National Library of Energy BETA

Sample records for federal information security

  1. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development | Department of Energy Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to

  2. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft ...

  3. GAO-06-811 Information Security: Coordination of Federal Cyber...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    secure, networked computer systems in the federal government and in the private sector. ... Chairman: Dramatic increases in computer interconnectivity, especially in the use of the ...

  4. Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services and International Security

    Broader source: Energy.gov [DOE]

    Subject: Cutting the Federal Government's Energy Bill: An Examination of the Sustainable Federal Government Executive Order 13524 By: Richard Kidd, Program Manager Federal Energy Management Program, Office of Energy Efficiency and Renewable Energy

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  7. Meeting Federal Energy Security Requirements

    Broader source: Energy.gov [DOE]

    Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  11. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  12. Federal Register Notice: National Nuclear Security Administration...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    New Mexico (SNLNM) Federal Register Notice: National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNL...

  13. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  14. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and

  15. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  16. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  17. Federal Register | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Register NNSA Updates Export Control Regulation WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) updated the Federal rule (10 CFR Part 810, or Part 810) that regulates the export of unclassified nuclear technology and assistance. The final rule was published in the Federal Register on Feb. 23 and will go into effect on

  18. FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) | Department...

    Energy Savers [EERE]

    FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) Form provides information on the federal assistance budget for ...

  19. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  20. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1989-09-01

    Certain governmental information must be classified for national security reasons. However, the national security benefits from classifying information are usually accompanied by significant costs -- those due to a citizenry not fully informed on governmental activities, the extra costs of operating classified programs and procuring classified materials (e.g., weapons), the losses to our nation when advances made in classified programs cannot be utilized in unclassified programs. The goal of a classification system should be to clearly identify that information which must be protected for national security reasons and to ensure that information not needing such protection is not classified. This document was prepared to help attain that goal. This document is the first of a planned four-volume work that comprehensively discusses the security classification of information. Volume 1 broadly describes the need for classification, the basis for classification, and the history of classification in the United States from colonial times until World War 2. Classification of information since World War 2, under Executive Orders and the Atomic Energy Acts of 1946 and 1954, is discussed in more detail, with particular emphasis on the classification of atomic energy information. Adverse impacts of classification are also described. Subsequent volumes will discuss classification principles, classification management, and the control of certain unclassified scientific and technical information. 340 refs., 6 tabs.

  1. federal budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    federal budget FY2015 Budget Request: Preserving President Obama's Nuclear Security Vision WASHINGTON, D.C. - The President's FY2015 Budget Request for the National Nuclear Security Administration (NNSA), delivered to Congress today, includes $11.7 billion to support NNSA's continued efforts to keep the American people safe by modernizing the U.S. nuclear stockpile, executing an... Management and Budget The organization provides timely, cost-effective, and efficient administrative and financial

  2. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  3. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  4. Federal Reporting Recipient Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Reporting Recipient Information Federal Reporting Recipient Information Recovery Act Recipient Reporting details as of March 6, 2012. ARRA870A Recovery Act - Recip Details 03062012.xlsx (439.94 KB) More Documents & Publications Federal Reporting Recipient Information Federal Reporting Recipient Information Federal Reporting Recipient Information

  5. The Federal Energy Regulatory Commission's Unclassified Cyber Security Program Â… 2013

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013 OAS-M-14-01 October 2013 Department of Energy Washington, DC 20585 October 23, 2013 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program -

  6. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  7. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  8. Federal Reporting Recipient Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    July, 19, 2011 Federal_Reporting_Recipient_Information.xls (1.04 MB

  9. Security Forms and Information | Department of Energy

    Office of Environmental Management (EM)

    New Employee Orientation Security Forms and Information Security Forms and Information ... Until such time as the new employee receives a permanent photo identification badge, the ...

  10. Notices DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4008 Federal Register / Vol. 80, No. 204 / Thursday, October 22, 2015 / Notices DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2015-0006] Guidelines for Implementing Executive Order 11988, Floodplain Management, and Executive Order 13690, Establishing a Federal Flood Risk Management Standard and a Process for Further Soliciting and Considering Stakeholder Input AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice. SUMMARY: This notice serves to

  11. Federal Laboratory Consortium | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Federal Laboratory Consortium Sandia wins tech transfer award from lab consortium EOD technician using XTK from within his response vehicle during a training exercise. NNSA's Sandia National Laboratories won the Federal Laboratory Consortium's (FLC) 2016 Award for Excellence in Technology Transfer for a decontamination product that neutralizes chemical and biological agents and

  12. Federal Emergency Management Agency | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Federal Emergency Management Agency Third interagency WINGS exercise The third Interagency Aerial Response WINGS exercise, sponsored by the Federal Emergency Management Agency (FEMA), and hosted by the Department of Energy (DOE) and the Environmental Protection Agency (EPA), will be held June 20 - 24, 2016 in Ocean County, New Jersey. On June 21, 2016 through

  13. Federal Register | Open Energy Information

    Open Energy Info (EERE)

    of Federal agencies, and provides a forum for public participation in the democratic process. The publications provide access to a wide range of Federal benefits and...

  14. Federal Register Notice: National Nuclear Security Administration Site-Wide

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNL/NM) | Department of Energy Register Notice: National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNL/NM) Federal Register Notice: National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNL/NM) Federal Register / Vol. 76, No. 156 / Friday, August 12, 2011 / Notices.

  15. Combined Federal Campaign | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Combined Federal Campaign Happy Thanksgiving to NNSA colleagues Colleagues: Thanksgiving is a time of celebration and reflection on the many reasons each of us has to be thankful. We are grateful for the blessings of family, friends, and the opportunity to live in this great country. We particularly appreciate all of you and commend your hard work

  16. The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012, OAS-L-13-01

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2 OAS-L-13-01 November 2012 Department of Energy Washington, DC 20585 November 7, 2012 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Daniel M. Weeber Assistant Inspector General for Audits and Administration Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent

  17. Membership Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Our Locations Albuquerque Complex Federal Asian Pacific American Council - New Mexico Chapter Albuquerque, NM Membership Information Membership Information "Promoting...

  18. Federal Bureau of Investigation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Bureau of Investigation NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On March 21 through March 24, the Department of Energy's National Nuclear Security Administration (NNSA) will participate in a federal and state/local training exercise in Philadelphia that will also include the Philadelphia Police Department and the Departments of Defense,... Gamma Shield Thunder Exercise Concludes National Nuclear Security Administration (NNSA)

  19. usajobs for Federal Employees | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Federal Employees Subscribe to usajobs for Federal Employees feed RSS of user search URL: https://www.usajobs.gov/ Updated: 1 hour 56 min ago General Engineer/Physical Scientist (Program Management) Thu, 2016-09-15 23:11 Job Announcement Number: 16-0215-GOV Location Name: Aiken County, South Carolina Department: Department Of Energy Agency: National Nuclear Security Administration Occupation Code: 0801, 1301 Pay Plan: NN Appointment Duration: Permanent Opening Date: Monday, September

  20. Federal Information Technology Acquisition Reform Act (FITARA...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Information Technology Acquisition Reform Act (FITARA) Data Resources FITARA Resources Available for Download: DOE IT Policy Archive: ZIP IT Leadership Directory: HTML | ...

  1. Nuclear Materials Information Program | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Information Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  2. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ...

  3. Site Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    LLNL is also home to a broad range of national security work for the DoD, DHS, the ... testing, and training in support of NNSA, the DoD, DHS, and other federal agencies. ...

  4. Information Security | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    It includes awareness training, evaluation of data, and the review of information prior to public release or posting to publicly available web sites to assure it does not contain ...

  5. Management and Security of Personally Identifiable Information

    Broader source: Energy.gov [DOE]

    This Policy Flash transmits for your information and appropriate action the Deputy Secretary's Memorandum, Management and Security of Personally Identifiable Information, dated April 17, 2013. Further information will be transmitted as it becomes available.

  6. Site Information | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Site Information Facilities & Projects Nuclear Operations Environment, Safety & Health Safeguards & Security Performance & Quality Assurance Programs NEPA Reading Room

  7. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  8. Information Technology Specialist (Info Security)

    Broader source: Energy.gov [DOE]

    (See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Corporate Services Office, Office of the Chief Information Officer, Cyber...

  9. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  10. Federal Register Notice: Proposed Agency Information Collection

    Broader source: Energy.gov [DOE]

    Federal Register Notice on the DOE’s invitation for public comment on its request to the Office of Management and Budget (OMB) to extend for three years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910–5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before November 7, 2011.

  11. Federal Register Notice: Proposed Agency Information Collection

    Broader source: Energy.gov [DOE]

    Federal Register Notice on the DOE’s invitation for public comment on its intent to request the Office of Management and Budget (OMB) to extend for four years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910–5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before October 11, 2011.

  12. Federal Reporting Recipient Information | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    U.S. Nuclear Regulatory Commission (NRC), in coordination with the U.S. Department of Energy (DOE), plans to conduct a workshop to discuss possible approaches to revising the regulatory framework for the management of commercial low-level radioactive waste (LLW). The purpose of this workshop is to gather information from a broad spectrum of stakeholders concerning the NRC's proposed options for a comprehensive revision to NRC's and DOE's waste regulations and to discuss possible options. Federal

  13. U-200: Red Hat Directory Server Information Disclosure Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  14. List of Major Information Systems,National Nuclear Security Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    List of Major Information Systems,National Nuclear Security Administration ADaPT ... List of Major Information Systems, Defense Line of Business National Nuclear Security ...

  15. Federated Wind Farm | Open Energy Information

    Open Energy Info (EERE)

    Federated Wind Farm Jump to: navigation, search Name Federated Wind Farm Facility Federated Sector Wind energy Facility Type Commercial Scale Wind Facility Status In Service Owner...

  16. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  17. Request for Information on Improving Performance of Federal Permitting...

    Energy Savers [EERE]

    Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and Review of Infrastructure...

  18. Federal Aviation Administration | Open Energy Information

    Open Energy Info (EERE)

    Aviation Administration Jump to: navigation, search Logo: Federal Aviation Administration Name: Federal Aviation Administration Address: 800 Independence Ave., SW Place:...

  19. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  20. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  1. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  2. Page 10, Security Forms and Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10 of 11 Previous Page Security Forms and Information Building Access and DOE Badges Employees entering DOE facilities must have either a DOE photo identification Security Badge or a DOE Temporary Badge. Either badge must be displayed above the waist in plain view at all times while in DOE facilities. Employees must present said badges to Protective Force personnel for inspection prior to entry into the facilities. You should have been provided instruction by email regarding training that must

  3. Supervisory Information Technology Specialist (Information Security)

    Broader source: Energy.gov [DOE]

    The Office of the Chief Information Officer is seeking a motivated and highly-qualified candidate to serve as the Director of the Cybersecurity Operations Office and oversee development and...

  4. Implementing Information Security and Its Technology: A LineManagement...

    Office of Scientific and Technical Information (OSTI)

    Country of Publication: United States Language: English Subject: 29; 99; INFORMATION SYSTEMS; MANAGEMENT; SECURITY cybersecurity cyberlaw information management privacy Word...

  5. Federal Business Opportunities website | Open Energy Information

    Open Energy Info (EERE)

    Opportunities website Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Federal Business Opportunities website Abstract This website lists federal...

  6. German Renewable Energy Federation | Open Energy Information

    Open Energy Info (EERE)

    Federation Jump to: navigation, search Name: German Renewable Energy Federation Place: Paderborn, Germany Zip: 33100 Sector: Renewable Energy Product: Paderborn-based pressure...

  7. Federal Highway Administration | Open Energy Information

    Open Energy Info (EERE)

    Administration Jump to: navigation, search Logo: Federal Highway Administration Name: Federal Highway Administration Abbreviation: FHWA Address: 1200 New Jersey Ave, SE Place:...

  8. Federal Energy Subsidies | Open Energy Information

    Open Energy Info (EERE)

    Federal Energy Subsidies Jump to: navigation, search Does wind energy receive federal subsidies, and if so how much? Do other forms of energy receive subsidies? Do fossil fuels...

  9. Federal Loan Program | Open Energy Information

    Open Energy Info (EERE)

    less. In recent years, the federal government has offered loans for renewables and energy efficiency projects. 1 Federal Loan Program Incentives CSV (rows 1 - 13) Incentive...

  10. Program Information | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Program Information FY 2015 Performance Evaluation Plan (PEP) FY 2013 Performance Evaluation Report (PER) International Union, Security, Police and Fire Professionals of America Contract International Association of Machinists and Aerospace Workers Agreement HS&E Management System Description and Worker Safety and Health Program 2015 Small Business Program (FY 2009 - 2015); Link to FY 2014 Negotiated Subcontracting Goals with Agencies (including DOE)

  11. RAPID/Geothermal/Exploration/Federal | Open Energy Information

    Open Energy Info (EERE)

    RAPIDGeothermalExplorationFederal < RAPID | Geothermal | Exploration Jump to: navigation, search RAPID Regulatory and Permitting Information Desktop Toolkit BETA About...

  12. DOE Releases Request for Information for Y-12 National Security...

    Office of Environmental Management (EM)

    Y-12 National Security Complex Water Treatment Facility Construction DOE Releases Request for Information for Y-12 National Security Complex Water Treatment Facility Construction ...

  13. Federal Energy Administration Act | Open Energy Information

    Open Energy Info (EERE)

    Federal Energy Administration Act Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: Federal Energy Administration ActLegal Abstract...

  14. Emergency Information | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Emergency Information The Sandia Field Office (SFO) Emergency Management System is designed to ensure that SFO, its contractors, and its tenants can respond effectively and efficiently to events categorized as operational emergencies and significant non-emergency events, and can provide emergency assistance so that appropriate response measures can be taken to protect workers, the public, the environment, and national security. The SFO maintains a cadre of experienced emergency response subject

  15. Information System Security Officer (ISSO) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Officer (ISSO) Information System Security Officer (ISSO) digital-388075_960_720.jpg The Information System Security Officer (ISSO) is responsible to the Information System Security Manager (SSM), information owner, and system owner for ensuring a proper security posture is in place. ISSO Core Competency Training Worksheet (241.41 KB) More Documents & Publications Cybersecurity Program Manager (CSPM) Authorizing Official Designated Representative (AODR) Information System Owner (ISO

  16. Request for Information on Improving Performance of Federal Permitting and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 | Department of Energy Improving Performance of Federal Permitting and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 The Department of Energy's Office of Electricity Delivery and

  17. Proposed Agency Information Collection: Federal Register Notice...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Collection: Federal Register Notice Volume 76, No. 195 - Oct. 7, 2011 The Department of Energy (DOE) invites public comment on DOE's request the Office of Management and ...

  18. Performing Energy Security Assessments: A How-To Guide for Federal Facility Managers

    Broader source: Energy.gov [DOE]

    Guide describes the best practices and recommended process for federal facility managers to prepare for the following sections of a facility’s energy security plan: vulnerability assessments, energy preparedness and operations plans, and remedial action plans.

  19. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE (299.08 KB) More Documents & Publications PIA - INL Education Programs Business Enclave Manchester Software 1099 Reporting PIA, Idaho National Laboratory PIA - INL PeopleSoft - Human Resource System

  20. Information System Security Manager (ISSM) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Manager (ISSM) Information System Security Manager (ISSM) macbook-925595_960_720.jpg The Information Security System Manager (ISSM) is designated by an operating unit's (DOE organization or site) Senior Manager to manage the unit's cyber security program. The ISSM establishes, documents, and monitors an operating unit's cyber security program implementation plan, and ensures compliance with DOE management policies. Candidates must possess a working knowledge of cyber security policies and

  1. Data Mining for Security Information: A Survey

    SciTech Connect (OSTI)

    Brugger, S T; Kelley, M; Sumikawa, K; Wakumoto, S

    2001-04-19

    This paper will present a survey of the current published work and products available to do off-line data mining for computer network security information. Hundreds of megabytes of data are collected every second that are of interest to computer security professionals. This data can answer questions ranging from the proactive, ''Which machines are the attackers going to try to compromise?'' to the reactive, ''When did the intruder break into my system and how?'' Unfortunately, there's so much data that computer security professionals don't have time to sort through it all. What we need are systems that perform data mining at various levels on this corpus of data in order to ease the burden of the human analyst. Such systems typically operate on log data produced by hosts, firewalls and intrusion detection systems as such data is typically in a standard, machine readable format and usually provides information that is most relevant to the security of the system. Systems that do this type of data mining for security information fall under the classification of intrusion detection systems. It is important to point out that we are not surveying real-time intrusion detection systems. Instead, we examined what is possible when the analysis is done off-line. Doing the analysis off-line allows for a larger amount of data correlation between distant sites who transfer relevant log files periodically and may be able to take greater advantage of an archive of past logs. Such a system is not a replacement for a real-time intrusion detection system but should be used in conjunction with one. In fact, as noted previously, the logs of the real-time IDS may be one of the inputs to the data mining system. We will concentrate on the application of data mining to network connection data, as opposed to system logs or the output of real-time intrusion detection systems. We do this primarily because this data is readily obtained from firewalls or real-time intrusion detectors and it

  2. RAPID/Geothermal/Land Use/Federal | Open Energy Information

    Open Energy Info (EERE)

    RAPIDGeothermalLand UseFederal < RAPID | Geothermal | Land Use Jump to: navigation, search RAPID Regulatory and Permitting Information Desktop Toolkit BETA About Bulk...

  3. RAPID/Geothermal/Environment/Federal | Open Energy Information

    Open Energy Info (EERE)

    GeothermalEnvironmentFederal < RAPID | Geothermal | Environment Jump to: navigation, search RAPID Regulatory and Permitting Information Desktop Toolkit BETA About Bulk...

  4. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site...

  5. Headquarters Facilities Master Security Plan- Chapter 13, Controlled Unclassified Information

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 13, Controlled Unclassified Information Describes DOE Headquarters procedures for protecting Controlled Unclassified Information (CUI).

  6. List of Major Information Systems,National Nuclear Security Administration

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ADaPT Networked: | Department of Energy List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear

  7. Proposed Agency Information Collection: Federal Register Notice...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to request OMB to renew Information Collection Request Title: OE Recovery Act ... for submission to the Office of Management and Budget (OMB) pursuant to the ...

  8. Farmland Security Zone | Open Energy Information

    Open Energy Info (EERE)

    Security Zone Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Farmland Security ZoneLegal Abstract California Department of...

  9. Request for Information on a National Power Transformer Reserve: Federal

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Register Notice Volume 80, No. 131 - July 9, 2015 | Department of Energy a National Power Transformer Reserve: Federal Register Notice Volume 80, No. 131 - July 9, 2015 Request for Information on a National Power Transformer Reserve: Federal Register Notice Volume 80, No. 131 - July 9, 2015 The Department of Energy (DOE), Office of Electricity Delivery and Energy Reliability (OE), is seeking comments and information from interested parties to inform its policy development related to the

  10. Information security management system planning for CBRN facilities

    SciTech Connect (OSTI)

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  11. The Department of Energy's National Security Information Fundamental...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Department of Energy's National Security Information Fundamental Classification Guidance Review The goals of this review process was to evaluate the guidance content, determine ...

  12. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  13. Secure Smart Grid Association | Open Energy Information

    Open Energy Info (EERE)

    Smart Grid Association Jump to: navigation, search Name: Secure Smart Grid Association Address: 2374 S Josephine St Place: Denver, Colorado Zip: 80210 Region: Rockies Area Number...

  14. Federal government information handbook: formerly utilized sites remedial action program

    SciTech Connect (OSTI)

    Not Available

    1980-12-31

    This volume is one of a series produced under contract with the DOE, by Politech Corporation to develop a legislative and regulatory data base to assist the FUSRAP management in addressing the institutional and socioeconomic issues involved in carrying out the Formerly Utilized Sites Remedial Action Program. This Information Handbook series contains information about all relevant government agencies at the Federal and state levels, the pertinent programs they administer, each affected state legislature, and current Federal and state legislative and regulatory initiatives. This volume is a compilation of information about the Federal Government. It contains a summary of the organization and responsibilities of agencies within the executive branch of the Federal government which may be relevant to FUSRAP activities; a brief summary of relevant Federal statutes and regulations; a description of the structure of the US Congress, identification of the officers, relevant committees and committee chairmen; a description of the Federal legislative process; a summary of legislation enacted and considered in the recently-adjourned 96th Congress; a description of the Federal budgetary process; a summary of the Carter Administration's comprehensive radioactive waste management program; and excerpts from the text of relevant federal statutes and regulations.

  15. Shared Solar. Current Landscape, Market Potential, and the Impact of Federal Securities Regulation

    SciTech Connect (OSTI)

    Feldman, David; Brockway, Anna M.; Ulrich, Elaine; Margolis, Robert

    2015-04-07

    This report provides a high-level overview of the current U.S. shared solar landscape, the impact that a given shared solar program’s structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.

  16. Shared Solar. Current Landscape, Market Potential, and the Impact of Federal Securities Regulation

    SciTech Connect (OSTI)

    Feldman, David; Brockway, Anna M.; Ulrich, Elaine; Margolis, Robert

    2015-04-01

    This report provides a high-level overview of the current U.S. shared solar landscape and the impact that a given shared solar program’s structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.

  17. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing Department of Energy (DOE), including National Nuclear Security Administration (NNSA), Federal workers with a safe and healthful workplace. Cancels DOE O 440.1A. Certified 6/17/2011. Canceled by DOE O 440.1B Chg 1.

  18. Electronic DOE Information Security System (eDISS) PIA, Office of Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Safety and Security | Department of Energy DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security (88.14 KB) More Documents & Publications Integrated Safety Management Workshop

  19. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  20. The Department of Energy's National Security Information Fundamental

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Classification Guidance Review | Department of Energy The Department of Energy's National Security Information Fundamental Classification Guidance Review The Department of Energy's National Security Information Fundamental Classification Guidance Review The goals of this review process was to evaluate the guidance content, determine if the guidance conforms to current operational and technical circumstances, determine if the guidance meets the standards for classification under section 1.4

  1. Proposed Agency Information Collection: Federal Register Notice Volume 76,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    No. 195 - Oct. 7, 2011 | Department of Energy 95 - Oct. 7, 2011 Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 195 - Oct. 7, 2011 The Department of Energy (DOE) invites public comment on DOE's request the Office of Management and Budget (OMB) to extend for three years the emergency Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 that DOE is submitting to OMB pursuant to the Paperwork Reduction Act of

  2. Federal Information Technology Acquisition Reform Act (FITARA) Data

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Resources | Department of Energy Information Technology Acquisition Reform Act (FITARA) Data Resources Federal Information Technology Acquisition Reform Act (FITARA) Data Resources FITARA Resources Available for Download: DOE IT Policy Archive: ZIP IT Leadership Directory: HTML | JSON | PDF CIO Governance Board Membership List: HTML | JSON | PDF DOE IT Reform Cost Savings: JSON | PDF DOE IT Policies policyarchive.zip (1.36 MB) bureaudirectory.html (8.07 KB) bureaudirectory.json (10.48 KB)

  3. information systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    information systems NNSA's systems administrators keep the computers running For Systems Administrator (SysAdmin) Day, meet some of the men & women keeping NNSA going. Thanks for all you do! Michelle Swinkels, Senior Systems and Network Technologist at NNSA's Lawrence Livermore National Laboratory What excites you about your work for NNSA? I'... NNSA's G2 Management Information System Wins Association for Enterprise Information's (AFEI) "Excellence in Enterprise Information Award"

  4. Program Information | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Program Information FY 2015 Performance Evaluation Plan (PEP) FY 2013 Performance ... Description and Worker Safety and Health Program 2015 Small Business Program (FY 2009 - ...

  5. National Security Information Classification Guidance Fundamental...

    Broader source: Energy.gov (indexed) [DOE]

    ... Isotopes Separation by the Atomic Vapor Laser Isotope Separation Process (CG-UAV-2) . ... classification is based on an assessment of the damage done by releasing this information. ...

  6. Important Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Important Information Important Information From time to time, important information for subcontractors to Y-12 is posted on this web page. If you have a question that is not answered here, please contact Procurement at 865.576.8500. Taxes on sales to Y-12 are subject to the the provisions of the State of Tennessee Sales Tax Rule and Regulation Number 68. See the Y-12 Blanket Certificate of Resale (PDF), which includes the letter from the Tennessee Department of Revenue. Financial information,

  7. How to implement security controls for an information security program at CBRN facilities

    SciTech Connect (OSTI)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  8. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  9. Denver Federal Center Solar Park | Open Energy Information

    Open Energy Info (EERE)

    Federal Center Solar Park Jump to: navigation, search Name Denver Federal Center Solar Park Facility Denver Federal Center Sector Solar Facility Type Photovoltaic Owner SunEdison...

  10. Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1993-07-23

    The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Supersedes DOE 5639.8.

  11. Form:Federal Oil and Gas Regulation | Open Energy Information

    Open Energy Info (EERE)

    Federal Oil and Gas Regulation Jump to: navigation, search Federal Oil and Gas Regulation This is the "Federal Oil and Gas Regulation" form. To create a page with this form, enter...

  12. Form:Federal Oil and Gas Statute | Open Energy Information

    Open Energy Info (EERE)

    Federal Oil and Gas Statute Jump to: navigation, search Federal Oil and Gas Statute This is the "Federal Oil and Gas Statute" form. To create a page with this form, enter the page...

  13. Special nuclear material information, security classification guidance. Instruction

    SciTech Connect (OSTI)

    Flickinger, A.

    1982-12-03

    The Instruction reissues DoD Instruction 5210.67, July 5, 1979, and provides security classification guidance for information concerning significant quantities of special nuclear material, other than that contained in nuclear weapons and that used in the production of energy in the reactor plant of nuclear-powered ships. Security classification guidance for these data in the latter two applications is contained in Joint DoE/DoD Nuclear Weapons Classification Guide and Joint DoE/DoD Classification Guide for the Naval Nuclear Propulsion Program.

  14. Federal University of Sao Carlos | Open Energy Information

    Open Energy Info (EERE)

    Sao Carlos Jump to: navigation, search Name: Federal University of Sao Carlos Place: Sao Carlos, Sao Paulo, Brazil Zip: 13565-905 Product: Federal university of Sao Carlos....

  15. Freedom of Information Act Related Sites | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Related Sites DOE Headquarters FOIA Page DOE Office of Hearings and Appeals Searchable index of FOIA and Privacy Act appeals A Citizen's Guide on Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records Department of Justice (DOJ) Office of Information and Privacy Includes the DOJ Guide to the FOIA, Overview of the PA, Your Right to Federal Records, FOIA Updates, and FOIA Annual Reports Defense Nuclear Facilities Safety Board An

  16. Security classification of information concerning high-energy lasers. Instruction

    SciTech Connect (OSTI)

    MacCallum, J.

    1981-09-18

    The Instruction reissues Department of Defense (DoD) Instruction 5210.61, April 7, 1977, to update policy and guidance, and establishes uniform criteria for the security classification of information concerning DoD programs and projects involving the research, development, test and evaluation (RDT E), application, production, and operational use of high-energy lasers (HEL), and their application for military purposes, whether as weapons or in other military systems.

  17. Category:Federal Oil and Gas Statutes | Open Energy Information

    Open Energy Info (EERE)

    Federal Oil and Gas Statutes Jump to: navigation, search Add a new Federal Oil and Gas Statute You need to have JavaScript enabled to view the interactive timeline. Further results...

  18. RAPID/Solar/Environment/Federal | Open Energy Information

    Open Energy Info (EERE)

    a federal permit. The level and scope of the NEPA review will vary depending on the nature of the project and the level of involvement by federal agencies. A small amount of...

  19. RAPID/BulkTransmission/Environment/Federal | Open Energy Information

    Open Energy Info (EERE)

    a federal permit. The level and scope of the NEPA review will vary depending on the nature of the project and the level of involvement by federal agencies. A small amount of...

  20. CCC Federal License and Permit List | Open Energy Information

    Open Energy Info (EERE)

    CCC Federal License and Permit List Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: CCC Federal License and Permit ListLegal Abstract...

  1. Shared Solar: Current Landscape, Market Potential, and the Impact of Federal Securities Regulation; NREL (National Renewable Energy Laboratory)

    SciTech Connect (OSTI)

    2015-05-27

    This presentation provides a high-level overview of the current U.S. shared solar landscape, the impact that a given shared solar program's structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.

  2. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F. Russell; Carroll, J. Ritchie; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  3. Secure quantum private information retrieval using phase-encoded queries

    SciTech Connect (OSTI)

    Olejnik, Lukasz

    2011-08-15

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  4. Secure Retrieval of FFTF Testing, Design, and Operating Information

    SciTech Connect (OSTI)

    Butner, R. Scott; Wootan, David W.; Omberg, Ronald P.; Makenas, Bruce J.; Nielsen, Deborah

    2009-10-01

    One of the goals of the Advanced Fuel Cycle Initiative (AFCI) is to preserve the knowledge that has been gained in the United States on Liquid Metal Reactors (LMR). In addition, preserving LMR information and knowledge is part of a larger international collaborative activity conducted under the auspices of the International Atomic Energy Agency (IAEA). A similar program is being conducted for EBR-II at the Idaho Nuclear Laboratory (INL) and international programs are also in progress. Knowledge preservation at the FFTF is focused on the areas of design, construction, startup, and operation of the reactor. As the primary function of the FFTF was testing, the focus is also on preserving information obtained from irradiation testing of fuels and materials. This information will be invaluable when, at a later date, international decisions are made to pursue new LMRs. In the interim, this information may be of potential use for international exchanges with other LMR programs around the world. At least as important in the United States, which is emphasizing large-scale computer simulation and modeling, this information provides the basis for creating benchmarks for validating and testing these large scale computer programs. Although the preservation activity with respect to FFTF information as discussed below is still underway, the team of authors above is currently retrieving and providing experimental and design information to the LMR modeling and simulation efforts for use in validating their computer models. On the Hanford Site, the FFTF reactor plant is one of the facilities intended for decontamination and decommissioning consistent with the cleanup mission on this site. The reactor facility has been deactivated and is being maintained in a cold and dark minimal surveillance and maintenance mode until final decommissioning is pursued. In order to ensure protection of information at risk, the program to date has focused on sequestering and secure retrieval

  5. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  6. A Framework for Federated Two-Factor Authentication Enabling Cost-Effective Secure Access to Distributed Cyberinfrastructure

    SciTech Connect (OSTI)

    Ezell, Matthew A; Rogers, Gary L; Peterson, Gregory D.

    2012-01-01

    As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity. The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, data resources, and software tools. XSEDE will offer centralized strong authentication for services amongst service providers that leverage their own user databases and security profiles. This work implements a scalable framework built on standards to provide federated secure access to distributed cyberinfrastructure.

  7. Category:Federal Oil and Gas Regulations | Open Energy Information

    Open Energy Info (EERE)

    Regulations Jump to: navigation, search Add a new Federal Oil and Gas Regulation This category currently contains no pages or media. Retrieved from "http:en.openei.orgw...

  8. Federal Cave Resources Protection Act | Open Energy Information

    Open Energy Info (EERE)

    allowing the land managing agencies to withhold the location of caves from the public, and requiring permits for any removal or collecting activities in caves on Federal...

  9. LOPP Federal Register Example Document | Open Energy Information

    Open Energy Info (EERE)

    GuidanceSupplemental Material Abstract Example LOPP federal register notice. Author Bureau of Reclamation Published Department of Interior, 2015 DOI Not Provided Check for DOI...

  10. Category:Regulatory Roadmap Federal Sections | Open Energy Information

    Open Energy Info (EERE)

    Datasets Community Login | Sign Up Search Category Edit History Category:Regulatory Roadmap Federal Sections Jump to: navigation, search GRR-logo.png Looking for the Regulatory...

  11. Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Subject: Cost-Plus Award Fee By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management

  12. NMMSS Information, Reports & Forms | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) NMMSS Information, Reports & Forms D-23 DOE Contractors Rev August 2016 D-24 NRC Licensees Rev August 2016 Change Request Forms Security Forms DOE/NRC Forms Sample Forms NMMSS Reports Code tables References NMMSS Users Guide (pdf) Frequently Asked Questions XML Schema v2 for Transactions (xsd) XML Schema v2 for Inventory (xsd) XML Schema v2 for Material Balance (xsd) NMMSS Contacts NMMSS Working Group (pdf) Newsletters DOE/NRC 741 Crosswalk to SAMS (pdf) NMMSS

  13. Federal Regulations | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Regulations Federal Regulations NOTE: Adobe Acrobat Reader may be necessary to view PDF documents listed below. Accessibility Section 508 of the Rehabilitation Act - Electronic and Information Technology Accessibility Standards Section 504 of the Rehabilitation Act - Nondiscrimination Under Federal Grants and Programs Federal Records Act Freedom of Information Act (as amended) Freedom of Information Act Updates Privacy Act of 1974 (as amended) Privacy Act Overview Cyber Security Atomic

  14. The use of information technology security assessment criteria to protect specialized computer systems

    SciTech Connect (OSTI)

    Lykov, V.A.; Shein, A.V.; Piskarev, A.S.; Devaney, D.M.; Melton, R.B.; Hunteman, W.J.; Prommel, J.M.; Rothfuss, J.S.

    1997-10-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry.

  15. EcoSecurities India Ltd | Open Energy Information

    Open Energy Info (EERE)

    Indian subsidiary of UK CDM project developer EcoSecurities, to focus primarily on methane capture and destruction projects. References: EcoSecurities India Ltd.1 This...

  16. Zicom Electronic Security Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    Security Systems Ltd. Place: Mumbai, Maharashtra, India Zip: 400093 Sector: Solar, Wind energy Product: Mumbai-based electronic security systems integrator. The firm plans to...

  17. MN Office of Energy Security | Open Energy Information

    Open Energy Info (EERE)

    MN Office of Energy Security Jump to: navigation, search Name: MN Office of Energy Security Place: St. Paul, MN Website: www.mnofficeofenergysecurity.c References: MN Office of...

  18. U.S. Department of Energy Federal Information Technology Acquisition Reform

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Act (FITARA) Common Baseline Implementation Plan and Self-Assessment | Department of Energy S. Department of Energy Federal Information Technology Acquisition Reform Act (FITARA) Common Baseline Implementation Plan and Self-Assessment U.S. Department of Energy Federal Information Technology Acquisition Reform Act (FITARA) Common Baseline Implementation Plan and Self-Assessment The DOE Federal Information Technology Acquisition Reform Act (FITARA) Implementation Plan provides the framework

  19. Federal Heights, Colorado: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    article is a stub. You can help OpenEI by expanding it. Federal Heights is a city in Adams County, Colorado. It falls under Colorado's 2nd congressional district.12...

  20. Federal Way, Washington: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    This article is a stub. You can help OpenEI by expanding it. Federal Way is a city in King County, Washington. It falls under Washington's 9th congressional district.12...

  1. Clean Air Act: Confidential business information security manual (revised). Procedures manual

    SciTech Connect (OSTI)

    Toomer, M.W.

    1998-08-01

    The procedures in this manual provide Federal, contractor, and subcontractor employees with the information necessary to utilize Confidential Business Information to perform their assigned duties without violating applicable Federal regulations protecting the rights of its owners.

  2. Fact Sheet Preliminary Notice of Violation: Classified Information Security Event at LANL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LANL On May 27, 2015 the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation (PNOV) to Los Alamos National Security, LLC (LANS) for violations of Department of Energy (DOE) classified information security program requirements. LANS is the management and operating contractor for NNSA's Los Alamos National Laboratory (LANL), located in Los Alamos, New Mexico. The PNOV cites three violations of Departmental classified information security requirements related to

  3. Fact Sheet Preliminary Notice of Violation: Classified Information Security Event at SNL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SNL On May 27, 2015, the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation (PNOV) to Sandia Corporation (Sandia) for violations of Department of Energy (DOE) classified information security program requirements. Sandia is the management and operating contractor for NNSA's Sandia National Laboratories (SNL), located in Albuquerque, New Mexico. The PNOV cites six violations of Departmental classified information security requirements related to a security

  4. RAPID/BulkTransmission/Federal | Open Energy Information

    Open Energy Info (EERE)

    Permitting Information Desktop Toolkit BETA About Bulk Transmission Geothermal Hydropower Solar Tools Contribute Contact Us Regulatory Information Overviews Search for other...

  5. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    SciTech Connect (OSTI)

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  6. Comments on the Request for Information on Improving Performance of Federal

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Permitting and Review of Infrastructure Projects | Department of Energy on the Request for Information on Improving Performance of Federal Permitting and Review of Infrastructure Projects Comments on the Request for Information on Improving Performance of Federal Permitting and Review of Infrastructure Projects On August 29, 2013, the U.S. Department of Energy (DOE) published a Request for Information seeking information on a draft Integrated, Interagency Pre-Application (IIP) Process for

  7. Credit Leona Securities Asia CLSA UK | Open Energy Information

    Open Energy Info (EERE)

    Leona Securities Asia CLSA UK Jump to: navigation, search Name: Credit Leona Securities Asia - CLSA (UK) Place: London, United Kingdom Zip: EC3V 4QH Sector: Services Product: CLSA...

  8. Department of Energy Cites Battelle Energy Alliance, LLC for Classified Information Security Violations

    Broader source: Energy.gov [DOE]

    Department of Energy issues a Preliminary Notice of Violation (PNOV) to Battelle Energy Alliance, LLC (BEA), for violations of DOE's classified information security program requirements

  9. 3-Year Renewal Request of OMB 1910-1800, Security, Information Collections

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 3-Year Renewal Request of OMB 1910-1800, Security, Information Collections 3-Year Renewal Request of OMB 1910-1800, Security, Information Collections Following are the collection instruments for your viewing. DOE F 5631.34, Data Report on Spouse/Cohabitant Security Incident Notification Report and Report of Preliminary Security Incident/Infraction (DOE F 471.1 and DOE F 5639.3) DOE F 5631.20, Request for Visitor Access Approval DOE Form 5631.18, Security

  10. Class Deviation from Federal Awardee Performance and Integrity Information Systems (FAPIIS) Requirement at Federal Acquisition Regulation (FAR) 9.4

    Broader source: Energy.gov [DOE]

    Attached is Civilian Agency Acquisition Letter 20 10-02. which recommends that civilian agencies authorize class deviations from FAR provisions 9.406-3(f)(1) and 9.407-3(e)(l), the specific portions of the Federal Awardee Performance and Integrity Information Systems (FAPIIS) rule requiring debarring and suspending officials to enter administrative agreements into the FAPSIIS data system. Accordingly, also attached is the Department of Energy's class deviation suspending compliance with this portion of the FAPIIS rule.

  11. Technical Services | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Technical Services Technical Services Technical services spans Y-12 disciplines that support manufacturing at Y-12. Information Systems (National Security Systems Development) Provide solutions for information security, including the protection of national security, proprietary and any other class of highly sensitive information. Develop highly integrated, enterprise level software applications for use within the federal space and adaptable to commercial application. Leverage the transformative

  12. Index of Energy Security Risk | Open Energy Information

    Open Energy Info (EERE)

    for 21st Century Energy Sector: Energy Focus Area: Non-renewable Energy, Renewable Energy Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website:...

  13. Security Forms | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  14. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  15. Acquisition Guide, Chapter 42.16, Reporting Other Contractor Information into the Federal Awardee Performance and Integrity Information System

    Broader source: Energy.gov [DOE]

    The subject Acquisition Guide Chapter has the internal procedures for data entry to report other contractor information into the Federal Awardee Performance and Integrity Information System (FAPIIS). Other contractor information includes terminations for cause or default, defective cost or pricing data, determinations of non-responsibility, and administrative agreements for debarment or suspension.

  16. FOIA 10CFR, Code of Federal Regulations for the Freedom of Information Act

    Broader source: Energy.gov [DOE]

    FOIA 10CFR, Code of Federal Regulations (CFR) for the Freedom of Information Act is 10 CFR 1004, as posted on the U.S. Department of Energy website.

  17. PKI-based security for peer-to-peer information sharing

    SciTech Connect (OSTI)

    Berket, Karlo; Essiari, Abdelilah; Muratas, Artur

    2004-05-02

    The free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a number of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.

  18. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Supersedes DOE O 440.1B Chg 1.

  19. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Chg 1 dated 8-21-12. Cancels DOE M 440.1-1A. Admin Chg 1, dated 3-14-13.

  20. Energy Independence and Security Act of 2007 | Open Energy Information

    Open Energy Info (EERE)

    Energy Independence and Security Act of 2007 Jump to: navigation, search This article is a stub. You can help OpenEI by expanding it. External Links Energy Independence and...

  1. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  2. Foreign Affairs Information System (FAIS) Early Operational Capability (EOC) network security criteria

    SciTech Connect (OSTI)

    Not Available

    1988-09-12

    The Joint Center for Information Security Technology (JCIST) at Oak Ridge, Tennessee, under an interagency agreement between the Department of State (DOS) and the Department of Energy (DOE), has been tasked with the security certification testing of the Foreign Affairs Information system (FAIS) Early Operational Capability (EOC) software. The basis for this certification is the FAIS (EOC) Security Requirements Allocation (SRA) document. This document defines the security requirements for the FAIS EOC software. Security certification of the FAIS system is the responsibility of the Office of Information Systems Security, Bureau of Diplomatic Security (DS/ST/ISS). The overall FAIS EOC certification will be completed in two general steps. First, a test of a stand-alone FAIS EOC system against the SRA requirements which is currently in progress. Second is a test of all FAIS network system interfaces against the SRA requirements as expanded to adequately address the network security issues. This accumulation of requirements is referred to as the FAIS EOC Network Security Criteria. 5 refs.

  3. of Western Area Power Administration's Cyber Security Program

    Broader source: Energy.gov (indexed) [DOE]

    ... could be exploited by both an insider and a remote attacker. ... Technology, such as NIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems and ...

  4. How information resources are used by federal agencies in risk assessment application: Rapporteur summary

    SciTech Connect (OSTI)

    Fenner-Crisp, P.

    1990-12-31

    The application of information available for risk assessment from the federal perspective is described. Different federal agencies conduct varying degrees of hazard evaluation, and some also generate empirical data. The role of the Agency for Toxic Substances and Disease Registry in hazard assessments of potential public health impacts of Superfund sites includes identification of the 275 most significant substances. ATSDR is responsible for preparing toxicological profiles. ATSDR also identifies data gaps and needs critical to adequately assessing human health impacts.

  5. Determining Home Range and Preferred Habitat of Feral Horses on the Nevada National Security Site Using Geographic Information Systems

    SciTech Connect (OSTI)

    Burns, Ashley V.

    2014-05-30

    Feral horses (Equus caballus) are free-roaming descendants of domesticated horses and legally protected by the Wild and Free-Roaming Horses and Burros Act of 1971, which mandates how feral horses and burros should be managed and protected on federal lands. Using a geographic information system to determine the home range and suitable habitat of feral horses on the federally managed Nevada National Security Site can enable wildlife biologists in making best management practice recommendations. Home range was estimated at 88.1 square kilometers. Site suitability was calculated for elevation, forage, slope, water presence and horse observations. These variables were combined in successive iterations into one polygon. Suitability rankings established that 85 square kilometers are most suitable habitat, with 2,052 square kilometers of good habitat 1,252 square kilometers of fair habitat and 122 square kilometers of least suitable habitat.

  6. Nuclear safety information sharing agreement between NRC and DOE’s Office of Environment, Health, Safety and Security

    Broader source: Energy.gov [DOE]

    Nuclear safety information sharing agreement between NRC and DOE’s Office of Environment, Health, Safety and Security.

  7. Freedom of Information Act (FOIA) | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Freedom of Information Act - Costs Public Reading Facilities Freedom of Information Act Related Sites FOIA Requester Service Centers, FOIA Public Liaisons and Web Pages Virtual ...

  8. Fact Sheet Preliminary Notice of Violation: Classified Information Security Event at Y-12

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Y-12 On January 28, 2016, the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation (PNOV) to Babcock and Wilcox Technical Services Y-12, LLC (B&W Y-12) for violations of Department of Energy (DOE) classified information security program requirements. B&W Y-12 was the management and operating contractor for NNSA's Y-12 National Security Complex (Y-12), located in Oak Ridge, Tennessee at the time of discovery of the security event. The PNOV cites three

  9. DOE Releases Request for Information for Y-12 National Security Complex

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Water Treatment Facility Construction | Department of Energy Y-12 National Security Complex Water Treatment Facility Construction DOE Releases Request for Information for Y-12 National Security Complex Water Treatment Facility Construction June 30, 2016 - 4:00pm Addthis Media Contact: Lynette Chafin 513-246-0461 Lynette.Chafin@emcbc.doe.gov Cincinnati -- The U.S. Department of Energy (DOE) today issued a Request for Information (RFI) seeking to solicit input via capability statements from

  10. Federal Awardee Performance and Integrity Information System (FAPIIS) – Public Access

    Broader source: Energy.gov [DOE]

    On April 15, 2011, the public side of the Federal Awardee Performance and Integrity Information System (FAPIIS) website was launched. This means that information posted to FAPIIS on and after this date, with the exception of past performance reviews, will be accessible by the public. Public access to information posted to FAPIIS prior to April 15, 2011, will be subject to the Freedom of Information Act (FOIA) process. (See paragraph (b)(3) of 52.209-9, Updates of Publicly Available Information Regarding Responsibility Matters (JAN 2011)).

  11. PRIVACY/SECURITY NOTICE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system

  12. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  13. Federal Awardee Performance and Integrity Information System (FAPIIS) Trailer (Civilian Agency Acquisition Letter 2010-05)

    Broader source: Energy.gov [DOE]

    The Civilian Agency Acquisition Letter 2010-05 encourages the acquisition community to view the FAPIIS trailer for an overview of the FAPIIS requirement. The website to access the FAPIIS trailer is www.fai.gov/FAPIIS/trailer/module.htm. Policy Flash 2010-56 issued Acquisition Guide Chapter 42.16, Reporting Other Contractor Information into the Federal Awardee Performance and Integrity Information System which provides the Department of Energy internal procedures.

  14. Secure communication of static information by electronic means

    DOE Patents [OSTI]

    Gritton, Dale G.

    1994-01-01

    A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

  15. NEVADA NATIONAL SECURITY SITE (NNSS) DRIVERS ROUTE/SHIPMENT INFORMATION

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (NNSS) DRIVERS ROUTE/SHIPMENT INFORMATION (12/2014 Log No. 2014-229) NOTE: THIS FORM IS TWO (2) PAGES - YOU MUST COMPLETE BOTH PAGES NNSS SHIPMENT NUMBER: CARRIER NAME: TRACTOR NO.: TRAILER NO.: AT ORIGIN AT NNSS Main Gate NNSS OFFICE USE ONLY DEPARTURE DATE: ARRIVAL DATE: DESTINATION AREA: Area 5 DEPARTURE TIME: ARRIVAL TIME: NNSS DEPARTURE TIME: LOCATION: HELD OVER? No Yes REASON: ROUTE INFORMATION REVIEWED BY: ONSITE SHIPMENT (MAP NOT APPLICABLE) DROP YARD; LEAVE THIS FORM WITH SHIPPING

  16. Implementing Information Security and Its Technology: A LineManagement Perspective

    SciTech Connect (OSTI)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  17. Headquarters Facilities Master Security Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    » Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2016 version of the Headquarters Facilities Master Security Plan (HQFMSP). The purpose of the HQFMSP is to inform employees, contractors, and visitors of the security procedures in place at Department of Energy (DOE) Headquarters (HQ) facilities in the Washington, DC area. The HQFMSP does not establish new security requirements; security requirements are established by various Federal laws

  18. Emergency Public Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration | (NNSA) Response / Training Emergency Operations Training Academy Rotating image showing pictures of Classroom, Online and Hands on trainings The Office of Emergency Operations, NA-40-The Emergency Operations Training Academy (EOTA) EOTA provides training and education to enhance the readiness of personnel in the radiological-nuclear emergency operations community. For more information or to contact us, visit the EOTA website at: http://eota.energy.gov/ Vision The Emergency

  19. Disclaimer | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disclaimer Disclaimer Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended

  20. Federal Digital Strategy | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Digital Strategy Federal Digital Strategy New expectations require the Federal Government to be ready to deliver and receive digital information and services anytime, anywhere and on any device. It must do so safely, securely, and with fewer resources. To build for the future, the Federal Government has developed a Digital Strategy that embraces the opportunity to innovate more with less, and enables entrepreneurs to better leverage government data to improve the quality of services to

  1. Federal Automated Information System of Nuclear Material Control and Accounting: Uniform System of Reporting Documents

    SciTech Connect (OSTI)

    Pitel, M V; Kasumova, L; Babcock, R A; Heinberg, C

    2003-06-12

    One of the fundamental regulations of the Russian State System for Nuclear Material Accounting and Control (SSAC), ''Basic Nuclear Material Control and Accounting Rules,'' directed that a uniform report system be developed to support the operation of the SSAC. According to the ''Regulation on State Nuclear Material Control and Accounting,'' adopted by the Russian Federation Government, Minatom of Russia is response for the development and adoption of report forms, as well as the reporting procedure and schedule. The report forms are being developed in tandem with the creation of an automated national nuclear material control and accounting system, the Federal Information System (FIS). The forms are in different stages of development and implementation. The first report forms (the Summarized Inventory Listing (SIL), Summarized Inventory Change Report (SICR) and federal and agency registers of nuclear material) have already been created and implemented. The second set of reports (nuclear material movement reports and the special anomaly report) is currently in development. A third set of reports (reports on import/export operations, and foreign nuclear material temporarily located in the Russian Federation) is still in the conceptual stage. To facilitate the development of a unified document system, the FIS must establish a uniform philosophy for the reporting system and determine the requirements for each reporting level, adhering to the following principles: completeness--the unified report system provides the entire range of information that the FIS requires to perform SSAC tasks; requisite level of detail; hierarchical structure--each report is based on the information provided in a lower-level report and is the source of information for reports at the next highest level; consistency checking--reports can be checked against other reports. A similar philosophy should eliminate redundancy in the different reports, support a uniform approach to the contents of

  2. DOE Issues Agency Information Collection Extension for OE-417 Form in the Federal Register

    Broader source: Energy.gov [DOE]

    The Department of Energy (DOE) has issued an Agency Information Collection Extension in the Federal Register, notifying the public of an information collection extension and requesting public comments on the revised Form OE-417 "Electric Emergency Incident and Disturbance Report" which is used to report electric emergency incidents and disturbances to DOE. The OE-417 reports enable the DOE to monitor electric emergency incidents and disturbances in the United States so that the Government may help prevent the physical or virtual disruption of the operation of any critical infrastructure.

  3. Departmental Personnel Security FAQs | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Departmental Personnel Security FAQs Departmental Personnel Security FAQs Frequently Asked Questions (FAQ) The Personnel Security Program ensures that individuals who are being considered for access to classified information or special nuclear material (SNM) meet national standards of honesty, reliability, and trustworthiness. Because each Federal agency's program is similar, most questions come from personnel who have never had a security clearance (DOE calls it an access authorization) or who

  4. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  5. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration Office of ...

  6. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration 1000 Independence ...

  7. Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.3

    SciTech Connect (OSTI)

    Burford, M.J.; Burnett, R.A.; Downing, T.R.

    1996-12-01

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the (Pacific Northwest National Laboratory) (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. 91 This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login, privileges, and usage. The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment.

  8. DOE integrated safeguards and security (DISS) system a nation-wide distributed information system for personnel security

    SciTech Connect (OSTI)

    Block, B.

    1997-06-05

    DISS uses secure client-server and relational database technology across open networks to address the problems of security clearance request processing and tracking of security clearances for the Department of energy. The system supports the entire process from data entry by the prospective clearance holders through tracking of all DOE clearances, and use of standard DOE badges in automated access control systems throughout the DOE complex.

  9. The theory of diversity and redundancy in information system security : LDRD final report.

    SciTech Connect (OSTI)

    Mayo, Jackson R.; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C.; Allan, Benjamin A.; Pierson, Lyndon George

    2010-10-01

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  10. Homeland Security Presidential Directive (HSPD)-12 | National Nuclear

    National Nuclear Security Administration (NNSA)

    Security Administration | (NNSA) Homeland Security Presidential Directive (HSPD)-12 HSPD-12 mandates a common identification standard for all Federal employees and contractors who have a need to access government facilities and information systems. The NNSA goal is to develop a common solution for effective and secure logical and physical access for longer than six months. Individuals who have a valid need to access NNSA-owned security areas, facilities and information systems will be issued

  11. Acquisition Guide, Chapters 42.15, Contractor Performance Information and 42.16 Reporting Other Contractor Information into Federal Awardee Performance and Integrity Information System (FAPIIS)

    Broader source: Energy.gov [DOE]

    The subject Acquisition Guide Chapters have been updated to incorporate guidance from the Office of Federal Procurement Policy's (OFPP) March 6, 2013 memorandum Improving the Collection and Use of Information about Contractor Performance and Integrity. A summary of some the revisions for both chapters includes DOE's annual reporting performance targets, MAX site quarterly reporting by the DOE Agency Coordinator, the requirement for 100% reporting compliance at all levels from the local office through the Headquarters, describing monitoring methods integrity information for FAPIIS, and updating list of the available past performance and FAPIIS training opportunities.

  12. Site Information--Updates 2-3-15 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | (NNSA) Site Information--Updates 2-3-15 KCFO ES&H Surveillance Plan NSC Emergency Plan (Available through request to SEB4@nnsa.doe.gov) Bannister Federal Complex Emergency Plan (Available through request to SEB4@nnsa.doe.gov) NSC Spill Control Plan KCP Annual Site Environmental Study KCP Final Environmental Assessment KCP Environmental Assessment FONSI EPA Hazardous and Solid Waste Amendments Permit Kansas City MO Wastewater Discharge Permit for KCP Air Pollution Control Program New

  13. File:08-FD-a - FederalTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    8-FD-a - FederalTransmission.pdf Jump to: navigation, search File File history File usage File:08-FD-a - FederalTransmission.pdf Size of this preview: 463 599 pixels. Other...

  14. What is the Freedom of Information Act (FOIA)? | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) What is the Freedom of Information Act (FOIA)? The FOIA, Title 5, United States Code, Section 552, was signed into law on July 4, 1966, by President Lyndon Johnson. Since then, the FOIA has been amended in 1974, 1986, and, most recently, with the enactment of the Electronic Freedom of Information Act Amendments of 1996 (E-FOIA). The U. S. Department of Energy (DOE) implements the FOIA pursuant to regulation in 10 Code of Federal Regulations, Part 1004 (10 CFR, Part

  15. Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-10-20

    This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Supersedes DOE G 440.1-1A and DOE G 440.1-8.

  16. Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-10-20

    This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Cancels DOE G 440.1-1A and DOE G 440.1-8. Adm Chg 1, dated 3-22-13.

  17. Safety and Security Enforcement Coordinator Handbook

    Broader source: Energy.gov (indexed) [DOE]

    & III-4) ......9 * Classified Information Security Noncompliance ... * Additional Guidance Unique to Classified Information Security Enforcement ...

  18. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  19. Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.4

    SciTech Connect (OSTI)

    Arp, J.A.; Burnett, R.A.; Downing, T.R.

    1997-11-21

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the US Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login privileges, and usage. The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via telecommunications links.

  20. Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.4.6

    SciTech Connect (OSTI)

    Arp, J.A.; Bower, J.C.; Burnett, R.A.; Carter, R.J.; Downing, T.R.; Fangman, P.M.; Gerhardstein, L.H.; Homer, B.J.; Johnson, D.M.; Johnson, R.L.; Johnson, S.M.; Loveall, R.M.; Martin, T.J.; Millard, W.D.; Schulze, S.A.; Stoops, L.R.; Tzemos, S.; Wood, B.M.

    1999-06-29

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are corrected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication data distribution and notification functionality necessary to operate FEMIS in a networked, client/server environment.

  1. Federal Emergency Management Information System (FEMIS) system administration guide, version 1.4.5

    SciTech Connect (OSTI)

    Arp, J.A.; Burnett, R.A.; Carter, R.J.

    1998-06-26

    The Federal Emergency Management Information Systems (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the US Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication, data distribution, and notification functionality necessary to operate FEMIS in a networked, client/server environment. The UNIX server provides an Oracle relational database management system (RDBMS) services, ARC/INFO GIS (optional) capabilities, and basic file management services. PNNL developed utilities that reside on the server include the Notification Service, the Command Service that executes the evacuation model, and AutoRecovery. To operate FEMIS, the Application Software must have access to a site specific FEMIS emergency management database. Data that pertains to an individual EOC`s jurisdiction is stored on the EOC`s local server. Information that needs to be accessible to all EOCs is automatically distributed by the FEMIS

  2. Federal Market Information Technology in the Post Flash Crash Era: Roles for Supercomputing

    SciTech Connect (OSTI)

    Bethel, E. Wes; Leinweber, David; Ruebel, Oliver; Wu, Kesheng

    2011-09-16

    This paper describes collaborative work between active traders, regulators, economists, and supercomputing researchers to replicate and extend investigations of the Flash Crash and other market anomalies in a National Laboratory HPC environment. Our work suggests that supercomputing tools and methods will be valuable to market regulators in achieving the goal of market safety, stability, and security. Research results using high frequency data and analytics are described, and directions for future development are discussed. Currently the key mechanism for preventing catastrophic market action are “circuit breakers.” We believe a more graduated approach, similar to the “yellow light” approach in motorsports to slow down traffic, might be a better way to achieve the same goal. To enable this objective, we study a number of indicators that could foresee hazards in market conditions and explore options to confirm such predictions. Our tests confirm that Volume Synchronized Probability of Informed Trading (VPIN) and a version of volume Herfindahl-Hirschman Index (HHI) for measuring market fragmentation can indeed give strong signals ahead of the Flash Crash event on May 6 2010. This is a preliminary step toward a full-fledged early-warning system for unusual market conditions.

  3. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    SciTech Connect (OSTI)

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  4. Feasibility of integrating other federal information systems into the Global Network of Environment and Technology, GNET{reg_sign}

    SciTech Connect (OSTI)

    1998-05-01

    The Global Environment and Technology Enterprise (GETE) of the Global Environment and Technology Foundation (GETF) has been tasked by the US Department of Energy`s (DOE), Federal Energy Technology Center (FETC) to assist in reducing DOE`s cost for the Global Network of Environment and Technology (GNET{reg_sign}). As part of this task, GETE is seeking federal partners to invest in GNET{reg_sign}. The authors are also seeking FETC`s commitment to serve as GNET`s federal agency champion promoting the system to potential agency partners. This report assesses the benefits of partnering with GNET{reg_sign} and provides recommendations for identifying and integrating other federally funded (non-DOE) environmental information management systems into GNET{reg_sign}.

  5. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  6. Los Alamos National Security, LLC Request for Information from industrial entities that desire to commercialize Laboratory-developed Extremely Low Resource Optical Identifier (ELROI) tech

    SciTech Connect (OSTI)

    Erickson, Michael Charles

    2015-11-10

    Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.

  7. FOA for Assisting Federal Facilities with Energy Conservation Technologies Informational Webinar

    Broader source: Energy.gov [DOE]

    This webinar will highlight the funding opportunity announcement (FOA) that was issued on March 6, 2015. The AFFECT grant will provide funding for renewable energy projects at federal facilities...

  8. For Profit Audits- Information Related to 12/21/11 Federal Register Notice

    Broader source: Energy.gov [DOE]

    Attached are copies of the 7 comments received to Federal Register notice Document Number 2011-32622, a copy of the matrix of the comments, a copy of DOE's responses to the comments, and marked up...

  9. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  10. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  11. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  12. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  13. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    ... non-classified portion of the review process. The Federal Project Director and appropriate DOEEM-HQ line management and security representatives must coordinate the classified ...

  14. Security and Privacy Notices | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory monitors this Web site for ...

  15. Renewable Energy Procurement for Federal Agencies

    Broader source: Energy.gov [DOE]

    FEMP’s Renewable Energy Procurement (REP) Program helps federal agencies reduce utility expenses, improve the energy security and resiliency of mission-critical facilities, and reduce environmental impacts. The REP Program bridges information gaps to help agencies meet their renewable energy goals and requirements.

  16. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    SciTech Connect (OSTI)

    Barbara McCabe; John Kovach

    2009-03-30

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  17. Public Access to Federal Awardee Performance and Integrity Information System (FAPIIS) – FAR Clause 52.209-8 Class Deviation

    Broader source: Energy.gov [DOE]

    Attached is a class deviation executed by the Senior Procurement Executives of NNSA and DOE. It allows a deviation to Federal Acquisition Regulation (FAR) clause 52.209-8, Updates of Information Regarding Responsibility Matters (DEVIATION) (OCT 2010). Given the requirements of Public Law 111-212, it is necessary to deviate from use of the current clause. Contracting Officers shall begin using the revised clause in new solicitations and contracts as prescribed at FAR 9.104-7(c).

  18. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  19. The Oak Ridge Technical Information Center: A trailblazer in federal documentation

    SciTech Connect (OSTI)

    Vaden, W.M.

    1992-01-01

    This document attempts to record the history of US AEC`s Technical Information Center, from its conception (1947) to 1977. This organization centralizes and manages the issues related to control and dissemination of technical information, to fulfill the provisions of the Atomic Energy Act of 1946. TIC tried to search out and install efficient and economical systems for servicing the various technical information programs. It coordinated a direct organization-to-organization information exchange program, and it also participated in official bilateral exchange programs and in developing information systems for IAEA and Euratom. The work, planning, and strategies employed to achieve goals are chronicled in this document, with 18 chapters arranged into four sections according to different presidential administrations.

  20. The Oak Ridge Technical Information Center: A trailblazer in federal documentation

    SciTech Connect (OSTI)

    Vaden, W.M.

    1992-01-01

    This softbound book attempts to record the history of US AEC's Technical Information Center, from its conception (1947) to 1977. This organization centralizes and manages the issues related to control and dissemination of technical information, to fulfill the provisions of the Atomic Energy Act of 1946. TIC tried to search out and install efficient and economical systems for servicing the various technical information programs. It coordinated a direct organization-to-organization information exchange program, and it also participated in official bilateral exchange programs and in developing information systems for IAEA and Euratom. The work, planning, and strategies employed to achieve goals are chronicled in this book, whose 18 chapters are arranged into four sections according to different presidential administrations.

  1. Towards improving software security by using simulation to inform requirements and conceptual design

    SciTech Connect (OSTI)

    Nutaro, James J.; Allgood, Glenn O.; Kuruganti, Teja

    2015-06-17

    We illustrate the use of modeling and simulation early in the system life-cycle to improve security and reduce costs. The models that we develop for this illustration are inspired by problems in reliability analysis and supervisory control, for which similar models are used to quantify failure probabilities and rates. In the context of security, we propose that models of this general type can be used to understand trades between risk and cost while writing system requirements and during conceptual design, and thereby significantly reduce the need for expensive security corrections after a system enters operation

  2. Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 154- Aug. 10, 2011

    Broader source: Energy.gov [DOE]

    The Department of Energy (DOE) invites public comment on DOE’s intent to request OMB to renew Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910...

  3. Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.6

    SciTech Connect (OSTI)

    Homer, B.J., Johnson, D.M.; Wood, B.M.; Stoops, L.R.; Fangman, P.M.; Johnson, R.L.; Loveall, R.M.; Millard, W.D.; Johnson, S.M.; Downing, T.R.

    1999-03-12

    This document describes the hardware and software required for the Federal Emergency Management Information System version 1.4.6 (FEMIS{copyright} v1.4.6). FEMIS is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCS via a Wide Area Network (WAN).

  4. FTCP Site Specific Information – Office of Environment, Health, Safety & Security

    Broader source: Energy.gov [DOE]

    Site Specific Information including Contact Information, and Annual Workforce Analysis & Staffing Plan Reports.

  5. Federal Spectrum Management at the National Telecommunications...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Spectrum Management at the National Telecommunications and Information Administration Federal Spectrum Management at the National Telecommunications and Information ...

  6. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    violations of Department of Energy's classified information security program ... Sheet, Preliminary Notice of Violation: Classified Information Security Event at NNSS ...

  7. Implementation of Unclassified Controlled Nuclear Information guidelines for fixed-site safeguards and security (FSSS) at Los Alamos National Laboratory

    SciTech Connect (OSTI)

    Rood, P.L.

    1995-02-01

    Unclassified Controlled Nuclear Information (UCNI) is one type of sensitive information that DOE employees, including computer users, must now identify and protect. Guidelines to identify information as UCNI are gradually being put in place. The publication of Unclassified Controlled Nuclear Information Topical Guideline for Fixed-Site Safeguards and Security, TG-FSSS-1, is a major step in the development of UCNI guidelines. This DOE published guide cuts across and addresses many different programmatic areas including automated data processing. Our local guideline, Los Alamos National Laboratory Unclassified Controlled Nuclear Information Guideline for Fixed-Site Safeguards and Security, IG-LAFSSS-1, is based on TG-FSSS-1. In this paper, I plan to discuss the background of UCNI, the definition of UCNI, information that qualifies as UCNI, the consequences of information being UCNI, the development of UCNI guidelines, TG-FSSS-1 and IG-LAFSSS-1, the relationship of UCNI to classification, and the implementation of the IG-LAFSSS-1 at Los Alamos.

  8. Defense Nuclear Security | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    This responsibility includes the physical, materials control and accounting, classified and sensitive information protection, personnel, technical, and cyber security programs. ...

  9. Before Senate Committee on Homeland Security and Governmental Affairs Subcommittee on Oversight on Government Management, the Federal Workforce, and the District of Columbia

    Broader source: Energy.gov [DOE]

    Subject: Inspiring Students to Federal Service By: Michael C. Kane, Chief Human Capital Officer, U.S. Department of Energy

  10. PSH-15-0102 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 2 - In the Matter of Personnel Security Hearing PSH-15-0102 - In the Matter of Personnel Security Hearing On April 7, 2016, an Administrative Judge issued a decision in which he determined that an individual should not be granted access authorization. During a background investigation, the Local Security Office (LSO) obtained information about the individual's finances that raised security concerns. Specifically, the LSO learned that the individual owed over $15,000 in unpaid federal

  11. INFORMATION: Audit Report on The Office of Secure Transportation DC-9 Aircraft Refurbishment

    SciTech Connect (OSTI)

    2009-05-01

    The National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) maintains a fleet of seven aircraft to transport sensitive items, equipment and security personnel. Based on increasing requirements for transporting components and security personnel, OST decided to add a heavy transport aircraft to meet the Department's weapons surety and emergency response missions. In 2004, as a replacement following the sale of a portion of its fleet, OST acquired a DC-9 cargo aircraft that had been excessed by the U.S. military. Prior to integrating the DC-9 into its fleet, NNSA ordered a refurbishment of the aircraft. This refurbishment project was to permit the aircraft to be certified to civil air standards so that it could transport passengers for site visits, training and other travel. The NNSA Service Center (Service Center) awarded a contract for the refurbishment of the aircraft in December 2004. In recent years, the Office of Inspector General has addressed a number of issues relating to the Department's aircraft management activities and services. As part of our ongoing review process and because of the national security importance of its fleet of aircraft, we conducted this review to determine whether OST had an effective and efficient aviation management program.

  12. dhs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    dhs NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... Federal Radiological Monitoring and Assessment Center The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal asset

  13. Security Notice | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice This computer system is operated on a U.S. Federal Government network (unclassified information only). This system is for the use of authorized users only. Unauthorized access is prohibited and makes you liable to civil and criminal penalties. Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities monitored and recorded by system personnel. In the course of monitoring individuals improperly using

  14. Request for Investigation or Inspection of Safety or Classified Information Security Violations

    Broader source: Energy.gov [DOE]

    Form allows for any DOE contractor employee or employee representative to submit a request to the Department of Energy’s Office of Enforcement, within the Office of Health, Safety, and Security, to initiate an enforcement investigation or inspection into a potential violation of DOE regulatory requirements.

  15. Independent Oversight Review, Nevada National Security Site,...

    Broader source: Energy.gov (indexed) [DOE]

    of Federal Assurance Capability at the Nevada National Security Site This report ... systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). ...

  16. Strategic Security Infrastructure Program | National Nuclear...

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  17. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  18. Software Configuration Management Plan (SCMP) version 1.1, Phase 1. Federal Emergency Management Information System (FEMIS): System platform

    SciTech Connect (OSTI)

    Strycker, F.E. Jr.

    1993-07-19

    This document is the Software Configuration Management Plan (SCMP) for the Federal Emergency Management Information System (FEMIS) project. FEMIS is an automated decision support system that integrates the planning and analysis, operations and response, and recovery phases of emergency management. It has broad application across the full range of emergency planning and operations. The SCMP will describe the configuration management system to be used for the control and maintenance of the software and associated documentation during development, test, and production of the FEMIS project. This plan provides information on the requirements and procedures necessary for the configuration management activities of FEMIS. It identifies the software configuration management requirements and establishes the methodology for generating configuration identifiers, controlling engineering changes, maintaining status accounting, and performing audits and reviews during the design and development of software configuration items. This plan defines the Software Configuration Management (SCM) activities necessary for maintaining all support software items and associated documentation being developed, procured, tested, sustained and kept in the production environment for FEMIS. It will apply to all phases of the software development life cycle, up to and including the time of delivery to the customer.

  19. Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security activities are managed by the Cyber Support Division (IM-622) within the Office of Chief Information Officer (IM-1). This chapter only covers the requirement for each HQ program element to appoint an Information Systems Security Officer (ISSO) to act as the point of contact between the

  20. planning for emergencies | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    planning for emergencies HQ Emergency Management Team (EMT) NNSA's Headquarters (HQ) EMT is the sole emergency focal point for HQ during an emergency. The HQ EMT acquires and manages event-related information, monitors HQ and field response actions, coordinates with other federal agencies, and receives/elicits emergency-related information: ... Homeland Security and Emergency Management Coordination (HSEMC) Program The Office of Emergency Management assists the NNSA and Department of Energy

  1. Secure Freight Initiative Launched to Secure U.S. From Nuclear...

    National Nuclear Security Administration (NNSA)

    phase of the Secure Freight Initiative, an unprecedented effort to build upon existing port security measures by enhancing the federal government's ability to scan containers for...

  2. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  3. National Security Education Center

    SciTech Connect (OSTI)

    Hurd, Alan J.

    2015-04-22

    Information about the National Security Education Center is given. Information about the Center’s history and current practices, including its facilities and its practicality are outlined.

  4. Security Policy, Guidance & Reports

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is responsible for the principal personnel security information processing activities of the Department and personnel security administrative review process. The Office of Headquarters Security Operations provides oversight and direction support to all Headquarters security operations to include physical protection, information security, personnel security, and guidance to the Headquarters Security Officers (HSO).

  5. Safeguards & Security | Department of Energy

    Energy Savers [EERE]

    The mission of the PPPO Safeguards and Security Program is to effectively implement the Office of Environmental Management ... Serves as the Federal liaison with the Nuclear Regulatory ...

  6. FEMA | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    of Energy (DOE) and the Environmental Protection Agency (EPA), ... Testing The National Nuclear Security Administration (NNSA) and Federal Emergency Management Agency (FEMA) under ...

  7. Security Notice | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User login Username * Password * Request new password Log in Forgot Your Password? Security Notice This computer system is operated on a U.S. Federal Government network ...

  8. Los Alamos Field Office Emergency Public Information | National Nuclear

    National Nuclear Security Administration (NNSA)

    Security Administration | (NNSA) Los Alamos Field Office Emergency Public Information Los Alamos Field Office Emergency Public Information DOE NNSA Accident Response Aerial Measuring System (AMS) Atmospheric Release Advisory Capability (ARAC) Accident Response Group (ARG) Emergency Response DOE NNSA Fissile Material Federal Radiological Monitoring and Assessment Center (FRMAC) Nuclear Emergency Support Team (NEST) Nuclear Weapons Guide Office of Secure Transportation Plutonium Fact Sheet

  9. Request for Information on the Availability of New Geothermal Electricity in the Salton Sea Area to Serve Regional Federal Load

    Broader source: Energy.gov [DOE]

    The purpose of the RFI is to gather industry input on options available to the federal government for a potential aggregated power purchase of 100-250 MW of new construction geothermal electricity generated in the Salton Sea area, within the Riverside and Imperial Counties of California, for delivery over a 10-year or 20-year contract period to serve regional federal load.

  10. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to