75 FR 18872 - Ginnie Mae Multiclass Securities Program Documents
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... Securities Program Documents AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice. SUMMARY... with the Multiclass Securities Program. The intent of the Multiclass Securities program is to increase... Securities Program Documents. OMB Approval Number: 2503-0030. Form Numbers: None. Description of the Need for...
6 CFR 13.20 - Disclosure of Documents.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Disclosure of Documents. 13.20 Section 13.20 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.20 Disclosure of Documents. (a) Upon written request to the Reviewing Official, the Defendant may...
Information security management system planning for CBRN facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.
The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2013-09-01
This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspections completed by the GWPP on active and inactive wells at Y-12 during calendar years (CY) 2010 through 2012. In addition, this report also documents well inspections performed under the Y-12 Water Resources Restoration Program, which is administered by URS|CH2M Oak Ridge (UCOR). This report documents well maintenance activities completed since the last triennial inspection event (CY 2009); and provides summary tablesmore » of well inspections and well maintenance activities during the reference time period.« less
Code of Federal Regulations, 2011 CFR
2011-01-01
... of all of the Borrower's obligations under the Loan Documents shall be secured by, and shall have the priority in, such Security as provided for within the terms and conditions of the Loan Documents. (2... ENERGY (CONTINUED) ASSISTANCE REGULATIONS ADVANCED TECHNOLOGY VEHICLES MANUFACTURER ASSISTANCE PROGRAM...
Code of Federal Regulations, 2010 CFR
2010-01-01
... of all of the Borrower's obligations under the Loan Documents shall be secured by, and shall have the priority in, such Security as provided for within the terms and conditions of the Loan Documents. (2... ENERGY (CONTINUED) ASSISTANCE REGULATIONS ADVANCED TECHNOLOGY VEHICLES MANUFACTURER ASSISTANCE PROGRAM...
75 FR 9607 - National Protection and Programs Directorate; Guidance Document Request and Evaluation
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-03
... techniques or other forms of information technology, e.g., permitting electronic submissions of responses... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0010] National Protection and Programs Directorate; Guidance Document Request and Evaluation AGENCY: National Protection and Programs Directorate...
Advanced Fuel Properties; A Computer Program for Estimating Property Values
1993-05-01
security considerations, contractual obligations, or notice on a specific document. REPORT DOCUMENTATION PAGE Fogu Approwd I OMB No. 0704-01=5 Ps NP...found in fuels. 14. SUBJECT TERMS 15. NUMBEROF PAGES 175 Fuel properties, Physical Propertie, Thermodynamnics, Predictions 16. PRICE CODE 17. SECURITY ...CLASSIFICATION is. SECURrrY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITFATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT Unclassified
75 FR 1566 - National Industrial Security Program Directive No. 1
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-12
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part...: Information Security Oversight Office, NARA. ACTION: Proposed rule; correction. SUMMARY: This document... Management System (FDMS) number to the proposed rule for Information Security Oversight Office (ISOO...
LANL Safeguards and Security Assurance Program. Revision 6
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-04-03
The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impactsmore » on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms.« less
Two Stage Sibling Cycle Compressor/Expander.
1994-02-01
documents, follow the procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1 -R, Information Security Program Regulation...procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1-R, Information Security Program Regulation, Chapter IX. For...Spae Piston rotation periodically connects channels from expansion/ compresion ces to ports P1Port B2 Heat Exchangers B Piston moves Ports Process Al
2016-09-01
be conducted midstream, at the end of an activity program or LOE, or ex post facto . Not all security cooperation endeavors require evaluation...noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only...iv Developing an AME Framework for DoD Security Cooperation approach, the study team analyzed documents, interviewed subject- matter experts
28 CFR 0.111B - Witness Security Program.
Code of Federal Regulations, 2014 CFR
2014-07-01
... United States Marshals Service § 0.111B Witness Security Program. (a) In connection with the protection... potential witness, the Director of the United States Marshals Service and officers of the United States Marshals Service designated by the Director may: (1) Provide suitable documents to enable the person to...
28 CFR 0.111B - Witness Security Program.
Code of Federal Regulations, 2013 CFR
2013-07-01
... United States Marshals Service § 0.111B Witness Security Program. (a) In connection with the protection... potential witness, the Director of the United States Marshals Service and officers of the United States Marshals Service designated by the Director may: (1) Provide suitable documents to enable the person to...
1982-01-01
number of countries in the FY 1983 Congressional Presentation Document (CPD) that the United States has security assistance programs with in one form...or another one would find 109 countries listed. Security assistance is a far reaching program and has as its major elements Foreign Military Sales...FMS), International Military Education and Training (IMET), the Military Assistance Program (MAP), commercial sales licensed under the Arms Export
24 CFR 882.515 - Reexamination of family income and composition.
Code of Federal Regulations, 2011 CFR
2011-04-01
... PROGRAM, SECTION 202 SUPPORTIVE HOUSING FOR THE ELDERLY PROGRAM AND SECTION 811 SUPPORTIVE HOUSING FOR... documentation as the PHA or HUD determine to be necessary, including submission of required evidence of citizenship or eligible immigration status, submission of social security numbers and verifying documentation...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dingell, J.D.
1991-02-01
The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secretmore » document control program was also assessed.« less
The $$ Game: A Guidebook on the Funding of Law-Related Educational Programs. Working Notes, No. 7.
ERIC Educational Resources Information Center
White, Charles J., III, Ed.
This document addresses itself to the securing of funds necessary to maintain or fund law-related education projects. Drawing on the expertise of project directors who have been successful in securing funds, this document was put together as a guide to the funding process. Essays provide guidance to locating funding sources, writing proposals,…
DOT National Transportation Integrated Search
2016-05-18
This document describes the Security Management Operating Concept (SMOC) for the New York City Department of Transportation (NYCDOT) Connected Vehicle Pilot Deployment (CVPD) Project. This SMOC outlines the security mechanisms that will be used to pr...
A Biosecurity Checklist for School Foodservice Programs: Developing a Biosecurity Management Plan
ERIC Educational Resources Information Center
US Department of Agriculture, 2004
2004-01-01
The purpose of this document is to introduce the need for securing foodservice operations from bioterrorism, provide a checklist of suggestions for improving the security of foodservice operations, and assist individuals responsible for school food service programs in strengthening the safety of the foodservice operation. While not mandatory, the…
MCPS School Safety & Security at a Glance 2011-2012
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2012
2012-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…
MCPS School Safety & Security at a Glance 2013-2014
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2014
2014-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…
MCPS School Safety & Security at a Glance 2012-2013
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2013
2013-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…
MCPS School Safety and Security at a Glance 2007-2008
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2008
2008-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, including school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for…
ERIC Educational Resources Information Center
Mississippi Employment Security Commission, Jackson.
The 2-part document, published by the Mississippi Employment Security Commission, relates to the Smaller Communities Program conducted during 1969 to help alleviate employment problems in rural areas of Mississippi and to provide employment services in areas with varying economic problems. Based on data secured from Federal, state, and private…
ERIC Educational Resources Information Center
Bovbjerg, Barbara D.
This report compares the Social Security Administration's Disability Insurance (DI) program and the practices of the private sector and other countries in helping people with severe disabilities return to work. Information was gathered in in-depth interviews and a review of policy documents and program data at three private sector disability…
SRI PUFF 8 Computer Program for One-Dimensional Stress Wave Propagation
1980-03-01
raial product. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (Tfhen Data Entered) REPORT DOCUMENTATION PAGE READ INSTRUCTIONS BEFORE COMPLETING...EDITION OF I NOV 6S (S OBSOLETE UNCLASSIFIED SECURITY CLASSIFICATIOK OF THIS PAGE (When Data Entered) UNCLASSIFIED SECURITY CLASSIFICATION OF THIS...aspects of wave propagation calculations. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGEfWhen Data Entered) FOREWORD This volume constitutes a
2008 U.S. Coast Guard Innovation Expo
2008-11-20
for Capability (CG-7) Public Release Authorized DCO Outcomes • Mission Performance Plans, policies, strategic analysis and planning, assessments and...Untitled Document 2008 U.S.htm[5/26/ 2016 2:24:38 PM] 2008 U.S. Coast Guard Innovation Expo “Collaboration Fuels Innovation” Virginia Beach, Virginia...Untitled Document 2008 U.S.htm[5/26/ 2016 2:24:38 PM] Panelists: Mr. Tom Tomaiko, Maritime Security Program Manager, Borders and Maritime Security
Implementing an Information Security Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.
The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less
6 CFR 13.26 - Filing, form and service of papers.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Filing, form and service of papers. 13.26 Section 13.26 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.26 Filing, form and service of papers. (a) Filing and form. (1) Documents filed with...
MCPS School Safety and Security at a Glance 2008-2009
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2009
2009-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…
MCPS School Safety and Security at a Glance 2010-2011
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2011
2011-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…
MCPS School Safety and Security at a Glance 2009-2010
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2010
2010-01-01
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) public schools. The information is presented for each school.…
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.
2013-07-01
This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.
Code of Federal Regulations, 2010 CFR
2010-10-01
... MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security Program...) National security means the national defense or foreign relations of the United States. (m) Need to know... new form into a new document. (s) Unauthorized disclosure means a communication or physical transfer...
Physical Security Modeling for the Shipboard Nuclear Weapons Security Program,
1982-04-01
I AOA1IR 396 NAVAL SURFACE WEAPONS CENTER SILVER SPRING MO F/G 15/3 PHYSICAL SECURITY MODELING FOR THE SHIPROARD NUCLEAR WEAPONS SE--ETEEU) APR A2 E ...WEAPONS SECURITY )PROGRAM 0% BY E . G. JACOUES D. L BARTUSEK R. W. MONROE M. S. SCHWARTZ WEAPONS SYSTEMS DEPARTMENT 1 APRIL 1982 A4pm lvW for p uic r...ASSIPICATIO N O F Tb IS PAGE t’W "mu Dat e E DLeT R)....... t READ W~STRUCTIoNs’ REPORT DOCUMENTATION PAGE BEFORE COMPLETNG FORM4 . REPiQRT NUM1e[i ja. VT
Marketing Plan for Demonstration and Validation Assets
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
The National Security Preparedness Project (NSPP), is to be sustained by various programs, including technology demonstration and evaluation (DEMVAL). This project assists companies in developing technologies under the National Security Technology Incubator program (NSTI) through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. This report documents the DEMVAL marketing and visibility plan, which will focus on collecting information about, and expanding the visibility of, DEMVAL assets serving businesses with national security technology applications in southern New Mexico.
75 FR 80734 - Chronic Beryllium Disease Prevention Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
... Disease Prevention Program AGENCY: Office of Health, Safety and Security, Department of Energy. ACTION... and comments on issues related to its current chronic beryllium disease prevention program. The... disease prevention program. DATES: All comments on the issues presented in this document must be received...
DOE Office of Scientific and Technical Information (OSTI.GOV)
2015-05-13
STONIX is a program for configuring UNIX and Linux computer operating systems. It applies configurations based on the guidance from publicly accessible resources such as: NSA Guides, DISA STIGs, the Center for Internet Security (CIS), USGCB and vendor security documentation. STONIX is written in the Python programming language using the QT4 and PyQT4 libraries to provide a GUI. The code is designed to be easily extensible and customizable.
Teaching Aids in Consumer Economics, 1970-71.
ERIC Educational Resources Information Center
New York State Council on Economic Education, Albany.
The document consists of 12 consumer education units for grade 12: Consumer Purchasing; Purchasing Food, Clothing, Furniture, and Appliances; Purchasing and Maintaining an Automobile; Housing; Consumer Credit; Money Management; Fraud, Quackery, and Deception; Banking and Savings; Investments; Life Insurance; Security Programs (Social Security,…
Code of Federal Regulations, 2014 CFR
2014-01-01
... regulations in this part may be sent as follows: (a) By mail addressed to: ATTN: Document Control Desk... Management Programs; or Director, Division of Security Policy, Office of Nuclear Security and Incident... electronic submission, for example, Electronic Information Exchange, or CD-ROM. Electronic submissions must...
44 CFR 361.6 - Documentation of matching contributions.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS NATIONAL EARTHQUAKE HAZARDS REDUCTION ASSISTANCE TO STATE AND LOCAL GOVERNMENTS Earthquake Hazards Reduction Assistance Program § 361.6 Documentation of matching... comprising its earthquake hazards reduction project, including the project budget, shall reflect a level of...
44 CFR 361.6 - Documentation of matching contributions.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS NATIONAL EARTHQUAKE HAZARDS REDUCTION ASSISTANCE TO STATE AND LOCAL GOVERNMENTS Earthquake Hazards Reduction Assistance Program § 361.6 Documentation of matching... comprising its earthquake hazards reduction project, including the project budget, shall reflect a level of...
44 CFR 361.6 - Documentation of matching contributions.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS NATIONAL EARTHQUAKE HAZARDS REDUCTION ASSISTANCE TO STATE AND LOCAL GOVERNMENTS Earthquake Hazards Reduction Assistance Program § 361.6 Documentation of matching... comprising its earthquake hazards reduction project, including the project budget, shall reflect a level of...
44 CFR 361.6 - Documentation of matching contributions.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS NATIONAL EARTHQUAKE HAZARDS REDUCTION ASSISTANCE TO STATE AND LOCAL GOVERNMENTS Earthquake Hazards Reduction Assistance Program § 361.6 Documentation of matching... comprising its earthquake hazards reduction project, including the project budget, shall reflect a level of...
44 CFR 361.6 - Documentation of matching contributions.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS NATIONAL EARTHQUAKE HAZARDS REDUCTION ASSISTANCE TO STATE AND LOCAL GOVERNMENTS Earthquake Hazards Reduction Assistance Program § 361.6 Documentation of matching... comprising its earthquake hazards reduction project, including the project budget, shall reflect a level of...
Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents
2015-01-01
very large public and private fingerprint databases comprehensive risk analysis and system security contribution to developing international ...Safety and Security Program which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety...201 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 201 Science and Engineering
Tractor Trailer Driver's Training Programs. Performance Report.
ERIC Educational Resources Information Center
New Hampshire Vocational Technical Coll., Nashua.
This document describes a project to develop a 320-hour tractor trailer driver training program and a 20-hour commercial driver licensing upgrade training program. Of 34 graduates from the training program, 28 secured employment in the trucking industry. From August 1989 to June 1990, 725 students were trained in the upgrade training program with…
Department of Energy: Nuclear S&T workforce development programs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bingham, Michelle; Bala, Marsha; Beierschmitt, Kelly
The U.S. Department of Energy (DOE) national laboratories use their expertise in nuclear science and technology (S&T) to support a robust national nuclear S&T enterprise from the ground up. Traditional academic programs do not provide all the elements necessary to develop this expertise, so the DOE has initiated a number of supplemental programs to develop and support the nuclear S&T workforce pipeline. This document catalogs existing workforce development programs that are supported by a number of DOE offices (such as the Offices of Nuclear Energy, Science, Energy Efficiency, and Environmental Management), and by the National Nuclear Security Administration (NNSA) andmore » the Naval Reactor Program. Workforce development programs in nuclear S&T administered through the Department of Homeland Security, the Nuclear Regulatory Commission, and the Department of Defense are also included. The information about these programs, which is cataloged below, is drawn from the program websites. Some programs, such as the Minority Serving Institutes Partnership Programs (MSIPPs) are available through more than one DOE office, so they appear in more than one section of this document.« less
How to implement security controls for an information security program at CBRN facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.
This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in anmore » easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... Department of Homeland Security, Federal Emergency Management Agency, and sent via electronic mail to oira... Program's (NFIP) Community Rating System (CRS) to document the activities that communities have undertaken... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2010-0012...
76 FR 71994 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-21
... recommendations on how to proceed on those topics: Subcommittee: The Global Supply Chain Security Land Border... document for public release.--Report by the Global Supply Chain Security Air Cargo Subcommittee. Status... surveys (IPR Partnership Program Survey and IPR Distribution Chain Management survey). Subcommittee...
1989-06-01
Science Unclassified SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la. REPORT SECURITY CLASS’r!CATION )b RESTRICTIVE MARKINGS UNCLASSIFIED...2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; Zb. DECLASSIFICATION I DOWNGRADING SCHEDULE...ZIP Code) 10 SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT Monterey, CA. 93943 FLEMENT NO. NO. NO ACCESSION NO. 11. TITLE (Include Security
Approximation in Optimal Control and Identification of Large Space Structures.
1985-01-01
I ease I Cr ’. ’. -4 . r*_...1- UN(D aSIFIED SECURITY CLAS.’ICATION OF fHIS P^.GE REPORT DOCUMENTATION PAGE 1 REPORT SECURITY CLASSIFICATION 1...RESTRICTIVE MARKINGS UNCLASSIFIED 2 SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; distribution 2b...NOS. PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. NO Bolling AFB DC 20332-6448 61102F 2304 Al 11. TITLE IlnRCiude Security Claas.ifcation
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-28
..., 2013. ADDRESSES: To view the documents mentioned in this notice, go to http://www.regulations.gov and... the Internet, you may view the docket online by visiting the Docket Management Facility in Room W12... INFORMATION: Viewing the NVIC and other documents: To view NVIC 01-13 and related documents, go to http://www...
Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert
2013-06-01
To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.
Counter Trafficking System Development "Analysis Training Program"
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peterson, Dennis C.
This document will detail the training curriculum for the Counter-Trafficking System Development (CTSD) Analysis Modules and Lesson Plans are derived from the United States Military, Department of Energy doctrine and Lawrence Livermore National Laboratory (LLNL), Global Security (GS) S Program.
NASA Technical Reports Server (NTRS)
Powell, John D.
2003-01-01
This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.
Downgrade of the Savannah River Sites FB-Line
DOE Office of Scientific and Technical Information (OSTI.GOV)
SADOWSKI, ED; YOURCHAK, RANDY; PRETZELLO MARJI
2005-07-05
This paper will discuss the Safeguards & Security (S&S) activities that resulted in the downgrade of the Savannah River Site's FB-Line (FBL) from a Category I Material Balance Area (MBA) in a Material Access Area (MAA) to a Category IV MBA in a Property Protection Area (PPA). The Safeguards activities included measurement of final product items, transferal of nuclear material to other Savannah River Site (SRS) facilities, discard of excess nuclear material items, and final measurements of holdup material. The Security activities included relocation and destruction of classified documents and repositories, decertification of a classified computer, access control changes, updatesmore » to planning documents, deactivation and removal of security systems, Human Reliability Program (HRP) removals, and information security training for personnel that will remain in the FBL PPA.« less
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Senate Special Committee on Aging.
This document contains six essays examining the history and impact of the social security program on America's economic and social development. "Social Security: The Cornerstone of American Social Welfare Policy," by Malcolm H. Morrison, presents brief background information on the system and discusses the basic principles of social…
42 CFR 457.340 - Application for and enrollment in a separate child health program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... understanding and completing applications and in obtaining any required documentation. (b) Use of social security number. A State may require a social security number for each individual requesting services... responsibilities. A State must inform applicants at the time of application, in writing and orally if appropriate...
A Basic Vocabulary of Federal Social Program Applications and Forms.
ERIC Educational Resources Information Center
Afflerbach, Peter P.; And Others
A study of the application forms for Social Security, Supplemental Security Income, public assistance, food stamps, Medicaid, and Medicare was conducted to examine the frequently occurring unfamiliar, specialized vocabulary words. It was found that 76 such words occurred at least ten times in the documents studied. A large number of other…
Input from Key Stakeholders in the National Security Technology Incubator
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.
Profiles of Food Security for US Farmworker Households and Factors Related to Dynamic of Change.
Ip, Edward H; Saldana, Santiago; Arcury, Thomas A; Grzywacz, Joseph G; Trejo, Grisel; Quandt, Sara A
2015-10-01
We recruited 248 farmworker families with preschool-aged children in North Carolina and examined food security indicators over 24 months to identify food security patterns and examine the dynamic of change over time. Participants in the Niños Sanos study, conducted 2011 to 2014, completed quarterly food security assessments. Based on responses to items in the US Household Food Security Survey Module, we identified different states of food security by using hidden Markov model analysis, and examined factors associated with different states. We delineated factors associated with changes in state by using mixed-effect ordinal logistic regression. About half of the households (51%) consistently stayed in the most food-secure state. The least food-secure state was transient, with only 29% probability of this state for 2 consecutive quarters. Seasonal (vs migrant) work status, having immigration documents (vs not documented), and season predicted higher levels of food security. Heterogeneity in food security among farmworker households calls for tailoring intervention strategies. The transiency and unpredictability of low food security suggest that access to safety-net programs could reduce low food security risk in this population.
Profiles of Food Security for US Farmworker Households and Factors Related to Dynamic of Change
Saldana, Santiago; Arcury, Thomas A.; Grzywacz, Joseph G.; Trejo, Grisel; Quandt, Sara A.
2015-01-01
Objectives. We recruited 248 farmworker families with preschool-aged children in North Carolina and examined food security indicators over 24 months to identify food security patterns and examine the dynamic of change over time. Methods. Participants in the Niños Sanos study, conducted 2011 to 2014, completed quarterly food security assessments. Based on responses to items in the US Household Food Security Survey Module, we identified different states of food security by using hidden Markov model analysis, and examined factors associated with different states. We delineated factors associated with changes in state by using mixed-effect ordinal logistic regression. Results. About half of the households (51%) consistently stayed in the most food-secure state. The least food-secure state was transient, with only 29% probability of this state for 2 consecutive quarters. Seasonal (vs migrant) work status, having immigration documents (vs not documented), and season predicted higher levels of food security. Conclusions. Heterogeneity in food security among farmworker households calls for tailoring intervention strategies. The transiency and unpredictability of low food security suggest that access to safety-net programs could reduce low food security risk in this population. PMID:26270304
10 CFR 850 Implementation of Requirements
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, S
2012-01-05
10 CFR 850 defines a contractor as any entity, including affiliated entities, such as a parent corporation, under contract with DOE, including a subcontractor at any tier, with responsibility for performing work at a DOE site in furtherance of a DOE mission. The Chronic Beryllium Disease Prevention Program (CBDPP) applies to beryllium-related activities that are performed at the Lawrence Livermore National Laboratory (LLNL). The CBDPP or Beryllium Safety Program is integrated into the LLNL Worker Safety and Health Program and, thus, implementation documents and responsibilities are integrated in various documents and organizational structures. Program development and management of the CBDPPmore » is delegated to the Environment, Safety and Health (ES&H) Directorate, Worker Safety and Health Functional Area. As per 10 CFR 850, Lawrence Livermore National Security, LLC (LLNS) periodically submits a CBDPP to the National Nuclear Security Administration/Livermore Site Office (NNSA/LSO). The requirements of this plan are communicated to LLNS workers through ES&H Manual Document 14.4, 'Working Safely with Beryllium.' 10 CFR 850 is implemented by the LLNL CBDPP, which integrates the safety and health standards required by the regulation, components of the LLNL Integrated Safety Management System (ISMS), and incorporates other components of the LLNL ES&H Program. As described in the regulation, and to fully comply with the regulation, specific portions of existing programs and additional requirements are identified in the CBDPP. The CBDPP is implemented by documents that interface with the workers, principally through ES&H Manual Document 14.4. This document contains information on how the management practices prescribed by the LLNL ISMS are implemented, how beryllium hazards that are associated with LLNL work activities are controlled, and who is responsible for implementing the controls. Adherence to the requirements and processes described in the ES&H Manual ensures that ES&H practices across LLNL are developed in a consistent manner. Other implementing documents, such as the ES&H Manual, are integral in effectively implementing 10 CFR 850.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grant, C W; Lenderman, J S; Gansemer, J D
This document is an update to the 'ADIS Algorithm Evaluation Project Plan' specified in the Statement of Work for the US-VISIT Identity Matching Algorithm Evaluation Program, as deliverable II.D.1. The original plan was delivered in August 2010. This document modifies the plan to reflect modified deliverables reflecting delays in obtaining a database refresh. This document describes the revised schedule of the program deliverables. The detailed description of the processes used, the statistical analysis processes and the results of the statistical analysis will be described fully in the program deliverables. The US-VISIT Identity Matching Algorithm Evaluation Program is work performed bymore » Lawrence Livermore National Laboratory (LLNL) under IAA HSHQVT-07-X-00002 P00004 from the Department of Homeland Security (DHS).« less
NASA Technical Reports Server (NTRS)
Logsdon, John M. (Editor); Day, Dwayne A. (Editor); Launius, Roger D. (Editor)
1996-01-01
The documents selected for inclusion in this volume are presented in three chapters, each covering a particular aspect of the evolution of U.S. space exploration. These chapters address (1) the relations between the civilian space program of the United States and the space activities of other countries, (2) the relations between the U.S. civilian space program and the space efforts of national security organizations and the military, and (3) NASA's relations with industry and academic institutions.
Exploring Public Health's roles and limitations in advancing food security in British Columbia.
Seed, Barbara A; Lang, Tim M; Caraher, Martin J; Ostry, Aleck S
2014-07-22
This research analyzes the roles and limitations of Public Health in British Columbia in advancing food security through the integration of food security initiatives into its policies and programs. It asks the question, can Public Health advance food security? If so, how, and what are its limitations? This policy analysis merges findings from 38 key informant interviews conducted with government and civil society stakeholders involved in the development of food security initiatives, along with an examination of relevant documents. The Population Health Template is used to delineate and analyze Public Health roles in food security. Public Health was able to advance food security in some ways, such as the adoption of food security as a core public health program. Public Health's leadership role in food security is constrained by a restricted mandate, limited ability to collaborate across a wide range of sectors and levels, as well as internal conflict within Public Health between Food Security and Food Protection programs. Public Health has a role in advancing food security, but it also faces limitations. As the limitations are primarily systemic and institutional, recommendations to overcome them are not simple but, rather, require movement toward embracing the determinants of health and regulatory pluralism. The results also suggest that the historic role of Public Health in food security remains salient today.
1992-10-09
PROGRAM CATALOG OF WAR GAMES 92-30805 U *3fl91\\k~o 9 2 SECURITY CLASSIFICATION OF THIS PAGE I ,i REPORT DOCUMENTATION PAGE la. REPORT SECURITY...4401 Ford Ave ELEMENT NO. NO. NO. ACCESSION NO. AIyxndriA. VA 229i2-14O1 --. 11. TITLE (Include Security Classification) Catalog of War Games 12...SCURITY CLASSIFICATiON OF THIS PAGE DECLARATION OF ACCORD 1. PURPOSE This catalog provides information on the primary war games , combat simulations
2006 Homeland Security Symposium and Exposition. Held in Arlington, VA on 29-31 March 2006
2006-03-31
Consequences , Vulnerabilities, and Threats) Prioritize Implement Protective Programs Measure Effectiveness 9March 2006 Major NIPP Theme: Sector Partnership... effect of exposure • Full understanding of the levels of exposure that mark the onset of miosis • Refined human operational exposure standard for GB...Untitled Document 2006 Homeland Security Symposium and Exposition.html[7/7/2016 11:38:26 AM] 2006 Homeland Security Symposium and Exposition
Hardened Reentry Vehicle Development Program. Erosion-Resistant Nosetip Technology
1978-01-01
Best Available Copy .- / L A- UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Data Enttered) _____________________ REPORT DOCUMENTATION PAGE...OF PAGES t Washington, D. C. 20305 3" TK~ 14 MONITORING AGENCY NAME a ADDRESfrif different troin Controllmng~ Office) IS. SECURITY CLA5--M~e7ry...tests indicate( 1 low probability of survival for DD IJAN 73 1473 EDITION OF I NOV 65 IS OBSOLETE UCASFE 41 -n0 SECURITY CLASSIFICATION OF THIS PAGE
Code of Federal Regulations, 2013 CFR
2013-04-01
... Name Record locator, if available; (xvi) International Air Transport Association (IATA) code of foreign... HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Aircraft Entry and Entry Documents...” includes each entity that is an “aircraft operator” or “foreign air carrier” with a security program under...
77 FR 52614 - Pre-Existing Condition Insurance Plan Program
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-30
...This document contains an amendment regarding program eligibility to the interim final regulation implementing the Pre- Existing Condition Plan program under provisions of the Patient Protection and Affordable Care Act. In light of a new process recently announced by the Department of Homeland Security, eligibility for the program is being amended so that the program does not inadvertently expand the scope of that process.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Modification of Two National Customs Automation Program (NCAP) Tests Concerning Automated Commercial Environment (ACE) Document Image System (DIS) and Simplified Entry (SE); Correction AGENCY: U.S. Customs and Border Protection, Department...
Fragmentation in social security old-age benefit provision in China.
Chen, Tianhong; Turner, John A
2015-01-01
Currently, in many countries most workers are covered by a national social security benefits program that applies equally in all parts of the country. In China, however, social security old-age benefits are provided in a highly fragmented manner. This article documents the high degree of fragmentation. It discusses both why that has occurred and the effects of the fragmentation on participants. It examines effects of the fragmentation on benefit levels, focusing on variations in the generosity of benefit formulas but also considering other measures of benefit adequacy. Fragmentation is seen to cause differences in benefit levels even within a single city. While the new National Rural Pension Scheme is a major improvement in the provision of retirement security for rural workers, important differences still exist in the social security programs for urban and rural workers.
Printable, scannable biometric templates for secure documents and materials
NASA Astrophysics Data System (ADS)
Cambier, James L.; Musgrave, Clyde
2000-04-01
Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.
77 FR 65395 - Air Cargo Advance Screening (ACAS) Pilot Program
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-26
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Air Cargo Advance Screening (ACAS) Pilot Program Correction In notice document 2012-26031 appearing on pages 65006-65009 in the issue of October 24, 2012 make the following correction: On page 65007, in the first column, under the...
Documents | Office of Marine and Aviation Operations
; Facilities Public & Legislative Affairs Publication Regulation Report Safety Security Specifications ) 2007 NOAA Diving Program Annual Report This report highlights the significant achievements of the NOAA Program, Office of Marine and Aviation Operation, Report Download from OMAO OMAO (2008) 2008 NOAA Diving
The Value of a Community College Education: A Preliminary Report.
ERIC Educational Resources Information Center
Coperthwaite, Corby A.
This document summarizes findings from an analysis of participants in Connecticut community college occupational programs conducted by the Department of Labor (DOL). The community colleges provided the DOL with files containing the social security numbers of all occupational program participants for an academic year. DOL then matched these files…
1990-10-15
Officer MOIE Program manager SSD/MSSB AFSTC/WCO OL-AB UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la . REPORT SECURITY...34 Metrologia , 9, 1973, pp. 107-112. 2. H. Hellwig, S. Jarvis, D. J. Glaze, D. Halford, and H. E. Bell, "Time domain velocity selection modulation as a
ERIC Educational Resources Information Center
Carson, Jessica A.
2015-01-01
This brief uses data from the 2013 Current Population Survey's Food Security Supplement to document levels of participation in two of the largest programs authorized by the Healthy, Hunger-Free Kids Act of 2010--the National School Lunch Program and the School Breakfast Program--by region and place type (rural, suburban, and city), to identify…
28 CFR 79.71 - Filing of claims.
Code of Federal Regulations, 2010 CFR
2010-07-01
... document or publications from the Assistant Director at that address or by accessing the Program's Web site... determination of the Social Security Administration that the person filing the claim is the spouse of the...
28 CFR 79.71 - Filing of claims.
Code of Federal Regulations, 2011 CFR
2011-07-01
... document or publications from the Assistant Director at that address or by accessing the Program's Web site... determination of the Social Security Administration that the person filing the claim is the spouse of the...
Advanced Simulation and Computing Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rummel, E.
To maintain a credible nuclear weapons program, the National Nuclear Security Administration’s (NNSA’s) Office of Defense Programs (DP) needs to make certain that the capabilities, tools, and expert staff are in place and are able to deliver validated assessments. This requires a complete and robust simulation environment backed by an experimental program to test ASC Program models. This ASC Business Plan document encapsulates a complex set of elements, each of which is essential to the success of the simulation component of the Nuclear Security Enterprise. The ASC Business Plan addresses the hiring, mentoring, and retaining of programmatic technical staff responsiblemore » for building the simulation tools of the nuclear security complex. The ASC Business Plan describes how the ASC Program engages with industry partners—partners upon whom the ASC Program relies on for today’s and tomorrow’s high performance architectures. Each piece in this chain is essential to assure policymakers, who must make decisions based on the results of simulations, that they are receiving all the actionable information they need.« less
Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals
NASA Astrophysics Data System (ADS)
Houdeau, Detlef
The first implementation of biometric documents, called biometric passports, based on a regulation is running, the second implementation since end of CY 2008 is coming to Europe. The focus is on persons staying for business, study or leisure for more than 3 months in Europe and coming from a state outside Europe and not being a member of the Visa-Waiver-Program of the EU. This second wave increases the demand for the security industry for certified security microcontroller chips, secure smart cards, readers and supporting infrastructure on top of the biometric Passport business. It underlines the continuing advance of contactless identification technology in the public sector. The article gives an overview on the application, the technology, the EU regulation, the EU roadmap and the implementations.
Roadmap to a Sustainable Structured Trusted Employee Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coates, Cameron W; Eisele, Gerhard R
2013-08-01
Organizations (facility, regulatory agency, or country) have a compelling interest in ensuring that individuals who occupy sensitive positions affording access to chemical biological, radiological and nuclear (CBRN) materials facilities and programs are functioning at their highest level of reliability. Human reliability and human performance relate not only to security but also focus on safety. Reliability has a logical and direct relationship to trustworthiness for the organization is placing trust in their employees to conduct themselves in a secure, safe, and dependable manner. This document focuses on providing an organization with a roadmap to implementing a successful and sustainable Structured Trustedmore » Employee Program (STEP).« less
UV Detector Materials Development Program
1981-12-01
document. UNCLASSIFIED SECURITY CLASSIFICATION OF THIr odkE ’Whe Date Entered) READ INSTRUCTIONS REPORT DOCUMENTATION PAGE BEFORE COMPLETING FORM 1... collection efficiency within the detector (internal quantum efficiency). As mentioned previously, it was found that reverse biasing the Schottky diodes...the ratio of the number of carriers collected in the detector versus the number of photons entering into the absorbing region. It is, therefore
LCS Content Document Application
NASA Technical Reports Server (NTRS)
Hochstadt, Jake
2011-01-01
My project at KSC during my spring 2011 internship was to develop a Ruby on Rails application to manage Content Documents..A Content Document is a collection of documents and information that describes what software is installed on a Launch Control System Computer. It's important for us to make sure the tools we use everyday are secure, up-to-date, and properly licensed. Previously, keeping track of the information was done by Excel and Word files between different personnel. The goal of the new application is to be able to manage and access the Content Documents through a single database backed web application. Our LCS team will benefit greatly with this app. Admin's will be able to login securely to keep track and update the software installed on each computer in a timely manner. We also included exportability such as attaching additional documents that can be downloaded from the web application. The finished application will ease the process of managing Content Documents while streamlining the procedure. Ruby on Rails is a very powerful programming language and I am grateful to have the opportunity to build this application.
1992-10-16
The Spread of Viruses Programs have been developed to attack some of these problems , primarily in the virus arena. Pick up any PC magazine and you...a particular DBMS-specific research area. These documents discuss the research problem , present an overview of relevant research and development ...MITRE has developed to date and a brief discussion those documents currently under development . For each companion document, the problem being
Accelerator-driven Medical Sterilization to Replace Co-60 Sources
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kroc, Thomas K.; Thangaraj, Jayakar C.T.; Penning, Richard T.
This report documents the results of a study prepared at the request of the Office of Radiological Security of the National Nuclear Security Administration (NNSA), as part of the Domestic Protect and Reduce mission by the Illinois Accelerator Research Center (IARC) of Fermi National Accelerator Laboratory. The study included a literature survey of over 80 relevant documents and articles including industry standards, regulatory documents, technical papers, a court case, previous task force reports and industry white papers. The team also conducted interviews or had conversations with over 40 individuals representing over a dozen organizations over the course of its 10-monthmore » program. This report summarizes our findings, addresses the specific questions posed to us by NNSA, and concludes with a list of actionable recommendations.« less
Kirtland Operations progress report, April--June 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Kirtland Operations (KO) is an integral part of EG G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy's (DOE's) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia's weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to othermore » federal agencies, primarily in weapons testing and safeguards. This report documents our support to these programs from April to June 1991.« less
Kirtland Operations progress report, October--December 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Kirtland Operations (KO) is an integral part of EG G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy's (DOE's) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia's weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to othermore » federal agencies, primarily in weapons testing and safeguards. This report documents our support to these programs from October to December 1991.« less
9 CFR 381.309 - Finished product inspection.
Code of Federal Regulations, 2012 CFR
2012-01-01
... alternative documented procedures for handling process deviations. (1) Incubation of shelf stable canned product—(i) Incubator. The establishment shall provide incubation facilities which include an accurate... the facility. The Program is responsible for the security of the incubator. (ii) Incubation...
9 CFR 381.309 - Finished product inspection.
Code of Federal Regulations, 2013 CFR
2013-01-01
... alternative documented procedures for handling process deviations. (1) Incubation of shelf stable canned product—(i) Incubator. The establishment shall provide incubation facilities which include an accurate... the facility. The Program is responsible for the security of the incubator. (ii) Incubation...
9 CFR 381.309 - Finished product inspection.
Code of Federal Regulations, 2014 CFR
2014-01-01
... alternative documented procedures for handling process deviations. (1) Incubation of shelf stable canned product—(i) Incubator. The establishment shall provide incubation facilities which include an accurate... the facility. The Program is responsible for the security of the incubator. (ii) Incubation...
46 CFR 503.57 - Mandatory review for declassification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 503.57 Shipping FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security Program § 503.57 Mandatory review for declassification. (a) Information originally... describes the documents or material containing the information with sufficient specificity to enable the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-14
... & Renewable Energy, Fossil Energy, and Nuclear Energy--a set of programs with an annual collected budget of... enhance energy and national security, reduce environmental impacts, and increase U.S. competitiveness. B...
"Something good can grow here": chicago urban agriculture food projects.
Hatchett, Lena; Brown, Loretta; Hopkins, Joan; Larsen, Kelly; Fournier, Eliza
2015-01-01
Food security is a challenge facing many African-American low-income communities nationally. Community and university partners have established urban agriculture programs to improve access to high quality affordable fruits and vegetables by growing, distributing, and selling food in urban neighborhoods. While the challenge of food security is within communities of color, few studies have described these urban agriculture programs and documented their impact on the crew members who work in the programs and live in the low-income communities. More information is needed on the program impact for crew and community health promotion. Using a survey and focus group discussion from the crew and staff we describe the program and activities of four Chicago Urban Agriculture programs. We summarized the impact these programs have on crew members' perception of urban agriculture, health habits, community engagement, and community health promotion in low-income African-American neighborhoods.
In acceptance we trust? Conceptualising acceptance as a viable approach to NGO security management.
Fast, Larissa A; Freeman, C Faith; O'Neill, Michael; Rowley, Elizabeth
2013-04-01
This paper documents current understanding of acceptance as a security management approach and explores issues and challenges non-governmental organisations (NGOs) confront when implementing an acceptance approach to security management. It argues that the failure of organisations to systematise and clearly articulate acceptance as a distinct security management approach and a lack of organisational policies and procedures concerning acceptance hinder its efficacy as a security management approach. The paper identifies key and cross-cutting components of acceptance that are critical to its effective implementation in order to advance a comprehensive and systematic concept of acceptance. The key components of acceptance illustrate how organisational and staff functions affect positively or negatively an organisation's acceptance, and include: an organisation's principles and mission, communications, negotiation, programming, relationships and networks, stakeholder and context analysis, staffing, and image. The paper contends that acceptance is linked not only to good programming, but also to overall organisational management and structures. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.
B. Loth; R.P. Karrfalt
2017-01-01
The U.S. Department of Agriculture Forest Service (USDA FS) National Seed Laboratory (NSL) began long term seed storage for genetic conservation, in 2005, for USDA FS units and cooperators. This program requires secure storage of both seeds and the data documenting the identification of the seeds. The Agricultural Research Service (ARS) has provided both of these...
Kirtland Operations progress report, October--December 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Kirtland Operations (KO) is an integral part of EG&G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy`s (DOE`s) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia`s weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to other federalmore » agencies, primarily in weapons testing and safeguards. This report documents our support to these programs from October to December 1991.« less
Kirtland Operations progress report, April--June 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Kirtland Operations (KO) is an integral part of EG&G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy`s (DOE`s) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia`s weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to other federalmore » agencies, primarily in weapons testing and safeguards. This report documents our support to these programs from April to June 1991.« less
Nevada National Security Site Radiation Protection Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
none,
2013-04-30
Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statementsmore » that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.« less
Test and Evaluation Enhancements for Cognitive Radio Technologies
2015-05-13
SECURITY CLASSIFICATION OF: This document serves as the final report for the Department of Defense (DoD) Research and Education Program for...report will described the instrumentation and the integration into the academic and research programs . All instrumentation has been procured, delivered...UNIT NUMBER 5c. PROGRAM ELEMENT NUMBER 5b. GRANT NUMBER 5a. CONTRACT NUMBER Form Approved OMB NO. 0704-0188 3. DATES COVERED (From - To) - UU UU UU UU
Kirtland Operations progress report, January--March 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
Kirtland Operations (KO) is an integral part of EG G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy's (DOE's) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia's weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to othermore » federal agencies, primarily in weapons testing and safeguards. This report documents our support to these porgrams from January to March 1991.« less
17 CFR 75.20 - Program for compliance; reporting.
Code of Federal Regulations, 2014 CFR
2014-04-01
... two calendar years shall maintain records that include: (1) Documentation of the exclusions or...; reporting. 75.20 Section 75.20 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... (a) of this section, at a minimum, shall include: (1) Written policies and procedures reasonably...
An updated look at document security: from initiation to storage or shredder.
McConnell, Charles R
2014-01-01
In these days of close attention to security of information handled electronically, there is often a tendency to overlook the security of hard-copy documents. Document security can involve many areas of business, but the health care department manager's concerns are primarily for patient records and employee documentation. Document security is closely related to growing concerns for individual privacy; guidelines are furnished for protecting employee privacy by separating retention practices for business information from personal information. Sensitive documentation requires rules and procedures for processing, retaining, accessing, storing, and eventually destroying. Also, documents that are missing or incomplete at times present unique problems for the organization. The department manager is provided with some simple rules for safeguarding employee and patient documentation.
2009-04-01
09 COL Kevin Peterson Principal Deputy Program Manager Joint MRAP Vehicle Program 17 MRAP Variant Overview FP COUGAR CAT I (FPII CAT I) MaxxPro BAE...distribution unlimited 13. SUPPLEMENTARY NOTES Presented at the TTCP LND TP3 Annual Meeting and Task Workshop Manned and Unmanned Ground Vehicle Systems, 23...28 April 2009, Suffield, Alberta, Canada, The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY
44 CFR 302.3 - Documentation of eligibility.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS CIVIL DEFENSE-STATE AND LOCAL EMERGENCY MANAGEMENT ASSISTANCE... administrative plan, an emergency operations plan for civil defense, and an annual submission (including a... national plan (i.e., program) for civil defense and as meeting the requirements of the regulations in this...
44 CFR 302.3 - Documentation of eligibility.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS CIVIL DEFENSE-STATE AND LOCAL EMERGENCY MANAGEMENT ASSISTANCE... administrative plan, an emergency operations plan for civil defense, and an annual submission (including a... national plan (i.e., program) for civil defense and as meeting the requirements of the regulations in this...
44 CFR 302.3 - Documentation of eligibility.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS CIVIL DEFENSE-STATE AND LOCAL EMERGENCY MANAGEMENT ASSISTANCE... administrative plan, an emergency operations plan for civil defense, and an annual submission (including a... national plan (i.e., program) for civil defense and as meeting the requirements of the regulations in this...
44 CFR 302.3 - Documentation of eligibility.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS CIVIL DEFENSE-STATE AND LOCAL EMERGENCY MANAGEMENT ASSISTANCE... administrative plan, an emergency operations plan for civil defense, and an annual submission (including a... national plan (i.e., program) for civil defense and as meeting the requirements of the regulations in this...
44 CFR 302.3 - Documentation of eligibility.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS CIVIL DEFENSE-STATE AND LOCAL EMERGENCY MANAGEMENT ASSISTANCE... administrative plan, an emergency operations plan for civil defense, and an annual submission (including a... national plan (i.e., program) for civil defense and as meeting the requirements of the regulations in this...
Connected vehicle pilot deployment program phase 2 : data privacy plan – New York City.
DOT National Transportation Integrated Search
2016-12-27
This document represents a data privacy plan for ensuring the data privacy and security of those participating in the New York City connected vehicle pilot. Personally Identifiable Information (PII) and Sensitive PII (SPII) will be collected from var...
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Banking and Financial Services.
This document presents testimony from the June 1998 hearing on the Children's Development Act (H.R. 3637) held before the Subcommittee on Capital Markets, Securities and Government Sponsored Enterprises. H.R. 3637 encourages the lending of resources to child care facilities by allowing a bank or lender access to a federal reinsurance program that…
1980-04-01
P 114 June 1978 Mr. W. Douglas Wright *Wiley and Wilson, Inc. 2310 Langhorne Road ’ :5 1973 Lvnchburg, Virginia 24505 & LSON, INC. LYNCHF.U1G. VA. Dv...CLASSIFICATION OF THIS P Dat Entered)’ " ’ READ INSTRUCTIO)NS REPORT DOCUMENTATION PAGE BEFORE COMPLETING FORM . REPORT NUMBER - 12. GOVT ACCESSION...OBSOLETE Unclassified -SECUnclassified OI P nd SECURITY CLASSIFICATION OF THIS PAGE (Wfen Dis Entered) SECURITY CLASSIFICATION OF INIS PAOE(Whe Data
78 FR 31555 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
... mitigate adverse selection and provide stability for health insurance issuers in the individual and small... State Children's Health Insurance Programs, Title XXI of the Social Security Act, established by the... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Medicare & Medicaid Services [Document...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2008-0022... Preparedness Program Manual AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice of availability. SUMMARY: The Federal Emergency Management Agency (FEMA) is issuing two final guidance documents...
6 CFR 7.29 - Documents of permanent historical value.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Documents of permanent historical value. 7.29 Section 7.29 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLASSIFIED NATIONAL SECURITY INFORMATION Classified Information § 7.29 Documents of permanent historical value. The...
Technology Program Management Model (TPMM) Overview
2006-05-10
1 1 “Secure the High Ground” Jeff Craver Project Manager Space and Missile Defense Technical Center Jeff.Craver@US.Army.Mil ff r r r j t r i il...f i l t r ff. r r . r . il UNCLASSIFIED UNCLASSIFIED Technology Program Management Model (TPMM) Overview 05-10-2006 Report Documentation Page Form...DATES COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Technology Program Management Model (TPMM) Overview 5a. CONTRACT NUMBER 5b. GRANT
Wind Factor Simulation Model: User’s Manual.
1980-04-01
computer program documentation; com- puterized simulation; equivalent headwind technique; great circle; great circle distance; great circle equation ; great... equation of a great circle. Program listing and flow chart are included. iv UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE(WIh.n Date EnItrd) USER’S...THE EQUATOR . 336 C 337 NTRIFG = 0 338 C 339 C END OF FUNCTION ICONV I 1. RETURN TO MAIN PROGRAM . 340 C 42 341 RETURN 34? C 343 C 344 C 345 C * PART II
Evaluating Realized Impacts of DOE/EERE R&D Programs. Standard impact evaluation method
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ruegg, Rosalie; O'Connor, Alan C.; Loomis, Ross J.
2014-08-01
This document provides guidance for evaluators who conduct impact assessments of research and development (R&D) programs for the U.S. Department of Energy’s (DOE) Office of Energy Efficiency and Renewable Energy (EERE). It is also targeted at EERE program staff responsible for initiating and managing commissioned impact studies. The guide specifies how to estimate economic benefits and costs, energy saved and installed or generated, environmental impacts, energy security impacts, and knowledge impacts of R&D investments in advanced energy technologies.
Security Policy for a Generic Space Exploration Communication Network Architecture
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.
2016-01-01
This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.
75 FR 71136 - Public Meetings of National Flood Insurance Program (NFIP) Reform Effort; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-22
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2010-0065... Emergency Management Agency, DHS. ACTION: Announcement of Public Meetings; correction. SUMMARY: The Federal Emergency Management Agency (FEMA) published a document in the Federal Register on November 10, 2010 (75 FR...
28 CFR 0.111B - Witness Security Program.
Code of Federal Regulations, 2010 CFR
2010-07-01
... tracking of such persons; and (8) Exempt procurement for services, materials, and supplies, and the... the Director knows or the request indicates that the person is under investigation for or has been... Marshals Service designated by the Director may: (1) Provide suitable documents to enable the person to...
Military Manpower Training Report for FY 1976.
ERIC Educational Resources Information Center
Office of the Assistant Secretary of Defense for Manpower and Reserve Affairs (DOD), Washington, DC.
The document presents anticipated needs and costs for training military personnel in FY 1976, based on national security objectives. Training loads for each of the following categories are presented with supporting tables: (1) recruit training, (2) officer acquisition training, (3) specialized skill training, (4) flight training programs, and (5)…
Optical security features for plastic card documents
NASA Astrophysics Data System (ADS)
Hossick Schott, Joachim
1998-04-01
Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.
Jahn, Michelle A; Porter, Brian W; Patel, Himalaya; Zillich, Alan J; Simon, Steven R; Russ, Alissa L
2018-04-01
Web-based patient portals feature secure messaging systems that enable health care providers and patients to communicate information. However, little is known about the usability of these systems for clinical document sharing. This article evaluates the usability of a secure messaging system for providers and patients in terms of its ability to support sharing of electronic clinical documents. We conducted usability testing with providers and patients in a human-computer interaction laboratory at a Midwestern U.S. hospital. Providers sent a medication list document to a fictitious patient via secure messaging. Separately, patients retrieved the clinical document from a secure message and returned it to a fictitious provider. We collected use errors, task completion, task time, and satisfaction. Twenty-nine individuals participated: 19 providers (6 physicians, 6 registered nurses, and 7 pharmacists) and 10 patients. Among providers, 11 (58%) attached and sent the clinical document via secure messaging without requiring assistance, in a median (range) of 4.5 (1.8-12.7) minutes. No patients completed tasks without moderator assistance. Patients accessed the secure messaging system within 3.6 (1.2-15.0) minutes; retrieved the clinical document within 0.8 (0.5-5.7) minutes; and sent the attached clinical document in 6.3 (1.5-18.1) minutes. Although median satisfaction ratings were high, with 5.8 for providers and 6.0 for patients (scale, 0-7), we identified 36 different use errors. Physicians and pharmacists requested additional features to support care coordination via health information technology, while nurses requested features to support efficiency for their tasks. This study examined the usability of clinical document sharing, a key feature of many secure messaging systems. Our results highlight similarities and differences between provider and patient end-user groups, which can inform secure messaging design to improve learnability and efficiency. The observations suggest recommendations for improving the technical aspects of secure messaging for clinical document sharing. Schattauer GmbH Stuttgart.
17 CFR 200.507 - Declassification dates on derivative documents.
Code of Federal Regulations, 2011 CFR
2011-04-01
... derivative documents. 200.507 Section 200.507 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... of National Security Information and Material § 200.507 Declassification dates on derivative... derivative document that derives its classification from the approved use of the classification guide of...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leigh, Richard J.
2012-09-01
The Electronic Maintenance Report forms allow Local Maintenance Providers (LMP) and other program staff to enter maintenance information into a simple and secure system. This document describes the features and information required to complete the Maintenance Report forms. It is expected that all Corrective Maintenance Reports from LMPs will be submitted electronically into the SLD Portal. As an exception (e.g., when access to the SLD Portal is unavailable), Maintenance Reports can be submitted via a secure Adobe PDF form available through the Sustainability Manager assigned to each country.
Code of Federal Regulations, 2012 CFR
2012-01-01
... farmer-creditor mediation program; and (3) Not agree to any proposals to rewrite the terms of a... action will be pursued. If the lender does not pursue the recovery, the reason must be documented when an... recovery value of the security as defined in § 762.102. The appraisal requirement may be waived by the...
Code of Federal Regulations, 2013 CFR
2013-01-01
... farmer-creditor mediation program; and (3) Not agree to any proposals to rewrite the terms of a... action will be pursued. If the lender does not pursue the recovery, the reason must be documented when an... recovery value of the security as defined in § 762.102. The appraisal requirement may be waived by the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... farmer-creditor mediation program; and (3) Not agree to any proposals to rewrite the terms of a... action will be pursued. If the lender does not pursue the recovery, the reason must be documented when an... recovery value of the security as defined in § 762.102. The appraisal requirement may be waived by the...
76 FR 48101 - Petition for Approval of Alternate; Odometer Disclosure Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-08
... power of attorney. In addition, Florida's proposed program would use different mechanisms to document... licensing of vehicles, for use in any State, unless the title issued to the transferee is printed using a... permit the use of a secure power of attorney for purposes of odometer mileage disclosure in circumstances...
78 FR 51192 - Secure Supply Chain Pilot Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-20
... (PDF) and using the Electronic Common Technical Document (eCTD) format and the Electronic Submissions.... The PDF file name should contain ``3676'' as part of the file name, and the eCTD leaf title should.... For further information regarding eCTD, please refer to the Web site at http://www.fda.gov/Drugs...
Food security practice in Kansas schools and health care facilities.
Yoon, Eunju; Shanklin, Carol W
2007-02-01
This pilot study investigated perceived importance and frequency of specific preventive measures, and food and nutrition professionals' and foodservice directors' willingness to develop a food defense management plan. A mail questionnaire was developed based on the US Department of Agriculture document, Biosecurity Checklist for School Foodservice Programs--Developing a Biosecurity Management Plan. The survey was sent to food and nutrition professionals and foodservice operators in 151 acute care hospitals, 181 long-term-care facilities, and 450 school foodservice operations. Chemical use and storage was perceived as the most important practice to protect an operation and was the practice implemented most frequently. Results of the study indicate training programs on food security are needed to increase food and nutrition professionals' motivation to implement preventive measures.
Protecting computer-based medical devices: defending against viruses and other threats.
2005-07-01
The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.
1984-09-01
records/documents in the division *- are quantitative in nature and are contained in computer printouts. Other documents include daily transactions docu...1498-1830). Venezuela was discovered by Christopher Columbus during his third voyage to the new world in 1498 (25:2). He was intrigued by pearl...maintain control, trade with other countries was forbidden and resulted in the colony’s isolation for most of *O its early existence. News of the new
Evans, William D [Cupertino, CA
2009-02-24
A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
...; Secondary Examination Status, and License Plate number (or Vehicle Identification Number (VIN), if no plate... License Plate number of the conveyance (or VIN number when no plate exists). Under the Entry/Exist Program... Driver's License (EDL); (5) another Federal Agency that has issued a valid travel document, such as...
2012-08-01
This document contains color. 14. ABSTRACT This effort focused specifically on the Liquid Composite Molding (LCM) class of processes as they...SUBJECT TERMS Liquid Composite Molding (LCM), fabrication, manufacturability assessment 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF... Molding (LCM) .......................................................................... 2 1.1.1 LCM Process Variations
Code of Federal Regulations, 2011 CFR
2011-10-01
... behalf of it and other indirect air carriers that co-sign the proposal. (1) Within 30 calendar days after... accomplished by personal delivery, certified mail, or express courier. Documents served on an indirect air... personal delivery; (ii) If served by certified mail, the mailing date shown on the certificate of service...
Finding Edges and Lines in Images.
1983-06-01
34 UNCLASSI FlED , SECURITY CLASSIFICATION OF THIS PAGE ("osen Data Entered) READ INSTRUCTIONSREPORT DOCUMENTATION PAGE BEFORE COMPLETING FORM I. REPORT...PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMENT. PROJECT. TASK Artificial Intelligence Laboratory AREA&WORKUNITNUMBERS 545 Technology Square...in the Artificial Intelligence Laboratory of the Massachusetts Institute of Technology. Support for the laboratory’s artificial intelligence research
Complexity Bounds for Quantum Computation
2007-06-22
Programs Trustees of Boston University Boston, MA 02215 - Complexity Bounds for Quantum Computation REPORT DOCUMENTATION PAGE 18. SECURITY CLASSIFICATION...Complexity Bounds for Quantum Comp[utation Report Title ABSTRACT This project focused on upper and lower bounds for quantum computability using constant...classical computation models, particularly emphasizing new examples of where quantum circuits are more powerful than their classical counterparts. A second
17 CFR 200.507 - Declassification dates on derivative documents.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Declassification dates on derivative documents. 200.507 Section 200.507 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... of National Security Information and Material § 200.507 Declassification dates on derivative...
Improved Optical Document Security Techniques Based on Volume Holography and Lippmann Photography
NASA Astrophysics Data System (ADS)
Bjelkhagen, Hans I.
Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, ID cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is need for a higher degree of security on such documents and this chapter covers new techniques to make improved mass-produced or personalized OVDs.
Web Application Software for Ground Operations Planning Database (GOPDb) Management
NASA Technical Reports Server (NTRS)
Lanham, Clifton; Kallner, Shawn; Gernand, Jeffrey
2013-01-01
A Web application facilitates collaborative development of the ground operations planning document. This will reduce costs and development time for new programs by incorporating the data governance, access control, and revision tracking of the ground operations planning data. Ground Operations Planning requires the creation and maintenance of detailed timelines and documentation. The GOPDb Web application was created using state-of-the-art Web 2.0 technologies, and was deployed as SaaS (Software as a Service), with an emphasis on data governance and security needs. Application access is managed using two-factor authentication, with data write permissions tied to user roles and responsibilities. Multiple instances of the application can be deployed on a Web server to meet the robust needs for multiple, future programs with minimal additional cost. This innovation features high availability and scalability, with no additional software that needs to be bought or installed. For data governance and security (data quality, management, business process management, and risk management for data handling), the software uses NAMS. No local copy/cloning of data is permitted. Data change log/tracking is addressed, as well as collaboration, work flow, and process standardization. The software provides on-line documentation and detailed Web-based help. There are multiple ways that this software can be deployed on a Web server to meet ground operations planning needs for future programs. The software could be used to support commercial crew ground operations planning, as well as commercial payload/satellite ground operations planning. The application source code and database schema are owned by NASA.
Small Technology Business Incubation Needs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report contains a summary of typical business incubation needs of small technology companies. This document will serve as a guide in the design and implementation of services offered by the National Security Technology Incubator (NSTI), an incubator program being designed and developed as part of the National Security Preparedness Project (NSPP), performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the methodology used to perform the needs assessment and services proposed to meet the needs of client companies. The purpose of the NSPP is to promote national security technologiesmore » through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland.« less
17 CFR 270.8b-24 - Summaries or outlines of documents.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Summaries or outlines of documents. 270.8b-24 Section 270.8b-24 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... statement shall be made, in succinct and condensed form, as to the most important provisions of the document...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... Document issued under 46 U.S.C., chapter 73, or a transportation security card issued under section 70105.... Merchant Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued... Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued under...
Ninth Semiannual Report of the Commission to the Congress, July - December 1950. January 1951
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dean, Gordon; Glennan, T. Keith; Murray, Thomas E.
1951-01-31
The document represents the ninth semiannual Atomic Energy Commission (AEC) report to Congress. The report sums up the major activities and developments in the national atomic energy program. This ninth report gives a summary of the year's program operations insofar as they can be reported within the limits of national security. It provides as well a brief review of the methods which the Commission follows in contracting with industries, research institutions, and with universities and colleges for the carrying on of the many phases of the national atomic energy program.
Information Security Program Regulation
1986-06-01
above. When an alarmed area is used for the storage of Top Secret material, the physical barrier must be adequate to prevent (a) surreptitious removal ...IV-9 4-304 Removable ADP and Word Processing Storage Media ---------- IV-10 4-305 Documents Produced by ADP Equipment...with a removal or cancellation of the classification designation. 1-315 Declassification Event An event that eliminates the need for continued
Onsite transportation of radioactive materials at the Savannah River Site
DOE Office of Scientific and Technical Information (OSTI.GOV)
Watkins, R.
The Savannah River Site (SRS) Transportation Safety Document (TSD) defines the onsite packaging and transportation safety program at SRS and demonstrates its compliance with Department of Energy (DOE) transportation safety requirements, to include DOE Order 460.1C, DOE Order 461.2, Onsite Packaging and Transfer of Materials of National Security Interest, and 10 CFR 830, Nuclear Safety Management (Subpart B).
COST EFFECTIVE AND HIGH RESOLUTION SUBSURFACE CHARACTERIZATION USING HYDRAULIC TOMOGRAPHY
2017-08-01
FINAL REPORT Cost -Effective and High-Resolution Subsurface Characterization Using Hydraulic Tomography ESTCP Project ER-201212 AUGUST...This document has been cleared for public release Page Intentionally Left Blank This report was prepared under contract to the Department of...Defense Environmental Security Technology Certification Program (ESTCP). The publication of this report does not indicate endorsement by the Department
DOD/COCOM Water Security Program Strategy Document
2011-04-22
in alignment with USG foreign policy objectives? The following discussion and appendices provide a framework to facilitate this process for DOD...USG foreign policy objectives? The following discussion and appendices provide a framework to facilitate this process for DOD. DOD/COCOM Water...technology, etc. Because water resources often cross political boundaries on a regional scale, focusing water scarcity initiatives on this level
Child Support Enforcement Amendments of 1984. Public Law 98-378.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC.
This document is the text of Public Law 98-378, the Child Support Enforcement Amendments of 1984. The act amends part D of title IV of the Social Security Act to assure, through mandatory income withholding, incentive payments to states, and other improvements in the child support enforcement program, that all children in the United States who are…
Implementation of Medical Information Exchange System Based on EHR Standard
Han, Soon Hwa; Kim, Sang Guk; Jeong, Jun Yong; Lee, Bi Na; Choi, Myeong Seon; Kim, Il Kon; Park, Woo Sung; Ha, Kyooseob; Cho, Eunyoung; Kim, Yoon; Bae, Jae Bong
2010-01-01
Objectives To develop effective ways of sharing patients' medical information, we developed a new medical information exchange system (MIES) based on a registry server, which enabled us to exchange different types of data generated by various systems. Methods To assure that patient's medical information can be effectively exchanged under different system environments, we adopted the standardized data transfer methods and terminologies suggested by the Center for Interoperable Electronic Healthcare Record (CIEHR) of Korea in order to guarantee interoperability. Regarding information security, MIES followed the security guidelines suggested by the CIEHR of Korea. This study aimed to develop essential security systems for the implementation of online services, such as encryption of communication, server security, database security, protection against hacking, contents, and network security. Results The registry server managed information exchange as well as the registration information of the clinical document architecture (CDA) documents, and the CDA Transfer Server was used to locate and transmit the proper CDA document from the relevant repository. The CDA viewer showed the CDA documents via connection with the information systems of related hospitals. Conclusions This research chooses transfer items and defines document standards that follow CDA standards, such that exchange of CDA documents between different systems became possible through ebXML. The proposed MIES was designed as an independent central registry server model in order to guarantee the essential security of patients' medical information. PMID:21818447
Implementation of Medical Information Exchange System Based on EHR Standard.
Han, Soon Hwa; Lee, Min Ho; Kim, Sang Guk; Jeong, Jun Yong; Lee, Bi Na; Choi, Myeong Seon; Kim, Il Kon; Park, Woo Sung; Ha, Kyooseob; Cho, Eunyoung; Kim, Yoon; Bae, Jae Bong
2010-12-01
To develop effective ways of sharing patients' medical information, we developed a new medical information exchange system (MIES) based on a registry server, which enabled us to exchange different types of data generated by various systems. To assure that patient's medical information can be effectively exchanged under different system environments, we adopted the standardized data transfer methods and terminologies suggested by the Center for Interoperable Electronic Healthcare Record (CIEHR) of Korea in order to guarantee interoperability. Regarding information security, MIES followed the security guidelines suggested by the CIEHR of Korea. This study aimed to develop essential security systems for the implementation of online services, such as encryption of communication, server security, database security, protection against hacking, contents, and network security. The registry server managed information exchange as well as the registration information of the clinical document architecture (CDA) documents, and the CDA Transfer Server was used to locate and transmit the proper CDA document from the relevant repository. The CDA viewer showed the CDA documents via connection with the information systems of related hospitals. This research chooses transfer items and defines document standards that follow CDA standards, such that exchange of CDA documents between different systems became possible through ebXML. The proposed MIES was designed as an independent central registry server model in order to guarantee the essential security of patients' medical information.
ERIC Educational Resources Information Center
National Crime Prevention Centre, Ottawa (Ontario).
This document presents a policy framework for improving the personal security of women and girls. The document includes: (1) "Introduction"; (2) "Policy Background" (the concept of personal security, the societal context of women's personal security, consequences of violence for women and girls, long-term policy concern, and…
17 CFR 240.15g-2 - Penny stock disclosure document relating to the penny stock market.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Penny stock disclosure document relating to the penny stock market. 240.15g-2 Section 240.15g-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bretzke, John C.
The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed tomore » a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.« less
Cyber Security and Resilient Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson
2009-07-01
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.« less
Data to DecisionsTerminate, Tolerate, Transfer, or Treat
2016-07-25
and patching, a risk-based cyber - security decision model that enables a pre- dictive capability to respond to impending cyber -attacks is needed...States. This sensitive data includes business proprietary information on key programs of record and infrastructure, including government documents at...leverage nationally. The Institute for Defense Analyses (IDA) assisted the DoD CIO in formalizing a proof of concept for cyber initiatives and
Preparing for War: The Structure and Conduct of Peacetime Maneuvers
2013-06-01
today.8 Documents such as Army TRADOC 525 series pamphlets and the current National Security Strategy will be examined to determine scenarios the...conduct training exercises.10 TRADOC Pamphlet 525-3-0, The Army Capstone Concept, Operational Adaptability: Operations under Conditions of Uncertainty...intermediate objectives to achieve long range goals, this base force provides the planning foundation for program requirements.it 11 TRADOC Pamphlet
Code of Federal Regulations, 2013 CFR
2013-04-01
... of obligations. Example 2. B operates a program to make loans to small businesses. Depending on the... terms and conditions. For accounting purposes, B classifies the two types of loans as a single class... lender on the loan documents and whose right to receive payment from the payor of record is secured by...
Code of Federal Regulations, 2012 CFR
2012-04-01
... of obligations. Example 2. B operates a program to make loans to small businesses. Depending on the... terms and conditions. For accounting purposes, B classifies the two types of loans as a single class... lender on the loan documents and whose right to receive payment from the payor of record is secured by...
Code of Federal Regulations, 2014 CFR
2014-04-01
... of obligations. Example 2. B operates a program to make loans to small businesses. Depending on the... terms and conditions. For accounting purposes, B classifies the two types of loans as a single class... lender on the loan documents and whose right to receive payment from the payor of record is secured by...
Code of Federal Regulations, 2011 CFR
2011-04-01
... of obligations. Example 2. B operates a program to make loans to small businesses. Depending on the... terms and conditions. For accounting purposes, B classifies the two types of loans as a single class... lender on the loan documents and whose right to receive payment from the payor of record is secured by...
[Important issues of biological safety].
Onishchenko, G G
2007-01-01
The problem of biological security raises alarm due to the real growth of biological threats. Biological security includes a wide scope of problems, the solution of which becomes a part of national security as a necessary condition for the constant development of the country. A number of pathogens, such as human immunodeficiency virus, exotic Ebola and Lassa viruses causing hemorrhagic fever,rotaviruses causing acute intestinal diseases, etc. were first discovered in the last century. Terrorist actions committed in the USA in 2001 using the anthrax pathogen made the problem of biological danger even more important. In Russian Federation, biological threats are counteracted through the united state policy being a part of general state security policy. The biological Security legislation of Russian Federation is chiefly based on the 1992 Federal Law on Security. On the basis of cumulated experience, the President of Russia ratified Basics of Russian Federation's State Policy for Chemical and Biological Security for the Period through 2010 and Beyond on 4 December, 2003. The document determines the main directions and stages of the state development in the area of chemical and biological security. The Federal target program Russian Federation's National Program for Chemical and Biological Security is being developed, and its development is to be completed soon in order to perfect the national system for biological security and fulfill Basics of Russian Federation's State Policy for Chemical and Biological Security for the Period through 2010 and Beyond, ratified by the President. The new global strategy for control over infectious diseases, presented in the materials of Saint Petersburg summit of the Group of Eight, as well as the substantive part of its elements in Sanitary International Standards, are to a large degree an acknowledgement of the Russian Federation's experience and the algorithm for fighting extremely dangerous infections. This Russia's experience has resulted in the following global achievements: smallpox elimination in the USSR (1936); the USSR's suggestions on the program of smallpox elimination in the world and 2 billion doses of the vaccine transferred to the possession of the WHO (since 1958); the global elimination of the disease (1980); effective control over avian influenza at the epizootic stage, recognized internationally at Beijing International Congress, 17-18 January, 2006.
Security and Privacy in a DACS.
Delgado, Jaime; Llorente, Silvia; Pàmies, Martí; Vilalta, Josep
2016-01-01
The management of electronic health records (EHR), in general, and clinical documents, in particular, is becoming a key issue in the daily work of Healthcare Organizations (HO). The need for providing secure and private access to, and storage for, clinical documents together with the need for HO to interoperate, raises a number of issues difficult to solve. Many systems are in place to manage EHR and documents. Some of these Healthcare Information Systems (HIS) follow standards in their document structure and communications protocols, but many do not. In fact, they are mostly proprietary and do not interoperate. Our proposal to solve the current situation is the use of a DACS (Document Archiving and Communication System) for providing security, privacy and standardized access to clinical documents.
78 FR 48457 - Correction of Document Revoking Customs Broker Licenses
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-08
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Correction of Document Revoking Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Correction of document revoking certain customs broker licenses. SUMMARY: In a notice published...
20 CFR 405.333 - Submitting documents.
Code of Federal Regulations, 2010 CFR
2010-04-01
... digits of the claimant's social security number. All such documents must be clear and legible to the... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Submitting documents. 405.333 Section 405.333 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL...
17 CFR 23.504 - Swap trading relationship documentation.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Swap trading relationship documentation. 23.504 Section 23.504 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SWAP DEALERS AND MAJOR SWAP PARTICIPANTS Swap Documentation § 23.504 Swap trading relationship...
17 CFR 23.504 - Swap trading relationship documentation.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Swap trading relationship documentation. 23.504 Section 23.504 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SWAP DEALERS AND MAJOR SWAP PARTICIPANTS Swap Documentation § 23.504 Swap trading relationship...
ERIC Educational Resources Information Center
California State Dept. of Education, Sacramento.
This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…
Operational Concepts for a Generic Space Exploration Communication Network Architecture
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Vaden, Karl R.; Jones, Robert E.; Roberts, Anthony M.
2015-01-01
This document is one of three. It describes the Operational Concept (OpsCon) for a generic space exploration communication architecture. The purpose of this particular document is to identify communication flows and data types. Two other documents accompany this document, a security policy profile and a communication architecture document. The operational concepts should be read first followed by the security policy profile and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes: subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.
Hyett, Nerida; Kenny, Amanda; Dickson-Swift, Virginia
2017-10-01
There is increasing opportunity and support for occupational therapists to expand their scope of practice in community settings. However, evidence is needed to increase occupational therapists' knowledge, confidence, and capacity with building community participation and adopting community-centered practice roles. The purpose of this study is to improve occupational therapists' understanding of an approach to building community participation, through case study of a network of Canadian food security programs. Qualitative case study was utilized. Data were semistructured interviews, field observations, documents, and online social media. Thematic analysis was used to identify and describe four themes that relate to processes used to build community participation. The four themes were use of multiple methods, good leaders are fundamental, growing participation via social media, and leveraging outcomes. Occupational therapists can utilize an approach for building community participation that incorporates resource mobilization. Challenges of sustainability and social exclusion must be addressed.
15 CFR 758.5 - Conformity of documents and unloading of items.
Code of Federal Regulations, 2010 CFR
2010-01-01
... disposition from BIS. (ii) Contact information. U.S. Department of Commerce, Bureau of Industry and Security... Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION... documents. When a license is issued by BIS, the information entered on related export control documents (e.g...
1987-06-30
one of the disposal alternatives now under study by the U.S. Army for...departure, established Army procedures and Army-sponsored studies on safety and security practices and on the handling and transportation of chemical agents...Statement published by the Army in July 1986. As part of the public commentary on this document, requests were made of the Army to consider also the
Reforming the Joint Military Establishment
1985-06-01
FOR PUBLIC RELEASE DISTRIBUTION UNLIMITED D UNCLASSIFIED StCURITV CLASJiriCATIOM OP THIS PAOK (*h*> Dmf Enltfd) REPORT DOCUMENTATION PAGE 1...COMPLETING FORM i Rt t lRNT’S CATALOG NUMBER 5. TYPE OF HEBORT 4 PCRIOC COVCRCO Final S. PERFORMING ORO. REPORT NUMICR B. CONTRACT OR GRANT...NUMBERft; 10. PROGRAM ELCMENT. PROJECT, TASK AREA ft WORK UNIT NUMBERS U. REPORT OAT1 June 1985 . NUMBER OF PAGES 78 IS. SECURITY CLASS
Critical Infrastructure: Control Systems and the Terrorist Threat
2004-01-20
Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...http://www.pnl.gov/main/sectors/homeland.html]. 68 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ,” Sandia Report SAND2002...and Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to
Critical Infrastructure: Control Systems and the Terrorist Threat
2003-07-14
Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...available online at [http://www.pnl.gov/main/sectors/homeland.html]. 56 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ...Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to
Toward a Persistent Object Base.
1986-07-01
would eliminate the user burden of explicitly invoking a decompressing program before each use of the compresed file. Another kind of flexible...joined to Source .version. It Is not the case, however, that I two relations have attributes with the same types that It always makes sense to join them...25 V V V~ ~ . - .. ~ " - IPE-~w Fam .rf rw vqrf wwp IECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE Is. REPORT SECURITY CLASSIFICATION
A Framework to Assess Programs for Building Partnerships
2009-01-01
available from www.rand.org as a public service of the RAND Corporation . 6Jump down to document THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY...ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE The RAND Corporation is a nonprofit research...6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Rand Corporation ,1776
42 CFR 37.60 - Submitting required chest roentgenograms and miner identification documents.
Code of Federal Regulations, 2012 CFR
2012-10-01
... prescribed in this subpart, all the forms shall be submitted with his or her name and social security account... miner identification document containing the miner's name, address, social security number and place of... format specified by NIOSH either using portable electronic media, or a secure electronic file transfer...
17 CFR 232.103 - Liability for transmission errors or omissions in documents filed via EDGAR.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Liability for transmission errors or omissions in documents filed via EDGAR. 232.103 Section 232.103 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC...
3 CFR - The Energy Independence and Security Act of 2007
Code of Federal Regulations, 2010 CFR
2010-01-01
... 3 The President 1 2010-01-01 2010-01-01 false The Energy Independence and Security Act of 2007 Presidential Documents Other Presidential Documents Memorandum of January 26, 2009 The Energy Independence and Security Act of 2007 Memorandum for the Secretary of Transportation [and] the Administrator of the National Highway Traffic Safety...
17 CFR 232.306 - Foreign language documents and symbols.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Foreign language documents and symbols. 232.306 Section 232.306 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION....14d-102), or Schedule 14D-9F (§ 240.14d-103). (e) Foreign currency denominations must be expressed in...
17 CFR 232.306 - Foreign language documents and symbols.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Foreign language documents and symbols. 232.306 Section 232.306 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION....14d-102), or Schedule 14D-9F (§ 240.14d-103). (e) Foreign currency denominations must be expressed in...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2012 CFR
2012-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2014 CFR
2014-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2013 CFR
2013-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2011 CFR
2011-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
Open Source Patient-Controlled Analgesic Pump Requirements Documentation
Larson, Brian R.; Hatcliff, John; Chalin, Patrice
2014-01-01
The dynamic nature of the medical domain is driving a need for continuous innovation and improvement in techniques for developing and assuring medical devices. Unfortunately, research in academia and communication between academics, industrial engineers, and regulatory authorities is hampered by the lack of realistic non-proprietary development artifacts for medical devices. In this paper, we give an overview of a detailed requirements document for a Patient-Controlled Analgesic (PCA) pump developed under the US NSF’s Food and Drug Administration (FDA) Scholar-in-Residence (SIR) program. This 60+ page document follows the methodology outlined in the US Federal Aviation Administrations (FAA) Requirements Engineering Management Handbook (REMH) and includes a domain overview, use cases, statements of safety & security requirements, and formal top-level system architectural description. Based on previous experience with release of a requirements document for a cardiac pacemaker that spawned a number of research and pedagogical activities, we believe that the described PCA requirements document can be an important research enabler within the formal methods and software engineering communities. PMID:24931440
Electronic Derivative Classifier/Reviewing Official
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harris, Joshua C; McDuffie, Gregory P; Light, Ken L
2017-02-17
The electronic Derivative Classifier, Reviewing Official (eDC/RO) is a web based document management and routing system that reduces security risks and increases workflow efficiencies. The system automates the upload, notification review request, and document status tracking of documents for classification review on a secure server. It supports a variety of document formats (i.e., pdf, doc, docx, xls, xlsx, xlsm, ppt, pptx, vsd, vsdx and txt), and allows for the dynamic placement of classification markings such as the classification level, category and caveats on the document, in addition to a document footer and digital signature.
Enhanced optical security by using information carrier digital screening
NASA Astrophysics Data System (ADS)
Koltai, Ferenc; Adam, Bence
2004-06-01
Jura has developed different security features based on Information Carrier Digital Screening. Substance of such features is that a non-visible secondary image is encoded in a visible primary image. The encoded image will be visible only by using a decoding device. One of such developments is JURA's Invisible Personal Information (IPI) is widely used in high security documents, where personal data of the document holder are encoded in the screen of the document holder's photography and they can be decoded by using an optical decoding device. In order to make document verification fully automated, enhance security and eliminate human factors, digital version of IPI, the D-IPI was developed. A special 2D-barcode structure was designed, which contains sufficient quantity of encoded digital information and can be embedded into the photo. Other part of Digital-IPI is the reading software, that is able to retrieve the encoded information with high reliability. The reading software developed with a specific 2D structure is providing the possibility of a forensic analysis. Such analysis will discover all kind of manipulations -- globally, if the photography was simply changed and selectively, if only part of the photography was manipulated. Digital IPI is a good example how benefits of digital technology can be exploited by using optical security and how technology for optical security can be converted into digital technology. The D-IPI process is compatible with all current personalization printers and materials (polycarbonate, PVC, security papers, Teslin-foils, etc.) and can provide any document with enhanced security and tamper-resistance.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Silvas, A. J.
The purpose of this Post-Closure Strategy is to provide a consistent methodology for continual evaluation of post-closure requirements for use-restricted areas on the Nevada National Security Site (NNSS), Nevada Test and Training Range (NTTR), and Tonopah Test Range (TTR) to consolidate, modify, or streamline the program. In addition, this document stipulates the creation of a single consolidated Post-Closure Plan that will detail the current post-closure requirements for all active use restrictions (URs) and outlines its implementation and subsequent revision. This strategy will ensure effective management and control of the post-closure sites. There are currently over 200 URs located on themore » NNSS, NTTR, and TTR. Post-closure requirements were initially established in the Closure Report for each site. In some cases, changes to the post-closure requirements have been implemented through addenda, errata sheets, records of technical change, or letters. Post-closure requirements have been collected from these multiple sources and consolidated into several formats, such as summaries and databases. This structure increases the possibility of inconsistencies and uncertainty. As more URs are established and the post-closure program is expanded, the need for a comprehensive approach for managing the program will increase. Not only should the current requirements be obtainable from a single source that supersedes all previous requirements, but the strategy for modifying the requirements should be standardized. This will enable more effective management of the program into the future. This strategy document and the subsequent comprehensive plan are to be implemented under the assumption that the NNSS and outlying sites will be under the purview of the U.S. Department of Energy, National Nuclear Security Administration for the foreseeable future. This strategy was also developed assuming that regulatory control of the sites remains static. The comprehensive plan is not intended to be a permanent long-term stewardship plan. However, it is intended to clarify requirements and identify components to effectively manage the sites until regulatory requirements are met or management of the site changes. The Environmental Management Program is required to manage these sites until the NNSS Environmental Restoration program is completed, currently planned for 2030. Prior to completion of the Environmental Restoration program, additional planning will be conducted to ensure that long-term stewardship of the sites is maintained. A comprehensive post-closure plan can be transitioned effectively into any future site-wide long-term stewardship program that may be developed. Therefore, the post-closure plan will include current aspects of the post-closure program that are also important aspects of long-term stewardship, including the following: • Management of physical and engineering controls such as fences, signs, and soil covers • Management of institutional and administrative controls such as use restrictions and real estate systems • Management of monitoring and maintenance programs • Management of information related to the sites such as geographic information system data and related documentation The strategy will also allow for periodic review and modification of any aspect of the program to ensure continued effectiveness.« less
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Enforcement and disciplinary proceedings: Availability of documents for inspection and copying. 201.230 Section 201.230 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Rules of Practice Initiation of Proceedings and Prehearing Rules §...
Takahashi, Mara Alice Batista Conti; Iguti, Aparecida Mari
2008-11-01
This article describes the changes in workers' rehabilitation practices under the Brazilian National Social Security Institute (INSS) in the 1990s, in the context of neoliberal economic adjustment measures, based on an analysis of INSS documents from 1992 to 1997. The INSS plan for "modernization" of workers' rehabilitation led to: (1) dismantling of multidisciplinary teams; (2) induction of workers to accept proportional retirement pensions and voluntary layoffs; (3) under-utilization of the remaining INSS professional staff; (4) elimination of treatment programs for workers' rehabilitation; and (5) dismantling of INSS rehabilitation centers and clinics. The changes in the Brazilian social security system undermined the county's social security project and hegemony and reduced social security reform to a mere management and fiscal issue. Current "rehabilitation" falls far short of the institution's original purpose of social protection for workers, while aiming at economic regulation of the system to contain costs of workers' benefits. Workers that suffer work-related accidents are denied occupational rehabilitation, which aggravates their social disadvantage when they return to work.
SU-G-PinS Room/Hall E-00: HAZMAT Training for the Medical Physicist - Part II
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
Medical Physicists are frequently involved in shipping radioactive materials or supervising those who do. Current U.S. Department of Transportation Hazardous Material Regulations, 49 CFR Parts 171 - 185, require hazmat employees to have documented training specified in 49 CFR 172 Subpart H. A hazmat employee is defined as an individual who: (1) loads, unloads or handles hazardous material; (2) manufactures, tests, reconditions, repairs, modifies, marks or otherwise represents containers, drums or packagings as qualified for use in the transportation of hazardous materials; (3) prepares hazardous materials for transportation; (4) is responsible for safety of transporting hazardous materials; or (5) operatesmore » a vehicle used to transport hazardous materials. Recurrent training is required at least once every three years. (The IATA two year training interval is not applicable and is generally misunderstood.) FAA has escalated inspection and enforcement. Facilities who ship radiopharmaceuticals to other laboratories, return radiopharmaceuticals or radioactive sources to suppliers, or otherwise ship radioactive materials have been cited for failure to provide and document the required training. The interrelationship of transportation regulations, 49 CFR, IATA, ICAO and other transportation regulations, which are frequently misunderstood, will be explained. The course will cover typical shipments by air and highway which are encountered in a medical institution. Items such as fissile materials, highway route controlled quantities, rail shipments, vessel shipments and such will be omitted; although specific questions may be addressed. A major objective of the course is to present the process of shipping radioactive material in a sequential and logical fashion. How radioactive materials for transportation purposes are defined by activity concentrations for exempt materials and activity limits for exempt consignments will be explained. Radioactive material shipments of excepted packages and Type A packages will be emphasized. The program is designed to meet the function specific DOT training requirements for shippers of medical radioactive materials. General awareness training and security awareness training can be obtained from two free DOT training CDs. Safety training and security awareness training is generally satisfied by the training required under the institution’s radioactive material license. For shippers of radioactive Yellow III labeled packages an in-depth written security plan and training are no longer required as of April 8, 2010. In general almost all shippers of medical radioactive material are now not required to have an in-depth security plan. Contents of general awareness training, security awareness training and in-depth security plans will be briefly outlined. It is the hazmat employer’s responsibility to ensure that each hazmat employee is properly trained. No third party can fulfill that requirement. It is the hazmat employer’s responsibility to determine the degree to which this course meets the employer’s requirements, including contents of the course and the examination. Participants will gain sufficient knowledge to prepare hazmat training programs for others in their institutions. A handout will be posted which should be printed out and brought to the course for reference during the presentation. The handout will also satisfy part of the training documentation required by DOT. A feature handout section is a composite table which provides A1, A2, RQ, Exempt Concentration, and Exempt Consignment values in a single table in both Becquerel and Curie units. Course attendance will be certified through the AAPM CEU documentation system. Learning Objectives: Understand the regulatory requirements for shipping radioactive materials. Understand the regulatory requirements for training of hazmat employees. Comprehend how to classify, package, mark, label, document, placard, and transport radioactive materials.« less
SU-CD-PinS Room/Hall E-00: HAZMAT Training for the Medical Physicist - Part I
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
Medical Physicists are frequently involved in shipping radioactive materials or supervising those who do. Current U.S. Department of Transportation Hazardous Material Regulations, 49 CFR Parts 171 - 185, require hazmat employees to have documented training specified in 49 CFR 172 Subpart H. A hazmat employee is defined as an individual who: (1) loads, unloads or handles hazardous material; (2) manufactures, tests, reconditions, repairs, modifies, marks or otherwise represents containers, drums or packagings as qualified for use in the transportation of hazardous materials; (3) prepares hazardous materials for transportation; (4) is responsible for safety of transporting hazardous materials; or (5) operatesmore » a vehicle used to transport hazardous materials. Recurrent training is required at least once every three years. (The IATA two-year training interval is not applicable and is generally misunderstood.) FAA has escalated inspection and enforcement. Facilities who ship radiopharmaceuticals to other laboratories, return radiopharmaceuticals or radioactive sources to suppliers, or otherwise ship radioactive materials have been cited for failure to provide and document the required training. The interrelationship of transportation regulations, 49 CFR, IATA, ICAO and other transportation regulations, which are frequently misunderstood, will be explained. The course will cover typical shipments by air and highway which are encountered in a medical institution. Items such as fissile materials, highway route controlled quantities, rail shipments, vessel shipments and such will be omitted; although specific questions may be addressed. A major objective of the course is to present the process of shipping radioactive material in a sequential and logical fashion. How radioactive materials for transportation purposes are defined by activity concentrations for exempt materials and activity limits for exempt consignments will be explained. Radioactive material shipments of excepted packages and Type A packages will be emphasized. The program is designed to meet the function specific DOT training requirements for shippers of medical radioactive materials. General awareness training and security awareness training can be obtained from two free DOT training CDs. Safety training and security awareness training is generally satisfied by the training required under the institution’s radioactive material license. For shippers of radioactive Yellow III labeled packages an in-depth written security plan and training are no longer required as of April 8, 2010. In general almost all shippers of medical radioactive material are now not required to have an in-depth security plan. Contents of general awareness training, security awareness training and in-depth security plans will be briefly outlined. It is the hazmat employer’s responsibility to ensure that each hazmat employee is properly trained. No third party can fulfill that requirement. It is the hazmat employer’s responsibility to determine the degree to which this course meets the employer’s requirements, including contents of the course and the examination. Participants will gain sufficient knowledge to prepare hazmat training programs for others in their institutions. A handout will be posted which should be printed out and brought to the course for reference during the presentation. The handout will also satisfy part of the training documentation required by DOT. A feature handout section is a composite table which provides A1, A2, RQ, Exempt Concentration, and Exempt Consignment values in a single table in both Becquerel and Curie units. Course attendance will be certified through the AAPM CEU documentation system. Learning Objectives: Understand the regulatory requirements for shipping radioactive materials. Understand the regulatory requirements for training of hazmat employees. Comprehend how to classify, package, mark, label, document, placard, and transport radioactive materials.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Parker, R.
Medical Physicists are frequently involved in shipping radioactive materials or supervising those who do. Current U.S. Department of Transportation Hazardous Material Regulations, 49 CFR Parts 171 - 185, require hazmat employees to have documented training specified in 49 CFR 172 Subpart H. A hazmat employee is defined as an individual who: (1) loads, unloads or handles hazardous material; (2) manufactures, tests, reconditions, repairs, modifies, marks or otherwise represents containers, drums or packagings as qualified for use in the transportation of hazardous materials; (3) prepares hazardous materials for transportation; (4) is responsible for safety of transporting hazardous materials; or (5) operatesmore » a vehicle used to transport hazardous materials. Recurrent training is required at least once every three years. (The IATA two-year training interval is not applicable and is generally misunderstood.) FAA has escalated inspection and enforcement. Facilities who ship radiopharmaceuticals to other laboratories, return radiopharmaceuticals or radioactive sources to suppliers, or otherwise ship radioactive materials have been cited for failure to provide and document the required training. The interrelationship of transportation regulations, 49 CFR, IATA, ICAO and other transportation regulations, which are frequently misunderstood, will be explained. The course will cover typical shipments by air and highway which are encountered in a medical institution. Items such as fissile materials, highway route controlled quantities, rail shipments, vessel shipments and such will be omitted; although specific questions may be addressed. A major objective of the course is to present the process of shipping radioactive material in a sequential and logical fashion. How radioactive materials for transportation purposes are defined by activity concentrations for exempt materials and activity limits for exempt consignments will be explained. Radioactive material shipments of excepted packages and Type A packages will be emphasized. The program is designed to meet the function specific DOT training requirements for shippers of medical radioactive materials. General awareness training and security awareness training can be obtained from two free DOT training CDs. Safety training and security awareness training is generally satisfied by the training required under the institution’s radioactive material license. For shippers of radioactive Yellow III labeled packages an in-depth written security plan and training are no longer required as of April 8, 2010. In general almost all shippers of medical radioactive material are now not required to have an in-depth security plan. Contents of general awareness training, security awareness training and in-depth security plans will be briefly outlined. It is the hazmat employer’s responsibility to ensure that each hazmat employee is properly trained. No third party can fulfill that requirement. It is the hazmat employer’s responsibility to determine the degree to which this course meets the employer’s requirements, including contents of the course and the examination. Participants will gain sufficient knowledge to prepare hazmat training programs for others in their institutions. A handout will be posted which should be printed out and brought to the course for reference during the presentation. The handout will also satisfy part of the training documentation required by DOT. A feature handout section is a composite table which provides A1, A2, RQ, Exempt Concentration, and Exempt Consignment values in a single table in both Becquerel and Curie units. Course attendance will be certified through the AAPM CEU documentation system. Learning Objectives: Understand the regulatory requirements for shipping radioactive materials. Understand the regulatory requirements for training of hazmat employees. Comprehend how to classify, package, mark, label, document, placard, and transport radioactive materials.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Parker, R.
Medical Physicists are frequently involved in shipping radioactive materials or supervising those who do. Current U.S. Department of Transportation Hazardous Material Regulations, 49 CFR Parts 171 - 185, require hazmat employees to have documented training specified in 49 CFR 172 Subpart H. A hazmat employee is defined as an individual who: (1) loads, unloads or handles hazardous material; (2) manufactures, tests, reconditions, repairs, modifies, marks or otherwise represents containers, drums or packagings as qualified for use in the transportation of hazardous materials; (3) prepares hazardous materials for transportation; (4) is responsible for safety of transporting hazardous materials; or (5) operatesmore » a vehicle used to transport hazardous materials. Recurrent training is required at least once every three years. (The IATA two year training interval is not applicable and is generally misunderstood.) FAA has escalated inspection and enforcement. Facilities who ship radiopharmaceuticals to other laboratories, return radiopharmaceuticals or radioactive sources to suppliers, or otherwise ship radioactive materials have been cited for failure to provide and document the required training. The interrelationship of transportation regulations, 49 CFR, IATA, ICAO and other transportation regulations, which are frequently misunderstood, will be explained. The course will cover typical shipments by air and highway which are encountered in a medical institution. Items such as fissile materials, highway route controlled quantities, rail shipments, vessel shipments and such will be omitted; although specific questions may be addressed. A major objective of the course is to present the process of shipping radioactive material in a sequential and logical fashion. How radioactive materials for transportation purposes are defined by activity concentrations for exempt materials and activity limits for exempt consignments will be explained. Radioactive material shipments of excepted packages and Type A packages will be emphasized. The program is designed to meet the function specific DOT training requirements for shippers of medical radioactive materials. General awareness training and security awareness training can be obtained from two free DOT training CDs. Safety training and security awareness training is generally satisfied by the training required under the institution’s radioactive material license. For shippers of radioactive Yellow III labeled packages an in-depth written security plan and training are no longer required as of April 8, 2010. In general almost all shippers of medical radioactive material are now not required to have an in-depth security plan. Contents of general awareness training, security awareness training and in-depth security plans will be briefly outlined. It is the hazmat employer’s responsibility to ensure that each hazmat employee is properly trained. No third party can fulfill that requirement. It is the hazmat employer’s responsibility to determine the degree to which this course meets the employer’s requirements, including contents of the course and the examination. Participants will gain sufficient knowledge to prepare hazmat training programs for others in their institutions. A handout will be posted which should be printed out and brought to the course for reference during the presentation. The handout will also satisfy part of the training documentation required by DOT. A feature handout section is a composite table which provides A1, A2, RQ, Exempt Concentration, and Exempt Consignment values in a single table in both Becquerel and Curie units. Course attendance will be certified through the AAPM CEU documentation system. Learning Objectives: Understand the regulatory requirements for shipping radioactive materials. Understand the regulatory requirements for training of hazmat employees. Comprehend how to classify, package, mark, label, document, placard, and transport radioactive materials.« less
Standardized development of computer software. Part 1: Methods
NASA Technical Reports Server (NTRS)
Tausworthe, R. C.
1976-01-01
This work is a two-volume set on standards for modern software engineering methodology. This volume presents a tutorial and practical guide to the efficient development of reliable computer software, a unified and coordinated discipline for design, coding, testing, documentation, and project organization and management. The aim of the monograph is to provide formal disciplines for increasing the probability of securing software that is characterized by high degrees of initial correctness, readability, and maintainability, and to promote practices which aid in the consistent and orderly development of a total software system within schedule and budgetary constraints. These disciplines are set forth as a set of rules to be applied during software development to drastically reduce the time traditionally spent in debugging, to increase documentation quality, to foster understandability among those who must come in contact with it, and to facilitate operations and alterations of the program as requirements on the program environment change.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cadwell, J.J.; Ruger, C.J.
1995-12-01
This document is one of a three report set, BNL 52201 contains detailed information for use by executives. BNL 52202 is titled, U.S. Statutes of General Interest to Safeguards and Security Officers, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled, U.S.Statutes for Enforcement by Security Inspectors, and only contains statutes to be applied by uniformed security inspectors. These are a newly updated version of a set of documents of similar titles published in September 1988, which were an updated version of an original set of documents published in November 1983.
Cyber Incidents Involving Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert J. Turk
2005-10-01
The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Managementmore » Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).« less
Network Speech Systems Technology Program
NASA Astrophysics Data System (ADS)
Weinstein, C. J.
1980-09-01
This report documents work performed during FY 1980 on the DCA-sponsored Network Speech Systems Technology Program. The areas of work reported are: (1) communication systems studies in Demand-Assignment Multiple Access (DAMA), voice/data integration, and adaptive routing, in support of the evolving Defense Communications System (DCS) and Defense Switched Network (DSN); (2) a satellite/terrestrial integration design study including the functional design of voice and data interfaces to interconnect terrestrial and satellite network subsystems; and (3) voice-conferencing efforts dealing with support of the Secure Voice and Graphics Conferencing (SVGC) Test and Evaluation Program. Progress in definition and planning of experiments for the Experimental Integrated Switched Network (EISN) is detailed separately in an FY 80 Experiment Plan Supplement.
2008 Homeland Security S and T Stakeholders Conference West
2008-01-16
Untitled Document 2008hls.html[5/26/ 2016 8:25:16 AM] 2008 Homeland Security S&T Stakeholders Conference West “Putting First Responders First” Los...Sector Commander/Captain of the Port, U.S. Coast Guard Sector Los Angeles - Long Beach Mr. Mark Denari, Director, Aviation Security & Public Safety...Document 2008hls.html[5/26/ 2016 8:25:16 AM] Pre Conference Training Workshop Monday, 14 January 2008 Training Session 3:Better Security via Randomization
6 CFR 37.11 - Application and documents the applicant must provide.
Code of Federal Regulations, 2011 CFR
2011-01-01
... filed with a State Office of Vital Statistics or equivalent agency in the individual's State of birth... present at least one document included in paragraph (c) of this section. (e) Social security number (SSN... documents listed in § 37.11(c)(1) and (2) must present his or her Social Security Administration account...
Security analysis for biometric data in ID documents
NASA Astrophysics Data System (ADS)
Schimke, Sascha; Kiltz, Stefan; Vielhauer, Claus; Kalker, Ton
2005-03-01
In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents like passports. Starting from classical techniques for manual authentication of ID card holders, we expand our view towards automatic methods based on biometrics. We do so by reviewing different human biometric attributes by modality, as well as by discussing possible techniques for storing and handling the particular biometric data on the document. Further, we explore possible vulnerabilities of potential biometric passport systems. Based on the findings of that discussion we will expand upon two exemplary approaches for including digital biometric data in the context of ID documents and present potential risks attack scenarios along with technical aspects such as capacity and robustness.
A slippery molecular assembly allows water as a self-erasable security marker
Thirumalai, Rajasekaran; Mukhopadhyay, Rahul Dev; Praveen, Vakayil K.; Ajayaghosh, Ayyappanpillai
2015-01-01
Protection of currency and valuable documents from counterfeit continues to be a challenge. While there are many embedded security features available for document safety, they are not immune to forgery. Fluorescence is a sensitive property, which responds to external stimuli such as solvent polarity, temperature or mechanical stress, however practical use in security applications is hampered due to several reasons. Therefore, a simple and specific stimuli responsive security feature that is difficult to duplicate is of great demand. Herein we report the design of a fluorescent molecular assembly on which water behaves as a self-erasable security marker for checking the authenticity of documents at point of care. The underlying principle involves the disciplined self-assembly of a tailor-made fluorescent molecule, which initially form a weak blue fluorescence (λem = 425 nm, Φf = 0.13) and changes to cyan emission (λem = 488 nm,Φf = 0.18) in contact with water due to a reversible molecular slipping motion. This simple chemical tool, based on the principles of molecular self-assembly and fluorescence modulation, allows creation of security labels and optically masked barcodes for multiple documents authentication. PMID:25940779
A slippery molecular assembly allows water as a self-erasable security marker.
Thirumalai, Rajasekaran; Mukhopadhyay, Rahul Dev; Praveen, Vakayil K; Ajayaghosh, Ayyappanpillai
2015-05-05
Protection of currency and valuable documents from counterfeit continues to be a challenge. While there are many embedded security features available for document safety, they are not immune to forgery. Fluorescence is a sensitive property, which responds to external stimuli such as solvent polarity, temperature or mechanical stress, however practical use in security applications is hampered due to several reasons. Therefore, a simple and specific stimuli responsive security feature that is difficult to duplicate is of great demand. Herein we report the design of a fluorescent molecular assembly on which water behaves as a self-erasable security marker for checking the authenticity of documents at point of care. The underlying principle involves the disciplined self-assembly of a tailor-made fluorescent molecule, which initially form a weak blue fluorescence (λem = 425 nm, Φf = 0.13) and changes to cyan emission (λem = 488 nm,Φf = 0.18) in contact with water due to a reversible molecular slipping motion. This simple chemical tool, based on the principles of molecular self-assembly and fluorescence modulation, allows creation of security labels and optically masked barcodes for multiple documents authentication.
FY 2017 Stockpile Stewardship and Management Plan - Biennial Plan Summary
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2016-03-01
This year’s summary report updates the Fiscal Year 2016 Stockpile Stewardship and Management Plan (FY 2016 SSMP), the 25-year strategic program of record that captures the plans developed across numerous NNSA programs and organizations to maintain and modernize the scientific tools, capabilities, and infrastructure necessary to ensure the success of NNSA’s nuclear weapons mission. The SSMP is a companion to the Prevent, Counter, and Respond: A Strategic Plan to Reduce Global Nuclear Threats (FY 2017-2021) report, the planning document for NNSA’s nuclear threat reduction mission. New versions of both reports are published each year in response to new requirements andmore » challenges. Much was accomplished in FY 2015 as part of the program of record described in this year’s SSMP. The science-based Stockpile Stewardship Program allowed the Secretaries of Energy and Defense to certify for the twentieth time that the stockpile remains safe, secure, and effective without the need for underground nuclear explosive testing. The talented scientists, engineers, and technicians at the three national security laboratories, the four nuclear weapons production plants, and the national security site are primarily responsible for this continued success. Research, development, test, and evaluation programs have advanced NNSA’s understanding of weapons physics, component aging, and material properties through first-of-a-kind shock physics experiments, along with numerous other critical experiments conducted throughout the nuclear security enterprise. The multiple life extension programs (LEPs) that are under way made progress toward their first production unit dates. The W76-1 LEP is past the halfway point in total production, and the B61-12 completed three development flight tests. Critical to this success is the budget. The Administration’s budget request for NNSA’s Weapons Activities has increased for all but one of the past seven years, resulting in a total increase of approximately 45 percent since 2010. If adopted by Congress, the FY 2017 budget request will increase funding by $396 million (about 4.5 percent) from the enacted FY 2016 level. A significant portion of the increase would fund the research for multiple life extension programs, support the programs in Directed Stockpile Work, and modernize the physical infrastructure of the nuclear security enterprise.« less
Secure Retrieval of FFTF Testing, Design, and Operating Information
DOE Office of Scientific and Technical Information (OSTI.GOV)
Butner, R. Scott; Wootan, David W.; Omberg, Ronald P.
One of the goals of the Advanced Fuel Cycle Initiative (AFCI) is to preserve the knowledge that has been gained in the United States on Liquid Metal Reactors (LMR). In addition, preserving LMR information and knowledge is part of a larger international collaborative activity conducted under the auspices of the International Atomic Energy Agency (IAEA). A similar program is being conducted for EBR-II at the Idaho Nuclear Laboratory (INL) and international programs are also in progress. Knowledge preservation at the FFTF is focused on the areas of design, construction, startup, and operation of the reactor. As the primary function ofmore » the FFTF was testing, the focus is also on preserving information obtained from irradiation testing of fuels and materials. This information will be invaluable when, at a later date, international decisions are made to pursue new LMRs. In the interim, this information may be of potential use for international exchanges with other LMR programs around the world. At least as important in the United States, which is emphasizing large-scale computer simulation and modeling, this information provides the basis for creating benchmarks for validating and testing these large scale computer programs. Although the preservation activity with respect to FFTF information as discussed below is still underway, the team of authors above is currently retrieving and providing experimental and design information to the LMR modeling and simulation efforts for use in validating their computer models. On the Hanford Site, the FFTF reactor plant is one of the facilities intended for decontamination and decommissioning consistent with the cleanup mission on this site. The reactor facility has been deactivated and is being maintained in a cold and dark minimal surveillance and maintenance mode until final decommissioning is pursued. In order to ensure protection of information at risk, the program to date has focused on sequestering and secure retrieval. Accomplishments include secure retrieval of: more than 400 boxes of FFTF information, several hundred microfilm reels including Clinch River Breeder Reactor (CRBR) information, and 40 boxes of information on the Fuels and Materials Examination Facility (FMEF). All information preserved to date is now being stored and categorized consistent with the IAEA international standardized taxonomy. Earlier information largely related to irradiation testing is likewise being categorized. The fuel test results information exists in several different formats depending upon the final stage of the test evaluation. In some cases there is information from both non-destructive and destructive examination while in other cases only non-destructive results are available. Non-destructive information would include disassembly records, dimensional profilometry, gamma spectrometry, and neutron radiography. Information from destructive examinations would include fission gas analysis, metallography, and photomicrographs. Archiving of FFTF data, including both the reactor plant and the fuel test information, is being performed in coordination with other data archiving efforts underway under the aegis of the AFCI program. In addition to the FFTF efforts, archiving of data from the EBR-II reactor is being carried out by INL. All material at risk associated with FFTF documentation has been secured in a timely manner consistent with the stated plan. This documentation is now being categorized consistent with internationally agreed upon IAEA standards. Documents are being converted to electronic format for transfer to a large searchable electronic database being developed by INL. In addition, selected FFTF information is being used to generate test cases for large-scale simulation modeling efforts and for providing Design Data Need (DDN) packages as requested by the AFCI program.« less
Optical benchmarking of security document readers for automated border control
NASA Astrophysics Data System (ADS)
Valentín, Kristián.; Wild, Peter; Å tolc, Svorad; Daubner, Franz; Clabian, Markus
2016-10-01
Authentication and optical verification of travel documents upon crossing borders is of utmost importance for national security. Understanding the workflow and different approaches to ICAO 9303 travel document scanning in passport readers, as well as highlighting normalization issues and designing new methods to achieve better harmonization across inspection devices are key steps for the development of more effective and efficient next- generation passport inspection. This paper presents a survey of state-of-the-art document inspection systems, showcasing results of a document reader challenge investigating 9 devices with regards to optical characteristics.
Query-Biased Preview over Outsourced and Encrypted Data
Luo, Guangchun; Qin, Ke; Chen, Aiguo
2013-01-01
For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. However, searching for the desired documents becomes problematic since it is costly to download and decrypt each possibly needed document to check if it contains the desired content. An informative query-biased preview feature, as applied in modern search engine, could help the users to learn about the content without downloading the entire document. However, when the data are encrypted, securely extracting a keyword-in-context snippet from the data as a preview becomes a challenge. Based on private information retrieval protocol and the core concept of searchable encryption, we propose a single-server and two-round solution to securely obtain a query-biased snippet over the encrypted data from the server. We achieve this novel result by making a document (plaintext) previewable under any cryptosystem and constructing a secure index to support dynamic computation for a best matched snippet when queried by some keywords. For each document, the scheme has O(d) storage complexity and O(log(d/s) + s + d/s) communication complexity, where d is the document size and s is the snippet length. PMID:24078798
Query-biased preview over outsourced and encrypted data.
Peng, Ningduo; Luo, Guangchun; Qin, Ke; Chen, Aiguo
2013-01-01
For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. However, searching for the desired documents becomes problematic since it is costly to download and decrypt each possibly needed document to check if it contains the desired content. An informative query-biased preview feature, as applied in modern search engine, could help the users to learn about the content without downloading the entire document. However, when the data are encrypted, securely extracting a keyword-in-context snippet from the data as a preview becomes a challenge. Based on private information retrieval protocol and the core concept of searchable encryption, we propose a single-server and two-round solution to securely obtain a query-biased snippet over the encrypted data from the server. We achieve this novel result by making a document (plaintext) previewable under any cryptosystem and constructing a secure index to support dynamic computation for a best matched snippet when queried by some keywords. For each document, the scheme has O(d) storage complexity and O(log(d/s) + s + d/s) communication complexity, where d is the document size and s is the snippet length.
KernPaeP - a web-based pediatric palliative documentation system for home care.
Hartz, Tobias; Verst, Hendrik; Ueckert, Frank
2009-01-01
KernPaeP is a new web-based on- and offline documentation system, which has been developed for pediatric palliative care-teams supporting patient documentation and communication among health care professionals. It provides a reliable system making fast and secure home care documentation possible. KernPaeP is accessible online by registered users using any web-browser. Home care teams use an offline version of KernPaeP running on a netbook for patient documentation on site. Identifying and medical patient data are strictly separated and stored on two database servers. The system offers a stable, enhanced two-way algorithm for synchronization between the offline component and the central database servers. KernPaeP is implemented meeting highest security standards while still maintaining high usability. The web-based documentation system allows ubiquitous and immediate access to patient data. Sumptuous paper work is replaced by secure and comprehensive electronic documentation. KernPaeP helps saving time and improving the quality of documentation. Due to development in close cooperation with pediatric palliative professionals, KernPaeP fulfils the broad needs of home-care documentation. The technique of web-based online and offline documentation is in general applicable for arbitrary home care scenarios.
Application of portable CDA for secure clinical-document exchange.
Huang, Kuo-Hsuan; Hsieh, Sung-Huai; Chang, Yuan-Jen; Lai, Feipei; Hsieh, Sheau-Ling; Lee, Hsiu-Hui
2010-08-01
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on the design method in CDA. In practice, although the HL7 organization tried to make medical messages exchangeable, it is still hard to exchange medical messages. There are many issues when two hospitals want to exchange clinical documents, such as patient privacy, network security, budget, and the strategies of the hospital. In this article, we propose a method for the exchange and sharing of clinical documents in an offline model based on the CDA-the Portable CDA. This allows the physician to retrieve the patient's medical record stored in a portal device, but not through the Internet in real time. The security and privacy of CDA data will also be considered.
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Krenzien, Susan
2015-01-01
This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities from October 1, 2013, through September 30, 2014 (fiscal year [FY] 2014). All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); National Security Technologies, LLC (NSTec); Navarro-Intera, LLC (N-I); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2014. The activities included conducting oversight assessments for QAP compliance, identifying findings and completing corrective actions, evaluating laboratory performance,more » and publishing documents. UGTA Activity participants conducted 25 assessments on topics including safe operations, QAP compliance, activity planning, and sampling. These assessments are summarized in Section 2.0. Corrective actions tracked in FY 2014 are presented in Appendix A. Laboratory performance was evaluated based on three approaches: (1) established performance evaluation programs (PEPs), (2) interlaboratory comparisons, or (3) data review. The results of the laboratory performance evaluations, and interlaboratory comparison results are summarized in Section 4.0. The UGTA Activity published three public documents and a variety of other publications in FY 2014. The titles, dates, and main authors are identified in Section 5.0. The Contract Managers, Corrective Action Unit (CAU) Leads, Preemptive Review (PER) Committee members, and Topical Committee members are listed by name and organization in Section 6.0. Other activities that affected UGTA quality are discussed in Section 7.0. Section 8.0 provides the FY 2014 UGTA QA program conclusions, and Section 9.0 lists the references not identified in Section 5.0.« less
National ITS architecture security
DOT National Transportation Integrated Search
2003-10-01
This Security Document presents an overview of security as it is represented in the National ITS Architecture and provides guidance for using the security-related parts of the National ITS Architecture. The objective of security, in the context of th...
48 CFR 3004.804-570 - Supporting closeout documents.
Code of Federal Regulations, 2013 CFR
2013-10-01
... documents. 3004.804-570 Section 3004.804-570 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Government... closure, the contracting officer shall obtain the listed DHS and Department of Defense (DOD) forms from...
48 CFR 3004.804-570 - Supporting closeout documents.
Code of Federal Regulations, 2010 CFR
2010-10-01
... documents. 3004.804-570 Section 3004.804-570 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Government... closure, the contracting officer shall obtain the listed DHS and Department of Defense (DOD) forms from...
48 CFR 3004.804-570 - Supporting closeout documents.
Code of Federal Regulations, 2014 CFR
2014-10-01
... documents. 3004.804-570 Section 3004.804-570 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Government... closure, the contracting officer shall obtain the listed DHS and Department of Defense (DOD) forms from...
LANL continuity of operations plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Senutovitch, Diane M
2010-12-22
The Los Alamos National Laboratory (LANL) is a premier national security research institution, delivering scientific and engineering solutions for the nation's most crucial and complex problems. Our primary responsibility is to ensure the safety, security, and reliability of the nation's nuclear stockpile. LANL emphasizes worker safety, effective operational safeguards and security, and environmental stewardship, outstanding science remains the foundation of work at the Laboratory. In addition to supporting the Laboratory's core national security mission, our work advances bioscience, chemistry, computer science, earth and environmental sciences, materials science, and physics disciplines. To accomplish LANL's mission, we must ensure that the Laboratorymore » EFs continue to be performed during a continuity event, including localized acts of nature, accidents, technological or attack-related emergencies, and pandemic or epidemic events. The LANL Continuity of Operations (COOP) Plan documents the overall LANL COOP Program and provides the operational framework to implement continuity policies, requirements, and responsibilities at LANL, as required by DOE 0 150.1, Continuity Programs, May 2008. LANL must maintain its ability to perform the nation's PMEFs, which are: (1) maintain the safety and security of nuclear materials in the DOE Complex at fixed sites and in transit; (2) respond to a nuclear incident, both domestically and internationally, caused by terrorist activity, natural disaster, or accident, including mobilizing the resources to support these efforts; and (3) support the nation's energy infrastructure. This plan supports Continuity of Operations for Los Alamos National Laboratory (LANL). This plan issues LANL policy as directed by the DOE 0 150.1, Continuity Programs, and provides direction for the orderly continuation of LANL EFs for 30 days of closure or 60 days for a pandemic/epidemic event. Initiation of COOP operations may be required to support an allhazards event, including a national security emergency, major fire, catastrophic natural disaster, man-made disaster, terrorism event, or technological disaster by rendering LANL buildings, infrastructure, or Technical Areas unsafe, temporarily unusable, or inaccessible.« less
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 9 2012-10-01 2012-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
The 3D Elevation Program: summary of program direction
Snyder, Gregory I.
2012-01-01
The 3D Elevation Program (3DEP) initiative responds to a growing need for high-quality topographic data and a wide range of other three-dimensional representations of the Nation's natural and constructed features. The National Enhanced Elevation Assessment (NEEA), which was completed in 2011, clearly documented this need within government and industry sectors. The results of the NEEA indicated that enhanced elevation data have the potential to generate $13 billion in new benefits annually. The benefits apply to food risk management, agriculture, water supply, homeland security, renewable energy, aviation safety, and other areas. The 3DEP initiative was recommended by the National Digital Elevation Program and its 12 Federal member agencies and was endorsed by the National States Geographic Information Council (NSGIC) and the National Geospatial Advisory Committee (NGAC).
2017-06-09
were processed. This program was designed to target a wide variety of combatants, with special emphasis placed on child soldiers. With these...Brzoska, SSR has its origin in the development of donor debate, where there has been ongoing discussion among different groups of theoreticians on how...human rights, humanitarian relief, and electoral reform. This document describes the framework on how post -war Liberia should implement the peace
Studies of Millimeter-Wave Diffraction Devices and Materials
1984-12-28
7.0 REFERENCES 1. Andrenko, S . d., Devyatkov, Acad. N. D., and Shestopalov, V. P., "Millimeter Field Band Antenna Arrays", Dokl. Akad. 4auk SSSR, Vol... S UNCLASSTFIED I* .RIT.Y CL.ASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE :kFPOO- SEURITY CLASSIFICATION 1-b. RESTRICTIVE MARKINGS .EM...State and ZIP Code) 10. SOURCE OF FUNDIN.G NOS. ______ C)c \\~ S PROGRAM PROJECT TASK WORK UNIT 2~~V \\~ ~(~ELEMENT NO. NO. No. NO. ATEinciude Security
Identifying and Mitigating Risks in Security Sector Assistance for Africa’s Fragile States
2015-01-01
The Logframe Handbook: A Logical Framework Approach to Project Cycle Management , Washington, D.C., 2005. 34 Identifying and Mitigating Risks in SSA...Fragile States 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER... Project Unique Identification Code (PUIC) for the project that produced this document is HQD126409. v Contents Preface
Developing an Assessment Framework for U.S. Air Force Building Partnerships Programs
2010-01-01
www.rand.org as a public service of the RAND Corporation . 6Jump down to document THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH...HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE The RAND Corporation is a nonprofit research organization providing objective...NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Rand Corporation
17 CFR 240.15g-2 - Penny stock disclosure document relating to the penny stock market.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Penny stock disclosure document relating to the penny stock market. 240.15g-2 Section 240.15g-2 Commodity and Securities Exchanges... Section 15(d) of the Act § 240.15g-2 Penny stock disclosure document relating to the penny stock market...
17 CFR 240.15g-2 - Penny stock disclosure document relating to the penny stock market.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Penny stock disclosure document relating to the penny stock market. 240.15g-2 Section 240.15g-2 Commodity and Securities Exchanges... Section 15(d) of the Act § 240.15g-2 Penny stock disclosure document relating to the penny stock market...
17 CFR 240.15g-2 - Penny stock disclosure document relating to the penny stock market.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Penny stock disclosure document relating to the penny stock market. 240.15g-2 Section 240.15g-2 Commodity and Securities Exchanges... Section 15(d) of the Act § 240.15g-2 Penny stock disclosure document relating to the penny stock market...
17 CFR 240.15g-2 - Penny stock disclosure document relating to the penny stock market.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Penny stock disclosure document relating to the penny stock market. 240.15g-2 Section 240.15g-2 Commodity and Securities Exchanges... Section 15(d) of the Act § 240.15g-2 Penny stock disclosure document relating to the penny stock market...
49 CFR 1503.205 - Records, documents, and reports.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Records, documents, and reports. 1503.205 Section 1503.205 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES Investigative...
National Security Technology Incubator Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less
A History of Sandia’s Water Decision Modeling and Analysis Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lowry, Thomas Stephen; Pate, Ronald C.
This document provides a brief narrative, and selected project descriptions, that represent Sandia’s history involving data, modeling, and analysis related to water, energy-water nexus, and energy-water-agriculture nexus within the context of climate change. Sandia National Laboratories has been engaged since the early-1990s with program development involving data, modeling, and analysis projects that address the interdependent issues, risks, and technology-based mitigations associated with increasing demands and stresses being placed on energy, water, and agricultural/food resources, and the related impacts on their security and sustainability in the face of both domestic and global population growth, expanding economic development, and climate change.
NASA Astrophysics Data System (ADS)
Kuhn, D. R.; Tracy, Miles C.; Frankel, Sheila E.
2002-08-01
This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. This document is not intended to provide a mandatory framework for telecommuting or home office broadband communication environments, but rather to present suggested approaches to the topic.
NASA Astrophysics Data System (ADS)
Polyakov, M.; Odinokov, S.
2017-05-01
The report focuses on special printing industry, which is called secure printing, which uses printing techniques to prevent forgery or falsification of security documents. The report considered the possibility of establishing a spectral device for determining the authenticity of certain documents that are protected by machine-readable luminophor labels. The device works in two spectral ranges - visible and near infrared that allows to register Stokes and anti-Stokes spectral components of protective tags. The proposed device allows verification of the authenticity of security documents based on multiple criteria in different spectral ranges. It may be used at enterprises related to the production of security printing products, expert units of law enforcement bodies at check of authenticity of banknotes and other structures.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.300 General. (a) The Facility Security Assessment (FSA) is a written document that is...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.300 General. (a) The Facility Security Assessment (FSA) is a written document that is...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.300 General. (a) The Facility Security Assessment (FSA) is a written document that is...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.300 General. (a) The Facility Security Assessment (FSA) is a written document that is...
12 CFR 168.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...
12 CFR 568.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Security program. 568.3 Section 568.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...
12 CFR 391.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...
12 CFR 168.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...
12 CFR 391.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...
Adapting Rational Unified Process (RUP) approach in designing a secure e-Tendering model
NASA Astrophysics Data System (ADS)
Mohd, Haslina; Robie, Muhammad Afdhal Muhammad; Baharom, Fauziah; Darus, Norida Muhd; Saip, Mohamed Ali; Yasin, Azman
2016-08-01
e-Tendering is an electronic processing of the tender document via internet and allow tenderer to publish, communicate, access, receive and submit all tender related information and documentation via internet. This study aims to design the e-Tendering system using Rational Unified Process approach. RUP provides a disciplined approach on how to assign tasks and responsibilities within the software development process. RUP has four phases that can assist researchers to adjust the requirements of various projects with different scope, problem and the size of projects. RUP is characterized as a use case driven, architecture centered, iterative and incremental process model. However the scope of this study only focusing on Inception and Elaboration phases as step to develop the model and perform only three of nine workflows (business modeling, requirements, analysis and design). RUP has a strong focus on documents and the activities in the inception and elaboration phases mainly concern the creation of diagrams and writing of textual descriptions. The UML notation and the software program, Star UML are used to support the design of e-Tendering. The e-Tendering design based on the RUP approach can contribute to e-Tendering developers and researchers in e-Tendering domain. In addition, this study also shows that the RUP is one of the best system development methodology that can be used as one of the research methodology in Software Engineering domain related to secured design of any observed application. This methodology has been tested in various studies in certain domains, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth. As a conclusion, these studies showed that the RUP one of a good research methodology that can be adapted in any Software Engineering (SE) research domain that required a few artifacts to be generated such as use case modeling, misuse case modeling, activity diagram, and initial class diagram from a list of requirements as identified earlier by the SE researchers
Code of Federal Regulations, 2010 CFR
2010-01-01
... LOAN SECURITY DOCUMENTS FOR ELECTRIC BORROWERS Loan Contracts With Distribution Borrowers § 1718.102 Definitions. For the purposes of this subpart: Borrower means any organization that has an outstanding loan... defined in 7 CFR 1710.2. Loan documents means the mortgage (or other security instrument acceptable to RUS...
Smith, Sunny; Malinak, David; Chang, Jinnie; Perez, Maria; Perez, Sandra; Settlecowski, Erica; Rodriggs, Timothy; Hsu, Ming; Abrew, Alexandra; Aedo, Sofia
2017-03-01
Food insecurity is associated with many poor health outcomes yet is not routinely addressed in clinical settings. The purpose of this study was to implement a food insecurity screening and referral program in Student-run Free Clinics (SRFC) and to document the prevalence of food insecurity screening in this low-income patient population. All patients seen in three SRFC sites affiliated with one institution in San Diego, California were screened for food insecurity using the 6-item United States Department of Agriculture (USDA) Food Security Survey between January and July 2015 and referred to appropriate resources. The percentage of patients who were food insecure was calculated. The screening rate was 92.5% (430/463 patients), 74.0% (318/430) were food insecure, including 30.7% (132/430) with very low food security. A food insecurity registry and referral tracking system revealed that by January 2016, 201 participants were receiving monthly boxes of food onsite, 66 used an off-site food pantry, and 64 were enrolled in the Supplemental Nutrition Assistance Program (SNAP). It is possible to implement a food insecurity screening and referral program into SRFCs. The prevalence of food insecurity in this population was remarkably high yet remained largely unknown until this program was implemented. Other health care settings, particularly those with underserved patient populations, should consider implementing food insecurity screening and referral programs.
NASA Technical Reports Server (NTRS)
Mallasch, Paul G.
1993-01-01
This volume contains the complete software system documentation for the Federal Communications Commission (FCC) Transponder Loading Data Conversion Software (FIX-FCC). This software was written to facilitate the formatting and conversion of FCC Transponder Occupancy (Loading) Data before it is loaded into the NASA Geosynchronous Satellite Orbital Statistics Database System (GSOSTATS). The information that FCC supplies NASA is in report form and must be converted into a form readable by the database management software used in the GSOSTATS application. Both the User's Guide and Software Maintenance Manual are contained in this document. This volume of documentation passed an independent quality assurance review and certification by the Product Assurance and Security Office of the Planning Research Corporation (PRC). The manuals were reviewed for format, content, and readability. The Software Management and Assurance Program (SMAP) life cycle and documentation standards were used in the development of this document. Accordingly, these standards were used in the review. Refer to the System/Software Test/Product Assurance Report for the Geosynchronous Satellite Orbital Statistics Database System (GSOSTATS) for additional information.
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
49 CFR 659.23 - System security plan: contents.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...
Defense Technology Security Administration Strategic Plan 2009-2010
2008-12-22
NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Technology Security Administration ( DTSA ),Washington,DC 8. PERFORMING ORGANIZATION...Security Administration This document is unclassifi ed in its entirety. Photography courtesy of Defense Link and DTSA . Document printed 2009. DTSA ...STRATEGIC PLAN 2009-2010 C O N T E N T S Message from the Director 2 Envisioning 2010 3 Our Way Ahead 5 We Are DTSA 18 Metrics Matrix 24 DTSA
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of Proposed Rule Change Consisting of Establishment of a Subscription to Historical Information and Documents Submitted to... historical information and documents submitted to the MSRB's Short-Term Obligation Rate Transparency System...
45 CFR 164.316 - Policies and procedures and documentation requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 1 2014-10-01 2014-10-01 false Policies and procedures and documentation requirements. 164.316 Section 164.316 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of...
Security patterns and a weighting scheme for mobile agents
NASA Astrophysics Data System (ADS)
Walker, Jessie J.
The notion of mobility has always been a prime factor in human endeavor and achievement. This need to migrate by humans has been distilled into software entities, which are their representatives on distant environments. Software agents are developed to act on behalf of a user. Mobile agents were born from the understanding that many times it was much more useful to move the code (program) to where the resources are located, instead of connecting remotely. Within the mobile agent research community, security has traditionally been the most defining issue facing the community and preventing the paradigm from gaining wide acceptance. There are still numerous difficult problems being addressed with very few practical solutions, such as the malicious host and agent problems. These problems are some of the most active areas of research within the mobile agent community. The major principles, facets, fundamental concepts, techniques and architectures of the field are well understood within the community. This is evident by the many mobile agent systems developed in the last decade that share common core components such as agent management, communication facilities, and mobility services. In other words new mobile agent systems and frameworks do not provide any new insights into agent system architecture or mobility services, agent coordination, communication that could be useful to the agent research community, although these new mobile agent systems do in many instances validate, refine, demonstrate the reuse of many previously proposed and discussed mobile agent research elements. Since mobile agent research for the last decade has been defined by security and related issues, our research into security patterns are within this narrow arena of mobile agent research. The research presented in this thesis examines the issue of mobile agent security from the standpoint of security pattern documented from the universe of mobile agent systems. In addition, we explore how these documented security patterns can be quantitatively compared based on a unique weighting scheme. The scheme is formalized into a theory that can be used improve the development of secure mobile agents and agent-based systems.
Nevada National Security Site Industrial Sites Project Closeout - 12498
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cabble, Kevin; Krauss, Mark; Matthews, Pat
The U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office is responsible for environmental restoration (ER) at the Nevada National Security Site (NNSS). This includes remediation at Industrial Sites where past nuclear testing activities and activities that supported nuclear testing may have or are known to have resulted in the release of contaminants into the environment. Industrial Sites at the NNSS have included nuclear facilities that supported the nuclear rocket/missile development programs, gas stations, landfills, spill sites, ordnance sites, and numerous other waste disposal and release sites. The NNSS Industrial Sites activities neared completion at the endmore » of fiscal year 2011 while other activities required under the Federal Facility Agreement and Consent Order (FFACO) and part of the same NNSS ER Project are forecasted to extend to 2027 or beyond. With the majority of Industrial Sites corrective action units (CAUs) completed (more than 250 CAUs and over 1,800 corrective action sites), it was determined that an activity closeout process should be implemented to ensure that the work completed over the past 15 years is well documented in a comprehensive and concise summary. While the process used to close each individual CAU is described in approved documents, no single document describes in summary fashion the work completed to close the many individual Industrial Sites. The activity closeout process will be used to develop an Industrial Sites closeout document that describes these years of work. This document will summarize the number of Industrial Sites closed under the FFACO and provide general descriptions of projects, contaminants removed, and sites closed in place with corresponding Use Restrictions. Other pertinent information related to Industrial Sites work such as the project history, closure decisions, historical declarations, remediation strategies, and final CAU status will be included in the closeout document, along with a table listing each CAU and corresponding corrective action sites within each CAU. Using this process of conducting the activity closeout and developing a closeout document may prove useful for other ER projects within the DOE complex in describing how a long period of ER can be summarized in a single document. The NNSS Industrial Sites activities were completed over the span of 15 years and involved the investigation, cleanup or Use Restriction, and closure of more than 260 CAUs and over 1,800 sites. These activities will conclude in FY 2012 (with the exception of one CAU). In order to capture the work completed over this length of time and document decisions made during the activities, a closeout effort was initiated. The closeout will review the work conducted during the Industrial Sites activities and produce a single document that summarizes Industrial Sites activities. This closeout is being conducted at an interim stage in the overall NNSA/NSO ER Project since the Soils and UGTA activities will continue for a number of years, but the completion of the Industrial Sites project warrants conducting a closeout now while personnel are available and information is still current. The process followed by NNSA/NSO in conducing project closeout for the Industrial Sites portion of the ER program may prove useful within the DOE complex in demonstrating how a large ER project can be summarized. (authors)« less
Growth of Staphylococcus aureus and Fungi in Beef Snacks at Various Levels of Water Activity
1988-01-01
concentration, the detection methods used were sensitive to 0.1 yg/mL. The assay method used in the present study detects 0.1 to 1 ng/mL of...DoD 5200.1-R, Information Security Program Regulation, Chapter IX For Unclassified/Limited Distribution Documents: Destroy by any method that...CONTENTS PREFACE iii LIST OF FI8ÜRES v LIST OF TABLES . v INTRODUCTION 1 MATERIALS AND METHODS 1 Bee-f snack production 1 Experimental samples 1
Zhou, Ming; Chang, Shoude; Grover, Chander
2004-06-28
Further to the optical coding based on fluorescent semiconductor quantum dots (QDs), a concept of using mixtures of multiple single-color QDs for creating highly secret cryptograms based on their absorption/emission properties was demonstrated. The key to readout of the optical codes is a group of excitation lights with the predetermined wavelengths programmed in a secret manner. The cryptograms can be printed on the surfaces of different objects such as valuable documents for security purposes.
1975-03-01
Approved for U.S. Government only. This docu- ment is exempted from public availability be- cause of restrictions imposed by the Export Con- trol Act...Transmittal of this document outside the U.S. Government must have prior approval of the Supersonic Transport Office. 20 Security Classif (of this...linings may be determined by comparing nozzle/ejector radiated noise power levels between the unlined (hardwall) ejector case and the lined ejector
Speaker Verification Using SVM
2010-11-01
application the required resources are provided by the phone itself. Speaker recognition can be used in many areas, like: • homeland security: airport ... security , strengthening the national borders, in travel documents, visas; • enterprise-wide network security infrastructures; • secure electronic
76 FR 56208 - Homeland Security Advisory Council, Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-12
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0063] Homeland Security Advisory Council... Security Advisory Council in the Federal Register on September 6, 2011. The document contained an incorrect... completed before 3 p.m. Dated: September 7, 2011. Becca Sharp, Executive Director, Homeland Security...
49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 7 2010-10-01 2010-10-01 false Secure Printing Processes and Other Secure... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure... printing—a printing process utilized in the production of bank-notes and other security documents whereby...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-02
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34--62161; File No. SR--ODD--2010--01] Self... of Supplement to the Options Disclosure Document Reflecting Certain Changes to Disclosure Regarding Options on Conventional Index-Linked Securities and Amendment to the Options Disclosure Document Inside...
1998-05-01
distribution limitations recommended if public release is not approved. The ASD(PA) shall also process appeals when public release denial is based upon...Rules of Evidence, and all other applicable laws. An interlocutory appeal by the United States shall lie from a decision or order of a district court... limitations ; document markings; document preparation; scientific and technical information; STINFO; information security; security training
12 CFR 748.0 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...
12 CFR 748.0 - Security program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...
Security, insecurity and health.
Coupland, Robin
2007-03-01
An examination of the nexus of security, insecurity and health shows that security is a prerequisite for health. The many and varied ways that armed violence--including threats of armed violence--can affect people's health can be documented by formal studies; however, valuable data also exist in other reports, such as media reports. The health community needs to recognize that people's insecurity is a massive global health issue. The foreign policies of donor governments should incorporate recognition that documentation, analysis and publication of data describing the impact of insecurity on people's health can lead to the creation of policies to enhance people's security.
Trainer Engineering Report (Final) for MILES. Volume 2. Revision
1981-04-22
formerly a separate document, Data Item AOOX. iii/iv 1A , SECURITY CLASSIFICATION OF THIS PAGE (Uhen Deaa Enterecd) ... __ . ....... REPORT DOCUMENTATION...NAVTRAEQUIPCEN, Orlando, FL 32813 3 14. MON’TORING AGENCY NAME & ADDRESS(II dilletent from CoftrollIn OGlue*) IS. SECURITY CLASS. (of thie twoot...OBSOLETE UNCLASSIFIED S/N 0102蓞-6601 I SECURITY CL.ASSIFICATION OF THIS iPAGE fUlses Data EaieteE i • CONTENTS .I * INTRODUCTION 1-1 1.1 1980 MILES 1-1
49 CFR 1546.103 - Form, content, and availability of security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Form, content, and availability of security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a...
49 CFR 1546.103 - Form, content, and availability of security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Form, content, and availability of security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a...
NASA Astrophysics Data System (ADS)
Rehan, S. C.
This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.
University of Texas Safeguards by Design Problem Statement
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rauch, Eric Benton; Scherer, Carolynn P.; Ruggiero, Christy E.
This document describes the problem statement that students at the University of Texas will use for their senior level capstone design class. The purpose of this project is to introduce students to Safeguards by Design concepts as part of their capstone design course at the culmination of their degree program. This work is supported by Los Alamos National Laboratory with FY17 and FY18 programmatic funding from the U. S. Department of Energy’s (DOE) National Nuclear Security Administration (NNSA), through the Office of Defense Nuclear Nonproliferation (DNN), Office of International Nuclear Safeguards (INS), Next Generation Safeguards Initiative (NGSI), Human Resource Developmentmore » Program, Safeguards by Design Project.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Elvado Environmental, LLC
2009-09-01
This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with themore » multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of Babcock & Wilcox Technical Services Y-12 LLC (hereafter referenced as B&W Y-12), the Y-12 management and operations (M&O) contractor for DOE. B&W Y-12 is a new corporate name, assumed in January 2007, for the company formerly known as BWXT Y-12, L.L.C., hereafter referenced as BWXT. This GWPP management plan addresses the requirements of DOE Order 450.1A Environmental Protection Program (hereafter referenced as DOE O 450.1A), which emphasize a site-wide approach for groundwater protection at each DOE facility through implementation of groundwater surveillance monitoring. Additionally, this plan addresses the relevant and applicable GWPP elements and goals described in the DOE O 450.1A technical guidance documents issued in June 2004 (DOE 2004) and May 2005 (DOE 2005). This GWPP management plan is a 'living' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP, and an overview of ongoing Y-12 groundwater monitoring activities. Section 3 describes the key elements of the GWPP management strategy. Organizational roles and responsibilities of GWPP personnel are outlined in Section 4. Section 5 presents an overview of the GWPP project plans for applicable programmatic elements. Section 6 lists the reports, plans, and documents that are referenced for technical and administrative details.« less
An Analysis of Sea Turtle Demographics along Maryland Shores, 1990-2015
NASA Astrophysics Data System (ADS)
Rhoades, C.; Driscoll, C.; Weschler, A.; Crawford, M.
2016-02-01
The Maryland Department of Natural Resources Marine Mammal and Sea Turtle Stranding Program was established in the fall of 1990, and responded to their first documented sea turtle stranding in the summer of 1991. Over this twenty-five year period, 575 dead strandings of sea turtles have been documented. This research project analyzes all sea turtle case files from the initiation of this program for the following parameters in order to associate stranding trends; species, location (Atlantic Ocean v. Chesapeake Bay), seasonality, length, relative age, condition code, and sex. Further understanding these protected species will assist in conserving their coastal ecosystem and securing these species a sustainable future. Along with the parameters previously discussed, this study will also consider the factors contributing to the animal's death, if determined. These potential causes incorporate natural causes such as disease, and also detail instances of human interaction, including: dredge takes, commercial or recreational fishing interaction, power plant entrainment, propeller and boat strikes. A total of approximately 17% of the dead stranded sea turtles Maryland Department of Natural Resources responded to were found to have some proven aspect of human interaction. Lastly, in order to further investigate for human interaction stomach contents were analyzed for plastics or other forms of marine debris. This project will contribute to MD DNR and NOAA's mission, goals, and objectives by further understanding these protected species in order to conserve their coastal ecosystem and secure these species a sustainable future.
NASA Technical Reports Server (NTRS)
Zelkin, Natalie; Henriksen, Stephen
2011-01-01
This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
DOT National Transportation Integrated Search
2016-07-01
This document provides guidance material in regards to security for the CV Pilots Deployment Concept Development Phase. An approach for developing the security operational concept is presented based on identifying the impacts of security breaches reg...
Birds of a Feather: Supporting Secure Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Braswell III, H V
2006-04-24
Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management,more » PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-07
... COMMODITY FUTURES TRADING COMMISSION 17 CFR Part 1 RIN 3038-AD46 SECURITIES AND EXCHANGE...-Based Swap Agreement Recordkeeping AGENCY: Commodity Futures Trading Commission; Securities and Exchange... Futures Trading Commission and the Securities and Exchange Commission published a document in the Federal...
Defense in Depth: Foundation for Secure and Resilient IT Enterprises
2006-09-01
Gabbard , D., & May, C. (2003). Outsourcing Managed Security Service. http://www.sei.cmu.edu/publications/documents/sims/sim012.html. 296 CMU/SEI...security_matters/2001/2q01/security-2q01.htm. [Allen 03] Allen, J., Gabbard , D., & May, C. Outsourcing Managed Security Service (CMU/SEI-SIM-012
49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.15 SSI disclosed by TSA or the Coast Guard. (a) In... allegations contained in a legal enforcement action document issued by TSA or the Coast Guard. (2) Security...
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1987-12-31
This report also provides data on the initiatives being implemented as a result of the review of domestic airport security by the Secretary’s Safety...enforcement support for airline and airport security measures. Finally, the passengers-the ultimate beneficiaries of the security program--pay for...of these airports is required to implement a security program which provides a secure operating environment for these air carriers. Airport security programs
Effectiveness of the Civil Aviation Security Program.
1979-12-05
The airline and airport security measures currently in effect continue to provide increased safety for airline passengers and crews as well as...107 governing airport security . other ongoing programs which contributed significantly to airport security included the training of law enforce- ment...officers supporting airport security programs and the explosives detection K(9 team program. Highlights of these actions and programs are summarized
7 CFR 274.8 - Functional and technical EBT system requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...
7 CFR 274.8 - Functional and technical EBT system requirements.
Code of Federal Regulations, 2011 CFR
2011-01-01
... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...
7 CFR 274.8 - Functional and technical EBT system requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...
7 CFR 274.8 - Functional and technical EBT system requirements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
NASA Astrophysics Data System (ADS)
Pasaribu, Hendra; Sitanggang, Delima; Rizki Damanik, Rudolfo; Rudianto Sitompul, Alex Chandra
2018-04-01
File transfer by using a smartphone has some security issues like data theft by irresponsible parties. To improve the quality of data security systems on smartphones, in this research the integration of AES 256 bit algorithm by using MD5 hashing is proposed. The use of MD5 aims to increase the key strength of the encryption and decryption process of document files. The test results show that the proposed method can increase the key strength of the encryption and decryption process in the document file. Encryption and decryption time by using AES and MD5 combination is faster than using AES only on *.txt file type and reverse results for *.docx, *.xlsx, *.pptx and *.pdf file files.
Facility Decontamination and Decommissioning Program Surveillance and Maintenance Plan, Revision 2
DOE Office of Scientific and Technical Information (OSTI.GOV)
Poderis, Reed J.; King, Rebecca A.
This Surveillance and Maintenance (S&M) Plan describes the activities performed between deactivation and final decommissioning of the following facilities located on the Nevada National Security Site, as documented in the Federal Facility Agreement and Consent Order under the Industrial Sites program as decontamination and decommissioning sites: ? Engine Maintenance, Assembly, and Disassembly (EMAD) Facility: o EMAD Building (Building 25-3900) o Locomotive Storage Shed (Building 25-3901) ? Test Cell C (TCC) Facility: o Equipment Building (Building 25-3220) o Motor Drive Building (Building 25-3230) o Pump Shop (Building 25-3231) o Cryogenic Lab (Building 25-3232) o Ancillary Structures (e.g., dewars, water tower, piping,more » tanks) These facilities have been declared excess and are in various stages of deactivation (low-risk, long-term stewardship disposition state). This S&M Plan establishes and implements a solid, cost-effective, and balanced S&M program consistent with federal, state, and regulatory requirements. A graded approach is used to plan and conduct S&M activities. The goal is to maintain the facilities in a safe condition in a cost-effective manner until their final end state is achieved. This plan accomplishes the following: ? Establishes S&M objectives and framework ? Identifies programmatic guidance for S&M activities to be conducted by National Security Technologies, LLC, for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) ? Provides present facility condition information and identifies hazards ? Identifies facility-specific S&M activities to be performed and their frequency ? Identifies regulatory drivers, NNSA/NFO policies and procedures, and best management practices that necessitate implementation of S&M activities ? Provides criteria and frequencies for revisions and updates ? Establishes the process for identifying and dispositioning a condition that has not been previously identified or documented ? Provides instructions for implementing annual S&M inspections and activities The following facilities that were included in Revision 1 of this plan have reached final disposition and are no longer in the S&M program: ? Reactor Maintenance, Assembly, and Disassembly Facility, Building 25-3110 ? Test Cell A Facility, Building 25-3113 ? TCC Facility, Building 25-3210 ? Pluto Disassembly Facility, Building 26-2201 ? Super Kukla Facility, Building 27-5400« less
Lardeau, M-P; Healey, G; Ford, J
2011-01-01
Food insecurity is a chronic problem affecting Inuit communities. The most comprehensive assessment of Inuit food security to-date, the Inuit Health Survey, reported that 70% of Inuit pre-school children lived in 'food insecure' households. Food banks and soup kitchens are relatively new in the Arctic but the number of users is increasing. Little is known about the experience and determinants of food insecurity among food program users who are often among the most marginalized (socially and economically) in communities. The use of participatory research methods when working in the north of Canada can promote meaningful knowledge exchange with community members and this approach was used in the present 'Photovoice' research. Photovoice uses photography to develop a baseline understanding of an issue, in this case the experience and determinants of food insecurity among users of community food programs in Iqaluit, Nunavut. The target population includes those who face significant social and economic marginalization, an often neglected group in Arctic food systems research. Eight regular users of food programs were recruited and engaged in a Photovoice research project to document factors determining their daily food consumption. The research method was introduced in workshops and discussion included the ethical concerns related to photography and how to take pictures. Participants were supplied with digital cameras, and asked to answer the following question using photography: 'What aspects of your everyday life affect what you eat and how much you have to eat?'. In the final workshop, photographs were discussed among the group and participants identified key themes in the photographs, offering an understanding of food insecurity from their perspectives. The group then discussed what should be done with the knowledge gained. Factors improving food security were the customary systems for sharing 'country food', and the presence of social support networks in the community, such as the Food Bank, the Soup Kitchen and the Tukisigiarvik Center. Factors identified as negatively affecting food security were the high cost of food in the Arctic, and substance abuse. The participants decided by consensus whether and how the knowledge from this project would be disseminated. They decided that a museum exhibit of the photographs in the summer of 2010 and promotion of the results among policy-makers in Nunavut were of high priority. The use of participatory research approaches such as Photovoice offers promise for exploring food security issues among similarly disadvantaged and vulnerable populations elsewhere in the Arctic. This approach was found to be a useful method for gathering and sharing research data because the data was generated and analysed by the participants. The clear and concise messages developed by the participants can be used to inform policy. This research method can assist in making a valuable contribution to health research, both in the Arctic and worldwide, because it promotes an understanding of the experiences of individuals from their own perspective.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, G.; Mansur, D.L.; Ruhter, W.D.
1994-01-01
The Lawrence Livermore National Laboratory (LLNL) carries out safeguards and security activities for the Department of Energy (DOE), Office of Safeguards and Security (OSS), as well as other organizations, both within and outside the DOE. This document summarizes the activities conducted for the OSS during the first quarter of fiscal year 1994 (October through December, 1993). The nature and scope of the activities carried out for OSS at LLNL require a broad base of technical expertise. To assure projects are staffed and executed effectively, projects are conducted by the organization at LLNL best able to supply the needed technical expertise.more » These projects are developed and managed by senior program managers. Institutional oversight and coordination is provided through the LLNL Deputy Director`s office. At present, the Laboratory is supporting OSS in five areas: (1) Safeguards Technology, (2) Safeguards and Decision Support, (3) Computer Security, (4) DOE Automated Physical Security, and (5) DOE Automated Visitor Access Control System. This report describes the activities in each of these five areas. The information provided includes an introduction which briefly describes the activity, summary of major accomplishments, task descriptions with quarterly progress, summaries of milestones and deliverables and publications published this quarter.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, G.; Mansur, D.L.; Ruhter, W.D.
The Lawrence Livermore National Laboratory (LLNL) carries out safeguards and security activities for the Department of Energy (DOE), Office of Safeguards and Security (OSS), as well as other organizations, both within and outside the DOE. This document summarizes the activities conducted for the OSS during the First Quarter of Fiscal Year 1997 (October through December, 1996). The nature and scope of the activities carried out for OSS at LLNL require a broad base of technical expertise. To assure projects are staffed and executed effectively, projects are conducted by the organization at LLNL best able to supply the needed technical expertise.more » These projects are developed and managed by senior program managers. Institutional oversight and coordination is provided through the LLNL Deputy Director`s office. At present, the Laboratory is supporting OSS in four areas: (1) safeguards technology; (2) safeguards and material accountability; (3) computer security--distributed systems; and (4) physical and personnel security support. The remainder of this report describes the activities in each of these four areas. The information provided includes an introduction which briefly describes the activity, summary of major accomplishments, task descriptions with quarterly progress, summaries of milestones and deliverables and publications published this quarter.« less
44 CFR 8.3 - Senior FEMA official responsible for the information security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the Security...
Review of flat panel display programs and defense applications
NASA Astrophysics Data System (ADS)
Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.
1997-07-01
Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.
NASA Technical Reports Server (NTRS)
2001-01-01
REI Systems, Inc. developed a software solution that uses the Internet to eliminate the paperwork typically required to document and manage complex business processes. The data management solution, called Electronic Handbooks (EHBs), is presently used for the entire SBIR program processes at NASA. The EHB-based system is ideal for programs and projects whose users are geographically distributed and are involved in complex management processes and procedures. EHBs provide flexible access control and increased communications while maintaining security for systems of all sizes. Through Internet Protocol- based access, user authentication and user-based access restrictions, role-based access control, and encryption/decryption, EHBs provide the level of security required for confidential data transfer. EHBs contain electronic forms and menus, which can be used in real time to execute the described processes. EHBs use standard word processors that generate ASCII HTML code to set up electronic forms that are viewed within a web browser. EHBs require no end-user software distribution, significantly reducing operating costs. Each interactive handbook simulates a hard-copy version containing chapters with descriptions of participants' roles in the online process.
Padilla-Frausto, Imelda D; Wallace, Steven P
2015-08-01
More than three-quarters of a million (772,000) older Californians are among the "hidden poor"--older adults with incomes above the federal poverty line (FPL) but below a minimally decent standard of living as determined by the Elder Economic Security Standard™ Index (Elder Index) in 2011. This policy brief uses the most recent Elder Index calculations to document the wide discrepancy that exists between the FPL and the Elder Index. This study finds that the FPL significantly underestimates the number of economically insecure older adults who are unable to make ends meet. Yet, because many public assistance programs are aligned with the FPL, potentially hundreds of thousands of economically insecure older Californians are denied aid. The highest rates of the hidden poor among older adults are found among renters, Latinos, women, those who are raising grandchildren, and people in the oldest age groups. Raising the income and asset eligibility requirement thresholds for social support programs such as Supplemental Security Income (SSI), housing, health care, and food assistance would help California's older hidden poor make ends meet.
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-03
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-64766; File No. S7-25-11] RIN 3235-AL10 Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap Participants Correction In proposed rule document number 2011-16758, appearing on pages 42396-42455 in the...
A scoping review of traditional food security in Alaska.
Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa
2018-12-01
Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.
NEVADA TEST SITE WASTE ACCEPTANCE CRITERIA, JUNE 2006
DOE Office of Scientific and Technical Information (OSTI.GOV)
U.S. DEPARTMENT OF ENERGY, NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE
This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) waste acceptance criteria (WAC). The WAC provides the requirements, terms, and conditions under which the Nevada Test Site (NTS) will accept low-level radioactive (LLW) and mixed waste (MW) for disposal. It includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NTS Area 3 and Area 5 Radioactive Waste Management Complex (RWMC) for storage or disposal.
Nevada Test Site Waste Acceptance Criteria
DOE Office of Scientific and Technical Information (OSTI.GOV)
U. S. Department of Energy, National Nuclear Security Administration Nevada Site Office
This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) waste acceptance criteria (WAC). The WAC provides the requirements, terms, and conditions under which the Nevada Test Site (NTS) will accept low-level radioactive (LLW) and mixed waste (MW) for disposal. It includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NTS Area 3 and Area 5 Radioactive Waste Management Complex (RWMC) for storage or disposal.
1983-06-01
SCHOOL MONTEREY CA R T SCHWAB JUN 83 NCLASSIFIED F/G 9/2 N Enhloss monsooI mhhhhhhhhhhhhI --. II14Il m -. 7 • oo 116 L.ll ___ M - m # 1&-1 12.0ih - & L...Schwab CU~ June 1983 Thesis Advisor: Donald M . Layton Approved for public release; distribution unlimited DISCLAIMER NOTICE THIS DOCUMENT IS BEST...School June 83 Monterey, California 93940 IS. NUMBER OF PAGES 61 ~4. MOIT M14N TGMC %ZAME a 4001RESS1(fi Musang " M Co"ausm Off) IS. SECURITY CLASS. (of
DOE Office of Scientific and Technical Information (OSTI.GOV)
Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.
This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.
5 CFR 1312.12 - Security Program Review Committee.
Code of Federal Regulations, 2011 CFR
2011-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Security Program Review Committee. 1312...
5 CFR 1312.12 - Security Program Review Committee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security Program Review Committee. 1312...
Dattalo, M; Wise, M; Ford Ii, J H; Abramson, B; Mahoney, J
2017-04-01
As of October 2016, use of federal Older Americans Act funds for health promotion and disease prevention will be restricted to the Administration on Aging's criteria for high-level evidence-based health promotion programs. Dissemination of these programs to rural communities remains limited. Therefore a strong need exists to identify strategies that facilitate program implementation and sustainability. The objective of this study was to compare organizational readiness and implementation strategies used by rural communities that achieved varying levels of success in sustaining evidence-based health promotion programs for older adults. We utilized a qualitative multi-site case study design to analyze the longitudinal experiences of eight rural sites working to implement evidence-based health promotion program over 3 years (8/2012-7/2015). Multiple sources of data (interviews, documents, reports, surveys) from each site informed the analysis. We used conventional content analysis to conduct a cross-case comparison to identify common features of rural counties that successfully implemented and sustained their target evidence-based health promotion program. Readiness to implement evidence-based programs as low at baseline as all site leaders described needing to secure additional resources for program implementation. Sites that successfully utilized six essential resources implemented and sustained greater numbers of workshops: (1) External Partnerships, (2) Agency Leadership Commitment, (3) Ongoing Source of Workshop Leaders, (4) Health Promotion Coordination Tasks Assigned to Specific Staff, (5) Organizational Stability, and (6) Change Team Engagement. The six essential resources described in this study can help rural communities assess their readiness to implement health promotion programs and work secure the resources necessary for successful implementation.
NASA Technical Reports Server (NTRS)
Tencati, Ron
1991-01-01
An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.
Managing Documents in the Wider Area: Intelligent Document Management.
ERIC Educational Resources Information Center
Bittleston, Richard
1995-01-01
Discusses techniques for managing documents in wide area networks, reviews technique limitations, and offers recommendations to database designers. Presented techniques include: increasing bandwidth, reducing data traffic, synchronizing documentation, partial synchronization, audit trials, navigation, and distribution control and security. Two…
Code of Federal Regulations, 2010 CFR
2010-04-01
... plan may provide that any such document may be transferred to microfilm or other recording medium after... years or at such earlier date as is specified in a plan for the destruction or disposition of any such documents if such plan has been filed with the Commission by such exchange, association, clearing agency or...
Nevada National Security Site Radiological Control Manual
DOE Office of Scientific and Technical Information (OSTI.GOV)
Radiological Control Managers’ Council
2012-03-26
This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted bymore » programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of low-level radioactive waste and the handling of radioactive sources. Remediation of contaminated land areas may also result in radiological exposures.« less
NASA Astrophysics Data System (ADS)
Riesmeier, Joerg; Eichelberg, Marco; Kleber, Klaus; Groenemeyer, Dietrich H.; Oosterwijk, Herman J.; Jensch, Peter F.
2002-05-01
With the release of 'DICOM Structured Reporting' (SR) as an official extension of the standard about two years ago, DICOM has entered a new domain that is only indirectly related to medical imaging. Basically, DICOM SR is a general model allowing to encode medical reports in a structured manner in DICOM's tag-based format. Therefore, the existing DICOM infrastructure can be used to archive and communicate structured reports, with only relatively small changes to existing systems. As a consequence of the introduction of medical reports in a digital form, the relevance of security measures increases significantly. We have developed a prototype implementation of DICOM structured reporting together with the new security extensions for secure transport connections and digital signatures. The application allows to create, read and modify any SR document, to digitally sign an SR document in whole or part and to transmit such documents over a network. While the secure transport connection protects data from modifications or unauthorized access only during transmission, digital signatures provide a lifetime integrity check and, therefore, maintain the legal document status of structured reports. The application has been successfully demonstrated at RSNA 2000 and ECR 2001, and is freely available on the Internet.
Sharing the Load: Amish Healthcare Financing
Rohrer, Kristyn; Dundes, Lauren
2016-01-01
When settling healthcare bills, the Old Order Amish of Lancaster County, Pennsylvania rely on an ethos of mutual aid, independent of the government. Consonant with this philosophy, many Amish do not participate in or receive benefits from Social Security or Medicare. They are also exempted from the Affordable Care Act of 2010. This study expands the limited documentation of Amish Hospital Aid, an Amish health insurance program that covers major medical costs. Interview data from 11 Amish adults in Lancaster County depict how this aid program supplements traditional congregational alms coverage of medical expenses. The interview data delineate the structure of the program, its operation, and how it encourages cost containment and community interdependence. The manner in which the Amish collaborate to pay for medical expenses provides a thought-provoking paradigm for managing health care costs. PMID:27983624
Advanced Technology System Scheduling Governance Model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ang, Jim; Carnes, Brian; Hoang, Thuc
In the fall of 2005, the Advanced Simulation and Computing (ASC) Program appointed a team to formulate a governance model for allocating resources and scheduling the stockpile stewardship workload on ASC capability systems. This update to the original document takes into account the new technical challenges and roles for advanced technology (AT) systems and the new ASC Program workload categories that must be supported. The goal of this updated model is to effectively allocate and schedule AT computing resources among all three National Nuclear Security Administration (NNSA) laboratories for weapons deliverables that merit priority on this class of resource. Themore » process outlined below describes how proposed work can be evaluated and approved for resource allocations while preserving high effective utilization of the systems. This approach will provide the broadest possible benefit to the Stockpile Stewardship Program (SSP).« less
Israel security in the 21st century: Risks and opportunities. Research report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eisenkot, G.
Unlike the United States which publicizes its national security strategy and national military strategy in official public documents, Israel, does not produce such documents for the general public. This may appear paradoxical in that the State of Israel, from its very inception, has invested enormous energy in its security. Nevertheless, Israel has no detailed security doctrine approved and updated by the Cabinet, the Knesset (Israel`s parliament) or the General Staff. The lack of an official, published, security doctrine does not imply that Israel lacks a coherent political and military strategy based on doctrine-like concepts. Israel`s political and military successes aremore » proof to the contrary. Our purpose, then, is to identify a number of the critical Security Principles that have shaped Israeli strategy. This will provide us the foundation for our main discussion which is the risks and challenges to Israeli security in the 21st century and possible responses to those challenges.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.
NASA Astrophysics Data System (ADS)
Itoh, Masanao
This article aims to explain the role and function of the faculty archives affiliated with the faculty of economics, the University of Tokyo, which preserves corporate and private documents and records of importance as historical materials received from various corporations and individuals and makes them available to the researcher and public, and then to explain how and why we have hold the original documents and records of Yamaichi Securities Company which had failed in 1997.
75 FR 57102 - Occupational Information Development Advisory Panel Meeting; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-17
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0058] Occupational Information Development Advisory Panel Meeting; Correction AGENCY: Social Security Administration. ACTION: Notice; correction. SUMMARY: The Social Security Administration published a document in the Federal Register of September 13...
Code of Federal Regulations, 2013 CFR
2013-10-01
... requirements shall include the following components: (i) Determination and implementation of appropriate... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... reviews, together with pertinent supporting documentation, for HHS on-site review. [43 FR 44853, Sept. 29...
Code of Federal Regulations, 2012 CFR
2012-10-01
... requirements shall include the following components: (i) Determination and implementation of appropriate... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... reviews, together with pertinent supporting documentation, for HHS on-site review. [43 FR 44853, Sept. 29...
Code of Federal Regulations, 2014 CFR
2014-10-01
... requirements shall include the following components: (i) Determination and implementation of appropriate... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... reviews, together with pertinent supporting documentation, for HHS on-site review. [43 FR 44853, Sept. 29...
The Document Management Alliance.
ERIC Educational Resources Information Center
Fay, Chuck
1998-01-01
Describes the Document Management Alliance, a standards effort for document management systems that manages and tracks changes to electronic documents created and used by collaborative teams, provides secure access, and facilitates online information retrieval via the Internet and World Wide Web. Future directions are also discussed. (LRW)
7 CFR 772.6 - Subordination of security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.6 Subordination of security. (a) Eligibility. The Agency shall grant a subordination of Minor Program loan security when the transaction will... still be adequately secured after the subordination, or the value of the loan security will be increased...
15 CFR 2008.16 - Security education program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures for...
2009-04-21
6 Intercity Passenger Rail Program (Amtrak) .....................................................................6... Intercity Bus Security Grant Program..............................................................................7 Trucking Security Program...continue security enhancements for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-16
... measure their effectiveness. Through its voluntary Corporate Security Review (CSR) Program, TSA's Highway... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Approval From OMB of One New Public Collection of Information: Security Program for Hazardous Materials Motor...
Near-Term Options for Improving Security at Los Angeles International Airport
2004-09-26
the Transportation Security Administration (TSA), the Los Angeles Police Department ( LAPD ), and LAX to make sure the list was reasonable...World Airports; the Transportation Security Agency; the Los Angeles International Airport Police Department ; the Los Angeles Police Department ; the Los ...Airports. iii PREFACE This document assesses near-term security
New Brunswick Laboratory. Progress report, October 1995--September 1996
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
Fiscal year (FY) 1996 was a very good year for New Brunswick Laboratory (NBL), whose major sponsor is the Office of Safeguards and Security (NN-51) in the US Department of Energy (DOE), Office of Nonproliferation and National Security, Office of Security Affairs. Several projects pertinent to the NBL mission were completed, and NBL`s interactions with partners and customers were encouraging. Among the partners with which NBL interacted in this report period were the International Atomic Energy Agency (IAEA), NN-51. Environmental Program Group of the DOE Chicago Operations Office, International Safeguards Project Office, Waste Isolation Pilot Plant (WIPP), Ukraine Working Group,more » Fissile Materials Assurance Working Group, National Institute of Standards and Technology (NIST), Nuclear Regulatory Commission (NRC), Institute for Reference Materials and Measurements (IRMM) in Belgium, Brazilian/Argentine Agency for Accounting and Control of Nuclear Materials (ABACC), Lockheed Idaho Technologies Company, and other DOE facilities and laboratories. NBL staff publications, participation in safeguards assistance and other nuclear programs, development of new reference materials, involvement in the updating and refinement of DOE documents, service in enhancing the science education of others, and other related activities enhanced NBL`s status among DOE laboratories and facilities. Noteworthy are the facts that NBL`s small inventory of nuclear materials is accurately accounted for, and, as in past years, its materials and human resources were used in peaceful nuclear activities worldwide.« less
Topic Detection in Online Chat
2009-09-01
CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18 . SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY CLASSIFICATION...Documents and Author-Author Documents—Radial Kernel. .............. 66 Figure 18 . Classifiers Results: LDA Models Created by Textbook-Author...Trained on Two Classes............................................................................................... 72 Table 18 . Maximum
78 FR 67210 - Charging Standard Administrative Fees for Nonprogram-Related Information; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-08
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0026] Charging Standard Administrative Fees for Nonprogram-Related Information; Correction AGENCY: Social Security Administration. ACTION: Notice... Social Security Administration published a document in the Federal Register of September 18, 2013...
Leading by Example: The Case for IT Security in Academia
ERIC Educational Resources Information Center
Davidson, Mary Ann
2005-01-01
Leadership in IT security is needed. Security matters: the ethics, the economics, and the social implications. There is much the academic community can do to help ensure cybersecurity. This document discusses steps academia can take to help ensure cybersecurity.
About machine-readable travel documents
NASA Astrophysics Data System (ADS)
Vaudenay, S.; Vuagnoux, M.
2007-07-01
Passports are documents that help immigration officers to identify people. In order to strongly authenticate their data and to automatically identify people, they are now equipped with RFID chips. These contain private information, biometrics, and a digital signature by issuing authorities. Although they substantially increase security at the border controls, they also come with new security and privacy issues. In this paper, we survey existing protocols and their weaknesses.
Public key infrastructure for DOE security research
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aiken, R.; Foster, I.; Johnston, W.E.
This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less
Self-authentication of value documents
NASA Astrophysics Data System (ADS)
Hayosh, Thomas D.
1998-04-01
To prevent fraud it is critical to distinguish an authentic document from a counterfeit or altered document. Most current technologies rely on difficult-to-print human detectable features which are added to a document to prevent illegal reproduction. Fraud detection is mostly accomplished by human observation and is based upon the examiner's knowledge, experience and time allotted for examination of a document. Another approach to increasing the security of a value document is to add a unique property to each document. Data about that property is then encoded on the document itself and finally secured using a public key based digital signature. In such a scheme, machine readability of authenticity is possible. This paper describes a patent-applied-for methodology using the unique property of magnetic ink printing, magnetic remanence, that provides for full self- authentication when used with a recordable magnetic stripe for storing a digital signature and other document data. Traditionally the authenticity of a document is determined by physical examination for color, background printing, paper texture, printing resolution, and ink characteristics. On an initial level, there may be numerous security features present on a value document but only a few can be detected and evaluated by the untrained individual. Because security features are normally not standardized except on currency, training tellers and cashiers to do extensive security evaluation is not practical, even though these people are often the only people who get a chance to closely examine the document in a payment system which is back-end automated. In the context of this paper, one should be thinking about value documents such as commercial and personal checks although the concepts presented here can easily be applied to travelers cheques, credit cards, event tickets, passports, driver's licenses, motor vehicle titles, and even currency. For a practical self-authentication system, the false alarms should be less than 1% on the first read pass. Causes of false alarms could be the lack of robustness of the taggant discrimination algorithm, excessive document skew as it is being read, or errors in reading the recordable stripe. The false alarm rate is readily tested by reading the magnetic tags and digitally signing documents in one reader and performing authentication in at least two other reading devices. When reading the same check in the same reader where signed, the error metric is typically in the range of 0.0600. When comparing different checks in different readers, the error metric generally reports values in the range of 0.3930. It is clear from tests to date that the taggant patterns are randomly different for checks even when printed serially one after another using the same printing process. Testing results to date on the robustness of the taggant comparison and discrimination algorithms indicate that it is probable that low false alarms and very low false accept rates will be achieved.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
The role of optics in secure credentials
NASA Astrophysics Data System (ADS)
Lichtenstein, Terri L.
2006-02-01
The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.
76 FR 81359 - National Security Personnel System
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-28
... contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization...
10 CFR 95.39 - External transmission of documents and material.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Procedures Plan for the protection of classified information. (e) Security of classified information in... Section 95.39 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.39 External...
10 CFR 95.39 - External transmission of documents and material.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Procedures Plan for the protection of classified information. (e) Security of classified information in... Section 95.39 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.39 External...
10 CFR 95.39 - External transmission of documents and material.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Procedures Plan for the protection of classified information. (e) Security of classified information in... Section 95.39 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.39 External...
10 CFR 95.39 - External transmission of documents and material.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Procedures Plan for the protection of classified information. (e) Security of classified information in... Section 95.39 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.39 External...
10 CFR 95.39 - External transmission of documents and material.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Procedures Plan for the protection of classified information. (e) Security of classified information in... Section 95.39 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.39 External...
The African Peace and Security Architecture: Myth or Reality
2013-03-01
resolving the conflicts. Efforts by African leaders to create continental peace and security mechanisms failed miserably . Consequently, Africans depended...Framework Document, October 2001), 14. 6 Andre Le Sage, “Africa’s Irregular Security Threats: Challenges for U.S. Engagement,” (Strategic Forum
77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-17
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...
78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-08
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1984-04-13
AD-fl143 023 SEMIANNUAL REPORT TO CONGRESS ON THEUEFFECTIVENESS OF i/i THE CIVIL AVIATION SECURITY PROGRAM(U) FEDERAL AVIATION ADMINISTRATION...Semiannual Report to O Congress on the US Deportmnent of TrasEffectiveness ofi of TransportationFedewl Avkffim Avao The Civil Aviation - Security Program... Aviation Security Program 8. Performing OrgniaetioNi RePwt Us. Aviation Security Division 9. Performing Organistion Name and Address 10. Work Unit No
'Second generation' Internet e-health: the gladiator for HIPAA compliance?
Korpman, R A; Rose, J S
2001-01-01
The Health Insurance Portability and Accountability Act (HIPAA) is intended to simplify administrative processes and improve health information security. There are a number of traditional ways to address the expense and complexities of simplification, but none of them are bargains or beauties to behold: (1) Do-it-yourself encryption; (2) new back-end system purchases; (3) legacy system re-programming; or (4) onerous paper documentation. The good news is that 'second generation' e-health solutions are emerging that act as internal "wrappers" for health plan or provider data systems. They provide both an interface for end-users and a layer of security for organizational information and allow detailed patient-related data to remain at the system owner's physical location. These second generation solutions don't just 'connect,' data, they actually 'understand' the information, and can use data elements to invoke necessary rules, processing pathways, or personalization for specific stakeholders as required by HIPAA.
Science and technology in the stockpile stewardship program, S & TR reprints
DOE Office of Scientific and Technical Information (OSTI.GOV)
Storm, E
This document reports on these topics: Computer Simulations in Support of National Security; Enhanced Surveillance of Aging Weapons; A New Precision Cutting Tool: The Femtosecond Laser; Superlasers as a Tool of Stockpile Stewardship; Nova Laser Experiments and Stockpile Stewardship; Transforming Explosive Art into Science; Better Flash Radiography Using the FXR; Preserving Nuclear Weapons Information; Site 300Õs New Contained Firing Facility; The Linear Electric Motor: Instability at 1,000 gÕs; A Powerful New Tool to Detect Clandestine Nuclear Tests; High Explosives in Stockpile Surveillance Indicate Constancy; Addressing a Cold War Legacy with a New Way to Produce TATB; JumpinÕ Jupiter! Metallic Hydrogen;more » Keeping the Nuclear Stockpile Safe, Secure, and Reliable; The Multibeam FabryÐPerot Velocimeter: Efficient Measurements of High Velocities; Theory and Modeling in Material Science; The Diamond Anvil Cell; Gamma-Ray Imaging Spectrometry; X-Ray Lasers and High-Density Plasma« less
Burlandy, Luciene
2009-01-01
This article analyzes institutional strategies of the Brazilian federal government that aim at promoting intersectorality in the field of Food and Nutrition Security (FNS), based on bibliographic review and document analysis. It is assumed that, although formal institutionality in this government level is not enough to promote intersectorality, it is important in process induction. It follows that the combination of different institutional mechanisms favors intersectorality, such as: the existence and location of councils integrated by government sectors and civil society in the presidency; political support by the presidency and inclusion of the issue as being strategic in the governmental agenda; assembly of institutional spaces that articulate the highest government spheres and that integrate technical levels; programs that integrate food production, commercialization, and consumption. Challenges concern interrelation with economic policy and the construction of budget agreed among sectors, integrated to policy management and monitoring.
Port Security in the Persian Gulf
2008-06-01
drafters of ISPS for secure, standardized documents to be issued to the world’s merchant seamen, another arm of the UN, the International Labour ...Revised), 2003," International Labour Organization, http://www.ilo.org/ilolex/cgi-lex/convde.pl?C185 (accessed March 11, 2008). 5 The convention has...identity documents for a particularly impoverished portion of their workforce . 2. MTSA (2002) and SAFE-Port (2006) The two primary pieces of
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
Ecological Monitoring and Compliance Program 2006 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
David C. Anderson; Paul D. Greger; Derek B. Hall
2007-03-01
The Ecological Monitoring and Compliance program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), monitors the ecosystem of the Nevada Test Site (NTS) and ensures compliance with laws and regulations pertaining to NTS biota. This report summarizes the program's activities conducted by National Security Technologies LLC (NSTec) during the Calendar Year 2006. Program activities included: (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem mapping and data management, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat monitoring, (g) habitat restoration monitoring, and (h)more » monitoring of the Nonproliferation Test and Evaluation Complex (NPTEC). Sensitive and protected/regulated species of the NTS include 44 plants, 1 mollusk, 2 reptiles, over 250 birds, and 26 mammals protected, managed, or considered sensitive as per state or federal regulations and natural resource agencies and organizations. The threatened desert tortoise (Gopherus agassizii) is the only species on the NTS protected under the Endangered Species Act. Biological surveys for the presence of sensitive and protected/regulated species and important biological resources on which they depend were conducted for 34 projects. A total of 342.1 hectares (ha) (845.37 acres [ac]) was surveyed for these projects. Sensitive and protected/regulated species and important biological resources found included: 2 inactive tortoise burrows, 2 western burrowing owls (Athene cunicularia hypugaea), several horses (Equus caballus), 2 active predator burrows, mature Joshua trees (Yucca brevifolia), yuccas and cacti; and also 1 bird nest (2 eggs), 1 barn owl (Tyto alba) and 2 great-horned owls (Bubo virginianus). NSTec provided a written summary report of all survey findings and mitigation recommendations, where applicable. All flagged burrows were avoided during construction activities. Twenty one of the 34 projects had sites within the distribution range of the threatened desert tortoise. NNSA/NSO must comply with the terms and conditions of a permit (called a Biological Opinion) from the U.S. Fish and Wildlife Service (FWS) when conducting work in tortoise habitat. No tortoises were found in or displaced from project areas. No desert tortoises were accidentally injured or killed, nor were any captured or displaced from project sites. One desert tortoise was accidentally killed along a paved road. One site specific re-vegetation plan was submitted this year as required by the desert tortoise habitat re-vegetation plan approved in 2004. This year a total of 1.89 ha (4.69 ac) of tortoise habitat was disturbed. Re-vegetation of habitat at the Bren Tower burn was completed in the spring of 2006. In the summer of 2006, NSTec scientists prepared a Biological Assessment of the security activities that were being conducted at the Device Assembly Facility (DAF). NNSA requested a Biological Opinion from FWS in late 2006. Ecosystem mapping and data management in 2006 focused primarily on two tasks: (a) converting hardcopies of about 17 reports (EMAC annual reports and selected topical reports from 1996 to 2003) into electronic versions (Portable Document Format [PDF] files) to facilitate electronic document exchange, rapid retrieval, duplication, and printing, and (b) conducting an annual vegetation survey to determine wildland fire hazards on the NTS. Copies of the PDF documents were sent to DOE's Office of Scientific and Technical Information website in Oak Ridge, Tennessee, and the DOE National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Public Reading Facility.« less
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.13 Marking... document. (b) Protective marking. The protective marking is: SENSITIVE SECURITY INFORMATION. (c... Sensitive Security Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may...
24 CFR 350.7 - Authority of Federal Reserve Banks as Depositories.
Code of Federal Regulations, 2010 CFR
2010-04-01
... applies, in accordance with the Securities Documentation, Federal Reserve Bank Operating Circulars, this..., Security Entitlements, and the operation of the book-entry system under this part. ...) Each Federal Reserve Bank is hereby authorized as Depository for Book-entry Ginnie Mae Securities to...
31 CFR 354.6 - Authority of Federal Reserve Banks.
Code of Federal Regulations, 2010 CFR
2010-07-01
... accordance with the Securities Documentation, and Federal Reserve Bank Operating Circulars; to service and..., Security Entitlements, and the operation of the Book-entry System under this part. ... SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.6 Authority of Federal Reserve Banks...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.13 Marking... document. (b) Protective marking. The protective marking is: SENSITIVE SECURITY INFORMATION. (c... Sensitive Security Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may...
78 FR 25521 - Revised Medical Criteria for Evaluating Visual Disorders
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-01
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0078] Revised Medical Criteria for Evaluating Visual Disorders AGENCY: Social Security Administration. ACTION: Final rules; Correction. SUMMARY: The Social Security Administration published a document in the Federal Register of March 28, 2013, in FR Doc...
75 FR 37253 - Classified National Security Information
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
..., Intelligence, National defense, National security information, Presidential documents, Security information... reveal the identity of a confidential human source or a human intelligence source or key design concepts... or a human intelligence source, the duration shall be up to 75 years and shall be designated with the...
Home Computer and Internet User Security
2005-01-01
Information Security Model © 2005 Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security...Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security Version 1.0.4 – slide 50 Contact Information Lawrence R. Rogers • Email: cert@cert.org CERT website: http://www.cert.org/ ...U.S. Patent and Trademark Office Home Computer and Internet User Security Report Documentation Page Form ApprovedOMB
A scoping review of traditional food security in Alaska
Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa
2018-01-01
ABSTRACT Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: “traditional foods”, “food security”, “access”, “availability”, “utilisation”, “Alaska”, “Alaska Native” and “indigenous”. Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska. PMID:29292675
Russian Contract Procurement Document
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tobin, J G
2010-03-29
This contract supports the enhancement of physical protection or nuclear material control and accounting systems at institutes or enterprises of the newly independent states under the material protection control and accounting (MPC&A) program. The contract is entered into pursuant to the MPC&A Program, a gratuitous technical assistance program, in accordance with the bilateral Agreements between the Russian Federation and the United States of America concerning the Safe and Secure Transportation, Storage and Destruction of Weapons and the Prevention of Weapons Proliferation of June 1992, as extended and amended by Protocol signed of June 1999, Agreement between the Government of themore » Russian Federation regarding Cooperation in the Area of Nuclear Materials Physical Protection, Control and Accounting of October 1999 and the Russian Federation law of May 1999 on the taxation exemption of gratuitous technical assistance with Russian Federation under registration No.DOE001000.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Guyer, H.B.; McChesney, C.A.
The overall primary Objective of HDAR is to create a repository of historical personnel security documents and provide the functionality needed for archival and retrieval use by other software modules and application users of the DISS/ET system. The software product to be produced from this specification is the Historical Document Archival and Retrieval Subsystem The product will provide the functionality to capture, retrieve and manage documents currently contained in the personnel security folders in DOE Operations Offices vaults at various locations across the United States. The long-term plan for DISS/ET includes the requirement to allow for capture and storage ofmore » arbitrary, currently undefined, clearance-related documents that fall outside the scope of the ``cradle-to-grave`` electronic processing provided by DISS/ET. However, this requirement is not within the scope of the requirements specified in this document.« less
Organizing Diverse, Distributed Project Information
NASA Technical Reports Server (NTRS)
Keller, Richard M.
2003-01-01
SemanticOrganizer is a software application designed to organize and integrate information generated within a distributed organization or as part of a project that involves multiple, geographically dispersed collaborators. SemanticOrganizer incorporates the capabilities of database storage, document sharing, hypermedia navigation, and semantic-interlinking into a system that can be customized to satisfy the specific information-management needs of different user communities. The program provides a centralized repository of information that is both secure and accessible to project collaborators via the World Wide Web. SemanticOrganizer's repository can be used to collect diverse information (including forms, documents, notes, data, spreadsheets, images, and sounds) from computers at collaborators work sites. The program organizes the information using a unique network-structured conceptual framework, wherein each node represents a data record that contains not only the original information but also metadata (in effect, standardized data that characterize the information). Links among nodes express semantic relationships among the data records. The program features a Web interface through which users enter, interlink, and/or search for information in the repository. By use of this repository, the collaborators have immediate access to the most recent project information, as well as to archived information. A key advantage to SemanticOrganizer is its ability to interlink information together in a natural fashion using customized terminology and concepts that are familiar to a user community.
2010-04-30
5 Intercity Bus Security Grant Program...eligibility.22 This grant program includes funding for the Freight Rail Security Grant Program (FRSGP), and the Intercity Passenger Rail Program (IPR...eligible to receive funding to continue security enhancements for its intercity rail services between high-risk urban areas. 21 U.S. Department of
Security Assistance Dependence - Wielding American Power
2002-12-09
national security objectives. One vehicle of this power brokering is the well-developed international security assistance program – oftentimes...incorrectly referred to exclusively as foreign military sales. There is nothing simple about the security assistance program as it has developed today...For the USG, there are many agencies influencing today’s security assistance program to execute complex, integrated tasks directly impacting U.S
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2014 CFR
2014-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2011 CFR
2011-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2013 CFR
2013-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2012 CFR
2012-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2010 CFR
2010-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2014 CFR
2014-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2013 CFR
2013-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2012 CFR
2012-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2011 CFR
2011-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
NEVADA TEST SITE WASTE ACCEPTANCE CRITERIA
DOE Office of Scientific and Technical Information (OSTI.GOV)
U.S. DEPARTMENT OF ENERGY, NATIONAL NUCLEAR SECURITY ADMINISTRATION, NEVADA SITE OFFICE
This document establishes the U. S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) waste acceptance criteria (WAC). The WAC provides the requirements, terms, and conditions under which the Nevada Test Site will accept low-level radioactive and mixed waste for disposal. Mixed waste generated within the State of Nevada by NNSA/NSO activities is accepted for disposal. It includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the Nevada Test Site Area 3 and Area 5 Radioactive Waste Management Site for storage or disposal.
IVOA Credential Delegation Protocol Version 1.0
NASA Astrophysics Data System (ADS)
Plante, Raymond; Graham, Matthew; Rixon, Guy; Taffoni, Giuliano; Plante, Raymond; Graham, Matthew
2010-02-01
The credential delegation protocol allows a client program to delegate a user's credentials to a service such that that service may make requests of other services in the name of that user. The protocol defines a REST service that works alongside other IVO services to enable such a delegation in a secure manner. In addition to defining the specifics of the service protocol, this document describes how a delegation service is registered in an IVOA registry along with the services it supports. The specification also explains how one can determine from a service registration that it requires the use of a supporting delegation service.
The Essentials of Safety and Security Management.
ERIC Educational Resources Information Center
Jones, Lance D.
2003-01-01
Presents a road map for colleges and universities to follow when establishing an in-house protective services department, focusing on: the leadership and command structure, screening and hiring of security officers, training of campus security personnel, documentation of officers' actions, policies and procedures (particularly regarding the use of…
DOT National Transportation Integrated Search
2004-08-01
Since September 11, 2001, state departments of transportation (DOTs) have been assuming a more proactive role in security and emergency management. The purpose of this Effective Practices Report is to document key lessons learned by state DOTs as the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-27
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information... Naturalization/Citizenship Document; OMB Control No. 1615-0091. The Department of Homeland Security, U.S... Security (DHS), USCIS, Chief, Regulatory Coordination Division, 20 Massachusetts Avenue NW., Washington, DC...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information... Naturalization/Citizenship Document; OMB Control No. 1615-0091. The Department of Homeland Security, U.S... Security (DHS), USCIS, Chief, Regulatory Products Division, 20 Massachusetts Avenue, NW., Washington, DC...
75 FR 77921 - Office of Administrative Services; Mandatory Declassification Review Address
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-14
... relating to national security information in accordance with Executive Order 13526 and directives issued there-under by the Information Security Oversight Office (ISOO). OPIC does not have the authority to classify national security information. Documents that are originally classified outside of OPIC must be...
78 FR 68133 - Cost-of-Living Increases and Other Determinations for 2014; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-13
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0057] Cost-of-Living Increases and Other Determinations for 2014; Correction AGENCY: Social Security Administration. ACTION: Notice; Correction. SUMMARY: The Social Security Administration published a document in the Federal Register of November 5, 2013...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
7 CFR 772.5 - Security maintenance.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security maintenance. 772.5 Section 772.5 Agriculture... SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.5 Security maintenance. (a) General. Borrowers are responsible for maintaining the collateral that is serving as security for their Minor Program loan in...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
7 CFR 772.5 - Security maintenance.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security maintenance. 772.5 Section 772.5 Agriculture... SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.5 Security maintenance. (a) General. Borrowers are responsible for maintaining the collateral that is serving as security for their Minor Program loan in...
Effectiveness of the Civil Aviation Security Program.
1980-05-22
SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting
FY 2016 - Stockpile Stewardship and Management Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2015-03-01
This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.
NIF Operations Management Plan, August 2011
DOE Office of Scientific and Technical Information (OSTI.GOV)
Van Wonterghem, Bruno M.
Lawrence Livermore National Laboratory’s (LLNL) National Ignition Facility (NIF) is a key component of the National Nuclear Security Administration’s (NNSA) Stockpile Stewardship Program, whose purpose is to maintain the safety, reliability, and effectiveness of our nation’s nuclear stockpile without underground nuclear testing. The NIF is crucial to the Stockpile Stewardship Program because it is the only facility that can create the conditions of extreme temperature and pressure—conditions that exist only in stars or in exploding nuclear weapons—that are relevant to understanding how our modern nuclear weapons operate. As such, the NIF’s primary mission is to attain fusion ignition in themore » laboratory. Fusion ignition not only supports Stockpile Stewardship needs, but also provides the basis for future decisions about fusion’s potential as a long-term energy source. Additionally, NIF provides scientists with access to high-energy-density regimes that can yield new insight and understanding in the areas of astrophysics, hydrodynamics, material properties, plasma physics, and radiative properties. The use of the NIF to support the Stockpile Stewardship Program and the advancement of basic high-energy-density science understanding is planned and managed through program-level execution plans and NIF directorate-level management teams. An example of a plan is the National Ignition Campaign Execution Plan. The NIF Operations Management Plan provides an overview of the NIF Operations organization and describes how the NIF is supported by the LLNL infrastructure and how it is safely and responsibly managed and operated. Detailed information on NIF management of the organization is found in a series of supporting plans, policies, and procedures. A list of related acronyms can be found in Appendix A of this document. The purpose of this document is to provide a roadmap of how the NIF Operations organization functions. It provides a guide to understanding the requirements, document flow down, organizational vision and mission, performance metrics, and interrelationship of the NIF Operations organization with other directorate and laboratory organizations. This document also provides a listing of roles and responsibilities, core processes, procedures, authority matrices, change control boards, and other information necessary for successfully functioning in the NIF Operations organization. This document, the NIF Shot Operations Plan, and the NIF Maintenance Plan together represent the primary documents satisfying our Conduct of Operations compliance requirement.« less
Acute Radiation Sickness Amelioration Analysis
1994-05-01
Emetic Drugs 16. PRICE CODE Antagonists 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19, SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF...102 UNCLASSIFIED mcuIw IA IIIcaIIin or Isis PAW CLASSFIED BY: N/A since Unclassified. DECLASSIFY ON: N/A since Unclassified. SECURITY CLASSIFICATION OF...Approximately 2000 documents relevant to the development of the candidate anti-emetic drugs ondansetron (Zofran, Glaxo Pharmaceuticals) and granisetron
3 CFR 8546 - Proclamation 8546 of August 13, 2010. 75th Anniversary of the Social Security Act
Code of Federal Regulations, 2011 CFR
2011-01-01
... Anniversary of the Social Security Act 8546 Proclamation 8546 Presidential Documents Proclamations Proclamation 8546 of August 13, 2010 Proc. 8546 75th Anniversary of the Social Security ActBy the President of... into law the Social Security Act to protect ordinary Americans “against the loss of a job and against...
Code of Federal Regulations, 2010 CFR
2010-04-01
... page] Important Information on Penny Stocks The U.S. Securities and Exchange Commission (SEC) requires... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND...
XNDM: An Experimental Network Data Manager.
1981-06-01
return this copy. Retain or destroy. t t , UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE fWln Dtet Entred) READ INSTRUCTIONSREPORT DOCUMENTATION...MONITORING AGENCY NAME & AODRESS(IE’ different Irom Controlling Office) 15 SECURITY CLASS, (I this report) UNCLASSIFIED Same Is DECLASSIFICATION...DD JAN% 1473 EDITION OF I NOV 65 IS OBSOLETE UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE ("hen Date Entered) -: o . <. UNCLASSIFIED SECURITY
Logistics Composite Model (LCOM) Workbook
1976-06-01
nc;-J to e UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Dots Ew.ervol. REPORT DOCUMENTATION PAGE READ INSTRUCTIONS BEFORE COMPLETING FORM I...Controlling Office) 15. SECURITY CLASS. (of this report) Unclassified 158. DECLASSIFICATIONDOWNGRADING SCHEDULE 16. DISTRIBUTION STATEMENT (of this Report...ID SECURITY CLASSIFICATION OF THIS PAGE (When Des Entered) K7 UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE(Whon Dal Entore o l Logic networks
Local Area Network (LAN) Compatibility Issues
1991-09-01
September, 1991 Thesis Advisor: Dr. Norman Schneidewind Approved for public release; distribution is unlimited 92 303s246 Unclassified SECURITY ...CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY CLASSIFICATION 1 b. RESTRICTIVE MARKINGS unclassified 2a. SECURITY CLASSIFICATION...Work UiNt ACCeLUOn Number 11. TITLE (Include Security Classification) LOCAL AREA NETWORK (LAN) COMPATIBILITY ISSUES 12. PERSONAL AUTHOR(S) Rita V
Glossary: Defense Acquisition Acronyms and Terms. Revision 2
1987-07-01
Approved REPORT DOCUMENTATION PAGE OMBNo. 070-O 18 la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS % unclassified 2a. SECURITY CLASSIFICATION ...WORK UNIT Fort Belvoir, VA 22060-5426 ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification ) Glossary Defense Acquisition...DISTRIBUTION/AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION [RUNCLASSIFIED/UNLIMITED 0 SAME AS RPT 0 DTIC USERS unclassified 22a. NAME OF
Test and Demonstration Assets of New Mexico
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This document was developed by the Arrowhead Center of New Mexico State University as part of the National Security Preparedness Project (NSPP), funded by a DOE/NNSA grant. The NSPP has three primary components: business incubation, workforce development, and technology demonstration and validation. The document contains a survey of test and demonstration assets in New Mexico available for external users such as small businesses with security technologies under development. Demonstration and validation of national security technologies created by incubator sources, as well as other sources, are critical phases of technology development. The NSPP will support the utilization of an integrated demonstrationmore » and validation environment.« less
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2012 CFR
2012-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2012-10-01 2012-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
2009-06-08
Security Grant Program ...............................................................................6 Intercity Passenger Rail Program (Amtrak...6 Intercity Bus Security Grant Program...fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk
2009-08-05
Freight Rail Security Grant Program ...............................................................................6 Intercity Passenger Rail Program...Amtrak) .....................................................................6 Intercity Bus Security Grant Program...overview- fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
78 FR 45452 - Mailing of Tickets Under the Ticket To Work Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-29
... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 411 [Docket No. SSA-2011-0034] RIN 0960-AH34 Mailing of Tickets Under the Ticket To Work Program AGENCY: Social Security Administration. ACTION: Final rule..., Office of Employment Support Programs, Social Security Administration, 6401 Security Boulevard, Baltimore...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2010 CFR
2010-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2014 CFR
2014-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2012 CFR
2012-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2013 CFR
2013-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2011 CFR
2011-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
What is Security? A perspective on achieving security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Atencio, Julian J.
This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.
ERIC Educational Resources Information Center
Comp, David J.
2013-01-01
The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…
17 CFR 4.31 - Required delivery of Disclosure Document to prospective clients.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Disclosure Document to prospective clients. 4.31 Section 4.31 Commodity and Securities Exchanges COMMODITY... Advisors § 4.31 Required delivery of Disclosure Document to prospective clients. (a) Each commodity trading... prospective client a Disclosure Document containing the information set forth in §§ 4.34 and 4.35 for the...
Federal Funding for Health Security in FY2018.
Watson, Crystal; Watson, Matthew; Kirk Sell, Tara
This article is the latest in an annual series analyzing federal funding for health security programs. It examines proposed funding in the President's Budget Request for FY2018 and provides updated amounts for FY2017 and actual funding for FY2010 through FY2016. The proposed FY2018 budget for health security-related programs represents a significant decrease in funding from prior years and previous administrations. In total, the President's proposed FY2018 budget includes $12.45 billion for health security-related programs, an estimated decrease in funding of $1.25 billion, or 9%, from the estimated $13.71 billion in FY2017 and an 11% decrease from the FY2016 actual funding level of $13.99 billion. Most FY2018 health security funding ($6.67 billion, 54%) would go to programs with multiple-hazard and preparedness goals and missions, representing a 14% decrease in this funding compared to FY2017. Radiological and nuclear security programs would receive 20% ($2.48 billion) of all health security funding, a slight decrease of 2% from the prior year. Biosecurity programs would be funded at $1.53 billion (12% of health security funding) in FY2018, a decrease of 6% compared to FY2017. Chemical security programs would represent 3% ($389.7 million) of all health security funding in FY2018, a 9% decrease from the prior year. Finally, 11% of health security funding ($1.39 billion) would be dedicated to pandemic influenza and emerging infectious diseases programs, the only category of funding to see an increase (3%) above FY2017.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The plan describes the technical approach that is implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and groundwater quality monitoring data. The technical approach is based on the GWPP status designation for each well. Under this approach, wells granted “active” status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling, whereas wells grantedmore » “inactive” status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP. Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans.« less
77 FR 19408 - Reinstate Index to Chapter III in 20 CFR
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-30
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0018] Reinstate Index to Chapter III in 20 CFR AGENCY: Social Security Administration. ACTION: Notice; correction. SUMMARY: The Social Security... Chapter III in Title 20 of the Code of Federal Regulations. The document contains a misprinted Web site...
Language Models for Hierarchical Summarization
2003-09-01
80 4.3.3 Airport Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80...82 4.6 The figure shows a portion of the hierarchy created for TREC Topic 341: Airport Security . The portion of the...ranked list displayed corresponds to documents that contain the term “Apple Boost AirPort Security ”. This hierarchy demonstrates how a particular
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-03
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information... Naturalization/Citizenship Document; OMB Control No. 1615-0091. * * * * * The Department of Homeland Security, U... associated response time, should be directed to the Department of Homeland Security (DHS), and to the Office...
17 CFR 232.12 - Business hours of the Commission.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Business hours of the Commission. 232.12 Section 232.12 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... documents may be submitted by direct transmission, via dial-up modem or Internet, to the Commission each day...
17 CFR 232.12 - Business hours of the Commission.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Business hours of the Commission. 232.12 Section 232.12 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... documents may be submitted by direct transmission, via dial-up modem or Internet, to the Commission each day...
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Job Profiles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 18.19 Section 18.19 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE... Provisions Document Requirements § 18.19 Security. The concentrate plant and equipment will be so constructed...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Security. 18.19 Section 18.19 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE... Provisions Document Requirements § 18.19 Security. The concentrate plant and equipment will be so constructed...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Security. 18.19 Section 18.19 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE... Provisions Document Requirements § 18.19 Security. The concentrate plant and equipment will be so constructed...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Security. 18.19 Section 18.19 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE... Provisions Document Requirements § 18.19 Security. The concentrate plant and equipment will be so constructed...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Security. 18.19 Section 18.19 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE... Provisions Document Requirements § 18.19 Security. The concentrate plant and equipment will be so constructed...
10 CFR 1016.23 - Establishment of security areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...
10 CFR 1016.23 - Establishment of security areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...
18 CFR 1314.3 - Authority of Reserve Banks.
Code of Federal Regulations, 2010 CFR
2010-04-01
... functions with respect to the issuance of Book-entry TVA Power Securities offered and sold by TVA to which this part 1314 applies, in accordance with the Securities Documentation, Reserve Bank Operating...-ENTRY PROCEDURES FOR TVA POWER SECURITIES ISSUED THROUGH THE FEDERAL RESERVE BANKS § 1314.3 Authority of...
32 CFR 2700.42 - Responsibility for safeguarding classified information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... responsibility. (b) Security and Top Secret Control Officers. The Director, OMSN, and the Status Liaison Officer, Saipan, are assigned specific security responsibilities as Security Officer and Top Secret Control Officer. (c) Handling. All documents bearing the terms “Top Secret,” “Secret” and “Confidential” shall be...
Regulatory Guide on Conducting a Security Vulnerability Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ek, David R.
This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.
The Superpowers: Nuclear Weapons and National Security. National Issues Forums.
ERIC Educational Resources Information Center
Mitchell, Greg; Melville, Keith
Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…
National Space Weather Program Releases Strategy for the New Decade
NASA Astrophysics Data System (ADS)
Williamson, Samuel P.; Babcock, Michael R.; Bonadonna, Michael F.
2010-12-01
The National Space Weather Program (NSWP; http://www.nswp.gov) is a U.S. federal government interagency program established by the Office of the Federal Coordinator for Meteorology (OFCM) in 1995 to coordinate, collaborate, and leverage capabilities across stakeholder agencies, including space weather researchers, service providers, users, policy makers, and funding agencies, to improve the performance of the space weather enterprise for the United States and its international partners. Two important documents released in recent months have established a framework and the vision, goals, and strategy to move the enterprise forward in the next decade. The U.S. federal agency members of the NSWP include the departments of Commerce, Defense, Energy, Interior, State, and Transportation, plus NASA, the National Science Foundation, and observers from the White House Office of Science and Technology Policy (OSTP) and the Office of Management and Budget (OMB). The OFCM is also working with the Department of Homeland Security's Federal Emergency Management Agency to formally join the program.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.
2009-10-14
The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators ofmore » the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The NIPP framework incorporates consequence, threat, and vulnerability components and addresses all hazards. The analysis of the vulnerability data needs to be reproducible, support risk analysis, and go beyond protection. It also needs to address important security/vulnerability topics, such as physical security, cyber security, systems analysis, and dependencies and interdependencies. This report provides an overview of the approach being developed to estimate vulnerability and provide vulnerability comparisons for sectors and subsectors. the information will be used to assist DHS in analyzing existing protective measures and vulnerability at facilities, to identify potential ways to reduce vulnerabilities, and to assist in preparing sector risk estimates. The owner/operator receives an analysis of the data collected for a specific asset, showing a comparison between the facility's protection posture/vulnerability index and those of DHS sector/subsector sites visited. This comparison gives the owner/operator an indication of the asset's security strengths and weaknesses that may be contributing factors to its vulnerability and protection posture. The information provided to the owner/operator shows how the asset compares to other similar assets within the asset's sector or subsector. A 'dashboard' display is used to illustrate the results in a convenient format. The dashboard allows the owner/operator to analyze the implementation of additional protective measures and to illustrate how such actions would impact the asset's Protective Measures Index (PMI) or Vulnerability Index (VI).« less
75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...
76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...
77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-01
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National... Information Security Oversight Office no later than Friday, March 16, 2012. The Information Security Oversight... FURTHER INFORMATION CONTACT: David O. Best, Senior Program Analyst, The Information Security Oversight...
76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-01
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 11...
76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-13
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...
75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-09
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS REENTRY PERMITS, REFUGEE TRAVEL DOCUMENTS..., refugee travel document, or advance parole document must be filed on Form I-131, with the fee required in... resident or conditional permanent resident. (2) Refugee travel document—(i) General. Except as otherwise...
49 CFR 1280.6 - Storage of classified documents.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 9 2012-10-01 2012-10-01 false Storage of classified documents. 1280.6 Section 1280.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION... SECURITY INFORMATION AND CLASSIFIED MATERIAL § 1280.6 Storage of classified documents. All classified...
49 CFR 1280.6 - Storage of classified documents.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Storage of classified documents. 1280.6 Section 1280.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION... SECURITY INFORMATION AND CLASSIFIED MATERIAL § 1280.6 Storage of classified documents. All classified...
49 CFR 1280.6 - Storage of classified documents.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Storage of classified documents. 1280.6 Section 1280.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION... SECURITY INFORMATION AND CLASSIFIED MATERIAL § 1280.6 Storage of classified documents. All classified...
49 CFR 1280.6 - Storage of classified documents.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Storage of classified documents. 1280.6 Section 1280.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION... SECURITY INFORMATION AND CLASSIFIED MATERIAL § 1280.6 Storage of classified documents. All classified...
Strategies for Time-resolved X-ray Diffraction of Phase Transitions with Laser Compression
NASA Astrophysics Data System (ADS)
Benedetti, Laura Robin; Eggert, J. H.; Bradley, D. K.; Bell, P. M.; Kilkenny, J. D.; Palmer, N.; Petre, R. B.; Rygg, J. R.; Sorce, C.; Collins, G. W.; Boehly, T. R.
2017-10-01
As part of a program to document kinetics of phase transitions under laser-driven dynamic compression, we are designing a platform to make multiple x-ray diffraction measurements during a single laser experiment. Our plans include experimental development at Omega-EP and eventual implementation at NIF. We will present our strategy for designing a robust platform that can effectively document a wide variety of phase transformations by utilizing both streaked and multiple-frame imaging detectors. Preliminary designs utilize a novel CMOS detector designed by Sandia National Lab. Our initial experiments include scoping studies that will focus on photometrics and shielding requirements in the high EMP environment close to the target. This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC, LLNL-ABS-734470.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthews, Patrick
2013-11-01
This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada. This complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The purpose of the CADD/CR is to provide justification and documentation supporting the recommendation that no further corrective action is needed.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-01
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0089] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that...
Effectiveness of the Civil Aviation Security Program.
1975-10-06
Results of the passenger screening procedures continue to reflect the success and effec- tiveness of airline and airport security programs. During the...airline and airport security programs. While it is impossible to estimate accurately just how many hijackings and related crimes were prevented, the...attempts might have occurred during 1974 and as many as 25 during the first 6 months of 1975, if current airline and airport security programs had not
US-CERT Control System Center Input/Output (I/O) Conceputal Design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-02-01
This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less
12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
... Establishing Information Security Standards Table of Contents I. Introduction A. Scope B. Preservation of... Security Program B. Objectives III. Development and Implementation of Customer Information Security Program.... Introduction The Interagency Guidelines Establishing Information Security Standards (Guidelines) set forth...
14 CFR 1203.201 - Information security objectives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...
14 CFR 1203.201 - Information security objectives.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...
76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-21
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the following Information...
Computer loss experience and predictions
NASA Astrophysics Data System (ADS)
Parker, Donn B.
1996-03-01
The types of losses organizations must anticipate have become more difficult to predict because of the eclectic nature of computers and the data communications and the decrease in news media reporting of computer-related losses as they become commonplace. Total business crime is conjectured to be decreasing in frequency and increasing in loss per case as a result of increasing computer use. Computer crimes are probably increasing, however, as their share of the decreasing business crime rate grows. Ultimately all business crime will involve computers in some way, and we could see a decline of both together. The important information security measures in high-loss business crime generally concern controls over authorized people engaged in unauthorized activities. Such controls include authentication of users, analysis of detailed audit records, unannounced audits, segregation of development and production systems and duties, shielding the viewing of screens, and security awareness and motivation controls in high-value transaction areas. Computer crimes that involve highly publicized intriguing computer misuse methods, such as privacy violations, radio frequency emanations eavesdropping, and computer viruses, have been reported in waves that periodically have saturated the news media during the past 20 years. We must be able to anticipate such highly publicized crimes and reduce the impact and embarrassment they cause. On the basis of our most recent experience, I propose nine new types of computer crime to be aware of: computer larceny (theft and burglary of small computers), automated hacking (use of computer programs to intrude), electronic data interchange fraud (business transaction fraud), Trojan bomb extortion and sabotage (code security inserted into others' systems that can be triggered to cause damage), LANarchy (unknown equipment in use), desktop forgery (computerized forgery and counterfeiting of documents), information anarchy (indiscriminate use of crypto without control), Internet abuse (antisocial use of data communications), and international industrial espionage (governments stealing business secrets). A wide variety of safeguards are necessary to deal with these new crimes. The most powerful controls include (1) carefully controlled use of cryptography and digital signatures with good key management and overriding business and government decryption capability and (2) use of tokens such as smart cards to increase the strength of secret passwords for authentication of computer users. Jewelry-type security for small computers--including registration of serial numbers and security inventorying of equipment, software, and connectivity--will be necessary. Other safeguards include automatic monitoring of computer use and detection of unusual activities, segmentation and filtering of networks, special paper and ink for documents, and reduction of paper documents. Finally, international cooperation of governments to create trusted environments for business is essential.
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
LCG MCDB—a knowledgebase of Monte-Carlo simulated events
NASA Astrophysics Data System (ADS)
Belov, S.; Dudko, L.; Galkin, E.; Gusev, A.; Pokorski, W.; Sherstnev, A.
2008-02-01
In this paper we report on LCG Monte-Carlo Data Base (MCDB) and software which has been developed to operate MCDB. The main purpose of the LCG MCDB project is to provide a storage and documentation system for sophisticated event samples simulated for the LHC Collaborations by experts. In many cases, the modern Monte-Carlo simulation of physical processes requires expert knowledge in Monte-Carlo generators or significant amount of CPU time to produce the events. MCDB is a knowledgebase mainly dedicated to accumulate simulated events of this type. The main motivation behind LCG MCDB is to make the sophisticated MC event samples available for various physical groups. All the data from MCDB is accessible in several convenient ways. LCG MCDB is being developed within the CERN LCG Application Area Simulation project. Program summaryProgram title: LCG Monte-Carlo Data Base Catalogue identifier: ADZX_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADZX_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: GNU General Public Licence No. of lines in distributed program, including test data, etc.: 30 129 No. of bytes in distributed program, including test data, etc.: 216 943 Distribution format: tar.gz Programming language: Perl Computer: CPU: Intel Pentium 4, RAM: 1 Gb, HDD: 100 Gb Operating system: Scientific Linux CERN 3/4 RAM: 1 073 741 824 bytes (1 Gb) Classification: 9 External routines:perl >= 5.8.5; Perl modules DBD-mysql >= 2.9004, File::Basename, GD::SecurityImage, GD::SecurityImage::AC, Linux::Statistics, XML::LibXML > 1.6, XML::SAX, XML::NamespaceSupport; Apache HTTP Server >= 2.0.59; mod auth external >= 2.2.9; edg-utils-system RPM package; gd >= 2.0.28; rpm package CASTOR-client >= 2.1.2-4; arc-server (optional) Nature of problem: Often, different groups of experimentalists prepare similar samples of particle collision events or turn to the same group of authors of Monte-Carlo (MC) generators to prepare the events. For example, the same MC samples of Standard Model (SM) processes can be employed for the investigations either in the SM analyses (as a signal) or in searches for new phenomena in Beyond Standard Model analyses (as a background). If the samples are made available publicly and equipped with corresponding and comprehensive documentation, it can speed up cross checks of the samples themselves and physical models applied. Some event samples require a lot of computing resources for preparation. So, a central storage of the samples prevents possible waste of researcher time and computing resources, which can be used to prepare the same events many times. Solution method: Creation of a special knowledgebase (MCDB) designed to keep event samples for the LHC experimental and phenomenological community. The knowledgebase is realized as a separate web-server ( http://mcdb.cern.ch). All event samples are kept on types at CERN. Documentation describing the events is the main contents of MCDB. Users can browse the knowledgebase, read and comment articles (documentation), and download event samples. Authors can upload new event samples, create new articles, and edit own articles. Restrictions: The software is adopted to solve the problems, described in the article and there are no any additional restrictions. Unusual features: The software provides a framework to store and document large files with flexible authentication and authorization system. Different external storages with large capacity can be used to keep the files. The WEB Content Management System provides all of the necessary interfaces for the authors of the files, end-users and administrators. Running time: Real time operations. References: [1] The main LCG MCDB server, http://mcdb.cern.ch/. [2] P. Bartalini, L. Dudko, A. Kryukov, I.V. Selyuzhenkov, A. Sherstnev, A. Vologdin, LCG Monte-Carlo data base, hep-ph/0404241. [3] J.P. Baud, B. Couturier, C. Curran, J.D. Durand, E. Knezo, S. Occhetti, O. Barring, CASTOR: status and evolution, cs.oh/0305047.