any arguments for alternative numbers. We received numerous comments regarding this issue. Some commenters suggested that 14 was an appropriate number, but the majority suggested that it be increased. The PVA and other commenters suggested that the Coast Guard should not have followed TSAC’s recommendation, as not all sectors of the domestic maritime industry have input into that group’s recommendations. The PVA suggested that 20 was a more appropriate number, noting that the largest minimum manning requirement for its members’ vessels was 16. This figure is larger than 14, but not so large that long-time crewmembers would not recognize each other. This figure was suggested as appropriate because it would be a figure developed with the consultation of industry. Similarly, many passenger vessel operators suggested that the exemption threshold be set high enough to exempt passenger vessels. One commenter suggested that the threshold number of 14 did not make sense, and that even with a crew of 20–30 people, it would be impossible for an imposter amongst them to go unnoticed. Another commenter suggested that 40 crewmembers would be a better threshold, arguing that the regulatory compliance costs of electronic TWIC inspection, added to other costs relating to security, were too onerous. After considering all comments, we have decided to increase the number to 20 crewmembers as the figure for determining the threshold number under 46 U.S.C. 70105(m). Considering input received from all areas of industry, we believe it is an appropriate crew size at or under which all crewmembers will be able to quickly identify people who do not have unescorted access to secure areas. We realize that this may be a conservative figure, and that there is no hard number at which all crewmembers will recognize each other by sight. This number is highly dependent on the length of time the crew has served together, and on the reliability of every individual crewmember’s memory. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 Nonetheless, we believe that the figure of 20 crewmembers presents a reasonable threshold at which all members of the crew can be realistically be expected to recognize one another. However, we are continuing to study the issue, and may propose to expand the electronic TWIC inspection requirements by reducing the exemption threshold in a future rulemaking. The Coast Guard realizes that increasing the crewmember threshold now exempts not only most passenger vessels, but many vessels that carry CDC in bulk. We are comfortable with this exemption at this time for two reasons. First, as stated by many of the commenters, we believe that a crew of 20 on a vessel that carries CDC in bulk will all be familiar with one another, so the risk of an unauthorized person being unnoticed on the vessel is slim. Second, due to the requirements for electronic TWIC inspection at the facilities where the CDC vessels conduct a majority of their business, the vast majority of these crewmembers will have their TWIC verified when passing through the facility on their way to the vessel, during crew changes or other trips ashore. Finally, one commenter in a public meeting noted that TWIC readers on vessels may be exposed to explosive atmospheres, and that therefore, TWIC readers must be intrinsically safe. In the event that TWIC readers are installed in hazardous areas, they would need to comply with all applicable requirements associated with those areas, which would at the minimum likely entail additional costs for testing and certification, and we note that no TWIC reader on the QTL is currently certified as intrinsically safe. For these reasons, we believe that imposing an additional requirement that crewmembers undergo an additional round of electronic TWIC inspection each time they board the vessel would provide limited security value for vessel with fewer than 20 crewmembers carrying bulk CDC. 6. Outer Continental Shelf Facilities In the NPRM, we proposed to characterize all OCS facilities as Risk Group B, meaning that they would not need to undertake electronic TWIC inspection. In this final rule, the Coast Guard continues to exclude OCS facilities from electronic TWIC inspection requirements. One commenter, an owner of some OCS facilities, asked whether TWIC readers could be placed at ‘‘the point(s) of embarkation’’ as opposed to placing TWIC readers on the OCS facility itself. Such a placement would be permissible if described in an approved FSP. However, we note that because OCS PO 00000 Frm 00034 Fmt 4701 Sfmt 4700 facilities are not considered Risk Group A, no electronic TWIC inspection requirements will apply as a result of this final rule. 7. Vessels and Facilities Not in Risk Group A Many commenters supported the Coast Guard’s decision not to include additional requirements for Risk Groups B and C in the NPRM. We appreciate the support, and agree that at this time, only vessels and facilities in Risk Group A will be affected by the electronic TWIC inspection requirements in this final rule. However, as stated in the NPRM, this final rule ‘‘should not be read to foreclose revised TWIC reader requirements in the future.’’ 59 Many commenters took this, and similar statements, as an indication that we had planned to extend electronic TWIC inspection requirements to Risk Group B vessels and facilities. As a result, we received several comments on the categorization of vessels and facilities within those Risk Groups. One commenter suggested that all facilities, including those proposed to be in Risk Groups B and C, should be required to have at least one portable TWIC reader. The commenter stated that this would allow the facility to complete a comprehensive check of a TWIC, which would help to deter potential attackers by making it more likely that they would be caught. While we agree that adding electronic TWIC inspection to all facilities would produce a security benefit, for the reasons extensively detailed in this rulemaking, we do not believe that such measures would be efficient at this time for lower-risk facilities. The commenter also argued that security guards should not manually check the CCL during visual TWIC inspection, as it could distract him or her. We note there are no requirements to check the list of cancelled TWICs during visual TWIC inspection, nor does this rulemaking affect visual inspection procedures. One substantial change being made in this final rule is the discontinuation of the distinction between Risk Group B and Risk Group C. The distinction between these two Risk Groups was relevant in the ANRPM, where we had proposed that Risk Group B vessels and facilities would be required to use TWIC readers on a random basis, whereas Risk Group C vessels and facilities would not be required to use TWIC readers at all. However, in the NPRM, we proposed to eliminate the random TWIC screenings from the Risk Group B requirements, and thus there was no distinction in 59 78 E:\FR\FM\23AUR2.SGM FR 17790. 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations requirements between those two Risk Groups. Nonetheless, we still proposed that the terminology for Risk Groups B and C be included in the regulations. Despite the lack of distinct requirements, many commenters read the NPRM to mean that electronic TWIC inspection requirements would be applied in some manner to Risk Group B vessels and facilities, and many commenters discussed the criteria by which vessels and facilities were classified as Risk Group B or C. One commenter did not support the proposed placement of Oil Spill Response Vessels and Oil Spill Response Barges in Risk Group B, arguing that these vessels carry primarily an oily water mixture, rendering them at low risk for terrorist attack. The commenter provided additional analysis distinguishing Oil Spill Response Vessels from tank vessels, and requested that they be classified as Risk Group C. Multiple commenters supported the decision to place Offshore Supply Vessels in Risk Group C, but wanted to clarify the definition of ‘‘Offshore Supply Vessel’’ for the purposes of TWIC requirements. One commenter argued against the placement of all OCS facilities in Risk Group B. The commenter believed they should be subject to the same sitespecific analysis that other facilities are subject to, and placed into Risk Group B or C as appropriate. Several commenters responded to the Coast Guard’s request for information as to whether petroleum refineries and storage facilities should be categorized as Risk Group A. Some commenters stated that it would be inappropriate for the agency to arbitrarily re-categorize these facilities without supporting study and analysis, and requested that if the Coast Guard omitted a risk in its initial analysis, a second notice and comment opportunity should be provided. One commenter noted that, according to the Coast Guard’s RA, the risk level for petroleum facilities was more comparable to Risk Group C than Risk Group A. Commenters also noted that due to the spacing of petroleum tanks at facilities, it is highly unlikely that a fire at one tank could ‘‘jump’’ to another. Several commenters provided the Coast Guard with a 2008 study entitled ‘‘Risks Associated with Gasoline Storage Sites,’’ which they argued demonstrated that gasoline does not pose a high risk of off-site consequences if involved in an incident, particularly one related to security. One commenter expressed concern about the expectation regarding the phase-in statements made in the NPRM, VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 stating that the absence of ‘‘definitive statements’’ has left the owners and operators of facilities in Risk Groups B and C wondering what will happen and what they should do. Similarly, one commenter stated that it seemed as if ‘‘phased in’’ was already the basic approach being taken by the Coast Guard, and that revisions to the electronic TWIC inspection requirements were all but certain. That commenter requested that instead of this approach, the Coast Guard should specifically identify the vulnerabilities that will be addressed and develop a proposal accordingly. Finally, commenters noted that if the Coast Guard were to propose expanding electronic TWIC inspection requirements beyond Risk Group A, a new Regulatory Flexibility Act analysis would be required. One commenter drew a distinction between petroleum refineries and petroleum storage facilities. The commenter stated that the petroleum storage facilities only store petroleum, whereas refineries may contain many types of more hazardous materials, such as hydrogen, although the commenter also stated that such facilities are wellequipped to handle those materials. Based on the comments received on this issue, we are not categorizing petroleum storage or refining facilities as Risk Group A in this final rule. Furthermore, we note that if and when the Coast Guard decides to propose additional electronic TWIC inspection requirements for facilities not currently classed as Risk Group A, global factors such as the cost of implementing electronic TWIC inspection, risk factors relating to the threat of a TSI, or other unforeseen conditions may have changed, necessitating a reconsideration of which vessels and facilities should be subject to additional security measures. The factors raised by commenters will be considered if and when additional TWIC inspection requirements are proposed in the future. We agree with the argument put forth by commenters that before extending electronic TWIC inspection requirements, a revised analysis of the costs and benefits should be undertaken and that opportunity to comment on those proposed requirements should be provided. Given the arguments raised in the comments, it is clear that more analysis needs to be conducted before the requirements of electronic TWIC inspection are extended to vessels and facilities not in Risk Group A. We do not believe that setting out the risk parameters for the next group of vessels and facilities to which electronic TWIC inspection may be applied is PO 00000 Frm 00035 Fmt 4701 Sfmt 4700 57685 appropriate at this time. If and when the electronic TWIC inspection requirements are phased in further, the Coast Guard believes that the additional flexibility afforded by not having preset definitions for the lower-tier Risk Groups will allow us to better tailor the future rulemakings appropriately. As the analysis of risks, threats, and costs continues to evolve, we will conduct further analysis as appropriate as well as solicit additional information from the public. 8. Barge Fleeting Facilities The inclusion in Risk Group A of barge fleeting facilities that handle barges carrying CDC in bulk was a topic discussed by a large number of commenters. The Coast Guard received comments from a variety of barge fleet operators, towing operators, and trade associations. Universally, comments on this subject argued that barge fleeting facilities should not be required to install TWIC readers. For the reasons described below, based on the comments received, we have removed the separate requirement that barge fleeting facilities that handle barges carrying CDC in bulk are specifically considered Risk Group A. Instead, barge fleeting facilities are considered facilities, and may be required to perform electronic TWIC inspection if the standard criteria for Risk Group A are met. Barge fleeting facilities are defined in 33 CFR 101.105 as ‘‘a commercial area, subject to permitting by the Army Corps of Engineers . . . or pursuant to a regional general permit[,] the purpose of which is for the making up, breaking down, or staging of barge tows.’’ Because this rulemaking would only affect barge fleeting facilities that interact with barges carrying CDC in bulk, only those barge fleeting facilities which are used for the staging of barge tows would be affected by this final rule. In the NPRM, we proposed that all barge fleeting facilities that service barges carrying CDC in bulk would be considered Risk Group A. Comments on why barge fleeting facilities should not be included in Risk Group A fell into four general categories. First, many commenters argued that the cost of installing TWIC readers at barge fleeting facilities would be higher than the installation costs at other facilities due to their remoteness, and that the Coast Guard’s preliminary RA had not taken this into account. Second, several commenters argued that due to the remote location or lack of permanent infrastructure of many barge fleeting facilities, the consequences of a TSI would not be so great as to warrant E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 57686 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations an inclusion into Risk Group A. Third, one commenter argued that because barge fleeting facilities only service vessels that would be exempt from the TWIC reader requirement (because they have fewer than 14 crew), the facilities should also be exempt. Finally, several commenters argued that a TWIC reader would not enhance security at barge fleeting facilities. We address each of these comment categories below. The cost of installing TWIC readers at barge fleeting facilities was cited by commenters as a reason to reconsider placing them in Risk Group A. Commenters generally argued that logistical considerations made installing TWIC readers in barge fleeting facilities substantially more expensive than at traditional installations. Several commenters stated that infrastructure costs, such as electricity, Internet access, and a facility to protect the TWIC reader would cause this requirement to be dramatically more expensive than originally considered. Similarly, commenters stated that these costs were not considered by the Coast Guard in its preliminary RA. Multiple commenters stated that the $300,000 initial phase-in costs estimated for bulk liquid facilities seemed like a low estimate. These commenters suggested that they would refuse to handle barges carrying bulk CDC rather than bear this increased cost, and that a final rule would cause rates to rise at other facilities. Similarly, commenters suggested that the decision to require TWIC readers at these barge fleeting facilities could actually be detrimental to security because, building on the idea that many facilities would refuse to handle bulk CDC barges, those barges would become concentrated at the few facilities that did allow them, thus increasing the risk profile of the fleeting areas that service them. We disagree with the notion that TWIC readers would be substantially more expensive to operate at barge fleeting facilities than at other types of facilities. As summarized above, the commenters who made this argument all cited various infrastructure costs, including installing electrical connections, Internet service, and a facility to protect the TWIC reader as drivers of the increased costs. However, all of these costs are associated with fixed TWIC readers, which are not required by this rule. Isolated facilities without electrical or data connections could use portable electronic readers to comply rather than undertake these measures to install fixed readers. We note that portable electronic readers can be, and are, operated using battery power and wireless communication VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 technology to scan TWICs and check them against the list of cancelled TWICs. With regard to our preliminary RA, we disagree that the costs of TWIC readers was not applied to barge fleeting facilities. As stated above, as portable electronic readers can be used to conduct electronic TWIC inspections without expensive upgrades to infrastructure, we believe that the price of portable electronic readers estimated in the preliminary RA is applicable to barge fleeting facilities that are not connected to electrical and information infrastructure. Furthermore, barge fleeting facilities were counted in the overall analysis of facilities covered by the proposed rule. Thus, we believe that the preliminary RA sufficiently analyzed the cost impacts for barge fleeting facilities. Numerous commenters argued that barge fleeting facilities are so isolated they should not be placed in Risk Group A. For example, one commenter recommended that barge fleeting facilities be categorized as Risk Group C, or as an alternative, CDC fleeting areas should be categorized using a risk-based approach based on the geographic location in relation to populations, with those in higher-density locations placed in Risk Group A. One commenter added that for economic reasons, fleets are usually far removed from major industrial or population centers, thus limiting the risk as potential targets for terrorist attacks. Because of the MSRAM methodology used to determine risk, we disagree that perceived geographic isolation of a particular facility alone should justify lesser security requirements. The risk groupings are based on the averaged MSRAM scores for each class of facility. In conducting our risk analysis, one of the primary factors used was an estimate of the average maximum consequences of a TSI on a class of facility. In MSRAM, the Coast Guard calculates the maximum consequence for each facility, which is the estimate of all damages that would occur from the total loss of a facility caused by a TSI resulting from a terrorist attack. This singular maximum consequence score factors in the total loss of a target, factoring in injury, loss of life, economic and environmental impact, symbolic effect, and national security impact. Further included in the calculation is an estimation of damage done to areas surrounding the facility that would be affected in the event of a TSI, meaning a facility in a densely-populated area could have a much higher maximum consequence score if a TSI would inflict damage on nearby populated areas. PO 00000 Frm 00036 Fmt 4701 Sfmt 4700 Then, the average maximum consequence for the class of facilities is derived from the calculations of each facility in the class, taking into account their specific geography. Thus, geographic isolation, or lack thereof, has already been considered in the score calculation. Even considering the geographic isolation of some barge fleeting facilities, this class as a whole presents a risk of a serious TSI, which is why it was included in Risk Group A. One commenter also argued that because tugboats that service barges are exempt from the requirements for electronic TWIC inspection, due to having fewer than 14 crewmembers, then the barge fleeting facilities should not be subject to TWIC requirements. In the discussion relating to electronic TWIC inspection requirements at facilities that service exempted vessels, we discussed in detail why a facility may be required to conduct electronic TWIC inspection, even if the vessels the facility services are exempted due to low crew counts. This analysis applies equally with regard to barge fleeting facilities. A variety of other arguments were made to exclude barge fleeting facilities from the electronic TWIC inspection requirements. For example, a commenter argued that barge fleeting facilities by their very nature do not interact with vendors or visitors. We note that TWIC requirements apply to permanent personnel as well as vendors and visitors (some of whom may not have TWICs, and would thus need to be escorted), and that electronic TWIC inspection provides several security enhancements, such as the ability to detect revoked TWICs, that are applicable to personnel as well as vendors and visitors. Some commenters stated that fleet personnel traffic is very low compared to regular shore maritime facilities and therefore are very low risk. We note that regular personnel traffic is not related to the risk that electronic TWIC inspection is designed to mitigate. Electronic TWIC inspection helps to ensure that unauthorized personnel are not granted unescorted access to secure areas. This can happen regardless of the number of persons on the facility. Several commenters argued that screening for personnel on barge fleeting facilities is already in place, and is extensive, including TWIC checks. As stated above, for high-risk facilities, we do not believe that visual TWIC inspections provide enough security. This final rule requires that TWICs be electronically inspected before unescorted access to secure areas of a MTSA-regulated, high-risk facility is E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations granted. This logic applies to barge fleeting facilities as well as other facilities. One commenter described a barge fleeting facility as ‘‘one of the few safe places’’ for crew transfers. The commenter implied that requiring crewmembers to run their cards through an electronic reader, which the commenter described as redundant and burdensome, could somehow impact safety. Without additional reasoning, we see no linkage between the safety of the crew and the need for security measures, except for the obvious benefits of protecting the crew from a TSI. Finally, several commenters argued that due to the nature of barge fleeting facilities, TWIC readers would not provide security benefits. One commenter stated that if there is no access from the riverbank to the area where the barges are stored, then the TWIC reader is not adding any security value. Similarly, several commenters noted that while electronic TWIC inspection is required at the access points to each secure area, barge fleeting facilities do not have defined access points, but rather people come in via waterways. Several commenters described barge fleeting facilities as ‘‘parking lots,’’ and noted that very few individuals from outside the fleeting facility, other than the crews of tugs, enter the facility. Oftentimes, due to a lack of other means of access, persons entering the facilities need to come via vessel and can do so only with the coordination of the FSO. Lastly, one commenter, while arguing for an exemption for barge fleeting facilities, stated that its barge fleeting facilities have a different risk profile than landbased facilities, noting that the fleeting areas are ‘‘simply unmanned barge parking lots continuously serviced by towing vessels.’’ 60 We have carefully considered the arguments of these commenters, and believe that we can address their concerns through a modification of the regulatory requirement. If a typical maritime facility met the specific criteria that these commenters describe, where there is no bulk CDC at the facility to protect, and no access points at which electronic TWIC inspection would be conducted, the facility would not be considered a Risk Group A facility. We believe that with regard to barge fleeting facilities, the same standard should be applied. For that reason, we are removing the specific reference to barge fleeting facilities in 60 USCG–2007–28915–0195, USCG–2007–28915– 0213. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 proposed § 105.253(a)(3). Instead, we are adding text, in § 105.110(e), Exemptions, which clearly states that barge fleeting facilities that do not have a secure area are exempt from the requirements in 33 CFR 101.535(b)(1). Based on this change, many of the concerns from the commenters regarding the application and utility of electronic TWIC inspection will be addressed. We note that simply because the reference to barge fleeting facilities has been deleted from proposed § 105.253(a)(3), some barge fleeting facilities will still be required to comply with electronic TWIC inspection if they meet the requirements of § 105.253(a)(1). Thus, if a barge fleeting facility handles or receives CDC in bulk, it would be considered to be a Risk Group A facility, and would be subject to the electronic TWIC inspection requirements. However, we note that the electronic TWIC inspection requirements would be limited to secure areas only, as towing boats could still service barges without having their crews’ TWICs electronically inspected (see the discussion in Section V.C.1, above). 9. Switching Risk Groups Several commenters requested additional clarification and explanation regarding the NPRM’s discussion of moving between Risk Groups. In the NPRM, the Coast Guard stated that it was adding §§ 104.263(d) and 105.253(d) to ‘‘address the movement between risk groups by vessels and facilities, based on the materials they are carrying or handling, or the types of vessels they are receiving at any given time.’’ 61 These provisions, which are located at §§ 104.263(b) and 105.253(b) of this final rule, provide flexibility to owners and operators of vessels and facilities that only meet the criteria for Risk Group A classification on an infrequent or periodic basis, such as a facility that only occasionally receives a shipment of bulk CDC. Based on the comments received on this issue, we are finalizing this requirement without change. One commenter supported the Coast Guard’s proposal for movement between Risk Groups noting that the proposal would grant a facility a degree of flexibility to tailor its security precautions to the TSI risks posed at a given time. We appreciate the support. In the NPRM, we stated that an owner or operator wishing to take advantage of one of these provisions would be required to explain how the vessel or 61 78 PO 00000 FR 17815–6. Frm 00037 Fmt 4701 Sfmt 4700 57687 facility would move between Risk Groups in an approved security plan, and that the plan would be required to account for the timing of such movement, as well as how the owner or operator would comply with the requirements of both the higher and lower Risk Groups. One commenter requested more explicit guidance on the criteria for facilities to move between Risk Groups, asking for guidance regarding the process and for the types of security measures that would need to be in place for a facility to move from a higher Risk Group to a lower one. In response, we note that moving between Risk Groups is not dependent on security measures, it is dependent on whether a facility’s change in operations moves it into a different Risk Group. For example, if a facility that periodically handled CDC in bulk were to cease handling that material, it could move from a Risk Group A facility to a non-Risk Group A facility. While such a move is independent of any change in security measures, we note that the facility would still have to amend its FSP with regard to any changes in security procedures. One commenter stated that his facility occasionally handles bulk CDC for short periods of time. The commenter supported the NPRM’s proposal to permit switching Risk Groups, but requested that is should be possible to do so ‘‘without a lot of bureaucratic paperwork.’’ In such an instance, an FSP could contain two alternative security arrangements, one for operating as a Risk Group A facility, and one for operating as a non Risk Group A facility, along with the process for switching. Assuming that such an FSP was approved by the COTP, then switching risk groups could be accomplished without additional paperwork each time the operator changes risk groups. E. Responses to Economic Comments The Coast Guard received numerous comments from organizations and individuals regarding the costs and benefits associated with the requirement for electronic TWIC inspection. Many commenters, responding to specific requests for information, provided details and opinions regarding the costs of installing and operating an electronic TWIC inspection system. The issues involved the specific costs of purchasing and installing electronic TWIC reading equipment, the operational details concerning electronic TWIC inspection (including how it could increase or decrease the number of persons employed in security positions), and the costs to E:\FR\FM\23AUR2.SGM 23AUR2 57688 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 transportation workers who may need to replace malfunctioning TWICs. We appreciate these comments and have attempted to integrate them into our RA. We address the specific topics in the sections of this preamble below. 1. Costs of TWIC Readers We received numerous comments from both suppliers and users of electronic TWIC inspection equipment regarding the standard costs of TWIC inspection equipment. In the NPRM, we estimated the average costs of TWIC readers by researching the equipment costs for all TWIC readers that have passed the TSA’s test to conform with its Initial Capability Evaluation (ICE) test, which is maintained and made available to the public by TSA. One commenter stated that the preliminary RA overestimated the costs of procuring TWIC readers. The commenter stated that the TWIC Pilot Report overstated the costs of TWIC readers, as pilot participants used grant money for incidental security needs, such as PACS, costs related to guard stations, lift gates and fencing. We disagree with the commenter’s analysis, and note that we did not use the pilot grants as a basis for the costs of TWIC readers. As stated in the NPRM RA (Section 4.1.1., TWIC reader costs), the costs of TWIC readers were determined using approved TWIC readers that had passed the TSA ICE test. Multiple commenters stated that the NPRM RA overestimated the cost of TWIC readers, and of the software, needed. One commenter also stated that the Coast Guard used overstated software prices that came from a single supplier and should have used $4,250 for both fixed and portable TWIC readers that included both hardware and software. The commenter added that the price of electronic TWIC inspection continues to fall as technology develops and is deployed on a larger scale. The Coast Guard did not use pricing information from a single supplier, but relied on multiple vendors’ publicly available information for regulatory analyses supporting the NPRM and this final rule. While we agree that the price has fallen, we cannot use the prices cited by the commenter directly. However, we note that we have adjusted the TWIC reader cost prices in the final RA. The NPRM RA’s TWIC reader cost estimates relied on the ICE List and utilized those equipment costs listed on the U.S. General Services Administration (GSA) price schedule. The QTL includes all TWIC readers that are currently approved by TSA (at the time the final RA was developed) for use in reading VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 TWICs. For the final rule RA, instead of using GSA schedule listed prices for TWIC readers as was the case for the NPRM RA, we utilized the QTL’s TWIC reader information to obtain an average cost for portable TWIC readers, and used the GSA schedule for fixed TWIC readers. We note that, for the final rule’s cost analysis, we used average TWIC reader prices that we estimated $5,373 for fixed TWIC readers and $7,035 for portable TWIC readers. These prices are close to the one the commenter suggested at $4,250 for either fixed or portable TWIC reader. The same commenter also added that it would not be necessary to purchase an entirely new PACS software system, and that one could simply add an electronic reader to the existing PACS that supports the perimeter access points for some entities. We agree, and go further in our RA, noting that it is possible to integrate biometric input functions into an existing PACS, rather than install a separate integrated TWIC reader. Use of this discretionary option can reduce electronic TWIC inspection costs substantially, depending on the business operations of the facility using such a system. However, we do not quantify the potential for these cost savings in the RA. The commenters also made statements regarding the cost for CCL updates, which were echoed by other commenters. They stated that updates to the CCL should be an automated function taking about five seconds, and therefore, these should not be included as an ongoing item with assigned labor expense in the RA. In the NPRM RA, we estimated that the costs to update the CCL would be, on average, 30 minutes per week, which comes to 26 hours per year. In the final analysis, this figure is unchanged. While we recognize that some larger facilities may be able to automate this process, we do not believe that all facilities will have such an automated solution. One commenter stated that the adoption of the QTL could cause ‘‘change order costs’’ to replace more expensive TWIC readers, and that the facilities who need to change TWIC readers should get grants to cover these costs. The Coast Guard disagrees. The final rule will allow many different types of biometric scanners in addition to the ones published on the TSA’s QTL, and the rule is not designprescriptive, so many entities will be able to continue to use existing equipment and therefore should not incur additional costs. The Coast Guard is not mandating that owners or operators use only the TWIC readers PO 00000 Frm 00038 Fmt 4701 Sfmt 4700 listed on the TSA’s QTL in this final rule. 2. Number of TWIC Readers at Vessels and Facilities Additionally, several commenters believed that the Coast Guard has not appropriately addressed the overall numbers of TWIC readers. Several commenters claimed that the NPRM and the RA did not contain accurate estimates of the number of TWIC readers needed for a vessel or a facility. One commenter, who owns multiple vessels and a terminal, estimated that it would need as many as 20 TWIC readers to comply with the proposed regulatory text. One commenter described the Coast Guard as contradicting itself, by stating in the preamble that Risk Group A vessels would need only one TWIC reader, at the entrance to the vessel, yet the proposed regulatory text required a TWIC reader at ‘‘each entry.’’ 62 Another commenter, a city government agency in charge of passenger ferries and terminals, also disagreed with the idea of one point of access per ferry. That agency estimated at least 62 TWIC readers would be necessary for their facilities alone. We note that the confusion regarding the regulatory text language in the NPRM, which stated that TWIC readers were required ‘‘prior to each entry,’’ has been thoroughly discussed above. In this final rule, most vessels are exempted from electronic TWIC inspection requirements, and those subject to them are only required to conduct such an inspection once, prior to entry onto the vessel. With regard to facilities, we clearly state that electronic TWIC inspection must be conducted prior to each entry into a secure area. Given the nature of facilities, we acknowledge that many facilities will require multiple TWIC readers or other machines capable of conducting electronic TWIC inspection, either because they have a large number of access points to secure areas, or because they have a high throughput of people who must undergo electronic TWIC inspection in a timely manner. One commenter disagreed with the idea of ‘‘one point of access’’ to a ferry, as there may be multiple points of access, and the proposed rule might have required them to install TWIC readers at 62 locations, with additional staffing, to meet the requirements. The Coast Guard disagrees with this assessment. The commenter is not necessarily required to purchase a large 62 See 78 FR 17803 and proposed § 104.265(a)(4), 78 FR 17831. E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations number of TWIC readers because the electronic TWIC inspection for the vessel crew can be executed on the facility side, rather than at each and every access point to the ferry or the vessel. Given the ‘‘combined security plan’’ discussed by this commenter above, it is permissible that a ferry operating a secure facility could have no dedicated TWIC readers, if all crew boarded from secure areas of the facility. Thus, such a ferry operator could comply with the electronic TWIC inspection requirements in this final rule without a wholesale replacement of its security infrastructure with new TWIC Readers. Several commenters provided qualitative discussions regarding the number of TWIC readers that would be needed at passenger terminals, which while not providing firm numerical information, helped the Coast Guard refine its assessment of how the final rule would affect these sorts of terminals. One commenter argued that the Coast Guard ‘‘does not fully understand the day-to-day operations of Group A passenger vessels and facilities . . .’’ and that ‘‘most of these vessels, terminals, and facilities are designated ‘‘public access areas’’, with only small areas designated secure, which ‘‘tend to be located away from one another.’’ The commenter provided examples of ‘‘a fuel storage area here and a secure communications room elsewhere’’ as examples of dispersed secure areas, and stated that ‘‘the everyday reality for a TWIC holder is that he or she is likely to move between secure areas and public areas, as well as between the vessel and facility, multiple times a day in multiple locations.’’ Similarly, operators of other passenger terminals made qualitative remarks regarding the number of TWIC readers needed. One commenter, operating a large facility on the West Coast, stated that ‘‘installation of TWIC readers on our vessels and at our terminal would provide a negligible improvement in security, which would come at an unreasonable cost given that WSF has already implemented a superior security infrastructure.’’ We note that, at the time the comment was made, the NPRM had not proposed the option that would allow the operators of facilities to integrate electronic TWIC inspection into their PACS. Given comments like these, we expect that larger passenger facilities that have already implemented PACS would be likely to use that option rather than installing TWIC readers in a parallel security structure. Commenters representing smaller facilities also provided qualitative VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 information. One commenter stated that ‘‘our terminals are a mix of secure and public areas where employees move between areas throughout the day,’’ indicating that TWIC readers would be needed at multiple access points, not just at the entrances to the facility. Similarly, a facility operator in San Diego noted that ‘‘careful consideration needs to be taken into account for the passenger vessel industry because our vessels and facilities are not just one big secure area, but rather are interspersed amongst public areas.’’ Based on the substantial numbers of comments regarding the implementation of electronic TWIC inspection at passenger facilities, as well as the policy changes in this final rule, we have reevaluated how we analyzed the costs of this rule for passenger facilities. In the TWIC pilot program, TWIC readers were typically only employed at the exterior access points to facilities, whereas in the final rule things are quite different. For passenger facilities, it is likely that electronic TWIC inspections would not likely take place at the main entrances where passengers enter and exit, as those areas would lead to ‘‘passenger access areas’’ which are, by definition, not secure areas and do not need to be controlled by a TWIC reader. Instead, TWIC readers or a PACS would likely be installed throughout the facility, at each entrance into a secure area, to ensure that only TWIC-holders had access to these secure areas of the facility. Furthermore, based on the comments, we are reasonably certain that the largest passenger facilities are much more likely to implement the electronic TWIC inspection requirement by adding a biometric input method into their PACS, rather than by developing an entirely parallel TWIC reader system. This option permit substantial cost savings and operational efficiency benefits for facilities that have already invested in, as one commenter stated, ‘‘superior security.’’ For these reasons, we have adjusted the ‘‘number of TWIC readers’’ used by passenger facilities as the cost basis in our analysis. For the largest 5% of facilities, we have assumed a larger number of TWIC readers, representing our estimates that these facilities are quite extensive and will require either modification of their PACS or installation of a substantial TWIC reader system. For other passenger facilities, we have left the estimate at 2 access points per facility, for a total of four readers. We estimate that these facilities would likely have an access point to the vessel, as well as an additional access point to secure areas of the facility, such as a storage room or communications PO 00000 Frm 00039 Fmt 4701 Sfmt 4700 57689 area. We develop this reasoning at more length in the accompanying regulatory analysis. One commenter, operating several large terminals on the West Coast, provided information on the maintenance of readers. The comment estimated that they are planning to prepurchase 74 contact card reader inserts for their 33 existing readers over the next three years at a total cost of $28,800, or approximately $300 per reader per year. We have used this information to increase our cost estimate for the maintenance of readers from 5 percent of the cost of a reader to 10 percent of the cost of a reader per year to cover the expense of insert replacements. With regards to the number of TWIC readers, Coast Guard recognizes that there may be variability in the number of electronic readers required for any specific facility or vessel due to a large range of facility sizes, configurations, PACS types, and throughputs that will necessitate large variations in the numbers and types of TWIC access points. For the purposes of producing a cost estimate in the NPRM and RA, Coast Guard used data from Facility Security Plans (FSPs) to estimate the number of access points per facility and the TWIC pilot data to estimate an average number of TWIC readers needed per access point for a vessel or facility. The average number of TWIC readers at a vessel or facility was derived from the actual number of TWIC readers installed per facility or vessel in the pilot study that ranged from between 1 and 39 TWIC readers based on a minimum number of 1 to 24 access points from the FSPs. While we appreciate specific information about individual facilities, we note that the average figures developed through the TWIC Pilot Program, which sampled a broader spectrum of facilities, provides the best data for average numbers of TWIC readers and access points. 3. Transaction Times Many commenters stated that conducting electronic TWIC inspection at each entry to a secure area on a dayto-day basis would negatively impact the time needed to make entries. These commenters did not, however, provide any specific information regarding transaction times. One commenter that operates a cruise ship terminal stated that conducting electronic TWIC inspection with a biometric identification component takes 20 to 30 seconds per transaction, and thus would result in intolerable delays, especially regarding baggage handlers who enter secure areas repeatedly (we would note E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 57690 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations that the RUA provisions in this final rule may offer flexibilities to mitigate transaction time concerns). One commenter provided feedback on its TWIC reader experience. According to this commenter, the learning curve for adopting TWIC readers is short, with the proper signage and instruction. Within one year of implementing TWIC readers into the facility, the commenter had over 1 million reads that take 4 seconds each, and the use of TWIC readers on inbound trucking has caused no delays. Further, the commenter suggested that TWICs can last 3 years without breakage or delamination issues if properly cared for, and believes that many TWICs were broken because the issue of their care was not communicated. The Coast Guard agrees with some of the points made by this commenter: The learning curve for using TWIC readers is relatively short and TWIC readers can handle a large volume of reads. However, the read time may not be 4 seconds on average across all the TWIC reader users, although we appreciate the data point supplied by the commenter. Other commenters also felt that the Coast Guard overestimated transaction times and the amount of time needed for a CCL update. With regard to the CCL update, we estimated that it would take 0.5 hours to update the CCL. One commenter suggested that the process could be automated. We agree that some operators could automate the process, but currently, we are unaware of any that do. We still believe that absent automation, our estimate of time is accurate. Transactions were discussed by an additional commenter. One commenter stated that he had heard from an operator who has conducted over 1 million electronic TWIC transactions, and who had experienced an average transaction time of 3.5 seconds, as opposed to the 8 seconds per successful transaction experienced during the TWIC Pilot Program. In response to comments regarding transaction times, we acknowledge that transaction times may vary based on equipment, software, environmental conditions, user familiarity, the condition of the TWIC, and perhaps many other conditions. This variability is reflected in the range of transaction times spanning from 3.5 to 30 seconds provided in the comments. The TWIC pilot collected data from a variety of facilities and circumstances, and produced an overall average of 8 seconds per transaction. We note that the range of times collected by the Pilot Program (which used TWIC readers from the ICE list) was from 6 to 27 VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 seconds per transaction, which is not inconsistent with the experiences of the commenters.63 One commenter stated that the 17.1 percent failure rate from the TWIC Pilot Report is a high figure to use in the regulatory impact analysis, since the primary cause of TWIC read failures (internal antenna failures) was addressed by the design of better cards. The commenter noted that these older cards have been retired since 2009. While we believe that the design of TWICs themselves has improved, without comprehensive data demonstrating that improvement, we continue to use the 17.1 percent failure rate from the Pilot Report in our analysis as the best available estimate. This failure rate is still a reasonable one to use when estimating the delays due to TWIC reads because there are other reasons for TWIC reads to fail, such as exposure to harsh weather. Finally, we note that even this higher failure rate did not produce measureable throughput delays, and thus a lower failure rate would not substantially affect the transaction costs of this rule. One commenter argued that between 2,500 and 3,000 people a day undergoing visual TWIC inspections would cost a great deal of money, and asked if they could use a PACS instead. Certainly nothing in this final rule precludes voluntary compliance with the requirements for electronic TWIC inspections, and the Coast Guard encourages owners and operators to go beyond minimum levels of compliance. The Coast Guard believes that this final rule will not only increase security but may also reduce the costs for owners and operators who are currently relying on visual TWIC inspection. The final rule also allows other, less expensive biometric scanners to be integrated with existing facilities’ PACS, as long as a biometric TWIC read is accomplished. 4. Security Personnel We received several comments regarding potential reductions in security personnel that could result from the mandatory use of electronic TWIC inspection. These comments generally fell into two categories. Some commenters felt that the requirements in the proposed rule, if finalized, would cause employers to reduce security staff, as fewer guards would be needed to conduct visual TWIC inspections. While some commenters believed this reduction would be a detriment to overall port security, in contrast, other 63 See Pilot report, located in the online docket for this rulemaking at USCG–2007–28915–0121, Appendix G, pp. 49–50. PO 00000 Frm 00040 Fmt 4701 Sfmt 4700 commenters stated a possible reduction in personnel costs is a benefit we did not consider in the NPRM RA. We do not believe that this final rule will have a substantial effect on staffing for several reasons. With regard to the argument that use of electronic TWIC inspection would lead to a reduction of security, we believe this results from a misunderstanding of the role of inspection and the role of security personnel. While electronic TWIC inspection can be used as a substitute for visual TWIC inspection, the role of a security guard goes far beyond this limited function, including providing other components of access control and physical security. If anything, we believe that electronic TWIC inspection can improve the capability of security personnel by allowing them to focus on their more specialized securityproviding roles. One of the reasons suggested for a reduction in staffing related to a scenario in which a vessel’s crew slightly exceeded the threshold limit for an exemption from the electronic TWIC inspection requirement, and the operator of the vessel decided to reduce the crew size in order to qualify for the exemption. By clarifying that the number of crew used to determine whether the vessel is exempt is based on the minimum manning requirement in the COI, we believe that this scenario will not come to pass. Unlike a situation in which a vessel operator could dismiss an optional deckhand to qualify for the exemption, it is exceedingly difficult, if not impossible, to alter the minimum manning requirements of the vessel. Alternatively, some commenters believed that by installing TWIC readers, operators of facilities could dismiss security guards. We are not aware of any instances of operators terminating security personnel as a result of installing TWIC readers (which should have been reflected in a change to a security plan and approval by the local COTP). We also note that pursuant to PAC–D 01–11, facilities are already permitted to employ TWIC readers in lieu of visual TWIC inspection on a voluntary basis. Some commenters felt that the proposed requirements, especially for those vessels and facilities not in Risk Group A, would increase the necessary number of security guards per shift. These comments were based on the erroneous assumptions about the use of electronic TWIC inspection with regard to vessels, as well as the mischaracterization of the requirements for electronic TWIC inspection with regard to vessels and facilities not in E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 Risk Group A. We believe that the clarifications in this final rule clearly illustrate that the scenarios in which large numbers of security personnel are required on board vessels will not apply. Furthermore, access control requirements for vessels and facilities not in Risk Group A are unaffected by this final rule. 5. Other Cost Comments Several commenters stated that the NPRM requirements were expensive. For example, one commenter stated that the expense of outfitting their vessels and facilities with TWIC readers would be enormously expensive compared to their normal operating budgets. In this particular instance, the Coast Guard notes that vessels owned by this commenter are not in Risk Group A and are not subject to the requirements in the final rule for TWIC readers. Most of these commenters did not include estimates or specific costs to support their claims. For the one commenter that provided a specific cost estimate, we incorporated the information to increase our estimate of the cost to maintain readers. The Coast Guard has carefully considered this input on burden and in this final rule has further reduced burden from the NPRM and ANPRM. See the final RA, included in the docket for this rulemaking, for the Coast Guard’s analysis of the available data. One commenter suggested that the NPRM did not appear to consider the secondary economic cost impact that would result from the disruption of such facilities from a TSI. The same commenter also stated that the breakeven analysis in the NPRM did not consider the economic cost impact that would result from an attack on a petroleum facility. This latter statement is correct, because petroleum facilities are not included in the affected population of this rule. Furthermore, the former statement is correct, although the net effect of adding additional categories of terrorism impacts not now quantified in this rule would be to increase the benefits of avoiding a TSI. Multiple commenters stated that the NPRM did not do a cost analysis of domestic inbound fleeting areas (also known as barge fleeting facilities), and that it did not fully evaluate the impact of TWIC readers on those fleets. More specifically, one of these commenters felt that owners of those fleets would have to make a significant monetary investment to install equipment in an area that might not be able to support it. The NPRM did include all those affected domestic inbound fleeting areas VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 in the cost analysis. It fully assessed the impact on an average facility, including the barge fleeting facilities. However, this final rule no longer specifically requires barge fleeting facilities to install TWIC reader equipment (see Section V.D.7 of this preamble), which addresses the concerns of these commenters. One commenter said that it should not take 25 hours to update a facility security plan for TWIC. The Coast Guard disagrees. For some facilities, it may take fewer hours, but for many others it will take more than 25 hours, especially if changes to security plans are reviewed by multiple people, and we believe that the 25-hour assumption is a reasonable average for the full range of vessels and facilities impacted by this rule. One commenter suggested that the TWIC is not designed to be handled multiple times per day, (the commenter suggested that at their passenger ferry facility, an average employee could expect to have their TWIC inspected 2,400 times per year) and therefore this rule would likely cause TWICs to degrade and malfunction at a high rate, leading to increased costs for mariners to replace degraded TWIC cards. We disagree with this analysis for two reasons. First, while some older TWICs were issued with antennas that proved unreliable, the cardstock was upgraded in 2009 to be more reliable and can be used frequently without degrading. Second, we note that at most large facilities, such as the passenger facility at issue, employees use a PACS for access control rather than the physical TWIC. This final rule permits the use of a PACS card for access control in lieu of the TWIC, so we expect that the many employees at larger facilities will not suffer any degradation of their TWICs during normal usage. 6. Costs Exceeding Benefits, CostEffectiveness, and Risk Reduction Many commenters expressed a concern that the costs of installing TWIC readers on their vessels and facilities would exceed their benefits. One of these commenters said it has already implemented a superior security infrastructure and the installation of TWIC readers would be duplicative of security measures already in place. Another of these commenters expressed the view that terminal facility TWIC readers would be an unnecessary burden and cannot be justified for their operations. Another commenter felt that the added burden of the TWIC readers does not enhance overall security for their nature of operations. In addition to these commenters who questioned PO 00000 Frm 00041 Fmt 4701 Sfmt 4700 57691 whether the costs of the TWIC reader rulemaking exceed the benefits, several others argued that the TWIC card readers would neither significantly enhance security on U.S. facilities and vessels, nor make our nation safer. The Coast Guard disagrees. The regulatory impact analysis we provide in the docket discusses at length why and how security will be enhanced by this rule. The commenters do not appear to account for the benefits to the nation and its economy of avoiding TSIs or that this rule is a Congressional mandate, and therefore, it addresses a market failure in which individual owners and operators tend to under-invest in security infrastructure, equipment and operations. As previously explained, we used a risk-based approach to apply these regulatory requirements to less than 5 percent of the MTSA-regulated population, which represents approximately 80 percent of the potential consequences of a TSI. The provisions in this final rule target the highest risk entities while minimizing the overall burden of the rule. We conducted a robust alternatives analysis that considered the ‘‘break-even’’ point of several different alternatives and we chose the alternative that shows the final rule will be cost effective if it prevents 1 TSI with every 234.3 years. Such small changes in risk reduction strongly suggest the potential benefits of the proposed rule justify its costs. One commenter argued that reduction of human error, as part of visual TWIC inspection, should be a quantified benefit of the final rule, and not an ‘‘unquantifiable’’ benefit as described in the preliminary RA. However, the commenter did not ascribe a dollar value to this benefit that could be quantified. Considering the RA did not attempt to quantify each individual security threat mitigated, but instead provided an overall break-even analysis that encompassed the rule, we believe our analysis remains appropriate for this issue. 7. Cumulative Costs of Security-Related Rulemakings Some commenters warned of the cumulative economic impacts of this rulemaking with several other finalized rules across Federal agencies. These comments did not provide specific data or information on these cumulative economic impacts. Understanding and considering the concerns about these cumulative economic impacts of all maritime security regulations, the Coast Guard decided to apply the final rule to a smaller population of MTSA-regulated entities after conducting its regulatory impact analysis. The Coast Guard E:\FR\FM\23AUR2.SGM 23AUR2 57692 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations believes that the increased flexibility of the final rule compared to the proposed regulations will help lower costs and ease the burden on the regulated stakeholders. 8. Small Business Impact One commenter expressed concern that its small profit margin would be negatively affected by new expenses for security due to changes to technology and additional regulations. Cognizant of regulatory impacts on small businesses, the Coast Guard sought to minimize these impacts by allowing businesses to integrate TWIC readers into their existing PACS, and to choose from a variety of biometric scanners that may cost less than those approved by the TSA and listed on the TSA’s QTL. F. Other Issues sradovich on DSK3GMQ082PROD with RULES2 1. The GAO Report and the TWIC Pilot Program Several commenters noted concerns with the final rule in light of the May 2013 GAO report ‘‘Transportation Worker Identification Credential: Card Reader Pilot Results Are Unreliable; Security Benefits Need to Be Reassessed’’ (GAO–13–198). Two commenters specifically called attention to the GAO report’s suggestion that results were less reliable due to ineffective evaluation design and the lack of requisite data. The Coast Guard fundamentally disagrees with the statement. Although there were many challenges in the implementation of the TWIC reader pilot, considerable data were obtained in sufficient quantity and quality to support the general findings and conclusions of the TWIC reader Pilot Report. The pilot obtained sufficient data to evaluate TWIC reader performance and assess the impact of using TWIC readers at maritime facilities. Furthermore, the Coast Guard supplemented the information from the TWIC Pilot Program with other sources of information. For example, in the RA, the Coast Guard estimated the number of access points per facility by facility type through the use of an independent data source (Facility Security Plans), and estimated the costs of TWIC readers through published pricing information. This independent data supplemented what we learned through the pilot and helped account for TWIC reader implementation at all access points when developing the NPRM. Similarly, multiple commenters suggested that the Coast Guard should not move forward on this final rule due to the GAO recommendations. We would encourage those who criticize the TWIC Pilot Program to closely review VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 how the information gained in the program was used in the development of this rulemaking. Because of the testing conditions endemic to a voluntary pilot program, the TWIC Pilot Program encountered many challenges. The Coast Guard was aware of the pilot’s limitations, and used it with discretion in developing the NPRM and, subsequently, in developing this final rule. For that reason, the pilot results were not the sole basis for the NPRM. The Coast Guard believes that the pilot produced valuable information concerning the environmental, operational, and fiscal impacts of the use of TWIC readers. The Coast Guard believes that data were obtained in sufficient quantity and quality to support the general findings and conclusions of the Pilot Report. The pilot data informed aspects of the rulemaking in which no other data were available. The Coast Guard is convinced that TWIC, including the use of biometric readers, can and should be a part of the nation’s maritime security system, for the reasons cited extensively in this final rule. Two commenters suggested that individual TWIC Pilot Program participants were not provided the opportunity to review the final draft Pilot Report prior to publication. In response, the Coast Guard participated along with TSA and the independent test agent in individual close-out meetings with each of the pilot participants. Individual test phase reports were provided to participants in advance of those meetings to verify and answer questions and concerns. One commenter suggested that they heard from participants that information contained in the Pilot Report was inconsistent with the participants’ records. We note that this commenter was not a pilot participant, nor did we receive such feedback from pilot participants. Given the nature of the program, we believe that the information from the pilot was generally helpful in providing data relating to certain operational aspects of the TWIC program. The RA for this final rule accounts for maintenance, replacement, and operation costs of TWIC readers in addition to the costs reported in the Pilot Report, contrary to the GAO’s assertions. As both the Pilot Report and the GAO’s review note, not all facilities implemented TWIC readers at all access points during the pilot in the same way they may have to do in the future to meet the requirements of this final rule. We believe that the immaturity of TWIC reader technology at the onset of the pilot, the voluntary nature of the Pilot PO 00000 Frm 00042 Fmt 4701 Sfmt 4700 Program, and lack of full cooperation at all facilities were major contributors to the pilot’s limitations. Furthermore, we note that the additional flexibility afforded by this final rule, especially with regard to utilizing PACS as a means to undertake electronic TWIC inspection, will further reduce the negative operational impacts of the TWIC requirement that were experienced by some participants during the pilot. One commenter took the opposite position, arguing that the GAO report went beyond the required purpose of assessing the validity of the pilot, and that TWIC reader technology could be seamlessly integrated into their facility access control systems. While we do acknowledge that there were some problems with the pilot, overall we agree with the commenter that it demonstrated the ability to integrate TWIC into access control systems at a wide range of maritime facilities. One commenter suggested that the Coast Guard does not have an accurate accounting of how long it will take to resolve TWIC reader issues. We addressed a similar comment in the section of this preamble regarding malfunctioning access control systems. Per that discussion, we note that in this final rule, we are removing the specific time period for repairs, and that restoration of an access control system will be handled in accordance with the procedures for the reporting requirements for non-compliance as described in 33 CFR 104.125, 105.125, and 106.125. These sections require the owner or operator to notify the cognizant COTP, and to either suspend operations or request and receive permission from the COTP to continue operating. Additionally, one commenter stated that the NPRM did not address the error rate experienced during the Pilot Program which, with repetitive failure, created distraction, confusion, and complacency with an overall degradation of security. The commenter suggested that another pilot should have been conducted to validate the original findings given technology problems encountered. The Coast Guard disagrees. The RA section in the NPRM did address error rates as potential opportunity costs associated with delays as a result of TWIC reader requirements. Furthermore, the Pilot Report did acknowledge both TWIC reader errors and card failures as challenges that were faced. The Coast Guard believes that the combination of technology advancement since the Pilot Program started and the enhanced flexibility and the movement to a more performance-based standard E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations in this final rule will have a significant role in reducing the rate of TWIC reader failure and the overall effect of TWIC reader failure on a vessel or facility. As noted in the NPRM, the Coast Guard anticipates that the rate of card failure requiring replacement will decrease as TWIC reader use increases. We believe the number of unreadable TWICs initially identified will decrease as the increased use of TWIC readers will enhance TWIC validity and readability by identifying damaged TWICs. However, as with any such critical system and as we have noted in previous sections, it is important for operators of vessels and facilities affected by this final rule to adequately address potential electronic reader failure scenarios in the development of their security plans to ensure that measures are identified, and to seamlessly react to a single electronic reader failure or, in the worst case, an entire PACS failure in a way that continues to meet the security intent of this rulemaking. Please see discussion in section V.B.3.d on malfunctioning access control systems for more discussion on this subject. One commenter highlighted GAO’s assertion that DHS has not yet adequately demonstrated how the TWIC actually enhances maritime security. We have addressed the efficacy of the TWIC program as a whole in Section V.A of this preamble. One commenter stated that the GAO report failed to account for the opinions of various container terminal operators that participated in the Pilot Program, and suggested that the GAO report itself was flawed and went beyond its mandate. The Coast Guard appreciates the extremely valuable information provided by all vessel and facility operators during the course of this rulemaking, and has evaluated all comments in comparison with economic and environmental data to enhance this final rule to address the greatest security threats in which TWIC and TWIC readers provide utility in the prevention of a TSI. We have modified this final rule in a manner that allows for the greatest flexibility for non-Risk Group A vessel and facility operators to implement electronic TWIC inspection procedures on a voluntary basis. Additionally, the Coast Guard is committed to the continued security of the nation’s ports. Accordingly, we will continue to evaluate the need for TWIC readers on vessels or facilities not covered in this final rule, and, should future cost benefit analysis show increased TWIC reader costeffectiveness to address the threats to VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 vessels and facilities within our ports, we may propose further requirements. Several commenters suggested that the Coast Guard did not engage with industry groups and advisory committees, other than TSAC, when drafting this rulemaking. The Coast Guard took into consideration input from a wide range of industry representatives during the development of this final rule through both formal and informal interaction. Formal interaction with stakeholders occurred in the form of direct contact with the National Maritime Security Advisory Committee, interaction with TWIC Pilot Program participants, and during multiple port and facility visits aimed at gathering specific feedback from industry on TWIC and the use of TWIC readers. Informal interaction occurred through multiple TWIC information sessions at industry-sponsored events such as meetings and conferences, and through feedback in the form of comments to both the ANPRM and NPRM for this rulemaking. 2. Additional Comments a. General Comments on the TWIC Program Many commenters supported the Coast Guard’s implementation of a delayed effective date for this final rule. As stated in the DATES section above, the Coast Guard will delay the effective date of this rulemaking by 2 years to allow the regulated industries time to comply with this final rule. One commenter asked if a non-Risk Group A vessel or facility decided, 1 year from the date of publication, to move up to Risk Group A, how many years that entity would have to comply with this final rule. In this example, the entity would have 1 more year to comply with the electronic TWIC inspection requirements of this final rule. All vessels and facilities meeting the Risk Group A criteria after the effective date of this final rule will have no extra time to comply, as the regulation will be in force. The commenter also asked what procedures such a facility would have to follow. Such a facility would have to adjust its FSP in accordance with all applicable regulations, and then implement the requirements of the approved FSP. Some commenters expressed concerns about the durability and reliability of TWICs themselves. As revealed in the TWIC Pilot Program, many users experienced problems with the TWIC. We note, as multiple commenters did, that prior to 2009, some cards were issued with antennas that experienced high rates of failure, but given the 5-year expiration period of the TWIC, those PO 00000 Frm 00043 Fmt 4701 Sfmt 4700 57693 cards should all be replaced by the time this final rule is effective. Furthermore, due to the flexibility added by this final rule, should an environment prove to have a negative effect on the TWIC, owners and operators can use one of the alternative means described above to provide for access control while keeping TWICs in a secure location where they will not become damaged. One commenter stated that mariners are already subject to background checks, which should preclude the need for another check conducted by an electronic reader. We would note that the electronic TWIC inspection does not actually conduct an additional background check, but merely verifies the individual presenting the card is the same person who underwent the original background check. This commenter also suggested that random Coast Guard checks of the TWIC ensure adequate security. We disagree, and believe that security validation at highrisk vessels and facilities should be conducted thoroughly, not occasionally, for the reasons described in this rule. One commenter in a public meeting suggested that because of the TWIC program, driver’s licenses and other forms of identification are no longer allowed for access to facilities, in favor of a TWIC, and that this has reduced security. The Coast Guard disagrees, and believes that TWIC enhances security. We note, for example, that merely having a driver’s license does not indicate that an individual has passed a background check. Some commenters discussed both possible TSIs and terrorist attacks which would not, in their view, have been averted by a TWIC reader requirement. The Coast Guard notes that the electronic TWIC inspection requirements are only part of the Coast Guard’s comprehensive port security program and will not address all attack scenarios. Issues relating to the overall effectiveness of the electronic TWIC inspection programs are discussed in Section V.A, above. Some commenters supported the use of the TWIC as a single Federal credential, and suggested that it should preempt and supersede other State, local, or site-specific credentials. One commenter suggested that using the TWIC as the only credential a person would need to enter multiple secure facilities would have substantial economic benefits, especially for individuals such as truck or bus drivers that need to access many different secure facilities. These benefits, according to the commenter, would include conducting only a single background check (as opposed to E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 57694 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations multiple background checks that might be needed to obtain State, local, and site-specific credentials), as well as reduced ‘‘wait time’’ as security credentials are examined. While there is an efficiency argument to having a single, nationwide credential, we believe that the disbenefits of such a mandatory program are substantial and outweigh that efficiency. To start, we note that part of the increased flexibility of this final rule allows for alternative cards, such as employee ID cards, to achieve electronic TWIC inspection, provided that these cards are linked to a TWIC in a manner described above. As several commenters noted, possession of an authorized TWIC should not, in and of itself, grant the TWIC-holder access to any secure area on any vessel or facility. While a valid TWIC is a necessary component for unescorted access to secure areas, it will not be the sole reason, as owners and operators must exercise their right and responsibility to decide to whom to provide such access. One commenter expressed concern regarding the tiered approach for the use of TWIC readers. This commenter suggested that multiple access control procedures could result in confusion for persons who visit many different facilities. The commenter proposed that the Coast Guard require the installation of TWIC readers at Risk Group A and B facilities, and require that Risk Group C facilities maintain portable TWIC Readers. We acknowledge that using different access procedures at different facilities could be confusing. Furthermore, for the reasons discussed extensively, we do not believe that requiring electronic TWIC inspection at non-Risk Group A facilities is an effective use of resources at this time. Two commenters suggested an alternative process where inspection requirements are relaxed during peak hours. One commenter stated that between 7 a.m. and 9 a.m., hundreds of vehicles enter a particular facility, often with multiple passengers, and that requiring biometric identification of each passenger could result in traffic delays. The commenter suggested that only the driver should be required to undergo electronic TWIC inspection, while the passengers could present their TWICs for visual TWIC inspection. The Coast Guard does not agree with this approach, as it creates a fairly obvious and exploitable gap in security. While we have worked to increase operator flexibility to reduce delays and minimize their effects, we have estimated in the Coast Guard’s RA that some facilities may have to make modifications to business operations to VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 accommodate electronic TWIC inspection requirements, such as increasing the number of access points for vehicles. Furthermore, it may be possible at some facilities to conduct electronic TWIC inspections at locations employees would walk through after disembarking from their automobiles. Several commenters considered existing requirements under the MTSA and/or under the International Ship and Port Security Code to be sufficient for themselves and others, and that electronic TWIC inspection requirements should not apply to them. We believe, for reasons extensively detailed in this document, that the statutorily-mandated enhancements to access control in this final rule have been applied to the class of vessels and facilities to which they are most costbeneficial. One commenter was concerned at the prospect of TWIC readers being considered ‘‘no-sail equipment,’’ that is, equipment which must be operational before a vessel can leave. We note that while a situation where a TWIC reader could become no-sail equipment theoretically exists (for example, if there were only one TWIC reader available on the vessel, no TWIC readers at the facility, and no portable TWIC readers available), we have elaborated on the many ways in which this could be avoided through advance planning. This final rule elaborates on procedures which would be acceptable in the event of an electronic reader or system failure. We would recommend that operators of vessels or facilities required to undertake electronic TWIC inspections utilize robust systems that are capable of withstanding a single point of failure. One commenter expressed confusion as to how the electronic TWIC inspection requirement would apply to the aviation industry. We note that the requirement for electronic TWIC inspection at Risk Group A vessels and facilities applies equally to individuals entering via helicopters or other airborne means. In such an instance, it would be the responsibility of the owner or operator to conduct electronic TWIC inspections to ensure that all persons granted unescorted access to secure areas within the facility or upon boarding the vessel possess a valid TWIC. One commenter in a public meeting suggested that multiple entrances and departures in a day may pose a safety risk, if for example a facility is surrounded by public roads and highways. We believe that businesses can design their access points to secure areas in such a way that mitigates traffic impacts and potential safety concerns PO 00000 Frm 00044 Fmt 4701 Sfmt 4700 regarding public roads. We note that with the requirement for electronic TWIC inspection prior to each entry into a secure area of the facility, the security risk of such an environment would be greatly mitigated compared to a system that only required, for example, one inspection per day. One commenter requested that the TWIC be used as a universal identification card for entrance to transportation facilities, replacing the issuance of State, county, and facilityspecific credentials. The commenter also suggested that bus and motorcoach drivers should be eligible for TWICs. Noting that many drivers travel to numerous MTSA-regulated sites, the commenter argued that using the TWIC exclusively could significantly reduce the costs and other burden associated with the need for multiple security credentials. While we do not dispute the efficiency argument, we are not requiring the use of a TWIC as universal identification card for a number of reasons. First, again, this suggestion is out of scope of the rulemaking, which is limited to the requirement for electronic TWIC inspections. Moreover, we note that nearly all MTSA-regulated facilities restrict access not only to those who have a TWIC, but also to those who have a valid reason to be on the premises. As many commenters repeated, simply having a TWIC does not guarantee access to a secure area of a vessel or facility. Many vessels and facilities use employment-specific identification cards both as a means to ensure that a person has been vetted as well as a means to show that they are employees. Furthermore, some of these PACS cards are used to track employee locations or restrict access within the facility. Requiring all facilities to use the TWIC exclusively could negatively impact security and business operations by removing the benefits of facilityspecific access cards. Several commenters encouraged the Coast Guard to dismiss or devalue the comments from other commenters. In accordance with the Administrative Procedure Act, the Coast Guard considered every comment it received, both through the docket and through public meetings, before issuing this final rule. Several commenters made statements asserting that their operations were more secure or employees better trained than public transit operations and employees, and yet the latter may not be required to perform electronic TWIC inspections. While we cannot attest to the validity of these statements, we continue to believe that the improved security of electronic TWIC inspection, E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 compared to visual TWIC inspection, is warranted for high-risk vessels and facilities for the reasons discussed extensively in this preamble. One commenter believed that disbanding the TWIC program would remove the ‘‘false crutch that TWIC provides’’ and encourage greater operational security. For the reasons discussed above, we disagree and believe that TWIC provides a necessary and effective element of a comprehensive security system. b. Clarification of Specific Items Several commenters asked for clarification about a term or idea used in the NPRM, or asked the Coast Guard to define it outright. Explanations of various terms are described below. One commenter requested clarification of the term ‘‘each entry.’’ As stated above, with regard to facilities, ‘‘each entry’’ is each distinct transition from a non-secure area to a secure area. With regard to vessels, ‘‘each entry’’ is each distinct transition from a nonsecure area prior to boarding the vessel. One commenter asked about the definition of ‘‘escorting,’’ specifically whether a visual inspection, such as the use of closed-circuit television (CCTV) systems, would be an acceptable form of escorting. In response, we refer the commenter to the detailed guidance on escorting found in NVIC 03–07. There, we provide guidance and examples of circumstances in which the use of surveillance equipment, including CCTV systems, might be sufficient for escorting purposes. The specific facts and circumstances of each case will determine whether the Coast Guard will permit CCTV systems for such purposes. In general, escorting in restricted areas requires side-by-side accompaniment with a TWIC-holder. However, escorting in secure areas that are not also designated restricted areas does not always require side-by-side accompaniment. In such secure, nonrestricted areas, escorting may be sufficient through CCTV or other monitoring method (see 33 CFR 104.285 and 105.275). Where such monitoring is appropriate, the general principle applies that monitoring must enable sufficient observation of the individual with a means to respond if the individual is observed to be engaging in unauthorized activities or crossing into an unauthorized area. One commenter raised the issue of how railroads would interact with the new electronic TWIC inspection requirements. PAC 05–08, ‘‘TWIC Requirements and Rail Access into Secure Areas,’’ is the existing policy guidance regarding railroad access as it VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 relates to facilities in the TWIC program. This guidance allows the railroad company’s local or regional scheduling coordinator to provide information on the TWIC status of the crew, and if all crewmembers are valid TWIC-holders, allows them to enter the secure area of a MTSA-regulated facility without further inspection of their TWICs. PAC 05–08 also permits trains on ‘‘continuous passage’’ through a facility to proceed without stopping to check TWICs in certain circumstances. One commenter, representing railroad companies, stated ‘‘[n]either the need for, nor the advisability of, a change has been demonstrated’’ in regards to this guidance. We agree, and reaffirm the guidance in PAC 05–08 in this final rule, with one caveat. If PAC 05–08 would require that an individual’s TWIC be checked at a Risk Group A facility, it must be checked using electronic TWIC inspection. c. Comments Outside the Scope of This Rulemaking Many commenters provided comments beyond the scope of this rulemaking when discussing the TWIC program generally. In addition to concerns about card stock and card reliability, comments concerning applicability of the TWIC card to other U.S. government or governmentregulated facilities, TWIC card applications, delays in issuing or renewing TWIC cards, and those concerning TWIC card waivers are all beyond the scope of this rulemaking. Similarly, it is beyond the scope of this rulemaking to require biometrics in the U.S. Merchant Mariners Document, commonly known as a ‘‘Z-Card,’’ or for multiple mariner documents to be consolidated into an ‘‘all-in-one’’ credential. The scope of this rulemaking is to establish requirements for electronic TWIC inspections on vessels and facilities regulated under the MTSA. Several commenters suggested ideas about how TSA’s CCL could be improved or altered. We note that these ideas are outside the scope of this rulemaking and are best addressed to the TSA. Some commenters expressed concerns with the background check criteria for receiving a TWIC. For example, one commenter noted that certain longshore workers were erroneously denied a TWIC based on incorrect information in the Federal Bureau of Investigation database, and another experienced difficulty proving citizenship because he was born on a military base. While we are aware that some challenges exist in the enrollment and application PO 00000 Frm 00045 Fmt 4701 Sfmt 4700 57695 process, we believe that the vast majority of enrollments are conducted accurately and efficiently, and that problems are generally dealt with in a courteous and timely manner. We note, however, that concerns relating to the background check are outside the scope of this rulemaking. One commenter expressed concern that no regulatory analysis was done for workers who need to acquire and pay for a TWIC. Another commenter stated that for workers in remote areas, the cost of obtaining a TWIC can be higher due to travel costs. We note that this final rule does not require any additional individuals to acquire a TWIC, and thus the comment is outside the scope of this rulemaking. However, we would refer interested parties to the RA for the TWIC final rule, available at https:// www.regulations.gov, docket number TSA–2006–24191–0745, for a detailed analysis of these costs. One commenter expressed concern that there is no requirement in this rule that obligates an employer to report individual TWIC-holders to the Coast Guard who commit TWIC-disqualifying offenses. This issue is outside the scope of this rulemaking. One commenter criticized facility owners for poor quality fences despite receiving money from the Federal government to improve security. This commenter also suggested that instead of investing funds into the TWIC readers, the Coast Guard should spend the money on bettering terminals and their surrounding areas. These comments do not address the use of electronic TWIC inspection, and therefore, are out of this rule’s scope. One commenter in a public meeting described a system where ‘‘personnel from other companies’’ must, prior to arrival at his facility, fax his company with basic information including whether or not the visitor holds a TWIC. Facility procedures other than those relating to the electronic TWIC inspection procedures are beyond the scope of this rulemaking. One commenter recommended using closed-circuit television systems for purposes of visual inspection, rather than having a guard physically present. This rule relates to electronic TWIC inspection, and we do not believe it is within the scope of this rulemaking to issue guidance on proper visual identification procedures. One commenter suggested that, if not requiring electronic TWIC inspection for all Risk Groups, the Coast Guard should institute a ‘‘display and challenge’’ requirement for all secure areas. This would require that all persons with unescorted access display their TWIC or E:\FR\FM\23AUR2.SGM 23AUR2 57696 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations other credential when in a secure area. As this final rule only relates to electronic TWIC inspection, such a suggestion is out of scope of this rulemaking. One commenter suggested that the Coast Guard has been lax in pursuing administrative action for TWIC-related offenses, such as loaning TWICs, entering facilities without undergoing proper screening processes, or using counterfeit TWICs. We note that these issues are taken seriously, but are outside the scope of this rulemaking as we are not changing the actions to be taken upon identification of TWIC issues, merely how they might be detected. One commenter noted that ‘‘terminals must abide by common law and practice,’’ in reference to the idea that TWICs are not the sole condition of entry. The Coast Guard agrees, but notes the improvement in access control that electronic TWIC inspection provides. One commenter implied that ammonium nitrate should not be considered CDC. Altering the list of CDC (defined in 33 CFR part 160) is beyond the scope of this rulemaking. One commenter noted that visual TWIC inspection presents a safety issue, as security personnel can be injured or killed by vehicles approaching the gate area. While there are certainly security incidents where attackers can try to use force to breach the perimeter of a secure facility, such incidents are beyond the scope of this rule. One commenter suggested that the U.S. Congress should fully fund the TWIC reader program, and asserted that funding of Federally mandated programs will ensure a degree of financial relief and minimize burdens. While we agree that funding would shift the industry burden to taxpayers, this comment remains beyond the scope of this rule. Finally, this final rule makes a number of minor, technical edits, including updating internal references, to the regulations in 33 CFR Chapter I, Subchapter H, in addition to the changes discussed elsewhere in the preamble. These edits affect the following sections in Title 33 of the CFR: • 101.105 Definitions. • 101.514 TWIC Requirement. • 101.515 TWIC/Personal Identification. • 104.105 Applicability. • 104.115 Compliance. • 104.120 Compliance documentation. • 104.200 Owner or operator. • 104.215 Vessel Security Officer (VSO). • 104.235 Vessel recordkeeping requirements. • 104.260 Security systems and equipment maintenance. • 104.267 Security measures for newly hired employees. • 104.292 Additional requirements— passenger vessels and ferries. • 104.405 Format of the Vessel Security Plan (VSP). • 104.410 Submission and approval. • 105.115 Compliance dates. • 105.120 Compliance documentation. • 105.200 Owner or operator. • 105.257 Security measures for newly hired employees. • 105.290 Additional requirements— cruise ship terminals. • 105.296 Additional requirements— barge fleeting facilities. • 105.405 Format and content of the Facility Security Plan (FSP). • 105.410 Submission and approval. • 106.110 Compliance dates. • 106.115 Compliance documentation. • 106.200 Owner or operator. • 106.262 Security measures for newly-hired employees. • 106.405 Format and content of the Facility Security Plan (FSP). • 106.410 Submission and approval. VI. Regulatory Analyses We developed this rule after considering numerous statutes and Executive Orders (E.O.s) related to rulemaking. Below we summarize our analyses based on these statutes or E.O.s. A. Regulatory Planning and Review E.O.s 12866 (‘‘Regulatory Planning and Review’’) and 13563 (‘‘Improving Regulation and Regulatory Review’’) direct agencies to assess the costs and benefits of available regulatory alternatives and, if regulation is necessary, to select regulatory approaches that maximize net benefits (including potential economic, environmental, public health and safety effects, distributive impacts, and equity). E.O. 13563 emphasizes the importance of quantifying both costs and benefits, of reducing costs, of harmonizing rules, and of promoting flexibility. This final rule is a significant regulatory action under section 3(f) of E.O. 12866. The Office of Management and Budget (OMB) has reviewed it under that Order. It requires an assessment of potential costs and benefits under section 6(a)(3) of E.O. 12866. A final assessment is available in the docket, and a summary follows. We amend our regulations on certain MTSA-regulated vessels and facilities to include requirements for electronic TWIC inspection to be used for access control for unescorted access to secure areas. Table 3 summarizes the costs and benefits of this final rule. TABLE 3—SUMMARY OF COSTS AND BENEFITS 64 Category Final rule Applicability ............................................................................................... High-risk MTSA-regulated facilities and high risk MTSA-regulated vessels with greater than 20 TWIC-holding crew. 1 vessel. 525 facilities. $21.9 (annualized). $153.8 (10-year). Time to retrieve or replace lost PINs for use with TWICs. Enhanced access control and security at U.S. maritime facilities and on board U.S.-flagged vessels. Reduction of human error when checking identification and manning access points. Affected Population .................................................................................. Costs ($ millions, 7% discount rate) ........................................................ sradovich on DSK3GMQ082PROD with RULES2 Costs (Qualitative) .................................................................................... Benefits (Qualitative) ................................................................................ VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 PO 00000 Frm 00046 Fmt 4701 Sfmt 4700 E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations Table 4 summarizes the changes in the regulatory analysis as we moved from the NPRM to this final rule. These changes to the RA came from either policy changes on the electronic TWIC inspection requirements, public comments received after the publication of the NPRM in March 2013, or simply 57697 from updating the data and information that informed our regulatory analysis. TABLE 4—CHANGES IN REGULATORY ANALYSIS FROM NPRM TO FINAL RULE Element of regulatory analysis Reason changed Explanation of change Affected Population ......................... Policy change ................................ Cost of TWIC Readers .................... Update to reflect current prices for TWIC readers. Comments received ....................... Wages for transportation workers ... Maintenance Cost of TWIC Readers. Number of TWIC Readers .............. More current BLS data .................. Comment received ........................ a. Barge fleeting facilities were removed reducing the previous facility population of 532 to 525, and b. Crew size changed to 20 (instead of 14) and thus reducing the number of vessels to 1. The most recent prices of electronic TWIC readers as published in GSA schedule and TSA’s QTL were significantly reduced. Some public comments suggested that TWIC reader costs have declined since the NPRM RA data was collected. Revised labor cost by using May 2012 BLS data. Revised this cost assumption from 5% of the total cost of a TWIC Reader to 10%. Per one large ferry passenger facility’s suggestion, accommodated this facility’s higher number of readers in cost estimates. Comment received ........................ sradovich on DSK3GMQ082PROD with RULES2 In this final rule, we require owners and operators of certain vessels and facilities regulated by the Coast Guard under 33 CFR Chapter I, subchapter H, to use electronic TWIC inspection designed to work with TWIC as an access control measure. This final rule also includes recordkeeping requirements for those owners and operators required to use an electronic TWIC inspection, and amendments to security plans previously approved by the Coast Guard to incorporate TWIC requirements. The provisions in this final rule enhance the security of vessels, ports, and other facilities by ensuring that only individuals who hold valid TWICs are granted unescorted access to secure areas at those locations. It will also further implement the MTSA transportation security card requirement, as well as the SAFE Port Act electronic TWIC inspection requirements. We estimate that this final rule would specifically affect owners and operators of certain MTSA-regulated vessels and facilities in Risk Group A with additional costs. As previously discussed, Risk Group A would consist of those vessels and facilities with highest consequence for a TSI. Affected facilities in Risk Group A would include: (1) Facilities, including barge fleeting facilities, that handle or receive vessels carrying CDC in bulk; and (2) Facilities that receive vessels certificated to carry more than 1,000 passengers. Affected vessels in Risk Group A would include: (1) Vessels that carry CDC in bulk; (2) Vessels certificated to carry more than 1,000 passengers; and (3) Towing vessels engaged in towing barges subject to (1) or (2). In addition, this proposal provides an electronic TWIC inspection exemption for vessels with 20 or fewer TWIC-holding crewmembers, further reducing the number of affected vessels in Risk Group A. Based on the risk-based hierarchy described in the preamble of this final rule and data from the Coast Guard’s MISLE database, we estimate this final rule will affect 525 facilities and 1 vessel with additional costs. All of these facilities and vessels are in Risk Group A. The final rule adds flexibility in using existing PACS to comply with the electronic TWIC inspection requirements, which may result in lower costs for affected facilities and vessels. For the purposes of regulatory analysis, however, we prepare the cost estimate assuming that all of the affected population will install and use electronic TWIC readers. The following discussion of the cost analysis is based on this assumption. To estimate the costs for this proposal, we use data from a variety of sources, including MISLE, TWIC Pilot Study, TSA’s ICE and QTL lists, public comments, and the GSA schedule among others. When data from the TWIC pilot are used (to estimate the costs for installation, integration, and PACS integration), the data are broken down by per electronic reader cost for each facility type. By distilling the costs from the TWIC Pilot down to a per TWIC reader cost by facility type, we are able to smooth out the varied costs in the TWIC Pilot and effectively normalize the TWIC Pilot costs before applying the costs to the full affected population of this rulemaking. The primary cost driver for this final rule is the capital cost associated with the purchase and installation of TWIC readers into access control systems. These costs include the cost of TWIC reader hardware and software, as well as costs associated with the installation, infrastructure, and integration with a PACS. Operational costs associated with this rulemaking include security plan amendments, recordkeeping, updates of the list of cancelled TWICs, training, and system maintenance. We also include operational and maintenance costs, which we estimate to be five percent of the cost of the TWIC reader hardware and software and are incurred annually. Table 5 summarizes our estimates for total capital costs by facility type during the 2-year implementation period; Table 6 provides the operational costs for facilities by four requirements throughout the analysis period.65 64 For a more detailed discussion of costs and benefits, see the full RA available in the online docket for this rulemaking. Appendix G of that document outlines the costs by provision and also discusses the complementary nature of the provisions and the subsequent difficulty in distinguishing independent benefits from individual provisions. 65 See RA Tables 4.10 and 4.16 and associated discussion for the specific sources for our estimates as well as how they were developed. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 PO 00000 Frm 00047 Fmt 4701 Sfmt 4700 E:\FR\FM\23AUR2.SGM 23AUR2 57698 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations TABLE 5—TOTAL FACILITY CAPITAL COSTS, 2-YEAR IMPLEMENTATION PERIOD (YEAR 1 AND YEAR 2) Total readers Facility type Total reader costs ($) Number Fixed Portable Fixed Total costs ($) Portable Install. Infra-structure PACS Total capital cost ($) Bulk Liquid ... Break Bulk and Solids Container ...... Large Passenger ....... Small Passenger ....... Mixed Use .... 290 1,535 292 8,247,555 2,054,220 11,475,387 20,033,055 15,279,201 57,089,418 16 3 91 36 45 8 488,943 193,428 316,575 56,280 904,128 909,612 3,724,904 589,952 2,938,552 1,020,184 8,373,102 2,769,456 92 42 524 225,666 3,686,340 1,682,152 4,102,368 841,642 10,538,168 63 61 0 180 426 72 0 967,140 2,996,910 506,520 0 8,191,008 0 6,300,000 0 1,242,108 2,996,910 17,206,776 Total ...... 525 1,884 1,367 10,122,732 9,616,845 23,162,287 34,750,279 21,321,687 98,973,830 TABLE 6—ANNUAL OPERATIONAL COSTS FOR FACILITIES Amendments Years after publication Recordkeeping Training Canceled card list Total Personnel FSO 1 ............................................................................... 2 ............................................................................... 3 ............................................................................... 4 ............................................................................... 5 ............................................................................... 6 ............................................................................... 7 ............................................................................... 8 ............................................................................... 9 ............................................................................... 10 ............................................................................. $467,614 465,836 0 0 0 0 0 0 0 0 $748,182 857,138 224,028 224,028 224,028 224,028 224,028 224,028 224,028 224,028 $486,319 484,469 970,788 970,788 970,788 970,788 970,788 970,788 970,788 970,788 $209,219 261,523 104,609 104,609 104,609 104,609 104,609 104,609 104,609 104,609 $74,676 93,345 37,338 37,338 37,338 37,338 37,338 37,338 37,338 37,338 $1,986,009 2,162,312 1,336,763 1,336,763 1,336,763 1,336,763 1,336,763 1,336,763 1,336,763 1,336,763 Total .................................................................. 933,450 3,397,544 8,737,092 1,307,616 466,725 14,842,427 Table 7 shows the 10-year period of analysis for the total costs by facility type. These facility costs do not include costs associated with delays or replacement of TWICs, which are discussed later. These estimates include capital replacement costs for TWIC reader hardware and software beginning 5 years after implementation. These costs are reduced from those estimated in the NPRM given cost reductions in TWIC readers and the removal of TWIC reader requirements for barge fleeting areas. TABLE 7—10-YEAR TOTAL COSTS, BY FACILITY TYPE * [$ Millions] Year Bulk liquid Break bulk and solids Container Large passenger Small passenger Mixed use Total $31.6 32.3 4.6 4.6 4.6 10.1 10.1 4.6 4.6 4.6 $2.4 2.4 0.3 0.3 0.3 0.8 0.8 0.3 0.3 0.3 $0.8 0.8 0.1 0.1 0.1 0.2 0.2 0.1 0.1 0.1 $9.8 10.0 1.4 1.4 1.4 3.1 3.1 1.4 1.4 1.4 $7.4 7.5 1.1 1.1 1.1 2.4 2.4 1.1 1.1 1.1 $4.4 4.5 0.6 0.6 0.6 1.4 1.4 0.6 0.6 0.6 $56.3 57.4 8.1 8.1 8.1 18.0 18.0 8.1 8.1 8.1 Total Undiscounted ........................... Total Discounted at 7% ........................... Total Discounted at 3% ........................... sradovich on DSK3GMQ082PROD with RULES2 1 ............................................................... 2 ............................................................... 3 ............................................................... 4 ............................................................... 5 ............................................................... 6 ............................................................... 7 ............................................................... 8 ............................................................... 9 ............................................................... 10 ............................................................. 111.5 88.7 100.4 8.3 6.6 7.5 2.7 2.1 2.4 34.5 27.5 31.1 26.0 20.7 23.4 15.4 12.2 13.9 198.3 157.8 178.7 Note: Numbers may not total due to rounding. * These facilities are regulated because they handle CDC or more than 1,000 passengers. In the U.S. marine transportation system, facilities often handle a variety of commodities and provide a variety of commercial services. These facility types have different costs based on physical characteristics, such as the number of access points that would require TWIC readers, and other data received from the TWIC Pilot Study. See the final RA for details on different facility types and data from the TWIC Pilot Study. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 PO 00000 Frm 00048 Fmt 4701 Sfmt 4700 E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations To account for potential opportunity costs associated with the delays as a result of the electronic TWIC inspection requirements, we estimate a cost associated with failed reads.66 We provide a range of delay costs based on different delays in seconds and also based on the number of times a TWIC- holder may have their card read on a weekly basis. By using a range of delay costs, we are able to account for multiple scenarios where an invalid electronic TWIC inspection transaction would lead to the use of a secondary processing operation, such as a visual TWIC inspection, additional 57699 identification validation, or other provisions as set forth in the FSP.67 Table 8 provides the annual costs associated with delays caused by invalid transactions for Risk Group A Facilities. TABLE 8—COST OF DELAYS DUE TO INVALID TRANSACTION PER YEAR, FOR RISK GROUP A FACILITIES 1 Read per week 2 Reads per week 3 Reads per week 4 Reads per week 5 Reads per week 6 Seconds ........................................................................ 14 Seconds ...................................................................... 30 Seconds ...................................................................... 60 Seconds ...................................................................... 120 Seconds .................................................................... $94,339 220,125 471,696 943,391 1,886,782 $188,678 440,249 943,391 1,886,782 3,773,564 $283,017 660,374 1,415,087 2,830,173 5,660,346 $377,356 880,498 1,886,782 3,773,564 7,547,129 $471,696 1,100,623 2,358,478 4,716,955 9,433,911 $283,017 660,374 1,415,087 2,830,173 5,660,346 Average ..................................................................... 723,266 1,446,533 2,169,799 2,893,066 3,616,332 2,169,799 For the purposes of this analysis, we used the cost of delay estimate of $2.2 million per year, which represents the average delay across all iterations of delay times and electronic TWIC inspection transactions. The use of TWIC readers will also increase the likelihood of faulty TWICs (TWICs that are not machine readable) being identified and the need for secondary screening procedures so affected workers and operators can address these issues.68 If a TWICholder’s card is faulty and cannot be read, the TWIC-holder would need to travel to a TWIC Enrollment Center to get a replacement TWIC, which may result in additional travel and replacement costs. To account for this, we estimate a cost for a percentage of TWIC-holders to obtain replacement TWICs. Based on information from the TWIC Pilot, we estimate that each year approximately five percent of TWICholders associated with Risk Group A would need to replace TWICs that cannot be read. We estimate that this would cost approximately $254.93 per TWIC-holder to travel to a TWIC Enrollment center and get a replacement TWIC.69 Overall, we estimate that TWIC replacement would cost approximately $2.3 million per year for TWIC Average transactions involving Risk Group A facilities. We assume this is an annual cost, though we anticipate that the rate of TWIC replacements will decrease as TWIC reader use increases, since the number of unreadable TWICs initially identified will decrease as the regular use of TWIC readers will serve to enhance TWIC validity and readability. Table 9 shows the average initial phase-in and annual recurring costs per facility by facility type. This includes capital, operational, delay, and TWIC replacement costs due to invalid TWIC reader transactions. It does not, however, account for vessel costs. TABLE 9—PER FACILITY COST, BY FACILITY TYPE Phase-in & recurring costs Bulk liquid Initial Phase-in Cost ......................................................... Annual Recurring Cost ..................................................... Annual Recurring Cost with Equipment Replacement .... $107,907 14,575 33,701 Break bulk and solids $145,588 19,664 45,470 Container Large passenger $251,211 33,931 78,457 $105,375 14,233 32,910 Small passenger $115,818 15,643 36,172 Mixed use $ 70,758 9,557 22,099 sradovich on DSK3GMQ082PROD with RULES2 For the single Risk Group A vessel with greater than 20 TWIC-holding crewmembers, we assume that this vessel will comply with the requirements by purchasing two portable TWIC readers (total first year cost of $14,070) and deploying them at the main access points of the vessel, replacing them at Year 6. We also estimate $1,339 for VSP amendments; $2,142 for the development of a recordkeeping system; and $2,028 for training in Year 1. Recurring costs include updates of the list of cancelled TWICs ($1,392 per year), ongoing training ($507 per year), and ongoing recordkeeping ($321 per year). We estimate the annualized costs to vessels of this rulemaking to be approximately $7,270 at a 7 percent discount rate. These costs are shown in Table 10. 66 Delays may result from operational, human- or weather-related factors. 67 The final RA contains a discussion of the different failure mode scenarios where an invalid TWIC reader transaction would lead to potential delays and the use of secondary processing. 68 Although current regulations require that TWICs be valid and readable upon request by DHS or law enforcement personnel, we anticipate that widespread use of TWIC readers will initially identify more unreadable cards. However, we expect the regular use of TWIC readers to ultimately serve to enhance compliance with current TWIC card validity and readability requirements. 69 This cost is explained in greater detail in the Final Regulatory Analysis and Final Regulatory Flexibility Analysis. It includes an estimated $194.93 for the average TWIC-holder to travel to a TWIC Enrollment Center, cost to be away from work, wait time at the Enrollment Center, and the $60 fee for a replacement TWIC. Some TWICholders may not need to pay a replacement fee if the TWIC is determined faulty as a result of the card production process. However, these TWIC-holders would chose to travel to a TWIC Enrollment Center to get a replacement TWIC instead of waiting to receive it by mail. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 PO 00000 Frm 00049 Fmt 4701 Sfmt 4700 E:\FR\FM\23AUR2.SGM 23AUR2 57700 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations TABLE 10—TOTAL VESSEL COSTS (RISK GROUP A WITH MORE THAN 20 TWIC-HOLDING CREWMEMBERS) * Year Undiscounted 7% 3% 1 ........................................................................................................................................................... 2 ........................................................................................................................................................... 3 ........................................................................................................................................................... 4 ........................................................................................................................................................... 5 ........................................................................................................................................................... 6 ........................................................................................................................................................... 7 ........................................................................................................................................................... 8 ........................................................................................................................................................... 9 ........................................................................................................................................................... 10 ......................................................................................................................................................... $20,971 3,627 3,627 3,627 3,627 17,697 3,627 3,627 3,627 3,627 $19,599 3,168 2,961 2,767 2,586 11,792 2,259 2,111 1,973 1,844 $20,360 3,419 3,319 3,222 3,129 14,821 2,949 2,863 2,780 2,699 Total .............................................................................................................................................. Annualized ........................................................................................................................................... 67,682 51,058 7,270 59,560 $,982 * Because the affected population is only one vessel, we assume that this vessel will comply within the first year of implementation. We estimate the annualized cost of this final rule to industry over 10 years to be approximately $21.9 million at a 7 percent discount rate. The main cost drivers of this final rule are the acquisition and installation of TWIC readers and the maintenance of the affected entity’s electronic TWIC inspection system. Initial costs, which will be distributed over a 2-year implementation phase, consist predominantly of the costs to purchase and install TWIC readers and to integrate them with owners’ and operators’ PACS. Annual costs will be driven by costs associated with updates of the list of cancelled TWICs, recordkeeping, training, system maintenance and opportunity costs associated with failed TWIC reader transactions. We estimated the present value average costs of this final rule on industry for a 10-year period as summarized in Table 11. The costs were discounted at 3 and 7 percent as set forth by guidance in OMB Circular A– 4. TABLE 11—TOTAL INDUSTRY COST, RISK GROUP A [$ Millions] Year Facility Vessel Additional costs * Undiscounted 7% 3% 1 ................................................................................... 2 ................................................................................... 3 ................................................................................... 4 ................................................................................... 5 ................................................................................... 6 ................................................................................... 7 ................................................................................... 8 ................................................................................... 9 ................................................................................... 10 ................................................................................. $51.5 52.6 3.3 3.3 3.3 13.2 13.2 3.3 3.3 3.3 $0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 $4.8 4.8 4.8 4.8 4.8 4.8 4.8 4.8 4.8 4.8 $56.3 57.4 8.1 8.1 8.1 18.0 18.0 8.1 8.1 8.1 $52.6 50.2 6.6 6.2 5.8 12.0 11.2 4.7 4.4 4.1 $54.7 54.1 7.4 7.2 7.0 15.1 14.6 6.4 6.2 6.0 Total ...................................................................... Annualized ................................................................... 150.3 0.1 48.0 198.4 157.8 22.5 178.8 21.0 * This includes additional delay, travel, and TWIC replacement costs due to TWIC failures. As this final rule will require amendments to FSPs and VSPs, we estimate a cost to the government to review these amendments during the implementation period, but do not anticipate any further annual cost to the government from this final rule. For the total implementation period, the total government cost will be $93,177 at a 7 percent discount rate. Table 12 shows the 10-year government costs. TABLE 12—GOVERNMENT COSTS * sradovich on DSK3GMQ082PROD with RULES2 Year FSP 1 ........................................................................................................... 2 ........................................................................................................... 3 ........................................................................................................... 4 ........................................................................................................... 5 ........................................................................................................... 6 ........................................................................................................... 7 ........................................................................................................... 8 ........................................................................................................... 9 ........................................................................................................... 10 ......................................................................................................... VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 PO 00000 Frm 00050 Fmt 4701 $51,450 51,450 0 0 0 0 0 0 0 0 Sfmt 4700 VSP Total undiscounted $166 0 0 0 0 0 0 0 0 0 E:\FR\FM\23AUR2.SGM $51,616 51,450 0 0 0 0 0 0 0 0 23AUR2 7% 3% $48,239 44,938 0 0 0 0 0 0 0 0 $50,112 48,497 0 0 0 0 0 0 0 0 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations 57701 TABLE 12—GOVERNMENT COSTS *—Continued Year FSP Total .............................................................................................. 102,900 Total undiscounted VSP 166 103,066 Annualized ........................................................................................... 13,266 7% 93,177 3% 98,609 11,560 * After implementation, we estimate there would be no additional government costs for plan review as additional updates would be covered under existing plan review requirements and resources. sradovich on DSK3GMQ082PROD with RULES2 Based on the provisions in this final rule and recent data, we estimated the average first-year cost of this final rule (combined industry and government) to be approximately $52.1 million or $54.1 million at a 7 or 3 percent discount rate, respectively. The undiscounted annual recurring cost for this final rule is approximately $7.5 million in every year except years 6 and 7, due to equipment replacement 5 years after implementation. The annualized cost of this final rule is $21.9 million at 7 percent and $20.4 million at 3 percent. The 10-year cost to industry and government of this final rule is approximately $153.8 million at a 7 percent discount rate, and $173.9 million at a 3 percent discount rate. The benefits of the final rule include enhancing the security of vessels, ports, and other facilities by ensuring that only individuals who hold TWICs are granted unescorted access to secure areas at those locations and reducing regulatory uncertainty by closing the gap between MTSA and SAFE Port Act requirements for electronic TWIC inspection and regulatory requirements. Electronic TWIC inspection programs will make identification, validation, and verification of individuals attempting to gain unescorted access to a secure area more reliable and also will help to alleviate potential sources of human error when checking credentials at access points. Identity verification ensures that the individual presenting the TWIC is the same person to whom the TWIC was issued. Card authentication ensures that the TWIC is not counterfeit, and card validation ensures that the TWIC has not expired or been revoked by TSA, or reported as lost, stolen, or damaged. Furthermore, the standardization of TWIC readers on a national scale could provide additional benefits in the form of efficiency gains in implementing access control systems throughout port facilities and nationally for companies operating in multiple locations. Data limitations preclude us monetizing these benefits, but instead, we use break-even analysis. Break-even analysis is useful when it is not possible to quantify the benefits of a regulatory action. OMB Circular A–4 recommends a ‘‘threshold’’ or ‘‘break-even’’ analysis when non-quantified benefits are important to evaluating the benefits of a regulation. Break-even analysis answers the question, ‘‘How small could the value of the non-quantified benefits be (or how large would the value of the non-quantified costs need to be) before the rule would yield zero net benefits?’’ 70 For this rulemaking, we calculate a potential range of break-even results from the estimated consequences of the three attack scenarios that are most likely to be mitigated by the use of TWIC readers. Because the primary function of the TWIC card and electronic TWIC inspection is to enhance access control and identity verification and validation, the attack scenarios evaluated within MSRAM to provide the consequence data for this analysis were limited to the following: • Truck Bomb Æ Armed terrorists use a truck loaded with explosives to attack the target focal point. The terrorists will attempt to overcome guards and barriers if they encounter them. • Terrorist Assault Team Æ A team of terrorists using weapons and explosives attack the target focal point. Assume the terrorists have done prior planning surveillance, but have no insider support of assault. • Passenger/Passerby Explosives/ Improvised Explosive Device Æ Terrorists exploit inadequate access control and detonate carried explosives at the target focal point. Assume the terrorists approach the target under cover of legitimate presence and are not armed. Note: for this attack mode, terrorist is not an insider. The focus on these three attack scenarios allows us to look at specific attack scenarios that are most likely to be mitigated by the electronic TWIC inspection programs. These scenarios were chosen because they represent the scenarios most likely to benefit from the enhanced access control afforded by electronic TWIC inspection, as they require would-be attackers gaining access to the target in question. For these three attack types, the aggressor would first need to gain access to the facility to inflict maximum damage. Because the function of the electronic TWIC inspection is to enhance access control, the deployment of TWIC readers would increase the likelihood of identifying and denying access to an individual attempting nefarious acts. For the break-even analysis, we estimate the consequences of these three scenarios by estimating the number of casualties and serious injuries that would occur had the attack been successful. To monetize the value of fatalities prevented, we use the concept of ‘‘value of a statistical life’’ (VSL), which is commonly used in regulatory analyses. The VSL does not represent the dollar value of a person’s life, but the amount society would be willing to pay to reduce the probability of premature death. We currently use a value of $9.1 million as an estimate of VSL.71 This break-even analysis does not consider any property damage, environmental damage, indirect or macroeconomic consequences these terrorist attacks might cause. Consequently, the economic impacts of the terrorist attacks estimated for this series of break-even analyses would be higher if these other impacts were considered. 70 U.S. Office of Management and Budget, Circular A–4, September 17, 2003, page 2. 71 See the Department of Transportation’s ‘‘Guidance on the Treatment of the Economic Value of a Statistical Life in U.S. Department of Transportation Analyses’’ https://www.dot.gov/sites/ dot.dev/files/docs/VSL%20Guidance%202013.pdf. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 PO 00000 Frm 00051 Fmt 4701 Sfmt 4700 E:\FR\FM\23AUR2.SGM 23AUR2 57702 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations TABLE 13—ANNUAL RISK REDUCTION AND ATTACKS AVERTED REQUIRED FOR COSTS TO EQUAL BENEFITS, FINAL RULE ALTERNATIVE Annualized cost, 7% discount rate ($ Millions) Final Rule Alternative ...................................................................................... As shown in Table 13, an avoided terrorist attack at an average target is equivalent to $5.01 billion in avoided consequences. This final rule is estimated to cost approximately $21.9 million annually. Using the estimated annualized cost of this regulation, the annual reduction in the probability of attack to a Risk Group A facility that would just equate avoided consequences with cost is less than 0.5 percent. To state this in another way, if implementing this regulation will lower the likelihood of a successful terrorist attack by more than 0.4 percent each year, then this would be a socially efficient use of resources. This final rule would be cost effective if it prevented Average maximum consequence ($ Millions) Required reduction in risk to break-even $5,014.1 0.4% $21.9 one terrorist attack with consequence equal to the average every 229 years ($5,014.1/$21.9). These small changes in required risk reduction suggest that the potential benefits of the final rule justify the costs. For the final rule alternative, we assess that all Risk Group A facilities will be required to conduct electronic TWIC inspections. On the vessel side, we assess that all Risk Group A vessels with a crew size greater than 20 TWICholding crewmembers will likely carry two portable TWIC readers. For this alternatives analysis, we look at several different ways to implement electronic TWIC inspection requirements based on the Risk Group hierarchy. These alternatives include requiring TWIC Frequency of attacks averted to breakeven One every 229 years readers for Risk Group A and B facilities, along with Risk Group A vessels with more than 14 TWICholding crewmembers, Risk Group A and container facilities, along with Risk Group A vessels with more than 14 TWIC-holding crewmembers, adding certain high-risk facilities to Risk Group A, including petroleum refineries, nonCDC bulk hazardous materials facilities, and petroleum storage facilities, and Risk Group A facilities and all selfpropelled Risk Group A vessels. Table 14 summarizes the cost of the alternatives considered. The costs displayed are the 10-year costs and the 10-year annualized cost, each discounted at 7 percent. TABLE 14—REGULATORY ALTERNATIVES Facility population Description Final Rule Alternative ........................ NPRM Alternative ............................. Alternative 2 ...................................... Alternative 3 ...................................... Alternative 4 ...................................... sradovich on DSK3GMQ082PROD with RULES2 Alternative 5 (ANPRM Alternative) ... All Risk Group A facilities and Risk Group A vessels with more than 20 crewmembers. All Risk Group A facilities and Risk Group A vessels with more than 14 crewmembers. All Risk Group A facilities and Risk Group A vessels (except barges). Risk Group A and all container facilities and Risk Group A vessels with more than 14 crewmembers. All Risk Group A facilities, plus additional high consequence facilities including petroleum refineries, non-CDC bulk hazardous materials facilities, and petroleum storage facilities, and Risk Group A vessels with more than 14 crewmembers. Risk Group A and B Facilities and Risk Group A vessels with more than 14 crewmembers. When comparing alternatives, we also looked at the results of the break-even analysis for these alternatives. As Table 15 shows, for the overall average maximum consequence, the final rule VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 Frm 00052 Fmt 4701 Sfmt 4700 Annualized cost ($ millions, at 7% discount rate) 525 1 $153.8 $21.9 532 38 153.5 21.9 532 138 158.2 22.5 651 38 182.6 26.0 1,174 38 309.5 44.1 2,173 38 548.9 78.1 alternative will require the lowest reduction in risk for the costs of the rule to be justified. As the purpose of this rulemaking is to enhance security to mitigate a TSI, we assess the break-even PO 00000 Total cost ($ millions, at 7% discount rate) Vessel population for the overall consequence of a TSI. It is assumed that the highest consequence targets will be the most attractive targets for potential terrorist attack. E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations 57703 TABLE 15—SUMMARY OF REQUIRED RISK REDUCTION AND ATTACKS AVERTED BY REGULATORY ALTERNATIVE, OVERALL (IN $ MILLIONS) Annualized cost, 7% discount rate Average consequence Required reduction in risk $21.9 $5,014.10 0.44% NPRM Alternative ....................................................................................... 21.9 5,014.10 0.44% Risk Group A facilities and all Risk Group A vessels, except barges ....... 22.5 5,014.10 0.45% Risk Group A and all container facilities and Risk Group A vessels with more than 14 crewmembers. All Risk Group A facilities, plus additional high consequence facilities including petroleum refineries, non-CDC bulk hazardous materials facilities, and petroleum storage facilities, and Risk Group A vessels with more than 14 crewmembers. ANPRM Alternative Risk Groups A and B facilities and Risk Group A vessels with more than 14 crewmembers. sradovich on DSK3GMQ082PROD with RULES2 Final Rule Alternative ................................................................................. 26.0 4,158.7 0.63% 44.1 2,211.3 1.99% 78.1 1,647.1 4.74% Final rule Alternative—Risk Group A Facilities and Risk Group A Vessels with More than 20 TWIC-Holding Crewmembers: The analysis for this alternative is discussed in detail previously in this section, as it is the alternative we have chosen in this final rule. NPRM Alternative—Risk Group A Facilities and Risk Group A Vessels with More than 14 TWIC-Holding Crewmembers: The analysis for this alternative was discussed in detail in the previously published NPRM’s regulatory impact analysis.72 The two key differences between the final rule and NPRM alternative are the exemption of barge fleeting facilities reducing the affected facility population to 525 and the adoption of the crew size of 20 or more removing all vessels except one in the final rule as opposed to all 532 facilities and 38 vessels in the Risk Group A. Alternative 2—Risk Group A Facilities and All Risk Group A Vessels, Except Barges: This alternative would require electronic TWIC inspection to be used at all Risk Group A facilities and for all Risk Group A vessels, except barges. This alternative would increase the burden on industry and small entities by increasing the affected population from 1 vessel to 138 vessels. The number of facilities would be the same as in the NPRM alternative. Under this alternative, annualized cost of this rulemaking would remain the same at $21.9 million, at a 7 percent discount rate. The discounted 10-year costs would go from $157.9 million to $158.2 million. While this alternative does not lead to a significant increase in costs, 72 78 FR 17782. VerDate Sep<11>2014 19:12 Aug 22, 2016 we reject it because requiring electronic TWIC inspection on vessels with 14 or fewer TWIC-holding crewmembers is unnecessary, as crews with that few members are known to all on the vessel. This crewmember limit was proposed in the ANPRM and in the NPRM, and was based on a recommendation from TSAC. See the discussion in the NPRM on ‘‘Recurring Unescorted Access’’ and ‘‘TWIC Reader Exemption for Vessels with 14 or Fewer TWIC-Holding Crewmembers’’ for more details.73 Alternative 3—Risk Group A and All Container Facilities and Risk Group A Vessels with More than 14 TWICHolding Crewmembers: For this alternative, we assumed that only those facilities in Risk Group A, as previously defined, and all container facilities will require electronic TWIC inspection. This alternative would increase the burden on industry and small entities by increasing the affected population from 525 facilities to 651 facilities. Under this scenario, the annualized cost of this rulemaking would increase from $21.9 million to $26.0 million, at a 7 percent discount rate. The discounted 10-year costs would go from $153.8 million to $182.6 million. The inclusion of container facilities would also potentially have adverse environmental impacts due to increased air emissions due to longer wait (‘‘queuing’’) times and congestion at facilities. We considered this alternative because of the risk associated with container facilities due to the transfer risk associated with containers. As discussed in the preamble of the NPRM, many of the high-risk threat scenarios at container facilities would not be 73 78 Jkt 238001 PO 00000 FR 17803 and 78 FR 17813, respectively. Frm 00053 Fmt 4701 Sfmt 4700 Frequency of attacks averted One every years. One every years. One every years. One every years. One every years. 229 229.0 222.8 160.0 50.1 One every 21.1 years. mitigated by electronic TWIC inspection. The costs for electronic TWIC inspection at container facilities would not be justified by the amount of potential risk reduction at these facilities from such a measure. While container facilities pose a higher transfer risk (i.e., there is a greater risk of a threat coming through a container facility and inflicting harm or damage elsewhere than with any other facility type), such threats are not mitigated by the use of TWIC readers. Furthermore, the use of TWIC readers, or other access control features, would not mitigate the threat associated with the contents of a container. The electronic TWIC inspection serves as an additional access control measure, but would not improve screening of cargoes for dangerous substances or devices. Alternative 4—Adding certain high consequence facilities to Risk Group A (these additional facilities to include petroleum refineries, non-CDC bulk hazardous materials facilities, and petroleum storage facilities): For this alternative, we moved three facility categories—petroleum refineries, non-CDC bulk hazardous materials facilities, and petroleum storage facilities—into Risk Group A from Risk Group B based on the average maximum consequence for these facility types. This alternative would increase the burden on industry by increasing the affected population from 525 facilities to 1,174 facilities. Under this scenario, the annualized cost of this rulemaking would increase from $21.9 million to $44.1 million, at a 7 percent discount rate. The discounted 10-year costs would go from $153.8 million to $309.5 million. We considered this alternative based on the high MSRAM consequences E:\FR\FM\23AUR2.SGM 23AUR2 sradovich on DSK3GMQ082PROD with RULES2 57704 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations associated with these three facility types, as well as due to the perception that petroleum facilities pose a greater security risk than other facility types. Despite the high MSRAM consequences for these facility types, the overall risk as determined in the AHP were not as high as those in the current Risk Group A, and therefore, we rejected this alternative and maintained the AHPbased risk groupings. Alternative 5—Risk Group A and Risk Group B Facilities and Risk Group A Vessels with More than 14 Crewmembers: Alternative 5 would require electronic TWIC inspection to be used at all Risk Group A and Risk Group B facilities, and Risk Group A vessels with greater than 14 TWIC-holding crewmembers. This alternative would increase the burden on industry and small entities by increasing the affected population from 525 facilities to 2,173 facilities. This increase in facilities would extend the affected population to facilities that fall under the second risk tier. Under this alternative, annualized cost of this rulemaking would increase from $21.9 million to $78.1 million, at a 7 percent discount rate. The discounted 10-year costs would go from $153.8 million to $548.9 million. Based on a recent study by the Homeland Security Institute, as discussed in the preamble to the NPRM, the difference in risk between facilities in Risk Groups A and B is clearly defined, indicating that the two Risk Groups do not require the same level of TWIC requirements. Further, as discussed in the benefits section of this analysis, the break-even point, or the amount of risk that would need to be reduced for costs to equal benefits, for this alternative is much higher than that of the final rule alternative. For these reasons, we rejected this alternative. The provisions in this final rule are taken in order to meet requirements set forth in MTSA and the SAFE Port Act. The final rule, as presented, represents the lowest cost alternative, as discussed above. We have focused this rulemaking on the highest risk population so as to reduce the impacts of this rule as much as possible. Also, we have created a performance standard that allows the affected population to implement the requirements in a manner most conducive to their own business practices. Furthermore, by allowing for flexibilities, such as the use of fixed or portable TWIC readers, and removing VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 vessels with 20 or fewer TWIC-holding crewmembers from the requirements, we have reduced potential burden on all entities, including small entities. Furthermore, we believe that providing any additional relief for small entities would conflict with the purpose of this rulemaking, as the objective is to enhance access control and reduce risk of a TSI. Providing relief of the proposed requirements based on entity size would contradict that stated purpose and leave small entities, which may possess as great a risk as entities that exceed the Small Business Administration (SBA) size standards, more vulnerable to a TSI. B. Small Entities Under the Regulatory Flexibility Act, 5 U.S.C. 601–612, we have considered whether this rule would have a significant economic impact on a substantial number of small entities. The term ‘‘small entities’’ comprises small businesses, not-for-profit organizations that are independently owned and operated and are not dominant in their fields, and governmental jurisdictions with populations of less than 50,000. A Final Regulatory Flexibility Analysis discussing the impact of this final rule on small entities is available in the docket, and a summary follows. For this final rule, we estimated costs for mandatory electronic TWIC inspection for approximately 1 vessel and 525 facilities based on the risk assessment hierarchy and current data from the Coast Guard’s MISLE database. Of these 525 facilities that would be affected by the electronic TWIC inspection requirements, we found 306 unique owners. Among these 306 unique owners, there were 31 government-owned entities, 114 companies that exceeded SBA small business size standards, 88 companies considered small by SBA size standards, and 73 companies for which no information was available. For the purposes of this analysis, we consider all entities for which information was not available to be small. There were no not-for-profit entities in our affected population. Of the 31 government jurisdictions that would be affected by this final rule, 24 exceed the 50,000 population threshold as defined by the Regulatory Flexibility Act to be considered small, and the remaining 7 have government revenue levels such that there would not be an impact PO 00000 Frm 00054 Fmt 4701 Sfmt 4700 greater than 1 percent of government revenue.74 We were able to find revenue information for 64 of the 88 businesses deemed small by SBA size standards.75 We then determined the impacts of the final rule on these companies by comparing the cost of the final rule to the average per facility cost of this rulemaking. To determine the average per facility cost, we average the per facility cost for all facility types using the same cost per facility type breakdown as used to assess the costs of this proposal. We then found what percent impact on revenue the final rule will have based on implementation costs (including capital costs) and annual recurring costs (including updates of the list of cancelled TWICs, recordkeeping, and training). We estimate these costs to be, on average $195,715 per entity during the implementation period and $12,612 per entity in annual recurring cost.76 The actual cost faced by a specific facility will vary based on a number of factors, such as the number of access points. Smaller facilities should in general incur lower costs, but the Coast Guard is unable to distinguish cost estimates on a facility-by-facility basis. We note that in some cases owners and operators might be able to finance the equipment costs as needed and such financing scenario could further decrease the impact on the facility owner and operators. We base our impact analysis on average cost to regulated entities due to the flexibility afforded by this final rule to individual facilities to determine how best to implement electronic TWIC inspection requirements.77 Table 16 shows the potential revenue impacts for small businesses impacted by this final rule. 74 ‘‘Government revenues’’ used for this analysis include tax revenues, and in some cases, operating revenues for government owned waterfront facilities. 75 SBA small business standards are based on either company revenue or number of employees. Many companies in our sample have employee numbers determining them small, but we were unable to find annual revenue data to pair with the employee data. 76 These are weighted averages, based on the per facility cost displayed in Table 4 and the number of facilities by type. 77 We do not know how a specific facility will comply with this rulemaking in regards to type and number of readers installed, number of personnel requiring training at a given facility, etc. E:\FR\FM\23AUR2.SGM 23AUR2 57705 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations TABLE 16—REVENUE IMPACTS ON AFFECTED SMALL BUSINESSES—FACILITIES Impacts from implementation costs Revenue impact range Number of entities Impacts from recurring annual costs Percent of entities Number of entities Percent of entities 0% < Impact ≤ 1% ........................................................................................... 1% < Impact ≤ 3% ........................................................................................... 3% < Impact ≤ 5% ........................................................................................... 5% < Impact ≤ 10% ......................................................................................... Above 10% ...................................................................................................... 33 4 5 8 14 52 6 8 13 22 57 6 0 1 0 89 9 0 2 0 Total .......................................................................................................... 64 100 64 100 sradovich on DSK3GMQ082PROD with RULES2 The greatest impact is expected to occur during the implementation phase when 48 percent of small businesses that we were able to find revenue data on will experience an impact of greater than 1 percent, and 22 percent of small businesses that we were able to find revenue data on will experience an impact greater than 10 percent. After implementation, the impacts decrease and 89 percent of affected small businesses will see an impact less than 1 percent. We expect the revenue impacts for years with equipment replacement to be between those for implementation and annual impacts. During those years with equipment replacement, we estimate that approximately 3 percent of businesses would see an impact greater than 1 percent, and 0 percent would see an impact greater than 10 percent.78 For vessels, we found that for the 1 vessel that will be affected by this final rule, there is 1 unique owner that did not qualify as small business by SBA size standards. Therefore, we do not provide a revenue impact analysis for affected small business as we provided above for affected facilities. C. Assistance for Small Entities Under section 213(a) of the Small Business Regulatory Enforcement Fairness Act of 1996, Public Law 104– 121, we offered to assist small entities in understanding this rule so that they could better evaluate its effects on them and participate in the rulemaking. The Coast Guard will not retaliate against small entities that question or complain about this rule or any policy or action of the Coast Guard. Small businesses may send comments on the actions of Federal employees who enforce, or otherwise determine compliance with, Federal regulations to the Small Business and Agriculture Regulatory Enforcement Ombudsman and the Regional Small Business 78 We estimate an average cost per facility in years with equipment replacement to be $48,110. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 Regulatory Fairness Boards. The Ombudsman evaluates these actions annually and rates each agency’s responsiveness to small business. If you wish to comment on actions by employees of the Coast Guard, call 1– 888–REG–FAIR (1–888–734–3247). D. Collection of Information This rule calls for a collection of information under the Paperwork Reduction Act of 1995, 44 U.S.C. 3501– 3520. You are not required to respond to a collection of information unless it displays a currently valid OMB control number. As required by 44 U.S.C. 3507(d), we submitted a copy of the final rule to the OMB for its review of the collection of information. As defined in 5 CFR 1320.3(c), ‘‘collection of information’’ comprises reporting, recordkeeping, monitoring, posting, labeling, and other similar actions. The title and description of the information collection, a description of those who must collect the information, and an estimate of the total annual burden follow. The estimate covers the time for reviewing instructions, searching existing sources of data, gathering and maintaining the data needed, and completing and reviewing the collection. Under the provisions of the final rule, the affected facilities and vessel will be required to update their FSPs and VSPs, as well as create and maintain a system of recordkeeping within 2 years of promulgation of the final rule. This requirement will be added to an existing collection with OMB control number 1625–0077. Title: Security Plans for Ports, Vessels, Facilities, Outer Continental Shelf Facilities and Other Security-Related Requirements. OMB Control Number: 1625–0077. Summary of the Collection of Information: This information collection is associated with the maritime security requirements mandated by MTSA. Security assessments, security plans, PO 00000 Frm 00055 Fmt 4701 Sfmt 4700 and other security-related requirements are found in 33 CFR Chapter I, subchapter H. The final rule will require certain vessel and facilities to use electronic readers designed to work with the TWIC as an access control measure. Affected owners and operators will also face requirements associated with electronic TWIC inspection, including recordkeeping requirements for those owners and operators required to use an electronic TWIC reader, and security plan amendments to incorporate TWIC requirements. Need for Information: The information is necessary to show evidence that affected vessels and facilities are complying with the electronic TWIC inspection requirements. Proposed Use of Information: We will use this information to ensure that facilities and vessels are properly implementing and utilizing electronic TWIC inspection programs. Description of the Respondents: The respondents are owners and operators of certain vessel and facilities regulated by the Coast Guard under 33 CFR Chapter I, subchapter H. Number of Respondents: The number of respondents is the 525 facilities that are considered ‘‘high-risk’’ and would be required to modify their existing FSPs, and 1 vessel that would be required to modify its VSP to account for the electronic TWIC inspection requirements. These same populations will be required to create and maintain recordkeeping systems as well. Frequency of Response: The FSP and VSP would need to be amended within 2 years of promulgation to include TWIC reader-related procedures. Recordkeeping requirements will need to be met along a similar timeline. Burden of Response: The estimated burden for facilities would be 17,063 hours in the first year, 17,063 hours in the second year and 3,150 hours in the third year and all subsequent years. The burden for vessels would be 65 burden E:\FR\FM\23AUR2.SGM 23AUR2 57706 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES2 hours in year one, and 6 burden hours for all subsequent years. This includes an estimated 25 burden hours to amend the FSP or VSP, along with an implementation period burden of 40 hours and an annual burden of 6 hours for designing and maintaining a system of records for each facility or vessel, to include recordkeeping related to the list of cancelled TWICs. Estimate of Total Annual Burden Facilities: The estimated burden over the 2-year implementation period for facilities is 25 hours per FSP amendment. Since there are currently 525 facilities that will need to amend their FSPs, the total burden on facilities would be 13,125 hours (525 FSPs × 25 hours per amendment) during the 2-year implementation period, or 6,563 hours each of the first 2 years. Facilities would also face a recordkeeping burden of 21,000 hours during the 2-year implementation period (525 facilities × 40 hours per recordkeeping system), or 10,500 hours each year over the first 2 years. There would also be an annual recordkeeping burden of 3,150 hours (525 facilities × 6 hours per year), starting in the third year. In the second year, the 262 facilities that implemented in the first year would incur the 6 hours of annual recordkeeping, at a burden of 1,572 (262 facilities × 6 hours). The total burden for facilities is estimated at 17,063 (6,563 + 10,500) in Year 1, 17,063 in Year 2 (6,563 + 10,500), and 3,150 in Year 3. Vessels: For the 1 vessel, the burden in the first year would be 25 hours (1 VSP × 25 hour per amendment). Vessels would also face a recordkeeping burden of 40 hours during the 1-year implementation period (1 vessel × 40 hours per recordkeeping system). There would also be an annual recordkeeping burden of 6 hours, starting in Year 2, (1 vessel × 6 hours per year). The total burden for vessels is estimated at 65 (25 + 40) in Year 1 and 6 hours in Years 2 and 3. Total: The total additional burden due to the electronic TWIC inspection rule is estimated at 17,128 (65 for vessels and 17,063 for facilities) in Year 1, 17,069 (6 for vessel and 17,063 for facilities) in Year 2, and 3,156 (6 for vessels and 3,150 for facilities) in Year 3. The current annual burden listed in this collection of information is 1,108,043. The new burden, as a result of this final rule, in Year 1 is 1,125,171 (1,108,043 + 17,128). In Year 2, the new burden, as a result of this final rule, is 1,125,171 (1,108,043 + 17,128) and in Year 3 it is 1,111,199 (1,108,043 + 3,156). The average annual additional burden across the 3 years is 12,425. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 As required by the Paperwork Reduction Act of 1995 (44 U.S.C. 3507(d)), we have submitted a copy of this final rule to OMB for its review of the collection of information. E. Federalism A rule has implications for Federalism under E.O. 13132, Federalism, if it has a substantial direct effect on the States, on the relationship between the national government and the States, or on the distribution of power and responsibilities among the various levels of government. This final rule has been analyzed in accordance with the principles and criteria in E.O. 13132, and it has been determined that this final rule does have Federalism implications or a substantial direct effect on the States. This final rule would update existing regulations by creating a risk-based analysis of MTSA-regulated vessels and facilities. Based on this analysis, each vessel or facility is classified according to its risk level, which then determines whether the vessel or facility will be required to use TWIC readers. Additionally, this final rule will amend recordkeeping requirements and add requirements to amend security plans in order to ensure compliance. It is well-settled that States may not regulate in categories reserved for regulation by the Coast Guard. It is also well-settled, now, that all of the categories covered in 46 U.S.C. 3306, 3703, 7101, and 8101 (design, construction, alteration, repair, maintenance, operation, equipping, personnel qualification, and manning of vessels), as well as the reporting of casualties and any other category in which Congress intended the Coast Guard to be the sole source of a vessel’s obligations, are within fields foreclosed from regulation by the States or local governments. (See the decision of the Supreme Court in the consolidated cases of United States v. Locke and Intertanko v. Locke, 529 U.S. 89, 120 S.Ct. 1135 (March 6, 2000)). The Coast Guard believes the Federalism principles articulated in Locke apply to this final rule since it will require certain MTSA-regulated vessels to carry TWIC readers or a PACS that can conduct electronic TWIC inspection (i.e., required equipment), and to conform to recordkeeping and security plan requirements. In enacting MTSA, Congress articulated a need to address nationwide port security threats while preserving the free flow of interstate and international maritime commerce. Congress identified enhancing global maritime security through implementing international PO 00000 Frm 00056 Fmt 4701 Sfmt 4700 security instruments as furthering this statutory purpose. MTSA’s comprehensive and uniform maritime security regime, founded on the purpose of facilitating interstate and international maritime commerce, indicates that States and local governments are generally foreclosed from regulating within this field. As discussed above, vessel equipping and operation are traditionally fields foreclosed from State and local regulation. However, States and local governments have traditionally shared certain regulatory jurisdiction over waterfront facilities. Therefore, MTSA standards contained in 33 CFR part 105 (Maritime security: Facilities) are not preemptive of State or local law or regulations that do not conflict with them (i.e., they would either actually conflict or would frustrate an overriding Federal need for uniformity). The Coast Guard recognizes the key role that State and local governments may have in making regulatory determinations. Additionally, Sections 4 and 6 of E.O. 13132 require that for any rules with preemptive effect, the Coast Guard provide elected officials of affected State and local governments and their representative national organizations the notice and opportunity for appropriate participation in any rulemaking proceedings, and consult with such officials early in the rulemaking process. Therefore, we invited affected State and local governments and their representative national organizations to indicate their desire for participation and consultation in this rulemaking process by submitting comments to the NPRM. Numerous State and local governments responded to the Coast Guard’s invitation by actively participating in this rulemaking process. State and local government interests participated by submitting written comments and by attending and presenting their views in person at four public meetings we held across the country to solicit comments on this rulemaking. All comments have been posted to the docket for this rulemaking. Participating State and local government interests included: Alaska Marine Highway System; American Association of Port Authorities; Broward County, Florida Port Everglades Department; Calhoun Port Authority; King County, Washington Department of Transportation; New York City Department of Transportation; Port Authority of New York and New Jersey; Port of Galveston; Port of Houston Authority; Port of Seattle; Port of Stockton; Port of Tacoma; and E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations Washington State Department of Transportation. We considered this State and local government input in the promulgation of this final rule, and multiple changes to the final rule are attributable to these comments. Based on these consultations and the content of the final rule, we can ensure that the final rule is consistent with the fundamental federalism principles and preemption requirements described in E.O. 13132. F. Unfunded Mandates Reform Act The Unfunded Mandates Reform Act of 1995, 2 U.S.C. 1531–1538, requires Federal agencies to assess the effects of their discretionary regulatory actions. In particular, the Act addresses actions that may result in the expenditure by a State, local, or tribal government, in the aggregate, or by the private sector of $100,000,000 (adjusted for inflation) or more in any one year. Though this rule will not result in such an expenditure, we do discuss the effects of this rule elsewhere in this preamble. G. Taking of Private Property This rule will not cause a taking of private property or otherwise have taking implications under E.O. 12630 (‘‘Governmental Actions and Interference with Constitutionally Protected Property Rights’’). H. Civil Justice Reform This rule meets applicable standards in sections 3(a) and 3(b)(2) of E.O. 12988, (‘‘Civil Justice Reform’’), to minimize litigation, eliminate ambiguity, and reduce burden. I. Protection of Children We have analyzed this rule under E.O. 13045 (‘‘Protection of Children from Environmental Health Risks and Safety Risks’’). Though this rule is a ‘‘significant regulatory action’’ under E.O. 12866, it does not create an environmental risk to health or risk to safety that might disproportionately affect children. sradovich on DSK3GMQ082PROD with RULES2 J. Indian Tribal Governments This rule does not have tribal implications under E.O. 13175 (‘‘Consultation and Coordination with Indian Tribal Governments’’), because it would not have a substantial direct effect on one or more Indian tribes, on the relationship between the Federal Government and Indian tribes, or on the distribution of power and responsibilities between the Federal Government and Indian tribes. VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 K. Energy Effects We have analyzed this rule under E.O. 13211 (‘‘Actions Concerning Regulations That Significantly Affect Energy Supply, Distribution, or Use’’). We have determined that it is not a ‘‘significant energy action’’ under E.O. 13211, because although it is a ‘‘significant regulatory action’’ under E.O. 12866, it is not likely to have a significant adverse effect on the supply, distribution, or use of energy, and the Administrator of OMB’s Office of Information and Regulatory Affairs has not designated it as a significant energy action. L. Technical Standards The National Technology Transfer and Advancement Act (NTTAA), codified as a note to 15 U.S.C. 272, directs agencies to use voluntary consensus standards in their regulatory activities unless the agency provides Congress, through OMB, with an explanation of why using these standards would be inconsistent with applicable law or otherwise impractical. Voluntary consensus standards are technical standards (e.g., specifications of materials, performance, design, or operation; test methods; sampling procedures; and related management systems practices) that are developed or adopted by voluntary consensus standards bodies. This final rule does not use technical standards. Therefore, we did not consider the use of voluntary consensus standards. The Federal government is constantly working on improving electronic TWIC inspection standards. Under NTTAA and OMB Circular A–119, NIST is tasked with the role of encouraging and coordinating Federal agency use of voluntary consensus standards and participation in the development of relevant standards, as well as promoting coordination between the public and private sectors in the development of standards and in conformity assessment activities. NIST and TSA have established the QTL and the associated standards for identity and privilege credential products, to be managed by TSA. NIST continues to assist TSA with the development of testing suites for qualifying products in conformity to specified standards and TSA specifications. M. Environment We have analyzed this rule under Department of Homeland Security Management Directive 023–01 and Commandant Instruction M16475.lD, which guide the Coast Guard in PO 00000 Frm 00057 Fmt 4701 Sfmt 4700 57707 complying with the National Environmental Policy Act of 1969, 42 U.S.C. 4321–4370f, and have concluded that this action is not likely to have a significant effect on the human environment. A Final Programmatic Environmental Assessment and a final Finding of No Significant Impact are available in the docket for this rulemaking. Our analysis indicates that electronic TWIC inspection operations will have insignificant direct, indirect or cumulative impacts on environmental resources, with special attention to potential air quality issues. List of Subjects 33 CFR Parts 101 and 103 Harbors, Incorporation by reference, Maritime security, Reporting and recordkeeping requirements, Security measures, Vessels, Waterways. 33 CFR Part 104 Maritime security, Reporting and recordkeeping requirements, Security measures, Vessels. 33 CFR Part 105 Maritime security, Reporting and recordkeeping requirements, Security measures. 33 CFR Part 106 Continental shelf, Maritime security, Reporting and recordkeeping requirements, Security measures. For the reasons discussed in the preamble, the Coast Guard amends 33 CFR parts 101, 103, 104, 105, and 106 as follows: PART 101—MARITIME SECURITY: GENERAL 1. The authority citation for part 101 continues to read as follows: ■ Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50 U.S.C. 191, 192; Executive Order 12656, 3 CFR 1988 Comp., p. 585; 33 CFR 1.05–1, 6.04–11, 6.14, 6.16, and 6.19; Department of Homeland Security Delegation No. 0170.1. 2. Amend § 101.105 as follows: a. Add the definitions, in alphabetical order, of ‘‘biometric match’’; ‘‘Canceled Card List (CCL)’’; ‘‘Card Holder Unique Identifier (CHUID)’’; ‘‘card validity check’’; ‘‘Designated Recurring Access Area (DRAA)’’; ‘‘electronic TWIC inspection’’; ‘‘identity verification’’; ‘‘Mobile Offshore Drilling Unit (MODU)’’; ‘‘Non-TWIC visual identity verification;’’ ‘‘Offshore Supply Vessel (OSV)’’; ‘‘Physical Access Control System (PACS)’’; ‘‘Qualified Reader’’; ‘‘Risk Group’’; ‘‘Transparent Reader’’; ‘‘TWIC reader’’; and ‘‘visual TWIC inspection’’; and ■ ■ E:\FR\FM\23AUR2.SGM 23AUR2 57708 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations b. Revise the definitions of ‘‘bulk or in bulk’’; ‘‘recurring unescorted access’’; and ‘‘TWIC Program’’. The revisions and additions read as follows: ■ § 101.105 Definitions. sradovich on DSK3GMQ082PROD with RULES2 * * * * * Biometric match means a confirmation that: One of the two biometric templates stored in the Transportation Worker Identification Credential (TWIC) matches the scanned biometric template of the person presenting the TWIC; or the alternate biometric stored in a Physical Access Control System (PACS) matches the corresponding biometric of the person. * * * * * Bulk or in bulk means a commodity that is loaded or carried without containers or labels, and that is received and handled without mark or count. This includes cargo transferred using hoses, conveyors, or vacuum systems. * * * * * Canceled Card List (CCL) is a list of Federal Agency Smart CredentialNumbers (FASC-Ns) that have been invalidated or revoked because TSA has determined that the TWIC-holder may pose a security threat, or the card has been reported lost, stolen, or damaged. * * * * * Card Holder Unique Identifier (CHUID) means the standardized data object comprised of the FASC–N, globally unique identifier, expiration date, and certificate used to validate the data integrity of other data objects on the credential. Card validity check means electronic verification that the TWIC has not been invalidated or revoked by checking the TWIC against the TSA-supplied list of cancelled TWICs or, for vessels and facilities not in Risk Group A, by verifying that the expiration date on the face of the TWIC has not passed. * * * * * Designated Recurring Access Area (DRAA) means an area designated under § 101.555 where persons are permitted recurring access to a secure area of a vessel or facility. * * * * * Electronic TWIC inspection means the process by which the TWIC is authenticated, validated, and the individual presenting the TWIC is matched to the stored biometric template. * * * * * Identity verification means the process by which an individual presenting a TWIC is verified as the owner of the TWIC. * * * * * VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 Mobile Offshore Drilling Unit (MODU) means the same as defined in 33 CFR 140.10. * * * * * Non-TWIC visual identity verification means the process by which an individual who is known to have been granted unescorted access to a secure area on a vessel or facility is matched to the picture on the facility’s PACS card or a government-issued identification card. * * * * * Offshore Supply Vessel (OSV) means the same as defined in 46 CFR 125.160. * * * * * Physical Access Control System (PACS) means a system that includes devices, personnel, and policies, that controls access to and within a facility or vessel. * * * * * Qualified Reader means an electronic device listed on TSA’s Qualified Technology List that is capable of reading a TWIC. Recurring unescorted access refers to special access procedures within a DRAA where a person may enter a secure area without passing an electronic TWIC inspection prior to each entry into the secure area. * * * * * Risk Group means the risk ranking assigned to a vessel, facility, or OCS facility according to §§ 104.263, 105.253, or 106.258 of this subchapter, for the purpose of TWIC requirements in this subchapter. * * * * * Transparent Reader means a device capable of reading the information from a TWIC or individual seeking access and transmitting it to a system capable of conducting electronic TWIC inspection. * * * * * TWIC Program means those procedures and systems that a vessel, facility, or outer continental shelf (OCS) facility must implement in order to assess and validate TWICs when maintaining access control. TWIC reader means a device capable of conducting an electronic TWIC inspection. * * * * * Visual TWIC inspection means the process by which the TWIC is authenticated, validated, and the individual presenting the TWIC is matched to the photograph on the face of the TWIC. * * * * * ■ 3. Add § 101.112 to read as follows: § 101.112 Federalism. (a) The regulations in 33 CFR parts 101, 103, 104, and 106 have preemptive PO 00000 Frm 00058 Fmt 4701 Sfmt 4700 effect over State or local regulation within the same field. (b) The regulations in 33 CFR part 105 have preemptive effect over State or local regulations insofar as a State or local law or regulation applicable to the facilities covered by part 105 would conflict with the regulations in part 105, either by actually conflicting or by frustrating an overriding Federal need for uniformity. § 101.514 [Amended] 4. Amend § 101.514 as follows: a. In paragraph (b), remove the word ‘‘federal’’ and add, in its place, the word ‘‘Federal’’; and ■ b. In paragraph (d), remove the word ‘‘State,’’ and add, in its place, the word ‘‘State’’. ■ 5. Amend § 101.515 as follows: ■ a. In paragraph (a), remove the words ‘‘of this part shall be required to’’ and add, in their place, the words ‘‘must’’; ■ b. In paragraph (b)(1), remove the words ‘‘of behalf’’ and add, in their place, the words ‘‘on behalf’’; ■ c. In paragraph (c), remove the words ‘‘of this part’’; and ■ d. Revise paragraph (d)(2). The revision reads as follows: ■ ■ § 101.515 TWIC/Personal Identification. * * * * * (d)* * * (2) Each person who has been issued or possesses a TWIC must pass an electronic TWIC inspection, and must submit his or her reference biometric, such as a fingerprint, and any other required information, such as a Personal Identification Number, upon a request from TSA, the Coast Guard, any other authorized DHS representative, or a Federal, State, or local law enforcement officer. ■ 6. Add § 101.520 to subpart E to read as follows: § 101.520 Electronic TWIC inspection. To conduct electronic TWIC inspection, the owner or operator of a vessel or facility must ensure the following actions are performed. (a) Card authentication. The TWIC must be authenticated by performing a challenge/response protocol using the Certificate for Card Authentication (CCA) and the associated card authentication private key stored in the TWIC. (b) Card validity check. The TWIC must be checked to ensure the TWIC has not expired and against TSA’s list of cancelled TWICs, and no match on the list may be found. (c) Identity verification. (1) One of the biometric templates stored in the TWIC must be matched to the TWIC-holder’s E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations live sample biometric or, by matching to the PACS enrolled reference biometrics linked to the FASC–N of the TWIC; or (2) If an individual is unable to provide a valid live sample biometric, the TWIC-holder must enter a Personal Identification Number (PIN) and pass a visual TWIC inspection. ■ 7. Add § 101.525 to subpart E to read as follows: § 101.525 TSA list of cancelled TWICs. (a) At Maritime Security (MARSEC) Level 1, the card validity check must be conducted using information from the TSA that is no more than 7 days old. (b) At MARSEC Level 2, the card validity check must be conducted using information from the TSA that is no more than 1 day old. (c) At MARSEC Level 3, the card validity check must be conducted using information from the TSA that is no more than 1 day old. (d) The list of cancelled TWICs used to conduct the card validity check must be updated within 12 hours of any increase in MARSEC level, no matter when the information was last updated. (e) Only the most recently obtained list of cancelled TWICs must be used to conduct card validity checks. ■ 8. Add § 101.530 to subpart E to read as follows: sradovich on DSK3GMQ082PROD with RULES2 § 101.530 Group A. PACS requirements for Risk This section lays out requirements for a Physical Access Control System (PACS) that may be used to meet electronic TWIC inspection requirements. (a) A PACS may use a TWIC directly to perform electronic TWIC inspection; (b) Each PACS card issued to an individual must be linked to that individual’s TWIC, and the PACS must contain the following information from each linked TWIC: (1) The name of the TWIC-holder holder as represented in the Printed Information container of the TWIC. (2) The TWIC-signed CHUID (with digital signature and expiration date). (3) The TWIC resident biometric template. (4) The TWIC digital facial image. (5) The PACS Personal Identification Number (PIN). (c) When first linked, a one-time electronic TWIC inspection must be performed, and the TWIC must be verified as authentic, valid, and biometrically matched to the individual presenting the TWIC. (d) Each time the PACS card is used to gain access to a secure area, the PACS must— (1) Conduct identity verification by: VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 (i) Conducting a biometric scan, and match the result with the biometric template stored in the PACS that is linked to the TWIC, or (ii) Having the individual enter a stored PACS PIN and conducting a NonTWIC visual identity verification as defined in § 101.105. (2) Conduct a card validity check; and (3) Maintain records in accordance with §§ 104.235(g) or 105.225(g) of this subchapter, as appropriate. ■ 9. Add § 101.535 to subpart E to read as follows: § 101.535 Electronic TWIC inspection requirements for Risk Group A. Owners or operators of vessels or facilities subject to part 104 or 105 of this subchapter, that are assigned to Risk Group A in §§ 104.263 or 105.253 of this subchapter, must ensure that a Transportation Worker Identification Credential (TWIC) Program is implemented as follows: (a) Requirements for Risk Group A vessels. Prior to each boarding of the vessel, all persons who require access to a secure area of the vessel must pass an electronic TWIC inspection before being granted unescorted access to the vessel. (b) Requirements for Risk Group A facilities. Prior to each entry into a secure area of the facility, all persons must pass an electronic TWIC inspection before being granted unescorted access to secure areas of the facility. (c) A Physical Access Control System that meets the requirements of § 101.530 may be used to meet the requirements of this section. (d) The requirements of this section do not apply under certain situations described in §§ 101.550 or 101.555. (e) Emergency access to secure areas, including access by law enforcement and emergency responders, does not require electronic TWIC inspection. ■ 10. Add § 101.540 to subpart E to read as follows: § 101.540 Electronic TWIC inspection requirements for vessels, facilities, and OCS facilities not in Risk Group A. A vessel or facility not in Risk Group A may use the electronic TWIC inspection requirements of § 101.535 in lieu of visual TWIC inspection. If electronic TWIC inspection is used, the recordkeeping requirements of §§ 104.235(b)(9) and (c) of this subchapter, or 105.225(b)(9) and (c) of this subchapter, as appropriate, apply. § 101.545 ■ [Added and Reserved] 11. Add reserved § 101.545 to subpart E. PO 00000 Frm 00059 Fmt 4701 Sfmt 4700 57709 12. Add § 101.550 to subpart E to read as follows: ■ § 101.550 TWIC inspection requirements in special circumstances. Owners or operators of any vessel, facility, or Outer Continental Shelf (OCS) facility subject to part 104, 105, or 106 of this subchapter must ensure that a Transportation Worker Identification Credential (TWIC) Program is implemented as follows: (a) Lost, damaged, stolen, or expired TWIC. If an individual cannot present a TWIC because it has been lost, damaged, stolen, or expired, and the individual previously has been granted unescorted access to secure areas and is known to have had a TWIC, the individual may be granted unescorted access to secure areas for a period of no longer than 30 consecutive calendar days if— (1) The individual provides proof that he or she has reported the TWIC as lost, damaged, or stolen to the Transportation Security Administration (TSA) as required in 49 CFR 1572.19(f), or the individual provides proof that he or she has applied for the renewal of an expired TWIC; (2) The individual can present another identification credential that meets the requirements of § 101.515; and (3) There are no other suspicious circumstances associated with the individual’s claim that the TWIC was lost, damaged, or stolen. (b) TWIC on the Canceled Card List. In the event an individual reports his or her TWIC as lost, damaged, or stolen, and that TWIC is then placed on the Canceled Card List, the individual may be granted unescorted access by a Physical Access Control System (PACS) that meets the requirements of § 101.530 for a period of no longer than 30 days. The individual must be known to have had a TWIC, and known to have reported the TWIC as lost, damaged, or stolen to TSA. (c) Special requirements for Risk Group A vessels and facilities. If a TWIC reader or a PACS cannot read an individual’s biometric templates due to poor biometric quality or no biometrics enrolled, the owner or operator may grant the individual unescorted access to secure areas based on either of the following secondary authentication procedures: (1) The owner or operator must conduct a visual TWIC inspection and require the individual to correctly submit his or her TWIC Personal Identification Number. (2) [Reserved] (d) If an individual cannot present a TWIC for any reason other than those E:\FR\FM\23AUR2.SGM 23AUR2 57710 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations outlined in paragraphs (a) or (b) of this section, the vessel or facility operator may not grant the individual unescorted access to secure areas. The individual must be under escort at all times while in the secure area. (e) With the exception of individuals granted access according to paragraphs (a) or (b) of this section, all individuals granted unescorted access to secure areas of a vessel, facility, or OCS facility must be able to produce their TWICs upon request from the TSA, the Coast Guard, another authorized Department of Homeland Security representative, or a Federal, State, or local law enforcement officer. (f) There must be disciplinary measures in place to prevent fraud and abuse. (g) Owners or operators must establish the frequency of the application of any security measures for access control in their approved security plans, particularly if these security measures are applied on a random or occasional basis. (h) The vessel, facility, or OCS facility operator should coordinate the TWIC Program, when practical, with identification and TWIC access control measures of other entities that interface with the vessel, facility, or OCS facility. ■ 13. Add § 101.555 to subpart E to read as follows: sradovich on DSK3GMQ082PROD with RULES2 § 101.555 Recurring Unescorted Access for Risk Group A vessels and facilities. 19:12 Aug 22, 2016 Jkt 238001 PART 103—MARITIME SECURITY: AREA MARITIME SECURITY 14. The authority citation for part 103 continues to read as follows: ■ Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. 70102, 70103, 70104, 70112; 50 U.S.C. 191; 33 CFR 1.05–1, 6.04–11, 6.14, 6.16, and 6.19; Department of Homeland Security Delegation No. 0170.1. § 103.505 [Amended] 15. Amend § 103.505(f) by removing the words ‘‘(e.g., TWIC)’’. ■ PART 104—MARITIME SECURITY: VESSELS 16. The authority citation for part 104 continues to read as follows: ■ This section describes how designated TWIC-holders may access certain secure areas on Risk Group A vessels and facilities on a continual and repeated basis without undergoing repeated electronic TWIC inspections. (a) An individual may enter a secure area on a vessel or facility without undergoing an electronic TWIC inspection under the following conditions: (1) Access is through a Designated Recurring Access Area (DRAA), designated under an approved Vessel, Facility, or Joint Vessel-Facility Security Plan. (2) The entire DRAA is continuously monitored by security personnel at the access points to secure areas used by personnel seeking Recurring Unescorted Access. (3) The individual possesses a valid TWIC. (4) The individual has passed an electronic TWIC inspection within each shift and in the presence of the on-scene security personnel. (5) The individual passes an additional electronic TWIC inspection prior to being granted unescorted access to a secure area if he or she enters an VerDate Sep<11>2014 unsecured area outside the DRAA and then returns. (b) The following requirements apply to a DRAA: (1) It must consist of an unsecured area where personnel will be moving into an adjacent secure area repeatedly. (2) The entire DRAA must be visible to security personnel. (3) During operation as a DRAA, there must be security personnel present at all times. (c) An area may operate as a DRAA at certain times, and during other times, access to secure areas may be obtained through the procedures in § 101.535. (d) Personnel may enter the secure areas adjacent to a DRAA at any time using the procedures in § 101.535. Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50 U.S.C. 191; 33 CFR 1.05–1, 6.04–11, 6.14, 6.16, and 6.19; Department of Homeland Security Delegation No. 0170.1. § 104.105 [Amended] 17. Amend § 104.105(d) by removing the words ‘‘this part’’ and adding, in their place, the words ‘‘parts 101 and 104 of this subchapter’’. ■ 18. Add § 104.110(c) to read as follows: ■ § 104.110 Exemptions. * * * * * (c) Vessels with a minimum manning requirement of 20 or fewer TWICholding crewmembers are exempt from the requirements in 33 CFR 101.535(a)(1). ■ 19. Amend § 104.115 as follows: ■ a. Revise paragraph (c); and ■ b. Remove paragraph (d). The revision reads as follows: § 104.115 Compliance. * * * * * (c) By August 23, 2018, owners and operators of vessels subject to this part must amend their Vessel Security Plans PO 00000 Frm 00060 Fmt 4701 Sfmt 4700 to indicate how they will implement the TWIC requirements in this subchapter. By August 23, 2018, owners and operators of vessels subject to this part must operate in accordance with the TWIC provisions found within this subchapter. § 104.120 [Amended] 20. Amend § 104.120(a) introductory text by removing the words ‘‘, on or before July 1, 2004,’’. ■ § 104.200 [Amended] 21. Amend § 104.200 as follows: a. In paragraph (b)(12) introductory text, remove the word ‘‘part’’ and add, in its place, the word ‘‘subchapter’’; and ■ b. In paragraph (b)(14), remove the words ‘‘§ 104.265(c) of this part’’ and add, in their place, the words ‘‘§ 101.550(a) of this subchapter’’. ■ ■ § 104.215 [Amended] 22. Amend § 104.215 as follows: a. In paragraph (b)(5), remove the second use of the word ‘‘and’’; ■ b. In paragraph (b)(6), remove the symbol ‘‘.’’ and add, in its place, the word ‘‘; and’’; and ■ c. In paragraph (b)(7), after the word ‘‘TWIC’’, add the symbol ‘‘.’’. ■ 23. Amend § 104.235 as follows: ■ a. In paragraph (b)(7), remove the second use of the word ‘‘and’’; ■ b. In paragraph (b)(8), remove the symbol ‘‘.’’ and add, in its place, the word ‘‘; and’’; ■ c. Add paragraph (b)(9); and ■ d. Revise paragraph (c). The addition and revision read as follows: ■ ■ § 104.235 Vessel recordkeeping requirements. * * * * * (b) * * * (9) Electronic Reader/Physical Access Control System (PACS). For each individual granted unescorted access to a secure area, the: FASC–N; date and time that unescorted access was granted; and, if captured, the individual’s name. Additionally, documentation to demonstrate that the owner or operator has updated the Canceled Card List with the frequency required in § 101.525 of this subchapter. (c) Any records required by this part must be protected from unauthorized access or disclosure. TWIC reader records and similar records in a PACS are sensitive security information and must be protected in accordance with 49 CFR part 1520. § 104.260 [Amended] 24. Amend § 104.260(b) by removing the word ‘‘shall’’ wherever it appears ■ E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations and adding in its place the word ‘‘must’’. ■ 25. Add § 104.263 to read as follows: § 104.263 vessels. Risk Group classifications for (a) For purposes of the Transportation Worker Identification Credential requirements of this subchapter, the following vessels subject to this part are in Risk Group A: (1) Vessels that carry Certain Dangerous Cargoes in bulk. (2) Vessels certificated to carry more than 1,000 passengers. (3) Any vessel engaged in towing a vessel subject to paragraph (a)(1) or (a)(2) of this section. (b) Vessels may move from one Risk Group classification to another, based on the cargo they are carrying or handling at any given time. An owner or operator expecting a vessel to move between Risk Groups must explain, in the Vessel Security Plan, the timing of such movements, as well as how the vessel will move between the requirements of the higher and lower Risk Groups, with particular attention to the security measures to be taken moving from a lower Risk Group to a higher Risk Group. ■ 26. Amend § 104.265 as follows: ■ a. Revise paragraph (a)(4); ■ b. Remove paragraphs (c) and (d); ■ c. Redesignate paragraphs (e) through (h) as (c) through (f), respectively; ■ d. Revise newly redesignated paragraph (d)(1); ■ e. In newly redesignated paragraph (e)(6), remove the word ‘‘and’’; ■ f. In newly redesignated paragraph (e)(7), remove the symbol ‘‘.’’ and add, in its place, the word ‘‘; or’’; ■ g. Add paragraph (e)(8); ■ h. In newly redesignated paragraph (f)(9), remove the word ‘‘or’’; ■ i. In newly redesignated paragraph (f)(10), remove the symbol ‘‘.’’ and add, in its place, the word ‘‘; or’’; and ■ j. Add paragraph (f)(11). The revisions and additions read as follows: sradovich on DSK3GMQ082PROD with RULES2 § 104.265 control. Security measures for access (a) * * * (4) Prevent an unescorted individual from entering an area of the vessel that is designated as a secure area unless the individual holds a duly issued TWIC and is authorized to be in the area. Individuals seeking unescorted access to a secure area on a vessel in Risk Group A must pass electronic TWIC inspection and those seeking unescorted access to a secure area on a vessel not in Risk Group A must pass either electronic VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 TWIC inspection or visual TWIC inspection. * * * * * (d) * * * (1) Implement a TWIC Program as set out in subpart E of part 101 of this subchapter, as applicable, and in accordance with the vessel’s assigned Risk Group, as set out in § 104.263; * * * * * (e) * * * (8) Implementing additional electronic TWIC inspection requirements, as required by § 104.263, and by subpart E of part 101 of this subchapter, if relevant. * * * * * (f) * * * (11) Implementing additional electronic TWIC inspection requirements, as required by § 104.263, and by subchapter E of part 101 of this subchapter, if relevant. § 104.267 [Amended] 27. Amend § 104.267(a) by removing the last sentence. ■ § 104.292 [Amended] 28. Amend § 104.292 as follows: a. In paragraph (b) introductory text, remove the words ‘‘§ 104.265(f)(2), (f)(4), and (f)(9)’’ and add, in their place, the words ‘‘§ 104.265(d)(2), (d)(4), and (d)(9)’’, and remove the symbol ‘‘:’’ and add, in its place, the symbol ‘‘—’’; ■ b. In paragraph (e)(3), remove the words ‘‘§ 104.265(f)(4) and (g)(1)’’ and add, in their place, the words ‘‘§ 104.265(d)(4) and (e)(1)’’; and ■ c. In paragraph (f), remove the words ‘‘§ 104.265(f)(4) and (h)(1)’’, and add, in their place, the words ‘‘§ 104.265(d)(4) and (f)(1)’’. ■ 29. Amend § 104.405 as follows: ■ a. Revise paragraph (a)(10); and ■ b. In paragraph (b), remove the last sentence. The revision reads as follows: ■ ■ § 104.405 Format of the Vessel Security Plan (VSP). (a) * * * (10) Security measures for access control, including the vessel’s TWIC Program, designated passenger access areas and employee access areas; * * * * * § 104.410 [Amended] 30. Amend § 104.410 as follows: a. In paragraph (a) introductory text, remove the words ‘‘on or before December 31, 2003,’’, and remove the symbol ‘‘:’’ and add, in its place, the symbol ‘‘—’’; ■ b. In paragraph (b), remove the words ‘‘or by December 31, 2003, whichever is later’’; and ■ ■ PO 00000 Frm 00061 Fmt 4701 Sfmt 4700 57711 c. In paragraph (c) introductory text, remove the symbol ‘‘:’’ and add, in its place, the symbol ‘‘—’’. ■ PART 105—MARITIME SECURITY: FACILITIES 31. The authority citation for part 105 continues to read as follows: ■ Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. 70103; 50 U.S.C. 191; 33 CFR 1.05–1, 6.04– 11, 6.14, 6.16, and 6.19; Department of Homeland Security Delegation No. 0170.1. 32. Revise § 105.110 to read as follows: ■ § 105.110 Exemptions. (a) A public access area designated under § 105.106 is exempt from the requirements for screening of persons, baggage, and personal effects and identification of persons in subpart E of part 101 of this subchapter, as applicable, in §§ 105.255 and § 105.285(a)(1). (b) An owner or operator of any general shipyard facility as defined in § 101.105 of this subchapter is exempt from the requirements of this part unless the facility— (1) Is subject to parts 126, 127, or 154 of this chapter; or (2) Provides any other service to vessels subject to part 104 of this subchapter not related to construction, repair, rehabilitation, refurbishment, or rebuilding. (c) Public access facility. (1) The COTP may exempt a public access facility from the requirements of this part, including establishing conditions for which such an exemption is granted, to ensure that adequate security is maintained. (2) The owner or operator of any public access facility exempted under this section must— (i) Comply with any COTP conditions for the exemption; and (ii) Ensure that the cognizant COTP has the appropriate information for contacting the individual with security responsibilities for the public access facility at all times. (3) The cognizant COTP may withdraw the exemption for a public access facility at any time the owner or operator fails to comply with any requirement of the COTP as a condition of the exemption or any measure ordered by the COTP pursuant to existing COTP authority. (d) An owner or operator of a facility is not subject to this part if the facility receives only vessels to be laid-up, dismantled, or otherwise placed out of commission provided that the vessels are not carrying and do not receive cargo or passengers at that facility. E:\FR\FM\23AUR2.SGM 23AUR2 57712 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations (e) Barge fleeting facilities without shore side access are exempt from the requirements in 33 CFR 101.535(b)(1). ■ 33. Revise § 105.115 to read as follows: § 105.115 c. Add paragraph (b)(9); and d. Revise paragraph (c). The addition and revision read as follows: ■ ■ § 105.225 Facility recordkeeping requirements. Compliance dates. (a) Facility owners or operators must submit to the cognizant Captain of the Port (COTP) for each facility— (1) The Facility Security Plan (FSP) described in subpart D of this part for review and approval; or (2) If intending to operate under an approved Alternative Security Program, a letter signed by the facility owner or operator stating which approved Alternative Security Program the owner or operator intends to use. (b) Facility owners or operators wishing to designate only those portions of their facility that are directly connected to maritime transportation or are at risk of being involved in a transportation security incident as their secure area(s) must do so by submitting an amendment to their FSP to their cognizant COTP, in accordance with § 105.415. (c) By August 23, 2018, owners and operators of facilities subject to this part must amend their FSPs to indicate how they will implement the TWIC requirements in this subchapter. By August 23, 2018, owners and operators of facilities subject to this part must be operating in accordance with the TWIC provisions found within this subchapter. § 105.120 [Amended] 34. Amend the introductory text of § 105.120 by removing the words ‘‘, on or before July 1, 2004,’’. ■ § 105.200 [Amended] 35. Amend § 105.200 as follows: a. In paragraph (b) introductory text, remove the symbol ‘‘:’’ and add, in its place, the symbol ‘‘—’’; ■ b. In paragraph (b)(6), remove the word ‘‘program’’ and add, in its place, the word ‘‘Program’’, and remove the word ‘‘part’’ and add, in its place, the word ‘‘subchapter’’, and remove the symbol ‘‘:’’ and add, in its place, the symbol ‘‘—’’; ■ c. In paragraph (b)(15), remove the words ‘‘section 105.255(c) of this part’’ and add, in their place, the words ‘‘§ 101.550 of this subchapter’’; and ■ d. In paragraph (b)(16), remove the words ‘‘of this part’’. ■ 36. Amend § 105.225 as follows: ■ a. In paragraph (b)(7), remove the second use of the word ‘‘and’’; ■ b. In paragraph (b)(8), remove the symbol ‘‘.’’ and add, in its place, the word ‘‘; and’’; sradovich on DSK3GMQ082PROD with RULES2 ■ ■ VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 * * * * * (b) * * * (9) TWIC Reader/Physical Access Control System (PACS). For each individual granted unescorted access to a secure area, the: FASC–N; date and time that unescorted access was granted; and, if captured, the individual’s name. Additionally, documentation to demonstrate that the owner or operator has updated the Canceled Card List with the frequency required in § 101.525 of this subchapter. (c) Any record required by this part must be protected from unauthorized access or disclosure. Electronic reader records and similar records in a PACS are sensitive security information and must be protected in accordance with 49 CFR part 1520. ■ 37. Add § 105.253 to read as follows: § 105.253 facilities. Risk Group classifications for (a) For purposes of the Transportation Worker Identification Credential (TWIC) requirements of this subchapter, the following facilities subject to this part are in Risk Group A: (1) Facilities that handle Certain Dangerous Cargoes (CDC) in bulk or receive vessels carrying CDC in bulk. (2) Facilities that receive vessels certificated to carry more than 1,000 passengers. (b) Facilities may move from one Risk Group classification to another, based on the material they handle or the types of vessels they receive at any given time. An owner or operator of a facility expected to move between Risk Groups must explain, in the Facility Security Plan, the timing of such movements, as well as how the facility will move between the requirements of the higher and lower Risk Groups, with particular attention to the security measures to be taken when moving from a lower Risk Group to a higher Risk Group. ■ 38. Amend § 105.255 as follows: ■ a. Revise paragraph (a)(4); ■ b. Remove paragraphs (c) and (d); ■ c. Redesignate paragraphs (e) through (h) as (c) through (f), respectively; ■ d. Revise newly redesignated paragraph (d)(1); ■ e. In newly redesignated paragraph (d)(4) introductory text, remove the word ‘‘shall’’ and add, in its place, the word ‘‘must’’; ■ f. In newly redesignated paragraph (d)(4)(vi), remove the words ‘‘paragraph PO 00000 Frm 00062 Fmt 4701 Sfmt 4700 (d) of this section’’ and add, in their place, the words ‘‘subpart E of part 101 of this subchapter’’; ■ g. In newly redesignated paragraph (e)(6), remove the word ‘‘or’’; ■ h. In newly redesignated paragraph (e)(7), remove the symbol ‘‘.’’ and add, in its place, the word ‘‘; or’’; ■ i. Add paragraph (e)(8); ■ j. In newly redesignated paragraph (f)(8), remove the word ‘‘or’’; ■ k. In newly redesignated paragraph (f)(9), remove the symbol ‘‘.’’ and add, in its place, the word ‘‘; or’’; and ■ l. Add paragraph (f)(10). The revisions and additions read as follows: § 105.255 control. Security measures for access (a) * * * (4) Prevent an unescorted individual from entering an area of the facility that is designated as a secure area unless the individual holds a duly issued TWIC and is authorized to be in the area. Individuals seeking unescorted access to a secure area in a facility in Risk Group A must pass electronic TWIC inspection and those seeking unescorted access to a secure area in a facility not in Risk Group A must pass either electronic TWIC inspection or visual TWIC inspection. * * * * * (d) * * * (1) Implement a TWIC Program as set out in subpart E of part 101 of this subchapter, as applicable, and in accordance with the facility’s assigned Risk Group, as set out in § 105.253. * * * * * (e) * * * (8) Implementing additional electronic TWIC inspection requirements, as required by § 105.253, and by subpart E of part 101 of this subchapter, if relevant. * * * * * (f) * * * (10) Implementing additional electronic TWIC inspection requirements, as required by § 105.253, and by subchapter E of part 101 of this subchapter, if relevant. § 105.257 [Amended] 39. Amend § 105.257(a) by removing the last sentence. ■ § 105.290 [Amended] 40. Amend § 105.290(b) by removing the word ‘‘shall’’ and adding, in its place, the word ‘‘must’’, and by removing the words ‘‘this part’’ and adding, in their place, the words ‘‘subpart E of part 101 of this subchapter’’. ■ E:\FR\FM\23AUR2.SGM 23AUR2 Federal Register / Vol. 81, No. 163 / Tuesday, August 23, 2016 / Rules and Regulations § 105.296 [Amended] 41. Amend § 105.296(a)(4) by removing the words ‘‘§ 105.255 of this part’’ and adding, in their place, the words ‘‘subpart E of part 101 of this subchapter, as applicable, and in accordance with the facility’s assigned Risk Group, as described in § 105.253’’. ■ 42. Amend § 105.405 as follows: ■ a. Revise paragraph (a)(10); and ■ b. In paragraph (b), remove the last sentence. The revision reads as follows: ■ § 105.405 Format and content of the Facility Security Plan (FSP). (a) * * * (10) Security measures for access control, including the facility’s TWIC Program and designated public access areas; * * * * * § 105.410 [Amended] 43. Amend § 105.410 as follows: a. In paragraph (a) introductory text, remove the words ‘‘On or before December 31, 2003, the’’ and add, in their place, the word ‘‘The’’; and ■ b. In paragraph (b), remove the words ‘‘or by December 31, 2003, whichever is later’’. ■ ■ PART 106—MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES 44. The authority citation for part 106 continues to read as follows: ■ Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50 U.S.C. 191; 33 CFR 1.05–1, 6.04–11, 6.14, 6.16, and 6.19; Department Of Homeland Security Delegation No. 0170.1. 45. Revise § 106.110 to read as follows: ■ § 106.110 Compliance dates. sradovich on DSK3GMQ082PROD with RULES2 (a) OCS facility owners or operators must submit to the cognizant District Commander for each OCS facility— (1) The Facility Security Plan described in subpart D of this part for review and approval; or (2) If intending to operate under an approved Alternative Security Program, a letter signed by the OCS facility owner or operator stating which approved VerDate Sep<11>2014 19:12 Aug 22, 2016 Jkt 238001 Alternative Security Program the owner or operator intends to use. (b) OCS facilities built on or after July 1, 2004 must submit a Facility Security Plan for approval 60 days prior to beginning operations. § 106.115 [Amended] 46. Amend the introductory text of § 106.115 by removing the words ‘‘before July 1, 2004,’’. ■ § 106.200 [Amended] 47. Amend § 106.200 as follows: a. In paragraph (b)(6) introductory text, remove the word ‘‘program’’ and add, in its place, the word ‘‘Program’’, and remove the word ‘‘part’’ and add, in its place, the word ‘‘subchapter’’; ■ b. In paragraph (b)(8), remove the word ‘‘Level’’ wherever it appears and add, in each place, the word ‘‘level’’; ■ c. In paragraph (b)(9), after the word ‘‘with’’, add the words ‘‘the requirements in’’; and ■ d. In paragraph (b)(12), remove the words ‘‘§ 106.260(c) of this part’’ and add, in their place, the words ‘‘§ 101.550 of this subchapter’’. ■ 48. Add § 106.258 to read as follows: ■ ■ § 106.258 Risk Group classification for OCS facilities. For the purposes of this subchapter, no OCS facilities are considered Risk Group A. ■ 49. Amend § 106.260 as follows: ■ a. Remove paragraphs (c) and (d); ■ b. Redesignate paragraphs (e) through (h) as (c) through (f), respectively; ■ c. Revise newly redesignated paragraph (d)(1); ■ d. In newly redesignated paragraph (e)(3), remove the word ‘‘or’’; ■ e. In newly redesignated paragraph (e)(4), remove the symbol ‘‘.’’ and add, in its place, the word ‘‘; or’’; ■ f. Add paragraph (e)(5); ■ g. In newly redesignated paragraph (f)(7), remove the word ‘‘or’’; ■ h. In newly redesignated paragraph (f)(8), remove the symbol ‘‘.’’ and add, in its place, the word ‘‘; or’’; and ■ i. Add paragraph (f)(9). The revisions and additions read as follows: PO 00000 Frm 00063 Fmt 4701 Sfmt 9990 § 106.260 control. 57713 Security measures for access * * * * * (d) * * * (1) Implement TWIC as set out in subpart E of part 101 of this subchapter and in accordance with the OCS facility’s assigned Risk Group, as set out in § 106.258. * * * * * (e) * * * (5) Implementing additional electronic TWIC inspection requirements, as required by § 106.258, and by subpart E of part 101 of this subchapter. (f) * * * (9) Implementing additional electronic TWIC inspection requirements, as required by § 106.258, and by subpart E of part 101 of this subchapter. § 106.262 [Amended] 50. Amend § 106.262(a) by removing the last sentence. ■ 51. Amend § 106.405 as follows: ■ a. Revise paragraph (a)(10); and ■ b. In paragraph (b), remove the last sentence. The revision reads as follows: ■ § 106.405 Format and content of the Facility Security Plan (FSP). (a) * * * (10) Security measures for access control, including the OCS facility’s TWIC Program; * * * * * § 106.410 [Amended] 52. Amend § 106.410 as follows: a. In paragraph (a) introductory text, remove the words ‘‘On or before December 31, 2003, the’’ and add, in their place, the word ‘‘The’’ and remove the symbol ‘‘:’’ and add, in its place, the symbol ‘‘—’’; and ■ b. In paragraph (b), remove the words ‘‘or by December 31, 2003, whichever is later’’. ■ ■ Dated: August 8, 2016. Paul F. Zukunft, Admiral, Commandant, U.S. Coast Guard. [FR Doc. 2016–19383 Filed 8–22–16; 8:45 am] BILLING CODE 9110–04–P E:\FR\FM\23AUR2.SGM 23AUR2

Agencies

[Federal Register Volume 81, Number 163 (Tuesday, August 23, 2016)]
[Rules and Regulations]
[Pages 57651-57713]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2016-19383]



[[Page 57651]]

Vol. 81

Tuesday,

No. 163

August 23, 2016

Part II





Department of Homeland Security





-----------------------------------------------------------------------





 Coast Guard





-----------------------------------------------------------------------





33 CFR Parts 101, 103, 104, et al.





Transportation Worker Identification Credential (TWIC)--Reader 
Requirements; Final Rule

Federal Register / Vol. 81 , No. 163 / Tuesday, August 23, 2016 / 
Rules and Regulations

[[Page 57652]]


-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Coast Guard

33 CFR Parts 101, 103, 104, 105 and 106

[Docket No. USCG-2007-28915]
RIN 1625-AB21


Transportation Worker Identification Credential (TWIC)--Reader 
Requirements

AGENCY: Coast Guard, DHS.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: The Coast Guard is issuing a final rule to require owners and 
operators of certain vessels and facilities regulated by the Coast 
Guard to conduct electronic inspections of Transportation Worker 
Identification Credentials (TWICs) as an access control measure. This 
final rule also implements recordkeeping requirements and security plan 
amendments that would incorporate these TWIC requirements. The TWIC 
program, including the electronic inspection requirements in this final 
rule, is an important component of the Coast Guard's multi-layered 
system of access control requirements designed to enhance maritime 
security.
    This rulemaking action builds upon existing regulations designed to 
ensure that only individuals who hold a valid TWIC are granted 
unescorted access to secure areas of Coast Guard-regulated vessels and 
facilities. The Coast Guard and the Transportation Security 
Administration have already promulgated regulations pursuant to the 
Maritime Transportation Security Act that require mariners and other 
individuals to hold a TWIC prior to gaining unescorted access to a 
secure area. By requiring certain high-risk vessels and facilities to 
perform electronic TWIC inspections, this rule enhances security at 
those locations. This rule also implements the Security and 
Accountability For Every Port Act of 2006 electronic reader 
requirements.

DATES: This final rule is effective August 23, 2018.

ADDRESSES: Comments and materials received from the public, as well as 
documents mentioned in this preamble as being available in the docket, 
are part of docket USCG-2007-28915 and are available using the Federal 
eRulemaking Portal. You can find this docket on the Internet by going 
to https://www.regulations.gov, entering ``USCG-2007-28915'' and then 
clicking ``Search.''

FOR FURTHER INFORMATION CONTACT: For information about this document, 
call or email LCDR Kevin McDonald, Coast Guard; telephone 202-372-1168, 
email Kevin.J.Mcdonald2@uscg.mil.

SUPPLEMENTARY INFORMATION: 

Table of Contents for Preamble

I. Abbreviations
II. Regulatory History and Information
III. Executive Summary
    A. Basis and Purpose
    B. Summary of Costs and Benefits
IV. Background
V. Discussion of Comments and Changes to the Final Rule
    A. General Matters Relating to TWIC
    1. Purpose and Efficacy of the TWIC Program
    2. Risk Analysis Methodology
    B. Electronic TWIC Inspection
    1. Electronic TWIC Inspection Does Not Necessarily Require a 
TWIC Reader
    2. Integrating Electronic TWIC Inspection Into a PACS
    a. List of Acceptable TWIC Readers
    b. PIN Pads and Biometric Input Methods
    3. Comments Related to Troubleshooting TWIC
    a. Lost, Stolen, or Damaged TWIC
    i. Vessels and Facilities Using a PACS
    ii. Vessels and Facilities Using TWIC Readers
    b. Transportation Worker Forgets to Bring TWIC to Work Site
    c. Inaccessible Biometrics
    d. Malfunctioning Access Control Systems
    e. Requirements for Varying MARSEC Levels
    4. Recordkeeping Requirements
    C. When to Conduct Electronic TWIC Inspection
    1. Secure, Restricted, Public Access, Passenger Access, and 
Employee Access Areas
    a. ``Prior to Each Entry'' for Risk Group A Facilities
    b. Recurring Unescorted Access
    2. Risk Group A Vessels
    3. Risk Groups B and C
    4. Miscellaneous Questions Regarding the Locations of Electronic 
TWIC Inspection
    D. Determination of Risk Groups
    1. Risk Group A Facilities
    a. Alternative Security Programs
    b. Determining Risk Group A Facilities
    2. The Crewmember Exemption Does Not Apply to Facilities
    3. The Low Number of Crewmembers Exemption
    4. Calculating the Total Number of TWIC-holding Crewmembers
    5. Threshold for the Crewmember Exemption of Vessels
    6. Outer Continental Shelf Facilities
    7. Vessels and Facilities Not in Risk Group A
    8. Barge Fleeting Facilities
    9. Switching Risk Groups
    E. Responses to Economic Comments
    1. Costs of TWIC Readers
    2. Number of TWIC Readers at Vessels and Facilities
    3. Transaction Times
    4. Security Personnel
    5. Other Cost Comments
    6. Costs Exceeding Benefits, Cost-effectiveness, and Risk 
Reduction
    7. Cumulative Costs of Security-related Rulemakings
    8. Small Business Impact
    F. Other Issues
    1. The GAO Report and the TWIC Pilot Program
    2. Additional Comments
    a. General Comments on the TWIC Program
    b. Clarification of Specific Items
    c. Comments Outside the Scope of this Rulemaking
VI. Regulatory Analyses
    A. Regulatory Planning and Review
    B. Small Entities
    C. Assistance for Small Entities
    D. Collection of Information
    E. Federalism
    F. Unfunded Mandates Reform Act
    G. Taking of Private Property
    H. Civil Justice Reform
    I. Protection of Children
    J. Indian Tribal Governments
    K. Energy Effects
    L. Technical Standards
    M. Environment

I. Abbreviations

AHP--Analytical Hierarchy Process
ANPRM--Advanced Notice of Proposed Rulemaking
ASP--Alternative Security Program
CCA--Certificate for Card Authentication
CCL--Canceled Card List
CCTV--Closed-Circuit Television
CDC--Certain Dangerous Cargoes
CFR--Code of Federal Regulations
CHUID--Card Holder Unique Identifier
COI--Certificate of Inspection
DHS--Department of Homeland Security
DRAA--Designated Recurring Access Area
E.O.--Executive Order
FASC--N Federal Agency Smart Credential--Number
FR--Federal Register
FSP--Facility Security Plan
ICE--Initial Capability Evaluation
MARSEC--Maritime Security
MISLE--Marine Information for Safety and Law Enforcement
MSRAM--Maritime Security Risk Analysis Model
MTSA--Maritime Transportation Security Act of 2002
NIST--National Institute of Standards and Technology
NPRM--Notice of Proposed Rulemaking
NTTAA--National Technology Transfer and Advancement Act
NVIC--Navigation and Vessel Inspection Circular
OCS--Outer Continental Shelf
OMB--Office of Management and Budget
PAC--Policy Advisory Council
PACS--Physical Access Control System
PVA--Passenger Vessel Association
PII--Personal Identifying Information
PIN--Personal Identification Number
Pub. L.--Public Law
QTL--Qualified Technology List
RA--Regulatory Analysis
RUA--Recurring Unescorted Access
SAFE--Port Act Security and Accountability For Every Port Act of 
2006

[[Page 57653]]

SBA--Small Business Administration
SSI--Sensitive Security Information
TSA--Transportation Security Administration
TSAC--Towing Safety Advisory Committee
TSI--Transportation Security Incident
TWIC--Transportation Worker Identification Credential
U.S.C.--United States Code
VSP--Vessel Security Plan

II. Regulatory History and Information

    On May 22, 2006, the Coast Guard and the Transportation Security 
Administration (TSA) jointly published a Notice of Proposed Rulemaking 
(NPRM) entitled ``Transportation Worker Identification Credential 
(TWIC) Implementation in the Maritime Sector; Hazardous Materials 
Endorsement for a Commercial Driver's License.'' \1\ On January 25, 
2007, the Coast Guard and TSA published the final rule, also entitled 
``Transportation Worker Identification Credential (TWIC) Implementation 
in the Maritime Sector; Hazardous Materials Endorsement for a 
Commercial Driver's License.'' \2\
---------------------------------------------------------------------------

    \1\ 71 FR 29396.
    \2\ 72 FR 3492.
---------------------------------------------------------------------------

    Although the May 22, 2006 NPRM proposed certain TWIC reader 
requirements, after reviewing the public comments, the Coast Guard 
decided to remove the proposed TWIC reader requirements from the 
January 25, 2007 final rule, address them in a separate rulemaking, and 
conducted a pilot program to address the feasibility of reader 
requirements before issuing a final rule.\3\ For a detailed discussion 
of those public comments and Coast Guard responses, please refer to the 
January 25, 2007 final rule.\4\
---------------------------------------------------------------------------

    \3\ The TWIC Reader Pilot was established pursuant to Section 
104 of the Security and Accountability For Every Port Act of 2006 
(SAFE Port Act) (P.L. 109-347), which was codified at 46 U.S.C. 
70105 (k)(4).
    \4\ 72 FR 3511.
---------------------------------------------------------------------------

    On March 27, 2009, the Coast Guard published an Advanced Notice of 
Proposed Rulemaking (ANPRM) for this rulemaking.\5\ On March 22, 2013, 
the Coast Guard published the NPRM for this rulemaking.\6\ 
Additionally, we held four public meetings across the country in 2013.
---------------------------------------------------------------------------

    \5\ 74 FR 13360.
    \6\ 78 FR 17782.
---------------------------------------------------------------------------

III. Executive Summary

A. Basis and Purpose

    In accordance with the Maritime Transportation Security Act of 2002 
(MTSA) and the Security and Accountability For Every Port Act of 2006 
(SAFE Port Act), the Coast Guard is establishing rules requiring 
electronic readers for use at high-risk vessels and at facilities. 
These rules will ensure that prior to being granted unescorted access 
to a designated secure area, an individual will have his or her TWIC 
authenticated, the status of that credential validated against an up-
to-date list maintained by the TSA, and the individual's identity 
confirmed by comparing his or her biometric (i.e. fingerprint) with a 
biometric template stored on the credential. By promulgating these 
rules, the Coast Guard is complying with the statutory requirement in 
the SAFE Port Act, improving security at the highest risk maritime 
transportation-related vessels and facilities, and making full use of 
the electronic and biometric security features integrated into the TWIC 
and mandated by Congress in MTSA.
    The TWIC is currently being used as a visual identity badge on many 
vessels and facilities. Essentially, DHS requires that a security guard 
examines the security features (hologram and watermark) embedded on the 
surface of the credential, checks the expiration date listed on the 
card, and compares the photograph to the person presenting the 
credential. While this system of ``visual TWIC inspection'' provides 
some benefits, it does not address all security concerns, nor does it 
make full use of the security features contained in the TWIC. For 
example, if a TWIC is stolen or lost, an unauthorized individual could 
make use of the credential, and provided that individual resembles the 
picture on the TWIC, could gain access to a secure area. Additionally, 
if a TWIC is revoked because the individual has committed a 
disqualifying offense, such as the theft of explosives, there is no way 
for security officers on a vessel or at a facility to determine that 
fact from the face of the TWIC. Finally, a sophisticated adversary 
could forge a realistic replica of a credential. It is also worth 
noting that since a TWIC-holder is required to renew his or her 
credential every 5 years, the TWIC-holder's resemblance to the picture 
on the TWIC may decrease over time, rendering visual inspection a 
somewhat less accurate means to confirm identity. Through the process 
of ``electronic TWIC inspection,'' by which TWICs are authenticated, 
validated, and the individual's identity confirmed biometrically, all 
of these scenarios would be thwarted or mitigated.
    In this rulemaking process, the Coast Guard published an ANPRM, 
published an NPRM, hosted a series of public meetings around the 
country to solicit public input, and worked with the Transportation 
Security Administration to conduct a pilot program. As a result of this 
input, the Coast Guard made a number of changes and clarifications in 
this final rule that we believe provide a robust system that improves 
security, addresses industry, labor, and Congressional concerns, and 
clarifies numerous issues relating to the operational nature of the 
electronic TWIC inspection program. Primarily, this rule allows for an 
even more flexible implementation of the electronic TWIC inspection 
requirements than the proposed rule that will allow new systems to be 
integrated into existing security and access control systems. We 
believe that this flexibility will provide robust security without 
causing unnecessary costs or significantly disrupting business 
operations. A brief summary of the main changes from the proposed rule 
to the final rule follows.
     This final rule provides additional flexibility with 
regard to the purchase, installation, and use of electronic readers. 
Instead of requiring the use of a TWIC reader on the TSA's Qualified 
Technology List (QTL), owners and operators can choose to fully 
integrate electronic TWIC inspection and biometric matching into a new 
or existing Physical Access Control System (PACS).
     We clarify that this final rule only affects Risk Group A 
vessels and facilities, and that no changes to the existing business 
practices of other MTSA-regulated vessels and facilities are required.
     This final rule eliminates the distinction between Risk 
Groups B and C for both vessels and facilities. If and when a 
requirement for electronic TWIC inspection may be considered for MTSA-
regulated vessels and facilities not currently in Risk Group A, we will 
provide an updated analysis of the costs and benefits of such an action 
and define new Risk Groups accordingly.
     This final rule clarifies that for Risk Group A 
facilities, electronic TWIC inspection is required each time a person 
is granted unescorted access to a secure area (a limited exception is 
permitted for Recurring Unescorted Access, or RUA). For Risk Group A 
vessels, electronic TWIC inspection is only required when boarding the 
vessel, even if only parts of the vessel are considered secure areas.
     This final rule eliminates the special requirement that 
barge fleeting facilities that handle or receive barges carrying 
Certain Dangerous Cargoes (CDC) in bulk be classified as Risk Group A. 
Barge fleeting facilities are instead classified the same as all other 
facilities. This change will effectively eliminate most isolated barge 
facilities

[[Page 57654]]

from the electronic TWIC inspection requirements due to a lack of a 
secure area.
     This final rule increases the exemption from electronic 
TWIC inspection requirements to vessels with 20 or fewer TWIC-holding 
crewmembers and defines that number as the minimum manning requirement 
specified on a vessel's Certificate of Inspection.
     This final rule provides additional flexibility for 
ferries and other vessels that use dedicated terminals in Risk Group A 
to integrate their electronic TWIC inspection programs with their 
terminals' programs.

B. Summary of Costs and Benefits

    Of the approximately 13,825 vessels, 3,270 facilities, and 56 Outer 
Continental Shelf (OCS) facilities regulated by MTSA, this final rule 
impacts only certain ``Risk Group A'' vessels and facilities, which 
currently number 1 vessel \7\ and 525 facilities under the revised 
applicability definitions for the final rule. No OCS facilities are 
affected by this final rule. We estimate the annualized cost of this 
final rule to be approximately $22.5 million, while the 10-year cost is 
$157.9 million, discounted at 7 percent. The main cost drivers of this 
rule are the acquisition, installation, and integration of TWIC readers 
into access control systems. Annual costs will be driven by costs 
associated with updates of the list of cancelled TWICs, recordkeeping, 
training, system maintenance, and opportunity costs associated with 
failed TWIC reader transactions. The estimated annualized cost of this 
final rule discounted at 7 percent is approximately $5.1 million less 
than the estimated cost of the NPRM.
---------------------------------------------------------------------------

    \7\ We note that the number of vessels affected by the provision 
is low, as most ``Risk Group A'' vessels are exempt from the 
electronic TWIC inspection requirements due to a low crewmember 
count.
---------------------------------------------------------------------------

    The benefits of this final rule include the enhancement of the 
security of vessels, ports, and other facilities by ensuring that only 
individuals who hold TWICs are granted unescorted access to secure 
areas at those locations. The main benefit of this regulation, 
decreased risk of a Transportation Security Incident (TSI), cannot be 
quantified given current data limitations. We used a risk-based 
approach to apply these regulatory requirements to less than 5 percent 
of the MTSA-regulated population, which represents approximately 80 
percent of the potential consequences of a TSI. The provisions in this 
final rule target the highest risk entities while maximizing the net 
benefits of the rule.
    Table 1 provides the estimated costs and functional benefits 
associated with the requirements of the TWIC reader.

     Table 1--Estimated Costs and Functional Benefits of TWIC Reader
                              Requirements
------------------------------------------------------------------------
                Category                            Final Rule
------------------------------------------------------------------------
Applicability..........................  High-risk MTSA-regulated
                                          facilities and high risk MTSA-
                                          regulated vessels with greater
                                          than 20 TWIC-holding
                                          crewmembers.
Affected Population....................  1 vessel.
                                         525 facilities.
Costs ($ millions, 7% discount rate)...  $22.5 (annualized).
                                         $157.9 (10-year).
Costs (Qualitative)....................  Time to retrieve or replace
                                          lost PINs for use with TWICs.
Benefits (Qualitative).................  Enhanced access control and
                                          security at U.S. maritime
                                          facilities and on board U.S.-
                                          flagged vessels.
                                         Reduction of human error when
                                          checking identification and
                                          manning access points.
------------------------------------------------------------------------

    For a more detailed discussion of costs and benefits, see the full 
Final Regulatory Analysis and Final Regulatory Flexibility Analysis 
available in the online docket for this rulemaking. Appendix G of that 
document outlines the costs by provision and also discusses the 
complementary nature of the provisions.

IV. Background

    The MTSA provides a multi-layered approach to maritime security 
which includes measures to consider broader security issues at U.S. 
ports and waterways, the coastal zone, the open ocean, and foreign 
ports. Under this multi-layered system, the Coast Guard is authorized 
to regulate vessels and facilities, and owners and operators of MTSA-
regulated vessels or facilities are required to submit for Coast Guard 
approval a comprehensive security plan detailing the access control and 
other security policies and procedures implemented on each vessel and 
facility. Security plans must identify and mitigate vulnerabilities by 
detailing the following items: (1) Security organization of the vessel 
or facility; (2) personnel training; (3) drills and exercises; (4) 
records and documentation; (5) response to changes in Maritime Security 
(MARSEC) Level; (6) procedures for interfacing with other facilities 
and/or vessels; (7) Declarations of Security; (8) communications; (9) 
security systems and equipment maintenance; (10) security measures for 
access control; (11) security measures for restricted areas; (12) 
security measures for handling cargo; (13) security measures regarding 
vessel stores and bunkers; (14) security measures for monitoring; (15) 
security incident procedures; (16) audits and security plan amendments; 
(17) Security Assessment Reports and other security reports; and (18) 
TWIC procedures.\8\
---------------------------------------------------------------------------

    \8\ See 33 CFR 104.405 and 33 CFR 105.405.
---------------------------------------------------------------------------

    For the purposes of MTSA, the term ``facility'' means ``any 
structure or facility of any kind located in, on, under, or adjacent to 
any waters subject to the jurisdiction of the United States.'' \9\ For 
the purposes of MTSA, the term ``vessel'' includes ``every description 
of watercraft or other artificial contrivance used, or capable of being 
used, as a means of transportation on water.'' \10\ Coast Guard 
regulations implementing MTSA with respect to vessels \11\ apply to: 
Mobile Offshore Drilling Units, cargo vessels, or passenger vessels 
subject to the International Convention for Safety of Life at Sea, 1974 
(SOLAS), chapter XI-1 or Chapter XI-2; foreign cargo vessels greater 
than 100 gross register tons; generally, self-propelled U.S. cargo 
vessels greater than 100 gross tons; offshore supply vessels; vessels 
subject to the Coast Guard's regulations regarding passenger vessels; 
passenger

[[Page 57655]]

vessels certificated to carry more than 150 passengers; passenger 
vessels carrying more than 12 passengers engaged on an international 
voyage; barges carrying, in bulk, cargoes regulated under the Coast 
Guard's regulations regarding tank vessels or CDC; \12\ barges carrying 
CDC or cargo and miscellaneous vessels engaged on an international 
voyage; tank ships; and generally, towing vessels greater than 8 meters 
in register length engaged in towing barges.
---------------------------------------------------------------------------

    \9\ 46 U.S.C. 70101(2).
    \10\ 46 U.S.C. 115; 1 U.S.C. 3.
    \11\ See 33 CFR 104.105(a).
    \12\ The term ``Certain Dangerous Cargoes'' is defined in 33 CFR 
101.105 by reference to 33 CFR 160.204, which lists all of the 
covered substances.
---------------------------------------------------------------------------

    TWIC requirements in those regulations do not apply to: Foreign 
vessels; mariners employed aboard vessels moored at U.S. facilities 
only when they are working immediately adjacent to their vessels in the 
conduct of vessel activities; except pursuant to international treaty, 
convention, or agreement to which the U.S. is a party, to any foreign 
vessel that is not destined for, or departing from, a port or place 
subject to the jurisdiction of the U.S. and that is either (a) in 
innocent passage through the territorial sea of the U.S., or (b) in 
transit through the navigable waters of the U.S. that form a part of an 
international strait.\13\
---------------------------------------------------------------------------

    \13\ See 33 CFR 104.105(d)-(f).
---------------------------------------------------------------------------

    Coast Guard regulations implementing MTSA with respect to 
facilities \14\ apply to: waterfront facilities handling dangerous 
cargoes (as generally defined in 49 CFR parts 170 through 179); 
waterfront facilities handling liquefied natural gas and liquefied 
hazardous gas; facilities transferring oil or hazardous materials in 
bulk; facilities that receive vessels certificated to carry more than 
150 passengers; facilities that receive vessels subject to SOLAS, 
Chapter XI; facilities that receive foreign cargo vessels greater than 
100 gross register tons; generally, facilities that receive U.S. cargo 
and miscellaneous vessels greater than 100 gross register tons; barge 
fleeting facilities that receive barges carrying, in bulk, cargoes 
regulated under the Coast Guard's regulations regarding tank vessels or 
CDC; and fixed or floating facilities operating on the OCS for the 
purposes of engaging in the exploration, development, or production of 
oil, natural gas, or mineral resources.
---------------------------------------------------------------------------

    \14\ See 33 CFR 105.105 and 106.105.
---------------------------------------------------------------------------

    Those regulations do not apply to: A facility owned or operated by 
the U.S. that is used primarily for military purposes; an oil and 
natural gas production, exploration, or development facility regulated 
by 33 CFR parts 126 or 154 if (a) the facility is engaged solely in the 
exploration, development, or production of oil and natural gas, and (b) 
the facility does not meet or exceed the operating conditions in 33 CFR 
106.105; a facility that supports the production, exploration, or 
development of oil and natural gas regulated by 33 CFR parts 126 or 154 
if (a) the facility is engaged solely in the support of exploration, 
development, or production of oil and natural gas and transports or 
stores quantities of hazardous materials that do not meet or exceed 
those specified in 49 CFR 172.800(b)(1) through (b)(6), or (b) the 
facility stores less than 42,000 gallons of cargo regulated by 33 CFR 
part 154; a mobile facility regulated by 33 CFR part 154; or an 
isolated facility that receives materials regulated by 33 CFR parts 126 
or 154 by vessel due to the lack of road access to the facility and 
does not distribute the material through secondary marine 
transfers.\15\ Additionally, the TWIC requirements in those regulations 
do not apply to mariners employed aboard vessels moored at U.S. 
facilities only when they are working immediately adjacent to their 
vessels in the conduct of vessel activities.\16\
---------------------------------------------------------------------------

    \15\ See 33 CFR 105.105(c).
    \16\ See 33 CFR 105.105(d) and 106.105(b).
---------------------------------------------------------------------------

    This rulemaking applies to the above-described vessels and 
facilities regulated by the Coast Guard pursuant to the authority 
granted in MTSA, and will further increase the security value of TWIC 
to the nation by making use of the statutorily-mandated biometric 
identification function and other security features. A complete 
statutory and regulatory history of this rulemaking can be found in 
Section III.B of the NPRM published on March 22, 2013.\17\
---------------------------------------------------------------------------

    \17\ 78 FR 17789.
---------------------------------------------------------------------------

    The TWIC program falls under the access control requirements as one 
component of MTSA. Since April 15, 2009, the TWIC has been used 
throughout the maritime sector for access to secure areas of MTSA-
regulated facilities and vessels. Its purpose is to ensure a vetted 
maritime workforce by establishing security-related eligibility 
criteria, and by requiring each TWIC-holder to undergo a security 
threat assessment from the TSA as part of the process of applying for 
and obtaining a TWIC.
    In addition to its visible security features, the TWIC stores two 
electronically readable reference biometric templates (i.e., 
fingerprint templates), a PIN, a digital facial image, authentication 
certificates, and a Federal Agency Smart Credential-Number (FASC-N). 
These features enable the TWIC to be used in different ways for (1) 
card authentication, (2) card validation, and (3) identity 
verification.
    Card authentication ensures that the TWIC is not counterfeit. 
Security personnel can authenticate a TWIC by visually inspecting the 
security features on the card. An electronic reader provides enhanced 
authentication by performing a challenge/response protocol using the 
Certificate for Card Authentication (CCA) and the associated card 
authentication private key stored in the TWIC. The electronic reader 
will read the CCA from the TWIC and send a command to the TWIC 
requesting the card authentication private key be used to sign a random 
block of data (created and known to the electronic reader). The 
electronic reader software will use the public key embedded in the CCA 
to verify that the signature of the random data block returned by the 
TWIC is valid. If the signature is valid, the electronic reader will 
trust the TWIC submitted and will then pull the FASC-N and other 
information from the card for further processing. The CCA contains the 
FASC-N and a certificate expiration date harmonized to the TWIC 
expiration date. This minimizes the need for the electronic reader to 
pull more information from the TWIC (unless required for additional 
checking).
    The card validity check ensures that the TWIC has not expired or 
been cancelled by TSA, or reported as lost, stolen, or damaged. 
Security personnel can validate whether a TWIC has expired by visually 
checking the TWIC's expiration date. Currently, a TSA-canceled TWIC is 
placed on TSA's official CCL, which is updated daily. TSA's CCL is 
available online at: https://universalenroll.dhs.gov/. Currently, the 
process of TWIC visual inspection does not require the security guard 
to compare the cardholder's name to the CCL and therefore facilities do 
not know when specific card holders have had their credentials 
cancelled and may continue to grant access unknowingly. Using an 
electronic reader, card validity is further confirmed by finding no 
match on the CCL and electronically checking the expiration date on the 
TWIC. Checks against the CCL may be performed electronically by 
downloading the list onto a TWIC reader or integrated PACS.
    Identity verification entails comparing the individual presenting 
the TWIC to the same person to whom the TWIC was issued. Identity can 
be verified by visually comparing the photo on the TWIC to the TWIC-
holder. Using an electronic reader, identity can be

[[Page 57656]]

verified by matching one of the biometric templates stored in the TWIC 
to the TWIC-holder's live sample biometric, matching to the PACS 
enrolled reference biometrics linked to the FASC-N of the TWIC, or 
requiring the TWIC-holder to place the TWIC into a TWIC reader 
(currently a PIN can only be accessed using a TWIC reader with a 
contact interface) and entering their PIN to release the digital facial 
image from the TWIC. This avoids the vulnerabilities of visual 
inspection by using the biometric capabilities mandated by Congress.

V. Discussion of Comments and Changes to the Final Rule

    In response to publication of the March 22, 2013 NPRM, the Coast 
Guard received over 100 comment letters, consisting of over 1,200 
unique comments. Commenters provided numerous opinions, arguments, 
questions, and recommendations regarding the proposed TWIC reader 
requirements. In this section, we describe the comments received, as 
well as how they influenced the decisions made in this final rule. 
Overall, we have grouped our discussion into five sections, as 
discussed below.
    In Section A, we address comments relating to the TWIC program 
generally, and electronic TWIC inspection specifically. This section 
includes comments relating to what the program's purpose is, how it 
affects security, and how it is tailored to achieve these goals in the 
most cost-effective and least-burdensome manner. We also discuss the 
risk analysis methodology in this section, in order to address comments 
relating to the specific types of threats the electronic TWIC 
inspection program is designed to combat.
    Sections B through D of this discussion respond to comments 
relating to the operational aspects of the electronic TWIC inspection 
program. Most comments received were of a practical nature, especially 
those asking for clarifications on exactly how the regulations would 
apply in a large variety of specific situations. Section B addresses 
the specific nature of what an ``electronic TWIC inspection'' is, 
including what must be carried out, how such an inspection can be 
carried out using a PACS, recordkeeping requirements arising from 
electronic TWIC inspections, and how specific problems, such as a 
misplaced TWIC, would be addressed in the regulations.
    Section C addresses when an electronic TWIC inspection must take 
place, including the specific locations on a facility or vessel where 
electronic readers must be located, and the parameters of an RUA 
configuration. Section D responds to comments relating to the 
classification of vessels and facilities into Risk Groups, including 
questions relating to barge fleeting facilities, shifting Risk Groups, 
and the exemption from electronic TWIC inspection requirements for 
vessels with a low number of crewmembers.
    Items relating to the economic issues of electronic TWIC inspection 
are addressed in Section E. Comments on these issues related to the 
costs of TWIC readers, throughput times for TWIC transactions, and 
potential changes in security staffing needs.
    Finally, Section F addresses several miscellaneous issues. Primary 
among these issues are comments relating to the TWIC Pilot Program and 
the Government Accountability Office (GAO) report on TWIC readers, 
issued in 2013 shortly before publication of the NPRM and accompanying 
analysis.\18\ Additionally, this section addresses all other comments 
and questions that were not included in other sections.
---------------------------------------------------------------------------

    \18\ ``Transportation Worker Identification Credential: Card 
Reader Pilot Results Are Unreliable; Security Benefits Need to Be 
Reassessed'' (GAO-13-198).
---------------------------------------------------------------------------

A. General Matters Relating to TWIC

    In response to the NPRM, the Coast Guard received a large variety 
of comments relating to the TWIC program. In this section, we begin 
with those comments that address the TWIC program as a whole. Multiple 
commenters expressed dissatisfaction with the TWIC program as a whole 
and suggested that it be dismantled. Many of these commenters noted 
that specific facilities or vessels had not been targeted by 
terrorists, and argued that the costs of the program were unnecessary. 
For a variety of reasons described extensively throughout this 
document, we believe that the targeted measures established in this 
final rule provide a cost-effective mitigation of various threats that 
could result in a TSI. For example, in the Regulatory Analysis (RA), we 
describe three hypothetical yet plausible scenarios in which an 
individual could gain access to a vessel or facility using a forged or 
stolen TWIC,\19\ threats that could specifically be reduced by 
electronic TWIC inspection. Congress has mandated, and we agree, that 
preventing unauthorized individuals from accessing secure areas of the 
nation's transportation infrastructure is part of a necessary security 
program. While we also agree with many commenters who suggested that it 
does not prevent every possible security threat, that is not the 
purpose of this final rule. The purpose of this final rule is to 
improve security at the highest risk maritime transportation-related 
vessels and facilities through the use of an electronic reader.
---------------------------------------------------------------------------

    \19\ RA, p. 88.
---------------------------------------------------------------------------

    One commenter criticized the Maritime Security Risk Analysis Model 
(MSRAM) threat analysis methodology, because it did not address the 
security issues raised by cargo containers, which include the potential 
for concealed threats within the containers. While we note that MSRAM 
does include scenarios associated with threats from cargo containers, 
for the purposes of the current analysis of electronic TWIC inspection, 
we limited our consideration to attack scenarios that require physical 
proximity to the intended target and for which access control would 
affect the ability to conduct an attack. Controlling access to a target 
is an essential component of security from such attacks because access 
control helps to detect and perhaps interdict or at least delay the 
attackers before they reach the target. TWIC readers enhance the 
reliability of access control measures, thereby increasing the 
likelihood of identifying and denying/delaying access to an individual 
or group attempting nefarious acts. For this reason, our analysis in 
this final rule focuses on threats that could be prevented or mitigated 
through use of electronic TWIC inspection. Concealed items or persons 
smuggled inside cargo containers are not attack scenarios that 
transportation worker identity verification (and electronic TWIC 
inspection in particular) addresses. Therefore, analyzing those 
scenarios would not be useful for this rule. Coast Guard regulations 
address security measures for those attack scenarios in other ways. 
Vessel and facility security plans must describe in detail how they 
meet all relevant security requirements, including the security 
measures in place for handling cargo.\20\
---------------------------------------------------------------------------

    \20\ See 33 CFR 104.405; 33 CFR 105.405; 33 CFR part 104, 
subpart B; and 33 CFR part 105, subpart B.
---------------------------------------------------------------------------

    Multiple commenters expressed concern over the application process 
for obtaining a new or renewal TWIC, stating that delays have saddled 
workers with an undue burden. The Coast Guard understands the 
challenges encountered during the initial implementation of TWIC, and 
during the more recent surge of renewals. We note the progress that has 
been made in the TWIC application process since publication of the 
NPRM.

[[Page 57657]]

Furthermore, we note that comments relating to the card application 
process are outside the scope of this rulemaking, which pertains to 
electronic TWIC inspection requirements only.
    One commenter sought clarification as to why the TWIC was not an 
acceptable form of identification for entry to U.S. Navy or Coast Guard 
bases, and stated that the TWIC should be recognized by the agency that 
is requiring its use within the maritime sector. This comment is also 
outside the scope of this rulemaking as it does not address TWIC 
readers or their application to maritime rather than Federal facilities 
(e.g., Coast Guard or Navy military bases).
    One commenter expressed concern with requiring electronic readers 
on vessels, stating that anyone boarding a vessel would need to first 
pass through a facility. The same commenter stated that seafarers 
should not be prevented from taking shore leave, and suggested that 
additional regulations be put in place to avoid unlawful charges to 
seafarers to transit facilities for shore leave. The Coast Guard 
understands these concerns and has applied this rulemaking to those 
vessels presenting the highest risk and to those vessels which, in most 
cases, will regularly visit international ports not regulated under 
MTSA. Additionally, Congress mandated seafarers' access in section 811 
of the Coast Guard Authorization Act of 2010. This mandate requires 
each Facility Security Plan to ``provide a system for seamen assigned 
to a vessel at that facility, pilots, and representatives of seamen's 
welfare and labor organizations to board and depart the vessel through 
the facility in a timely manner at no cost to the individual.'' \21\ 
The Coast Guard is currently conducting a separate rulemaking to 
implement section 811.\22\
---------------------------------------------------------------------------

    \21\ See the Seafarers' Access to Maritime Facilities Notice of 
Proposed Rulemaking (79 FR 77981, 77985 (Dec. 29, 2014)).
    \22\ The docket for the Seafarers' Access rulemaking is 
available online at www.regulations.gov by entering ``USCG-2013-
1087'' in the Search box.
---------------------------------------------------------------------------

    Several commenters requested more flexibility within this final 
rule rather than a ``one size fits all'' approach. This final rule 
incorporates additional flexibility for vessel and facility operators 
in direct response to comments in which specific requests for 
flexibility were made. The Coast Guard wholly agrees that there is no 
``one size fits all'' approach for maritime security given the vast 
range of facility and vessel operations which, in many cases, overlap 
or occur in close proximity to each other. This final rule moves to a 
more performance-based approach by defining the criteria for electronic 
inspection requirements that meet the TWIC access control measures. 
Additionally, this rule sets flexible baseline requirements for 
electronic reader implementation for those vessels and facilities. We 
believe that the increased flexibility will decrease the burden on 
industry by allowing the use of existing systems with minor 
modifications, increasing the pool of available electronic reader 
technology, and allowing the individual operators to determine the 
approach to meet the regulatory requirement that best facilitates their 
business needs.
    Some commenters suggested that the TWIC should be a standardized 
credential that can be used at multiple facilities, and that having 
this Federal credential should be a standard credential, rather than 
requiring truck drivers and others who need access to secure areas to 
obtain individual site-specific badges. The commenters argued that the 
use of the credential could alleviate redundant and overlapping 
background checks for workers, such as drivers, that access multiple 
facilities. We partially agree with this argument, but believe we 
should elaborate more closely on the role that TWIC and other 
identification credentials play in ensuring security at maritime 
facilities. We disagree with the suggestion that the TWIC should be 
used as an ``all-access'' credential that would override the property 
rights and security responsibilities of vessel and facility owners. We 
believe (like many other commenters), that possession of TWIC should 
not automatically grant an individual access to secure areas because 
the mere possession of a TWIC does not entitle the holder to access 
another person's property. The decision to grant access to a secure 
area of a vessel or facility appropriately lies with the owner or 
operator of that vessel or facility. We expect vessel and facility 
operators to limit access to their secure spaces to those who need such 
access, and to ensure that only those with a valid TWIC are granted 
unescorted access.
    However, we note that controlling access to facilities can be 
carried out in several ways. For example, a facility may grant 
unescorted access to employees who enter the facility multiple times 
per day on a regular basis, and also grant access to truck or bus 
drivers who may only enter the facility on an occasional basis. Such a 
facility may use different ways to control access, and ensure that all 
individuals granted unescorted access possess a valid TWIC. The 
facility may vary how it does this depending on the operator's business 
needs and on the reasons why different individuals are requesting 
unescorted access. In this example, the facility might have one 
entrance for employees who use a PACS card to enter secure areas of the 
facility, and have another entrance for truck or bus drivers, who would 
present a TWIC for inspection. A single access point could also contain 
both a PACS reader and a TWIC reader, the latter for use by contractors 
or visitors who may not have been issued a facility-specific access 
card.
    In this final rule we have granted flexibility that allows 
operators to use a variety of means to grant unescorted access, 
including the use of the TWIC as a means of identification. However, 
this final rule does not require operators to grant unescorted access 
to any TWIC-holder. As is currently the case, access to any vessel or 
facility is granted by the owner or operator, who has the authority and 
responsibility to determine if the individual requesting access has a 
legitimate business purpose.
1. Purpose and Efficacy of the TWIC Program
    Several commenters questioned the overall efficacy of the TWIC 
program, questioning whether the program, with or without electronic 
readers, does anything to improve security. The Coast Guard understands 
that there have been many challenges with the implementation of the 
TWIC program, but does believe that TWIC has improved access control at 
vessels and at maritime facilities across the country. The TWIC 
program's single standard and nationwide recognition is intended to 
ensure a secure, consistent biometrically enabled credential, and 
facilitate an efficient, resilient, mobile transportation workforce 
during routine and emergency situations. However, an individual 
successfully obtaining a TWIC is only the first half of a two-part 
process. First, vessel and facility security personnel must determine 
that an individual possesses a valid TWIC, meaning that they have been 
vetted. Second, they must verify the individual's authorization for 
entering a vessel or facility before granting the person unescorted 
access. As mentioned above, the mere possession of a valid TWIC alone 
is not sufficient to gain the holder of that credential access to 
secure areas on vessels or facilities across the country. The TWIC 
provides a means by which a vessel or facility security officer can 
determine that an individual has been vetted to an established and 
accepted standard. This determination

[[Page 57658]]

helps inform the vessel or facility security officer's decision to 
grant unescorted access to an individual. Vessel and facility personnel 
may then evaluate a TWIC-holder's authorization and determine whether 
the TWIC-holder should be granted unescorted access.
    One commenter took issue with a statement in the NPRM that read 
``TWIC readers will not help identify valid cards that were obtained 
via fraudulent means, e.g., through unreported theft or the use of 
fraudulent IDs.'' \23\ The commenter stated that TWIC readers can 
identify cards that were obtained through unreported theft of the TWIC 
card by performing biometric identification of the TWIC-holder. We 
believe the commenter misunderstood the statement in the NPRM, which 
referred to the use of fake or stolen (but unreported) identification 
documents, such as drivers licences and birth certificates, to 
fraudulently obtain an authentic TWIC from the TSA. The use of such 
fraudulently acquired, but genuine TWICs was one issue highlighted by 
the GAO and by several commenters as a shortcoming in the TWIC program, 
and we acknowledge that the use of electronic TWIC inspection will not 
address that particular scenario. However, we agree with the commenter 
that if a valid TWIC was stolen after it was produced, electronic TWIC 
inspection would help to identify such a card if an unauthorized person 
attempted to use it. Although visual TWIC inspection could also detect 
such unauthorized use, electronic TWIC inspection would do so more 
effectively by using the TWIC's biometric and other security features.
---------------------------------------------------------------------------

    \23\ 78 FR 17787.
---------------------------------------------------------------------------

    Some commenters argued that visual TWIC inspection does not provide 
``adequate security,'' and that electronic TWIC inspection should be 
the standard procedure for all TWIC inspections, rather than used only 
for high-risk vessels and facilities. The commenter made several 
arguments as to why visual TWIC inspection should not be used. The 
commenter quoted guidance from the National Institute of Standards and 
Technology (NIST), issued with regard to identification for Federal 
employees when entering Federal facilities, which stated that visual 
inspection of an identification card offers little to no assurance that 
the claimed identity of the individual matches the identification. The 
commenter stated that visual inspection is a weak authentication 
mechanism and does not provide the level of assurance that an 
electronic inspection can provide. Another commenter cited the 2011 GAO 
report on the TWIC program, which stated that visual TWIC inspection 
was not a particularly effective means of identity verification.\24\ 
While we agree that electronic TWIC inspection provides a more reliable 
means of identity verification than visual TWIC inspection, we disagree 
with the assertion that the visual inspection provides no security 
benefit. Many industries rely on photographic identification cards to 
verify a card-holder's identity before granting access to accounts or 
locations. Some situations may require, and justify the cost of, 
additional layers of security. For example, the heightened risk at Risk 
Group A vessels and facilities warrant the greater security afforded by 
electronic TWIC inspection, along with the attendant costs. As 
explained in this preamble and the accompanying RA, we do not believe 
such costs are justified for vessels and facilities outside of Risk 
Group A at this time.
---------------------------------------------------------------------------

    \24\ GAO-11-657, ``Transportation Worker Identification 
Credential: Internal Control Weaknesses Need to Be Corrected to Help 
Achieve Security Objectives''
---------------------------------------------------------------------------

    The commenter made several other arguments relating to visual TWIC 
inspection. First, the commenter noted that there is no way for visual 
TWIC inspection to determine if a TWIC has been cancelled. While we 
agree that visual TWIC inspection will not perform an electronic check 
against the TSA's list of cancelled TWICs, we disagree with the 
suggestion that visual inspection has no value in performing the card 
validity check. Security personnel perform the basic card validity 
check to ensure that a TWIC has not expired by checking the card's 
expiration date. A TWIC reader does the same validity check 
electronically, but will further confirm card validity by finding no 
match on the list of cancelled TWICs. We explain in the RA that the 
costs associated with this added layer of security are warranted only 
for Risk Group A vessels and facilities.
    The commenter also stated visual TWIC inspection creates 
vulnerability because it relies on a ``repetitive human process,'' 
where the staff may become distracted or less attentive. While we agree 
generally that electronic TWIC inspection is more reliable than visual 
TWIC inspection, we disagree with the suggestion that visual TWIC 
inspection is unreliable. We are requiring TWIC readers for Risk Group 
A, in part, due to the potentially reduced human error that TWIC 
readers afford. As explained in the RA, that added benefit does not 
outweigh the costs associated with requiring TWIC readers outside of 
Risk Group A at this time.
    One commenter stated that the background check does not ensure that 
facilities are protected from crime. The Coast Guard agrees that crimes 
can still be committed despite background checks, although we note that 
MTSA specifically prohibits certain persons with extensive criminal 
histories from receiving TWICs.\25\ However, the purpose of requiring 
electronic TWIC inspection is not to prevent all crime, but to prevent 
TSIs at high-risk vessels and maritime facilities. In that regard, we 
believe that TWIC is a critical part of the layered approach to port 
security because it establishes a minimum, uniform vetting and threat 
assessment process for mariners and port workers across the country 
aimed at preventing a TSI. The existing TWIC Program ensures that 
workers needing routine, unescorted access to secure areas of 
facilities and vessels undergo lawful status checks (for non-U.S. 
citizens) and that they are vetted against a specific list in statute 
of terrorism associations and criminal convictions.\26\ It provides a 
standard baseline for determining an individual's suitability to enter 
the secure area of a vessel or facility regulated under the MTSA. We 
note that the program does not exclude everyone with a criminal record 
and that most, but not all, of the permanent disqualifying crimes for a 
TWIC can be waived in extraordinary circumstances.\27\ However, there 
are aggressive procedures to remove a TWIC from any TWIC-holder found 
to have committed one of these crimes after receiving their TWIC, or to 
remove a TWIC from a TWIC-holder who is later added to any of the 
terrorism associated databases.
---------------------------------------------------------------------------

    \25\ See 46 U.S.C. 70105(c) for the list of disqualifying 
criminal offenses.
    \26\ 46 U.S.C. 70105 and 49 CFR 1572.103.
    \27\ 46 U.S.C. 70105 and 49 CFR part 1515.
---------------------------------------------------------------------------

    Multiple commenters suggested that the risk analysis for the NPRM 
did not adequately address cargo containers and the related cargo 
container facilities. One commenter suggested that container terminals 
were the primary focus of the enactment of the MTSA and SAFE Port Act, 
yet they are not subject to the highest level of TWIC scrutiny. The 
Coast Guard disagrees that container terminals were the primary focus 
of the Acts, noting that there was substantial discretion permitted by 
the statutory language to implement electronic TWIC inspection 
requirements. We reiterate that with regard to threats carried within 
cargo

[[Page 57659]]

containers, electronic TWIC inspection is not particularly effective 
for threat mitigation since scenarios involving container contents 
(e.g., weapons, personnel) in an attack in the United States do not 
require access to the container inside the secure area. The risk 
analysis evaluated the consequence of an attack on the maritime 
facilities themselves, deeming it reasonable to confine attack 
scenarios to the facility because offsite scenarios (e.g., transfer of 
container contents) are not mitigated by TWIC, but are instead the 
focus of additional layers of protections in the larger MTSA regulatory 
regime. Based on the MSRAM calculations relating to the effect of an 
attack on a cargo container facility, the efficacy of electronic TWIC 
inspections in disrupting such attacks, and considering the costs of 
requiring electronic TWIC inspections, we arrived at the conclusion 
that it would not be the most cost-effective approach to improving 
public safety to require electronic TWIC inspection at these facilities 
at this time. We would refer interested parties to the accompanying RA 
for a detailed discussion of alternative regulatory approaches 
considered in this rulemaking. Furthermore, we note that under existing 
guidance, any facility not covered by this final rule may implement 
electronic TWIC inspection on a voluntary basis for any reason.
    One commenter stated that the classification for large general 
cargo container terminals was counterintuitive, because disruption to 
any one of these facilities could have significant negative 
consequences for the nation's economy. We understand the commenter's 
perspective. However, for this rule, as part of the MSRAM analysis, we 
evaluated the risk of a TSI that (1) occurs at cargo container 
facilities and (2) would be less likely to occur through TWIC reader 
implementation, and for these scenarios, the likelihood of long-term 
disruptions to the nation's economy is assessed to be minimal.
    One commenter suggested that not placing container terminals in 
Risk Group A, and thus not requiring electronic TWIC inspection, would 
threaten the supply chain by allowing TWIC-holders, who have 
subsequently been determined by the TSA to be a security threat to the 
United States, to have unescorted access to the nation's critical 
infrastructure with impunity. We disagree that not placing container 
facilities in Risk Group A is tantamount to exposing those facilities 
to security threats. We note that the general TWIC requirements located 
in Sec.  101.515, which prohibit those who do not hold a valid TWIC 
from receiving unescorted access to a secure area, is still effective 
for these facilities. Container facilities may voluntarily institute 
requirements for electronic verification, for example, for business 
reasons. Furthermore, such facilities are subject to spot checks by the 
U.S. Coast Guard where such invalidated TWIC-holders could be 
discovered through the use of portable TWIC readers by Coast Guard 
personnel.
    One commenter suggested that terrorists might use a small facility 
to transport a weapon, thus bypassing electronic TWIC inspection 
programs. Pursuant to existing requirements, unescorted access to a 
secure area of any MTSA-regulated maritime facility requires a TWIC, so 
all workers seeking unescorted access, not just those at high-risk 
facilities, are subject to background checks. However, we note that 
electronic TWIC inspection is not designed to directly protect against 
smuggling, including the smuggling of terrorist weapons. Electronic 
TWIC inspection is designed to ensure that unauthorized persons, who 
have not been provided a TWIC, are not provided unescorted access to 
high-risk vessels and facilities. Many, if not most, smuggling 
scenarios do not require adversary access to secure areas for success, 
and thus the enhanced access control afforded by electronic TWIC 
inspection does little to reduce the risk for these scenarios.
    One commenter added that facilities are poor targets for terrorist 
attacks and thus, screening workers on those facilities adds little 
value. We disagree, and note that we have tailored this rule to 
specifically encompass only those maritime facilities where the dangers 
of a TSI are heightened, such as those that handle or receive vessels 
carrying CDC in bulk. We have determined that the facilities in Risk 
Group A could be attractive targets for terrorist attacks due to the 
substantial loss of life and environmental effects that could result 
from a TSI. Furthermore, we tailored the requirements to only require 
electronic TWIC inspection when such inspection would have a 
substantial effect on reducing the likelihood of such an attack (the 
``TWIC utility'' prong of the risk analysis, described in detail in the 
NPRM). See 78 FR 17791.
2. Risk Analysis Methodology
    Multiple commenters expressed concern with the risk analysis for 
this rulemaking. While we have considered the commenters' concerns, our 
risk analysis model remains unchanged from that proposed in the NPRM. 
We believe that the existing risk analysis model, which considered a 
wide range of targets, attacks, and consequences, remains the most 
comprehensive and logical means available to implement the electronic 
TWIC inspection program. In this process, the Coast Guard analyzed 68 
distinct types of vessels and facilities using the MSRAM database based 
on their purposes or operational descriptions. The Coast Guard 
initially separated this list of vessels and facilities into proposed 
Risk Groups A, B, and C in the ANPRM and have ultimately used this 
baseline to inform the classification of Risk Group A vessels and 
facilities in this final rule. We identify these vessels and facilities 
as those that can best be protected by electronic TWIC inspection.
    The risk analysis methodology used in this rulemaking consists of 
three distinct analytical factors. The first factor, which we described 
in the NPRM as the ``maximum consequences to [a] vessel or facility 
resulting from a terrorist attack,'' is the direct consequence of a 
type of attack that could be prevented or mitigated by use of 
electronic TWIC inspection. This factor was assessed for each class of 
vessel and facility. The second factor, which we described as the 
``criticality to the nation's health, economy, and national security,'' 
considered the impact of the loss of a vessel or facility beyond the 
direct consequences, taking into consideration regional or national 
impact on health and security. Finally, we considered TWIC utility, 
which we describe as the effectiveness of the TWIC program in reducing 
a vessel or facility's vulnerability to a terrorist attack.''
    It is important to note that the electronic TWIC inspection program 
is not the only security measure protecting vessels and maritime 
facilities, and is not designed to counter every conceivable threat to 
them. In the preliminary RA, we explained that there were three 
specific attack scenarios most likely to be mitigated by electronic 
TWIC inspection, and thus used in our analysis. These scenarios were: 
(1) A truck bomb, (2) a terrorist assault team, and (3) an explosive 
attack carried out by a passenger or passerby (with the specific caveat 
that the terrorist is not an ``insider'').\28\ While several commenters 
criticized certain aspects of the TWIC program for not countering 
additional threats, we note that benefits outside the scope of the 
above threats were not considered to be likely successes of the TWIC 
program and were not considered in our analysis. One commenter 
suggested that the truck bomb scenario was unrealistic, as it would be 
easier to

[[Page 57660]]

place a bomb in a container itself. We note that these are two distinct 
scenarios, and that the risk identified in the latter scenario is one 
that is not mitigated by electronic TWIC inspection.
---------------------------------------------------------------------------

    \28\ Preliminary RA, p.72.
---------------------------------------------------------------------------

    The first factor of the analysis was the most comprehensive, which 
was to determine the direct primary and secondary consequences of the 
total loss of a vessel or facility. To conduct this stage of the 
analysis, we used MSRAM data. MSRAM collects data from a wide variety 
of vessels and facilities and includes calculations of damages for each 
individual vessel or facility. The damages incorporated into the MSRAM 
analysis include: (1) Death and serious injuries; (2) direct property 
damage and the costs of business interruptions; (3) environmental 
consequences; (4) national security consequences; and (5) secondary 
economic consequences, such as damage done to the supply chain.\29\ To 
finish the first stage of analysis, we aggregated the MSRAM data from 
the individual vessels and facilities into averages for each of the 68 
identified classes.
---------------------------------------------------------------------------

    \29\ Preliminary RA, p.75.
---------------------------------------------------------------------------

    The second factor in the analysis considered the impact of the 
total loss of the vessel or facility beyond the immediate local 
consequences. This involved examining the regional and national effects 
of such a loss on the state of human health, the economy, and national 
security. The third factor in the analysis focused on the effectiveness 
of the TWIC program in actually reducing the vessel or facility class' 
vulnerability to a terrorist attack. In instances where electronic TWIC 
inspection would substantially reduce the effect or likelihood of an 
attack, this factor was assigned a greater value.
    Once the three analytical factors were determined, the Coast Guard 
combined the scores using the Analytic Hierarchy Process (AHP), 
developing a total score that combined the severity of an attack and 
the effectiveness of the TWIC program in countering that attack for 
each of the classes of vessels and facilities. These overall rankings 
were then used to determine the Risk Groups used in developing this 
rulemaking. We believe that this approach used in this risk analysis 
methodology is highly effective, and represents the best method 
available for assessing the benefits of the electronic TWIC inspection 
program to the specific vessels and facilities under consideration.
    One commenter suggested that the Coast Guard should not finalize 
this rule, and that a panel of private industry representatives should 
be included in an objective review of where the risks and 
vulnerabilities are in order to develop the best tool for mitigation. 
The Coast Guard has taken a collaborative approach toward developing 
this final rule, and has considered information from numerous 
stakeholders in this rulemaking, including the large number of comments 
on both the ANPRM and NPRM. As a result, the Coast Guard has amended 
this final rule, targeting the affected population to those vessels for 
which the use of electronic TWIC inspection provides the greatest 
benefit at minimum cost. This would not have been possible without the 
extensive public input received.
    One commenter suggested that previous risk assessments of their 
operation had never identified a scenario in which rogue employees 
played a role. We do not agree with the commenter that this weakens the 
case for the implementation of electronic TWIC inspection requirements. 
We note that ``rogue employees'' (no precise definition of this term 
was supplied, but we assume it means an employee who intends to carry 
out a TSI) are unlikely to be a threat mitigated by this final rule. 
This final rule is primarily designed to identify and intercept those 
adversaries who are not employees, but are attempting to use a stolen 
or otherwise invalid card to gain access to a secure area. A ``rogue 
employee'' with a valid TWIC would not be intercepted by electronic 
TWIC inspection. The ``rogue employee'' scenario is partially addressed 
by the security threat assessment that each employee must undergo 
before obtaining a TWIC, and is also addressed by other layers of 
security. For example, 33 CFR 104.285 and 105.275 require owners and 
operators to have the capability to continuously monitor their vessels 
and facilities through the use of lighting, security guards, waterborne 
patrols, automatic intrusion devices, or surveillance equipment.
    The same commenter asserted that there are no facts, objective risk 
assessments, or examples provided to support how a TWIC reader would 
enhance security absent a known risk or vulnerability. Additionally, 
the commenter broadly suggested that an owner or operator should be 
allowed to self-assess and determine its own risk group category after 
taking into account the security measures already in place at their own 
location. We disagree with both comments. MSRAM is a fact-based, 
objective tool for assessing TSI risk in the maritime domain. MSRAM 
incorporates specific examples of vessels and facility types and 
various attack modes. As explained in great detail in the ANPRM, NPRM, 
and elsewhere in this preamble, MSRAM is an analysis tool designed to 
estimate risk for potential terrorist targets. We consider MSRAM to be 
the best available tool for determining which vessels and facilities 
should be considered high-risk for the purpose of TWIC reader 
requirements. Because electronic TWIC inspection is generally more 
reliable than visual TWIC inspection, TWIC readers enhance access 
control more than visual inspection, increasing the likelihood of 
identifying an aggressor and denying access to secure areas. While the 
above rationale applies generally to Risk Group A, the Coast Guard also 
recognizes that the nature or operating conditions of certain vessels 
and facilities may warrant a waiver from certain regulatory 
requirements. The existing regulations in 33 CFR 104.130 and 105.130 
provide that owners and operators may apply for a waiver of any 
requirement of the security regulations in 33 CFR parts 104 and 105 
(including the TWIC reader requirements) in appropriate circumstances 
and where the waiver will not reduce overall security.
    Several commenters noted that while the Coast Guard used the MSRAM 
data to conduct its risk analysis, a number of TWIC Pilot Program 
participants were not contacted during this assessment. They argued 
that these participants could have provided local knowledge to produce 
supportable conclusions relative to risks and risk mitigation 
strategies in particular locations. We believe that these commenters 
misunderstand how MSRAM data were used. The Coast Guard carefully 
reviewed the pilot project in writing this final rule. MSRAM datawere 
used to help determine the consequences of a TSI. This was one factor 
used in determining the overall risk to the various classes of 
facilities analyzed in the Coast Guard's risk analysis. The Coast Guard 
uses MSRAM in a variety of risk analysis applications and does not 
engage in discussion with each participant every time the data are 
utilized.
    Some commenters also argued that they were the subject of several 
counterterrorism studies, and that these studies had not identified 
TWIC as risk mitigation tool, nor had they identified a scenario in 
which an employee bringing harm to a ferry was an identified 
vulnerability. These studies were not provided by the commenter but, 
from their descriptions, seem to have focused on risks other than those 
posed by persons impersonating

[[Page 57661]]

employees. We note that while previous studies may not have identified 
TWIC as a risk mitigation tool, we have considered various scenarios in 
which electronic TWIC inspection would mitigate risk, and used them as 
the basis for our risk analysis. Furthermore, we note that electronic 
TWIC inspection is not designed to prevent a valid and cleared employee 
from bringing harm to a vessel or facility. Instead, it is specifically 
designed to prevent access to a secure area by an unauthorized person 
who is attempting to gain access by using a stolen or counterfeited 
TWIC. We believe that electronic TWIC inspection is an appropriate and 
cost-effective tool to mitigate such risks.

B. Electronic TWIC Inspection

    Electronic TWIC inspection is the process by which the TWIC is 
authenticated, validated, and the individual presenting the TWIC is 
matched to the stored biometric template. This process consists of 
three discrete parts: (1) Card authentication, in which the TWIC at 
issue is identified as an authentic card issued by the TSA; (2) the 
card validity check, in which the TWIC is compared to the TSA-supplied 
list of cancelled TWICs \30\ to ascertain that it has not been revoked, 
and is not expired; and (3) identity verification, in which the TWIC is 
matched to the person presenting identification through use of a 
biometric template stored on the TWIC.
---------------------------------------------------------------------------

    \30\ We note that at this time, this list is the Cancelled Card 
List (CCL). However, there are also several specific Certificate 
Revocation Lists maintained by TSA, which differ from the CCL. In 
order to provide a regulation that is flexible in terms of future 
technology adaptations, in this final rule, we have described the 
list in the regulatory requirement generically as the ``list of 
cancelled TWICs.'' See sections 101.520(b) and 101.525 of the final 
rule regulatory text. This allows TSA to continue to use the CCL, 
but will also allow additions from various Certificate Revocation 
Lists if and when that becomes feasible and efficient. Any such 
change in the list of cancelled TWICs would be a ``back end'' change 
on TSA's part and would not impact the burdens or operations of 
private parties, who would still only be required to check a TWIC 
against the list as part of the card validity check. In this 
document, we generally refer to the ``list of cancelled TWICs'' when 
referring to the regulatory requirements in the final rule, while 
still using the ``CCL'' terminology when discussing comments on the 
Cancelled Card List or discussions in the NPRM that used that 
terminology.
---------------------------------------------------------------------------

    The purpose of electronic TWIC inspection is to improve the 
inspection of TWICs, as compared to visual TWIC inspection. We note 
that visual TWIC inspection accomplishes the same three tasks as 
electronic TWIC inspection, but in different ways, and generally not as 
thoroughly or reliably as electronic TWIC inspection. Visual card 
authentication is accomplished by visually inspecting the security 
features on the card (such as the watermark). A visual card validity 
check is accomplished by checking the expiration date on the face of 
the card, although there is no way to visually check if the TWIC has 
been revoked by the TSA since it was issued. Finally, visual identity 
verification is conducted by comparing the photograph on the TWIC with 
the individual's face.
    Electronic TWIC inspection improves upon the visual inspection 
checks, and adds two additional benefits. In electronic TWIC 
inspection, the authenticity of the card is verified by issuing a 
challenge/response to the TWIC's unique electronic identifier, called a 
Card Holder Unique Identifier (CHUID). The card's validity is 
determined by checking the TWIC against the most recently updated list 
of cancelled TWICs. Finally, the identity of the TWIC-holder is 
verified by matching the biometric template stored on the TWIC to the 
individual's biometrics. Each of these methods is an improvement upon 
visual TWIC inspection as the electronic TWIC inspection uses methods 
of validation that are not easily manipulated through means such as 
counterfeiting or altering the surface of the TWIC. Additionally, 
electronic TWIC inspection ensures that the card being presented has 
not been invalidated by a means other than being expired, such as the 
card having been reported lost, or the TWIC being revoked due to a 
criminal conviction.
    TWIC inspection, either electronic or visual, provides a baseline 
of information to determine who may be provided unescorted access to 
secure areas of MTSA-regulated vessels and facilities. While not every 
TWIC-holder is authorized unescorted access, the TWIC ensures that 
facility security personnel do not grant unescorted access to 
individuals that have not been vetted or have been adjudicated unfit 
for access to secure areas.
    Several commenters suggested that the sole purpose of TWIC is for a 
worker to be vetted through security and criminal checks, and that 
access control is not a purpose of the TWIC program. We disagree with 
this description of a fundamental principle of the TWIC program. The 
controlling statute, 46 U.S.C. 70105(a)(1) reads, in part, ``[t]he 
Secretary shall prescribe regulations to prevent an individual from 
entering an area of a vessel or facility that is designated as a secure 
area . . . unless the individual holds a transportation security card 
issued under this section. . .''. This is a clear mandate for an access 
control program. We have implemented this mandate by requiring maritime 
workers to obtain a TWIC, and by requiring owners and operators to 
inspect each individual's TWIC prior to granting access to secure 
areas. Using the biometric template, TWIC provides a highly secure 
means for security personnel to verify the identity of an individual 
seeking access to a secure vessel or facility and implementing this 
core requirement of the MTSA.
    In this final rule, we are revising the regulatory text to add 
flexibility and more accurately reflect the electronic TWIC inspection 
process. In the NPRM, we did not describe the process as ``electronic 
TWIC inspection,'' but stated in proposed Sec.  101.520(a) that ``all 
persons must present their TWICs for inspection using a TWIC reader, 
with or without a . . . PACS. . .''. \31\ In this final rule, we are 
modifying the process from presentation of a TWIC to a TWIC reader to 
the concept of electronic TWIC inspection. As stated below, and as 
defined in section 101.105 of this final rule, ``Electronic TWIC 
inspection'' means the process by which the TWIC is authenticated, 
validated, and the individual presenting the TWIC is matched to the 
stored biometric template. In doing so, we have laid out the exact 
requirements for this process in revised Sec.  101.520.
---------------------------------------------------------------------------

    \31\ 78 FR 17829.
---------------------------------------------------------------------------

    In this section, we address the comments and concerns submitted in 
response to the NPRM, and describe in detail how electronic TWIC 
inspection will work in a wide variety of operational situations. Table 
2 provides a summary of the acceptable implementation options for 
owners and operators to perform electronic TWIC inspection. The owner 
or operator of a vessel or facility must ensure the options chosen to 
meet the electronic TWIC inspection requirements perform the required 
card authentication, card validity, and identity verification required 
in revised Sec.  101.520.

[[Page 57662]]



                     Table 2--Implementation Options
------------------------------------------------------------------------
            Option                            Description
------------------------------------------------------------------------
TWIC Reader (QTL)............  Owner/operator uses a TWIC reader listed
                                on TSA's QTL. To gain entry to a secure
                                area, employee presents TWIC and
                                biometric for electronic inspection.
TWIC Reader (non-QTL)........  Owner/operator uses a TWIC reader that
                                adequately performs the three required
                                electronic checks (card authentication,
                                card validity check, identity
                                verification). To gain entry to a secure
                                area, employee presents TWIC and
                                biometric for electronic inspection.
Transparent Reader...........  Similar to non-QTL TWIC reader, except
                                the Transparent Reader does not
                                independently perform card validation,
                                card authentication, and identity
                                verification. Instead, the Transparent
                                Reader transmits information from the
                                employee's TWIC and biometric to a back
                                end system containing software that
                                performs the TWIC check.
                               Once the TWIC check is complete, the back
                                end system shall perform what processes
                                are required to either grant or deny
                                access.
PACS (with facility access     Employee is issued a facility access card
 card).                         after initially registering employee's
                                TWIC and biometric into the facility's
                                access control database. To gain entry
                                to a secure area, employee presents
                                facility access card and biometric for
                                electronic inspection to match against
                                employee's record in the facility's
                                database.
PACS (with biometric only)...  Employee's TWIC and biometric are
                                initially registered into the facility's
                                access control database. To gain entry
                                to a secure area, employee presents
                                biometric (e.g., fingerprint) for
                                electronic inspection to match against
                                employee's record in the facility's
                                database.
------------------------------------------------------------------------

1. Electronic TWIC Inspection Does Not Necessarily Require a TWIC 
Reader
    Many commenters expressed concerns regarding the costs of 
purchasing, installing, and using TWIC readers that have been approved 
by the TSA. They argued that the costs of the TWIC readers were high, 
and that there were problems with the reliability of TWIC readers and 
cards. Many commenters requested that the Coast Guard extend guidance 
issued in Navigation and Vessel Inspection Circular (NVIC) 03-07 and 
Policy Advisory Council (PAC) Decision 08-09, change 1, in which we 
outlined how an existing PACS could be used in lieu of a TWIC reader 
until the TWIC final rule was issued.
    In NVIC 03-07, we described how TWIC could be incorporated into an 
access control system even if the person accessing the secure area did 
not physically use the TWIC as an access control card. We stated that:

    Example: A facility employee who possesses a valid TWIC is 
registered into the facility's access control database and is issued 
a facility access card after the TWIC is verified visually as 
described in 3.3 a. (7) [of NVIC 03-07]. To gain entry into a secure 
area, the employee inserts or scans his/her facility access card at 
a card reader, which verifies the access card as a valid card for 
the facility. The TWIC does not need to be used as a visual identity 
badge at each entry once the facility-specific card is issued. The 
card reader then verifies the individual by matching the facility 
access card to the individual's record in the facility database and 
allows access to secure areas as dictated by the permissions 
established by the owner/operator in the access control system. By 
virtue of the fact that the employee would not be issued a vessel or 
facility-specific card without first having a TWIC, the requirement 
to possess a TWIC for unescorted access to secure areas is met.\32\
---------------------------------------------------------------------------

    \32\ Enclosure (3) to NVIC 03-07, p. 1515 (Available in the 
docket by following the instructions in the ADDRESSES section of 
this preamble).

    Many commenters noted, and we are aware that, the proposed 
regulatory text in the NPRM was worded in such a way that rendered this 
method of compliance impossible. The proposed regulatory text in Sec.  
101.520(a)(1) stated ``Prior to each entry, all persons must present 
their TWICs for inspection using a TWIC reader, with or without a 
physical access control system (PACS), before being granted unescorted 
access to secure areas.'' \33\ Similarly, proposed Sec. Sec.  101.525 
and 101.530 required visual inspections of TWICs before permitting 
access. Many commenters took issue with the change in approach from 
current requirements as described in the NVIC.
---------------------------------------------------------------------------

    \33\ 78 FR 17829.
---------------------------------------------------------------------------

    In this final rule, we are revising the regulatory text to allow 
electronic TWIC inspection to be conducted by either a TWIC reader or a 
PACS at vessels and facilities. This regulatory language will supersede 
previous guidance documents such as PAC 08-09, change 1 and NVIC 03-07. 
Under the new language in revised section 101.520 we are providing 
greater flexibility on the type of equipment used, as long as the three 
parts of electronic TWIC inspection are performed satisfactorily.
    Multiple commenters discussed the scenario where an owner or 
operator has a PACS which cross-checks successful electronic TWIC 
inspections against employment records and other internal security 
systems and records to verify that the cardholder works for the 
company, holds current certifications, and should be allowed into the 
facility. As explained in this document in Section V.B., such a system 
could meet the requirements for electronic TWIC inspection as revised 
for this final rule.
    Two commenters at a public meeting suggested that if a facility 
could prove its PACS is superior to the TWIC requirements, then the 
facility should be exempt from them. Similarly, other commenters 
suggested alternatives the Coast Guard could require, including a 
color-coded system analogous to the former Homeland Security Advisory 
System. In this final rule, we are not providing a generalized 
exemption from electronic TWIC inspection requirements as suggested by 
the commenters. However, as explained, such requirements can be 
performed by a PACS, thus potentially eliminating the need for these 
particular commenters to purchase entirely new equipment or the need 
for an exemption from the electronic TWIC inspection requirements.
    Multiple commenters stated that it would be more cost effective in 
some cases to purchase one or two stationary TWIC readers, but also to 
purchase several portable TWIC readers for multiple temporary gates or 
entrances. One commenter asked whether the final rule requires fixed 
card readers at every point of access, even a temporary or infrequently 
used one. The same commenter asked whether portable TWIC readers would 
meet the TWIC reader requirements on an OCS facility. We clarify that 
neither the NPRM nor final rule required stationary TWIC readers. The 
final rule, as described above, allows for flexibility in terms of 
equipment.
    The arrangements the commenters suggested could all be accommodated 
by this final rule. In this final rule, we are removing prescriptive 
requirements regarding the permanence, type, and placement of 
electronic readers. If a

[[Page 57663]]

vessel or facility has an existing access control system, of any 
variety, whose electronic readers perform the requirements of the 
electronic TWIC inspection (including identity verification), and are 
approved under the relevant security plan, then the PACS is 
permissible.
    In response to the many comments we received on this issue, in this 
final rule, we are substantially altering the TWIC reader requirements 
to accomplish the goals set out by the TWIC reader program, but in a 
manner that provides more flexibility in terms of how those goals are 
met. The requirements in this final rule are designed to allow as much 
flexibility in design of an access control system as possible while 
still achieving the goals of the TWIC reader program.
    We believe that the increased flexibility offered by the revised, 
performance-based regulations is responsive to the many commenters who 
described existing access control systems that they believe are better 
suited for their individual vessels and facilities than those proposed 
in the NPRM. Under these final regulations, a system that accomplishes 
the goals of the TWIC program and uses the three electronic checks 
mandated by the regulation will be considered by the Coast Guard when 
reviewing the security plans. As long as the Coast Guard agrees that 
the proposed security plan accomplishes the goals in a robust fashion, 
we will not limit the choices of the means to do so.
2. Integrating Electronic TWIC Inspection Into a PACS
    NVIC 03-07 and PAC 08-09 change 1 explain that they are valid 
guidance until a TWIC reader final rule is issued, but many commenters 
requested that these documents remain valid even after the final rule 
becomes effective. Because this final rule significantly changes the 
TWIC inspection process for Risk Group A vessels and facilities, the 
TWIC-specific guidance provided in those documents will not continue to 
apply to Risk Group A. However, because we are not making any changes 
to the TWIC requirements for those vessels and facilities not in Risk 
Group A, the guidance documents still retain their validity with regard 
to those entities. We will update and post these guidance documents 
online at https://homeport.uscg.mil/ prior to the effective date of 
this final rule.
    In this final rule, we no longer require facility and vessel 
operators to use a TWIC reader listed on the QTL each time a person is 
granted unescorted access to a secure area. Instead, we are permitting 
multiple options as previously described, including the use of a PACS 
approved in the required Facility Security Plan (FSP) or Vessel 
Security Plan (VSP), if the PACS can perform the electronic TWIC 
inspection requirements.

    Example: A facility employee who possesses a valid TWIC is 
registered into the facility's access control database and is issued 
a facility access card after the TWIC is verified in accordance with 
33 CFR 101.530. After the TWIC and holder of the TWIC are validated 
to ensure the TWIC is issued by TSA and the holder of the TWIC is 
bound to the TWIC, a biometric template of the employee is taken and 
stored on the facility access control system. To gain entry into a 
secure area, the employee inserts or scans his or her facility 
access card at a card reader, which verifies the access card as a 
valid card for the facility. The card reader then matches the 
facility access card to the employee's record in the facility 
database. A biometric sample from the employee is taken and matched 
to the associated biometric template stored on the facility's access 
control system. The facility's access control system then checks the 
TWIC's CHUID to assure that the TWIC is still valid (unexpired) as 
well as checks the list of cancelled TWICs to ensure that it has not 
been cancelled for any other reason. Upon verification that the TWIC 
is valid and the employee's biometric matches the associated 
template, the facility access control system allows access to secure 
areas as dictated by the permissions established by the owner or 
operator in the access control system. By virtue of the fact that 
the employee would not be issued a facility-specific card without 
first having a TWIC, the requirement to possess a TWIC for 
unescorted access to secure areas is met. The requirement for a 
biometric match of the employee is met through the performance of a 
match to the biometric template stored on the facility access 
control system.

    We note that the requirement for electronic TWIC inspection can be 
met even without the use of any sort of card reader, so long as the 
three parts of the electronic TWIC inspection are met. Such a system 
could be designed to use an individual's biometric check as a means of 
identification, such as described below.

    Example:  A facility employee who possesses a valid TWIC is 
registered into the facility's access control database and a 
biometric template of the employee is taken and stored on the 
facility access system. (We note that this is done after the TWIC 
and holder of the TWIC are validated to ensure the TWIC is issued by 
TSA and the holder of the TWIC is bound to the TWIC). To gain entry 
into a secure area, the employee presents a biometric (e.g., 
fingerprint) to a biometric reader connected to the facility's 
access control system. The access control system identifies the 
employee from the fingerprint and then matches it to the biometric 
template and the employee's TWIC information in the facility 
database. The facility's access control system then checks the 
TWIC's CHUID to assure that the TWIC is still valid (unexpired) as 
well as checks the list of cancelled TWICs to ensure that it has not 
been revoked for any other reason. Upon verification that that the 
TWIC is valid and the employee's biometric matches the associated 
template, the facility access control system allows access to secure 
areas as dictated by the permissions established by the owner or 
operator in the access control system. By virtue of the fact that 
the employee would not be entered into the facility's access control 
system without first having an authenticated TWIC, the requirement 
to possess a TWIC for unescorted access to secure areas is met. The 
requirement for a biometric match of the employee is met through the 
performance of a match to the biometric template, in this case a 
fingerprint stored on the facility access control system.

    Additionally, we note that although a biometric template is the 
particular biometric measurement used in the TWIC application process, 
an alternative biometric may be used to perform the identity 
verification check required by the regulations so long as the method is 
approved in the security plan. For example, as two commenters 
suggested, a vascular scan could be stored on a facility's access 
control system instead of a fingerprint, which could be useful in 
situations where some employees have difficult-to-read fingerprints.
a. List of Acceptable TWIC Readers
    In the NPRM, the Coast Guard proposed that only certain TWIC 
readers would be permitted to be used for purposes of electronic TWIC 
inspection. As stated above, proposed Sec.  101.520(a)(1) read, 
``[p]rior to each entry, all persons must present their TWICs for 
inspection using a TWIC reader, . . .''. The term ``TWIC reader'' was 
defined in proposed Sec.  101.105 as ``an electronic device listed on 
TSA's Qualified Technology List . . .''. Thus, by operation of the 
proposed regulatory text, TWIC readers listed on the QTL would be 
required at access points to secure areas on facilities and at the 
entrances to vessels requiring electronic TWIC inspection.
    TSA had not published the QTL at the time of publication of the 
NPRM. Thus, in its discussion regarding the types of approved TWIC 
readers, the NPRM reiterated guidance from PAC-D 01-11 regarding the 
use of TWIC readers to meet the existing regulatory requirements for 
effective identity verification, card validity, and card 
authentication.\34\ Specifically, in that guidance document, we stated 
that:
---------------------------------------------------------------------------

    \34\ 78 FR 17805.

    In accordance with 33 CFR 101.130, the Coast Guard determines 
that a biometric

[[Page 57664]]

match using a TWIC reader from the TSA list of readers that have 
passed the Initial Capability Evaluation (ICE) Test (available at: 
https://www.tsa.gov/assets/pdf/twic_ice_list.pdf) to confirm that the 
biometric template stored on the TWIC matches the fingerprint of the 
individual presenting the TWIC meets or exceeds the effectiveness of 
---------------------------------------------------------------------------
the identity verification check.

    The NPRM also noted that, in accordance with the guidance, ``TWIC 
readers allowed pursuant to PAC-D 01-11 may no longer be valid after 
promulgation of a TWIC reader final rule, and DHS will not fund 
replacement of TWIC readers.'' \35\
---------------------------------------------------------------------------

    \35\ 78 FR 17805.
---------------------------------------------------------------------------

    In recognition of advancing technology and standards, and to 
provide further flexibility to the end user that may meet business 
specific needs, this final rule does not require a TWIC reader from the 
TSA's QTL, accessible online at https://www.tsa.gov/stakeholders/reader-qualified-technology-list-qtl. Instead, the Coast Guard is permitting 
multiple options for the implementation of electronic TWIC inspection. 
The first option for meeting these needs within this final rule remains 
the mechanism proposed in the NPRM, which is the use of TWIC readers 
listed on the QTL. These TWIC readers are defined as ``Qualified 
Readers.'' We believe that this option is most appropriate for vessels 
or facilities that currently do not conduct electronic TWIC inspection 
and are seeking a TWIC reader determined to be in conformance with the 
TWIC Reader Hardware and Card Application Specification, available in 
the online docket for this rulemaking. The QTL continues to remain 
useful for this and other purposes.
    A similar option would be to use a TWIC reader that is not on the 
QTL. While such electronic readers are not prohibited by this rule, 
they must still meet the performance requirements of Sec.  101.520. 
This performance-oriented option is intended to provide more options to 
users to meet their individual needs while still relying on the TWIC as 
an access control credential.
    Another option would be to use an electronic reader or combination 
of separate devices--such as proximity readers, biometric readers, and 
PIN pads--that would transmit the information from the TWIC and 
individual seeking access to software that performs the card 
authentication, card validity check, and biometric identification 
functions required in Sec.  101.520. We refer to this arrangement as a 
``Transparent Reader.'' In this case, for example, a Transparent Reader 
would read the information from the TWIC along with the biometric 
sample provided by the individual and transmit it to a back end system 
containing software that performs the TWIC check. Once the TWIC check 
is complete, the back end system would perform what processes are 
required to either grant or deny access. This option may be highly 
popular with facilities that have already invested in electronic reader 
infrastructure and high tech software systems that may not be on the 
QTL. In this case, much as a situation with a PACS, the operator may 
have to add a biometric component, if not already in place, and modify 
software to include TWIC compatibility, but would not have to replace 
the entire system.
    The last option, described in detail above, would be the use of an 
existing PACS, with the inclusion of biometrics, with a facility-
specific access card that uses the TWIC as the baseline credential. 
This is purely a performance requirement, and would not require the use 
of government-approved equipment. In this case, the PACS would be 
required to match the TWIC against the list of cancelled TWICs and, if 
positively matched, automatically cancel the facility access card so as 
to not allow unescorted access to secure areas of the facility.
    Several commenters provided comments that addressed the specific 
types of approved card readers, but we believe that many of the 
concerns raised by commenters are resolved by the Coast Guard moving to 
a more flexible series of options for conducting electronic TWIC 
inspection. One commenter in a public meeting expressed concern that 
there was not an approved card reader which he could use for cost 
estimates. We note that the TSA now has a list of approved TWIC 
readers, which is available on the Coast Guard's Homeport site.\36\ One 
commenter suggested that this rule was not in alignment with the TSA's 
Request for Information regarding development of the QTL. We disagree, 
and note that the Coast Guard and TSA worked closely in developing and 
implementing the electronic TWIC inspection requirements. Furthermore, 
we note that with the additional flexibility afforded by this final 
rule, equipment to conduct electronic TWIC inspections is available at 
a wide variety of prices, depending on the manner in which electronic 
TWIC inspection is conducted. Additional information on cost estimates 
is provided in the final RA accompanying this final rule.
---------------------------------------------------------------------------

    \36\ We have also included the current version of the list in 
the docket USCG-2007-28915.
---------------------------------------------------------------------------

    Additionally, one commenter requested that software be included on 
the QTL. We note that the list of TWIC readers on the QTL includes TWIC 
reader and software pairings. Beyond the physical aspects of TWIC 
reader testing in terms of environmental or drop testing, a large 
portion of what is tested in the QTL process is the software.
    Other commenters suggested that, based on the TWIC Pilot Program, 
TWIC reader technology is still not ready for requiring TWIC readers at 
facilities, and requested that this final rule be delayed. Similarly, 
one commenter recommended that the Coast Guard only proceed with the 
rule if it was confident in the reliability of existing TWIC readers. 
We believe that not only has technology continued to improve, but also 
additional flexibility has been afforded in this final rule, both of 
which should alleviate problems with specific TWIC readers used in the 
pilot. Vessels and facilities required to conduct electronic TWIC 
inspection can choose from a wide variety of means so as to meet their 
budget and operational needs. Furthermore, the flexibility built into 
this final rule allows for future advancement of both card and reader 
technologies in a manner that will provide for further reductions in 
impact on business operations of the maritime industry.
b. PIN Pads and Biometric Input Methods
    One issue raised in the ANPRM was the use of PINs as part of the 
identification process. We note that upon getting a TWIC, each TWIC-
holder is required to remember a PIN. As proposed in the NPRM, under 
most circumstances, the TWIC-holder would not be required to provide 
the PIN when seeking access to secure areas, except as a backup measure 
when the TWIC-holder's biometric template is unreadable. For this 
reason, there is no requirement that access control systems have the 
capability to accept a PIN.
    Comments relating to the use of PINs were generally negative. 
Several commenters specifically argued against the use of PINs. Some 
commenters stated that because the PINs are rarely used, they are 
seldom remembered by TWIC-holders. We agree that rarely-used PINs will 
likely be forgotten, and thus the only people who would likely remember 
their PINs are those who use them regularly, such as those with 
impaired biometrics. Similarly, one commenter stated that 100 percent 
of cardholders would need to visit one of

[[Page 57665]]

the TWIC enrollment centers to reset or establish a new PIN in the 
event that the Coast Guard required PIN entry, implying that without 
regular use of PINs, they are quickly forgotten.
    PINs would not be required or permitted as a substitute for 
biometric identification of most users. Instead, this rule provides 
that PINs are available as an alternative only for individuals whose 
biometrics can not be read. The Coast Guard recognizes that for some 
people, taking a biometric read can be problematic. For example, people 
with severely injured fingers are often unable to have their 
fingerprints read. For such cases, the final rule provides an 
alternative means to ensure identity verification. As stated in Sec.  
101.520(c)(2), the use of a PIN plus a visual TWIC inspection is an 
acceptable alternative to a biometric match for individuals who are 
unable to have their biometric template captured at enrollment or who 
have unreadable biometrics due to injury after enrollment. For that 
reason, owners and operators may find it expedient to include an 
electronic reader with a PIN pad in at least some of their access 
control locations to accommodate people with unreadable biometrics.
3. Comments Related to Troubleshooting TWIC
    This section elaborates on certain programmatic issues relating to 
electronic TWIC inspection, specifically, how to address problems 
arising if either the electronic reader or access card malfunctions. In 
this section, we elaborate and expand on the provisions described in 
the NPRM as well as address issues raised by commenters.
    In the NPRM, the Coast Guard proposed regulations in Sec.  101.535 
that laid out requirements for TWIC inspection in special circumstances 
where a malfunction in the TWIC inspection system has occurred. In 
paragraph (a), we described how access could be granted in the event of 
a lost, stolen, or damaged TWIC card. In paragraph (b), we proposed how 
access could be granted in the event that a person's biometric template 
could not be read due to either technology malfunction or the inability 
of an individual to provide a biometric template. In paragraph (c), we 
proposed that in the event of a TWIC reader malfunction, an individual 
could still be granted unescorted access to secure areas for a period 
not to exceed 7 days, provided that individual has been granted such 
unescorted access in the past and is known to possess a TWIC. We note 
that the period in paragraph (c) was extended to 37 days in CG-FAC 
Policy Letter 12-04.
    Because the final rule, as written, sets forth a requirement for 
electronic TWIC inspection rather than specifically requiring that a 
TWIC be read by a TWIC reader, the text of this section needs some 
alterations to account for the new flexibility. We have integrated 
these alterations into the final regulatory text as detailed in the 
sections below. Furthermore, we have considered the requests and 
arguments of various commenters, and we are integrating many of the 
ideas presented into the final rule. Finally, we have attempted to 
modify and clarify the regulations where appropriate.
a. Lost, Stolen, or Damaged TWIC
    The NPRM proposed that if an individual cannot present a TWIC 
because it has been lost, damaged, or stolen, the individual could be 
granted unescorted access for a period of up to seven days if various 
conditions were met. The conditions include the individual previously 
having been granted unescorted access, being known to have had a TWIC, 
being able to present alternative identification, and having reported 
the TWIC as lost, stolen, or damaged to the TSA. This proposed language 
was derived from existing requirements in 33 CFR parts 104 through 106. 
Additionally, in CG-FAC Policy Letter 12-04, the Coast Guard allowed an 
individual to be granted unescorted access for an additional 30 days 
(for a total of 37 days of unescorted access), if the individual 
provided proof that a replacement TWIC had been ordered. Policy Letter 
12-04 also allowed unescorted access to those individuals with expired 
TWICs who had applied for a TWIC renewal prior to expiration.
i. Vessels and Facilities Using a PACS
    Because the final rule provides more flexibility for electronic 
TWIC inspection beyond presenting a TWIC for access control purposes, 
some of the issues addressed in Sec.  101.535 are significantly 
different if using a PACS to perform the electronic TWIC inspection. 
For example, if an employee's TWIC is stolen and the theft is reported 
to the TSA, the affected TWIC will be placed on the list of cancelled 
TWICs, but the employee will still be registered in the facility's 
PACS. However, upon attempting to gain access to a secure area, during 
the card validity check, the affected TWIC will appear on the list of 
cancelled TWICs, and thus fail the check. The revised final regulations 
are designed to allow a procedure where the employee can still be 
granted unescorted access until he or she can obtain a replacement TWIC 
and update his or her profile in the facility access control system 
with the information from the new TWIC. In this final rule, we have 
added Sec.  101.550(b), which allows unescorted access to secure areas 
to be granted by a facility operator for a period of up to 30 days if 
the TWIC appears on the list of cancelled TWICs if the individual is 
known to have had a TWIC and to have reported it lost, damaged, or 
stolen.

    Example:  An individual who works at a facility where the PACS 
has been linked to a TWIC card reports his or her TWIC as lost. When 
presenting his or her facility access card to the PACS, the card 
validity check will return a TWIC on the list of cancelled TWICs 
because the TWIC has been reported lost. The FSO confirms that the 
TWIC was reported as lost. In that instance, the PACS will recognize 
the status of the TWIC as cancelled, but can still grant unescorted 
access to secure areas to the individual for a period of up to 30 
days. If, after 30 days, the individual has not linked their 
facility access card to a valid TWIC, the PACS would have to deny 
unescorted access to secure areas to that individual.
ii. Vessels and Facilities Using TWIC Readers
    We proposed in Sec.  101.535 that vessel or facility operators 
using TWIC readers allow for temporary access in the case of a lost, 
stolen, or damaged TWIC. Specifically, the Coast Guard proposed that if 
a person is known to have had a TWIC, has previously been granted 
unescorted access, and can present another form of acceptable 
identification, and there are no other suspicious circumstances, then 
the operator may grant that person access for 30 days so that they can 
be issued a new TWIC.
    We received a wide variety of comments relating to the issue of 
lost or stolen TWICs. One commenter argued that any allowance for 
malfunctioning TWICs undermines the point of having the card at all. We 
disagree, and note that the procedure is necessary to ensure smooth 
operation of the TWIC system, and believe it contains enough safeguards 
so as not to function as a loophole in security.
    One commenter recommended splitting the CCL into separate 
categories, including categories of TWICs invalidated for 
``administrative reasons.'' We disagree, because the list of cancelled 
TWICs is intended to help screen out invalid cards regardless of the 
reason.
    Many commenters argued that the 7-day period proposed in Sec.  
101.535(a) is too short, and that the period should be extended, with a 
significant number of

[[Page 57666]]

these commenters referring to the 30-day extension of the 7-day period 
permitted by CG-FAC Policy Letter 12-04. Based upon the comments 
received, which indicated that it can take longer than 7 days to be 
issued a new TWIC, we have decided to include a 30-day period for this 
situation in section 101.550(b) of the final rule. We believe that this 
provides ample time to be issued a new TWIC, without presenting an 
undue security risk. When effective, this regulation will supersede the 
current guidance in CG-FAC Policy Letter 12-04, which allowed for a 
total of 37 days.
b. Transportation Worker Forgets To Bring TWIC To Work Site
    The existing regulations in 33 CFR parts 104 through 106, the 
policy arrangements in CG-FAC Policy Letter 12-04, as well as the 
proposed regulations in Sec.  101.535, only grant unescorted access to 
those individuals whose TWICs have expired or have reported their TWIC 
as lost, stolen, or damaged to the TSA. For all other individuals who 
fail to present a TWIC, unescorted access would be denied under 
proposed Sec.  101.535(d). Thus, under the proposed regulation, an 
employee who forgot his or her TWIC at home would not be permitted 
unescorted access to the facility, whereas an employee whose TWIC was 
stolen would be permitted unescorted access for a limited period of 
time.
    We received one comment relating to the issue of forgotten TWICs 
from a commenter who described such a situation in their submission to 
the docket for this rulemaking. This commenter suggested that we add an 
allowance for persons who forgot their TWIC at home. After reviewing 
comments on the proposed rule, we reiterate our existing position that 
persons who cannot present a valid TWIC, and have not reported their 
TWIC as lost, stolen, or damaged to the TSA, may not be granted 
unescorted access to a vessel or facility.
    We believe that providing an exemption for forgotten TWICs creates 
a potential degradation in security and additional risks that outweigh 
the benefits. Unlike the situation where a TWIC has been reported as 
stolen or lost to the TSA and is therefore no longer valid which can be 
verified by checking the list of cancelled TWICs, a claim of a 
forgotten TWIC cannot be validated.
    Instead, we reiterate that under current regulation at Sec.  
101.514(a), unless exempted from the TWIC requirements by Sec.  
101.514(b), (c), or (d), all persons must physically possess a TWIC, or 
undergo electronic TWIC inspection, prior to being granted unescorted 
access to a secure area of a vessel or facility. Persons who do not 
physically present a TWIC or undergo electronic TWIC inspection, and 
have not reported their TWIC as lost, stolen, or damaged to the TSA, 
may not be granted unescorted access.
c. Inaccessible Biometrics
    In the NPRM, we proposed two secondary authentication procedures 
that could be followed in the event that a person's biometric template 
could not be read by a TWIC reader or PACS due to a technology 
malfunction or low quality biometric template. These alternatives were 
listed in proposed Sec.  101.535(b), and allowed either the input of a 
PIN or the use of an alternative biometric that has been incorporated 
into the PACS. Given the change from requiring a TWIC reader to 
requiring electronic TWIC inspection, some changes to this section are 
needed as well. We discuss changes to this section and comments 
received below.
    One commenter suggested that people with unreadable biometric 
templates should be allowed to use a PACS card in addition to a PIN or 
alternate biometric. We agree, and note that under the final 
regulations, given that input of biometric information (including 
alternatives to fingerprints) into a PACS reader may now be a common 
manner of completing identification verification, the use of a PACS 
card in conjunction with an alternative biometric will be an accepted 
regular way to conduct an electronic TWIC inspection.
    However, upon consideration, we do not believe that the input of a 
PIN alone is equivalent to biometric identification. Biometric 
identification allows the facility to ascertain with a high degree of 
certainty whether the individual requesting access is the TWIC-holder. 
On the other hand, commenters noted that other methods of 
identification verification will not detect counterfeit, stolen, or 
borrowed TWICs. Similarly, the use of a PIN alone will not detect a 
borrowed TWIC or PACS card or, potentially, a stolen TWIC or PACS card, 
if the PIN has been illicitly obtained.
    Nonetheless, the Coast Guard believes that a method for 
accommodating persons with unreadable biometrics is important. In such 
cases, we believe that visual TWIC inspection, when combined with the 
PIN, provides enough certainty as to be an acceptable alternative to 
biometric identification. Combining visual identification with the PIN 
will help to ensure that stolen and borrowed cards are difficult to 
use.
    Thus, in this final rule, we are modifying the provision in 
proposed Sec.  101.535(b), which allowed for PINs to be used in lieu of 
biometric matching, to include a requirement for visual identification 
in addition to the PIN. The new provision is located in Sec.  
101.550(c) of this final rule. We believe that this provision would 
present few problems, as people could use their TWICs for visual 
identification. Alternatively, if a PACS PIN is assigned and stored in 
the access control system, an employee with unreadable biometrics could 
enter his or her PIN and present a PACS card or driver's license to 
conduct a visual identification check.
d. Malfunctioning Access Control Systems
    In the NPRM, we proposed a mechanism by which persons could be 
granted unescorted access to secure areas if a TWIC reader 
malfunctioned. Specifically, proposed Sec.  101.535(c) allowed owners 
and operators to use visual checks for a period of 7 days if a TWIC 
reader malfunctioned. In light of the change in this final rule from 
the required use of TWIC readers to the more flexible requirement for 
electronic TWIC inspection for Risk Group A vessels and facilities, we 
are making some conforming changes and clarifications to this 
procedure. We received several comments on the matter, which are 
addressed below.
    Upon consideration of this policy, we believe that a clause 
automatically allowing the use of visual TWIC inspections in lieu of 
biometric matching presents a serious security concern. As one 
commenter argued, any allowance for malfunctioning TWICs undermines the 
point of having the card at all. The Coast Guard agrees, and believes 
that allowing the use of visual TWIC inspections in lieu of biometric 
matching degrades security. This final rule represents a concerted 
effort to significantly upgrade the security at a relatively small 
group of high-risk vessels and facilities. Given the importance of 
security, we would not expect vessels or facilities to have only a 
single TWIC reader, but expect some redundancy in the system, and note 
that two commenters strongly echoed the view that redundancy is needed 
in any critical system. We would agree that, as a practical matter, the 
minimum number of electronic readers (either dedicated TWIC readers or 
those integrated into a PACS) at a facility or onboard a vessel would 
be two, in case one malfunctioned. As discussed in the RA, using the 
TWIC pilot data we estimated the average number of electronic readers

[[Page 57667]]

required by this final rule by facility and vessel types at a minimum 2 
per vessel and 4 per facility (Tables 4.3 and 4.4 of the RA). While the 
TWIC readers on the QTL have been tested to ensure a degree of 
reliability, there are many factors external to the testing process 
that could cause any one individual electronic reader to fail. The 
immediate availability of a backup electronic reader should one fail 
(as documented in the relevant security plan) would allow a vessel or 
facility to maintain the appropriate level of security for access 
control and continue operating without further burden. Due to the 
security concerns discussed in this paragraph, we are removing from the 
final rule the proposed provision in Sec.  101.535 that would have 
permitted automatic transition to visual TWIC inspections in the event 
of an electronic reader malfunction. As stated above, based on 
discussions with industry we expect that owners and operators will have 
an additional functioning electronic reader to use in those instances 
in case of equipment failures or malfunctions (Sec. Sec.  104.260(c) 
and 105.250(c)). If the owners and operators plan for malfunctions as 
existing regulations require, there should be no significant disruption 
of operations. Further, in the unlikely event that both primary and 
redundant electronic readers malfunction, the owner or operator could 
obtain permission from the Captain of the Port (COTP) to continue 
operating.
    Two commenters suggested changing the language in proposed Sec.  
101.535(c) from a ``reader malfunction'' to ``in the event of an access 
control system failure,'' noting that many other systems (such as the 
software or electricity) could fail, thus rendering an electronic 
reader inoperable. As we are deleting this exemption in this final 
rule, the language question is no longer at issue.
    Commenters also suggested that 7 days is not sufficient to correct 
all problems that can result in a TWIC malfunction. They noted that it 
might take longer to procure parts, especially after a major regional 
disaster or holiday, and that a 15-day period where visual TWIC 
inspection is permitted would be more reasonable. On the other hand, 
one commenter suggested that it should take only hours to repair a 
malfunctioning TWIC reader. In this final rule, we are removing this 
provision. Thus, restoration of an access control system will be 
handled in accordance with the procedures for the reporting 
requirements for non-compliance in Sec. Sec.  104.125, 105.125, and 
106.125, which require the owner or operator to notify the cognizant 
Captain of the Port and either suspend operations or request and 
receive permission from the COTP to continue operating. Similarly, in 
the event of a total system collapse or regional disaster, the COTP 
will work with the affected organization to restore an access control 
system as expeditiously as possible.
    The following examples provide illustrations relating to scenarios 
involving the failure of an access control system:

    Example:  A facility using TWIC readers at five access points 
suffers equipment failure of TWIC readers at two of those access 
points. The facility would still be able to permit unescorted access 
through the remaining three access points. Unescorted access could 
also be granted using portable TWIC readers at the two affected 
access points immediately in accordance with the FSP. The facility 
would be required to notify the COTP that this equipment failure 
took place but could continue operations using the remaining TWIC 
readers.

    Example:  A computer virus causes a facility's PACS to become 
completely inoperable, but the FSP contains an alternative where 
access is controlled through the use of portable TWIC readers, 
compliant with Sec.  101.520, at each access point to secure areas. 
The facility would be required to notify the COTP that such a 
failure of the PACS had occurred, but could continue operations 
uninterrupted by using the portable TWIC readers.

    Example:  A computer virus causes a facility's PACS to become 
completely inoperable, and the FSP does not contain an alternative 
means of conducting electronic TWIC inspection. The owner or 
operator could request permission from the COTP to conduct visual 
TWIC inspections for a limited time until the PACS is operational. 
Grants of unescorted access to secure areas would have to be 
suspended until such permission was granted by the COTP.

    Multiple commenters suggested that in the event that a TWIC reader 
malfunctions, a facility should be immediately able to continue to 
process workers using an alternative means defined in a security plan, 
rather than requesting approval from the COTP to do so. One commenter 
also suggested that an after-the-fact review by the Coast Guard could 
be used in such circumstances. We note that the proposed text of Sec.  
101.535(c) in the NPRM did not propose to require COTP authorization to 
allow continuing operation for a period of 7 days, so we are unsure of 
the provision to which the commenter may be referring. Nonetheless, the 
final regulatory text allows a facility to immediately continue to 
process workers using an alternative means as defined in an approved 
security plan as required by Sec. Sec.  104.260(c) and 105.250(c) 
without additional COTP approval.
    One commenter suggested that the Facility Security Officer (FSO) 
should be able to determine if there are mitigating circumstances that 
need to be implemented for a temporary time frame. In such a case, the 
commenter suggested that the facility would conduct visual 
identification verification in lieu of electronic TWIC inspection. We 
disagree with this suggestion, for the reasons described above. The 
commenter also requested that the COTP be able to waive TWIC 
requirements in certain circumstances. We note that the COTP has the 
power to waive requirements or impose alternative equivalent measures 
generally.
    One commenter requested clarification on procedures to be used if 
TSA's Web site is inaccessible and they are unable to access updates to 
the CCL. In general, the owner or operator of an access control system 
is required to download the TSA-supplied list of cancelled TWICs 
(currently, the CCL) periodically, depending on the MARSEC level, 
pursuant to Sec.  101.525 of this final rule. However, if the problem 
with downloading the list is out of the operator's control, such as the 
TSA Web site being down for an extended period of time, we would 
consider it acceptable to continue to operate the access control system 
by using the most recent version of the list available.
e. Requirements for Varying MARSEC Levels
    In the NPRM, we proposed requirements for Risk Group A vessels and 
facilities that would vary based on the MARSEC level. MARSEC levels are 
set to reflect the prevailing threat environment of the maritime 
transportation system, including ports, vessels, facilities, and 
critical assets and infrastructure located on or adjacent to waters 
subject to the jurisdiction of the United States. Specifically, we 
proposed to require that at MARSEC Level 1, during the card validation 
process, a TWIC must be checked against a version of the list of 
cancelled TWICs that is no more than 7 days old. However, at higher 
MARSEC levels, we proposed that the version of the list used to conduct 
the card validity check be no more than one day old. Several commenters 
responded to this issue, and offered remarks relating to the use of 
MARSEC levels overall.
    One commenter agreed with the Coast Guard's proposal to require, at 
a minimum, weekly updates of the CCL at MARSEC Level 1 and daily 
updates of the CCL at higher MARSEC levels.

[[Page 57668]]

Another commenter stated that we did not adequately clarify how 
different MARSEC levels would interact with Risk Groups A, B, and C. In 
response, we note that vessels and facilities that were proposed to be 
classified as Risk Groups B or C are not affected by this final rule, 
and that MARSEC interacts with Risk Group A as described in Sec.  
101.525. We have moved the MARSEC level requirements to this separate 
section to improve clarity.
    Several commenters suggested that electronic TWIC inspection should 
only consist of card validation and card authentication at MARSEC Level 
1, and that the Coast Guard should provide the flexibility for them to 
use electronic TWIC inspection for biometric matching purposes at 
higher MARSEC levels, or require it only at those levels. Other 
commenters recommended that electronic TWIC inspection should only be 
required once per day at MARSEC Level 1, with additional measures, such 
as full electronic TWIC inspection or random spot checks, implemented 
only at higher MARSEC levels. One commenter recommended that electronic 
TWIC inspection be used only at higher MARSEC levels, with visual TWIC 
inspections performed the rest of the time. We disagree with these 
suggestions. We believe that Risk Group A vessels and facilities should 
be secured at all times, not just at rare moments of heightened alert, 
and that biometric identification, one of the TWIC's strongest security 
features, should be used regularly. Based on the experience with the 
pilot, we also believe that consistency in electronic TWIC inspection 
processes is important, as varying use of security features can create 
confusion that can hinder operations.
    One commenter suggested that the CCL should be updated daily at all 
MARSEC levels, not just at MARSEC Levels 2 and 3. Similarly, one 
commenter stated that the CCL should be continually updated at all 
times. The commenter stated that once an automated method is 
established to do this, there is no additional cost associated with the 
increased frequency. While we do agree that, if automated, it is simple 
to update the list of cancelled TWICs, we note that not all operators 
use an automated system at this time. While we realize that some larger 
operations can set up automatic updates of the list, other operations 
may need to conduct such updates manually. In our RA, we calculated 
that it takes 30 minutes to update the CCL. For that reason, we have 
only required in 33 CFR 101.525 that the list of cancelled TWICs be 
updated daily during periods of heightened risk according to the 
specified MARSEC level. We note that the required periods to update the 
list are considered minimum requirements, but operators are free to 
update more often if desired.
    One commenter asked if electronic TWIC inspection requirements 
should be applied to Risk Groups B and C at higher MARSEC levels. We do 
not believe it should. This would require those vessels and facilities 
to purchase and install equipment for electronic TWIC inspection for 
use during those periods of heightened alert, dramatically increasing 
the costs of the rule for what we believe is, at this time, 
comparatively little corresponding benefit. Furthermore, changing 
electronic TWIC inspection procedures at irregular and long-spaced 
intervals can cause confusion that could impair operations.
4. Recordkeeping Requirements
    In the NPRM, the Coast Guard proposed specific recordkeeping 
requirements relating to the use of TWIC readers in vessels and 
facilities. These proposals, in proposed Sec. Sec.  104.235(b)(9) and 
105.225(b)(9), specified that owners or operators must keep records of 
each individual granted unescorted access to a secure area, which would 
include the FASC-N, date and time that unescorted access was granted, 
and the individual's name (if captured). The NPRM also proposed to 
require that owners or operators keep documentation demonstrating that 
they had updated the CCL with the required frequency. The NPRM proposed 
a 2-year minimum retention time for such records, and specified that 
TWIC reader and PACS readers were sensitive security information (SSI), 
protected under 49 CFR 1520. We received several comments on the 
subject of recordkeeping, which are discussed below.
    Many commenters suggested that the 2-year recordkeeping requirement 
was too long. One commenter supported the 2-year recordkeeping 
requirement, although noted that a shorter period would not be 
objectionable if the 2-year requirement was deemed overly burdensome or 
unnecessary. Another commenter suggested the period was an issue of 
concern, and that the Coast Guard should provide the rationale behind 
the requirement to retain records for 2 years rather than any other 
amount of time. The same commenter added that the argument for 
consistency with other recordkeeping requirements did not justify the 
burden of a 2-year requirement, although the commenter did not suggest 
an alternative timeframe. One commenter recommended that the records be 
retained for only 30 days, noting that this would be less burdensome.
    In this final rule, as explained in more detail below, we are 
maintaining the 2-year timeframe for record retention as we do not 
believe it is unduly burdensome or unnecessary. We also disagree with 
the commenter that consistency with all other MTSA-related records is 
an insufficient rationale for requiring records to be kept for a 2-year 
period. We believe that if differing records were required to be kept 
for varying amounts of time, it would needlessly complicate the storage 
of those records and potentially add additional expenses.
    One commenter stated that the 2-year retention period presents 
opportunities for the information to be mishandled or misused, and thus 
should be shorter, although no specific timeframe was suggested. While 
we realize that storing data for any period of time can result in 
misuse or mishandling, we note that the information is protected as 
SSI, and thus is subject to comparatively strict usage and storage 
controls. We believe that the risk of misuse or mishandling of the 
information is far outweighed by the security value of collecting and 
storing the data for use in security investigations. The commenter also 
stated that a shorter window would provide law enforcement sufficient 
data to assist in security investigation, but no alternative window was 
suggested nor supporting information supplied. Without additional 
information, we are not deviating from the 2-year period proposed in 
the NPRM and used in all other MTSA-related recordkeeping requirements.
    This commenter also stated that 46 U.S.C. 70105(e) implies that 
information gathered by a TWIC reader from a worker's card must not be 
shared with an employer or otherwise publicly released. We do not 
believe that this characterization is correct. 46 U.S.C. 70105(e)(1) 
reads as follows: ``Information obtained by the Attorney General or the 
Secretary under this section may not be made available to the public, 
including the individual's employer.'' This restriction only applies to 
information obtained by the Attorney General or the Secretary, and 
includes information received by the Coast Guard. The information 
generated by electronic TWIC inspection is obtained by a private entity 
(the facility or vessel owner or operator) to whom the restriction in 
46 U.S.C. 70105(e)(1) does not apply.
    However, and as the commenter noted, some information collected by

[[Page 57669]]

the TWIC reader or PACS is considered SSI, and is thus protected from 
unauthorized disclosure under 49 CFR part 1520. The commenter 
recommended that the Coast Guard consider all electronic reader 
records, whether of an individual or of an aggregated group, be 
restricted to security use only and explicitly forbidden to be used in 
labor-management issues (such as establishing hours worked or reporting 
criminal activity).
    Not all electronic reader records qualify as SSI and thus some 
information concurrently collected during electronic TWIC inspection 
can appropriately be used by an owner/operator for non-security but 
still legitimate purposes without violating 49 CFR 1520. The preamble 
of the NPRM contains clear guidance regarding the treatment of certain 
information collected by electronic TWIC inspection. In that document, 
we clearly stated that ``[w]e consider a TWIC-holder's name and FASC-N 
to be SSI under 49 CFR 15.5.'' We went on to explain that ``to the 
extent that a PACS contains personal identity [including the FASC-N] 
and biometric information, it contains SSI, which must be protected in 
accordance with 49 CFR part 15.'' \37\ However, an important aspect of 
this final rule is that it allows electronic TWIC inspection to be 
integrated with a facility's PACS, which serves many other purposes 
beyond security and contains non-SSI information. For example, PACSs 
are legitimately used to restrict access for non-security purposes 
(such as private or dangerous areas) and to help establish the hours 
worked by employees. Owners and operators of facilities have valid uses 
for the non-private information not covered in the SSI regulations but 
still collected by a PACS regarding the location of personnel on their 
property.
---------------------------------------------------------------------------

    \37\ 78 FR 17806-7.
---------------------------------------------------------------------------

    One commenter requested specific information regarding the 
requirements established for owners or operators to secure the privacy 
of individual cardholders. We note that we have not established any new 
requirements in this rule for such safeguarding because the SSI 
requirements are already sufficiently comprehensive. See 49 CFR part 15 
for regulations covering restrictions on disclosure, persons with a 
need to know, marking, consequences of unauthorized disclosure, and 
proper destruction of SSI.
    The Coast Guard weighed privacy and security concerns in the 
development of this requirement. To minimize the amount of personally-
identifiable information transferred from the TWIC to the TWIC reader, 
TWIC readers are specifically designed to only collect the minimum 
amount of information necessary to assist in access control and 
maritime security. Owners and operators who collect and maintain 
protected data from electronic TWIC inspections cannot share this 
information outside of their vessel or facility. The only allowable 
sharing is back to the TSA or to the Coast Guard for auditing or law 
enforcement purposes, or to assist with customer redress.\38\
---------------------------------------------------------------------------

    \38\ See 49 CFR part 1520.
---------------------------------------------------------------------------

    Owners and operators are also bound by the restrictions on 
disclosure of SSI.\39\ Unauthorized disclosure of SSI is grounds for a 
civil penalty and other enforcement or corrective action by DHS, and 
appropriate personnel actions for Federal employees. Corrective action 
may include the issuance of an order requiring retrieval of SSI to 
remedy unauthorized disclosure, or of an order to cease future 
unauthorized disclosure.
---------------------------------------------------------------------------

    \39\ See 49 CFR 15.9(a)(1).
---------------------------------------------------------------------------

    Two commenters suggested that SSI requirements should not apply to 
electronic TWIC inspection records if no personally-identifiable 
information is recorded (i.e., only the FASC-N, date, and time of the 
transaction is recorded). We note that pursuant to 49 CFR 
1520.5(b)(11)(i)(A), SSI includes identifying information of certain 
transportation security personnel, which includes ``Lists of the names 
or other identifying information that identify persons as . . . having 
unescorted access to . . . a secure or restricted area of a maritime 
facility, port area, or vessel.'' This information is specifically 
addressed in the recordkeeping requirements of this final rule. For 
example, Sec.  105.225(b)(9) states that the TWIC Reader or PACS system 
must capture the ``FASC-N, date and time that unescorted access was 
granted; and, if captured, the individual's name.'' If such information 
was captured, it would be considered SSI.
    Commenters also suggested additional information that could be 
collected during electronic TWIC inspection. One commenter suggested 
that an electronic TWIC reader transaction should also include an 
identifier for the specific electronic reader device, and if it is a 
portable electronic reader, an identifier for the operator of the 
device. The commenter suggested that this information would enhance the 
usefulness of an audit trail. While we see that there could be some 
value in having this information recorded, we believe that it would be 
overly complex to add this information into the suite of recorded 
information at this time, and the value of such information would not 
be worth the additional cost. We note that such information might be 
gathered from other sources even without a requirement to collect it in 
this final rule. Nonetheless, should we reconsider the scope of data 
collection for electronic TWIC inspection in future rulemakings, we 
will consider this suggestion.
    Two commenters recommended that recordkeeping requirements should 
be extended to situations where an electronic TWIC inspection is not 
used, such as visual TWIC inspections, RUA, and escorted access. One 
commenter suggested that without recordkeeping requirements for visual 
TWIC inspection, there is no incentive--other than avoiding the 
consequences of being caught--to actually conduct visual TWIC 
inspections. We disagree with these comments. A recordkeeping 
requirement for visual TWIC inspections would mean that each owner or 
operator would need to record information on each TWIC inspection. We 
would need to demonstrate that the cost of such a requirement is 
justified before imposing it on the regulated population. In that 
regard, we note that in 2013, the Coast Guard conducted 12,171 
inspections at MTSA-regulated facilities for compliance with the 
regulations in 33 CFR part 105. As part of those inspections, Coast 
Guard personnel spot-checked 52,708 TWICs, finding a validity rate of 
greater than 97 percent. In light of the high validity rate, we do not 
believe that a recordkeeping requirement for visual TWIC inspections is 
appropriate or necessary.
    One commenter also suggested that there should be recordkeeping 
requirements for when a person is granted unescorted access through the 
``special circumstances,'' described in Sec.  101.550 of the final 
rule, such as if he or she had reported their TWIC as lost or stolen. 
In the NPRM, we did not propose any requirements that records be kept 
for transactions that do not make use of electronic TWIC inspection. 
While such a suggestion is outside the scope of this final rule, we 
will consider it in future regulatory actions.
    Furthermore, we are not creating new requirements for visual 
inspections in this final rule, including any recordkeeping 
requirements. This final rule pertains to requirements for electronic 
TWIC inspection. Requirements pertaining to other means of access, 
including access granted through visual TWIC inspection or escorted 
access to a secure area, are

[[Page 57670]]

outside the scope of the final rule. We do note that electronic TWIC 
inspection is a prerequisite for RUA, and thus a record is created when 
that transaction occurs. However, due to the nature of RUA, no 
additional records are kept outside of the electronic TWIC inspection 
transactions. Such recordkeeping would be burdensome and defeat the 
purpose of RUA.
    One commenter suggested that the lack of criteria or specificity as 
to what the required records should contain severely limits their 
efficacy. We believe that the NPRM was clear on what records are 
required to be kept, but we will discuss them here in greater length. 
Specifically, a record should be kept of each instance in which a 
person is granted unescorted access to a secure area. This record must 
contain the FASC-N of the TWIC issued to the person granted unescorted 
access. If the TWIC reader or PACS captures the individual's name, the 
name associated with the TWIC must also be part of the record. Finally, 
the record must include the date and time the person was granted 
unescorted access (the time can be rounded to the nearest minute; it is 
not required that the precise second that access was granted be 
captured, although it is acceptable to be more precise). As noted in 
the NPRM, ``we allow individual regulated parties to determine the best 
method and manner of complying with the recordkeeping requirements.'' 
\40\
---------------------------------------------------------------------------

    \40\ 78 FR 17806.
---------------------------------------------------------------------------

    The commenter also requested additional justification for the 2-
year period, stating that neither the argument for consistency nor the 
argument for law enforcement justify the length of time to hold 
records. As stated in the NPRM, the timeframe was designed, in part, 
for consistency with existing security-related and other recordkeeping 
requirements applicable to vessels and facilities, and we note that all 
other security recordkeeping requirements in the affected sections are 
subject to a 2-year retention period. In response to the commenters who 
requested additional justification, we would add that investigations of 
TSIs can involve analysis of data that stretches back for that amount 
of time, and we want to ensure that any historical data that could be 
useful is available. We believe that a 2-year period is an appropriate 
amount of time to ask owner operators to store data to ensure that no 
investigation is limited due to the unavailability of relevant data. We 
continue to believe that a uniform timeframe for recordkeeping 
requirements, when practicable, provides the most efficient regulatory 
system, and that the costs of storing data are minor compared to the 
security benefits provided.
    The commenter also referred to the 2013 GAO report, noting its 
concern that the TWIC Pilot Program had difficulties collecting 
accurate, consistent data from the pilot sites.\41\ While we are aware 
of the GAO's criticisms of the TWIC Pilot Program, we do not believe 
those data collection concerns are relevant to the data collection 
proposed by the implemented electronic TWIC inspection regulations. 
Beyond the fact that both involved data collections, the nature and 
uses of the data collected in the two programs are very dissimilar. For 
example, among many other items that related to the overall operation 
of the facilities at issue, the Pilot Program collected data on the 
number of people using TWIC readers, the amount of time taken per 
transaction, and the failure rates for transactions. These are very 
different data than collected by electronic TWIC inspection, which 
collects items such as the FASC-N. The data collected by electronic 
TWIC inspection is narrowly tailored to assist the Coast Guard and 
other law enforcement agencies in investigating TSIs, and the 
criticisms of data collection on the Pilot Report are not analogous.
---------------------------------------------------------------------------

    \41\ ``Transportation Worker Identification Credential: Card 
Reader Pilot Results Are Unreliable; Security Benefits Need to Be 
Reassessed'' (GAO-13-198) is available in the docket by following 
the instructions in the ADDRESSES section of this preamble.
---------------------------------------------------------------------------

    One commenter stated that the recordkeeping requirements proposed 
in the NPRM would create a large amount of data and may need to be 
stored in a media that is not immediately accessible. The commenter 
requested that the final rule allow a reasonable amount of time to 
retrieve and produce the electronic records when requested. We agree 
with the commenter that a reasonable amount of time will be permitted 
to produce any requested records. This final rule deals only with 
recordkeeping requirements; it does not specify a timeframe for record 
retrieval.
    One commenter requested clarification of a specific situation: a 
Port Authority operates a cruise terminal which uses an FSP, but when a 
cruise ship is in port, the cruise security line operates under its own 
FSP. The commenter asked who would be responsible for maintaining the 
records. Based on the information described in this situation, the 
owner or operator of the TWIC reader or PACS system conducting the 
electronic TWIC inspection would be responsible for maintaining the 
required records of those transactions. However, we note that 
recordkeeping requirements for any particular facility would be 
described in the FSP and that different situations may yield different 
results, but that these issues would be resolved during approval of the 
FSP.
    Similarly, another commenter described a scenario where a private 
security company and a public entity share a facility. The commenter 
asked if the entities would need to share records. In response, we note 
that there is no requirement to share records, and that the owner or 
operator of the TWIC reader or PACS conducting the electronic TWIC 
inspections is the entity required to keep the records. Which entity is 
responsible for recordkeeping should also be addressed in the FSPs.
    One commenter requested that, if a non-Risk Group A facility were 
to use electronic TWIC inspection on a voluntary basis, they should not 
be subject to the electronic recordkeeping requirements in proposed 
Sec.  105.225(b)(9) and (c). Assuming that a facility is using 
electronic TWIC inspection on a voluntary basis to replace visual TWIC 
inspection, pursuant to the guidance in PAC 01-11, we disagree. If 
replacing security personnel with electronic TWIC inspection, then all 
elements of such an inspection, including recordkeeping requirements, 
would have to be met. Maintaining the electronic records as required 
provides additional security and information in case of a security 
breach in the future. Visual inspection programs are not required to 
maintain this type of information due to the large amount of time 
needed to manually enter the same information.

C. When To Conduct Electronic TWIC Inspection

    One of the areas in which the Coast Guard received the most 
comments on the proposed rule was the issue of when a TWIC must be 
read. Specifically, the NPRM used language that stated, ``prior to each 
entry, all persons seeking unescorted access to secure areas [must] 
present their [TWIC] for inspection before being granted such 
unescorted access'' (this language was used in proposed Sec. Sec.  
101.520(a)(1), 101.525 introductory text, and 101.530 introductory 
text).
    Many commenters asked for clarification regarding this language, 
specifically relating to issues of where TWIC readers should be 
located, and to what specifically ``prior to each entry'' referred. 
Despite using identical language in the proposed regulatory

[[Page 57671]]

text, the requirement for when to perform electronic TWIC inspection is 
very different for vessels than it is for facilities. With regard to 
vessels, we stated in the NPRM that ``for vessels, this NPRM proposes 
to require TWIC readers at the access points to the vessel itself, 
regardless of whether the secure area encompasses the entire vessel.'' 
\42\ On the other hand, with regard to facilities, we stated that 
``this NPRM proposes to require TWIC readers at the access points to 
each secure area,'' \43\ which could necessitate a large number of TWIC 
readers in facilities like passenger facilities, many of which have 
multiple access points to secure areas within the facility. Similarly, 
the NPRM RA reflected this information, estimating that each facility 
might use a number of TWIC readers (passenger facilities, with many 
access points to secure areas, were estimated to require an average of 
16 TWIC readers each), whereas each vessel might only be equipped with 
one or two, reflecting the fact that they would only be deployed at the 
entrances to the vessels, not at each access point to a secure area 
within the vessel.
---------------------------------------------------------------------------

    \42\ 78 FR 17803.
    \43\ 78 FR 17803.
---------------------------------------------------------------------------

    Nonetheless, we recognize the confusion brought on by the proposed 
language. One commenter, for example, requested a clarification of the 
reference to ``each entry'' to a facility or vessel secure area. The 
commenter noted that passenger vessels and facilities included 
restricted areas, employee access areas, and passenger areas, and it 
was unclear from the NPRM where the electronic TWIC inspection 
requirements would be applied. In this final rule, we have used 
language that we believe more clearly describes the specific 
requirements of the rule. We broke the language down into two separate 
paragraphs, one for vessels (see Sec.  101.535(a)), and one for 
facilities (see Sec.  101.535(b)), using slightly different language 
for each. The final regulatory text for facilities now states, ``Prior 
to each entry into a secure area of the facility,'' while the final 
regulatory text for vessels now states, ``Prior to each boarding of the 
vessel.'' While the language is slightly modified, we believe it more 
clearly implements the proposed requirements in the NPRM.

1. Secure, Restricted, Public Access, Passenger Access, and Employee 
Access Areas

    In terms of clarifying that an electronic TWIC inspection must be 
performed prior to each entry into a secure area (for facilities), we 
believe that it is important to clarify the term ``secure area,'' as 
well as explain the differences between secure areas and other types of 
areas on MTSA-regulated vessels and facilities. Many commenters asked 
questions that indicated the difference between secure areas, 
restricted areas, employee access areas, public access areas, and 
passenger access areas was not entirely clear. In this section, we 
discuss the definitions of these types of areas, given their 
definitions in 33 CFR part 101, as well as the additional explanation 
offered in NVIC 03-07 and other documents.
    The statutory requirement for TWIC readers, stated in 46 U.S.C. 
70105(a)(1), requires that anyone granted unescorted access to a secure 
area of a vessel or facility maintain a valid TWIC. Secure areas are 
defined in 33 CFR 101.105. The relevant portion of the definition 
states that ``Secure area means the area on board a vessel or at a 
facility over which the owner/operator has implemented security 
measures for access control in accordance with a Coast Guard approved 
security plan. It does not include passenger access areas, employee 
access areas, or public access areas.''
    The concept of a secure area is explained in more detail in NVIC 
03-07, enclosure (3). Section 3.3b of that document explains that ``for 
facilities, the secure area is the entire area within the outer-most 
access control perimeter of the facility, with the exception of public 
access areas, and encompasses all restricted areas.'' Similarly, ``for 
vessels and OCS facilities, the secure area encompasses the entirety of 
a vessel or OCS facility, with the exception of passenger or employee 
access areas for vessels.''
    Existing regulations distinguish between the secure area and areas 
designated as ``restricted.'' The term restricted area, as defined in 
existing 33 CFR 101.105, means ``the infrastructures or locations 
identified in an area, vessel, or facility security assessment or by 
the operator that require limited access and a higher degree of 
security protection [than secure areas].''
    NVIC 03-07 also goes into detail explaining the difference between 
secure and restricted areas, noting that by virtue of the fact that the 
secure area encompasses the entire facility or vessel (with the 
exclusion of public, passenger, and employee-access areas), restricted 
areas fall within this perimeter.
    Multiple commenters with facilities expressed concerns about the 
existence of multiple secure areas within any one facility, and what 
access control measures would be required by this final rule. Other 
commenters represented both vessels and facilities, but had similar 
concerns with regard to the differences among secure, restricted, and 
public access areas. The definitions of secure and restricted areas 
have implications when determining where to locate electronic TWIC 
inspection locations on various facilities. These locations would be 
marked in an FSP or a VSP. Given the requirement that electronic TWIC 
inspection be conducted ``prior to each entry'' into a secure area (for 
facilities), we would anticipate that the inspection points at 
facilities would be located at the access points to secure areas. For 
example, in a chemical cargo facility the entire facility may be 
considered a secure area, as security measures for access control may 
surround the entire facility. Such a facility would likely only conduct 
electronic TWIC inspection at the entrance to the facility. 
Alternatively, a facility might categorize the parking lot as a 
``public access area'' so that employees and visitors can park, and 
electronic TWIC inspection could be conducted at the access point from 
the parking lot into the secure area of the facility. We note that a 
second round of electronic TWIC inspection is not required when passing 
from a secure area to a restricted area, although we would anticipate 
other security measures to be in place.
    For passenger facilities, the majority of the areas may be 
designated ``public access areas,'' ``passenger access areas,'' or 
``employee access areas'' (such as break rooms). In such an instance, 
electronic TWIC inspection points may only be located at entrances to 
secure areas such as the pier or FSO's office. The Coast Guard 
acknowledges the confusion surrounding this issue, which is why we have 
included a clarifying revision to 33 CFR 103.505, Elements of the Area 
Maritime Security (AMS) Plan, in which a parenthetical reference to the 
TWIC program may create confusion regarding whether TWIC provides 
access control for secure or restricted areas. This final rule creates 
electronic TWIC inspection requirements for access to secure areas, and 
does not address requirements for access control to restricted areas.
    Finally, we note the concerns commenters had relating to secure 
areas on water. One commenter noted that the water where barge fleets 
are located is considered a secure area, but the area was only 
accessible by boat. The commenter questioned how electronic TWIC 
inspection could be conducted in such a situation. Similarly, another 
commenter requested that they be allowed to conduct electronic TWIC 
inspections on shore before entering

[[Page 57672]]

barge fleeting areas, as otherwise there would be no way to conduct an 
electronic TWIC inspection. Another commenter noted that the only 
``access point'' into such secure areas may be a towing vessel with the 
dedicated purpose of guarding the area.
    These commenters raise important issues as to how we would apply 
the electronic TWIC inspection process to secure areas on water, such 
as barge fleeting facilities. Upon consideration, we do not believe 
that requiring electronic TWIC inspection prior to entering such areas 
would be practical, as there is no particular access point to such an 
area that can be controlled by a TWIC reader. Electronic TWIC 
inspection would instead be required at the barge fleeting facility's 
shore side location.
    Many commenters representing vessels were concerned about a 
situation involving a passenger vessel (potentially in Risk Groups B or 
C) with multiple secure areas and no one standing watch at the 
entrances to each secure area. We note that while the electronic TWIC 
inspection requirements are different for vessels than for facilities, 
the definitions of secure areas and restricted areas are similar. On 
non-passenger vessels, generally the entire vessel is considered a 
secure area. Certain areas within the vessel may have higher levels of 
security, and those would be considered restricted, which again are not 
impacted by this final rule. On passenger vessels, while security 
measures would still encompass the vessel, only certain areas would be 
considered secure, as passenger access areas and employee access areas 
are excluded from the definition of secure areas. As described below in 
Section V.C.2 of this preamble, because electronic TWIC inspection on 
vessels is only conducted when boarding the vessel, the exact location 
of secure and restricted areas on a vessel would not affect the 
placement of electronic TWIC inspection points.
a. ``Prior to Each Entry'' for Risk Group A Facilities
    In this final rule, we are finalizing without change the proposed 
requirement that electronic TWIC inspection is required prior to each 
entry into a secure area of a Risk Group A facility. Similarly, we are 
finalizing the proposed requirement that electronic TWIC inspection is 
required prior to each entry onto a Risk Group A vessel. While some 
commenters objected to this policy, we believe that it represents the 
best balance of security and practicability at this time. Furthermore, 
we believe that many objections to the policy expressed by industry are 
addressed by clarifying that the new requirements apply only to Risk 
Group A vessels and facilities, and that vessels and facilities not in 
this group have no new requirements in this final rule. In this 
section, we address comments specifically related to Risk Group A 
facilities. Questions for Risk Groups B and C, as well as questions for 
vessels, are discussed in other sections of this preamble.
    Several commenters requested guidance related to operations 
conducted under PAC 08-09, change 1. That document allows owners and 
operators of a vessel or facility to use a local access card to grant 
unescorted access to secure areas, assuming that the local access card 
is tied to a valid TWIC and that verification (visual or electronic) of 
the local access card is conducted each time access is granted to a 
secure area. Pursuant to PAC 08-09, TWICs needed only to be validated 
once every 24 hours. However, PAC 08-09 is only valid until the Coast 
Guard publishes a final rule requiring the use of TWIC readers as an 
access control measure.\44\ Because this final rule establishes 
electronic TWIC inspection as a requirement for Risk Group A 
facilities, the guidance in PAC 08-09 will no longer be valid with 
respect to those facilities upon the effective date of this rule. 
Because there are no electronic TWIC inspection requirements for Risk 
Groups B and C, PAC 08-09 remains in force for those facilities. We 
intend to update PAC 08-09 before the effective date of this final 
rule.
---------------------------------------------------------------------------

    \44\ PAC 08-09, change 1, p. 2.
---------------------------------------------------------------------------

    We note that while PAC 08-09 will no longer be valid for Risk Group 
A facilities, the flexible performance requirements of this final rule 
will continue to allow access using local access or PACS cards, 
assuming the PACS is able to perform the electronic TWIC inspection 
requirements of biometric identification, the card validity check, and 
card authentication. While many commenters requested that Risk Group A 
facilities be permitted to continue to follow the guidance in PAC 08-09 
(some of whom suggested that it could be augmented by a daily card 
validity check), we are not granting that request. Electronic TWIC 
inspection is a more secure system than that used under PAC 08-09 for a 
variety of reasons, but most distinctly because it performs a biometric 
identification each time a person is granted unescorted access to a 
secure area, whereas the system described in the PAC 08-09 does not. 
Biometric identification provides a higher level of certainty that an 
individual is an approved TWIC-holder than visual identification.
    One commenter suggested that the purpose of TWIC is for a worker to 
be vetted, and that TWIC should not be used as an access control 
system, noting that it is up to the owner of the secure space to 
determine which TWIC-holders are granted unescorted access. While we 
agree that one of the benefits of TWIC is that it ensures an individual 
has undergone a background check, we disagree that vetting is the only 
purpose of a TWIC. Congress mandated that the TWIC contain the 
biometric identification of the TWIC-holder. Furthermore, Congress 
explicitly required that the Coast Guard ensure that only individuals 
who hold a TWIC be granted unescorted access to secure areas of MTSA-
regulated facilities in 46 U.S.C. 70105(a)(1). We conclude, therefore, 
that it is the clear mandate of Congress for this biometric 
identification to be used to ensure that only TWIC-holders are granted 
unescorted access to secure areas of Risk Group A vessels and 
facilities. Using this function of the TWIC for identification 
verification purposes will enhance the security afforded by the TWIC 
program in the highest-risk areas.
    Other commenters expressed the opposite view, arguing that the 
Coast Guard was wrong to limit the requirement of electronic TWIC 
inspection to Risk Group A vessels and facilities only. Multiple 
commenters suggested that the proposal to limit the use of electronic 
TWIC inspection to Risk Group A vessels and facilities deviated from 
Congress' intent in developing the TWIC program, and that to conform to 
the intent of Congress, we should have extended the mandate to perform 
electronic TWIC inspection to Risk Group B as well. Other commenters 
noted that in the ``findings'' section of the MTSA statute (Pub. L. 
107-251, 101(11)), Congress found that ``[b]iometric identification 
procedures for individuals having access to secure areas in port 
facilities are important tools to deter and prevent port cargo crimes, 
smuggling, and terrorist actions.'' The commenter argued that to be 
responsive to Congress, TWIC cards should not be used primarily as a 
``flash pass,'' but should be used more often as biometric 
identification tools.
    The Coast Guard believes that the requirement instituted in this 
final rule represents a reasoned implementation of electronic TWIC 
inspection. As analyzed in the NPRM and associated preliminary RA, we 
believe the vessels and facilities in Risk Group A are at much greater 
risk than other MTSA-regulated vessels and facilities.

[[Page 57673]]

Electronic TWIC inspection has a high utility in deterring and 
mitigating certain threats to these targets. Given the costs in 
infrastructure and operational needs associated with electronic TWIC 
inspection, as shown in the TWIC Pilot Program and in the Coast Guard's 
regulatory analyses, we do not believe that electronic TWIC inspection 
should be extended to other vessels or facilities at this time. 
Information and experience gained through the implementation of Risk 
Group A vessels and facilities will, however, help to determine whether 
and how the electronic TWIC inspection program should be expanded in 
the future.
    Several commenters argued that the requirement to undergo 
electronic TWIC inspection prior to each entry into a secure area of 
facility was overly burdensome and unnecessary. One commenter stated 
that the Coast Guard does not understand the day-to-day operations of 
passenger vessels and facilities, and that only small areas are secure 
and restricted, requiring a TWIC-holder to move in and out of these 
areas multiple times per day. We disagree with this statement, and note 
that the NPRM and the NPRM RA repeatedly affirmed that a TWIC reader 
would be required at each access point to a secure area in a Risk Group 
A facility. We acknowledge that in cases where employees of a passenger 
facility move repeatedly from a non-secure area (such as a passenger 
access area) to a secure area, they will likely have to undergo 
repeated electronic TWIC inspections. We also note that these 
facilities already use access control measures to prevent unauthorized 
persons, including vessel passengers, from entering secure areas, and 
that this requirement only involves incorporating electronic TWIC 
inspection into those existing access control measures.
    Other commenters also made suggestions that would allow for reduced 
numbers of electronic TWIC inspections for employees that enter and 
leave secure areas multiple times per day. Several commenters suggested 
that checking TWICs against the CCL multiple times per day is 
redundant, as the list is only updated, at most, once per day. These 
commenters suggested that at lower MARSEC levels, one electronic TWIC 
inspection per day would be enough, and then a visual TWIC inspection 
could be used for each subsequent entry into a secure area. We note 
that electronic TWIC inspection performs much more than just the card 
validity check, and that there is a need to check that the individual 
presenting the card is the correct individual presenting an authentic 
card each time he or she is granted unescorted access to a secure area. 
For these reasons, a single electronic TWIC inspection should not allow 
repeated grants of unescorted access to secure areas in Risk Group A 
facilities.
    One commenter argued that its security needs would be better met 
through cross-checking TWICs via its employment, human resources, and 
internal security systems, and then issuing badges that it has control 
over. The commenter stated that in that situation, it would have the 
ability to verify and revoke access as necessary for the security of 
the facility. With the new flexibility for electronic TWIC inspection 
in this final rule, such cross-checking using facility-specific 
identification cards linked to a PACS is possible, as long as the 
facility's PACS performs the biometric identification, card validity 
check, and card authentication procedures required in this final rule 
prior to each entry into a secure area.
    One commenter stated that the ``prior to each entry'' requirement 
is impracticable for cruise ship terminals. This commenter stated that 
dozens of porters, stevedores, and shore staff constantly move baggage 
in and out of secure areas using mechanical equipment such as forklifts 
and hand trucks, and that requiring electronic TWIC inspection at each 
entry would be potentially unsafe. We realize that there is a need to 
balance the requirement to ensure that only TWIC-holders are granted 
unescorted access to secure areas with the operational needs of a 
facility. In a situation such as that described by the commenter, an 
RUA plan could alleviate the burden of repeated and constant electronic 
TWIC inspections. The RUA option was designed primarily to address the 
needs of baggage handlers and stevedores, and was developed to 
facilitate operations such as those described by the commenter where 
persons must enter and exit a secure area on a continual basis. RUA is 
described in more detail in Section V.C of this preamble.
    Several commenters were concerned that the proposed requirement for 
permanently placed TWIC readers at the access points for Risk Group A 
facilities offered no flexibility, and could restrict the use of 
portable TWIC readers as an option at less heavily-trafficked access 
points. We first note that the NPRM did not specifically require a 
fixed TWIC reader at all access points, but we assumed that many 
facilities would use fixed TWIC readers over portable ones at fixed 
access points for the purposes of analysis. However, we agree with the 
commenter that the NPRM did not offer enough flexibility, and thus this 
final rule adds another option for electronic TWIC inspection. 
Facilities will be able to use fixed electronic readers, portable 
electronic readers, or a PACS to conduct electronic TWIC inspection, 
depending on which works best considering their business operations.
    One commenter raised a concern that a requirement to present a TWIC 
prior to each entry into a secure area would mean that TWIC-holders 
would have to carry their cards at all times, thus exposing cards to 
being damaged in a harsh environment or lost. The commenter recommended 
that a system be utilized that would allow them to keep their workers' 
TWICs in a safe and secure location where, upon request, the TWICs 
could be retrieved and inspected within a reasonable amount of time. We 
agree that this could be appropriate in many maritime environments, and 
thus the flexibility allowed by this final rule would permit such a 
system. A facility could control access to secure areas using a PACS to 
conduct the electronic TWIC inspection, thus allowing the TWICs 
themselves to be maintained in a safe, nearby location, where they 
could be inspected if necessary.
    One commenter requested clarification with regard to overall 
personnel accountability within secured areas. Specifically, the 
commenter asked if the Coast Guard would require TWIC-holders to record 
when they exited a secure area, and if a facility should know who is in 
a secured area, at all times. In this rulemaking, we did not propose to 
require personnel accountability in this fashion, nor does the final 
rule require TWIC-holders to record when they exit a secured area. 
Another commenter expressed support for not proposing such a 
requirement in the NPRM. The final rule only requires electronic TWC 
inspection upon entering a secure area of a Risk Group A facility. With 
regard to recordkeeping, as discussed above, this final rule only 
requires that records be kept of individuals that enter the secure 
area, and of when they entered. This final rule does not require that 
records be kept of individuals leaving a secure area, nor does it 
require that records be kept of who is in a secure area at any 
particular time.
b. Recurring Unescorted Access
    Many commenters requested that the Coast Guard reinstate the 
concept of RUA that had originally been considered in the ANPRM, but 
was not proposed in the NPRM. As described in the ANPRM, as part of an 
RUA plan, the owner or operator of a vessel or facility would conduct 
an initial biometric

[[Page 57674]]

match of the individual against his or her TWIC, either at hiring or 
upon the effective date of a final rule, whichever occurs later. This 
biometric match would include a verification of the authenticity and 
validity of the TWIC. Once this check is done, the TWIC would only be 
used as a visual identity badge, at a frequency to be approved by the 
Coast Guard in the amended security plan, so long as the validity of 
the TWIC is verified periodically, ranging from monthly to daily, 
depending upon Risk Group and MARSEC Level.\45\ RUA, as described in 
the ANPRM, would be limited to 14 TWIC-holders per vessel or facility, 
although it was not clear whether that meant an RUA regime would only 
be approved if the vessel or facility crew were limited to 14 TWIC-
holders, or if 14 people per vessel or facility would be exempted from 
electronic TWIC inspection procedures that would still be in place for 
other employees or persons seeking access.
---------------------------------------------------------------------------

    \45\ See 74 FR 13362.
---------------------------------------------------------------------------

    The Coast Guard opted not to include RUA in the proposed regulatory 
text in the NPRM, despite the fact that many ANPRM commenters supported 
various versions of RUA procedures. In the NPRM, we explained that 
``RUA was previously proposed [in the ANPRM] to introduce flexibility 
and provide relief to vessels otherwise required to use TWIC readers, 
based on the familiarity that exists between a relatively small number 
of crewmembers.'' \46\ However, by limiting electronic TWIC inspection 
requirements to Risk Group A vessels only, and including the vessel 
crewmember exemption in the TWIC applicability section, we believed we 
had rendered the need for RUA as a mechanism for regulatory relief 
unnecessary. One commenter requested clarification about whether the 
proposed RUA mechanism would apply to facilities as well, or just 
vessels. While the NPRM did not explicitly discuss the use of RUA for 
facilities, we did not consider such plans viable. Unlike vessels, 
facilities regularly receive unfamiliar personnel, such as visitors, 
contractors, and deliveries, and must have a means to ensure those 
visitors are valid TWIC-holders, regardless of the size of the regular 
staff.
---------------------------------------------------------------------------

    \46\ See 78 FR 17804.
---------------------------------------------------------------------------

    We received several comments in response to the decision in the 
NPRM not to include an RUA provision. Most commenters recommended that 
some sort of RUA provision be included in the final rule, although they 
differed in their interpretations of what, exactly, an RUA plan would 
entail. Furthermore, multiple commenters laid out specific examples of 
how RUA could improve operations in several scenarios. These comments 
are described below.
    One commenter suggested that an RUA plan for vessel and facility 
operations, including operations at facilities that service passenger 
vessels, would require that a TWIC-holder undergo electronic TWIC 
inspection once when he or she reports for work each day. It was 
unclear from these comments specifically how this plan would be 
implemented. If RUA were limited to certain crewmembers or employees, 
it is unclear how those crewmembers would differentiate themselves from 
other TWIC-holders who would still be required to undergo electronic 
TWIC inspection prior to each entry into the vessel or into a secure 
area of the facility. Furthermore, unless all crewmembers or employees 
were subject to the RUA plan, it is unclear how such a system would 
reduce costs, as access control measures would still need to be in 
place that would need to differentiate between TWIC-holders and non-
TWIC-holders, but also differentiate between those TWIC-holders granted 
RUA and those subject to repeated electronic TWIC inspection. These 
questions, along with the exemption from electronic TWIC inspection 
requirements for vessels with low numbers of crewmembers, are the 
reason that the RUA plan was not proposed in the NPRM, despite being 
raised in the ANPRM, and we still do not have clear answers to these 
issues.
    Several commenters raised the issue of RUA with regard to certain 
port workers who repeatedly enter and leave secure areas, such as 
baggage porters at cruise terminals or workers such as stevedores 
transferring cargo into a secure area. Similarly, one commenter 
expressed concern about how porters would be able to do their jobs if 
required to conduct electronic TWIC inspection at each entry into the 
baggage area. Some commenters suggested that in order to permit workers 
to efficiently perform their jobs, which may entail entering and 
leaving a secure area several times an hour, biometric checks should be 
limited to the beginning of a shift and after extended breaks. The 
commenter stated that it is not operationally practical to have these 
workers undergo electronic TWIC inspection repeatedly.
    We agree that, for narrow classes of vessel or facility employees 
such as baggage porters, the electronic TWIC inspection requirements 
could prove particularly burdensome, and that these workers could be 
accommodated using a limited form of RUA as suggested by the commenter. 
Some scenarios where this may prove useful include, for example, 
porters who carry baggage from a curbside check-in area (unsecure) to a 
baggage storage area (secure) for cruise customers, or forklift 
operators who transport packages from a loading area (unsecure) to a 
secure storage area on a vessel or facility. These persons need to 
travel back and forth across the secure-unsecure boundary repeatedly, 
and repeated electronic TWIC inspections can be both cumbersome and 
redundant in these situations.
    Therefore, to accommodate these situations without compromising 
security, we have added a limited form of RUA into this rule as Sec.  
101.555. The system would operate as follows: a vessel or facility 
would designate an area as a ``Designated Recurring Access Area 
(DRAA)'' in its security plan. As shown in Figures 1 and 2, the DRAA 
would consist of adjoining secure and unsecure areas, as well as the 
access gates between them. As long as a TWIC-holder stayed inside the 
designated area, he or she could pass between the unsecure and secure 
portions of the DRAA without having to undergo an electronic TWIC 
inspection each time he or she entered the secure portion.
BILLING CODE 9110-04-P

[[Page 57675]]

[GRAPHIC] [TIFF OMITTED] TR23AU16.000


[[Page 57676]]


[GRAPHIC] [TIFF OMITTED] TR23AU16.001

BILLING CODE 9110-04-C
    We have considered the problem of differentiating between those 
persons granted recurring access and those who must undergo electronic 
TWIC inspection prior to each entry. Certain restrictions and 
conditions would be applied to ensure that no unauthorized persons gain 
access to the secure area through the DRAA. In order to allow recurring 
access, the Coast Guard is requiring that security personnel be present 
at the access points to the secure areas where recurring access is 
used. Although electronic devices, such as TWIC readers or a PACS 
reader, can be used to control access at other entrances, in an RUA 
situation the TWIC (or a linked PACS card) is not presented at each 
entry to the secure area. Instead, the presence of security personnel 
is necessary to properly control access while allowing the known DRAA 
participants to pass through repeatedly.
    An additional requirement for a DRAA is that the entire unsecured 
area must be visible at all times to the on-site security personnel. 
This requirement is necessary to ensure that all recurring access 
participants have undergone the necessary electronic TWIC inspection 
before entering a secure area. We believe that without this 
requirement, it might be possible for a non-TWIC-holder to ``talk their 
way'' into a secure area by claiming they had already undergone a TWIC 
inspection, and had merely returned from an authorized break. We note 
that among various GAO criticisms of the maritime security program, 
this was one of the means by which GAO investigators were able to 
bypass security measures. We agree with one commenter that suggested 
electronic TWIC inspection should be repeated once returning from a 
break. By requiring recurring access participants to stay within sight 
of the security personnel or undergo a new electronic TWIC inspection, 
we can ensure that these types of incidents do not happen.
    To gain recurring access, a TWIC-holder would need to undergo

[[Page 57677]]

electronic TWIC inspection, including biometric matching, the first 
time the TWIC-holder entered the secure portion of a DRAA. This would 
of course happen at the beginning of a work shift, but would also 
happen after each time the TWIC-holder left the DRAA for any reason, 
including administrative reasons, lunch breaks, or even to use the 
restroom. We have also added a provision that requires at least one 
electronic TWIC inspection per change of security personnel in order to 
account for shift changes.
    We have attempted to make the RUA policy as flexible as possible 
while still maintaining security. We note that the use of a DRAA is a 
wholly voluntary option, and that access to secure areas of a vessel or 
facility may always be accomplished through the procedures in 
Sec. Sec.  101.535 and 101.550. Even within a DRAA, only access points 
that are used for recurring access must be manned by security 
personnel, so there can be other access points controlled by unmanned 
means (such as a lock connected to a TWIC reader) for employees who do 
not need recurring access. Furthermore, an area can be designated a 
DRAA at certain times. For example, at a cruise ship terminal, a 
curbside area could be designated a DRAA only during boarding times. 
This would allow the access points to be secured by unmanned means 
during other periods when recurring access is not necessary.
    We also note that a DRAA may be incorporated in a Joint Vessel and 
Facility Security Plan, allowing an area where employees can cross from 
a pier to a vessel repeatedly without having to undergo electronic TWIC 
inspection each time. This can facilitate the loading or unloading of 
vessels considered secure areas.
2. Risk Group A Vessels
    We received fewer comments regarding the requirements for 
electronic TWIC inspection for Risk Group A vessels than for vessels in 
other Risk Groups. In the NPRM, we discussed the TWIC reader 
requirements as applied to the Risk Group A vessel population in 
Section IV.L, ``Physical Placement of TWIC Readers.'' In that section, 
we stated that ``[w]e propose to amend 33 CFR 104.265(a)(4) by 
requiring a vessel owner or operator to place TWIC readers at the 
vessel's access points only, regardless of whether the secure area 
encompasses the entire vessel.'' \47\ We realize that this sentence may 
have been confusing, as the only proposed modification to Sec.  
104.265(a)(4) was to add the sentence ``Depending on a vessel's Risk 
Group, TWICs must be checked either visually or electronically using a 
TWIC reader or as integrated into a PACS at the locations where TWIC-
holders embark the vessel'' to the existing requirement that the owners 
or operator of a vessel must ensure that only authorized TWIC-holders 
are granted unescorted access to secure areas of the vessel.\48\ A 
clearer citation would have been to Sec.  101.514(a)(1), which 
contained the proposed requirement that prior to each entry, all 
persons seeking unescorted access to secure areas in Risk Group A 
vessels and facilities must present a TWIC. The regulatory text was 
also unclear about what ``prior to each entry'' meant, and many 
commenters believed that it meant prior to each entry into a secure 
area of the vessel, which was contrary to the stated intent of the 
preamble.
---------------------------------------------------------------------------

    \47\ 78 FR 17816
    \48\ 78 FR 17830-17831, Amendatory Instruction 16a
---------------------------------------------------------------------------

    As stated above, in this final rule, we are modifying the 
electronic TWIC inspection requirements so that they are both more 
flexible and more performance-oriented than described in the NPRM. In 
this final rule, we require electronic TWIC inspection rather than the 
presentation of a TWIC. Furthermore, again as stated above, we are 
clarifying the language relating to the locations of electronic TWIC 
inspection. The new language, contained in Sec.  101.535(a), 
``Requirements for Risk Group A Vessels,'' reads ``prior to each 
boarding of the vessel.'' We believe that this change should improve 
the clarity of the regulatory text.
    The Passenger Vessel Association (PVA) noted the confusion between 
the preamble and regulatory text, noting in its comments that ``The 
proposed rule states (proposed Sec.  104.265(a) \49\), `Prior to each 
entry, all persons must present their TWICs for inspection using a TWIC 
reader.''' The PVA argued that ``[t]he Coast Guard's explanatory 
material in the Federal Register suggesting otherwise cannot override 
the very clear language of the proposed regulation.'' We agree that the 
language is confusing, and have clarified it appropriately. The 
commenter also recommended that the Coast Guard adopt a version of RUA 
that would allow a single verification of the TWIC status when the 
TWIC-holder reports to the secure area for the first time each day. 
While this was not what RUA, as proposed in the ANPRM, was intended to 
do, we note that the clarified electronic TWIC inspection requirements 
in this final rule will result in far fewer inspections on vessels than 
the commenter anticipated.
---------------------------------------------------------------------------

    \49\ We note that the language cited is actually from proposed 
Sec.  101.520(a)(1), not Sec.  104.265(a).
---------------------------------------------------------------------------

    One commenter, who operates as a combined ferry/terminal operator, 
discussed methodologies to improve security through a ``Combined 
Security Plan'' that allowed them to effectively identify risk while 
allowing their employees to perform their duties in a secure and 
efficient manner. The commenter suggested that its ferries have 
multiple points of access from the terminal to the ferry as well as 
multiple points of access to secure areas within the ferry. The Coast 
Guard agrees that insofar as security measures between a terminal and 
ferry can be combined, a combined plan can produce a more effective and 
efficient security regime than separate plans. Furthermore, secure 
areas within terminals can be connected to the entrances of ferries. In 
those instances, where TWIC-holders pass directly from a secure area of 
the terminal onto a ferry, an additional electronic TWIC inspection is 
unnecessary. For that reason, we interpret the phrase ``prior to each 
boarding of the vessel'' in Sec.  101.535(a)(1) to include the 
situation in which an electronic TWIC inspection has been carried out 
prior to boarding a ferry, and the TWIC-holder has not entered an 
unsecure area in the interim. We believe that such an allowance will 
reduce the costs of compliance with the electronic TWIC inspection 
program for combined ferry/terminal operators without compromising 
security.
    Several commenters posed questions relating to a situation in which 
a Risk Group A vessel, such as a ferry, has multiple secure areas 
separated by unsecure areas, but sole control of its terminal 
facilities. These commenters asked whether it would be possible to have 
only one TWIC reader at each terminal facility for both vessel and 
facility workers. As explained below, such a system could meet the 
requirements for electronic TWIC inspection. If a worker is granted 
unescorted access to a secure area of a Risk Group A facility, and 
remains in the secure area, he or she may board a Risk Group A vessel 
without a second electronic TWIC inspection. We note that once on board 
a Risk Group A vessel, a worker does not need to undergo additional 
electronic TWIC inspections when entering secure areas.
    One commenter stated that vessels at sea should be required to 
update the CCL if there are separate and distinct secure areas on board 
the vessel. We disagree, and note that the requirement for Risk Group A 
vessels is that

[[Page 57678]]

electronic TWIC inspections are only performed when the personnel are 
boarding the vessel, not, like facilities, at each entry into a secure 
area. Therefore updating the CCL while at sea would not serve any 
functional purpose.
3. Risk Groups B and C
    In this final rule, we are completely removing any mention of 
additional TWIC requirements for vessels and facilities other than 
those covered under Sec.  101.535, ``Electronic TWIC inspection 
Requirements for Risk Group A.'' Many commenters noted the apparent 
differences between the language on Risk Groups B and C in the NPRM 
preamble and the proposed regulatory text in Sec. Sec.  101.525 and 
101.530, which pertained to Risk Groups B and C respectively.
    In the preamble of the NPRM, we stated that we were making no 
changes to either of those groups. For example, in Section III.E.7.b of 
the NPRM, ``Risk Group B TWIC Reader Requirements,'' we stated that 
``proposing requirements for Risk Group A only in this NPRM is 
indicative of our desire to minimize highest risks first. . . .'' \50\ 
Likewise, in Section III.E.8.b, ``Risk Group C TWIC Requirements,'' we 
noted that ``Under current regulations (which would not change under 
this NPRM) for vessels and facilities categorized in this NPRM Risk 
Group C, security personnel must visually inspect the TWIC of each 
person seeking unescorted access to secure areas.'' \51\ Our 
preliminary RA echoed this language. In that document, we did not 
include any cost analyses relating to vessels or facilities in Risk 
Groups B or C.
---------------------------------------------------------------------------

    \50\ 78 FR 17802.
    \51\ 78 FR 17803.
---------------------------------------------------------------------------

    However, as commenters noted, in proposed Sec. Sec.  101.525 and 
101.530, we included language from the ANPRM that contradicted the 
statements in the preamble that no new requirements were being proposed 
for Risk Groups B and C. The proposed regulatory text would have 
required vessels and facilities in Risk Groups B and C to undergo 
visual TWIC inspection prior to each entry into a secure area. Thus, 
the practical effect of such a requirement would have been to require 
security personnel be posted at each entry point, which many commenters 
argued would dramatically increase the compliance costs for MTSA-
regulated vessels and facilities in Risk Groups B and C, contrary to 
the stated intent of the regulation. The specific comments are 
described in greater detail below.
    We received a large number of comments from the owners and 
operators of passenger vessels that would have been categorized as Risk 
Groups B and C. These individuals suggested that the proposed 
regulatory text would impose severe burdens on their operations, 
burdens that would be extremely costly and produce relatively little in 
the way of security benefits. The PVA's comment summed up many of its 
members' statements, noting that ``Group B and C passenger vessels and 
facilities have multiple and widely separated secure areas with large 
public access areas in between. TWIC-holders move regularly in and out 
of those spaces multiple times during the day. As a practical matter, 
this means that in those vessels and facilities, there must be some 
other person stationed in or outside of each secure area to visually 
inspect the TWIC and presumably bar the holder from entry if the visual 
inspection is unsatisfactory.'' \52\ We agree with the PVA that, with 
regard to passenger facilities, the wording of the proposed regulatory 
text could have had this effect, but these concerns are moot because we 
removed the proposed provisions on Risk Groups B and C.
---------------------------------------------------------------------------

    \52\ USCG-2007-28915-0190, p. 12.
---------------------------------------------------------------------------

    Many operators of passenger vessels argued that the requirement to 
visually inspect TWICs at each entry point into a secure area would be 
enormously expensive, impracticable, and provide little security 
benefit. One commenter suggested that the use of existing access 
control systems on vessels could be used in place of visual TWIC 
inspection on vessels. One commenter wrote, ``we do not have enough 
berthing to add 2 additional people that would do nothing but sit at 
the galley door on opposite shifts and request to see the TWIC card of 
[the] same person multiple times per day.'' \53\ Another commenter 
wrote that requiring a visual TWIC inspection at each entry to a secure 
area on a vessel ``is a bit like asking your brother who lives in your 
household for his ID whenever he needs to use the restroom.'' \54\ 
Commenters also argued that needing to present a TWIC to enter an 
unmanned engine room space could hinder access in an emergency. Many 
other commenters echoed the substance of these remarks. In this final 
rule, we hope to clarify that: (1) With regard to Risk Group A vessels, 
the requirement to undergo electronic TWIC inspection applies only upon 
boarding the vessel, and (2) there are no new requirements, for either 
visual or electronic TWIC inspection, or anything else applicable to 
vessels or facilities outside of Risk Group A in this final rule. The 
existing visual TWIC inspection requirements in 33 CFR Chapter I, 
Subchapter H continue to apply to vessels and facilities outside of 
Risk Group A.
---------------------------------------------------------------------------

    \53\ USCG-2007-28915-0139.
    \54\ USCG-2007-28915-0215, p. 3.
---------------------------------------------------------------------------

    We received similar comments pertaining to Risk Group B and C 
facilities. Many commenters requested that the final rule should state 
that approved FSPs using PAC 08-09 practices continued to be allowed 
for Risk Group B and C facilities. We reiterate that this final rule 
imposes no changes on the operation of Risk Group B or C facilities; 
accordingly, such practices will continue to be allowed. One commenter 
suggested that the guidance permitting voluntary use of TWIC readers, 
contained in PAC 01-11, be continued for Risk Group B and C facilities. 
While that guidance is rendered obsolete by this final rule, we note 
that its contents have been largely incorporated into the final rule as 
Sec.  101.540, which permits non-Risk Group A facilities to use 
electronic TWIC inspection procedures in lieu of visual TWIC inspection 
on a voluntary basis.
    One commenter recommended that language be added to proposed Sec.  
101.525 (Risk Group B) that would allow a PACS card to be used in place 
of a TWIC at each entry to a secure area. Some commenters noted that 
the PAC 08-09 practices are significantly less costly than inspecting a 
TWIC at each entry into a secure area. While the rule imposes no new 
TWIC inspection requirements on Risk Groups B or C, we follow this 
suggestion with regard to Risk Group A facilities in the form of 
increased flexibility for electronic TWIC inspection. One commenter 
added that this could be coupled with a periodic TWIC check to ensure 
it is still valid. We note that Coast Guard inspections, conducted at 
Risk Group B and C facilities, accomplish exactly this check.
4. Miscellaneous Questions Regarding the Locations of Electronic TWIC 
Inspection
    In this section, we address certain questions raised by commenters 
on issues related to the locations where electronic TWIC inspections 
must take place. Several similar comments asked us to clarify what an 
``access point'' to a secure area is. The commenter provided an example 
of an alarmed fire escape door that leads to a pier, which is 
designated as a secure area. In response, we would clarify that an 
``access point'' is any location where personnel access from a non-
secure area to a secure area is permitted, in any circumstance, by a 
facility's security plan. However, we agree with the commenter that 
requiring an electronic

[[Page 57679]]

TWIC inspection in the event of a fire would be unwise. For that 
reason, we are including language in Sec.  101.535(e), allowing an 
exemption from electronic TWIC inspection requirements for emergency 
situations. We believe that this exemption will protect against 
unauthorized access to secure areas without compromising safety in the 
event of an emergency response.
    The commenter also provided an example of a roll-up baggage door, 
where the porters bring in luggage they collect from guests at the curb 
in front of a cruise ship terminal. Next to the roll-up door is ``a 
typical personnel door.'' The commenter asked if the two doors count as 
a single access point, or if they are two separate access points, where 
each door requires its own TWIC reader. Again we note that in this 
final rule, we are not requiring the installation of TWIC readers; 
instead the requirement is that prior to being granted unescorted 
access to a secure area, an individual must undergo electronic TWIC 
inspection. Thus, two doors to a secure area could be controlled by a 
single TWIC reader or PACS reader, if permitted in the FSP.
    The commenter also asked about an area that switches between being 
secure and non-secure based on the operations taking place there at a 
given time. In such an instance (and permitted, we assume, by the FSP), 
when the area is designated secure, persons would need to undergo 
electronic TWIC inspection before being granted unescorted access. At 
times when the area was designated non-secure, there would be no such 
requirement. We would expect the relevant FSP to contain more detail on 
how such an area would operate.
D. Determination of Risk Groups
    The third major area of comments related to the determination of 
which vessels and facilities should be placed into which Risk Groups. 
In Sec. Sec.  104.263 and 105.253 of the NPRM, we proposed three 
different Risk Groups, A, B, and C, although there were no differences 
between the requirements for Risk Groups B and C. The proposed Risk 
Groups were as follows:
    Risk Group A:
     Vessels certificated to carry more than 1,000 passengers;
     Vessels that carry CDC in bulk;
     Vessels engaged in towing another Risk Group A vessel;
     Facilities that handle CDC in bulk;
     Facilities that receive vessels certificated to carry more 
than 1,000 passengers; and
     Barge fleeting facilities that receive barges carrying CDC 
in bulk.
    Risk Group B:
     Vessels that carry hazardous materials, other than CDC, in 
bulk;
     Vessels subject to 46 CFR chapter I, subchapter D, that 
carry any flammable or combustible liquid cargoes or residues;
     Vessels certificated to carry 500 to 1,000 passengers;
     Vessels engaged in towing a Risk Group B vessels;
     Facilities that receive vessels that carry hazardous 
materials, other than CDC, in bulk;
     Facilities that receive vessels subject to 46 CFR chapter 
I, subchapter D, that carry any flammable or combustible liquid cargoes 
or residues;
     Facilities that receive vessels certificated to carry 
between 500 and 1,000 passengers;
     Facilities that receive vessels subject to 46 CFR chapter 
I, subchapter D, that carry any flammable or combustible liquid cargoes 
or residues;
     Facilities that receive a vessel engaged in towing a Risk 
Group B vessel; and
     All OCS facilities subject to 33 CFR part 106.
    Risk Group C:
     Vessels carrying non-hazardous cargoes that are required 
to have a VSP;
     Vessels certificated to carry fewer than 500 passengers;
     Vessels engaged in towing a Risk Group C vessel;
     Facilities that receive vessels carrying non-hazardous 
cargoes;
     Facilities that receive vessels certificated to carry 
fewer than 500 passengers; and
     Facilities that receive vessels towing a Risk Group C 
vessel.
    Most comments were related to the categorization of vessels and 
facilities in Risk Group A, with many commenters requesting 
clarification on how to classify their own facilities, or offering 
rationales for why vessels and facilities should be categorized 
differently. As stated in previous parts of this discussion, the NPRM 
did not propose any additional requirements for Risk Groups B or C, and 
thus, for purposes of the electronic TWIC inspection requirements, 
whether or not a vessel or facility is classified as Risk Group A is 
the only relevant distinction.
    In this final rule, we have made a number of modifications to the 
classification of facilities and vessels in response to the comments. 
The major changes are summarized as follows:
     We have changed the crewmember exemption cutoff for 
vessels from 14 crewmembers to 20 crewmembers, as well as clarified how 
to calculate the number of crewmembers to apply this exemption.
     We have removed the specific reference to barge fleeting 
facilities from the Risk Group A classification, and now treat barge 
fleeting facilities like all other MTSA-regulated facilities.
     We have eliminated the distinction between Risk Groups B 
and C. Vessels and facilities are now classified as either Risk Group A 
or non-Risk Group A.
1. Risk Group A Facilities
    In the NPRM, we defined Risk Group A facilities in proposed Sec.  
105.253(a) as: (1) Facilities that handle CDC in bulk; (2) Facilities 
that receive vessels certificated to carry more than 1,000 passengers; 
and (3) Barge fleeting facilities that receive barges carrying CDC in 
bulk. We developed Risk Group A, along with the other Risk Groups, 
using a risk-based analysis system that identified which types of 
facilities were exposed to the most risk in the event of a TSI. This 
system used the MSRAM to derive a numeric ``consequence'' for a class 
of facilities. Once the potential risk to a class of facilities was 
ascertained, we then determined whether a program of electronic TWIC 
inspection would provide utility in alleviating that risk. This 
analysis is described in far greater detail in the ANPRM \55\ and the 
NPRM,\56\ and we refer interested parties to those documents for a 
detailed discussion.
---------------------------------------------------------------------------

    \55\ 74 FR 13363.
    \56\ 78 FR 17810.
---------------------------------------------------------------------------

    Several commenters raised issues relating to the fundamental nature 
of our analysis, arguing that certain factors, such as the geographic 
location of a facility or its proximity to higher-risk facilities 
should have been incorporated into our analysis. After considering the 
comments, we have decided to largely retain the overall structure of 
how Risk Group A is structured. The basis for the analysis is discussed 
in Section V.A, above.
    Several commenters suggested that the MSRAM analysis used by the 
Coast Guard to determine Risk Group A was flawed, and that a different 
methodology to determine the Risk Groups should have been employed that 
would bring more facilities into the Risk Group A category. Many of 
these commenters recommended that the Coast Guard adopt a risk analysis 
approach that focuses on area risks or geography, rather than the risks 
associated with classes of facilities. For example, one commenter 
recommended that the risk analysis should have included the risk to 
port operations where the port has minimum channel depth, or for 
petrochemical facilities that would create a significant impact to

[[Page 57680]]

commodity supplies, or chemical facilities where an attack could have 
significant environmental consequences.
    Other commenters recommended that the Coast Guard consider the 
geographic area surrounding a facility as the most important factor in 
determining the appropriate Risk Group. Similarly, another commenter 
stated that the Coast Guard should expand the risk-based concept and 
aggregate risks to the port area first, before using MSRAM to determine 
specific risks. In response, the Coast Guard considered a broad range 
of factors, including geographic location, when determining the Risk 
Groups. The totality of that analysis identifies the highest risk 
vessels and facilities.
    One commenter stated that the Port of New York is the nation's 
highest-risk port, suggesting that TWIC inspection should also be used 
to mitigate risks associated with criminal activity such as drug 
trafficking, cargo theft, and alien contraband smuggling. The commenter 
suggested that TWIC readers should be required at more facilities in 
that port than are required under this rule. We are not requiring 
electronic TWIC inspection as a crime prevention measure, and we 
reiterate that the primary purpose of requiring electronic TWIC 
inspection is not to prevent crime, but to prevent TSIs at high-risk 
vessels and maritime facilities.
    One commenter stated that MSRAM does not contain any data that 
identifies TWIC readers as a threat mitigation tool, and that 
assumptions must have been made that would connect the MSRAM data with 
mitigation scenarios based on TWIC readers. In response, as emphasized 
throughout this preamble, an electronic TWIC reader is a threat 
mitigation tool because it provides identity verification, card 
authentication, and card validity checks more effectively than visual 
TWIC inspection. In the MSRAM context, a target's ``vulnerability'' is 
defined as the probability that an attack will be successful. MSRAM 
measures target vulnerability as a product of three factors: (1) 
Achievability, which assumes the absence of all security measures and 
then factors in the degree of difficulty delivering an attack on a 
target; (2) Target Hardness, which considers the probability that the 
attack focal point would fail to withstand the attack; and (3) System 
Security, which considers the probability of a security strategy in 
place to successfully thwart an attack before it occurs. Electronic 
TWIC inspection is a component of System Security.
    Some commenters argued that the relative locations of Risk Group A 
and B facilities should factor into the risk analysis. One commenter 
stated that the NPRM did not consider a scenario where a Risk Group B 
facility is immediately adjacent to a Risk Group A facility. The 
commenter suggested that a terrorist could use a counterfeit TWIC to 
gain access to the Risk Group B facility (which would conduct only a 
visual TWIC inspection), and then use the location to mount an attack 
on the adjacent Risk Group A facility. Other commenters echoed the 
sentiment, stating that a Risk Group B facility that is immediately 
adjacent to a Risk Group A facility should not automatically have less 
stringent requirements that could become a threat vector.
    While we agree that this specific scenario was not used in our 
analysis, we also do not believe that it would be appropriate to 
consider. We note that in this scenario, all the counterfeit TWIC 
accomplishes is to allow the adversary to get to the perimeter of the 
Risk Group A facility. If the Risk Group B facility was not located in 
the adjacent location, then it would be even easier for the terrorist 
to get to the aforementioned perimeter. Electronic TWIC inspection is 
designed to thwart access to the secure area of Risk Group A facility, 
not to prevent access to the secure perimeter.
    One commenter recommended that large container terminals should not 
be classified as Risk Group B, but rather as Risk Group A. The 
commenter stated that a disruption of operations at any one of these 
facilities could have a significant impact on the economy, and that the 
Coast Guard should have used secondary consequences in its economic 
analysis. While we agree that a disruption of a large container 
terminal could have significant economic impacts, we disagree with the 
suggestion that container facilities should be automatically classified 
in Risk Group A. As stated elsewhere in this preamble, MSRAM considers 
scenarios associated with threats to container facilities. However, for 
the purpose analyzing electronic TWIC inspection, we limited our 
consideration to attack scenarios that require physical proximity to 
the intended target. Controlling access to a target is an essential 
component of security from such attack scenarios because access control 
helps to detect and perhaps delay the attackers before they reach the 
target. Threats to cargo containers are typically not attack scenarios 
that require physical proximity to the intended target. Accordingly, 
electronic TWIC inspection would not mitigate such threats. Such 
threats are addressed in existing Coast Guard regulations (33 CFR 
104.275 and 105.265) that specifically require owners and operators to 
implement detailed security measures relating to cargo handling on 
vessels and at facilities.
a. Alternative Security Programs
    One commenter, representing the American Gaming Association, 
recommended that instead of the risk categorization approach proposed 
in the NPRM, the Coast Guard should adopt a case-by-case approach to 
classification of facilities participating in its Alternative Security 
Program (ASP). This commenter noted that the security measures adopted 
on these vessels and facilities can be more restrictive than Coast 
Guard regulations require, and that those vessels and facilities should 
not be required to use TWIC readers. Furthermore, the commenter stated 
that the TWIC reader technology may be duplicative with systems onboard 
gaming vessels. We disagree, for the reasons stated above, with using a 
case-by-case approach to risk categorization rather than the Risk Group 
system proposed in the ANPRM and NPRM. However, we note that several 
suggestions that the commenter made are permitted by this final rule. 
If the existing security system on a vessel or facility is duplicative 
of a TWIC reader (i.e., is capable of conducting a card authentication, 
card validity check, and biometric match), then a dedicated TWIC reader 
would not be required. We believe that a PACS can be modified to meet 
these requirements with relatively little additional costs, as 
discussed in the accompanying RA.
    Similarly, several commenters stated that the combined vessel and 
facility security plan, as adopted in the PVA ASP, should permit 
facilities to be exempt from electronic TWIC inspection requirements if 
the vessels they service are exempt. For reasons discussed below, we 
disagree. We note that all ASPs, including the PVA ASP, can be used to 
integrate security between passenger terminals and vessels, but that 
the ASP must meet all electronic TWIC inspection requirements in this 
final rule.
b. Determining Risk Group A Facilities
    Several commenters asked questions or requested clarifications of 
issues related to whether certain facilities would be classified as 
Risk Group A facilities. Our thoughts on these specific questions are 
below:
    One commenter requested clarification regarding a cruise terminal

[[Page 57681]]

that handles general cargo (presumably not including bulk CDC) when 
cruise ships are not present. The commenter asked whether a Risk Group 
A classification would only apply to a facility when a passenger vessel 
certificated to carry 1,000 or more passengers was at the facility. In 
such an instance, movement between Risk Groups would be permissible, if 
detailed in the FSP in accordance with 33 CFR 105.253(b). One commenter 
suggested that allowing movement between Risk Groups would be unfair to 
those facilities that have installed electronic TWIC inspection 
technology. We disagree, and note that when subject to Risk Group A 
electronic TWIC inspection requirements, a facility would have to make 
full and complete use of such technology, and would incur all the costs 
of installing the technology.
    One commenter requested clarification that a facility would not be 
classed as a Risk Group A facility if it handles multiple passenger 
vessels not in Risk Group A simultaneously. This is correct, a facility 
(assuming, of course, that does not handle or receive vessels carrying 
CDC in bulk) would only be classified as Risk Group A if it handles one 
or more vessels certificated to carry over 1,000 passengers. The 
relevant risk factor is the presence at the facility of a vessel 
certificated to carry more than 1,000 passengers. The relevant risk 
factor is not the mere presence on the facility of more than 1,000 
people, which would be a transient event driven by simultaneous 
arrivals.
    Several commenters requested clarification of the use of the word 
``handle.'' Proposed Sec.  105.253(a)(1) categorizes facilities that 
handle CDC in bulk as Risk Group A facilities, but commenters had 
questions about how to interpret this phrase. These commenters 
requested clarification on how a facility would be classified if a 
vessel carrying CDC in bulk were to stop at a facility, but not 
transfer any of the bulk CDC cargo there. After considering the 
comments, and to clarify risk groups, we have determined that any 
facility that handles or receives vessels carrying CDC in bulk will be 
classified as Risk Group A. While moored at a facility, a vessel must 
rely on the facility's security program to adequately secure the 
interface between the facility and vessel and mitigate the threat of a 
TSI. For that reason, the facility should conduct electronic TWIC 
inspection to meet the security needs associated with handling or 
receiving vessels that carry CDC in bulk.
    Discussions at public meetings prompted the Coast Guard to clarify 
the term ``handle'' as it related to non-maritime commerce. 
Specifically, the question was raised whether a facility would be 
classified as Risk Group A if it was used to transfer CDC in bulk 
through rail or other non-maritime means. In this situation, such a 
facility would be considered to ``handle CDC in bulk'' and would be 
classified as Risk Group A. This is because the bulk CDC would be on 
the premises of a MTSA-regulated facility, and thus the facility's 
access control system would need to be used to mitigate the risk of a 
TSI. We note that there are provisions where non-maritime activities of 
a facility can be located outside of the facility's MTSA footprint. In 
that situation, where the bulk CDC is not a part of the maritime 
transportation activities, it may be that a facility could define its 
MTSA footprint in such a way as to exclude that area. In such a case, 
the TWIC reader requirements that are being implemented in this final 
rule would not apply in that area.
    Several commenters also requested clarification of the term ``in 
bulk.'' The term ``bulk'' or ``in bulk'' is defined in the Coast 
Guard's existing MTSA regulations (33 CFR 101.105) as meaning ``. . . a 
commodity that is loaded or carried on board a vessel without 
containers or labels, and that is received and handled without mark or 
count.'' Additionally, the term ``bulk'' is defined in 33 CFR 126.3 as 
``. . . without mark or count and directly loaded or unloaded to or 
from a hold or tank on a vessel without the use of containers or break-
bulk packaging.'' To clarify, the use of hoses and conveyor or vacuum 
systems would be considered direct loading or unloading and thus 
involve ``bulk.'' We have added such language to the definition of 
``bulk'' in Sec.  101.105 to improve clarity. We have also removed the 
phrase ``on board a vessel'' from the definition of ``bulk or in bulk'' 
to avoid confusion. Specifically, as stated above, a MTSA-regulated 
facility would be classified as Risk Group A if it handled bulk CDC 
offloaded by a train or other non-maritime means. A MTSA-regulated 
facility that handles or receives bulk CDC is determined to be Risk 
Group A whether or not the facility accepted the bulk CDC from a 
vessel. Finally, one commenter requested clarification that container 
terminals do not carry CDC in bulk. While we can clarify that CDC 
shipped in containers would not be considered bulk CDC, we note that 
some container facilities may also handle CDC in bulk.
    Some commenters requested clarification of the term ``receive,'' in 
regards to what the requirements would be if a Risk Group A vessel were 
received by a Risk Group B facility. The term ``receive'' is used in 
this final rule only in Sec.  105.253(a)(2), which states that 
``facilities that receive vessels certificated to carry more than 1,000 
passengers'' are considered Risk Group A. In this instance, the word 
``receive'' means that the vessel moors or transfers passengers to or 
from the facility. If there is a need for such a passenger vessel to 
moor up or transfer passengers at a non-Risk Group A facility, the COTP 
would need to be contacted to ensure that proper security measures are 
in place.
    One commenter asked how Strategic Ports would be classified. A 
Strategic Port designation, which means the location is used by the 
military to load equipment, has no direct impact on the electronic TWIC 
inspection requirements. Individual vessels and facilities will be 
required to comply with the applicable parts of this regulation based 
on their specific operations.
    One commenter asked if facilities that receive vessels certificated 
to carry more than 1,000 passengers would be classified as Risk Group A 
if all the vessels the facility received are exempted from the 
electronic TWIC inspection requirements by virtue of having fewer than 
14 crewmembers. The commenter further stated that it is rare that the 
vessels certificated to carry more than 1,000 passengers ever carry 
that many, and that there are rarely 1,000 passengers in the facility. 
Regardless of this fact, pursuant to Sec.  105.253(a)(2), such a 
facility would be required to conduct an electronic TWIC inspection 
prior to each entry into a secure area of the facility. We note that 
neither condition the commenter discussed is grounds for classifying 
the facility as anything other than Risk Group A. The fact that the 
vessels are exempt from the electronic TWIC inspection requirement due 
to their low manning requirement does not grant a TWIC exemption to the 
facility, for reasons discussed in greater detail below.
    Furthermore, the fact that the ferries at issue ``rarely'' carry 
the number of passengers they are certificated to carry does not change 
the status of the facility either. Our analysis has shown that the 
class of facilities that receive large passenger vessels present a 
heightened risk of a TSI, and that the use of electronic TWIC 
inspection in such facilities is an effective means to mitigate that 
danger. We believe that the access control requirements in this rule 
represent a good balance between costs and security.

[[Page 57682]]

    Several commenters were concerned that the dichotomy between 
electronic TWIC inspections on vessels and facilities could present 
problems for mariners. One commenter called a situation ``absurd'' 
where a ferry terminal, servicing ferries certificated to carry over 
1,000 passengers, would be required to meet electronic TWIC inspection 
requirements, while the ferries themselves would be exempt from those 
requirements due to their low crew size. We disagree with the 
commenter's characterization of the regulations. Ferry terminals that 
handle large ferries present a risk of a large-consequence TSI, so much 
so that we believe that requiring a biometric identification before 
granting an individual access to the non-passenger areas of the ferry 
terminal is a warranted security burden. On the other hand, we do not 
believe that electronic TWIC inspection is necessary to gain access to 
the ferries themselves, considering that non-TWIC-holding passengers 
will also have access to the same vessels. Contrary to the commenter's 
assertion, we believe it is quite reasonable to only require electronic 
TWIC inspections when the TWIC-holder is accessing an area where non-
TWIC-holders are excluded. As we stated previously, the electronic TWIC 
inspection requirements are designed in such a way as to only require a 
burden where the security benefits will be tangible and substantial, 
which is why they apply as they do.
    Some commenters suggested that where the presence of, and access 
to, CDC in bulk can be isolated from areas not containing these 
products within a large MTSA footprint, the facility should be allowed 
to limit elevated security measures to the higher-risk area only. This 
is a subject that was also raised in the NPRM.\57\ Upon consideration, 
and given the general flexibility accorded by this final rule, we 
believe that this suggestion is appropriate. If bulk CDC is contained 
in a discrete area of the facility, it may be possible to isolate that 
area from other areas of the facility. Any areas where bulk CDC is 
transferred, passed through, or stored (permanently or temporarily) 
would be subject to the electronic TWIC inspection access control 
requirements. If the owner or operator of a facility were to take this 
approach, we would still consider the facility a Risk Group A facility. 
However, the owner or operator would be permitted to delineate in the 
FSP a portion of the facility as not subject to the electronic TWIC 
inspection requirements. The FSP would also have to contain details of 
how unescorted access to other secure areas is still limited to TWIC-
holders.
---------------------------------------------------------------------------

    \57\ 78 FR 17797.
---------------------------------------------------------------------------

    Finally, many commenters presented examples of specific situations 
where they believed that electronic TWIC inspection in parts or in all 
of their facilities was inefficient or redundant. With regard to those 
situations, we reiterate that an owner or operator may apply for a 
waiver of any requirement the owner or operator considers unnecessary, 
as provided in 33 CFR 104.130 and 105.130, as appropriate. We have 
endeavored to tailor these requirements to be as effective as possible, 
but certain situations must be dealt with on an individualized basis.
    One commenter in a public meeting asked the Coast Guard to consider 
an exemption for LNG/LPG facilities not conducting transfer operations. 
Similarly, this commenter and others requested an exemption for cruise 
ship terminals when vessels are not present at the terminal. Without 
specific information, we cannot comment on the likelihood of a waiver, 
but note that in certain circumstances, facilities can change Risk 
Groups depending on operational needs.
    One commenter in a public meeting stated that container facilities 
should not be considered CDC facilities, and would therefore not be in 
Risk Group A. Given the definition of ``in bulk'' provided in 33 CFR 
101.105, any CDC being transported in a container (including tank 
containers) would be considered packaged and thus would not cause the 
facility to be classified as Risk Group A. We note that if a container 
facility were also used to transfer or store bulk CDC, it would be 
considered a Risk Group A facility and thus subject to electronic TWIC 
inspection requirements.
2. The Crewmember Exemption Does Not Apply to Facilities
    Many commenters supported the Coast Guard's proposal to exempt 
vessels with 14 or fewer crewmembers, but felt that a similar exemption 
should be applied to facilities with 14 or fewer employees as well. For 
the reasons described below, we disagree with this concept and are not 
including an exemption for small facilities similar to the exemption 
for low-crew vessels.
    One reason not to expand the electronic TWIC inspection exemption 
to facilities is due to the specific language of the SAFE Port Act. As 
stated above, the vessel exemption is predicated on Section 104 of the 
SAFE Port Act, codified in 46 U.S.C. 70105(m)(1), which prohibits the 
Coast Guard from requiring the placement of an electronic reader on a 
vessel unless the vessel has more individuals on the crew that are 
required to have a TWIC than the number we determine warrants such a 
reader. No similar mandate exists regarding facilities.
    Secondly, we believe that the nature of access to facilities is 
fundamentally different from the nature of access to vessels, and thus 
the rationale that justifies an exemption for vessels with a low crew 
count does not transfer to facilities with a low employee count. As 
stated elsewhere in this preamble, the TWIC serves fundamentally 
different roles with regard to facilities and vessels, due to the 
nature of the respective populations. On vessels (with the exception of 
passenger vessels), everyone on the vessel is generally known to one 
another, and new persons are generally not introduced to the vessel 
population while at sea. For this reason, the electronic TWIC 
inspection requirements for vessels, when applied, require only that 
the electronic TWIC inspection occur when boarding the vessel, not 
prior to each entry into a secure area of the vessel (such as an engine 
room). Conversely, at facilities, the entrance, exit, and egress of 
persons who are not employees is a regular occurrence; drivers, 
contractors, pedestrians, mariners, and other non-employees are on 
facility grounds regularly. Indeed, truck drivers make up one of the 
largest populations of TWIC-holders. For this reason, there are many 
persons on facility grounds that are not ``known'' to facility 
employees, and so additional security measures must be employed to 
ensure that unescorted access to the secure areas of a facility is 
granted only to TWIC-holders. For Risk Group A facilities, we believe 
that the appropriate level of security is to conduct an electronic TWIC 
inspection of each individual before granting them such access. That is 
why electronic TWIC inspection at facilities is required ``prior to 
each entry into a secure area,'' rather than only at the perimeter of 
the facility,\58\ as is the case with vessels. Due to the differences 
in electronic TWIC inspection requirements, we do not believe an 
exemption from the electronic TWIC inspection requirements based on a 
low number of employees is appropriate for Risk Group A facilities.
---------------------------------------------------------------------------

    \58\ See Sec.  101.535(b)(1).
---------------------------------------------------------------------------

    One commenter, in addition to requesting the extension of the low 
crewmember exemption to facilities, specifically requested that barge 
fleeting facilities with 14 or fewer people be excluded as well. In 
this final rule, barge fleeting facilities are no longer a

[[Page 57683]]

separate class of facilities specifically subject to electronic TWIC 
inspection requirements. However, barge fleeting facilities are treated 
as facilities, and are subject to the same electronic TWIC inspection 
requirements as other facilities.
3. The Low Number of Crewmembers Exemption
    The NPRM proposed that, unlike facilities, vessels in Risk Group A 
are exempt from the electronic TWIC inspection requirements unless they 
have more than 14 TWIC-holding crewmembers. This exemption was based, 
in part, on the statutory limit imposed in the SAFE Port Act, 46 U.S.C. 
70105(m)(1), which prohibits the Coast Guard from requiring the 
placement of an electronic reader on a vessel unless the vessel has 
more individuals on the crew that are required to have a TWIC than the 
number we determine warrants such a reader. In the ANPRM and the NPRM, 
we tentatively proposed that this number would be 14 crewmembers, 
basing our recommendation on an analysis conducted by the Towing Safety 
Advisory Committee (TSAC). For the final rule, factoring in comments 
received and assumed risks, we have increased this number to 20 
crewmembers.
    We received numerous comments on the proposal to exempt all vessels 
with 14 or fewer TWIC-holding crewmembers from the electronic TWIC 
inspection requirements. In the NPRM, we requested that commenters 
explain any alternative suggestions and provide available data to 
support their comments. Comments we received generally fell into two 
categories. Many commenters suggested different numbers for the 
exemption threshold, with a fair majority supporting a larger number, 
thus exempting more vessels from the electronic TWIC inspection 
requirement. The other main group of commenters requested clarification 
on how, specifically, we would calculate the crew size of any 
particular vessel to determine whether a Risk Group A vessel would be 
exempt from the electronic TWIC inspection requirements. Both items are 
discussed below.
4. Calculating the Total Number of TWIC-Holding Crewmembers
    Several commenters raised questions as to how, specifically, the 
Coast Guard would calculate the number of TWIC-holding crewmembers on a 
vessel to determine whether the vessel would be exempt from the 
electronic TWIC inspection requirements. Upon review, we found that 
there was some degree of confusion with regard to how this number is 
determined. We have identified two approaches to calculating the 
exemption number that may have led to this confusion. One approach 
would be to calculate the number by counting the total number of 
persons employed as crewmembers on the vessel. The NPRM's original 
determination of 14 crewmembers was calculated using this approach. 
That number included the Master, Chief Engineer, and three four-person 
rotating crews. We counted the total number of persons employed as 
crew, whether or not all of them would serve together simultaneously.
    The other approach would be to calculate the number by referring to 
a vessel's Certificate of Inspection (COI) regarding crew size, which 
does not contain information regarding multiple crew rotations, but 
rather just the manning requirements for the vessel. Using that 
methodology, the same vessel described above, with a Master, Chief 
Engineer, and several four-person rotating crews would actually have 
had six crewmembers. As explained more fully below, this final rule 
adopts the latter approach.
    Commenters also put forth a number of detailed issues relating to 
how the number of crewmembers would be determined. One commenter noted 
that while at any given time during a shift, the total number of 
required TWIC-holders aboard will generally be 14 or fewer, during 
shift changes the number will swell to more than 14. The commenter went 
on to question the definition of the term ``crewmember,'' noting that 
there may be TWIC-holders on board, such as security personnel, who are 
not members of the marine crew required under the vessel's COI. The 
commenter requested that the Coast Guard clarify the scope of the 14-
crewmember exemption with regard to TWIC-holders who are not members of 
the marine crew.
    Similarly, several commenters specifically requested that the Coast 
Guard clarify that the 14-crewmember threshold only includes the 
required number listed on the vessel's COI, and does not include 
``persons in addition to the crew,'' industrial workers, etc. Some 
commenters recommended that for uninspected vessels, ``required crew'' 
should include all personnel assigned to the vessel performing 
navigation, safety, and security functions. Commenters also asked 
whether crewmembers included additional individuals such as company 
representatives, cadets, and contractors. One commenter stated that 46 
U.S.C. 2101(21) excludes certain company representatives from being 
counted as passengers, so they could be counted as crew. Also, in 
situations where a vessel is forced to carry persons other than crew, 
such as emergency responders, commenters asked if they would still be 
subject to the exemption from the electronic TWIC inspection 
requirement.
    In response to these comments, the Coast Guard is providing 
additional detail and explanation regarding this exemption. Based on 
our own analysis, and on the comments received, we agree with the 
commenters who suggested that ``crewmembers'' should include all 
personnel required to hold a TWIC in the required manning section of 
the COI (and we note that there are no uninspected vessels subject to 
MTSA requirements). Other persons in the crew section and the ``persons 
in addition to the crew'' section of the COI do not count towards the 
calculation for total number of TWIC-holding crewmembers. We reached 
this decision for the following reasons.
    First, whether a vessel is subject to electronic TWIC inspection 
requirements should not vary based on transient circumstances, such as 
whether a company representative is on board, or a crew change causes 
the number of TWIC-holders on the vessel to temporarily swell and 
exceed the threshold. Electronic TWIC inspection programs must be 
incorporated into a security plan and followed consistently. We believe 
that the stability from having a consistent electronic TWIC inspection 
process will help serve the goals of the inspection requirements while 
minimizing the burden on vessels and facilities in Risk Group A.
    Second, establishing the minimum manning requirement as the 
threshold number helps to ensure that other manning decisions are not 
affected by the electronic TWIC inspection requirements. For example, 
if it were based on the total number of employed crew, irrespective of 
whether that crew was required for manning the vessel, then some owners 
or operators of vessels might choose to lower their staffing 
requirements rather than introduce the new procedures. We received 
several comments suggesting that certain companies might choose to 
eliminate staff rather than comply with electronic TWIC inspection 
requirements. Tying the electronic TWIC inspection requirements to the 
minimum manning requirements will significantly reduce the risk of this 
occurring. The minimum manning requirements of a vessel are tied to the 
intrinsic nature of the vessel, and are not nearly as elastic as the 
other crewing needs of the vessel.

[[Page 57684]]

5. Threshold for the Crewmember Exemption
    Based on the TSAC recommendation, we proposed in the NPRM that the 
cutoff number of crewmembers that make a vessel exempt from the 
electronic TWIC inspection requirement should be 14. We specifically 
requested comments from the public on whether 14 is an appropriate 
cutoff number, and requested explanations and available data to support 
any arguments for alternative numbers. We received numerous comments 
regarding this issue. Some commenters suggested that 14 was an 
appropriate number, but the majority suggested that it be increased.
    The PVA and other commenters suggested that the Coast Guard should 
not have followed TSAC's recommendation, as not all sectors of the 
domestic maritime industry have input into that group's 
recommendations. The PVA suggested that 20 was a more appropriate 
number, noting that the largest minimum manning requirement for its 
members' vessels was 16. This figure is larger than 14, but not so 
large that long-time crewmembers would not recognize each other. This 
figure was suggested as appropriate because it would be a figure 
developed with the consultation of industry.
    Similarly, many passenger vessel operators suggested that the 
exemption threshold be set high enough to exempt passenger vessels. One 
commenter suggested that the threshold number of 14 did not make sense, 
and that even with a crew of 20-30 people, it would be impossible for 
an imposter amongst them to go unnoticed. Another commenter suggested 
that 40 crewmembers would be a better threshold, arguing that the 
regulatory compliance costs of electronic TWIC inspection, added to 
other costs relating to security, were too onerous.
    After considering all comments, we have decided to increase the 
number to 20 crewmembers as the figure for determining the threshold 
number under 46 U.S.C. 70105(m). Considering input received from all 
areas of industry, we believe it is an appropriate crew size at or 
under which all crewmembers will be able to quickly identify people who 
do not have unescorted access to secure areas. We realize that this may 
be a conservative figure, and that there is no hard number at which all 
crewmembers will recognize each other by sight. This number is highly 
dependent on the length of time the crew has served together, and on 
the reliability of every individual crewmember's memory. Nonetheless, 
we believe that the figure of 20 crewmembers presents a reasonable 
threshold at which all members of the crew can be realistically be 
expected to recognize one another. However, we are continuing to study 
the issue, and may propose to expand the electronic TWIC inspection 
requirements by reducing the exemption threshold in a future 
rulemaking.
    The Coast Guard realizes that increasing the crewmember threshold 
now exempts not only most passenger vessels, but many vessels that 
carry CDC in bulk. We are comfortable with this exemption at this time 
for two reasons. First, as stated by many of the commenters, we believe 
that a crew of 20 on a vessel that carries CDC in bulk will all be 
familiar with one another, so the risk of an unauthorized person being 
unnoticed on the vessel is slim. Second, due to the requirements for 
electronic TWIC inspection at the facilities where the CDC vessels 
conduct a majority of their business, the vast majority of these 
crewmembers will have their TWIC verified when passing through the 
facility on their way to the vessel, during crew changes or other trips 
ashore. Finally, one commenter in a public meeting noted that TWIC 
readers on vessels may be exposed to explosive atmospheres, and that 
therefore, TWIC readers must be intrinsically safe. In the event that 
TWIC readers are installed in hazardous areas, they would need to 
comply with all applicable requirements associated with those areas, 
which would at the minimum likely entail additional costs for testing 
and certification, and we note that no TWIC reader on the QTL is 
currently certified as intrinsically safe. For these reasons, we 
believe that imposing an additional requirement that crewmembers 
undergo an additional round of electronic TWIC inspection each time 
they board the vessel would provide limited security value for vessel 
with fewer than 20 crewmembers carrying bulk CDC.
6. Outer Continental Shelf Facilities
    In the NPRM, we proposed to characterize all OCS facilities as Risk 
Group B, meaning that they would not need to undertake electronic TWIC 
inspection. In this final rule, the Coast Guard continues to exclude 
OCS facilities from electronic TWIC inspection requirements. One 
commenter, an owner of some OCS facilities, asked whether TWIC readers 
could be placed at ``the point(s) of embarkation'' as opposed to 
placing TWIC readers on the OCS facility itself. Such a placement would 
be permissible if described in an approved FSP. However, we note that 
because OCS facilities are not considered Risk Group A, no electronic 
TWIC inspection requirements will apply as a result of this final rule.
7. Vessels and Facilities Not in Risk Group A
    Many commenters supported the Coast Guard's decision not to include 
additional requirements for Risk Groups B and C in the NPRM. We 
appreciate the support, and agree that at this time, only vessels and 
facilities in Risk Group A will be affected by the electronic TWIC 
inspection requirements in this final rule. However, as stated in the 
NPRM, this final rule ``should not be read to foreclose revised TWIC 
reader requirements in the future.'' \59\ Many commenters took this, 
and similar statements, as an indication that we had planned to extend 
electronic TWIC inspection requirements to Risk Group B vessels and 
facilities. As a result, we received several comments on the 
categorization of vessels and facilities within those Risk Groups.
---------------------------------------------------------------------------

    \59\ 78 FR 17790.
---------------------------------------------------------------------------

    One commenter suggested that all facilities, including those 
proposed to be in Risk Groups B and C, should be required to have at 
least one portable TWIC reader. The commenter stated that this would 
allow the facility to complete a comprehensive check of a TWIC, which 
would help to deter potential attackers by making it more likely that 
they would be caught. While we agree that adding electronic TWIC 
inspection to all facilities would produce a security benefit, for the 
reasons extensively detailed in this rulemaking, we do not believe that 
such measures would be efficient at this time for lower-risk 
facilities. The commenter also argued that security guards should not 
manually check the CCL during visual TWIC inspection, as it could 
distract him or her. We note there are no requirements to check the 
list of cancelled TWICs during visual TWIC inspection, nor does this 
rulemaking affect visual inspection procedures.
    One substantial change being made in this final rule is the 
discontinuation of the distinction between Risk Group B and Risk Group 
C. The distinction between these two Risk Groups was relevant in the 
ANRPM, where we had proposed that Risk Group B vessels and facilities 
would be required to use TWIC readers on a random basis, whereas Risk 
Group C vessels and facilities would not be required to use TWIC 
readers at all. However, in the NPRM, we proposed to eliminate the 
random TWIC screenings from the Risk Group B requirements, and thus 
there was no distinction in

[[Page 57685]]

requirements between those two Risk Groups. Nonetheless, we still 
proposed that the terminology for Risk Groups B and C be included in 
the regulations. Despite the lack of distinct requirements, many 
commenters read the NPRM to mean that electronic TWIC inspection 
requirements would be applied in some manner to Risk Group B vessels 
and facilities, and many commenters discussed the criteria by which 
vessels and facilities were classified as Risk Group B or C.
    One commenter did not support the proposed placement of Oil Spill 
Response Vessels and Oil Spill Response Barges in Risk Group B, arguing 
that these vessels carry primarily an oily water mixture, rendering 
them at low risk for terrorist attack. The commenter provided 
additional analysis distinguishing Oil Spill Response Vessels from tank 
vessels, and requested that they be classified as Risk Group C.
    Multiple commenters supported the decision to place Offshore Supply 
Vessels in Risk Group C, but wanted to clarify the definition of 
``Offshore Supply Vessel'' for the purposes of TWIC requirements.
    One commenter argued against the placement of all OCS facilities in 
Risk Group B. The commenter believed they should be subject to the same 
site-specific analysis that other facilities are subject to, and placed 
into Risk Group B or C as appropriate.
    Several commenters responded to the Coast Guard's request for 
information as to whether petroleum refineries and storage facilities 
should be categorized as Risk Group A. Some commenters stated that it 
would be inappropriate for the agency to arbitrarily re-categorize 
these facilities without supporting study and analysis, and requested 
that if the Coast Guard omitted a risk in its initial analysis, a 
second notice and comment opportunity should be provided. One commenter 
noted that, according to the Coast Guard's RA, the risk level for 
petroleum facilities was more comparable to Risk Group C than Risk 
Group A. Commenters also noted that due to the spacing of petroleum 
tanks at facilities, it is highly unlikely that a fire at one tank 
could ``jump'' to another.
    Several commenters provided the Coast Guard with a 2008 study 
entitled ``Risks Associated with Gasoline Storage Sites,'' which they 
argued demonstrated that gasoline does not pose a high risk of off-site 
consequences if involved in an incident, particularly one related to 
security.
    One commenter expressed concern about the expectation regarding the 
phase-in statements made in the NPRM, stating that the absence of 
``definitive statements'' has left the owners and operators of 
facilities in Risk Groups B and C wondering what will happen and what 
they should do.
    Similarly, one commenter stated that it seemed as if ``phased in'' 
was already the basic approach being taken by the Coast Guard, and that 
revisions to the electronic TWIC inspection requirements were all but 
certain. That commenter requested that instead of this approach, the 
Coast Guard should specifically identify the vulnerabilities that will 
be addressed and develop a proposal accordingly. Finally, commenters 
noted that if the Coast Guard were to propose expanding electronic TWIC 
inspection requirements beyond Risk Group A, a new Regulatory 
Flexibility Act analysis would be required.
    One commenter drew a distinction between petroleum refineries and 
petroleum storage facilities. The commenter stated that the petroleum 
storage facilities only store petroleum, whereas refineries may contain 
many types of more hazardous materials, such as hydrogen, although the 
commenter also stated that such facilities are well-equipped to handle 
those materials.
    Based on the comments received on this issue, we are not 
categorizing petroleum storage or refining facilities as Risk Group A 
in this final rule. Furthermore, we note that if and when the Coast 
Guard decides to propose additional electronic TWIC inspection 
requirements for facilities not currently classed as Risk Group A, 
global factors such as the cost of implementing electronic TWIC 
inspection, risk factors relating to the threat of a TSI, or other 
unforeseen conditions may have changed, necessitating a reconsideration 
of which vessels and facilities should be subject to additional 
security measures. The factors raised by commenters will be considered 
if and when additional TWIC inspection requirements are proposed in the 
future.
    We agree with the argument put forth by commenters that before 
extending electronic TWIC inspection requirements, a revised analysis 
of the costs and benefits should be undertaken and that opportunity to 
comment on those proposed requirements should be provided. Given the 
arguments raised in the comments, it is clear that more analysis needs 
to be conducted before the requirements of electronic TWIC inspection 
are extended to vessels and facilities not in Risk Group A. We do not 
believe that setting out the risk parameters for the next group of 
vessels and facilities to which electronic TWIC inspection may be 
applied is appropriate at this time. If and when the electronic TWIC 
inspection requirements are phased in further, the Coast Guard believes 
that the additional flexibility afforded by not having preset 
definitions for the lower-tier Risk Groups will allow us to better 
tailor the future rulemakings appropriately. As the analysis of risks, 
threats, and costs continues to evolve, we will conduct further 
analysis as appropriate as well as solicit additional information from 
the public.
8. Barge Fleeting Facilities
    The inclusion in Risk Group A of barge fleeting facilities that 
handle barges carrying CDC in bulk was a topic discussed by a large 
number of commenters. The Coast Guard received comments from a variety 
of barge fleet operators, towing operators, and trade associations. 
Universally, comments on this subject argued that barge fleeting 
facilities should not be required to install TWIC readers. For the 
reasons described below, based on the comments received, we have 
removed the separate requirement that barge fleeting facilities that 
handle barges carrying CDC in bulk are specifically considered Risk 
Group A. Instead, barge fleeting facilities are considered facilities, 
and may be required to perform electronic TWIC inspection if the 
standard criteria for Risk Group A are met.
    Barge fleeting facilities are defined in 33 CFR 101.105 as ``a 
commercial area, subject to permitting by the Army Corps of Engineers . 
. . or pursuant to a regional general permit[,] the purpose of which is 
for the making up, breaking down, or staging of barge tows.'' Because 
this rulemaking would only affect barge fleeting facilities that 
interact with barges carrying CDC in bulk, only those barge fleeting 
facilities which are used for the staging of barge tows would be 
affected by this final rule. In the NPRM, we proposed that all barge 
fleeting facilities that service barges carrying CDC in bulk would be 
considered Risk Group A.
    Comments on why barge fleeting facilities should not be included in 
Risk Group A fell into four general categories. First, many commenters 
argued that the cost of installing TWIC readers at barge fleeting 
facilities would be higher than the installation costs at other 
facilities due to their remoteness, and that the Coast Guard's 
preliminary RA had not taken this into account. Second, several 
commenters argued that due to the remote location or lack of permanent 
infrastructure of many barge fleeting facilities, the consequences of a 
TSI would not be so great as to warrant

[[Page 57686]]

an inclusion into Risk Group A. Third, one commenter argued that 
because barge fleeting facilities only service vessels that would be 
exempt from the TWIC reader requirement (because they have fewer than 
14 crew), the facilities should also be exempt. Finally, several 
commenters argued that a TWIC reader would not enhance security at 
barge fleeting facilities. We address each of these comment categories 
below.
    The cost of installing TWIC readers at barge fleeting facilities 
was cited by commenters as a reason to reconsider placing them in Risk 
Group A. Commenters generally argued that logistical considerations 
made installing TWIC readers in barge fleeting facilities substantially 
more expensive than at traditional installations. Several commenters 
stated that infrastructure costs, such as electricity, Internet access, 
and a facility to protect the TWIC reader would cause this requirement 
to be dramatically more expensive than originally considered. 
Similarly, commenters stated that these costs were not considered by 
the Coast Guard in its preliminary RA. Multiple commenters stated that 
the $300,000 initial phase-in costs estimated for bulk liquid 
facilities seemed like a low estimate. These commenters suggested that 
they would refuse to handle barges carrying bulk CDC rather than bear 
this increased cost, and that a final rule would cause rates to rise at 
other facilities. Similarly, commenters suggested that the decision to 
require TWIC readers at these barge fleeting facilities could actually 
be detrimental to security because, building on the idea that many 
facilities would refuse to handle bulk CDC barges, those barges would 
become concentrated at the few facilities that did allow them, thus 
increasing the risk profile of the fleeting areas that service them.
    We disagree with the notion that TWIC readers would be 
substantially more expensive to operate at barge fleeting facilities 
than at other types of facilities. As summarized above, the commenters 
who made this argument all cited various infrastructure costs, 
including installing electrical connections, Internet service, and a 
facility to protect the TWIC reader as drivers of the increased costs. 
However, all of these costs are associated with fixed TWIC readers, 
which are not required by this rule. Isolated facilities without 
electrical or data connections could use portable electronic readers to 
comply rather than undertake these measures to install fixed readers. 
We note that portable electronic readers can be, and are, operated 
using battery power and wireless communication technology to scan TWICs 
and check them against the list of cancelled TWICs.
    With regard to our preliminary RA, we disagree that the costs of 
TWIC readers was not applied to barge fleeting facilities. As stated 
above, as portable electronic readers can be used to conduct electronic 
TWIC inspections without expensive upgrades to infrastructure, we 
believe that the price of portable electronic readers estimated in the 
preliminary RA is applicable to barge fleeting facilities that are not 
connected to electrical and information infrastructure. Furthermore, 
barge fleeting facilities were counted in the overall analysis of 
facilities covered by the proposed rule. Thus, we believe that the 
preliminary RA sufficiently analyzed the cost impacts for barge 
fleeting facilities.
    Numerous commenters argued that barge fleeting facilities are so 
isolated they should not be placed in Risk Group A. For example, one 
commenter recommended that barge fleeting facilities be categorized as 
Risk Group C, or as an alternative, CDC fleeting areas should be 
categorized using a risk-based approach based on the geographic 
location in relation to populations, with those in higher-density 
locations placed in Risk Group A. One commenter added that for economic 
reasons, fleets are usually far removed from major industrial or 
population centers, thus limiting the risk as potential targets for 
terrorist attacks.
    Because of the MSRAM methodology used to determine risk, we 
disagree that perceived geographic isolation of a particular facility 
alone should justify lesser security requirements. The risk groupings 
are based on the averaged MSRAM scores for each class of facility. In 
conducting our risk analysis, one of the primary factors used was an 
estimate of the average maximum consequences of a TSI on a class of 
facility. In MSRAM, the Coast Guard calculates the maximum consequence 
for each facility, which is the estimate of all damages that would 
occur from the total loss of a facility caused by a TSI resulting from 
a terrorist attack. This singular maximum consequence score factors in 
the total loss of a target, factoring in injury, loss of life, economic 
and environmental impact, symbolic effect, and national security 
impact. Further included in the calculation is an estimation of damage 
done to areas surrounding the facility that would be affected in the 
event of a TSI, meaning a facility in a densely-populated area could 
have a much higher maximum consequence score if a TSI would inflict 
damage on nearby populated areas. Then, the average maximum consequence 
for the class of facilities is derived from the calculations of each 
facility in the class, taking into account their specific geography. 
Thus, geographic isolation, or lack thereof, has already been 
considered in the score calculation. Even considering the geographic 
isolation of some barge fleeting facilities, this class as a whole 
presents a risk of a serious TSI, which is why it was included in Risk 
Group A.
    One commenter also argued that because tugboats that service barges 
are exempt from the requirements for electronic TWIC inspection, due to 
having fewer than 14 crewmembers, then the barge fleeting facilities 
should not be subject to TWIC requirements. In the discussion relating 
to electronic TWIC inspection requirements at facilities that service 
exempted vessels, we discussed in detail why a facility may be required 
to conduct electronic TWIC inspection, even if the vessels the facility 
services are exempted due to low crew counts. This analysis applies 
equally with regard to barge fleeting facilities.
    A variety of other arguments were made to exclude barge fleeting 
facilities from the electronic TWIC inspection requirements. For 
example, a commenter argued that barge fleeting facilities by their 
very nature do not interact with vendors or visitors. We note that TWIC 
requirements apply to permanent personnel as well as vendors and 
visitors (some of whom may not have TWICs, and would thus need to be 
escorted), and that electronic TWIC inspection provides several 
security enhancements, such as the ability to detect revoked TWICs, 
that are applicable to personnel as well as vendors and visitors.
    Some commenters stated that fleet personnel traffic is very low 
compared to regular shore maritime facilities and therefore are very 
low risk. We note that regular personnel traffic is not related to the 
risk that electronic TWIC inspection is designed to mitigate.
    Electronic TWIC inspection helps to ensure that unauthorized 
personnel are not granted unescorted access to secure areas. This can 
happen regardless of the number of persons on the facility.
    Several commenters argued that screening for personnel on barge 
fleeting facilities is already in place, and is extensive, including 
TWIC checks. As stated above, for high-risk facilities, we do not 
believe that visual TWIC inspections provide enough security. This 
final rule requires that TWICs be electronically inspected before 
unescorted access to secure areas of a MTSA-regulated, high-risk 
facility is

[[Page 57687]]

granted. This logic applies to barge fleeting facilities as well as 
other facilities.
    One commenter described a barge fleeting facility as ``one of the 
few safe places'' for crew transfers. The commenter implied that 
requiring crewmembers to run their cards through an electronic reader, 
which the commenter described as redundant and burdensome, could 
somehow impact safety. Without additional reasoning, we see no linkage 
between the safety of the crew and the need for security measures, 
except for the obvious benefits of protecting the crew from a TSI.
    Finally, several commenters argued that due to the nature of barge 
fleeting facilities, TWIC readers would not provide security benefits. 
One commenter stated that if there is no access from the riverbank to 
the area where the barges are stored, then the TWIC reader is not 
adding any security value. Similarly, several commenters noted that 
while electronic TWIC inspection is required at the access points to 
each secure area, barge fleeting facilities do not have defined access 
points, but rather people come in via waterways. Several commenters 
described barge fleeting facilities as ``parking lots,'' and noted that 
very few individuals from outside the fleeting facility, other than the 
crews of tugs, enter the facility. Oftentimes, due to a lack of other 
means of access, persons entering the facilities need to come via 
vessel and can do so only with the coordination of the FSO. Lastly, one 
commenter, while arguing for an exemption for barge fleeting 
facilities, stated that its barge fleeting facilities have a different 
risk profile than land-based facilities, noting that the fleeting areas 
are ``simply unmanned barge parking lots continuously serviced by 
towing vessels.'' \60\
---------------------------------------------------------------------------

    \60\ USCG-2007-28915-0195, USCG-2007-28915-0213.
---------------------------------------------------------------------------

    We have carefully considered the arguments of these commenters, and 
believe that we can address their concerns through a modification of 
the regulatory requirement. If a typical maritime facility met the 
specific criteria that these commenters describe, where there is no 
bulk CDC at the facility to protect, and no access points at which 
electronic TWIC inspection would be conducted, the facility would not 
be considered a Risk Group A facility. We believe that with regard to 
barge fleeting facilities, the same standard should be applied. For 
that reason, we are removing the specific reference to barge fleeting 
facilities in proposed Sec.  105.253(a)(3). Instead, we are adding 
text, in Sec.  105.110(e), Exemptions, which clearly states that barge 
fleeting facilities that do not have a secure area are exempt from the 
requirements in 33 CFR 101.535(b)(1). Based on this change, many of the 
concerns from the commenters regarding the application and utility of 
electronic TWIC inspection will be addressed.
    We note that simply because the reference to barge fleeting 
facilities has been deleted from proposed Sec.  105.253(a)(3), some 
barge fleeting facilities will still be required to comply with 
electronic TWIC inspection if they meet the requirements of Sec.  
105.253(a)(1). Thus, if a barge fleeting facility handles or receives 
CDC in bulk, it would be considered to be a Risk Group A facility, and 
would be subject to the electronic TWIC inspection requirements. 
However, we note that the electronic TWIC inspection requirements would 
be limited to secure areas only, as towing boats could still service 
barges without having their crews' TWICs electronically inspected (see 
the discussion in Section V.C.1, above).
9. Switching Risk Groups
    Several commenters requested additional clarification and 
explanation regarding the NPRM's discussion of moving between Risk 
Groups. In the NPRM, the Coast Guard stated that it was adding 
Sec. Sec.  104.263(d) and 105.253(d) to ``address the movement between 
risk groups by vessels and facilities, based on the materials they are 
carrying or handling, or the types of vessels they are receiving at any 
given time.'' \61\ These provisions, which are located at Sec. Sec.  
104.263(b) and 105.253(b) of this final rule, provide flexibility to 
owners and operators of vessels and facilities that only meet the 
criteria for Risk Group A classification on an infrequent or periodic 
basis, such as a facility that only occasionally receives a shipment of 
bulk CDC. Based on the comments received on this issue, we are 
finalizing this requirement without change.
---------------------------------------------------------------------------

    \61\ 78 FR 17815-6.
---------------------------------------------------------------------------

    One commenter supported the Coast Guard's proposal for movement 
between Risk Groups noting that the proposal would grant a facility a 
degree of flexibility to tailor its security precautions to the TSI 
risks posed at a given time. We appreciate the support.
    In the NPRM, we stated that an owner or operator wishing to take 
advantage of one of these provisions would be required to explain how 
the vessel or facility would move between Risk Groups in an approved 
security plan, and that the plan would be required to account for the 
timing of such movement, as well as how the owner or operator would 
comply with the requirements of both the higher and lower Risk Groups.
    One commenter requested more explicit guidance on the criteria for 
facilities to move between Risk Groups, asking for guidance regarding 
the process and for the types of security measures that would need to 
be in place for a facility to move from a higher Risk Group to a lower 
one. In response, we note that moving between Risk Groups is not 
dependent on security measures, it is dependent on whether a facility's 
change in operations moves it into a different Risk Group. For example, 
if a facility that periodically handled CDC in bulk were to cease 
handling that material, it could move from a Risk Group A facility to a 
non-Risk Group A facility. While such a move is independent of any 
change in security measures, we note that the facility would still have 
to amend its FSP with regard to any changes in security procedures.
    One commenter stated that his facility occasionally handles bulk 
CDC for short periods of time. The commenter supported the NPRM's 
proposal to permit switching Risk Groups, but requested that is should 
be possible to do so ``without a lot of bureaucratic paperwork.'' In 
such an instance, an FSP could contain two alternative security 
arrangements, one for operating as a Risk Group A facility, and one for 
operating as a non Risk Group A facility, along with the process for 
switching. Assuming that such an FSP was approved by the COTP, then 
switching risk groups could be accomplished without additional 
paperwork each time the operator changes risk groups.
E. Responses to Economic Comments
    The Coast Guard received numerous comments from organizations and 
individuals regarding the costs and benefits associated with the 
requirement for electronic TWIC inspection. Many commenters, responding 
to specific requests for information, provided details and opinions 
regarding the costs of installing and operating an electronic TWIC 
inspection system. The issues involved the specific costs of purchasing 
and installing electronic TWIC reading equipment, the operational 
details concerning electronic TWIC inspection (including how it could 
increase or decrease the number of persons employed in security 
positions), and the costs to

[[Page 57688]]

transportation workers who may need to replace malfunctioning TWICs. We 
appreciate these comments and have attempted to integrate them into our 
RA. We address the specific topics in the sections of this preamble 
below.
1. Costs of TWIC Readers
    We received numerous comments from both suppliers and users of 
electronic TWIC inspection equipment regarding the standard costs of 
TWIC inspection equipment. In the NPRM, we estimated the average costs 
of TWIC readers by researching the equipment costs for all TWIC readers 
that have passed the TSA's test to conform with its Initial Capability 
Evaluation (ICE) test, which is maintained and made available to the 
public by TSA.
    One commenter stated that the preliminary RA overestimated the 
costs of procuring TWIC readers. The commenter stated that the TWIC 
Pilot Report overstated the costs of TWIC readers, as pilot 
participants used grant money for incidental security needs, such as 
PACS, costs related to guard stations, lift gates and fencing. We 
disagree with the commenter's analysis, and note that we did not use 
the pilot grants as a basis for the costs of TWIC readers. As stated in 
the NPRM RA (Section 4.1.1., TWIC reader costs), the costs of TWIC 
readers were determined using approved TWIC readers that had passed the 
TSA ICE test.
    Multiple commenters stated that the NPRM RA overestimated the cost 
of TWIC readers, and of the software, needed. One commenter also stated 
that the Coast Guard used overstated software prices that came from a 
single supplier and should have used $4,250 for both fixed and portable 
TWIC readers that included both hardware and software. The commenter 
added that the price of electronic TWIC inspection continues to fall as 
technology develops and is deployed on a larger scale. The Coast Guard 
did not use pricing information from a single supplier, but relied on 
multiple vendors' publicly available information for regulatory 
analyses supporting the NPRM and this final rule. While we agree that 
the price has fallen, we cannot use the prices cited by the commenter 
directly. However, we note that we have adjusted the TWIC reader cost 
prices in the final RA. The NPRM RA's TWIC reader cost estimates relied 
on the ICE List and utilized those equipment costs listed on the U.S. 
General Services Administration (GSA) price schedule. The QTL includes 
all TWIC readers that are currently approved by TSA (at the time the 
final RA was developed) for use in reading TWICs. For the final rule 
RA, instead of using GSA schedule listed prices for TWIC readers as was 
the case for the NPRM RA, we utilized the QTL's TWIC reader information 
to obtain an average cost for portable TWIC readers, and used the GSA 
schedule for fixed TWIC readers. We note that, for the final rule's 
cost analysis, we used average TWIC reader prices that we estimated 
$5,373 for fixed TWIC readers and $7,035 for portable TWIC readers. 
These prices are close to the one the commenter suggested at $4,250 for 
either fixed or portable TWIC reader.
    The same commenter also added that it would not be necessary to 
purchase an entirely new PACS software system, and that one could 
simply add an electronic reader to the existing PACS that supports the 
perimeter access points for some entities. We agree, and go further in 
our RA, noting that it is possible to integrate biometric input 
functions into an existing PACS, rather than install a separate 
integrated TWIC reader. Use of this discretionary option can reduce 
electronic TWIC inspection costs substantially, depending on the 
business operations of the facility using such a system. However, we do 
not quantify the potential for these cost savings in the RA.
    The commenters also made statements regarding the cost for CCL 
updates, which were echoed by other commenters. They stated that 
updates to the CCL should be an automated function taking about five 
seconds, and therefore, these should not be included as an ongoing item 
with assigned labor expense in the RA. In the NPRM RA, we estimated 
that the costs to update the CCL would be, on average, 30 minutes per 
week, which comes to 26 hours per year. In the final analysis, this 
figure is unchanged. While we recognize that some larger facilities may 
be able to automate this process, we do not believe that all facilities 
will have such an automated solution.
    One commenter stated that the adoption of the QTL could cause 
``change order costs'' to replace more expensive TWIC readers, and that 
the facilities who need to change TWIC readers should get grants to 
cover these costs. The Coast Guard disagrees. The final rule will allow 
many different types of biometric scanners in addition to the ones 
published on the TSA's QTL, and the rule is not design-prescriptive, so 
many entities will be able to continue to use existing equipment and 
therefore should not incur additional costs. The Coast Guard is not 
mandating that owners or operators use only the TWIC readers listed on 
the TSA's QTL in this final rule.
2. Number of TWIC Readers at Vessels and Facilities
    Additionally, several commenters believed that the Coast Guard has 
not appropriately addressed the overall numbers of TWIC readers. 
Several commenters claimed that the NPRM and the RA did not contain 
accurate estimates of the number of TWIC readers needed for a vessel or 
a facility. One commenter, who owns multiple vessels and a terminal, 
estimated that it would need as many as 20 TWIC readers to comply with 
the proposed regulatory text.
    One commenter described the Coast Guard as contradicting itself, by 
stating in the preamble that Risk Group A vessels would need only one 
TWIC reader, at the entrance to the vessel, yet the proposed regulatory 
text required a TWIC reader at ``each entry.'' \62\ Another commenter, 
a city government agency in charge of passenger ferries and terminals, 
also disagreed with the idea of one point of access per ferry. That 
agency estimated at least 62 TWIC readers would be necessary for their 
facilities alone.
---------------------------------------------------------------------------

    \62\ See 78 FR 17803 and proposed Sec.  104.265(a)(4), 78 FR 
17831.
---------------------------------------------------------------------------

    We note that the confusion regarding the regulatory text language 
in the NPRM, which stated that TWIC readers were required ``prior to 
each entry,'' has been thoroughly discussed above. In this final rule, 
most vessels are exempted from electronic TWIC inspection requirements, 
and those subject to them are only required to conduct such an 
inspection once, prior to entry onto the vessel.
    With regard to facilities, we clearly state that electronic TWIC 
inspection must be conducted prior to each entry into a secure area. 
Given the nature of facilities, we acknowledge that many facilities 
will require multiple TWIC readers or other machines capable of 
conducting electronic TWIC inspection, either because they have a large 
number of access points to secure areas, or because they have a high 
throughput of people who must undergo electronic TWIC inspection in a 
timely manner.
    One commenter disagreed with the idea of ``one point of access'' to 
a ferry, as there may be multiple points of access, and the proposed 
rule might have required them to install TWIC readers at 62 locations, 
with additional staffing, to meet the requirements. The Coast Guard 
disagrees with this assessment. The commenter is not necessarily 
required to purchase a large

[[Page 57689]]

number of TWIC readers because the electronic TWIC inspection for the 
vessel crew can be executed on the facility side, rather than at each 
and every access point to the ferry or the vessel. Given the ``combined 
security plan'' discussed by this commenter above, it is permissible 
that a ferry operating a secure facility could have no dedicated TWIC 
readers, if all crew boarded from secure areas of the facility. Thus, 
such a ferry operator could comply with the electronic TWIC inspection 
requirements in this final rule without a wholesale replacement of its 
security infrastructure with new TWIC Readers.
    Several commenters provided qualitative discussions regarding the 
number of TWIC readers that would be needed at passenger terminals, 
which while not providing firm numerical information, helped the Coast 
Guard refine its assessment of how the final rule would affect these 
sorts of terminals. One commenter argued that the Coast Guard ``does 
not fully understand the day-to-day operations of Group A passenger 
vessels and facilities . . .'' and that ``most of these vessels, 
terminals, and facilities are designated ``public access areas'', with 
only small areas designated secure, which ``tend to be located away 
from one another.'' The commenter provided examples of ``a fuel storage 
area here and a secure communications room elsewhere'' as examples of 
dispersed secure areas, and stated that ``the everyday reality for a 
TWIC holder is that he or she is likely to move between secure areas 
and public areas, as well as between the vessel and facility, multiple 
times a day in multiple locations.''
    Similarly, operators of other passenger terminals made qualitative 
remarks regarding the number of TWIC readers needed. One commenter, 
operating a large facility on the West Coast, stated that 
``installation of TWIC readers on our vessels and at our terminal would 
provide a negligible improvement in security, which would come at an 
unreasonable cost given that WSF has already implemented a superior 
security infrastructure.'' We note that, at the time the comment was 
made, the NPRM had not proposed the option that would allow the 
operators of facilities to integrate electronic TWIC inspection into 
their PACS. Given comments like these, we expect that larger passenger 
facilities that have already implemented PACS would be likely to use 
that option rather than installing TWIC readers in a parallel security 
structure.
    Commenters representing smaller facilities also provided 
qualitative information. One commenter stated that ``our terminals are 
a mix of secure and public areas where employees move between areas 
throughout the day,'' indicating that TWIC readers would be needed at 
multiple access points, not just at the entrances to the facility. 
Similarly, a facility operator in San Diego noted that ``careful 
consideration needs to be taken into account for the passenger vessel 
industry because our vessels and facilities are not just one big secure 
area, but rather are interspersed amongst public areas.''
    Based on the substantial numbers of comments regarding the 
implementation of electronic TWIC inspection at passenger facilities, 
as well as the policy changes in this final rule, we have re-evaluated 
how we analyzed the costs of this rule for passenger facilities. In the 
TWIC pilot program, TWIC readers were typically only employed at the 
exterior access points to facilities, whereas in the final rule things 
are quite different. For passenger facilities, it is likely that 
electronic TWIC inspections would not likely take place at the main 
entrances where passengers enter and exit, as those areas would lead to 
``passenger access areas'' which are, by definition, not secure areas 
and do not need to be controlled by a TWIC reader. Instead, TWIC 
readers or a PACS would likely be installed throughout the facility, at 
each entrance into a secure area, to ensure that only TWIC-holders had 
access to these secure areas of the facility.
    Furthermore, based on the comments, we are reasonably certain that 
the largest passenger facilities are much more likely to implement the 
electronic TWIC inspection requirement by adding a biometric input 
method into their PACS, rather than by developing an entirely parallel 
TWIC reader system. This option permit substantial cost savings and 
operational efficiency benefits for facilities that have already 
invested in, as one commenter stated, ``superior security.''
    For these reasons, we have adjusted the ``number of TWIC readers'' 
used by passenger facilities as the cost basis in our analysis. For the 
largest 5% of facilities, we have assumed a larger number of TWIC 
readers, representing our estimates that these facilities are quite 
extensive and will require either modification of their PACS or 
installation of a substantial TWIC reader system. For other passenger 
facilities, we have left the estimate at 2 access points per facility, 
for a total of four readers. We estimate that these facilities would 
likely have an access point to the vessel, as well as an additional 
access point to secure areas of the facility, such as a storage room or 
communications area. We develop this reasoning at more length in the 
accompanying regulatory analysis.
    One commenter, operating several large terminals on the West Coast, 
provided information on the maintenance of readers. The comment 
estimated that they are planning to pre-purchase 74 contact card reader 
inserts for their 33 existing readers over the next three years at a 
total cost of $28,800, or approximately $300 per reader per year. We 
have used this information to increase our cost estimate for the 
maintenance of readers from 5 percent of the cost of a reader to 10 
percent of the cost of a reader per year to cover the expense of insert 
replacements.
    With regards to the number of TWIC readers, Coast Guard recognizes 
that there may be variability in the number of electronic readers 
required for any specific facility or vessel due to a large range of 
facility sizes, configurations, PACS types, and throughputs that will 
necessitate large variations in the numbers and types of TWIC access 
points. For the purposes of producing a cost estimate in the NPRM and 
RA, Coast Guard used data from Facility Security Plans (FSPs) to 
estimate the number of access points per facility and the TWIC pilot 
data to estimate an average number of TWIC readers needed per access 
point for a vessel or facility. The average number of TWIC readers at a 
vessel or facility was derived from the actual number of TWIC readers 
installed per facility or vessel in the pilot study that ranged from 
between 1 and 39 TWIC readers based on a minimum number of 1 to 24 
access points from the FSPs. While we appreciate specific information 
about individual facilities, we note that the average figures developed 
through the TWIC Pilot Program, which sampled a broader spectrum of 
facilities, provides the best data for average numbers of TWIC readers 
and access points.
3. Transaction Times
    Many commenters stated that conducting electronic TWIC inspection 
at each entry to a secure area on a day-to-day basis would negatively 
impact the time needed to make entries. These commenters did not, 
however, provide any specific information regarding transaction times. 
One commenter that operates a cruise ship terminal stated that 
conducting electronic TWIC inspection with a biometric identification 
component takes 20 to 30 seconds per transaction, and thus would result 
in intolerable delays, especially regarding baggage handlers who enter 
secure areas repeatedly (we would note

[[Page 57690]]

that the RUA provisions in this final rule may offer flexibilities to 
mitigate transaction time concerns).
    One commenter provided feedback on its TWIC reader experience. 
According to this commenter, the learning curve for adopting TWIC 
readers is short, with the proper signage and instruction. Within one 
year of implementing TWIC readers into the facility, the commenter had 
over 1 million reads that take 4 seconds each, and the use of TWIC 
readers on inbound trucking has caused no delays. Further, the 
commenter suggested that TWICs can last 3 years without breakage or 
delamination issues if properly cared for, and believes that many TWICs 
were broken because the issue of their care was not communicated. The 
Coast Guard agrees with some of the points made by this commenter: The 
learning curve for using TWIC readers is relatively short and TWIC 
readers can handle a large volume of reads. However, the read time may 
not be 4 seconds on average across all the TWIC reader users, although 
we appreciate the data point supplied by the commenter.
    Other commenters also felt that the Coast Guard overestimated 
transaction times and the amount of time needed for a CCL update. With 
regard to the CCL update, we estimated that it would take 0.5 hours to 
update the CCL. One commenter suggested that the process could be 
automated. We agree that some operators could automate the process, but 
currently, we are unaware of any that do. We still believe that absent 
automation, our estimate of time is accurate.
    Transactions were discussed by an additional commenter. One 
commenter stated that he had heard from an operator who has conducted 
over 1 million electronic TWIC transactions, and who had experienced an 
average transaction time of 3.5 seconds, as opposed to the 8 seconds 
per successful transaction experienced during the TWIC Pilot Program.
    In response to comments regarding transaction times, we acknowledge 
that transaction times may vary based on equipment, software, 
environmental conditions, user familiarity, the condition of the TWIC, 
and perhaps many other conditions. This variability is reflected in the 
range of transaction times spanning from 3.5 to 30 seconds provided in 
the comments. The TWIC pilot collected data from a variety of 
facilities and circumstances, and produced an overall average of 8 
seconds per transaction. We note that the range of times collected by 
the Pilot Program (which used TWIC readers from the ICE list) was from 
6 to 27 seconds per transaction, which is not inconsistent with the 
experiences of the commenters.\63\
---------------------------------------------------------------------------

    \63\ See Pilot report, located in the online docket for this 
rulemaking at USCG-2007-28915-0121, Appendix G, pp. 49-50.
---------------------------------------------------------------------------

    One commenter stated that the 17.1 percent failure rate from the 
TWIC Pilot Report is a high figure to use in the regulatory impact 
analysis, since the primary cause of TWIC read failures (internal 
antenna failures) was addressed by the design of better cards. The 
commenter noted that these older cards have been retired since 2009. 
While we believe that the design of TWICs themselves has improved, 
without comprehensive data demonstrating that improvement, we continue 
to use the 17.1 percent failure rate from the Pilot Report in our 
analysis as the best available estimate. This failure rate is still a 
reasonable one to use when estimating the delays due to TWIC reads 
because there are other reasons for TWIC reads to fail, such as 
exposure to harsh weather. Finally, we note that even this higher 
failure rate did not produce measureable throughput delays, and thus a 
lower failure rate would not substantially affect the transaction costs 
of this rule.
    One commenter argued that between 2,500 and 3,000 people a day 
undergoing visual TWIC inspections would cost a great deal of money, 
and asked if they could use a PACS instead. Certainly nothing in this 
final rule precludes voluntary compliance with the requirements for 
electronic TWIC inspections, and the Coast Guard encourages owners and 
operators to go beyond minimum levels of compliance. The Coast Guard 
believes that this final rule will not only increase security but may 
also reduce the costs for owners and operators who are currently 
relying on visual TWIC inspection. The final rule also allows other, 
less expensive biometric scanners to be integrated with existing 
facilities' PACS, as long as a biometric TWIC read is accomplished.
4. Security Personnel
    We received several comments regarding potential reductions in 
security personnel that could result from the mandatory use of 
electronic TWIC inspection. These comments generally fell into two 
categories. Some commenters felt that the requirements in the proposed 
rule, if finalized, would cause employers to reduce security staff, as 
fewer guards would be needed to conduct visual TWIC inspections. While 
some commenters believed this reduction would be a detriment to overall 
port security, in contrast, other commenters stated a possible 
reduction in personnel costs is a benefit we did not consider in the 
NPRM RA. We do not believe that this final rule will have a substantial 
effect on staffing for several reasons.
    With regard to the argument that use of electronic TWIC inspection 
would lead to a reduction of security, we believe this results from a 
misunderstanding of the role of inspection and the role of security 
personnel. While electronic TWIC inspection can be used as a substitute 
for visual TWIC inspection, the role of a security guard goes far 
beyond this limited function, including providing other components of 
access control and physical security. If anything, we believe that 
electronic TWIC inspection can improve the capability of security 
personnel by allowing them to focus on their more specialized security-
providing roles.
    One of the reasons suggested for a reduction in staffing related to 
a scenario in which a vessel's crew slightly exceeded the threshold 
limit for an exemption from the electronic TWIC inspection requirement, 
and the operator of the vessel decided to reduce the crew size in order 
to qualify for the exemption. By clarifying that the number of crew 
used to determine whether the vessel is exempt is based on the minimum 
manning requirement in the COI, we believe that this scenario will not 
come to pass. Unlike a situation in which a vessel operator could 
dismiss an optional deckhand to qualify for the exemption, it is 
exceedingly difficult, if not impossible, to alter the minimum manning 
requirements of the vessel. Alternatively, some commenters believed 
that by installing TWIC readers, operators of facilities could dismiss 
security guards. We are not aware of any instances of operators 
terminating security personnel as a result of installing TWIC readers 
(which should have been reflected in a change to a security plan and 
approval by the local COTP). We also note that pursuant to PAC-D 01-11, 
facilities are already permitted to employ TWIC readers in lieu of 
visual TWIC inspection on a voluntary basis.
    Some commenters felt that the proposed requirements, especially for 
those vessels and facilities not in Risk Group A, would increase the 
necessary number of security guards per shift. These comments were 
based on the erroneous assumptions about the use of electronic TWIC 
inspection with regard to vessels, as well as the mischaracterization 
of the requirements for electronic TWIC inspection with regard to 
vessels and facilities not in

[[Page 57691]]

Risk Group A. We believe that the clarifications in this final rule 
clearly illustrate that the scenarios in which large numbers of 
security personnel are required on board vessels will not apply. 
Furthermore, access control requirements for vessels and facilities not 
in Risk Group A are unaffected by this final rule.
5. Other Cost Comments
    Several commenters stated that the NPRM requirements were 
expensive. For example, one commenter stated that the expense of 
outfitting their vessels and facilities with TWIC readers would be 
enormously expensive compared to their normal operating budgets. In 
this particular instance, the Coast Guard notes that vessels owned by 
this commenter are not in Risk Group A and are not subject to the 
requirements in the final rule for TWIC readers. Most of these 
commenters did not include estimates or specific costs to support their 
claims. For the one commenter that provided a specific cost estimate, 
we incorporated the information to increase our estimate of the cost to 
maintain readers. The Coast Guard has carefully considered this input 
on burden and in this final rule has further reduced burden from the 
NPRM and ANPRM. See the final RA, included in the docket for this 
rulemaking, for the Coast Guard's analysis of the available data.
    One commenter suggested that the NPRM did not appear to consider 
the secondary economic cost impact that would result from the 
disruption of such facilities from a TSI. The same commenter also 
stated that the break-even analysis in the NPRM did not consider the 
economic cost impact that would result from an attack on a petroleum 
facility. This latter statement is correct, because petroleum 
facilities are not included in the affected population of this rule. 
Furthermore, the former statement is correct, although the net effect 
of adding additional categories of terrorism impacts not now quantified 
in this rule would be to increase the benefits of avoiding a TSI.
    Multiple commenters stated that the NPRM did not do a cost analysis 
of domestic inbound fleeting areas (also known as barge fleeting 
facilities), and that it did not fully evaluate the impact of TWIC 
readers on those fleets. More specifically, one of these commenters 
felt that owners of those fleets would have to make a significant 
monetary investment to install equipment in an area that might not be 
able to support it.
    The NPRM did include all those affected domestic inbound fleeting 
areas in the cost analysis. It fully assessed the impact on an average 
facility, including the barge fleeting facilities. However, this final 
rule no longer specifically requires barge fleeting facilities to 
install TWIC reader equipment (see Section V.D.7 of this preamble), 
which addresses the concerns of these commenters.
    One commenter said that it should not take 25 hours to update a 
facility security plan for TWIC. The Coast Guard disagrees. For some 
facilities, it may take fewer hours, but for many others it will take 
more than 25 hours, especially if changes to security plans are 
reviewed by multiple people, and we believe that the 25-hour assumption 
is a reasonable average for the full range of vessels and facilities 
impacted by this rule.
    One commenter suggested that the TWIC is not designed to be handled 
multiple times per day, (the commenter suggested that at their 
passenger ferry facility, an average employee could expect to have 
their TWIC inspected 2,400 times per year) and therefore this rule 
would likely cause TWICs to degrade and malfunction at a high rate, 
leading to increased costs for mariners to replace degraded TWIC cards. 
We disagree with this analysis for two reasons. First, while some older 
TWICs were issued with antennas that proved unreliable, the cardstock 
was upgraded in 2009 to be more reliable and can be used frequently 
without degrading. Second, we note that at most large facilities, such 
as the passenger facility at issue, employees use a PACS for access 
control rather than the physical TWIC. This final rule permits the use 
of a PACS card for access control in lieu of the TWIC, so we expect 
that the many employees at larger facilities will not suffer any 
degradation of their TWICs during normal usage.
6. Costs Exceeding Benefits, Cost-Effectiveness, and Risk Reduction
    Many commenters expressed a concern that the costs of installing 
TWIC readers on their vessels and facilities would exceed their 
benefits. One of these commenters said it has already implemented a 
superior security infrastructure and the installation of TWIC readers 
would be duplicative of security measures already in place. Another of 
these commenters expressed the view that terminal facility TWIC readers 
would be an unnecessary burden and cannot be justified for their 
operations. Another commenter felt that the added burden of the TWIC 
readers does not enhance overall security for their nature of 
operations. In addition to these commenters who questioned whether the 
costs of the TWIC reader rulemaking exceed the benefits, several others 
argued that the TWIC card readers would neither significantly enhance 
security on U.S. facilities and vessels, nor make our nation safer.
    The Coast Guard disagrees. The regulatory impact analysis we 
provide in the docket discusses at length why and how security will be 
enhanced by this rule. The commenters do not appear to account for the 
benefits to the nation and its economy of avoiding TSIs or that this 
rule is a Congressional mandate, and therefore, it addresses a market 
failure in which individual owners and operators tend to under-invest 
in security infrastructure, equipment and operations. As previously 
explained, we used a risk-based approach to apply these regulatory 
requirements to less than 5 percent of the MTSA-regulated population, 
which represents approximately 80 percent of the potential consequences 
of a TSI. The provisions in this final rule target the highest risk 
entities while minimizing the overall burden of the rule. We conducted 
a robust alternatives analysis that considered the ``break-even'' point 
of several different alternatives and we chose the alternative that 
shows the final rule will be cost effective if it prevents 1 TSI with 
every 234.3 years. Such small changes in risk reduction strongly 
suggest the potential benefits of the proposed rule justify its costs.
    One commenter argued that reduction of human error, as part of 
visual TWIC inspection, should be a quantified benefit of the final 
rule, and not an ``unquantifiable'' benefit as described in the 
preliminary RA. However, the commenter did not ascribe a dollar value 
to this benefit that could be quantified. Considering the RA did not 
attempt to quantify each individual security threat mitigated, but 
instead provided an overall break-even analysis that encompassed the 
rule, we believe our analysis remains appropriate for this issue.
7. Cumulative Costs of Security-Related Rulemakings
    Some commenters warned of the cumulative economic impacts of this 
rulemaking with several other finalized rules across Federal agencies. 
These comments did not provide specific data or information on these 
cumulative economic impacts. Understanding and considering the concerns 
about these cumulative economic impacts of all maritime security 
regulations, the Coast Guard decided to apply the final rule to a 
smaller population of MTSA-regulated entities after conducting its 
regulatory impact analysis. The Coast Guard

[[Page 57692]]

believes that the increased flexibility of the final rule compared to 
the proposed regulations will help lower costs and ease the burden on 
the regulated stakeholders.
8. Small Business Impact
    One commenter expressed concern that its small profit margin would 
be negatively affected by new expenses for security due to changes to 
technology and additional regulations. Cognizant of regulatory impacts 
on small businesses, the Coast Guard sought to minimize these impacts 
by allowing businesses to integrate TWIC readers into their existing 
PACS, and to choose from a variety of biometric scanners that may cost 
less than those approved by the TSA and listed on the TSA's QTL.

F. Other Issues

1. The GAO Report and the TWIC Pilot Program
    Several commenters noted concerns with the final rule in light of 
the May 2013 GAO report ``Transportation Worker Identification 
Credential: Card Reader Pilot Results Are Unreliable; Security Benefits 
Need to Be Reassessed'' (GAO-13-198). Two commenters specifically 
called attention to the GAO report's suggestion that results were less 
reliable due to ineffective evaluation design and the lack of requisite 
data. The Coast Guard fundamentally disagrees with the statement. 
Although there were many challenges in the implementation of the TWIC 
reader pilot, considerable data were obtained in sufficient quantity 
and quality to support the general findings and conclusions of the TWIC 
reader Pilot Report. The pilot obtained sufficient data to evaluate 
TWIC reader performance and assess the impact of using TWIC readers at 
maritime facilities. Furthermore, the Coast Guard supplemented the 
information from the TWIC Pilot Program with other sources of 
information. For example, in the RA, the Coast Guard estimated the 
number of access points per facility by facility type through the use 
of an independent data source (Facility Security Plans), and estimated 
the costs of TWIC readers through published pricing information. This 
independent data supplemented what we learned through the pilot and 
helped account for TWIC reader implementation at all access points when 
developing the NPRM.
    Similarly, multiple commenters suggested that the Coast Guard 
should not move forward on this final rule due to the GAO 
recommendations. We would encourage those who criticize the TWIC Pilot 
Program to closely review how the information gained in the program was 
used in the development of this rulemaking. Because of the testing 
conditions endemic to a voluntary pilot program, the TWIC Pilot Program 
encountered many challenges. The Coast Guard was aware of the pilot's 
limitations, and used it with discretion in developing the NPRM and, 
subsequently, in developing this final rule. For that reason, the pilot 
results were not the sole basis for the NPRM. The Coast Guard believes 
that the pilot produced valuable information concerning the 
environmental, operational, and fiscal impacts of the use of TWIC 
readers. The Coast Guard believes that data were obtained in sufficient 
quantity and quality to support the general findings and conclusions of 
the Pilot Report. The pilot data informed aspects of the rulemaking in 
which no other data were available. The Coast Guard is convinced that 
TWIC, including the use of biometric readers, can and should be a part 
of the nation's maritime security system, for the reasons cited 
extensively in this final rule.
    Two commenters suggested that individual TWIC Pilot Program 
participants were not provided the opportunity to review the final 
draft Pilot Report prior to publication. In response, the Coast Guard 
participated along with TSA and the independent test agent in 
individual close-out meetings with each of the pilot participants. 
Individual test phase reports were provided to participants in advance 
of those meetings to verify and answer questions and concerns.
    One commenter suggested that they heard from participants that 
information contained in the Pilot Report was inconsistent with the 
participants' records. We note that this commenter was not a pilot 
participant, nor did we receive such feedback from pilot participants. 
Given the nature of the program, we believe that the information from 
the pilot was generally helpful in providing data relating to certain 
operational aspects of the TWIC program.
    The RA for this final rule accounts for maintenance, replacement, 
and operation costs of TWIC readers in addition to the costs reported 
in the Pilot Report, contrary to the GAO's assertions. As both the 
Pilot Report and the GAO's review note, not all facilities implemented 
TWIC readers at all access points during the pilot in the same way they 
may have to do in the future to meet the requirements of this final 
rule. We believe that the immaturity of TWIC reader technology at the 
onset of the pilot, the voluntary nature of the Pilot Program, and lack 
of full cooperation at all facilities were major contributors to the 
pilot's limitations. Furthermore, we note that the additional 
flexibility afforded by this final rule, especially with regard to 
utilizing PACS as a means to undertake electronic TWIC inspection, will 
further reduce the negative operational impacts of the TWIC requirement 
that were experienced by some participants during the pilot.
    One commenter took the opposite position, arguing that the GAO 
report went beyond the required purpose of assessing the validity of 
the pilot, and that TWIC reader technology could be seamlessly 
integrated into their facility access control systems. While we do 
acknowledge that there were some problems with the pilot, overall we 
agree with the commenter that it demonstrated the ability to integrate 
TWIC into access control systems at a wide range of maritime 
facilities.
    One commenter suggested that the Coast Guard does not have an 
accurate accounting of how long it will take to resolve TWIC reader 
issues. We addressed a similar comment in the section of this preamble 
regarding malfunctioning access control systems. Per that discussion, 
we note that in this final rule, we are removing the specific time 
period for repairs, and that restoration of an access control system 
will be handled in accordance with the procedures for the reporting 
requirements for non-compliance as described in 33 CFR 104.125, 
105.125, and 106.125. These sections require the owner or operator to 
notify the cognizant COTP, and to either suspend operations or request 
and receive permission from the COTP to continue operating.
    Additionally, one commenter stated that the NPRM did not address 
the error rate experienced during the Pilot Program which, with 
repetitive failure, created distraction, confusion, and complacency 
with an overall degradation of security. The commenter suggested that 
another pilot should have been conducted to validate the original 
findings given technology problems encountered. The Coast Guard 
disagrees. The RA section in the NPRM did address error rates as 
potential opportunity costs associated with delays as a result of TWIC 
reader requirements. Furthermore, the Pilot Report did acknowledge both 
TWIC reader errors and card failures as challenges that were faced. The 
Coast Guard believes that the combination of technology advancement 
since the Pilot Program started and the enhanced flexibility and the 
movement to a more performance-based standard

[[Page 57693]]

in this final rule will have a significant role in reducing the rate of 
TWIC reader failure and the overall effect of TWIC reader failure on a 
vessel or facility. As noted in the NPRM, the Coast Guard anticipates 
that the rate of card failure requiring replacement will decrease as 
TWIC reader use increases. We believe the number of unreadable TWICs 
initially identified will decrease as the increased use of TWIC readers 
will enhance TWIC validity and readability by identifying damaged 
TWICs. However, as with any such critical system and as we have noted 
in previous sections, it is important for operators of vessels and 
facilities affected by this final rule to adequately address potential 
electronic reader failure scenarios in the development of their 
security plans to ensure that measures are identified, and to 
seamlessly react to a single electronic reader failure or, in the worst 
case, an entire PACS failure in a way that continues to meet the 
security intent of this rulemaking. Please see discussion in section 
V.B.3.d on malfunctioning access control systems for more discussion on 
this subject.
    One commenter highlighted GAO's assertion that DHS has not yet 
adequately demonstrated how the TWIC actually enhances maritime 
security. We have addressed the efficacy of the TWIC program as a whole 
in Section V.A of this preamble.
    One commenter stated that the GAO report failed to account for the 
opinions of various container terminal operators that participated in 
the Pilot Program, and suggested that the GAO report itself was flawed 
and went beyond its mandate. The Coast Guard appreciates the extremely 
valuable information provided by all vessel and facility operators 
during the course of this rulemaking, and has evaluated all comments in 
comparison with economic and environmental data to enhance this final 
rule to address the greatest security threats in which TWIC and TWIC 
readers provide utility in the prevention of a TSI. We have modified 
this final rule in a manner that allows for the greatest flexibility 
for non-Risk Group A vessel and facility operators to implement 
electronic TWIC inspection procedures on a voluntary basis. 
Additionally, the Coast Guard is committed to the continued security of 
the nation's ports. Accordingly, we will continue to evaluate the need 
for TWIC readers on vessels or facilities not covered in this final 
rule, and, should future cost benefit analysis show increased TWIC 
reader cost-effectiveness to address the threats to vessels and 
facilities within our ports, we may propose further requirements.
    Several commenters suggested that the Coast Guard did not engage 
with industry groups and advisory committees, other than TSAC, when 
drafting this rulemaking. The Coast Guard took into consideration input 
from a wide range of industry representatives during the development of 
this final rule through both formal and informal interaction. Formal 
interaction with stakeholders occurred in the form of direct contact 
with the National Maritime Security Advisory Committee, interaction 
with TWIC Pilot Program participants, and during multiple port and 
facility visits aimed at gathering specific feedback from industry on 
TWIC and the use of TWIC readers. Informal interaction occurred through 
multiple TWIC information sessions at industry-sponsored events such as 
meetings and conferences, and through feedback in the form of comments 
to both the ANPRM and NPRM for this rulemaking.
2. Additional Comments
a. General Comments on the TWIC Program
    Many commenters supported the Coast Guard's implementation of a 
delayed effective date for this final rule. As stated in the DATES 
section above, the Coast Guard will delay the effective date of this 
rulemaking by 2 years to allow the regulated industries time to comply 
with this final rule. One commenter asked if a non-Risk Group A vessel 
or facility decided, 1 year from the date of publication, to move up to 
Risk Group A, how many years that entity would have to comply with this 
final rule. In this example, the entity would have 1 more year to 
comply with the electronic TWIC inspection requirements of this final 
rule. All vessels and facilities meeting the Risk Group A criteria 
after the effective date of this final rule will have no extra time to 
comply, as the regulation will be in force. The commenter also asked 
what procedures such a facility would have to follow. Such a facility 
would have to adjust its FSP in accordance with all applicable 
regulations, and then implement the requirements of the approved FSP.
    Some commenters expressed concerns about the durability and 
reliability of TWICs themselves. As revealed in the TWIC Pilot Program, 
many users experienced problems with the TWIC. We note, as multiple 
commenters did, that prior to 2009, some cards were issued with 
antennas that experienced high rates of failure, but given the 5-year 
expiration period of the TWIC, those cards should all be replaced by 
the time this final rule is effective. Furthermore, due to the 
flexibility added by this final rule, should an environment prove to 
have a negative effect on the TWIC, owners and operators can use one of 
the alternative means described above to provide for access control 
while keeping TWICs in a secure location where they will not become 
damaged.
    One commenter stated that mariners are already subject to 
background checks, which should preclude the need for another check 
conducted by an electronic reader. We would note that the electronic 
TWIC inspection does not actually conduct an additional background 
check, but merely verifies the individual presenting the card is the 
same person who underwent the original background check. This commenter 
also suggested that random Coast Guard checks of the TWIC ensure 
adequate security. We disagree, and believe that security validation at 
high-risk vessels and facilities should be conducted thoroughly, not 
occasionally, for the reasons described in this rule.
    One commenter in a public meeting suggested that because of the 
TWIC program, driver's licenses and other forms of identification are 
no longer allowed for access to facilities, in favor of a TWIC, and 
that this has reduced security. The Coast Guard disagrees, and believes 
that TWIC enhances security. We note, for example, that merely having a 
driver's license does not indicate that an individual has passed a 
background check.
    Some commenters discussed both possible TSIs and terrorist attacks 
which would not, in their view, have been averted by a TWIC reader 
requirement. The Coast Guard notes that the electronic TWIC inspection 
requirements are only part of the Coast Guard's comprehensive port 
security program and will not address all attack scenarios. Issues 
relating to the overall effectiveness of the electronic TWIC inspection 
programs are discussed in Section V.A, above.
    Some commenters supported the use of the TWIC as a single Federal 
credential, and suggested that it should preempt and supersede other 
State, local, or site-specific credentials. One commenter suggested 
that using the TWIC as the only credential a person would need to enter 
multiple secure facilities would have substantial economic benefits, 
especially for individuals such as truck or bus drivers that need to 
access many different secure facilities. These benefits, according to 
the commenter, would include conducting only a single background check 
(as opposed to

[[Page 57694]]

multiple background checks that might be needed to obtain State, local, 
and site-specific credentials), as well as reduced ``wait time'' as 
security credentials are examined.
    While there is an efficiency argument to having a single, 
nationwide credential, we believe that the disbenefits of such a 
mandatory program are substantial and outweigh that efficiency. To 
start, we note that part of the increased flexibility of this final 
rule allows for alternative cards, such as employee ID cards, to 
achieve electronic TWIC inspection, provided that these cards are 
linked to a TWIC in a manner described above. As several commenters 
noted, possession of an authorized TWIC should not, in and of itself, 
grant the TWIC-holder access to any secure area on any vessel or 
facility. While a valid TWIC is a necessary component for unescorted 
access to secure areas, it will not be the sole reason, as owners and 
operators must exercise their right and responsibility to decide to 
whom to provide such access.
    One commenter expressed concern regarding the tiered approach for 
the use of TWIC readers. This commenter suggested that multiple access 
control procedures could result in confusion for persons who visit many 
different facilities. The commenter proposed that the Coast Guard 
require the installation of TWIC readers at Risk Group A and B 
facilities, and require that Risk Group C facilities maintain portable 
TWIC Readers. We acknowledge that using different access procedures at 
different facilities could be confusing. Furthermore, for the reasons 
discussed extensively, we do not believe that requiring electronic TWIC 
inspection at non-Risk Group A facilities is an effective use of 
resources at this time.
    Two commenters suggested an alternative process where inspection 
requirements are relaxed during peak hours. One commenter stated that 
between 7 a.m. and 9 a.m., hundreds of vehicles enter a particular 
facility, often with multiple passengers, and that requiring biometric 
identification of each passenger could result in traffic delays. The 
commenter suggested that only the driver should be required to undergo 
electronic TWIC inspection, while the passengers could present their 
TWICs for visual TWIC inspection. The Coast Guard does not agree with 
this approach, as it creates a fairly obvious and exploitable gap in 
security.
    While we have worked to increase operator flexibility to reduce 
delays and minimize their effects, we have estimated in the Coast 
Guard's RA that some facilities may have to make modifications to 
business operations to accommodate electronic TWIC inspection 
requirements, such as increasing the number of access points for 
vehicles. Furthermore, it may be possible at some facilities to conduct 
electronic TWIC inspections at locations employees would walk through 
after disembarking from their automobiles.
    Several commenters considered existing requirements under the MTSA 
and/or under the International Ship and Port Security Code to be 
sufficient for themselves and others, and that electronic TWIC 
inspection requirements should not apply to them. We believe, for 
reasons extensively detailed in this document, that the statutorily-
mandated enhancements to access control in this final rule have been 
applied to the class of vessels and facilities to which they are most 
cost-beneficial.
    One commenter was concerned at the prospect of TWIC readers being 
considered ``no-sail equipment,'' that is, equipment which must be 
operational before a vessel can leave. We note that while a situation 
where a TWIC reader could become no-sail equipment theoretically exists 
(for example, if there were only one TWIC reader available on the 
vessel, no TWIC readers at the facility, and no portable TWIC readers 
available), we have elaborated on the many ways in which this could be 
avoided through advance planning. This final rule elaborates on 
procedures which would be acceptable in the event of an electronic 
reader or system failure. We would recommend that operators of vessels 
or facilities required to undertake electronic TWIC inspections utilize 
robust systems that are capable of withstanding a single point of 
failure.
    One commenter expressed confusion as to how the electronic TWIC 
inspection requirement would apply to the aviation industry. We note 
that the requirement for electronic TWIC inspection at Risk Group A 
vessels and facilities applies equally to individuals entering via 
helicopters or other airborne means. In such an instance, it would be 
the responsibility of the owner or operator to conduct electronic TWIC 
inspections to ensure that all persons granted unescorted access to 
secure areas within the facility or upon boarding the vessel possess a 
valid TWIC.
    One commenter in a public meeting suggested that multiple entrances 
and departures in a day may pose a safety risk, if for example a 
facility is surrounded by public roads and highways. We believe that 
businesses can design their access points to secure areas in such a way 
that mitigates traffic impacts and potential safety concerns regarding 
public roads. We note that with the requirement for electronic TWIC 
inspection prior to each entry into a secure area of the facility, the 
security risk of such an environment would be greatly mitigated 
compared to a system that only required, for example, one inspection 
per day.
    One commenter requested that the TWIC be used as a universal 
identification card for entrance to transportation facilities, 
replacing the issuance of State, county, and facility-specific 
credentials. The commenter also suggested that bus and motorcoach 
drivers should be eligible for TWICs. Noting that many drivers travel 
to numerous MTSA-regulated sites, the commenter argued that using the 
TWIC exclusively could significantly reduce the costs and other burden 
associated with the need for multiple security credentials. While we do 
not dispute the efficiency argument, we are not requiring the use of a 
TWIC as universal identification card for a number of reasons. First, 
again, this suggestion is out of scope of the rulemaking, which is 
limited to the requirement for electronic TWIC inspections. Moreover, 
we note that nearly all MTSA-regulated facilities restrict access not 
only to those who have a TWIC, but also to those who have a valid 
reason to be on the premises. As many commenters repeated, simply 
having a TWIC does not guarantee access to a secure area of a vessel or 
facility. Many vessels and facilities use employment-specific 
identification cards both as a means to ensure that a person has been 
vetted as well as a means to show that they are employees. Furthermore, 
some of these PACS cards are used to track employee locations or 
restrict access within the facility. Requiring all facilities to use 
the TWIC exclusively could negatively impact security and business 
operations by removing the benefits of facility-specific access cards.
    Several commenters encouraged the Coast Guard to dismiss or devalue 
the comments from other commenters. In accordance with the 
Administrative Procedure Act, the Coast Guard considered every comment 
it received, both through the docket and through public meetings, 
before issuing this final rule.
    Several commenters made statements asserting that their operations 
were more secure or employees better trained than public transit 
operations and employees, and yet the latter may not be required to 
perform electronic TWIC inspections. While we cannot attest to the 
validity of these statements, we continue to believe that the improved 
security of electronic TWIC inspection,

[[Page 57695]]

compared to visual TWIC inspection, is warranted for high-risk vessels 
and facilities for the reasons discussed extensively in this preamble.
    One commenter believed that disbanding the TWIC program would 
remove the ``false crutch that TWIC provides'' and encourage greater 
operational security. For the reasons discussed above, we disagree and 
believe that TWIC provides a necessary and effective element of a 
comprehensive security system.
b. Clarification of Specific Items
    Several commenters asked for clarification about a term or idea 
used in the NPRM, or asked the Coast Guard to define it outright. 
Explanations of various terms are described below.
    One commenter requested clarification of the term ``each entry.'' 
As stated above, with regard to facilities, ``each entry'' is each 
distinct transition from a non-secure area to a secure area. With 
regard to vessels, ``each entry'' is each distinct transition from a 
non-secure area prior to boarding the vessel.
    One commenter asked about the definition of ``escorting,'' 
specifically whether a visual inspection, such as the use of closed-
circuit television (CCTV) systems, would be an acceptable form of 
escorting. In response, we refer the commenter to the detailed guidance 
on escorting found in NVIC 03-07. There, we provide guidance and 
examples of circumstances in which the use of surveillance equipment, 
including CCTV systems, might be sufficient for escorting purposes. The 
specific facts and circumstances of each case will determine whether 
the Coast Guard will permit CCTV systems for such purposes. In general, 
escorting in restricted areas requires side-by-side accompaniment with 
a TWIC-holder. However, escorting in secure areas that are not also 
designated restricted areas does not always require side-by-side 
accompaniment. In such secure, non-restricted areas, escorting may be 
sufficient through CCTV or other monitoring method (see 33 CFR 104.285 
and 105.275). Where such monitoring is appropriate, the general 
principle applies that monitoring must enable sufficient observation of 
the individual with a means to respond if the individual is observed to 
be engaging in unauthorized activities or crossing into an unauthorized 
area.
    One commenter raised the issue of how railroads would interact with 
the new electronic TWIC inspection requirements. PAC 05-08, ``TWIC 
Requirements and Rail Access into Secure Areas,'' is the existing 
policy guidance regarding railroad access as it relates to facilities 
in the TWIC program. This guidance allows the railroad company's local 
or regional scheduling coordinator to provide information on the TWIC 
status of the crew, and if all crewmembers are valid TWIC-holders, 
allows them to enter the secure area of a MTSA-regulated facility 
without further inspection of their TWICs. PAC 05-08 also permits 
trains on ``continuous passage'' through a facility to proceed without 
stopping to check TWICs in certain circumstances. One commenter, 
representing railroad companies, stated ``[n]either the need for, nor 
the advisability of, a change has been demonstrated'' in regards to 
this guidance. We agree, and reaffirm the guidance in PAC 05-08 in this 
final rule, with one caveat. If PAC 05-08 would require that an 
individual's TWIC be checked at a Risk Group A facility, it must be 
checked using electronic TWIC inspection.
c. Comments Outside the Scope of This Rulemaking
    Many commenters provided comments beyond the scope of this 
rulemaking when discussing the TWIC program generally. In addition to 
concerns about card stock and card reliability, comments concerning 
applicability of the TWIC card to other U.S. government or government-
regulated facilities, TWIC card applications, delays in issuing or 
renewing TWIC cards, and those concerning TWIC card waivers are all 
beyond the scope of this rulemaking. Similarly, it is beyond the scope 
of this rulemaking to require biometrics in the U.S. Merchant Mariners 
Document, commonly known as a ``Z-Card,'' or for multiple mariner 
documents to be consolidated into an ``all-in-one'' credential. The 
scope of this rulemaking is to establish requirements for electronic 
TWIC inspections on vessels and facilities regulated under the MTSA.
    Several commenters suggested ideas about how TSA's CCL could be 
improved or altered. We note that these ideas are outside the scope of 
this rulemaking and are best addressed to the TSA.
    Some commenters expressed concerns with the background check 
criteria for receiving a TWIC. For example, one commenter noted that 
certain longshore workers were erroneously denied a TWIC based on 
incorrect information in the Federal Bureau of Investigation database, 
and another experienced difficulty proving citizenship because he was 
born on a military base. While we are aware that some challenges exist 
in the enrollment and application process, we believe that the vast 
majority of enrollments are conducted accurately and efficiently, and 
that problems are generally dealt with in a courteous and timely 
manner. We note, however, that concerns relating to the background 
check are outside the scope of this rulemaking.
    One commenter expressed concern that no regulatory analysis was 
done for workers who need to acquire and pay for a TWIC. Another 
commenter stated that for workers in remote areas, the cost of 
obtaining a TWIC can be higher due to travel costs. We note that this 
final rule does not require any additional individuals to acquire a 
TWIC, and thus the comment is outside the scope of this rulemaking. 
However, we would refer interested parties to the RA for the TWIC final 
rule, available at https://www.regulations.gov, docket number TSA-2006-
24191-0745, for a detailed analysis of these costs.
    One commenter expressed concern that there is no requirement in 
this rule that obligates an employer to report individual TWIC-holders 
to the Coast Guard who commit TWIC-disqualifying offenses. This issue 
is outside the scope of this rulemaking.
    One commenter criticized facility owners for poor quality fences 
despite receiving money from the Federal government to improve 
security. This commenter also suggested that instead of investing funds 
into the TWIC readers, the Coast Guard should spend the money on 
bettering terminals and their surrounding areas. These comments do not 
address the use of electronic TWIC inspection, and therefore, are out 
of this rule's scope.
    One commenter in a public meeting described a system where 
``personnel from other companies'' must, prior to arrival at his 
facility, fax his company with basic information including whether or 
not the visitor holds a TWIC. Facility procedures other than those 
relating to the electronic TWIC inspection procedures are beyond the 
scope of this rulemaking.
    One commenter recommended using closed-circuit television systems 
for purposes of visual inspection, rather than having a guard 
physically present. This rule relates to electronic TWIC inspection, 
and we do not believe it is within the scope of this rulemaking to 
issue guidance on proper visual identification procedures.
    One commenter suggested that, if not requiring electronic TWIC 
inspection for all Risk Groups, the Coast Guard should institute a 
``display and challenge'' requirement for all secure areas. This would 
require that all persons with unescorted access display their TWIC or

[[Page 57696]]

other credential when in a secure area. As this final rule only relates 
to electronic TWIC inspection, such a suggestion is out of scope of 
this rulemaking.
    One commenter suggested that the Coast Guard has been lax in 
pursuing administrative action for TWIC-related offenses, such as 
loaning TWICs, entering facilities without undergoing proper screening 
processes, or using counterfeit TWICs. We note that these issues are 
taken seriously, but are outside the scope of this rulemaking as we are 
not changing the actions to be taken upon identification of TWIC 
issues, merely how they might be detected.
    One commenter noted that ``terminals must abide by common law and 
practice,'' in reference to the idea that TWICs are not the sole 
condition of entry. The Coast Guard agrees, but notes the improvement 
in access control that electronic TWIC inspection provides.
    One commenter implied that ammonium nitrate should not be 
considered CDC. Altering the list of CDC (defined in 33 CFR part 160) 
is beyond the scope of this rulemaking.
    One commenter noted that visual TWIC inspection presents a safety 
issue, as security personnel can be injured or killed by vehicles 
approaching the gate area. While there are certainly security incidents 
where attackers can try to use force to breach the perimeter of a 
secure facility, such incidents are beyond the scope of this rule.
    One commenter suggested that the U.S. Congress should fully fund 
the TWIC reader program, and asserted that funding of Federally 
mandated programs will ensure a degree of financial relief and minimize 
burdens. While we agree that funding would shift the industry burden to 
taxpayers, this comment remains beyond the scope of this rule.
    Finally, this final rule makes a number of minor, technical edits, 
including updating internal references, to the regulations in 33 CFR 
Chapter I, Subchapter H, in addition to the changes discussed elsewhere 
in the preamble. These edits affect the following sections in Title 33 
of the CFR:
     101.105 Definitions.
     101.514 TWIC Requirement.
     101.515 TWIC/Personal Identification.
     104.105 Applicability.
     104.115 Compliance.
     104.120 Compliance documentation.
     104.200 Owner or operator.
     104.215 Vessel Security Officer (VSO).
     104.235 Vessel recordkeeping requirements.
     104.260 Security systems and equipment maintenance.
     104.267 Security measures for newly hired employees.
     104.292 Additional requirements--passenger vessels and 
ferries.
     104.405 Format of the Vessel Security Plan (VSP).
     104.410 Submission and approval.
     105.115 Compliance dates.
     105.120 Compliance documentation.
     105.200 Owner or operator.
     105.257 Security measures for newly hired employees.
     105.290 Additional requirements--cruise ship terminals.
     105.296 Additional requirements--barge fleeting 
facilities.
     105.405 Format and content of the Facility Security Plan 
(FSP).
     105.410 Submission and approval.
     106.110 Compliance dates.
     106.115 Compliance documentation.
     106.200 Owner or operator.
     106.262 Security measures for newly-hired employees.
     106.405 Format and content of the Facility Security Plan 
(FSP).
     106.410 Submission and approval.

VI. Regulatory Analyses

    We developed this rule after considering numerous statutes and 
Executive Orders (E.O.s) related to rulemaking. Below we summarize our 
analyses based on these statutes or E.O.s.

A. Regulatory Planning and Review

    E.O.s 12866 (``Regulatory Planning and Review'') and 13563 
(``Improving Regulation and Regulatory Review'') direct agencies to 
assess the costs and benefits of available regulatory alternatives and, 
if regulation is necessary, to select regulatory approaches that 
maximize net benefits (including potential economic, environmental, 
public health and safety effects, distributive impacts, and equity). 
E.O. 13563 emphasizes the importance of quantifying both costs and 
benefits, of reducing costs, of harmonizing rules, and of promoting 
flexibility. This final rule is a significant regulatory action under 
section 3(f) of E.O. 12866. The Office of Management and Budget (OMB) 
has reviewed it under that Order. It requires an assessment of 
potential costs and benefits under section 6(a)(3) of E.O. 12866. A 
final assessment is available in the docket, and a summary follows.
    We amend our regulations on certain MTSA-regulated vessels and 
facilities to include requirements for electronic TWIC inspection to be 
used for access control for unescorted access to secure areas.
    Table 3 summarizes the costs and benefits of this final rule.

               Table 3--Summary of Costs and Benefits \64\
------------------------------------------------------------------------
                Category                            Final rule
------------------------------------------------------------------------
Applicability..........................  High-risk MTSA-regulated
                                          facilities and high risk MTSA-
                                          regulated vessels with greater
                                          than 20 TWIC-holding crew.
Affected Population....................  1 vessel.
                                         525 facilities.
Costs ($ millions, 7% discount rate)...  $21.9 (annualized).
                                         $153.8 (10-year).
Costs (Qualitative)....................  Time to retrieve or replace
                                          lost PINs for use with TWICs.
Benefits (Qualitative).................  Enhanced access control and
                                          security at U.S. maritime
                                          facilities and on board U.S.-
                                          flagged vessels.
                                         Reduction of human error when
                                          checking identification and
                                          manning access points.
------------------------------------------------------------------------


[[Page 57697]]

    Table 4 summarizes the changes in the regulatory analysis as we 
moved from the NPRM to this final rule. These changes to the RA came 
from either policy changes on the electronic TWIC inspection 
requirements, public comments received after the publication of the 
NPRM in March 2013, or simply from updating the data and information 
that informed our regulatory analysis.
---------------------------------------------------------------------------

    \64\ For a more detailed discussion of costs and benefits, see 
the full RA available in the online docket for this rulemaking. 
Appendix G of that document outlines the costs by provision and also 
discusses the complementary nature of the provisions and the 
subsequent difficulty in distinguishing independent benefits from 
individual provisions.

     Table 4--Changes in Regulatory Analysis From NPRM to Final Rule
------------------------------------------------------------------------
Element of regulatory analysis    Reason changed   Explanation of change
------------------------------------------------------------------------
Affected Population...........  Policy change....  a. Barge fleeting
                                                    facilities were
                                                    removed reducing the
                                                    previous facility
                                                    population of 532 to
                                                    525, and
                                                   b. Crew size changed
                                                    to 20 (instead of
                                                    14) and thus
                                                    reducing the number
                                                    of vessels to 1.
Cost of TWIC Readers..........  Update to reflect  The most recent
                                 current prices     prices of electronic
                                 for TWIC readers.  TWIC readers as
                                                    published in GSA
                                                    schedule and TSA's
                                                    QTL were
                                                    significantly
                                                    reduced.
                                Comments received  Some public comments
                                                    suggested that TWIC
                                                    reader costs have
                                                    declined since the
                                                    NPRM RA data was
                                                    collected.
Wages for transportation        More current BLS   Revised labor cost by
 workers.                        data.              using May 2012 BLS
                                                    data.
Maintenance Cost of TWIC        Comment received.  Revised this cost
 Readers.                                           assumption from 5%
                                                    of the total cost of
                                                    a TWIC Reader to
                                                    10%.
Number of TWIC Readers........  Comment received.  Per one large ferry
                                                    passenger facility's
                                                    suggestion,
                                                    accommodated this
                                                    facility's higher
                                                    number of readers in
                                                    cost estimates.
------------------------------------------------------------------------

    In this final rule, we require owners and operators of certain 
vessels and facilities regulated by the Coast Guard under 33 CFR 
Chapter I, subchapter H, to use electronic TWIC inspection designed to 
work with TWIC as an access control measure. This final rule also 
includes recordkeeping requirements for those owners and operators 
required to use an electronic TWIC inspection, and amendments to 
security plans previously approved by the Coast Guard to incorporate 
TWIC requirements.
    The provisions in this final rule enhance the security of vessels, 
ports, and other facilities by ensuring that only individuals who hold 
valid TWICs are granted unescorted access to secure areas at those 
locations. It will also further implement the MTSA transportation 
security card requirement, as well as the SAFE Port Act electronic TWIC 
inspection requirements.
    We estimate that this final rule would specifically affect owners 
and operators of certain MTSA-regulated vessels and facilities in Risk 
Group A with additional costs. As previously discussed, Risk Group A 
would consist of those vessels and facilities with highest consequence 
for a TSI. Affected facilities in Risk Group A would include: (1) 
Facilities, including barge fleeting facilities, that handle or receive 
vessels carrying CDC in bulk; and (2) Facilities that receive vessels 
certificated to carry more than 1,000 passengers. Affected vessels in 
Risk Group A would include: (1) Vessels that carry CDC in bulk; (2) 
Vessels certificated to carry more than 1,000 passengers; and (3) 
Towing vessels engaged in towing barges subject to (1) or (2). In 
addition, this proposal provides an electronic TWIC inspection 
exemption for vessels with 20 or fewer TWIC-holding crewmembers, 
further reducing the number of affected vessels in Risk Group A.
    Based on the risk-based hierarchy described in the preamble of this 
final rule and data from the Coast Guard's MISLE database, we estimate 
this final rule will affect 525 facilities and 1 vessel with additional 
costs. All of these facilities and vessels are in Risk Group A.
    The final rule adds flexibility in using existing PACS to comply 
with the electronic TWIC inspection requirements, which may result in 
lower costs for affected facilities and vessels. For the purposes of 
regulatory analysis, however, we prepare the cost estimate assuming 
that all of the affected population will install and use electronic 
TWIC readers. The following discussion of the cost analysis is based on 
this assumption.
    To estimate the costs for this proposal, we use data from a variety 
of sources, including MISLE, TWIC Pilot Study, TSA's ICE and QTL lists, 
public comments, and the GSA schedule among others. When data from the 
TWIC pilot are used (to estimate the costs for installation, 
integration, and PACS integration), the data are broken down by per 
electronic reader cost for each facility type. By distilling the costs 
from the TWIC Pilot down to a per TWIC reader cost by facility type, we 
are able to smooth out the varied costs in the TWIC Pilot and 
effectively normalize the TWIC Pilot costs before applying the costs to 
the full affected population of this rulemaking.
    The primary cost driver for this final rule is the capital cost 
associated with the purchase and installation of TWIC readers into 
access control systems. These costs include the cost of TWIC reader 
hardware and software, as well as costs associated with the 
installation, infrastructure, and integration with a PACS. Operational 
costs associated with this rulemaking include security plan amendments, 
recordkeeping, updates of the list of cancelled TWICs, training, and 
system maintenance. We also include operational and maintenance costs, 
which we estimate to be five percent of the cost of the TWIC reader 
hardware and software and are incurred annually. Table 5 summarizes our 
estimates for total capital costs by facility type during the 2-year 
implementation period; Table 6 provides the operational costs for 
facilities by four requirements throughout the analysis period.\65\
---------------------------------------------------------------------------

    \65\ See RA Tables 4.10 and 4.16 and associated discussion for 
the specific sources for our estimates as well as how they were 
developed.

[[Page 57698]]



                                 Table 5--Total Facility Capital Costs, 2-Year Implementation Period (Year 1 and Year 2)
--------------------------------------------------------------------------------------------------------------------------------------------------------
                                                     Total readers      Total reader costs ($)                 Total costs ($)                  Total
            Facility type               Number  --------------------------------------------------------------------------------------------   capital
                                                   Fixed     Portable     Fixed       Portable     Install.    Infra-structure      PACS       cost ($)
--------------------------------------------------------------------------------------------------------------------------------------------------------
Bulk Liquid.........................        290      1,535        292    8,247,555    2,054,220   11,475,387        20,033,055   15,279,201   57,089,418
Break Bulk and Solids...............         16         91         45      488,943      316,575      904,128         3,724,904    2,938,552    8,373,102
Container...........................          3         36          8      193,428       56,280      909,612           589,952    1,020,184    2,769,456
Large Passenger.....................         92         42        524      225,666    3,686,340    1,682,152         4,102,368      841,642   10,538,168
Small Passenger.....................         63          0        426            0    2,996,910            0                 0            0    2,996,910
Mixed Use...........................         61        180         72      967,140      506,520    8,191,008         6,300,000    1,242,108   17,206,776
                                     -------------------------------------------------------------------------------------------------------------------
    Total...........................        525      1,884      1,367   10,122,732    9,616,845   23,162,287        34,750,279   21,321,687   98,973,830
--------------------------------------------------------------------------------------------------------------------------------------------------------


                                Table 6--Annual Operational Costs for Facilities
----------------------------------------------------------------------------------------------------------------
                                                                                   Training
   Years after publication      Amendments    Recordkeeping     Canceled  --------------------------    Total
                                                               card list    Personnel       FSO
----------------------------------------------------------------------------------------------------------------
1............................     $467,614          $748,182     $486,319     $209,219      $74,676   $1,986,009
2............................      465,836           857,138      484,469      261,523       93,345    2,162,312
3............................            0           224,028      970,788      104,609       37,338    1,336,763
4............................            0           224,028      970,788      104,609       37,338    1,336,763
5............................            0           224,028      970,788      104,609       37,338    1,336,763
6............................            0           224,028      970,788      104,609       37,338    1,336,763
7............................            0           224,028      970,788      104,609       37,338    1,336,763
8............................            0           224,028      970,788      104,609       37,338    1,336,763
9............................            0           224,028      970,788      104,609       37,338    1,336,763
10...........................            0           224,028      970,788      104,609       37,338    1,336,763
                              ----------------------------------------------------------------------------------
    Total....................      933,450         3,397,544    8,737,092    1,307,616      466,725   14,842,427
----------------------------------------------------------------------------------------------------------------

    Table 7 shows the 10-year period of analysis for the total costs by 
facility type. These facility costs do not include costs associated 
with delays or replacement of TWICs, which are discussed later. These 
estimates include capital replacement costs for TWIC reader hardware 
and software beginning 5 years after implementation. These costs are 
reduced from those estimated in the NPRM given cost reductions in TWIC 
readers and the removal of TWIC reader requirements for barge fleeting 
areas.

                                                    Table 7--10-Year Total Costs, by Facility Type *
                                                                      [$ Millions]
--------------------------------------------------------------------------------------------------------------------------------------------------------
                                                                             Break bulk                  Large        Small
                             Year                              Bulk liquid   and solids   Container    passenger    passenger    Mixed use      Total
--------------------------------------------------------------------------------------------------------------------------------------------------------
1............................................................        $31.6         $2.4         $0.8         $9.8         $7.4         $4.4        $56.3
2............................................................         32.3          2.4          0.8         10.0          7.5          4.5         57.4
3............................................................          4.6          0.3          0.1          1.4          1.1          0.6          8.1
4............................................................          4.6          0.3          0.1          1.4          1.1          0.6          8.1
5............................................................          4.6          0.3          0.1          1.4          1.1          0.6          8.1
6............................................................         10.1          0.8          0.2          3.1          2.4          1.4         18.0
7............................................................         10.1          0.8          0.2          3.1          2.4          1.4         18.0
8............................................................          4.6          0.3          0.1          1.4          1.1          0.6          8.1
9............................................................          4.6          0.3          0.1          1.4          1.1          0.6          8.1
10...........................................................          4.6          0.3          0.1          1.4          1.1          0.6          8.1
                                                              ------------------------------------------------------------------------------------------
    Total Undiscounted.......................................        111.5          8.3          2.7         34.5         26.0         15.4        198.3
Total Discounted at 7%.......................................         88.7          6.6          2.1         27.5         20.7         12.2        157.8
Total Discounted at 3%.......................................        100.4          7.5          2.4         31.1         23.4         13.9        178.7
--------------------------------------------------------------------------------------------------------------------------------------------------------
Note: Numbers may not total due to rounding.
* These facilities are regulated because they handle CDC or more than 1,000 passengers. In the U.S. marine transportation system, facilities often
  handle a variety of commodities and provide a variety of commercial services. These facility types have different costs based on physical
  characteristics, such as the number of access points that would require TWIC readers, and other data received from the TWIC Pilot Study. See the final
  RA for details on different facility types and data from the TWIC Pilot Study.


[[Page 57699]]

    To account for potential opportunity costs associated with the 
delays as a result of the electronic TWIC inspection requirements, we 
estimate a cost associated with failed reads.\66\ We provide a range of 
delay costs based on different delays in seconds and also based on the 
number of times a TWIC-holder may have their card read on a weekly 
basis. By using a range of delay costs, we are able to account for 
multiple scenarios where an invalid electronic TWIC inspection 
transaction would lead to the use of a secondary processing operation, 
such as a visual TWIC inspection, additional identification validation, 
or other provisions as set forth in the FSP.\67\
---------------------------------------------------------------------------

    \66\ Delays may result from operational, human- or weather-
related factors.
    \67\ The final RA contains a discussion of the different failure 
mode scenarios where an invalid TWIC reader transaction would lead 
to potential delays and the use of secondary processing.
---------------------------------------------------------------------------

    Table 8 provides the annual costs associated with delays caused by 
invalid transactions for Risk Group A Facilities.

            Table 8--Cost of Delays Due to Invalid Transaction Per Year, for Risk Group A Facilities
----------------------------------------------------------------------------------------------------------------
                                     1 Read per  2 Reads per  3 Reads per  4 Reads per  5 Reads per
                                        week         week         week         week         week       Average
----------------------------------------------------------------------------------------------------------------
6 Seconds.........................      $94,339     $188,678     $283,017     $377,356     $471,696     $283,017
14 Seconds........................      220,125      440,249      660,374      880,498    1,100,623      660,374
30 Seconds........................      471,696      943,391    1,415,087    1,886,782    2,358,478    1,415,087
60 Seconds........................      943,391    1,886,782    2,830,173    3,773,564    4,716,955    2,830,173
120 Seconds.......................    1,886,782    3,773,564    5,660,346    7,547,129    9,433,911    5,660,346
                                   -----------------------------------------------------------------------------
    Average.......................      723,266    1,446,533    2,169,799    2,893,066    3,616,332    2,169,799
----------------------------------------------------------------------------------------------------------------

    For the purposes of this analysis, we used the cost of delay 
estimate of $2.2 million per year, which represents the average delay 
across all iterations of delay times and electronic TWIC inspection 
transactions.
    The use of TWIC readers will also increase the likelihood of faulty 
TWICs (TWICs that are not machine readable) being identified and the 
need for secondary screening procedures so affected workers and 
operators can address these issues.\68\ If a TWIC-holder's card is 
faulty and cannot be read, the TWIC-holder would need to travel to a 
TWIC Enrollment Center to get a replacement TWIC, which may result in 
additional travel and replacement costs. To account for this, we 
estimate a cost for a percentage of TWIC-holders to obtain replacement 
TWICs.
---------------------------------------------------------------------------

    \68\ Although current regulations require that TWICs be valid 
and readable upon request by DHS or law enforcement personnel, we 
anticipate that widespread use of TWIC readers will initially 
identify more unreadable cards. However, we expect the regular use 
of TWIC readers to ultimately serve to enhance compliance with 
current TWIC card validity and readability requirements.
---------------------------------------------------------------------------

    Based on information from the TWIC Pilot, we estimate that each 
year approximately five percent of TWIC-holders associated with Risk 
Group A would need to replace TWICs that cannot be read. We estimate 
that this would cost approximately $254.93 per TWIC-holder to travel to 
a TWIC Enrollment center and get a replacement TWIC.\69\ Overall, we 
estimate that TWIC replacement would cost approximately $2.3 million 
per year for TWIC transactions involving Risk Group A facilities. We 
assume this is an annual cost, though we anticipate that the rate of 
TWIC replacements will decrease as TWIC reader use increases, since the 
number of unreadable TWICs initially identified will decrease as the 
regular use of TWIC readers will serve to enhance TWIC validity and 
readability.
---------------------------------------------------------------------------

    \69\ This cost is explained in greater detail in the Final 
Regulatory Analysis and Final Regulatory Flexibility Analysis. It 
includes an estimated $194.93 for the average TWIC-holder to travel 
to a TWIC Enrollment Center, cost to be away from work, wait time at 
the Enrollment Center, and the $60 fee for a replacement TWIC. Some 
TWIC-holders may not need to pay a replacement fee if the TWIC is 
determined faulty as a result of the card production process. 
However, these TWIC-holders would chose to travel to a TWIC 
Enrollment Center to get a replacement TWIC instead of waiting to 
receive it by mail.
---------------------------------------------------------------------------

    Table 9 shows the average initial phase-in and annual recurring 
costs per facility by facility type. This includes capital, 
operational, delay, and TWIC replacement costs due to invalid TWIC 
reader transactions. It does not, however, account for vessel costs.

                                  Table 9--Per Facility Cost, by Facility Type
----------------------------------------------------------------------------------------------------------------
                                                  Break bulk                  Large        Small
    Phase-in & recurring costs      Bulk liquid   and solids   Container    passenger    passenger    Mixed use
----------------------------------------------------------------------------------------------------------------
Initial Phase-in Cost.............     $107,907     $145,588     $251,211     $105,375     $115,818     $ 70,758
Annual Recurring Cost.............       14,575       19,664       33,931       14,233       15,643        9,557
Annual Recurring Cost with               33,701       45,470       78,457       32,910       36,172       22,099
 Equipment Replacement............
----------------------------------------------------------------------------------------------------------------

    For the single Risk Group A vessel with greater than 20 TWIC-
holding crewmembers, we assume that this vessel will comply with the 
requirements by purchasing two portable TWIC readers (total first year 
cost of $14,070) and deploying them at the main access points of the 
vessel, replacing them at Year 6. We also estimate $1,339 for VSP 
amendments; $2,142 for the development of a recordkeeping system; and 
$2,028 for training in Year 1. Recurring costs include updates of the 
list of cancelled TWICs ($1,392 per year), ongoing training ($507 per 
year), and ongoing recordkeeping ($321 per year). We estimate the 
annualized costs to vessels of this rulemaking to be approximately 
$7,270 at a 7 percent discount rate. These costs are shown in Table 10.

[[Page 57700]]



   Table 10--Total Vessel Costs (Risk Group A With More Than 20 TWIC-
                         holding Crewmembers) *
------------------------------------------------------------------------
             Year                Undiscounted        7%           3%
------------------------------------------------------------------------
1.............................         $20,971      $19,599      $20,360
2.............................           3,627        3,168        3,419
3.............................           3,627        2,961        3,319
4.............................           3,627        2,767        3,222
5.............................           3,627        2,586        3,129
6.............................          17,697       11,792       14,821
7.............................           3,627        2,259        2,949
8.............................           3,627        2,111        2,863
9.............................           3,627        1,973        2,780
10............................           3,627        1,844        2,699
                               -----------------------------------------
    Total.....................          67,682       51,058       59,560
Annualized....................  ..............        7,270        $,982
------------------------------------------------------------------------
* Because the affected population is only one vessel, we assume that
  this vessel will comply within the first year of implementation.

    We estimate the annualized cost of this final rule to industry over 
10 years to be approximately $21.9 million at a 7 percent discount 
rate. The main cost drivers of this final rule are the acquisition and 
installation of TWIC readers and the maintenance of the affected 
entity's electronic TWIC inspection system. Initial costs, which will 
be distributed over a 2-year implementation phase, consist 
predominantly of the costs to purchase and install TWIC readers and to 
integrate them with owners' and operators' PACS. Annual costs will be 
driven by costs associated with updates of the list of cancelled TWICs, 
recordkeeping, training, system maintenance and opportunity costs 
associated with failed TWIC reader transactions.
    We estimated the present value average costs of this final rule on 
industry for a 10-year period as summarized in Table 11. The costs were 
discounted at 3 and 7 percent as set forth by guidance in OMB Circular 
A-4.

                                   Table 11--Total Industry Cost, Risk Group A
                                                  [$ Millions]
----------------------------------------------------------------------------------------------------------------
                                                            Additional
              Year                 Facility      Vessel      costs *     Undiscounted        7%           3%
----------------------------------------------------------------------------------------------------------------
1..............................        $51.5         $0.0         $4.8           $56.3        $52.6        $54.7
2..............................         52.6          0.0          4.8            57.4         50.2         54.1
3..............................          3.3          0.0          4.8             8.1          6.6          7.4
4..............................          3.3          0.0          4.8             8.1          6.2          7.2
5..............................          3.3          0.0          4.8             8.1          5.8          7.0
6..............................         13.2          0.0          4.8            18.0         12.0         15.1
7..............................         13.2          0.0          4.8            18.0         11.2         14.6
8..............................          3.3          0.0          4.8             8.1          4.7          6.4
9..............................          3.3          0.0          4.8             8.1          4.4          6.2
10.............................          3.3          0.0          4.8             8.1          4.1          6.0
                                --------------------------------------------------------------------------------
    Total......................        150.3          0.1         48.0           198.4        157.8        178.8
Annualized.....................  ...........  ...........  ...........  ..............         22.5         21.0
----------------------------------------------------------------------------------------------------------------
* This includes additional delay, travel, and TWIC replacement costs due to TWIC failures.

    As this final rule will require amendments to FSPs and VSPs, we 
estimate a cost to the government to review these amendments during the 
implementation period, but do not anticipate any further annual cost to 
the government from this final rule. For the total implementation 
period, the total government cost will be $93,177 at a 7 percent 
discount rate. Table 12 shows the 10-year government costs.

                                          Table 12--Government Costs *
----------------------------------------------------------------------------------------------------------------
                                                                             Total
                    Year                          FSP          VSP       undiscounted        7%           3%
----------------------------------------------------------------------------------------------------------------
1...........................................      $51,450         $166         $51,616      $48,239      $50,112
2...........................................       51,450            0          51,450       44,938       48,497
3...........................................            0            0               0            0            0
4...........................................            0            0               0            0            0
5...........................................            0            0               0            0            0
6...........................................            0            0               0            0            0
7...........................................            0            0               0            0            0
8...........................................            0            0               0            0            0
9...........................................            0            0               0            0            0
10..........................................            0            0               0            0            0

[[Page 57701]]

 
    Total...................................      102,900          166         103,066       93,177       98,609
                                             -------------------------------------------------------------------
Annualized..................................                                    13,266                    11,560
----------------------------------------------------------------------------------------------------------------
* After implementation, we estimate there would be no additional government costs for plan review as additional
  updates would be covered under existing plan review requirements and resources.

    Based on the provisions in this final rule and recent data, we 
estimated the average first-year cost of this final rule (combined 
industry and government) to be approximately $52.1 million or $54.1 
million at a 7 or 3 percent discount rate, respectively. The 
undiscounted annual recurring cost for this final rule is approximately 
$7.5 million in every year except years 6 and 7, due to equipment 
replacement 5 years after implementation. The annualized cost of this 
final rule is $21.9 million at 7 percent and $20.4 million at 3 
percent. The 10-year cost to industry and government of this final rule 
is approximately $153.8 million at a 7 percent discount rate, and 
$173.9 million at a 3 percent discount rate.
    The benefits of the final rule include enhancing the security of 
vessels, ports, and other facilities by ensuring that only individuals 
who hold TWICs are granted unescorted access to secure areas at those 
locations and reducing regulatory uncertainty by closing the gap 
between MTSA and SAFE Port Act requirements for electronic TWIC 
inspection and regulatory requirements.
    Electronic TWIC inspection programs will make identification, 
validation, and verification of individuals attempting to gain 
unescorted access to a secure area more reliable and also will help to 
alleviate potential sources of human error when checking credentials at 
access points. Identity verification ensures that the individual 
presenting the TWIC is the same person to whom the TWIC was issued. 
Card authentication ensures that the TWIC is not counterfeit, and card 
validation ensures that the TWIC has not expired or been revoked by 
TSA, or reported as lost, stolen, or damaged. Furthermore, the 
standardization of TWIC readers on a national scale could provide 
additional benefits in the form of efficiency gains in implementing 
access control systems throughout port facilities and nationally for 
companies operating in multiple locations.
    Data limitations preclude us monetizing these benefits, but 
instead, we use break-even analysis. Break-even analysis is useful when 
it is not possible to quantify the benefits of a regulatory action. OMB 
Circular A-4 recommends a ``threshold'' or ``break-even'' analysis when 
non-quantified benefits are important to evaluating the benefits of a 
regulation. Break-even analysis answers the question, ``How small could 
the value of the non-quantified benefits be (or how large would the 
value of the non-quantified costs need to be) before the rule would 
yield zero net benefits?'' \70\ For this rulemaking, we calculate a 
potential range of break-even results from the estimated consequences 
of the three attack scenarios that are most likely to be mitigated by 
the use of TWIC readers. Because the primary function of the TWIC card 
and electronic TWIC inspection is to enhance access control and 
identity verification and validation, the attack scenarios evaluated 
within MSRAM to provide the consequence data for this analysis were 
limited to the following:
---------------------------------------------------------------------------

    \70\ U.S. Office of Management and Budget, Circular A-4, 
September 17, 2003, page 2.
---------------------------------------------------------------------------

     Truck Bomb
    [cir] Armed terrorists use a truck loaded with explosives to attack 
the target focal point. The terrorists will attempt to overcome guards 
and barriers if they encounter them.
     Terrorist Assault Team
    [cir] A team of terrorists using weapons and explosives attack the 
target focal point. Assume the terrorists have done prior planning 
surveillance, but have no insider support of assault.
     Passenger/Passerby Explosives/Improvised Explosive Device
    [cir] Terrorists exploit inadequate access control and detonate 
carried explosives at the target focal point. Assume the terrorists 
approach the target under cover of legitimate presence and are not 
armed. Note: for this attack mode, terrorist is not an insider.
    The focus on these three attack scenarios allows us to look at 
specific attack scenarios that are most likely to be mitigated by the 
electronic TWIC inspection programs. These scenarios were chosen 
because they represent the scenarios most likely to benefit from the 
enhanced access control afforded by electronic TWIC inspection, as they 
require would-be attackers gaining access to the target in question. 
For these three attack types, the aggressor would first need to gain 
access to the facility to inflict maximum damage. Because the function 
of the electronic TWIC inspection is to enhance access control, the 
deployment of TWIC readers would increase the likelihood of identifying 
and denying access to an individual attempting nefarious acts.
    For the break-even analysis, we estimate the consequences of these 
three scenarios by estimating the number of casualties and serious 
injuries that would occur had the attack been successful. To monetize 
the value of fatalities prevented, we use the concept of ``value of a 
statistical life'' (VSL), which is commonly used in regulatory 
analyses. The VSL does not represent the dollar value of a person's 
life, but the amount society would be willing to pay to reduce the 
probability of premature death. We currently use a value of $9.1 
million as an estimate of VSL.\71\ This break-even analysis does not 
consider any property damage, environmental damage, indirect or 
macroeconomic consequences these terrorist attacks might cause. 
Consequently, the economic impacts of the terrorist attacks estimated 
for this series of break-even analyses would be higher if these other 
impacts were considered.
---------------------------------------------------------------------------

    \71\ See the Department of Transportation's ``Guidance on the 
Treatment of the Economic Value of a Statistical Life in U.S. 
Department of Transportation Analyses'' https://www.dot.gov/sites/dot.dev/files/docs/VSL%20Guidance%202013.pdf.

[[Page 57702]]



Table 13--Annual Risk Reduction and Attacks Averted Required for Costs to Equal Benefits, Final Rule Alternative
----------------------------------------------------------------------------------------------------------------
                                                    Annualized        Average        Required      Frequency of
                                                     cost, 7%         maximum      reduction in       attacks
                                                   discount rate    consequence   risk to break-    averted to
                                                   ($ Millions)    ($ Millions)        even         break-even
----------------------------------------------------------------------------------------------------------------
Final Rule Alternative..........................           $21.9        $5,014.1            0.4%   One every 229
                                                                                                           years
----------------------------------------------------------------------------------------------------------------

    As shown in Table 13, an avoided terrorist attack at an average 
target is equivalent to $5.01 billion in avoided consequences. This 
final rule is estimated to cost approximately $21.9 million annually. 
Using the estimated annualized cost of this regulation, the annual 
reduction in the probability of attack to a Risk Group A facility that 
would just equate avoided consequences with cost is less than 0.5 
percent. To state this in another way, if implementing this regulation 
will lower the likelihood of a successful terrorist attack by more than 
0.4 percent each year, then this would be a socially efficient use of 
resources. This final rule would be cost effective if it prevented one 
terrorist attack with consequence equal to the average every 229 years 
($5,014.1/$21.9). These small changes in required risk reduction 
suggest that the potential benefits of the final rule justify the 
costs.
    For the final rule alternative, we assess that all Risk Group A 
facilities will be required to conduct electronic TWIC inspections. On 
the vessel side, we assess that all Risk Group A vessels with a crew 
size greater than 20 TWIC-holding crewmembers will likely carry two 
portable TWIC readers. For this alternatives analysis, we look at 
several different ways to implement electronic TWIC inspection 
requirements based on the Risk Group hierarchy. These alternatives 
include requiring TWIC readers for Risk Group A and B facilities, along 
with Risk Group A vessels with more than 14 TWIC-holding crewmembers, 
Risk Group A and container facilities, along with Risk Group A vessels 
with more than 14 TWIC-holding crewmembers, adding certain high-risk 
facilities to Risk Group A, including petroleum refineries, non-CDC 
bulk hazardous materials facilities, and petroleum storage facilities, 
and Risk Group A facilities and all self-propelled Risk Group A 
vessels. Table 14 summarizes the cost of the alternatives considered. 
The costs displayed are the 10-year costs and the 10-year annualized 
cost, each discounted at 7 percent.

                                        Table 14--Regulatory Alternatives
----------------------------------------------------------------------------------------------------------------
                                                                                                    Annualized
                                                                                   Total cost ($      cost ($
                                   Description       Facility         Vessel       millions, at    millions, at
                                                    population      population      7% discount     7% discount
                                                                                       rate)           rate)
----------------------------------------------------------------------------------------------------------------
Final Rule Alternative........  All Risk Group A             525               1          $153.8           $21.9
                                 facilities and
                                 Risk Group A
                                 vessels with
                                 more than 20
                                 crewmembers.
NPRM Alternative..............  All Risk Group A             532              38           153.5            21.9
                                 facilities and
                                 Risk Group A
                                 vessels with
                                 more than 14
                                 crewmembers.
Alternative 2.................  All Risk Group A             532             138           158.2            22.5
                                 facilities and
                                 Risk Group A
                                 vessels (except
                                 barges).
Alternative 3.................  Risk Group A and             651              38           182.6            26.0
                                 all container
                                 facilities and
                                 Risk Group A
                                 vessels with
                                 more than 14
                                 crewmembers.
Alternative 4.................  All Risk Group A           1,174              38           309.5            44.1
                                 facilities,
                                 plus additional
                                 high
                                 consequence
                                 facilities
                                 including
                                 petroleum
                                 refineries, non-
                                 CDC bulk
                                 hazardous
                                 materials
                                 facilities, and
                                 petroleum
                                 storage
                                 facilities, and
                                 Risk Group A
                                 vessels with
                                 more than 14
                                 crewmembers.
Alternative 5 (ANPRM            Risk Group A and           2,173              38           548.9            78.1
 Alternative).                   B Facilities
                                 and Risk Group
                                 A vessels with
                                 more than 14
                                 crewmembers.
----------------------------------------------------------------------------------------------------------------

    When comparing alternatives, we also looked at the results of the 
break-even analysis for these alternatives. As Table 15 shows, for the 
overall average maximum consequence, the final rule alternative will 
require the lowest reduction in risk for the costs of the rule to be 
justified. As the purpose of this rulemaking is to enhance security to 
mitigate a TSI, we assess the break-even for the overall consequence of 
a TSI. It is assumed that the highest consequence targets will be the 
most attractive targets for potential terrorist attack.

[[Page 57703]]



    Table 15--Summary of Required Risk Reduction and Attacks Averted by Regulatory Alternative, Overall (in $
                                                    Millions)
----------------------------------------------------------------------------------------------------------------
                                          Annualized                       Required
                                           cost, 7%         Average      reduction in     Frequency of attacks
                                         discount rate    consequence        risk                averted
----------------------------------------------------------------------------------------------------------------
Final Rule Alternative................           $21.9       $5,014.10           0.44%  One every 229 years.
NPRM Alternative......................            21.9        5,014.10           0.44%  One every 229.0 years.
Risk Group A facilities and all Risk              22.5        5,014.10           0.45%  One every 222.8 years.
 Group A vessels, except barges.
Risk Group A and all container                    26.0         4,158.7           0.63%  One every 160.0 years.
 facilities and Risk Group A vessels
 with more than 14 crewmembers.
All Risk Group A facilities, plus                 44.1         2,211.3           1.99%  One every 50.1 years.
 additional high consequence
 facilities including petroleum
 refineries, non-CDC bulk hazardous
 materials facilities, and petroleum
 storage facilities, and Risk Group A
 vessels with more than 14 crewmembers.
ANPRM Alternative Risk Groups A and B             78.1         1,647.1           4.74%  One every 21.1 years.
 facilities and Risk Group A vessels
 with more than 14 crewmembers.
----------------------------------------------------------------------------------------------------------------

    Final rule Alternative--Risk Group A Facilities and Risk Group A 
Vessels with More than 20 TWIC-Holding Crewmembers:
    The analysis for this alternative is discussed in detail previously 
in this section, as it is the alternative we have chosen in this final 
rule.
    NPRM Alternative--Risk Group A Facilities and Risk Group A Vessels 
with More than 14 TWIC-Holding Crewmembers:
    The analysis for this alternative was discussed in detail in the 
previously published NPRM's regulatory impact analysis.\72\ The two key 
differences between the final rule and NPRM alternative are the 
exemption of barge fleeting facilities reducing the affected facility 
population to 525 and the adoption of the crew size of 20 or more 
removing all vessels except one in the final rule as opposed to all 532 
facilities and 38 vessels in the Risk Group A.
---------------------------------------------------------------------------

    \72\ 78 FR 17782.
---------------------------------------------------------------------------

    Alternative 2--Risk Group A Facilities and All Risk Group A 
Vessels, Except Barges:
    This alternative would require electronic TWIC inspection to be 
used at all Risk Group A facilities and for all Risk Group A vessels, 
except barges. This alternative would increase the burden on industry 
and small entities by increasing the affected population from 1 vessel 
to 138 vessels. The number of facilities would be the same as in the 
NPRM alternative. Under this alternative, annualized cost of this 
rulemaking would remain the same at $21.9 million, at a 7 percent 
discount rate. The discounted 10-year costs would go from $157.9 
million to $158.2 million. While this alternative does not lead to a 
significant increase in costs, we reject it because requiring 
electronic TWIC inspection on vessels with 14 or fewer TWIC-holding 
crewmembers is unnecessary, as crews with that few members are known to 
all on the vessel. This crewmember limit was proposed in the ANPRM and 
in the NPRM, and was based on a recommendation from TSAC. See the 
discussion in the NPRM on ``Recurring Unescorted Access'' and ``TWIC 
Reader Exemption for Vessels with 14 or Fewer TWIC-Holding 
Crewmembers'' for more details.\73\
---------------------------------------------------------------------------

    \73\ 78 FR 17803 and 78 FR 17813, respectively.
---------------------------------------------------------------------------

    Alternative 3--Risk Group A and All Container Facilities and Risk 
Group A Vessels with More than 14 TWIC-Holding Crewmembers:
    For this alternative, we assumed that only those facilities in Risk 
Group A, as previously defined, and all container facilities will 
require electronic TWIC inspection. This alternative would increase the 
burden on industry and small entities by increasing the affected 
population from 525 facilities to 651 facilities. Under this scenario, 
the annualized cost of this rulemaking would increase from $21.9 
million to $26.0 million, at a 7 percent discount rate. The discounted 
10-year costs would go from $153.8 million to $182.6 million. The 
inclusion of container facilities would also potentially have adverse 
environmental impacts due to increased air emissions due to longer wait 
(``queuing'') times and congestion at facilities.
    We considered this alternative because of the risk associated with 
container facilities due to the transfer risk associated with 
containers. As discussed in the preamble of the NPRM, many of the high-
risk threat scenarios at container facilities would not be mitigated by 
electronic TWIC inspection. The costs for electronic TWIC inspection at 
container facilities would not be justified by the amount of potential 
risk reduction at these facilities from such a measure. While container 
facilities pose a higher transfer risk (i.e., there is a greater risk 
of a threat coming through a container facility and inflicting harm or 
damage elsewhere than with any other facility type), such threats are 
not mitigated by the use of TWIC readers.
    Furthermore, the use of TWIC readers, or other access control 
features, would not mitigate the threat associated with the contents of 
a container. The electronic TWIC inspection serves as an additional 
access control measure, but would not improve screening of cargoes for 
dangerous substances or devices.
    Alternative 4--Adding certain high consequence facilities to Risk 
Group A (these additional facilities to include petroleum refineries, 
non-CDC bulk hazardous materials facilities, and petroleum storage 
facilities):
    For this alternative, we moved three facility categories--petroleum 
refineries, non-CDC bulk hazardous materials facilities, and petroleum 
storage facilities--into Risk Group A from Risk Group B based on the 
average maximum consequence for these facility types. This alternative 
would increase the burden on industry by increasing the affected 
population from 525 facilities to 1,174 facilities. Under this 
scenario, the annualized cost of this rulemaking would increase from 
$21.9 million to $44.1 million, at a 7 percent discount rate. The 
discounted 10-year costs would go from $153.8 million to $309.5 
million.
    We considered this alternative based on the high MSRAM consequences

[[Page 57704]]

associated with these three facility types, as well as due to the 
perception that petroleum facilities pose a greater security risk than 
other facility types. Despite the high MSRAM consequences for these 
facility types, the overall risk as determined in the AHP were not as 
high as those in the current Risk Group A, and therefore, we rejected 
this alternative and maintained the AHP-based risk groupings.
    Alternative 5--Risk Group A and Risk Group B Facilities and Risk 
Group A Vessels with More than 14 Crewmembers:
    Alternative 5 would require electronic TWIC inspection to be used 
at all Risk Group A and Risk Group B facilities, and Risk Group A 
vessels with greater than 14 TWIC-holding crewmembers. This alternative 
would increase the burden on industry and small entities by increasing 
the affected population from 525 facilities to 2,173 facilities. This 
increase in facilities would extend the affected population to 
facilities that fall under the second risk tier. Under this 
alternative, annualized cost of this rulemaking would increase from 
$21.9 million to $78.1 million, at a 7 percent discount rate. The 
discounted 10-year costs would go from $153.8 million to $548.9 
million. Based on a recent study by the Homeland Security Institute, as 
discussed in the preamble to the NPRM, the difference in risk between 
facilities in Risk Groups A and B is clearly defined, indicating that 
the two Risk Groups do not require the same level of TWIC requirements. 
Further, as discussed in the benefits section of this analysis, the 
break-even point, or the amount of risk that would need to be reduced 
for costs to equal benefits, for this alternative is much higher than 
that of the final rule alternative. For these reasons, we rejected this 
alternative.
    The provisions in this final rule are taken in order to meet 
requirements set forth in MTSA and the SAFE Port Act. The final rule, 
as presented, represents the lowest cost alternative, as discussed 
above. We have focused this rulemaking on the highest risk population 
so as to reduce the impacts of this rule as much as possible. Also, we 
have created a performance standard that allows the affected population 
to implement the requirements in a manner most conducive to their own 
business practices.
    Furthermore, by allowing for flexibilities, such as the use of 
fixed or portable TWIC readers, and removing vessels with 20 or fewer 
TWIC-holding crewmembers from the requirements, we have reduced 
potential burden on all entities, including small entities. 
Furthermore, we believe that providing any additional relief for small 
entities would conflict with the purpose of this rulemaking, as the 
objective is to enhance access control and reduce risk of a TSI. 
Providing relief of the proposed requirements based on entity size 
would contradict that stated purpose and leave small entities, which 
may possess as great a risk as entities that exceed the Small Business 
Administration (SBA) size standards, more vulnerable to a TSI.
B. Small Entities
    Under the Regulatory Flexibility Act, 5 U.S.C. 601-612, we have 
considered whether this rule would have a significant economic impact 
on a substantial number of small entities. The term ``small entities'' 
comprises small businesses, not-for-profit organizations that are 
independently owned and operated and are not dominant in their fields, 
and governmental jurisdictions with populations of less than 50,000. A 
Final Regulatory Flexibility Analysis discussing the impact of this 
final rule on small entities is available in the docket, and a summary 
follows.
    For this final rule, we estimated costs for mandatory electronic 
TWIC inspection for approximately 1 vessel and 525 facilities based on 
the risk assessment hierarchy and current data from the Coast Guard's 
MISLE database. Of these 525 facilities that would be affected by the 
electronic TWIC inspection requirements, we found 306 unique owners. 
Among these 306 unique owners, there were 31 government-owned entities, 
114 companies that exceeded SBA small business size standards, 88 
companies considered small by SBA size standards, and 73 companies for 
which no information was available. For the purposes of this analysis, 
we consider all entities for which information was not available to be 
small. There were no not-for-profit entities in our affected 
population. Of the 31 government jurisdictions that would be affected 
by this final rule, 24 exceed the 50,000 population threshold as 
defined by the Regulatory Flexibility Act to be considered small, and 
the remaining 7 have government revenue levels such that there would 
not be an impact greater than 1 percent of government revenue.\74\
---------------------------------------------------------------------------

    \74\ ``Government revenues'' used for this analysis include tax 
revenues, and in some cases, operating revenues for government owned 
waterfront facilities.
---------------------------------------------------------------------------

    We were able to find revenue information for 64 of the 88 
businesses deemed small by SBA size standards.\75\ We then determined 
the impacts of the final rule on these companies by comparing the cost 
of the final rule to the average per facility cost of this rulemaking. 
To determine the average per facility cost, we average the per facility 
cost for all facility types using the same cost per facility type 
breakdown as used to assess the costs of this proposal. We then found 
what percent impact on revenue the final rule will have based on 
implementation costs (including capital costs) and annual recurring 
costs (including updates of the list of cancelled TWICs, recordkeeping, 
and training). We estimate these costs to be, on average $195,715 per 
entity during the implementation period and $12,612 per entity in 
annual recurring cost.\76\ The actual cost faced by a specific facility 
will vary based on a number of factors, such as the number of access 
points. Smaller facilities should in general incur lower costs, but the 
Coast Guard is unable to distinguish cost estimates on a facility-by-
facility basis. We note that in some cases owners and operators might 
be able to finance the equipment costs as needed and such financing 
scenario could further decrease the impact on the facility owner and 
operators. We base our impact analysis on average cost to regulated 
entities due to the flexibility afforded by this final rule to 
individual facilities to determine how best to implement electronic 
TWIC inspection requirements.\77\ Table 16 shows the potential revenue 
impacts for small businesses impacted by this final rule.
---------------------------------------------------------------------------

    \75\ SBA small business standards are based on either company 
revenue or number of employees. Many companies in our sample have 
employee numbers determining them small, but we were unable to find 
annual revenue data to pair with the employee data.
    \76\ These are weighted averages, based on the per facility cost 
displayed in Table 4 and the number of facilities by type.
    \77\ We do not know how a specific facility will comply with 
this rulemaking in regards to type and number of readers installed, 
number of personnel requiring training at a given facility, etc.

[[Page 57705]]



                       Table 16--Revenue Impacts on Affected Small Businesses--Facilities
----------------------------------------------------------------------------------------------------------------
                                                    Impacts from implementation    Impacts from recurring annual
                                                               costs                           costs
              Revenue impact range               ---------------------------------------------------------------
                                                     Number of      Percent of       Number of      Percent of
                                                     entities        entities        entities        entities
----------------------------------------------------------------------------------------------------------------
0% < Impact <= 1%...............................              33              52              57              89
1% < Impact <= 3%...............................               4               6               6               9
3% < Impact <= 5%...............................               5               8               0               0
5% < Impact <= 10%..............................               8              13               1               2
Above 10%.......................................              14              22               0               0
                                                 ---------------------------------------------------------------
    Total.......................................              64             100              64             100
----------------------------------------------------------------------------------------------------------------

    The greatest impact is expected to occur during the implementation 
phase when 48 percent of small businesses that we were able to find 
revenue data on will experience an impact of greater than 1 percent, 
and 22 percent of small businesses that we were able to find revenue 
data on will experience an impact greater than 10 percent. After 
implementation, the impacts decrease and 89 percent of affected small 
businesses will see an impact less than 1 percent. We expect the 
revenue impacts for years with equipment replacement to be between 
those for implementation and annual impacts. During those years with 
equipment replacement, we estimate that approximately 3 percent of 
businesses would see an impact greater than 1 percent, and 0 percent 
would see an impact greater than 10 percent.\78\
---------------------------------------------------------------------------

    \78\ We estimate an average cost per facility in years with 
equipment replacement to be $48,110.
---------------------------------------------------------------------------

    For vessels, we found that for the 1 vessel that will be affected 
by this final rule, there is 1 unique owner that did not qualify as 
small business by SBA size standards. Therefore, we do not provide a 
revenue impact analysis for affected small business as we provided 
above for affected facilities.
C. Assistance for Small Entities
    Under section 213(a) of the Small Business Regulatory Enforcement 
Fairness Act of 1996, Public Law 104-121, we offered to assist small 
entities in understanding this rule so that they could better evaluate 
its effects on them and participate in the rulemaking. The Coast Guard 
will not retaliate against small entities that question or complain 
about this rule or any policy or action of the Coast Guard.
    Small businesses may send comments on the actions of Federal 
employees who enforce, or otherwise determine compliance with, Federal 
regulations to the Small Business and Agriculture Regulatory 
Enforcement Ombudsman and the Regional Small Business Regulatory 
Fairness Boards. The Ombudsman evaluates these actions annually and 
rates each agency's responsiveness to small business. If you wish to 
comment on actions by employees of the Coast Guard, call 1-888-REG-FAIR 
(1-888-734-3247).

D. Collection of Information

    This rule calls for a collection of information under the Paperwork 
Reduction Act of 1995, 44 U.S.C. 3501-3520. You are not required to 
respond to a collection of information unless it displays a currently 
valid OMB control number. As required by 44 U.S.C. 3507(d), we 
submitted a copy of the final rule to the OMB for its review of the 
collection of information. As defined in 5 CFR 1320.3(c), ``collection 
of information'' comprises reporting, recordkeeping, monitoring, 
posting, labeling, and other similar actions. The title and description 
of the information collection, a description of those who must collect 
the information, and an estimate of the total annual burden follow. The 
estimate covers the time for reviewing instructions, searching existing 
sources of data, gathering and maintaining the data needed, and 
completing and reviewing the collection.
    Under the provisions of the final rule, the affected facilities and 
vessel will be required to update their FSPs and VSPs, as well as 
create and maintain a system of recordkeeping within 2 years of 
promulgation of the final rule. This requirement will be added to an 
existing collection with OMB control number 1625-0077.
    Title: Security Plans for Ports, Vessels, Facilities, Outer 
Continental Shelf Facilities and Other Security-Related Requirements.
    OMB Control Number: 1625-0077.
    Summary of the Collection of Information: This information 
collection is associated with the maritime security requirements 
mandated by MTSA. Security assessments, security plans, and other 
security-related requirements are found in 33 CFR Chapter I, subchapter 
H. The final rule will require certain vessel and facilities to use 
electronic readers designed to work with the TWIC as an access control 
measure. Affected owners and operators will also face requirements 
associated with electronic TWIC inspection, including recordkeeping 
requirements for those owners and operators required to use an 
electronic TWIC reader, and security plan amendments to incorporate 
TWIC requirements.
    Need for Information: The information is necessary to show evidence 
that affected vessels and facilities are complying with the electronic 
TWIC inspection requirements.
    Proposed Use of Information: We will use this information to ensure 
that facilities and vessels are properly implementing and utilizing 
electronic TWIC inspection programs.
    Description of the Respondents: The respondents are owners and 
operators of certain vessel and facilities regulated by the Coast Guard 
under 33 CFR Chapter I, subchapter H.
    Number of Respondents: The number of respondents is the 525 
facilities that are considered ``high-risk'' and would be required to 
modify their existing FSPs, and 1 vessel that would be required to 
modify its VSP to account for the electronic TWIC inspection 
requirements. These same populations will be required to create and 
maintain recordkeeping systems as well.
    Frequency of Response: The FSP and VSP would need to be amended 
within 2 years of promulgation to include TWIC reader-related 
procedures. Recordkeeping requirements will need to be met along a 
similar timeline.
    Burden of Response: The estimated burden for facilities would be 
17,063 hours in the first year, 17,063 hours in the second year and 
3,150 hours in the third year and all subsequent years. The burden for 
vessels would be 65 burden

[[Page 57706]]

hours in year one, and 6 burden hours for all subsequent years. This 
includes an estimated 25 burden hours to amend the FSP or VSP, along 
with an implementation period burden of 40 hours and an annual burden 
of 6 hours for designing and maintaining a system of records for each 
facility or vessel, to include recordkeeping related to the list of 
cancelled TWICs.
Estimate of Total Annual Burden
    Facilities: The estimated burden over the 2-year implementation 
period for facilities is 25 hours per FSP amendment. Since there are 
currently 525 facilities that will need to amend their FSPs, the total 
burden on facilities would be 13,125 hours (525 FSPs x 25 hours per 
amendment) during the 2-year implementation period, or 6,563 hours each 
of the first 2 years. Facilities would also face a recordkeeping burden 
of 21,000 hours during the 2-year implementation period (525 facilities 
x 40 hours per recordkeeping system), or 10,500 hours each year over 
the first 2 years. There would also be an annual recordkeeping burden 
of 3,150 hours (525 facilities x 6 hours per year), starting in the 
third year. In the second year, the 262 facilities that implemented in 
the first year would incur the 6 hours of annual recordkeeping, at a 
burden of 1,572 (262 facilities x 6 hours). The total burden for 
facilities is estimated at 17,063 (6,563 + 10,500) in Year 1, 17,063 in 
Year 2 (6,563 + 10,500), and 3,150 in Year 3.
    Vessels: For the 1 vessel, the burden in the first year would be 25 
hours (1 VSP x 25 hour per amendment). Vessels would also face a 
recordkeeping burden of 40 hours during the 1-year implementation 
period (1 vessel x 40 hours per recordkeeping system). There would also 
be an annual recordkeeping burden of 6 hours, starting in Year 2, (1 
vessel x 6 hours per year). The total burden for vessels is estimated 
at 65 (25 + 40) in Year 1 and 6 hours in Years 2 and 3.
    Total: The total additional burden due to the electronic TWIC 
inspection rule is estimated at 17,128 (65 for vessels and 17,063 for 
facilities) in Year 1, 17,069 (6 for vessel and 17,063 for facilities) 
in Year 2, and 3,156 (6 for vessels and 3,150 for facilities) in Year 
3. The current annual burden listed in this collection of information 
is 1,108,043. The new burden, as a result of this final rule, in Year 1 
is 1,125,171 (1,108,043 + 17,128). In Year 2, the new burden, as a 
result of this final rule, is 1,125,171 (1,108,043 + 17,128) and in 
Year 3 it is 1,111,199 (1,108,043 + 3,156). The average annual 
additional burden across the 3 years is 12,425.
    As required by the Paperwork Reduction Act of 1995 (44 U.S.C. 
3507(d)), we have submitted a copy of this final rule to OMB for its 
review of the collection of information.

E. Federalism

    A rule has implications for Federalism under E.O. 13132, 
Federalism, if it has a substantial direct effect on the States, on the 
relationship between the national government and the States, or on the 
distribution of power and responsibilities among the various levels of 
government. This final rule has been analyzed in accordance with the 
principles and criteria in E.O. 13132, and it has been determined that 
this final rule does have Federalism implications or a substantial 
direct effect on the States.
    This final rule would update existing regulations by creating a 
risk-based analysis of MTSA-regulated vessels and facilities. Based on 
this analysis, each vessel or facility is classified according to its 
risk level, which then determines whether the vessel or facility will 
be required to use TWIC readers. Additionally, this final rule will 
amend recordkeeping requirements and add requirements to amend security 
plans in order to ensure compliance.
    It is well-settled that States may not regulate in categories 
reserved for regulation by the Coast Guard. It is also well-settled, 
now, that all of the categories covered in 46 U.S.C. 3306, 3703, 7101, 
and 8101 (design, construction, alteration, repair, maintenance, 
operation, equipping, personnel qualification, and manning of vessels), 
as well as the reporting of casualties and any other category in which 
Congress intended the Coast Guard to be the sole source of a vessel's 
obligations, are within fields foreclosed from regulation by the States 
or local governments. (See the decision of the Supreme Court in the 
consolidated cases of United States v. Locke and Intertanko v. Locke, 
529 U.S. 89, 120 S.Ct. 1135 (March 6, 2000)).
    The Coast Guard believes the Federalism principles articulated in 
Locke apply to this final rule since it will require certain MTSA-
regulated vessels to carry TWIC readers or a PACS that can conduct 
electronic TWIC inspection (i.e., required equipment), and to conform 
to recordkeeping and security plan requirements. In enacting MTSA, 
Congress articulated a need to address nationwide port security threats 
while preserving the free flow of interstate and international maritime 
commerce. Congress identified enhancing global maritime security 
through implementing international security instruments as furthering 
this statutory purpose. MTSA's comprehensive and uniform maritime 
security regime, founded on the purpose of facilitating interstate and 
international maritime commerce, indicates that States and local 
governments are generally foreclosed from regulating within this field. 
As discussed above, vessel equipping and operation are traditionally 
fields foreclosed from State and local regulation. However, States and 
local governments have traditionally shared certain regulatory 
jurisdiction over waterfront facilities. Therefore, MTSA standards 
contained in 33 CFR part 105 (Maritime security: Facilities) are not 
preemptive of State or local law or regulations that do not conflict 
with them (i.e., they would either actually conflict or would frustrate 
an overriding Federal need for uniformity).
    The Coast Guard recognizes the key role that State and local 
governments may have in making regulatory determinations. Additionally, 
Sections 4 and 6 of E.O. 13132 require that for any rules with 
preemptive effect, the Coast Guard provide elected officials of 
affected State and local governments and their representative national 
organizations the notice and opportunity for appropriate participation 
in any rulemaking proceedings, and consult with such officials early in 
the rulemaking process. Therefore, we invited affected State and local 
governments and their representative national organizations to indicate 
their desire for participation and consultation in this rulemaking 
process by submitting comments to the NPRM.
    Numerous State and local governments responded to the Coast Guard's 
invitation by actively participating in this rulemaking process. State 
and local government interests participated by submitting written 
comments and by attending and presenting their views in person at four 
public meetings we held across the country to solicit comments on this 
rulemaking. All comments have been posted to the docket for this 
rulemaking. Participating State and local government interests 
included: Alaska Marine Highway System; American Association of Port 
Authorities; Broward County, Florida Port Everglades Department; 
Calhoun Port Authority; King County, Washington Department of 
Transportation; New York City Department of Transportation; Port 
Authority of New York and New Jersey; Port of Galveston; Port of 
Houston Authority; Port of Seattle; Port of Stockton; Port of Tacoma; 
and

[[Page 57707]]

Washington State Department of Transportation. We considered this State 
and local government input in the promulgation of this final rule, and 
multiple changes to the final rule are attributable to these comments. 
Based on these consultations and the content of the final rule, we can 
ensure that the final rule is consistent with the fundamental 
federalism principles and preemption requirements described in E.O. 
13132.

F. Unfunded Mandates Reform Act

    The Unfunded Mandates Reform Act of 1995, 2 U.S.C. 1531-1538, 
requires Federal agencies to assess the effects of their discretionary 
regulatory actions. In particular, the Act addresses actions that may 
result in the expenditure by a State, local, or tribal government, in 
the aggregate, or by the private sector of $100,000,000 (adjusted for 
inflation) or more in any one year. Though this rule will not result in 
such an expenditure, we do discuss the effects of this rule elsewhere 
in this preamble.

G. Taking of Private Property

    This rule will not cause a taking of private property or otherwise 
have taking implications under E.O. 12630 (``Governmental Actions and 
Interference with Constitutionally Protected Property Rights'').

H. Civil Justice Reform

    This rule meets applicable standards in sections 3(a) and 3(b)(2) 
of E.O. 12988, (``Civil Justice Reform''), to minimize litigation, 
eliminate ambiguity, and reduce burden.

I. Protection of Children

    We have analyzed this rule under E.O. 13045 (``Protection of 
Children from Environmental Health Risks and Safety Risks''). Though 
this rule is a ``significant regulatory action'' under E.O. 12866, it 
does not create an environmental risk to health or risk to safety that 
might disproportionately affect children.

J. Indian Tribal Governments

    This rule does not have tribal implications under E.O. 13175 
(``Consultation and Coordination with Indian Tribal Governments''), 
because it would not have a substantial direct effect on one or more 
Indian tribes, on the relationship between the Federal Government and 
Indian tribes, or on the distribution of power and responsibilities 
between the Federal Government and Indian tribes.

K. Energy Effects

    We have analyzed this rule under E.O. 13211 (``Actions Concerning 
Regulations That Significantly Affect Energy Supply, Distribution, or 
Use''). We have determined that it is not a ``significant energy 
action'' under E.O. 13211, because although it is a ``significant 
regulatory action'' under E.O. 12866, it is not likely to have a 
significant adverse effect on the supply, distribution, or use of 
energy, and the Administrator of OMB's Office of Information and 
Regulatory Affairs has not designated it as a significant energy 
action.

L. Technical Standards

    The National Technology Transfer and Advancement Act (NTTAA), 
codified as a note to 15 U.S.C. 272, directs agencies to use voluntary 
consensus standards in their regulatory activities unless the agency 
provides Congress, through OMB, with an explanation of why using these 
standards would be inconsistent with applicable law or otherwise 
impractical. Voluntary consensus standards are technical standards 
(e.g., specifications of materials, performance, design, or operation; 
test methods; sampling procedures; and related management systems 
practices) that are developed or adopted by voluntary consensus 
standards bodies.
    This final rule does not use technical standards. Therefore, we did 
not consider the use of voluntary consensus standards.
    The Federal government is constantly working on improving 
electronic TWIC inspection standards. Under NTTAA and OMB Circular A-
119, NIST is tasked with the role of encouraging and coordinating 
Federal agency use of voluntary consensus standards and participation 
in the development of relevant standards, as well as promoting 
coordination between the public and private sectors in the development 
of standards and in conformity assessment activities. NIST and TSA have 
established the QTL and the associated standards for identity and 
privilege credential products, to be managed by TSA. NIST continues to 
assist TSA with the development of testing suites for qualifying 
products in conformity to specified standards and TSA specifications.

M. Environment

    We have analyzed this rule under Department of Homeland Security 
Management Directive 023-01 and Commandant Instruction M16475.lD, which 
guide the Coast Guard in complying with the National Environmental 
Policy Act of 1969, 42 U.S.C. 4321-4370f, and have concluded that this 
action is not likely to have a significant effect on the human 
environment. A Final Programmatic Environmental Assessment and a final 
Finding of No Significant Impact are available in the docket for this 
rulemaking. Our analysis indicates that electronic TWIC inspection 
operations will have insignificant direct, indirect or cumulative 
impacts on environmental resources, with special attention to potential 
air quality issues.

List of Subjects

33 CFR Parts 101 and 103

    Harbors, Incorporation by reference, Maritime security, Reporting 
and recordkeeping requirements, Security measures, Vessels, Waterways.

33 CFR Part 104

    Maritime security, Reporting and recordkeeping requirements, 
Security measures, Vessels.

33 CFR Part 105

    Maritime security, Reporting and recordkeeping requirements, 
Security measures.

33 CFR Part 106

    Continental shelf, Maritime security, Reporting and recordkeeping 
requirements, Security measures.

    For the reasons discussed in the preamble, the Coast Guard amends 
33 CFR parts 101, 103, 104, 105, and 106 as follows:

PART 101--MARITIME SECURITY: GENERAL

0
1. The authority citation for part 101 continues to read as follows:

    Authority:  33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50 
U.S.C. 191, 192; Executive Order 12656, 3 CFR 1988 Comp., p. 585; 33 
CFR 1.05-1, 6.04-11, 6.14, 6.16, and 6.19; Department of Homeland 
Security Delegation No. 0170.1.


0
2. Amend Sec.  101.105 as follows:
0
a. Add the definitions, in alphabetical order, of ``biometric match''; 
``Canceled Card List (CCL)''; ``Card Holder Unique Identifier 
(CHUID)''; ``card validity check''; ``Designated Recurring Access Area 
(DRAA)''; ``electronic TWIC inspection''; ``identity verification''; 
``Mobile Offshore Drilling Unit (MODU)''; ``Non-TWIC visual identity 
verification;'' ``Offshore Supply Vessel (OSV)''; ``Physical Access 
Control System (PACS)''; ``Qualified Reader''; ``Risk Group''; 
``Transparent Reader''; ``TWIC reader''; and ``visual TWIC 
inspection''; and

[[Page 57708]]

0
b. Revise the definitions of ``bulk or in bulk''; ``recurring 
unescorted access''; and ``TWIC Program''.
    The revisions and additions read as follows:


Sec.  101.105  Definitions.

* * * * *
    Biometric match means a confirmation that: One of the two biometric 
templates stored in the Transportation Worker Identification Credential 
(TWIC) matches the scanned biometric template of the person presenting 
the TWIC; or the alternate biometric stored in a Physical Access 
Control System (PACS) matches the corresponding biometric of the 
person.
* * * * *
    Bulk or in bulk means a commodity that is loaded or carried without 
containers or labels, and that is received and handled without mark or 
count. This includes cargo transferred using hoses, conveyors, or 
vacuum systems.
* * * * *
    Canceled Card List (CCL) is a list of Federal Agency Smart 
Credential-Numbers (FASC-Ns) that have been invalidated or revoked 
because TSA has determined that the TWIC-holder may pose a security 
threat, or the card has been reported lost, stolen, or damaged.
* * * * *
    Card Holder Unique Identifier (CHUID) means the standardized data 
object comprised of the FASC-N, globally unique identifier, expiration 
date, and certificate used to validate the data integrity of other data 
objects on the credential.
    Card validity check means electronic verification that the TWIC has 
not been invalidated or revoked by checking the TWIC against the TSA-
supplied list of cancelled TWICs or, for vessels and facilities not in 
Risk Group A, by verifying that the expiration date on the face of the 
TWIC has not passed.
* * * * *
    Designated Recurring Access Area (DRAA) means an area designated 
under Sec.  101.555 where persons are permitted recurring access to a 
secure area of a vessel or facility.
* * * * *
    Electronic TWIC inspection means the process by which the TWIC is 
authenticated, validated, and the individual presenting the TWIC is 
matched to the stored biometric template.
* * * * *
    Identity verification means the process by which an individual 
presenting a TWIC is verified as the owner of the TWIC.
* * * * *
    Mobile Offshore Drilling Unit (MODU) means the same as defined in 
33 CFR 140.10.
* * * * *
    Non-TWIC visual identity verification means the process by which an 
individual who is known to have been granted unescorted access to a 
secure area on a vessel or facility is matched to the picture on the 
facility's PACS card or a government-issued identification card.
* * * * *
    Offshore Supply Vessel (OSV) means the same as defined in 46 CFR 
125.160.
* * * * *
    Physical Access Control System (PACS) means a system that includes 
devices, personnel, and policies, that controls access to and within a 
facility or vessel.
* * * * *
    Qualified Reader means an electronic device listed on TSA's 
Qualified Technology List that is capable of reading a TWIC.
    Recurring unescorted access refers to special access procedures 
within a DRAA where a person may enter a secure area without passing an 
electronic TWIC inspection prior to each entry into the secure area.
* * * * *
    Risk Group means the risk ranking assigned to a vessel, facility, 
or OCS facility according to Sec. Sec.  104.263, 105.253, or 106.258 of 
this subchapter, for the purpose of TWIC requirements in this 
subchapter.
* * * * *
    Transparent Reader means a device capable of reading the 
information from a TWIC or individual seeking access and transmitting 
it to a system capable of conducting electronic TWIC inspection.
* * * * *
    TWIC Program means those procedures and systems that a vessel, 
facility, or outer continental shelf (OCS) facility must implement in 
order to assess and validate TWICs when maintaining access control.
    TWIC reader means a device capable of conducting an electronic TWIC 
inspection.
* * * * *
    Visual TWIC inspection means the process by which the TWIC is 
authenticated, validated, and the individual presenting the TWIC is 
matched to the photograph on the face of the TWIC.
* * * * *

0
3. Add Sec.  101.112 to read as follows:


Sec.  101.112  Federalism.

    (a) The regulations in 33 CFR parts 101, 103, 104, and 106 have 
preemptive effect over State or local regulation within the same field.
    (b) The regulations in 33 CFR part 105 have preemptive effect over 
State or local regulations insofar as a State or local law or 
regulation applicable to the facilities covered by part 105 would 
conflict with the regulations in part 105, either by actually 
conflicting or by frustrating an overriding Federal need for 
uniformity.


Sec.  101.514  [Amended]

0
4. Amend Sec.  101.514 as follows:
0
a. In paragraph (b), remove the word ``federal'' and add, in its place, 
the word ``Federal''; and
0
b. In paragraph (d), remove the word ``State,'' and add, in its place, 
the word ``State''.

0
5. Amend Sec.  101.515 as follows:
0
a. In paragraph (a), remove the words ``of this part shall be required 
to'' and add, in their place, the words ``must'';
0
 b. In paragraph (b)(1), remove the words ``of behalf'' and add, in 
their place, the words ``on behalf'';
0
c. In paragraph (c), remove the words ``of this part''; and
0
 d. Revise paragraph (d)(2).
    The revision reads as follows:


Sec.  101.515  TWIC/Personal Identification.

* * * * *
    (d)* * *
    (2) Each person who has been issued or possesses a TWIC must pass 
an electronic TWIC inspection, and must submit his or her reference 
biometric, such as a fingerprint, and any other required information, 
such as a Personal Identification Number, upon a request from TSA, the 
Coast Guard, any other authorized DHS representative, or a Federal, 
State, or local law enforcement officer.

0
6. Add Sec.  101.520 to subpart E to read as follows:


Sec.  101.520  Electronic TWIC inspection.

    To conduct electronic TWIC inspection, the owner or operator of a 
vessel or facility must ensure the following actions are performed.
    (a) Card authentication. The TWIC must be authenticated by 
performing a challenge/response protocol using the Certificate for Card 
Authentication (CCA) and the associated card authentication private key 
stored in the TWIC.
    (b) Card validity check. The TWIC must be checked to ensure the 
TWIC has not expired and against TSA's list of cancelled TWICs, and no 
match on the list may be found.
    (c) Identity verification. (1) One of the biometric templates 
stored in the TWIC must be matched to the TWIC-holder's

[[Page 57709]]

live sample biometric or, by matching to the PACS enrolled reference 
biometrics linked to the FASC-N of the TWIC; or
    (2) If an individual is unable to provide a valid live sample 
biometric, the TWIC-holder must enter a Personal Identification Number 
(PIN) and pass a visual TWIC inspection.

0
7. Add Sec.  101.525 to subpart E to read as follows:


Sec.  101.525  TSA list of cancelled TWICs.

    (a) At Maritime Security (MARSEC) Level 1, the card validity check 
must be conducted using information from the TSA that is no more than 7 
days old.
    (b) At MARSEC Level 2, the card validity check must be conducted 
using information from the TSA that is no more than 1 day old.
    (c) At MARSEC Level 3, the card validity check must be conducted 
using information from the TSA that is no more than 1 day old.
    (d) The list of cancelled TWICs used to conduct the card validity 
check must be updated within 12 hours of any increase in MARSEC level, 
no matter when the information was last updated.
    (e) Only the most recently obtained list of cancelled TWICs must be 
used to conduct card validity checks.

0
8. Add Sec.  101.530 to subpart E to read as follows:


Sec.  101.530  PACS requirements for Risk Group A.

    This section lays out requirements for a Physical Access Control 
System (PACS) that may be used to meet electronic TWIC inspection 
requirements.
    (a) A PACS may use a TWIC directly to perform electronic TWIC 
inspection;
    (b) Each PACS card issued to an individual must be linked to that 
individual's TWIC, and the PACS must contain the following information 
from each linked TWIC:
    (1) The name of the TWIC-holder holder as represented in the 
Printed Information container of the TWIC.
    (2) The TWIC-signed CHUID (with digital signature and expiration 
date).
    (3) The TWIC resident biometric template.
    (4) The TWIC digital facial image.
    (5) The PACS Personal Identification Number (PIN).
    (c) When first linked, a one-time electronic TWIC inspection must 
be performed, and the TWIC must be verified as authentic, valid, and 
biometrically matched to the individual presenting the TWIC.
    (d) Each time the PACS card is used to gain access to a secure 
area, the PACS must--
    (1) Conduct identity verification by:
    (i) Conducting a biometric scan, and match the result with the 
biometric template stored in the PACS that is linked to the TWIC, or
    (ii) Having the individual enter a stored PACS PIN and conducting a 
Non-TWIC visual identity verification as defined in Sec.  101.105.
    (2) Conduct a card validity check; and
    (3) Maintain records in accordance with Sec. Sec.  104.235(g) or 
105.225(g) of this subchapter, as appropriate.

0
9. Add Sec.  101.535 to subpart E to read as follows:


Sec.  101.535  Electronic TWIC inspection requirements for Risk Group 
A.

    Owners or operators of vessels or facilities subject to part 104 or 
105 of this subchapter, that are assigned to Risk Group A in Sec. Sec.  
104.263 or 105.253 of this subchapter, must ensure that a 
Transportation Worker Identification Credential (TWIC) Program is 
implemented as follows:
    (a) Requirements for Risk Group A vessels. Prior to each boarding 
of the vessel, all persons who require access to a secure area of the 
vessel must pass an electronic TWIC inspection before being granted 
unescorted access to the vessel.
    (b) Requirements for Risk Group A facilities. Prior to each entry 
into a secure area of the facility, all persons must pass an electronic 
TWIC inspection before being granted unescorted access to secure areas 
of the facility.
    (c) A Physical Access Control System that meets the requirements of 
Sec.  101.530 may be used to meet the requirements of this section.
    (d) The requirements of this section do not apply under certain 
situations described in Sec. Sec.  101.550 or 101.555.
    (e) Emergency access to secure areas, including access by law 
enforcement and emergency responders, does not require electronic TWIC 
inspection.

0
10. Add Sec.  101.540 to subpart E to read as follows:


Sec.  101.540  Electronic TWIC inspection requirements for vessels, 
facilities, and OCS facilities not in Risk Group A.

    A vessel or facility not in Risk Group A may use the electronic 
TWIC inspection requirements of Sec.  101.535 in lieu of visual TWIC 
inspection. If electronic TWIC inspection is used, the recordkeeping 
requirements of Sec. Sec.  104.235(b)(9) and (c) of this subchapter, or 
105.225(b)(9) and (c) of this subchapter, as appropriate, apply.


Sec.  101.545  [Added and Reserved]

0
 11. Add reserved Sec.  101.545 to subpart E.

0
 12. Add Sec.  101.550 to subpart E to read as follows:


Sec.  101.550  TWIC inspection requirements in special circumstances.

    Owners or operators of any vessel, facility, or Outer Continental 
Shelf (OCS) facility subject to part 104, 105, or 106 of this 
subchapter must ensure that a Transportation Worker Identification 
Credential (TWIC) Program is implemented as follows:
    (a) Lost, damaged, stolen, or expired TWIC. If an individual cannot 
present a TWIC because it has been lost, damaged, stolen, or expired, 
and the individual previously has been granted unescorted access to 
secure areas and is known to have had a TWIC, the individual may be 
granted unescorted access to secure areas for a period of no longer 
than 30 consecutive calendar days if--
    (1) The individual provides proof that he or she has reported the 
TWIC as lost, damaged, or stolen to the Transportation Security 
Administration (TSA) as required in 49 CFR 1572.19(f), or the 
individual provides proof that he or she has applied for the renewal of 
an expired TWIC;
    (2) The individual can present another identification credential 
that meets the requirements of Sec.  101.515; and
    (3) There are no other suspicious circumstances associated with the 
individual's claim that the TWIC was lost, damaged, or stolen.
    (b) TWIC on the Canceled Card List. In the event an individual 
reports his or her TWIC as lost, damaged, or stolen, and that TWIC is 
then placed on the Canceled Card List, the individual may be granted 
unescorted access by a Physical Access Control System (PACS) that meets 
the requirements of Sec.  101.530 for a period of no longer than 30 
days. The individual must be known to have had a TWIC, and known to 
have reported the TWIC as lost, damaged, or stolen to TSA.
    (c) Special requirements for Risk Group A vessels and facilities. 
If a TWIC reader or a PACS cannot read an individual's biometric 
templates due to poor biometric quality or no biometrics enrolled, the 
owner or operator may grant the individual unescorted access to secure 
areas based on either of the following secondary authentication 
procedures:
    (1) The owner or operator must conduct a visual TWIC inspection and 
require the individual to correctly submit his or her TWIC Personal 
Identification Number.
    (2) [Reserved]
    (d) If an individual cannot present a TWIC for any reason other 
than those

[[Page 57710]]

outlined in paragraphs (a) or (b) of this section, the vessel or 
facility operator may not grant the individual unescorted access to 
secure areas. The individual must be under escort at all times while in 
the secure area.
    (e) With the exception of individuals granted access according to 
paragraphs (a) or (b) of this section, all individuals granted 
unescorted access to secure areas of a vessel, facility, or OCS 
facility must be able to produce their TWICs upon request from the TSA, 
the Coast Guard, another authorized Department of Homeland Security 
representative, or a Federal, State, or local law enforcement officer.
    (f) There must be disciplinary measures in place to prevent fraud 
and abuse.
    (g) Owners or operators must establish the frequency of the 
application of any security measures for access control in their 
approved security plans, particularly if these security measures are 
applied on a random or occasional basis.
    (h) The vessel, facility, or OCS facility operator should 
coordinate the TWIC Program, when practical, with identification and 
TWIC access control measures of other entities that interface with the 
vessel, facility, or OCS facility.

0
13. Add Sec.  101.555 to subpart E to read as follows:


Sec.  101.555  Recurring Unescorted Access for Risk Group A vessels and 
facilities.

    This section describes how designated TWIC-holders may access 
certain secure areas on Risk Group A vessels and facilities on a 
continual and repeated basis without undergoing repeated electronic 
TWIC inspections.
    (a) An individual may enter a secure area on a vessel or facility 
without undergoing an electronic TWIC inspection under the following 
conditions:
    (1) Access is through a Designated Recurring Access Area (DRAA), 
designated under an approved Vessel, Facility, or Joint Vessel-Facility 
Security Plan.
    (2) The entire DRAA is continuously monitored by security personnel 
at the access points to secure areas used by personnel seeking 
Recurring Unescorted Access.
    (3) The individual possesses a valid TWIC.
    (4) The individual has passed an electronic TWIC inspection within 
each shift and in the presence of the on-scene security personnel.
    (5) The individual passes an additional electronic TWIC inspection 
prior to being granted unescorted access to a secure area if he or she 
enters an unsecured area outside the DRAA and then returns.
    (b) The following requirements apply to a DRAA:
    (1) It must consist of an unsecured area where personnel will be 
moving into an adjacent secure area repeatedly.
    (2) The entire DRAA must be visible to security personnel.
    (3) During operation as a DRAA, there must be security personnel 
present at all times.
    (c) An area may operate as a DRAA at certain times, and during 
other times, access to secure areas may be obtained through the 
procedures in Sec.  101.535.
    (d) Personnel may enter the secure areas adjacent to a DRAA at any 
time using the procedures in Sec.  101.535.

PART 103--MARITIME SECURITY: AREA MARITIME SECURITY

0
 14. The authority citation for part 103 continues to read as follows:

    Authority:  33 U.S.C. 1226, 1231; 46 U.S.C. 70102, 70103, 70104, 
70112; 50 U.S.C. 191; 33 CFR 1.05-1, 6.04-11, 6.14, 6.16, and 6.19; 
Department of Homeland Security Delegation No. 0170.1.


Sec.  103.505  [Amended]

0
15. Amend Sec.  103.505(f) by removing the words ``(e.g., TWIC)''.

PART 104--MARITIME SECURITY: VESSELS

0
 16. The authority citation for part 104 continues to read as follows:

    Authority:  33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50 
U.S.C. 191; 33 CFR 1.05-1, 6.04-11, 6.14, 6.16, and 6.19; Department 
of Homeland Security Delegation No. 0170.1.


Sec.  104.105  [Amended]

0
17. Amend Sec.  104.105(d) by removing the words ``this part'' and 
adding, in their place, the words ``parts 101 and 104 of this 
subchapter''.

0
18. Add Sec.  104.110(c) to read as follows:


Sec.  104.110  Exemptions.

* * * * *
    (c) Vessels with a minimum manning requirement of 20 or fewer TWIC-
holding crewmembers are exempt from the requirements in 33 CFR 
101.535(a)(1).

0
 19. Amend Sec.  104.115 as follows:
0
a. Revise paragraph (c); and
0
b. Remove paragraph (d).
    The revision reads as follows:


Sec.  104.115  Compliance.

* * * * *
    (c) By August 23, 2018, owners and operators of vessels subject to 
this part must amend their Vessel Security Plans to indicate how they 
will implement the TWIC requirements in this subchapter. By August 23, 
2018, owners and operators of vessels subject to this part must operate 
in accordance with the TWIC provisions found within this subchapter.


Sec.  104.120  [Amended]

0
20. Amend Sec.  104.120(a) introductory text by removing the words ``, 
on or before July 1, 2004,''.


Sec.  104.200  [Amended]

0
21. Amend Sec.  104.200 as follows:
0
a. In paragraph (b)(12) introductory text, remove the word ``part'' and 
add, in its place, the word ``subchapter''; and
0
 b. In paragraph (b)(14), remove the words ``Sec.  104.265(c) of this 
part'' and add, in their place, the words ``Sec.  101.550(a) of this 
subchapter''.


Sec.  104.215  [Amended]

0
22. Amend Sec.  104.215 as follows:
0
 a. In paragraph (b)(5), remove the second use of the word ``and'';
0
b. In paragraph (b)(6), remove the symbol ``.'' and add, in its place, 
the word ``; and''; and
0
 c. In paragraph (b)(7), after the word ``TWIC'', add the symbol ``.''.

0
23. Amend Sec.  104.235 as follows:
0
 a. In paragraph (b)(7), remove the second use of the word ``and'';
0
b. In paragraph (b)(8), remove the symbol ``.'' and add, in its place, 
the word ``; and'';
0
c. Add paragraph (b)(9); and
0
d. Revise paragraph (c).
    The addition and revision read as follows:


Sec.  104.235  Vessel recordkeeping requirements.

* * * * *
    (b) * * *
    (9) Electronic Reader/Physical Access Control System (PACS). For 
each individual granted unescorted access to a secure area, the: FASC-
N; date and time that unescorted access was granted; and, if captured, 
the individual's name. Additionally, documentation to demonstrate that 
the owner or operator has updated the Canceled Card List with the 
frequency required in Sec.  101.525 of this subchapter.
    (c) Any records required by this part must be protected from 
unauthorized access or disclosure. TWIC reader records and similar 
records in a PACS are sensitive security information and must be 
protected in accordance with 49 CFR part 1520.


Sec.  104.260  [Amended]

0
24. Amend Sec.  104.260(b) by removing the word ``shall'' wherever it 
appears

[[Page 57711]]

and adding in its place the word ``must''.

0
 25. Add Sec.  104.263 to read as follows:


Sec.  104.263  Risk Group classifications for vessels.

    (a) For purposes of the Transportation Worker Identification 
Credential requirements of this subchapter, the following vessels 
subject to this part are in Risk Group A:
    (1) Vessels that carry Certain Dangerous Cargoes in bulk.
    (2) Vessels certificated to carry more than 1,000 passengers.
    (3) Any vessel engaged in towing a vessel subject to paragraph 
(a)(1) or (a)(2) of this section.
    (b) Vessels may move from one Risk Group classification to another, 
based on the cargo they are carrying or handling at any given time. An 
owner or operator expecting a vessel to move between Risk Groups must 
explain, in the Vessel Security Plan, the timing of such movements, as 
well as how the vessel will move between the requirements of the higher 
and lower Risk Groups, with particular attention to the security 
measures to be taken moving from a lower Risk Group to a higher Risk 
Group.

0
26. Amend Sec.  104.265 as follows:
0
a. Revise paragraph (a)(4);
0
b. Remove paragraphs (c) and (d);
0
 c. Redesignate paragraphs (e) through (h) as (c) through (f), 
respectively;
0
 d. Revise newly redesignated paragraph (d)(1);
0
e. In newly redesignated paragraph (e)(6), remove the word ``and'';
0
f. In newly redesignated paragraph (e)(7), remove the symbol ``.'' and 
add, in its place, the word ``; or'';
0
g. Add paragraph (e)(8);
0
 h. In newly redesignated paragraph (f)(9), remove the word ``or'';
0
i. In newly redesignated paragraph (f)(10), remove the symbol ``.'' and 
add, in its place, the word ``; or''; and
0
j. Add paragraph (f)(11).
    The revisions and additions read as follows:


Sec.  104.265  Security measures for access control.

    (a) * * *
    (4) Prevent an unescorted individual from entering an area of the 
vessel that is designated as a secure area unless the individual holds 
a duly issued TWIC and is authorized to be in the area. Individuals 
seeking unescorted access to a secure area on a vessel in Risk Group A 
must pass electronic TWIC inspection and those seeking unescorted 
access to a secure area on a vessel not in Risk Group A must pass 
either electronic TWIC inspection or visual TWIC inspection.
* * * * *
    (d) * * *
    (1) Implement a TWIC Program as set out in subpart E of part 101 of 
this subchapter, as applicable, and in accordance with the vessel's 
assigned Risk Group, as set out in Sec.  104.263;
* * * * *
    (e) * * *
    (8) Implementing additional electronic TWIC inspection 
requirements, as required by Sec.  104.263, and by subpart E of part 
101 of this subchapter, if relevant.
* * * * *
    (f) * * *
    (11) Implementing additional electronic TWIC inspection 
requirements, as required by Sec.  104.263, and by subchapter E of part 
101 of this subchapter, if relevant.


Sec.  104.267  [Amended]

0
27. Amend Sec.  104.267(a) by removing the last sentence.


Sec.  104.292  [Amended]

0
28. Amend Sec.  104.292 as follows:
0
a. In paragraph (b) introductory text, remove the words ``Sec.  
104.265(f)(2), (f)(4), and (f)(9)'' and add, in their place, the words 
``Sec.  104.265(d)(2), (d)(4), and (d)(9)'', and remove the symbol 
``:'' and add, in its place, the symbol ``--'';
0
b. In paragraph (e)(3), remove the words ``Sec.  104.265(f)(4) and 
(g)(1)'' and add, in their place, the words ``Sec.  104.265(d)(4) and 
(e)(1)''; and
0
c. In paragraph (f), remove the words ``Sec.  104.265(f)(4) and 
(h)(1)'', and add, in their place, the words ``Sec.  104.265(d)(4) and 
(f)(1)''.

0
29. Amend Sec.  104.405 as follows:
0
a. Revise paragraph (a)(10); and
0
b. In paragraph (b), remove the last sentence.
    The revision reads as follows:


Sec.  104.405  Format of the Vessel Security Plan (VSP).

    (a) * * *
    (10) Security measures for access control, including the vessel's 
TWIC Program, designated passenger access areas and employee access 
areas;
* * * * *


Sec.  104.410  [Amended]

0
30. Amend Sec.  104.410 as follows:
0
a. In paragraph (a) introductory text, remove the words ``on or before 
December 31, 2003,'', and remove the symbol ``:'' and add, in its 
place, the symbol ``--'';
0
b. In paragraph (b), remove the words ``or by December 31, 2003, 
whichever is later''; and
0
c. In paragraph (c) introductory text, remove the symbol ``:'' and add, 
in its place, the symbol ``--''.

PART 105--MARITIME SECURITY: FACILITIES

0
31. The authority citation for part 105 continues to read as follows:

    Authority:  33 U.S.C. 1226, 1231; 46 U.S.C. 70103; 50 U.S.C. 
191; 33 CFR 1.05-1, 6.04-11, 6.14, 6.16, and 6.19; Department of 
Homeland Security Delegation No. 0170.1.

0
32. Revise Sec.  105.110 to read as follows:


Sec.  105.110  Exemptions.

    (a) A public access area designated under Sec.  105.106 is exempt 
from the requirements for screening of persons, baggage, and personal 
effects and identification of persons in subpart E of part 101 of this 
subchapter, as applicable, in Sec. Sec.  105.255 and Sec.  
105.285(a)(1).
    (b) An owner or operator of any general shipyard facility as 
defined in Sec.  101.105 of this subchapter is exempt from the 
requirements of this part unless the facility--
    (1) Is subject to parts 126, 127, or 154 of this chapter; or
    (2) Provides any other service to vessels subject to part 104 of 
this subchapter not related to construction, repair, rehabilitation, 
refurbishment, or rebuilding.
    (c) Public access facility. (1) The COTP may exempt a public access 
facility from the requirements of this part, including establishing 
conditions for which such an exemption is granted, to ensure that 
adequate security is maintained.
    (2) The owner or operator of any public access facility exempted 
under this section must--
    (i) Comply with any COTP conditions for the exemption; and
    (ii) Ensure that the cognizant COTP has the appropriate information 
for contacting the individual with security responsibilities for the 
public access facility at all times.
    (3) The cognizant COTP may withdraw the exemption for a public 
access facility at any time the owner or operator fails to comply with 
any requirement of the COTP as a condition of the exemption or any 
measure ordered by the COTP pursuant to existing COTP authority.
    (d) An owner or operator of a facility is not subject to this part 
if the facility receives only vessels to be laid-up, dismantled, or 
otherwise placed out of commission provided that the vessels are not 
carrying and do not receive cargo or passengers at that facility.

[[Page 57712]]

    (e) Barge fleeting facilities without shore side access are exempt 
from the requirements in 33 CFR 101.535(b)(1).

0
33. Revise Sec.  105.115 to read as follows:


Sec.  105.115  Compliance dates.

    (a) Facility owners or operators must submit to the cognizant 
Captain of the Port (COTP) for each facility--
    (1) The Facility Security Plan (FSP) described in subpart D of this 
part for review and approval; or
    (2) If intending to operate under an approved Alternative Security 
Program, a letter signed by the facility owner or operator stating 
which approved Alternative Security Program the owner or operator 
intends to use.
    (b) Facility owners or operators wishing to designate only those 
portions of their facility that are directly connected to maritime 
transportation or are at risk of being involved in a transportation 
security incident as their secure area(s) must do so by submitting an 
amendment to their FSP to their cognizant COTP, in accordance with 
Sec.  105.415.
    (c) By August 23, 2018, owners and operators of facilities subject 
to this part must amend their FSPs to indicate how they will implement 
the TWIC requirements in this subchapter. By August 23, 2018, owners 
and operators of facilities subject to this part must be operating in 
accordance with the TWIC provisions found within this subchapter.


Sec.  105.120  [Amended]

0
34. Amend the introductory text of Sec.  105.120 by removing the words 
``, on or before July 1, 2004,''.


Sec.  105.200  [Amended]

0
35. Amend Sec.  105.200 as follows:
0
a. In paragraph (b) introductory text, remove the symbol ``:'' and add, 
in its place, the symbol ``--'';
0
b. In paragraph (b)(6), remove the word ``program'' and add, in its 
place, the word ``Program'', and remove the word ``part'' and add, in 
its place, the word ``subchapter'', and remove the symbol ``:'' and 
add, in its place, the symbol ``--'';
0
c. In paragraph (b)(15), remove the words ``section 105.255(c) of this 
part'' and add, in their place, the words ``Sec.  101.550 of this 
subchapter''; and
0
d. In paragraph (b)(16), remove the words ``of this part''.

0
36. Amend Sec.  105.225 as follows:
0
a. In paragraph (b)(7), remove the second use of the word ``and'';
0
b. In paragraph (b)(8), remove the symbol ``.'' and add, in its place, 
the word ``; and'';
0
c. Add paragraph (b)(9); and
0
d. Revise paragraph (c).
    The addition and revision read as follows:


Sec.  105.225  Facility recordkeeping requirements.

* * * * *
    (b) * * *
    (9) TWIC Reader/Physical Access Control System (PACS). For each 
individual granted unescorted access to a secure area, the: FASC-N; 
date and time that unescorted access was granted; and, if captured, the 
individual's name. Additionally, documentation to demonstrate that the 
owner or operator has updated the Canceled Card List with the frequency 
required in Sec.  101.525 of this subchapter.
    (c) Any record required by this part must be protected from 
unauthorized access or disclosure. Electronic reader records and 
similar records in a PACS are sensitive security information and must 
be protected in accordance with 49 CFR part 1520.

0
37. Add Sec.  105.253 to read as follows:


Sec.  105.253  Risk Group classifications for facilities.

    (a) For purposes of the Transportation Worker Identification 
Credential (TWIC) requirements of this subchapter, the following 
facilities subject to this part are in Risk Group A:
    (1) Facilities that handle Certain Dangerous Cargoes (CDC) in bulk 
or receive vessels carrying CDC in bulk.
    (2) Facilities that receive vessels certificated to carry more than 
1,000 passengers.
    (b) Facilities may move from one Risk Group classification to 
another, based on the material they handle or the types of vessels they 
receive at any given time. An owner or operator of a facility expected 
to move between Risk Groups must explain, in the Facility Security 
Plan, the timing of such movements, as well as how the facility will 
move between the requirements of the higher and lower Risk Groups, with 
particular attention to the security measures to be taken when moving 
from a lower Risk Group to a higher Risk Group.

0
38. Amend Sec.  105.255 as follows:
0
a. Revise paragraph (a)(4);
0
b. Remove paragraphs (c) and (d);
0
c. Redesignate paragraphs (e) through (h) as (c) through (f), 
respectively;
0
d. Revise newly redesignated paragraph (d)(1);
0
e. In newly redesignated paragraph (d)(4) introductory text, remove the 
word ``shall'' and add, in its place, the word ``must'';
0
f. In newly redesignated paragraph (d)(4)(vi), remove the words 
``paragraph (d) of this section'' and add, in their place, the words 
``subpart E of part 101 of this subchapter'';
0
g. In newly redesignated paragraph (e)(6), remove the word ``or'';
0
h. In newly redesignated paragraph (e)(7), remove the symbol ``.'' and 
add, in its place, the word ``; or'';
0
i. Add paragraph (e)(8);
0
j. In newly redesignated paragraph (f)(8), remove the word ``or'';
0
k. In newly redesignated paragraph (f)(9), remove the symbol ``.'' and 
add, in its place, the word ``; or''; and
0
l. Add paragraph (f)(10).
    The revisions and additions read as follows:


Sec.  105.255  Security measures for access control.

    (a) * * *
    (4) Prevent an unescorted individual from entering an area of the 
facility that is designated as a secure area unless the individual 
holds a duly issued TWIC and is authorized to be in the area. 
Individuals seeking unescorted access to a secure area in a facility in 
Risk Group A must pass electronic TWIC inspection and those seeking 
unescorted access to a secure area in a facility not in Risk Group A 
must pass either electronic TWIC inspection or visual TWIC inspection.
* * * * *
    (d) * * *
    (1) Implement a TWIC Program as set out in subpart E of part 101 of 
this subchapter, as applicable, and in accordance with the facility's 
assigned Risk Group, as set out in Sec.  105.253.
* * * * *
    (e) * * *
    (8) Implementing additional electronic TWIC inspection 
requirements, as required by Sec.  105.253, and by subpart E of part 
101 of this subchapter, if relevant.
* * * * *
    (f) * * *
    (10) Implementing additional electronic TWIC inspection 
requirements, as required by Sec.  105.253, and by subchapter E of part 
101 of this subchapter, if relevant.


Sec.  105.257  [Amended]

0
39. Amend Sec.  105.257(a) by removing the last sentence.


Sec.  105.290  [Amended]

0
40. Amend Sec.  105.290(b) by removing the word ``shall'' and adding, 
in its place, the word ``must'', and by removing the words ``this 
part'' and adding, in their place, the words ``subpart E of part 101 of 
this subchapter''.

[[Page 57713]]

Sec.  105.296  [Amended]

0
41. Amend Sec.  105.296(a)(4) by removing the words ``Sec.  105.255 of 
this part'' and adding, in their place, the words ``subpart E of part 
101 of this subchapter, as applicable, and in accordance with the 
facility's assigned Risk Group, as described in Sec.  105.253''.

0
 42. Amend Sec.  105.405 as follows:
0
 a. Revise paragraph (a)(10); and
0
 b. In paragraph (b), remove the last sentence.
    The revision reads as follows:


Sec.  105.405  Format and content of the Facility Security Plan (FSP).

    (a) * * *
    (10) Security measures for access control, including the facility's 
TWIC Program and designated public access areas;
* * * * *


Sec.  105.410  [Amended]

0
43. Amend Sec.  105.410 as follows:
0
a. In paragraph (a) introductory text, remove the words ``On or before 
December 31, 2003, the'' and add, in their place, the word ``The''; and
0
b. In paragraph (b), remove the words ``or by December 31, 2003, 
whichever is later''.

PART 106--MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES

0
44. The authority citation for part 106 continues to read as follows:

    Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50 
U.S.C. 191; 33 CFR 1.05-1, 6.04-11, 6.14, 6.16, and 6.19; Department 
Of Homeland Security Delegation No. 0170.1.

0
45. Revise Sec.  106.110 to read as follows:


Sec.  106.110  Compliance dates.

    (a) OCS facility owners or operators must submit to the cognizant 
District Commander for each OCS facility--
    (1) The Facility Security Plan described in subpart D of this part 
for review and approval; or
    (2) If intending to operate under an approved Alternative Security 
Program, a letter signed by the OCS facility owner or operator stating 
which approved Alternative Security Program the owner or operator 
intends to use.
    (b) OCS facilities built on or after July 1, 2004 must submit a 
Facility Security Plan for approval 60 days prior to beginning 
operations.


Sec.  106.115  [Amended]

0
46. Amend the introductory text of Sec.  106.115 by removing the words 
``before July 1, 2004,''.


Sec.  106.200  [Amended]

0
47. Amend Sec.  106.200 as follows:
0
a. In paragraph (b)(6) introductory text, remove the word ``program'' 
and add, in its place, the word ``Program'', and remove the word 
``part'' and add, in its place, the word ``subchapter'';
0
b. In paragraph (b)(8), remove the word ``Level'' wherever it appears 
and add, in each place, the word ``level'';
0
 c. In paragraph (b)(9), after the word ``with'', add the words ``the 
requirements in''; and
0
d. In paragraph (b)(12), remove the words ``Sec.  106.260(c) of this 
part'' and add, in their place, the words ``Sec.  101.550 of this 
subchapter''.

0
48. Add Sec.  106.258 to read as follows:


Sec.  106.258  Risk Group classification for OCS facilities.

    For the purposes of this subchapter, no OCS facilities are 
considered Risk Group A.

0
 49. Amend Sec.  106.260 as follows:
0
a. Remove paragraphs (c) and (d);
0
b. Redesignate paragraphs (e) through (h) as (c) through (f), 
respectively;
0
c. Revise newly redesignated paragraph (d)(1);
0
 d. In newly redesignated paragraph (e)(3), remove the word ``or'';
0
e. In newly redesignated paragraph (e)(4), remove the symbol ``.'' and 
add, in its place, the word ``; or'';
0
 f. Add paragraph (e)(5);
0
 g. In newly redesignated paragraph (f)(7), remove the word ``or'';
0
 h. In newly redesignated paragraph (f)(8), remove the symbol ``.'' and 
add, in its place, the word ``; or''; and
0
 i. Add paragraph (f)(9).
    The revisions and additions read as follows:


Sec.  106.260  Security measures for access control.

* * * * *
    (d) * * *
    (1) Implement TWIC as set out in subpart E of part 101 of this 
subchapter and in accordance with the OCS facility's assigned Risk 
Group, as set out in Sec.  106.258.
* * * * *
    (e) * * *
    (5) Implementing additional electronic TWIC inspection 
requirements, as required by Sec.  106.258, and by subpart E of part 
101 of this subchapter.
    (f) * * *
    (9) Implementing additional electronic TWIC inspection 
requirements, as required by Sec.  106.258, and by subpart E of part 
101 of this subchapter.


Sec.  106.262  [Amended]

0
50. Amend Sec.  106.262(a) by removing the last sentence.
0
 51. Amend Sec.  106.405 as follows:

0
a. Revise paragraph (a)(10); and
0
b. In paragraph (b), remove the last sentence.
    The revision reads as follows:


Sec.  106.405  Format and content of the Facility Security Plan (FSP).

    (a) * * *
    (10) Security measures for access control, including the OCS 
facility's TWIC Program;
* * * * *


Sec.  106.410  [Amended]

0
52. Amend Sec.  106.410 as follows:
0
a. In paragraph (a) introductory text, remove the words ``On or before 
December 31, 2003, the'' and add, in their place, the word ``The'' and 
remove the symbol ``:'' and add, in its place, the symbol ``--''; and
0
 b. In paragraph (b), remove the words ``or by December 31, 2003, 
whichever is later''.

    Dated: August 8, 2016.
 Paul F. Zukunft,
Admiral, Commandant, U.S. Coast Guard.
[FR Doc. 2016-19383 Filed 8-22-16; 8:45 am]
 BILLING CODE 9110-04-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.