Matrix Game Methodology - Support to V2010 Olympic Marine Security Planners
2011-02-01
OMOC was called the Integrated Safety /Security Matrix Game – Marine III, and was held 16-17 June 2009. This was the most extensive and complex of...Protection Matrix Game Marine Two .................................................. 12 3.3 Integrated Safety /Security Matrix Game – Marine III...Integrated Safety /Security Matrix Game – Marine III Scenarios........................... 53 ISSMG Marine III – Team Groupings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badwan, Faris M.; Demuth, Scott F
Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is amore » fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the UNFSF. The framework for integration of safeguards and security into the UNFSF will include 1) identification of applicable regulatory requirements, 2) selection of a common system that share dual safeguard and security functions, 3) development of functional design criteria and design requirements for the selected system, 4) identification and integration of the dual safeguards and security design requirements, and 5) assessment of the integration and potential benefit.« less
Leveraging Safety Programs to Improve and Support Security Programs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leach, Janice; Snell, Mark K.; Pratt, R.
2015-10-01
There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.
Bibliography for computer security, integrity, and safety
NASA Technical Reports Server (NTRS)
Bown, Rodney L.
1991-01-01
A bibliography of computer security, integrity, and safety issues is given. The bibliography is divided into the following sections: recent national publications; books; journal, magazine articles, and miscellaneous reports; conferences, proceedings, and tutorials; and government documents and contractor reports.
ERIC Educational Resources Information Center
Daneman, Kathy
1998-01-01
Describes the integration of security systems to provide enhanced security that is both effective and long lasting. Examines combining card-access systems with camera surveillance, and highly visible emergency phones and security officers. as one of many possible combinations. Some systems most capable of being integrated are listed. (GR)
Safety and Security Interface Technology Initiative
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie
Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme)more » includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.« less
Integrating Safety with Science,Technology and Innovation at Los Alamos National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rich, Bethany M
2012-04-02
The mission of Los Alamos National Laboratory (LANL) is to develop and apply science, technology and engineering solutions to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve emerging national security challenges. The most important responsibility is to direct and conduct efforts to meet the mission with an emphasis on safety, security, and quality. In this article, LANL Environmental, Safety, and Health (ESH) trainers discuss how their application and use of a kinetic learning module (learn by doing) with a unique fall arrest system is helping to address one the most common industrialmore » safety challenges: slips and falls. A unique integration of Human Performance Improvement (HPI), Behavior Based Safety (BBS) and elements of the Voluntary Protection Program (VPP) combined with an interactive simulator experience is being used to address slip and fall events at Los Alamos.« less
[Significance of re-evaluation and development of Chinese herbal drugs].
Gao, Yue; Ma, Zengchun; Zhang, Boli
2012-01-01
The research of new herbal drugs involves in new herbal drugs development and renew the old drugs. It is necessary to research new herbal drugs based on the theory of traditional Chinese medicine (TCM). The current development of famous TCM focuses on the manufacture process, quality control standards, material basis and clinical research. But system management of security evaluation is deficient, the relevant system for the safety assessment TCM has not been established. The causes of security problems, security risks, target organ of toxicity, weak link of safety evaluation, and ideas of safety evaluation are discussed in this paper. The toxicology research of chinese herbal drugs is necessary based on standard of good laboratory practices (GLP), the characteristic of Chinese herbal drugs is necessary to be fully integrated into safety evaluation. The safety of new drug research is necessary to be integrated throughout the entire process. Famous Chinese medicine safety research must be paid more attention in the future.
ERIC Educational Resources Information Center
Spoor, Dana L.
1996-01-01
School districts are integrating security and life-safety systems into school buildings to protect students and property. This proactive approach includes sprinkler systems, fire alarms, and security systems that monitor door movement. Some school districts that are incorporating the latest life-safety technology are in Missouri, Ohio, California,…
NASA Astrophysics Data System (ADS)
Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov
2018-03-01
The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.
Gleeson, John F; Lederman, Reeva; Wadley, Greg; Bendall, Sarah; McGorry, Patrick D; Alvarez-Jimenez, Mario
2014-04-01
Internet-based treatments for early psychosis offer considerable promise, but safety and security need to be established. This study pilot tested Horyzons, a novel online treatment application that integrates purpose-built moderated social networking with psychoeducation for recovery from early psychosis. Safety, privacy, and security were evaluated during a one-month single-group trial with 20 young consumers recovering from early psychosis who were recruited in Melbourne, Australia. Known clinical risk factors informed the safety protocol. Safety, privacy, and security were evaluated with respect to relapse and self-harm, users' perceptions of safety and privacy, and activity using Horyzons. No clinical or security problems with use of Horyzons were noted. Participants described feeling safe and trusting Horyzons. Private moderated online social networking combined with psychoeducation was a safe and secure therapeutic environment for consumers recovering from a first episode of psychosis. Testing the intervention in a randomized controlled trial is warranted.
NNSA Administrator Tom D'Agostino's speech at the 2009 ISM Conference
Thomas D'Agostino
2017-12-09
National Nuclear Security Administration Administrator Thomas DAgostino addressed the 2009 Department of Energy Integrated Safety Management (ISM) Conference in Knoxville, Tenn., on Wednesday, Aug. 26. In his remarks, Administrator DAgostino highlighted the NNSAs track record of developing innovative approaches to workplace safety. And, while he noted the improvements in NNSAs safety record over the years, the Administrator highlighted the need to ensure that workers across the nuclear security enterprise never become complacent in their approach to safety.
Safety on a Rural Community College Campus via Integrated Communications
ERIC Educational Resources Information Center
Gnage, Marie Foster; Dziagwa, Connie; White, Dave
2009-01-01
West Virginia University at Parkersburg uses a two-way emergency system as a baseline for emergency communications. The college has found that such a system, a key component of its safety and crisis management plan, can be integrated with other communication initiatives to provide focused security on the campus.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-08
... strengthening the integrity of the nation's legal immigration system by ensuring that immigration benefits are... the United States. In addition, USCIS enhances the integrity of the nation's legal immigration system... legal immigration system by: (1) Identifying threats to national security and public safety posed by...
Cyber Security Threats to Safety-Critical, Space-Based Infrastructures
NASA Astrophysics Data System (ADS)
Johnson, C. W.; Atencia Yepez, A.
2012-01-01
Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.
The Interface of Safety and Security in Transport: A Regional Perspective
DOE Office of Scientific and Technical Information (OSTI.GOV)
Welch, Tim; Duhamel, David A; Nandakumar, A. N.
Security of nuclear and other radioactive material in transport continues to be a challenge for States that are working on strengthening their nuclear security regime. One reason for this is that State regulatory agencies and other organizations lack the resources and trained personnel to dedicate to this field. For over 50 years safety has been a major focus in the use, storage and transport of radioactive material. Only recently, since the late 1990s, has dedicated focus been given to the field of security. One way to assist States to advance nuclear security is to reach out to safety workers (regulators,more » inspectors, and safety compliance personnel) and showcase the need to better integrate safety and security practices. A recent IAEA regional workshop in Bangkok, Thailand (June 2015) yielded profound results when subject matter experts lectured on both the safety and the security of radioactive material in transport. These experts presented and discussed experiences and best practices for: 1) developing and implementing safety requirements and security recommendations for radioactive material in transport; 2) national and international cooperation; and 3) preventing shipment delays/denials of radioactive material. The workshop participants, who were predominantly from safety organizations, shared that they received the following from this event: 1. A clear understanding of the objectives of the IAEA safety requirements and security recommendations for radioactive material in transport. 2. A general understanding of and appreciation for the similarities and differences between safety requirements and security recommendations for radioactive material in transport. 3. A greater appreciation of the interface between transport safety and security and potential impacts of this interface on the efforts to strengthen the compliance assurance regime for the safe transport of radioactive material. 4. A general understanding of assessing the transport security scenarios and developing transport security plans. Many participants also reported their appreciation of the workshop exercises that specifically focused on practical aspects of safety and security of transport of radioactive material. These workshop outcomes highlight the important role professionals can offer when they receive additional safety training and education for radioactive material in transport. Moreover, these professionals can help to increase capacity in countries with developing nuclear security regimes. This paper explores workshop outcomes and transportation regulations and guidelines for radioactive material.« less
Integrated Work Management: Overview, Course 31881
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simpson, Lewis Edward
Integrated work management (IWM) is the process used for formally implementing the five-step process associated with integrated safety management (ISM) and integrated safeguards and security management (ISSM) at Los Alamos National Laboratory (LANL). IWM also directly supports the LANL Environmental Management System (EMS). IWM helps all workers and managers perform work safely and securely and in a manner that protects people, the environment, property, and the security of the nation. The IWM process applies to all work activities at LANL, from working in the office to designing experiments to assembling and detonating explosives. The primary LANL document that establishes andmore » describes IWM requirements is Procedure (P) 300, Integrated Work Management.« less
Kentucky commercial vehicle safety applications evaluation : technical report.
DOT National Transportation Integrated Search
2008-01-31
An advanced-technology Integrated Safety and Security Enforcement System (ISSES), now deployed at three commercial vehicle inspection sites along interstate highways in Kentucky, was evaluated from the point of view of system performance, potential e...
2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference
2017-11-15
beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and
Towards An Engineering Discipline of Computational Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mili, Ali; Sheldon, Frederick T; Jilani, Lamia Labed
2007-01-01
George Boole ushered the era of modern logic by arguing that logical reasoning does not fall in the realm of philosophy, as it was considered up to his time, but in the realm of mathematics. As such, logical propositions and logical arguments are modeled using algebraic structures. Likewise, we submit that security attributes must be modeled as formal mathematical propositions that are subject to mathematical analysis. In this paper, we approach this problem by attempting to model security attributes in a refinement-like framework that has traditionally been used to represent reliability and safety claims. Keywords: Computable security attributes, survivability, integrity,more » dependability, reliability, safety, security, verification, testing, fault tolerance.« less
Addressing software security risk mitigations in the life cycle
NASA Technical Reports Server (NTRS)
Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt
2003-01-01
The NASA Office of Safety and Mission Assurance (OSMA) has funded the Jet Propulsion Laboratory (JPL) with a Center Initiative, 'Reducing Software Security Risk through an Integrated Approach' (RSSR), to address this need. The Initiative is a formal approach to addressing software security in the life cycle through the instantiation of a Software Security Assessment Instrument (SSAI) for the development and maintenance life cycles.
3S (Safeguards, Security, Safety) based pyroprocessing facility safety evaluation plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ku, J.H.; Choung, W.M.; You, G.S.
The big advantage of pyroprocessing for the management of spent fuels against the conventional reprocessing technologies lies in its proliferation resistance since the pure plutonium cannot be separated from the spent fuel. The extracted materials can be directly used as metal fuel in a fast reactor, and pyroprocessing reduces drastically the volume and heat load of the spent fuel. KAERI has implemented the SBD (Safeguards-By-Design) concept in nuclear fuel cycle facilities. The goal of SBD is to integrate international safeguards into the entire facility design process since the very beginning of the design phase. This paper presents a safety evaluationmore » plan using a conceptual design of a reference pyroprocessing facility, in which 3S (Safeguards, Security, Safety)-By-Design (3SBD) concept is integrated from early conceptual design phase. The purpose of this paper is to establish an advanced pyroprocessing hot cell facility design concept based on 3SBD for the successful realization of pyroprocessing technology with enhanced safety and proliferation resistance.« less
ERIC Educational Resources Information Center
New Mexico Public Education Department, 2006
2006-01-01
Safety in New Mexico's schools is one of the most important issues facing our communities. Every school and school district in the state make it a priority to identify and implement ways to increase the safety, security and integrity of students, teachers, staff, parents and visitors at our schools on a daily basis. Safety is critical for…
Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research
NASA Astrophysics Data System (ADS)
Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne
This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.
U29: commercial vehicle secure network for safety and mobility applications final report.
DOT National Transportation Integrated Search
2011-09-01
The main objective of this project is to develop a secure, reliable, high throughput and integrated wireless network for Vehicle-To-Vehicle (V2V), Vehicle-To-Infrastructure (V2I) and intra-vehicle communications. Novel techniques and communication pr...
Advanced approach to information security management system model for industrial control system.
Park, Sanghyun; Lee, Kyungho
2014-01-01
Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, and availability of sensitive information. While an ISMS based on ISO 27000 series has no particular flaws for general information systems, it is unfit to manage sensitive information for industrial control systems (ICSs) because the first priority of industrial control is safety of the system. Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. This new ISMS must be mutually exclusive of an ICS. This paper provides a new paradigm of ISMS for ICSs, which will be shown to be more suitable than the existing ISMS.
Advanced Approach to Information Security Management System Model for Industrial Control System
2014-01-01
Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, and availability of sensitive information. While an ISMS based on ISO 27000 series has no particular flaws for general information systems, it is unfit to manage sensitive information for industrial control systems (ICSs) because the first priority of industrial control is safety of the system. Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. This new ISMS must be mutually exclusive of an ICS. This paper provides a new paradigm of ISMS for ICSs, which will be shown to be more suitable than the existing ISMS. PMID:25136659
Development of a consortium for water security and safety: Planning for an early warning system
Clark, R.M.; Adam, N.R.; Atluri, V.; Halem, M.; Vowinkel, E.F.; ,
2004-01-01
The events of September 11, 2001 have raised concerns over the safety and security of the Nation's critical infrastructure including water and waste water systems. In June 2002, the U.S. EPA's Region II Office (New York City), in response to concerns over water security, in collaboration with Rutgers University agreed to establish a Regional Drinking Water Security and Safety Consortium (RDWSSC). Members of the consortium include: Rutgers University's Center for Information Management, Integration and Connectivity (CIMIC), American Water (AW), the Passaic Valley Water Commission (PVWC), the North Jersey District Water Supply Commission (NJDWSC), the N.J. Department of Environmental Protection, the U.S. Geological Survey (USGS), and the U.S. Environmental Protection Agencies, Region II Office. In December of 2002 the consortium members signed a memorandum of understanding (MOU) to pursue activities to enhance regional water security. Development of an early warning system for source and distributed water was identified as being of primary importance by the consortium. In this context, an early warning system (EWS) is an integrated system of monitoring stations located at strategic points in a water utilities source waters or in its distribution system, designed to warn against contaminants that might threaten the health and welfare of drinking water consumers. This paper will discuss the consortium's progress in achieving these important objectives.
Safe and Secure Partitioning with Pikeos: Towards Integrated Modular Avionics in Space
NASA Astrophysics Data System (ADS)
Almeida, J.; Prochazka, M.
2009-05-01
This paper presents our approach to logical partitioning of spacecraft onboard software. We present PikeOS, a separation micro-kernel which applies the state-of-the- art techniques and widely recognised standards such as ARINC 653 and MILS in order to guarantee safety and security properties of partitions executing software with different criticality and confidentiality. We provide an overview of our approach, also used in the Securely Partitioning Spacecraft Computing Resources project, an ESA TRP contract, which shifts spacecraft onboard software development towards the Integrated Modular Avionics concept with relevance for dual-use military and civil missions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mladineo, Stephen V.; Frazar, Sarah L.; Kurzrok, Andrew J.
This paper will explore the development of a framework for conducting an assessment of safety-security-safeguards integration within a State. The goal is to examine State regulatory structures to identify conflicts and gaps that hinder management of the three disciplines at nuclear facilities. Such an analysis could be performed by a State Regulatory Authority (SRA) to provide a self-assessment or as part of technical cooperation with either a newcomer State, or to a State with a fully developed SRA.
Military Review. Volume 90, Number 2, March-April 2000
2000-04-01
additional safety and security concerns and re- quirements for workers� and drivers� life support. Integration. Integration went smoothly at Puerto Quetzal ...the SPOD for initial deployment in Gua- temala. Quetzal was only 10 kilome- ters from the forward operating base and was collocated with the main
The role of the health physicist in nuclear security.
Waller, Edward J; van Maanen, Jim
2015-04-01
Health physics is a recognized safety function in the holistic context of the protection of workers, members of the public, and the environment against the hazardous effects of ionizing radiation, often generically designated as radiation protection. The role of the health physicist as protector dates back to the Manhattan Project. Nuclear security is the prevention and detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Its importance has become more visible and pronounced in the post 9/11 environment, and it has a shared purpose with health physics in the context of protection of workers, members of the public, and the environment. However, the duties and responsibilities of the health physicist in the nuclear security domain are neither clearly defined nor recognized, while a fundamental understanding of nuclear phenomena in general, nuclear or other radioactive material specifically, and the potential hazards related to them is required for threat assessment, protection, and risk management. Furthermore, given the unique skills and attributes of professional health physicists, it is argued that the role of the health physicist should encompass all aspects of nuclear security, ranging from input in the development to implementation and execution of an efficient and effective nuclear security regime. As such, health physicists should transcend their current typical role as consultants in nuclear security issues and become fully integrated and recognized experts in the nuclear security domain and decision making process. Issues regarding the security clearances of health physics personnel and the possibility of insider threats must be addressed in the same manner as for other trusted individuals; however, the net gain from recognizing and integrating health physics expertise in all levels of a nuclear security regime far outweighs any negative aspects. In fact, it can be argued that health physics is essential in achieving an integrated approach toward nuclear safety, security, and safeguards.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badwan, Faris M.; Demuth, Scott Francis; Miller, Michael Conrad
Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fullymore » integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may lead to more proliferation resistant and physically secure design features for SMRs.« less
The Role of the Health Physicist in Nuclear Security
Waller, Edward J.; van Maanen, Jim
2015-01-01
Abstract Health physics is a recognized safety function in the holistic context of the protection of workers, members of the public, and the environment against the hazardous effects of ionizing radiation, often generically designated as radiation protection. The role of the health physicist as protector dates back to the Manhattan Project. Nuclear security is the prevention and detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Its importance has become more visible and pronounced in the post 9/11 environment, and it has a shared purpose with health physics in the context of protection of workers, members of the public, and the environment. However, the duties and responsibilities of the health physicist in the nuclear security domain are neither clearly defined nor recognized, while a fundamental understanding of nuclear phenomena in general, nuclear or other radioactive material specifically, and the potential hazards related to them is required for threat assessment, protection, and risk management. Furthermore, given the unique skills and attributes of professional health physicists, it is argued that the role of the health physicist should encompass all aspects of nuclear security, ranging from input in the development to implementation and execution of an efficient and effective nuclear security regime. As such, health physicists should transcend their current typical role as consultants in nuclear security issues and become fully integrated and recognized experts in the nuclear security domain and decision making process. Issues regarding the security clearances of health physics personnel and the possibility of insider threats must be addressed in the same manner as for other trusted individuals; however, the net gain from recognizing and integrating health physics expertise in all levels of a nuclear security regime far outweighs any negative aspects. In fact, it can be argued that health physics is essential in achieving an integrated approach toward nuclear safety, security, and safeguards. PMID:25706142
Non-developmental item computer systems and the malicious software threat
NASA Technical Reports Server (NTRS)
Bown, Rodney L.
1991-01-01
The following subject areas are covered: a DOD development system - the Army Secure Operating System; non-development commercial computer systems; security, integrity, and assurance of service (SI and A); post delivery SI and A and malicious software; computer system unique attributes; positive feedback to commercial computer systems vendors; and NDI (Non-Development Item) computers and software safety.
48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...
48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...
48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...
48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...
Courtney, Brooke; Bond, Katherine C; Maher, Carmen
2014-01-01
In February 2014, health officials from around the world announced the Global Health Security Agenda, a critical effort to strengthen national and global systems to prevent, detect, and respond to infectious disease threats and to foster stronger collaboration across borders. With its increasing global roles and broad range of regulatory responsibilities in ensuring the availability, safety, and security of medical and food products, the US Food and Drug Administration (FDA) is engaged in a range of efforts in support of global health security. This article provides an overview of FDA's global health security roles, focusing on its responsibilities related to the development and use of medical countermeasures (MCMs) for preventing, detecting, and responding to global infectious disease and other public health emergency threats. The article also discusses several areas-antimicrobial resistance, food safety, and supply chain integrity-in which FDA's global health security roles continue to evolve and extend beyond MCMs and, in some cases, beyond traditional infectious disease threats.
ERIC Educational Resources Information Center
School Planning & Management, 2002
2002-01-01
Several architects, planners, administrators, and contractors answer questions about trends related to school construction, interior design, business, security, and technology. Trends concern funding issues, specialized designs, planning for safety, technological integration, and equity in services. (EV)
Mitigating Hazards in School Facilities
ERIC Educational Resources Information Center
National Clearinghouse for Educational Facilities, 2008
2008-01-01
School safety is a human concern, one that every school and community must take seriously and strive continually to achieve. It is also a legal concern; schools can be held liable if they do not make good-faith efforts to provide a safe and secure school environment. How schools are built and maintained is an integral part of school safety and…
2013-12-01
Program HSGP Homeland Security Grant Program IAEA International Atomic Energy Agency IAV Initial Asset Visit IPD Integrated Project Delivery...Light of Program’s Failures, Energy & Commerce Committee, 2013. 85 Adam Estes, “The Exploding Fertilizer Plant in Texas Hadn’t Had a Full Inspection in...63 INITIAL DISTRIBUTION LIST
A 3S Risk ?3SR? Assessment Approach for Nuclear Power: Safety Security and Safeguards.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Forrest, Robert; Reinhardt, Jason Christian; Wheeler, Timothy A.
Safety-focused risk analysis and assessment approaches struggle to adequately include malicious, deliberate acts against the nuclear power industry's fissile and waste material, infrastructure, and facilities. Further, existing methods do not adequately address non- proliferation issues. Treating safety, security, and safeguards concerns independently is inefficient because, at best, it may not take explicit advantage of measures that provide benefits against multiple risk domains, and, at worst, it may lead to implementations that increase overall risk due to incompatibilities. What is needed is an integrated safety, security and safeguards risk (or "3SR") framework for describing and assessing nuclear power risks that canmore » enable direct trade-offs and interactions in order to inform risk management processes -- a potential paradigm shift in risk analysis and management. These proceedings of the Sandia ePRA Workshop (held August 22-23, 2017) are an attempt to begin the discussions and deliberations to extend and augment safety focused risk assessment approaches to include security concerns and begin moving towards a 3S Risk approach. Safeguards concerns were not included in this initial workshop and are left to future efforts. This workshop focused on four themes in order to begin building out a the safety and security portions of the 3S Risk toolkit: 1. Historical Approaches and Tools 2. Current Challenges 3. Modern Approaches 4. Paths Forward and Next Steps This report is organized along the four areas described above, and concludes with a summary of key points. 2 Contact: rforres@sandia.gov; +1 (925) 294-2728« less
10 CFR 850 Implementation of Requirements
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, S
2012-01-05
10 CFR 850 defines a contractor as any entity, including affiliated entities, such as a parent corporation, under contract with DOE, including a subcontractor at any tier, with responsibility for performing work at a DOE site in furtherance of a DOE mission. The Chronic Beryllium Disease Prevention Program (CBDPP) applies to beryllium-related activities that are performed at the Lawrence Livermore National Laboratory (LLNL). The CBDPP or Beryllium Safety Program is integrated into the LLNL Worker Safety and Health Program and, thus, implementation documents and responsibilities are integrated in various documents and organizational structures. Program development and management of the CBDPPmore » is delegated to the Environment, Safety and Health (ES&H) Directorate, Worker Safety and Health Functional Area. As per 10 CFR 850, Lawrence Livermore National Security, LLC (LLNS) periodically submits a CBDPP to the National Nuclear Security Administration/Livermore Site Office (NNSA/LSO). The requirements of this plan are communicated to LLNS workers through ES&H Manual Document 14.4, 'Working Safely with Beryllium.' 10 CFR 850 is implemented by the LLNL CBDPP, which integrates the safety and health standards required by the regulation, components of the LLNL Integrated Safety Management System (ISMS), and incorporates other components of the LLNL ES&H Program. As described in the regulation, and to fully comply with the regulation, specific portions of existing programs and additional requirements are identified in the CBDPP. The CBDPP is implemented by documents that interface with the workers, principally through ES&H Manual Document 14.4. This document contains information on how the management practices prescribed by the LLNL ISMS are implemented, how beryllium hazards that are associated with LLNL work activities are controlled, and who is responsible for implementing the controls. Adherence to the requirements and processes described in the ES&H Manual ensures that ES&H practices across LLNL are developed in a consistent manner. Other implementing documents, such as the ES&H Manual, are integral in effectively implementing 10 CFR 850.« less
1983-03-01
have both a Federal and a State mission. The State mission is to provide protection of life and property and to preserve peace and public safety. The...logistics system is basically the same and will be integrated into the active system in wartime. Financial man- agement support consists of financial...the entire system is security. ErS is on contract to furnish basic security as well as a higher type of security known as the enhanced version
Maritime Cyber Security University Research
2016-05-01
traffic so vital to the global economy . The vulnerabilities associated with reliance on digital systems in the maritime environment must be continuously...Abstract (MAXIMUM 200 WORDS) Modern maritime systems are highly complex digital systems to ensure the safety and efficient operation of the shipping...integrity of the entrances to our " digital ports" and work to develop practical cyber security solutions to protect the nation’s maritime
Measuring Global Water Security Towards Sustainable Development Goals
NASA Technical Reports Server (NTRS)
Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide
2016-01-01
Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.
RESTORING SAFETY: AN ATTACHMENT-BASED APPROACH TO CLINICAL WORK WITH A TRAUMATIZED TODDLER.
Ribaudo, Julie
2016-01-01
This clinical case study explores the integration of infancy research, brain development, attachment theory, and models of infant-parent/child-parent psychotherapy to address the needs of abused and neglected young children placed in foster or adoptive homes. Traumatized children employ defensive strategies to survive when there is no "good enough" caregiver (D.W. Winnicott, 1953, p. 94), and helping professionals can provide therapeutic experiences to develop or restore a child's sense of safety. With the case example of Anthony and his foster/adoptive parents, I illustrate how to manage and contain a traumatized child's terror, rage, and grief through therapeutic sessions with the parent and child together, and supportive parental guidance. I promote attention to the child's ability to self-integrate and to regulate his own affect, and encourages secure-base parental responses that facilitate a child's shift toward secure attachment behavior. © 2015 Michigan Association for Infant Mental Health.
Sandia National Laboratories: Integrated Military Systems
Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios
Design of Xen Hybrid Multiple Police Model
NASA Astrophysics Data System (ADS)
Sun, Lei; Lin, Renhao; Zhu, Xianwei
2017-10-01
Virtualization Technology has attracted more and more attention. As a popular open-source virtualization tools, XEN is used more and more frequently. Xsm, XEN security model, has also been widespread concern. The safety status classification has not been established in the XSM, and it uses the virtual machine as a managed object to make Dom0 a unique administrative domain that does not meet the minimum privilege. According to these questions, we design a Hybrid multiple police model named SV_HMPMD that organically integrates multiple single security policy models include DTE,RBAC,BLP. It can fullfill the requirement of confidentiality and integrity for security model and use different particle size to different domain. In order to improve BLP’s practicability, the model introduce multi-level security labels. In order to divide the privilege in detail, we combine DTE with RBAC. In order to oversize privilege, we limit the privilege of domain0.
MEMS and MOEMS for national security applications
NASA Astrophysics Data System (ADS)
Scott, Marion W.
2003-01-01
Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.
Code of Federal Regulations, 2010 CFR
2010-10-01
... requirements or such other requirements as defined and specified by the Secretary of Homeland Security: (1) Is... otherwise cause, for which a SAFETY Act designation has been issued. For purposes of defining a QATT..., engineering services, software development services, software integration services, threat assessments...
Code of Federal Regulations, 2013 CFR
2013-10-01
... requirements or such other requirements as defined and specified by the Secretary of Homeland Security: (1) Is... otherwise cause, for which a SAFETY Act designation has been issued. For purposes of defining a QATT..., engineering services, software development services, software integration services, threat assessments...
Code of Federal Regulations, 2012 CFR
2012-10-01
... requirements or such other requirements as defined and specified by the Secretary of Homeland Security: (1) Is... otherwise cause, for which a SAFETY Act designation has been issued. For purposes of defining a QATT..., engineering services, software development services, software integration services, threat assessments...
Code of Federal Regulations, 2011 CFR
2011-10-01
... requirements or such other requirements as defined and specified by the Secretary of Homeland Security: (1) Is... otherwise cause, for which a SAFETY Act designation has been issued. For purposes of defining a QATT..., engineering services, software development services, software integration services, threat assessments...
Code of Federal Regulations, 2014 CFR
2014-10-01
... requirements or such other requirements as defined and specified by the Secretary of Homeland Security: (1) Is... otherwise cause, for which a SAFETY Act designation has been issued. For purposes of defining a QATT..., engineering services, software development services, software integration services, threat assessments...
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen
2016-01-01
Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.
Lund, Adam; Turris, Sheila
2017-08-01
Despite the best efforts of event producers and on-site medical teams, there are sometimes serious illnesses, life-threatening injuries, and fatalities related to music festival attendance. Producers, clinicians, and researchers are actively seeking ways to reduce the mortality and morbidity associated with these events. After analyzing the available literature on music festival health and safety, several major themes emerged. Principally, stakeholder groups planning in isolation from one another (ie, in silos) create fragmentation, gaps, and overlap in plans for major planned events (MPEs). The authors hypothesized that one approach to minimizing this fragmentation may be to create a framework to "connect the dots," or join together the many silos of professionals responsible for safety, security, health, and emergency planning at MPEs. Adapted from the well-established literature regarding the management of cardiac arrests, both in and out of hospital, the "chain of survival" concept is applied to the disparate groups providing services that support event safety in the context of music festivals. The authors propose this framework for describing, understanding, coordinating and planning around the integration of safety, security, health, and emergency service for events. The adapted Event Chain of Survival contains six interdependent links, including: (1) event producers; (2) police and security; (3) festival health; (4) on-site medical services; (5) ambulance services; and (6) off-site medical services. The authors argue that adapting and applying this framework in the context of MPEs in general, and music festivals specifically, has the potential to break down the current disconnected approach to event safety, security, health, and emergency planning. It offers a means of shifting the focus from a purely reactive stance to a more proactive, collaborative, and integrated approach. Improving health outcomes for music festival attendees, reducing gaps in planning, promoting consistency, and improving efficiency by reducing duplication of services will ultimately require coordination and collaboration from the beginning of event production to post-event reporting. Lund A , Turris SA . The Event Chain of Survival in the context of music festivals: a framework for improving outcomes at major planned events. Prehosp Disaster Med. 2017;32(4):437-443.
Sharma, Tarun K; Ramanathan, Rajesh; Rakwal, Randeep; Agrawal, Ganesh K; Bansal, Vipul
2015-05-01
Plant-based foods are integral part of our day-to-day diet. Increasing world population has put forth an ever increasing demand for plant-based foods, and food security remains a major concern. Similarly, biological, chemical, and physical threats to our food and increasing regulatory demands to control the presence of foreign species in food products have made food safety a growing issue. Nanotechnology has already established its roots in diverse disciplines. However, the food industry is yet to harness the full potential of the unique capabilities offered by this next-generation technology. While there might be safety concerns in regards to integration of nanoproducts with our food products, an aspect of nanotechnology that can make remarkable contribution to different elements of the food chain is the use of nanobiosensors and diagnostic platforms for monitoring food traceability, quality, safety, and nutritional value. This brings us to an important question that whether existing diagnostic platforms that have already been well developed for biomedical and clinical application are suitable for food industry or whether the demands of the food industry are altogether different that may not allow adoption/adaptation of the existing technology. This review is an effort to raise this important "uncomfortable" yet "timely" question. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
14 CFR 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2013 CFR
2013-01-01
.... (a) Security is the condition of safeguarding against espionage, sabotage, crime (including computer... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Breach of safety or security. 1274.936... security. Breach of Safety or Security July 2002 Safety is the freedom from those conditions that can cause...
14 CFR 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2010 CFR
2010-01-01
.... (a) Security is the condition of safeguarding against espionage, sabotage, crime (including computer... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Breach of safety or security. 1274.936... security. Breach of Safety or Security July 2002 Safety is the freedom from those conditions that can cause...
14 CFR 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2011 CFR
2011-01-01
.... (a) Security is the condition of safeguarding against espionage, sabotage, crime (including computer... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Breach of safety or security. 1274.936... security. Breach of Safety or Security July 2002 Safety is the freedom from those conditions that can cause...
Privacy preservation and authentication on secure geographical routing in VANET
NASA Astrophysics Data System (ADS)
Punitha, A.; Manickam, J. Martin Leo
2017-05-01
Vehicular Ad hoc Networks (VANETs) play an important role in vehicle-to-vehicle communication as it offers a high level of safety and convenience to drivers. In order to increase the level of security and safety in VANETs, in this paper, we propose a Privacy Preservation and Authentication on Secure Geographical Routing Protocol (PPASGR) for VANET. It provides security by detecting and preventing malicious nodes through two directional antennas such as forward (f-antenna) and backward (b-antenna). The malicious nodes are detected by direction detection, consistency detection and conflict detection. The location of the trusted neighbour is identified using TNT-based location verification scheme after the implementation of the Vehicle Tamper Proof Device (VTPD), Trusted Authority (TA) is generated that produces the anonymous credentials. Finally, VTPD generates pseudo-identity using TA which retrieves the real identity of the sender. Through this approach, the authentication, integrity and confidentiality for routing packets can be achieved. The simulation results show that the proposed approach reduces the packet drop due to attack and improves the packet delivery ratio.
33 CFR 1.05-5 - Marine Safety and Security Council.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine... Commandant and is the focal point of the Coast Guard regulatory system. The Marine Safety and Security...
33 CFR 1.05-5 - Marine Safety and Security Council.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine... Commandant and is the focal point of the Coast Guard regulatory system. The Marine Safety and Security...
33 CFR 1.05-5 - Marine Safety and Security Council.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine... Commandant and is the focal point of the Coast Guard regulatory system. The Marine Safety and Security...
33 CFR 1.05-5 - Marine Safety and Security Council.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine... Commandant and is the focal point of the Coast Guard regulatory system. The Marine Safety and Security...
NASA Technical Reports Server (NTRS)
Fujikawa, Gene (Compiler)
2005-01-01
Contents includes papers on the following: JPDO: Inter-Agency Cooperation for the Next Generation ATS; R&T Programs; Integrated CNS Systems and Architectures; Datalink Communication Systems; Navigation, System Demonstrations and Operations; Safety and Security Initiatives Impacting CNS; Global Communications Initiatives; Airborne Internet; Avionics for System-Level Enhancements; SWIM (System Wide Information Management); Weather Products and Data Dissemination Technologies; Airsapce Communication Networks; Surveillance Systems; Workshop Breakouts Sessions and ; ICNS Conference Information.
Online Safety: Fraud, Security, Phishing, Vishing
... Theft Online Safety Privacy Report Scams and Frauds Online Safety Be aware of these scams when you' ... Security and Safety Internet Fraud Phishing and Vishing Online Security and Safety The internet makes many everyday ...
Children affected by HIV/AIDS: SAFE, a model for promoting their security, health, and development.
Betancourt, Theresa S; Fawzi, Mary K S; Bruderlein, Claude; Desmond, Chris; Kim, Jim Y
2010-05-01
A human security framework posits that individuals are the focus of strategies that protect the safety and integrity of people by proactively promoting children's well being, placing particular emphasis on prevention efforts and health promotion. This article applies this framework to a rights-based approach in order to examine the health and human rights of children affected by HIV/AIDS. The SAFE model describes sources of insecurity faced by children across four fundamental dimensions of child well-being and the survival strategies that children and families may employ in response. The SAFE model includes: Safety/protection; Access to health care and basic physiological needs; Family/connection to others; and Education/livelihoods. We argue that it is critical to examine the situation of children through an integrated lens that effectively looks at human security and children's rights through a holistic approach to treatment and care rather than artificially limiting our scope of work to survival-oriented interventions for children affected by HIV/AIDS. Interventions targeted narrowly at children, in isolation of their social and communal environment as outlined in the SAFE model, may in fact undermine protective resources in operation in families and communities and present additional threats to children's basic security. An integrated approach to the basic security and care of children has implications for the prospects of millions of children directly infected or indirectly affected by HIV/AIDS around the world. The survival strategies that young people and their families engage in must be recognized as a roadmap for improving their protection and promoting healthy development. Although applied to children affected by HIV/AIDS in the present analysis, the SAFE model has implications for guiding the care and protection of children and families facing adversity due to an array of circumstances from armed conflict and displacement to situations of extreme poverty.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-19
... Chemical Facility Safety and Security Listening Sessions AGENCY: National Protection and Programs... from stakeholders on issues pertaining to Improving Chemical Facility Safety and Security (Executive... regulations, guidance, and policies; and identifying best practices in chemical facility safety and security...
Chattopadhyay, Pritam; Banerjee, Goutam; Mukherjee, Sayantan
2017-05-01
Food security and safety are the major concern in ever expanding human population on the planet earth. Each and every year insect pests cause a serious damage in agricultural field that cost billions of dollars annually to farmers. The loss in term of productivity and high cost of chemical pesticides enhance the production cost. Irrespective use of chemical pesticides (such as Benzene hexachloride, Endosulfan, Aldicarb, and Fenobucarb) in agricultural field raised several types of environmental issues. Furthermore, continuous use of chemical pesticides creates a selective pressure which helps in emerging of resistance pest. These excess chemical pesticide residues also contaminate the environment including the soil and water. Therefore, the biological control of insect pest in the agricultural field gains more importance due to food safety and environment friendly nature. In this regard, bacterial insecticides offer better alternative to chemical pesticides. It not only helps to establish food security through fighting against insect pests but also ensure the food safety. In this review, we have categorized insect pests and the corresponding bacterial insecticides, and critically analyzed the importance and mode of action of bacterial pesticides. We also have summarized the use of biopesticides in integrated pest management system. We have tried to focus the future research area in this field for the upcoming scientists.
Code of Federal Regulations, 2012 CFR
2012-07-01
...; Captain of the Port Long Island Sound Zone Safety and Security Zones. 165.154 Section 165.154 Navigation... Long Island Sound Zone Safety and Security Zones. The following areas are designated safety and... navigable waters of Long Island Sound, from surface to bottom, North and Northeast of a line running from...
46 CFR 154.419 - Design vapor pressure.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 5 2012-10-01 2012-10-01 false Design vapor pressure. 154.419 Section 154.419 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY STANDARDS FOR SELF-PROPELLED VESSELS CARRYING BULK LIQUEFIED GASES Design, Construction and Equipment Integral Tanks § 154.419 Design vapor pressure. The...
46 CFR 154.419 - Design vapor pressure.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 5 2014-10-01 2014-10-01 false Design vapor pressure. 154.419 Section 154.419 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY STANDARDS FOR SELF-PROPELLED VESSELS CARRYING BULK LIQUEFIED GASES Design, Construction and Equipment Integral Tanks § 154.419 Design vapor pressure. The...
46 CFR 154.419 - Design vapor pressure.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 5 2013-10-01 2013-10-01 false Design vapor pressure. 154.419 Section 154.419 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY STANDARDS FOR SELF-PROPELLED VESSELS CARRYING BULK LIQUEFIED GASES Design, Construction and Equipment Integral Tanks § 154.419 Design vapor pressure. The...
ERIC Educational Resources Information Center
Florida State Dept. of Education, Tallahassee.
During summer and fall 2001, the Florida Commissioner of Education conducted eight regional meetings, open to the public, on school safety and security. The purpose of the meetings was to explore safety issues faced by districts and schools, share best safety practices, and generate local discussion on matters of school safety and security. This…
NASA Astrophysics Data System (ADS)
Straub, Jeremy
2017-06-01
A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.
33 CFR 165.904 - Lake Michigan at Chicago Harbor & Burnham Park Harbor-Safety and Security Zone.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Harbor, to the northwest point. (b) Effective times and dates. This safety and security zone will be in... & Burnham Park Harbor-Safety and Security Zone. 165.904 Section 165.904 Navigation and Navigable Waters... Guard District § 165.904 Lake Michigan at Chicago Harbor & Burnham Park Harbor—Safety and Security Zone...
Secure real-time wireless video streaming in the aeronautical telecommunications network
NASA Astrophysics Data System (ADS)
Czernik, Pawel; Olszyna, Jakub
2010-09-01
As Air Traffic Control Systems move from a voice only environment to one in which clearances are issued via data link, there is a risk that an unauthorized entity may attempt to masquerade as either the pilot or controller. In order to protect against this and related attacks, air-ground communications must be secured. The challenge is to add security in an environment in which bandwidth is limited. The Aeronautical Telecommunications Network (ATN) is an enabling digital network communications technology that addresses capacity and efficiency issues associated with current aeronautical voice communication systems. Equally important, the ATN facilitates migration to free flight, where direct computer-to-computer communication will automate air traffic management, minimize controller and pilot workload, and improve overall aircraft routing efficiency. Protecting ATN communications is critical since safety-of-flight is seriously affected if an unauthorized entity, a hacker for example, is able to penetrate an otherwise reliable communications system and accidentally or maliciously introduce erroneous information that jeopardizes the overall safety and integrity of a given airspace. However, an ATN security implementation must address the challenges associated with aircraft mobility, limited bandwidth communication channels, and uninterrupted operation across organizational and geopolitical boundaries. This paper provides a brief overview of the ATN, the ATN security concept, and begins a basic introduction to the relevant security concepts of security threats, security services and security mechanisms. Security mechanisms are further examined by presenting the fundamental building blocks of symmetric encipherment, asymmetric encipherment, and hash functions. The second part of this paper presents the project of cryptographiclly secure wireless communication between Unmanned Aerial Vehicles (UAV) and the ground station in the ATM system, based on the ARM9 processor development kid and Embedded Linux operation system.
Renewable Hydrogen-Economically Viable: Integration into the U.S. Transportation Sector
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurtz, Jennifer; Peters, Mike; Muratori, Matteo
The U.S. transportation sector is expected to meet numerous goals in differing applications. These goals address security, safety, fuel source, emissions reductions, advanced mobility models, and improvements in quality and accessibility. Solutions to meeting these goals include a variety of alternative-fuel technologies, including batteries, fuel cells, synthetic fuels, and biofuels, as well as modifying how current transportation systems are used and integrating new systems, such as storing renewable energy. Overall, there are many combinations of problems, objectives, and solutions.
Persistent maritime traffic monitoring for the Canadian Arctic
NASA Astrophysics Data System (ADS)
Ulmke, M.; Battistello, G.; Biermann, J.; Mohrdieck, C.; Pelot, R.; Koch, W.
2017-05-01
This paper presents results of the Canadian-German research project PASSAGES (Protection and Advanced Surveillance System for the Arctic: Green, Efficient, Secure)1 on an advanced surveillance system for safety and security of maritime operations in Arctic areas. The motivation for a surveillance system of the Northwest Passage is the projected growth of maritime traffic along Arctic sea routes and the need for securing Canada's sovereignty by controlling its arctic waters as well as for protecting the safety of international shipping and the intactness of the arctic marine environment. To ensure border security and to detect and prevent illegal activities it is necessary to develop a system for surveillance and reconnaissance that brings together all related means, assets, organizations, processes and structures to build one homogeneous and integrated system. The harsh arctic conditions require a new surveillance concept that fuses heterogeneous sensor data, contextual information, and available pre-processed surveillance data and combines all components to efficiently extract and provide the maximum available amount of information. The fusion of all these heterogeneous data and information will provide improved and comprehensive situation awareness for risk assessment and decision support of different stakeholder groups as governmental authorities, commercial users and Northern communities.
Programs That Support Safety and Security for the Transit Industry
DOT National Transportation Integrated Search
2001-03-01
FTA's Office of Safety and Security (Office) directly supports the U.S. Department of Transportation's safety goals through a series of programs designed to maintain continuous improvement in the safety and security of our nation's transit systems. T...
Women's Science Major Satisfaction: Regulatory Focus and the Critical Mass Hypothesis
ERIC Educational Resources Information Center
Deemer, Eric D.
2015-01-01
Women contend with gender bias in certain science contexts, which suggests they may be likely to adopt prevention-focused modes of regulation aimed at maintaining safety and security in such settings. This study represented an integrated test of regulatory focus theory (RFT; Higgins, 1997, 1998) and the critical mass hypothesis, which assumes that…
ERIC Educational Resources Information Center
Schneider, Tod; Walker, Hill; Sprague, Jeffrey
This document seeks to synthesize, integrate, and make available to school personnel solid information regarding Crime Prevention through Environmental Design (CPTED). Chapter 1, "The Changed Landscape of School Safety and Security," examines characteristics of safe and unsafe schools, causes of vulnerability, and the role of design and technology…
One Health in food safety and security education: Subject matter outline for a curricular framework.
Angelos, John A; Arens, Amanda L; Johnson, Heather A; Cadriel, Jessica L; Osburn, Bennie I
2017-06-01
Educating students in the range of subjects encompassing food safety and security as approached from a One Health perspective requires consideration of a variety of different disciplines and the interrelationships among disciplines. The Western Institute for Food Safety and Security developed a subject matter outline to accompany a previously published One Health in food safety and security curricular framework. The subject matter covered in this outline encompasses a variety of topics and disciplines related to food safety and security including effects of food production on the environment. This subject matter outline should help guide curriculum development and education in One Health in food safety and security and provides useful information for educators, researchers, students, and public policy-makers facing the inherent challenges of maintaining and/or developing safe and secure food supplies without destroying Earth's natural resources.
Sandia National Laboratories: National Security Missions: Nuclear Weapons:
Safety & Security Sandia National Laboratories Exceptional service in the national interest & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Twitter YouTube Flickr RSS Top Nuclear Weapons About Nuclear Weapons at Sandia Safety & Security
Safety and security in acute admission psychiatric wards in Ireland and London: a comparative study.
Cowman, Seamus; Bowers, Len
2009-05-01
The comparative element of this study is to describe safety and security measures in psychiatric acute admission wards in the Republic of Ireland and London; to describe differences and similarities in terms of safety and security patterns in the Republic of Ireland and London; and to make recommendations on safety and security to mental health services management and psychiatric nurses. Violence is a serious problem in psychiatric services and staff experience significant psychological reactions to being assaulted. Health and Safety Authorities in the UK and Ireland have expressed concern about violence and assault in healthcare, however, there remains a lack of clarity on matters of procedure and policy pertaining to safety and security in psychiatric hospitals. A descriptive survey research design was employed. Questionnaires were circulated to all acute wards in London and in Ireland and the resulting data compared. A total of 124 psychiatric wards from London and 43 wards from Ireland were included in this study and response rates of 70% (London) and 86% (Ireland) were obtained. Differences and similarities in safety and security practices were identified between London and Ireland, with Irish wards having generally higher and more intensive levels of security. There is a lack of coherent policy and procedure in safety and security measures across psychiatric acute admission wards in the Republic of Ireland and London. Given the trends in European Union (EU) regulation, there is a strong argument for the publication of acceptable minimum guidelines for safety and security in mental health services across the EU. There must be a concerted effort to ensure that all policy and procedure in safety and security is founded on evidence and best practice. Mental health managers must establish a review of work safety and security procedures and practices. Risk assessment and environmental audits of all mental health clinical environments should be mandatory.
Poggi, L A; Malizia, A; Ciparisse, J F; Gaudio, P
2016-10-01
An open issue still under investigation by several international entities working on the safety and security field for the foreseen nuclear fusion reactors is the estimation of source terms that are a hazard for the operators and public, and for the machine itself in terms of efficiency and integrity in case of severe accident scenarios. Source term estimation is a crucial key safety issue to be addressed in the future reactors safety assessments, and the estimates available at the time are not sufficiently satisfactory. The lack of neutronic data along with the insufficiently accurate methodologies used until now, calls for an integrated methodology for source term estimation that can provide predictions with an adequate accuracy. This work proposes a complete methodology to estimate dust source terms starting from a broad information gathering. The wide number of parameters that can influence dust source term production is reduced with statistical tools using a combination of screening, sensitivity analysis, and uncertainty analysis. Finally, a preliminary and simplified methodology for dust source term production prediction for future devices is presented.
76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-31
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...
Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure
NASA Astrophysics Data System (ADS)
Arndt, Craig M.; Hall, Nathaniel A.
2004-08-01
Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.
A National Partnership for Careers in Public Safety and Security
ERIC Educational Resources Information Center
Coffee, Joseph
2007-01-01
A partnership of state, local and federal public safety agencies, secondary and postsecondary educational institutions, and professional and educational associations, the National Partnership for Careers in Law, Public Safety, Corrections and Security also serves as the lead organization for the Law, Public Safety, Corrections and Security Career…
MCPS School Safety & Security at a Glance 2011-2012
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2012
2012-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…
MCPS School Safety & Security at a Glance 2013-2014
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2014
2014-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…
MCPS School Safety & Security at a Glance 2012-2013
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2013
2013-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…
ERIC Educational Resources Information Center
Eisele-Dyrli, Kurt
2010-01-01
A new informal federal survey has found that for many districts, budget cuts have had a profound effect on school safety and security measures. Administrators have been forced to cut safety and security staffing and programs, reorganize security departments and find alternative sources of funding in order to maintain levels of safety and security…
MCPS School Safety and Security at a Glance 2007-2008
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2008
2008-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, including school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for…
Multi-discipline Waste Acceptance Process at the Nevada National Security Site - 13573
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carilli, Jhon T.; Krenzien, Susan K.
2013-07-01
The Nevada National Security Site low-level radioactive waste disposal facility acceptance process requires multiple disciplines to ensure the protection of workers, the public, and the environment. These disciplines, which include waste acceptance, nuclear criticality, safety, permitting, operations, and performance assessment, combine into the overall waste acceptance process to assess low-level radioactive waste streams for disposal at the Area 5 Radioactive Waste Management Site. Four waste streams recently highlighted the integration of these disciplines: the Oak Ridge Radioisotope Thermoelectric Generators and Consolidated Edison Uranium Solidification Project material, West Valley Melter, and classified waste. (authors)
Geographical Database Integrity Validation
NASA Technical Reports Server (NTRS)
Jacobs, Derya; Kauffman, Paul; Blackstock, Dexter
2000-01-01
Airport Safety Modeling Data (ASMD) was developed at the request of a 1997 White House Conference on Aviation Safety and Security. Politicians, military personnel, commercial aircraft manufacturers and the airline industry attended the conference. The objective of the conference was to study the airline industry and make recommendations to improve safety and security. One of the topics discussed at the conference was the loss of situational awareness by aircraft pilots. Loss of situational awareness occurs when a pilot loses his geographic position during flight and can result in crashes into terrain and obstacles. It was recognized at the conference that aviation safety could be improved by reducing the loss of situational awareness. The conference advised that a system be placed in the airplane cockpit that would provide pilots with a visual representation of the terrain around airports. The system would prevent airline crashes during times of inclement weather and loss of situational awareness. The system must be based on accurate data that represents terrain around airports. The Department of Defense and the National Imagery and Mapping Agency (NIMA) released ASMD to be used for the development of a visual system for aircraft pilots. ASMD was constructed from NIMA digital terrain elevation data (DTED).
NASA Astrophysics Data System (ADS)
Robinson, Nidia; Saafi, Mohamed
2006-03-01
Critical civil infrastructure systems such as bridges, high rises, dams, nuclear power plants and pipelines present a major investment and the health of the United States' economy and the lifestyle of its citizens both depend on their safety and security. The challenge for engineers is to maintain the safety and security of these large structures in the face of terrorism threats, natural disasters and long-term deterioration, as well as to meet the demands of emergency response times. With the significant negative impact that these threats can have on the structural environment, health monitoring of civil infrastructure holds promise as a way to provide information for near real-time condition assessment of the structure's safety and security. This information can be used to assess the integrity of the structure for post-earthquake and terrorist attacks rescue and recovery, and to safely and rapidly remove the debris and to temporary shore specific structural elements. This information can also be used for identification of incipient damage in structures experiencing long-term deterioration. However, one of the major obstacles preventing sensor-based monitoring is the lack of reliable, easy-to-install, cost-effective and harsh environment resistant sensors that can be densely embedded into large-scale civil infrastructure systems. Nanotechnology and MEMS-based systems which have matured in recent years represent an innovative solution to current damage detection systems, leading to wireless, inexpensive, durable, compact, and high-density information collection. In this paper, ongoing research activities at Alabama A&M University (AAMU) Center for Transportation Infrastructure Safety and Security on the application of nanotechnology and MEMS to Civil Infrastructure for health monitoring will presented. To date, research showed that nanotechnology and MEMS-based systems can be used to wirelessly detect and monitor different damage mechanisms in concrete structures as well as monitor critical structures' stability during floods and barge impact. However, some technical issues that needs to be addressed before full implementation of these new systems and will also be discussed in this paper.
Regulatory cross-cutting topics for fuel cycle facilities.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Denman, Matthew R.; Brown, Jason; Goldmann, Andrew Scott
This report overviews crosscutting regulatory topics for nuclear fuel cycle facilities for use in the Fuel Cycle Research & Development Nuclear Fuel Cycle Evaluation and Screening study. In particular, the regulatory infrastructure and analysis capability is assessed for the following topical areas: Fire Regulations (i.e., how applicable are current Nuclear Regulatory Commission (NRC) and/or International Atomic Energy Agency (IAEA) fire regulations to advance fuel cycle facilities) Consequence Assessment (i.e., how applicable are current radionuclide transportation tools to support risk-informed regulations and Level 2 and/or 3 PRA) While not addressed in detail, the following regulatory topic is also discussed: Integrated Security,more » Safeguard and Safety Requirement (i.e., how applicable are current Nuclear Regulatory Commission (NRC) regulations to future fuel cycle facilities which will likely be required to balance the sometimes conflicting Material Accountability, Security, and Safety requirements.)« less
Fielden, Sarah J; Anema, Aranka; Fergusson, Pamela; Muldoon, Katherine; Grede, Nils; de Pee, Saskia
2014-10-01
As an increasing number of countries implement integrated food and nutrition security (FNS) and HIV programs, global stakeholders need clarity on how to best measure FNS at the individual and household level. This paper reviews prominent FNS measurement tools, and describes considerations for interpretation in the context of HIV. There exist a range of FNS measurement tools and many have been adapted for use in HIV-endemic settings. Considerations in selecting appropriate tools include sub-types (food sufficiency, dietary diversity and food safety); scope/level of application; and available resources. Tools need to reflect both the needs of PLHIV and affected households and FNS program objectives. Generalized food sufficiency and dietary diversity tools may provide adequate measures of FNS in PLHIV for programmatic applications. Food consumption measurement tools provide further data for clinical or research applications. Measurement of food safety is an important, but underdeveloped aspect of assessment, especially for PLHIV.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-15
...; announcement of effective date. SUMMARY: On October 15, 2012, the Public Safety and Homeland Security Bureau...: Gene Fullano, Federal Communications Commission, Public Safety and Homeland Security Bureau, 445 12th... . SUPPLEMENTARY INFORMATION: On October 15, 2012, the Public Safety and Homeland Security Bureau (Bureau) of the...
MCPS School Safety and Security at a Glance 2008-2009
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2009
2009-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…
MCPS School Safety and Security at a Glance 2010-2011
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2011
2011-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…
MCPS School Safety and Security at a Glance 2009-2010
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2010
2010-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) public schools. The information is presented for each school.…
Communication and computing technology in biocontainment laboratories using the NEIDL as a model.
McCall, John; Hardcastle, Kath
2014-07-01
The National Emerging Infectious Diseases Laboratories (NEIDL), Boston University, is a globally unique biocontainment research facility housing biosafety level 2 (BSL-2), BSL-3, and BSL-4 laboratories. Located in the BioSquare area at the University's Medical Campus, it is part of a national network of secure facilities constructed to study infectious diseases of major public health concern. The NEIDL allows for basic, translational, and clinical phases of research to be carried out in a single facility with the overall goal of accelerating understanding, treatment, and prevention of infectious diseases. The NEIDL will also act as a center of excellence providing training and education in all aspects of biocontainment research. Within every detail of NEIDL operations is a primary emphasis on safety and security. The ultramodern NEIDL has required a new approach to communications technology solutions in order to ensure safety and security and meet the needs of investigators working in this complex building. This article discusses the implementation of secure wireless networks and private cloud computing to promote operational efficiency, biosecurity, and biosafety with additional energy-saving advantages. The utilization of a dedicated data center, virtualized servers, virtualized desktop integration, multichannel secure wireless networks, and a NEIDL-dedicated Voice over Internet Protocol (VoIP) network are all discussed. © 2014 Federation of European Microbiological Societies. Published by John Wiley & Sons Ltd. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-13
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0342] Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port Columbia River... will enforce the security and safety zone in 33 CFR 165.1318 for large passenger vessels operating in...
47 CFR 0.191 - Functions of the Bureau.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., the Communications Assistance for Law Enforcement Act (CALEA), and network security. Recommends... Homeland Security Bureau § 0.191 Functions of the Bureau. The Public Safety and Homeland Security Bureau..., in all matters pertaining to public safety, homeland security, national security, emergency...
47 CFR 0.191 - Functions of the Bureau.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., the Communications Assistance for Law Enforcement Act (CALEA), and network security. Recommends... Homeland Security Bureau § 0.191 Functions of the Bureau. The Public Safety and Homeland Security Bureau..., in all matters pertaining to public safety, homeland security, national security, emergency...
47 CFR 0.191 - Functions of the Bureau.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., the Communications Assistance for Law Enforcement Act (CALEA), and network security. Recommends... Homeland Security Bureau § 0.191 Functions of the Bureau. The Public Safety and Homeland Security Bureau..., in all matters pertaining to public safety, homeland security, national security, emergency...
Cyber security challenges in Smart Cities: Safety, security and privacy.
Elmaghraby, Adel S; Losavio, Michael M
2014-07-01
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.
Security Personnel Practices and Policies in U.S. Hospitals: Findings From a National Survey.
Schoenfisch, Ashley L; Pompeii, Lisa A
2016-06-27
Concerns of violence in hospitals warrant examination of current hospital security practices. Cross-sectional survey data were collected from members of a health care security and safety association to examine the type of personnel serving as security in hospitals, their policies and practices related to training and weapon/restraint tool carrying/use, and the broader context in which security personnel work to maintain staff and patient safety, with an emphasis on workplace violence prevention and mitigation. Data pertaining to 340 hospitals suggest security personnel were typically non-sworn officers directly employed (72%) by hospitals. Available tools included handcuffs (96%), batons (56%), oleoresin capsicum products (e.g., pepper spray; 52%), hand guns (52%), conducted electrical weapons (e.g., TASERs®; 47%), and K9 units (12%). Current workplace violence prevention policy components, as well as recommendations to improve hospital security practices, aligned with Occupational Safety and Health Administration guidelines. Comprehensive efforts to address the safety and effectiveness of hospital security personnel should consider security personnel's relationships with other hospital work groups and hospitals' focus on patients' safety and satisfaction. © 2016 The Author(s).
Greenberg, Sheldon F
2007-09-01
In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.
48 CFR 245.7311-2 - Safety, security, and fire regulations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Safety, security, and fire regulations. 245.7311-2 Section 245.7311-2 Federal Acquisition Regulations System DEFENSE ACQUISITION... Inventory 245.7311-2 Safety, security, and fire regulations. ...
DOT National Transportation Integrated Search
2003-09-16
The objective of this Hazardous Material (HazMat) Transportation Safety and Security Field Operational Test (FOT) Final Detailed Test Plans evaluation is to measure the impact of technology solutions on the safety, security, and operational efficienc...
78 FR 48029 - Improving Chemical Facility Safety and Security
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... responding to risks in chemical facilities (including during pre-inspection, inspection execution, post.... Sec. 2. Establishment of the Chemical Facility Safety and Security Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-07
...] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation... they could be published in the Federal Register. This notice lists temporary safety zones, security zones, special local regulations, drawbridge operation regulations and regulated navigation areas, all...
Achieving Safety through Security Management
NASA Astrophysics Data System (ADS)
Ridgway, John
Whilst the achievement of safety objectives may not be possible purely through the administration of an effective Information Security Management System (ISMS), your job as safety manager will be significantly eased if such a system is in place. This paper seeks to illustrate the point by drawing a comparison between two of the prominent standards within the two disciplines of security and safety management.
The MICROBE Project, A Report from the Interagency Working Group on Microbial Genomics
2001-01-01
including targeting of genes related to pathogenesis, possibilities for acquired pathogen resistance, industrial and food -grade enzymes, and probiotics ...safety, food security, biotechnology, value-added products , human nutrition and functional foods , plant and animal protection and furthering fundamental...supports a number of microbial studies, which are integral components of the USDA national programs in animal health, food animal production , food
Capabilities-Based Planning for Energy Security at Department of Defense Installations
2013-01-01
Support Services—The ability to provide assis- tance for payload and launch vehicles including safety, reception , staging, integration, movement to the...pubs/technical_reports/TR1249.html Davis, Paul K., and Paul Dreyer, RAND’s Portfolio Analysis Tool (PAT): Theory , Methods, and Reference Manual, Santa...Steven C. Bankes, and Michael Egner, Enhancing Strategic Planning with Massive Scenario Generation: Theory and Experiments, Santa Monica, Calif
Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun
2018-01-01
To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.
Shared Information Framework and Technology (SHIFT) Handbook
2009-02-01
field. Such a patchwork of separate systems neither improves information sharing nor guarantees the safety and security of communities and personnel in...analysis. In many organizations, security may not necessarily be the expertise of people working in the field, or security and safety issues may be...the safety and security of all crisis management personnel in crisis areas. Functioning information sharing between organisations improves situational
ERIC Educational Resources Information Center
California State Dept. of Education, Sacramento.
This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…
76 FR 43534 - Alternative to Minimum Days Off Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-21
... fatigue does not adversely affect public health and safety and the common defense and security. Among... health and safety and the common defense and security by establishing clear and enforceable requirements... public health and safety and common defense and security. B. Alternative to the Minimum Days Off...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-14
...] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation... published in the Federal Register. This notice lists temporary safety zones, security zones, special local..., telephone (202) 372-3862. For questions on viewing, or on submitting material to the docket, contact Ms...
The research of computer network security and protection strategy
NASA Astrophysics Data System (ADS)
He, Jian
2017-05-01
With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.
76 FR 63202 - Security Zones; Captain of the Port Lake Michigan Zone
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-12
...-AA87 Security Zones; Captain of the Port Lake Michigan Zone AGENCY: Coast Guard, DHS. ACTION: Final rule. SUMMARY: Based on a review of safety and security zones around critical infrastructure in the... Chicago Harbor & Burnham Park Harbor--Safety and Security Zone regulation and the Security Zones; Captain...
Geovisualization for Smart Video Surveillance
NASA Astrophysics Data System (ADS)
Oves García, R.; Valentín, L.; Serrano, S. A.; Palacios-Alonso, M. A.; Sucar, L. Enrique
2017-09-01
Nowadays with the emergence of smart cities and the creation of new sensors capable to connect to the network, it is not only possible to monitor the entire infrastructure of a city, including roads, bridges, rail/subways, airports, communications, water, power, but also to optimize its resources, plan its preventive maintenance and monitor security aspects while maximizing services for its citizens. In particular, the security aspect is one of the most important issues due to the need to ensure the safety of people. However, if we want to have a good security system, it is necessary to take into account the way that we are going to present the information. In order to show the amount of information generated by sensing devices in real time in an understandable way, several visualization techniques are proposed for both local (involves sensing devices in a separated way) and global visualization (involves sensing devices as a whole). Taking into consideration that the information is produced and transmitted from a geographic location, the integration of a Geographic Information System to manage and visualize the behavior of data becomes very relevant. With the purpose of facilitating the decision-making process in a security system, we have integrated the visualization techniques and the Geographic Information System to produce a smart security system, based on a cloud computing architecture, to show relevant information about a set of monitored areas with video cameras.
Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel
2017-11-01
After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.
Measuring global water security towards sustainable development goals
NASA Astrophysics Data System (ADS)
Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide
2016-12-01
Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.
Cyber security challenges in Smart Cities: Safety, security and privacy
Elmaghraby, Adel S.; Losavio, Michael M.
2014-01-01
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517
Assessment of global water security: moving beyond water scarcity assessment
NASA Astrophysics Data System (ADS)
Wada, Y.; Gain, A. K.; Giupponi, C.
2015-12-01
Water plays an important role in underpinning equitable, stable and productive societies, and the ecosystems on which we depend. Many international river basins are likely to experience 'low water security' over the coming decades. Hence, ensuring water security along with energy and food securities has been recognised as priority goals in Sustainable Development Goals (SDGs) by the United Nations. This water security is not rooted only in the limitation of physical resources, i.e. the shortage in the availability of freshwater relative to water demand, but also on social and economic factors (e.g. flawed water planning and management approaches, institutional incapability to provide water services, unsustainable economic policies). Until recently, advanced tools and methods are available for assessment of global water scarcity. However, integrating both physical and socio-economic indicators assessment of water security at global level is not available yet. In this study, we present the first global understanding of water security using a spatial multi-criteria analysis framework that goes beyond available water scarcity assessment. For assessing water security at global scale, the term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The Water security index is calculated by aggregating the indicators using both simple additive weighting (SAW) and ordered weighted average (OWA).
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... Secure Gun Storage or Safety Devices ACTION: 30-Day Notice of information collection. The Department of... approved collection. (2) Title of the Form/Collection: Certification of Secure Gun Storage or Safety... to the availability of secure gun storage or safety devices. (5) An estimate of the total number of...
49 CFR 209.501 - Review of rail transportation safety and security route analysis.
Code of Federal Regulations, 2010 CFR
2010-10-01
... establish that the route chosen by the carrier poses the least overall safety and security risk, the... analysis, including a clear description of the risks on the selected route that have not been... commercially practicable alternative route poses fewer overall safety and security risks than the route...
19 CFR 122.187 - Revocation or suspension of access.
Code of Federal Regulations, 2010 CFR
2010-04-01
... that continued access might pose an unacceptable risk to public health, interest or safety, national security, aviation safety, the revenue, or the security of the area. In this case the port director will... health, safety, or security is involved and, in such a case, a final notice of revocation or suspension...
33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...
33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...
33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...
33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...
33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...
Integration of Dynamic Models in Range Operations
NASA Technical Reports Server (NTRS)
Bardina, Jorge; Thirumalainambi, Rajkumar
2004-01-01
This work addresses the various model interactions in real-time to make an efficient internet based decision making tool for Shuttle launch. The decision making tool depends on the launch commit criteria coupled with physical models. Dynamic interaction between a wide variety of simulation applications and techniques, embedded algorithms, and data visualizations are needed to exploit the full potential of modeling and simulation. This paper also discusses in depth details of web based 3-D graphics and applications to range safety. The advantages of this dynamic model integration are secure accessibility and distribution of real time information to other NASA centers.
The electronic security partnership of safety/security and information systems departments.
Yow, J Art
2012-01-01
The ever-changing world of security electronics is reviewed in this article. The author focuses on its usage in a hospital setting and the need for safety/security and information systems departments to work together to protect and get full value from IP systems.
Criticality Safety Evaluation for the TACS at DAF
DOE Office of Scientific and Technical Information (OSTI.GOV)
Percher, C. M.; Heinrichs, D. P.
2011-06-10
Hands-on experimental training in the physical behavior of multiplying systems is one of ten key areas of training required for practitioners to become qualified in the discipline of criticality safety as identified in DOE-STD-1135-99, Guidance for Nuclear Criticality Safety Engineer Training and Qualification. This document is a criticality safety evaluation of the training activities and operations associated with HS-3201-P, Nuclear Criticality 4-Day Training Course (Practical). This course was designed to also address the training needs of nuclear criticality safety professionals under the auspices of the NNSA Nuclear Criticality Safety Program1. The hands-on, or laboratory, portion of the course will utilizemore » the Training Assembly for Criticality Safety (TACS) and will be conducted in the Device Assembly Facility (DAF) at the Nevada Nuclear Security Site (NNSS). The training activities will be conducted by Lawrence Livermore National Laboratory following the requirements of an Integrated Work Sheet (IWS) and associated Safety Plan. Students will be allowed to handle the fissile material under the supervision of an LLNL Certified Fissile Material Handler.« less
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone; Cove Point Liquefied Natural Gas Terminal, Chesapeake Bay, Maryland. 165.502 Section 165.502 Navigation and... Areas Fifth Coast Guard District § 165.502 Safety and Security Zone; Cove Point Liquefied Natural Gas...
33 CFR 165.720 - Safety/Security Zone: St. Johns River, Jacksonville, FL.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: St. Johns... § 165.720 Safety/Security Zone: St. Johns River, Jacksonville, FL. (a) Location. The water and the land..., within 100 yards of the St. Johns River. (3) All waters within 200 yards of any specified military supply...
ERIC Educational Resources Information Center
Owusu, G. A.; Akoto, J. S.; Abnory, M. M.
2016-01-01
In higher education like other institutions, safety and security of persons particularly students resident on university campuses remain topical. The limited research conducted on the experiences of university students in Ghana reflects paucity of literature on safety and security on university campuses in Ghana where such issues have been…
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Safety and Security Zone; Cove Point Liquefied Natural Gas Terminal, Chesapeake Bay, Maryland. 165.502 Section 165.502 Navigation and... Areas Fifth Coast Guard District § 165.502 Safety and Security Zone; Cove Point Liquefied Natural Gas...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Areas Thirteenth Coast Guard District § 165.1324 Safety and Security Zone; Cruise Ship Protection... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone; Cruise Ship Protection, Elliott Bay and Pier-91, Seattle, Washington. 165.1324 Section 165.1324 Navigation and...
Safety and Security at School: A Pedagogical Perspective
ERIC Educational Resources Information Center
de Waal, Elda; Grosser, M. M.
2009-01-01
Education law and policy currently focus on broader physical aspects of safety and security at schools, as well as, for example, on pedagogical insecurity such as is caused by discriminatory teaching, but law and policy have yet to pay attention to the overall and far-reaching pedagogical safety and security of learners. By means of a descriptive…
Müthing, Jannis; Jäschke, Thomas
2017-01-01
Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. PMID:29046271
Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M
2017-10-18
Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. ©Jannis Müthing, Thomas Jäschke, Christoph M Friedrich. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 18.10.2017.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pind, C.
The SECURE heating reactor was designed by ASEA-ATOM as a realistic alternative for district heating in urban areas and for supplying heat to process industries. SECURE has unique safety characteristics, that are based on fundamental laws of physics. The safety does not depend on active components or operator intervention for shutdown and cooling of the reactor. The inherent safety characteristics of the plant cannot be affected by operator errors. Due to its very low environment impact, it can be sited close to heat consumers. The SECURE heating reactor has been shown to be competitive in comparison with other alternatives formore » heating Helsinki and Seoul. The SECURE heating reactor forms a basis for the power-producing SECURE-P reactor known as PIUS (Process Inherent Ultimate Safety), which is based on the same inherent safety principles. The thermohydraulic function and transient response have been demonstrated in a large electrically heated loop at the ASEA-ATOM laboratories.« less
Spectrum for UAS Control and Non-Payload Communications
NASA Technical Reports Server (NTRS)
Kerczewski, Robert J.
2013-01-01
There is an increasing need to fly UAS in the NAS to perform missions of vital importance to National Security and Defense, Emergency Management, and Science as well as commercial applications (e.g. cargo transport). To enable integration of UAS into the National Airspace System, several critical technical barriers must be eliminated, including: Separation Assurance/Sense and Avoid - the uncertainty surrounding the ability to interoperate in ATC environments and maintain safe separation from other aircraft in the absence of an on-board pilot. Human Systems Integration - lack of standards and guidelines with respect to UAS display information as well as lack of Ground Control Station (GCS) design requirements to operate in the NAS. Certification - lack of airworthiness requirements and safety-related data specific to the full range of UAS, or for their avionics systems or other components. Communications - lack of standard, certifiable data links and aviation safety spectrum to operate such links for civil UAS control communications.
47 CFR 0.192 - Emergency Response Interoperability Center.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Organization Public Safety and Homeland Security Bureau § 0.192 Emergency Response Interoperability Center. (a... Public Safety and Homeland Security Bureau to develop, recommend, and administer policy goals, objectives... and procedures for the 700 MHz public safety broadband wireless network and other public safety...
47 CFR 0.192 - Emergency Response Interoperability Center.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Organization Public Safety and Homeland Security Bureau § 0.192 Emergency Response Interoperability Center. (a... Public Safety and Homeland Security Bureau to develop, recommend, and administer policy goals, objectives... and procedures for the 700 MHz public safety broadband wireless network and other public safety...
Organizational Culture for Safety, Security, and Safeguards in New Nuclear Power Countries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kovacic, Donald N
2015-01-01
This chapter will contain the following sections: Existing international norms and standards for developing the infrastructure to support new nuclear power programs The role of organizational culture and how it supports the safe, secure, and peaceful application of nuclear power Identifying effective and efficient strategies for implementing safety, security and safeguards in nuclear operations Challenges identified in the implementation of safety, security and safeguards Potential areas for future collaboration between countries in order to support nonproliferation culture
Social Security: Strengthening a Vital Safety Net for Latinos
ERIC Educational Resources Information Center
Cruz, Jeff
2012-01-01
Since 1935, Social Security has provided a vital safety net for millions of Americans who cannot work because of age or disability. This safety net has been especially critical for Americans of Latino decent, who number more than 50 million or nearly one out of every six Americans. Social Security is critical to Latinos because it is much more…
Naval War College Review. Volume 64, Number 2, Spring 2011
2011-01-01
to revolutionize the African maritime sector holistically, across its entire spectrum—improving safety and security, gover - nance, and industrial...strategy for a maritime economy that includes the enabling elements of gover - nance, infrastructure, trade, safety, and security and plainly tells global...transport in its core function); tourism ; energy; infrastructure (ports); cooperation on safety, security, and environmental protection; tariff harmonization
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Safety and Security Zones: New York Marine Inspection Zone and Captain of the Port Zone. 165.169 Section 165.169 Navigation and... Areas First Coast Guard District § 165.169 Safety and Security Zones: New York Marine Inspection Zone...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Safety and Security Zones: New York Marine Inspection Zone and Captain of the Port Zone. 165.169 Section 165.169 Navigation and... Areas First Coast Guard District § 165.169 Safety and Security Zones: New York Marine Inspection Zone...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: New York Marine Inspection Zone and Captain of the Port Zone. 165.169 Section 165.169 Navigation and... Areas First Coast Guard District § 165.169 Safety and Security Zones: New York Marine Inspection Zone...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Safety and Security Zones: New York Marine Inspection Zone and Captain of the Port Zone. 165.169 Section 165.169 Navigation and... Areas First Coast Guard District § 165.169 Safety and Security Zones: New York Marine Inspection Zone...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Safety and Security Zones: New York Marine Inspection Zone and Captain of the Port Zone. 165.169 Section 165.169 Navigation and... Areas First Coast Guard District § 165.169 Safety and Security Zones: New York Marine Inspection Zone...
Ensuring Food Security Through Enhancing Microbiological Food Safety
NASA Astrophysics Data System (ADS)
Mikš-Krajnik, Marta; Yuk, Hyun-Gyun; Kumar, Amit; Yang, Yishan; Zheng, Qianwang; Kim, Min-Jeong; Ghate, Vinayak; Yuan, Wenqian; Pang, Xinyi
2015-10-01
Food safety and food security are interrelated concepts with a profound impact on the quality of human life. Food security describes the overall availability of food at different levels from global to individual household. While, food safety focuses on handling, preparation and storage of foods in order to prevent foodborne illnesses. This review focuses on innovative thermal and non-thermal technologies in the area of food processing as the means to ensure food security through improving food safety with emphasis on the reduction and control of microbiological risks. The antimicrobial efficiency and mechanism of new technologies to extend the shelf life of food product were also discussed.
Safety Versus Passenger Service: The Flight Attendants’ Dilemma
Damos, Diane L.; Boyett, Kimberly S.; Gibbs, Patt
2013-01-01
After 9/11, new security duties were instituted at many U.S. air carriers and existing safety and security duties received increased emphasis. Concurrently, in-flight services were changed and in many cases, cabin crews were reduced. This article examines the post-9/11 conflict between passenger service and the timely performance of safety and security duties at 1 major U.S. air carrier. In-flight data were obtained on both international and domestic flights. The data suggest that the prompt performance of the safety and security duties is adversely affected by the number of service duties occurring in the later part of both international and domestic flights. PMID:23667300
14 CFR § 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... environment. Safety is essential to NASA and is a material part of this contract. NASA's safety priority is to... Occupational Safety and Health Administration (OSHA) or by a state agency operating under an OSHA approved plan... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Breach of safety or security. § 1274.936...
NASA Astrophysics Data System (ADS)
Watanabe, Eriko; Ishikawa, Mami; Ohta, Maiko; Murakami, Yasuo; Kodate, Kashiko
2006-01-01
Medical errors and patient safety have always received a great deal of attention, as they can be critically life-threatening and significant matters. Hospitals and medical personnel are trying their utmost to avoid these errors. Currently in the medical field, patients' record is identified through their PIN numbers and ID cards. However, for patients who cannot speak or move, or who suffer from memory disturbances, alternative methods would be more desirable, and necessary in some cases. The authors previously proposed and fabricated a specially-designed correlator called FARCO (Fast Face Recognition Optical Correlator) based on the Vanderlugt Correlator1, which operates at the speed of 1000 faces/s 2,3,4. Combined with high-speed display devices, the four-channel processing could achieve such high operational speed as 4000 faces/s. Running trial experiments on a 1-to-N identification basis using the optical parallel correlator, we succeeded in acquiring low error rates of 1 % FMR and 2.3 % FNMR. In this paper, we propose a robust face recognition system using the FARCO for focusing on the safety and security of the medical field. We apply our face recognition system to registration of inpatients, in particular children and infants, before and after medical treatments or operations. The proposed system has recorded a higher recognition rate by multiplexing both input and database facial images from moving images. The system was also tested and evaluated for further practical use, leaving excellent results. Hence, our face recognition system could function effectively as an integral part of medical system, meeting these essential requirements of safety, security and privacy.
Network Analytical Tool for Monitoring Global Food Safety Highlights China
Nepusz, Tamás; Petróczi, Andrea; Naughton, Declan P.
2009-01-01
Background The Beijing Declaration on food safety and security was signed by over fifty countries with the aim of developing comprehensive programs for monitoring food safety and security on behalf of their citizens. Currently, comprehensive systems for food safety and security are absent in many countries, and the systems that are in place have been developed on different principles allowing poor opportunities for integration. Methodology/Principal Findings We have developed a user-friendly analytical tool based on network approaches for instant customized analysis of food alert patterns in the European dataset from the Rapid Alert System for Food and Feed. Data taken from alert logs between January 2003 – August 2008 were processed using network analysis to i) capture complexity, ii) analyze trends, and iii) predict possible effects of interventions by identifying patterns of reporting activities between countries. The detector and transgressor relationships are readily identifiable between countries which are ranked using i) Google's PageRank algorithm and ii) the HITS algorithm of Kleinberg. The program identifies Iran, China and Turkey as the transgressors with the largest number of alerts. However, when characterized by impact, counting the transgressor index and the number of countries involved, China predominates as a transgressor country. Conclusions/Significance This study reports the first development of a network analysis approach to inform countries on their transgressor and detector profiles as a user-friendly aid for the adoption of the Beijing Declaration. The ability to instantly access the country-specific components of the several thousand annual reports will enable each country to identify the major transgressors and detectors within its trading network. Moreover, the tool can be used to monitor trading countries for improved detector/transgressor ratios. PMID:19688088
LANL Safeguards and Security Assurance Program. Revision 6
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-04-03
The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impactsmore » on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms.« less
47 CFR 0.332 - Actions taken under delegated authority.
Code of Federal Regulations, 2012 CFR
2012-10-01
... safety, homeland security, national security, emergency management and preparedness, and disaster management communications—the Public Safety and Homeland Security Bureau. (d) Complaints involving equal... frequencies shared with broadcast, common carrier, or government services—Office of Engineering and Technology...
Reducing Risk in CO2 Sequestration: A Framework for Integrated Monitoring of Basin Scale Injection
NASA Astrophysics Data System (ADS)
Seto, C. J.; Haidari, A. S.; McRae, G. J.
2009-12-01
Geological sequestration of CO2 is an option for stabilization of atmospheric CO2 concentrations. Technical ability to safely store CO2 in the subsurface has been demonstrated through pilot projects and a long history of enhanced oil recovery and acid gas disposal operations. To address climate change, current injection operations must be scaled up by a factor of 100, raising issues of safety and security. Monitoring and verification is an essential component in ensuring safe operations and managing risk. Monitoring provides assurance that CO2 is securely stored in the subsurface, and the mechanisms governing transport and storage are well understood. It also provides an early warning mechanism for identification of anomalies in performance, and a means for intervention and remediation through the ability to locate the CO2. Through theoretical studies, bench scale experiments and pilot tests, a number of technologies have demonstrated their ability to monitor CO2 in the surface and subsurface. Because the focus of these studies has been to demonstrate feasibility, individual techniques have not been integrated to provide a more robust method for monitoring. Considering the large volumes required for injection, size of the potential footprint, length of time a project must be monitored and uncertainty, operational considerations of cost and risk must balance safety and security. Integration of multiple monitoring techniques will reduce uncertainty in monitoring injected CO2, thereby reducing risk. We present a framework for risk management of large scale injection through model based monitoring network design. This framework is applied to monitoring CO2 in a synthetic reservoir where there is uncertainty in the underlying permeability field controlling fluid migration. Deformation and seismic data are used to track plume migration. A modified Ensemble Kalman filter approach is used to estimate flow properties by jointly assimilating flow and geomechanical observations. Issues of risk, cost and uncertainty are considered.
49 CFR 659.27 - Internal safety and security reviews.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the..., indicating that the rail transit agency is in compliance with its system safety program plan and system... security reviews indicate that the rail transit agency is not in compliance with its system safety program...
Code of Federal Regulations, 2011 CFR
2011-01-01
... SUBMITTED INFORMATION § 193.5 How may I submit safety or security information and have it protected from... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false How may I submit safety or security information and have it protected from disclosure? 193.5 Section 193.5 Aeronautics and Space FEDERAL AVIATION...
Code of Federal Regulations, 2010 CFR
2010-01-01
... SUBMITTED INFORMATION § 193.5 How may I submit safety or security information and have it protected from... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false How may I submit safety or security information and have it protected from disclosure? 193.5 Section 193.5 Aeronautics and Space FEDERAL AVIATION...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-09
... USCG-2008-1113 Chicago, IL Safety Zones (Part 165)...... 11/4/2008 USCG-2008-1114 San Diego, CA Safety...)...... 1/10/2009 USCG-2008-1228 Chicago, IL Safety Zones (Part 165)...... 12/27/2008 USCG-2008-1242 San... USCG-2009-0079 Chicago, IL Safety Zones (Part 165)...... 2/8/2009 USCG-2009-0085 Chicago, IL Security...
Johnson, Mark B; Voas, Robert; Miller, Brenda A; Byrnes, Hilary; Bourdeau, Beth
2016-02-01
There is substantial evidence that heavy drinking is associated with aggression and violence. Most managers of drinking establishments are required to maintain a security staff to deal with disruptive patrons who threaten an organization's business or legal status. However, managers may focus little on minor instances of aggression even though these may escalate into more serious events. We hypothesize that proactive security efforts may positively affect patrons' perceptions of nighttime safety and influence their decisions to return to the club, thereby affecting the club's bottom line. Data for this study were collected from entry and exit surveys with 1714 attendees at 70 electronic music dance events at 10 clubs in the San Francisco Bay Area (2010-2012). Participants were asked to report on observations and experiences with aggressive behavior while in the club, their overall perception of club safety, and their plans to return to the same club in the next 30 days. Mediational multiple regression analysis was used to relate observations of club security to perceptions of personal safety and plans to return to the club. Reported observations of an active club security staff were positively related to perceptions of personal safety. Safety perceptions, in turn, were significantly related to plans to return to the club. The indirect path between perceptions of security and plans to return was significant as well. The results suggest that an active security presence inside clubs can encourage club attendance by providing an environment where minor altercations are minimized, contributing to the perception of club safety. Evidence that proactive security efforts appear to increase return customers might motivate managers to implement better security policies. Copyright © 2015 Elsevier Ltd and National Safety Council. All rights reserved.
Organizing safety: conditions for successful information assurance programs.
Collmann, Jeff; Coleman, Johnathan; Sostrom, Kristen; Wright, Willie
2004-01-01
Organizations must continuously seek safety. When considering computerized health information systems, "safety" includes protecting the integrity, confidentiality, and availability of information assets such as patient information, key components of the technical information system, and critical personnel. "High Reliability Theory" (HRT) argues that organizations with strong leadership support, continuous training, redundant safety mechanisms, and "cultures of high reliability" can deploy and safely manage complex, risky technologies such as nuclear weapons systems or computerized health information systems. In preparation for the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Office of the Assistant Secretary of Defense (Health Affairs), the Offices of the Surgeons General of the United States Army, Navy and Air Force, and the Telemedicine and Advanced Technology Research Center (TATRC), US Army Medical Research and Materiel Command sponsored organizational, doctrinal, and technical projects that individually and collectively promote conditions for a "culture of information assurance." These efforts include sponsoring the "P3 Working Group" (P3WG), an interdisciplinary, tri-service taskforce that reviewed all relevant Department of Defense (DoD), Miliary Health System (MHS), Army, Navy and Air Force policies for compliance with the HIPAA medical privacy and data security regulations; supporting development, training, and deployment of OCTAVE(sm), a self-directed information security risk assessment process; and sponsoring development of the Risk Information Management Resource (RIMR), a Web-enabled enterprise portal about health information assurance.
49 CFR 659.25 - Annual review of system safety program plan and system security plan.
Code of Federal Regulations, 2010 CFR
2010-10-01
... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-06-15
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.
Model Policy for Security and Safety Committee.
ERIC Educational Resources Information Center
Perillo, Stephen E.
The starting point of an effective school safety program is the development of a written policy statement that reflects the school board's belief in safety for its students and that is widely publicized to the staff and community. A sample safety/security policy is provided that lists, first, the superintendent's responsibilities in establishing a…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-24
... focuses on the unique aspects of nuclear safety and security and highlights the Commission's expectations... safety culture and (2) high level descriptions or traits of areas important to safety culture. The... NRC headquarters. Please allow time at both locations to register with building security upon entering...
The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity.
Busdicker, Mike; Upendra, Priyanka
2017-09-02
This article discusses the role of healthcare technology management (HTM) in medical device cybersecurity and outlines concepts that are applicable to HTM professionals at a healthcare delivery organization or at an integrated delivery network, regardless of size. It provides direction for HTM professionals who are unfamiliar with the security aspects of managing healthcare technologies but are familiar with standards from The Joint Commission (TJC). It provides a useful set of recommendations, including relevant references for incorporating good security practices into HTM practice. Recommendations for policies, procedures, and processes referencing TJC standards are easily applicable to HTM departments with limited resources and to those with no resource concerns. The authors outline processes from their organization as well as best practices learned through information sharing at AAMI, National Health Information Sharing and Analysis Center (NH-ISAC), and Medical Device Innovation, Safety, and Security Consortium (MDISS) conferences and workshops.
A sensor monitoring system for telemedicine, safety and security applications
NASA Astrophysics Data System (ADS)
Vlissidis, Nikolaos; Leonidas, Filippos; Giovanis, Christos; Marinos, Dimitrios; Aidinis, Konstantinos; Vassilopoulos, Christos; Pagiatakis, Gerasimos; Schmitt, Nikolaus; Pistner, Thomas; Klaue, Jirka
2017-02-01
A sensor system capable of medical, safety and security monitoring in avionic and other environments (e.g. homes) is examined. For application inside an aircraft cabin, the system relies on an optical cellular network that connects each seat to a server and uses a set of database applications to process data related to passengers' health, safety and security status. Health monitoring typically encompasses electrocardiogram, pulse oximetry and blood pressure, body temperature and respiration rate while safety and security monitoring is related to the standard flight attendance duties, such as cabin preparation for take-off, landing, flight in regions of turbulence, etc. In contrast to previous related works, this article focuses on the system's modules (medical and safety sensors and associated hardware), the database applications used for the overall control of the monitoring function and the potential use of the system for security applications. Further tests involving medical, safety and security sensing performed in an real A340 mock-up set-up are also described and reference is made to the possible use of the sensing system in alternative environments and applications, such as health monitoring within other means of transport (e.g. trains or small passenger sea vessels) as well as for remotely located home users, over a wired Ethernet network or the Internet.
Energy System Integration Facility Secure Data Center | Energy Systems
Integration Facility | NREL Energy System Integration Facility Secure Data Center Energy System Integration Facility Secure Data Center The Energy Systems Integration Facility's Secure Data Center provides
ERIC Educational Resources Information Center
St. Lifer, Evan
1994-01-01
Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…
Driver face recognition as a security and safety feature
NASA Astrophysics Data System (ADS)
Vetter, Volker; Giefing, Gerd-Juergen; Mai, Rudolf; Weisser, Hubert
1995-09-01
We present a driver face recognition system for comfortable access control and individual settings of automobiles. The primary goals are the prevention of car thefts and heavy accidents caused by unauthorized use (joy-riders), as well as the increase of safety through optimal settings, e.g. of the mirrors and the seat position. The person sitting on the driver's seat is observed automatically by a small video camera in the dashboard. All he has to do is to behave cooperatively, i.e. to look into the camera. A classification system validates his access. Only after a positive identification, the car can be used and the driver-specific environment (e.g. seat position, mirrors, etc.) may be set up to ensure the driver's comfort and safety. The driver identification system has been integrated in a Volkswagen research car. Recognition results are presented.
Space and Time Partitioning with Hardware Support for Space Applications
NASA Astrophysics Data System (ADS)
Pinto, S.; Tavares, A.; Montenegro, S.
2016-08-01
Complex and critical systems like airplanes and spacecraft implement a very fast growing amount of functions. Typically, those systems were implemented with fully federated architectures, but the number and complexity of desired functions of todays systems led aerospace industry to follow another strategy. Integrated Modular Avionics (IMA) arose as an attractive approach for consolidation, by combining several applications into one single generic computing resource. Current approach goes towards higher integration provided by space and time partitioning (STP) of system virtualization. The problem is existent virtualization solutions are not ready to fully provide what the future of aerospace are demanding: performance, flexibility, safety, security while simultaneously containing Size, Weight, Power and Cost (SWaP-C).This work describes a real time hypervisor for space applications assisted by commercial off-the-shell (COTS) hardware. ARM TrustZone technology is exploited to implement a secure virtualization solution with low overhead and low memory footprint. This is demonstrated by running multiple guest partitions of RODOS operating system on a Xilinx Zynq platform.
Gopalakrishnan, Chennat; Okada, Norio
2007-12-01
The goal of integrated disaster risk management is to promote an overall improvement in the quality of safety and security in a region, city or community at disaster risk. This paper presents the case for a thorough overhaul of the institutional component of integrated disaster risk management. A review of disaster management institutions in the United States indicates significant weaknesses in their ability to contribute effectively to the implementation of integrated disaster risk management. Our analysis and findings identify eight key elements for the design of dynamic new disaster management institutions. Six specific approaches are suggested for incorporating the identified key elements in building new institutions that would have significant potential for enhancing the effective implementation of integrated disaster risk management. We have developed a possible blueprint for effective design and construction of efficient, sustainable and functional disaster management institutions.
Haslberger, Alexander G
2006-05-03
Evidence for substantial environmental influences on health and food safety comes from work with environmental health indicators which show that agroenvironmental practices have direct and indirect effects on human health, concluding that "the quality of the environment influences the quality and safety of foods" [Fennema, O. Environ. Health Perspect. 1990, 86, 229-232). In the field of genetically modified organisms (GMOs), Codex principles have been established for the assessment of GM food safety and the Cartagena Protocol on Biosafety outlines international principles for an environmental assessment of living modified organisms. Both concepts also contain starting points for an assessment of health/food safety effects of GMOs in cases when the environment is involved in the chain of events that could lead to hazards. The environment can act as a route of unintentional entry of GMOs into the food supply, such as in the case of gene flow via pollen or seeds from GM crops, but the environment can also be involved in changes of GMO-induced agricultural practices with relevance for health/food safety. Examples for this include potential regional changes of pesticide uses and reduction in pesticide poisonings resulting from the use of Bt crops or influences on immune responses via cross-reactivity. Clearly, modern methods of biotechnology in breeding are involved in the reasons behind the rapid reduction of local varieties in agrodiversity, which constitute an identified hazard for food safety and food security. The health/food safety assessment of GM foods in cases when the environment is involved needs to be informed by data from environmental assessment. Such data might be especially important for hazard identification and exposure assessment. International organizations working in these areas will very likely be needed to initiate and enable cooperation between those institutions responsible for the different assessments, as well as for exchange and analysis of information. An integrated assessment might help to focus and save capacities in highly technical areas such as molecular characterization or profiling, which are often necessary for both assessments. In the area of establishing international standards for traded foods, such as for the newly created Standards in Trade and Development Facility (STDF), an integrated assessment might help in the consideration of important environmental aspects involved in health and food safety. Furthermore, an established integrated view on GMOs may create greater consumer confidence in the technology.
SAFETY, SECURITY, HYGIENE AND PRIVACY IN MIGRANT FARMWORKER HOUSING
Arcury, Thomas A.; Weir, Maria M.; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F.; Bischoff, Werner E.; Quandt, Sara A.
2013-01-01
Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed. PMID:22776578
Software Security Practices: Integrating Security into the SDLC
2011-05-01
Software Security Practices Integrating Security into the SDLC Robert A. Martin HS SEDI is a trademark of the U.S. Department of Homeland Security...2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Security Practices Integrating Security into the SDLC 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...SEDI FFRDC is managed and operated by The MITRE Corporation for DHS. 4 y y w SDLC Integrating Security into a typical software development lifecycle
NASA Technical Reports Server (NTRS)
Zelkin, Natalie; Henriksen, Stephen
2011-01-01
This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.
77 FR 65892 - Patient Safety Organizations: Voluntary Relinquishment From PDR Secure, LLC
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-31
... Organizations: Voluntary Relinquishment From PDR Secure, LLC AGENCY: Agency for Healthcare Research and Quality... Patient Safety Organizations (PSOs), which collect, aggregate, and analyze confidential information... Safety Act authorizes the listing of PSOs, which are entities or component organizations whose mission...
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-01-01
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358
Effectiveness of the Civil Aviation Security Program.
1981-04-15
on item were processed through the screening system daily. The airline and airport security measures developed continue to provide increased safety...United States or Puerto Rico. None of these 16 hijackings resulted from insufficient airport security measures or a breakdown in the FAA-approved airport ... airport security programs is conducted at the Transportation Safety Institute in Oklahoma City, Oklahoma. The course provides in-depth coverage of civil
Code of Federal Regulations, 2010 CFR
2010-01-01
... and security, or in such manner as to affect the health and safety of the public; or (2) Any important... Energy, the Secretary of Homeland Security, and the head of any other appropriate Federal agency... health and safety or the common defense and security; and (ii) Before, on, or after August 8, 2005, is...
33 CFR 165.500 - Safety/Security Zones; Chesapeake Bay, Maryland.
Code of Federal Regulations, 2010 CFR
2010-07-01
... designated representative. (3) Persons desiring to transit the area of the security zone may contact the COTP... HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated Navigation Areas and Limited Access Areas Fifth Coast Guard District § 165.500...
Safe Schools Survey: Post-Secondary Survey Results.
ERIC Educational Resources Information Center
Mowery, Andrea
This report provides the results of a survey of safety and security at colleges and universities in Minnesota, along with policy recommendations to improve safety and security at Minnesota post-secondary institutions. It is based on campus security reports voluntarily submitted by 60 of the 110 Minnesota post-secondary institutions, personal…
49 CFR 392.9 - Inspection of cargo, cargo securement devices and systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) FEDERAL MOTOR CARRIER SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR CARRIER SAFETY REGULATIONS DRIVING OF COMMERCIAL MOTOR VEHICLES General § 392.9 Inspection of cargo, cargo securement devices... drives that commercial motor vehicle; (2) Inspect the cargo and the devices used to secure the cargo...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-24
... including cybersecurity best practices, media security and reliability best practices, transition to Next... Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau, Federal Communications... Chief for Cybersecurity and Communications Reliability. [FR Doc. 2011-4211 Filed 2-23-11; 8:45 am...
Building Security and Personal Safety. SPEC Kit 150.
ERIC Educational Resources Information Center
Bingham, Karen Havill
This report on a survey of Association of Research Libraries (ARL) member libraries on building security and personal safety policies examines three areas in detail: (1) general building security (access to the building, key distribution, patrols or monitors, intrusion prevention, lighting, work environment after dark); (2) problem behavior…
Safety, security and dual-use chemicals
Walters, Douglas B.; Ho, Pauline; Hardesty, Jasper
2014-12-18
Many chemicals that are frequently used in laboratories and industries can be harmful if not handled properly. Chemical safety best practices are designed to protect people from accidentally being exposed to hazardous chemicals. On the other hand, chemical security best practices are designed to protect people from someone deliberately exposing others to hazardous chemicals. Finally, many chemical safety best practices overlap with chemical security best practices, but there are important differences, as will be discussed in this paper.
33 CFR 165.904 - Lake Michigan at Chicago Harbor & Burnham Park Harbor-Safety and Security Zone.
Code of Federal Regulations, 2012 CFR
2012-07-01
... & Burnham Park Harbor-Safety and Security Zone. 165.904 Section 165.904 Navigation and Navigable Waters... Guard District § 165.904 Lake Michigan at Chicago Harbor & Burnham Park Harbor—Safety and Security Zone... entrance of the harbor connecting coordinates 41°51′09″ N, 087°36′36″W and 41°51′11″ N, 087°36′22″ W. (b...
33 CFR 165.904 - Lake Michigan at Chicago Harbor & Burnham Park Harbor-Safety and Security Zone.
Code of Federal Regulations, 2014 CFR
2014-07-01
... & Burnham Park Harbor-Safety and Security Zone. 165.904 Section 165.904 Navigation and Navigable Waters... Guard District § 165.904 Lake Michigan at Chicago Harbor & Burnham Park Harbor—Safety and Security Zone... entrance of the harbor connecting coordinates 41°51′09″ N, 087°36′36″ W and 41°51′11″ N, 087°36′22″ W. (b...
33 CFR 165.904 - Lake Michigan at Chicago Harbor & Burnham Park Harbor-Safety and Security Zone.
Code of Federal Regulations, 2013 CFR
2013-07-01
... & Burnham Park Harbor-Safety and Security Zone. 165.904 Section 165.904 Navigation and Navigable Waters... Guard District § 165.904 Lake Michigan at Chicago Harbor & Burnham Park Harbor—Safety and Security Zone... entrance of the harbor connecting coordinates 41°51′09″ N, 087°36′36″W and 41°51′11″ N, 087°36′22″ W. (b...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-12
... unique aspects of nuclear safety and security, and to note the Commission's expectations that all NRC... health and safety and the common defense and security when carrying out licensed activities. The comment...) development of high-level [[Page 1657
Hierarchical video surveillance architecture: a chassis for video big data analytics and exploration
NASA Astrophysics Data System (ADS)
Ajiboye, Sola O.; Birch, Philip; Chatwin, Christopher; Young, Rupert
2015-03-01
There is increasing reliance on video surveillance systems for systematic derivation, analysis and interpretation of the data needed for predicting, planning, evaluating and implementing public safety. This is evident from the massive number of surveillance cameras deployed across public locations. For example, in July 2013, the British Security Industry Association (BSIA) reported that over 4 million CCTV cameras had been installed in Britain alone. The BSIA also reveal that only 1.5% of these are state owned. In this paper, we propose a framework that allows access to data from privately owned cameras, with the aim of increasing the efficiency and accuracy of public safety planning, security activities, and decision support systems that are based on video integrated surveillance systems. The accuracy of results obtained from government-owned public safety infrastructure would improve greatly if privately owned surveillance systems `expose' relevant video-generated metadata events, such as triggered alerts and also permit query of a metadata repository. Subsequently, a police officer, for example, with an appropriate level of system permission can query unified video systems across a large geographical area such as a city or a country to predict the location of an interesting entity, such as a pedestrian or a vehicle. This becomes possible with our proposed novel hierarchical architecture, the Fused Video Surveillance Architecture (FVSA). At the high level, FVSA comprises of a hardware framework that is supported by a multi-layer abstraction software interface. It presents video surveillance systems as an adapted computational grid of intelligent services, which is integration-enabled to communicate with other compatible systems in the Internet of Things (IoT).
Johnson, Mark B.; Voas, Robert; Miller, Brenda A.; Byrnes, Hilary; Bourdeau, Beth
2017-01-01
Introduction There is substantial evidence that heavy drinking is associated with aggression and violence. Most managers of drinking establishments are required to maintain a security staff to deal with disruptive patrons who threaten an organization’s business or legal status. However, managers may focus little on minor instances of aggression even though these may escalate into more serious events. We hypothesize that proactive security efforts may positively affect patron’s perceptions of nighttime safety and influence their decisions to return to the club, thereby affecting the club’s bottom line. Method Data for this study were collected from entry and exit surveys with 1,714 attendees at 70 electronic music dance events at 10 clubs in the San Francisco Bay Area (2010–2012). Participants were asked to report on observations and experiences with aggressive behavior while in the club, their overall perception of club safety, and their plans to return to the same club in the next 30 days. Mediational multiple regression analysis was used to relate observations of club security to perceptions of personal safety and plans to return to the club. Results Reported observations of an active club security staff were positively related to perceptions of personal safety. Safety perceptions, in turn, were significantly related to plans to return to the club. The indirect path between perceptions of security and plans to return was significant as well. Conclusions The results suggest that an active security presence inside clubs can encourage club attendance by providing an environment where minor altercations are minimized, contributing to the perception of club safety. Practical Applications Evidence that proactive security efforts appear to increase return customers might motivate managers to implement better security policies. PMID:26875162
Applications for radio-frequency identification technology in the perioperative setting.
Zhao, Tiyu; Zhang, Xiaoxiang; Zeng, Lili; Xia, Shuyan; Hinton, Antentor Othrell; Li, Xiuyun
2014-06-01
We implemented a two-year project to develop a security-gated management system for the perioperative setting using radio-frequency identification (RFID) technology to enhance the management efficiency of the OR. We installed RFID readers beside the entrances to the OR and changing areas to receive and process signals from the RFID tags that we sewed into surgical scrub attire and shoes. The system also required integrating automatic access control panels, computerized lockers, light-emitting diode (LED) information screens, wireless networks, and an information system. By doing this, we are able to control the flow of personnel and materials more effectively, reduce OR costs, optimize the registration and attire-changing process for personnel, and improve management efficiency. We also anticipate this system will improve patient safety by reducing the risk of surgical site infection. Application of security-gated management systems is an important and effective way to help ensure a clean, convenient, and safe management process to manage costs in the perioperative area and promote patient safety. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.
ERIC Educational Resources Information Center
Lafo, Joseph; Robillard, Marc
2001-01-01
Explains how high-rise residence halls can provide high-level safety and security at colleges and universities. Boston University is used to illustrate high-rise security and fire protection issues. (GR)
10 CFR 851.32 - Action on variance requests.
Code of Federal Regulations, 2010 CFR
2010-01-01
... cited by the Chief Health, Safety and Security Officer; or (ii) Forward to the Under Secretary the... DEPARTMENT OF ENERGY WORKER SAFETY AND HEALTH PROGRAM Variances § 851.32 Action on variance requests. (a) Procedures for an approval recommendation. (1) If the Chief Health, Safety and Security Officer recommends...
Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents
2015-01-01
very large public and private fingerprint databases comprehensive risk analysis and system security contribution to developing international ...Safety and Security Program which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety...201 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 201 Science and Engineering
Training and the Training Officer/Coordinator
ERIC Educational Resources Information Center
Holman, Larry L., Jr.
2008-01-01
The role of the campus law enforcement/security officer is to provide safety and security to students, staff/faculty, visitors and campus property as well as enforce all laws, and campus/departmental policies and procedures. This is the reason that training for the campus law enforcement/security officer is so vital to his/her safety and…
The Handbook for Campus Safety and Security Reporting. 2016 Edition
ERIC Educational Resources Information Center
US Department of Education, 2016
2016-01-01
Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters, Washington. 165.1317 Section 165.1317 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS...
Correlation between safety climate and contractor safety assessment programs in construction
Sparer, EH1; Murphy, LA; Taylor, KM; Dennerlein, Jt
2015-01-01
Background Contractor safety assessment programs (CSAPs) measure safety performance by integrating multiple data sources together; however, the relationship between these measures of safety performance and safety climate within the construction industry is unknown. Methods 401 construction workers employed by 68 companies on 26 sites and 11 safety managers employed by 11 companies completed brief surveys containing a nine-item safety climate scale developed for the construction industry. CSAP scores from ConstructSecure, Inc., an online CSAP database, classified these 68 companies as high or low scorers, with the median score of the sample population as the threshold. Spearman rank correlations evaluated the association between the CSAP score and the safety climate score at the individual level, as well as with various grouping methodologies. In addition, Spearman correlations evaluated the comparison between manager-assessed safety climate and worker-assessed safety climate. Results There were no statistically significant differences between safety climate scores reported by workers in the high and low CSAP groups. There were, at best, weak correlations between workers’ safety climate scores and the company CSAP scores, with marginal statistical significance with two groupings of the data. There were also no significant differences between the manager-assessed safety climate and the worker-assessed safety climate scores. Conclusions A CSAP safety performance score does not appear to capture safety climate, as measured in this study. The nature of safety climate in construction is complex, which may be reflective of the challenges in measuring safety climate within this industry. PMID:24038403
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Koyama, Tadashi
2005-04-01
We developed a secure system that minimizes staff workload and secures safety of a medical information system. In this study, we assess the legal security requirements and risks occurring from the use of digitized data. We then analyze the security measures for ways of reducing these risks. In the analysis, not only safety, but also costs of security measures and ease of operability are taken into consideration. Finally, we assess the effectiveness of security measures by employing our system in small-sized medical institution. As a result of the current study, we developed and implemented several security measures, such as authentications, cryptography, data back-up, and secure sockets layer protocol (SSL) in our system. In conclusion, the cost for the introduction and maintenance of a system is one of the primary difficulties with its employment by a small-sized institution. However, with recent reductions in the price of computers, and certain advantages of small-sized medical institutions, the development of an efficient system configuration has become possible.
Betancourt, Theresa S; Williams, Timothy P; Kellner, Sarah E; Gebre-Medhin, Joy; Hann, Katrina; Kayiteshonga, Yvonne
2012-05-01
This study examines the core components of children's basic security and well-being in order to examine issues central to improving child protection in Rwanda. Sources of data included 15 focus groups with adults, 7 focus groups with children ages 10-17, and 11 key informant interviews with child protection stakeholders, including representatives from international NGOs, community-based groups, and the Rwandan Government, all of which took place in April and May of 2010. Participants painted a complex picture of threats to children's basic security in Rwanda. Three key themes were pervasive across all interviews: (1) deterioration of social and community cohesion in post-genocide Rwanda; (2) the cascading effects of poverty; and (3) the impact of caregiver illness and death on the caregiving environment. Consistent with the SAFE (Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security) model of child protection, participants rarely elaborated on a child protection threat independent of other basic security needs and rights. Findings suggest a need for integrated approaches to child protection that recognize this interrelatedness and extend beyond issue-specific child protection responses. This study contributes to a growing body of work highlighting the interrelated nature of child protection threats and the implications of adaptive and dangerous survival strategies that children and families engage in to meet their basic security needs. Analysis of this interrelatedness provides a roadmap for improving policies and implementing integrated and robust child protection strategies in Rwanda and other settings. Copyright © 2012 Elsevier Ltd. All rights reserved.
The design and implementation of hydrographical information management system (HIMS)
NASA Astrophysics Data System (ADS)
Sui, Haigang; Hua, Li; Wang, Qi; Zhang, Anming
2005-10-01
With the development of hydrographical work and information techniques, the large variety of hydrographical information including electronic charts, documents and other materials are widely used, and the traditional management mode and techniques are unsuitable for the development of the Chinese Marine Safety Administration Bureau (CMSAB). How to manage all kinds of hydrographical information has become an important and urgent problem. A lot of advanced techniques including GIS, RS, spatial database management and VR techniques are introduced for solving these problems. Some design principles and key techniques of the HIMS including the mixed mode base on B/S, C/S and stand-alone computer mode, multi-source & multi-scale data organization and management, multi-source data integration and diverse visualization of digital chart, efficient security control strategies are illustrated in detail. Based on the above ideas and strategies, an integrated system named Hydrographical Information Management System (HIMS) was developed. And the HIMS has been applied in the Shanghai Marine Safety Administration Bureau and obtained good evaluation.
Safety and security of radioactive sources in industrial radiography in Bangladesh
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mollah, A. S.; Nazrul, M. Abdullah
2013-07-01
Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing themore » risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)« less
[Ecological security of wastewater treatment processes: a review].
Yang, Sai; Hua, Tao
2013-05-01
Though the regular indicators of wastewater after treatment can meet the discharge requirements and reuse standards, it doesn't mean the effluent is harmless. From the sustainable point of view, to ensure the ecological and human security, comprehensive toxicity should be considered when discharge standards are set up. In order to improve the ecological security of wastewater treatment processes, toxicity reduction should be considered when selecting and optimizing the treatment processes. This paper reviewed the researches on the ecological security of wastewater treatment processes, with the focus on the purposes of various treatment processes, including the processes for special wastewater treatment, wastewater reuse, and for the safety of receiving waters. Conventional biological treatment combined with advanced oxidation technologies can enhance the toxicity reduction on the base of pollutants removal, which is worthy of further study. For the process aimed at wastewater reuse, the integration of different process units can complement the advantages of both conventional pollutants removal and toxicity reduction. For the process aimed at ecological security of receiving waters, the emphasis should be put on the toxicity reduction optimization of process parameters and process unit selection. Some suggestions for the problems in the current research and future research directions were put forward.
Food Safety Legislation Regarding Of Aflatoxins Contamination
NASA Astrophysics Data System (ADS)
Ketney, Otto
2015-09-01
The main objective of the European Union (EU) is to reduce certain contaminants in foodstuffs to acceptable levels. The occurrence of aflatoxin B1 in food was considered to be one of the most important issues of global food security to protect the health of humans and animals, over 100 nations have established maximum tolerable levels for aflatoxin in food. Although EU legislation covers many aspects of food safety was not legally establish an integrated framework that could effectively combat and cover all sectors of the food chain. Monitoring and reporting levels of aflatoxins after controls are essential actions that assist to identify potential risks to human health. The review process for aflatoxin regulations is a complex activity involving many factors and stakeholders.
[Hygiene and security management in medical biology laboratory].
Vinner, E; Odou, M F; Fovet, B; Ghnassia, J C
2013-06-01
Risk management in Medical Biology Laboratory (MBL) which includes hygiene and waste management, is an integrated process to the whole MBL organisation. It is composed of three stages: risks factors identification, grading and prioritization, and their evaluation in the system. From the legislation and NF EN ISO 15189 standard's requirements viewpoint, prevention and protection actions to implement are described, at premises level, but also at work station environment's one (human resources and equipments) towards biological, chemical, linked to gas, to ionizing or non ionizing radiations and fire riks, in order not to compromise patients safety, employees safety, and quality results. Then, although NF EN 15189 standard only enacts requirements in terms of prevention, curative actions after established blood or chemical exposure accident are defined.
Building Partner Country Capacity for Stability Operations
2011-01-01
international aFFairs law and Business national seCurity population and aging puBliC saFety sCienCe and teChnology terrorism and homeland seCurity this... Quantic Thurston, MG-942-A, 2010 (available at http://www.rand.org/pubs/monographs/MG942.html). This research brief was written by Kristin J. Leuschner...AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND HOMELAND SECURITY
Correlation Research of Medical Security Management System Network Platform in Medical Practice
NASA Astrophysics Data System (ADS)
Jie, Wang; Fan, Zhang; Jian, Hao; Li-nong, Yu; Jun, Fei; Ping, Hao; Ya-wei, Shen; Yue-jin, Chang
Objective-The related research of medical security management system network in medical practice. Methods-Establishing network platform of medical safety management system, medical security network host station, medical security management system(C/S), medical security management system of departments and sections, comprehensive query, medical security disposal and examination system. Results-In medical safety management, medical security management system can reflect the hospital medical security problem, and can achieve real-time detection and improve the medical security incident detection rate. Conclusion-The application of the research in the hospital management implementation, can find hospital medical security hidden danger and the problems of medical disputes, and can help in resolving medical disputes in time and achieve good work efficiency, which is worth applying in the hospital practice.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-20
... Coast Guard is establishing regulated navigation areas (RNAs) and safety and security zones around the recently constructed Neptune Deepwater Port Facility, and modifying RNA and safety zone regulations for the... and Northeast Gateway deepwater ports. The Neptune RNAs will prohibit vessels from anchoring or...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-22
... Secure Gun Storage or Safety Devices ACTION: 60-Day notice of information collection. The Department of...) Title of the Form/Collection: Certification of Secure Gun Storage or Safety Devices. (3) Agency form... gun storage or safety devices. (5) An estimate of the total number of respondents and the amount of...
A Review of the Security of Insulin Pump Infusion Systems
Paul, Nathanael; Kohno, Tadayoshi; Klonoff, David C
2011-01-01
Insulin therapy has enabled patients with diabetes to maintain blood glucose control to lead healthier lives. Today, rather than injecting insulin manually using syringes, a patient can use a device such as an insulin pump to deliver insulin programmatically. This allows for more granular insulin delivery while attaining blood glucose control. Insulin pump system features have increasingly benefited patients, but the complexity of the resulting system has grown in parallel. As a result, security breaches that can negatively affect patient health are now possible. Rather than focus on the security of a single device, we concentrate on protecting the security of the entire system. In this article, we describe the security issues as they pertain to an insulin pump system that includes an embedded system of components, which include the insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices (e.g., a mobile phone or personal computer). We detail not only the growing wireless communication threat in each system component, but also describe additional threats to the system (e.g., availability and integrity). Our goal is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we describe mitigating solutions to address identified security issues. PMID:22226278
A review of the security of insulin pump infusion systems.
Paul, Nathanael; Kohno, Tadayoshi; Klonoff, David C
2011-11-01
Insulin therapy has enabled patients with diabetes to maintain blood glucose control to lead healthier lives. Today, rather than injecting insulin manually using syringes, a patient can use a device such as an insulin pump to deliver insulin programmatically. This allows for more granular insulin delivery while attaining blood glucose control. Insulin pump system features have increasingly benefited patients, but the complexity of the resulting system has grown in parallel. As a result, security breaches that can negatively affect patient health are now possible. Rather than focus on the security of a single device, we concentrate on protecting the security of the entire system. In this article, we describe the security issues as they pertain to an insulin pump system that includes an embedded system of components, which include the insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices (e.g., a mobile phone or personal computer). We detail not only the growing wireless communication threat in each system component, but also describe additional threats to the system (e.g., availability and integrity). Our goal is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we describe mitigating solutions to address identified security issues. © 2011 Diabetes Technology Society.
Scan to Bim for 3d Reconstruction of the Papal Basilica of Saint Francis in Assisi in Italy
NASA Astrophysics Data System (ADS)
Angelini, M. G.; Baiocchi, V.; Costantino, D.; Garzia, F.
2017-05-01
The historical building heritage, present in the most of Italian cities centres, is, as part of the construction sector, a working potential, but unfortunately it requires planning of more complex and problematic interventions. However, policies to support on the existing interventions, together with a growing sensitivity for the recovery of assets, determine the need to implement specific studies and to analyse the specific problems of each site. The purpose of this paper is to illustrate the methodology and the results obtained from integrated laser scanning activity in order to have precious architectural information useful not only from the cultural heritage point of view but also to construct more operative and powerful tools, such as BIM (Building Information Modelling) aimed to the management of this cultural heritage. The Papal Basilica and the Sacred Convent of Saint Francis in Assisi in Italy are, in fact, characterized by unique and complex peculiarities, which require a detailed knowledge of the sites themselves to ensure visitor's security and safety. For such a project, we have to take in account all the people and personnel normally present in the site, visitors with disabilities and finally the needs for cultural heritage preservation and protection. This aim can be reached using integrated systems and new technologies, such as Internet of Everything (IoE), capable of connecting people, things (smart sensors, devices and actuators; mobile terminals; wearable devices; etc.), data/information/knowledge and processes to reach the desired goals. The IoE system must implement and support an Integrated Multidisciplinary Model for Security and Safety Management (IMMSSM) for the specific context, using a multidisciplinary approach.
Requirements Definition for ORNL Trusted Corridors Project
DOE Office of Scientific and Technical Information (OSTI.GOV)
Walker, Randy M; Hill, David E; Smith, Cyrus M
2008-02-01
The ORNL Trusted Corridors Project has several other names: SensorNet Transportation Pilot; Identification and Monitoring of Radiation (in commerce) Shipments (IMR(ic)S); and Southeastern Transportation Corridor Pilot (SETCP). The project involves acquisition and analysis of transportation data at two mobile and three fixed inspection stations in five states (Kentucky, Mississippi, South Carolina, Tennessee, and Washington DC). Collaborators include the State Police organizations that are responsible for highway safety, law enforcement, and incident response. The three states with fixed weigh-station deployments (KY, SC, TN) are interested in coordination of this effort for highway safety, law enforcement, and sorting/targeting/interdiction of potentially non-compliant vehicles/persons/cargo.more » The Domestic Nuclear Detection Office (DNDO) in the U.S. Department of Homeland Security (DHS) is interested in these deployments, as a Pilot test (SETCP) to identify Improvised Nuclear Devices (INDs) in highway transport. However, the level of DNDO integration among these state deployments is presently uncertain. Moreover, DHS issues are considered secondary by the states, which perceive this work as an opportunity to leverage these (new) dual-use technologies for state needs. In addition, present experience shows that radiation detectors alone cannot detect DHS-identified IND threats. Continued SETCP success depends on the level of integration of current state/local police operations with the new DHS task of detecting IND threats, in addition to emergency preparedness and homeland security. This document describes the enabling components for continued SETCP development and success, including: sensors and their use at existing deployments (Section 1); personnel training (Section 2); concept of operations (Section 3); knowledge discovery from the copious data (Section 4); smart data collection, integration and database development, advanced algorithms for multiple sensors, and network communications (Section 5); and harmonization of local, state, and Federal procedures and protocols (Section 6).« less
Code of Federal Regulations, 2014 CFR
2014-01-01
... Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary of Homeland Security, the Administrator of the Environmental... Secretary level or higher. In addition, the Working Group shall consist of the head of each of the following...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-25
...-AA00 Safety Zone; Bay Ferry II Maritime Security Exercise; San Francisco Bay, San Francisco, CA AGENCY... Security Exercise, a multi-agency exercise that tests the proficiency of teams called upon in real [[Page... exercise, many of whom will be traveling at high speeds while interfacing with law enforcement responders...
The Challenges of Balancing Safety and Security in Implantable Medical Devices.
Katzis, Konstantinos; Jones, Richard W; Despotou, George
2016-01-01
Modern Implantable Medical Devices (IMDs), implement capabilities that have contributed significantly to patient outcomes, as well as quality of life. The ever increasing connectivity of IMD's does raise security concerns though there are instances where implemented security measures might impact on patient safety. The paper discusses challenges of addressing both of these attributes in parallel.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of the Port Zone 165.1318 Section 165.1318 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-01
... to Facility Vulnerability Assessments and the Integration of Security Systems AGENCY: Coast Guard...-sharing measures. Security System Integration Alternatives Require each MTSA-regulated facility owner or... other forms of security system integration. Information Requested 1. We request comments on the...
Gharaveis, Arsalan; Hamilton, D Kirk; Pati, Debajyoti; Shepley, Mardelle
2017-01-01
The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.
Nissen, Alexander; Heir, Trond
2016-12-01
We aimed to explore how perceived safety after terrorism is connected to views on security measures and emergency preparedness in a workplace setting. Using a questionnaire-based, cross-sectional study of ministerial employees in Norway who were targeted in a terrorist attack in 2011 (n=3344), we investigated how employees' perceived safety at work 9 to 10 months after the attack was associated with their perceptions of whether security measures were sufficiently prioritized at work, whether there had been sufficient escape and evacuation training, and whether they were confident with evacuation procedures. We found strong evidence of increasing perceived safety at work the more employees believed security measures were sufficiently prioritized at work (partially confounded by post-traumatic stress disorder), and the better their knowledge of evacuation procedures (modified by gender and education). The present study suggests that employers may enhance perceived safety at work for terror-exposed employees by showing a commitment to security measures and by ensuring employees know evacuation procedures well. More research is needed to investigate causality patterns behind the associations found in this cross-sectional study. (Disaster Med Public Health Preparedness. 2016;10:805-811).
33 CFR 1.05-5 - Marine Safety and Security Council.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Safety and Security Council, composed of senior Coast Guard officials, acts as policy advisor to the... Council provides oversight, review, and guidance for all Coast Guard regulatory activity. [CGD 95-057, 60...
Transit safety & security statistics & analysis 2003 annual report (formerly SAMIS)
DOT National Transportation Integrated Search
2005-12-01
The Transit Safety & Security Statistics & Analysis 2003 Annual Report (formerly SAMIS) is a compilation and analysis of mass transit accident, casualty, and crime statistics reported under the Federal Transit Administrations (FTAs) National Tr...
47 CFR 0.191 - Functions of the Bureau.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION Organization Public Safety and... management and preparedness, disaster management, and ancillary operations. The Bureau has responsibility for coordinating public safety, homeland security, national security, emergency management and preparedness...
47 CFR 0.191 - Functions of the Bureau.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION Organization Public Safety and... management and preparedness, disaster management, and ancillary operations. The Bureau has responsibility for coordinating public safety, homeland security, national security, emergency management and preparedness...
Transit safety & security statistics & analysis 2002 annual report (formerly SAMIS)
DOT National Transportation Integrated Search
2004-12-01
The Transit Safety & Security Statistics & Analysis 2002 Annual Report (formerly SAMIS) is a compilation and analysis of mass transit accident, casualty, and crime statistics reported under the Federal Transit Administrations (FTAs) National Tr...
33 CFR 165.500 - Safety/Security Zones; Chesapeake Bay, Maryland.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Safety/Security Zones; Chesapeake Bay, Maryland. (a) Definitions. (1) Certain Dangerous Cargo (CDC) means... surface to bottom, within a 500 yard radius around cruise ships and vessels transporting CDC, LNG, or LHG...
33 CFR 165.500 - Safety/Security Zones; Chesapeake Bay, Maryland.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Safety/Security Zones; Chesapeake Bay, Maryland. (a) Definitions. (1) Certain Dangerous Cargo (CDC) means... surface to bottom, within a 500 yard radius around cruise ships and vessels transporting CDC, LNG, or LHG...
33 CFR 165.500 - Safety/Security Zones; Chesapeake Bay, Maryland.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Safety/Security Zones; Chesapeake Bay, Maryland. (a) Definitions. (1) Certain Dangerous Cargo (CDC) means... surface to bottom, within a 500 yard radius around cruise ships and vessels transporting CDC, LNG, or LHG...
ERIC Educational Resources Information Center
Education Law Association, Dayton, OH.
This booklet contains five chapters relating to issues in school safety and security, and fair dismissals: (1) "Ohio Legislation and Federal and State Decisions" (Richard J. Dickinson). Items of deliberation include financial matters, school safety issues, administrator and teacher contract matters, Title IX liability, school prayer, drug testing…
78 FR 23811 - Privacy Act of 1974; Proposed New Routine Uses and System of Records Alterations
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-22
..., and local law enforcement agencies and private security contractors to protect the safety of SSA... respect to activities that affect such safety and security, or activities that disrupt the operation of.... B. To Federal, State, and Local Law Enforcement To Protect the Safety of SSA Employees and Customers...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-01
... rulemaking. SUMMARY: The Coast Guard proposes to establish new regulated navigation areas (RNAs) and safety... (COTP) Zone, off the coast of Gloucester, Massachusetts. The proposed RNAs and safety and security zones..., SE., Washington, DC 20590-0001. (4) Hand delivery: Same as mail address above, between 9 a.m. and 5 p...
A security/safety survey of long term care facilities.
Acorn, Jonathan R
2010-01-01
What are the major security/safety problems of long term care facilities? What steps are being taken by some facilities to mitigate such problems? Answers to these questions can be found in a survey of IAHSS members involved in long term care security conducted for the IAHSS Long Term Care Security Task Force. The survey, the author points out, focuses primarily on long term care facilities operated by hospitals and health systems. However, he believes, it does accurately reflect the security problems most long term facilities face, and presents valuable information on security systems and practices which should be also considered by independent and chain operated facilities.
NASA Astrophysics Data System (ADS)
Reddy, K. Rasool; Rao, Ch. Madhava
2018-04-01
Currently safety is one of the primary concerns in the transmission of images due to increasing the use of images within the industrial applications. So it's necessary to secure the image facts from unauthorized individuals. There are various strategies are investigated to secure the facts. In that encryption is certainly one of maximum distinguished method. This paper gives a sophisticated Rijndael (AES) algorithm to shield the facts from unauthorized humans. Here Exponential Key Change (EKE) concept is also introduced to exchange the key between client and server. The things are exchange in a network among client and server through a simple protocol is known as Trivial File Transfer Protocol (TFTP). This protocol is used mainly in embedded servers to transfer the data and also provide protection to the data if protection capabilities are integrated. In this paper, implementing a GUI environment for image encryption and decryption. All these experiments carried out on Linux environment the usage of Open CV-Python script.
Leveraging brightness from transportation lighting systems through light source color.
DOT National Transportation Integrated Search
2013-11-01
Roadway transportation lighting is installed for multiple reasons including traffic safety and pedestrian : security. Judgments of pedestrian safety and security along roadways are not strictly correlated to : specified light levels, but the color of...
33 CFR 127.007 - Letter of intent and waterway suitability assessment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... facility and LNG or LHG tanker route; (iii) Risk assessment for maritime safety and security; (iv) Risk management strategies; and (v) Resource needs for maritime safety, security, and response. (g) The Follow-on...
U27 : real-time commercial vehicle safety & security monitoring final report.
DOT National Transportation Integrated Search
2012-12-01
Accurate real-time vehicle tracking has a wide range of applications including fleet management, drug/speed/law enforcement, transportation planning, traffic safety, air quality, electronic tolling, and national security. While many alternative track...
Security warning method and system for worker safety during live-line working
NASA Astrophysics Data System (ADS)
Jiang, Chilong; Zou, Dehua; Long, Chenhai; Yang, Miao; Zhang, Zhanlong; Mei, Daojun
2017-09-01
Live-line working is an essential part in the operations in an electric power system. Live-line workers are required to wear shielding clothing. Shielding clothing, however, acts as a closed environment for the human body. Working in a closed environment for a long time can change the physiological responses of the body and even endanger personal safety. According to the typical conditions of live-line working, this study synthesizes environmental factors related to shielding clothing and the physiological factors of the body to establish the heart rate variability index RMSSD and the comprehensive security warning index SWI. On the basis of both indices, this paper proposes a security warning method and system for the safety live-line workers. The system can monitor the real-time status of workers during live-line working to provide security warning and facilitate the effective safety supervision by the live operation center during actual live-line working.
Agrawal, Ganesh Kumar; Sarkar, Abhijit; Righetti, Pier Giorgio; Pedreschi, Romina; Carpentier, Sebastien; Wang, Tai; Barkla, Bronwyn J; Kohli, Ajay; Ndimba, Bongani Kaiser; Bykova, Natalia V; Rampitsch, Christof; Zolla, Lello; Rafudeen, Mohamed Suhail; Cramer, Rainer; Bindschedler, Laurence Veronique; Tsakirpaloglou, Nikolaos; Ndimba, Roya Janeen; Farrant, Jill M; Renaut, Jenny; Job, Dominique; Kikuchi, Shoshi; Rakwal, Randeep
2013-01-01
Tremendous progress in plant proteomics driven by mass spectrometry (MS) techniques has been made since 2000 when few proteomics reports were published and plant proteomics was in its infancy. These achievements include the refinement of existing techniques and the search for new techniques to address food security, safety, and health issues. It is projected that in 2050, the world's population will reach 9-12 billion people demanding a food production increase of 34-70% (FAO, 2009) from today's food production. Provision of food in a sustainable and environmentally committed manner for such a demand without threatening natural resources, requires that agricultural production increases significantly and that postharvest handling and food manufacturing systems become more efficient requiring lower energy expenditure, a decrease in postharvest losses, less waste generation and food with longer shelf life. There is also a need to look for alternative protein sources to animal based (i.e., plant based) to be able to fulfill the increase in protein demands by 2050. Thus, plant biology has a critical role to play as a science capable of addressing such challenges. In this review, we discuss proteomics especially MS, as a platform, being utilized in plant biology research for the past 10 years having the potential to expedite the process of understanding plant biology for human benefits. The increasing application of proteomics technologies in food security, analysis, and safety is emphasized in this review. But, we are aware that no unique approach/technology is capable to address the global food issues. Proteomics-generated information/resources must be integrated and correlated with other omics-based approaches, information, and conventional programs to ensure sufficient food and resources for human development now and in the future. © 2013 Wiley Periodicals, Inc.
Cyber Safety and Security for Reduced Crew Operations (RCO)
NASA Technical Reports Server (NTRS)
Driscoll, Kevin
2017-01-01
NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified. The approach includes a comprehensive safety-hazard analysis of the RCO system to determine top level INFOSEC requirements for RCO and proposes an option for effective RCO implementation. This paper concludes with questioning the economic viability of RCO in light of the expense of overcoming the operational safety and security hazards it would introduce.
Linking hospital security to customer service: making the case for 'world class' security.
Hill, Scott A
2011-01-01
The reluctance of many hospitals today to invest money and resources into security and safety while at the same time promoting customer good will is a fallacy that has to be corrected, according to the author. He demonstrates how high customer satisfaction scores, as well as regulatory compliance, can only be achieved if a hospital takes the steps necessary to provide adequate safety and security to patients, visitors, physicians and to all who come to the hospital.
Security culture for nuclear facilities
NASA Astrophysics Data System (ADS)
Gupta, Deeksha; Bajramovic, Edita
2017-01-01
Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.
Correlation between safety climate and contractor safety assessment programs in construction.
Sparer, Emily H; Murphy, Lauren A; Taylor, Kathryn M; Dennerlein, Jack T
2013-12-01
Contractor safety assessment programs (CSAPs) measure safety performance by integrating multiple data sources together; however, the relationship between these measures of safety performance and safety climate within the construction industry is unknown. Four hundred and one construction workers employed by 68 companies on 26 sites and 11 safety managers employed by 11 companies completed brief surveys containing a nine-item safety climate scale developed for the construction industry. CSAP scores from ConstructSecure, Inc., an online CSAP database, classified these 68 companies as high or low scorers, with the median score of the sample population as the threshold. Spearman rank correlations evaluated the association between the CSAP score and the safety climate score at the individual level, as well as with various grouping methodologies. In addition, Spearman correlations evaluated the comparison between manager-assessed safety climate and worker-assessed safety climate. There were no statistically significant differences between safety climate scores reported by workers in the high and low CSAP groups. There were, at best, weak correlations between workers' safety climate scores and the company CSAP scores, with marginal statistical significance with two groupings of the data. There were also no significant differences between the manager-assessed safety climate and the worker-assessed safety climate scores. A CSAP safety performance score does not appear to capture safety climate, as measured in this study. The nature of safety climate in construction is complex, which may be reflective of the challenges in measuring safety climate within this industry. Am. J. Ind. Med. 56:1463-1472, 2013. © 2013 Wiley Periodicals, Inc. © 2013 Wiley Periodicals, Inc.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smidts, Carol; Huang, Funqun; Li, Boyuan
With the current transition from analog to digital instrumentation and control systems in nuclear power plants, the number and variety of software-based systems have significantly increased. The sophisticated nature and increasing complexity of software raises trust in these systems as a significant challenge. The trust placed in a software system is typically termed software dependability. Software dependability analysis faces uncommon challenges since software systems’ characteristics differ from those of hardware systems. The lack of systematic science-based methods for quantifying the dependability attributes in software-based instrumentation as well as control systems in safety critical applications has proved itself to be amore » significant inhibitor to the expanded use of modern digital technology in the nuclear industry. Dependability refers to the ability of a system to deliver a service that can be trusted. Dependability is commonly considered as a general concept that encompasses different attributes, e.g., reliability, safety, security, availability and maintainability. Dependability research has progressed significantly over the last few decades. For example, various assessment models and/or design approaches have been proposed for software reliability, software availability and software maintainability. Advances have also been made to integrate multiple dependability attributes, e.g., integrating security with other dependability attributes, measuring availability and maintainability, modeling reliability and availability, quantifying reliability and security, exploring the dependencies between security and safety and developing integrated analysis models. However, there is still a lack of understanding of the dependencies between various dependability attributes as a whole and of how such dependencies are formed. To address the need for quantification and give a more objective basis to the review process -- therefore reducing regulatory uncertainty -- measures and methods are needed to assess dependability attributes early on, as well as throughout the life-cycle process of software development. In this research, extensive expert opinion elicitation is used to identify the measures and methods for assessing software dependability. Semi-structured questionnaires were designed to elicit expert knowledge. A new notation system, Causal Mechanism Graphing, was developed to extract and represent such knowledge. The Causal Mechanism Graphs were merged, thus, obtaining the consensus knowledge shared by the domain experts. In this report, we focus on how software contributes to dependability. However, software dependability is not discussed separately from the context of systems or socio-technical systems. Specifically, this report focuses on software dependability, reliability, safety, security, availability, and maintainability. Our research was conducted in the sequence of stages found below. Each stage is further examined in its corresponding chapter. Stage 1 (Chapter 2): Elicitation of causal maps describing the dependencies between dependability attributes. These causal maps were constructed using expert opinion elicitation. This chapter describes the expert opinion elicitation process, the questionnaire design, the causal map construction method and the causal maps obtained. Stage 2 (Chapter 3): Elicitation of the causal map describing the occurrence of the event of interest for each dependability attribute. The causal mechanisms for the “event of interest” were extracted for each of the software dependability attributes. The “event of interest” for a dependability attribute is generally considered to be the “attribute failure”, e.g. security failure. The extraction was based on the analysis of expert elicitation results obtained in Stage 1. Stage 3 (Chapter 4): Identification of relevant measurements. Measures for the “events of interest” and their causal mechanisms were obtained from expert opinion elicitation for each of the software dependability attributes. The measures extracted are presented in this chapter. Stage 4 (Chapter 5): Assessment of the coverage of the causal maps via measures. Coverage was assessed to determine whether the measures obtained were sufficient to quantify software dependability, and what measures are further required. Stage 5 (Chapter 6): Identification of “missing” measures and measurement approaches for concepts not covered. New measures, for concepts that had not been covered sufficiently as determined in Stage 4, were identified using supplementary expert opinion elicitation as well as literature reviews. Stage 6 (Chapter 7): Building of a detailed quantification model based on the causal maps and measurements obtained. Ability to derive such a quantification model shows that the causal models and measurements derived from the previous stages (Stage 1 to Stage 5) can form the technical basis for developing dependability quantification models. Scope restrictions have led us to prioritize this demonstration effort. The demonstration was focused on a critical system, i.e. the reactor protection system. For this system, a ranking of the software dependability attributes by nuclear stakeholders was developed. As expected for this application, the stakeholder ranking identified safety as the most critical attribute to be quantified. A safety quantification model limited to the requirements phase of development was built. Two case studies were conducted for verification. A preliminary control gate for software safety for the requirements stage was proposed and applied to the first case study. The control gate allows a cost effective selection of the duration of the requirements phase.« less
A Look at the Law, Public Safety, Corrections & Security Cluster
ERIC Educational Resources Information Center
Coffee, Joseph N.
2008-01-01
A month after the 9/11 terrorist attack in 2001, an advisory group met in Little Rock, Arkansas, to begin the development of the Law, Public Safety, Corrections and Security (LPSCS) career cluster. At that time there were five pathways of what was then called the Law and Public Safety cluster--fire and emergency services, law enforcement,…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-17
... Morgan City--07-012 New Iberia, LO Safety Zones (Parts 147 and 10/2/2007 165). COTP Morgan City--07-014... Iberia, LO Safety Zones (Parts 147 and 10/11/2007 165). COTP San Francisco Bay 06-013 Carquinez Strait...-0043 Savannah, GA Security zones (Part 165)..... 1/24/2008 USCG-2008-0050 Atchafalaya Bay, LO...
Safety and Security of Older Persons in Tehran, Iran: A Sociological Appraisal of Elder Abuse
ERIC Educational Resources Information Center
Sheykhi, Mohammad Taghi
2010-01-01
The article explores and evaluates the quality of life, safety, and security of elderly people in Tehran City in Iran. In that, different dimensions of material and social well-being, and abuse of people of the age 65 and above, are assessed. Besides the human rights, the dignity, and the gradual decline of the elderly's social security are…
Global Food Security in a Changing Climate: Considerations and Projections
NASA Astrophysics Data System (ADS)
Walsh, M. K.; Brown, M. E.; Backlund, P. W.; Antle, J. M.; Carr, E. R.; Easterling, W. E.; Funk, C. C.; Murray, A.; Ngugi, M.; Barrett, C. B.; Ingram, J. S. I.; Dancheck, V.; O'Neill, B. C.; Tebaldi, C.; Mata, T.; Ojima, D. S.; Grace, K.; Jiang, H.; Bellemare, M.; Attavanich, W.; Ammann, C. M.; Maletta, H.
2015-12-01
Global food security is an elusive challenge and important policy focus from the community to the globe. Food is provisioned through food systems that may be simple or labyrinthine, yet each has vulnerabilities to climate change through its effects on food production, transportation, storage, and other integral food system activities. At the same time, the future of food systems is sensitive to socioeconomic trajectories determined by choices made outside of the food system, itself. Constrictions for any reason can lead to decreased food availability, access, utilization, or stability - that is, to diminished food security. Possible changes in trade and other U.S. relationships to the rest of the world under changing conditions to the end of the century are considered through integrated assessment modelling under a range of emissions scenarios. Climate change is likely to diminish continued progress on global food security through production disruptions leading to local availability limitations and price increases, interrupted transport conduits, and diminished food safety, among other causes. In the near term, some high-latitude production export regions may benefit from changes in climate. The types and price of food imports is likely to change, as are export demands, affecting U.S. consumers and producers. Demands placed on foreign assistance programs may increase, as may demand for advanced technologies. Adaptation across the food system has great potential to manage climate change effects on food security, and the complexity of the food system offers multiple potential points of intervention for decision makers at every level. However, effective adaptation is subject to highly localized conditions and socioeconomic factors, and the technical feasibility of an adaptive intervention is not necessarily a guarantee of its application if it is unaffordable or does not provide benefits within a relatively short time frame.
49 CFR 179.3 - Procedure for securing approval.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Executive Director—Tank Car Safety, AAR, for consideration by its Tank Car Committee and other appropriate... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS SPECIFICATIONS FOR TANK CARS Introduction, Approvals and Reports § 179.3 Procedure for securing approval. (a) Application...
Identification of port communication equipment needs for safety, security, and interoperability
DOT National Transportation Integrated Search
2007-12-01
Identification of Port Communication Equipment Needs for Safety, Security, and Interoperability is a big concern for current and : future need. The data demonstrates that two-way radios should be the most effective method of communication in both rou...
Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.
Sackner-Bernstein, Jonathan
2017-03-01
The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.
Wireless gas detection with a smartphone via rf communication
Azzarelli, Joseph M.; Mirica, Katherine A.; Ravnsbæk, Jens B.; Swager, Timothy M.
2014-01-01
Chemical sensing is of critical importance to human health, safety, and security, yet it is not broadly implemented because existing sensors often require trained personnel, expensive and bulky equipment, and have large power requirements. This study reports the development of a smartphone-based sensing strategy that employs chemiresponsive nanomaterials integrated into the circuitry of commercial near-field communication tags to achieve non-line-of-sight, portable, and inexpensive detection and discrimination of gas-phase chemicals (e.g., ammonia, hydrogen peroxide, cyclohexanone, and water) at part-per-thousand and part-per-million concentrations. PMID:25489066
NASA Astrophysics Data System (ADS)
Byłak, Michał; RóŻański, Grzegorz
2017-04-01
The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.
Wang, Tao; Zhang, Yong
2015-01-01
Purpose: To assess the efficacy and safety of tension-free vaginal tape (TVT)-Secur for stress urinary incontinence (SUI). Methods: A literature review was performed to identify all published trials of TVT-Secur. The search included the following databases: MEDLINE, Embase, and the Cochrane Controlled Trial Register. Results: Seventeen publications involving a total of 1,879 patients were used to compare TVT-Secur with tension-free obturator tape (TVT-O) and TVT. We found that TVT-Secur had significant reductions in operative time, visual analog score for pain, and postoperative complications compared with TVT-O. Even though TVT-Secur had a significantly lower subjective cure rate (P<0.00001), lower objective cure rate (P<0.00001), and higher intraoperative complication rate, compared with TVT-O at 1 to 3 years, there was no significant difference between TVT-Secur and TVT-O in the subjective cure rate (odds ratio [OR], 0.49; 95% confidence interval [CI], 0.22–1.08; P=0.08), objective cure rate (OR, 0.49; 95% CI, 0.22–1.09; P=0.08), or complications at 3 to 5 years. Moreover, TVT-Secur had significantly lower subjective and objective cure rates compared with TVT. Conclusions: This meta-analysis indicates that TVT-Secur did not show an inferior efficacy and safety compared with TVT-O for SUI in 3 to 5 years, even though displaying a clear tread toward a lower efficacy in 1 to 3 years. Considering that the safety is similar, there are no advantages in using TVT-Secur. PMID:26739179
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
ERIC Educational Resources Information Center
Rasmussen, Chris; Johnson, Gina
2008-01-01
This report is the result of a nationwide survey conducted in March 2008 of student life officers and campus safety directors to assess the impact of the April 2007 shootings at Virginia Tech on campus safety and security policy and practice. Discussion areas include: (1) Student Privacy vs. Need-to-Know; (2) Prevention, Mitigation and Recovery;…
Choi, Gi Heung; Loh, Byoung Gook
2017-06-01
Despite the recent efforts to prevent industrial accidents in the Republic of Korea, the industrial accident rate has not improved much. Industrial safety policies and safety management are also known to be inefficient. This study focused on dynamic characteristics of industrial safety systems and their effects on safety performance in the Republic of Korea. Such dynamic characteristics are particularly important for restructuring of the industrial safety system. The effects of damping and elastic characteristics of the industrial safety system model on safety performance were examined and feedback control performance was explained in view of cost and benefit. The implications on safety policies of restructuring the industrial safety system were also explored. A strong correlation between the safety budget and the industrial accident rate enabled modeling of an industrial safety system with these variables as the input and the output, respectively. A more effective and efficient industrial safety system could be realized by having weaker elastic characteristics and stronger damping characteristics in it. A substantial decrease in total social cost is expected as the industrial safety system is restructured accordingly. A simple feedback control with proportional-integral action is effective in prevention of industrial accidents. Securing a lower level of elastic industrial accident-driving energy appears to have dominant effects on the control performance compared with the damping effort to dissipate such energy. More attention needs to be directed towards physical and social feedbacks that have prolonged cumulative effects. Suggestions for further improvement of the safety system including physical and social feedbacks are also made.
Surveillance systems for intermodal transportation
NASA Astrophysics Data System (ADS)
Jakovlev, Sergej; Voznak, Miroslav; Andziulis, Arunas
2015-05-01
Intermodal container monitoring is considered a major security issue in many major logistic companies and countries worldwide. Current representation of the problem, we face today, originated in 2002, right after the 9/11 attacks. Then, a new worldwide Container Security Initiative (CSI, 2002) was considered that shaped the perception of the transportation operations. Now more than 80 larger ports all over the world contribute to its further development and integration into everyday transportation operations and improve the regulations for the developing regions. Although, these new improvements allow us to feel safer and secure, constant management of transportation operations has become a very difficult problem for conventional data analysis methods and information systems. The paper deals with a proposal of a whole new concept for the improvement of the Containers Security Initiative (CSI) by virtually connecting safety, security processes and systems. A conceptual middleware approach with deployable intelligent agent modules is proposed to be used with possible scenarios and a testbed is used to test the solution. Middleware examples are visually programmed using National Instruments LabView software packages and Wireless sensor network hardware modules. An experimental software is used to evaluate he solution. This research is a contribution to the intermodal transportation and is intended to be used as a means or the development of intelligent transport systems.
14 CFR 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Breach of safety or security. 1274.936 Section 1274.936 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION COOPERATIVE... following: compromise of classified information; illegal technology transfer; workplace violence resulting...
DOT National Transportation Integrated Search
2017-05-01
This research collected information on the frequency and impact of safety and security incidents (threats) at selected facilities and identified priority incidents at each facility. A customized all hazards approach was used to determine the ha...
Editors' Preface to Special Issue on Drinking Water Safety, Security, and Sustainability
Recognizing these needs, researchers from Zhejiang University (China), the US EPA and the University of Alberta (Canada) organized the “International Conference on Drinking Water Safety, Security and Sustainability” in October 2011 in Hangzhou, China. The conference was attended...
DOT National Transportation Integrated Search
2003-03-17
The purpose of this effort is to independently evaluate the Battelle Operational Test Team to test methods for leveraging technology and operations to improve HAZMAT transport security, safety, and operational efficiency. As such, the preceding techn...
Security for safety critical space borne systems
NASA Technical Reports Server (NTRS)
Legrand, Sue
1987-01-01
The Space Station contains safety critical computer software components in systems that can affect life and vital property. These components require a multilevel secure system that provides dynamic access control of the data and processes involved. A study is under way to define requirements for a security model providing access control through level B3 of the Orange Book. The model will be prototyped at NASA-Johnson Space Center.
Pati, Debajyoti; Harvey, Thomas E; Pati, Sipra
2014-01-01
The objective of this study was to explore and identify physical design correlates of safety and efficiency in emergency department (ED) operations. This study adopted an exploratory, multimeasure approach to (1) examine the interactions between ED operations and physical design at 4 sites and (2) identify domains of physical design decision-making that potentially influence efficiency and safety. Multidisciplinary gaming and semistructured interviews were conducted with stakeholders at each site. Study data suggest that 16 domains of physical design decisions influence safety, efficiency, or both. These include (1) entrance and patient waiting, (2) traffic management, (3) subwaiting or internal waiting areas, (4) triage, (5) examination/treatment area configuration, (6) examination/treatment area centralization versus decentralization, (7) examination/treatment room standardization, (8) adequate space, (9) nurse work space, (10) physician work space, (11) adjacencies and access, (12) equipment room, (13) psych room, (14) staff de-stressing room, (15) hallway width, and (16) results waiting area. Safety and efficiency from a physical environment perspective in ED design are mutually reinforcing concepts--enhancing efficiency bears positive implications for safety. Furthermore, safety and security emerged as correlated concepts, with security issues bearing implications for safety, thereby suggesting important associations between safety, security, and efficiency.
Water security - Nation state and international security implications
Tindall, James A.; Andrew A. Campbell,
2009-01-01
A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.
[Airport security check of medical substances used during patient repatriation].
Felkai, Péter
2012-09-16
During airport security check of passenger luggage, hazardous items and substances are prohibited to be taken into the restricted safety zone of the airport and the aircraft. Among equipment of the medical staff escorting the patient, there are several devices and materials which are considered hazardous for security reasons. However, medical equipment and substances are indispensable for treating patients during the flight. The aim of the author was to present his experience obtained with the use of an instrument developed for testing liquids, aerosols and gels for security reasons. An instrument based on Raman spectroscopy was used for the identification of medical substances. The results confirmed that the instrument was able to recognize the tested medical substances. The non-destructive testing maintained sample integrity and asepsis. The data indicate that the instrument has a promising utility for the identification of medical substances. It seems important that during repatriation medical substances should be selected not only on the ground of their medical necessity, but their packaging should be also taken into consideration. It is necessary to perform more tests on different medical substances used in emergency care in order to make the database of medical substances stored in the library of instrument more complete.
DOT National Transportation Integrated Search
1999-11-01
This plan describes coordinated long-term research initiatives to bring about advances in aviation that will be required in the opening decades of the next century. The White House Commission on Aviation Safety and Security and the National Civil Avi...
DOT National Transportation Integrated Search
1999-11-01
This plan describes coordinated long-term research initiatives to bring about advances in aviation that will be required in the opening decades of the next century. The White House Commission on Aviation Safety and Security and the National Civil Avi...
Problem Patrons: Reviewing Your Options.
ERIC Educational Resources Information Center
Shuman, Bruce A.
2002-01-01
Considers possible options for public librarians dealing with problem patrons. Highlights include considering the safety of the patrons and staff; general considerations of library security, including security guards, legal responsibility for patrons and staff safety; and working through possible options ahead of time to be more prepared. (LRW)
Staying Secure for School Safety
ERIC Educational Resources Information Center
Youngkin, Minu
2012-01-01
Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…
High Assurance Control of Cyber-Physical Systems with Application to Unmanned Aircraft Systems
NASA Astrophysics Data System (ADS)
Kwon, Cheolhyeon
With recent progress in the networked embedded control technology, cyber attacks have become one of the major threats to Cyber-Physical Systems (CPSs) due to their close integration of physical processes, computational resources, and communication capabilities. While CPSs have various applications in both military and civilian uses, their on-board automation and communication afford significant advantages over a system without such abilities, but these benefits come at the cost of possible vulnerability to cyber attacks. Traditionally, most cyber security studies in CPSs are mainly based on the computer security perspective, focusing on issues such as the trustworthiness of data flow, without rigorously considering the system's physical processes such as real-time dynamic behaviors. While computer security components are key elements in the hardware/software layer, these methods alone are not sufficient for diagnosing the healthiness of the CPSs' physical behavior. In seeking to address this problem, this research work proposes a control theoretic perspective approach which can accurately represent the interactions between the physical behavior and the logical behavior (computing resources) of the CPS. Then a controls domain aspect is explored extending beyond just the logical process of the CPS to include the underlying physical behavior. This approach will allow the CPS whose physical operations are robust/resilient to the damage caused by cyber attacks, successfully complementing the existing CPS security architecture. It is important to note that traditional fault-tolerant/robust control methods could not be directly applicable to achieve resiliency against malicious cyber attacks which can be designed sophisticatedly to spoof the security/safety monitoring system (note this is different from common faults). Thus, security issues at this layer require different risk management to detect cyber attacks and mitigate their impact within the context of a unified physical and logical process model of the CPS. Specifically, three main tasks are discussed in this presentation: (i) we first investigate diverse granularity of the interactions inside the CPS and propose feasible cyber attack models to characterize the compromised behavior of the CPS with various measures, from its severity to detectability; (ii) based on this risk information, our approach to securing the CPS addresses both monitoring of and high assurance control design against cyber attacks by developing on-line safety assessment and mitigation algorithms; and (iii) by extending the developed theories and methods from a single CPS to multiple CPSs, we examine the security and safety of multi-CPS network that are strongly dependent on the network topology, cooperation protocols between individual CPSs, etc. The effectiveness of the analytical findings is demonstrated and validated with illustrative examples, especially unmanned aircraft system (UAS) applications.
Security, safety, and related technology - the triangle of eHealth service provision.
Savastano, Mario; Hovsto, Asbjorn; Pharow, Peter; Blobel, Bernd
2008-01-01
The developing of innovative solutions in the emerging eHealth market requires strong economic efforts which may be justified only in presence of particularly suitable boundary conditions. Among the factors retained of primary importance for the development of eHealth, a correct approach to id-management is unanimously considered fundamental. Three keywords in the id-management context appear particularly important: standardization, security and safety. Standardization may contribute to increase the size and duration of the eHealth market, while security and safety may encourage all the stakeholders to trust in a appropriate and safe management of all the very sensitive personal data involved in the eHealth applications. The aim of the present paper is analyzing some security and safety issues in eHealth from the particular prospective of the identity management and standardization. The paper highlights the mission of the EU funded "BioHealth" project whose mission is to increase the stakeholders' knowledge about existing and emerging standards in eHealth with particular reference to identity management.
[Basic consideration on the security checking of sick travelers at airports].
Felkai, Péter; Mártai, István
2012-09-02
The authorities guarantee the safety of passengers during air travel by strict ground security measures. All of these measures are restrictive and can affect the health status of both healthy and ill travelers. Patients who are in critical condition or confined to a stretcher and have to be repatriated by stretcher on a regular flight, must pass the airport security check as well. But the developers of security system should take into account the medical safety of patients during the procedure. The relevant medical principles are painfully missing not only in Hungary, but unfortunately also at most international airports. On the basis of principles reviewed in the present publication, an unambiguous, professionally reconciled regulation is necessary that would serve as a guideline for airport management and authorities, as well as for the involved medical personnel. Although setting principles into practice requires a different solution at each airport, yet, passenger safety and patient safety have to be harmonized as soon as possible.
Okeke, Sunday O.
2017-01-01
Background For optimum delivery of service, an establishment needs to ensure a safe and secure environment. In 2011, the South African government promulgated the National Core Standards for Health Establishments for safety and security for all employees in all establishments. Little is known about whether these standards are being complied to. Aim and setting: To assess the perceptions of health care professionals (HCPs) on safety and security at Odi District Hospital. Methodology A sample of 181 out of a total of 341 HCPs was drawn through a systematic sampling method from each HCP category. Data were collected through a self-administered questionnaire. The SPSS® statistical software version 22 was used for data analysis. The level of statistical significance was set at < 0.05. Results There were more female respondents than male respondents (136; 75.10%). The dominant age group was 28–47 years (114; 57.46%). Perceptions on security personnel, their efficiency and the security system were significantly affirmed (p = 0.0001). The hospital infrastructure, surroundings and plan in emergencies were perceived to be safe (p < 0.0001). The hospital lighting system was perceived as inadequate (p = 0.0041). Only 36 (20.2%) HCPs perceived that hospital authorities were concerned about employees’ safety (p < 0.0001). Conclusion HCPs had positive perceptions regarding the hospital’s security system. Except for the negative perceptions of the lighting system and the perceived lack of hospital authorities’ concern for staff safety, perceptions of the HCPs on the hospital working environment were positive. The hospital authorities need to establish the basis of negative perceptions and enforce remedial measures to redress them. PMID:29113444
Secure and Resilient Cloud Computing for the Department of Defense
2015-07-21
that addresses that threat model, and (3) integrate the technology into a usable, secure, resilient cloud test bed. Underpinning this work is the...risks for the DoD’s acquisition of secure, resilient cloud technology by providing proofs of concept, technology maturity, integration demonstrations...we need a strategy for integrating LLSRC technology with the cloud services and applications that need to be secured. The LLSRC integration
Papoutsi, Chrysanthi; Reed, Julie E; Marston, Cicely; Lewis, Ruth; Majeed, Azeem; Bell, Derek
2015-10-14
Although policy discourses frame integrated Electronic Health Records (EHRs) as essential for contemporary healthcare systems, increased information sharing often raises concerns among patients and the public. This paper examines patient and public views about the security and privacy of EHRs used for health provision, research and policy in the UK. Sequential mixed methods study with a cross-sectional survey (in 2011) followed by focus group discussions (in 2012-2013). Survey participants (N = 5331) were recruited from primary and secondary care settings in West London (UK). Complete data for 2761 (51.8 %) participants were included in the final analysis for this paper. The survey results were discussed in 13 focus groups with people living with a range of different health conditions, and in 4 mixed focus groups with patients, health professionals and researchers (total N = 120). Qualitative data were analysed thematically. In the survey, 79 % of participants reported that they would worry about the security of their record if this was part of a national EHR system and 71 % thought the National Health Service (NHS) was unable to guarantee EHR safety at the time this work was carried out. Almost half (47 %) responded that EHRs would be less secure compared with the way their health record was held at the time of the survey. Of those who reported being worried about EHR security, many would nevertheless support their development (55 %), while 12 % would not support national EHRs and a sizeable proportion (33 %) were undecided. There were also variations by age, ethnicity and education. In focus group discussions participants weighed up perceived benefits against potential security and privacy threats from wider sharing of information, as well as discussing other perceived risks: commercial exploitation, lack of accountability, data inaccuracies, prejudice and inequalities in health provision. Patient and public worries about the security risks associated with integrated EHRs highlight the need for intensive public awareness and engagement initiatives, together with the establishment of trustworthy security and privacy mechanisms for health information sharing.
49 CFR 193.2911 - Security lighting.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 3 2011-10-01 2011-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...
49 CFR 193.2911 - Security lighting.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 3 2012-10-01 2012-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...
49 CFR 193.2911 - Security lighting.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 3 2010-10-01 2010-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...
49 CFR 193.2909 - Security communications.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 3 2010-10-01 2010-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement officials...
49 CFR 193.2909 - Security communications.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 3 2012-10-01 2012-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement officials...
49 CFR 193.2909 - Security communications.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 3 2011-10-01 2011-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement officials...
Safety in the Classroom: How to Communicate Policies that Ensure Children's Health and Safety
ERIC Educational Resources Information Center
Wilford, Sara
2006-01-01
The events of September 11th, 2001 in the US eroded a basic sense of security on the national level. This is one of the factors that affect the need for early childhood schools and centers to review and be clear about their safety and security policies. In this article, the author stresses that it is the director's job to make sure that basic…
ERIC Educational Resources Information Center
Holmes, Ryan Clevis
2014-01-01
Campus safety has been a source of concern since the 1990s. However, in 2007, the tragedy at the Virginia Polytechnic and State University sent a sense of alarm through many institutions of higher education. Immediately following this tragedy, institutions across the country began to evaluate and question their safety and security practices. While…
Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety
Sackner-Bernstein, Jonathan
2017-01-01
Background: The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware. PMID:27837161
NASA Technical Reports Server (NTRS)
Zelkin, Natalie; Henriksen, Stephen
2011-01-01
This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed C-band (5091- to 5150-MHz) airport surface communication system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents an initial high-level safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the C-band communication system after the profile is finalized and system rollout timing is determined. A security risk assessment has been performed by NASA as a parallel activity. While safety analysis is concerned with a prevention of accidental errors and failures, the security threat analysis focuses on deliberate attacks. Both processes identify the events that affect operation of the system; and from a safety perspective the security threats may present safety risks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
VIGIL, FRANCINE S.; SANCHEZ, REBECCA D.; WAGNER, KATRINA
2002-09-01
Sandia National Laboratories, New Mexico (SNL/NM) is a government-owned, contractor-operated facility overseen by the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) through the Albuquerque Operations Office (AL), Office of Kirtland Site Operations (OKSO). Sandia Corporation, a wholly-owned subsidiary of Lockheed Martin Corporation, operates SNL/NM. Work performed at SNL/NM is in support of the DOE and Sandia Corporation's mission to provide weapon component technology and hardware for the needs of the nation's security. Sandia Corporation also conducts fundamental research and development (R&D) to advance technology in energy research, computer science, waste management, microelectronics, materials science, and transportation safetymore » for hazardous and nuclear components. In support of Sandia Corporation's mission, the Integrated Safety and Security (ISS) Center and the Environmental Restoration (ER) Project at SNL/NM have established extensive environmental programs to assist Sandia Corporation's line organizations in meeting all applicable local, state, and federal environmental regulations and DOE requirements. This annual report summarizes data and the compliance status of Sandia Corporation's environmental protection and monitoring programs through December 31, 2001. Major environmental programs include air quality, water quality, groundwater protection, terrestrial surveillance, waste management, pollution prevention (P2), environmental remediation, oil and chemical spill prevention, and the National Environmental Policy Act (NEPA). Environmental monitoring and surveillance programs are required by DOE Order 5400.1, General Environmental Protection Program (DOE 1990) and DOE Order 231.1, Environment, Safety, and Health Reporting (DOE 1996).« less
Hemmer, Alexander; Meier, Philipp; Reisch, Thomas
2017-01-01
The goal of the study was to compare the effectiveness of different suicide prevention measures implemented on bridges and other high structures in Switzerland. A national survey identified all jumping hotspots that have been secured in Switzerland; of the 15 that could be included in this study, 11 were secured by vertical barriers and 4 were secured by low-hanging horizontal safety nets. The study made an overall and individual pre-post analysis by using Mantel-Haenszel Tests, regression methods and calculating rate ratios. Barriers and safety nets were both effective, with mean suicide reduction of 68.7% (barriers) and 77.1% (safety nets), respectively. Measures that do not secure the whole hotspot and still allow jumps of 15 meters or more were less effective. Further, the analyses revealed that barriers of at least 2.3 m in height and safety-nets fixed significantly below pedestrian level deterred suicidal jumps. Secured bridgeheads and inbound angle barriers seemed to enhance the effectiveness of the measure. Findings can help to plan and improve the effectiveness of future suicide prevention measures on high structures. PMID:28060950
Cybersecurity: The Nation’s Greatest Threat to Critical Infrastructure
2013-03-01
protection has become a matter of national security, public safety, and economic stability . It is imperative the U.S. Government (USG) examine current...recommendations for federal responsibilities and legislation to direct nation critical infrastructure efforts to ensure national security, public safety and economic stability .
SAFETY AND SECURITY BUILDING, TRA614. ELEVATIONS. SECTIONS. TWO ROOF LEVELS. ...
SAFETY AND SECURITY BUILDING, TRA-614. ELEVATIONS. SECTIONS. TWO ROOF LEVELS. BLAW-KNOX 3150-814-2, 3/1950. INL INDEX NO. 531-0614-00-098-100703, REV. 6. - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
SAFETY AND SECURITY BUILDING, TRA614. SIMPLIFIED FLOOR LAYOUT AND WEST ...
SAFETY AND SECURITY BUILDING, TRA-614. SIMPLIFIED FLOOR LAYOUT AND WEST ELEVATION. BLAW-KNOX 3150-14-1, 1/1950. INL INDEX NO. 531-0614-00-098-100024, REV. 2. - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
8 CFR 212.1 - Documentary requirements for nonimmigrants.
Code of Federal Regulations, 2010 CFR
2010-01-01
... special humanitarian concern; and (iv) Poses no threat to the welfare, safety or security of the United States, its territories, or commonwealths. Any potential threats to the welfare, safety, or security of...) of this section: Australia, Brunei, Indonesia, Japan, Malaysia, Nauru, New Zealand, Papua New Guinea...
The Impact of Terrorism on School Safety Planning.
ERIC Educational Resources Information Center
Trump, Kenneth S.
2002-01-01
Discusses why history and "thinking outside of the box" should encourage schools to acknowledge that they are potentially vulnerable targets of terrorism. Presents new safety and security issues raised by the threat of terrorism, including anthrax scares, cell phone use, and field trips. Describes "heightened security"…
DOT National Transportation Integrated Search
1997-03-05
This statement before Congress by Gerald L. Dillingham, Associate Director, : Transportation Issues, Resources, Community, and Economic Development Division, : General Accounting Office (GAO) assesses the recommendations contained in the : recently r...
Collaboration with the Local Community.
ERIC Educational Resources Information Center
Jackson, Michael L.; Cherrey, Cynthia
2002-01-01
Colleges and universities continually search for ways to enhance the safety and security of their educational programs and physical plant. This article examines how the University of Southern California and other institutions are using collaborative efforts with the local community to enhance their mutual safety and security through dynamic…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eipeldauer, Mary D; Shelander Jr, Bruce R
2012-01-01
The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) wasmore » established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.« less
A Survey on Cyber Security awareness among college students in Tamil Nadu
NASA Astrophysics Data System (ADS)
Senthilkumar, K.; Easwaramoorthy, Sathishkumar
2017-11-01
The aim of the study is to analyse the awareness of cyber security on college students in Tamil Nadu by focusing various security threats in the internet. In recent years cybercrime is an enormous challenge in all areas including national security, public safety and personal privacy. To prevent from a victim of cybercrime everyone must know about their own security and safety measures to protect by themselves. A well-structured questionnaire survey method will be applied to analyse the college student’s awareness in the area of cyber security. This survey will be going to conducted in major cities of Tamil Nadu by focusing various security threats like email, virus, phishing, fake advertisement, popup windows and other attacks in the internet. This survey examines the college students’ awareness and the level of awareness about the security issues and some suggestions are set forth to overcome these issues.
SAFETY GUIDES FOR YOU--IN THE PRIMARY GRADES.
ERIC Educational Resources Information Center
WALKER, LUVERNE CRABTREE
THIS SAFETY INSTRUCTIONAL GUIDE FOR PRIMARY-GRADE TEACHERS PRESENTS NINE DIFFERENT SAFETY UNITS, INCLUDING TRAFFIC SAFETY, PLAYTIME SAFETY, SAFE EATING AND DRINKING HABITS, SAFE CLOTHING, HOME SAFETY, ANIMAL SAFETY, CIVIL DEFENSE SECURITY, AND TESTING SAFETY PRACTICES. EACH UNIT STRESSES THE REASONS FOR ACCENTING SAFETY, WHAT TO KNOW AND DO, AND…
Dura-Bernal, Salvador; Garreau, Guillaume; Georgiou, Julius; Andreou, Andreas G; Denham, Susan L; Wennekers, Thomas
2013-10-01
The ability to recognize the behavior of individuals is of great interest in the general field of safety (e.g. building security, crowd control, transport analysis, independent living for the elderly). Here we report a new real-time acoustic system for human action and behavior recognition that integrates passive audio and active micro-Doppler sonar signatures over multiple time scales. The system architecture is based on a six-layer convolutional neural network, trained and evaluated using a dataset of 10 subjects performing seven different behaviors. Probabilistic combination of system output through time for each modality separately yields 94% (passive audio) and 91% (micro-Doppler sonar) correct behavior classification; probabilistic multimodal integration increases classification performance to 98%. This study supports the efficacy of micro-Doppler sonar systems in characterizing human actions, which can then be efficiently classified using ConvNets. It also demonstrates that the integration of multiple sources of acoustic information can significantly improve the system's performance.
Study on development and application of platform with students' safety based on SOA
NASA Astrophysics Data System (ADS)
Jiang, Derong
2011-10-01
Students' safety management is a very important work, which is responsible for the entire school student security problems, student safety primarily prevent, only advance predict various of the imminent problems, to better protect their safety. The system mainly used on the development request the student safety management, safety evaluation, safety education, and etc, which are for daily management work completed for students in the security digital management. Development of the system can reduce the safety management for department working pressure, meanwhile, can reduce the labor force to use, accelerate query speed, strengthens the management, as well as the national various departments about the information step, making each management standardized. Therefore, developing a set of suitability and the populace, compatibly good system is very necessary.
Medical device integration using mobile telecommunications infrastructure.
Moorman, Bridget A; Cockle, Richard A
2013-01-01
Financial pressures, an aging population, and a rising number of patients with chronic diseases, have encouraged the use of remote monitoring technologies. This usually entails at least one physiological parameter measurement for a clinician. Mobile telecommunication technologies lend themselves to this functionality, and in some cases, avoid some of the issues encountered with device integration. Moreover, the inherent characteristics of the mobile telecommunications infrastructure allow a coupling of business and clinical functions that were not possible before. Table I compares and contrasts some key aspect of device integration in and out of a healthcare facility. An HTM professional may be part of the team that acquires and/or manages a system using a mobile telecommunications technology. It is important for HTM professionals to ensure the data is in a standard format so that the interfaces across this system don't become brittle and break easily if one part changes. Moreover, the security and safety considerations of the system and the data should be a primary consideration in and y purchase, with attention given to the proper environmental and encryption mechanisms. Clinical engineers and other HTM professionals are unique in that they understand the patient/clinician/device interface and the need to ensure its safety and effectiveness regardless of geographical environment.
20 CFR 410.101 - Introduction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV.... The regulations in this part 410 (Regulation No. 10 of the Social Security Administration) relate to the provisions of part B (Black Lung Benefits) of title IV of the Federal Coal Mine Health and Safety...
30 CFR 75.1506 - Refuge alternatives.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE SAFETY AND HEALTH... unit consisting of 15 psi stoppings constructed prior to an event in a secure space and an isolated.... Refuge alternatives consisting of materials pre-positioned for miners to deploy in a secure space with an...
30 CFR 75.1506 - Refuge alternatives.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE SAFETY AND HEALTH... unit consisting of 15 psi stoppings constructed prior to an event in a secure space and an isolated.... Refuge alternatives consisting of materials pre-positioned for miners to deploy in a secure space with an...
30 CFR 75.1506 - Refuge alternatives.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE SAFETY AND HEALTH... unit consisting of 15 psi stoppings constructed prior to an event in a secure space and an isolated.... Refuge alternatives consisting of materials pre-positioned for miners to deploy in a secure space with an...
78 FR 69745 - Safety and Security Plans for Class 3 Hazardous Materials Transported by Rail
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... Security Plans for Class 3 Hazardous Materials Transported by Rail AGENCY: Pipeline and Hazardous Materials... characterization, classification, and selection of a packing group for Class 3 materials, and the corresponding...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-19
... award recipients under the Capital Fund Safety and Security grant program. FOR FURTHER INFORMATION... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. 5636-FA-01] Announcement of Funding Awards... Public and Indian Housing, HUD. ACTION: Announcement of funding awards. SUMMARY: In accordance with...
Checklist for the Safety and Security of Buildings and Grounds.
ERIC Educational Resources Information Center
Virginia State Dept. of Education, Richmond.
An evaluation checklist is provided for assessing a school's strengths and weaknesses relative to the safety and security of buildings and grounds, as well as assessing development and enforcement of policies, the presence of intervention and prevention plans, staff development, parent and community involvement, opportunities for student…
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
75 FR 57465 - Sunshine Act Meeting; Open Commission Meeting; Thursday, September 23, 2010
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-21
... WIRELINE TITLE: Schools and COMPETITION. Libraries Universal Service Support Mechanism (CC Docket No. 02- 6... PUBLIC SAFETY & TITLE: Wireless HOMELAND SECURITY. E911 Location Accuracy Requirements (PS Docket No. 07... SAFETY & TITLE: Wireless HOMELAND SECURITY. E911 Location Accuracy Requirements (PS Docket No. 07- 114...
Ready to Respond: Case Studies in Campus Safety and Security
ERIC Educational Resources Information Center
Hyatt, James A.
2010-01-01
Is your campus primed for the next big emergency? The National Campus Safety and Security Project (NCSSP), led by NACUBO, sought to help colleges and universities develop comprehensive emergency management plans that address the four phases of emergency management: prevention/mitigation, preparedness, response, and recovery. A major component of…
A terrorism response plan for hospital security and safety officers.
White, Donald E
2002-01-01
Security and Safety managers in today's healthcare facilities need to factor terrorism response into their emergency management plans, separate from the customary disaster plans and the comparatively recent security plans. Terrorism incidents will likely be security occurrences that use a weapon of mass destruction to magnify the incidents into disasters. Facility Y2K Plans can provide an excellent framework for the detailed contingency planning needed for terrorism response by healthcare facilities. Tabbed binder notebooks, with bulleted procedures and contact points for each functional section, can provide security and safety officers with at-a-glance instructions for quick 24/7 implementation. Each functional section should focus upon what activities or severity levels trigger activation of the backup processes. Network with your countywide, regional, and/or state organizations to learn what your peers are doing. Comprehensively inventory your state, local, and commercial resources so that you have alternate providers readily available 24/7 to assist your facility upon disasters.
Older adult bathroom safety; Falls - bathroom safety ... You may need to have safety bars in your bathroom. These grab bars should be secured vertically or horizontally to the wall, not diagonally. DO NOT use ...
The new risk paradigm for chemical process security and safety.
Moore, David A
2004-11-11
The world of safety and security in the chemical process industries has certainly changed since 11 September, but the biggest challenges may be yet to come. This paper will explain that there is a new risk management paradigm for chemical security, discuss the differences in interpreting this risk versus accidental risk, and identify the challenges we can anticipate will occur in the future on this issue. Companies need to be ready to manage the new chemical security responsibilities and to exceed the expectations of the public and regulators. This paper will outline the challenge and a suggested course of action.
Radar Spectrum Engineering and Management (Ingenierie et gestion du spectre radar)
2017-04-01
geophysical monitoring of Earth resources from space, automotive safety , severe weather tracking, and surveillance for defence and security. Nearly...With regard to curtailing adjacent-band spectral regrowth of radar emissions, for obvious reasons of national security and public safety , the precise...generated in adjacent bands. It is important, in the interests of safety as well as those of prospective users of the frequency bands 2,500 – 2,690
49 CFR 193.2913 - Security monitoring.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 3 2012-10-01 2012-10-01 false Security monitoring. 193.2913 Section 193.2913...: FEDERAL SAFETY STANDARDS Security § 193.2913 Security monitoring. Each protective enclosure and the area.... Monitoring must be by visual observation in accordance with the schedule in the security procedures under...
49 CFR 193.2903 - Security procedures.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 3 2011-10-01 2011-10-01 false Security procedures. 193.2903 Section 193.2903...: FEDERAL SAFETY STANDARDS Security § 193.2903 Security procedures. Each operator shall prepare and follow one or more manuals of written procedures to provide security for each LNG plant. The procedures must...
49 CFR 193.2903 - Security procedures.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 3 2010-10-01 2010-10-01 false Security procedures. 193.2903 Section 193.2903...: FEDERAL SAFETY STANDARDS Security § 193.2903 Security procedures. Each operator shall prepare and follow one or more manuals of written procedures to provide security for each LNG plant. The procedures must...
49 CFR 193.2913 - Security monitoring.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 3 2010-10-01 2010-10-01 false Security monitoring. 193.2913 Section 193.2913...: FEDERAL SAFETY STANDARDS Security § 193.2913 Security monitoring. Each protective enclosure and the area.... Monitoring must be by visual observation in accordance with the schedule in the security procedures under...
49 CFR 193.2903 - Security procedures.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 3 2012-10-01 2012-10-01 false Security procedures. 193.2903 Section 193.2903...: FEDERAL SAFETY STANDARDS Security § 193.2903 Security procedures. Each operator shall prepare and follow one or more manuals of written procedures to provide security for each LNG plant. The procedures must...
49 CFR 193.2913 - Security monitoring.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 3 2011-10-01 2011-10-01 false Security monitoring. 193.2913 Section 193.2913...: FEDERAL SAFETY STANDARDS Security § 193.2913 Security monitoring. Each protective enclosure and the area.... Monitoring must be by visual observation in accordance with the schedule in the security procedures under...
Zhuravlev, P V; Aleshnia, V V; Panasovets, O P; Morozova, A A; Artemova, T Z; Talaeva, Iu G; Zagaĭnova, A V; Gipp, E K
2012-01-01
Due to intensive anthropogenic pollution of water environment generally accepted indicators of epidemic security of water bodies - common bacteria and thermotolerant coliform bacteria do not always permit to obtain an objective characterization of bacterial contamination of tap water. From the point of view of authors the integral index - glucose positive coliform bacteria most adequately reflect the sanitary-hygienic and epidemiological situation of water bodies. In monitoring for bacterial quality of tap water it is advisable to determine glucose positive coliform bacteria, that will provide the relevance of estimation of the epidemiological safety of water use. According to the method developed by the authors the calculation of the index of population risk of acute intestinal infections occurrence in dependence on the quality of tap water in Azov and Tsimlyansk towns.
Safety Psychology Applicating on Coal Mine Safety Management Based on Information System
NASA Astrophysics Data System (ADS)
Hou, Baoyue; Chen, Fei
In recent years, with the increase of intensity of coal mining, a great number of major accidents happen frequently, the reason mostly due to human factors, but human's unsafely behavior are affected by insecurity mental control. In order to reduce accidents, and to improve safety management, with the help of application security psychology, we analyse the cause of insecurity psychological factors from human perception, from personality development, from motivation incentive, from reward and punishment mechanism, and from security aspects of mental training , and put forward countermeasures to promote coal mine safety production,and to provide information for coal mining to improve the level of safety management.
Wang, Yuanyuan; Liu, Weiwei; Shi, Huifeng; Liu, Chaojie; Wang, Yan
2017-07-12
Patient safety culture (PSC) plays a critical role in ensuring safe and quality care. Extensive PSC studies have been undertaken in hospitals. However, little is known about PSC in maternal and child health (MCH) institutions in China, which provide both population-based preventive services as well as individual care for patients. This study aimed to develop a theoretical framework for conceptualising PSC in MCH institutions in China. The study was undertaken in six MCH institutions (three in Hebei and three in Beijing). Participants (n=118) were recruited through stratified purposive sampling: 20 managers/administrators, 59 care providers and 39 patients. In-depth interviews were conducted with the participants. The interview data were coded using both inductive (based on the existing PSC theory developed by the Agency for Healthcare Research and Quality) and deductive (open coding arising from data) approaches. A PSC framework was formulated through axial coding that connected initial codes and selective coding that extracted a small number of themes. The interviewees considered patient safety in relation to six aspects: safety and security in public spaces, safety of medical services, privacy and information security, financial security, psychological safety and gap in services. A 12-dimensional PSC framework was developed, containing 69 items. While the existing PSC theory was confirmed by this study, some new themes emerged from the data. Patients expressed particular concerns about psychological safety and financial security. Defensive medical practices emerged as a PSC dimension that is associated with not only medical safety but also financial security and psychological safety. Patient engagement was also valued by the interviewees, especially the patients, as part of PSC. Although there are some common features in PSC across different healthcare delivery systems, PSC can also be context specific. In MCH settings in China, the meaning of 'patient safety' goes beyond the traditional definition of patients. General well-being, health and disease prevention are important anchor points for defining PSC in such settings. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
49 CFR 172.802 - Components of a security plan.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 2 2013-10-01 2013-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...
49 CFR 172.802 - Components of a security plan.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 2 2014-10-01 2014-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...
49 CFR 172.802 - Components of a security plan.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 2 2011-10-01 2011-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...
49 CFR 172.802 - Components of a security plan.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 2 2012-10-01 2012-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...
Moving forward with safety culture.
Weber, Michael
2012-04-01
Radiation safety and protection of people are shared goals of the Health Physics Society (HPS) and the U.S. Nuclear Regulatory Commission (NRC). A positive safety culture contributes to achieving radiation safety and protection of people, which are important to both the HPS and the NRC. Through unprecedented collaboration and engagement with diverse stakeholders, the NRC and the stakeholders developed a Safety Culture Policy Statement. The policy statement defines safety culture and describes the traits of a positive safety culture. Consideration of both safety and security issues and the interface of safety and security are underlying principles that support the policy. Examination of significant events, both within the nuclear industry and in society at large, illustrates how weaknesses in these traits can contribute to the occurrence and consequences of safety incidents, including serious injury and loss of life. With the policy statement in place, the NRC is moving forward with outreach and education about safety culture. Health physicists and other radiation safety specialists play an essential role in enhancing safety culture.
Personal control of privacy and data: Estonian experience.
Priisalu, Jaan; Ottis, Rain
2017-01-01
The Republic of Estonia leads Europe in the provision of public digital services. The national communications and transactions platform allows for twenty-first century governance by allowing for transparency, e-safety (inter alia privacy), e-security, entrepreneurship and, among other things, rising levels of prosperity, and well-being for all its Citizens. However, a series of Information Infrastructure attacks against the Estonian e-society infrastructure in 2007 became one of best known incidents and experiences that fundamentally changed both Estonian and international discussions about Cyber Security and Privacy. Estonian experience shows that an open and transparent attitude provides a good foundation for trust between the Citizen and the State, and gives more control to the real owner of the data - the Citizen. Another important lesson is that the Citizen needs to be confident in the government's ability to keep their data safe -- in terms of confidentiality, integrity and availability - establishing a strong link between privacy and information security. This paper discusses certain critical choices, context, and events connected to the birth and growth of the Estonian e-society in terms of Privacy.
Remote video assessment for missile launch facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, G.G.; Stewart, W.A.
1995-07-01
The widely dispersed, unmanned launch facilities (LFs) for land-based ICBMs (intercontinental ballistic missiles) currently do not have visual assessment capability for existing intrusion alarms. The security response force currently must assess each alarm on-site. Remote assessment will enhance manpower, safety, and security efforts. Sandia National Laboratories was tasked by the USAF Electronic Systems Center to research, recommend, and demonstrate a cost-effective remote video assessment capability at missile LFs. The project`s charter was to provide: system concepts; market survey analysis; technology search recommendations; and operational hardware demonstrations for remote video assessment from a missile LF to a remote security center viamore » a cost-effective transmission medium and without using visible, on-site lighting. The technical challenges of this project were to: analyze various video transmission media and emphasize using the existing missile system copper line which can be as long as 30 miles; accentuate and extremely low-cost system because of the many sites requiring system installation; integrate the video assessment system with the current LF alarm system; and provide video assessment at the remote sites with non-visible lighting.« less
24 CFR 232.555 - Security instrument and lien.
Code of Federal Regulations, 2011 CFR
2011-04-01
... AUTHORITIES MORTGAGE INSURANCE FOR NURSING HOMES, INTERMEDIATE CARE FACILITIES, BOARD AND CARE HOMES, AND... of Fire Safety Equipment Eligible Security Instruments § 232.555 Security instrument and lien. The...
Medical cyber-physical systems: A survey.
Dey, Nilanjan; Ashour, Amira S; Shi, Fuqian; Fong, Simon James; Tavares, João Manuel R S
2018-03-10
Medical cyber-physical systems (MCPS) are healthcare critical integration of a network of medical devices. These systems are progressively used in hospitals to achieve a continuous high-quality healthcare. The MCPS design faces numerous challenges, including inoperability, security/privacy, and high assurance in the system software. In the current work, the infrastructure of the cyber-physical systems (CPS) are reviewed and discussed. This article enriched the researches of the networked Medical Device (MD) systems to increase the efficiency and safety of the healthcare. It also can assist the specialists of medical device to overcome crucial issues related to medical devices, and the challenges facing the design of the medical device's network. The concept of the social networking and its security along with the concept of the wireless sensor networks (WSNs) are addressed. Afterward, the CPS systems and platforms have been established, where more focus was directed toward CPS-based healthcare. The big data framework of CPSs is also included.
Mishra, Dheerendra; Mukhopadhyay, Sourav; Chaturvedi, Ankita; Kumari, Saru; Khan, Muhammad Khurram
2014-06-01
Remote user authentication is desirable for a Telecare Medicine Information System (TMIS) for the safety, security and integrity of transmitted data over the public channel. In 2013, Tan presented a biometric based remote user authentication scheme and claimed that his scheme is secure. Recently, Yan et al. demonstrated some drawbacks in Tan's scheme and proposed an improved scheme to erase the drawbacks of Tan's scheme. We analyze Yan et al.'s scheme and identify that their scheme is vulnerable to off-line password guessing attack, and does not protect anonymity. Moreover, in their scheme, login and password change phases are inefficient to identify the correctness of input where inefficiency in password change phase can cause denial of service attack. Further, we design an improved scheme for TMIS with the aim to eliminate the drawbacks of Yan et al.'s scheme.
NASA Astrophysics Data System (ADS)
Blount, P. J.
2017-06-01
Since the very beginning of the space age, security has been the critical, overriding concern at the heart of both international and domestic space law regimes. While these regimes certainly encompass broader interests, such as commercial uses of outer space, they are built on a legal foundation that is largely intended to regularize interactions among space actors to ensure security, safety, and sustainability in the space environment. Space security law, as a result, has central goals of both maintaining peace and providing security as a public good for the benefit of humankind. The idea of security is a technical and political construct. The law is a tool that is used to articulate that construct as concept and operationalize it as a value. As such, space security law is a network of law and regulation that governs a wide variety of space activities. There are four broad categories that typify the various manifestations of space security law: international peace and security; national security; human security; and space safety and sustainability. International peace and security, the first category, is directly concerned with the international law and norms that have been adopted to decrease the risk of conflict between states. National security, category two, consists of domestic law that implements, at the national level, the obligations found in the first category as well as law that promotes other national security goals. Human security, the third category, is the loose set of law and policy directed at the use of space for the protection of human populations, such as disaster response and planetary protection. Finally, the fourth category, space safety and security, represents the emerging body of law and policy that seeks to protect the space environment through measures that address space debris and harmful contamination. Obviously, these categories overlap and laws can serve duplicative purposes, but this compartmentalization reveals much about the legal structures that surround core security projects being pursued in and through space.
A baseline assessment of emergency planning and preparedness in Italian universities.
Marincioni, Fausto; Fraboni, Rita
2012-04-01
Besides offering teaching and research services, schools and universities also must provide for the safety and security of their employees, students, and visitors. This paper describes emergency preparedness in a sample of Italian universities. In particular it examines risk perception within a specific professional category (university safety and security officers) in a specific cultural context (Italy). In addition, it discusses the transposition and implementation in a European Union (EU) member state of EU Council Directive 89/391/EEC of 12 June 1989, on the introduction of measures to encourage improvements in the safety and health of workers. The findings highlight heterogeneous and fragmented emergency management models within the Italian university system, underlining the need for a stricter framework of standardised safety protocols and emergency management guidelines. The study also points out that enhancing emergency planning and preparedness in Italian universities entails increasing safety leadership, employee engagement and individual responsibility for safety and security; essentially, it necessitates improving the culture of risk prevention. © 2012 The Author(s). Disasters © Overseas Development Institute, 2012.
Cryptographically supported NFC tags in medication for better inpatient safety.
Özcanhan, Mehmet Hilal; Dalkılıç, Gökhan; Utku, Semih
2014-08-01
Reliable sources report that errors in drug administration are increasing the number of harmed or killed inpatients, during healthcare. This development is in contradiction to patient safety norms. A correctly designed hospital-wide ubiquitous system, using advanced inpatient identification and matching techniques, should provide correct medicine and dosage at the right time. Researchers are still making grouping proof protocol proposals based on the EPC Global Class 1 Generation 2 ver. 1.2 standard tags, for drug administration. Analyses show that such protocols make medication unsecure and hence fail to guarantee inpatient safety. Thus, the original goal of patient safety still remains. In this paper, a very recent proposal (EKATE) upgraded by a cryptographic function is shown to fall short of expectations. Then, an alternative proposal IMS-NFC which uses a more suitable and newer technology; namely Near Field Communication (NFC), is described. The proposed protocol has the additional support of stronger security primitives and it is compliant to ISO communication and security standards. Unlike previous works, the proposal is a complete ubiquitous system that guarantees full patient safety; and it is based on off-the-shelf, new technology products available in every corner of the world. To prove the claims the performance, cost, security and scope of IMS-NFC are compared with previous proposals. Evaluation shows that the proposed system has stronger security, increased patient safety and equal efficiency, at little extra cost.
24 CFR 232.525 - Note and security form.
Code of Federal Regulations, 2011 CFR
2011-04-01
... MORTGAGE INSURANCE FOR NURSING HOMES, INTERMEDIATE CARE FACILITIES, BOARD AND CARE HOMES, AND ASSISTED... Fire Safety Equipment Eligible Security Instruments § 232.525 Note and security form. The lender shall...
SAFETY AND SECURITY BUILDING, TRA614. FLOOR, ROOF, AND FOUNDATION PLANS. ...
SAFETY AND SECURITY BUILDING, TRA-614. FLOOR, ROOF, AND FOUNDATION PLANS. ROOM FUNCTIONS. DOOR AND ROOM FINISH SCHEDULE. BLAW-KNOX 3150-814-1, 3/1950. INL INDEX NO. 531-0614-00-098-100702, REV. 6. - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Safety and Security Zone; Liquefied Natural Gas Carrier Transits and Anchorage Operations, Boston, Massachusetts. 165.110 Section 165... Carrier Transits and Anchorage Operations, Boston, Massachusetts. (a) Definitions. As used in this section...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Safety and Security Zone; Liquefied Natural Gas Carrier Transits and Anchorage Operations, Boston, Massachusetts. 165.110 Section 165... Carrier Transits and Anchorage Operations, Boston, Massachusetts. (a) Definitions. As used in this section...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Safety and Security Zone; Liquefied Natural Gas Carrier Transits and Anchorage Operations, Boston, Massachusetts. 165.110 Section 165... Carrier Transits and Anchorage Operations, Boston, Massachusetts. (a) Definitions. As used in this section...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Safety and Security Zone; Liquefied Natural Gas Carrier Transits and Anchorage Operations, Boston, Massachusetts. 165.110 Section 165... Carrier Transits and Anchorage Operations, Boston, Massachusetts. (a) Definitions. As used in this section...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Harbor, Portsmouth, New Hampshire. (a) Location. The following areas are safety and security zones: (1... receiving facility on the Piscataqua River, Newington, New Hampshire. (b) Definitions. For purposes of this... Vessel Transits in Portland, Maine, Captain of the Port Zone, Portsmouth Harbor, Portsmouth, New...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Harbor, Portsmouth, New Hampshire. (a) Location. The following areas are safety and security zones: (1... receiving facility on the Piscataqua River, Newington, New Hampshire. (b) Definitions. For purposes of this... Vessel Transits in Portland, Maine, Captain of the Port Zone, Portsmouth Harbor, Portsmouth, New...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Harbor, Portsmouth, New Hampshire. (a) Location. The following areas are safety and security zones: (1... receiving facility on the Piscataqua River, Newington, New Hampshire. (b) Definitions. For purposes of this... Vessel Transits in Portland, Maine, Captain of the Port Zone, Portsmouth Harbor, Portsmouth, New...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Harbor, Portsmouth, New Hampshire. (a) Location. The following areas are safety and security zones: (1... receiving facility on the Piscataqua River, Newington, New Hampshire. (b) Definitions. For purposes of this... Vessel Transits in Portland, Maine, Captain of the Port Zone, Portsmouth Harbor, Portsmouth, New...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Harbor, Portsmouth, New Hampshire. (a) Location. The following areas are safety and security zones: (1... receiving facility on the Piscataqua River, Newington, New Hampshire. (b) Definitions. For purposes of this... Vessel Transits in Portland, Maine, Captain of the Port Zone, Portsmouth Harbor, Portsmouth, New...
The safety and security of water supplies has come under reassessment in the past year. Issues ranging from public safety and health, ecological, and national security are under consideration. The terrorist attacks on the United States on September 11, 2001 and the subsequent del...
78 FR 5178 - Emergency Access Advisory Committee; Announcement of Charter Extension
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-24
... extension of the charter will enable the EAAC to complete the important work it began in early 2011 pursuant...); and/or Zenji Nakazawa, Public Safety and Homeland Security Bureau, (202) 418-7949, [email protected] Governmental Affairs Bureau and the Public Safety and Homeland Security Bureau of the Federal Communications...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-03
... holders, and other stakeholders on a draft guidance document entitled ``Weapons Safety Assessment'' (WSA... weapons under the NRC's proposed rule titled ``Enhanced Weapons, Firearms Background Checks, and Security.... You should not include any site-specific security information in your comments. Federal rulemaking Web...
Maui Community College Campus Safety and Security.
ERIC Educational Resources Information Center
Hawaii Univ., Kahului. Maui Community Coll.
This document discusses campus safety at Maui Community College (MCC) (Hawaii). MCC is situated on 75 acres of land; the campus population is approximately 2,700 day and night students, with a faculty and staff of approximately 175. The report presents information on campus security services, procedures for reporting crimes and emergencies,…
ERIC Educational Resources Information Center
Cavanagh, Sean
2004-01-01
Since the Sept. 11, 2001, terrorist attacks, student interest in school programs dealing with careers in law, public safety, and national security is on the rise. This article describes students' experiences at the Academy for Law and Public Safety at Butler High School in Butler, New Jersey. This vocational academy is one of a number of career…
33 CFR 165.708 - Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Harbor and Cooper River, Charleston, SC. 165.708 Section 165.708 Navigation and Navigable Waters COAST... Guard District § 165.708 Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC. (a... Cooper River. All coordinates referenced use datum: NAD 1983. (2) All waters within 100 yards of the...
49 CFR 393.130 - What are the rules for securing heavy vehicles, equipment and machinery?
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 5 2014-10-01 2014-10-01 false What are the rules for securing heavy vehicles, equipment and machinery? 393.130 Section 393.130 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL MOTOR CARRIER SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR CARRIER SAFETY REGULATIONS PARTS AND...
Safety and Security in Schools in KwaZulu-Natal
ERIC Educational Resources Information Center
White, C. J.; Gina, J. M.; Coetzee, I. E. M.
2015-01-01
This article is based on research conducted on the topic: "Safety and security in schools: The case of KwaZulu-Natal." For the research project a purposive sample consisting of secondary school learners, teachers, school governing body chairpersons and principals were selected from the rural and township schools used in this study to…
3D Face Generation Tool Candide for Better Face Matching in Surveillance Video
2014-07-01
Safety and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public ...by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale... public safety and security practitioners to achieve specific objectives; 4. Threats/Hazards F – Major trans-border criminal activity – e.g. smuggling
2013-06-14
ever-evolving contemporary nature of external and internal threats to the safety and security of the American homeland, it becomes increasingly...Major Justin P. Hurt, 146 pages. With the ever-evolving contemporary nature of external and internal threats to the safety and security of the American...HAZMAT Hazardous Materials HRF Homeland Response Force HSPD Homeland Security Presidential Directive JFHQ Joint Force
Cyber Safety and Security for Reduced Crew Operations (RCO)
NASA Technical Reports Server (NTRS)
Driscoll, Kevin R.; Roy, Aloke; Ponchak, Denise S.; Downey, Alan N.
2017-01-01
NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified.
Risk assessment and management of radiofrequency radiation exposure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dabala, Dana; Surducan, Emanoil; Surducan, Vasile
2013-11-13
Radiofrequency radiation (RFR) industry managers, occupational physicians, security department, and other practitioners must be advised on the basic of biophysics and the health effects of RF electromagnetic fields so as to guide the management of exposure. Information on biophysics of RFR and biological/heath effects is derived from standard texts, literature and clinical experiences. Emergency treatment and ongoing care is outlined, with clinical approach integrating the circumstances of exposure and the patient's symptoms. Experimental risk assessment model in RFR chronic exposure is proposed. Planning for assessment and monitoring exposure, ongoing care, safety measures and work protection are outlining the proper management.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pratt, Richard J.
2013-11-01
From 17-21 June 2013, Sandia National Laboratories, Technical Area-V (SNL TA-V) represented the United States Department of Energy/National Nuclear Security Administration (DOE/NNSA) at the International Atomic Energy Agency (IAEA) Training Workshop (T3-TR-45486). This report gives a breakdown of the IAEA regulatory structure for those unfamiliar, and the lessons learned and observations that apply to SNL TA-V that were obtained from the workshop. The Safety Report Series, IAEA workshop final report, and SNL TA-V presentation are included as attachments.
Review of Estelle and LOTOS with respect to critical computer applications
NASA Technical Reports Server (NTRS)
Bown, Rodney L.
1991-01-01
Man rated NASA space vehicles seem to represent a set of ultimate critical computer applications. These applications require a high degree of security, integrity, and safety. A variety of formal and/or precise modeling techniques are becoming available for the designer of critical systems. The design phase of the software engineering life cycle includes the modification of non-development components. A review of the Estelle and LOTOS formal description languages is presented. Details of the languages and a set of references are provided. The languages were used to formally describe some of the Open System Interconnect (OSI) protocols.
Optical fiber sensors: Systems and applications. Volume 2
NASA Astrophysics Data System (ADS)
Culshaw, Brian; Dakin, John
State-of-the-art fiber-optic (FO) sensors and their applications are described in chapters contributed by leading experts. Consideration is given to interferometers, FO gyros, intensity- and wavelength-based sensors and optical actuators, Si in FO sensors, point-sensor multiplexing principles, and distributed FO sensor systems. Also examined are chemical, biochemical, and medical sensors; physical and chemical sensors for process control; FO-sensor applications in the marine and aerospace industries; FO-sensor monitoring systems for security and safety, structural integrity, NDE, and the electric-power industry; and the market situation for FO-sensor technology. Diagrams, drawings, graphs, and photographs are provided.
Risk assessment and management of radiofrequency radiation exposure
NASA Astrophysics Data System (ADS)
Dabala, Dana; Surducan, Emanoil; Surducan, Vasile; Neamtu, Camelia
2013-11-01
Radiofrequency radiation (RFR) industry managers, occupational physicians, security department, and other practitioners must be advised on the basic of biophysics and the health effects of RF electromagnetic fields so as to guide the management of exposure. Information on biophysics of RFR and biological/heath effects is derived from standard texts, literature and clinical experiences. Emergency treatment and ongoing care is outlined, with clinical approach integrating the circumstances of exposure and the patient's symptoms. Experimental risk assessment model in RFR chronic exposure is proposed. Planning for assessment and monitoring exposure, ongoing care, safety measures and work protection are outlining the proper management.
[Operating Room Nurses' Experiences of Securing for Patient Safety].
Park, Kwang Ok; Kim, Jong Kyung; Kim, Myoung Sook
2015-10-01
This study was done to evaluate the experience of securing patient safety in hospital operating rooms. Experiential data were collected from 15 operating room nurses through in-depth interviews. The main question was "Could you describe your experience with patient safety in the operating room?". Qualitative data from the field and transcribed notes were analyzed using Strauss and Corbin's grounded theory methodology. The core category of experience with patient safety in the operating room was 'trying to maintain principles of patient safety during high-risk surgical procedures'. The participants used two interactional strategies: 'attempt continuous improvement', 'immersion in operation with sharing issues of patient safety'. The results indicate that the important factors for ensuring the safety of patients in the operating room are manpower, education, and a system for patient safety. Successful and safe surgery requires communication, teamwork and recognition of the importance of patient safety by the surgical team.
47 CFR 0.181 - The Defense Commissioner.
Code of Federal Regulations, 2010 CFR
2010-10-01
... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...
47 CFR 0.181 - The Defense Commissioner.
Code of Federal Regulations, 2011 CFR
2011-10-01
... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...
47 CFR 0.185 - Responsibilities of the bureaus and staff offices.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ORGANIZATION Organization Homeland Security, Defense and Emergency Preparedness Functions § 0.185... assistance to the Chief, Public Safety and Homeland Security Bureau in the performance of that person's duties with respect to homeland security, national security, emergency management and preparedness...
47 CFR 0.181 - The Defense Commissioner.
Code of Federal Regulations, 2014 CFR
2014-10-01
... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...
47 CFR 0.181 - The Defense Commissioner.
Code of Federal Regulations, 2013 CFR
2013-10-01
... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...
47 CFR 0.185 - Responsibilities of the bureaus and staff offices.
Code of Federal Regulations, 2013 CFR
2013-10-01
... ORGANIZATION Organization Homeland Security, Defense and Emergency Preparedness Functions § 0.185... assistance to the Chief, Public Safety and Homeland Security Bureau in the performance of that person's duties with respect to homeland security, national security, emergency management and preparedness...
47 CFR 0.181 - The Defense Commissioner.
Code of Federal Regulations, 2012 CFR
2012-10-01
... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...
47 CFR 0.185 - Responsibilities of the bureaus and staff offices.
Code of Federal Regulations, 2012 CFR
2012-10-01
... ORGANIZATION Organization Homeland Security, Defense and Emergency Preparedness Functions § 0.185... assistance to the Chief, Public Safety and Homeland Security Bureau in the performance of that person's duties with respect to homeland security, national security, emergency management and preparedness...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 3 2011-10-01 2011-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 3 2014-10-01 2014-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 3 2012-10-01 2012-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 3 2013-10-01 2013-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...
Yang, Qing; Lu, Cheng Peng; Zhou, Feng; Geng, Yong; Jing, Hong Shuang; Ren, Wan Xia; Xue, Bing
2016-05-01
Based on the integrated model of emergy-ecological footprint approaches, the ecological security of Liaoning Province, a typical case for the old industrial area, was quantitatively evaluated from 2003 to 2012, followed by a scenario analysis on the development trend of the ecological secu-rity by employing the gray kinetic model. The results showed that, from 2003 to 2012, the value of emergy ecological-capacity per capita in Liaoning Province decreased from 3.13 hm 2 to 3.07 hm 2 , while the emergy-ecological footprint increased from 13.88 hm 2 to 21.96 hm 2 , which indicated that the ecological deficit existed in Liaoning Province and the situation was getting worse. The ecological pressure index increased from 4.43 to 7.16 during the studied period, and the alert level of ecological security changed from light to middle level. According to the development trend, the emergy ecological capacity per capita during 2013-2022 would correspondingly decrease from 3.04 hm 2 to 2.98 hm 2 , while the emergy ecological footprint would increase from 22.72 hm 2 to 35.87 hm 2 , the ecological pressure index would increase from 7.46 to 12.04, and the ecological deficit would keep increasing and the ecological security level would slide into slightly unsafe condition. The alert level of ecological security would turn to be middle or serious, suggesting the problems in ecological safety needed to be solved urgently.
77 FR 32655 - DHS Data Privacy and Integrity Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-01
... Officer, Data Privacy and Integrity Advisory Committee, Department of Homeland Security, 245 Murray Lane..., DHS Data Privacy and Integrity Advisory Committee, Department of Homeland Security, 245 Murray Lane SW... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2012-0029] DHS Data...
Security Systems Consideration: A Total Security Approach
NASA Astrophysics Data System (ADS)
Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.
2007-12-01
The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.
33 CFR 165.30 - Security zones.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zones. 165.30 Section... AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Security Zones § 165.30 Security zones. (a) A security zone is an area of land, water, or land and water which is so designated by...
47 CFR 80.277 - Ship Security Alert System (SSAS).
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 5 2010-10-01 2010-10-01 false Ship Security Alert System (SSAS). 80.277... Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety..., “RTCM Standard 11020.0—Ship Security Alert Systems (SSAS) using the Cospas-Sarsat System,” Version 1.0...
Digital Signal Processing Methods for Safety Systems Employed in Nuclear Power Industry
NASA Astrophysics Data System (ADS)
Popescu, George
Some of the major safety concerns in the nuclear power industry focus on the readiness of nuclear power plant safety systems to respond to an abnormal event, the security of special nuclear materials in used nuclear fuels, and the need for physical security to protect personnel and reactor safety systems from an act of terror. Routine maintenance and tests of all nuclear reactor safety systems are performed on a regular basis to confirm the ability of these systems to operate as expected. However, these tests do not determine the reliability of these safety systems and whether the systems will perform for the duration of an accident and whether they will perform their tasks without failure after being engaged. This research has investigated the progression of spindle asynchronous error motion determined from spindle accelerations to predict bearings failure onset. This method could be applied to coolant pumps that are essential components of emergency core cooling systems at all nuclear power plants. Recent security upgrades mandated by the Nuclear Regulatory Commission and the Department of Homeland Security have resulted in implementation of multiple physical security barriers around all of the commercial and research nuclear reactors in the United States. A second part of this research attempts to address an increased concern about illegal trafficking of Special Nuclear Materials (SNM). This research describes a multi element scintillation detector system designed for non - invasive (passive) gamma ray surveillance for concealed SNM that may be within an area or sealed in a package, vehicle or shipping container. Detection capabilities of the system were greatly enhanced through digital signal processing, which allows the combination of two very powerful techniques: 1) Compton Suppression (CS) and 2) Pulse Shape Discrimination (PSD) with less reliance on complicated analog instrumentation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
33 CFR 165.30 - Security zones.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security zones. 165.30 Section 165.30 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Security Zones § 165.30...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
33 CFR 165.30 - Security zones.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security zones. 165.30 Section 165.30 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Security Zones § 165.30...
33 CFR 165.30 - Security zones.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security zones. 165.30 Section 165.30 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Security Zones § 165.30...
33 CFR 165.30 - Security zones.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security zones. 165.30 Section 165.30 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Security Zones § 165.30...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
Security Risks: Management and Mitigation in the Software Life Cycle
NASA Technical Reports Server (NTRS)
Gilliam, David P.
2004-01-01
A formal approach to managing and mitigating security risks in the software life cycle is requisite to developing software that has a higher degree of assurance that it is free of security defects which pose risk to the computing environment and the organization. Due to its criticality, security should be integrated as a formal approach in the software life cycle. Both a software security checklist and assessment tools should be incorporated into this life cycle process and integrated with a security risk assessment and mitigation tool. The current research at JPL addresses these areas through the development of a Sotfware Security Assessment Instrument (SSAI) and integrating it with a Defect Detection and Prevention (DDP) risk management tool.
1978-05-01
1 . REPORT NUMB» NJ00015 2. GOVT ACCESSION NO ’base I Inspection Report* lational Dam Safety Program* found Valley South Dam> ’Hunterdon...Springfield, Virginia, 22151. 1 «. KEY WOROS (Continue on rereree elde II neeeeeery end Identity by block number) National Dam Safety Program Dam...IW,. 1 ,W,,.^U„UI,H..l,. 1 ,«.M,.„—II SECURITY CLASSIFICATION OP THIS PAOEfWhan Dmtm gnlafQ SECURITY CLASSIFICATION OF THIS PAGEfWhan Data Fnr.r.di
2010-12-01
people, and governance; that no one nation has the resources required to provide safety and security throughout the entire maritime domain, for...enhancing the safety of navigation); military activities, including military marine data collection; environmental monitoring and assessment of marine...hydrographic survey is generally defined as the “obtaining of information for the making of navigational charts and safety of navigation.”22 It has
NASA Astrophysics Data System (ADS)
Xian, W.; Chen, Y.; Chen, J.; Luo, X.; Shao, H.
2018-04-01
According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.
Information Security Management - Part Of The Integrated Management System
NASA Astrophysics Data System (ADS)
Manea, Constantin Adrian
2015-07-01
The international management standards allow their integrated approach, thereby combining aspects of particular importance to the activity of any organization, from the quality management systems or the environmental management of the information security systems or the business continuity management systems. Although there is no national or international regulation, nor a defined standard for the Integrated Management System, the need to implement an integrated system occurs within the organization, which feels the opportunity to integrate the management components into a cohesive system, in agreement with the purpose and mission publicly stated. The issues relating to information security in the organization, from the perspective of the management system, raise serious questions to any organization in the current context of electronic information, reason for which we consider not only appropriate but necessary to promote and implement an Integrated Management System Quality - Environment - Health and Operational Security - Information Security
A Career Cluster in Law, Public Safety, Corrections and Security
ERIC Educational Resources Information Center
Reese, Susan
2007-01-01
This article describes a program at Great Plains Technology Center that is not only serving its community's needs but it is also serving as a national pilot site. When Oklahoma's Great Plains Technology Center began developing its Law, Public Safety, Corrections and Security Cluster in 2003, the National Partnership for Careers in Law, Public…
76 FR 802 - Florida Power and Light Company, Turkey Point, Units 3 and 4; Exemption
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-06
..., health physics, chemistry, and security, to maintain the safe and secure operation of the facility. The... exemption is authorized by law. No Undue Risk to Public Health and Safety The underlying purposes of 10 CFR... previously evaluated. Therefore, there is no undue risk to public health and safety. Consistent With Common...
The Impact of the Structure, Function, and Resources of the Campus Security Office on Campus Safety
ERIC Educational Resources Information Center
Bennett, Patricia Anne
2012-01-01
The topic of this dissertation is college and university safety. This national quantitative study utilized resource dependency theory to examine relationships between the incidence of reported campus crimes and the structure, function, and resources of campus security offices. This study uncovered a difference in reported total crime rates,…
Code of Federal Regulations, 2010 CFR
2010-07-01
...; Liquefied Natural Gas Carrier Transits and Anchorage Operations, Boston, Massachusetts. 165.110 Section 165... Limited Access Areas First Coast Guard District § 165.110 Safety and Security Zone; Liquefied Natural Gas... ahead and one mile astern, and 500 yards on each side of any liquefied natural gas carrier (LNGC) vessel...
Environmental Change & Fragile States Early Warning and Intervention
2011-05-12
data needed , and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this...power to effectively meet the most challenging international objectives 7 Addressing Basic Human Needs Self- Actualization Ego (Esteem) Social...Belonging) Safety/Security Physiological Physical survival needs : water, food, shelter, warmth, sleep, etc. Physical safety, economic security, freedom
Code of Federal Regulations, 2010 CFR
2010-07-01
... Sound, Georgia and St. Marys River Entrance Channel. 165.731 Section 165.731 Navigation and Navigable... Seventh Coast Guard District § 165.731 Safety/Security Zone: Cumberland Sound, Georgia and St. Marys River... waters and land from bank to bank within Cumberland Sound and the St. Marys Entrance Channel: the...
The Effects of Students' Perceptions of Campus Safety and Security on Student Enrollment
ERIC Educational Resources Information Center
Carrico, Brian Andrew
2016-01-01
The purpose of this research was to determine whether student enrollment is affected by the student perception of campus safety and security when choosing a college. As the competition for students increases among higher education institutions, it is important for higher education administrators to know how to effectively present their respective…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-03
... dealers; (ii) insurance companies; (iii) corporate issuers; (iv) issuers of asset-backed securities (as... ``whistleblower'') claims under section 806 of the Corporate and Criminal Fraud Accountability Act of 2002, Title... Systems Security Act and the Federal Railroad Safety Act, 29 CFR part 1982; the Consumer Product Safety...
To Test or Not to Test? Drug Testing Teachers: The View of the Superintendent
ERIC Educational Resources Information Center
DeMitchell, Todd A.; Kossakoski, Stephen; Baldasaro, Tony
2008-01-01
Purpose: School superintendents are charged with maintaining the safety and security of the schools in their district. One major recognized threat to the security and safety of students and staff is the use of illegal drugs. Superintendents are responding to the constitutionality of student drug-testing policies by implementing drug-testing…
76 FR 63934 - Navigation Safety Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-14
... the Road, navigation regulations and equipment, routing measures, marine information, diving safety... Road, navigation regulations and equipment, routing measures, marine information, diving safety, and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0204] Navigation Safety Advisory...
49 CFR 1544.409 - Integrity of screener tests.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Integrity of screener tests. 1544.409 Section 1544.409 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Screener...
33 CFR 96.220 - What makes up a safety management system?
Code of Federal Regulations, 2011 CFR
2011-07-01
... SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Company and Vessel Safety Management Systems § 96.220 What makes up a safety management system? (a) The safety management system must document the responsible person's— (1) Safety and pollution prevention...
Naveh, Eitan; Katz-Navon, Tal
2014-01-01
To avoid errors and improve patient safety and quality of care, health care organizations need to identify the sources of failures and facilitate implementation of corrective actions. Hence, health care organizations try to collect reports and data about errors by investing enormous resources in reporting systems. However, despite health care organizations' declared goal of increasing the voluntary reporting of errors and although the Patient Safety and Quality Improvement Act of 2005 (S.544, Public Law 109-41) legalizes efforts to secure reporters from specific liabilities, the problem of underreporting of adverse events by staff members remains. The purpose of the paper is to develop a theory-based model and a set of propositions to understand the antecedents of staff members' willingness to report errors based on a literature synthesis. The model aims to explore a complex system of considerations employees use when deciding whether to report their errors or be silent about them. The model integrates the influences of three types of organizational climates (psychological safety, psychological contracts, and safety climate) and individual perceptions of the applicability of the organization's procedures and proposes their mutual influence on willingness to report errors and, as a consequence, patient safety. The model suggests that managers should try to control and influence both the way employees perceive procedure applicability and organizational context-i.e., psychological safety, no-blame contracts, and safety climate-to increase reporting and improve patient safety.
Security analysis of standards-driven communication protocols for healthcare scenarios.
Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco
2012-12-01
The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.
O'Connell, Matthew; Delgado, Kristin; Lawrence, Amie; Kung, Mavis; Tristan, Esteban
2017-06-01
A growing body of applied research has identified certain psychological traits that are predictive of worker safety. However, most of these studies suffer from an overreliance on common method bias caused by self-report measures of both: (a) personal factors such as personality traits; and (b) outcomes such as safety behaviors and injuries. This study utilized archival data from 796 employees at a large U.S. automobile manufacturer. Data were gathered on a pre-employment assessment, SecureFit®, that measured key personality characteristics such as conscientiousness, locus of control, and risk taking. In addition, objective measures of workers' compensation claims and disciplinary actions were also gathered. The results indicated that disciplinary actions and workers' compensation claims were strongly correlated. It also demonstrated that the pre-employment assessment was able to predict both disciplinary actions and workers' compensation claims up to 12months in the future. Screening out just 8% of the applicant sample using the assessment would have resulted in a 35% reduction in disciplinary actions and 46% in workers' compensation claims, respectively. The study found a very strong relationship between counterproductive work behaviors (CWBs), such as not following rules, and workers' compensation claims. It also found a strong relationship between a combination of personality traits that have been shown to be associated with both variables, although the current study was able to demonstrate that relationship with objective measure of both variables. Individuals who receive disciplinary actions for things such as not following rules, not coming to work on time, etc. are significantly more likely to also be involved in serious safety incidents, and vice versa. Identifying those individuals early on in the hiring process and screening them out can significantly reduce the number of CWBs as well as workers' compensation claims. Copyright © 2017 Elsevier Ltd and National Safety Council. All rights reserved.
49 CFR 193.2715 - Training: security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...
49 CFR 193.2715 - Training: security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 3 2012-10-01 2012-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...
49 CFR 193.2715 - Training: security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 3 2011-10-01 2011-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...
Sandia National Laboratories: Directed-energy tech receives funding to
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research
Ullman, Amanda J; Kleidon, Tricia; Gibson, Victoria; McBride, Craig A; Mihala, Gabor; Cooke, Marie; Rickard, Claire M
2017-08-30
Central venous access device (CVAD) associated complications are a preventable source of patient harm, frequently resulting in morbidity and delays to vital treatment. Dressing and securement products are used to prevent infectious and mechanical complications, however current complication rates suggest customary practices are inadequate. The aim of this study was to evaluate the feasibility of launching a full-scale randomized controlled efficacy trial of innovative dressing and securement products for pediatric tunneled CVAD to prevent complication and failure. An external, pilot, four-group randomized controlled trial of standard care (bordered polyurethane dressing and suture), in comparison to integrated securement-dressing, suture-less securement device, and tissue adhesive was undertaken across two large, tertiary referral pediatric hospitals in Australia. Forty-eight pediatric participants with newly inserted tunneled CVADs were consecutively recruited. The primary outcome of study feasibility was established by elements of eligibility, recruitment, attrition, protocol adherence, missing data, parent and healthcare staff satisfaction and acceptability, and effect size estimates for CVAD failure (cessation of function prior to completion of treatment) and complication (associated bloodstream infection, thrombosis, breakage, dislodgement or occlusion). Dressing integrity, product costs and site complications were also examined. Protocol feasibility was established. CVAD failure was: 17% (2/12) integrated securement-dressing; 8% (1/13) suture-less securement device; 0% tissue adhesive (0/12); and, 0% standard care (0/11). CVAD complications were: 15% (2/13) suture-less securement device (CVAD associated bloodstream infection, and occlusion and partial dislodgement); 8% (1/12) integrated securement-dressing (partial dislodgement); 0% tissue adhesive (0/12); and, 0% standard care (0/11). One CVAD-associated bloodstream infection occurred, within the suture-less securement device group. Overall satisfaction was highest in the integrated securement-dressing (mean 8.5/10; standard deviation 1.2). Improved dressing integrity was evident in the intervention arms, with the integrated securement-dressing associated with prolonged time to first dressing change (mean days 3.5). Improving the security and dressing integrity of tunneled CVADs is likely to improve outcomes for pediatric patients. Further research is necessary to identify novel, effective CVAD securement to reduce complications, and provide reliable vascular access for children. ACTRN12614000280606 ; prospectively registered on 17/03/2014.
49 CFR 1546.409 - Integrity of screener tests.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Integrity of screener tests. 1546.409 Section 1546.409 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Screener Qualifications When the Foreign Air...
A semantic autonomous video surveillance system for dense camera networks in Smart Cities.
Calavia, Lorena; Baladrón, Carlos; Aguiar, Javier M; Carro, Belén; Sánchez-Esguevillas, Antonio
2012-01-01
This paper presents a proposal of an intelligent video surveillance system able to detect and identify abnormal and alarming situations by analyzing object movement. The system is designed to minimize video processing and transmission, thus allowing a large number of cameras to be deployed on the system, and therefore making it suitable for its usage as an integrated safety and security solution in Smart Cities. Alarm detection is performed on the basis of parameters of the moving objects and their trajectories, and is performed using semantic reasoning and ontologies. This means that the system employs a high-level conceptual language easy to understand for human operators, capable of raising enriched alarms with descriptions of what is happening on the image, and to automate reactions to them such as alerting the appropriate emergency services using the Smart City safety network.
Translational plant proteomics: a perspective.
Agrawal, Ganesh Kumar; Pedreschi, Romina; Barkla, Bronwyn J; Bindschedler, Laurence Veronique; Cramer, Rainer; Sarkar, Abhijit; Renaut, Jenny; Job, Dominique; Rakwal, Randeep
2012-08-03
Translational proteomics is an emerging sub-discipline of the proteomics field in the biological sciences. Translational plant proteomics aims to integrate knowledge from basic sciences to translate it into field applications to solve issues related but not limited to the recreational and economic values of plants, food security and safety, and energy sustainability. In this review, we highlight the substantial progress reached in plant proteomics during the past decade which has paved the way for translational plant proteomics. Increasing proteomics knowledge in plants is not limited to model and non-model plants, proteogenomics, crop improvement, and food analysis, safety, and nutrition but to many more potential applications. Given the wealth of information generated and to some extent applied, there is the need for more efficient and broader channels to freely disseminate the information to the scientific community. This article is part of a Special Issue entitled: Translational Proteomics. Copyright © 2012 Elsevier B.V. All rights reserved.
A Semantic Autonomous Video Surveillance System for Dense Camera Networks in Smart Cities
Calavia, Lorena; Baladrón, Carlos; Aguiar, Javier M.; Carro, Belén; Sánchez-Esguevillas, Antonio
2012-01-01
This paper presents a proposal of an intelligent video surveillance system able to detect and identify abnormal and alarming situations by analyzing object movement. The system is designed to minimize video processing and transmission, thus allowing a large number of cameras to be deployed on the system, and therefore making it suitable for its usage as an integrated safety and security solution in Smart Cities. Alarm detection is performed on the basis of parameters of the moving objects and their trajectories, and is performed using semantic reasoning and ontologies. This means that the system employs a high-level conceptual language easy to understand for human operators, capable of raising enriched alarms with descriptions of what is happening on the image, and to automate reactions to them such as alerting the appropriate emergency services using the Smart City safety network. PMID:23112607
Zhuravlev, P V; Aleshnya, V V; Panasovets, O P; Morozova, A A; Artemova, T Z; Talaeva, Yu G; Zagaynova, A V
2013-01-01
Due to intensive anthropogenic pollution of water environment generally accepted indicators of epidemic security of water bodies--common bacteria (CB) and thermotolerant coliform bacteria (TCB) do not always permit to obtain an objective characterization of bacterial contamination of tap water. From the point of view of authors the integral index--glucose positive coliform bacteria most adequately reflect the sanitary-hygienic and epidemiological situation of water bodies. In monitoring for bacterial quality of tap water it is advisable to determine glucose positive coliform bacteria, that will provide the relevance of estimation of the epidemiological safety of water use. According to the method developed by the authors the calculation of the index of population risk of acute intestinal infections (AHI) occurrence in dependence on the quality of tap water in Azov and Tsimlyansk towns.
Investigation of a “Sharps” Incident
Cournoyer, Michael Edward; Trujillo, Stanley; Schreiber, Stephen Bruce
2016-08-03
Special nuclear material research, process development, technology demonstration, and manufacturing capabilities are provided at the Los Alamos National Laboratory Plutonium Facility. Engineered barriers provide the most effective protection from radioactive and hazardous materials. The Worker Safety Security Team augments these passive safety feature by investigating incidents to identify appropriate prevention and mitigation measures. “Learning Teams” facilitate employee feedback loop and integration toward process improvement. Here, this article reports an investigation of a “Sharps” incident and reviews a case study of a technician that cuts his left thumb while making a gasket. Causal analysis of the sharps incident uncovered contributing factorsmore » that created the environment in which the incident occurred. Finally, latent organizational conditions that created error-likely situations or weakened defenses were identified and controlled. Effective improvements that reduce the probability or consequence of similar sharps incidents were implemented.« less
ADVANCED SEISMIC BASE ISOLATION METHODS FOR MODULAR REACTORS
DOE Office of Scientific and Technical Information (OSTI.GOV)
E. Blanford; E. Keldrauk; M. Laufer
2010-09-20
Advanced technologies for structural design and construction have the potential for major impact not only on nuclear power plant construction time and cost, but also on the design process and on the safety, security and reliability of next generation of nuclear power plants. In future Generation IV (Gen IV) reactors, structural and seismic design should be much more closely integrated with the design of nuclear and industrial safety systems, physical security systems, and international safeguards systems. Overall reliability will be increased, through the use of replaceable and modular equipment, and through design to facilitate on-line monitoring, in-service inspection, maintenance, replacement,more » and decommissioning. Economics will also receive high design priority, through integrated engineering efforts to optimize building arrangements to minimize building heights and footprints. Finally, the licensing approach will be transformed by becoming increasingly performance based and technology neutral, using best-estimate simulation methods with uncertainty and margin quantification. In this context, two structural engineering technologies, seismic base isolation and modular steel-plate/concrete composite structural walls, are investigated. These technologies have major potential to (1) enable standardized reactor designs to be deployed across a wider range of sites, (2) reduce the impact of uncertainties related to site-specific seismic conditions, and (3) alleviate reactor equipment qualification requirements. For Gen IV reactors the potential for deliberate crashes of large aircraft must also be considered in design. This report concludes that base-isolated structures should be decoupled from the reactor external event exclusion system. As an example, a scoping analysis is performed for a rectangular, decoupled external event shell designed as a grillage. This report also reviews modular construction technology, particularly steel-plate/concrete construction using factory prefabricated structural modules, for application to external event shell and base isolated structures.« less
The evolution of analytical chemistry methods in foodomics.
Gallo, Monica; Ferranti, Pasquale
2016-01-08
The methodologies of food analysis have greatly evolved over the past 100 years, from basic assays based on solution chemistry to those relying on the modern instrumental platforms. Today, the development and optimization of integrated analytical approaches based on different techniques to study at molecular level the chemical composition of a food may allow to define a 'food fingerprint', valuable to assess nutritional value, safety and quality, authenticity and security of foods. This comprehensive strategy, defined foodomics, includes emerging work areas such as food chemistry, phytochemistry, advanced analytical techniques, biosensors and bioinformatics. Integrated approaches can help to elucidate some critical issues in food analysis, but also to face the new challenges of a globalized world: security, sustainability and food productions in response to environmental world-wide changes. They include the development of powerful analytical methods to ensure the origin and quality of food, as well as the discovery of biomarkers to identify potential food safety problems. In the area of nutrition, the future challenge is to identify, through specific biomarkers, individual peculiarities that allow early diagnosis and then a personalized prognosis and diet for patients with food-related disorders. Far from the aim of an exhaustive review of the abundant literature dedicated to the applications of omic sciences in food analysis, we will explore how classical approaches, such as those used in chemistry and biochemistry, have evolved to intersect with the new omics technologies to produce a progress in our understanding of the complexity of foods. Perhaps most importantly, a key objective of the review will be to explore the development of simple and robust methods for a fully applied use of omics data in food science. Copyright © 2015 Elsevier B.V. All rights reserved.
Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.
Caruso, Ronald D
2003-01-01
Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003
78 FR 21634 - Order of Suspension of Trading; in the Matter of Integrity Bancshares, Inc.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-11
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; in the Matter of Integrity Bancshares, Inc. April 9, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Integrity...
[Security aspects on the Internet].
Seibel, R M; Kocher, K; Landsberg, P
2000-04-01
Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.
75 FR 47311 - National Offshore Safety Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-05
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0489] National Offshore Safety Advisory... Offshore Safety Advisory Committee (NOSAC) will meet by teleconference to discuss items related to safety... advice and makes recommendations to the Coast Guard on [[Page 47312
DOT National Transportation Integrated Search
2001-09-21
This is the statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues before the Subcommittee on Aviation, Committee on Transportation and Infrastructure, House of Representatives regarding aviation safety and security. The statemen...
Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety
DOT National Transportation Integrated Search
1998-05-01
Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...
47 CFR 80.277 - Ship Security Alert System (SSAS).
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 5 2011-10-01 2011-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277 Ship Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety...
47 CFR 80.277 - Ship Security Alert System (SSAS).
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 5 2014-10-01 2014-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277 Ship Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety...
47 CFR 80.277 - Ship Security Alert System (SSAS).
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 5 2012-10-01 2012-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277 Ship Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety...
47 CFR 80.277 - Ship Security Alert System (SSAS).
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 5 2013-10-01 2013-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277 Ship Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety...
School Security Assessment Programme in Australia
ERIC Educational Resources Information Center
Marrapodi, John
2007-01-01
This article describes a successful security risk management programme in Australia. The state-wide programme follows a structured risk management approach focusing on the safety and security of people, information, provision, and assets in the school environment. To assist school principals, a Security Risk Assessment Programme was developed on a…
Yang, Qing-Sheng; Qiao, Ji-Gang; Ai, Bin
2013-09-01
Taking the Dongguan City with rapid urbanization as a case, and selecting landscape ecological security level as evaluation criterion, the urbanization cellular number of 1 km x 1 km ecological security cells was obtained, and imbedded into the transition rules of cellular automata (CA) as the restraint term to control urban development, establish ecological security urban CA, and simulate ecological security urban development pattern. The results showed the integrated landscape ecological security index of the City decreased from 0.497 in 1998 to 0.395 in 2005, indicating that the ecological security at landscape scale was decreased. The CA-simulated integrated ecological security index of the City in 2005 was increased from the measured 0.395 to 0.479, showing that the simulated urban landscape ecological pressure from human became lesser, ecological security became better, and integrated landscape ecological security became higher. CA could be used as an effective tool in researching urban ecological security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 4 2010-10-01 2010-10-01 false Subjects to be addressed in a Safety Integration... TRANSPORTATION REGULATIONS ON SAFETY INTEGRATION PLANS GOVERNING RAILROAD CONSOLIDATIONS, MERGERS, AND ACQUISITIONS OF CONTROL Safety Integration Plans § 244.15 Subjects to be addressed in a Safety Integration Plan...
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1987-12-31
This report also provides data on the initiatives being implemented as a result of the review of domestic airport security by the Secretary’s Safety...enforcement support for airline and airport security measures. Finally, the passengers-the ultimate beneficiaries of the security program--pay for...of these airports is required to implement a security program which provides a secure operating environment for these air carriers. Airport security programs
Chemical Facility Security: Reauthorization, Policy Issues, and Options for Congress
2009-07-13
Process Safety, American Institute of Chemical Engineers , before the Senate Committee on Environment and Public Works, June 21, 2006, S.Hrg. 109-1044. See...example, Testimony by Dennis C. Hendershot, Staff Consultant, Center for Chemical Process Safety, American Institute of Chemical Engineers , before...CRS Report for Congress Prepared for Members and Committees of Congress Chemical Facility Security: Reauthorization, Policy Issues, and
ERIC Educational Resources Information Center
US Department of Justice, 2005
2005-01-01
The aftermath of September 11, 2001 prompted the reexamination of the nation's defenses and vulnerabilities in light of new realities. Every sector of society, particularly those who protect the well being of communities, required change. Safety and security operations on the nation's college and university campuses are no exception. The nation's…
ERIC Educational Resources Information Center
Florida State Legislature, Tallahassee. Office of Program Policy Analysis and Government Accountability.
The 2001 Florida Legislature passed Ch. 2001-125, Laws of Florida, Section 40, which is often referred to as the Safe Passage Act. It requires all school districts to conduct a self-assessment of their school safety and security using best practices developed by the Office of Program Policy Analysis and Government Accountability (OPPAGA). It also…
A Compton Gamma Imager for Criminal and National Security Investigation
2014-05-01
which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety Canada. Partners in the...project include National Research Council, McGill University, Royal Canadian Mounted Police, Public Safety Canada, Toronto Police, and Canada Border...16 6.2.1 Follow-on Research ...................................................................................... 16 6.2.2 Follow-on
Code of Federal Regulations, 2011 CFR
2011-07-01
... Island Sound Marine Inspection Zone and Captain of the Port Zone. 165.154 Section 165.154 Navigation and... Areas First Coast Guard District § 165.154 Safety and Security Zones: Long Island Sound Marine... this zone is prohibited unless authorized by the Captain of the Port Long, Island Sound. (3) All...
A sequential-move game for enhancing safety and security cooperation within chemical clusters.
Pavlova, Yulia; Reniers, Genserik
2011-02-15
The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided. Copyright © 2010 Elsevier B.V. All rights reserved.
Ageing-in-place with the use of ambient intelligence technology: perspectives of older users.
van Hoof, J; Kort, H S M; Rutten, P G S; Duijnstee, M S H
2011-05-01
Ambient intelligence technologies are a means to support ageing-in-place by monitoring clients in the home. In this study, monitoring is applied for the purpose of raising an alarm in an emergency situation, and thereby, providing an increased sense of safety and security. Apart from these technological solutions, there are numerous environmental interventions in the home environment that can support people to age-in-place. The aim of this study was to investigate the needs and motives, related to ageing-in-place, of the respondents receiving ambient intelligence technologies, and to investigate whether, and how, these technologies contributed to aspects of ageing-in-place. This paper presents the results of a qualitative study comprised of interviews and observations of technology and environmental interventions in the home environment among 18 community-dwelling older adults with a complex demand for care. These respondents had a prototype of the Unattended Autonomous Surveillance system, an example of ambient intelligence technology, installed in their homes as a means to age-in-place. The UAS-system offers a large range of functionalities, including mobility monitoring, voice response, fire detection, as well as wandering detection and prevention, which can be installed in different configurations. The respondents had various motives to use ambient intelligence technologies to support ageing-in-place. The most prominent reason was to improve the sense of safety and security, in particular, in case of fall incidents, when people were afraid not to be able to use their existing emergency response systems. The ambient intelligence technologies were initially seen as a welcome addition to strategies already adopted by the respondents, including a variety of home modifications and assistive devices. The systems tested increased the sense of safety and security and helped to postpone institutionalisation. Respondents came up with a set of specifications in terms of the operation and the design of the technology. False alarms were also regarded as a sign that the ambient intelligence technology is functioning. Moreover, a good integration of the new technologies in the provision of health care is indispensable, and installation should be done in an acceptable and unobtrusive manner. Ambient intelligence technologies can contribute to an increased safety and security at home. The technologies alone offer no all encompassing solution as home care and additional environmental interventions are still needed to support ageing-in-place. Results of the study are used to further improve the ambient intelligence technologies and their implementation. 2011 Elsevier Ireland Ltd. All rights reserved.
Safety Needs Mediate Stressful Events Induced Mental Disorders.
Zheng, Zheng; Gu, Simeng; Lei, Yu; Lu, Shanshan; Wang, Wei; Li, Yang; Wang, Fushun
2016-01-01
"Safety first," we say these words almost every day, but we all take this for granted for what Maslow proposed in his famous theory of Hierarchy of Needs : safety needs come second to physiological needs. Here we propose that safety needs come before physiological needs. Safety needs are personal security, financial security, and health and well-being, which are more fundamental than physiological needs. Safety worrying is the major reason for mental disorders, such as anxiety, phobia, depression, and PTSD. The neural basis for safety is amygdala, LC/NE system, and corticotrophin-releasing hormone system, which can be regarded as a "safety circuitry," whose major behavior function is "fight or flight" and "fear and anger" emotions. This is similar to the Appraisal theory for emotions: fear is due to the primary appraisal, which is related to safety of individual, while anger is due to secondary appraisal, which is related to coping with the unsafe situations. If coping is good, the individual will be happy; if coping failed, the individual will be sad or depressed.
49 CFR 193.2909 - Security communications.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY LIQUEFIED NATURAL GAS FACILITIES...) Prompt communications between personnel having supervisory security duties and law enforcement officials...
Privacy, security and access with sensitive health information.
Croll, Peter
2010-01-01
This chapter gives an educational overview of: * Confidentiality issues and the challenges faced; * The fundamental differences between privacy and security; * The different access control mechanisms; * The challenges of Internet security; * How 'safety and quality' relate to all the above.
Halbesleben, Jonathon R B; Leroy, Hannes; Dierynck, Bart; Simons, Tony; Savage, Grant T; McCaughey, Deirdre; Leon, Matthew R
2013-10-01
While previous research has identified that leaders' safety expectations and safety actions are important in fostering occupational safety, research has yet to demonstrate the importance of leader alignment between safety expectations and actions for improving occupational safety. We build on safety climate literature and theory on behavioral integrity to better understand the relationship between the leader's behavioral integrity regarding safety and work-related injuries. In a time-lagged study of 658 nurses, we find that behavioral integrity for high safety values is positively associated with greater reporting of fewer and less severe occupational injuries. The effects of behavioral integrity regarding safety can be better understood through the mediating mechanisms of safety compliance and psychological safety toward one's supervisor. We discuss the implications of our findings for future research on safety climate.
49 CFR 244.11 - Contents of a Safety Integration Plan.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 4 2014-10-01 2014-10-01 false Contents of a Safety Integration Plan. 244.11... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS ON SAFETY INTEGRATION PLANS GOVERNING RAILROAD CONSOLIDATIONS, MERGERS, AND ACQUISITIONS OF CONTROL Safety Integration Plans § 244.11 Contents of a Safety...
49 CFR 244.11 - Contents of a Safety Integration Plan.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 4 2013-10-01 2013-10-01 false Contents of a Safety Integration Plan. 244.11... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS ON SAFETY INTEGRATION PLANS GOVERNING RAILROAD CONSOLIDATIONS, MERGERS, AND ACQUISITIONS OF CONTROL Safety Integration Plans § 244.11 Contents of a Safety...
49 CFR 244.11 - Contents of a Safety Integration Plan.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 4 2011-10-01 2011-10-01 false Contents of a Safety Integration Plan. 244.11... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS ON SAFETY INTEGRATION PLANS GOVERNING RAILROAD CONSOLIDATIONS, MERGERS, AND ACQUISITIONS OF CONTROL Safety Integration Plans § 244.11 Contents of a Safety...
49 CFR 244.11 - Contents of a Safety Integration Plan.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 4 2012-10-01 2012-10-01 false Contents of a Safety Integration Plan. 244.11... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS ON SAFETY INTEGRATION PLANS GOVERNING RAILROAD CONSOLIDATIONS, MERGERS, AND ACQUISITIONS OF CONTROL Safety Integration Plans § 244.11 Contents of a Safety...
49 CFR 244.11 - Contents of a Safety Integration Plan.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 4 2010-10-01 2010-10-01 false Contents of a Safety Integration Plan. 244.11... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS ON SAFETY INTEGRATION PLANS GOVERNING RAILROAD CONSOLIDATIONS, MERGERS, AND ACQUISITIONS OF CONTROL Safety Integration Plans § 244.11 Contents of a Safety...
Effectiveness of the Civil Aviation Security Program.
1979-12-05
The airline and airport security measures currently in effect continue to provide increased safety for airline passengers and crews as well as...107 governing airport security . other ongoing programs which contributed significantly to airport security included the training of law enforce- ment...officers supporting airport security programs and the explosives detection K(9 team program. Highlights of these actions and programs are summarized
46 CFR 154.1400 - Safety equipment: All vessels.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 5 2010-10-01 2010-10-01 false Safety equipment: All vessels. 154.1400 Section 154.1400 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY STANDARDS FOR SELF-PROPELLED VESSELS CARRYING BULK LIQUEFIED GASES Design, Construction and Equipment Safety Equipment § 154.1400 Safety...
46 CFR 154.1400 - Safety equipment: All vessels.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 5 2011-10-01 2011-10-01 false Safety equipment: All vessels. 154.1400 Section 154.1400 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY STANDARDS FOR SELF-PROPELLED VESSELS CARRYING BULK LIQUEFIED GASES Design, Construction and Equipment Safety Equipment § 154.1400 Safety...
Byrnes, Hilary F; Miller, Brenda A; Johnson, Mark B; Voas, Robert B
2014-12-01
Electronic music and dance events in nightclubs attract patrons with heavy alcohol/drug use. Public health concerns are raised from risks related to these behaviors. Practices associated with increased risk in these club settings need to be identified. The relationship between club management practices and biological measures of patrons' alcohol/drug use is examined. Observational data from 25 events across six urban clubs were integrated with survey data (N = 738 patrons, 42.8% female) from patrons exiting these events, 2010-2012. Five indicators of club management practices were examined using mixed model regressions: club security, bar crowding, safety signs, serving intoxicated patrons, and isolation. Analyses revealed that serving intoxicated patrons and safety signs were related to substance use. Specifically, serving intoxicated patrons was related to heavy alcohol and drug use at exit, while safety signs were marginally related to less exit drug use. CONCLUSIONS/IMPORTANCE: Findings indicate observable measures in nightclubs provide important indicators for alcohol/drug use, suggesting practices to target. Study strengths include the use of biological measures of substance use on a relatively large scale. Limitations and future directions are discussed.
[Combining herbs with medication--risks vs. chances].
Amir, Nir
2013-07-01
Traditional herbal medicine is driven by the use of plants or parts of plants, which have undergone minimal processing in order to treat disease and improve health. The article: "Traditional Immunosuppression--Lei Gong Teng in Modern Medicine", published in this issue of "Harefuah", raises the importance of integrating herbal medicine within the existing medical system. However, there are various limitations on integrating herbology in official frameworks, such as bureaucratic and legislative restrictions concerning the safety and efficacy of the herbs. This allows the marketing of many plants without a prescription requirement or professional advice. Another limitation relates to therapists, some of whom have not undergone proper training and may recommend the improper use of plants, resulting in a problematic combination with drugs in some cases. Regulation is necessary in order to better serve both the public and doctors. Regulation will define who is allowed to work with herbs and this will create a secure integration of herbs into the formal medical world.
Exploring the Future of Security in the Caribbean: a Regional Security Partnership?
2007-12-14
by these organizations and their members. 25 CHAPTER 2 LITERATURE REVIEW Psychologist Abraham Maslow posited that safety [read security] is one...addressing the security needs of the Caribbean Basin and the United States? Of necessity , there are several secondary questions which must be...development of models/ theories of security. These theories of security abound, and have evolved as the international arena has changed. Realists, idealists and
Safety in Schools: An Integral Approach
ERIC Educational Resources Information Center
Gairin, Joaquin; Castro, Diego
2011-01-01
The present paper summarizes a research project into integral safety in schools. The aims of this particular research are, firstly, to evaluate the degree of integral safety in schools, secondly, to propose means for improving prevention and integral safety systems and thirdly, to identify the characteristics of safety culture. The field work was…
78 FR 19505 - National Boating Safety Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-01
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0164] National Boating Safety Advisory... Planning Subcommittee of the National Boating Safety Advisory Council (NBSAC) will meet via teleconference... boating safety program. This teleconference meeting will be open to the public. DATES: The teleconference...
78 FR 19507 - National Boating Safety Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-01
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0164] National Boating Safety Advisory... Associated Equipment Subcommittee of the National Boating Safety Advisory Council (NBSAC) will meet via teleconference and online webinar to discuss safety issues related to boats and associated equipment. This...
78 FR 19506 - National Boating Safety Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-01
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0164] National Boating Safety Advisory... Through People Subcommittee of the National Boating Safety Advisory Council (NBSAC) will meet via teleconference and online webinar to discuss issues related to improving safety of recreational boating through...
78 FR 34115 - National Offshore Safety Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-06
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2013-0461] National Offshore Safety.... SUMMARY: The National Offshore Safety Advisory Committee (NOSAC) will meet via teleconference to receive a.... Additionally the committee will reconvene the Subcommittee on commercial diving safety to consider...
75 FR 65025 - National Offshore Safety Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-21
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0925] National Offshore Safety Advisory Committee AGENCY: Coast Guard, DHS. ACTION: Notice of meeting. SUMMARY: The National Offshore Safety Advisory Committee (NOSAC) will meet to discuss items related to safety of operations and other matters...
78 FR 44958 - Commercial Fishing Safety Advisory Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
... be dedicated to continuing subcommittee sessions on training requirements and alternative safety... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2013-0625] Commercial Fishing Safety.... SUMMARY: The Commercial Fishing Safety Advisory Committee (CFSAC) will meet in Washington, DC to discuss...
77 FR 67658 - Navigation Safety Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-13
... the Road, navigation regulations and equipment, routing measures, marine information, diving safety... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0212] Navigation Safety Advisory... Navigation Safety Advisory Council (NAVSAC) will meet on November 28 and 29, 2012 in Tampa, Florida, to...
33 CFR 150.602 - What occupational awareness training is required?
Code of Federal Regulations, 2011 CFR
2011-07-01
... safety and health, the implementation of an approved, port-specific safety and environmental management... HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Safety and Health (general) § 150.602 What occupational awareness training is required? (a) Each...
75 FR 35444 - Safety and Security Equipment and Services Trade Mission To Brazil
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-22
... electronic security, the market is estimated at US$ 1.5 billion. Today, electronic security equipment is not... market information and to provide access to key government officials and potential business partners for... both the public sector (e.g., public security authorities and officials) and private business (e.g...
76 FR 63668 - Omaha Public Power District; Fort Calhoun Station, Unit 1; Exemption
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... health and safety, and are consistent with the common defense and security; and (2) special circumstances.... Consistent With Common Defense and Security The proposed exemption would allow FCS to reschedule its biennial... schedule has no relation to security issues. Therefore, the common defense and security is not impacted by...