Security of Radiation Sources

Slides:



Advertisements
Similar presentations
Pakistan Nuclear Regulatory Authority
Advertisements

Environmental Management System (EMS)
SECURITY REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS IN THE UNITED STATES.
IAEA International Atomic Energy Agency. IAEA Outline Learning objectives Introduction Functions of Regulatory Body (RB) on EPR Appraisal guidance: Part.
IAEA International Atomic Energy Agency Responsibility for Radiation Safety Day 8 – Lecture 4.
Categorization of Radioactive Sources
Industrial Radiography
School for drafting regulations Nuclear Safety Decommissioning Vienna, 2-7 December 2012 Tea Bilic Zabric.
Gauges and well logging
International Atomic Energy Agency Code of Conduct Guidance on Import/Export of Sources TRAINING COURSE ON TECHNICAL REQUIREMENTS TO FULFILL NATIONAL OBLIGATIONS.
Regulatory Body MODIFIED Day 8 – Lecture 3.
1 Regulatory Challenges During and Following a Major Safety or Security Event Muhammad Iqbal Pakistan Nuclear Regulatory Authority Presentation at General.
Revision of NSS No Security of Radioactive Sources
Session 3 – Information Security Policies
Protection Against Occupational Exposure
1 - Issuing regulations Governmental, Legal and Regulatory Framework for Safety (GSR – Part 1) Requirement 1: National policy and strategy for safety The.
Ship Recycling Facility Management System IMO Guideline A.962
Postgraduate Educational Course in radiation protection and the Safety of Radiation sources PGEC Part IV The International System of Radiation Protection.
Basics of OHSAS Occupational Health & Safety Management System
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Staffing and Training.
International Atomic Energy Agency Code of Conduct on the Safety and Security of Radioactive Sources Training Course on Technical Requirements to Fulfill.
IAEA 1 - Issuing regulations Governmental, Legal and Regulatory Framework for Safety (GSR – Part 1)GSR – Part 1 Requirement 1: National policy and strategy.
IAEA International Atomic Energy Agency Reviewing Management System and the Interface with Nuclear Security (IRRS Modules 4 and 12) BASIC IRRS TRAINING.
SAFETY AND SECURITY ASPECTS OF RADIOACTIVE MATERIAL DURING TRANSPORT R.K. Singh Radiological Safety Division Atomic Energy Regulatory Board Mumbai, India.
School for Drafting Regulations on Radiation Safety Vienna, November 2012 Rules and responsibilities of the regulatory body Jiří Veselý, SONS, Czech republic.
IAEA REGULATION RADIOACTIVE MATERIALS TRANSPORTATION IN ARMENIA Ashot Mnatsakanyan Head of Radiation Safety Department Armenian Nuclear Regulatory Authority.
School for drafting regulations Nuclear Safety Operation Vienna, 26 November -7 December 2012 Tea Bilic Zabric.
ZHRC/HTI Financial Management Training Session 9: Stores and Supplies Management.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Inspection Part II.
International Atomic Energy Agency IX.4.4. Pre-disposal waste management Safety Standards.
Prime Responsibility for Radiation Safety
IAEA International Atomic Energy Agency Safety Reports Series No. 7 Lessons Learned from Accidents in Industrial Radiography Practical Radiation Safety.
Programme Performance Criteria. Regulatory Authority Objectives To identify criteria against which the status of each element of the regulatory programme.
Main Requirements on Different Stages of the Licensing Process for New Nuclear Facilities Module 4.5/1 Design Geoff Vaughan University of Central Lancashire,
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Regulatory Authority.
IAEA International Atomic Energy Agency School of Drafting Regulations – November 2014 Government and Regulatory Body Functions and Responsibilities IAEA.
Specific Safety Requirements on Safety Assessment and Safety Cases for Predisposal Management of Radioactive Waste – GSR Part 5.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Inspection Part III.
International Atomic Energy Agency Roles and responsibilities for development of disposal facilities Phil Metcalf Workshop on Strategy and Methodologies.
IAEA International Atomic Energy Agency IAEA Safety Standards for Research Reactors W. Kennedy Research Reactor Safety Section Division of Nuclear Installation.
AuthorizationAuthorization. Authorization Objectives To provide understanding of the authorization process and the procedures for its implementation.
Authorization Part III. Content of a license Structure of a license General elements General and specific conditions Annexes Documents attached (e.g.
Management System Part II: Inventory of Radiation Sources – Regulatory Authority Information System (RAIS)
Planned Exposure Situations. Generic safety requirements “ ” “IAEA Regional Workshop - School for Drafting Regulations on Radiation Safety” International.
International Atomic Energy Agency IX.4.2. Principles of radioactive waste management Basic technical management solutions: concentrate and contain, storage.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Technical Services.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Categorization of Radioactive Sources.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Code of Conduct on the Safety and Security of Radioactive.
IAEA International Atomic Energy Agency PGEC Part IV The International System of Radiation Protection and the Regulatory Framework Module IV.11. Safety.
IAEA International Atomic Energy Agency Radiation protection of the public IAEA Regional Training Course on Radiation Protection of patients for Radiographers,
Working Procedure with Ionizing Radiation 1. Introduction Introduction Classification of Areas Classification of Areas Safe Handling/Use of Safe Handling/Use.
WORKSHOP ON ACCREDITATION OF BODIES CERTIFYING MEDICAL DEVICES INT MARKET TOPIC 9 CH 8 ISO MEASUREMENT, ANALYSIS AND IMPROVEMENT INTERNAL AUDITS.
10. Security and Physical Protection Basic Concepts
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Program Performance Criteria.
1.9. Safety assessment “School for Drafting Regulations on Radiation Safety, IAEA - Module 1 Regulatory framework for safety, authorization and inspection.
Technical Services. Objectives To identify the technical services needed within the infrastructure for an effective implementation of regulatory programme.
Status of national system for control of radioactive sources:
Code of Conduct on Safety and Security of Radioactive Sources & Guidance on Import and Export of Radioactive Sources Dariusz Mroz & Christina George INT9182.
Occupational Radiation Protection during High Exposure Operations
Characterization and Categorization of
Occupational Radiation Protection during High Exposure Operations
Efforts to strengthen Source Security
Categorization of Radioactive Sources
Safety and Security of Radiation Sources
International Workshop on National Registers of Radiation Sources
Regulatory Oversight of HOF in Finland
Regulatory Infrastructure and Transport Safety Section
Operationalizing Export Certification and Regionalization Programmes
Presentation transcript:

Security of Radiation Sources

Objective To understand the criteria for establishing the level of security required for radioactive sources and how the criteria are to be implemented by users and the Regulatory Body

Contents Security and source categorization. Security requirements to be applied to the user. Controls to be applied by the Regulatory Body.

Background States should formulate security policy for radioactive sources and regulatory bodies should develope regulatory requirements that are consistent with the Code of Conduct . Operators managing radioactive sources should develope their own security programmes Operators should develope measures for the prevention of, detection of, and response to malicious acts involving radioactive sources, and preventing the loss of control of such sources. Security measures should be applied on a graded basis, taking into account the current evaluation of the threat, the relative attractiveness of the source, and the potential consequences resulting from malicious use. The requisite level of security is achieved through a combination of deterrence, detection, delay, response and security management Security of Radioactive Sources IAEA NSS No. 11 (2009)

Basic principles1 Every State should, in order to protect individuals, society and the environment, take the appropriate measures necessary to ensure: that the radioactive sources within its territory, or under its jurisdiction or control, are safely managed and securely protected during their useful lives and at the end of their useful lives; the promotion of safety culture and of security culture with respect to radioactive sources. MODIFIED 1 Code of Conduct on the safety and security of radiation sources, paragraph 7

Basic Principles-cont Operators, as the authorized entities, should have the primary responsibility for implementing and maintaining security measures for radioactive sources in accordance with national requirements. Operators should ensure that their personnel and their contractors are suitably trained and meet the regulatory requirements, which should include trustworthiness. Operators should promote a security culture, and establish a management system commensurate with the levels of security

Security of Radioactive Sources. Implementation Guide Security and source categorization. Security requirements to be applied by the user. Controls to be applied by the Regulatory Body. MODIFIED

Program against malevolent uses Design of devices and sources to minimize the feasibility of malicious acts; Management of sources only within an authorized and regulated legal framework; Measures to prevent unauthorized acquisition of sources; Measures to detect theft or loss; Measures to respond to theft or loss.

Part I: Security Grouping

Security Grouping based on Source Categorization Three Security Groups (A, B, and C) have been identified for the five source categorizations (1, 2, 3, 4 and 5)

Source categories 1 2 3 4 5 Activity ratio A/D 1000 10 1 0.01 exempt Teletherapy sources Irradiators Industrial gamma radiography sources High / medium dose rate brachytherapy sources Industrial gauges with high activity sources Well logging gauges Low dose rate brachytherapy sources Industrial gauges with moderate / low activity sources X-ray fluorescence (XRF) devices Electron capture devices 1 2 3 4 5 1000 10 1 0.01 exempt

Security Grouping based on Source Categorization (cont) Source Category Examples A 1 Irradiators Teletherapy Radioisotope thermoelectric generators Fixed multi-beam teletherapy (gamma knife)

Security Grouping based on Source Categorization (cont) Source Category Examples B 2 Industrial radiography High / medium dose rate brachytherapy C 3 Fixed industrial gauges that incorporate high activity sources Well logging

Security Grouping based on Source Categorization (cont) Source Category Examples Apply measures as described in the Basic Safety Standards 4 Low dose rate brachytherapy (except eye and permanent implants)) Industrial gauges that do not incorporate high activity sources Bone densitometers Static eliminators Source category 4 & 5 could be without any specific security measure and is sufficient to apply measure general requirement for security of radioactive sources as described in The International Basic Safety Standards for Protection against Ionizing Radiation and for the Safety of Radiation Sources (BSS).

Security Grouping based on Source Categorization (cont) Source Category Examples Apply measures as described in the Basic Safety Standards 5 Low dose rate brachytherapy eye plaques and permanent implant sources X-ray fluorescence devices Electron capture devices Mossbauer spectrometry sources Positron emission tomography (PET)  check sources Source category 4 & 5 could be without any specific security measure and is sufficient to apply measure general requirement for security of radioactive sources as described in The International Basic Safety Standards for Protection against Ionizing Radiation and for the Safety of Radiation Sources (BSS).

RECOMMENDED MEASURES FOR SECURITY LEVEL A function Security objective Security measures Detect Provide immediate detection of any unauthorized access to the secured area/source location Electronic intrusion detection system and/or continuous surveillance by operator personnel. any attempted unauthorized removal of the source, including by an insider Electronic tamper detection equipment and/ or continuous surveillance by operator personnel Provide immediate assessment of detection Remote monitoring of CCTV or assessment by operator / response personnel Provide immediate communication to response Rapid, dependable, diverse means of communication such as phones, cell phones, pagers, radios Provide a means to detect loss through verification Daily checking through physical checks, CCTV, tamper indicating devices, etc.

RECOMMENDED MEASURES FOR SECURITY LEVEL A - Cont function Security objective Security measures Delay Provide delay after detection sufficient for response personnel to interrupt the unauthorized removal System of at least two layers of barriers (e.g. walls, cages) which together provide delay sufficient to enable response personnel to interdict. Response Provide immediate response to assessed alarm with sufficient resources to interrupt and prevent the unauthorized removal. Capability for immediate response with size, equipment, and training to interdict . Security management Provide access controls to source location that effectively restrict access to authorized persons only. Identification and verification, for example, lock controlled by swipe card reader and personal identification number, or key and key control Ensure trustworthiness of authorized individuals Background checks for all personnel authorized for unescorted access to the source location and for access to sensitive information. Identify and protect sensitive information. Procedures to identify sensitive information and protect it from unauthorized disclosure. Provide a security plan. A security plan which conforms to regulatory requirements and provides for response to increased threat levels Ensure a capability to manage security events covered by security contingency plans Procedures for responding to security-related scenarios Establish security event reporting system Procedures for timely reporting of security events.

RECOMMENDED MEASURES FOR SECURITY LEVEL B function Security objective Security measures Detect Provide immediate detection of any unauthorized access to the secured area/source location Electronic intrusion detection system and/or continuous surveillance by operator personnel. Provide detection of any attempted unauthorized removal of the source Tamper detection equipment and/ or periodic checks by operator personnel Provide immediate assessment of detection Remote monitoring of CCTV or assessment by operator / response personnel Provide immediate communication to response personnel Rapid, dependable means of communication such as phones, cell phones, pagers, radios Provide a means to detect loss through verification Weekly checking through physical checks, tamper indicating devices, etc.

RECOMMENDED MEASURES FOR SECURITY LEVEL B - Cont function Security objective Security measures Delay Provide delay to minimize the likelihood of unauthorized removal System of two layers of barriers (e.g. walls, cages). Response Provide immediate initiation of response to interrupt unauthorized removal . Equipment and procedures to immediately initiate response. Security management Provide access controls to source location that effectively restrict access to authorized persons only. One identification measure Ensure trustworthiness of authorized individuals Background checks for all personnel authorized for unescorted access to the source location and for access to sensitive information. Identify and protect sensitive information. Procedures to identify sensitive information and protect it from unauthorized disclosure. Provide a security plan. A security plan which conforms to regulatory requirements and provides for response to increased threat levels Ensure a capability to manage security events covered by security contingency plans Procedures for responding to security-related scenarios Establish security event reporting system Procedures for timely reporting of security events.

RECOMMENDED MEASURES FOR SECURITY LEVEL C function Security objective Security measures Detect Provide detection of unauthorized removal of the source Tamper detection equipment and/ or periodic checks by operator personnel Provide immediate assessment of detection assessment by operator / response personnel Provide a means to detect loss through verification Monthly checking through physical checks, tamper indicating devices, or other checks to confirm the presence of the source. Delay Provide delay to reduce the likelihood of unauthorized removal of a source One barrier (e.g. cage, source housing) or under observation by operator personnel Response Implement appropriate action in the event of unauthorized removal of a source. Procedures for identifying necessary actions in accordance with contingency plans

RECOMMENDED MEASURES FOR SECURITY LEVEL C - Cont function Security objective Security measures Security management Provide access controls to source location that effectively restrict access to authorized persons only. One identification measure Ensure trustworthiness of authorized individuals Appropriate methods for determining the trustworthiness of authorized individuals with unescorted access to radioactive sources and access to sensitive information.. Identify and protect sensitive information. Procedures to identify sensitive information and protect it from unauthorized disclosure. Provide a security plan. Documentation of security arrangements and reference procedures Ensure a capability to manage security events covered by security contingency plans Procedures for responding to security-related scenarios Establish security event reporting system Procedures for timely reporting of security events.

Part II: Applicable Security Measures

Applicable Security Measures Administrative Appropriate administrative measures include: access control procedures; alarmed access points (e.g. with radiation detectors); key control procedures; video cameras or personal surveillance; records related to the management of sources;

Applicable Security Measures Administrative (cont) Appropriate administrative measures include: source inventories; regulations and guidance; reliability and trustworthiness of personnel; information security; quality assurance measures; and establishment of a safety culture and security culture.

Applicable Security Measures Technical Measures Appropriate technical measures include: fences; walls; cages; transport packaging; locks and interlocks for doors (or access points); locked, shielded containers.

Applicable Security Measures Emergency response plan (Group A and B sources) Minimum contents of the plan Early notification procedures. Immediate response measures to be taken. Procedures for public communication. The plan should be Exercised periodically. Evaluated periodically.

Applicable Security Measures Information Security (Group A and B sources) Information that can be used to identify specific locations, specific security measures or weaknesses in the system of management of sources should be controlled and distributed on a “need to know” basis. This includes information concerning: the specific locations of sources; the facility’s security plan and security systems; temporary or permanent weaknesses in the security system;

Applicable Security Measures Information Security (cont) source utilization plans and records; proposed dates and times of source shipments and transfers; emergency response plans and systems.

Applicable Security Measures Personnel background checks (Group A and B sources) Authorized users the licensee should ensure trustworthiness; check should be made before an authorization is granted.

Applicable Security Measures Transport The transport of Security Group B and C sources should: satisfy the performance requirements for security for the particular group; for a mobile source, administrative controls such as personal surveillance should be rigorously maintained; include consideration of a communication link to allow timely response to incidents or potential threats.

Applicable Security Measures Transport The transport of Security Group A sources should provide for: background checks on trustworthiness of the transport organization and operatives; deterrence through the use of locked and sealed transport packages and the use of a dedicated, locked transport unit; timely detection through radio communication between the personnel in the vehicle and a security office or organization;

Applicable Security Measures Transport (cont) The transport of Security Group A sources should provide for: response through security trained transport operatives; an emergency plan developed to deal with emergencies in transit.

Part III: Responsibilities of the Authorities

Applicable Security Measures The Regulatory Body The Regulatory Body should: maintain appropriate records of authorizations that clearly indicate the type of radioactive source, and records of the transfer and disposal of source on termination of the authorization; establish systems to ensure, where practicable, that radioactive sources are identifiable and traceable;

Applicable Security Measures The Regulatory Body (cont) The Regulatory Body should: ensure that regulations and other criteria with regard to the security of radioactive sources remain adequate and valid; implement an inspection Program that includes verification that facilities and radiation protection Programs are maintained and adequately manage the radioactive sources.

Part IV: Responsibilities of the Registrants and Licensees MODIFIED

Applicable Security Measures Registrants and Licensees bear the responsibility for setting up and implementing the technical and organizational measures that are needed to ensure both the safety and security of the authorized sources; who appoint other people to carry out actions and tasks, nevertheless remain responsible for the relevant actions and tasks themselves. MODIFIED

Applicable Security Measures Registrants and Licensees (cont) Registrants and Licensees should ensure that: sources are managed in accordance with the authorization; when not in use, sources are promptly stored in an approved manner and relevant to the requirements of the security grouping to which the source(s) belong; the transfer of sources to another person is documented and that person is appropriately authorized to receive the transferred source; MODIFIED

Applicable Security Measures Registrants and Licensees (cont) Registrants and Licensees should ensure that: financial provisions in accordance with regulatory requirements are in place for the safe disposal of disused sources; sources are shipped and received in accordance with regulatory requirements. MODIFIED

Applicable Security Measures Surveys and audits The registrant or licensee must: perform an inventory check of all radiation sources at regular intervals, including x-ray equipment, spent, calibration and crawler control radioactive sources; ensure that all radioactive sources are surveyed when removed from, and returned to, storage; MODIFIED

Applicable Security Measures Surveys and audits The registrant or licensee must: apply the same survey and audit procedures to locations where extended field site work is taking place and where a temporary store is established; if a radiation source cannot be located, take action as if an accident has occurred and shall immediately notify the Regulatory Body. MODIFIED

Applicable Security Measures Registrants and Licensees (cont) In addition to normal reporting requirements relating to safety issues, registrants and licensees should report to the Regulatory Body: any loss of control over a radioactive source; unauthorized access to, or unauthorized use of, a source; malicious acts threatening authorized activities; failures of equipment containing radioactive sources which may have security implications; the discovery of any unaccounted source. MODIFIED

References Security of Radioactive Sources. Implementing Guides. IAEA Nuclear Security Series No. 11, Vienna (2009). Categorization of Radioactive Sources, Safety Guide RS-G-1.9, IAEA, Vienna (2005). MODIFIED