ML20207F907

From kanterella
Jump to navigation Jump to search
Rev 1 to Nuclear Operations Interfacing Procedure 11.000.114, Protection of Safeguards Info
ML20207F907
Person / Time
Site: Fermi DTE Energy icon.png
Issue date: 04/07/1986
From:
DETROIT EDISON CO.
To:
Shared Package
ML20207F722 List:
References
FOIA-86-430 11.000.114, NUDOCS 8607220637
Download: ML20207F907 (37)


Text

_ _ _ _ _ _ _ _ _ _ _ _

o-DETROIT EDISON 11.000 114 FERMI 2 Revision 1 NUCLEAR OPERATIONS INTERFACING PROCEDURE Page 1 l

l PROTECTION OF SAFEGUARDS INFORMATION Approved By:

M l8 d

,1 Manager, Nuclear Opsrations Date Originating Organization: Nuclear Security Safety Classification: NO Revision Summary This is a major revision matching the requirements for protecting Safeguards Informaton set forth in 10CFR 73.21 and NUREG 0794 Implementation Plan This procedure is in effect upon approval There are no specific implementation instructions e

f 8607220637 860715 PDR FOIA PUNTENN86-430 PDR

' r r.1; - F ' ' ' ;, : : N r/ ST r.'s f*/~}l.~

CTC_

T P ; D '.'

^ 3 N N,;;.O j_fY

_? C ',

1 Cate Pts P:S File 1703 01 Act ent -I-M_

s

\\)k s') $' 3 I I " 9 *%, ) $

f1 $

A Nb J1 b$

af O }k )J

-g hi

f 11.000.114 I

Revision 1 Page 2 4

TABLE OF CONTENTS i

Fage 4

1.0 Purpose l

4 2.0 Scope 5

30 References j

5 4.0 Definitions 7

5.0 Responsibilities 9

60 Procedure 9

61 Information to be Protected i

11 6.2 Category information Exempted from Safeguards Information 12 6.3 Access to Safeguards Information 4

13 6 4 Protection of Safeguards information While Unattenced 13 6.5 Protection of Safeguards Information While in Use 14 6.6 Marking of Informational Media Containing Safeguarcs Information 15 6.7 Transportation of Safeguards information l

17 6 8 Request for Authorization and Approval 17 6.9 Destruction of Safeguards Information j

210 Transmittal Receipt and Destruction Letter for Documents 18 l

and Materials Containing Safeguards information 18 6.11 Unauthorized Disclosure of Safeguards information 18 6.12 Reproduction and Dissemination 18 6.13 Security of Electronic Safeguards Information j

19 6.1410CFT. 2.790(d) Material. Witnheid from Public Disclosure

. I e

/

~ ~ ~

w Aut-a c o,p%

,1*Le %. m /

f S,,,

c p e.t..

f ?

ub) n*w ~cy c s

tu-Q sn w-c4.f, 1

i s,..

g)

J' &^, lO

/

,s

11.000.114 Revision 1 Page 3 TABLE OF CONTENTS CONT.

Attachments 1

Request for Authorization and Approval to Use, Store or Originate Safeguards Information (including administrative instructions) (sample) 2 Organizational Listing of Authorized Users, Storers, or Originators of Safeguards Information (sample) 3 Safeguards information Markings:

Originator, Criminal Sanction, and Safeguards information (sample) 4 10CFR 2.790 (d) Marking (sample) 5 Mailing Envelopes and Safeguards Information (sample) 6 Transmitta! Receipt and Destruction Letter (sample) 4 e

i i

L

11.000.114 Revision 1 Page 4 PROTECTION OF SAFEGUARDS INFORMATION 1.0 PURPOSE The purpose of this procedure is to establish methods for protecting St.feguards Information.

2.0 SCOPE 2.1 The methods established by this procedure apply to all Edison. contractor, and subcontractor personnel who originate, use, store, process / microfilm, trartsmit, or transport Safeguards Information or 10CFR 2.790 (d) information.

2.2 The controls established by this procedure apply tr., all information media containing Safeguards arid 10CFR 2.790 (d) information. Media which may contain these types of information include, but are not limited to, the following:

2.2 1 Printed and typed cocuments 2.2.2 Drawings, sketches, and design change documents and packages 2.2.3 Pictures, negatives, and movie films 2 2.4 Microforms (microfiche, microfilm, or aperture cards) 2 2.5 Computer disks. diskettes, and tapes 2.2.6 Television disks and tapes 2.2.7 Maps 2.2.8 Audio tapes, records, or other recordings 2.2.9 instructional transparencies, charts, posters, and student notes 2.2.10 Telephone, telex, microwave, and other similar communications media 2.2.11 Trainee notebooks a

i i

11.000.114 I

Revision 1 Page 6 1

4.5 Controlled Access Area: L eny temporary or permanently established are's to which l

personnat access is controlled, and its boundaries are clearly defined and are substantial enough to afford isolation of the material or persons within the area. Access should be l'

positively controlled by persor,al recognition, the use of keys or keycards, or other comparable means, in many cases, corporation headquarters or other office buildings wil qualify as controlled access areas provided th6y are attended around the clock or locked at night.

4.6 Need to know: a determination by an Edison organization head or designee responsible for protecting Safeguards Information that a proposed recipient's access to Safeguards Information is necessary in the performance of official, contractural, or licensee duties of employment.

3 i

4.7 Originator

an authorized person designated to review and evaluate informational media suspected of containing Safeguards Information to determine whether the media does if j

fact, contain Safeguards Information. Originators are also responsible for ensuring that j

Safeguards Information is properly identified, marked. dated. and authenticated An j

origmator is responsible for evaluating infortnational media and may or may not be the i

actual creator of that media I

48 10CFR 2.790 (d) material. confidential commercial and financial information deemec withholdable from public disclosure which concerns the physical prot 6ction of Fermi 2 and its material control and accountin0 program for special nuclear material and which is j

not otherwise designated to be Safeguards Information.

i l

4.9 Safeguards Information. information which specifically identifies detailed security rnessures for the physical protection of special nuclear materral or security measures for the physical protection and location of certain plant cQuipment vital to the safety of

{-

production or utilization facilities, or which discloses equipment, procedures, i

communications, or response plans used by a licensee to protect special nuclear materia' or facilities.

i 1

1 1

1 1

l l

I 1

1 j

d v--

.+-w-g y --e,i p

.-w--,,vv-m

--yw m,,

,-c-w,,,%,-,-

=mw---

-..--wwm----

,.q, m.

11.000.114 Revision 1 Page 8 5.1.5 Identifying the personnel requiring access to' Safeguards Information and granting access by publishing a list of individuals authorized to originate, use c-store Safeguards Information.

5.1.6 Evaluating the adequacy of personnel access controts and administrative procedures of Edison organizations requesting authorization to use. originate. o' store Safeguards Information prior to granting authorization.

5.1.7 Ensuring that organizations authorized to originate, use, or store Safeguards 4

Information are in receipt of the necessary stamps and labels to support this procedure.

5.1.8 Notifying local and state agencies originating using, or storing Safeguards Information of the provisions of 10CFR 73.21.

5.1.9 Ensuring that each organizational unit head whose organization appears on the Authorization List has received a copy of this procedure.

5.1.10 Authorizing requests for personnet desiring distribution of Safeguards information from Information Systems.

5.1.11 Reviewing and updating this procedure at least every 2 years.

5.2 Each organizational unit head whose organization appears on the Authorization List is responsible for.

5.2.1 Requesting from the Assistant Director, Nuclear Security or designee. in writing authorization to use, store, or originate Safeguards Information (see Attachment 1).

5.2.2 Identifying, in writing, authorized individuals withir their organization who use Safeguards Information and ensuring they are fam liar with the administrative controls, NRC requirements, and any applicable prc cedures to ensure that tne informatien is protected.

i 5.2.3 Identifying. In writing, the authorized users of Safeguards Information. providing them with Security Storage Containers, and ensuring they are familiar with the i

administrative controls to ensure Safeguards Information is properly stored j

These individuals shall be limited to a minimum number of personnel based on operating requirements.

5.2.4 Documenting that authorized individuals within their organization who use.

store, or originate Safeguards information are familiar with the administrative controls on the protection of Safeguards Information.

4 l

4

11.000.114 Revision 1 Page 10

~

6.1.2 Fermi 2 specific drawings, diagrams, sketches, or maps that substantially represent the final design features of the physical protection system. Specif;c items of design that should be protected include response and patrol procedures, details of alarm station and guard post bullet resistant constructicr-features, vehicle alarm and immobilization features, and the location of alarm stations (when it does not conflict with other submittal requirements).

6.1.3 Details of alarm system laycuts showing the location of intrusion detection devices, alarm assessment equipment, alarm system wiring, emergency power sources, and duress alarms. Wiring lists or cable schedules are excluded 6.1.4 Drawings, diagrams, sketches. cr maps showing the location or design of f

Security Officer posts or defensive positions 6.1.5 Written physical security orders and procedures for members of the security organization, duress codes and patrol schedufes 6.1.6 Details of the onsite and offsite communications systems that are used for security purposes 6.1.7 Lock combinatiens and mechanical key design 6.1.8 Documents and other matter that contain lists or locations of certain safety-related equipment explicitly identified in the documents as vital for purposes of physical protection as containec in physical security plans.

Safeguards contingency plans. or plant specific safeguards analyses for production or utilization facilities 6.1.9 Those portions of the Nuclear Security personnel qualification and training plan 4

which discloses features of the physical security system or respense procedures 6.1.10 Response plans to specific threats detailing size. disposition, response times.

and armament of respcnding forces 6.1.11 Size, armament. and disposition of onsite and offsite reserve forces I

e i

i i

I

11.000.114 Revision 1 Page 12 6.3 Access to Safeguards information 6.3.1 No person shall be given access to Safeguards information unless the person has an established "need to know* for the information and is (1) an employe.

agent, or contractor of Edison, another licensee, the NRC. or the United States Government: (2) a member of a duty authorized committee of the United States Congress; (3) the governor of the State of Michigan, or designated representative: (4) a representative of the International Atomic Energy Agency (IAEA) engaged in activities with the United States /lAEA Safeguards agreement who has been certified by the NRC;(5) a member of a state or local law enforcement authority that is responsible for responding to requests for assistance during safeguards emergencies; (6) an individual to whom disclosure is ordered pursuant to 10CFR 2.744 (e).

6 3.2 Officers, Managers. Directors, and Supervisors shall designate. in writing. the people within their organizations who must have access to Safeguards information on a regular and continuing basis. The designation will also indicate which persons are responsible for originating. using and storing Safeguards Information. The designation shall be forwarded to the Assistant Director, Nuclear Security or designee for review, authentication, approval, and insertion into a master compilation of listings of persons within Eaison with authorized access to Safeguards Information (see Attachment 2) 6.3.3 Officers, Managers Directors and Supervisors may designate persons to use, originate. or store Safeguards Information by job title if the designation describes the position in sufficient detail to preclude Safeguards Information from being inadvertently sent to a similar job title which might not be authorized access to Safeguards Information.

6.3.4 A copy of the organization's listing is posted on or near the organization's Security Storage Container so the person (s) responsible for storing Safeguards Information can limit personnel access to the container to those on the listing Safeguards Information may be distributed outside the organization cnly tc persons who are authorized by Nuclear Security to have a "need to know" that particular information S

h

11.000.114 Revision 1 Page 14 6.5.2 This requirement is satisfied if the Safeguards Information is attended by an authorized individual, even though the information is not constantly being use::

Under certain conditions, the general control exercised over protected or controlled access areas meets this requirement. The primary consideration is limiting access to those who have a *need-to-know.* Examples include:

1.

Alarm stations, continucusly manned security posts, and security ready rooms 2.

An engineering or drafting area if visitors are escorted 3.

Certain nuclear power plant vital areas such as the control room or security office 4.

Administrative offices such as central records or purchasing if visitors are escorted 6.6 Marking of Informational Media Containing Safeguards Information 6 6.1 Each document containing Safeguards information shall have on its face- (1) the name. title, and organization of the originator of the document. (2) the dets the document was originated. (3) an indication that the document contains Safeguards information, and (4) an indication that unauthorized disclosure will be subject to civil and criminal sanctions. Each page within the document shall s,

be marked in a conspicious fashion at the top and bottom denoting SAFEGUARDS INFORMATION (see Attachment 3).

6.6.2 Transmittal letters or memoranda which do not themselves contain Safeguards Information shall be marked, top and bottom, to indicate that attachments or enclosures contain Safeguards Information. The transmittal letters or memoranda should also be marked with the WHEN SEPARATED FROM ENCLOSURES, HANDLE THIS DOCUMENT AS DECONTROLLED stamp.

6.6.3 Documents and records that were produced more than 1 year prior to the effective date of 10CFR 73.21 (1/20/82) need not be marked according to this procedure if they are in storage. If they are removed from storage for use. thei must be marked according to this procedure by an originator.

6.6.4 in the event that an authorized user or storer suspects that material may contain Safeguards information and is lacking proper marking, the authorized originator should be notified to resolve the issue. When material is upgraded to Safeguards information by revising or supplementing. and by obtaining the written approval of the Assistant Director, Nuclear Security or designee. the originator shall notify the Supervisor, information Systems of the change in writing.

a

11.000.114 Revision 1 Page 16 c.

The inner envelope shall be marked SAFEGUARDS INFORMATION at the top and bottom of the front of the envelope and the top and bottom of the back of the envelope.

d.

The document shall be placed in the inner envelope. The flap shall be adhered securely to the envelope so that the envelope will have to be damaged when it is opened.

e.

The outer envelope shall be prepared by placing the sender's and recipient's addresses on the outside in the same locations as on the inner envelope:

CAUTION:

Do not mark the outside envelope SAFEGUARDS INFORMATION.

f.

The inner envelope shall be placed into the outer envelope and the outer envelope securely sealed.

2.

Documents or other matter containing Safeguards information that are too large to fit into an envelope may be double wrapped. placed in a packege and wrapped; or rolled, wrapped. and placed in a mailing tute.

a.

The ends or flaps of the packege shall be sealed to ensure that the documents or matter remain within it.

b.

The wrapper around the rolled documents shall be seated securely so that the wrapper is damaged when the tape is removed c.

The names and addresses of the sender and the recipient are placed on the package or the wrapper around the rolled documents similar to the inner envelcDe described in Section 6.7.2.

d.

Packages shall be marked SAFEGUARDS INFORMATION en all four sides, top and bottom. Ro!!ed documents shall be marhd four times along the wrapper with SAFEGUARDS INFORMATION sc at least one of the markings will be visible from any direction when the rolled documents are placed on either end.

a l

l l

11.000.114 Revision 1 Page 18 6.10 Transmittal Recei.

.. e. Ar. action Letter for Documents and Materials Containing Safeguards Informa e 6.10.1 Upon receiving a revised or new controlled copy of Safeguards information. a Transmittal Reeipt and Destruction letter for Documents and Materials containing Safegurds Information shall be completed as follows (see ).

1.

Part 1 discusses the subject matter of revised Safeguards Information and informs the recipient to destroy the old revision (if applicable).

2.

Part 2 is signed by the recipient of the Safeguards information described in Part 1.

3.

Part 3 explains that if the recipient of the revised Safeguards Information was in receipt of the superseded Safeguards Information. the recipient must property destroy the old revision.

4.

Note the forwarding process 6.11 Unauthorized Disclosure of Safeguards Information 6.11.1 A suspected or actual loss or compromise of Safeguards information must be immediately reported to Nuclear Security 6.11.2 A comp.omise of Safeguards Information may constitute a violation in which a civil or criminal penalty may be imposed 6.12 Reproduction and Dissemination Reproduction and dissemination of Safeguards Information are kept to an absolute minimum nececsary for normal operations and must be in accordance with this procedure and NOIP 11.000 49.

6.13 Security of Electronic Safeguards Information 6.13.1 Safeguards Information shall not to be transmitted by unprotected telecommunications circuits except under emergency or extraordinary con'ditions. This restriction applies to telephone, telegraph, teletype facsimile circuits, and radio. For the purpose of this procedure, emergency or extraordinary conditions are defined as any circumstances that roquire immediate communications in order to report, summon assistance for, or respond to a safeguards event that has potential safequards significance.

i

11.000.114 Revision 1 Page 20 6.14.2 Types of information to be withheld from public disclosure are described belo'..

1.

Correspondence and reports to or from the NRC which contain confidentia' commercial and financial information concerning the physical protection of Fermi 2 or its material control and accounting program for special nuclear material not otherwise designated to be Safeguards information.

2.

Plans, procedures, records, and correspondence which contain confidential commercial and financial information concerning the physical protection o' Fermi 2 or its Material Control and Accounting Program for special nuclear material not otherwise designated to be Safeguards Information whose specific purpose does not include submission to the NRC, but might in time be copied and removed from Edison control by an NRC representati.c during the course of an inspection, information gathering effort, or an investigation 6.14.3 Plans. procedures, correspondence. software, etc.. containing information to be withheld from public disclosure must be marked similar to Safeguards Information with 2.790 (d) MATERIAL WITHOLD FROM PUBLIC D:SCLOSURE replacing the SAFEOUARDS INFORMATION identification markings (see ). Two exceptions to this guideline are.

1.

Criminal sanction stamps are not required 2.

An originating stamp is not required. The originator is the person authorizing the information. Originators of Safeguards Information shall act as originators of 10CFR 2.790 (d) Material.

6.14.4 There are no special requirements for handling 10CFR 2.790 (d) material. Fermi 2 personnel should take precautionary measures to ensure that 10CFR 2.790 (d; material is not accessible to the public at large i

11.000.114 Revision 1 Page 22 ATTACHMENT 2: ORGANIZATIONAL LISTING OF AUTHORIZED USERS, STORERS, OR ORIGINATORS OF SAFEGUARDS INFORMATION

' Date: October 14,1983 NUCLEAR ADMINISTRATION ORIGINATOR J.M. DuBay L.W. Hastings S.E. Kremer J L Piana USERS R.D Cleveland S E. Kremer E.R. Dragan J L Piana J.M. DuBay M K. Picke!

E. Ebner, Jr.

J.D Schager J.W. Grav J.J. Sutka LW. Hastings S A Washburn M Kluska-Vierk A D. Wiley Jr.

PERSONS RESPONSIBLE FOR STCRING SAFEGUARDS INFORMATION M. Kluska-Vierk M.K. Picket Approved by:

Assistant Director, Nuclear Security i-Combination Changed:

'Date

' E.790 (d) Material 11.000.11'

.h3 fztxo Public Disdomre Revision 1 Page 24 ATTACHMENT 4: 10CFR 2.790 MARKING DETROIT EDISON COMPANY 10CFR 2.790 (d) Material 1.

PURPOSE AND SCOPE The purpose of this sample is to depict the markings which must appear on pages of all documents containing 10CFR 2.790 (d) Material. The following stamp appears on this page: 10CFR 2.790 (d) Material Withhold from Public Disclosure.

il.

REFERENCES 10CFR 2.790 (d)

NUREG 0794 IIL PROCEDURE 1.0 informational media which contains information concerning the physical protection of specitt nuclear material and equipment vital to the safety of the general public or the material control and secounting program for special nuclear material not designated as Safeguards information snall be marked 10CFR 2.790 (c) Material.

2.0 When a cover letter is separated from attachments containing 10CFR 2 790 (d)

Materis!. It does not contain 10CFR 290 (d) Material and shall be stamped WHEN SEPARATED FROM ENCLOSURES, HANDLE THIS DDCUMENT AS DECONTROLLED.

i

.i

'2.F (5) Mateid YfItEEc!d frc:n Public Disdosn:e

11.000.114 Revision 1 Page 26 ATTACHMENT 6: TRANSMITTAL RECEIPT AND DESTRUCTION LETTER Nuclear Security-Edison-Fermi 2 Transmittal Receipt and Destruction letter for Documents and Matter containing Safeguards information To: George Swell Nuclear Security, Shift Lieutenant Part 1 Attached is a copy of WXYZ of the Security Contingency Plan. Please destroy the superseded version (if applicable) and acknowledge receipt of the Security Contingency Plan by signing and returning this transmittal from to the Nuclear Security Coordinator.

Part 2 l nave received the Safeguards information described in Part 1 above on February 7 195.:

Signature Part 3 l received a copy of ABCD of the Security Contingency Plan and have properly destroyed the document (s) by shredding, grinding or burning on February 7,1984.

Signature Return to; I

Nuclear Security Coordinator GTOC-Security a

White Copy - sent to receiver and returned by recipient Yellow Copy - retained by sonder Pink Copy - retained by recipient hND

Det.ro.i.t m

&( Ds i as/rrnas n.ztw.m =mmansmaw"s'i n~

r-rv'uno _

c w=p mgwu.

%.c_

ON c 6.- i n.

)

. e. -.

4 8

6...'

g

.?.

s.%....r.

e.

C.e ~*:...s..

. w

...L,,~

s

~.

m.

a...,.

i d.....

.4..

., ;Je..'.e.

1

.c. f

t.....

.c '. 4...

.e g

.c

..<;., e.'

D. :,e<.

.c

.u "y..

.* \\. O.

?

..s. w. A..*. y *.. :,., "

. Uw s.( * =,,s. J t

.'.f...~%.

.s*

s.

......v.,.

.jw.

,,. b 4

.b s...

w 3...v

.t

.,,t

,3.f.,..'.S.....q b.__.3

..,g

...u.

. s c., t. g G 7....

I w.

ge-..,..

.O,,.,

4;.,.;.,,., g ;

u

c..

.g s

.e.m.d. _> b... ; C.

.i.,.,

1.

. r. v.

.. s...

c..

. s. c.

.. '. l

.J. e t.. g n,... c a.v...

p v..'. Js.. I.,

  • .}...

p..... c. g..,

.f.

. g - (
  • i'. ( #.,....,+.

y u

. v.

s, s.

  • ... C.I.' '.' C (.. '.. '. _ '

e.'.."u*..***

  • '.a..

p.., g. g.

...g...,.

....w.

...w

.v

2...

~

..*e.

s. :, l..

n.-

..+

6 6...

...'g.......'

c4

.4 s...

um Uta S t..,:

... s e '.:..62 m.

-. a. c.......y g

.-. 4 u..

t: e,

. +. -.,,.

..c........i_.

ct..

6_.,,.

6 a

.a...,

I

.....i...

....E.,.

u s.

v..

r.,...

w..c

?..

.........a...

s s.

.... <.. t

,,,.,,...:~.

1....... ~

[.,

t; ~...v

. ~.....

...~

e,,.

>.m

.y...,..,.,,...i....

,.7

. 4

,s.,

w.,,......f.,

e

  • L...

.,..g.. (.-

+.v.* {g.,...

e,,, i e f..)f t. c.q4 p..~ {

..y w.

I.

. t.

,1.,.

.. s.

v N

T.

, u....-

v.

,..v..

.C 4,..... v

.s..c,. e.

t.. a....s. s c n,.s

.Q..,u.

10.

v

. ( # * * ' ",7

-.... c.' s 1i'*:Cu..-

C, r.

3. v *6,.s

.s. a' e! O.

. s; o

- '/

r+

+

. 2

.2 v.....

e........

(.,.,.........,.....

.m....

v...,

4 n

1 Appr ed:

r s

p alt P. li5w~kifisE Chief-Nuclear Security 4

I t

I M

I

\\

/

7 N,

'g NUGLEAR SICURITY APRIL 1986 - MG/PN21 REPORT MRPPN LCC CM EEASCN REPAIR STAPP CCMPLT 1779 AAP N Failed op Test Conplete 022786 041486 1780 kHS Y Detection Prob Testing

'Ibsting Corrplete 022786 041186 987129 GH N

Icose Base Plate Lock Plate Repair 030286 042586 987140 PA N

Lights Cut Various Lcca Parts Hold 031086 g

987141 GH N

F2ex Line Brcken Ccepleted 031086 032886 1798 KEB N Change Mi43 A Unit to B Ccepleted 031986 041586 987150 FEN N Second. hst Fence Pep Anchored Fence 032086 050286 987154 PA N

Test Ta~per/Junc Boxes Ccopleted 032686 040786 987162 RR3 Y Stuck In Alarm Papaired 032786 040186 987164 CW Y t h erous Ala ms Papaired 033086 040186 987163 C'IV Y Wide Angle Tele Inop Replace Carcra 033086 040186 1804 Hi Y

Failed Cp Test Ccuplete 033086 041486 987165 Mi Y

Numerous Alarms Replaced Board 033186 040286 987168 PA N

Recore PA/VA Lccks Regired/ VOID 033186 040186 987166 EB Y

Card Reader Inoierative Repaircd 033186 040186 987167 EB Y

Card Pader Inoperative Pepired 033186 040186 1806 AAP N Ecd Ca~ era Picture Ccoplete 033186 041186 1806 AAP N Ba3 Ca. era Picture Pepired C33186 040486 pol 3327

  • N Blanket-Explosive Detc n/a 040186 043086

.PO13326

  • N Blanket-Micrcuaves n/a 040186 043086 PO13325
  • N Blanket-Xray Machines n/a 040186 043086

~ pol 6200

  • N Blanket-Fetal Detect.

n/a 040186 043086 1809 N

Detect Prcb' Testing Adjust Sensit.

040186 041086 1

987171 EB N

N=erous Alams Conplete 040186 041566 1808 K4 Y

Will Not Alarm Cp Test Sat 040186 040886 1807 Mi Y

!& ercus Alarrs Decreased Sensit. 040186 010286

>987172 Mi Y

lucrous Alams 00 hst Sat 040186 040986 987170 fag Y Nu::erous Alarrs Repired 040186 040386

' 987169 kB Y

leerous Alacs Closed 040186 040186 987173 CAS N CAS Reyboard Pep 1 Brd 040386 040786 987174 RB Y

Bolt Sticking Eepaired 040486 040786

' 1810 AAP N Continuous Alarm Plugged In Tran.n 040666 040786 987179 RB N

Mag Switch Misaligned Aligned MAG Swtch 040786 042585 987175 SAS Y Pertion Incperative Eepaired 040786 040786 1811 AAP N Continuous Alarms 7dj rensitivity 040786 041086 987177 kT Y

Wcn't Peturn To Normal Op Test Sat 040786 040986

' 987178 KT N

NL'.erous Alarrs Pepaire3 040786 040985 987180 NPA N Lcw Light Open 040886

~~~~~~

'1812 Mi Y

Will Not Alarm VOID 040886 WID 987181 EHR N Nurerous Alarrs Ccmplete 040986 041986 987182 RB Y

Card Reader,Not Working PepairEd 040986 041086 1814 AAP N Failed Cp Test Op Test Sat 041086 041486 987183 KT Y

Nurerous Alams Open 041086 041186 987184 EB Y

Hinge Hinge Fepair 041186 041586 987186 CAS Y Won't Paturn To Normal Cccplete 041386 041686 1817 AAP N Failed Cb Test Ccoplete 041386 041486 1822 Mi Y

Wcn't Ala = At CAS Perforred MI/IC 041386 041486 987185 F3 Y

Incperative Cceplete 041386 041486 1816 FAP N Bulb Burned Cut Ccrplete 041386 041486 357190 C~7 N Systen Prchle s Cpen C41456

'987138 CV N K2 Incperative Cancel _ed 041486 Carc.

987187 C'IV Y PT: Incperative Cancelled 041486 Canc.

1821 Mi Y

Wcn't Alam Peplaced Trcns-tr 041486 041786 1820 M4 Y

itercus Alacs Cp Test Sat 041486 041486 A

/

y Cb l

[GyhN IOC CM REASON RITAIR START. CCMPLT 1819 m

Y Will Not Alarm Op Test Sat 041486 011486 987129 W

Y

}M Proble:rs Pepaired 041486 041786 987192 EHR N Sticking Peplace Door Hard 041686 050186 987391 hY Y

R:nerous Alarrs Pepaired 041686 041886 1823 PAP N Failed op 7bst Eeplaced Helium 041886 041886 1834 AAP N Failed Op Test Mjust Detector 041886 041886 1@25 W

Y Won't Alarm Op Test Sat 041886 041886 987194 FRR Y Nunerous Alams Open 041986 987193 EHR Y Alarrs hhen Ingress Fepaired 041986 041986 987195 SIC N Data Fam Board Feplaced Board 042086 050486 987196 km Y

Inoperative Pepl Elec Cccp 042086 042486 987197 CAS N Fire Detect Won't Clear Open 042086 1826 Y

Nunerous Alarrs Mjusted 042286 042286 987198 CAS N Nunerous Alarrs Open 042286 987199 CAS N Inoperative Open 042386 1827 m

Y Nurerous Alarrs Open 042386 1826 AAP N EM Picture Mjusted 042386 042386 1829 m

Y Stuck In Alarm Open 042586 1830 W

Y Nunerous Alarrs None Fequired 042586 042886 987205 AAP N Inoperative Pepl Elec Ccrp 042686 043086 987206 AAP Y lbnerous Alarrs loose Wire 042686 050186 987208 CAS N Unable to Fead Mj & Fepaired 042886 050586 987209 GHG N Cable Icose Mjusted Cable 042886 050686 987211

'IB Y

Reerous MX1/BP1 Alarrs Fem Shav. MAG Swt 042986 052286 987212 RPG Y Bolt Stuck Mjusted Gate 042986 050186 987034 SYS N CCW Mjustrients Cccpletcd 121385 033086

/cjc 5-8-86 e

-...~,

I

(,

u CmFDEA70W MENSURES maus APRIL, 1986

\\Y T W T F S S M T W T F S S M T W T F S S M T W T F S S H n

1 2 3 4 5 6 7 8 9 101112131415161718192021222324252627282; IRS 012 C1 C1 004 C1 005 C1 ;2 008 C1 018 C1 C2 C3 038 C1 C2 C3 C4 009 C1 YFPAS m'23 C1

.5Pr7.TJNErts S

Al T

Al G01 Al A2 G02 Al A2 T01 Al A1 Al A2 A3 A4 A5 702 Al A2 A3 A4 Al A2 A3 A4 TO4 A1 Al A2 Al A2 CKh'nvES 28 C1 FD1 C1 C2 C3 R31 C1 C2 C3 Ud, 1 0 0 1 1 1 0 0 1 0 1 1 2 3 1 1 0 0 1 1 0 0 0 0 1 1 1 1 1 1

= Parsen Ccqensating

= Corp Measure did not require personnel (egaipcent was usa 5)

= Farsonnel Conp Meausures taken, however, one person is covering two or Ircre consensatory action Cr O duty position.

/

A oo

.ea um annar wurne ramt APRIL,1986 T W T F S S M T W T F S S H T W T F S S M T W T F S S M T 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 _.

(SIVE Drnu mr5 X1 34 35 36 37 38 39 40 41 42 43 44 45 46 47 X1 L Dear wi6 X1 X1 X2 X3 X1 X1 X2 X3 X4 S

X1 X1 X2 X3 X4 X5 X6 X7 X8 X91011 L

2 2 2 2 2 3 3 3 3 3 2 2 4 1 0 0 0 2 0 0 0 0 1 0 0 0 0 0 0 0 i

e

6 1

M

{^

/

"Ti Mem0YQR0UM L

t

[ wad /

//AA///#$

F ROM:

on,,

\\

S6W)

(AY/dA

~

2S1 P GMRhi&A-72st-

  1. A d c// W J/ / A l

SUBJECT:

fe/fbMA2 fin N S IP.Th s. #

-/ noah-M 6F-A P^ RI L-AESSAGE:

WAZhJ S2% /$ $dff/p'T"*?///*?/l

/

l

$NT8/W

&GcK&g-

$f/[ DAf'f h/

YSW h $$$5f//$W (WV

'??B4 sum A/razances deer /8 5 #bP 41s' 7

/WA' lWf W Aw r f?A/

fYhY N/rVrYW8U

/W$$PEY f / /.) ~ // W k f / Y b b NA#

r 1

SIGNATU iLY:

~

l E

~

tJ

$w L-THE DETROIT EDISON COMPANY m us i 3m u

If SENDER:

)

^

p,3 RECIPIENT:

)

{

(

(

(

I jy '

. uove vetten ec.v -,onnu:~. t s m,<

9 3

m a,.

,<c:. _=t w sw-treasia j

r

_~

.s

-f:%.

a-i p':,r;f/

(' P L

g 4,/

o,

). l.

.. ': i t

e

fG u o '. >

M (y v.

4 %

Detroit Edg a-........_.

M h --- -

m -. m

.h6 p,,

Date:

March 27, 1986 To:

L. W. Eastings Director Ibclear Security From:

M. S. Candela % E

~

Supervisor General / Background Investigations

Subject:

Review of Backcround Investication Files Co::nencing on January 3,1986, a file review was initiated to verify co pleteness of background files. The review was corpleted on January 28, 1986. Tne review discicaed a need to update and/or obtain verification documentation for sv~ne files. Considering the large volume of files and docu.ents handled in the past three or so years, there does not appear to be any rajor discrepancies.

Consent to Search Forra -

Those needing signed forrs were identified. Personnel were contacted and new forms were acconplished. Twelve (12) personnel rerain to sign a new form. Six have keycards and those keycards have been rade inactive pending signing of the form.

Medical Evaluation -

All files contained initial medical evaluation. Some files (102) did not contain current meJical evaluations. A letter identifying those personnel that current medical evaluations were needed for was sent to the site Medical section on 2/3/86. This was cerpleted en 3/13/86, except for cne whose keycard has been rade inactive pending receipt of new physical. 2sg alification rencal evaluz,tiens are rain-tained in the Eadge Roco at GZC.

f\\

fr r

L. W. Bastings Page 2 Education Verification -

All files contained education verification. Two files were identified as needing scoe type of nore positive verification.

This was co pleted 2/19/86.

E ploymnt Verification -

Updated verification was needed on 22 files. Many of these were due to corpany transfer i.e.

Kelly to DECO while on site.

This was co:pleted on 2/7/86.

IRSPPs -

During the course of the recent G audit, scoe files were found not to have a UASPR or an expired UAS?R. A re/iew of files was conducted. New LMPP.s were obtained on those files needing IMPRs. Coupleted on 3/13/86.

Sa.ple Audit -

A sanple audit using attachmnt il was corx3ucted 3/25/86-3/26/86.

126 files were reviewed. No documentation discrepancies were found. On 3/26/86-3/27/86, a verification audit was conducted corparino a listing of keycard holders against the BI files, no discrepancies were found.

All other verification / documentation was in place. As of March 27, 1986, files should be 100% accurate. Program appears to be stabilizing, nost of the discrepancies appear to have cccurred during the " Start Up" phase of the entire Access Authorization Program and during reva. ping of the program, also optimism e.g.

Regaest for Unescorted Access had expired because sem supervisors felt that scce pe-ople would not be here after Fuel Load, Dec 84, so they entered an e:giration date cf Cec 34 en the regaest as they were operating on the bes: infor.a:icn availr.cle c: the time. Corrective paperworx did no:

follow nor was it caught at the tim. Pariedic reviews will be

~

L. W. Bastings Page 3 conducted throughout the re:ainder of this year to ensure that all keycard holders have either a corpleted favorable EI or a BI in the interim status. This will be conducted by co paring a keycard holder listing against BI files. You will be advised of results as these review are conducted.

MSC/rb cc:

J. Korte Attach.ent O

I l

INTEREL COC3LINCE INSPECTION CHECFLIST ACCESS SCREC31G E

E 5

5 E

Y N R/A Y N N/A Y N N/A Yl N R/A 1.

Unescorted Access Screening Process ReqJest or Regaest for LY. escorted Access 2.

Chance of etetus*

3.

Personal History Forr 4.

Consent to Search Fon-

._5. Emloye Packaround Checklist 6.

Employm_nt Verification (5 years) a.

Current b.

Previous E-olovers 7.

Education (Eichest Decree) 8.

U.S. Militarv Service (Past 5 vaars) 9.

References or Sapervisors Ceservation Recort (s)

10. Cri:ninal Eistory (Fast 5 years) a.

Michican I

b.

O]t of S~ ate (dere cerritte3)

I l

l

1).

Psvpbqic.gical Dialgaj; ipa

12. Medical D/aluation
13. Interira Access Progra:r.*

I a.

Cortpletion within 180 days b.

!bt conpleted within 180 days c.

Extgasion on file

14. Final Signature for closing a.

Investigator i

i b.

Supervisor BI or Designate c.

Direy,or or Desicnate

  • If applicable Re:rarks:

l l

O.

0801.01.03 PADtTWC PM GRTP ME"f*I*C MNm3 Date Parch 26,1986

!G-tiA-85-0180 Date:

turch 25,1996 Place:

ATA/Srall Confererce Rom.

Subject:

Ses.:rity Grcuo/Rf Group: Rev.:f re ents to tieet Cerr.it ents/

Fryalatory Pagairements Regarding Preventiw Mainterance on Seearitv Svste-C rrerer.ts Present:

K. Engelrann - Painte.v.n=e. Chair enN P. Halley - Seearity, PSE R. Tayler - Seearity D's l'S* *0:

Due to several cor.ersations betwen P. Ha.11ey, R. Taylcr, K. Weira.n a.rf G. Jones it bec.re ctvious that a eeting was necessa:y to detemine exactly e.at role the 2: Grcep needed to play in resc1ving corcerns rai<od daring recent PUC reviews of the Pr:ysical Seearity Plan.

Cbiactives/ Action It =:

1.

To update the M1 Group on the Seearity Departrent's car.it:: ants /regaire-cents regarding the Seearity Systen's preventive reintenance rd.s.

- R. Taylor dis:asted Seearity Departnent's Perfor ance L ptcrie ent Plan (PIP) regstding cer.it er.ts associated with the preventive rainterance of Security Syster. Ccrponents.

he cmrit ents that have teen made are:

1)

Py Acril 1,1926, identify cll Pil Tasks that need to be conducted on See.:rity System Ccrpnents.

2)

By May 1, 1986 have Maintenance Instructions written to su; port tasks that are identified in no. I above.

3)

By May 31.-1985, have all identified preventive maintera.ce tasks incorporated into the preventive :rainteN.nce sy: ten and schedaled for c:rpletien as a;propriate.

h

...(-M m ny rd. 3

($ ~

b "I 4.s..

nu 5

J m

vm I

s

Meeting rtinutes Parch 26,1986 NP-PA-86-0180 Page 2 4)

All preventive mainterance activities as identified by the various security system ccrponent verders will be 1:plemented.

Reference information to docrent these ccrr.it.ents was not rade available at this reeting. 'Ihe PM Croup was 1.for:ned that Iarry Schuer an, Nuclear Engineering Sc;ervisor, could supply the reference inferration that was required.

2.

To identify the regaired actions on the Rt Creep's tehalf ard assign specific action items.

In ad:litice to existing M1 activities cn the security syste, the follcwing security systen eqai; rent has tren identified as reqairing preventive raintenance. 'the s;ecific tasks, MI's ard rethods to irplerent this preventive raintenance has not yet teen determined in all cases. Another reeting is planned to prioritize the action iter.s identified.

1)

Tr.rcogh the wall air corditioning u.its freeaired to reintain security system electronic sear:5 egai; rent coc1).

MS lb. 's: A7CC05CCl threuch A7CC05007 I

F_.,. T ' t r A70003023 throu h A70CC2026 W ^ '?

j A e.e ~- t7 I i. a J rtu Actions reg; ired to 1 ple ent R'.'s on this egai;:en:.

a.

1.

Sacarity - identify what tasks need to te perfor ed (clean air filters, check freon charge, etc.)

2.

P1 Crcaro - Write up event sheets, input into c:rputer data base ard schedule.

2)

Electrical Cabi.w ts PIS W s: A7000P169, P170, Pl71, P172, P173, Pl74, P175, Pl76, Pl77, P178, P182.

A700CRO11, RCl3 A7000S004 a.

Seearity reqJested that yearly Rt's be established to

" Clean ard Ins;ect" the abcve listed electrical cabi.vts.

Meeting Minutes March 26, 1985 NP-MA-86-0180 Page 3 T.> rb a T b.

Actions regaired to 1.ple ent Rt's en this egai; rent.

[}y,1.

$.s e s c

'?

e

/

. i n o..

Pt Crm - Write up event sheets, inpn into caputer data tase ard schedule.

3)

Card Reaoers

- P. Halley will check with PCO to find out if they (PCC) plans en perforr.ing periodic rainterance on card readers.

- Should the PM Grcup be reqJired to 1"ple ent MI's for Card readers, the follcwing in'orration will te re7 aired.

a.

A list of all card realers by PIS nrber, location, zone, etc.

b.

W.at is it' that needs to be perfor ed on the?

c.

Mcv the card readers erf te grouped so as to minir.ize the nrber of PM ceders that are sent out. Shculd they be grouped tj building, secarity rene, or scre other reans?

4)

SAS Aateatic 'lWperature Centrol Fa.nel and ass:ciated Oc pers

- PIS !k. 's: A7000P163 A7CCCF001, P002, PCC3 Security regaested that yearly PM's to functierally test a.

the above egai; rent be estelished, b.

Actio.s regaired to implement R1's on this eq.:irrent.

1.

Cecuritv - Dete nir,e exactly eat needs to be done to "Pa.ccionally Wst" this egai; rent.

(L. Karas ard L. Massa cre ray rave acre infor ation).

2.

P' Creu, - Write up event sheets, inp.:t into c:rpeter d.sta basa ard schedale.

5)

Jancticn Boxes en Creras Problem: Due to being located outside and c1cse to the ground, the junction bcxes are scjected to snew, water and te gerature extrenes which have caused significant degra$ation to rany of the junction boxes.

a.

Seearity regaested that the following tasks te perfor ed on ju.ction bcxes fer ree.:rity syste-creras (2 yr perirdic;ty).

Meeting tiinutes March 26, 1986 NP-MA-S E-0120 Page 4 1.

Cwek ccver seals and replace if necessary to ensure that snoisture instrusion into the junction box is not a problem.

2.

Insp ct and rework electrical contacts as necessary.

EM.c I A s k t *.Q 3.

Inspect ea:h junction bcx for rust / paint degradation and hrm *)'<-

~

RN.:.

repaint as necessary.

b.

Actions reqJired to irplement Pr!'s on this eqJiyent.

Security - Proiide a list of junction tcxes with applicable ident:f acation codes a.M locations.

Se:arity - <re/ide the rure of the type of paint that is regaired.

_P." Crou: - Write u$ e'. tnt sheets, input into ccepner data tase aM schedule.

6)

Infrared retectors

-PIS No.'s: A7000'044A throuch !!

-22 Ri's on this eg;igrent 2:ust be re-evaluated.

-Jointly the P". Groep and Security will review R!'s on this ryster.

7)

SAS Distr h tien Unit

-PIS PC.: A7002:222

-Security is going to lod, into this eqJi[ rent to deternine What typ of maintenance, if arrf, is reqJired.

8)

Electric Gate Locks PIS to's: A70001003 through A700310C3 Security regaested that all presently established Ri's on the a.

electric gate locks be rescheduled so as for all cf tidr: to be issue:1 in the sane renth. Also, Security revaested that the priority of these PM's be upgraded to a Pri-2.

b.

Actions reqaired,te 1:51enent PM's on this equi; rent:

PM Groe - Reschedule events as regaested am$ upgra$e the corputer data base to change the priority of these events to Pri-2.

9)

Cuardhouse/Latte:'/ Roca he. ash Station

-PIS No.: A7000DOCl

Meeting Minutes tiarch 26, 1966 IN:A-66-0160 Page 5 F..riire bar y hfj,'rr$

Actions regaired to iqlement R1's on this eqJijrent a.

Pt Grove - Will write up event sheets at:5 transfer it to the n ennical Grcup.

Technical Groue - Incorporate this event into the newly established Perfor ance Evaluation Progran (PEP).

10) CAS General Purpoce Ccrputer Bulk Senicerzbeter Me cry Unit

-P S to. 's: A7000R172, R173 Security reTaeste! the Rd's be set up to cleaYteplace a.

filters for the acsociated disk drives on a tenthly periodicity.

b.

Seearity is going to lock into additional PM reTJirementS C3 tais eg.:ipnt.

Actio s required to irplement Pft's on this eTai; rent:

c.

Sacaritv - Ccrplete the reviet of this eq;irrent aM deter ane s$ditional Ri reTairements.

P4 Grc=>o - Write up event sheetc, inM into ccrpt.er data base armi schedale.

11) CAS/SAS Ceneral Parpose ccrpt.er Te perature Sensors

-PIS No.'s: A7000*:0el,1282 (e' ther related PIS No.'s A7000N171 through A7000tE80) a.

SeCJrity re7 Jested that these te"perature Bens 0rS be checked en a yearly basis to ensure they will perfe:a their reg; ired functicns een reeded, b.

Actices regaired to irplanent 24's on this eqJi; rent.

Seearity - Verify nethod for checking these sensors, Wich was d:scussed at meeting, is satisft ::ory and provide detailed instructions, including tegerature setpoints, for perfoming the checks.

Pt Group - Cnce supplied with the above information, write up event sheets, inM into ccrputer data base atx3 schedule.

Meeting Minutes March 26, 1966 NP-MA-86-0183 Fage 6

12) Guard Ecuse Doors

-PIS PC.'s: A7000YO69, YO59 i,

Seearity regaested that R:'s be established to periodica.11y a.

1 Le m F inspect these docrs.

Er c. t 7 4 den L :,..r.. 7 b.

Actions required to irple ent Mi's on this egalp ent.

Security - Coordinate with M1 Group to review established R1's on other doors and decide what needs to be done en these doors.

P4 Croce - Write up ennt sheets, input into ccrpt.er data base aM stredale.

13) Turnstile Doors

-PIS PC. 's: A7000YO70, YC71, YO90, YO91, YO92, YO93 Seearity revaested that these doors be cleared, lubricated, a.

aM inspected en a gaarterly basis. Dec parts to be checked are: gear, sprocket, spring retar.s aM bolt tightress.

b.

Actions regaired to irple ent R:'s c. this eqaipent.

Seearity

  • .eter.ine aM describe in rore detail the exact ms;ections, checks and lubrications that are regaired.

Security - Determine if a Mainterance instraction is regaired to perform these tasks.

P" Croap - As I t.nd 2 ab:ve are cTpleted, write up ewnt sheets, ing into exputer data base ard se,edale.

14) CAS/SAS Video AT Cabinets

-PIS Pb.'s: A7000PlE4, P185 a.

Security regaested that El's be established to " check aM Adjust the video signal eqJipTnt as necessary to retain clarity of Security System ibnitors' on a smonthly basis, b.

Actions req; ired to 1 plement PM's on this evaipent.

Pt Cr&Je - Write up event sheets, input into cTpeter data taase aM seedale.

I

ftMeting Minutes March 25, ID95 NP-MA-26-01SO Page 7 D eb t'

{

Ad c^

2 rice, /

R(q..ru[f

15) Outier Cx era Housings Rese were identified as possibly reqairing m. Security will review this egai; rent in rcre detail aM inform the m Group of any regaired periodic :ainterance.
16) UPS Battery

-PIS No.: A7000S004

-Sere is presently a m event set up for perfcrming a ca;4 city test disd.arge on the UPS Battery but it lacks an apprcved procedare strich is reqaired to carry out the test.

Actions regaired to irplerent m on this eqJi; Tent.

a.

Fe urity - Will cocrdirate with the Maical Group in getting a procedure written.

P' Grom - Once the procedare is arpreved for perfon-ing the test dise.arge, incorpcrate it into the existing event aM sctedale the event for ccrpletien.

17) Outdoor Security System Lighting

-P:S No.: A7000YC00 Security revaested that en cpan order te issmd on a rent:Cy a.

basis in crder to allow fer replacerent of burned out/brcken light tults. A bucket truck is regaired, b.

Acticns regaired to imple ent PM on this equi; rent.

SeOJritV - SJpply m Group with applicable StCCk ntrlers for lignts.

P' Gr~_m - Set up event sheets iry into c:r;xt.er data base and senedale.

10) Ccrpc ents Data Ease Peries

-+'.atrf of the Security System Ccrponents have been replaced with updated models. Bis inferretion ray not be updated in the Ccrponents Datz Base contained in the new ccrputer program PalEK n SE.

-C4 initial area cf concern lays with the X-ray, explosive cbtector, and micrcz. ave devices.

Hetting Kinates March 26, 1935 IN*A-EC-C180 Page 8 I

p.,rd r.< - AO.en a.

Actice.s regired to c:Mact this review ard update the data

-rr i e r. ty 7-t be.se.

q.,7ej ?

Pt CrcJo - Provide Security with print:uts of all ctrponent infocation available.

Seearity - Identify on the printccts, the e.anges that are regaired.

,M4 Grot @h Crcuo - Update the Ccrpenent Inicratien in the corputer data tase.

19) Prioritire ard ed,edule the alnre listed action ite~.

-A fell:u up eeting will be cd.edaled by tha Pt Group in c:Ser to twiew these action ite s so that priorities and da dates ca. be established.

,vs K5 Uacp ect G. Jone:

R. Shafer P. Sncter FA File (2) 4

C t

5~n g' Detroit L. d,..

} a_.._....

/

DETROIT EDISON m.

.m _. m _.s.

m,_, m.

N.

/,...... n.. _.. e.. m :._.. -

SAFEGUARDS INFORMATION

.t.

4AMUA_RD31NIDRMATl0N DETERMINATION MJ Date:

March 19, 19S6 BY: /

[b.

h1 RCQAS60099 TITLE:* #

DATI+US'5 To:

1.. W. Hastings, Director g g huclear Security From:

F. T. Schwartz, Supervisor Quality Assurance Staff

Subject:

Annual Audit of Nuclear Security Audit Number A-QS-F-86-02 Enclosed herein is the Audit Report for the Annual Audit of Nuclear Security. As noted in the enclosed report, the i -

plementation of the Physical Security Plan was not satisfactorv and procedure implementation has not shown marked improve ent."

You are requested to respond to this original transmittal of the attached twenty-three (23) Audit Finding Reports by April 21, 1956.

(Two AFR's were previously transmitted to the Technical Otranizatien for action and one other AFR was closed upon issuance of DER NP 0 0100). Your response should utilize the fcreat prescribed on the attached instructions fro: NQA Procedure 1501.

If you have any questions on the content of the enclosed Audit Report ple e contact R. W. Fitzsimmons (Tea Leader) of my Staff at extension d

4 b

SAuGilA:RDS.10WA 0<1" FTS/RWF/jb Enclosure THIS MATERIAL AS EEEN,$tTEWIN: D TO BE SAFEGUAROS INFORbMTION WM!C-4 IS PROTECTED IN I

Attachsent ACCORDANCE WITH 13,CFR 73 t' f f.OMDU ALS QN_Q,.UI4AuTHORIZCth0R IN ACVERT AT.T D:SCLCSURE cc: F. E. Agosti MAY BE SUB.'ECT T,d CivikAND CRIMINAL PENALTIES

.7. L. Piana PURSUANT TO SECTION 147' T THE ATO!.itC ENERGY Y

G. M. Trahey ACT, AS AMEND D.

Audit File DISTRIBUTION t STR6CTLY LIMIT CN A "NEED.

TO.KNOW" EASIS i

l n

SAFISUARCS ISiCEMAi!05

/
J

QAS-86/64 Becate 3ower Corporation Engineers - Constructe :.

15740 Shady Grove Road Gaithersburg, Maryland 20877 301 -258-3000 March 18, 1986 f

i Mr. Vince Manta "h ((

Detroit. Edison Enrico Fermi Unit 2 U

I Nuclear QA 6400 N.

Dixie Highway Newport, Michigan 48166

Dear Mr. Manta:

This is to notify you that the following Detroit Edison personnel satisfactorily completed the Bechtel Auditor Training Class conducted from February 24 through February 28, 1986 at Enrico Fermi Unit 2.

Jeffrey A.

Boudrie Steven R.

Tisher James W.

Fountain Wendy Vert Robert V.

Taylor James D.

Sturgill Susan M.

Kalisek James M.

Sielaniec Carolyn Larry Keith Johnson Joseph H.

Korte David R. Gnaedinger John O'Callaghan Rebekah Koch Thomas Heemstra Linda Bugoci A Certificate of Achievement for each of the above participants has been sent to their supervisor.

If you have any questions, please call me at (301) 258-4054.

Very truly yours,

~'

<i sbV d P.

R.

Britnell Project QA Manager PRE:ajj b

D i

13 O J

l 3'r6h DOITOli

" d i e m, m m := m : r.u.: w : a m m ua m a u w n. m m a a a,L y Z u.,

P

~

bccl (3 O kq. t cu DATE:

MARCH 8, 1986 TO:

Me:nbers of Security Force assigned to Turnstile duty d

Chief, !!uclear Sfeu/ " d.

h'alte! P. Hawkins/

y FR0! :

rity

SUBJECT:

Intensified surveilance at Turnstiles, Officers assigned as Tunstile Duty are to concentrate their efforts _in assuring that Keycards DO NOT LEAVE THE PROTECTED AREA.

Checking of Inaterials, briefcases and lunchbcxes leaving the protected area are SECONDARY to your efforts regarding keycards.

,tlI f)

'pf '

g l

O

/ H U' q'l6 fl 14 o,

( fl I y 6

/

y

+d yo o

4 o\\ [L l

G I

l l~

r i

1 i

Detroit

-nmacassormmm ~=

===r~

2 Edie.

e _ -- -

jurecw-sa=cw ; -

10 yea.asurma-rarmrst wramicurt.wemrarusrzmtmxrw Date:

March 4, 1986 To:

S. J. Booker B. Miller M. E. Chrpley C. A. thegeli P. A. Childs

, S. H. tbetzel G. J. Debner T. J. O'Keefe J. M. DuBay G. R. Overiseck R. R. Eberhardt J. H. Plona G. H. Foster E. Preston M. J. Gavin T. Randazzo H. F. Heffner L. E. Schuerran M. J. Horvath C. P. Sexauer S. J. Iatone J. D. Shafer J. D. Leran L. J. SiKpkin R. S. Lenart D. Spiers J. F. Malaric G. M. Trahey R. A. Fay D. B. Wehneyer From:

L. W. Hastings Director-lbclear Security

Subject:

Security Awareness to Reduce IGs Ibclear Security has been issuing Ibn-Conformance Reports (NCRs) since mid-1984 for violations of security rules. You have been counselling these ecployes individually on correcting their behavior toward security rules every time you received an ICR. The 12C Security Incpectors have made the nurber of 1 G s issued, without changing definition, a security inprovement plan item. This reqaires that all Fermi 2 have less than 10 IGs monthly with the ultirate goal being none in some nonths. Your efforts in February, 1986 resulted in meeting the security inprovement plan goal for the first time by achieving the 1.owest nu:rber yet recorded at Fermi 2.

i Each of you are asked to review the attached information with all of your personnel and especially enphasize it with those people who have received nultiple IGs in the last twelve nonths or an tG in 1986. A continuing effort to securely operate Fermi 2 will be rea,uired to raintcin cur February record.

l Attachnents I-DWcjc cc:

F. E. A;csti

(._ }

2. S. Lenarr S. H. Ibettel

/ /

j J. L. Pian:

)

_ _. _ _.