ML20149L426

From kanterella
Jump to navigation Jump to search
Reporting of Safeguards Events
ML20149L426
Person / Time
Issue date: 02/29/1988
From: Dwyer P, Ervin N
Office of Nuclear Reactor Regulation
To:
References
NUREG-1304, NUDOCS 8802240225
Download: ML20149L426 (25)


Text

-

~

l e

NUREG-1304 Reporting of Safeguards Events l

l i

U.S. Nuclear Regulatory Commission Office of Nuclear Reactor Regulation P. A. Dwyer, N.E. Ervin ji*

  • a r c,,'o, o

e h

l 1

?

hR khh 9

1304 R pop

\\

l NOTICE Availability of Reference Materials Cited in NRC Publications Most documents cited in NRC publications will be available from one of the following sources:

1. The NRC Public Document Room,1717 H Street, N.W.

Washington, DC 20655

2. The Superintendent of Documents, U.S. Government Printing Office, Post OfRe Box 37082, Washington, DC 20013 7082
3. The National Technical Information Service, Springfield, VA 22161 Although the listing that follows represents the majority of documents cited in NRC publications, it is not intended to be exhaustive.

Referenced documents available for inspection and copying for a fee from the NRC Public Docu-ment Room include NRC correspondence and internal NRC memoranda; NRC Office of Inspection and Enforcement bulletins, circulars, information notices, inspection and investigation notices; Licensee Event Reports; vendor reports and correspondence; Commission papers; and applicant and licensee documents and correspondence.

The following documents in the NUREG series are available for purchase from the GPO Sales Program: formal NRC staff and contractor reports, NRC sponsored conference proceedings, and NRC booklets and brochures. Also available are Regulatory Guides, NRC regulations in the Code of Federal Regulations, and Nuclear Regulatory Comminion issuances.

Documents available from the National Technical Information Service include NUREG series reports and technical reports prepared by other federal agencies and reports prepared by the Atomic Energy Commission, forerunner agency to the Nuclear Regulatory Commission.

Documents available from public and special technical libraries include all open literature items, such as books, journal and periodical artic!*s, and transactions. Federal Register notices, federal and state legisladon, and congressional reports can usually be obtained from these libraries.

Documents such as theses, dissertations, foreign reports and translations, and non NRC conference proceedings are available for purchase from the organization sponsoring the publication cited.

Single copies of NRC draft reports are available free, to the extent of supply, upon written request to the Division of Information Support Services, Distribution Section, U.S. Nuclear Regulatory Commission, Washington, DC 20555.

Copies of industry codes and standards used in a substantive manner in the NRC regulatory process are maintained at the NRC Library, 7920 Norfolk Avenue, Bethesda, Maryland, and are available there for reference use by the public. Codes and standards are usually copyrighted and may be purchased from the originating organization or, if they are American National Standards, from the American National Standards Institute,1430 Broadway, New York, NY 10018.

NUREG-1304 Reporting of Safeguards Events Manuscript Completed: February 1988 Date Published: February 1988 P. A. Dwyer, N.E. Ervin Division of Reactor inspection and Safeguards Office of Nuclear Reactor Regulation U.S. Nuclear Regulatory Commission Wcshington, DC 20555

.p.

4 o-

)

i

l ABSTRACT On June 9, 1987, the Commission published in the Federal Register a final rule revising the reporting requirements for safeguards events.

Safeguards events include actual or attempted theft of special nuclear material (SNM); actual or attempted acts or events which interrupt normal operations at power reactors due to unauthorized use of or tampering with machinery, components, or controls; certain threats made against facilities possessing SNM; and safeguards system failures impacting the effectiveness of the system.

The revised rule was effective October 8, 1987.

On September 14, 1987, the NRC held a workshop in Bethesda, MD to answer affected licensees' questions on the final rule.

This report documents questions discussed at the September 14 meeting, reflects a completed staff review of the answers, and supersedes previous oral comment on the topics covered.

Answers that have been revised are identified by an asterisk next to the question number.

After additional experience is gained under the new reporting regulations in 10 CFR 73.71, the NRC staf f also intends to revise its formal guidance in Regulatory Guide 5.62, as appropriate, iii

- =.

i r,

i t

CONTENTS t

t 4

M' i

ABSTRACT.............................................................

iii 1

i

1. 0 INTRODUCTION....................................................

1 2.0 REPORTABLE EVENTS (GENERAL)......................................

3 r

2.1 SAFEGUARDS EVENTS TO BE REPORTED WITHIN ONE HOUR (GENERAL).......

3 2

i

2. 2 EXAMPLES OF SAFEGUARDS EVENTS TO BE REPORTED WITHIN ONE HOUR.....

4 2.3 SAFEGUARDS EVENTS TO BE REPORTED AND SUBMITTED QUARTERLY IN A LOG (GENERAL)..................................................

16 2.4 EXAMPLES OF SAFEGUARDS EVENTS TO BE REPORTED AND SUBMITTED QUARTERLY IN A LOG..............................................

17 i

t i

h J.

t I

i i

1

+

d i

a i

3 1

i l

I J

l l

l k

f 1

l v

i 5

l.

1

-,_s

1.0 INTRODUCTION

On September 14, 1987, the NRC staff conducted a workshop to respond to affected licensees' questions on revisions to 10 CFR 73.71, "Reporting Requirements for Safeguards Events", published on June 9, 1987 (52 FR 21651),

effective on October 8, 1987.

Many questions were also directed at the rule's supporting regulatory guide, Regulatory Guide 5.62, "Reporting of Safeguards Events", Rev. 1.

This report documents questions discussed at the September 14 meeting, reflects a completed staff review of the answers, and supersedes previous oral comment on the topics covered.

Answers that have been revised are identified by an asterisk next the the question number.

After additional experience is gained under the new reporting regulations in 10 CFR 73.71, the NRC staff also intends to revise its formal guidance in Regulatory Guide 5.62, as appropriate.

The organization of this report is based on Sections 2.2 and 2.4 of Regulatory Guide 5.62; questions and responses are grouped under either "General" categories or appropriate regulatory guide examples of items to be reported or logged.

1 i

1

2.0 Reportable Events (General)

Q. 2.0.1.

If a report is made under 10 CFR 50.72 or 10,CFR 50.73 for an event that is also reportable under 10 CFR 73.71, is a dualicate report required under 10 CFR 73.71?

A.

No.

  • Q. 2.0.2.

If a report is made under 10 CFR 73.71 for an event that '.s also reportable under 10 CFR 50.72 or 50.73, is a duplicate report under 10 CFR 50.72 or 50.73 required to be made?

A.

No.

Duplicate reports are not required.

  • Q. 2.0.3.

Does guidance found in a regulatory guide supersede approved security plan commitments?

A.

No.

Q. 2.0.4.

Must plan amendments be submitted which commit to implement the revised 10 CFR 73.71?

A.

No.

However, if certain provisions in licensees' plans are no longer authorized under the new 73.71 rule, licensees should make conforming revisions to their plans through 10 CFR 50.54(p) or 10 CFR 70.32(e) changes, as appropriate.

Q. 2.0.5.

Is there a relationship between the safeguards severity levels in Appendix C to 10 CFR Part 2 and the revised 10 CFR 73.71?

A.

No.

However, the staff did attempt to ensura consistency in philosophy.

2.1 Safeguards Events To Be Reported Within One Hour (General)

Q. 2.1.1.

Can a one hour report be converted to a log item if a licensee erroneously reports an item that should be logged as a one hour report?

A.

Yes.

Q. 2.1.2.

If pertinent information is uncovered after an initial telephonic I

notification, should the pertinent information be telephoned to the NRC Opera-tions Center?

A.

Yes, but only if the information is significant.

Significant information is that which would affect licensee or NRC respense to the event.

  • Q. 2.1.3.

What procedures should licensees follow if compensatory measures in approved security plans are different than compensatory measures described in the guide?

A.

The guidance in Regulatory Guide 5.62 is not intended to supplant any regulation or NRC-approved licensee safeguards plan.

Accordingly, compensatory actions taken by licensees in accordance with approved security plans will permit the logging of certain events in lieu of reporting them within one hour.

3

The regulatory guide contains examples of acceptable compensatory measures to-guide licensee reporting in situations not covered by approved safeguards i

plans.

Q. 2.1.4.

When does the one hour notification clock for a safeguards event involving interruption of normal operation begin?

l A.

The clock begins when there is reasonable suspicion that the incident is the result of unauthorized use of or tampering with equipment, controls, etc.

l

  • Q. 2.1.5.

The LER form has a "block" where you provide a sequential number for events.

Should we use the same numbering system for security events as for safety events?

A.

No.

The sequential numbering system for security events should start with the letter "S", followed by a two digit sequential number.

(See the following example.)

EXAMPLE:

j l

LER NUMBER (6)

REPORT DATE (7)

YEAF.

SEQ. NUMBER REV. NUMBER MONTH DAY YEAR 0 :0 10 Oi9 8 i7 l 81 7 5: 011 t

If you exceed 99 events in one year, replace the "S" with a "T".

2.2 E 3mples of Safeguards Events That Should Be Reported Within One Hour J

2.2.1 Crcdible bomb or extortion threats.

In addition to the initial telephone report, a telephone report of the results of a bomb search 4

should be made within one hour of completion of the search, j

Unsubstantiated threats need not be reported immediately unless a specific organization or group claims responsibility or the threat is one of a pattern of harassing threats; in these cases, the threat must be reported within one hour.

(Paragraph I(a)(1), (2), or (3) of Appendix G.) There are no compensatory measures that would preclude the reporting of a substantiated threat within one hour.

If a threat cannot be substantiated (no organization or group identified, negative search results, and no additional evidei.ce other than the threat message), the event need only be i

logged.

(Also see number 13 in Section 2.4.)

i Q. 2.2.1.a.

Does this example include credible threats to commit certain actions?

j A.

Yes, if the threatened actions are as described in Appendix G Paragraph I, of 10 CFR 73.71, as events to be reported within one hour.

)

j

  • Q 2.2.1.b.

If a bomb threat is apparently unsubstantiated but search results cannot be obtained within an hour, should the threat be reported within l

one hour?

If so, can the event status be changed if the result of subsequent j

search is negative?

i

}

4 l

A.

If a specific organization or group has not claimed responsibility and the threat is not one of a pattern of harassing threats, the decision to report or log can await the results of the search if the search can be completed within a reasonable time.

If the threat cannot be substantiated (no organization or group identified, negative search results, and no additional evidence other c

than the threat message), the event need only be logged.

It should always be reported within one hour if substantiated.

2.2.2 Discovery of a criminal act involving individuals granted unescorted protected area or vital area access that, in the judgment of the licensee, adversely affects radiological safety in licensed activities 4

or facility operations (e.g., felonious acts, oiscovery of a conspiracy to bomb the facility or disturb its vital components, vandalism of vital equipment, reasonable suspicion of illegal sale, use, possession, or introduction of a controlled substance onsite).

(Paragraph I(a)(2) or (3) of Appendix G.) Because of the serious nature of such an event, discovery of the event should be reported within one hour even if the individual's unescorted access authorization is cancelled.

(Also see number 3 in this section.)

Q. 2.2.2.e.

Is this example intended to cover only criminal acts onsite?

If i

so, how is onsite defined with respect to the facility's protected area and the introduction of a controlled substance?

A.

Yes, this example is intended to cover only criminal acts onsite.

Onsite is defined as inside the protected area.

Detection of a controlled substance at an entry point to a protected area or within the owner controlled area outside of the protected areas should be logged.

t Q. 2.2.2.b.

Does the term "criminal act" imply conviction of the individual?

A.

No. Acts of concern are those judged by licensees to adversely affect radiological safety in licensed activities or facility operations.

Q. 2.2.2.c.

If management decides to perform drug screening on an individual based on reasonable suspicion for cause, does the time clock for reportability e

begin when initial tests give positive results or when the results are confirmed?

If the individual's unescorted access is suspended, does the event need only be logged? Assume this person has safety-related responsibilities.

A.

The time clock begins when the licensee has reasonable suspicion that an individual is abusing drugs onsite or is under the influence while onsite.

Any i

illegal sale, possession, or use of a controlled substance onsite is reportable within one hour regardless of the responsibilities of the individual involved.

i For further discussion of the offsite aspects of this question see paragraph i

l 2.2.3 below.

1 i

Q. 2.2.2.d.

If a suspected controlled substance is found onsite, does the one hour time clock start when the discovery is made, or, after laboratory 2

tests have confirmed that the material is a controlled substance?

A.

The time clock begins when there is reasonable suspicion that the material is a controlled substance.

l 4

s 1

4

i i

Q. 2.2.2.e.

Do allegations of illegal sale, use, possession, or introduction I

of a controlled substance onsite constitute reasonable suspicion, thus making the allegation itself reportable within one hour?

A.

No.

Such an allegation should be reported within one hour only if, in the licensee's judgment, the allegation is valid.

Q. 2.2.2.f.

Can the apparent validity of the allegation be used to determine

)

reasonable suspicion, for example, whether the allegation was made anonymously, by a known individual, or by a private citizen versus a law enforcement officer?

A.

Yes.

The credibility of the source can be used to evaluate the reasonable suspicion factor.

L Q. 2.2.2.g.

Could not the reporting of suspicion of illegal use of a controlled substance undermine or compromise police undercover activities?

A.

Licensees are expected to maintain liaison with local law enforcement agencies to minimize such conflicts and to internally protect such information.

Submission of written reports can be delayed, with approval by the appropriate l

HRC Regional office, to minimize the possibility of compromise.

l Q. 2.2.2.h.

Define the term "reasonable suspicion."

A.

Reasonable suspicion implies that there is some logical, or factual basis for believing that something is true.

2.2.3 Discovery of a criminal act involving a person granted unescorted protected area or vital area access if the act has the potential for adversely affecting the public health and safety, e.g., illegal use of a controlled substance offsite by a reactor control room operator.

(Paragraph I(a)(2) or (3) of Appendix G.)

Licensees should exercife judgment in determining the reportability of criminal acts conducted offsite.

Only those acts with the potential for affecting the radiological safety of licensed activities need be reported.

Criteria that can be used to judge reportability of these types of events include (1) the event indicates a failure in program design or implementation, (2) the person involved has safety-related responsibilities, or (3) the event is receiving media attention.

Positive drug screens should be validated prior to determining reportability to the NRC.

If the event is 4

properly compensated, e.g., the program failure is corrected or, for

)

individuals with no safety related responsibilities, the individual's unescorted access is suspended, then the event need only be logged.

Q 2.2.3.a.

Is this example intended to cover only criminal acts committed offsite?

A.

Yes.

Q. 2.2.3.b.

Wry is "media interest" required to be reported within one hour?

A.

Media interest by itself is not required to be reported within one hour to 1

the NRC.

Licensees are encouraged to use media interest in a safeguards event i

6 J

^

\\

as one criterion for determining reportability of an event where licensee judgment must be exercised.

"Q. 2.2.3.c.

If an employee turns himself or herself in to an employee assistance program because of drug or alcohol abuse, should this be reported or logged? Wouldn't this impact confidentiality of the program?

4 A.

If continued performance in the individual's state constitutes a hazard to the public health and safety, including fellow employees, then the EAP has the

]

obligation to inform appropriate management who should withdraw unescorted access and log the event.

Presumably, licensees will handle such cases with due regard for confidentiality and privacy.

However, public health and safety considerations must outweigh all other considerations in such cases.

I

'Q.

2. 2. 3. d.

What steps should a licensee take when an allegation of drug use offsite is received?

A.

(1) Attempt to verify the allegation, (2) if reasonable suspicion exists, log the item and follow normal procedures for handling an allegation.

  • Q. 2.2.3.e.

What does the term ".... person involved has safety-related responsibilities" mean?

A.

Actions of the person have the potential for affecting the radiological safety of licensed activities.

  • Q. 2.2.3.f.

If results of an individual's annual drug screen are positive i

I should the event be reported or logged?

r A.

The event may be logged if their unescorted access is suspended pending I

completion of any additional confirmatory tests and reviews.

]

2.2.4 Discovery of theft or loss of classified documents pertaining to l

facility or transport safeguards.

(Paragraph I(a) of Appendix G.)

(Note:

This is also reportable under S 95.57 of 10 CFR Part 95.) This type of event is considered a credible threat to the proper safeguarding of a facility or transport.

By the nature of this event, its discovery can occur only after a significant degradation of the safeguards system designed to protect the classified documents has occurred.

No measure can adequately compensate for such an event, and events of this type should always be reported within one hour of discovery.

After the discovery, the licensee should endeavor to locate the missing or stolen document, take measures to help ensure the event is not repeated, and take whatever steps are possible to minimize the consequences of the event.

No questions were received on this item.

2.2.5 Fire or explosion of suspicious or unknown origin within the isolation zone, protected area, material access area, or vital area.

(Note:

Events reportable under SS 50.72 or 50.73 do not require duplicate a

reports under S 73.71.) (Paragraphs I(a)(1), (2), or (3), or 1(d) of 3

Appendix G.)

If the origin of a fire or explosion can be determined within one hour to be nonsuspicious and the facility sustains no 4

1 j

7 i

.~

. _ - -... ~

significant damage, the event is not considered a security threat to the j

facility and need not be reported or logged.

i No questions were received on this item.

2 2.2.6 Discovery of a suspicious vehicle following a licensed carrier transporting formula quantities of SSNM.

(Paragraph I(a)(1) of Appendix G.)

In this situation, armed escorts or other responsible

, l personnel should determine whether or not a threat exists and assess the extent of the threat, if any.

If a threat exists, it should be reported'

~

to the NRC within one hour of confirmation and the provisions of paragraph 73.26(e) should be followed.

If no threat exists, the event need not be reported or logged.

l No questions were received on this item.

l 1

2.2.7 Mechanical breakdown of transport vehicle carrying formula i

j quantities of SSNM.

(Paragraphs I(a)(1), (2) of Appendix G.) Since it is 1

difficult to readily determine if a mechanical breakdown is random or intentional, and because of the strategic significance of the material, mechanical breakdowns of transports carrying formula quantities of SSNM should always be reported to the NRC within one hour of discovery.

No questions were received on this item.

I e

]

2.2.8 Complete loss of offsite communications, (Paragraph I(a)(2) or (3) of Appendix G.)

If possible, the licensee should report the complete loss i

of communications from the site within one hour or immediately after restoration of communications.

If communications from the site are lost and cannot be restored within one hour, the licensee should use communications located offsite to notify the NRC.

j Q. 2.2.8.a.

Explain which offsite communications this exampic refers to.

A.

Complete loss of offsite communications means loss of telephone and radio I

j capabilities, j

i l

2.2.9 Mass demonstration at plant site that may pose a threat to the j

l facility.

(Paragraph I(a)(2) or (3) of Appendix G.)

1 Q. 2.2.9.a.

Does a demonstration directed at other than nuclear-related activities at a facility need to be reported to the NRC?

i A.

No, not if it has no impact on nuclear activities.

i 2.2.10 Civil disturbanu. ear the plant site that may pose a threat to j

the facility.

(Paragraph I(a)(2) or (3) of Appendix G.)

j No questions were received on this item.

2.2.11 Confirmed tampering of suspicious origin with safety or security equipment.

(Paragraph I(a)(1), (2), or (3) of Appendix G.)

l l

No questions were received on this item, i

i 8

1

-m.-m-

--+

n--y-.-

y v

-i.-Fwr,-n.-

T-'---P

  • T"fT

'T"*78-'T-*'"N"**"-""9"'Fs'-

P~#~"W'

-T

'P*'F"' - -- -

-'--*"N*WT T-"@-

t F-*-

TF 9'

      • - - 'N*

- + * *$

2.2.12 An assault on a power reactor, facility, or transport possessing i

or transporting SSNM regardless of whether perimeter penetration is achieved.

(Paragraph I(a)(1), (2), or (3) of Appendix G.)

No questions were received on this item.

2.2.13 Confirmed intrusions by unauthorized individuals into the protected area, material access area, controlled access area, vital area, or carrier transporting formula quantities of SSNM.

(Paragraph I(b) of Appendix G.) Measures should be taken to preclude the recurrence of such events.

Since any compensatory measures for such an event would be after the fact of a serious safeguards degradation, there are no compensatory measures that would preclude reporting such an event within one hour of i

discovery.

The violation of licensee-established work rules (e.g., area zoning) within an area by an authorized individual need not be reported or logged as a safeguards event.

(Also see number 11 in Section 2.4.)

  • Q. 2.2.13.a.

If a visitor, e.g., an individual requiring an escort while onsite, temporarily is left behind by an escort in an area that he or she entered in an authorized manner, should the event be reported?

A.

If the escort or other employees authorized unescorted access promptly recognize and rectify the situation (e.g., within several minutes of occurrence), the event need only be logged.

Escorts need not be maintained within restrooms from which there are limited means of egress.

Otherwise, the incident should be reported within one hour because the visitor has not been authorized unescorted access.

Q. 2.2.13.b.

What does the term "...licensce established work rules (e.g., area zoning)..." mean?

A.

This term refers to areas to which access is restricted for reasons other than security (e.g., radiation areas).

It is priparily used at fuel facilities and does not apply to vital area access at power reactors except with respect to zoning for safety-related purposes.

  • Q. 2.2.13.c.

If an individual enters a vital area to which he or she is authorized unescorted access by inadvertently using an access device intended for another individual who also has unescorted access to the area, should the event be reported or logged?

A.

The event should be logged.

For individuals with unescorted vital area access, only those entries which cannot be satisfactorily explained need be reported within one hour of discovery.

  • Q. 2.2.13.d.

If an individual with access only to the protected area inadvertently receives a badge granting vital area access but is stopped before any vital area entry is made, should the event be reported or logged?

A.

Logged.

l r

9

l l

2.2.14 Uncompensated suspension of safeguards controls during either

)j radiological or nonradiological emergencies that could allow undetected or j

j unauthorized access.

(Note:

Events reportable under SS 50.72 or 50.73 do i

I not require duplicate reports under S 73.71.)

(Paragraph I(c) of Appendix G.) Section 5.3, "Controls that Can Be Suspended During an Emergency," of Regulatory Guide 5.65, "Vital Area Access Controls, Protection of Physical Security Equipment, and Key and Lock Controls,"

describes safeguards measures that may be suspended during nonradiological l

emergencies.

No questions were received on this item.

i 2.2.15 Discovery of intentionally falsified identification badges or key cards.

(Paragraph I(a) of Appendix G.) This event is considered a safeguards threat to the facility and should always be reported within one hour of discovery.

Measures should be taken immediately to cancel the badges or key cards from the access system and to determine to what extent the badges or key cards have been used.

No questions were received on this item.

I 2.2.16 Discovery of uncompensated and unaccounted for, lost, or stolen key cards, I.D. card blanks, keys, or any access device that could allow unauthorized or undetected access to protected areas, material access i

areas, controlled access areas, or vital areas.

(Paragraph I(c) of i

Appendix G.) Such events need not be reported within one hour if measures L

i are taken within 10 minutes of the discovery of the loss to preclude the use of the lost or stolen device for gaining access to a controlled area

+

i and to ensure that the lost or stolen device has not been used in an

'j unauthorized manner prior to completion of actions to prevent unauthorized use of the device.

(Also see number 6 in Section 2.4.)

  • Q. 2.2.16.a.

If an access device is lost or stolen, must two actions be taken, e.g., action to preclude the use of the lost or stolen device and action i

to ensure that the lost or stolen device has not been used in an unauthorized j

manner, in order to log the event?

4 A.

If action to preclude the use of the lost or stolen device is completed within 10 minutes of discovery, and action is initiated to ensure that the device has not been used in an unauthorized manner, the event should be logged.

i 2.2.17 Compromise of safeguards information (including loss or theft) that would significantly assist a person in an act of radiological l

sabotage or theft of SNM.

(Paragraph I(a) of Appendix G.) There is no j

measure that would adequately compensate a compromise of-safeguards a

information once the event has occurred.

A licensee should always report i

this type of event within one hour of discovery, and follow-up measures similar to those for thef t or loss of a classified document should be I

taken.

(Also see number 4 in Section 2.2 above.)

1

]

Q. 2.2.17.a.

What does she term "... significantly assist in an act of i

radiological sabotage.." mean with respect to loss of safeguards information?

10 i

1 1

A.

This term means information that could be used to gain unauthorized or i

undetected access to a facility or information which would significantly assist an individual in damaging the facility or in theft of SNM.

)

3 1

Q. 2.2.17.b.

Beyond verbal compromise, is there a difference between i

compromise of safeguards information and theft or loss of a classified document?

A.

Yes.

Classified documents are national security information.

Theft or 4

loss of these documents is always required to be reported within one hour of discovery.

If lost safeguards information could significantly assist an individual in an act of radiological sabotage or theft of SNM, it is also f

required to be reported within one hour.

However, if the lost safeguards information could not significantly assist in these acts, the event should be logged and the system failure corrected.

Q. 2.2.17,c.

How long can safeguards information be missing before it is considered lost?

A.

The NRC staff expects a report to be made within one hour of discovery that j

the document is missing.

Q. 2.2.17.d.

In view of the regulatory reference in Appendix G to Part 73, which allows for reduced reporting if the event is compensated, why can't a significant loss or theft of safeguards information be compensated and logged?

i 3

A.

There is no adequate compensatory measure.

The reference to Appendix G contained a typographical error which has since been corrected.

The reference j

has been changed to Appendix G.I.(a).

2.2.18 Uncompensated loss of the ability to monitor or remotely assess t

protected area alarms through loss of both central and secondary alarm stations.

(Paragraph I(c) of Appendix G.)

If the event involves an outage of the alarms, closed circuit television, or security computers, the event is considered properly compensated if the original capability is restored within 10 minutes of discovery of the event or if dedicated observers with appropriate communications are in place within 10 i

minutes of the discovery to provide total observation of each area.1 Licensees are expected to discover this type of event upon occurrence.

If j

immediate restoration of system capability is provided by activating i

secondary computers, the loss of backup capability need not be reported j

within one hour.

(Also see number 10 in Section 2.4.)

i Q. 2.2.18.a.

Does immediate restoration of system capability mean restoration 1

within 10 minutes?

A.

Yes.

)

4 2 Posting personnel as a compensatory measure implies that the personnel are capable of performing the lost or degraded function. When they cannot per-j form that function, such as when they are asleep, there is an uncompensated loss that must be reported within 1 hour1.157407e-5 days <br />2.777778e-4 hours <br />1.653439e-6 weeks <br />3.805e-7 months <br /> of discovery.

Preplanned compensatory measures are normally described in NRC-approved safeguards plans.

i

)

11

l Q. 2.2.18.b.

If the loss of both the central. alarm station and the secondary alarm station is properly compensated as described in item 18, should the event j

be logged?

If the secondary computer is lost also, should the event be

{

reported within one hour?

A.

Yes in both cases.

i Q. 2.2.18.c.

What is meant by the term "back-up capability" in item 18?

A.

As used in item 18, this term means secondary computers.

Q. 2.2.18.d.

Must a "dedicated observer" receive security training?

A.

A dedicated observer must be trained in and capable of performing any j

assigned security function.

However, dedicated observers are not required to j

be members of the security force.

1~

Q 2.2.18.e.

Many security systems are designed with built-in redundancies 1

such that if one element of the system fails, such as a central processing unit in a security computer, another one instantaneously functions in its place.

Is the failure of one such redundant element reportable under 10 CFR 73.717 4

A.

No.

If switchover is automatic such that there is no loss of system integrity or system degradation, the event is not required to be reported or 4

logged.

l

  • Q. 2.2.18.f.

With use of the phrase "... licensees are expected to discover l

l this type of event upon occurrence...", it is recognized that in most cases, i

5 component failures of security electronics systems will be discovered upon l

l occurrence when the failure can be detected by line supervision det,ign, etc.

l j

However, when failure is due to a loss in sensitivity, the event will not be i

discovered upon occurrence, but rather when a test is made of that component.

Does "upon occurrence" mean "upon discovery" when the failure of the alarm is due to loss of sensitivity?

]

4 A.

Licensees are required to monitor the functioning of their alarms and maintain their effectiveness through proper maintenance and testing programs, i

which may lead to periodic recalibrations.

Regardless of when it may have

]

occurred, if a system "fails" due to loss of sensitivity it should be inmediately j

compensated (within 10 minutes of discovery) and the event should be logged.

If it cannot be compensated within 10 minutes of c'iscovery it should be reported within one hour.

2.2.19 Unavailability of a minimum number of security personnel or an i

actual or imminent strike by the security force.

(Paragraph I(c) of

]

Appendix G.) If an unexpected unavailability of a minimum number of 1

f security personnel occurs, procedures pre-approved by the NRC may be used; j

or "on call" guards or trained management, supervisory, or operations personnel available within 10 minutes may be used to supplement the on-duty security force.

If minimum requirements cannot be met, the event l

should be reported within one hour of discovery, i

l i

Q. 2.2.19.a.

What does the term "imminent" mean with respect to a security i

]

force strike?

12

1 A.

In this case, the terra means within three days.

Q. 2.2.19.b.

Since it is highly unlikely that either an actual or imminent j

strike is something that would occur suddenly or would require immediate response by the NRC, what is the need for one hour reporting? This is particularly true if the utility has approved plans for dealing with a strike contingency.

A.

The NRC staff believes that it can only discharge its responsibility for assuring that a licenses maintains protection of a facility during a strike by having current knowledge of the event.

This cannot be accomplished through a log submitted quarterl).

Q. 2.2.19.c.

As a conuensatory measure for the unavailability of a minimum number of a security force onsite, does initiation of getting additional members onsite within 10 minutes suffice or da these guard force members have to be posted within 10 minutes?

A.

In general, a minimum number must be posted within 10 minutes.

NRC-approved site-specific plans may specify other measures and unique situations may require consultation with appropriate NRC staff to arrive at alternate solutions (e.g., contingency plans for replacing a sick security guard).

  • Q. 2.2.19.d.

If the NRC is already on notice that a strike is going to occur, is a one hour report necessary when the strike actually does occur?

A.

Not for 10 CFR 73.71 requirements, however, such a report might be required in accordance with 10 CFR 50.72.

l' 2.2.20 Uncoripensated loss of all ac power supply to security systems that i

could allow unauthorized or undetected access to a protected area, material access area, controlled access area, or vital area.

(Paragraph 1(c) of Appendix G.) If the security system integrity can be

[

maintained by standby power, the event is considered properly compensated and need only be logged.

However, if standby power fails prior to

}

restoratior,of ac power, the event should be reported within one hour of l

loss of standby power.

Licensees are expected to discover this type of f

event upon occurrence.

(Also see number 7 in Section 2.4.)

)

  • Q.

2.2,20.a.

If power loss is momentary, (e.g., less than 10 minutes) should j

the event be reported or logged?

t A.

If all AC power supply is lost and security system integrity is not maintained by standby power, the event should be reported within one hour, l

]

unless compensated in accordance with an NRC-approved security plan.

2.2.21 Un:ompensated loss of ability to detect within a single intrusion detection system zone.

(Paragraph I(c) of Appendix G.) Proper l

i compent.at'.on for this event means immediate deployment (within 10 minutes i

of discovery) of backup intrusion detection equipment or posting a dedicated observer with a view of the entire area and capability to f

i I

13 l

I a

l l

l communicate with alara stations.1 (Also see number 3 in Section 2.4.)

Licensees are expected to discover this type of event upon occurrence, i

No questions were receivei on this item.

i l

2.2.22 Loss of alarm capability or locking mechanism on a material access l

area or vital area portal.

(Paragraph I(c) of Appendix G.) A bolt position alarm capability is not a proper compensato*y measure for loss of a balanced-magnetic alarm because it is not tamper-resistant.

.oroper compensation for either of these events means immediate (within 10 minutes of discovery) posting of a dedicated observer for loss of an alarm or posting an armed member of the security force for loss of a lock.

The posted observer or guard should have appropriate communications equipment.1 In addition, a thorough search of the affected area should be initiated immediately and completed as soon as practicable.

Licensees are expected to discover this type of event upon occurrence.

(Also see number 8 in Section 2.4.)

  • Q. 2.2.22.a.

Does "upon occurrence" mean "upon discovery" when the failure of a locking device is due to mechanical breakdown?

A.

Regardless of cause, actions to compensate for loss of locking mechanism should be initiated upon discovery.

  • Q. 2.2.22.b.

If a lock fails on a vital area door but the alarm remains operational should this event be reported or logged?

A.

Logged, if properly compensated.

Proper compensation means immediate (within 10 minutes of discovery) posting of an armed member of the security force or other measures as described in the licensee's NRC-approved security plans, as applicable.

  • Q. 2.2.22.c.

The requirement to post an armed member of the security force for the loss of a lock is inconsistent withTCFR 73.55(d)(8) which allows an unarmed watchman to control access to a reactor containment building and NUREG-1045 which allows watchpersons to provide access control to protected and i

vital areas.

A.

NUREG-1045 and RG 5.62 both call for an armed member of the security force as a compensatory measure whenever barrier integrity is reduced, including doors and appropriate hardware.

NUREG-1045 does allow security personnel, including watch persons to be used where barrier integrity is maintained but the computer 17. not able to verify the identity and maintain the required log.

The first example cited, 10 CFR 73.55(d)(8), refers to an outage situation when the reactor is not operating.

Preplanned compensatory measures are normally described in NRC-approved safeguards plans.

Q. 2.2.22.d.

What is proper compensation for an open vital area door during a planned maintenance evolution with the reactor operating!

2 Posting personnel as a compensatory measure implies that the personnel are capable of performing the lost or degraded function.

When they cannot perform that function, such as when they are asleep, there is an uncompensated loss that must be reported within 1 hour1.157407e-5 days <br />2.777778e-4 hours <br />1.653439e-6 weeks <br />3.805e-7 months <br /> of discovery.

Preplanned compensatory j

measures are normally described in NRC-approved safeguards plans.

14

1 A.

Armed guards should be posted with appropM ate communication devices.

2.2.23 Discovery of the actual or attempted introduction into or possession within the protected area, material access area, or vital area of unauthorized weapons, exploshes, or incendiary devices.

(Paragraph I(d) of Appendix G.) There are no compensatory measures that would preclude reporting this evint within one hour.

If an actual introduction of contraband is made, steps should be taken to correct the vulnerability that allowed the introduction.

(Also see number 5 in this section.) The discovery of vehicular emergency equipment such as safety flares during entrance searches need not be reported or logged.

1 Q. 2.2.23.a.

"Cad-weld" material is frequently used for installation and repair at most nuclear sites.

If authorized for onsite use, should discovery of this material be reported? If not authorized, should discovery be reported 1

or logged?

A.

Discovery of material such as "cad-weld" that is authorized for onsite use and properly controlled should not be reported or logged.

If the event can be 1

satisfactorily explained, discovery of weapons, explosives, or incendiary devices during routine entrance search should be logged.

Weapons, explosives,

^

or incendiary devices (including materials such as "cad-weld") not authorized onsite and discovered within the PA should be reported within one hour.

Q. 2.2.23.b.

Define the term "contraband."

A.

Contraband includes any dangerous weapon, explosive, or other dangerous instrument or material likely to produce substantial injury or damage to i

persons or property.

Safety flares carried on vehicles as emergency road equipment need not be considered incendiary devices for the purpose of i

reportability.

Q. 2.2.23.c.

If a vehicle operator fails to turn in a weapon stored in the vehicle prior to search and the weapon is not found during the search, but is found later, should the event be reported within one hour?

A. Yes.

Contraband has entered the protected area.

Q. 2.2.23.d.

If a weapon is found in a vehicle located in a parking lot outside the protected area, should it be reported within one hour?

A.

Generally, the discovery of a weapon in a vehicle parked in a lot outside of the PA need not be reported or logged.

Q. 2.2.23.e.

If a weapon is found on a vehicle during an entrance search should it be reported or logged?

A.

Logged, unless malevolent intent is established.

Q. 2.2.23.f.

If a weapons contractor ships a licensee one more weapon than

)

ordered, is the extra weapon considered unauthorized and should it be reported?

A.

If there is reasonable suspicion that this constituted a deliberate attempt to introduce an unauthorized weapon onsite, a one hour report should be made.

J 15 i

I 1

i Q. 2.2.23.g.

If a driver turns in a weapon upon request prior to search, j

shou'd it be reported?

I A.

No.

Q. 2.2.23.h.

Does the term "weapon" refer strictly to firearms.

f 4

A.

No.

2.24 Loss of security weapon at the site.

(Paragraph I(a)(3) of l

Appendix G.)

No questions were received on this item.

?

i j

2.3 Safeguards Events To Be Reported and Submitted Quarterly in a Log (General) i i

  • Q. 2.3.1.

Must a licensee maintain backup documentation for follow-up l

inspections resulting from NRC review of log entries? How long must this i

i backup documentation be maintained?

g 4

A.

A licensee should maintain information which resolves log entries for three j

years.

P

  • Q. 2.3.2.

Paragraph II.b. of Appendix G requires logging of events which reduce capabilities below that committed to in a licensed physical security or contingency plan.

Certain compensatory measures may go beyond what has been approved in a licensee's security plan. What takes precedence?

l A.

The guidance in Regulatory Guide 5.62 is not intended to supplant any regulation or NRC-approved licensee safeguards plan.

Accordingly, compensatory l

actions taken by licensees in accordance with approved security plans will.

permit the logging of certain events in lieu of reporting them within one hour.

l' t

The regulatory guide contains examples of acceptable compensatory measures to guide licensee reporting in situations not covered by approved safeguards 1

plans.

l 1

l Q. 2.3.3.

When must false or nuisance alarms be logged?

l 9

1 A.

False or nuisance alarms should be logged if a pattern of such alarms f

I emerges or when their frequency is such that system effectiveness is degraded j

i below that committed to in an approved security plan.

I

(

i j

Q.

2.3.4.

The regulatory guide states that log entries should be updated when I

the event terminates.

Define the term "... when the event terminates..."

s A.

This term means when compensatory measures are established or the original j

i system capability is restored.

I Q. 2.3.5.

Define "end of the quarter" with respect to quarterly submittal of 4

the safeguards evehts log.

)

A.

The end of the quarter is defined as December 31, March 31, June 30, and i

September 30.

Safeguards event logs should be postmarked within 30 days of the end of each quarter.

16 i

l l

l

)

i l

  • Q. 2.3.6.

If an audit conducted under provisions of 10 CFR 73.55(g)(4) or Appendix B to 10 CFR Part 50 uncovers events not previously reported or logged, should a licensee make a report?

i A.

No.

It should not be reported or logged under 10 CFR 73.71.

However, it would be a licensee-identified finding which should be brought to the attention of the appropriate NRC Regional Office.

2.4 Examples of Safeguards Events To Be Reported and Submitted Quarterly in a g 2.4.1 Properly compensated security computer failures.

(Paragraph II(a) of Appendix G.) Properly compensated means that within 10 minutes of the discovery of the failure the system is restored to operation, the backup system is operational, or other resources, e.g., security personnel with appropriate communications equipment, are posted to provide an equivalent level of protection.

In all cases, a thorough search of all areas where alarms or access controls may have been compromised by the failure should t

be initiated immediately and completed as soon as practicable.

Licensees are expected to discover this type of event upon occurrence.

Q. 2.4.1.a.

For fuel cycle facilities, what constitutes a "thorough search"?

A.

This term means a search for unauthorized individuals, tampering, or unauthorized packages.

It does not usually mean equipment search for SNM.

N. 2.4.1.b.

Must a guard be posted at every vital area portal when a security computer fails?

A.

Unless compensated by some other means described in an NRC-approved safeguards plan, guards must be posted at all vital area portals that fail open or are used for access.

2.4.2 Properly compensated vital area card reader failures.

l (Paragraph II(a) of Appendix G.) For this event, proper compensation means posting appropriate personnel (i.e., armed guard if door is 1

i unlocked, dedicated observer if door remains locked but access is required) within 10 minutes of discovery.1 The appropriate personnel must have a current access list and communications capability to alarm stations.

A thorough search of the affected area must be initiated immediately and completed as soon as practicable.

Licensees are expected to discover this type of event upon occurrence, l

Q. 2.4.2.a.

If a vital area card reader fails, is it a sufficient compensatory measure to post a guard with an access list and check I.D. cards as badged individuals enter the area?

i 2 Posting personnel ar > compensatory measure implies that the personnel are capable of per'orming the tvst or degraded function.

When they cannot perform I

i that function, such as when they are asleep, there is an uncompensated loss that must be :eported within 1 hour1.157407e-5 days <br />2.777778e-4 hours <br />1.653439e-6 weeks <br />3.805e-7 months <br /> of discovery, Preplanned compensatory measures are normally described ir NRC-approved safeguards plans.

i 17

i A.

The guard wou. also be required to maintain a log of individuals in the affected area.

it is required under the Miscellaneous Amendments issued August 4, 1986, (51 FR 27817).

i Q. 2.4.2.b.

Can coded badges be used in lieu of an access list when seeking access to areas during card reador failures?

i A.

Coded badges may be used in lieu of an access list.

However, a record must i

still be kept of entries to and exits from the vital area.

  • Q. 2.4.2.c.

The example states that licensees are expected to discover this type of event upon occurrence, is it correct to assume that "upon occurrence" means at the time someone attempts to use the card reader?

A.

It is possible that this event may not be discovered until someone attempts to use the card reader.

Regardless of when the failure may have occurred, it should be compensated within 10 minutes of discovery and logged.

If it cannot be compensated within 10 minutes of discovery it should be reported within one hour.

  • Q. 2.4.2.d.

If a CCTV system has a failure and the approved security plan does not require the posting of a dedicated observer, (it commits to an armed response to an alarm, only), must a one hour report be made if a dedicated observer is not posted?

l A.

No.

Licensees are expected to take compensatory actions in accordance with NRC-approved safeguards plans and log such events as "compensated".

2.4.3 Properly compensated alarm failures.

(Paragraph II(a) of Appendix G.) For this event, proper compensation means deployment of backup alarm equipment (a bolt position alarm capability is not considered backup alarm equipment because it is not tamper-resistant) or posting a dedicated observer within 10 minutes of discovery.1 The dedicated observer should have appropriate communications equipment and should be able to observe the entire affected area of the portal.

In addition, a thorough search of the af fectn1 area should be initiated immediately and completed as soon as practiuble.

(Also see number 21 in Section 2.2.)

i Licensees are expected te discover this type of event upon occurrence.

)

No questions were received on this item.

2.4.4 Properly compensated closed circuit television failure in a single zone while the intrusion detection system remains operational.

(Paragraph II(a) of Appendix G.) Properly compensated means providing other assessment capability, such as posting a dedicated observer with l

communications equipment to assess the entire zone within 10 minutes of l

discovery of the failure.1 Licensees are expected to discover this type of event upon occurrence.

4 l

IPosting personneT as a compensatory measure implies that the personnel are r

capable of performing the lost or degraded function. When they cannot perform that function, such as when they are asleep, there is an uncompensated loss i

l that must be reported within 1 hour1.157407e-5 days <br />2.777778e-4 hours <br />1.653439e-6 weeks <br />3.805e-7 months <br /> of discovery.

Preplanned compensatory l

measures are normally described in NRC-approved safeguards plans,

}

10 l

Q. 2.4.4.a.

May multiple failed zones be compensated by one dedicated observer with observation of all zonas?

A.

Yes, if the inuividual can observe all affected zones.

  • Q. 2.4.1.b.

If a CCTV system assessing multiple zones has beer, approved for use at a site, must dedicated observers be posted at each zone if the CCTV fails?

A.

Some site-specific unique situations may permit fewer than one dedicated observer pi r zone.

Licensees should consult with appropriate NRC staff if it is believed their situation is unique.

Licensees are expected to take compensatory actions in accordance with approved security plans if applicable to an event and log it accordingly.

2.4.5 Properly compensated failure or degradation of a single perimeter lighting zone if the intrusion detection system remains operational.

(Paragraph II(a) of Appendix G.) Measures to properly compensate for failure or degradation of a lighting zone must be implemented within 10 minutes of discovery and may include (1) using standby power, (2) using low-light-level surveillance devices, (3) using portable lighting systems or (4) posting dedicated observers with appropriate communications equipment to provide an equivalent level of protection.

Q. 2.4.5.a.

If some lighting is lost but not enough to go below the level committed to in the security plan (e.g., 0.2 foot-candles), is a report required or can the event be logged?

A.

Neither a report within one hour nor a log entry need be made.

Q. 2.4.5.b.

With respect to this example, what if failure is less than i

i system-wide but more than a single zone? How should this be reported or logged?

A.

Use the reporting criteria as if it was a single zone.

2.4.6 Properly compensated accidental removal offsite or loss of badge by employee.

(Paragraph II(a) of Appendix G.) For this event, proper compensation is cancelling the badge from the access control system within 10 minutes of discovery by onsite personnel that the badge is missing.

Measures must be taken to be sure the badge has not been used in an unauthorized manner while it has been missing.

(Also see number 16 in Section 2.2.)

No questions were received on this item.

2.4.7 Properly compensated loss of the AC power supply for the entire intrusion detection system that, if uncompensated, would allow unauthorized or undetected access.

(Paragraph II(a) of Appendix G.)

i Proper compensation for this event is immediately available emergency i

power through an uninterruptible power source such as a battery supported i

l

)

)

19 i

by a generator.

If backup power is not available, security personnel with communications equipment should be posted within 10 minutes of discovery; r

however, this action is not considered proper compensation for the event i

and does not excuse a licensee from reporting the event within one hour.

l Licensees are expected to discover this type of event upon occurrence, j

(Also see number 20 in Section 2.2.)

l Q. 2.4.7.a.

Why is timely posting of properly equipped security personnel not j

considered proper compensation for loss of AC power supply to the entire i

intrusien detection system?

A.

A significant degradation that cannot be properly compensated has occurred.

j The level of ef fectiveness existing prior to the loss cannot be maintained only 4

through posting.

2.4.8 Properly compensated loss of either alarm or locking mechanism on a j

material access area or a vital area portal.

(Paragraph II(a) of Appendix G.) A bolt position alarm capability is not considered a proper compensatory measure because it is not tamper-resistant.

Proper i

compensation for this event is immediate (within 10 minutes of discovery) j posting of a dedicated observer for a loss of alarm or an armed member of the security force for loss of a lock.1 The posted personnel should have appr opriate communications equipment.

In addition, a thorough search of l

j the affected area should be initiated immediately and completed as soon as practicable.

Licensees are expected to discover this type of event upon occurrence.

(Also see numvwe 22 in Section 2.2.)

I i

No questions were received on this item.

l i

)

2.4.9 Security computer failures that may not enable unauthorized or I

I undetected access.

(Paragraph II(b) of Appendix G.)

i I

Q. 2.4.9 a.

What type of events are security computer failures that may not l

enable unauthorized or undetected access?

r

=

i j

A.

Such things as loss of printing capability only, or when a computer fails i

I to store entries on a disk, are security computer failures of this type.

l l

  • Q. 2.4.9.b.

Should a security computer data base failure that does not impact i

effectiveness be reported?

1 i,

A.

No.

8 i

2.4.10 Loss of the capability of a single alarm station to monitor or remotely assess alarms but monitoring or assessment capability remains in j

other stations.

(Paragraph II(b) of Appendix G.)

(Aiso see number 18 in I

Section 2.2.)

j

\\

\\

l IPosting personnel as a compensatory measure implies that the personnel are capable of performing the lost or degraded function. When they cannot perform i

that function, such as when they are asleep, there is an uncompensated loss that must be reported within 1 hour1.157407e-5 days <br />2.777778e-4 hours <br />1.653439e-6 weeks <br />3.805e-7 months <br /> of discovery.

Preplanned compensatory i

I measures are normally described in NRC-approved safeguards plans, f

20

_=

i

-i Q. 2.4.10.a.

Does this example imply that all vital area portal alarms should be logged, or only those alarms which are caused by actual problems?

i A.

This example implies neither.

In some cases vital area alarms caused by actual problems may require one hour reporting.

In most cases, if a reportable i

event is properly compensateo, it need only be logged.

2.4.11 Tailgating by a licenste employee or contractor to gain access to i

an area to which he or she is authorized access.

(Paragraph II(b) of i

Appendix G.) (Also see n wber 13 in Section 2.2.)

(

  • Q. 2.4.11.a.

Does specific irtent affect reportability of tailgating?

c A.

Yes.

For example, if tailgating is committed by an authorized employee or contractor, it is considered an administrative matter that should be enrrected j

snd the event should be logged.

If tailgating is committed by unauthorized ind, ' duals, the event should be logged If it can be satis /actorily explained i

air level of screening would qualify them for unescorted access.

ar.o t Other

'se, the event should be reported within one hour.

Licensees are

<xpei.ed to investigate the matter and correct any deficiencies in programs and

cc edures.

2.4.1? For shipments of formula quantities of $$NM, intra-convoy communications ability is lost, but ability to communicat9 with movement

{

control center rema'ns, (Paragraph II(b) of Appendix G.)

{

No questions were received on this item.

I i

2.4.13 Unsubstantiated bomb or extortion threat.

(Paragraph II(b) of I

Appendix G.) An unsubstantiated bomb or extortion threat is a threat in j

which no specific organization or group claims responsibility, the search i

result is negative, and no evidence is available other than the threat j

message.

If a threat is one of a pattern of harassing, even if unsubstantiated, it should be reported within one hour.

j No questions were received on this item.

tt l

l

[

i i

i l

F t

I l

l l

21 i

i

a;,*ou

v i = vet sia ioutarou co

..c.

.- oari ~.,=,-.,r,oc - v. %,..,,,,

e Ek*,"3 E',

HIBLIOGRAPHIC DATA SHEET b

fM EG-1304 si e s%3fnuctio%s 0%

a vinsi i fa)Li.Nolv8flTL.

J ti.v dgK REPORTING OF.AFEGUARDS EVENTS

.o.tiaspecc~.6evio

..ou -

gl

' 'v'"

a 'i' Februarv /

1988 Priscilla A. Dryer k

. e.vi ai o=1. svio Nancy E. Ervin g

Februgd, l

wo%'-

i.a 1988 7 *ia>0.c.mG om;Anit t eo, N.wi.No W.i@4 t ion and Safeguards f

G.oom 55 uars,e,le cem, 8 PmQ.iC's1d5E wont v%it %vutem Division of Reactor insp c Office of Nuclear Reactor egulation

... sot:,a.%i%vonia U. S. Nuclear Regulatory C' ission f

Washington, D' 20555 4

io so so.No o.a.sa.iion.wi.w.,use,.co. g% d S f

,,%,e,,, ce,,,

J,o,.

,0.,

Division of Feactor Inspection n a eguards c

Office of Nuclear Reactor Regula' ion y

U.S. Nuclear Regulatory Commissio

% a'* cov i a w "~~ ~ ~-

l

  1. l'

'lashington, JC 20545 1

F

,J SUPPL Wi%f.R T sot 9 3

~

Technical Report

[

o.. 1.. C, ax..,,,

w.

_ in tfi,e Federal Register a final rule On June 9, 1987, the Commission publish

' revising the reporting requirements for s' egdards events ~ Safeguards events include actual or attempted theft of speci nuclear material (SNM); actual or e

attempted tets or events which interrupt n ' al operations at power reactors due to unauthorized use of or tampering wit chinery, components, or controls; certain t1reats made against facilitiepfposs psing SNM; and safeguards system failures impacting the effectiveness offthe system.

The revised rule was effective October 8, 1987. On September 14, 19JKf, the NRh held a wcrkshop in Bethesda, MD to answer affected licensees' questiyns on the f al rule.

This report documents questions discussed at the Septembef14 meeting. ' flects a completed staff review of the arv9ers, and supersedes prgfious oral comme t on the topics covered.

Je f./

}

4

/

k I

v

\\_

l

,. oock.is,.%.......

.,4 3,oi,3,. o.,

,,....,m,.

Safeguards Events

[

\\

Unlimited Physical Protectio,'

\\

I

'6 SiCumel v Ct.ll'e rC.f so%

t Fae page/

. ioisti.ii.i tes % %oio ti."'

\\

Unclassified ar... u Unclassified

,, %.... o...oi.

'U. S. GCVC AW 4f Mitf ikG crr tCt :1959 707 292:50342

-..m

m.

UNITED STATES g,, mat couamctass aan

' NUCLEAR REGULATORY COMMISSION Postict * *Ets roo

'NASHINriTON, D.C. 20555 g

eran w. c o

- OFFICIAL BUSINESS

. PENALTY FOR PRIVATE USE,4300 12055507hg77 1 1Ah1x819U11A1 US NRC-0 ARM-AD'i OIV 0F PJB SVCS POLICY & PU3 MGT (19-PCR NUREG W-537 WASHINGTON DC 20555 s

4

,b 8:

I 11 l

i f

I B

.4 a

I m

4

,_.._-!..-m.,

'-