RIS 2005-31, Official Exhibit - Mandatory Hearing - AES000056-MA-BD01 - NRC Regulatory Issue Summary 2005-31, Control of Security-Related Sensitive Unclassified Non-Safeguards Information Handled by Individuals, Firms & Entities Subject to NRC Regula: Difference between revisions

From kanterella
Jump to navigation Jump to search
(Created page by program invented by StriderTol)
 
(Created page by program invented by StriderTol)
 
(2 intermediate revisions by the same user not shown)
Line 3: Line 3:
| issue date = 12/22/2005
| issue date = 12/22/2005
| title = Official Exhibit - Mandatory Hearing - AES000056-MA-BD01 - NRC Regulatory Issue Summary 2005-31, Control of Security-Related Sensitive Unclassified Non-Safeguards Information Handled by Individuals, Firms & Entities Subject to NRC Regulatio
| title = Official Exhibit - Mandatory Hearing - AES000056-MA-BD01 - NRC Regulatory Issue Summary 2005-31, Control of Security-Related Sensitive Unclassified Non-Safeguards Information Handled by Individuals, Firms & Entities Subject to NRC Regulatio
| author name = Miller C L
| author name = Miller C
| author affiliation = NRC/NMSS/IMNS
| author affiliation = NRC/NMSS/IMNS
| addressee name =  
| addressee name =  
Line 15: Line 15:
| document type = Legal-Exhibit
| document type = Legal-Exhibit
| page count = 29
| page count = 29
| revision = 0
}}{{Adams
| number = ML16196A237
| issue date = 12/26/2017
| title = Rev. 1, Control of Security-Related Sensitive Unclassified Non-Safeguards Information Handled by Individuals, Firms, and Entities Subject to NRC Regulation of the Use of Source Byproduct, & SNM
| author name = Kock A L
| author affiliation = NRC/NMSS/DMSTR
| addressee name =
| addressee affiliation =
| docket =
| license number =
| contact person = Goldberg P
| document report number = RIS-05-031, Rev. 1
| document type = NRC Regulatory Issue Summary
| page count = 31
| revision = 1
}}{{Adams
| number = ML16277A133
| issue date = 12/22/2005
| title = Enclosure - NRC Regulatory Issue Summary 2005-31
| author name =
| author affiliation = NRC/OIP
| addressee name =
| addressee affiliation =
| docket =
| license number =
| contact person = Langlie G  --  287-9076
| document report number = RIS-05-031
| document type = NRC Regulatory Issue Summary
| page count = 29
| revision = 0
}}
}}
{{#Wiki_filter:ML16196A237 December 26, 2017 NRC REGULATORY ISSUE SUMMARY 2005-31, REVISION 1 CONTROL OF SECURITY-RELATED SENSITIVE UNCLASSIFIED NON HANDLED BY INDIVIDUALS, FIRMS, AND ENTITIES SUBJECT TO NRC REGULATION OF THE USE OF SOURCE, BYPRODUCT, AND SPECIAL NUCLEAR MATERIAL  
{{#Wiki_filter:Nuclear Regulatory Commission Exhibit # - AES000056-MA-BD01 Docket # - 07007015 Identified: 01/25/2011 Admitted: 01/25/2011          Withdrawn:
Rejected:                      Stricken:
                                                                                                              Exh. AES000056 UNITED STATES
                                              NUCLEAR REGULATORY COMMISSION
                                  OFFICE OF NUCLEAR MATERIAL SAFETY AND SAFEGUARDS
                                                  WASHINGTON, D.C. 20555-0001 December 22, 2005 NRC REGULATORY ISSUE SUMMARY 2005-31 CONTROL OF SECURITY-RELATED SENSITIVE UNCLASSIFIED NON-
                      SAFEGUARDS INFORMATION HANDLED BY INDIVIDUALS, FIRMS,
                      AND ENTITIES SUBJECT TO NRC REGULATION OF THE USE OF
                          SOURCE, BYPRODUCT, AND SPECIAL NUCLEAR MATERIAL


==ADDRESSEES==
==ADDRESSEES==
All radiation control program directors and State liaison officer All licensees, certificate holders, applicants, and other entities (hereafter referred to as "licensees and others") subject to regulation by the U.S. Nuclear Regulatory Commission (NRC) for the use of source, byproduct, and special nuclear material, excluding the following:
All licensees, certificate holders, applicants, and other entities (hereafter referred to as licensees and others) subject to regulation by the U.S. Nuclear Regulatory Commission (NRC)
* All holders of and applicants for an operating license or construction permit under Title 10 of the Code of Federal Regulations (10 CFR) Part 50, "Domestic Licensing of Production and Utilization Facilities," and those licensees that have permanently ceased operations and have submitted certifications under 10 CFR 50.82(a)(1) or have submitted applications for license termination under 10 CFR 50.82(b)(1).
                  of the use of source, byproduct, and special nuclear material, except for those as covered by provisions of Regulatory Issue Summary (RIS) 2005-26 for nuclear power reactors.
* All holders of and applicants for a power reactor early site permit, combined license, standard design approval, or manufacturing license under 10 CFR Part 52, "Licenses, Certifications, and Approvals for Nuclear Power Plants." All applicants for a standard design certification, including such applicants after initial issuance of a design certification rul
* All holders of and applicants for certificates for reactor design


==INTENT==
==INTENT==
The NRC is issuing this regulatory issue summary (RIS) to accomplish the following:
This RIS sets forth procedures that licensees and others are encouraged to follow when handling documents and/or when submitting documents to the NRC that contain security- related sensitive information, other than classified or safeguards information, that could be useful, or could reasonably be expected to be useful, to a terrorist in a potential attack.
* Inform licensees and others of the screening criteria that the NRC uses to identify and protect security-related sensitive information in documents generated by the NRC and in documents developed by licensees and others, particularly those received by the NRC. (Enclosure 2)
 
Attached to this RIS are screening criteria that licensees and others should use to identify security-related sensitive information.
 
No specific action nor written response is required.
 
==BACKGROUND==
NRC traditionally has given the public access to a significant amount of information about the facilities and materials the Agency regulates. Openness has been and remains a cornerstone of NRCs regulatory philosophy. The Atomic Energy Act, subsequent legislation, and various NRC regulations have given the public the right to participate in the licensing and oversight process for NRC licensees. To participate in a meaningful way, the public must have access to information about the design and operation of regulated facilities and use of nuclear materials.


* Encourage licensees and others to identify security-related sensitive information in documents submitted to the NRC by using the marking procedures in Enclosure 1 and the screening criteria in Enclosure RIS 2005-31, Rev. 1
However, NRC and other Government agencies have always withheld some information from public disclosure for reasons of security, personal privacy, or commercial or trade secret protection.
* Encourage licensees and others that may possess security-related sensitive information to control the information in order to limit the risk that the information might fall into the hands of those who would use it for malevolent act No specific action or written response is required.


==BACKGROUND INFORMATION==
In the post-September 11, 2001, environment, NRC, like many other agencies, has found it necessary to be more judicious in determining what information to voluntarily release, so as not to inadvertently provide assistance to those who might use certain information for malevolent acts. NRC has issued orders and advisories and taken specific actions regarding the security of its licensed facilities and has also assessed and revised its policies and practices for making information available to the public. One of the actions NRC took was to suspend public access to documents in its electronic Agency-wide Documents Access and Management System (ADAMS) on October 25, 2004. Subsequently, NRC screened those documents to determine whether they contained security-related sensitive information. Based on this screening, a large number of documents were returned to public access in ADAMS. This screening process continues as requests for specific documents are received and as new documents are created by NRC and received from licensees and others.
The NRC traditionally has given the public access to a significant amount of information about the facilities and materials the agency regulate Openness has been and remains a cornerstone of the NRC's regulatory philosoph The Atomic Energy Act of 1954, as amended; subsequent legislation; and various NRC regulations have given the public the right to participate in the licensing and oversight process for NRC licensee To participate in a meaningful way, the public must have access to information about the design and operation of regulated facilities and use of nuclear material However, the NRC and other Government agencies have always withheld some information from public disclosure for reasons of security, personal privacy, or designation as proprietary information (commercial or trade secret protection).


In the post-September 11, 2001, environment, the NRC has found it necessary to be more judicious in determining what information to voluntarily release so that it does not inadvertently provide assistance to those who might use certain information for malevolent act The NRC has issued orders, advisories, and rules; taken specific actions on the security of its licensed facilities; and assessed and revised its policies and practices for making information available to the publi As one such action, the NRC temporarily suspended public access to documents in its electronic Agencywide Documents Access and Management System (ADAMS) on October 25, 200 Subsequently, the NRC screened those documents to determine whether they contained security-related sensitive informatio Based on this screening, the NRC returned a large number of documents to public access in ADAM This screening process continues as requests for specific documents are received and as new documents are created by the NRC and received from licensees and other entitie The NRC has continued to presumptively withhold some categories of documents from routine public releas In SECY-04-0191, "Withholding Sensitive Unclassified Information Concerning Nuclear Power Reactors from Public Disclosure," dated October 19, 2004 (ADAMS Accession No. ML043140175), and SECY-05-0101, "Withholding from Public Disclosure Sensitive Unclassified Information Concerning Materials Licensees and Certification Holders," dated October 7, 2005, (ADAMS Accession No. ML051040407) (non-public) the staff proposed to withhold certain information on fire protection and emergency planning and response to ensure that information that could reasonably be expected to be useful to a potential adversary was not made publi The Commission approved the initial withholding of this information and the review of the information for release in response to requests such as those made under the Freedom of Information Act (FOIA). See Staff Requirements Memorandum SECY-04-0191 dated Nov. 9, 2004 and Staff Requirements Memorandum SECY-05-0101 dated October 7, 200 In SECY-15-0032, "Reviewing Documents for Public Release Using Sensitive Unclassified Non-Safeguards Information Guidance," dated March 6, 2015 (ADAMS Accession No. ML14352A172), the staff proposed to discontinue this policy and instead apply the NRC's sensitive unclassified nonsafeguards information (SUNSI) policy to review, release, and withhold fire protection and emergency preparedness document The Commission approved this proposal in its staff requirements memorandum to SECY-15-0032, dated June 15, 2015 (ADAMS Accession No. ML15167A090). The advice in this RIS reflects that chang RIS 2005-31, Rev. 1 To facilitate the screening process for the public release of information, the NRC developed screening criteria and issued two RISs that pertain to nuclear reactors for conducting its review On November 7, 2005, the NRC issued RIS 2005-26, "Control of Sensitive Unclassified Nonsafeguards Information Related to Nuclear Power Reactors," (ADAMS Accession No. ML051430228) for assessing whether documents associated with reactor licensees should be made publicly availabl On December 23, 2015, the NRC issued RIS 2015-17, "Review and Submission of Updates to Final Safety Analysis Reports, Emergency Preparedness Documents, and Fire Protection Documents," (ADAMS Accession N ML15321A400) to remind licensees of the review and submission requirements of 10 CFR 2.390, "Public Inspections, Exemptions, Requests for Withholding," on information that may be withheld from public disclosur As part of related efforts in the nonreactor arena, the NRC has developed the enclosed criteria for identifying security-related sensitive information that the staff encourages licensees to screen out or to mark and protect as sensitive information, particularly before those licensees that handle source, byproduct, or special nuclear material submit documents to the NR The advice in this RIS and its enclosures does not apply to classified information, Safeguards Information, or Safeguards Information-Modified Handling, which by law must be withheld from the publi
To facilitate this screening process, NRC has developed screening criteria for conducting its reviews. In November 2005, NRC issued guidance (NRC RIS 2005-26) for assessing whether documents associated with reactor licensees should be made publicly available. As part of the continuing efforts in this area, NRC has now developed the attached criteria for screening from public disclosure security-related sensitive information associated with various NRC-regulated activities of persons handling source, byproduct, and special nuclear material.
 
This RIS and its attachments do not apply to classified information or Safeguards Information.
 
Classified information (Confidential, Secret, Top Secret) is withheld from the public by law.
 
Safeguards Information is withheld because it provides details of security measures at nuclear facilities. Handling requirements for classified information and Safeguards Information are set forth in various NRC orders, regulations, and generic communications (e.g., requirements for the handling and protection of Safeguards Information are discussed in RIS-2003-08, Protection of Safeguards Information from Unauthorized Disclosure, dated April 30, 2003).
Sensitive (but unclassified, non-safeguards) information covers a range of information for which the loss, misuse, modification, or unauthorized access can reasonably be foreseen to harm the public interest, commercial or financial interests of an entity, the conduct of NRC and Federal Programs, or the personal privacy of individuals. As noted above, this RIS covers security- related information which, if released, could cause harm to the public interest as it could be useful, or could reasonably be expected to be useful, to a terrorist in a potential attack.
 
Specifically, information that should be protected under this RIS is described in Attachment 2.
 
In addition, licensees and others should use the procedures set forth below to protect information designated for protection by other federal, State, or local agencies.


==SUMMARY OF ISSUE==
==SUMMARY OF ISSUE==
SUNSI includes information that, if lost, misused, or modified, can reasonably be foreseen to harm the public interest, the commercial or financial interests of an entity, the conduct of NRC and Federal programs, or the personal privacy of individual It also includes security-related informatio If practical, licensees and others that submit documents to the NRC should avoid including any security-related sensitive information to permit the release of the document to the public in its entiret However, if that is not practical, the following steps will help ensure that sensitive information is not released:
This RIS:
    1) Informs licensees and others of the screening criteria that NRC uses to identify and protect security-related sensitive information in documents generated by the Agency and in documents received from licensees and others;
    2) Encourages licensees and others to identify security-related sensitive information contained in documents submitted to NRC, by using the screening criteria in Attachment 2 and marking procedures; and 3) Encourages licensees and others that may possess security-related sensitive information to control the information, to limit the risk that the information might fall into the hands of those who would use it for malevolent acts.
 
Specifically, protection of the information should be implemented in the following manner:
1. Screening of Future Documents Submitted to NRC
      To assure that future submittals containing security-related sensitive information are not made publicly available in ADAMS, while still making other appropriate information available to the public, NRC is encouraging licensees and others to screen submittals in accordance with the guidance in Attachment 2. If practical, documents submitted to NRC should avoid including security-related sensitive information to permit releasing the document to the public in its entirety.


(1) Screening of Licensee-Generated Documents To ensure that any security-related sensitive information in submitted documents is not made publicly available in ADAMS, the NRC is encouraging licensees and other entities to screen submittals in accordance with the criteria in Enclosure In addition, to ensure that licensees and other entities identify and control security-related sensitive information in their documents, the NRC is encouraging them to develop implementing procedures to screen documents that might have sensitive security-related information in order to identify and control the information appropriatel The goal is to limit the risk that the information might fall into the hands of those who would use it for malevolent act (2) Cover Letter If a cover letter that does not itself contain sensitive information is used to transmit a document(s) that contains security-related sensitive information, the cover letter should clearly state thi Furthermore, the cover letter should have a statement that indicates that once its sensitive attachments are removed, the cover letter itself may be handled as an uncontrolled documen However, if the cover letter itself contains security-related sensitive information, it cannot be decontrolle RIS 2005-31, Rev. 1 (3) Marking Documents That Contain Security-Related Sensitive Information As shown in Section A of Enclosure 1, include the marking "Security-Related Information-Withhold under 10 CFR 2.390" at the top center of every pag If submitting both a public and a nonpublic version of the same document, licensees and other entities should "black out" the sensitive information in the public version or withhold the sensitive information with a notation that it was withheld on the basis that it is "security-related information."
2. Marking and Submitting Documents Containing Security-Related Sensitive Information If it is necessary to include security-related sensitive information in a submitted document, the submittal should be marked to indicate the presence of such information as follows:
          a)    The cover letter should clearly state that the attached documents contain security-related sensitive information. When separated from the attached documents, if the cover letter itself does not contain security-related sensitive information, the cover letter itself is uncontrolled.


Alternately, security-related sensitive information may be segregated from the main body of the document and included only in attachments to the submitta In this scenario, only the attachments that contain security-related sensitive information would be marked for withholding from public disclosur If this approach is used, the public version does not need to be marked as containing security-related sensitive informatio Enclosure 1, Section B, contains additional information on suggested handling and methods of submitting security-related sensitive informatio Protection of Security-Related Sensitive Information Documents that contain security-related sensitive information should be protected from public disclosure using methods similar to those for protecting proprietary informatio To the extent practical, any existing documents that contain security-related sensitive information that licensees or other entities have previously made available to the public should be withdrawn from public acces Licensees and other entities should have sufficient internal controls to prevent release of information to limit the risk that sensitive security-related information could be released to someone with malevolent inten In addition to the points enumerated above, other methods to prevent the inadvertent release of security-related sensitive information include (1) restricting access to electronic recordkeeping systems that contain such information, (2) controlling the reproduction, distribution, and destruction of potentially sensitive records, and (3) releasing sensitive information only to those individuals who have a need to know the information to perform their jobs and who are made aware of the security-related nature of the informatio Certain categories of security-related sensitive information under 10 CFR Part 37, "Physical Protection of Category 1 and Category 2 Quantities of Radioactive Material," must be protected pursuant to 10 CFR 37.43(d) and 37.77(f), as described in more detail in Section D, "Security Program Information," of Appendix 3, "Reviews of Medical, Industrial, and Academic Users of Nuclear Materials," to Enclosure Much of the NRC's information is readily available to the public through the NRC's Web site (http://www.nrc.gov) and ADAMS (http://www.nrc.gov/reading-rm/adams.html). In addition, the agency may release other information to the public in response to formal or informal request Although the NRC developed these security-related sensitive information screening criteria with the principles of FOIA in mind, a review for security-related sensitive information does not substitute for a FOIA revie The NRC will continue to review and process FOIA requests under 10 CFR 2.390(d)(1), independently from the security-related sensitive information review proces RIS 2005-31, Rev. 1
b)    As shown in Attachment 1 (Section A), the top of every page of a letter or document that contains security-related sensitive information should include the marking Security-Related Information  Withhold Under 10 CFR 2.390 (note that NRCs procedure for these documents is to mark them as Official Use Only
                - Security-Related Information). For the pages having security-related sensitive information, an additional marking (e.g., an editorial notebox) should be included adjacent to the material meeting the screening criteria in Attachment 2.
 
Information on suggested handling and methods of submittal of security-related sensitive information is also contained in Attachment 1 (Section B).
      Licensees and others can submit both a public and a non-public version of a document, when security-related documents need to be submitted. The public version could have the security-related sensitive information marked out or removed with a notation that the information was withheld on the basis that it is Security-Related Information. This is similar to what is sometimes done to protect proprietary information under 10 CFR
      2.390, except that an affidavit is not needed. Alternatively, security-related sensitive information could be segregated from the main body of the document and included only in attachments to the submittal. Only the attachments containing security-related sensitive information would be marked for withholding from public disclosure. Using this approach, the public version need not be marked as containing security-related sensitive information. 3. Protection of Security-Related Sensitive Information Documents that contain security-related sensitive information should be protected from public disclosure, using methods similar to that for protecting proprietary information.
 
To the extent practicable, any existing documents containing security-related sensitive information that licensees or others have previously made available to the public should be withdrawn from public access. As with proprietary information, licensees and others should have sufficient internal controls to prevent release of information. Possible methods to prevent the inadvertent release of security-related sensitive information include marking documents Security-Related Information - Withhold Under 10 CFR
        2.390, restricting access to electronic recordkeeping systems that contain such information, and controlling the reproduction, distribution, and destruction of potentially sensitive records. Licensees and others should ensure that similar controls are in place when security-related sensitive information is provided to outside parties such as contractors or other Government agencies, and that the information is made available only to such parties who have a need to know the information to perform their jobs and who are made aware of the security-related nature of the information.
 
This RIS, the attached screening criteria, and additional explanatory material, as appropriate, are also posted on the NRC Web site at http://www.nrc.gov/reading-rm/sensitive-info.html)
(note that the criteria for fuel cycle facilities in this website and in this RIS supercedes information at http://www.nrc.gov/materials/fuel-cycle-fac/review-criteria-fuel-cycle.html).
The NRC staff will interact with licensees and others on a case-by-case basis to resolve questions regarding the application of the procedures and screening criteria set forth in this RIS
and its attachments.
 
NRC will continue to make available to the public as much information as possible. Much of NRCs information is readily available to the public via the NRC Web site (www.nrc.gov) and NRCs ADAMS system (www.nrc.gov/reading-rm/adams.html). In addition, other information may be released to the public in response to formal and/or informal requests. Although the security-related sensitive information screening criteria were developed with the principles of the Freedom of Information Act (FOIA) in mind, a review for security-related sensitive information does not substitute for a FOIA review. FOIA requests will continue to be reviewed and processed independently from the security-related sensitive information review process.


==BACKFIT DISCUSSION==
==BACKFIT DISCUSSION==
This RIS informs addressees of the screening criteria that the NRC uses to identify and protect security-sensitive information, and to encourage licensees and others to identify and control such informatio This RIS requires no action or written response beyond that already required by NRC regulations, and is, therefore, not a backfit under the backfitting provisions of 10 CFR 70.76, 72.62, or 76.76, all titled "Backfitting." Consequently, the NRC staff did not perform a backfit analysi
This RIS requires no action nor written response and is, therefore, not a backfit under 10 CFR
70.76, 72.62, or 76.76. Consequently, the NRC staff did not perform a backfit analysis.


===FEDERAL REGISTER NOTIFICATION===
===FEDERAL REGISTER NOTIFICATION===
A notice of opportunity for public comment was not published in the Federal Register because this RIS is informational and does not represent a departure from current regulatory requirements and practic
A notice of opportunity for public comment on this RIS was not published in the Federal Register because it is informational and does not represent a departure from current regulatory requirements and practice. SMALL BUSINESS REGULATORY ENFORCEMENT FAIRNESS ACT OF 1996 NRC has determined that this action is not subject to the Small Business Regulatory Enforcement Fairness Act of 1996.


===CONGRESSIONAL REVIEW ACT===
===PAPERWORK REDUCTION ACT STATEMENT===
This RIS is not a rule for purposes for purposes of the Congressional Review Act, 5 U.S.C. §§ 801-80
This RIS does not contain information collections and, therefore, is not subject to the requirements of the Paperwork Reduction Act of 1995 (44 U.S.C. 3501, et seq.).
Please direct any questions about this matter to the technical contacts listed below.


===PAPERWORK REDUCTION ACT STATEMENT===
/RA/
This RIS does not request any information collections and, therefore, is not subject to the Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et seq.).
                                            Charles L. Miller, Director Division of Industrial and Medical Nuclear Safety Office of Nuclear Material Safety and Safeguards Technical Contacts:
RIS 2005-31, Rev. 1  
                                Spent Fuel Storage and Materials IMNS/Regional        Transportation                      Fuel Cycle Paul Goldberg, NMSS/IMNS        Joe Sebrosky, NMSS/SFPO            Patricia Silva, NMSS/FCSS
301-415-7842                    301-415-1132                        301-415-8029 E-mail: pfg@nrc.gov            E-mail: jms3@nrc.gov                E-mail: pas6@nrc.gov Decommissioning                HLWRS                              Import/Export Ted Carter, NMSS/DWMEP          Alexander Sapountzis                Stephen Dembek
301-415-6668                    301-415-7822                        301-415-2342 E-mail: thc1@nrc.gov            E-mail: aps@nrc.gov                E-mail: sxd@nrc.gov Attachments:
1. Suggested Markings; Withhold From Public Disclosure in Accordance With 10 CFR 2.390
2. NMSS Guidance on Screening Criteria for Security-Related Sensitive Unclassified Non- Safeguards Information
3. List of Recently Issued NMSS Generic Communications
 
Attachment 1 RIS-2005-31 SUGGESTED MARKINGS AND HANDLING
This attachment provides information on suggested markings for pages of a document that contains security-related sensitive information (Section A) and suggested handling of such documents (Section B).
A. Page Markings Overall page marking on the top of all pages of a document that contains security-related sensitive information Security-Related Information                      Note that a cover letter should clearly state Withhold Under 10 CFR 2.390                        that attached documents contain security- related sensitive information - - However, this marking is also needed on the cover letter only if it itself contains security- related sensitive information.
 
Subject Ensure Subject Line is non-sensitive XXXXXXXXXX
                  XXXXXXXXXX
                  XXXXXXXXXX
                  XXXXXXXXXX
 
Attachment 1 RIS-2005-31 B. Appropriate Controls for Handling Documents Access:                      Need-to-know in order to perform official licensee, applicant or entity functions.
 
Storage:                    Openly within licensee, applicant, or other entity facilities with electronic or other access controls, for example, key cards, guards, alarms.
 
Mail:                        U.S. Postal Service first class mail, registered mail, express mail, or certified mail in single opaque envelope with no external markings to indicate 10 CFR 2.390 contents.
 
Electronic Transmission:              Over phone if the recipient is confirmed as being authorized to access the information; over facsimile if it is confirmed that a recipient who is authorized to access the information will be present to receive the transmission;
                                      over encrypted computer e-mail (using computer software such as SecureZip).
                            Note that NRC is using SecureZip when transmitting security- related sensitive information by e-mail to licensees and others to encrypt electronic information. Users will be prompted for a password to access a free download of the reader.
 
Attachment 2 NMSS GUIDANCE
    SCREENING CRITERIA FOR SECURITY-RELATED
SENSITIVE UNCLASSIFIED NON-SAFEGUARDS INFORMATION
                  DECEMBER 2005
                        -1-
 
Attachment 2 SCREENING CRITERIA FOR SECURITY-RELATED
                SENSITIVE UNCLASSIFIED NON-SAFEGUARDS INFORMATION
                                          DECEMBER 2005 INTRODUCTION:
This guidance provides the criteria which will be used to determine the types of security-related sensitive information, other than classified or safeguards information, associated with materials licensees, applicants, certificate holders, and other entities that will not be voluntarily disclosed to the public so as not to inadvertently provide assistance to those who might wish to use this information for malevolent acts.
 
==BACKGROUND==
:
Historically, the Nuclear Regulatory Commission (NRC) has made routinely available to the public large amounts of information, more than required by law. In the post-September 11,
2001 environment, however, like many other agencies, the NRC has found it necessary to be more judicious in what it voluntarily releases, so as not to inadvertently provide assistance to those who might use this information for malevolent acts.
 
The NRC developed guidance several months ago for conducting a broad security/sensitivity review to assess whether documents associated with reactor licensees should be made publicly available in the first instance as a matter of administrative discretion (SECY-04-0191). In November 2005, the NRC issued guidance (NRC RIS 2005-26) in this area. As part of the continuing efforts in this area, the NRC has now developed this guidance which addresses the criteria for screening from public disclosure certain types of information associated with various classes of materials licensees, applicants, certificate holders and other entities.
 
Consistent with the Task Force Report on Public Disclosure of Security-Related Information, (SECY 05-0091) and the Commission guidance on that Task Force Report, the screening criteria in these guidelines ...should follow the principles for withholding security-related information under FOIA. Although the security-related sensitive screening criteria were developed with the principles of the Freedom of Information Act (FOIA) in mind, a review for security-related sensitive information does not substitute for a FOIA review. FOIA requests will continue to be reviewed and processed independently from the security-related sensitive information review process.
 
ORGANIZATION OF THIS GUIDANCE:
This guidance is organized as follows (see Table 1 for an outline on navigating the guidance):
    -    Section 1 indicates the thresholds under which documents may be released to the public without any further screening. However, Section 1 also notes specific requirements for withholding documents in certain cases even if the documents fall under the threshold.
 
-    Section 2 contains general criteria for screening documents above the threshold.
 
Attachment 2 -    Appendices 1 - 5 contain guidance, in addition to that in Section 2, for screening documents specific to fuel cycle facilities; decommissioning and low-level waste sites;
        medical, industrial, and academic uses of nuclear materials; spent fuel/transportation;
        and export/import, respectively.
 
Table 1 Stakeholders Using This Guidance and Applicable Sections of the Guidance1 Stakeholder                                          Applicable guidance Fuel cycle facilities including milling,            Sections 1 and 2 for general information and conversion, enrichment and fuel fabrication          Appendix 1.
 
facilities Decommissioning and low-level waste sites            Sections 1 and 2 for general information and Appendix 2.
 
Medical, Industrial, and Academic Uses of            Sections 1 and 2 for general information and Nuclear Materials                                    Appendix 3.
 
10 CFR Part 71: certificate holders, and            Sections 1 and 2 for general information and registered users                                    Appendix 4, parts A, B, and E. Special attention should be given to the guidance relative to detailed design drawings, and control of registered users list for transportation packages.
 
10 CFR Part 71: Quality Assurance Program            Sections 1 and 2 for general information and holders                                              Appendix 4, parts A, B, and E. Based on NRC staff experience, most QA program holder submittals do not contain sensitive information as defined in this RIS. However, attention should be given to the guidance relative to detailed design drawings, and control of registered users list for transportation packages.
 
10 CFR Part 72: certificate holders, general        Sections 1 and 2 for general information and licensees, and site specific licensees              Appendix 4, parts A, B, C, D and E.
 
Export and Import                                    Sections 1 and 2 for general information and Appendix 5.
 
1 With regards to High-Level Waste, requirements for making information publicly available via the Licensing Support Network (LSN) is contained in 1O CFR Part 2 Subpart J for an applicant of the proposed geological repository at Yucca Mountain in Nevada. Furthermore, the "Joint DOE and NRC Sensitive Unclassified Information and Classification Guide for the Office of Civilian Radioactive Waste Management Program" (CG-OCRWM-1) provides guidance for determining sensitive information.
 
Attachment 2 1. NMSS THRESHOLD CRITERIA:
Documents containing information falling under these thresholds may be released without any further screening, except as specifically noted.
 
A. Low Hazard: The following types of licensee files need NOT be screened due to the low hazard of the radioactive material at the sites:
    - Licensees authorized to possess quantities of radionuclides in any single location that are below the International Atomic Energy Agencys (IAEA) Category 3 quantities (as listed in Table 1 of these guidelines). However, documents which give the exact location of the material should be withheld, even if they refer to material levels below the Category 3 threshold. Thus, a document may be released if it indicates a general location (i.e., in a certain building), but documents giving the exact location should be withheld unless the location is intuitively obvious.
 
-  Licensees (other than fuel cycle) authorized to possess radionuclides which are not listed in Table 1. However, information on the exact location of this radioactive material should be withheld.
 
- Uranium recovery (yellow cake and tailings only)
      - Current information on decommissioning materials sites with diffuse contamination only.
 
(Check for other active licenses or radioactive material at the site; e. g., high activity reactor components, and high activity waste. Screen any such documents separately.)
      - Terminated licenses where all radioactivity except diffuse contamination has been removed. (Screen old files for operational information which may contain sensitive information.)
B. Information Readily Available to the Public Elsewhere:
Based on Reactor Criteria Approved by Commission (see SECY-04-0191):
      - If the information is available from open source literature such as text books, Web sites, or other sources, an NRC decision to withhold the information may decrease the openness of our regulatory programs without obstructing an adversary.
 
- Information clearly visible from locations accessible to the public is generally released.
 
This includes general (low resolution) drawings of the site and adjacent areas.
 
Attachment 2 2. GENERAL CRITERIA FOR SCREENING DOCUMENTS ABOVE THE THRESHOLD
A. Descriptions of Facilities Where Licensed Material May Be Located Criteria:
(1) Locations and quantities of radioactive material (above the thresholds listed in Table 1)
    - Withhold information identifying the exact locations of radioactive material
    - Withhold information on possession limits or actual inventories of radionuclides.
 
- Withhold manufacturers and model numbers of sealed sources and devices.
 
- For fuel cycle facilities, withhold information on possession limits and inventories of enriched uranium above 6% U-235, and mixed oxide materials.
 
- Withhold lists of licensees registered to use NRC-approved 10 CFR Part 71 transportation packages.
 
- Release identification of radionuclides and form.
 
- Release 10 CFR Part 71 certificates and 10 CFR Part 72 information related to radionuclide form, content, quantities, model numbers, and locations of independent spent fuel storage installations, regardless of the quantities.
 
- Release event reports involving lost/stolen/abandoned/found radioactive material.
 
(2) Design of structures/equipment (site specific)
    - Withhold information related to security requirements, information from analyses which could reveal vulnerabilities, reports of specific or predicted failures, and any other information which could reasonably be expected to be useful to potential adversaries.
 
- Release information regarding the design of structures provided to the NRC which typically consists of analyses to show that the design feature will withstand the combinations of forces associated with design basis events and natural hazards. The analyses do not typically provide realistic information on the failure of structural features, and, except for fuel cycle facilities, are not considered sensitive. However, withhold information related to predicted structural failures that could be useful to terrorists. (See Appendix 1 for specific guidance on fuel cycle facilities.)
(3) Nearby Facilities
    - Withhold information related to nearby facilities if the information might reasonably be helpful to those planning an attack.
 
B.  Design Information (non-site-specific): Spent Fuel Casks, Transportation Packages, Sealed Source and Device Catalog and Files, etc.
 
- Withhold drawings showing detailed design information.
 
- Withhold design/performance information which indicates vulnerabilities that could reasonably be expected to be useful to potential adversaries.
 
- Release text information containing descriptions of how packages/devices/sources are constructed.
 
Attachment 2 C.  Emergency Planning/Fire Protection Information
    - Withhold information related to emergency planning, emergency response, and fire protection. Review any considerations and/or requests for release on a case-by-case basis. As part of the review, check to see whether the State or local governments are withholding related information as sensitive.
 
- Withhold information describing licensee or government responses to malevolent attacks.
 
- Withhold information and drawings identifying locations of radioactive material, and onsite routes and pathways to or from the locations of radioactive material.
 
- Withhold information which State or local government agencies have designated as sensitive.
 
D. Security Program Information
    - Much information related to security programs at fuel cycle facilities and other materials facilities with high risk sources has already been designated to be withheld as Classified, Safeguards, or Proprietary Information.
 
- In addition to withholding Classified, Safeguards, or Proprietary Information, withhold any security information which could reasonably be expected to be useful to potential adversaries.
 
E.  Vulnerability/Security Assessments/Accident Analyses/Safety Analyses/Risk Assessments
    - Release typical accident analyses which involve conservative models to demonstrate a facilitys ability to respond to design basis events (i.e., non-security related events),
      unless the analysis could reasonably be expected to be useful to an adversary.
 
- Withhold assessments which use a malevolent event as an initial condition (e.g.,vulnerability/security analysis).
    - Withhold descriptions of structural features related to potential malevolent attacks.
 
- Withhold detailed information and drawings describing the specific locations of equipment relied upon for safety or security.
 
- Withhold discussions of safety features or mitigation strategies within vulnerability/security assessments.
 
- Withhold any analysis that identifies which events have significant consequences and which events don't.
 
- Withhold information related to security events and any information which could be useful to an adversary due to identification of vulnerabilities.
 
Attachment 2 APPENDICES 1-5: ADDITIONAL GUIDANCE FOR SECURITY-RELATED SENSITIVE
INFORMATION SCREENING REVIEWS
These appendices contain additional guidance for screening documents for security-related sensitive information specific to fuel cycle facilities; decommissioning and low-level waste sites;
medical, industrial, and academic uses of nuclear materials; spent fuel/transportation; and export/import licensing. These appendices are organized as follows:
    1. Fuel cycle facilities including milling, conversion, enrichment and fuel fabrication facilities;
    2. Decommissioning and low-level waste sites;
    3. Medical, industrial, and academic uses of nuclear materials;
    4. Spent Fuel/Transportation (10 CFR Part 71: certificate holders, and registered users;
        10 CFR Part 71: Quality Assurance Program holders; 10 CFR Part 72: certificate holders, general licensees, and site specific licensees);
    5. Export/Import licensing.
 
Attachment 2 APPENDIX 1 - - FUEL CYCLE FACILITY REVIEWS (NRC
 
==CONTACT==
: DIVISION OF FUEL
CYCLE SAFETY AND SAFEGUARDS (FCSS), NMSS)
A.  Descriptions of Facilities Where Licensed Material May Be Located
    - Withhold information on possession limits or actual inventories of radionuclides, and quantities, including such information on the license itself, for mixed oxide material and uranium enriched to greater than 6 % U-235. (Release identification of radionuclides and their forms.)
    - Withhold information related to military contract operations, even if it is publicly available elsewhere.
 
- Withhold information identifying the exact locations (e.g., detailed floor plans) of radioactive and hazardous material whose release or theft could allow adversaries to create a diversion for theft of material or result in a significant consequence.
 
Information for planning a sabotage activity (e.g., bombing a building) would likely require less detailed information than theft where exact locations would likely be needed.
 
- Withhold information about the design of structures that consists of analyses to show that design features will withstand the forces associated with both security-related scenarios and non-security-related scenarios, such as tornadoes, high winds, snow loads, etc. Analyses indicating forces associated with non-security regulatory requirements could be useful in planning terrorist activities. For instance, information related to seismic loadings could be used to determine blast loads for bombs.
 
- Withhold detailed design information, including diagrams showing dimensions, material properties, and descriptions of how the facilities/equipment is constructed. Additionally, withhold process information that could potentially allow an adversary to access radioactive or hazardous materials or gain knowledge of detailed information or potential weaknesses of systems designed to ensure safe operations (necessary to prevent or mitigate accidents) at fuel cycle facilities.
 
B. Design Information (non-site specific)
  No additional fuel cycle facility guidance for this category.
 
C. Emergency Planning/Fire Protection Information
    - Withhold information contained in Emergency Planning and Fire Protection Plans that could potentially allow an adversary to gain knowledge of detailed information or potential weaknesses of systems designed to ensure safe operations (necessary to prevent or mitigate accidents) at fuel cycle facilities.
 
Attachment 2 - Withhold information and drawings identifying routes to or from the locations of radioactive and hazardous material whose release or theft could allow adversaries to achieve their goals.
 
- Withhold information that State or local government agencies have designated as sensitive.
 
- Withhold any detailed accident analysis that identifies which accidents have significant consequences and which accidents don't. Accident analysis information can appear in many documents (i.e., emergency plan, fire protection plan, Integrated Safety Analysis Summary, environmental assessment, etc.). General information may be releasable, but details should be withheld.
 
D. Security Program Information
    - Much information related to security programs at fuel cycle facilities and other materials facilities with high risk sources has already been designated to be withheld as Proprietary, Classified or Safeguards Information.
 
- Withhold information about security equipment and programs, descriptions of equipment and radioactive or hazardous materials, and accident studies that bear a close resemblance to programs, equipment, radioactive or hazardous materials, and studies at other active licensee sites if that information would reveal vulnerabilities or be expected to be useful to adversaries at active licensee sites.
 
E. Vulnerability/Security Assessments/Accident Analyses
    - Withhold detailed information and drawings describing the exact locations of radioactive or hazardous materials or gain knowledge of detailed information or potential weaknesses of system designed to ensure safe operations (necessary to prevent or mitigate accidents) at fuel cycle facilities.
 
- Withhold any detailed accident analysis which contains accident sequences, identifies accident consequences, identifies systems and components relied upon for safety, or identifies which accidents have significant consequences and which accidents don't.
 
Accident analysis information can appear in many documents (i.e., emergency plan, fire protection plan, Integrated Safety Analysis Summary, environmental assessment, etc.).
      General information may be acceptable, but details should be withheld.
 
- Withhold information identifying the exact locations (e.g., detailed floor plans) of radioactive and hazardous material whose release or theft could allow adversaries create a diversion for theft of material or result in a significant consequence.
 
Information for planning a sabotage activity (e.g., bombing a building) would likely require less detailed information than theft where exact locations would likely be needed.
 
Attachment 2 APPENDIX 2 - - DECOMMISSIONING AND LOW-LEVEL WASTE SITE REVIEWS (NRC
 
==CONTACT==
: DIVISION OF DECOMMISSIONING, WASTE MANAGEMENT, AND
ENVIRONMENTAL PROTECTION (DWMEP), NMSS)
DECOMMISSIONING AND LOW-LEVEL WASTE SITE THRESHOLD CRITERIA
  1. Diffuse contamination consists of soil, groundwater, surface contamination on and in buildings, including that which is on equipment, floors, walls, etc. It also could include volumetrically contaminated materials whose concentrations are sufficiently low.
 
For determining whether only diffuse contamination is present at a decommissioning site, apply the following information derived from the IAEA Code of Conduct on the Safety and Security of Radioactive Sources (see Table 1). Category 3 sources in the Code of Conduct, for which NRC is developing a rulemaking to control their import and export, are typically about 1 curie. At a concentration of 2000 pCi/gram, which is well above the concentrations of plutonium typically found in soil at sites undergoing decommissioning, this equates to approximately 15,000 cubic feet of material, well in excess of what a terrorist could reasonably use for malevolent purposes. For materials at the 10 CFR Part 61 Class A limit for plutonium (10 nCi/gram), the volume of waste that would contain the Category 3 activity limit for plutonium would be 3000 cubic feet, also in excess of what could reasonably be used by a terrorist. However, for Co-60, the amount of loose material or rubble at the Class A limit (700 Ci/cubic meter) containing the Category 3 quantity (about 1 curie) would be less than 0.1 cubic foot, an amount that could easily be used for malevolent purposes because of its small volume.
 
Reviewers should apply values taking into consideration the examples given above in making a determination on whether a decommissioning site is within the threshold limits.
 
2. DWMEP has little licensing work in low-level waste. However, that which is performed may not be below the threshold. For example, import and export licensing could involve quantities of materials that would be useful to terrorists.
 
GENERAL GUIDANCE FOR DECOMMISSIONING AND LOW-LEVEL WASTE SITES
  Most sites undergoing decommissioning are expected to be below the threshold, so that most licensing documents can be released. Sensitivity reviews must be conducted on documents related to LLW storage, safety, and security systems and procedures. Reviews should focus on determining if the information contained in these documents could be useful to an adversary in planning a terrorist act. Examples include the location and security arrangements for high-activity waste, the location of highly activated components, or the transportation security arrangements for high-activity waste or activated components.
 
Attachment 2 For fuel cycle, materials, and spent fuel pool and independent spent fuel storage installation (ISFSI) licensees that are undergoing decommissioning, issues that are not unique to decommissioning (such as descriptions of plant processes, vulnerability/security assessments, etc.) should be reviewed with regard to Appendices 1, 3, and 4, respectively.
 
A. Descriptions of Facilities Where Licensed Material May Be Located
    - Withhold information identifying the exact locations of radioactive material. For example, detail drawings or maps of facilities, room numbers and locations, and specific locations of waste storage/processing operations.
 
- Withhold design information that could reasonably be expected to be useful to potential adversaries. Examples include detailed drawings or maps showing the locations of security measures/operations and infrastructure, locations of critical site infrastructure (electrical or power systems), and the design of facilities that could be useful in developing approaches to breech the facility.
 
- For transportation package information provided in connection with decommissioning or LLW disposal licensing, consider Appendix 4 for sensitivity of the information.
 
No additional guidance for decommissioning and low-level waste sites for other categories.
 
Attachment 2 APPENDIX 3 - - REVIEWS OF MEDICAL, INDUSTRIAL, AND ACADEMIC USERS OF
NUCLEAR MATERIALS (NRC
 
==CONTACT==
: DIVISION OF INDUSTRIAL AND MEDICAL
NUCLEAR SAFETY (IMNS), NMSS)
A. Descriptions of Facilities Where Licensed Material May Be Located (above the thresholds in Table 1)
(1) Copies of Licenses and Mailing Lists
    - Copies of licenses: Release authorized radionuclides and form. Withhold authorized quantities. Withhold manufacturers and model numbers of sealed sources and devices.
 
Withhold information which identifies buildings or rooms where radioactive material is located (this may be in the license condition specifying authorized location).
    - Withhold mailings lists which are compiled for security purposes or identify high risk facilities or vulnerable facilities.
 
- Release individual mailing addresses, and street address where material is located (normally included on licenses).
(2) Locations of radioactive material
    - Withhold lists of authorized or actual inventories of radionuclides.
 
- Withhold building numbers and room numbers (other than mailing addresses) or similar information which identify locations of material.
 
- Withhold site drawings which identify individual buildings on the licensee site.
 
- Withhold building drawings which identify the location of radioactive material, or onsite pathways or routes to and from locations of radioactive material.
 
- Release individual mailing addresses and street addresses.
 
(3) Design/description of structures/equipment/operating procedures (site specific)
    - Most descriptions of structures/equipment/procedures may be released if they are not security-related.
 
- Withhold drawings of buildings/rooms/devices where radioactive material is located.
 
- Withhold manufacturers and model numbers of sealed sources and devices.
 
- Withhold information on security programs, guards, access controls, key cards, alarms, barriers, chains, locks, etc.
 
B. Design Information (non-site specific) - Sealed Source and Device Catalog
    - Release information on addresses of manufacturers/distributors.
 
- Establish a password system for users with a valid need-to-know, and who have agreed to protect the information from unauthorized disclosure.
 
Attachment 2 C. Emergency Planning/Fire Protection Information
    - Release general descriptions of emergency procedures for safety related events, such as radioactive material spills, releases, contamination, and fires.
 
- Withhold information on routes to and from locations of radioactive material.
 
- Withhold information related to responses to security events and malevolent events.
 
- Withhold information on responses of offsite law enforcement officials.
 
- Withhold information designated by State or local governments as sensitive.
 
D. Security Program Information
    - Certain security information at specified facilities is already designated as Safeguards Information and should continue to be withheld and protected accordingly.
 
- In addition to withholding Safeguards Information, withhold any security information related to malevolent events or which could be useful to potential adversaries.
 
Examples as given in Section A above: information on guards, access controls, key cards, alarms, barriers, chains, locks, etc.
 
E. Vulnerability/Security Assessments/Accident Analyses
    - No additional guidance for medical, industrial, and academic users of nuclear material for this category.
 
Attachment 2 APPENDIX 4 - - SPENT FUEL/TRANSPORTATION REVIEWS (NRC
 
==CONTACT==
: SPENT
FUEL PROJECT OFFICE (SFPO), NMSS)
A. Descriptions of Facilities Where Licensed Material Be Located Subject                            Discussion and/or typical controls
10 CFR Part 72 Specific ISFSI      Uncontrolled - Information provided to the NRC for Licenses and General Licenses      specific ISFSI licenses and general licenses typically
- Text descriptions of the        consists of analyses to show that the design feature will following: general description,    withstand the combinations of forces associated with site characteristics, principal    design basis events and natural hazards. The analyses design criteria, storage cask      do not typically provide realistic information on the failure design, operations, waste          of structural features and are not considered sensitive.
 
management, radiation protection, accident analyses, conduct of operations, operating controls and limits, and quality assurance
10 CFR Part 72 Specific ISFSI      Potentially Controlled - Decisions regarding the control of Licenses and General Licenses      information that show the plant site and buildings are
- Drawings and locations of        dependent on the level of detail. Information clearly related hazards                    visible from locations accessible to the public near the site is generally released. This includes general (low- resolution) layout drawings of the site and adjacent areas.
 
Drawings showing details such as the specific locations of equipment within buildings, doorways, stairways, storage areas, etc. are to be withheld under 10 CFR 2.390(d).
                                    Drawings showing locations of hazards in relation to the ISFSI are also withheld. A text description of the hazards in relation to the ISFSI is uncontrolled and will not be reviewed.
 
10 CFR Part 72 Specific ISFSI      Controlled - Information related to non-nuclear facilities Licenses and General Licenses      located near the ISFSI such as pipeline data (usually
- Nearby industrial,              withheld per DOT) and chemical facilities (some data transportation, and military      withheld per EPA) is controlled. Other information may facilities                        be protected by other federal agencies (e.g., DHS, FERC,
                                    EPA, DOT)
10 CFR Part 72 Specific ISFSI      Uncontrolled - Information related to radionuclides, form, Licenses and General Licenses      and quantities Lists of licensees registered to  Withhold lists and associated letters required by 10 CFR
use NRC-approved 10 CFR Part      71.17(c)(3).
71 transportation packages.
 
Attachment 2 B. Design Information (non-site specific): Transportation Packages, and Spent Fuel Casks Subject                          Discussion and/or typical controls
10 CFR Part 71 Transportation    Uncontrolled - Information provided to the NRC typically Package Descriptions Text        consists of analyses to show that the design feature will Descriptions Including            withstand the combinations of forces associated with Radionuclide Form, Content and    design basis events and natural hazards. The analyses Quantity                          do not typically provide realistic information on the failure of structural features and are not considered sensitive.
 
Text descriptions regarding the design of transportation packages do not need to be controlled for 3 basic reasons: 1) Part 71 does not authorize possession of byproduct, source or special nuclear material, 2) package design information is required for commerce both domestically and internationally, and 3) the information that could reasonably be expected to be useful to terrorists in planning or executing an attack for transportation packages containing large quantities of byproduct, source or special nuclear material is controlled by other means (e.g., route controls, escort requirements, etc., in accordance with Commission Orders, interim compensatory measures or other applicable requirements).
10 CFR Part 71 Drawings          Potentially Controlled - Withhold diagrams showing detailed design information. Do not withhold drawings which have already been made public through FOIA
                                  requests, hearings, rulemakings, or other public forums.
 
10 CFR Part 71 Transportation    Uncontrolled - An entity wishing to use or fabricate an Quality Assurance Program        approved transportation package must submit a Plan Descriptions                description of its quality assurance program to the NRC.
 
This submittal is assigned a 10 CFR Part 71 docket and reviewed and approved by the staff. The QA program description typically does not contain the type of information found in the generic criteria that would cause it to be controlled. In addition, filing and approving a QA
                                  program description does not authorize possession of byproduct, source, or special nuclear material.
 
10 CFR Part 71 Package            Uncontrolled Information related to radionuclides, form and quantities
 
Attachment 2 Subject                          Discussion and/or typical controls
10 CFR Part 71 Advance          NSIR has programmatic responsibility for reviewing and Notification of Shipments of    controlling this information. 10 CFR 71.97 requires Irradiated Reactor Fuel and      advance notifications to the governor of a State, or the Nuclear Waste                    governors designee, of certain shipments of high-risk radioactive material.
 
10 CFR Part 72 Dry Cask          Uncontrolled - Information provided to the NRC typically Storage Systems -Certificates of consists of analyses to show that the design feature will Compliance (COC) safety          withstand the combinations of forces associated with analysis report information      design basis events and natural hazards. The analyses do not typically provide realistic information on the failure of structural features and are not considered sensitive.
 
Text information in the safety analysis report including design information is not controlled for the following reasons: 1) the design of the casks are simple by nature and the criteria for which they are designed are widely known; 2) most casks designs involve storage of the casks in open areas on concrete pads that are often readily seen from offsite locations; and 3) this information has been historically released to the public to support rulemaking for approved cask designs, and other public outreach efforts.
 
10 CFR Part 72 Dry Cask          Potentially Controlled - Withhold diagrams showing Storage Systems -Drawings        detailed design information. Do not withhold drawings which have already been made public through FOIA
                                requests, hearings, rulemakings, or other public forums.
 
10 CFR Part 72 Package          Uncontrolled Information related to radionuclides, form and quantities
 
Attachment 2 C. Emergency Planning Information Subject                            Discussion and/or typical controls
10 CFR Part 72 Specific ISFSI      Potentially Controlled - Incoming documents are initially Licenses and General Licenses      profiled as nonpublic - staff will review for release upon
- Emergency Planning              request. Most information related to emergency planning will not need to be designated as sensitive. Special attention is needed to determine if information relates to the response by a licensee or government agency to a terrorist attack. Note that some State and local governments consider parts of their emergency plans to be sensitive.
 
D. Security Program Information Subject                            Discussion and/or typical controls
10 CFR Part 72 Specific ISFSI      Potentially Controlled - Information related to security Licenses and General Licenses      programs is generally designated as SGI or SGI-M and is
- Security                        protected in a manner similar to classified confidential information. Security-related information within the inspection and oversight program is withheld from public disclosure under 10 CFR 2.390(d).
E. Vulnerability/Security Assessments/Accident Analyses/Risk Assessments Subject                            Discussion and/or typical controls Vulnerability/Security            Controlled - Vulnerability/security assessments to Assessments for:                  determine the ability of transportation packages, dry cask
-    10 CFR Part 71                storage systems, or ISFSIs to withstand events from transportation package        malevolent acts have been and will continue to be designs                      withheld from public disclosure.
 
-    10 CFR Part 72 dry cask storage systems
-    10 CFR Part 72 independent spent fuel storage installations (ISFSI)
 
Attachment 2 APPENDIX 5 - - EXPORT/IMPORT LICENSING (NRC


==CONTACT==
==CONTACT==
S Please direct any questions about this matter to the technical contacts listed belo /RA Kevin Williams for/ Andrea L. Kock, Acting Director Division of Material Safety, State, Tribal and Rulemaking Programs Office of Nuclear Material Safety and Safeguards Technical Contacts: Paul Goldberg, NMSS/MSTR Raynard Wharton, NMSS/DSFM 301-415-7842 301-415-7497 E-mail: Paul.Goldberg@nrc.gov E-mail: Raynard.Wharton@nrc.gov Kevin Ramsey, NMSS/FCSE Zahira Cruz, NMSS/DUWP 301-415-7506 301-415-3808 E-mail: Kevin.Ramsey@nrc.gov E-mail: Zahira.Cruz@nrc.gov Gary Langlie, OIP 301-287-9076 E-mail: Gary.Langlie@nrc.gov
: OFFICE OF
INTERNATIONAL PROGRAMS (OIP)
    - Withhold information on authorized quantities or actual inventories of radionuclides, above the thresholds in Table 1, mixed oxide materials, and enriched uranium above 6%
      U-235. Release information identifying radionuclides and form.
 
- For quantities above the thresholds in Table 1, mixed oxide materials, and enriched uranium above 6% U-235, withhold information on projected or actual shipment schedules, delivery dates, date required, mode of transport, storage arrangements, or any other related logistical information provided by the licensee in the application or added by the NRC.
 
Attachment 2 Table 1: Radionuclide Screening Threshold Values Radionuclide              Quantity of        Quantity of Concern1 (TBq)      Concern2 (Ci )
                            Am-241                    0.06                1.6 Am-241/Be                    0.06                1.6 Cf-252                    0.02              0.54 Cm-244                    0.05                1.4 Co-60                    0.03              0.81 Cs-137                    0.1                2.7 Gd-153                      1                27 Ir-192                    0.08                2.2 Pm-147                      40                1100
                              Pu-238                    0.06                1.6 Pu-239/Be                  0.06                1.6 Se-75                    0.2                5.4 Sr-90 (Y-90)                    1                27 Tm-170                    20                540
                              Yb-169                    0.3                8.1 Combinations of                  See Footnote radioactive materials listed        Below4 above3
1 The aggregate activity of multiple, collocated sources should be included when the total activity exceeds the quantity of concern.
 
2 TBq values are the regulatory standard and the Curie values are rounded to two significant figures.
 
3 Radioactive materials are to be considered collocated if breaching a common physical security barrier (e.g., a locked door at the entrance to a storage room) would allow access to the radioactive material or devices containing the radioactive material. For sources installed in devices, each device should be considered a separate location.
 
4 If several radionuclides are aggregated, the sum of the ratios of the activity of each source, I
of radionuclide, n, A(i,n), to the quantity of concern for radionuclide n, Q(n), listed for that radionuclide exceeds one. [(aggregated source activity for radionuclide A) ÷ (quantity of concern for radionuclide A)] + [(aggregated source activity for radionuclide B) ÷ (quantity of concern for radionuclide B)] + etc........ >1
 
Attachment 3 Recently Issued NMSS Generic Communications Date    GC No.                    Subject                             
 
==Addressees==
2/11/05  BL-05-01  Material Control and Accounting at  All holders of operating licenses for Reactors and Wet Spent Fuel        nuclear power reactors, decommissioning Storage Facilities                  nuclear power reactor sites storing spent fuel in a pool, and wet spent fuel storage sites.
 
11/23/05 RIS-05-24  Control of Radiation Dose to        All medical licensees.
 
Visitors of Hospital Patients
11/14/05 RIS-05-21  Clarification of the Reporting      All U.S. Nuclear Regulatory Commission Requirements in                    licensees and Part 76 certificate holders
                    10 CFR 20.2201                      authorized to possess licensed material.
 
11/08/05 RIS-05-27  NRC Timeliness Goals,              All 10 CFR Parts 71 and 72 licensees Prioritization of Incoming License  and certificate holders.
 
Applications and Voluntary Submittal of Schedule for Future Actions for NRC Review
10/28/05 RIS-05-22  Requirements for the Physical      All holders of licenses for the possession Protection During Transportation of of special nuclear material (SNM) that Special Nuclear Material of        ship Category II and III quantities of this Moderate and Low Strategic          material.
 
Significance: 10 CFR Part 72 vs.
 
Regulatory Guide 5.59 (1983)
10/07/05 RIS-05-23  Clarification of the Physical      All gamma stereotactic radiosurgery Presence Requirement During        (GSR) licensees.
 
Gamma Stereotactic Radiosurgery Treatments
09/27/05 RIS-04-17, Revised Decay-in-Storage            All licensees regulated under 10 CFR
          Rev. 1  Provisions for the Storage of      Parts 30, 32, 33, 35, 39, and 50.
 
Radioactive Waste Containing Byproduct Material
08/25/05 RIS-05-18  Guidance for Establishing and      All licensees, applicants for licenses, Maintaining a Safety Conscious      holders of certificates of compliance, and Work Environment                    their contractors subject to NRC authority
08/10/05 RIS-05-16  Issuance of NRC Management          All licensees and certificate holders.
 
Directive 8.17, Licensee Complaints Against NRC
                    Employees
08/03/05 RIS-05-15  Reporting Requirements for          All material licensees possessing Damaged Industrial Radiographic    industrial radiographic equipment, Equipment                          regulated under 10 CFR Part 34.
 
Attachment 3 Date    GC No.               Subject                                 


===Enclosures:===
==Addressees==
1. Suggested Markings and Handling for Those Subject to NRC Regulation Screening Criteria for Security-Related Sensitive Unclassified Nonsafeguards Information Note: NRC generic communications may be found on the NRC public Web site, http://www.nrc.gov, under NRC Library/Document Collection RIS 2005-31, Rev. 1 SUBJECT: CONTROL OF SECURITY-RELATED SENSITIVE UNCLASSIFIED NON HANDLED BY INDIVIDUALS, FIRMS, AND ENTITIES SUBJECT TO NRC REGULATION OF THE USE OF SOURCE, BYPRODUCT, AND SPECIAL NUCLEAR MATERIAL DATE: December 26, 2017 ML16196A237  CAC A34010 OFC NMSS/MSTR NMSS/MSTR NMSS/MSTR OGC OGC NMSS/FCSE NMSS/DSFM/ Staff NAME PGoldberg SAtack AMcIntosh ACoggins CSafford KRamsey RWharton DATE 12/15/16 12/5/16 7/15/16 9/12/17 9/18/2017 1/24/17 2/14/17 OFC NMSS/DUWP OE OCIO OCIO OIP NMSS/FSCE NMSS/DUWP NAME ZCruz DFurst Via e-mail DCullison RGagnon PHabighorst CErlanger JTappert DATE 1/26/17 1/23/17 9/18/17 6/30/16 2/09/17 2/13/17 1/26/17 OFC NMSS/DSFM NSIR/DSO QTE NMSS/MSTR NAME MLayton MBailey CHsu KWilliams for AKock DATE 2/14/17 1/27/17 2/22/17 12/26/17  OFFICIAL RECORD COPY RIS 2005-31, Rev. 1 Enclosure 1 SUGGESTED MARKINGS AND HANDLING FOR THOSE SUBJECT TO NRC REGULATION This enclosure provides information on markings suggested by the U.S. Nuclear Regulatory Commission (NRC) for pages of a document that contains security-related sensitive information (Section A) and suggested handling of such documents (Section B).
07/13/05 RIS-05-13 NRC Incident Response and the       All licensees and certificate holders.


Section A: Page Markings Place the overall page marking on the top and bottom of all pages of a document that contains security-related sensitive informatio Note that a cover letter must include the marking if the letter or any attachment to the letter contains security-related informatio If the cover letter itself is nonsensitive, add the following statement to the bottom of the letter: "Documents transmitted herewith contain sensitive, unclassified informatio When separated from the sensitive information, this document is decontrolled." Ensure that the subject line is nonsensitiv Security-Related Information Withhold under 10 CFR 2.390
National Response Plan
07/11/05 RIS-05-12 Transportation of Radioactive      Licensees authorized to possess Material Quantities of Concern      radioactive material that equals or NRC Threat Advisory and            exceeds the threshold values in the Protective Measures System          Additional Security Measures (ASM) for transportation of Radioactive Material Quantities of Concern (RAMQC) under their 10 CFR Part 30, 32, 50, 70, and 71 licenses and Agreement State licensees similarly authorized to possess such material in such quantities under their Agreement State licenses.


Security-Related InformationWithhold under 10 CFR 2.390 RIS 2005-31, Rev. 1 Enclosure 1 Section B: Appropriate Controls for Handling Documents Access: Access is based on "need to know" to perform official licensee, applicant, or other entity function Storage: Documents can be stored openly within licensee, applicant, or other entity facilities but with electronic or other access controls (e.g., key cards, guards, alarms).
07/11/05 RIS-05-11 Requirements for Power Reactor      All holders of operating licenses for Licensees in Possession of          nuclear power reactors and generally Devices Subject to the General      licensed device License Requirements of 10 CFR      vendors.


Mail: Documents should be sent through U.S. Postal Service first class mail, registered mail, express mail, or certified mail in a single opaque envelope with no external markings to indicate contents covered by Title 10 of the Code of Federal Regulations (10 CFR) 2.390, "Public Inspections, Exemptions, Requests for Withholding." Electronic Transmission: Information can be handled over the telephone if the recipient is confirmed as being authorized to access the information, over facsimile if it is confirmed that a recipient who is authorized to access the information will be present to receive the transmission, or over encrypted computer e-mail (using computer software such as SecureZip). Note that the NRC uses SecureZip to encrypt electronic information before transmitting security-related sensitive information by e-mail to licensees and other entitie Users will be prompted for a password to access a free download of the reade RIS 2005-31, Rev. 1 Enclosure 2 SCREENING CRITERIA FOR SECURITY-RELATED SENSITIVE U N C LASSIFIED NON December 26, 2017 INTRODUCTION This enclosure provides the criteria that should be used to determine what information may be disclosed to the public and what information should be withheld to prevent inadvertent assistance to those who might wish to use security-related information for malevolent act As a reminder, the advice in this enclosure applies to all security-related information except for classified information, Safeguards Information, or Safeguards Information - Modified Handlin
31.5
06/10/05 RIS-05-10 Performance-Based Approach for      All industrial radiography licensees and Associated Equipment in 10 CFR      manufacturers and distributors of
                  34.20                              industrial radiography equipment.


==BACKGROUND==
04/18/05 RIS-05-06 Reporting Requirements for          All material licensees possessing Gauges Damaged at Temporary        portable gauges, regulated under 10 CFR
Historically, the U.S. Nuclear Regulatory Commission (NRC) has made large amounts of information, more than required by law, routinely available to the publi However, in the post-September 11, 2001, environment, the NRC, like many other agencies, has found it necessary to be more judicious in what it voluntarily releases so that it does not inadvertently provide assistance to those who might use this information for malevolent act The NRC developed guidance in SECY-04-0191, "Withholding Sensitive Unclassified Information Concerning Nuclear Power Reactors from Public Disclosure," dated October 19, 2004, and advised licensees in NRC Regulatory Issue Summary (RIS) 2005-26, "Control of Sensitive Unclassified Non-Safeguards Information Related to Nuclear Power Reactors," dated November 7, 2005, on the conduct of a broad security/sensitivity review to assess whether documents associated with reactor licensees should be made publicly available in the first instance as a matter of administrative discretio The NRC has now developed the guidance in this enclosure, which addresses the criteria for screening from public disclosure certain types of information associated with various classes of materials licensees, applicants, certificate holders, and other entitie Consistent with the Commission's Staff Requirements Guidance on SECY 05-0091, "Task Force Report on Public Disclosure of Security-Related Information," dated June 30, 2005, the screening criteria in these guidelines "...should follow the principles for withholding security-related information under FOIA." Although the NRC developed these security-related sensitive information screening criteria with the principles of the Freedom of Information Act (FOIA) in mind, a review for security-related sensitive information does not substitute for a FOIA revie The NRC will continue to review and process FOIA requests independently from the security-related sensitive information review proces RIS 2005-31, Rev. 1 ORGANIZATION OF THIS ENCLOSURE Table 1 outlines the contents of this enclosure:
                  Job Sites                          Part 30.
* Section 1 indicates the criteria under which documents may be released to the public without any further screenin However, Section 1 also notes specific requirements for withholding documents in certain cases even if the documents meet the criteri
 
* Section 2 contains general criteria for screening documents that do not meet the criteria in Section
04/14/05 RIS-05-04 Guidance on the Protection of      All holders of operating licenses or Unattended Openings that            construction permits for nuclear power Intersect a Security Boundary or    reactors, Area                                research and test reactors, decommissioning reactors with fuel on site, Category 1 fuel cycle facilities, critical mass facilities, uranium conversion facility, independent spent fuel storage installations, gaseous diffusion plants, and certain other material licensees.
* Appendices 1-5 contain guidance, in addition to that in Section 2, for screening documents specific to fuel cycle facilities; decommissioning and low-level waste sites; medical, industrial, and academic uses of nuclear materials; spent fuel/transportation; and export/import, respectivel Table 1 Stakeholders Using This Guidance and Applicable Sections of the Guidance1 STAKEHOLDER APPLICABLE SECTION AND APPENDIX Fuel cycle facilities, including milling, conversion, enrichment, and fuel fabrication facilities Sections 1 and 2 for general information and Appendix 1 Decommissioning and low-level waste sites Sections 1 and 2 for general information and Appendix 2 Medical, industrial, and academic uses of nuclear materials Sections 1 and 2 for general information and Appendix 3 10 CFR Part 71 certificate holders and registered users Sections 1 and 2 for general information and Appendix 4, Parts A, B, and E Special attention should be given to the guidance on detailed design drawings and control of the registered users list for transportation packages. 1 With regard to high-level waste, Subpart J, "Procedures Applicable to Proceedings for the Issuance of Licenses for the Receipt of High-Level Radioactive Waste at a Geologic Repository," of Title 10 of the Code of Federal Regulations (10 CFR) Part 2, "Agency Rules of Practice and Procedure," contains requirements that an applicant of the proposed geological repository at Yucca Mountain in Nevada must follow when making information publicly available through the Licensing Support Networ RIS 2005-31, Rev. 1 . STAKEHOLDER APPLICABLE SECTION AND APPENDIX 10 CFR Part 71 quality assurance program (QA) holders Sections 1 and 2 for general information and Appendix 4, Parts A, B, and E
 
02/28/05 RIS-05-03 10 CFR Part 40 Exemptions for       All persons possessing aircraft Uranium Contained in Aircraft      counterweights containing uranium under Counterweights - Storage and       the exemption in Repair                              10 CFR 40.13(c)(5).
11/17/05  IN-05-31 Potential Non-conservative Error in All licensees using the KENO V.a or Preparing Problem-dependent        KENO-VI criticality code module in Cross Sections for use with the     Version 5 of the Standardized Computer KENO V.a or KENO-VI Criticality    Analyses for Licensing Evaluation Code                                (SCALE) software developed by Oak Ridge National Laboratory (ORNL).
10/31/05  IN-05-28 Inadequate Test Procedure Fails    All licensees authorized to possess a to Detect Inoperable Criticality    critical mass of special nuclear material.
 
Accident Alarm Horns
10/07/05  IN-05-27 Low Dose-Rate Manual                All medical licensees.
 
Brachytheraphy Equipment Related Medical Events
 
Attachment 3 Date        GC No.                  Subject                               
 
==Addressees==
07/29/05    IN-05-22  Inadequate Criticality Safety        All licensees authorized to possess a Analysis of Ventilation Systems at   critical mass of special nuclear material.


Based on the NRC staff's experience, most QA program holder submittals do not contain sensitive information as defined in this RI However, attention should be given to the guidance on detailed design drawings and control of the registered users list for transportation packages. 10 CFR Part 72 certificate holders, general licensees, and specific licensees Sections 1 and 2 for general information and Appendix 4, Parts A, B, C, D, and E Export and Import Sections 1 and 2 for general information and Appendix 5 RIS 2005-31, Rev. 1 . SECTION 1: GENERAL SCREENING CRITERIA FOR DOCUMENTS TO BE RELEASED TO THE PUBLIC Low-Hazard Information Documents Documents that meet the following criteria may be released without the need for any further screening, except as specifically noted: (1) Documents that specify the quantities of radionuclides located in any single location if those quantities are below the International Atomic Energy Agency's Category 3 quantities (as listed in Table 2 of these guidelines). However, the staff will withhold from public access the exact location of the material even if material levels are below the Category 3 threshold value Thus, the staff will release a document if it indicates a general location (e.g., in a certain building), but if the document gives the exact location (e.g., "Room 12"), the staff will redact the exact location unless the location is intuitively obviou (2) Documents from licensees (other than fuel cycle licensees) authorized to possess radionuclides that are not listed in Table However, the staff will withhold information on the exact location of this radioactive materia (3) Uranium recovery documents describing or discussing yellow cake and mill tailings onl (4) Current information on decommissioning materials sites with diffuse contamination onl However, check for other active licenses or radioactive material at the site (e.g., high-activity reactor components and high-activity waste) and screen any related documents separatel (5) Documents concerning terminated licenses for which all radioactivity except diffuse contamination has been remove However, screen old files for operational information that may contain sensitive informatio B. Information Readily Available to the Public Elsewhere (Based on Reactor Criteria Approved by the Commission (SECY-04-0191))
Fuel Cycle Facilities
The following criteria apply to information on materials facilities: (1) If the information is available from open source literature such as text books, Web sites, or other sources, an NRC decision to withhold the information may decrease the openness of the agency's regulatory programs without obstructing an adversary. (2) Information clearly visible from locations accessible to the public, including general (low-resolution) drawings of the site and adjacent areas, is generally release RIS 2005-31, Rev. 1 . SECTION 2: GENERAL SCREENING CRITERIA FOR DOCUMENTS TO BE WITHHELD FROM PUBLIC RELEASE This section lists the general screening criteria that the NRC staff will use for withholding information from the public, as well as the information that the staff will releas A. Facilities Where Licensed Material May Be Located (1) The NRC staff will withhold the following information related to locations and quantities of radioactive material that equal or exceed the threshold values listed in Table 2: (a) information for identifying the exact locations of radioactive material The staff will release a document if it indicates a general location (e.g., in a certain building), but if the document gives the exact location (e.g., "Room 12"), the staff will withhold it unless the location is intuitively obviou (b) information on possession limits or actual inventories of radionuclides (c) manufacturers and model numbers of sealed sources and devices (d) for fuel cycle facilities, information on possession limits and inventories of enriched uranium and plutonium exceeding a critical mass (e) lists of licensees registered to use transportation packages approved by the NRC under 10 CFR Part 71, "Packaging and Transportation of Radioactive Material" (2) The NRC staff will release the following information: (a) identification of radionuclides and form (b) 10 CFR Part 71 certificates and information under 10 CFR Part 72, "Licensing Requirements for the Independent Storage of Spent Nuclear Fuel and High-Level Radioactive Waste, and Reactor-Related Greater Than Class C Waste," related to radionuclide form, content, quantities, model numbers, and locations of independent spent fuel storage installations regardless of the quantities (c) event reports involving lost, stolen, abandoned, or found radioactive material, regardless of whether the radioactive material equals or exceeds the quantities specified in Table 2 Design of Structures/Equipment (1) The NRC staff will withhold the following information for design of structures and equipment (site specific):
    06/23/05    IN-05-17  Manual Brachytherapy Source          All medical licensees authorized to Jamming                              possess a Mick applicator.
RIS 2005-31, Rev. 1 . (a) information related to security requirements, information from analyses that could reveal vulnerabilities, reports of specific or predicted failures, and any other information that could reasonably be expected to be useful to potential adversaries (b) information related to predicted structural failures that could be useful to potential adversaries (see Appendix 1 for specific guidance on fuel cycle facilities) (2) The NRC staff will release the following information: Notwithstanding paragraph B(1)(b) above, the NRC staff will release information on the design of structures provided to the NRC, which typically consists of analyses to show that the design feature will withstand the combinations of forces associated with design-basis events and natural hazard Such analyses do not typically provide realistic information on the failure of structural features and, except for fuel cycle facilities, are not considered sensitiv C. Nearby Facilities The NRC staff will withhold information related to nearby facilities if the information might reasonably be helpful to those planning a malevolent ac D. Design Information: Spent Fuel Casks, Transportation Packages, and Other Information (1) The NRC staff will withhold information related to nonsite-specific spent fuel casks, transportation packages, sealed source and device catalog and files, and other such items, including the following types of information: (a) drawings that show detailed design information (b) design/performance information that indicates vulnerabilities that could reasonably be expected to be useful to potential adversaries (2) The NRC staff will release text information describing how spent fuel casks, transportation packages and devices/sources are constructe E. Emergency Planning/Fire Protection Information (1) In regard to emergency planning/fire protection information, the NRC staff will withhold the following information:
(a) the document in its entirety if it contains site-specific information that would be useful to an adversary in planning a malevolent act The NRC staff will review any considerations or requests for release on a case-by-case basi As part of the review, the staff will determine whether the State or local governments are withholding related information as sensitiv RIS 2005-31, Rev. 1 . (b) detailed information describing response capabilities (e.g., personnel and resources available) (c) information and drawings identifying the locations of radioactive material and onsite routes and pathways to or from the locations of radioactive material, especially detailed descriptions of areas not normally visible to the public (d) information that State or local government agencies have designated as sensitive F. Security Program Information Much information related to security programs at fuel cycle facilities and other materials facilities with high risk sources has already been designated to be withheld as classified information, Safeguards Information, or proprietary informatio In addition to withholding classified information, Safeguards Information, or proprietary information, the NRC staff will withhold any security information that could reasonably be expected to be useful to potential adversarie In addition, certain categories of information are protected under 10 CFR Part 37, "Physical Protection of Category 1 and Category 2 Quantities of Radioactive Material." G. Vulnerability and Security Assessments, Accident Analyses, Safety Analyses, and Risk Assessments


(1) The NRC staff will withhold the following information:
05/17/05    IN-05-13  Potential Non-conservative Error in  All licensees using the Keno-V.a criticality Modeling Geometric Regions in         code module in Standardized Computer the                                   Analyses for Licensing Evaluation Keno-v.a Criticality Code            (SCALE) software developed by Oak Ridge National Laboratory (ORNL)
(a) assessments that use a malevolent event as an initial condition (e.g., vulnerability/security analysis) (b) descriptions of structural features related to potential malevolent acts (c) detailed information and drawings describing the specific locations of equipment that is relied upon for safety or security (d) discussions of safety features or mitigation strategies within vulnerability/security assessments (e) any analysis that identifies which events have significant consequences and which events do not (f) information related to security events and any information that could be useful to an adversary as a result of the identification of vulnerabilities (2) The NRC staff will release typical accident analyses that involve conservative models to demonstrate a facility's ability to respond to design-basis events (i.e., nonsecurity-related events), unless the analysis could reasonably be expected to be useful to an adversar RIS 2005-31, Rev. 1 . APPENDICES 1-5: ADDITIONAL GUIDANCE FOR SECURITY-RELATED SENSITIVE INFORMATION SCREENING REVIEWS Appendices 1-5 contain additional guidance for screening documents for security-related sensitive information specific to types of facilities and uses of material These appendices cover the following topics, respectively: (1) fuel cycle facilities, including milling, conversion, enrichment, and fuel fabrication facilities (2) decommissioning and low-level waste sites (3) medical, industrial, and academic uses of nuclear materials (4) spent fuel/transportation (10 CFR Part 71 certificate holders and registered users; 10 CFR Part 71 QA program holders; and 10 CFR Part 72 certificate holders, general licensees, and site-specific licensees) (5) export/import licensing RIS 2005-31, Rev. 1 . APPENDIX 1 FUEL CYCLE FACILITY REVIEWS NRC Contact: Division of Fuel Cycle Safety, Safeguards, and Environmental Review, Office of Nuclear Material Safety and Safeguards A. Descriptions of Facilities Where Licensed Material May Be Located (1) Withhold information on the quantity of enriched uranium or plutonium authorized in possession limits, or possessed in actual inventories, when the quantity exceeds a critical mas Information identifying radionuclides and chemical/physical forms authorized may be release (2) Withhold information related to military contract operations, even if it is publicly available elsewher (3) Withhold information that identifies the exact locations (e.g., detailed floor plans)
    05/17/05    IN-05-12  Excessively Large Criticality Safety All licensees authorized to possess a Limits Fail to Provide Double        critical mass of special nuclear material.
of radioactive and hazardous material whose release or theft could allow adversaries to create a diversion for theft of material or result in a significant consequenc Planning a sabotage activity (e.g., bombing a building) would likely require less detailed information than planning a theft, for which exact locations would likely be necessar (4) Withhold information about the design of structures that consists of analyses to show that design features will withstand the forces associated with both security-related scenarios and nonsecurity-related scenarios, such as tornadoes, high winds, and snow load Analyses indicating forces associated with nonsecurity regulatory requirements could be useful in planning terrorist activitie For example, information related to seismic loadings could be used to determine blast loads for bomb (5) Withhold detailed design information, including diagrams showing dimensions, material properties, and descriptions of how the facility/equipment is constructe Additionally, withhold process information that could potentially allow an adversary to access radioactive or hazardous materials or gain knowledge of detailed information or potential weaknesses of systems designed to ensure safe operations (necessary to prevent or mitigate accidents) at fuel cycle facilitie B. Nonsite-Specific Design Information There is no additional fuel cycle facility guidance for this categor C. Emergency Planning/Fire Protection Information (1) Withhold site-specific information that would be useful to an adversary planning a malevolent ac This includes detailed information or potential weaknesses of systems designed to ensure safe operations (necessary to prevent or mitigate accidents) at fuel cycle facilitie Withhold detailed information and drawings of areas not normally visible to the publi This includes information identifying routes to or from the locations of radioactive and hazardous material whose release or theft could allow adversaries to achieve their goal RIS 2005-31, Rev. 1 . (2) Withhold information that State or local government agencies have designated as sensitiv (3) Withhold any detailed accident analysis that identifies which accidents have significant consequences and which accidents do no Accident analysis information can appear in many documents (e.g., an emergency plan, fire protection plan, integrated safety analysis summary, environmental report or assessment). General information may be releasable, but details should be withhel (4) Withhold site-specific emergency action levels used to declare emergencie (5) Withhold detailed information about response capabilities (e.g., personnel and resources available). D. Security Program Information (1) Much information related to security programs at fuel cycle facilities and other materials facilities with high-risk sources has already been designated to be withheld as proprietary information, classified information, or Safeguards Informatio (2) Withhold information on security equipment and programs, descriptions of equipment and radioactive or hazardous materials, and accident studies that closely resemble programs, equipment, radioactive or hazardous materials, and studies at other active licensee sites if that information would reveal vulnerabilities or would be expected to be useful to adversaries at active licensee site E. Vulnerability and Security Assessments and Accident Analyses (1) Withhold detailed information and drawings describing the exact locations of radioactive or hazardous materials or that would allow adversaries to gain knowledge of detailed information or potential weaknesses of systems designed to ensure safe operations (necessary to prevent or mitigate accidents) at fuel cycle facilitie (2) Withhold any detailed accident analysis that contains accident sequences, identifies accident consequences, identifies systems and components that are relied upon for safety, or identifies which accidents have significant consequences and which accidents do no Accident analysis information can appear in many documents (e.g., an emergency plan, fire protection plan, integrated safety analysis summary, environmental assessment). General information may be acceptable, but details should be withhel RIS 2005-31, Rev. 1 . (3) Withhold information identifying the exact locations (e.g., detailed floor plans) of radioactive and hazardous material whose release or theft could allow adversaries to create a diversion for the theft of material or could result in a significant consequenc Planning a sabotage activity (e.g., bombing a building)
would likely require less detailed information than planning a theft, for which exact locations would likely be necessar RIS 2005-31, Rev. 1 . APPENDIX 2 DECOMMISSIONING AND LOW-LEVEL WASTE SITE REVIEW NRC Contact: Division of Decommissioning, Uranium Recovery, and Waste Programs (DUWP), Office of Nuclear Material Safety and Safeguards DECOMMISSIONING AND LOW-LEVEL WASTE SITE CRITERIA Note that U.S. Nuclear Regulatory Commission (NRC) Regulatory Issue Summary 2005-26, "Control of Sensitive Unclassified Nonsafeguards Information Related to Nuclear Power Reactors," dated November 7, 2005, informs licensees of the appropriate handling of sensitive unclassified nonsafeguards information for decommissioning reactor The following criteria apply:
(1) "Diffuse contamination" consists of soil, ground water, and surface contamination on and in buildings, including that which is on equipment, floors, walls, and other surface It also could include volumetrically contaminated materials whose concentrations are sufficiently lo For determining whether only diffuse contamination is present at a decommissioning site, apply the following information derived from the International Atomic Energy Agency's Code of Conduct on the Safety and Security of Radioactive Sources (Code of Conduct) (ADAMS Accession Number ML043270621) (see Table 2). Category 3 sources in the Code of Conduct are typically about 1 curi (The NRC is developing a rulemaking to control the import and export of such sources.) At a concentration of 2,000 picocuries per gram, which is well above the concentrations of plutonium typically found in soil at sites undergoing decommissioning, this equates to approximately 15,000 cubic feet of material, which is well in excess of the amount a terrorist could reasonably use for malevolent purpose For materials at the Class A limit for plutonium (10 nanocuries per gram) in Title 10 of the Code of Federal Regulations (10 CFR) Part 61, "Licensing Requirements for Land Disposal of Radioactive Waste," the volume of waste that would contain the Category 3 activity limit for plutonium would be 3,000 cubic feet, which is also in excess of the amount a terrorist could reasonably use. However, for cobalt-60, the amount of loose material or rubble at the Class A limit (700 curies per cubic meter) containing the Category 3 quantity (about 1 curie) would be less than 0.1 cubic foot, which is an amount that could easily be used for malevolent purposes because of its small volum Reviewers should apply values taking into consideration the examples given above in determining whether a decommissioning site is within the threshold value RIS 2005-31, Rev. 1 . GENERAL GUIDANCE FOR DECOMMISSIONING AND LOW-LEVEL WASTE SITES Most sites undergoing decommissioning are expected to be below the threshold values in Table 2, such that most licensing documents can be release Sensitivity reviews must be conducted on documents related to low-level waste storage, safety, and security systems and procedure Reviews should focus on determining whether the information contained in these documents could be useful to an adversary in planning a terrorist ac Examples include the location and security arrangements for high-activity waste, the location of highly activated components, or the transportation security arrangements for high-activity waste or activated component For fuel cycle, materials, and spent fuel pool and independent spent fuel storage installation licensees that are undergoing decommissioning, issues that are not unique to decommissioning (e.g., descriptions of plant processes, vulnerability/security assessments) should be reviewed with regard to Appendices 1, 3, and 4, respectivel A. Descriptions of Facilities Where Licensed Material May Be Located (1) Withhold information identifying the exact locations of radioactive material (e.g., detailed drawings or maps of facilities, room numbers and locations, and specific locations of waste storage/processing operations). (2) Withhold design information that could reasonably be expected to be useful to potential adversarie Examples include detailed drawings or maps showing the locations of security measures/operations and infrastructure, locations of critical site infrastructure (electrical or power systems), and the design of facilities that could be useful in developing approaches to breech the facilit (3) Withhold procedures for the receipt of low-level waste at a waste facility or processing sit (4) For transportation package information provided in connection with decommissioning or low-level waste disposal licensing, consider Appendix 4 for sensitivity of the informatio RIS 2005-31, Rev. 1 . APPENDIX 3 REVIEWS OF MEDICAL, INDUSTRIAL, AND ACADEMIC USERS OF NUCLEAR MATERIALS NRC Contact: Division of Material Safety, State, Tribal, and Rulemaking Programs, Office of Nuclear Material Safety and Safeguards Descriptions of Facilities Where Licensed Material May Be Located (Equals or Exceeds the Threshold Values in Table 2) (1) Copies of Licenses and Mailing Lists (a) For copies of licenses, release authorized radionuclides and for Withhold authorized quantitie Withhold manufacturers and model numbers of sealed sources and device Withhold information that identifies buildings or rooms where radioactive material is locate (This may be in the license condition that specifies the authorized location.) (b) Withhold mailing lists that are compiled for security purposes or that identify facilities that may have quantities of radioactive material that equals or exceeds the threshold values listed in Table 2 or vulnerable facilities such as those that possess material that equals or exceeds the threshold values in Table 2 but do not aggregate the materia (c) Release individual mailing addresses and the street address where material is located (normally included on licenses). (2) Locations of Radioactive Material (a) Withhold lists of authorized or actual inventories of radionuclide (b) Withhold building numbers and room numbers (other than mailing addresses) or similar information that identifies the locations of materia (c) Withhold site drawings that identify individual buildings on the licensee sit (d) Withhold building drawings that identify the location of radioactive material or onsite pathways or routes to and from locations of radioactive materia (e) Release individual mailing addresses and street addresse RIS 2005-31, Rev. 1 . (3) Site-Specific Design/Description of Structures, Equipment, and Operating Procedures (a) Most descriptions of structures, equipment, and procedures may be released if they are not security relate (b) Withhold drawings of buildings, rooms, and devices in which radioactive material is located. (c) Withhold manufacturers and model numbers of sealed sources and device (d) Withhold information on security programs, guards, access controls, key cards, alarms, barriers, chains, and lock B. Nonsite-Specific Design Information: Sealed Source and Device Catalog (1) Release information on addresses of manufacturers/distributor (2) Establish a password system for sensitive information for users who have with a valid need to know and who have agreed to protect the information from unauthorized disclosur C. Emergency Planning/Fire Protection Information (1) Release general descriptions of emergency procedures for safety-related events, such as radioactive material spills, releases, contamination, and fire (2) Withhold information on routes to and from locations of radioactive materia (3) Withhold information related to responses to security events and malevolent event (4) Withhold information on responses of offsite law enforcement official (5) Withhold information designated by State or local governments as sensitiv D. Security Program Information (1) For applicable licensees- (a) Under Title 10 of the Code of Federal Regulations (10 CFR) 37.43(d), licensees limit access to, and unauthorized disclosure of, their security plan, implementing procedures, and the list of individuals that have been approved for unescorted acces RIS 2005-31, Rev. 1 . (b) Under 10 CFR 37.77(f), individuals who receive schedule information related to shipments of Category 1 material, as identified in Appendix A, "Category 1 and Category 2 Radioactive Materials," to 10 CFR Part 37, "Physical Protection of Category 1 and Category 2 Quantities of Radioactive Material," are required to limit access to, and unauthorized disclosure of, that information. (2) Withhold any security information that is related to malevolent events or suspicious incidents or that could be useful to potential adversarie Examples include information on guards, access controls, key cards, alarms, barriers, chains, and locks. Vulnerability and Security Assessments and Accident Analyses There is no additional guidance for medical, industrial, and academic users of nuclear material for this categor RIS 2005-31, Rev. 1 . APPENDIX 4 SPENT FUEL/TRANSPORTATION REVIEWS NRC Contact: Division of Spent Fuel Management, Office of Nuclear Material Safety and Safeguards A. Descriptions of Facilities Where Licensed Material Is Located SUBJECT DISCUSSION AND TYPICAL CONTROLS 10 CFR Part 72 Specific Independent Spent Fuel Storage Installation (ISFSI)
Licenses and General Licenses - Text descriptions of the following: general description, site characteristics, principal design criteria, storage cask design, operations, waste management, radiation protection, accident analyses, conduct of operations, operating controls and limits, and quality assurance (QA) Release-Information provided to the U.S. Nuclear Regulatory Commission (NRC) for specific ISFSI licenses and general licenses that typically consists of analyses to show that the design feature will withstand the combinations of forces associated with design-basis events and natural hazard The analyses do not typically provide realistic information on the failure of structural features and are not considered sensitive. 10 CFR Part 72 Specific ISFSI Licenses and General Licenses - Drawings and locations of related hazards Potentially Withhold-Decisions on the control of information that shows the plant site and buildings are dependent on the level of detai Information on aspects clearly visible from locations accessible to the public near the site is generally release This includes general (low resolution) layout drawings of the site and adjacent area Drawings showing details such as the specific locations of equipment within buildings, doorways, stairways, storage areas, and other such areas are to be withheld under 10 CFR 2.390(d). Drawings showing locations of hazards in relation to the ISFSI are also withhel A text description of the hazards in relation to the ISFSI is uncontrolled and will not be reviewed. 10 CFR Part 72 Specific ISFSI Licenses and General Licenses


- Nearby industrial, transportation, and military facilities Withhold-Information related to nonnuclear facilities located near the ISFSI such as pipeline data (usually withheld per the U.S. Department of Transportation (DOT)) and chemical facilities (some data withheld per the U.S. Environmental Protection Agency (EPA)) is controlle Other information may be protected by other Federal agencies (e.g., U.S. Department of Homeland Security, Federal Energy Regulatory Commission, EPA, DOT). 10 CFR Part 72 Specific ISFSI Licenses and General Licenses Release-Information related to radionuclides, form, and quantitie RIS 2005-31, Rev. 1 . B. Nonsite-Specific Design Information: Transportation Packages and Spent Fuel Casks SUBJECT DISCUSSION AND TYPICAL CONTROLS 10 CFR Part 71 Transportation Package Descriptions
Contingency at Fuel Cycle Facility
    04/07/05    IN-05-10  Changes to 10 CFR Part 71            All 10 CFR Part 71 licensees and Packages                              certificate holders.


- Text descriptions, including radionuclide form, content, and quantity Release-Information provided to the NRC typically consists of analyses to show that the design features will withstand the combinations of forces associated with design-basis events and natural hazard The analyses do not typically provide realistic information on the failure of structural features and are not considered sensitive. Text descriptions on the design of transportation packages do not need to be controlled because (1) 10 CFR Part 71 does not authorize possession of byproduct, source, or special nuclear material, (2) package design information is required for commerce both domestically and internationally, and (3) the information that "could reasonably be expected to be useful to terrorists in planning or executing an attack" for transportation packages containing large quantities of byproduct, source, or special nuclear material is controlled by other means (e.g., route controls, escort requirements, and other means in accordance with the Commission's orders, interim compensatory measures, or other applicable requirements). 10 CFR Part 71 Drawings Potentially Withhold-Withhold diagrams showing detailed design informatio Do not withhold drawings that have already been made public through Freedom of Information Act (FOIA) requests, hearings, rulemakings, or other public forums. 10 CFR Part 71 Transportation QA Program Plan Descriptions Release-An entity wishing to use or fabricate an approved transportation package must submit a description of its QA program to the NR This submittal is assigned a 10 CFR Part 71 docket and reviewed and approved by the staf The QA program description typically does not contain the type of information found in the generic criteria that would cause it to be controlle In addition, filing and approving a QA program description does not authorize possession of byproduct, source, or special nuclear materia RIS 2005-31, Rev. 1 . SUBJECT DISCUSSION AND TYPICAL CONTROLS 10 CFR Part 71 Package Information (as related to radionuclides and their form and quantities) Release 10 CFR Part 71 Advance Notification of Shipments of Irradiated Reactor Fuel and Nuclear Waste Release unless waste shipment is Category 1 material subject to 37.77(f) -- Under 10 CFR 71.97, the NRC requires advance notifications to the governor of a State, or the governor's designee, and to Tribal officials, of certain shipments of high-risk radioactive materia Notification of shipments of irradiated reactor fuel in quantities less than those subject to 73.37(f) has been moved to 73.35, which requires licensees to follow the requirements of Subpart D of Part 37. 10 CFR Part 72 Dry Cask Storage Systems
040/01/05    IN-05-07  Results of HEMYC Electrical          All holders of operating licenses for Raceway Fire Barrier System Full      nuclear power reactors, except those who Scale Fire Testing                    have permanently ceased operations and have certified that fuel has been permanently removed from the reactor vessel, and fuel facilities licensees.


- Certificates of Compliance safety analysis report information Release-Information provided to the NRC typically consists of analyses to show that the design features will withstand the combinations of forces associated with design-basis events and natural hazard The analyses do not typically provide realistic information on the failure of structural features and are not considered sensitiv Text information in the safety analysis report, including design information, is not controlled because (1) the design of the casks are simple by nature, and the criteria for which they are designed are widely known, (2) most cask designs involve storage of the casks in open areas on concrete pads that are often readily seen from offsite locations, and (3) this information has been historically released to the public to support rulemaking for approved cask designs and other public outreach efforts. 10 CFR Part 72 Dry Cask Storage Systems - Drawings Potentially Withhold-Withhold diagrams showing detailed design informatio Do not withhold drawings that have already been made public through FOIA requests, hearings, rulemakings, or other public forums. 10 CFR Part 72 Package Information (as related to radionuclides and their form and quantities) Release RIS 2005-31, Rev. 1 . C. Emergency Planning Information SUBJECT DISCUSSION AND TYPICAL CONTROLS 10 CFR Part 72 Specific ISFSI Licenses and General Licenses
03/10/05    IN-05-05   Improving Material Control and       All licensees authorized to possess a Accountability Interface with        critical mass of special nuclear material.
- Emergency planning Release-Most information related to emergency planning will not need to be designated as sensitiv Special attention is needed to determine whether information relates to the response by a licensee or Government agency to a terrorist attac Note that some State and local governments consider parts of their emergency plans to be sensitiv D. Security Program Information SUBJECT DISCUSSION AND TYPICAL CONTROLS 10 CFR Part 72 Specific ISFSI Licenses and General Licenses
- Security Potentially Withhold-Information related to security programs is generally designated as Safeguards Information or Safeguards Information-Modified Handling and is protected in a manner similar to classified confidential informatio Security-related information within the inspection and oversight program is withheld from public disclosure under 10 CFR 2.390(d). E. Vulnerability and Security Assessments, Accident Analyses, and Risk Assessments SUBJECT DISCUSSION AND TYPICAL CONTROLS Vulnerability/Security Assessments - 10 CFR Part 71 transportation package designs - 10 CFR Part 72 dry cask storage systems - 10 CFR Part 72 ISFSIs Withhold-Vulnerability/security assessments used to determine the ability of transportation packages, dry cask storage systems, or ISFSIs to withstand events from malevolent acts have been and will continue to be withheld from public disclosur RIS 2005-31, Rev. 1 APPENDIX 5 EXPORT/IMPORT LICENSING NRC Contact: Office of International Programs (1) On a case-by-case basis that documents compelling reasons, withhold information on authorized quantities or actual inventories of radionuclides that equal or exceed the threshold values in Table 2, mixed-oxide materials, and enriched uranium above 6 percent unranium-23 Release information identifying radionuclides and for (2) For quantities that equal or exceed the threshold values in Table 2, withhold information on projected or actual shipment schedules, delivery dates, date required, mode of transport, storage arrangements, or any other related logistical information provided by the licensee in the application or added by the U.S. Nuclear Regulatory Commissio RIS 2005-31, Rev. 1 Table 2 Radionuclide Screening Threshold Values RADIONUCLIDE QUANTITY OF CONCERN1 (TBq) QUANTITY OF CONCERN2 (Ci)Am-241 0.06 1.6 Am-241/Be 0.06 1.6 Cf-252 0.02 0.54 Cm-244 0.05 1.4 Co-60 0.03 0.81 Cs-137 0.1 2.7 Gd-153 1 27 Ir-192 0.08 2.2 Pm-147 40 1080 Pu-238 0.06 1.6 Pu-239/Be 0.06 1.6 Ra-226 0.04 1.1 Se-75 0.2 5.4 Sr-90 (Y-90) 1 27 Tm-170 20 540 Yb-169 0.3 8.1 Combinations of radioactive materials listed above3 See footnote below4 1 The activity of multiple aggregated sources should be included when the total activity exceeds the quantity of concern. 2 Terabecquerel (TBq) values are the regulatory standar Curie values are provided for convenience only and have been rounded to two significant figures. 3 Radioactive materials are to be considered "aggregated" if breaching a common physical security barrier (e.g., a locked door at the entrance to a storage room) would allow access to the radioactive material or devices containing the radioactive materia See the definition of "aggregated" in 10 CFR Part 37 and related guidance in NUREG-2155, "Implementation Guidance for 10 CFR Part 37, 'Physical Protection of Category 1 and Category 2 Quantities of Radioactive Material, '" Revison 1, January, 201 For calculations concerning multiple sources or multiple radionuclides, the licensee must use the following sum-of-fractions methodology to evaluate combinations of multiple sources or multiple radionuclides when determining whether a location equals or exceeds the threshold values and, therefore, is subject to the guidance in this document:
RIS 2005-31, Rev. 1 (1) If multiple sources of the same radionuclide or multiple radionuclides are aggregated at a location, the licensee must determine the sum of the ratios of the total activity of each of the radionuclides to verify whether the activity at the location is less than the values in Table If the calculated sum of the ratios, using the equation below, is greater than or equal to 1.0, the applicable recommendations of this RIS appl (2) First, determine the total activity for each radionuclide from Table 2 by adding the activity of each individual source, the material in any device, and any loose or bulk material that contains the radionuclid Then, use the equation below to calculate the sum of the ratios by inserting the total activity of the applicable radionuclides from Table 2 in the numerator of the equation and the corresponding threshold values from Table 2 in the denominator of the equatio The licensee must perform the calculations in metric values (i.e., TBq); the numerator and denominator values must be given in the same unit .0 =1 where: R1 = total activity for radionuclide 1 R2 = total activity for radionuclide 2 Rn = total activity for radionuclide n AR1 = threshold value for radionuclide 1 AR2 = threshold value for radionuclide 2 ARn = activity threshold value for radionuclide n


Criticality Safety Activities at Fuel Cycle Facilities Note: NRC generic communications may be found on the NRC public website at http://www.nrc.gov, under Electronic Reading Room/Document Collections.
}}
}}


{{RIS-Nav}}
{{RIS-Nav}}

Latest revision as of 07:24, 22 November 2019

Official Exhibit - Mandatory Hearing - AES000056-MA-BD01 - NRC Regulatory Issue Summary 2005-31, Control of Security-Related Sensitive Unclassified Non-Safeguards Information Handled by Individuals, Firms & Entities Subject to NRC Regulatio
ML110310854
Person / Time
Site: Eagle Rock
Issue date: 12/22/2005
From: Chris Miller
NRC/NMSS/IMNS
To:
Atomic Safety and Licensing Board Panel
SECY RAS
Shared Package
ML110140853 List:
References
70-7015-ML, AES000056, ASLBP 10-899-02-ML-BD01, RAS 19430 RIS-05-031
Download: ML110310854 (29)


Nuclear Regulatory Commission Exhibit # - AES000056-MA-BD01 Docket # - 07007015 Identified: 01/25/2011 Admitted: 01/25/2011 Withdrawn:

Rejected: Stricken:

Exh. AES000056 UNITED STATES

NUCLEAR REGULATORY COMMISSION

OFFICE OF NUCLEAR MATERIAL SAFETY AND SAFEGUARDS

WASHINGTON, D.C. 20555-0001 December 22, 2005 NRC REGULATORY ISSUE SUMMARY 2005-31 CONTROL OF SECURITY-RELATED SENSITIVE UNCLASSIFIED NON-

SAFEGUARDS INFORMATION HANDLED BY INDIVIDUALS, FIRMS,

AND ENTITIES SUBJECT TO NRC REGULATION OF THE USE OF

SOURCE, BYPRODUCT, AND SPECIAL NUCLEAR MATERIAL

ADDRESSEES

All licensees, certificate holders, applicants, and other entities (hereafter referred to as licensees and others) subject to regulation by the U.S. Nuclear Regulatory Commission (NRC)

of the use of source, byproduct, and special nuclear material, except for those as covered by provisions of Regulatory Issue Summary (RIS) 2005-26 for nuclear power reactors.

INTENT

This RIS sets forth procedures that licensees and others are encouraged to follow when handling documents and/or when submitting documents to the NRC that contain security- related sensitive information, other than classified or safeguards information, that could be useful, or could reasonably be expected to be useful, to a terrorist in a potential attack.

Attached to this RIS are screening criteria that licensees and others should use to identify security-related sensitive information.

No specific action nor written response is required.

BACKGROUND

NRC traditionally has given the public access to a significant amount of information about the facilities and materials the Agency regulates. Openness has been and remains a cornerstone of NRCs regulatory philosophy. The Atomic Energy Act, subsequent legislation, and various NRC regulations have given the public the right to participate in the licensing and oversight process for NRC licensees. To participate in a meaningful way, the public must have access to information about the design and operation of regulated facilities and use of nuclear materials.

However, NRC and other Government agencies have always withheld some information from public disclosure for reasons of security, personal privacy, or commercial or trade secret protection.

In the post-September 11, 2001, environment, NRC, like many other agencies, has found it necessary to be more judicious in determining what information to voluntarily release, so as not to inadvertently provide assistance to those who might use certain information for malevolent acts. NRC has issued orders and advisories and taken specific actions regarding the security of its licensed facilities and has also assessed and revised its policies and practices for making information available to the public. One of the actions NRC took was to suspend public access to documents in its electronic Agency-wide Documents Access and Management System (ADAMS) on October 25, 2004. Subsequently, NRC screened those documents to determine whether they contained security-related sensitive information. Based on this screening, a large number of documents were returned to public access in ADAMS. This screening process continues as requests for specific documents are received and as new documents are created by NRC and received from licensees and others.

To facilitate this screening process, NRC has developed screening criteria for conducting its reviews. In November 2005, NRC issued guidance (NRC RIS 2005-26) for assessing whether documents associated with reactor licensees should be made publicly available. As part of the continuing efforts in this area, NRC has now developed the attached criteria for screening from public disclosure security-related sensitive information associated with various NRC-regulated activities of persons handling source, byproduct, and special nuclear material.

This RIS and its attachments do not apply to classified information or Safeguards Information.

Classified information (Confidential, Secret, Top Secret) is withheld from the public by law.

Safeguards Information is withheld because it provides details of security measures at nuclear facilities. Handling requirements for classified information and Safeguards Information are set forth in various NRC orders, regulations, and generic communications (e.g., requirements for the handling and protection of Safeguards Information are discussed in RIS-2003-08, Protection of Safeguards Information from Unauthorized Disclosure, dated April 30, 2003).

Sensitive (but unclassified, non-safeguards) information covers a range of information for which the loss, misuse, modification, or unauthorized access can reasonably be foreseen to harm the public interest, commercial or financial interests of an entity, the conduct of NRC and Federal Programs, or the personal privacy of individuals. As noted above, this RIS covers security- related information which, if released, could cause harm to the public interest as it could be useful, or could reasonably be expected to be useful, to a terrorist in a potential attack.

Specifically, information that should be protected under this RIS is described in Attachment 2.

In addition, licensees and others should use the procedures set forth below to protect information designated for protection by other federal, State, or local agencies.

SUMMARY OF ISSUE

This RIS:

1) Informs licensees and others of the screening criteria that NRC uses to identify and protect security-related sensitive information in documents generated by the Agency and in documents received from licensees and others;

2) Encourages licensees and others to identify security-related sensitive information contained in documents submitted to NRC, by using the screening criteria in Attachment 2 and marking procedures; and 3) Encourages licensees and others that may possess security-related sensitive information to control the information, to limit the risk that the information might fall into the hands of those who would use it for malevolent acts.

Specifically, protection of the information should be implemented in the following manner:

1. Screening of Future Documents Submitted to NRC

To assure that future submittals containing security-related sensitive information are not made publicly available in ADAMS, while still making other appropriate information available to the public, NRC is encouraging licensees and others to screen submittals in accordance with the guidance in Attachment 2. If practical, documents submitted to NRC should avoid including security-related sensitive information to permit releasing the document to the public in its entirety.

2. Marking and Submitting Documents Containing Security-Related Sensitive Information If it is necessary to include security-related sensitive information in a submitted document, the submittal should be marked to indicate the presence of such information as follows:

a) The cover letter should clearly state that the attached documents contain security-related sensitive information. When separated from the attached documents, if the cover letter itself does not contain security-related sensitive information, the cover letter itself is uncontrolled.

b) As shown in Attachment 1 (Section A), the top of every page of a letter or document that contains security-related sensitive information should include the marking Security-Related Information Withhold Under 10 CFR 2.390 (note that NRCs procedure for these documents is to mark them as Official Use Only

- Security-Related Information). For the pages having security-related sensitive information, an additional marking (e.g., an editorial notebox) should be included adjacent to the material meeting the screening criteria in Attachment 2.

Information on suggested handling and methods of submittal of security-related sensitive information is also contained in Attachment 1 (Section B).

Licensees and others can submit both a public and a non-public version of a document, when security-related documents need to be submitted. The public version could have the security-related sensitive information marked out or removed with a notation that the information was withheld on the basis that it is Security-Related Information. This is similar to what is sometimes done to protect proprietary information under 10 CFR

2.390, except that an affidavit is not needed. Alternatively, security-related sensitive information could be segregated from the main body of the document and included only in attachments to the submittal. Only the attachments containing security-related sensitive information would be marked for withholding from public disclosure. Using this approach, the public version need not be marked as containing security-related sensitive information. 3. Protection of Security-Related Sensitive Information Documents that contain security-related sensitive information should be protected from public disclosure, using methods similar to that for protecting proprietary information.

To the extent practicable, any existing documents containing security-related sensitive information that licensees or others have previously made available to the public should be withdrawn from public access. As with proprietary information, licensees and others should have sufficient internal controls to prevent release of information. Possible methods to prevent the inadvertent release of security-related sensitive information include marking documents Security-Related Information - Withhold Under 10 CFR

2.390, restricting access to electronic recordkeeping systems that contain such information, and controlling the reproduction, distribution, and destruction of potentially sensitive records. Licensees and others should ensure that similar controls are in place when security-related sensitive information is provided to outside parties such as contractors or other Government agencies, and that the information is made available only to such parties who have a need to know the information to perform their jobs and who are made aware of the security-related nature of the information.

This RIS, the attached screening criteria, and additional explanatory material, as appropriate, are also posted on the NRC Web site at http://www.nrc.gov/reading-rm/sensitive-info.html)

(note that the criteria for fuel cycle facilities in this website and in this RIS supercedes information at http://www.nrc.gov/materials/fuel-cycle-fac/review-criteria-fuel-cycle.html).

The NRC staff will interact with licensees and others on a case-by-case basis to resolve questions regarding the application of the procedures and screening criteria set forth in this RIS

and its attachments.

NRC will continue to make available to the public as much information as possible. Much of NRCs information is readily available to the public via the NRC Web site (www.nrc.gov) and NRCs ADAMS system (www.nrc.gov/reading-rm/adams.html). In addition, other information may be released to the public in response to formal and/or informal requests. Although the security-related sensitive information screening criteria were developed with the principles of the Freedom of Information Act (FOIA) in mind, a review for security-related sensitive information does not substitute for a FOIA review. FOIA requests will continue to be reviewed and processed independently from the security-related sensitive information review process.

BACKFIT DISCUSSION

This RIS requires no action nor written response and is, therefore, not a backfit under 10 CFR 70.76, 72.62, or 76.76. Consequently, the NRC staff did not perform a backfit analysis.

FEDERAL REGISTER NOTIFICATION

A notice of opportunity for public comment on this RIS was not published in the Federal Register because it is informational and does not represent a departure from current regulatory requirements and practice. SMALL BUSINESS REGULATORY ENFORCEMENT FAIRNESS ACT OF 1996 NRC has determined that this action is not subject to the Small Business Regulatory Enforcement Fairness Act of 1996.

PAPERWORK REDUCTION ACT STATEMENT

This RIS does not contain information collections and, therefore, is not subject to the requirements of the Paperwork Reduction Act of 1995 (44 U.S.C. 3501, et seq.).

Please direct any questions about this matter to the technical contacts listed below.

/RA/

Charles L. Miller, Director Division of Industrial and Medical Nuclear Safety Office of Nuclear Material Safety and Safeguards Technical Contacts:

Spent Fuel Storage and Materials IMNS/Regional Transportation Fuel Cycle Paul Goldberg, NMSS/IMNS Joe Sebrosky, NMSS/SFPO Patricia Silva, NMSS/FCSS

301-415-7842 301-415-1132 301-415-8029 E-mail: pfg@nrc.gov E-mail: jms3@nrc.gov E-mail: pas6@nrc.gov Decommissioning HLWRS Import/Export Ted Carter, NMSS/DWMEP Alexander Sapountzis Stephen Dembek

301-415-6668 301-415-7822 301-415-2342 E-mail: thc1@nrc.gov E-mail: aps@nrc.gov E-mail: sxd@nrc.gov Attachments:

1. Suggested Markings; Withhold From Public Disclosure in Accordance With 10 CFR 2.390

2. NMSS Guidance on Screening Criteria for Security-Related Sensitive Unclassified Non- Safeguards Information

3. List of Recently Issued NMSS Generic Communications

Attachment 1 RIS-2005-31 SUGGESTED MARKINGS AND HANDLING

This attachment provides information on suggested markings for pages of a document that contains security-related sensitive information (Section A) and suggested handling of such documents (Section B).

A. Page Markings Overall page marking on the top of all pages of a document that contains security-related sensitive information Security-Related Information Note that a cover letter should clearly state Withhold Under 10 CFR 2.390 that attached documents contain security- related sensitive information - - However, this marking is also needed on the cover letter only if it itself contains security- related sensitive information.

Subject Ensure Subject Line is non-sensitive XXXXXXXXXX

XXXXXXXXXX

XXXXXXXXXX

XXXXXXXXXX

Attachment 1 RIS-2005-31 B. Appropriate Controls for Handling Documents Access: Need-to-know in order to perform official licensee, applicant or entity functions.

Storage: Openly within licensee, applicant, or other entity facilities with electronic or other access controls, for example, key cards, guards, alarms.

Mail: U.S. Postal Service first class mail, registered mail, express mail, or certified mail in single opaque envelope with no external markings to indicate 10 CFR 2.390 contents.

Electronic Transmission: Over phone if the recipient is confirmed as being authorized to access the information; over facsimile if it is confirmed that a recipient who is authorized to access the information will be present to receive the transmission;

over encrypted computer e-mail (using computer software such as SecureZip).

Note that NRC is using SecureZip when transmitting security- related sensitive information by e-mail to licensees and others to encrypt electronic information. Users will be prompted for a password to access a free download of the reader.

Attachment 2 NMSS GUIDANCE

SCREENING CRITERIA FOR SECURITY-RELATED

SENSITIVE UNCLASSIFIED NON-SAFEGUARDS INFORMATION

DECEMBER 2005

-1-

Attachment 2 SCREENING CRITERIA FOR SECURITY-RELATED

SENSITIVE UNCLASSIFIED NON-SAFEGUARDS INFORMATION

DECEMBER 2005 INTRODUCTION:

This guidance provides the criteria which will be used to determine the types of security-related sensitive information, other than classified or safeguards information, associated with materials licensees, applicants, certificate holders, and other entities that will not be voluntarily disclosed to the public so as not to inadvertently provide assistance to those who might wish to use this information for malevolent acts.

BACKGROUND

Historically, the Nuclear Regulatory Commission (NRC) has made routinely available to the public large amounts of information, more than required by law. In the post-September 11,

2001 environment, however, like many other agencies, the NRC has found it necessary to be more judicious in what it voluntarily releases, so as not to inadvertently provide assistance to those who might use this information for malevolent acts.

The NRC developed guidance several months ago for conducting a broad security/sensitivity review to assess whether documents associated with reactor licensees should be made publicly available in the first instance as a matter of administrative discretion (SECY-04-0191). In November 2005, the NRC issued guidance (NRC RIS 2005-26) in this area. As part of the continuing efforts in this area, the NRC has now developed this guidance which addresses the criteria for screening from public disclosure certain types of information associated with various classes of materials licensees, applicants, certificate holders and other entities.

Consistent with the Task Force Report on Public Disclosure of Security-Related Information, (SECY 05-0091) and the Commission guidance on that Task Force Report, the screening criteria in these guidelines ...should follow the principles for withholding security-related information under FOIA. Although the security-related sensitive screening criteria were developed with the principles of the Freedom of Information Act (FOIA) in mind, a review for security-related sensitive information does not substitute for a FOIA review. FOIA requests will continue to be reviewed and processed independently from the security-related sensitive information review process.

ORGANIZATION OF THIS GUIDANCE:

This guidance is organized as follows (see Table 1 for an outline on navigating the guidance):

- Section 1 indicates the thresholds under which documents may be released to the public without any further screening. However, Section 1 also notes specific requirements for withholding documents in certain cases even if the documents fall under the threshold.

- Section 2 contains general criteria for screening documents above the threshold.

Attachment 2 - Appendices 1 - 5 contain guidance, in addition to that in Section 2, for screening documents specific to fuel cycle facilities; decommissioning and low-level waste sites;

medical, industrial, and academic uses of nuclear materials; spent fuel/transportation;

and export/import, respectively.

Table 1 Stakeholders Using This Guidance and Applicable Sections of the Guidance1 Stakeholder Applicable guidance Fuel cycle facilities including milling, Sections 1 and 2 for general information and conversion, enrichment and fuel fabrication Appendix 1.

facilities Decommissioning and low-level waste sites Sections 1 and 2 for general information and Appendix 2.

Medical, Industrial, and Academic Uses of Sections 1 and 2 for general information and Nuclear Materials Appendix 3.

10 CFR Part 71: certificate holders, and Sections 1 and 2 for general information and registered users Appendix 4, parts A, B, and E. Special attention should be given to the guidance relative to detailed design drawings, and control of registered users list for transportation packages.

10 CFR Part 71: Quality Assurance Program Sections 1 and 2 for general information and holders Appendix 4, parts A, B, and E. Based on NRC staff experience, most QA program holder submittals do not contain sensitive information as defined in this RIS. However, attention should be given to the guidance relative to detailed design drawings, and control of registered users list for transportation packages.

10 CFR Part 72: certificate holders, general Sections 1 and 2 for general information and licensees, and site specific licensees Appendix 4, parts A, B, C, D and E.

Export and Import Sections 1 and 2 for general information and Appendix 5.

1 With regards to High-Level Waste, requirements for making information publicly available via the Licensing Support Network (LSN) is contained in 1O CFR Part 2 Subpart J for an applicant of the proposed geological repository at Yucca Mountain in Nevada. Furthermore, the "Joint DOE and NRC Sensitive Unclassified Information and Classification Guide for the Office of Civilian Radioactive Waste Management Program" (CG-OCRWM-1) provides guidance for determining sensitive information.

Attachment 2 1. NMSS THRESHOLD CRITERIA:

Documents containing information falling under these thresholds may be released without any further screening, except as specifically noted.

A. Low Hazard: The following types of licensee files need NOT be screened due to the low hazard of the radioactive material at the sites:

- Licensees authorized to possess quantities of radionuclides in any single location that are below the International Atomic Energy Agencys (IAEA) Category 3 quantities (as listed in Table 1 of these guidelines). However, documents which give the exact location of the material should be withheld, even if they refer to material levels below the Category 3 threshold. Thus, a document may be released if it indicates a general location (i.e., in a certain building), but documents giving the exact location should be withheld unless the location is intuitively obvious.

- Licensees (other than fuel cycle) authorized to possess radionuclides which are not listed in Table 1. However, information on the exact location of this radioactive material should be withheld.

- Uranium recovery (yellow cake and tailings only)

- Current information on decommissioning materials sites with diffuse contamination only.

(Check for other active licenses or radioactive material at the site; e. g., high activity reactor components, and high activity waste. Screen any such documents separately.)

- Terminated licenses where all radioactivity except diffuse contamination has been removed. (Screen old files for operational information which may contain sensitive information.)

B. Information Readily Available to the Public Elsewhere:

Based on Reactor Criteria Approved by Commission (see SECY-04-0191):

- If the information is available from open source literature such as text books, Web sites, or other sources, an NRC decision to withhold the information may decrease the openness of our regulatory programs without obstructing an adversary.

- Information clearly visible from locations accessible to the public is generally released.

This includes general (low resolution) drawings of the site and adjacent areas.

Attachment 2 2. GENERAL CRITERIA FOR SCREENING DOCUMENTS ABOVE THE THRESHOLD

A. Descriptions of Facilities Where Licensed Material May Be Located Criteria:

(1) Locations and quantities of radioactive material (above the thresholds listed in Table 1)

- Withhold information identifying the exact locations of radioactive material

- Withhold information on possession limits or actual inventories of radionuclides.

- Withhold manufacturers and model numbers of sealed sources and devices.

- For fuel cycle facilities, withhold information on possession limits and inventories of enriched uranium above 6% U-235, and mixed oxide materials.

- Withhold lists of licensees registered to use NRC-approved 10 CFR Part 71 transportation packages.

- Release identification of radionuclides and form.

- Release 10 CFR Part 71 certificates and 10 CFR Part 72 information related to radionuclide form, content, quantities, model numbers, and locations of independent spent fuel storage installations, regardless of the quantities.

- Release event reports involving lost/stolen/abandoned/found radioactive material.

(2) Design of structures/equipment (site specific)

- Withhold information related to security requirements, information from analyses which could reveal vulnerabilities, reports of specific or predicted failures, and any other information which could reasonably be expected to be useful to potential adversaries.

- Release information regarding the design of structures provided to the NRC which typically consists of analyses to show that the design feature will withstand the combinations of forces associated with design basis events and natural hazards. The analyses do not typically provide realistic information on the failure of structural features, and, except for fuel cycle facilities, are not considered sensitive. However, withhold information related to predicted structural failures that could be useful to terrorists. (See Appendix 1 for specific guidance on fuel cycle facilities.)

(3) Nearby Facilities

- Withhold information related to nearby facilities if the information might reasonably be helpful to those planning an attack.

B. Design Information (non-site-specific): Spent Fuel Casks, Transportation Packages, Sealed Source and Device Catalog and Files, etc.

- Withhold drawings showing detailed design information.

- Withhold design/performance information which indicates vulnerabilities that could reasonably be expected to be useful to potential adversaries.

- Release text information containing descriptions of how packages/devices/sources are constructed.

Attachment 2 C. Emergency Planning/Fire Protection Information

- Withhold information related to emergency planning, emergency response, and fire protection. Review any considerations and/or requests for release on a case-by-case basis. As part of the review, check to see whether the State or local governments are withholding related information as sensitive.

- Withhold information describing licensee or government responses to malevolent attacks.

- Withhold information and drawings identifying locations of radioactive material, and onsite routes and pathways to or from the locations of radioactive material.

- Withhold information which State or local government agencies have designated as sensitive.

D. Security Program Information

- Much information related to security programs at fuel cycle facilities and other materials facilities with high risk sources has already been designated to be withheld as Classified, Safeguards, or Proprietary Information.

- In addition to withholding Classified, Safeguards, or Proprietary Information, withhold any security information which could reasonably be expected to be useful to potential adversaries.

E. Vulnerability/Security Assessments/Accident Analyses/Safety Analyses/Risk Assessments

- Release typical accident analyses which involve conservative models to demonstrate a facilitys ability to respond to design basis events (i.e., non-security related events),

unless the analysis could reasonably be expected to be useful to an adversary.

- Withhold assessments which use a malevolent event as an initial condition (e.g.,vulnerability/security analysis).

- Withhold descriptions of structural features related to potential malevolent attacks.

- Withhold detailed information and drawings describing the specific locations of equipment relied upon for safety or security.

- Withhold discussions of safety features or mitigation strategies within vulnerability/security assessments.

- Withhold any analysis that identifies which events have significant consequences and which events don't.

- Withhold information related to security events and any information which could be useful to an adversary due to identification of vulnerabilities.

Attachment 2 APPENDICES 1-5: ADDITIONAL GUIDANCE FOR SECURITY-RELATED SENSITIVE

INFORMATION SCREENING REVIEWS

These appendices contain additional guidance for screening documents for security-related sensitive information specific to fuel cycle facilities; decommissioning and low-level waste sites;

medical, industrial, and academic uses of nuclear materials; spent fuel/transportation; and export/import licensing. These appendices are organized as follows:

1. Fuel cycle facilities including milling, conversion, enrichment and fuel fabrication facilities;

2. Decommissioning and low-level waste sites;

3. Medical, industrial, and academic uses of nuclear materials;

4. Spent Fuel/Transportation (10 CFR Part 71: certificate holders, and registered users;

10 CFR Part 71: Quality Assurance Program holders; 10 CFR Part 72: certificate holders, general licensees, and site specific licensees);

5. Export/Import licensing.

Attachment 2 APPENDIX 1 - - FUEL CYCLE FACILITY REVIEWS (NRC

CONTACT

DIVISION OF FUEL

CYCLE SAFETY AND SAFEGUARDS (FCSS), NMSS)

A. Descriptions of Facilities Where Licensed Material May Be Located

- Withhold information on possession limits or actual inventories of radionuclides, and quantities, including such information on the license itself, for mixed oxide material and uranium enriched to greater than 6 % U-235. (Release identification of radionuclides and their forms.)

- Withhold information related to military contract operations, even if it is publicly available elsewhere.

- Withhold information identifying the exact locations (e.g., detailed floor plans) of radioactive and hazardous material whose release or theft could allow adversaries to create a diversion for theft of material or result in a significant consequence.

Information for planning a sabotage activity (e.g., bombing a building) would likely require less detailed information than theft where exact locations would likely be needed.

- Withhold information about the design of structures that consists of analyses to show that design features will withstand the forces associated with both security-related scenarios and non-security-related scenarios, such as tornadoes, high winds, snow loads, etc. Analyses indicating forces associated with non-security regulatory requirements could be useful in planning terrorist activities. For instance, information related to seismic loadings could be used to determine blast loads for bombs.

- Withhold detailed design information, including diagrams showing dimensions, material properties, and descriptions of how the facilities/equipment is constructed. Additionally, withhold process information that could potentially allow an adversary to access radioactive or hazardous materials or gain knowledge of detailed information or potential weaknesses of systems designed to ensure safe operations (necessary to prevent or mitigate accidents) at fuel cycle facilities.

B. Design Information (non-site specific)

No additional fuel cycle facility guidance for this category.

C. Emergency Planning/Fire Protection Information

- Withhold information contained in Emergency Planning and Fire Protection Plans that could potentially allow an adversary to gain knowledge of detailed information or potential weaknesses of systems designed to ensure safe operations (necessary to prevent or mitigate accidents) at fuel cycle facilities.

Attachment 2 - Withhold information and drawings identifying routes to or from the locations of radioactive and hazardous material whose release or theft could allow adversaries to achieve their goals.

- Withhold information that State or local government agencies have designated as sensitive.

- Withhold any detailed accident analysis that identifies which accidents have significant consequences and which accidents don't. Accident analysis information can appear in many documents (i.e., emergency plan, fire protection plan, Integrated Safety Analysis Summary, environmental assessment, etc.). General information may be releasable, but details should be withheld.

D. Security Program Information

- Much information related to security programs at fuel cycle facilities and other materials facilities with high risk sources has already been designated to be withheld as Proprietary, Classified or Safeguards Information.

- Withhold information about security equipment and programs, descriptions of equipment and radioactive or hazardous materials, and accident studies that bear a close resemblance to programs, equipment, radioactive or hazardous materials, and studies at other active licensee sites if that information would reveal vulnerabilities or be expected to be useful to adversaries at active licensee sites.

E. Vulnerability/Security Assessments/Accident Analyses

- Withhold detailed information and drawings describing the exact locations of radioactive or hazardous materials or gain knowledge of detailed information or potential weaknesses of system designed to ensure safe operations (necessary to prevent or mitigate accidents) at fuel cycle facilities.

- Withhold any detailed accident analysis which contains accident sequences, identifies accident consequences, identifies systems and components relied upon for safety, or identifies which accidents have significant consequences and which accidents don't.

Accident analysis information can appear in many documents (i.e., emergency plan, fire protection plan, Integrated Safety Analysis Summary, environmental assessment, etc.).

General information may be acceptable, but details should be withheld.

- Withhold information identifying the exact locations (e.g., detailed floor plans) of radioactive and hazardous material whose release or theft could allow adversaries create a diversion for theft of material or result in a significant consequence.

Information for planning a sabotage activity (e.g., bombing a building) would likely require less detailed information than theft where exact locations would likely be needed.

Attachment 2 APPENDIX 2 - - DECOMMISSIONING AND LOW-LEVEL WASTE SITE REVIEWS (NRC

CONTACT

DIVISION OF DECOMMISSIONING, WASTE MANAGEMENT, AND

ENVIRONMENTAL PROTECTION (DWMEP), NMSS)

DECOMMISSIONING AND LOW-LEVEL WASTE SITE THRESHOLD CRITERIA

1. Diffuse contamination consists of soil, groundwater, surface contamination on and in buildings, including that which is on equipment, floors, walls, etc. It also could include volumetrically contaminated materials whose concentrations are sufficiently low.

For determining whether only diffuse contamination is present at a decommissioning site, apply the following information derived from the IAEA Code of Conduct on the Safety and Security of Radioactive Sources (see Table 1). Category 3 sources in the Code of Conduct, for which NRC is developing a rulemaking to control their import and export, are typically about 1 curie. At a concentration of 2000 pCi/gram, which is well above the concentrations of plutonium typically found in soil at sites undergoing decommissioning, this equates to approximately 15,000 cubic feet of material, well in excess of what a terrorist could reasonably use for malevolent purposes. For materials at the 10 CFR Part 61 Class A limit for plutonium (10 nCi/gram), the volume of waste that would contain the Category 3 activity limit for plutonium would be 3000 cubic feet, also in excess of what could reasonably be used by a terrorist. However, for Co-60, the amount of loose material or rubble at the Class A limit (700 Ci/cubic meter) containing the Category 3 quantity (about 1 curie) would be less than 0.1 cubic foot, an amount that could easily be used for malevolent purposes because of its small volume.

Reviewers should apply values taking into consideration the examples given above in making a determination on whether a decommissioning site is within the threshold limits.

2. DWMEP has little licensing work in low-level waste. However, that which is performed may not be below the threshold. For example, import and export licensing could involve quantities of materials that would be useful to terrorists.

GENERAL GUIDANCE FOR DECOMMISSIONING AND LOW-LEVEL WASTE SITES

Most sites undergoing decommissioning are expected to be below the threshold, so that most licensing documents can be released. Sensitivity reviews must be conducted on documents related to LLW storage, safety, and security systems and procedures. Reviews should focus on determining if the information contained in these documents could be useful to an adversary in planning a terrorist act. Examples include the location and security arrangements for high-activity waste, the location of highly activated components, or the transportation security arrangements for high-activity waste or activated components.

Attachment 2 For fuel cycle, materials, and spent fuel pool and independent spent fuel storage installation (ISFSI) licensees that are undergoing decommissioning, issues that are not unique to decommissioning (such as descriptions of plant processes, vulnerability/security assessments, etc.) should be reviewed with regard to Appendices 1, 3, and 4, respectively.

A. Descriptions of Facilities Where Licensed Material May Be Located

- Withhold information identifying the exact locations of radioactive material. For example, detail drawings or maps of facilities, room numbers and locations, and specific locations of waste storage/processing operations.

- Withhold design information that could reasonably be expected to be useful to potential adversaries. Examples include detailed drawings or maps showing the locations of security measures/operations and infrastructure, locations of critical site infrastructure (electrical or power systems), and the design of facilities that could be useful in developing approaches to breech the facility.

- For transportation package information provided in connection with decommissioning or LLW disposal licensing, consider Appendix 4 for sensitivity of the information.

No additional guidance for decommissioning and low-level waste sites for other categories.

Attachment 2 APPENDIX 3 - - REVIEWS OF MEDICAL, INDUSTRIAL, AND ACADEMIC USERS OF

NUCLEAR MATERIALS (NRC

CONTACT

DIVISION OF INDUSTRIAL AND MEDICAL

NUCLEAR SAFETY (IMNS), NMSS)

A. Descriptions of Facilities Where Licensed Material May Be Located (above the thresholds in Table 1)

(1) Copies of Licenses and Mailing Lists

- Copies of licenses: Release authorized radionuclides and form. Withhold authorized quantities. Withhold manufacturers and model numbers of sealed sources and devices.

Withhold information which identifies buildings or rooms where radioactive material is located (this may be in the license condition specifying authorized location).

- Withhold mailings lists which are compiled for security purposes or identify high risk facilities or vulnerable facilities.

- Release individual mailing addresses, and street address where material is located (normally included on licenses).

(2) Locations of radioactive material

- Withhold lists of authorized or actual inventories of radionuclides.

- Withhold building numbers and room numbers (other than mailing addresses) or similar information which identify locations of material.

- Withhold site drawings which identify individual buildings on the licensee site.

- Withhold building drawings which identify the location of radioactive material, or onsite pathways or routes to and from locations of radioactive material.

- Release individual mailing addresses and street addresses.

(3) Design/description of structures/equipment/operating procedures (site specific)

- Most descriptions of structures/equipment/procedures may be released if they are not security-related.

- Withhold drawings of buildings/rooms/devices where radioactive material is located.

- Withhold manufacturers and model numbers of sealed sources and devices.

- Withhold information on security programs, guards, access controls, key cards, alarms, barriers, chains, locks, etc.

B. Design Information (non-site specific) - Sealed Source and Device Catalog

- Release information on addresses of manufacturers/distributors.

- Establish a password system for users with a valid need-to-know, and who have agreed to protect the information from unauthorized disclosure.

Attachment 2 C. Emergency Planning/Fire Protection Information

- Release general descriptions of emergency procedures for safety related events, such as radioactive material spills, releases, contamination, and fires.

- Withhold information on routes to and from locations of radioactive material.

- Withhold information related to responses to security events and malevolent events.

- Withhold information on responses of offsite law enforcement officials.

- Withhold information designated by State or local governments as sensitive.

D. Security Program Information

- Certain security information at specified facilities is already designated as Safeguards Information and should continue to be withheld and protected accordingly.

- In addition to withholding Safeguards Information, withhold any security information related to malevolent events or which could be useful to potential adversaries.

Examples as given in Section A above: information on guards, access controls, key cards, alarms, barriers, chains, locks, etc.

E. Vulnerability/Security Assessments/Accident Analyses

- No additional guidance for medical, industrial, and academic users of nuclear material for this category.

Attachment 2 APPENDIX 4 - - SPENT FUEL/TRANSPORTATION REVIEWS (NRC

CONTACT

SPENT

FUEL PROJECT OFFICE (SFPO), NMSS)

A. Descriptions of Facilities Where Licensed Material Be Located Subject Discussion and/or typical controls

10 CFR Part 72 Specific ISFSI Uncontrolled - Information provided to the NRC for Licenses and General Licenses specific ISFSI licenses and general licenses typically

- Text descriptions of the consists of analyses to show that the design feature will following: general description, withstand the combinations of forces associated with site characteristics, principal design basis events and natural hazards. The analyses design criteria, storage cask do not typically provide realistic information on the failure design, operations, waste of structural features and are not considered sensitive.

management, radiation protection, accident analyses, conduct of operations, operating controls and limits, and quality assurance

10 CFR Part 72 Specific ISFSI Potentially Controlled - Decisions regarding the control of Licenses and General Licenses information that show the plant site and buildings are

- Drawings and locations of dependent on the level of detail. Information clearly related hazards visible from locations accessible to the public near the site is generally released. This includes general (low- resolution) layout drawings of the site and adjacent areas.

Drawings showing details such as the specific locations of equipment within buildings, doorways, stairways, storage areas, etc. are to be withheld under 10 CFR 2.390(d).

Drawings showing locations of hazards in relation to the ISFSI are also withheld. A text description of the hazards in relation to the ISFSI is uncontrolled and will not be reviewed.

10 CFR Part 72 Specific ISFSI Controlled - Information related to non-nuclear facilities Licenses and General Licenses located near the ISFSI such as pipeline data (usually

- Nearby industrial, withheld per DOT) and chemical facilities (some data transportation, and military withheld per EPA) is controlled. Other information may facilities be protected by other federal agencies (e.g., DHS, FERC,

EPA, DOT)

10 CFR Part 72 Specific ISFSI Uncontrolled - Information related to radionuclides, form, Licenses and General Licenses and quantities Lists of licensees registered to Withhold lists and associated letters required by 10 CFR

use NRC-approved 10 CFR Part 71.17(c)(3).

71 transportation packages.

Attachment 2 B. Design Information (non-site specific): Transportation Packages, and Spent Fuel Casks Subject Discussion and/or typical controls

10 CFR Part 71 Transportation Uncontrolled - Information provided to the NRC typically Package Descriptions Text consists of analyses to show that the design feature will Descriptions Including withstand the combinations of forces associated with Radionuclide Form, Content and design basis events and natural hazards. The analyses Quantity do not typically provide realistic information on the failure of structural features and are not considered sensitive.

Text descriptions regarding the design of transportation packages do not need to be controlled for 3 basic reasons: 1) Part 71 does not authorize possession of byproduct, source or special nuclear material, 2) package design information is required for commerce both domestically and internationally, and 3) the information that could reasonably be expected to be useful to terrorists in planning or executing an attack for transportation packages containing large quantities of byproduct, source or special nuclear material is controlled by other means (e.g., route controls, escort requirements, etc., in accordance with Commission Orders, interim compensatory measures or other applicable requirements).

10 CFR Part 71 Drawings Potentially Controlled - Withhold diagrams showing detailed design information. Do not withhold drawings which have already been made public through FOIA

requests, hearings, rulemakings, or other public forums.

10 CFR Part 71 Transportation Uncontrolled - An entity wishing to use or fabricate an Quality Assurance Program approved transportation package must submit a Plan Descriptions description of its quality assurance program to the NRC.

This submittal is assigned a 10 CFR Part 71 docket and reviewed and approved by the staff. The QA program description typically does not contain the type of information found in the generic criteria that would cause it to be controlled. In addition, filing and approving a QA

program description does not authorize possession of byproduct, source, or special nuclear material.

10 CFR Part 71 Package Uncontrolled Information related to radionuclides, form and quantities

Attachment 2 Subject Discussion and/or typical controls

10 CFR Part 71 Advance NSIR has programmatic responsibility for reviewing and Notification of Shipments of controlling this information. 10 CFR 71.97 requires Irradiated Reactor Fuel and advance notifications to the governor of a State, or the Nuclear Waste governors designee, of certain shipments of high-risk radioactive material.

10 CFR Part 72 Dry Cask Uncontrolled - Information provided to the NRC typically Storage Systems -Certificates of consists of analyses to show that the design feature will Compliance (COC) safety withstand the combinations of forces associated with analysis report information design basis events and natural hazards. The analyses do not typically provide realistic information on the failure of structural features and are not considered sensitive.

Text information in the safety analysis report including design information is not controlled for the following reasons: 1) the design of the casks are simple by nature and the criteria for which they are designed are widely known; 2) most casks designs involve storage of the casks in open areas on concrete pads that are often readily seen from offsite locations; and 3) this information has been historically released to the public to support rulemaking for approved cask designs, and other public outreach efforts.

10 CFR Part 72 Dry Cask Potentially Controlled - Withhold diagrams showing Storage Systems -Drawings detailed design information. Do not withhold drawings which have already been made public through FOIA

requests, hearings, rulemakings, or other public forums.

10 CFR Part 72 Package Uncontrolled Information related to radionuclides, form and quantities

Attachment 2 C. Emergency Planning Information Subject Discussion and/or typical controls

10 CFR Part 72 Specific ISFSI Potentially Controlled - Incoming documents are initially Licenses and General Licenses profiled as nonpublic - staff will review for release upon

- Emergency Planning request. Most information related to emergency planning will not need to be designated as sensitive. Special attention is needed to determine if information relates to the response by a licensee or government agency to a terrorist attack. Note that some State and local governments consider parts of their emergency plans to be sensitive.

D. Security Program Information Subject Discussion and/or typical controls

10 CFR Part 72 Specific ISFSI Potentially Controlled - Information related to security Licenses and General Licenses programs is generally designated as SGI or SGI-M and is

- Security protected in a manner similar to classified confidential information. Security-related information within the inspection and oversight program is withheld from public disclosure under 10 CFR 2.390(d).

E. Vulnerability/Security Assessments/Accident Analyses/Risk Assessments Subject Discussion and/or typical controls Vulnerability/Security Controlled - Vulnerability/security assessments to Assessments for: determine the ability of transportation packages, dry cask

- 10 CFR Part 71 storage systems, or ISFSIs to withstand events from transportation package malevolent acts have been and will continue to be designs withheld from public disclosure.

- 10 CFR Part 72 dry cask storage systems

- 10 CFR Part 72 independent spent fuel storage installations (ISFSI)

Attachment 2 APPENDIX 5 - - EXPORT/IMPORT LICENSING (NRC

CONTACT

OFFICE OF

INTERNATIONAL PROGRAMS (OIP)

- Withhold information on authorized quantities or actual inventories of radionuclides, above the thresholds in Table 1, mixed oxide materials, and enriched uranium above 6%

U-235. Release information identifying radionuclides and form.

- For quantities above the thresholds in Table 1, mixed oxide materials, and enriched uranium above 6% U-235, withhold information on projected or actual shipment schedules, delivery dates, date required, mode of transport, storage arrangements, or any other related logistical information provided by the licensee in the application or added by the NRC.

Attachment 2 Table 1: Radionuclide Screening Threshold Values Radionuclide Quantity of Quantity of Concern1 (TBq) Concern2 (Ci )

Am-241 0.06 1.6 Am-241/Be 0.06 1.6 Cf-252 0.02 0.54 Cm-244 0.05 1.4 Co-60 0.03 0.81 Cs-137 0.1 2.7 Gd-153 1 27 Ir-192 0.08 2.2 Pm-147 40 1100

Pu-238 0.06 1.6 Pu-239/Be 0.06 1.6 Se-75 0.2 5.4 Sr-90 (Y-90) 1 27 Tm-170 20 540

Yb-169 0.3 8.1 Combinations of See Footnote radioactive materials listed Below4 above3

1 The aggregate activity of multiple, collocated sources should be included when the total activity exceeds the quantity of concern.

2 TBq values are the regulatory standard and the Curie values are rounded to two significant figures.

3 Radioactive materials are to be considered collocated if breaching a common physical security barrier (e.g., a locked door at the entrance to a storage room) would allow access to the radioactive material or devices containing the radioactive material. For sources installed in devices, each device should be considered a separate location.

4 If several radionuclides are aggregated, the sum of the ratios of the activity of each source, I

of radionuclide, n, A(i,n), to the quantity of concern for radionuclide n, Q(n), listed for that radionuclide exceeds one. [(aggregated source activity for radionuclide A) ÷ (quantity of concern for radionuclide A)] + [(aggregated source activity for radionuclide B) ÷ (quantity of concern for radionuclide B)] + etc........ >1

Attachment 3 Recently Issued NMSS Generic Communications Date GC No. Subject

Addressees

2/11/05 BL-05-01 Material Control and Accounting at All holders of operating licenses for Reactors and Wet Spent Fuel nuclear power reactors, decommissioning Storage Facilities nuclear power reactor sites storing spent fuel in a pool, and wet spent fuel storage sites.

11/23/05 RIS-05-24 Control of Radiation Dose to All medical licensees.

Visitors of Hospital Patients

11/14/05 RIS-05-21 Clarification of the Reporting All U.S. Nuclear Regulatory Commission Requirements in licensees and Part 76 certificate holders

10 CFR 20.2201 authorized to possess licensed material.

11/08/05 RIS-05-27 NRC Timeliness Goals, All 10 CFR Parts 71 and 72 licensees Prioritization of Incoming License and certificate holders.

Applications and Voluntary Submittal of Schedule for Future Actions for NRC Review

10/28/05 RIS-05-22 Requirements for the Physical All holders of licenses for the possession Protection During Transportation of of special nuclear material (SNM) that Special Nuclear Material of ship Category II and III quantities of this Moderate and Low Strategic material.

Significance: 10 CFR Part 72 vs.

Regulatory Guide 5.59 (1983)

10/07/05 RIS-05-23 Clarification of the Physical All gamma stereotactic radiosurgery Presence Requirement During (GSR) licensees.

Gamma Stereotactic Radiosurgery Treatments

09/27/05 RIS-04-17, Revised Decay-in-Storage All licensees regulated under 10 CFR

Rev. 1 Provisions for the Storage of Parts 30, 32, 33, 35, 39, and 50.

Radioactive Waste Containing Byproduct Material

08/25/05 RIS-05-18 Guidance for Establishing and All licensees, applicants for licenses, Maintaining a Safety Conscious holders of certificates of compliance, and Work Environment their contractors subject to NRC authority

08/10/05 RIS-05-16 Issuance of NRC Management All licensees and certificate holders.

Directive 8.17, Licensee Complaints Against NRC

Employees

08/03/05 RIS-05-15 Reporting Requirements for All material licensees possessing Damaged Industrial Radiographic industrial radiographic equipment, Equipment regulated under 10 CFR Part 34.

Attachment 3 Date GC No. Subject

Addressees

07/13/05 RIS-05-13 NRC Incident Response and the All licensees and certificate holders.

National Response Plan

07/11/05 RIS-05-12 Transportation of Radioactive Licensees authorized to possess Material Quantities of Concern radioactive material that equals or NRC Threat Advisory and exceeds the threshold values in the Protective Measures System Additional Security Measures (ASM) for transportation of Radioactive Material Quantities of Concern (RAMQC) under their 10 CFR Part 30, 32, 50, 70, and 71 licenses and Agreement State licensees similarly authorized to possess such material in such quantities under their Agreement State licenses.

07/11/05 RIS-05-11 Requirements for Power Reactor All holders of operating licenses for Licensees in Possession of nuclear power reactors and generally Devices Subject to the General licensed device License Requirements of 10 CFR vendors.

31.5

06/10/05 RIS-05-10 Performance-Based Approach for All industrial radiography licensees and Associated Equipment in 10 CFR manufacturers and distributors of

34.20 industrial radiography equipment.

04/18/05 RIS-05-06 Reporting Requirements for All material licensees possessing Gauges Damaged at Temporary portable gauges, regulated under 10 CFR

Job Sites Part 30.

04/14/05 RIS-05-04 Guidance on the Protection of All holders of operating licenses or Unattended Openings that construction permits for nuclear power Intersect a Security Boundary or reactors, Area research and test reactors, decommissioning reactors with fuel on site, Category 1 fuel cycle facilities, critical mass facilities, uranium conversion facility, independent spent fuel storage installations, gaseous diffusion plants, and certain other material licensees.

02/28/05 RIS-05-03 10 CFR Part 40 Exemptions for All persons possessing aircraft Uranium Contained in Aircraft counterweights containing uranium under Counterweights - Storage and the exemption in Repair 10 CFR 40.13(c)(5).

11/17/05 IN-05-31 Potential Non-conservative Error in All licensees using the KENO V.a or Preparing Problem-dependent KENO-VI criticality code module in Cross Sections for use with the Version 5 of the Standardized Computer KENO V.a or KENO-VI Criticality Analyses for Licensing Evaluation Code (SCALE) software developed by Oak Ridge National Laboratory (ORNL).

10/31/05 IN-05-28 Inadequate Test Procedure Fails All licensees authorized to possess a to Detect Inoperable Criticality critical mass of special nuclear material.

Accident Alarm Horns

10/07/05 IN-05-27 Low Dose-Rate Manual All medical licensees.

Brachytheraphy Equipment Related Medical Events

Attachment 3 Date GC No. Subject

Addressees

07/29/05 IN-05-22 Inadequate Criticality Safety All licensees authorized to possess a Analysis of Ventilation Systems at critical mass of special nuclear material.

Fuel Cycle Facilities

06/23/05 IN-05-17 Manual Brachytherapy Source All medical licensees authorized to Jamming possess a Mick applicator.

05/17/05 IN-05-13 Potential Non-conservative Error in All licensees using the Keno-V.a criticality Modeling Geometric Regions in code module in Standardized Computer the Analyses for Licensing Evaluation Keno-v.a Criticality Code (SCALE) software developed by Oak Ridge National Laboratory (ORNL)

05/17/05 IN-05-12 Excessively Large Criticality Safety All licensees authorized to possess a Limits Fail to Provide Double critical mass of special nuclear material.

Contingency at Fuel Cycle Facility

04/07/05 IN-05-10 Changes to 10 CFR Part 71 All 10 CFR Part 71 licensees and Packages certificate holders.

040/01/05 IN-05-07 Results of HEMYC Electrical All holders of operating licenses for Raceway Fire Barrier System Full nuclear power reactors, except those who Scale Fire Testing have permanently ceased operations and have certified that fuel has been permanently removed from the reactor vessel, and fuel facilities licensees.

03/10/05 IN-05-05 Improving Material Control and All licensees authorized to possess a Accountability Interface with critical mass of special nuclear material.

Criticality Safety Activities at Fuel Cycle Facilities Note: NRC generic communications may be found on the NRC public website at http://www.nrc.gov, under Electronic Reading Room/Document Collections.