HL-5582, Comment on Draft Reg Guide DG-5008, Reporting of Safeguards Events

From kanterella
Jump to navigation Jump to search
Comment on Draft Reg Guide DG-5008, Reporting of Safeguards Events
ML20203J995
Person / Time
Site: Hatch, Vogtle, Farley  Southern Nuclear icon.png
Issue date: 02/27/1998
From: Sumner H
SOUTHERN NUCLEAR OPERATING CO.
To: Hoyle J
NRC OFFICE OF THE SECRETARY (SECY)
References
FRN-63FR275, RTR-REGGD-05.062, RTR-REGGD-5.062, TASK-*****, TASK-RE 63FR275-00004, 63FR275-4, HL-5582, LCV-1181, NUDOCS 9803040396
Download: ML20203J995 (3)


Text

@@]i.27.195 8804MI SCOTFERfd IUCLEAR (205)992 6109 Il0.966 P.1/3 4

towiesame

n. pram s.nswa nectear {}Jpf OEA 273~

om.umce m .ia.

h Heich Pr6:t sawt 40Immeu Frkwey f) gpfg7p 70'4 8. [M 0 Um * ' as203 EEWED g f,2 g go 1 gpp0 liar '2 hi 9 13 RULE M E h Febraary 27, 1998 US NRtMPANY nrgy to$orer Ym%rM*

N Docket Nos. 50 348 $0 321 50-424 HL 5582 ,

50 364 $0 366 $0 425 LCV 1181 Mr. John C. Hoyle, Secretary l

U. S. Nuclear Regulatory Cortmission i

ATTN: Rulemakings and Adjudication's Staff Washington,D.C.20$$$ 0001 Comments on ..

Draft Regulatory Guide DG $008 Proposed Revision 2 to Regulatory Guide 5.62, ' Reporting of Safeguards Events" (REgderal Reoirter 275 dated knum' 5.1998)

Dear Ladies and Gentlemen:

Southern Nuclear Operating Company has reviewed the Draft R.:gulatory Guide DG 5008, Proposed Revision 2 to Regulatory Oulde 5.62, " Reporting of Safeguards Events," published in the Federal Register on January 5,1998. In accordance with request for comments, Southern Nuclear Operating Company (Southern Nuclear) is in total agreement with the NEI comments which are to be provided to the NRC Southern Nuclear is also enclosing additional comments.

Respectfully submitted, H. L. Sumner 1

HLS/JDD 1

Enclosure g

9003040396 900227 O Od {

u"Oa?" eoa gyqsyg '

wa. o i

_j

  • FED.27.1998 0805ft1 SOUTHERN ffJCLEfA (205)992 6100 10.966 P.2/3 4

k i

D- U. S. Nuclear Regulatory Commission Page Two cc: Santhern Nuclear Oneratine enmnany Mr. R. D. Hill, General Manager Plant Farley Mr. P. H. Wells, General Manager Plant Hatch Mr. J. B. Beasley, General Manager Vogtle Electric Generating Plant Mr. D. N. Morey, Vice President Plant I arley Mr. C. K. McCoy, Vice President - Plant Vogtle U. L Nuetaar Raeulatory enmmlutan. Washineton. no Mr. J. I. Zimmerman, Licensing Project Manager . Farley Mr. L. N. Olshan, Project Manager Hatch Mr. D. H. Jaffe, Senior Project Manager - Vogtle U. L Muelanc RaeulathyCommlulnn Ranlon II l Mr.L. A.Reyes, Regional Administrator Mr. T. M. Ross, Senior Resident Inspector - Farley Mr. B. L. Holbrook. Senior Resident Inspector - Hatch ,

Mr. J. Zeller, Senior Resident Inspector Vogtle e

HL-5582 ,

LCV ll81

FED 27.1999 8 05AM SOUTH RN TOCLEAR (205)992 6t08 NO.%6 P.3/3 k

i Enclosure Comment'. 6n Draft Regulatory Guide DG-5008 Soutbem Nuclear submits the following comments for consideration:

Regulatory Guide (RO) 5.62. Revision 1 - Position 2.2, Example 2, or the word "credn ' "

needs to be added before " omb th*:at or extortion threats." By adding the word credib.e it brings into play the steps contained in the definition for " credible throat" in Appendix A.

Regula'ory Position 2.2, Eumples 16 and 21 need to be combined with Example 12. Tb-new wording can address unaccoanted for, lost, or stolen key cards, identification %

blanks, or any access control media that could allow unauthorized access or that - it - ~

someon: using the medium foi improper access. Material access areas can be et "

list of areas bela accessed, All thre6 of these examples address the same scenar.

Regulatory Position 2.2, Example 17 reeds to include the fact that the incoihplete or ,

inaccurate information was the result of the intent to use fraud W "in improper access.

There we several cases ofincomplete or inaccurate informatir. ;b da significant nature the does not involve the malicious intent to defraud. These case, should be logged but not reported as a 1 hour1.157407e-5 days <br />2.777778e-4 hours <br />1.653439e-6 weeks <br />3.805e-7 months <br /> report, Regulatory Position 2.4, Example 1 needs to be deleted. This event is encompassed in Exampla 8 and puts the computer failure in the proper context for being logged.

Regulatory Position 2.4, Example 9 needs to have the reference to " security computers" removed. Security Computer failures are covered in Emuple 8. Also this example references Exampic 16 in Regulatory Position 2.2 wnich does not have any relationship to this example.

Regulatory Position 2.4,2xample 14 should be deleted. This ncat is encompassed in Example 9.

Regulatory Position 2.4, Example 18.9 needs to be supplemented to include information that would hau resulted in denial of access if1: intent to defraud is not found to be the reason for the incomplete or inaccurate information.

Regulatory Position 2.5, Example 6 needs to have the word " malevolent" inserted before the last " tampering." Thir. will clarify tb". .ntent of 6% cxample and link it with the wording in Regulatory Position 2.2 Example 9.

l