Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security planning for

Recommendation 1 The Transportation Security Administration, with its responsibility for the federal oversight of security operations at U.S. airports, should integrate strategies for defense against chemical/biological attacks into its broader security plan for protecting the U.S. air transportation system. The line of authority and... [Pg.14]

Office of Management and Budget. Guidance for Preparation and Submission of Security Plans for Federal Computer Systems Containing Sensitive Information. 0MB bulletin no. 88-16. Washington, DC Office of Management and Budget, July 6,1988. [Pg.242]

Develop security plans for crowd control, traffic control, clinic personnel, materials/supplies/equipment at each clinic site. [Pg.476]

Align security measures for the computer system with your corporation s Information Asset Protection Policies (lAPP) and coordinate with the building and/or plant security plans. For some systems, strict compliance with specific security requirements mentioned in the lAPP may not be possible given proprietary system limitations. Examples may include unique user identification codes, specified lengths for user identification codes and passwords, or inactivity time-outs. Use a deviation change process to document and justify these situations. [Pg.633]

Because of the incident last spring at the high school, the superintendent is mandating that you have a security plan for a fall festival planned at your elementary school. If you did not have the employee resources for this type of duty, list three other possible sources for the manpower to accomplish this task. [Pg.93]

Each person who offers for transportation in commerce or transports in commerce one or more of the following hazardous materials must develop and adhere to a transportation security plan for hazardous materials. [Pg.416]

The handling, transportation, communications, emergency response, training requirements, and security plans for hazardous materials can be found in 49 CFR 171-179. [Pg.89]

The NRC also imposes special security requirements for spent fuel shipments and transport of highly enriched uranium or plutonium materials that can be used in the manufacture of nuclear weapons. These security measures include route evaluation, escort personnel and vehicles, communications capabiHties, and emergency plans. State governments are notified in advance of any planned shipment within their state of spent fuel, or any other radioactive materials requiring shipment in accident-proof. Type B containers. [Pg.92]

There are 12 producers of ethylene oxide ia the United States. Table 9 shows the plant locations, estimated capacities, and types of processes employed. The total U.S. production capacity for 1992 was ca 3.4 x 10 metric tons. The percentages of total domestic production made by the air- and oxygen-based processes are ca 20 and 80%, respectively. The largest producer is Union Carbide Corp. with approximately one-third of the United States ethylene oxide capacity. About 94% of domestic ethylene oxide capacity is located on the Gulf Coast near secure and plentiful ethylene suppHes. Plans for additional U.S. production ia the 1990s have been announced by Union Carbide (incremental expansions), Eormosa Plastics (at Pt. Comfort, Texas), and Shell (at Geismar, Louisiana) (101). [Pg.454]

Attempting to modify structure or services to accommodate structural idiosyncrasies later is always problematic. Protection and isolation of existing facilities from the disruption of construction should be resolved early in the design. The reconciliation of building and production activities is never easy, but early planning for construction traffic, personnel, site screening, security, site access and site communications can minimize these adverse effects. [Pg.51]

Three miles from the restaurant where they ate dinner, the security clerk of the Vermittlungstelle Wehrmacht was about to quit for the day. He carefully checked the papers that were stamped "secret — l.G. farbenindustre." Among them were rough sketches of a proposed "buna plant to the East," the plans for the Fuerstenberg site in Upper Silesia, and mobilization plans for more than 100,000 tons of buna mbber for the year 1939. [Pg.152]

Vaccination is not recommended, and the vaccine is not available to health providers or the public. In the absence of a confirmed case of smallpox anywhere in the world, there is no need to be vaccinated against smallpox. There also can be severe side effects to the smallpox vaccine, which is another reason we do not recommend vaccination. In the event of an outbreak, the CDC has clear guidelines to swiftly provide vaccine to people exposed to this disease. The vaccine is securely stored for use in the case of an outbreak. In addition, Secretary of Health and Human Services Tommy Thompson recently announced plans to accelerate production of a new smallpox vaccine. [Pg.353]

Moving to the transport sector, Fig. 15.1 quantifies the continued oil stress of the transportation sector. Even when a rather aggressive development of biofuels is included, the transportation demand for oil does not go down. This underlines that in all likelihood the energy security issue is as much a long-term issue as the climate change issue. It induces a strong motivation around the world to develop non oil-based transportation fuels, even in the absence of CO2 emission concerns. Current investments in the area of Gas-to-Liquids (GTL) and plans for Coal-to-Liquids (CTL) attest to this [7]. [Pg.340]

The secretary, under the law, must review and approve the required assessment, plan, and implementation for each facility. The statute prohibits the secretary from disapproving a site security plan on the basis of the presence or absence of a particular security measure, but the secretary may disapprove a site security plan that does not meet the risk-based performance standards. The secretary may approve vulnerability assessments (see chapter 5) and site security plans created through security programs not developed by DHS, so long as the results of these programs meet the risk-based performance standards established in regulation. [Pg.60]

Federal, state, and local programs already exist that—with varying degrees of effectiveness—encourage or require the operators of chemical facilities to boost their efforts to promote safety and security and to share information that can help local governments plan for emergencies (Schierow 2006). [Pg.100]

Monitoring threat information should be a regular part of a security program manager s job, and utility-, facility-, and region-specific threat levels and information should be shared with those responsible for security. As part of security planning, chemical facilities should develop systems to access threat information and procedures that will be followed in the event of increased industry or facility threat levels, and should be prepared to put these procedures in place immediately, so that adjustments are seamless. Involving local law enforcement and FBI is critical. [Pg.220]

Developing plans for response to credible fire events is an important emergency planning element. Different fire events require different responses. Complete extinguishment is the appropriate approach for some events. For others, the optimum approach may be to cool adjacent structures until the source of the fuel can be isolated or until the fuel is depleted. Still others may require that firefighters secure perimeter areas and allow the fire to burn itself out. [Pg.374]

Supply chain safety— to protect the products and services on which our economy and society depend. The opportunities for chemical scientists include improved security plans at chemical production sites, automated detection systems that can sense agents inside of closed containers, and improved placarding of railroad tank cars. [Pg.3]

Think twice before you send confidential, private, or other sensitive material in an e-mail message. E-mail messages can be intercepted. The information may reach people other than those you intend. Unless you are confident that the server is secure, you may not want to include information about yourself (Social Security number, credit card number, and so on) or your company s secrets (strategic plans for the future, account numbers, and so on). In fact, your company may have regulations about what can and cannot be sent over e-mail or the Internet. Find out and follow your company s guidelines. [Pg.189]

US for the conduct of prompt and sustained combat operations on land in accordance with plans for national security... [Pg.485]

Physical access controls (limited access) (all listed implementation features must be present) This area is related to the procedures for limiting physical access to an entity while ensuring that properly authorized access is allowed. Disaster recovery Emergency operating mode Equipment control (into and out of site) Facility security plan Procedures for verifying access authorizations prior to physical access Maintenance records Need-to-know procedures for personnel access Sign-in for visitors and their escorts, if appropriate Testing and revision... [Pg.237]

A question many employees have is, How much money do I need to retire and maintain my preretirement lifestyle According to a growing field of research on investment withdrawals, in order to have a 100 percent inflation-adjusted probability of not running out of money over a 30-year period (based on the historical performance of stocks, bonds, cash, and inflation), retirees should not withdraw more than 4 to 5 percent of their investment portfolios on an annual basis (Cooley, Hubbard, and Waltz, 1998). A typical couple needs to plan for a minimum of 20 years of income at retirement (Burns, 1997). In essence, if you have 20 years of income in investments or some other vehicle, you will be secure. Where do you get those years of income ... [Pg.328]

Organisation for Economic Co-operation and Development, 2004, Implementation plan for the OECD guidelines for the security of information systems and networks towards a culture of security, http //www.olis.oecd.org/olis/2002doc.nsf/ 43bb6130e5e86e5fcl2569fa005d004c/36896c8a5cb63c7ecl256ca6005cf815/... [Pg.56]


See other pages where Security planning for is mentioned: [Pg.39]    [Pg.9]    [Pg.28]    [Pg.516]    [Pg.559]    [Pg.39]    [Pg.9]    [Pg.28]    [Pg.516]    [Pg.559]    [Pg.161]    [Pg.166]    [Pg.50]    [Pg.45]    [Pg.791]    [Pg.42]    [Pg.108]    [Pg.59]    [Pg.60]    [Pg.8]    [Pg.47]    [Pg.166]    [Pg.228]    [Pg.323]    [Pg.169]    [Pg.362]    [Pg.40]    [Pg.4]    [Pg.3]    [Pg.167]   
See also in sourсe #XX -- [ Pg.190 ]




SEARCH



© 2024 chempedia.info