Request for Information; NSPM 33 Research Security Programs Standard Requirement, 14187-14189 [2023-04660]

Download as PDF Federal Register / Vol. 88, No. 44 / Tuesday, March 7, 2023 / Notices SUPPLEMENTARY INFORMATION: I. Obtaining Information and Submitting Comments A. Obtaining Information Please refer to Docket ID NRC–2022– 0215 when contacting the NRC about the availability of information for this action. You may obtain publicly available information related to this action by any of the following methods: • Federal Rulemaking Website: Go to https://www.regulations.gov and search for Docket ID NRC–2022–0215. • NRC’s Agencywide Documents Access and Management System (ADAMS): You may obtain publicly available documents online in the ADAMS Public Documents collection at https://www.nrc.gov/reading-rm/ adams.html. To begin the search, select ‘‘Begin Web-based ADAMS Search.’’ For problems with ADAMS, please contact the NRC’s Public Document Room (PDR) reference staff at 1–800–397–4209, 301– 415–4737, or by email to PDR.Resource@nrc.gov. The draft ISG, ‘‘Material Compatibility for non-Light Water Reactors, DANU–ISG–2023–01’’ is available in ADAMS under Accession No. ML22203A175. • NRC’s PDR: You may examine and purchase copies of public documents, by appointment, at the NRC’s PDR, Room P1 B35, One White Flint North, 11555 Rockville Pike, Rockville, Maryland 20852. To make an appointment to visit the PDR, please send an email to PDR.Resource@nrc.gov or call 1–800–397–4209 or 301–415– 4737, between 8 a.m. and 4 p.m. eastern time (ET), Monday through Friday, except Federal holidays. ddrumheller on DSK120RN23PROD with NOTICES1 B. Submitting Comments The NRC encourages electronic comment submission through the Federal rulemaking website (https:// www.regulations.gov). Please include Docket ID NRC–2022–0215 in your comment submission. The NRC cautions you not to include identifying or contact information that you do not want to be publicly disclosed in your comment submission. The NRC will post all comment submissions at https:// www.regulations.gov as well as enter the comment submissions into ADAMS. The NRC does not routinely edit comment submissions to remove identifying or contact information. If you are requesting or aggregating comments from other persons for submission to the NRC, then you should inform those persons not to include identifying or contact information that they do not want to be publicly VerDate Sep<11>2014 19:49 Mar 06, 2023 Jkt 259001 disclosed in their comment submission. Your request should state that the NRC does not routinely edit comment submissions to remove such information before making the comment submissions available to the public or entering the comment into ADAMS. II. Background As part of its review of advanced nonlight water reactor applications, the NRC determines whether materials proposed to be used will allow components to fulfill design requirements for the design life, or that adequate surveillance and monitoring programs are in place. NRC regulations in part 50 and part 52 of title 10 of the Code of Federal Regulations (10 CFR) include requirements for material qualification and performance monitoring. The NRC endorsed American Society of Mechanical Engineers (ASME) Code Section III, Division 5, ‘‘High Temperature Reactors’’ (Section III–5), with conditions, in Revision 2 of Regulatory Guide 1.87, ‘‘Acceptability of ASME Code, Section III, Division 5, ‘High Temperature Reactors,’ ’’ (ADAMS Accession No. ML22101A263). III. Discussion The purpose of this draft ISG is to aid the NRC staff reviewing non-light water reactor applications for a construction permit or operating license under 10 CFR part 50 or for a design certification, combined license, standard design approval, or manufacturing license under 10 CFR part 52 that propose to use materials allowed under Section III– 5. Section III–5 specifies the mechanical properties and allowable stresses to be used for design of components in high temperature reactors. Because Section III–5 states that it does not provide methods to evaluate deterioration that may occur in service as a result of corrosion, mass transfer phenomena, radiation effects, or other material instabilities, this draft ISG identifies information that the staff should consider as part of its review of a nonlight water reactor application to review applicable design requirements including qualification and monitoring programs for safety-significant structures, systems, and components. Dated: March 1, 2023. For the Nuclear Regulatory Commission. Steven T. Lynch, Chief, Advanced Reactor Policy Branch, Division of Advanced Reactors and NonPower Production and Utilization Facilities, Office of Nuclear Reactor Regulation. [FR Doc. 2023–04577 Filed 3–6–23; 8:45 am] BILLING CODE 7590–01–P PO 00000 Frm 00074 Fmt 4703 Sfmt 4703 14187 OFFICE OF SCIENCE AND TECHNOLOGY POLICY Request for Information; NSPM 33 Research Security Programs Standard Requirement Office of Science and Technology Policy (OSTP). ACTION: Notice and request for comments. AGENCY: The Office of Science and Technology Policy (OSTP) requests comments from the public on draft Research Security Programs Standard Requirement developed in response to National Security Presidential Memorandum 33 on National Security Strategy for United States GovernmentSupported Research and Development (R&D). The draft Standard Requirement has been created by OSTP, together with Federal agencies and the Office of Management and Budget, to ensure that there is uniformity across Federal research agencies in implementing this requirement. DATES: Interested persons and organizations are invited to submit comments on or before 5 p.m. ET June 5, 2023. ADDRESSES: Submit comments electronically to researchsecurity@ ostp.eop.gov with the subject line Comment on Research Security Programs by the deadline. Due to time constraints, mailed paper submissions will not be accepted. Instructions: Response to this notice is voluntary. Responses to this notice may be used by the government for program planning on a non-attribution basis. OSTP therefore requests that no business proprietary information or copyrighted information be submitted in response to this notice. Please note that the U.S. Government will not pay for response preparation, or for the use of any information contained in the response. Responses may address one or as many topics as desired from the enumerated list provided in this request for comment, noting the corresponding number of the topic(s) to which the response pertains. Submissions must not exceed 5 pages (exclusive of cover page) in 12-point or larger font, with a page number provided on each page. Responses should include the name of the person(s) or organization(s) filing the comment, as well as the respondent type (e.g., academic institution, advocacy group, professional society, community-based organization, industry, member of the public, government, other). Respondent’s role in the organization may also be SUMMARY: E:\FR\FM\07MRN1.SGM 07MRN1 ddrumheller on DSK120RN23PROD with NOTICES1 14188 Federal Register / Vol. 88, No. 44 / Tuesday, March 7, 2023 / Notices provided (e.g., researcher, administrator, student, program manager, journalist) on a voluntary basis. Please also organize your responses such that substantive comments are at the beginning of the document and more procedural and/or technical comments are at the end. This format will help us to absorb and respond to your comments in a more organized way. Comments containing references, studies, research, and other empirical data that are not widely published should include copies or electronic links of the referenced materials; these materials, as well as a list of references, do not count toward the 5-page limit. No business proprietary information, copyrighted information, or personally identifiable information (aside from that requested above) should be submitted in response to this request for comment. Comments submitted in response to this notice are subject to the Freedom of Information Act. Comments submitted may be posted online or otherwise released publicly. FOR FURTHER INFORMATION CONTACT: Direct questions to Kei Koizumi at researchsecurity@ostp.eop.gov; tel: 202– 456–4444. SUPPLEMENTARY INFORMATION: National Security Presidential Memorandum 33 provides for a National Security Strategy for United States Government— Supported Research and Development. Section 4(g) directs that, ‘‘heads of funding agencies shall require that research institutions receiving Federal science and engineering support in excess of 50 million dollars per year certify to the funding agency that the institution has established and operates a research security program. Institutional research security programs should include elements of cyber security, foreign travel security, insider threat awareness and identification, and, as appropriate, export control training.’’ On January 4, 2022, the OSTP’s National Science and Technology Council released Guidance for Implementing National Security Presidential Memorandum 33 (NSPM– 33). NSPM–33 charges OSTP with ‘‘coordina[ting] activities to protect Federally funded R&D from foreign government interference, and outreach to the United States scientific and academic communities to enhance awareness of risks to research security and Federal Government actions to address these risks.’’ A similar charge is captured in the National Defense Authorization Act of 2020.1 1 The language from the 2020 NDAA (Public Law 116–92), captured in Sec. 1746. (a), states: ‘‘In VerDate Sep<11>2014 19:49 Mar 06, 2023 Jkt 259001 The resulting Guidance, called for by the Director of OSTP, delivers on three key priorities, consistent with the values of the Biden-Harris Administration: (1) protecting America’s security AND openness; (2) being clear in our delivery of guidance and information to impacted communities, so that compliance with NSPM–33 is easy, straightforward, and minimally burdensome; and (3) ensuring that our policies do not fuel xenophobia or prejudice. The Guidance also captured next steps regarding the implementation of a Standard Requirement for Research Security Programs (hereinafter shortened to ‘Standard Requirement’), stating on page 19: ‘‘OSTP, in consultation with the NSTC Subcommittee on Research Security, OMB, and external stakeholders, will develop a standardized requirement for uniform implementation across research agencies. Following a 90-day external engagement period, OSTP will complete the standardized requirement in the subsequent 120 days, and, upon completion, work with OMB to develop a plan to implement the standardized requirement. Upon receipt of the standards, relevant research agencies should engage with external stakeholders to ensure that program requirements are appropriate to the broad range of organizations that are subject to the requirement.’’ In fulfillment of this statement, a draft Standard Requirement has been completed and is available for review at: https://www.whitehouse.gov/wpcontent/uploads/2023/02/RS_Programs_ Guidance_public_comment.pdf. To enable further coordination, OSTP is leading engagement with external stakeholders, as the Guidance described. This request for comment is an important source of engagement and is meant to give the public an opportunity to review and provide feedback on the draft Standard Requirement. Through this request for comment, OSTP seeks public input on the Standard Requirement, with special attention to equity, clarity, feasibility, burden, and compliance. general.—The Director of the Office of Science and Technology Policy, acting through the National Science and Technology Council, in consultation with the National Security Advisor, shall establish or designate an interagency working group to coordinate activities to protect federally funded research and development from foreign interference, cyber attacks, theft, or espionage and to develop common definitions and best practices for Federal science agencies and grantees, while accounting for the importance of the open exchange of ideas and international talent required for scientific progression and American leadership in science and technology.’’ PO 00000 Frm 00075 Fmt 4703 Sfmt 4703 Scope: OSTP invites comment from any interested stakeholders. In particular, OSTP is interested in input from research organizations that will be subject to the Research Security Program requirement, researchers within those organizations, professional organizations representing those organizations, and organizations representing diverse interests across the U.S. research ecosystem. Information Requested: Respondents may provide information for one or more of the topics included below. Respondents are asked to note the corresponding number/s to which responses pertain. 1. Equity. The NSPM–33 implementation Guidance requires that research security policies and practices are implemented in an equitable and non-discriminatory fashion. Are there any areas of the Standard Requirement that have not, in your view, upheld the fundamental commitments to equity and non-discrimination? 2. Clarity. It is essential that the Research Security Programs Standard Requirement is clear. Clarity enables equity, transparency, and compliance. Comments on clarity throughout the Standard Requirement are especially appreciated, particularly as they pertain to the ability of organizations to understand and meet the provisions of the Standard Requirement. Your perspectives on the extent to which the Standard Requirement is clear and allows for straightforward adoption are of great interest. 3. Feasibility. The Research Security Program Standard Requirement will be most successful if covered organizations view adoption as feasible. With that in mind, are there aspects of the Standard Requirement that are concerning in terms of implementation? If so, how and why? 4. Burden. Closely related to feasibility is burden. Engagement with the research community has allowed us to understand that concerns about burden, whether in regard to financial or administrative burden, are high. Provisions in the Standard Requirement have been scoped with an aim to lessen burden, such as centralized certification on SAM.gov and technical assistance for development of research security training. Are there other measures that would help to lower the burden on the research community in implementing the Standard Requirement? 5. Compliance. The draft Standard Requirement suggests self-certification as the primary model of compliance with the requirements, with initially certification required one year after the issuance of the Standard Requirement. E:\FR\FM\07MRN1.SGM 07MRN1 Federal Register / Vol. 88, No. 44 / Tuesday, March 7, 2023 / Notices What are your perspectives on these approaches? Are there others that should be considered? Dated: March 2, 2023. Stacy Murphy, Deputy Chief Operations Officer/Security Officer. [FR Doc. 2023–04660 Filed 3–6–23; 8:45 am] BILLING CODE 3270–F1–P SECURITIES AND EXCHANGE COMMISSION [Release No. 34–97001; File No. SR–FICC– 2023–003] Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Proposed Rule Change To Revise the Description of the Stressed Period Used To Calculate the Value-atRisk Charge and Make Other Changes March 1, 2023. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (‘‘Act’’) 1 and Rule 19b–4 thereunder,2 notice is hereby given that on February 17, 2023, Fixed Income Clearing Corporation (‘‘FICC’’) filed with the Securities and Exchange Commission (‘‘Commission’’) the proposed rule change as described in Items I, II and III below, which Items have been prepared by the clearing agency. The Commission is publishing this notice to solicit comments on the proposed rule change from interested persons. I. Clearing Agency’s Statement of the Terms of Substance of the Proposed Rule Change The proposed rule change 3 consists of amendments to the GSD Methodology Document—GSD Initial Market Risk Margin Model (‘‘GSD QRM Methodology Document’’) 4 and the 1 15 U.S.C. 78s(b)(1). CFR 240.19b–4. 3 Capitalized terms used herein and not defined shall have the meaning assigned to such terms in the FICC’s Government Securities Division (‘‘GSD’’) Rulebook (‘‘GSD Rules’’) and FICC’s MortgageBacked Securities Division (‘‘MBSD’’) Clearing Rules (‘‘MBSD Rules’’, and together with the GSD Rules, the ‘‘Rules’’), available at https:// www.dtcc.com/legal/rules-and-procedures.aspx. 4 The GSD QRM Methodology Document was filed as a confidential exhibit in the rule filing and advance notice for GSD sensitivity VaR. See Securities Exchange Act Release Nos. 83362 (June 1, 2018), 83 FR 26514 (June 7, 2018) (SR–FICC– 2018–001) and 83223 (May 11, 2018), 83 FR 23020 (May 17, 2018) (SR–FICC–2018–801). The GSD QRM Methodology has been subsequently amended. See Securities Exchange Act Release Nos. 85944 (May 24, 2019), 84 FR 25315 (May 31, 2019) (SR–FICC–2019–001), 90182 (October 14, 2020), 85 FR 66630 (October 20, 2020) (SR–FICC–2020–009), 93234 (October 1, 2021), 86 FR 55891 (October 7, 2021) (SR–FICC–2021–007), and 95605 (August 25, ddrumheller on DSK120RN23PROD with NOTICES1 2 17 VerDate Sep<11>2014 19:49 Mar 06, 2023 Jkt 259001 MBSD Methodology and Model Operations Document—MBSD Quantitative Risk Model (‘‘MBSD QRM Methodology Document’’,5 and collectively with the GSD QRM Methodology Document, the ‘‘QRM Methodology Documents’’) in order to revise the description of the stressed period used to calculate the VaR Charge (as defined below). FICC is also proposing to amend the GSD QRM Methodology Document in order to clarify the language describing the floor parameters used for the calculation of the VaR Floor. In addition, FICC is proposing to amend the QRM Methodology Documents to make certain technical changes, as described in greater detail below. II. Clearing Agency’s Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change In its filing with the Commission, the clearing agency included statements concerning the purpose of and basis for the proposed rule change and discussed any comments it received on the proposed rule change. The text of these statements may be examined at the places specified in Item IV below. The clearing agency has prepared summaries, set forth in sections A, B, and C below, of the most significant aspects of such statements. (A) Clearing Agency’s Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change 1. Purpose FICC has observed significant volatility in the U.S. government securities market due to tightening monetary policy, increasing inflation, and recession fears. The significant volatility has led to greater risk exposures for FICC. In order to mitigate the increased risk exposures, FICC has to quickly and timely respond to rapidly changing market conditions. For example, in order to respond to rapidly changing market conditions, FICC may need to quickly and timely adjust the look-back period that FICC uses for 2022), 87 FR 53522 (August 31, 2022) (SR–FICC– 2022–005). 5 The MBSD QRM Methodology was filed as a confidential exhibit in the rule filing and advance notice for MBSD sensitivity VaR. See Securities Exchange Act Release Nos. 79868 (January 24, 2017), 82 FR 8780 (January 30, 2017) (SR–FICC– 2016–007) and 79843 (January 19, 2017), 82 FR 8555 (January 26, 2017) (SR–FICC–2016–801). The MBSD QRM Methodology has been amended. See Securities Exchange Act Release Nos. 85944 (May 24, 2019), 84 FR 25315 (May 31, 2019) (SR–FICC– 2019–001), 90182 (October 14, 2020), 85 FR 66630 (October 20, 2020) (SR–FICC–2020–009), 92303 (June 30, 2021), 86 FR 35854 (July 7, 2021) (SR– FICC–2020–017) and 95070 (June 8, 2022), 87 FR 36014 (June 14, 2022) (SR–FICC–2022–002). PO 00000 Frm 00076 Fmt 4703 Sfmt 4703 14189 purposes of calculating the VaR Charge with an appropriate stressed period, as needed, to enable FICC to calculate and collect adequate margin from members. Accordingly, FICC is proposing to amend the QRM Methodology Documents by revising the description of the stressed period used to calculate the VaR Charge in order to enable FICC to quickly and timely adjust the lookback period used for calculating the VaR Charge with an appropriate stressed period, as needed. Adjustments to the look-back period could affect the amount of the VaR Charge that GSD Members are assessed by either increasing or decreasing such charge to reflect the level of risk the activities of the GSD Members presented to FICC. FICC is also proposing to amend the GSD QRM Methodology Document in order to clarify the language describing the floor parameters used for the calculation of the VaR Floor. In addition, FICC is proposing to amend the QRM Methodology Documents to make certain technical changes. FICC, through GSD and MBSD, serves as a central counterparty (‘‘CCP’’) and provider of clearance and settlement services for the U.S. government securities and mortgage-backed securities markets. A key tool that FICC uses to manage its credit exposures to its members is the daily collection of margin from each member. The aggregated amount of all GSD and MBSD members’ margin constitutes the GSD Clearing Fund and MBSD Clearing Fund (collectively referred to herein as the ‘‘Clearing Fund’’), which FICC would be able to access should a defaulted member’s own margin be insufficient to satisfy losses to FICC caused by the liquidation of that member’s portfolio. Each member’s margin consists of a number of applicable components, including a value-at-risk (‘‘VaR’’) charge (‘‘VaR Charge’’) designed to capture the potential market price risk associated with the securities in a member’s portfolio. The VaR Charge is typically the largest component of a member’s margin requirement. The VaR Charge is designed to cover FICC’s projected liquidation losses with respect to a defaulted member’s portfolio at a 99% confidence level. FICC calculates VaR Charge by using a methodology referred to as the sensitivity approach. The sensitivity approach leverages external vendor expertise in supplying the market risk attributes, which would then be incorporated by FICC into the GSD and MBSD models to calculate the VaR Charge. Specifically, FICC sources security-level risk sensitivity data and E:\FR\FM\07MRN1.SGM 07MRN1

Agencies

[Federal Register Volume 88, Number 44 (Tuesday, March 7, 2023)]
[Notices]
[Pages 14187-14189]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-04660]


=======================================================================
-----------------------------------------------------------------------

OFFICE OF SCIENCE AND TECHNOLOGY POLICY


Request for Information; NSPM 33 Research Security Programs 
Standard Requirement

AGENCY: Office of Science and Technology Policy (OSTP).

ACTION: Notice and request for comments.

-----------------------------------------------------------------------

SUMMARY: The Office of Science and Technology Policy (OSTP) requests 
comments from the public on draft Research Security Programs Standard 
Requirement developed in response to National Security Presidential 
Memorandum 33 on National Security Strategy for United States 
Government-Supported Research and Development (R&D). The draft Standard 
Requirement has been created by OSTP, together with Federal agencies 
and the Office of Management and Budget, to ensure that there is 
uniformity across Federal research agencies in implementing this 
requirement.

DATES: Interested persons and organizations are invited to submit 
comments on or before 5 p.m. ET June 5, 2023.

ADDRESSES: Submit comments electronically to 
[email protected] with the subject line Comment on Research 
Security Programs by the deadline. Due to time constraints, mailed 
paper submissions will not be accepted.
    Instructions: Response to this notice is voluntary. Responses to 
this notice may be used by the government for program planning on a 
non-attribution basis. OSTP therefore requests that no business 
proprietary information or copyrighted information be submitted in 
response to this notice. Please note that the U.S. Government will not 
pay for response preparation, or for the use of any information 
contained in the response.
    Responses may address one or as many topics as desired from the 
enumerated list provided in this request for comment, noting the 
corresponding number of the topic(s) to which the response pertains. 
Submissions must not exceed 5 pages (exclusive of cover page) in 12-
point or larger font, with a page number provided on each page. 
Responses should include the name of the person(s) or organization(s) 
filing the comment, as well as the respondent type (e.g., academic 
institution, advocacy group, professional society, community-based 
organization, industry, member of the public, government, other). 
Respondent's role in the organization may also be

[[Page 14188]]

provided (e.g., researcher, administrator, student, program manager, 
journalist) on a voluntary basis.
    Please also organize your responses such that substantive comments 
are at the beginning of the document and more procedural and/or 
technical comments are at the end. This format will help us to absorb 
and respond to your comments in a more organized way.
    Comments containing references, studies, research, and other 
empirical data that are not widely published should include copies or 
electronic links of the referenced materials; these materials, as well 
as a list of references, do not count toward the 5-page limit. No 
business proprietary information, copyrighted information, or 
personally identifiable information (aside from that requested above) 
should be submitted in response to this request for comment. Comments 
submitted in response to this notice are subject to the Freedom of 
Information Act. Comments submitted may be posted online or otherwise 
released publicly.

FOR FURTHER INFORMATION CONTACT: Direct questions to Kei Koizumi at 
[email protected]; tel: 202-456-4444.

SUPPLEMENTARY INFORMATION: National Security Presidential Memorandum 33 
provides for a National Security Strategy for United States 
Government--Supported Research and Development. Section 4(g) directs 
that, ``heads of funding agencies shall require that research 
institutions receiving Federal science and engineering support in 
excess of 50 million dollars per year certify to the funding agency 
that the institution has established and operates a research security 
program. Institutional research security programs should include 
elements of cyber security, foreign travel security, insider threat 
awareness and identification, and, as appropriate, export control 
training.''
    On January 4, 2022, the OSTP's National Science and Technology 
Council released Guidance for Implementing National Security 
Presidential Memorandum 33 (NSPM-33). NSPM-33 charges OSTP with 
``coordina[ting] activities to protect Federally funded R&D from 
foreign government interference, and outreach to the United States 
scientific and academic communities to enhance awareness of risks to 
research security and Federal Government actions to address these 
risks.'' A similar charge is captured in the National Defense 
Authorization Act of 2020.\1\
---------------------------------------------------------------------------

    \1\ The language from the 2020 NDAA (Public Law 116-92), 
captured in Sec. 1746. (a), states: ``In general.--The Director of 
the Office of Science and Technology Policy, acting through the 
National Science and Technology Council, in consultation with the 
National Security Advisor, shall establish or designate an 
interagency working group to coordinate activities to protect 
federally funded research and development from foreign interference, 
cyber attacks, theft, or espionage and to develop common definitions 
and best practices for Federal science agencies and grantees, while 
accounting for the importance of the open exchange of ideas and 
international talent required for scientific progression and 
American leadership in science and technology.''
---------------------------------------------------------------------------

    The resulting Guidance, called for by the Director of OSTP, 
delivers on three key priorities, consistent with the values of the 
Biden-Harris Administration: (1) protecting America's security AND 
openness; (2) being clear in our delivery of guidance and information 
to impacted communities, so that compliance with NSPM-33 is easy, 
straightforward, and minimally burdensome; and (3) ensuring that our 
policies do not fuel xenophobia or prejudice.
    The Guidance also captured next steps regarding the implementation 
of a Standard Requirement for Research Security Programs (hereinafter 
shortened to `Standard Requirement'), stating on page 19: ``OSTP, in 
consultation with the NSTC Subcommittee on Research Security, OMB, and 
external stakeholders, will develop a standardized requirement for 
uniform implementation across research agencies. Following a 90-day 
external engagement period, OSTP will complete the standardized 
requirement in the subsequent 120 days, and, upon completion, work with 
OMB to develop a plan to implement the standardized requirement. Upon 
receipt of the standards, relevant research agencies should engage with 
external stakeholders to ensure that program requirements are 
appropriate to the broad range of organizations that are subject to the 
requirement.''
    In fulfillment of this statement, a draft Standard Requirement has 
been completed and is available for review at: https://www.whitehouse.gov/wp-content/uploads/2023/02/RS_Programs_Guidance_public_comment.pdf.
    To enable further coordination, OSTP is leading engagement with 
external stakeholders, as the Guidance described. This request for 
comment is an important source of engagement and is meant to give the 
public an opportunity to review and provide feedback on the draft 
Standard Requirement. Through this request for comment, OSTP seeks 
public input on the Standard Requirement, with special attention to 
equity, clarity, feasibility, burden, and compliance.
    Scope: OSTP invites comment from any interested stakeholders. In 
particular, OSTP is interested in input from research organizations 
that will be subject to the Research Security Program requirement, 
researchers within those organizations, professional organizations 
representing those organizations, and organizations representing 
diverse interests across the U.S. research ecosystem.
    Information Requested: Respondents may provide information for one 
or more of the topics included below. Respondents are asked to note the 
corresponding number/s to which responses pertain.
    1. Equity. The NSPM-33 implementation Guidance requires that 
research security policies and practices are implemented in an 
equitable and non-discriminatory fashion. Are there any areas of the 
Standard Requirement that have not, in your view, upheld the 
fundamental commitments to equity and non-discrimination?
    2. Clarity. It is essential that the Research Security Programs 
Standard Requirement is clear. Clarity enables equity, transparency, 
and compliance. Comments on clarity throughout the Standard Requirement 
are especially appreciated, particularly as they pertain to the ability 
of organizations to understand and meet the provisions of the Standard 
Requirement. Your perspectives on the extent to which the Standard 
Requirement is clear and allows for straightforward adoption are of 
great interest.
    3. Feasibility. The Research Security Program Standard Requirement 
will be most successful if covered organizations view adoption as 
feasible. With that in mind, are there aspects of the Standard 
Requirement that are concerning in terms of implementation? If so, how 
and why?
    4. Burden. Closely related to feasibility is burden. Engagement 
with the research community has allowed us to understand that concerns 
about burden, whether in regard to financial or administrative burden, 
are high. Provisions in the Standard Requirement have been scoped with 
an aim to lessen burden, such as centralized certification on SAM.gov 
and technical assistance for development of research security training. 
Are there other measures that would help to lower the burden on the 
research community in implementing the Standard Requirement?
    5. Compliance. The draft Standard Requirement suggests self-
certification as the primary model of compliance with the requirements, 
with initially certification required one year after the issuance of 
the Standard Requirement.

[[Page 14189]]

What are your perspectives on these approaches? Are there others that 
should be considered?

    Dated: March 2, 2023.
Stacy Murphy,
Deputy Chief Operations Officer/Security Officer.
[FR Doc. 2023-04660 Filed 3-6-23; 8:45 am]
BILLING CODE 3270-F1-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.