NRC Enforcement Policy, 78022-78028 [2016-26762]
Download as PDF
78022
Federal Register / Vol. 81, No. 215 / Monday, November 7, 2016 / Rules and Regulations
the rule is inappropriate. The other
comment contained general statements
and questions about dry cask storage
systems manufactured by Holtec and
used overseas, Independent Spent Fuel
Storage Installations, and the
infrastructure for the transportation of
spent fuel. The NRC determined that
this general comment about spent fuel
storage and transportation is not within
the scope of the direct final rule, which
is limited to the specific changes
contained in Amendment No. 2 to CoC
No. 1032. Therefore, because no
significant adverse comments were
received, the direct final rule will
become effective as scheduled. The final
CoC, Technical Specifications, and
Safety Evaluation Report can be viewed
in ADAMS under Accession No.
ML16280A008.
Dated: November 1, 2016.
For the Nuclear Regulatory Commission.
Cindy Bladey,
Chief, Rules, Announcements, and Directives
Branch, Division of Administrative Services,
Office of Administration.
[FR Doc. 2016–26775 Filed 11–4–16; 8:45 am]
BILLING CODE 7590–01–P
NUCLEAR REGULATORY
COMMISSION
10 CFR Chapter I
[NRC–2014–0221]
NRC Enforcement Policy
Nuclear Regulatory
Commission.
ACTION: Policy revision; issuance.
AGENCY:
The U.S. Nuclear Regulatory
Commission (NRC) is issuing a revision
to its Enforcement Policy (Policy) to
incorporate changes approved by the
Commission.
SUMMARY:
This revision is effective on
November 7, 2016. The NRC is not
soliciting comments on this revision to
its Policy at this time.
ADDRESSES: Please refer to Docket ID
NRC–2014–0221 when contacting the
NRC about the availability of
information regarding this document.
You may obtain publicly-available
information related to this document
using any of the following methods:
• Federal Rulemaking Web site: Go to
https://www.regulations.gov and search
for Docket ID NRC–2014–0221. Address
questions about NRC dockets to Carol
Gallagher: telephone: 301–415–3463;
email: Carol.Gallagher@nrc.gov. For
technical questions, contact the
individual listed in the FOR FURTHER
ehiers on DSK5VPTVN1PROD with RULES
DATES:
VerDate Sep<11>2014
11:32 Nov 04, 2016
Jkt 241001
section of this
document.
• NRC’s Agencywide Documents
Access and Management System
(ADAMS): You may obtain publiclyavailable documents online in the
ADAMS Public Documents collection
https://www.nrc.gov/reading-rm/
adams.html. To begin the search, select
‘‘ADAMS Public Documents’’ and then
select ‘‘Begin Web-based ADAMS
Search.’’ For problems with ADAMS,
please contact the NRC’s Public
Document Room (PDR) reference staff at
1–800–397–4209, 301–415–4737, or by
email to pdr.resource@nrc.gov. The
ADAMS accession number for each
document referenced in this document
(if that document is available in
ADAMS) is provided the first time that
a document is referenced.
• NRC’s PDR: You may examine and
purchase copies of public documents at
the NRC’s PDR, Room O1–F21, One
White Flint North, 11555 Rockville
Pike, Rockville, Maryland 20852.
The NRC maintains the Enforcement
Policy on its Web site at https://
www.nrc.gov: under the heading
‘‘Popular Documents,’’ select
‘‘Enforcement Actions,’’ then under
‘‘Enforcement’’ in the left side column,
select ‘‘Enforcement Policy.’’ The
revised Enforcement Policy is available
in ADAMS under Accession No.
ML16271A446.
FOR FURTHER INFORMATION CONTACT:
Gerry Gulla, Office of Enforcement, U.S.
Nuclear Regulatory Commission,
Washington, DC 20555–0001; telephone:
301–287–9143; email: Gerald.Gulla@
nrc.gov.
SUPPLEMENTARY INFORMATION:
INFORMATION CONTACT
I. Background
The mission of the NRC is to license
and regulate the Nation’s civilian use of
byproduct, source, and special nuclear
material to ensure adequate protection
of public health and safety, promote the
common defense and security, and
protect the environment. The NRC
supports this mission through its use of
its Policy. Adequate protection is
presumptively assured by compliance
with the NRC’s regulations, and the
Policy contains the basic procedures
used to assess and disposition apparent
violations of the NRC’s requirements.
The NRC initially published the
Policy in the Federal Register on
October 7, 1980 (45 FR 66754). Since its
initial publication, the Policy has been
revised on a number of occasions to
address changing requirements and
lessons learned. The most recent Policy
revision is dated August 1, 2016. That
revision reflects the new maximum civil
PO 00000
Frm 00002
Fmt 4700
Sfmt 4700
penalty amount that the NRC can assess
for a violation of the Atomic Energy Act
of 1954, as amended (AEA), or any
regulation or order issued under the
AEA.
This current revision to the Policy
incorporates lessons learned along with
miscellaneous clarifications and
additions. These revisions include a
rewrite of Section 6.13, ‘‘Information
Security,’’ to incorporate a riskinformed approach for assessing the
significance of information security
violations; the implementation of the
Construction Reactor Oversight Process
(cROP); and miscellaneous revisions to:
(1) The Glossary; (2) violation examples;
and (3) Section 2.3.4, ‘‘Civil Penalty.’’
The NRC provided an opportunity for
the public to comment on these Policy
revisions in a document published in
the Federal Register on October 9, 2014
(79 FR 61107). The Nuclear Energy
Institute (NEI) was the only stakeholder
that submitted comments (ADAMS
Accession No. ML14364A020).
II. Revisions to the Enforcement Policy
1. Construction Reactor Oversight
Process (cROP)
a. Table of Contents
The NRC is revising the Table of
Contents to incorporate the
implementation of the cROP into the
Policy. This requires a revision to the
titles of Sections 2.2.3 and 2.2.4. In
addition to the revision discussed
below, there are also other
miscellaneous cROP related reference
revisions throughout the Policy.
b. Section 2.2 ‘‘Assessment of
Violations’’
Section 2.2 is modified to include the
cROP, and remove the specificity which
allows for the use of the significance
determination process (SDP), not only
for facilities under construction, but for
independent spent fuel storage
installations when an SDP is developed.
Revision
After a violation is identified, the
NRC assesses its severity or significance
(both actual and potential). Under
traditional enforcement, the severity
level (SL) assigned to the violation
generally reflects the assessment of the
significance of a violation. For most
violations committed by power reactor
licensees, the significance of a violation
is assessed using the Reactor Oversight
Process (ROP) or the Construction
Reactor Oversight Process (cROP), as
discussed below in Section 2.2.3,
‘‘Assessment of Violations Identified
Under the ROP or cROP.’’ All other
violations at power reactors or power
E:\FR\FM\07NOR1.SGM
07NOR1
Federal Register / Vol. 81, No. 215 / Monday, November 7, 2016 / Rules and Regulations
reactor facilities under construction will
be assessed using traditional
enforcement as described in Section
2.2.4, ‘‘Using Traditional Enforcement
to Disposition Violations Identified at
Power Reactors.’’ Violations identified
at facilities that are not subject to an
ROP or cROP are assessed using
traditional enforcement.
c. Section 2.2.3 ‘‘Operating Reactor
Assessment Program’’
The NRC is revising this section to
add the implementation of the cROP
and will reference the NRC’s Inspection
Manual Chapter (IMC) 2505, ‘‘Periodic
Assessment of Construction Inspection
Program Results’’ (ADAMS Accession
No. ML14269A107). IMC 2505 describes
the construction assessment program
and IMC 0305, ‘‘Operating Reactor
Assessment Program,’’ describes the
ROP (ADAMS Accession No.
ML15089A315).
Revision
ehiers on DSK5VPTVN1PROD with RULES
2.2.3 Assessment of Violations
Identified Under the ROP or cROP
The assessment, disposition, and
subsequent NRC action related to
inspection findings identified at
operating power reactors are determined
by the ROP, as described in NRC
Inspection Manual Chapter (IMC) 0305,
‘‘Operating Reactor Assessment
Program,’’ and IMC 0612, ‘‘Power
Reactor Inspection Reports.’’ The
assessment, disposition, and subsequent
NRC action related to inspection
findings identified at power reactors
under construction are determined by
the cROP, as described in IMC 2505,
‘‘Periodic Assessment of Construction
Inspection Program Results’’ and in IMC
0613, ‘‘Power Reactor Construction
Inspection Reports.’’
Inspection findings identified through
the ROP are assessed for significance
using the SDP described in IMC 0609,
‘‘Significance Determination Process.’’
Inspection findings identified through
the cROP are assessed for significance
using the SDP described in IMC 2519,
‘‘Construction Significance
Determination Process.’’ The SDPs use
risk insights, where possible, to assist
the NRC staff in determining the
significance of inspection findings
identified within the ROP or cROP.
Inspection findings processed through
the SDP, including associated
violations, are documented in
inspection reports and are assigned one
of the following colors, depending on
their significance.
VerDate Sep<11>2014
11:32 Nov 04, 2016
Jkt 241001
d. Section 2.2.4 ‘‘Exceptions To Using
Only the Operating Reactor Assessment
Program’’
The NRC is revising this section to
add the implementation of the cROP
and will reference IMC 2505.
Revision
2.2.4 Using Traditional Enforcement to
Disposition Violations Identified at
Power Reactors
Some aspects of violations at power
reactors cannot be addressed solely
through the SDP. In these cases,
violations must be addressed separately
from any associated ROP or cROP
findings (when findings are present).
Accordingly, these violations are
assigned severity levels and can be
considered for civil penalties in
accordance with this Policy while the
significance of the associated ROP or
cROP finding (when present) must be
dispositioned in accordance with the
SDP. In determining the severity level
assigned to such violations, the NRC
will consider information in this Policy
and the violation examples in Section
6.0 of this Policy, as well as SDP-related
information, when available.
e. Section 2.2.6 ‘‘Construction’’
Section 2.2.6, ‘‘Construction,’’ will be
revised to provide clarifying guidance
regarding enforcement and the Changes
during Construction (CdC) Preliminary
Amendment Request (PAR) process. The
policy will now note that enforcement
actions will not be taken for
construction pursuant to a PAR NoObjection Letter, issued by the NRC,
even if that construction is outside of
the current licensing basis (CLB) while
a corresponding license amendment
request (LAR) is under review. This will
allow the licensee to continue
construction at-risk if the construction
is consistent with the associated LAR
and the No-Objection Letter. In
addition, this section will also be
revised to conform the policy to be
consistent with the revised regulations
promulgated by the NRC in ‘‘Licenses,
Certifications, and Approvals for
Materials Licenses’’ (76 FR 56951;
September 15, 2011).
Revision
2.2.6 Construction
In accordance with 10 CFR 50.10, no
person may begin the construction of a
production or utilization facility on a
site on which the facility is to be
operated until that person has been
issued either a construction permit
under 10 CFR part 50, a combined
license under 10 CFR part 52, an early
site permit authorizing the activities
PO 00000
Frm 00003
Fmt 4700
Sfmt 4700
78023
under 10 CFR 50.10(d), or a limited
work authorization under 10 CFR
50.10(d). In an effort to preclude
unnecessary regulatory burden on 10
CFR part 52 combined license holders
while maintaining safety, the Changes
during Construction (CdC) Preliminary
Amendment Request (PAR) process was
developed in Interim Staff Guidance
(ISG)–025, ‘‘Interim Staff Guidance on
Changes During Construction Under 10
CFR part 52.’’ The license condition
providing the option for a PAR as
detailed in ISG–025 allows the licensee
to request to make physical changes to
the plant that are consistent with the
scope of the associated license
amendment request (LAR). The NRC
staff may issue a No-Objection Letter
with or without specific limitations, in
response to the PAR. Enforcement
actions will not be taken for
construction pursuant to a PAR NoObjection Letter that is outside of the
Current Licensing Basis (CLB) while the
corresponding LAR is under review as
long as the construction is consistent
with the associated LAR and the NoObjection Letter (the latter of which may
contain limitations on construction
activities). The PAR No-Objection Letter
authorization is strictly conditioned on
the licensee’s commitment to return the
plant to its CLB if the requested LAR is
subsequently denied or withdrawn.
Failure to timely restore the CLB may be
subject to separate enforcement, such as
an order, a civil penalty, or both.
f. Section 2.3.1 ‘‘Minor Violation’’
This revision will remove redundant
language (IMC titles) from previously
identified IMCs and will add references
to examples of minor violation issues
found in IMCs 0613 and 0617.
Revision
Violations of minor safety or security
concern generally do not warrant
enforcement action or documentation in
inspection reports but must be
corrected. Examples of minor violations
can be found in the NRC Enforcement
Manual, IMC 0612, Appendix E,
‘‘Examples of Minor Issues,’’ IMC 0613,
Appendix E, ‘‘Examples of Minor
Construction Issues,’’ and IMC 0617,
Appendix E, ‘‘Minor Examples of
Vendor and Quality Assurance
Implementation Findings.’’ Provisions
for documenting minor violations can
be found in the NRC Enforcement
Manual, IMC 0610, IMC 0612, IMC
0613, IMC 0616, and IMC 0617.
g. Section 2.3.2 ‘‘Noncited Violation’’
This revision incorporates ‘‘plain
writing’’ into the Policy regarding
noncited violations. It will also revise
E:\FR\FM\07NOR1.SGM
07NOR1
78024
Federal Register / Vol. 81, No. 215 / Monday, November 7, 2016 / Rules and Regulations
the opening paragraph of Section 2.3.2
to be consistent with a previous
approved revision to this section
associated with crediting licensee
corrective action programs.
Revision
2.3.2
Noncited Violation
If a licensee or nonlicensee has
implemented a corrective action
program that is determined to be
adequate by the NRC, the NRC will
normally disposition SL IV violations
and violations associated with green
ROP or cROP findings as noncited
violations (NCVs) if all the criteria in
Paragraph 2.3.2.a. are met.
For licensees and nonlicensees that
are not credited by the NRC as having
adequate corrective action programs, the
NRC will normally disposition SL IV
violations and violations associated
with green ROP or cROP findings as
NCVs if all of the criteria in Paragraph
2.3.2.b are met. If the SL IV violation or
violation associated with Green ROP or
cROP finding was identified by the
NRC, the NRC will normally issue a
Notice of Violation.
Inspection reports or inspection
records document NCVs and briefly
describe the corrective action the
licensee or nonlicensee has taken or
plans to take, if known. Licensees and
nonlicensees are not required to provide
written responses to NCVs; however,
they may provide a written response if
they disagree with the NRC’s
description of the NCV or dispute the
validity of the NCV.
ehiers on DSK5VPTVN1PROD with RULES
2. Section 2.3.4 ‘‘Civil Penalty’’
Recent cases involving the willful
failure to file for reciprocity or to obtain
an NRC specific license have led to
discussions about the agency’s ability to
deter future noncompliance in these
areas and lessen the perceived potential
economic benefit of working in NRC
jurisdiction without the required
notification or license.
Although the Policy (Section 3.6,
‘‘Use of Discretion in Determining the
Amount of a Civil Penalty’’) allows the
NRC to exercise discretion to propose or
escalate a civil penalty for cases
involving willfulness, the NRC will add
clarifying language to Section 2.3.4,
‘‘Civil Penalty.’’ To aid in
implementation and ensure consistency,
the Enforcement Manual will include
specific guidance on the typical or
‘‘starting’’ civil penalty amount (e.g., 2
times the base civil penalty).
Revision
The following language appears in
Section 2.3.4 after the paragraph
VerDate Sep<11>2014
11:32 Nov 04, 2016
Jkt 241001
starting: ‘‘The NRC considers civil
penalties for violations . . .’’
For cases involving the willful failure
to either file for reciprocity or obtain an
NRC specific license, the NRC will
normally consider a civil penalty to
deter noncompliance for economic
benefit. Therefore, notwithstanding the
normal civil penalty assessment
process, in cases where there is any
indication (e.g., statements by company
employees regarding the nonpayment of
fees, previous violations of the
requirement including those not issued
by the NRC, or previous filings without
a significant change in management)
that the violation was committed for
economic gain, the NRC may exercise
discretion and impose a civil penalty.
The resulting civil penalty will
normally be no more than 3 times the
base civil penalty; however, the agency
may mitigate or escalate the amount
based on the merits of a specific case.
3. Addition of Section 3.10 ‘‘Reactor
Violations With No Performance
Deficiencies’’
The NRC is revising Section 2.2.4.d to
clarify that violations with no ROP
findings are dispositioned by using
traditional enforcement. Section 3.10,
‘‘Reactor Violations with No
Performance Deficiencies,’’ has been
added for NRC guidance to properly
disposition these violations. This
clarification involves no actual change
in policy.
Revisions
2.2.4.d: Violations not Associated With
ROP or cROP Findings
3.10 Reactor Violations With No
Performance Deficiencies
The NRC may exercise discretion for
violations of NRC requirements by
reactor licensees for which there are no
associated performance deficiencies
(e.g., a violation of a TS which is not a
performance deficiency).
4. Section 6.0 ‘‘Violation Examples’’
a. 6.3 ‘‘Materials Operations’’
Section 6.3, ‘‘Materials Operations,’’
of the Policy addresses the failure to
secure a portable gauge as required by
10 CFR 30.34(i). Specifically, under the
current Policy, paragraph 6.3.c.3, a
Severity Level (SL) III violation
example, states, ‘‘A licensee fails to
secure a portable gauge with at least two
independent physical controls
whenever the gauge is not under the
control and constant surveillance of the
licensee as required by 10 CFR
30.34(i).’’ Accordingly, a violation of 10
CFR 30.34(i) constitutes a SL III
violation for gauges having either no
PO 00000
Frm 00004
Fmt 4700
Sfmt 4700
security or one level of security. The SL
III significance is based largely on
licensees’ control of portable gauges to
reduce the opportunity for unauthorized
removal or theft and is the only example
currently provided in the Policy for this
type of violation.
When assessing the significance of a
violation involving the failure to secure
a portable gauge, the NRC considers that
both physical controls must be defeated
for the portable gauge to be removed.
This deters a theft by requiring a more
determined effort to remove the gauge.
Considering that there is a reduced risk
associated with having one barrier
instead of no barrier, the NRC has
determined that a graded approach is
appropriate for 10 CFR 30.34(i)
violations of lower significance.
Therefore, the NRC believes that failures
of one level of physical control to secure
portable gauges warrant a SL IV
designation. This graded approach was
piloted in Enforcement Guidance
Memoranda 11–004, dated April 28,
2011 (ADAMS Accession No.
ML111170601). After over 2 years of
monitoring, the NRC determined that
the addition of the SL IV example did
not increase the number of losses/thefts
reported. Therefore, the NRC is revising
violation example 6.3.c.3 and adding
violation example 6.3.d.10:
Revisions
6.3.c.3: Except as provided for in
section 6.3.d.10 of the policy, a licensee
fails to secure a portable gauge as
required by 10 CFR 30.34(i);
6.3.d.10: A licensee fails to secure a
portable gauge as required by 10 CFR
30.34(i), whenever the gauge is not
under the control and constant
surveillance of the licensee, where one
level of physical control existed and
there was no actual loss of material, and
that failure is not repetitive.
b. Section 6.5.c.4 and 5 SL III Violations
Involve, for Example
The NRC modifies these examples (4
and 5) to reference the appropriate
regulation governing changes to a
facility referencing a certified design
(i.e., 10 CFR 52.98). This regulation
refers to applicable change processes in
the applicable design certification rule,
which are currently contained in 10
CFR part 52, Appendix A–D.
Revisions
4. A licensee fails to obtain prior
Commission approval required by 10
CFR 50.59 or 10 CFR 52.98 for a change
that results in a condition evaluated as
having low-to-moderate or greater safety
significance; or
E:\FR\FM\07NOR1.SGM
07NOR1
Federal Register / Vol. 81, No. 215 / Monday, November 7, 2016 / Rules and Regulations
5. A licensee fails to update the FSAR
as required by 10 CFR 50.71(e), and the
FSAR is used to perform a 10 CFR 50.59
or 10 CFR 52.98 evaluation for a change
to the facility or procedures,
implemented without Commission
approval, that results in a condition
evaluated as having low-to-moderate or
greater safety significance.
c. Section 6.5.d.5 SL IV Violations
Involve, for Example
Example 6.5.d.5 was added to Section
6.9.d ‘‘Inaccurate and Incomplete
Information or Failure to Make a
Required Report.’’
d. Section 6.9 Inaccurate and
Incomplete Information or Failure to
Make a Required Report
Section 50.55(e)(3) requires holders of
a construction permit or combined
license (until the Commission makes the
finding under 10 CFR 52.103(g)) to
adopt procedures to evaluate deviations
and failures to comply to ensure
identification of defects and failures to
comply associated with substantial
safety hazards as soon as practicable.
This section is similar to the reporting
requirements of 10 CFR part 21. A SL
II violation example was added;
violation example 6.9.c.2.(a) was
deleted; and the reference to 10 CFR
50.55(e) was moved to the revised
6.9.c.5 examples.
Revisions
b. SL II Violations Involve, for Example
8. A deliberate failure to notify the
Commission as required by 10 CFR
50.55(e).
ehiers on DSK5VPTVN1PROD with RULES
c. SL III Violations Involve, for Example
2.(a) Deleted ‘‘failure to make required
notifications and reports pursuant to 10
CFR 50.55(e);’’
5. A failure to provide the notice
required by 10 CFR part 21 or 10 CFR
50.55(e), for example:
(a) An inadequate review or failure to
review such that, if an appropriate
review had been made as required, a 10
CFR part 21 or 10 CFR 50.55(e) report
would have been required; or
(b) A withholding of information or a
failure to make a required interim report
by 10 CFR 21.21, ‘‘Notification of
Failure to Comply or Existence of a
Defect and Its Evaluation,’’ or 10 CFR
50.55(e) occurs with careless disregard.
d. SL IV Violations Involve, for Example
12. A licensee fails to make an interim
report required by 10 CFR 21.21(a)(2) or
under 10 CFR 50.55(e);
13. Failure to implement adequate 10
CFR part 21 or 10 CFR 50.55(e)
processes or procedures that has more
VerDate Sep<11>2014
11:32 Nov 04, 2016
Jkt 241001
78025
than minor safety or security
significance; or
14. A materials licensee fails to . . .
6.14.a.2 and modifying violation
example 6.14.b.1.
e. Section 6.9 ‘‘Inaccurate and
Incomplete Information or Failure to
Make a Required Report’’
The NRC is removing the reference to
10 CFR 26.719(d) in violation example
6.9.c.2.(c) because 10 CFR 26.719(d) is
not a reporting requirement.
6.14.a.2: Deleted.
6.14.b.1: A licensee fails to remove an
individual from unescorted access
status when this person has been
involved in the sale, use, or possession
of illegal drugs within the protected
area, or a licensee fails to take action in
the case of an on-duty misuse of
alcohol, illegal drugs, prescription
drugs, or over-the-counter medications
or once the licensee identifies an
individual that appears to be impaired
or that their fitness is questionable, the
licensee fails to take immediate actions
to prevent the individual from
performing the duties that require him
or her to be subject to 10 CFR part 26;
Revision
6.9.c.2.(b): Failure to make any report
required by 10 CFR 73.71, ‘‘Reporting of
Safeguards Events,’’ or Appendix G,
‘‘Reportable Safeguards Events,’’ to 10
CFR part 73 ‘‘Physical Protection of
Plants and Materials,’’ or 10 CFR part
26, ‘‘Fitness-For-Duty Programs;’’
f. Section 6.11 ‘‘Reactor, Independent
Spent Fuel Storage Installation, Fuel
Facility, and Special Nuclear Material
Security’’
The current Policy examples for a SL
IV violation in Section 6.11.d are
focused on the loss of special nuclear
material (SNM) of low strategic
significance. The loss of SNM is too
narrow of a focus on the loss of material
and not the other aspects of the
Materials Control & Accountability
(MC&A) program that could be a
precursor to a loss of SNM. The Policy
should include an example for the
MC&A program at fuel facilities that
covers the reduction in the ability to
detect a loss or diversion of material
which could lead to a more significant
event. Therefore, the NRC is adding
violation example 6.11.d.3 as follows.
Violation Example
6.11.d.3: A licensee fails to comply
with an element of its material and
accounting program that results in a fuel
cycle facility procedure degradation
regarding adequate detection or
protection against loss, theft, or
diversion of SNM.
g. Section 6.14 ‘‘Fitness-For-Duty’’
Violation Example 6.14.a.2
The NRC is incorporating violation
example 6.14.a.2 into example 6.14.b.1.
An employee assistance program (EAP)
is one provision of many contained in
10 CFR part 26, subpart B, for which
6.14.a.1 applies. Therefore, the
‘‘severity’’ associated with an
inadequate EAP is significantly less
than that of a licensee not meeting ‘‘two
or more subparts of 10 CFR part 26.’’ An
ineffective implementation of an EAP
does not directly result in an immediate
safety or security concern and should
not represent a SL I violation. Therefore,
the NRC is deleting violation example
PO 00000
Frm 00005
Fmt 4700
Sfmt 4700
Revision
h. Section 6.14 ‘‘Fitness-For-Duty’’
Violation Example 6.14.b.2
In violation example 6.14.b.2, the
NRC is removing the language
‘‘unfitness for duty based on drug or
alcohol use.’’ Regulations in 10 CFR part
26 do not define unfitness and the
behavioral observation program is not
limited to drug and alcohol impairment.
Revision
6.14.b.2: A licensee fails to take action
to meet a regulation or a licensee
behavior observation program
requirement when observed behavior
within the protected area or credible
information concerning the activities of
an individual indicates impairment by
any substance, legal or illegal, or mental
or physical impaired from any cause,
which adversely affects their ability to
safely and competently perform their
duties.
i. Section 6.14 ‘‘Fitness-For-Duty’’
Violation Example 6.14.c.1
The NRC is revising violation
example 6.14.c.1 to encompass more
than positive drug and alcohol tests; it
should include other aspects of the
fitness-for-duty program such as
subversions.
Revision
6.14.c.1: A licensee fails to take the
required action for a person who has
violated the licensee’s Fitness-For-Duty
Policy, in cases that do not amount to
a SL II violation;
j. Section 6.14 ‘‘Fitness-For-Duty’’
Violation Example 6.14.c.5
Due to the revision to violation
example 6.14.b.1, the NRC is revising
violation example 6.14.c.5 to maintain a
graded approach method to its violation
example.
E:\FR\FM\07NOR1.SGM
07NOR1
Federal Register / Vol. 81, No. 215 / Monday, November 7, 2016 / Rules and Regulations
Revision
6.14.c.5: A licensee’s employee
assistance program (EAP) staff fails to
notify licensee management when the
EAP staff is aware that an individual’s
condition, based on the information
known at the time, may adversely affect
safety or security of the facility and the
failure to notify did not result in a
condition adverse to safety or security;
or
5. Section 6.13 ‘‘Information Security’’
The NRC is revising Section 6.13,
‘‘Information Security.’’ This revision
will replace the current examples,
which are based on the classification
levels of the information, with a riskinformed approach for assessing the
severity of information security
violations. This approach of evaluating
the severity of information security
violations by using a risk-informed
process is based on the totality of the
circumstances surrounding the
information security violation and will
more accurately reflect the severity of
these types of violations and improve
regulatory consistency.
This process is the result of lessons
learned from a number of violations that
ehiers on DSK5VPTVN1PROD with RULES
BILLING CODE 7590–01–C
significance of the disclosure as it
Step 1: Significance 1—Describes the
decision point to determine the
1 The
significance guidance provided in Step 1 is
only applicable within the context of the NRC’s
Enforcement Policy and its application. The
significance guidance is not intended to define the
‘‘harm’’ that an unauthorized disclosure of SECRET
VerDate Sep<11>2014
11:32 Nov 04, 2016
the NRC has processed over the last few
years based on varying significance
levels. This process will use a flow chart
and table approach, along with defined
terms.
Once a noncompliance is identified, a
four-step approach will be applied to
determine the severity level of the
violation. The four steps are: (1)
Determine the significance of the
information (i.e., high, moderate, or
low), (2) determine the extent of
disclosure (i.e., individual deemed
trustworthy and reliable, unknown
disclosure, or confirmed to an
unauthorized individual), (3) determine
the accessibility of the information (i.e.,
how limited was access to the
information), and (4) determine the
duration of the noncompliance (i.e.,
how long was the information
available).
Once all steps are completed, the user
will obtain a recommended severity
level for the violation. The staff
recognizes this approach as a change
from the traditional violation examples;
however, the process will be riskinformed and will consider the totality
of circumstances surrounding the
information disclosure. The risk-
Jkt 241001
or CONFIDENTIAL information is reasonably
expected to cause as those definitions are set forth
in Executive Order 13526, ‘‘Classified National
Security Information.’’ Nothing in section 6.13 of
the Enforcement Policy should be read to contradict
the National Policy on classified information.
PO 00000
Frm 00006
Fmt 4700
Sfmt 4700
informed approach to information
security violations adopted by the NRC
should not be read to contradict the
national policy on classified
information as set forth in Executive
Order 13526, ‘‘Classified National
Security Information.’’ This first
revision is located in the beginning of
the last paragraph of Section 4.3 of the
Policy. Two conforming revisions are
being made to Section 6.12 of the Policy
to delete examples that conflict with the
revised approach.
Revisions
a. Section 4.3 Civil Penalties to
Individuals
Section 6.13, ‘‘Information Security,’’
of this Policy provides a risk-informed
approach for assessing the significance
of information security violations.
b. Section 6.12 Materials Security
6.12.c.3: Deleted
6.12.d.10: Deleted
b. Violation example 6.13 Information
Security
BILLING CODE 7590–01–P
relates to national security and/or
common defense and security.
High Significance: The totality of
information disclosed provides a
significant amount of information about
a technology (i.e., key elements of a
technology or system) or combinations
of the following elements related to
E:\FR\FM\07NOR1.SGM
07NOR1
ER07NO16.008
78026
ehiers on DSK5VPTVN1PROD with RULES
Federal Register / Vol. 81, No. 215 / Monday, November 7, 2016 / Rules and Regulations
protective strategies: Response Strategy,
Target Sets, Physical Security Plan,
Contingency Plan or Integrated
Response Plan. The information can be
either SECRET or CONFIDENTIAL
(National Security or Restricted Data) or
Safeguards.
Moderate Significance: The totality of
information disclosed provides limited
information that may be useful to an
adversary about technology information
or physical security plan of a facility.
The information can be either SECRET
or CONFIDENTIAL (National Security
or Restricted Data), Safeguards, or
information requiring protection under
10 CFR part 37.
Low Significance: The totality of
information disclosed, taken by itself,
would not aid an adversary in gaining
information about a technology or
physical security plan of a facility. The
information can be either SECRET or
CONFIDENTIAL (National Security or
Restricted Data), Safeguards, or
information requiring protection under
10 CFR part 37.
Step 2: Disclosure—Describes the
decision point to determine if: (a) The
information was accessible to any
individual(s) via hard copy format or
electronic (e.g. computers) form, (b) you
can determine who the individual(s)
are, and (c) those individual(s) would
meet the definition of Trustworthy and
Reliable.
Trustworthy and Reliable (T&R): Are
characteristics of an individual
considered dependable in judgment,
character, and performance, such that
disclosure of information to that
individual does not constitute an
unreasonable risk to the public health
and safety or common defense and
security. A determination of T&R for
this purpose is based upon the results
from a background investigation or
background check in accordance with
10 CFR 37.5 or 10 CFR 73.2,
respectively. To meet the T&R
requirement, the individual must
possess a T&R determination before the
disclosure of the information, regardless
of the ‘‘need to know’’ determination.
Note: In accordance with 10 CFR 73.21
or 73.59, there are designated categories
of individuals that are relieved from
fingerprinting, identification and
criminal history checks and other
elements of background checks.
Unknown Disclosure: Instances when
controlled information has been
secured, protected, or marked
improperly but there is no evidence that
anyone has accessed the information
while it was improperly handled.
Confirmed: Instances where a person
who does not have authorization to
VerDate Sep<11>2014
11:32 Nov 04, 2016
Jkt 241001
access controlled information gains
access to the information.
Electronic Media/Confirmed: For
electronic media it is considered
confirmed once the information is no
longer on an approved network for that
type of information.
Unauthorized Individual: A person
who does not possess a T&R
determination and a need to know.
Step 3: Limited Access—Describes the
decision point to determine the amount
of controls (e.g., doors, locks, barriers,
firewalls, encryption levels) needed to
enter or gain access to an area or
computer system in order to obtain the
disclosed security information.
Hard Copy Format: A location
provides limited access if it meets all of
the following conditions:
a. The area was locked or had access
control measures, and;
b. individuals that frequented the area
were part of a known population, and;
c. records of personnel entry were
maintained to the area via key control
or key card access.
Electronic Media: A computer
network provides limited access if it
meets all of the following conditions:
a. The information is stored in a
location that is still within the licensee’s
computer network’s firewall, and
b. the licensee has some type of
control system in place which
delineates who can access the
information.
Step 4: Duration—Describes the
decision point in which a time period
determination is made regarding the
number of days the information was not
controlled properly in accordance with
the respective handling and storage
requirements of the security
information.
Long: Greater than or equal to 14 days
from the date of infraction to discovery
of the non-compliance.
Short: Less than 14 days from the date
of infraction to discovery of the noncompliance.
6. Glossary
a. Confirmatory Action Letter
Some agency procedures have not
consistently described all Confirmatory
Action Letter (CAL) recipients,
according to an audit of the NRC’s use
of CALs. To date, all affected procedures
have been revised to incorporate a
consistent definition with the exception
of the Policy. Therefore, the NRC is
revising the Glossary term CAL to
specifically state the recipients of a
CAL.
Revision
Confirmatory Action Letter (CAL) is a
letter confirming a licensee’s,
PO 00000
Frm 00007
Fmt 4700
Sfmt 4700
78027
contractor’s, or nonlicensee’s (subject to
NRC jurisdiction) voluntary agreement
to take certain actions to remove
significant concerns about health and
safety, safeguards, or the environment.
c. Interim Enforcement Policy
The term Interim Enforcement Policy
was added to the Glossary.
Revision
Interim Enforcement Policies (IEPs)
refers to a policy that is developed by
the NRC staff and approved by the
Commission for specific topics,
typically for a finite period. Generally,
IEPs grant the staff permission to refrain
from taking enforcement action for
generic issues which are not currently
addressed in the Policy and are
typically effective until such time that
formal guidance is developed and
implemented or other resolution to the
generic issue. IEPs can be found in
Section 9.0 of the Policy.
d. Traditional Enforcement
The NRC is revising the definition of
traditional enforcement for clarification
purposes.
Revision
Traditional Enforcement, as used in
this Policy, refers to the process for the
disposition of violations of NRC
requirements, including those that
cannot be addressed only through the
Operating Reactor Assessment Program.
Traditional enforcement violations are
assigned severity levels and typically
include, but may not be limited to, those
violations involving (1) actual safety
and security consequences, (2)
willfulness, (3) impeding the regulatory
process, (4) discrimination, (5)
violations not associated with ROP or
cROP findings, (6) materials regulations,
and (7) deliberate violations committed
by individuals.
7. Miscellaneous Corrections/
Modifications
Note: The page numbers cited
correspond with the newly revised
Enforcement Policy.
a. Page 8: Subject to the same
oversight as the regional offices, the
Directors of the Office of Nuclear
Reactor Regulation (NRR), the Office of
Nuclear Material Safety and Safeguards
(NMSS), the Office of New Reactors
(NRO), and the Office of Nuclear
Security and Incident Response (NSIR)
may also approve, sign, and issue
certain enforcement actions as delegated
by the Director, OE. The Director, OE,
has delegated authority to the Directors
of NRR, NMSS, NRO, and NSIR to issue
Orders not related to specific violations
E:\FR\FM\07NOR1.SGM
07NOR1
ehiers on DSK5VPTVN1PROD with RULES
78028
Federal Register / Vol. 81, No. 215 / Monday, November 7, 2016 / Rules and Regulations
of NRC requirements (i.e.,
nonenforcement-related Orders.)
b. Page 9: The NRC reviews each case
being considered for enforcement action
on its own merits to ensure that the
severity of a violation is characterized at
the level appropriate to the safety or
security significance of the particular
violation.
Whenever possible, the NRC uses risk
information in assessing the safety or
security significance of violations and
assigning severity levels. A higher
severity level may be warranted for
violations that have greater risk, safety,
or security significance, while a lower
severity level may be appropriate for
issues that have lower risk, safety, or
security significance.
c. Page 15: a. Licensees and
Nonlicensees with a credited Corrective
Action Program
d. Page 19: The flow chart (Figure 2)
is a graphic representation of the civil
penalty assessment process and should
be used in conjunction with the
narrative in this section.
e. Page 33: The NRC may refrain from
issuing an NOV for a SL II, III, or IV
violation that meets the above criteria,
provided that the violation was caused
by conduct that is not reasonably linked
to the licensee’s present performance
(normally, violations that are at least 3
years old or violations occurring during
plant construction) and that there had
not been prior notice so that the licensee
could not have reasonably identified the
violation earlier.
f. Page 34: In addition, the NRC may
refrain from issuing enforcement action
for violations resulting from matters not
within a licensee’s control, such as
equipment failures that were not
avoidable by reasonable licensee QA
measures or management controls (e.g.,
reactor coolant system leakage that was
not within the licensee’s ability to
detect during operation, but was
identified at the first available
opportunity or outage).
g. Page 43: 6.1.c.2 A system that is
part of the primary success path and
which functions or actuates to mitigate
a DBA or transient that either assumes
the failure of or presents a challenge to
the integrity of the fission product
barrier not being able to perform its
licensing basis safety function because it
is not fully qualified (per the IMC 0326,
‘‘Operability Determinations &
Functional Assessment for Conditions
Adverse to Quality or Safety’’) (e.g.,
materials or components not
environmentally qualified);
h. Page 43: 6.1.d.3 A licensee fails to
update the FSAR as required by 10 CFR
50.71(e) and the lack of up-to-date
VerDate Sep<11>2014
11:32 Nov 04, 2016
Jkt 241001
information has a material impact on
safety or licensed activities; or
i. Page 59: 6.7.d.3 ‘‘A radiation dose
rate in an unrestricted or controlled area
exceeds 0.002 rem (0.02 millisieverts) in
any 1 hour (2 mrem/hour) or 50 mrem
(0.5 mSv) in a year;’’
III. Procedural Requirements
Paperwork Reduction Act Statement
This policy statement does not
contain new or amended information
collection requirements subject to the
Paperwork Reduction Act of 1995 (44
U.S.C. 3501 et seq.). Existing
requirements were approved by the
Office of Management and Budget
(OMB), approval number 3150–0136.
Public Protection Notification
The NRC may not conduct or sponsor,
and a person is not required to respond
to, a request for information or an
information collection requirement
unless the requesting document
displays a currently valid OMB control
number.
Congressional Review Act
This policy is a rule as defined in the
Congressional Review Act (5 U.S.C 801–
808). However, the Office of
Management and Budget has not found
it to be a major rule as defined in the
Congressional Review Act.
Dated at Rockville, Maryland, this 1st day
of November, 2016.
For the Nuclear Regulatory Commission.
Annette L. Vietti-Cook,
Secretary of the Commission.
[FR Doc. 2016–26762 Filed 11–4–16; 8:45 am]
BILLING CODE 7590–01–P
NATIONAL CREDIT UNION
ADMINISTRATION
12 CFR Part 747
RIN 3133–AE59
Civil Monetary Penalty Inflation
Adjustment
National Credit Union
Administration (NCUA).
ACTION: Final rule.
AGENCY:
On June 21, 2016, the NCUA
Board (Board) published an interim
final rule amending its regulations to
adjust the maximum amount of each
civil monetary penalty (CMP) within its
jurisdiction to account for inflation.
This action, including the amount of the
adjustments, is required under the
Federal Civil Penalties Inflation
Adjustment Act of 1990, as amended by
the Debt Collection Improvement Act of
SUMMARY:
PO 00000
Frm 00008
Fmt 4700
Sfmt 4700
1996 and the Federal Civil Penalties
Inflation Adjustment Act Improvements
Act of 2015. This final rule confirms
those amendments while making a
clarification regarding the prospective
effect of the 2015 legislation.
DATES: Effective date: November 7,
2016.
Ian
Marenna, Senior Trial Attorney, at 1775
Duke Street, Alexandria, VA 22314, or
telephone: (703) 518–6540.
SUPPLEMENTARY INFORMATION:
FOR FURTHER INFORMATION CONTACT:
I. Background
II. Regulatory Procedures
I. Background
A. June 2016 Interim Final Rule
The Debt Collection Improvement Act
of 1996 1 (DCIA) amended the Federal
Civil Penalties Inflation Adjustment Act
of 1990 2 (FCPIA Act) to require every
federal agency to enact regulations that
adjust each CMP provided by law under
its jurisdiction by the rate of inflation at
least once every four years. In November
2015, Congress further amended the
CMP inflation requirements in the
Bipartisan Budget Act of 2015,3 which
contains the Federal Civil Penalties
Inflation Adjustment Act Improvements
Act of 2015 (the 2015 amendments).4
This legislation provides for an initial
‘‘catch-up’’ adjustment of CMPs in 2016,
followed by annual adjustments. The
catch-up adjustment re-sets CMP
maximum amounts by setting aside the
inflation adjustments that agencies
made in prior years and instead
calculating inflation with reference to
the year when each CMP was enacted or
last modified by Congress. For 2017 and
subsequent years, the Board will be
required to adjust maximum levels to
account for annual inflation.5
On June 21, 2016, in compliance with
the 2015 amendments, the Board
published an interim final rule with a
request for comments in the Federal
Register.6 In calculating the
adjustments, the Board reviewed and
applied government-wide guidance
issued by the Office of Management and
Budget (OMB).7 In accordance with the
1 Public Law 104–134, sec. 31001(s), 110 Stat.
1321–373 (Apr. 26, 1996). The law is codified at 28
U.S.C. 2461 note.
2 Public Law 101–410, 104 Stat. 890 (Oct. 5,
1990), also codified at 28 U.S.C. 2461 note.
3 Public Law 114–74, 129 Stat. 584 (Nov. 2, 2015).
4 129 Stat. 599.
5 Public Law 114–74, 129 Stat. 584 (Nov. 2, 2015).
6 81 FR 40152 (June 21, 2016).
7 Office of Mgmt. & Budget, Exec. Office of the
President, OMB Memorandum No. M–16–06,
Implementation of the Federal Civil Penalties
Inflation Adjustment Act Improvements Act of 2015
(2016).
E:\FR\FM\07NOR1.SGM
07NOR1
Agencies
[Federal Register Volume 81, Number 215 (Monday, November 7, 2016)]
[Rules and Regulations]
[Pages 78022-78028]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2016-26762]
-----------------------------------------------------------------------
NUCLEAR REGULATORY COMMISSION
10 CFR Chapter I
[NRC-2014-0221]
NRC Enforcement Policy
AGENCY: Nuclear Regulatory Commission.
ACTION: Policy revision; issuance.
-----------------------------------------------------------------------
SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is issuing a
revision to its Enforcement Policy (Policy) to incorporate changes
approved by the Commission.
DATES: This revision is effective on November 7, 2016. The NRC is not
soliciting comments on this revision to its Policy at this time.
ADDRESSES: Please refer to Docket ID NRC-2014-0221 when contacting the
NRC about the availability of information regarding this document. You
may obtain publicly-available information related to this document
using any of the following methods:
Federal Rulemaking Web site: Go to https://www.regulations.gov and search for Docket ID NRC-2014-0221. Address
questions about NRC dockets to Carol Gallagher: telephone: 301-415-
3463; email: Carol.Gallagher@nrc.gov. For technical questions, contact
the individual listed in the FOR FURTHER INFORMATION CONTACT section of
this document.
NRC's Agencywide Documents Access and Management System
(ADAMS): You may obtain publicly-available documents online in the
ADAMS Public Documents collection https://www.nrc.gov/reading-rm/adams.html. To begin the search, select ``ADAMS Public Documents'' and
then select ``Begin Web-based ADAMS Search.'' For problems with ADAMS,
please contact the NRC's Public Document Room (PDR) reference staff at
1-800-397-4209, 301-415-4737, or by email to pdr.resource@nrc.gov. The
ADAMS accession number for each document referenced in this document
(if that document is available in ADAMS) is provided the first time
that a document is referenced.
NRC's PDR: You may examine and purchase copies of public
documents at the NRC's PDR, Room O1-F21, One White Flint North, 11555
Rockville Pike, Rockville, Maryland 20852.
The NRC maintains the Enforcement Policy on its Web site at https://www.nrc.gov: under the heading ``Popular Documents,'' select
``Enforcement Actions,'' then under ``Enforcement'' in the left side
column, select ``Enforcement Policy.'' The revised Enforcement Policy
is available in ADAMS under Accession No. ML16271A446.
FOR FURTHER INFORMATION CONTACT: Gerry Gulla, Office of Enforcement,
U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001;
telephone: 301-287-9143; email: Gerald.Gulla@nrc.gov.
SUPPLEMENTARY INFORMATION:
I. Background
The mission of the NRC is to license and regulate the Nation's
civilian use of byproduct, source, and special nuclear material to
ensure adequate protection of public health and safety, promote the
common defense and security, and protect the environment. The NRC
supports this mission through its use of its Policy. Adequate
protection is presumptively assured by compliance with the NRC's
regulations, and the Policy contains the basic procedures used to
assess and disposition apparent violations of the NRC's requirements.
The NRC initially published the Policy in the Federal Register on
October 7, 1980 (45 FR 66754). Since its initial publication, the
Policy has been revised on a number of occasions to address changing
requirements and lessons learned. The most recent Policy revision is
dated August 1, 2016. That revision reflects the new maximum civil
penalty amount that the NRC can assess for a violation of the Atomic
Energy Act of 1954, as amended (AEA), or any regulation or order issued
under the AEA.
This current revision to the Policy incorporates lessons learned
along with miscellaneous clarifications and additions. These revisions
include a rewrite of Section 6.13, ``Information Security,'' to
incorporate a risk-informed approach for assessing the significance of
information security violations; the implementation of the Construction
Reactor Oversight Process (cROP); and miscellaneous revisions to: (1)
The Glossary; (2) violation examples; and (3) Section 2.3.4, ``Civil
Penalty.''
The NRC provided an opportunity for the public to comment on these
Policy revisions in a document published in the Federal Register on
October 9, 2014 (79 FR 61107). The Nuclear Energy Institute (NEI) was
the only stakeholder that submitted comments (ADAMS Accession No.
ML14364A020).
II. Revisions to the Enforcement Policy
1. Construction Reactor Oversight Process (cROP)
a. Table of Contents
The NRC is revising the Table of Contents to incorporate the
implementation of the cROP into the Policy. This requires a revision to
the titles of Sections 2.2.3 and 2.2.4. In addition to the revision
discussed below, there are also other miscellaneous cROP related
reference revisions throughout the Policy.
b. Section 2.2 ``Assessment of Violations''
Section 2.2 is modified to include the cROP, and remove the
specificity which allows for the use of the significance determination
process (SDP), not only for facilities under construction, but for
independent spent fuel storage installations when an SDP is developed.
Revision
After a violation is identified, the NRC assesses its severity or
significance (both actual and potential). Under traditional
enforcement, the severity level (SL) assigned to the violation
generally reflects the assessment of the significance of a violation.
For most violations committed by power reactor licensees, the
significance of a violation is assessed using the Reactor Oversight
Process (ROP) or the Construction Reactor Oversight Process (cROP), as
discussed below in Section 2.2.3, ``Assessment of Violations Identified
Under the ROP or cROP.'' All other violations at power reactors or
power
[[Page 78023]]
reactor facilities under construction will be assessed using
traditional enforcement as described in Section 2.2.4, ``Using
Traditional Enforcement to Disposition Violations Identified at Power
Reactors.'' Violations identified at facilities that are not subject to
an ROP or cROP are assessed using traditional enforcement.
c. Section 2.2.3 ``Operating Reactor Assessment Program''
The NRC is revising this section to add the implementation of the
cROP and will reference the NRC's Inspection Manual Chapter (IMC) 2505,
``Periodic Assessment of Construction Inspection Program Results''
(ADAMS Accession No. ML14269A107). IMC 2505 describes the construction
assessment program and IMC 0305, ``Operating Reactor Assessment
Program,'' describes the ROP (ADAMS Accession No. ML15089A315).
Revision
2.2.3 Assessment of Violations Identified Under the ROP or cROP
The assessment, disposition, and subsequent NRC action related to
inspection findings identified at operating power reactors are
determined by the ROP, as described in NRC Inspection Manual Chapter
(IMC) 0305, ``Operating Reactor Assessment Program,'' and IMC 0612,
``Power Reactor Inspection Reports.'' The assessment, disposition, and
subsequent NRC action related to inspection findings identified at
power reactors under construction are determined by the cROP, as
described in IMC 2505, ``Periodic Assessment of Construction Inspection
Program Results'' and in IMC 0613, ``Power Reactor Construction
Inspection Reports.''
Inspection findings identified through the ROP are assessed for
significance using the SDP described in IMC 0609, ``Significance
Determination Process.'' Inspection findings identified through the
cROP are assessed for significance using the SDP described in IMC 2519,
``Construction Significance Determination Process.'' The SDPs use risk
insights, where possible, to assist the NRC staff in determining the
significance of inspection findings identified within the ROP or cROP.
Inspection findings processed through the SDP, including associated
violations, are documented in inspection reports and are assigned one
of the following colors, depending on their significance.
d. Section 2.2.4 ``Exceptions To Using Only the Operating Reactor
Assessment Program''
The NRC is revising this section to add the implementation of the
cROP and will reference IMC 2505.
Revision
2.2.4 Using Traditional Enforcement to Disposition Violations
Identified at Power Reactors
Some aspects of violations at power reactors cannot be addressed
solely through the SDP. In these cases, violations must be addressed
separately from any associated ROP or cROP findings (when findings are
present). Accordingly, these violations are assigned severity levels
and can be considered for civil penalties in accordance with this
Policy while the significance of the associated ROP or cROP finding
(when present) must be dispositioned in accordance with the SDP. In
determining the severity level assigned to such violations, the NRC
will consider information in this Policy and the violation examples in
Section 6.0 of this Policy, as well as SDP-related information, when
available.
e. Section 2.2.6 ``Construction''
Section 2.2.6, ``Construction,'' will be revised to provide
clarifying guidance regarding enforcement and the Changes during
Construction (CdC) Preliminary Amendment Request (PAR) process. The
policy will now note that enforcement actions will not be taken for
construction pursuant to a PAR No-Objection Letter, issued by the NRC,
even if that construction is outside of the current licensing basis
(CLB) while a corresponding license amendment request (LAR) is under
review. This will allow the licensee to continue construction at-risk
if the construction is consistent with the associated LAR and the No-
Objection Letter. In addition, this section will also be revised to
conform the policy to be consistent with the revised regulations
promulgated by the NRC in ``Licenses, Certifications, and Approvals for
Materials Licenses'' (76 FR 56951; September 15, 2011).
Revision
2.2.6 Construction
In accordance with 10 CFR 50.10, no person may begin the
construction of a production or utilization facility on a site on which
the facility is to be operated until that person has been issued either
a construction permit under 10 CFR part 50, a combined license under 10
CFR part 52, an early site permit authorizing the activities under 10
CFR 50.10(d), or a limited work authorization under 10 CFR 50.10(d). In
an effort to preclude unnecessary regulatory burden on 10 CFR part 52
combined license holders while maintaining safety, the Changes during
Construction (CdC) Preliminary Amendment Request (PAR) process was
developed in Interim Staff Guidance (ISG)-025, ``Interim Staff Guidance
on Changes During Construction Under 10 CFR part 52.'' The license
condition providing the option for a PAR as detailed in ISG-025 allows
the licensee to request to make physical changes to the plant that are
consistent with the scope of the associated license amendment request
(LAR). The NRC staff may issue a No-Objection Letter with or without
specific limitations, in response to the PAR. Enforcement actions will
not be taken for construction pursuant to a PAR No-Objection Letter
that is outside of the Current Licensing Basis (CLB) while the
corresponding LAR is under review as long as the construction is
consistent with the associated LAR and the No-Objection Letter (the
latter of which may contain limitations on construction activities).
The PAR No-Objection Letter authorization is strictly conditioned on
the licensee's commitment to return the plant to its CLB if the
requested LAR is subsequently denied or withdrawn. Failure to timely
restore the CLB may be subject to separate enforcement, such as an
order, a civil penalty, or both.
f. Section 2.3.1 ``Minor Violation''
This revision will remove redundant language (IMC titles) from
previously identified IMCs and will add references to examples of minor
violation issues found in IMCs 0613 and 0617.
Revision
Violations of minor safety or security concern generally do not
warrant enforcement action or documentation in inspection reports but
must be corrected. Examples of minor violations can be found in the NRC
Enforcement Manual, IMC 0612, Appendix E, ``Examples of Minor Issues,''
IMC 0613, Appendix E, ``Examples of Minor Construction Issues,'' and
IMC 0617, Appendix E, ``Minor Examples of Vendor and Quality Assurance
Implementation Findings.'' Provisions for documenting minor violations
can be found in the NRC Enforcement Manual, IMC 0610, IMC 0612, IMC
0613, IMC 0616, and IMC 0617.
g. Section 2.3.2 ``Noncited Violation''
This revision incorporates ``plain writing'' into the Policy
regarding noncited violations. It will also revise
[[Page 78024]]
the opening paragraph of Section 2.3.2 to be consistent with a previous
approved revision to this section associated with crediting licensee
corrective action programs.
Revision
2.3.2 Noncited Violation
If a licensee or nonlicensee has implemented a corrective action
program that is determined to be adequate by the NRC, the NRC will
normally disposition SL IV violations and violations associated with
green ROP or cROP findings as noncited violations (NCVs) if all the
criteria in Paragraph 2.3.2.a. are met.
For licensees and nonlicensees that are not credited by the NRC as
having adequate corrective action programs, the NRC will normally
disposition SL IV violations and violations associated with green ROP
or cROP findings as NCVs if all of the criteria in Paragraph 2.3.2.b
are met. If the SL IV violation or violation associated with Green ROP
or cROP finding was identified by the NRC, the NRC will normally issue
a Notice of Violation.
Inspection reports or inspection records document NCVs and briefly
describe the corrective action the licensee or nonlicensee has taken or
plans to take, if known. Licensees and nonlicensees are not required to
provide written responses to NCVs; however, they may provide a written
response if they disagree with the NRC's description of the NCV or
dispute the validity of the NCV.
2. Section 2.3.4 ``Civil Penalty''
Recent cases involving the willful failure to file for reciprocity
or to obtain an NRC specific license have led to discussions about the
agency's ability to deter future noncompliance in these areas and
lessen the perceived potential economic benefit of working in NRC
jurisdiction without the required notification or license.
Although the Policy (Section 3.6, ``Use of Discretion in
Determining the Amount of a Civil Penalty'') allows the NRC to exercise
discretion to propose or escalate a civil penalty for cases involving
willfulness, the NRC will add clarifying language to Section 2.3.4,
``Civil Penalty.'' To aid in implementation and ensure consistency, the
Enforcement Manual will include specific guidance on the typical or
``starting'' civil penalty amount (e.g., 2 times the base civil
penalty).
Revision
The following language appears in Section 2.3.4 after the paragraph
starting: ``The NRC considers civil penalties for violations . . .''
For cases involving the willful failure to either file for
reciprocity or obtain an NRC specific license, the NRC will normally
consider a civil penalty to deter noncompliance for economic benefit.
Therefore, notwithstanding the normal civil penalty assessment process,
in cases where there is any indication (e.g., statements by company
employees regarding the nonpayment of fees, previous violations of the
requirement including those not issued by the NRC, or previous filings
without a significant change in management) that the violation was
committed for economic gain, the NRC may exercise discretion and impose
a civil penalty. The resulting civil penalty will normally be no more
than 3 times the base civil penalty; however, the agency may mitigate
or escalate the amount based on the merits of a specific case.
3. Addition of Section 3.10 ``Reactor Violations With No Performance
Deficiencies''
The NRC is revising Section 2.2.4.d to clarify that violations with
no ROP findings are dispositioned by using traditional enforcement.
Section 3.10, ``Reactor Violations with No Performance Deficiencies,''
has been added for NRC guidance to properly disposition these
violations. This clarification involves no actual change in policy.
Revisions
2.2.4.d: Violations not Associated With ROP or cROP Findings
3.10 Reactor Violations With No Performance Deficiencies
The NRC may exercise discretion for violations of NRC requirements
by reactor licensees for which there are no associated performance
deficiencies (e.g., a violation of a TS which is not a performance
deficiency).
4. Section 6.0 ``Violation Examples''
a. 6.3 ``Materials Operations''
Section 6.3, ``Materials Operations,'' of the Policy addresses the
failure to secure a portable gauge as required by 10 CFR 30.34(i).
Specifically, under the current Policy, paragraph 6.3.c.3, a Severity
Level (SL) III violation example, states, ``A licensee fails to secure
a portable gauge with at least two independent physical controls
whenever the gauge is not under the control and constant surveillance
of the licensee as required by 10 CFR 30.34(i).'' Accordingly, a
violation of 10 CFR 30.34(i) constitutes a SL III violation for gauges
having either no security or one level of security. The SL III
significance is based largely on licensees' control of portable gauges
to reduce the opportunity for unauthorized removal or theft and is the
only example currently provided in the Policy for this type of
violation.
When assessing the significance of a violation involving the
failure to secure a portable gauge, the NRC considers that both
physical controls must be defeated for the portable gauge to be
removed. This deters a theft by requiring a more determined effort to
remove the gauge. Considering that there is a reduced risk associated
with having one barrier instead of no barrier, the NRC has determined
that a graded approach is appropriate for 10 CFR 30.34(i) violations of
lower significance. Therefore, the NRC believes that failures of one
level of physical control to secure portable gauges warrant a SL IV
designation. This graded approach was piloted in Enforcement Guidance
Memoranda 11-004, dated April 28, 2011 (ADAMS Accession No.
ML111170601). After over 2 years of monitoring, the NRC determined that
the addition of the SL IV example did not increase the number of
losses/thefts reported. Therefore, the NRC is revising violation
example 6.3.c.3 and adding violation example 6.3.d.10:
Revisions
6.3.c.3: Except as provided for in section 6.3.d.10 of the policy,
a licensee fails to secure a portable gauge as required by 10 CFR
30.34(i);
6.3.d.10: A licensee fails to secure a portable gauge as required
by 10 CFR 30.34(i), whenever the gauge is not under the control and
constant surveillance of the licensee, where one level of physical
control existed and there was no actual loss of material, and that
failure is not repetitive.
b. Section 6.5.c.4 and 5 SL III Violations Involve, for Example
The NRC modifies these examples (4 and 5) to reference the
appropriate regulation governing changes to a facility referencing a
certified design (i.e., 10 CFR 52.98). This regulation refers to
applicable change processes in the applicable design certification
rule, which are currently contained in 10 CFR part 52, Appendix A-D.
Revisions
4. A licensee fails to obtain prior Commission approval required by
10 CFR 50.59 or 10 CFR 52.98 for a change that results in a condition
evaluated as having low-to-moderate or greater safety significance; or
[[Page 78025]]
5. A licensee fails to update the FSAR as required by 10 CFR
50.71(e), and the FSAR is used to perform a 10 CFR 50.59 or 10 CFR
52.98 evaluation for a change to the facility or procedures,
implemented without Commission approval, that results in a condition
evaluated as having low-to-moderate or greater safety significance.
c. Section 6.5.d.5 SL IV Violations Involve, for Example
Example 6.5.d.5 was added to Section 6.9.d ``Inaccurate and
Incomplete Information or Failure to Make a Required Report.''
d. Section 6.9 Inaccurate and Incomplete Information or Failure to Make
a Required Report
Section 50.55(e)(3) requires holders of a construction permit or
combined license (until the Commission makes the finding under 10 CFR
52.103(g)) to adopt procedures to evaluate deviations and failures to
comply to ensure identification of defects and failures to comply
associated with substantial safety hazards as soon as practicable. This
section is similar to the reporting requirements of 10 CFR part 21. A
SL II violation example was added; violation example 6.9.c.2.(a) was
deleted; and the reference to 10 CFR 50.55(e) was moved to the revised
6.9.c.5 examples.
Revisions
b. SL II Violations Involve, for Example
8. A deliberate failure to notify the Commission as required by 10
CFR 50.55(e).
c. SL III Violations Involve, for Example
2.(a) Deleted ``failure to make required notifications and reports
pursuant to 10 CFR 50.55(e);''
5. A failure to provide the notice required by 10 CFR part 21 or 10
CFR 50.55(e), for example:
(a) An inadequate review or failure to review such that, if an
appropriate review had been made as required, a 10 CFR part 21 or 10
CFR 50.55(e) report would have been required; or
(b) A withholding of information or a failure to make a required
interim report by 10 CFR 21.21, ``Notification of Failure to Comply or
Existence of a Defect and Its Evaluation,'' or 10 CFR 50.55(e) occurs
with careless disregard.
d. SL IV Violations Involve, for Example
12. A licensee fails to make an interim report required by 10 CFR
21.21(a)(2) or under 10 CFR 50.55(e);
13. Failure to implement adequate 10 CFR part 21 or 10 CFR 50.55(e)
processes or procedures that has more than minor safety or security
significance; or
14. A materials licensee fails to . . .
e. Section 6.9 ``Inaccurate and Incomplete Information or Failure to
Make a Required Report''
The NRC is removing the reference to 10 CFR 26.719(d) in violation
example 6.9.c.2.(c) because 10 CFR 26.719(d) is not a reporting
requirement.
Revision
6.9.c.2.(b): Failure to make any report required by 10 CFR 73.71,
``Reporting of Safeguards Events,'' or Appendix G, ``Reportable
Safeguards Events,'' to 10 CFR part 73 ``Physical Protection of Plants
and Materials,'' or 10 CFR part 26, ``Fitness-For-Duty Programs;''
f. Section 6.11 ``Reactor, Independent Spent Fuel Storage Installation,
Fuel Facility, and Special Nuclear Material Security''
The current Policy examples for a SL IV violation in Section 6.11.d
are focused on the loss of special nuclear material (SNM) of low
strategic significance. The loss of SNM is too narrow of a focus on the
loss of material and not the other aspects of the Materials Control &
Accountability (MC&A) program that could be a precursor to a loss of
SNM. The Policy should include an example for the MC&A program at fuel
facilities that covers the reduction in the ability to detect a loss or
diversion of material which could lead to a more significant event.
Therefore, the NRC is adding violation example 6.11.d.3 as follows.
Violation Example
6.11.d.3: A licensee fails to comply with an element of its
material and accounting program that results in a fuel cycle facility
procedure degradation regarding adequate detection or protection
against loss, theft, or diversion of SNM.
g. Section 6.14 ``Fitness-For-Duty'' Violation Example 6.14.a.2
The NRC is incorporating violation example 6.14.a.2 into example
6.14.b.1. An employee assistance program (EAP) is one provision of many
contained in 10 CFR part 26, subpart B, for which 6.14.a.1 applies.
Therefore, the ``severity'' associated with an inadequate EAP is
significantly less than that of a licensee not meeting ``two or more
subparts of 10 CFR part 26.'' An ineffective implementation of an EAP
does not directly result in an immediate safety or security concern and
should not represent a SL I violation. Therefore, the NRC is deleting
violation example 6.14.a.2 and modifying violation example 6.14.b.1.
Revision
6.14.a.2: Deleted.
6.14.b.1: A licensee fails to remove an individual from unescorted
access status when this person has been involved in the sale, use, or
possession of illegal drugs within the protected area, or a licensee
fails to take action in the case of an on-duty misuse of alcohol,
illegal drugs, prescription drugs, or over-the-counter medications or
once the licensee identifies an individual that appears to be impaired
or that their fitness is questionable, the licensee fails to take
immediate actions to prevent the individual from performing the duties
that require him or her to be subject to 10 CFR part 26;
h. Section 6.14 ``Fitness-For-Duty'' Violation Example 6.14.b.2
In violation example 6.14.b.2, the NRC is removing the language
``unfitness for duty based on drug or alcohol use.'' Regulations in 10
CFR part 26 do not define unfitness and the behavioral observation
program is not limited to drug and alcohol impairment.
Revision
6.14.b.2: A licensee fails to take action to meet a regulation or a
licensee behavior observation program requirement when observed
behavior within the protected area or credible information concerning
the activities of an individual indicates impairment by any substance,
legal or illegal, or mental or physical impaired from any cause, which
adversely affects their ability to safely and competently perform their
duties.
i. Section 6.14 ``Fitness-For-Duty'' Violation Example 6.14.c.1
The NRC is revising violation example 6.14.c.1 to encompass more
than positive drug and alcohol tests; it should include other aspects
of the fitness-for-duty program such as subversions.
Revision
6.14.c.1: A licensee fails to take the required action for a person
who has violated the licensee's Fitness-For-Duty Policy, in cases that
do not amount to a SL II violation;
j. Section 6.14 ``Fitness-For-Duty'' Violation Example 6.14.c.5
Due to the revision to violation example 6.14.b.1, the NRC is
revising violation example 6.14.c.5 to maintain a graded approach
method to its violation example.
[[Page 78026]]
Revision
6.14.c.5: A licensee's employee assistance program (EAP) staff
fails to notify licensee management when the EAP staff is aware that an
individual's condition, based on the information known at the time, may
adversely affect safety or security of the facility and the failure to
notify did not result in a condition adverse to safety or security; or
5. Section 6.13 ``Information Security''
The NRC is revising Section 6.13, ``Information Security.'' This
revision will replace the current examples, which are based on the
classification levels of the information, with a risk-informed approach
for assessing the severity of information security violations. This
approach of evaluating the severity of information security violations
by using a risk-informed process is based on the totality of the
circumstances surrounding the information security violation and will
more accurately reflect the severity of these types of violations and
improve regulatory consistency.
This process is the result of lessons learned from a number of
violations that the NRC has processed over the last few years based on
varying significance levels. This process will use a flow chart and
table approach, along with defined terms.
Once a noncompliance is identified, a four-step approach will be
applied to determine the severity level of the violation. The four
steps are: (1) Determine the significance of the information (i.e.,
high, moderate, or low), (2) determine the extent of disclosure (i.e.,
individual deemed trustworthy and reliable, unknown disclosure, or
confirmed to an unauthorized individual), (3) determine the
accessibility of the information (i.e., how limited was access to the
information), and (4) determine the duration of the noncompliance
(i.e., how long was the information available).
Once all steps are completed, the user will obtain a recommended
severity level for the violation. The staff recognizes this approach as
a change from the traditional violation examples; however, the process
will be risk-informed and will consider the totality of circumstances
surrounding the information disclosure. The risk-informed approach to
information security violations adopted by the NRC should not be read
to contradict the national policy on classified information as set
forth in Executive Order 13526, ``Classified National Security
Information.'' This first revision is located in the beginning of the
last paragraph of Section 4.3 of the Policy. Two conforming revisions
are being made to Section 6.12 of the Policy to delete examples that
conflict with the revised approach.
Revisions
a. Section 4.3 Civil Penalties to Individuals
Section 6.13, ``Information Security,'' of this Policy provides a
risk-informed approach for assessing the significance of information
security violations.
b. Section 6.12 Materials Security
6.12.c.3: Deleted
6.12.d.10: Deleted
b. Violation example 6.13 Information Security
BILLING CODE 7590-01-P
[GRAPHIC] [TIFF OMITTED] TR07NO16.008
BILLING CODE 7590-01-C
Step 1: Significance \1\--Describes the decision point to determine
the significance of the disclosure as it relates to national security
and/or common defense and security.
---------------------------------------------------------------------------
\1\ The significance guidance provided in Step 1 is only
applicable within the context of the NRC's Enforcement Policy and
its application. The significance guidance is not intended to define
the ``harm'' that an unauthorized disclosure of SECRET or
CONFIDENTIAL information is reasonably expected to cause as those
definitions are set forth in Executive Order 13526, ``Classified
National Security Information.'' Nothing in section 6.13 of the
Enforcement Policy should be read to contradict the National Policy
on classified information.
---------------------------------------------------------------------------
High Significance: The totality of information disclosed provides a
significant amount of information about a technology (i.e., key
elements of a technology or system) or combinations of the following
elements related to
[[Page 78027]]
protective strategies: Response Strategy, Target Sets, Physical
Security Plan, Contingency Plan or Integrated Response Plan. The
information can be either SECRET or CONFIDENTIAL (National Security or
Restricted Data) or Safeguards.
Moderate Significance: The totality of information disclosed
provides limited information that may be useful to an adversary about
technology information or physical security plan of a facility. The
information can be either SECRET or CONFIDENTIAL (National Security or
Restricted Data), Safeguards, or information requiring protection under
10 CFR part 37.
Low Significance: The totality of information disclosed, taken by
itself, would not aid an adversary in gaining information about a
technology or physical security plan of a facility. The information can
be either SECRET or CONFIDENTIAL (National Security or Restricted
Data), Safeguards, or information requiring protection under 10 CFR
part 37.
Step 2: Disclosure--Describes the decision point to determine if:
(a) The information was accessible to any individual(s) via hard copy
format or electronic (e.g. computers) form, (b) you can determine who
the individual(s) are, and (c) those individual(s) would meet the
definition of Trustworthy and Reliable.
Trustworthy and Reliable (T&R): Are characteristics of an
individual considered dependable in judgment, character, and
performance, such that disclosure of information to that individual
does not constitute an unreasonable risk to the public health and
safety or common defense and security. A determination of T&R for this
purpose is based upon the results from a background investigation or
background check in accordance with 10 CFR 37.5 or 10 CFR 73.2,
respectively. To meet the T&R requirement, the individual must possess
a T&R determination before the disclosure of the information,
regardless of the ``need to know'' determination. Note: In accordance
with 10 CFR 73.21 or 73.59, there are designated categories of
individuals that are relieved from fingerprinting, identification and
criminal history checks and other elements of background checks.
Unknown Disclosure: Instances when controlled information has been
secured, protected, or marked improperly but there is no evidence that
anyone has accessed the information while it was improperly handled.
Confirmed: Instances where a person who does not have authorization
to access controlled information gains access to the information.
Electronic Media/Confirmed: For electronic media it is considered
confirmed once the information is no longer on an approved network for
that type of information.
Unauthorized Individual: A person who does not possess a T&R
determination and a need to know.
Step 3: Limited Access--Describes the decision point to determine
the amount of controls (e.g., doors, locks, barriers, firewalls,
encryption levels) needed to enter or gain access to an area or
computer system in order to obtain the disclosed security information.
Hard Copy Format: A location provides limited access if it meets
all of the following conditions:
a. The area was locked or had access control measures, and;
b. individuals that frequented the area were part of a known
population, and;
c. records of personnel entry were maintained to the area via key
control or key card access.
Electronic Media: A computer network provides limited access if it
meets all of the following conditions:
a. The information is stored in a location that is still within the
licensee's computer network's firewall, and
b. the licensee has some type of control system in place which
delineates who can access the information.
Step 4: Duration--Describes the decision point in which a time
period determination is made regarding the number of days the
information was not controlled properly in accordance with the
respective handling and storage requirements of the security
information.
Long: Greater than or equal to 14 days from the date of infraction
to discovery of the non-compliance.
Short: Less than 14 days from the date of infraction to discovery
of the non-compliance.
6. Glossary
a. Confirmatory Action Letter
Some agency procedures have not consistently described all
Confirmatory Action Letter (CAL) recipients, according to an audit of
the NRC's use of CALs. To date, all affected procedures have been
revised to incorporate a consistent definition with the exception of
the Policy. Therefore, the NRC is revising the Glossary term CAL to
specifically state the recipients of a CAL.
Revision
Confirmatory Action Letter (CAL) is a letter confirming a
licensee's, contractor's, or nonlicensee's (subject to NRC
jurisdiction) voluntary agreement to take certain actions to remove
significant concerns about health and safety, safeguards, or the
environment.
c. Interim Enforcement Policy
The term Interim Enforcement Policy was added to the Glossary.
Revision
Interim Enforcement Policies (IEPs) refers to a policy that is
developed by the NRC staff and approved by the Commission for specific
topics, typically for a finite period. Generally, IEPs grant the staff
permission to refrain from taking enforcement action for generic issues
which are not currently addressed in the Policy and are typically
effective until such time that formal guidance is developed and
implemented or other resolution to the generic issue. IEPs can be found
in Section 9.0 of the Policy.
d. Traditional Enforcement
The NRC is revising the definition of traditional enforcement for
clarification purposes.
Revision
Traditional Enforcement, as used in this Policy, refers to the
process for the disposition of violations of NRC requirements,
including those that cannot be addressed only through the Operating
Reactor Assessment Program. Traditional enforcement violations are
assigned severity levels and typically include, but may not be limited
to, those violations involving (1) actual safety and security
consequences, (2) willfulness, (3) impeding the regulatory process, (4)
discrimination, (5) violations not associated with ROP or cROP
findings, (6) materials regulations, and (7) deliberate violations
committed by individuals.
7. Miscellaneous Corrections/Modifications
Note: The page numbers cited correspond with the newly revised
Enforcement Policy.
a. Page 8: Subject to the same oversight as the regional offices,
the Directors of the Office of Nuclear Reactor Regulation (NRR), the
Office of Nuclear Material Safety and Safeguards (NMSS), the Office of
New Reactors (NRO), and the Office of Nuclear Security and Incident
Response (NSIR) may also approve, sign, and issue certain enforcement
actions as delegated by the Director, OE. The Director, OE, has
delegated authority to the Directors of NRR, NMSS, NRO, and NSIR to
issue Orders not related to specific violations
[[Page 78028]]
of NRC requirements (i.e., nonenforcement-related Orders.)
b. Page 9: The NRC reviews each case being considered for
enforcement action on its own merits to ensure that the severity of a
violation is characterized at the level appropriate to the safety or
security significance of the particular violation.
Whenever possible, the NRC uses risk information in assessing the
safety or security significance of violations and assigning severity
levels. A higher severity level may be warranted for violations that
have greater risk, safety, or security significance, while a lower
severity level may be appropriate for issues that have lower risk,
safety, or security significance.
c. Page 15: a. Licensees and Nonlicensees with a credited
Corrective Action Program
d. Page 19: The flow chart (Figure 2) is a graphic representation
of the civil penalty assessment process and should be used in
conjunction with the narrative in this section.
e. Page 33: The NRC may refrain from issuing an NOV for a SL II,
III, or IV violation that meets the above criteria, provided that the
violation was caused by conduct that is not reasonably linked to the
licensee's present performance (normally, violations that are at least
3 years old or violations occurring during plant construction) and that
there had not been prior notice so that the licensee could not have
reasonably identified the violation earlier.
f. Page 34: In addition, the NRC may refrain from issuing
enforcement action for violations resulting from matters not within a
licensee's control, such as equipment failures that were not avoidable
by reasonable licensee QA measures or management controls (e.g.,
reactor coolant system leakage that was not within the licensee's
ability to detect during operation, but was identified at the first
available opportunity or outage).
g. Page 43: 6.1.c.2 A system that is part of the primary success
path and which functions or actuates to mitigate a DBA or transient
that either assumes the failure of or presents a challenge to the
integrity of the fission product barrier not being able to perform its
licensing basis safety function because it is not fully qualified (per
the IMC 0326, ``Operability Determinations & Functional Assessment for
Conditions Adverse to Quality or Safety'') (e.g., materials or
components not environmentally qualified);
h. Page 43: 6.1.d.3 A licensee fails to update the FSAR as required
by 10 CFR 50.71(e) and the lack of up-to-date information has a
material impact on safety or licensed activities; or
i. Page 59: 6.7.d.3 ``A radiation dose rate in an unrestricted or
controlled area exceeds 0.002 rem (0.02 millisieverts) in any 1 hour (2
mrem/hour) or 50 mrem (0.5 mSv) in a year;''
III. Procedural Requirements
Paperwork Reduction Act Statement
This policy statement does not contain new or amended information
collection requirements subject to the Paperwork Reduction Act of 1995
(44 U.S.C. 3501 et seq.). Existing requirements were approved by the
Office of Management and Budget (OMB), approval number 3150-0136.
Public Protection Notification
The NRC may not conduct or sponsor, and a person is not required to
respond to, a request for information or an information collection
requirement unless the requesting document displays a currently valid
OMB control number.
Congressional Review Act
This policy is a rule as defined in the Congressional Review Act (5
U.S.C 801-808). However, the Office of Management and Budget has not
found it to be a major rule as defined in the Congressional Review Act.
Dated at Rockville, Maryland, this 1st day of November, 2016.
For the Nuclear Regulatory Commission.
Annette L. Vietti-Cook,
Secretary of the Commission.
[FR Doc. 2016-26762 Filed 11-4-16; 8:45 am]
BILLING CODE 7590-01-P