National Library of Energy BETA

Sample records for information security management

  1. Management and Security of Personally Identifiable Information

    Broader source: Energy.gov [DOE]

    This Policy Flash transmits for your information and appropriate action the Deputy Secretary's Memorandum, Management and Security of Personally Identifiable Information, dated April 17, 2013. Further information will be transmitted as it becomes available.

  2. Information System Security Manager (ISSM) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Information Security System Manager (ISSM) is designated by an operating unit's (DOE organization or site) Senior Manager to manage the unit's cyber security program. ...

  3. Implementing Information Security and Its Technology: A LineManagement...

    Office of Scientific and Technical Information (OSTI)

    Country of Publication: United States Language: English Subject: 29; 99; INFORMATION SYSTEMS; MANAGEMENT; SECURITY cybersecurity cyberlaw information management privacy Word...

  4. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PDF icon PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE More Documents & Publications PIA - INL Education Programs Business Enclave Manchester Software 1099 Reporting PIA, Idaho National Laboratory PIA - INL PeopleSoft - Human Resource System

  5. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION ... 1099 Reporting PIA, Idaho National Laboratory PIA - INL PeopleSoft - Human Resource ...

  6. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site...

  7. Information security management system planning for CBRN facilities

    SciTech Connect (OSTI)

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  8. EEO Complaints Information for Managers | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration EEO Complaints Information for Managers Managers & supervisors are often confused when an EEO complaint is filed naming them. This page is intended to provide managers & supervisors with information to skillfully respond to EEO Complaints. Step 1 Cooperate throughout the informal and formal process. At the informal stage, a counselor will conduct a limited inquiry with the purpose of: presenting the issues to you and listening to your side attempt a resolution and if

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nationís security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nationís security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  11. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  14. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  15. Implementing Information Security and Its Technology: A LineManagement Perspective

    SciTech Connect (OSTI)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  16. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more¬†¬Ľ This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it¬íeasy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.¬ę¬†less

  17. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  18. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1989-09-01

    Certain governmental information must be classified for national security reasons. However, the national security benefits from classifying information are usually accompanied by significant costs -- those due to a citizenry not fully informed on governmental activities, the extra costs of operating classified programs and procuring classified materials (e.g., weapons), the losses to our nation when advances made in classified programs cannot be utilized in unclassified programs. The goal of a classification system should be to clearly identify that information which must be protected for national security reasons and to ensure that information not needing such protection is not classified. This document was prepared to help attain that goal. This document is the first of a planned four-volume work that comprehensively discusses the security classification of information. Volume 1 broadly describes the need for classification, the basis for classification, and the history of classification in the United States from colonial times until World War 2. Classification of information since World War 2, under Executive Orders and the Atomic Energy Acts of 1946 and 1954, is discussed in more detail, with particular emphasis on the classification of atomic energy information. Adverse impacts of classification are also described. Subsequent volumes will discuss classification principles, classification management, and the control of certain unclassified scientific and technical information. 340 refs., 6 tabs.

  19. Nuclear Materials Information Program | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Information Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  20. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  1. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  2. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  3. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and state regulators,

  4. NMMSS Information, Reports & Forms | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Us Our Programs Defense Nuclear Security Nuclear Materials Management & Safeguards System NMMSS Information, Reports & Forms NMMSS Information, Reports & Forms D-23 DOE...

  5. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development | Department of Energy Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In

  6. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  7. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  8. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for ...

  9. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  10. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  11. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  12. Department of Energy Cyber Security Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-21

    The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

  13. Department of Energy Cyber Security Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-04

    The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

  14. information systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    information systems NNSA's G2 Management Information System Wins Association for Enterprise Information's (AFEI) "Excellence in Enterprise Information Award" The G2 team and the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information Award. (WASHINGTON, D.C) - The National Nuclear Security Administration (NNSA) has received the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information

  15. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  16. Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security

    Broader source: Energy.gov [DOE]

    Subject: Cost-Plus Award Fee By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management

  17. Office of Information Management

    Broader source: Energy.gov [DOE]

    The Office of Information Management provides a broad range of information technology services in support of the Associate Under Secretary for the Office of Environment, Health, Safety and Security (AU).

  18. Electronic DOE Information Security System (eDISS) PIA, Office...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Information Security System (eDISS) PIA, Office of Health Safety and Security ... Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory ...

  19. Information Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or NNSA and Department of Energy (DOE) directives. Classified Matter Protection and Control ensures the protection and control of classified matter. It includes briefing and training requirements for personnel who work with classified on identifying, marking, reproducing, protecting, handling, transmitting,

  20. Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services and International Security

    Broader source: Energy.gov [DOE]

    Subject: Cutting the Federal Government's Energy Bill: An Examination of the Sustainable Federal Government Executive Order 13524 By: Richard Kidd, Program Manager Federal Energy Management Program, Office of Energy Efficiency and Renewable Energy

  1. Information System Security Officer (ISSO) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Officer (ISSO) Information System Security Officer (ISSO) digital-388075_960_720.jpg The Information System Security Officer (ISSO) is responsible to the Information System Security Manager (SSM), information owner, and system owner for ensuring a proper security posture is in place. PDF icon ISSO Core Competency Training Worksheet More Documents & Publications Cybersecurity Program Manager (CSPM) Authorizing Official Designated Representative (AODR) Information System Owner (ISO

  2. Information Technology Specialist (Information Security) | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Information Technology Specialist (Information Security) Information Technology Specialist (Information Security) Submitted by admin on Tue, 2016-05-10 18:01 Job Summary Organization Name Department Of Energy Agency SubElement Department of Energy Locations Oak Ridge, Tennessee Announcement Number DOE-SE-16-ST-00003-DHA Job Summary A successful candidate in this position will serve as an Information Technology Specialist (INFOSEC) responsible for the protection of the information and

  3. Security Forms and Information

    Broader source: Energy.gov [DOE]

    Homeland Security Presidential Directive HSPD-12 established new policy for a common identification standard for Federal Employees and contractors. As of October 27, 2005, all new Federal employees...

  4. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  5. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  6. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  7. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  8. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  9. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  10. Electronic DOE Information Security System (eDISS) PIA, Office of Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Safety and Security | Department of Energy DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security PDF icon Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security More Documents & Publications Integrated Safety Management Workshop

  11. NA IM- Associate Administrator for Information Management & Chief

    National Nuclear Security Administration (NNSA)

    Information Officer | National Nuclear Security Administration IM- Associate Administrator for Information Management & Chief Information Officer

  12. Material Management and Minimization | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Management and Minimization | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering...

  13. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Program Information FY 2015 Performance Evaluation Plan (PEP) FY 2013 Performance Evaluation Report (PER) International Union, Security, Police and Fire Professionals of America Contract International Association of Machinists and Aerospace Workers Agreement HS&E Management System Description and Worker Safety and Health Program 2015 Small Business Program (FY 2009 - 2015); Link to FY 2014 Negotiated Subcontracting Goals with Agencies (including DOE)

  14. NA IM- Associate Administrator for Information Management & Chief...

    National Nuclear Security Administration (NNSA)

    IM- Associate Administrator for Information Management & Chief Information Officer | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission...

  15. Emergency Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Emergency Information The Sandia Field Office (SFO) Emergency Management System is designed to ensure that SFO, its contractors, and its tenants can respond effectively and efficiently to events categorized as operational emergencies and significant non-emergency events, and can provide emergency assistance so that appropriate response measures can be taken to protect workers, the public, the environment, and national security. The SFO maintains a cadre of experienced emergency response subject

  16. acquisition management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    management | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  17. Asset Management Plan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Asset Management Plan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  18. managing the stockpile | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    managing the stockpile NNSA Releases Annual Stockpile Stewardship & Management Plan Annual Report Provides Insight into Vital National Security Programs WASHINGTON, DC - The Department of Energy's National Nuclear Security Administration (NNSA) has released its Fiscal Year 2016 Stockpile Stewardship and Management Plan (SSMP). The FY16 SSMP documents NNSA's 25-year strategic plan... Law Enforcement & Emergency Management Liaison Mission StatementThe Office of Secure Transportation (OST)

  19. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Apply for Our Jobs Our Jobs Working at NNSA Blog Home About Us Our Operations Acquisition and Project Management Major Contract Solicitation National Security Campus ...

  20. The Department of Energy's National Security Information Fundamental...

    Office of Environmental Management (EM)

    The Department of Energy's National Security Information Fundamental Classification Guidance Review The Department of Energy's National Security Information Fundamental ...

  1. How to implement security controls for an information security program at CBRN facilities

    SciTech Connect (OSTI)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  2. Site Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Site Information Facilities & Projects Nuclear Operations Environment, Safety & Health Safeguards & Security Performance & Quality Assurance Programs NEPA Reading Room

  3. Integrated Safeguards and Security Management (ISSM) Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

  4. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  5. acquisition and project management | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration and project management Acquisition and Project Management Office volunteers get up-close look at Office of Secure Transportation exercise Contracting professionals from the NNSA Acquisition & Project Management (APM) Field Program Section (FPS) recently served as role players for Office of Secure Transportation (OST) training exercises in Arkansas and Oklahoma. OST Federal Agents transport U.S. nuclear weapons, components and... SNL Starting Points Sandia Field Office Home

  6. Vendor Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vendor Information Vendor Information Thank you for your interest in the Y-12 National Security Complex. For small businesses that desire to provide products/services in support of Y-12's mission, there are several options that your company may want to consider: Y-12 Mission: Determine if the products/services your company provides meet one or more of Y-12's missions: Nuclear Deterrence, Global Security, or Naval Reactors. Vendor Information Database: Register your company into the Y-12 Vendor

  7. Acquisition and Project Management | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Operations Acquisition and Project Management NNSA's missions require an industrial and laboratory infrastructure that is secure and able to meet immediate and long term operational needs. The associate administrator for Acquisition and Project Management provides the leadership and corporate integration for the development and execution of NNSA's facilities management policies and programs and project management systems. Learn More Project Management and Systems Support Small

  8. Safeguards and Security for Program and Project Management -...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program Management, Property Management, Safety and Security The Guide provides a methodology for implementing the safeguards and security requirements of DOE O 413.3B....

  9. ORISE: National Security and Emergency Management Resources

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A few examples of ORISE-developed resources available to national security and emergency management personnel include: First Responders test WeB-MEDIS WeB-MEDIS WeB-MEDIS is a ...

  10. Safeguards and Security Program Planning and Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes program planning and management requirements for the Departments Safeguards and Security (S&S) Program. Cancels: DOE N 473.9 and DOE M 470.1-1

  11. Safeguards and Security Program Planning and Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes program planning and management requirements for the Departments Safeguards and Security. Chg 1, dated 3-7-06 Cancels DOE N 473.9, DOE M 470.1-1 Chg 2.

  12. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  13. Information Technology Specialist (Info Security)

    Broader source: Energy.gov [DOE]

    (See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Corporate Services Office, Office of the Chief Information Officer, Cyber...

  14. PIA - Human Resources Management Information System (HRMIS) | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Information System (HRMIS) PIA - Human Resources Management Information System (HRMIS) PIA - Human Resources Management Information System (HRMIS) PDF icon PIA - Human Resources Management Information System (HRMIS) More Documents & Publications PIA - INL PeopleSoft - Human Resource System PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - Human Resources - Personal Information Change Request - Idaho National Engineering Laboratory

  15. U-200: Red Hat Directory Server Information Disclosure Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  16. management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure ...

  17. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  18. Safeguards and Security Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-04-18

    The proposed revision to this Department of Energy Guide focuses on alignment of guidance for implementing key safeguard and security components to the DOE capital asset acquisition process with the revised DOE O 413.3B, Program and Project Management for Acquisition of Capital Assets, the revised DOE O 470.4B, Safeguard and Security Program, and the new series of DOE Orders replacing the DOE M 470.4 series of manuals.

  19. Page 10, Security Forms and Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10 of 11 Previous Page Security Forms and Information Building Access and DOE Badges Employees entering DOE facilities must have either a DOE photo identification Security Badge or a DOE Temporary Badge. Either badge must be displayed above the waist in plain view at all times while in DOE facilities. Employees must present said badges to Protective Force personnel for inspection prior to entry into the facilities. You should have been provided instruction by email regarding training that must

  20. Site Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Site Information Kansas City National Security Campus (NSC), located in Kansas City, Mo., is the principal nonnuclear production site within the nuclear weapons complex, responsible for manufacturing and procuring nonnuclear components for nuclear weapons, including electronic, mechanical, and engineered material components. It supports national laboratories, universities, and U.S. industry. Work for other federal agencies is also conducted at NSC in a variety of national security programs.

  1. Supervisory Information Technology Specialist (Information Security)

    Broader source: Energy.gov [DOE]

    The Office of the Chief Information Officer is seeking a motivated and highly-qualified candidate to serve as the Director of the Cybersecurity Operations Office and oversee development and...

  2. Information Exchange management site

    Energy Science and Technology Software Center (OSTI)

    2012-08-01

    Django site used to manage the approved information exchanges (content models) after creation and public comment at https://github.com/usgin-models.

  3. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-23

    The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Supersedes DOE O 200.1.

  4. Central Scrap Management Office | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    shipment Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Central Scrap Management...

  5. Infrastructure and Facilities Management | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Home / content Infrastructure and Facilities Management NNSA restores, rebuilds, and revitalizes the physical infrastructure of the nuclear weapons complex to ensure the vitality and readiness of the NNSA's nuclear security enterprise. Mission execution is built upon management of the Facilities and Infrastructure Recapitalization Program (FIRP) that includes reduction of the maintenance backlog of old facilities, reduction of excess facilities and utility construction. The

  6. emergency management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    management NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On March 21 through March 24, the Department of Energy's National Nuclear Security Administration (NNSA) will participate in a federal and state/local training exercise in Philadelphia that will also include the Philadelphia Police Department and the Departments of Defense,

  7. Fact Sheet Preliminary Notice of Violation: Classified Information Security Event at LANL

    Energy Savers [EERE]

    LANL On May 27, 2015 the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation (PNOV) to Los Alamos National Security, LLC (LANS) for violations of Department of Energy (DOE) classified information security program requirements. LANS is the management and operating contractor for NNSA's Los Alamos National Laboratory (LANL), located in Los Alamos, New Mexico. The PNOV cites three violations of Departmental classified information security requirements related to

  8. Fact Sheet Preliminary Notice of Violation: Classified Information Security Event at SNL

    Energy Savers [EERE]

    SNL On May 27, 2015, the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation (PNOV) to Sandia Corporation (Sandia) for violations of Department of Energy (DOE) classified information security program requirements. Sandia is the management and operating contractor for NNSA's Sandia National Laboratories (SNL), located in Albuquerque, New Mexico. The PNOV cites six violations of Departmental classified information security requirements related to a security

  9. LTS Information Management - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Management About Us LTS Home Page LTS Project Management LTS Transition and Timeline LTS Execution LTS Background LTS Information Management LTS Fact Sheets Briefings ...

  10. Safeguards and Security Program Planning and Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes program planning and management requirements for the Departmentís Safeguards and Security (S&S) Program. Change 2 is a revision to Section M of both the Manual and the CRD to realign the process for establishing deviations from DOE directives containing safeguards and security requirements to reflect established Departmental policy as set forth in DOE O 251.1C. Original publication, 8-26-05; Chg 1, 3-7-06. Canceled by DOE O 470.4B

  11. Integrated Safeguards and Security Management Self-Assessment 2004

    SciTech Connect (OSTI)

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

  12. Information Management | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Center Information Center The U.S. Department of Energy's (DOE) Office of Enterprise Assessments (EA) provides expert evaluations of management performance in safety, security and other areas by seasoned experts who are independent of line management. Information related to enforcement, safety, security, emergency management and cyber performance management is made available to the public in the EA Information Center. Enforcement Info Center The Department's Enforcement Office conducts

  13. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  14. emergency management systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    systems NNSA sites prepared for disasters using real-time response management system Pantex Emergency Services now uses the Emergency Management Information System, or EMInS. From left: Maribel Martinez, Brenda Graham and Greg Roddahl. One of NNSA's missions is emergency response, so it only makes sense that our sites and labs excel at emergency management on the local level. When... Building International Emergency Management Systems NNSA helps nations develop the core elements of an emergency

  15. emergency management team | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    team NNSA sites prepared for disasters using real-time response management system Pantex Emergency Services now uses the Emergency Management Information System, or EMInS. From left: Maribel Martinez, Brenda Graham and Greg Roddahl. One of NNSA's missions is emergency response, so it only makes sense that our sites and labs excel at emergency management on the local level. When... HQ Emergency Management Team (EMT) NNSA's Headquarters (HQ) EMT is the sole emergency focal point for HQ during an

  16. Information Collection Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-11

    This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

  17. HQ Emergency Management Team (EMT) | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Apply for Our Jobs Our Jobs Working at NNSA Blog Home ... NNSA and Department of Energy senior management, coordinatesprovides ... response management system Homeland Security and ...

  18. National Interest Security Company NISC Formerly Technology Management...

    Open Energy Info (EERE)

    NISC Formerly Technology Management Services TMS Inc Jump to: navigation, search Name: National Interest Security Company (NISC) (Formerly Technology & Management Services (TMS)...

  19. Project Management and Systems Support | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Project Management and Systems Support | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation ...

  20. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  1. NNSA Selects Consolidated Nuclear Security, LLC to Manage the Consolidated

    National Nuclear Security Administration (NNSA)

    Contract for Nuclear Production Operations | National Nuclear Security Administration Selects Consolidated Nuclear Security, LLC to Manage the Consolidated Contract for Nuclear Production Operations January 08, 2013 The National Nuclear Security Administration (NNSA) today announced that Consolidated Nuclear Security, LLC (CNS) has been selected to be the management and operating contractor for the Y-12 National Security Complex in Oak Ridge, Tenn., and the Pantex Plant near Amarillo, Texas.

  2. project management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    project management NNSA projects win Secretary's Achievement Awards for cost savings and efficiency NNSA was presented with two Department of Energy Secretary's Achievement Awards at a ceremony in Arlington, Va., on Wednesday. The awards, presented by Deputy Secretary of Energy Elizabeth Sherwood-Randall, commend NNSA on delivering the Y-12 Nuclear Facility Risk Reduction Project $5.7... NNSA's G2 Management Information System Wins Association for Enterprise Information's (AFEI) "Excellence

  3. Deactivation & Decommissioning Knowledge Management Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Knowledge Management Information Tool (D&D KM-IT) Deactivation & Decommissioning Knowledge Management Information Tool (D&D KM-IT) Deactivation & Decommissioning Knowledge ...

  4. Data Mining for Security Information: A Survey

    SciTech Connect (OSTI)

    Brugger, S T; Kelley, M; Sumikawa, K; Wakumoto, S

    2001-04-19

    This paper will present a survey of the current published work and products available to do off-line data mining for computer network security information. Hundreds of megabytes of data are collected every second that are of interest to computer security professionals. This data can answer questions ranging from the proactive, ''Which machines are the attackers going to try to compromise?'' to the reactive, ''When did the intruder break into my system and how?'' Unfortunately, there's so much data that computer security professionals don't have time to sort through it all. What we need are systems that perform data mining at various levels on this corpus of data in order to ease the burden of the human analyst. Such systems typically operate on log data produced by hosts, firewalls and intrusion detection systems as such data is typically in a standard, machine readable format and usually provides information that is most relevant to the security of the system. Systems that do this type of data mining for security information fall under the classification of intrusion detection systems. It is important to point out that we are not surveying real-time intrusion detection systems. Instead, we examined what is possible when the analysis is done off-line. Doing the analysis off-line allows for a larger amount of data correlation between distant sites who transfer relevant log files periodically and may be able to take greater advantage of an archive of past logs. Such a system is not a replacement for a real-time intrusion detection system but should be used in conjunction with one. In fact, as noted previously, the logs of the real-time IDS may be one of the inputs to the data mining system. We will concentrate on the application of data mining to network connection data, as opposed to system logs or the output of real-time intrusion detection systems. We do this primarily because this data is readily obtained from firewalls or real-time intrusion detectors and it looks the same regardless of the network architecture or the systems that run on the network. This similarity greatly simplifies the data cleansing step and provides a dataset with high orthogonality between multiple sites, increasing the accuracy of the data mining operations. The decision to use connection logs instead of packet logs is discussed below. This paper will survey both the research that has been done in this area to date and publicly available products that perform such tasks.

  5. NNSA's G2 Management Information System Wins Association for Enterprise

    National Nuclear Security Administration (NNSA)

    Information's (AFEI) "Excellence in Enterprise Information Award" | National Nuclear Security Administration NNSA's G2 Management Information System Wins Association for Enterprise Information's (AFEI) "Excellence in Enterprise Information Award" February 17, 2016 The G2 team and the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information Award. (WASHINGTON, D.C) - The National Nuclear Security Administration (NNSA) has received the 2015

  6. Headquarters Facilities Master Security Plan- Chapter 13, Controlled Unclassified Information

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 13, Controlled Unclassified Information Describes DOE Headquarters procedures for protecting Controlled Unclassified Information (CUI).

  7. Information and Records Management Transition Guidance | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information and Records Management Transition Guidance Information and Records Management Transition Guidance Information and Records Management Transition Guidance (March 2004)...

  8. Information Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30

    Provides a framework for managing information, information resources, and information technology investment, which supports the operating elements of the Department in the accomplishment of its missions and functions in both an efficient and effective manner and in accordance with Departmental policy. Cancels: DOE 1324.5B, DOE 5900.1A, DOE 1130.8A, DOE 1330.1D, DOE 1410.2, DOE 1450.3A, DOE 1700.1, DOE 1800.1A, DOE 5300.1C

  9. Information Management Conference | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Management Conference Information Management Conference Information Management Conference The 34th Information Management Conference (IMC) sponsored by the Office of ...

  10. NERSC Information Management (NIM) portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NERSC Information Management (NIM) portal The NERSC Information Management (NIM) system is a web portal used to view and modify user account, usage, and allocations information. Link to NIM interface NIM Guide for Users The NERSC Information Management (NIM) system is a web portal used to view and modify user account, usage, and allocations information. Read More ¬Ľ NIM Guide for PIs and Project Managers This Guide explains how to manage users in a project account (called a repository or repo).

  11. Accident management information needs

    SciTech Connect (OSTI)

    Hanson, D.J.; Ward, L.W.; Nelson, W.R.; Meyer, O.R. (EG and G Idaho, Inc., Idaho Falls, ID (USA))

    1990-04-01

    In support of the US Nuclear Regulatory Commission (NRC) Accident Management Research Program, a methodology has been developed for identifying the plant information needs necessary for personnel involved in the management of an accident to diagnose that an accident is in progress, select and implement strategies to prevent or mitigate the accident, and monitor the effectiveness of these strategies. This report describes the methodology and presents an application of this methodology to a Pressurized Water Reactor (PWR) with a large dry containment. A risk-important severe accident sequence for a PWR is used to examine the capability of the existing measurements to supply the necessary information. The method includes an assessment of the effects of the sequence on the measurement availability including the effects of environmental conditions. The information needs and capabilities identified using this approach are also intended to form the basis for more comprehensive information needs assessment performed during the analyses and development of specific strategies for use in accident management prevention and mitigation. 3 refs., 16 figs., 7 tabs.

  12. GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development

    Energy Savers [EERE]

    the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House

  13. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  14. List of Major Information Systems,National Nuclear Security Administration

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ADaPT Networked: | Department of Energy List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear

  15. Material Management/Strategic Reserve | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Material ManagementStrategic Reserve Y-12 ensures safe, secure and compliant storage of the nation's strategic reserve of nuclear materials at Y-12. Our Nuclear Materials...

  16. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - ... Configuration and Execute Arbitrary Code T-622: Adobe Acrobat and Reader Unspecified ...

  17. John Angelis named Manager, Information Resource Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Names John S. Angelis Manager of Information Resource Management CARLSBAD, N.M., March 22, 2000 - The Westinghouse Waste Isolation Division (WID) has named John S. Angelis of Carlsbad as Manager of Information Resource Management at the Waste Isolation Pilot Plant (WIPP). "John's extensive computer technology and telecommunications experience, combined with his progressive attitude, make him an ideal choice for this increasingly important position," said WID General Manager Joe

  18. Farmland Security Zone | Open Energy Information

    Open Energy Info (EERE)

    Security Zone Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Farmland Security ZoneLegal Abstract California Department of...

  19. Security robots for nuclear materials management

    SciTech Connect (OSTI)

    Deming, R.

    1986-01-01

    Robots have successfully invaded industry where they have replaced costly personnel performing their tasks cheaper and better in most cases. There may be a place for a unique class of robots, security robots, in nuclear materials management. Robots could be employed in the functions of general response, patrol and neutralizing dangerous situations. The last is perhaps most important. Ion Track Instruments of Burlington, Massachusetts has designed an excellent unit to protect life in hazardous situations. The unit can detect, disrupt or remove explosives. It can enter dangerous areas to reconnoiter the extent of danger. It can communicate with those in a dangerous area. It can fight fires or clean an area using a 2 1/2 inch, two man hose. If necessary, it can engage an adversary in a fire fight using a twelve gauge shot gun.

  20. LEGACY MANAGEMENT REQUIRES INFORMATION

    SciTech Connect (OSTI)

    CONNELL, C.W.; HILDEBRAND, R.D.

    2006-12-14

    ''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

  1. List of Major Information Systems,National Nuclear Security Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. ...

  2. Project Management Information Systems (PMIS) | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) In today's day and age, Information ...

  3. Risk Based Security Management at Research Reactors

    SciTech Connect (OSTI)

    Ek, David R.

    2015-09-01

    This presentation provides a background of what led to the international emphasis on nuclear security and describes how nuclear security is effectively implemented so as to preserve the societal benefits of nuclear and radioactive materials.

  4. Stockpile Stewardship and Management Plan | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Mission / Managing the Stockpile Stockpile Stewardship and Management Plan This Department of Energy's (DOE) National Nuclear Security Administration (NNSA) Fiscal Year 2017 Stockpile Stewardship and Management Plan (SSMP) - Biennial Plan Summary (FY 2017 SSMP) is a key planning document for the nuclear security enterprise. This year's summary report updates the Fiscal Year 2016 Stockpile Stewardship and Management Plan (FY 2016 SSMP), the 25-year strategic program of record

  5. Secure Smart Grid Association | Open Energy Information

    Open Energy Info (EERE)

    Smart Grid Association Jump to: navigation, search Name: Secure Smart Grid Association Address: 2374 S Josephine St Place: Denver, Colorado Zip: 80210 Region: Rockies Area Number...

  6. Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878

    Energy Savers [EERE]

    Follow-up Audit of the Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of

  7. Fact Sheet Preliminary Notice of Violation: Classified Information Security Event at Y-12

    Energy Savers [EERE]

    Y-12 On January 28, 2016, the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation (PNOV) to Babcock and Wilcox Technical Services Y-12, LLC (B&W Y-12) for violations of Department of Energy (DOE) classified information security program requirements. B&W Y-12 was the management and operating contractor for NNSA's Y-12 National Security Complex (Y-12), located in Oak Ridge, Tennessee at the time of discovery of the security event. The PNOV cites three

  8. Management and Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Highlights FY'17 Budget Request FY2016 Budget Request: Positioned for the 21st Century Mission Delivery FY2015 Budget Request: Preserving...

  9. Contact Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Asa Von Sudderth, Executive Services (702) 295-1097 Y-12 National Security Complex Tom Berg (865) 574-0907 Savannah River Site Angeline Martin, Workforce Services-Site Strategic ...

  10. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  11. Membership Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Our Locations Albuquerque Complex Federal Asian Pacific American Council - New Mexico Chapter Albuquerque, NM Membership Information Membership Information "Promoting...

  12. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Admin Chg 1, dated 1-16-2013, supersedes DOE O 415.1.

  13. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  14. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-14

    The Order establishes requirements and responsibilities for managing DOE's scientific and technical information. Cancels DOE O 241.1. Canceled by DOE O 241.1B.

  15. Safeguards and Security for Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-11-15

    This Guide provides approaches for implementing security provisions within the functional areas contained in DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets. Canceled by DOE G 413.3-3A.

  16. Security and Emergency Management Independent Oversight and Performance Assurance Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-03-01

    Establishes the DOE Security and Emergency Management Independent Oversight and Performance Assurance Program. Cancels DOE O 470.2, Paragraph 5b(2) of DOE O 231.1 and Chapter IV of DOE M 231.1-1.

  17. Homeland Security and Emergency Management Coordination (HSEMC...

    National Nuclear Security Administration (NNSA)

    Blog Home About Us Our Programs ... The Office of Emergency Management assists the NNSA and Department of Energy sites in ... the NNSA Emergency Management System (EMS). ...

  18. Manager, Sandia National Laboratories | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Novak Role: Manager, Sandia National Laboratories Award: University of New Mexico's Anderson School of Management's Hall of Fame Inductee Profile: Jim Novak from Sandia National...

  19. radiological consquence management | National Nuclear Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Apply for Our Jobs Our Jobs Working at NNSA Blog Home radiological consquence management radiological consquence management Fukushima: Five Years Later After the March 11, 2011, ...

  20. The Department's Cyber Security Incident Management Program, IG-0787 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy The Department's Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its

  1. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  2. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-11-21

    This revised Order is needed to clarify the roles and responsibilities, policies, and procedures for effectively managing IT investments to ensure mission success.

  3. The Department of Energy's National Security Information Fundamental

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Classification Guidance Review | Department of Energy The Department of Energy's National Security Information Fundamental Classification Guidance Review The Department of Energy's National Security Information Fundamental Classification Guidance Review The goals of this review process was to evaluate the guidance content, determine if the guidance conforms to current operational and technical circumstances, determine if the guidance meets the standards for classification under section 1.4

  4. Acquisition Management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Acquisition Management The Office of Acquisition Management supports NNSA's efforts to: Reduce Nuclear Dangers; Manage the nuclear weapons stockpile; Recapitalize the nuclear infrastructure and deterrent capability; Strengthen the science, technology, and engineering base; and, Continue NNSA management reforms. Our Values: Providing solutions: We will use our expertise and knowledge to be solutions people assisting our business partners to achieve mission goals while ensuring compliance with

  5. CONTACTS FOR INFORMATION MANAGEMENT: Forms & Records | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CONTACTS FOR INFORMATION MANAGEMENT: Forms & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms & Records Maria Levesque, Director Enterprise Records Management Division (IM-23) ...

  6. Information Management Governance Council | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Governance Council Information Management Governance Council Describes the establishment of the Information Management Governance Council and What They Do. PDF icon...

  7. Project Management Information Systems (PMIS) | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) Project Assessment & Reporting System (PARS IIe) Office of Project Management Oversight...

  8. Management of the National Nuclear Security Administration¬źs Biosafety Laboratories

    Energy Savers [EERE]

    National Nuclear Security Administration's Biosafety Laboratories DOE/IG-0917 August 2014 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 August 6, 2014 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of the National Nuclear Security Administration's Biosafety Laboratories" BACKGROUND In response to the increase in infectious

  9. Important Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Important Information Important Information From time to time, important information for subcontractors to Y-12 is posted on this web page. If you have a question that is not answered here, please contact Procurement at 865.576.8500. Taxes on sales to Y-12 are subject to the the provisions of the State of Tennessee Sales Tax Rule and Regulation Number 68. See the Y-12 Blanket Certificate of Resale (PDF), which includes the letter from the Tennessee Department of Revenue. Financial information,

  10. Management and Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Management and Budget The organization provides timely, cost-effective, and efficient administrative and financial support for NNSA headquarters staff. The major functions of the ...

  11. ORISE: National Security and Emergency Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Emergency Management Emergency Response Crisis and Risk Communication Forensic Science How ORISE is Making a Difference Overview Exercises and Planning Training and Technology...

  12. Risk Assessment & Management Information

    Broader source: Energy.gov [DOE]

    NRC - A Proposed Risk Management Regulatory Framework, April 2012 Risk Assessment Technical Experts Working Group (RWG) web page DOE Standard on Development and Use of Probabilistic Risk Assessment in DOE Nuclear Safety Applications (draft), December 2010 Consortium for Risk Evaluation with Stakeholder Participation Workshop on Risk Assessment and Safety Decision Making Under Uncertainty

  13. Consequence Management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Response / Responding to Emergencies Consequence Management NNSA's Consequence Management operations involve the deployment of the following assets in response to a radiological or nuclear emergency: Aerial Measuring System (AMS) Federal Radiological Monitoring and Assessment Center (FRMAC) National Atmospheric Release Advisory Center (NARAC) Radiation Emergency Assistance Center / Training Site (REAC/TS) Each asset provides specialized capabilities to include analysts, scientists, doctors,

  14. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  15. Homeland Security and Emergency Management Coordination (HSEMC) Program |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Homeland Security and Emergency Management Coordination (HSEMC) Program NNSA ensures that capabilities are in place to respond to any NNSA and Department of Energy facility emergency. It is also the nation's premier responder to any nuclear or radiological incident within the United States or abroad and provides operational planning and training to counter both domestic and international nuclear terrorism. NNSA ensures that capabilities are in place

  16. Information Management and Supporting Documentation

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Paperwork Reduction Act (PRA) of 1995 requires each Federal agency to seek and obtain approval from the Office of Management and Budget (OMB) before undertaking a collection of information...

  17. Aviation Manager | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Aviation Manager Joseph Ginanni Joseph Ginanni July 2009 U.S. General Services Administration (GSA) Federal Aviation Professional Award Aviation Manager Joseph Ginanni has received the U.S. General Services Administration (GSA) Federal Aviation Professional Award. Ginanni oversees the Aviation Services Department of the NNSA/NSO Remote Sensing Laboratory at Nellis and Andrews Air Force Bases. The program provides aerial support to the NNSA Office of Emergency Response, which protects people from

  18. Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1993-07-23

    The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Supersedes DOE 5639.8.

  19. Defense Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Programs Defense Nuclear Security The Office of Defense Nuclear Security develops and implements NNSA security programs to protect, control, and account for materials, information, and facilities across the nuclear security enterprise. The Office of the Chief, Defense Nuclear Security (CDNS) executes responsibility for the overall direction and management of security programs employed across the nuclear security enterprise comprised of NNSA's operations and facilities. The CDNS is charged with

  20. Management and Administration | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Management and Administration NNSA's Naval Reactors is committed to excellence and dedicated to meeting its human resource needs in a manner that is customer driven. NNSA's Naval Reactors is committed to excellence and dedicated to meeting its human resource needs in a manner that is customer driven. EMPLOYEE RESOURCES All Employees Thrift Savings Plan off site link (TSP) - Retirement savings plan for civilians who are employed by the United States Government and members of the uniformed

  1. Acquisition & Project Management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Acquisition & Project Management Sandia National Laboratories Contract Process Announced WASHINGTON (May 18, 2016) - The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) has initiated the process to compete the management and operating contract for Sandia National Laboratories (SNL) in Albuquerque, N.M.; Livermore, Calif.; Kauai, Hawaii;... M & O Support Department The M&O Support Department supports pre-award source selection or contract extension

  2. Information Technology Project Management - DOE Directives, Delegation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5.1 Admin Chg 1, Information Technology Project Management by Denise Hill Functional areas: Administrative Change, Information Technology, Project Management, The Order provides...

  3. Information system revives materials management

    SciTech Connect (OSTI)

    Hansen, T.

    1995-12-01

    Through a change in philosophy and the development of a new, more efficient information management system, Arizona Public Service Co. (APSW) has, in less than two years, reduced material and service costs by 10 percent. The utility plans to cut these costs form 1993 figures by 25 percent before 2000. The utility is breaking new ground with ongoing implementation of new business processes and the new Materials Logistics Information System (MLIS), which has been co-developed with Texas Instruments Software Division (TISD).

  4. Special nuclear material information, security classification guidance. Instruction

    SciTech Connect (OSTI)

    Flickinger, A.

    1982-12-03

    The Instruction reissues DoD Instruction 5210.67, July 5, 1979, and provides security classification guidance for information concerning significant quantities of special nuclear material, other than that contained in nuclear weapons and that used in the production of energy in the reactor plant of nuclear-powered ships. Security classification guidance for these data in the latter two applications is contained in Joint DoE/DoD Nuclear Weapons Classification Guide and Joint DoE/DoD Classification Guide for the Naval Nuclear Propulsion Program.

  5. Appropriate Technology Management Information System

    SciTech Connect (OSTI)

    Not Available

    1984-02-01

    From 1978 to 1981, the Department of Energy (DOE) awarded more than 2200 small grants worth more than $25 million to individuals, organizations and small businesses across the nation for the purposes of researching, developing and demonstrating appropriate technologies. Grants were given in the full range of technology areas, including conservation, solar, biomass, wind, geothermal, and hydro power. The final report from each DOE grantee was reviewed in an effort to extract information about new ideas and proven concepts that could be of value to the public. To manage the growing wealth of information from the grant reports, and to monitor the report review process, the Appropriate Technology Management Information System (ATMIS), a computer data base, was developed. The ATMIS can classify data into numerous categories (technology area, geographic location, project status, etc.). This manual was generated directly from the data base.

  6. Security classification of information concerning high-energy lasers. Instruction

    SciTech Connect (OSTI)

    MacCallum, J.

    1981-09-18

    The Instruction reissues Department of Defense (DoD) Instruction 5210.61, April 7, 1977, to update policy and guidance, and establishes uniform criteria for the security classification of information concerning DoD programs and projects involving the research, development, test and evaluation (RDT E), application, production, and operational use of high-energy lasers (HEL), and their application for military purposes, whether as weapons or in other military systems.

  7. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  8. Ross Management | Open Energy Information

    Open Energy Info (EERE)

    Management Jump to: navigation, search Name: Ross Management Place: Goldendale, Washington State Product: Ross Management is the management parent for a group of family owned...

  9. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  10. Training for Records and Information Management

    Broader source: Energy.gov [DOE]

    Records Management Training:  NARA Records Management Training   NARA Targeted Assistance NARA Brochures Training Presentation:  Information Collection Requests/PRA (pdf)  

  11. TEPS/BPA Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Management / Technical, Engineering, and Programmatic Support (TEPS) Blanket Purchase Agreements (BPAs) TEPS/BPA Information The following information summarizes NNSA's recently awarded enterprise-wide, strategic sourcing initiative for obtaining technical, engineering and programmatic support services from eight Contactor Teaming Arrangements (CTAs). The eight CTAs were thoroughly vetted using a diligent evaluation process which included participation from evaluation team members representing

  12. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F. Russell; Carroll, J. Ritchie; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  13. Los Alamos National Security LLC Selected to Manage Los Alamos National

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Laboratory | Department of Energy Security LLC Selected to Manage Los Alamos National Laboratory Los Alamos National Security LLC Selected to Manage Los Alamos National Laboratory December 21, 2005 - 4:51pm Addthis WASHINGTON, D.C. - Secretary of Energy Samuel W. Bodman announced today that Los Alamos National Security LLC has been selected to be the management and operations contractor for Los Alamos National Laboratory in New Mexico. Los Alamos National Security LLC is a limited liability

  14. Secure Retrieval of FFTF Testing, Design, and Operating Information

    SciTech Connect (OSTI)

    Butner, R. Scott; Wootan, David W.; Omberg, Ronald P.; Makenas, Bruce J.; Nielsen, Deborah

    2009-10-01

    One of the goals of the Advanced Fuel Cycle Initiative (AFCI) is to preserve the knowledge that has been gained in the United States on Liquid Metal Reactors (LMR). In addition, preserving LMR information and knowledge is part of a larger international collaborative activity conducted under the auspices of the International Atomic Energy Agency (IAEA). A similar program is being conducted for EBR-II at the Idaho Nuclear Laboratory (INL) and international programs are also in progress. Knowledge preservation at the FFTF is focused on the areas of design, construction, startup, and operation of the reactor. As the primary function of the FFTF was testing, the focus is also on preserving information obtained from irradiation testing of fuels and materials. This information will be invaluable when, at a later date, international decisions are made to pursue new LMRs. In the interim, this information may be of potential use for international exchanges with other LMR programs around the world. At least as important in the United States, which is emphasizing large-scale computer simulation and modeling, this information provides the basis for creating benchmarks for validating and testing these large scale computer programs. Although the preservation activity with respect to FFTF information as discussed below is still underway, the team of authors above is currently retrieving and providing experimental and design information to the LMR modeling and simulation efforts for use in validating their computer models. On the Hanford Site, the FFTF reactor plant is one of the facilities intended for decontamination and decommissioning consistent with the cleanup mission on this site. The reactor facility has been deactivated and is being maintained in a cold and dark minimal surveillance and maintenance mode until final decommissioning is pursued. In order to ensure protection of information at risk, the program to date has focused on sequestering and secure retrieval. Accomplishments include secure retrieval of: more than 400 boxes of FFTF information, several hundred microfilm reels including Clinch River Breeder Reactor (CRBR) information, and 40 boxes of information on the Fuels and Materials Examination Facility (FMEF). All information preserved to date is now being stored and categorized consistent with the IAEA international standardized taxonomy. Earlier information largely related to irradiation testing is likewise being categorized. The fuel test results information exists in several different formats depending upon the final stage of the test evaluation. In some cases there is information from both non-destructive and destructive examination while in other cases only non-destructive results are available. Non-destructive information would include disassembly records, dimensional profilometry, gamma spectrometry, and neutron radiography. Information from destructive examinations would include fission gas analysis, metallography, and photomicrographs. Archiving of FFTF data, including both the reactor plant and the fuel test information, is being performed in coordination with other data archiving efforts underway under the aegis of the AFCI program. In addition to the FFTF efforts, archiving of data from the EBR-II reactor is being carried out by INL. All material at risk associated with FFTF documentation has been secured in a timely manner consistent with the stated plan. This documentation is now being categorized consistent with internationally agreed upon IAEA standards. Documents are being converted to electronic format for transfer to a large searchable electronic database being developed by INL. In addition, selected FFTF information is being used to generate test cases for large-scale simulation modeling efforts and for providing Design Data Need (DDN) packages as requested by the AFCI program.

  15. 2015 Information Management Conference | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2015 Information Management Conference 2015 Information Management Conference January 26, 2015 - 3:51pm Addthis The 34th Information Management Conference (IMC) sponsored by the Office of the Chief Information Officer (OCIO) will be held at the Gaylord Opryland Convention Center in Nashville, TN, June 15-18, 2015. The conference theme is: "Mission Excellence through Innovation" The Office of the Chief Information Officer (OCIO) is committed to an effective, collaborative strategy with

  16. MN Office of Energy Security | Open Energy Information

    Open Energy Info (EERE)

    MN Office of Energy Security Jump to: navigation, search Name: MN Office of Energy Security Place: St. Paul, MN Website: www.mnofficeofenergysecurity.c References: MN Office of...

  17. Zicom Electronic Security Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    Security Systems Ltd. Place: Mumbai, Maharashtra, India Zip: 400093 Sector: Solar, Wind energy Product: Mumbai-based electronic security systems integrator. The firm plans to...

  18. EcoSecurities India Ltd | Open Energy Information

    Open Energy Info (EERE)

    Indian subsidiary of UK CDM project developer EcoSecurities, to focus primarily on methane capture and destruction projects. References: EcoSecurities India Ltd.1 This...

  19. Nevada National Security Site Management and Operating (M&O) Contract

    National Nuclear Security Administration (NNSA)

    Competition | National Nuclear Security Administration Nevada National Security Site Management and Operating (M&O) Contract Competition Contract Competition Home Page Welcome to the National Nuclear Security Administration's website for the Nevada National Security Site (NNSS) M&O Contract Competition. The NNSS is a geographically diverse outdoor testing, training, and evaluation complex situated on approximately 1,360 square miles. The facility helps ensure the security of the

  20. National Security Campus Management and Operating (M&O) Contract

    National Nuclear Security Administration (NNSA)

    Competition | National Nuclear Security Administration National Security Campus Management and Operating (M&O) Contract Competition Contract Competition Home Page Welcome to the National Nuclear Security Administration's website for the National Security Campus (NSC) Management and Operating Contract Competition. The NSC in Kansas City, MO, is situated on approximately 177 acres. The facility is leased for the NNSA by the General Services Administration. Satellite operations include

  1. NNSA Awards Kansas City National Security Campus Follow-on Management &

    National Nuclear Security Administration (NNSA)

    Operating Contract to Honeywell FM&T | National Nuclear Security Administration Awards Kansas City National Security Campus Follow-on Management & Operating Contract to Honeywell FM&T July 10, 2015 WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the award to Honeywell Federal Manufacturing and Technologies, LLC, to be the management and operating contractor for the National Security Campus (NSC) in Kansas City, Missouri. "Our

  2. Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee

    SciTech Connect (OSTI)

    2005-03-02

    This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for former waste management units, legacy contamination source areas and distribution of contamination in soils, and environmental infrastructure (e.g., caps, monitoring systems, etc.) that is in place or planned in association with RAs. (3) Regulatory considerations and processes for management and disposition of waste soil upon generation, including regulatory drivers, best management practices (BMPs), waste determination protocols, waste acceptance criteria, and existing waste management procedures and BMPs for Y-12. This Soil Management Plan provides information to project planners to better coordinate their activities with other organizations and programs with a vested interest in soil disturbance activities at Y-12. The information allows project managers and maintenance personnel to evaluate and anticipate potential contaminant levels that may be present at a proposed soil disturbance site prior to commencement of activities and allows a more accurate assessment of potential waste management requirements.

  3. Information Collection Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Collection Management Information Collection Management Forms44.jpg The Paperwork Reduction Act (PRA) of 1995 requires federal agencies and government-owned, contractor-operated facilities to obtain approval from the Office of Management and Budget (OMB) before collecting information from the general public, which includes contractors. This ensures each organization will maximize the utility of information created, collected, maintained, and used. The coordination with OMB also

  4. Vantage Management | Open Energy Information

    Open Energy Info (EERE)

    Management Jump to: navigation, search Name: Vantage Management Place: New York Product: US-based firm which provides business and technical consulting to growing companies....

  5. Claridge Management | Open Energy Information

    Open Energy Info (EERE)

    Claridge Management Jump to: navigation, search Name: Claridge Management Place: United Kingdom Product: Claridge is focusing on setting up incubatortechnology development hubs in...

  6. The Quality of Management and of the Science and Engineering at the NNSA National Security Laboratories

    Broader source: Energy.gov [DOE]

    The Quality of Management and of the Science and Engineering at the NNSA National Security Laboratories was presented to CRENEL 9/15/2014.

  7. Security Council Approval of Kofi

    Energy Savers [EERE]

    Security Control Assessor Security Control Assessor Cyber-security-300x199.jpg The Security Control Assessor (SOA) is responsible for assessing the management, operational, assurance, and technical security controls implemented on an information system via security testing and evaluation (ST&E) methods. The SOA must be independent of system development, operation, and deficiency mitigation. PDF icon Security Control Assessor Core Competency Training Worksheet More Documents &

  8. Security Forms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  9. Credit Leona Securities Asia CLSA UK | Open Energy Information

    Open Energy Info (EERE)

    Leona Securities Asia CLSA UK Jump to: navigation, search Name: Credit Leona Securities Asia - CLSA (UK) Place: London, United Kingdom Zip: EC3V 4QH Sector: Services Product: CLSA...

  10. Facilities Information Management System (FIMS)

    Broader source: Energy.gov [DOE]

     FIMS is DOE’s corporate database for real property as required by DOE Order 430.1B, Real Property Asset Management. The system provides DOE with an accurate inventory and management tool that...

  11. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  12. Vencon Management | Open Energy Information

    Open Energy Info (EERE)

    States Sector: Services Product: General Financial & Legal Services ( Partnership (investment, law etc) ) References: Vencon Management1 This article is a stub. You can help...

  13. ADMINISTRATIVE SUPPORT INFORMATION MANAGEMENT ADMINISTRATIVE...

    National Nuclear Security Administration (NNSA)

    ... HEALTH PHYSICS TECHNOLOGY R&D S&E, CHEMICAL ENGINEERING INDUSTRIAL HYGIENE R&D S&E, ... AIDED DESIGN AND DRAFTING TECHNOLOGIST CHEMICAL ENGINEERING CONSTRUCTION MANAGER ...

  14. Safeguards and Security for Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-08-15

    This Guide addresses the implementation steps for achieving safeguards and security systems that support the Department's projection objectives.

  15. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Energy Savers [EERE]

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  16. 3-Year Renewal Request of OMB 1910-1800, Security, Information Collections

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 3-Year Renewal Request of OMB 1910-1800, Security, Information Collections 3-Year Renewal Request of OMB 1910-1800, Security, Information Collections Following are the collection instruments for your viewing. DOE F 5631.34, Data Report on Spouse/Cohabitant Security Incident Notification Report and Report of Preliminary Security Incident/Infraction (DOE F 471.1 and DOE F 5639.3) DOE F 5631.20, Request for Visitor Access Approval DOE Form 5631.18, Security

  17. Index of Energy Security Risk | Open Energy Information

    Open Energy Info (EERE)

    for 21st Century Energy Sector: Energy Focus Area: Non-renewable Energy, Renewable Energy Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website:...

  18. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-13

    The purpose of this directive is to ensure that STI is appropriately managed as part of the DOE mission to enable the advancement of scientific knowledge and technological innovation. Supersedes DOE O 241.1B.

  19. Management of Naval Reactors' Cyber Security Program, OIG-0884

    Broader source: Energy.gov (indexed) [DOE]

    It is imperative that the systems are protected against cyber security threats, regardless of classification, given the sensitive nature of the Naval Reactors mission and its ...

  20. NNSA selects Consolidated Nuclear Security, LLC to manage the...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration (NNSA) today ... Ridge, Tenn., and the Pantex Plant near Amarillo, Texas. ... unexercised option for Savannah River Tritium Operations at the ...

  1. Safeguards and Security for Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-08-15

    The Guide provides a methodology for implementing the safeguards and security requirements of DOE O 413.3B. Supersedes DOE G 413.3-3.

  2. Contacts for Information Collection Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Collection Management Contacts for Information Collection Management Information Collection Program, and Information Quality Guidelines Christina Rouleau, IM-23 Records Management Division Office of the CIO US Department of Energy 301-903-6227 Christina.Rouleau

  3. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-13

    The purpose of this directive is to ensure that STI is appropriately managed as part of the DOE mission to enable the advancement of scientific knowledge and technological innovation. Supersedes DOE O 241.1A and DOE O 241.1A Chg 1.

  4. PKI-based security for peer-to-peer information sharing

    SciTech Connect (OSTI)

    Berket, Karlo; Essiari, Abdelilah; Muratas, Artur

    2004-05-02

    The free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a number of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.

  5. Energy Independence and Security Act of 2007 | Open Energy Information

    Open Energy Info (EERE)

    Energy Independence and Security Act of 2007 Jump to: navigation, search This article is a stub. You can help OpenEI by expanding it. External Links Energy Independence and...

  6. Office of Legacy Management. Information and Records Management. Transition Guidance

    SciTech Connect (OSTI)

    2004-03-01

    The Office of Legacy Management (LM) is an integral part of the U.S. Department of Energy’s (DOE’s) strategy to ensure that legacy liabilities of former nuclear weapons production sites are properly managed following the completion of environmental cleanup activities. LM will work with each site using an integrated team approach to ensure a successful transition. Part of this process will include transition of Government records and information. The Office of Legacy Management Information and Records Management Transition Guidance focuses on LM’s goal to preserve and protect legacy records and information. This guidance document establishes a framework for the transfer of records management responsibilities for sites transferring to LM. It describes the requirements, responsibilities, and procedures for the efficient and cost-effective transfer of custody, ownership, and management of records and other information products from the transfer site to LM. Records management practices are critical to the functions of Federal agencies because records provide information about, or evidence of, the organization, functions, policies, decisions, procedures, operations, or other activities. Therefore, the information generated by an agency is created, maintained, and dispositioned through records management processes that ensure the appropriate preservation and retrieval of essential information. Because of their intrinsic value, best practices to preserve information and records should be utilized when records are transferred from one organization to another. As the transfer program completes cleanup activities at closure sites, a transitional process will facilitate the transparent shift in the management of site records activities to LM. The roles and responsibilities of the transfer site and/or program and LM described in this document are a necessary foundation for cooperation and coordination and are essential to the successful transition of records and information responsibilities. The DOE Office of the Chief Information Officer (OCIO) has a central role in DOE records management by providing guidance, expertise, and coordination to all DOE offices and organizations and coordination with the National Archives and Records Administration (NARA). LM and the transfer site will complete an integrated transition plan which will integrate all transition elements including information and records. As part of the overall transition plan, an Information and Records Transition Plan will be developed consistent with the integrated transition plan for the site transfer and included as an attachment. The Information and Records Management Transition Plan will be developed to assist both organizations in organizing the tasks; establishing a timetable and milestones for their completion; and identifying manpower, funding and other resources that will be needed to complete the ownership transfer. In addition, the plan will provide a valuable exchange of institutional knowledge that will assist LM in meeting the obligations of responsibly managing legacy records. Guidance for the development of the plan is included in this document. Records management concerns that may arise during site closure, such as management support, contract language and agreements, interactions with the OCIO and NARA, resource and budget considerations, and procedures to safeguard records are addressed. Guidelines and criteria for records management transition activities are also provided. These include LM expectations for the inventory, scheduling, and disposition of records; the management and transfer of electronic files, including databases and software; records finding aids, indices, and recordkeeping systems; and the process for the transfer of hard copy and electronic records to LM.

  7. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    SciTech Connect (OSTI)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  8. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-09

    To establish Department of Energy (DOE) requirements and responsibilities to ensure that scientific and technical information (STI) is identified, processed, disseminated, and preserved in a manner that (a) enables the scientific community and the public to locate and use the unclassified and unlimited STI resulting from DOE's research and related endeavors and (b) ensures access to classified and sensitive unclassified STI is protected according to legal or Departmental requirements. Cancels DOE O 241.1. Canceled by DOE O 241.1A Chg 1.

  9. Performing Energy Security Assessments: A How-To Guide for Federal Facility Managers

    Broader source: Energy.gov [DOE]

    Guide describes the best practices and recommended process for federal facility managers to prepare for the following sections of a facility’s energy security plan: vulnerability assessments, energy preparedness and operations plans, and remedial action plans.

  10. DOE Selects Lawrence Livermore National Security, LLC to Manage its Lawrence Livermore National Laboratory

    Broader source: Energy.gov [DOE]

    WASHINGTON, DC - The U.S. Department of Energy (DOE) today announced that Lawrence Livermore National Security, LLC (LLNS) has been selected to be the management and operating contractor for DOE's...

  11. Foreign Affairs Information System (FAIS) Early Operational Capability (EOC) network security criteria

    SciTech Connect (OSTI)

    Not Available

    1988-09-12

    The Joint Center for Information Security Technology (JCIST) at Oak Ridge, Tennessee, under an interagency agreement between the Department of State (DOS) and the Department of Energy (DOE), has been tasked with the security certification testing of the Foreign Affairs Information system (FAIS) Early Operational Capability (EOC) software. The basis for this certification is the FAIS (EOC) Security Requirements Allocation (SRA) document. This document defines the security requirements for the FAIS EOC software. Security certification of the FAIS system is the responsibility of the Office of Information Systems Security, Bureau of Diplomatic Security (DS/ST/ISS). The overall FAIS EOC certification will be completed in two general steps. First, a test of a stand-alone FAIS EOC system against the SRA requirements which is currently in progress. Second is a test of all FAIS network system interfaces against the SRA requirements as expanded to adequately address the network security issues. This accumulation of requirements is referred to as the FAIS EOC Network Security Criteria. 5 refs.

  12. Freedom of Information Act (FOIA) | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration NNSA Office of General Counsel Freedom of Information Act (FOIA) The FOIA establishes the premise that people should have access to government information, and it is the responsibility of the government to justify why records should not be disclosed. This section provides information about how to obtain records/information. Learn More What is the Freedom of Information Act (FOIA)? Freedom of Information Act - Costs Public Reading Facilities Freedom of Information Act Related

  13. Electronic DOE Information Security System (eDISS) PIA, Office...

    Energy Savers [EERE]

    Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory Occupational Injury & Illness System...

  14. U.S. DEPARTMENT OF ENERGY Information Collection Clearance Manager...

    Office of Environmental Management (EM)

    Approving Official Signature Date Position Title SECTION II. Appointee Contact Information Location (City, State) Security Classification Email Phone Number SECTION III. Appointee ...

  15. Logistics Services Manager, Nevada Test Site | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Logistics Services Manager, Nevada Test Site Lance Rakow, NTS Logistics Services Mangager Lance Rakow August 2009 U.S. Department of Energy's Management Award Along with colleague Susan Livenick, Lance Rakow was awarded this years Department of Energy's Management Award honoring his outstanding achievements in energy and water management. Lance, the Logistics Services Manager at the Nevada Test Site, oversaw the conversion of nearly all fleet vehicles at NTS to using

  16. Guidance for Fiscal Year 2015 Facilities Information Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fiscal Year 2015 Facilities Information Management System Data Validations Guidance for Fiscal Year 2015 Facilities Information Management System Data Validations PDF icon FIMS ...

  17. Guidance for Fiscal Year 2015 Facilities Information Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Guidance for Fiscal Year 2015 Facilities Information Management System Data Validations Guidance for Fiscal Year 2015 Facilities Information Management System Data Validations PDF...

  18. Contact Information | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact Information Environment, Safety, Health & Assurance (ESH&A), G40 TASF, 294-2153 Sean Whalen ESH&A Manager, Quality Assurance Manager Safety and Security Management...

  19. CONTACTS FOR INFORMATION MANAGEMENT: Forms & Records | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CONTACTS FOR INFORMATION MANAGEMENT: Forms & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms & Records Maria Levesque, Director Enterprise Records Management Division (IM-23) Email: Maria.Levesque@hq.doe.gov Troy Manigault, Departmental Records Officer Deidre Wilkerson, Management Analyst Tonya Meadows, Management Analyst Gale Mitchell, Management Analyst Markus Robinson - Contractor Greg Holland - Contractor Andrea Heimbrock - Contractor Records Management Program E-mail:

  20. Project Manager, Nevada Test Site | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Project Manager, Nevada Test Site Susan Livenick, NTS Project Manager Susan Livenick August 2009 U.S. Department of Energy's Management Award On August 12, Susan Livenick, a Project Manager at the Nevada Test Site received the 2009 U.S. Department of Energy's Management Award at a special awards ceremony in Providence, R.I. The awards honor outstanding achievements in energy and water management. Susan oversaw Bldg. B3's abatement and renovation from 2005-2008, making B3 the

  1. Environmental Restoration Information Resource Management Program Plan

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Environmental Restoration Information Resources Management (ER IRM) Program Plan defines program requirements, organizational structures and responsibilities, and work breakdown structure and to establish an approved baseline against which overall progress of the program as well as the effectiveness of its management will be measured. This plan will guide ER IRM Program execution and define the program`s essential elements. This plan will be routinely updated to incorporate key decisions and programmatic changes and will serve as the project baseline document. Environmental Restoration Waste Management Program intersite procedures and work instructions will be developed to facilitate the implementation of this plan.

  2. Environmental remediation and waste management information systems

    SciTech Connect (OSTI)

    Harrington, M.W.; Harlan, C.P.

    1993-12-31

    The purpose of this paper is to document a few of the many environmental information systems that currently exist worldwide. The paper is not meant to be a comprehensive list; merely a discussion of a few of the more technical environmental database systems that are available. Regulatory databases such as US Environmental Protection Agency`s (EPA`s) RODS (Records of Decision System) database [EPA, 1993] and cost databases such as EPA`s CORA (Cost of Remedial Action) database [EPA, 1993] are not included in this paper. Section 2 describes several US Department of Energy (DOE) Environmental Restoration and Waste Management (EM) information systems and databases. Section 3 discusses several US EPA information systems on waste sites and technologies. Section 4 summarizes a few of the European Community environmental information systems, networks, and clearinghouses. And finally, Section 5 provides a brief overview of Geographical Information Systems. Section 6 contains the references, and the Appendices contain supporting information.

  3. NNSA selects Consolidated Nuclear Security, LLC to manage the consolidated

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and far | National Nuclear Security Administration scientists find more effective ways to detect nuclear explosions near and far Wednesday, April 6, 2016 - 10:36am NNSA Blog NNSA activities are vital to detecting nuclear explosions and helping verify compliance with the testing ban worldwide. Recent developments at NNSA's Livermore National Laboratory (LLNL) will help NNSA meet this commitment. Using computer-generated models and field experiments, LLNL simulates how gases produced from

  4. Management of Los Alamos National Laboratory's Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Los Alamos National Laboratory (OAS-SR-07-01, November ... management process consistent with Federal requirements. ... used to support office automation and general productivity. ...

  5. Introduction SCADA Security for Managers and Operators | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SCADA Test Bed introduction to managers and operators in the field- To establish a National capability to support industry and government in addressing control system cyber ...

  6. ORISE: Capabilities in National Security and Emergency Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Capabilities ORISE Emergency Management Capabilities In preparation for a natural or man-made disaster, the Oak Ridge Institute for Science and Education (ORISE) provides national...

  7. Notices DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Agency Docket ID FEMA-2015-0006 Guidelines for Implementing Executive Order 11988, Floodplain Management, and Executive Order 13690, Establishing a Federal Flood Risk ...

  8. Los Alamos National Security LLC Selected to Manage Los Alamos...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the management and operations contractor for Los Alamos National Laboratory in New Mexico. ... Los Alamos community and state of New Mexico since it will guarantee the lab will ...

  9. Safety and Security Officer

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-07-20

    Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security violations, and the management and administration of agency occupational safety and health program pursuant to EO 12196

  10. Secure communication of static information by electronic means

    DOE Patents [OSTI]

    Gritton, Dale G.

    1994-01-01

    A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

  11. LM Records and Information Management Transition Guidance (January 2015) |

    Energy Savers [EERE]

    Department of Energy Records and Information Management Transition Guidance (January 2015) LM Records and Information Management Transition Guidance (January 2015) This guidance document establishes a framework for developing a Records and Information Management Transition Plan as part of the overall transition effort for a legacy site. PDF icon LM Records and Information Management Transition Guidance (January 2015) More Documents & Publications Information and Records Management

  12. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    SciTech Connect (OSTI)

    Barbara McCabe; John Kovach

    2009-03-30

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  13. NEVADA NATIONAL SECURITY SITE (NNSS) DRIVERS ROUTE/SHIPMENT INFORMATION

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (NNSS) DRIVERS ROUTE/SHIPMENT INFORMATION (12/2014 Log No. 2014-229) NOTE: THIS FORM IS TWO (2) PAGES - YOU MUST COMPLETE BOTH PAGES NNSS SHIPMENT NUMBER: CARRIER NAME: TRACTOR NO.: TRAILER NO.: AT ORIGIN AT NNSS Main Gate NNSS OFFICE USE ONLY DEPARTURE DATE: ARRIVAL DATE: DESTINATION AREA: Area 5 DEPARTURE TIME: ARRIVAL TIME: NNSS DEPARTURE TIME: LOCATION: HELD OVER? No Yes REASON: ROUTE INFORMATION REVIEWED BY: ONSITE SHIPMENT (MAP NOT APPLICABLE) DROP YARD; LEAVE THIS FORM WITH SHIPPING

  14. Freedom of Information Act Related Sites | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Related Sites DOE Headquarters FOIA Page DOE Office of Hearings and Appeals Searchable index of FOIA and Privacy Act appeals A Citizen's Guide on Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records Department of Justice (DOJ) Office of Information and Privacy Includes the DOJ Guide to the FOIA, Overview of the PA, Your Right to Federal Records, FOIA Updates, and FOIA Annual Reports Defense Nuclear Facilities Safety Board An

  15. MIS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    MIS NNSA's G2 Management Information System Wins Association for Enterprise Information's (AFEI) "Excellence in Enterprise Information Award" The G2 team and the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information Award. (WASHINGTON, D.C) - The National Nuclear Security Administration (NNSA) has received the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information

  16. Information needs for risk management/communication

    SciTech Connect (OSTI)

    Bennett, D.A.

    1990-12-31

    The hazardous waste cleanup program under the Comprehensive Environmental Response, Compensation, and Liability Act (Superfund) is delegated to the ten Regions of the US Environmental Protection Agency (EPA) and has, to date, identified more than 33,000 sites for consideration. The size and complexity of the program places great demands on those who would provide information to achieve national consistency in application of risk assessment while meeting site-specific needs for risk management and risk communication.

  17. Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

  18. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  19. Environmental Management Associates | Open Energy Information

    Open Energy Info (EERE)

    Environmental Management Associates Jump to: navigation, search Name: Environmental Management Associates Abbreviation: EMA Website: www.emacorp.com Environmental Management...

  20. Emergency Public Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration Response / Training Emergency Operations Training Academy Rotating image showing pictures of Classroom, Online and Hands on trainings The Office of Emergency Operations, NA-40-The Emergency Operations Training Academy (EOTA) EOTA provides training and education to enhance the readiness of personnel in the radiological-nuclear emergency operations community. For more information or to contact us, visit the EOTA website at: http://eota.energy.gov/ Vision The Emergency Operations

  1. National Security Campus Management and Operating (M&O) Contract...

    National Nuclear Security Administration (NNSA)

    NNSA will use this website as a means to disseminate information relating to this acquisition. Please direct questions concerning the content of this web site to SEB4@nnsa.doe.gov ...

  2. HQ Emergency Management Team (EMT) | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration HQ Emergency Management Team (EMT) NNSA ensures that capabilities are in place to respond to any NNSA and Department of Energy facility emergency. It is also the nation's premier responder to any nuclear or radiological incident within the United States or abroad and provides operational planning and training to counter both domestic and international nuclear terrorism. NNSA ensures that capabilities are in place to respond to any NNSA and Department of Energy facility

  3. Inventory Tracking and Management: Fact Sheet | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Inventory Tracking and Management: Fact Sheet March 23, 2012 Under International Atomic Energy Agency (IAEA) safeguards agreements, States are required to establish a "state system of accounting and control" (SSAC) to keep track of all nuclear material (quantity and type), note changes in material inventories (imports/exports), and monitor all material balance areas (for material use and/or processing) within safeguarded nuclear facilities. States are required to

  4. INFORMATION: Audit Report on The Office of Secure Transportation DC-9 Aircraft Refurbishment

    SciTech Connect (OSTI)

    2009-05-01

    The National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) maintains a fleet of seven aircraft to transport sensitive items, equipment and security personnel. Based on increasing requirements for transporting components and security personnel, OST decided to add a heavy transport aircraft to meet the Department's weapons surety and emergency response missions. In 2004, as a replacement following the sale of a portion of its fleet, OST acquired a DC-9 cargo aircraft that had been excessed by the U.S. military. Prior to integrating the DC-9 into its fleet, NNSA ordered a refurbishment of the aircraft. This refurbishment project was to permit the aircraft to be certified to civil air standards so that it could transport passengers for site visits, training and other travel. The NNSA Service Center (Service Center) awarded a contract for the refurbishment of the aircraft in December 2004. In recent years, the Office of Inspector General has addressed a number of issues relating to the Department's aircraft management activities and services. As part of our ongoing review process and because of the national security importance of its fleet of aircraft, we conducted this review to determine whether OST had an effective and efficient aviation management program.

  5. ARM Tropical Western Pacific (TWP) Operations Management and Support: Securing ARM Data

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Tropical Western Pacific (TWP) Operations Management and Support: Securing ARM Data K. L. Nitschke South Pacific Regional Environment Programme Apia, Samoa L. Jones Los Alamos National Laboratory Los Alamos, New Mexico C. N. Long Pacific Northwest National Laboratory Richland, Washington Introduction The Tropical Western Pacific Office (TWPO) (a) has been tasked with providing operational management and support for three (b) climate station instrument facilities in the Tropical Western pacific

  6. Bureau of Land Management - WO-210 - Contact Information | Open...

    Open Energy Info (EERE)

    navigation, search OpenEI Reference LibraryAdd to library Web Site: Bureau of Land Management - WO-210 - Contact Information Abstract This page provides contact information for...

  7. Energy Management and Information Systems Study - 2014 BTO Peer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Information Systems Study - 2014 BTO Peer Review Energy Management and Information Systems Study - 2014 BTO Peer Review Presenter: Jessica Granderson, Lawrence Berkeley ...

  8. Best Management Practice #2: Information and Education Programs...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Information and Education Programs Best Management Practice 2: Information and Education Programs Educating users about water conservation is essential to sustain the savings ...

  9. Solar International Management Inc | Open Energy Information

    Open Energy Info (EERE)

    International Management Inc Jump to: navigation, search Name: Solar International Management Inc Place: Washington,DC, Washington, DC Zip: 20006 Sector: Solar Product: Manager of...

  10. GHG Management Institute | Open Energy Information

    Open Energy Info (EERE)

    GHG Management Institute Jump to: navigation, search Name: GHG Management Institute Address: Greenhouse Gas Management Institute 9215 View Avenue NW Seattle, WA USA 98117 Place:...

  11. Ethanol Capital Management | Open Energy Information

    Open Energy Info (EERE)

    Management Jump to: navigation, search Name: Ethanol Capital Management Place: Tucson, Arizona Zip: 85711 Product: Manages funds investing in Ethanol plants in the US Coordinates:...

  12. Generation Investment Management LLP | Open Energy Information

    Open Energy Info (EERE)

    Investment Management LLP Jump to: navigation, search Name: Generation Investment Management LLP Place: London, Greater London, United Kingdom Zip: W1J 0AH Product: Fund manager of...

  13. Green Capital Management | Open Energy Information

    Open Energy Info (EERE)

    Capital Management Jump to: navigation, search Name: Green Capital Management Place: London, United Kingdom Zip: SW10 0BB Sector: Services Product: The Green Capital Management...

  14. Lawrence Livermore National Security CFO Processes Functional Management Assessment

    SciTech Connect (OSTI)

    Sparks, A; Sampson, D; Thomas, B; Mendez, M

    2008-06-12

    The scope of the Functional Management Assessment of the CFO included a review of the CFO Organizational Structure, including deployed financial services and the division of responsibilities and internal controls between CFO and other organizations that perform financial functions across the Laboratory. In addition, the assessment team solicited input from end users and reviewers. Three issues discussed are: ISSUE 1: Financial activities and cash transactions are occurring outside the CFO organization. Approximately $200M of non-purchase order spending occurs in seven areas outside CFO control (travel, relocation, special disbursements, IPO, legal, risk management, and freight). NIF financial services have not been integrated into the CFO organization and operate outside CFO control. Business risks--There is no single point of financial accountably; Currently within the CFO and Business and Operations organizations there is a lack of clarity of roles and responsibilities for financial activities; Financial talent within the laboratory is fragmented; and Inefficiencies exist based on the current structure; An example of the above business risks associated with organizational structure can be observed in the process for reimbursement of relocation costs to employees. Currently, Human Resources and Travel both administer portions of an employee's relocation. Costs are reviewed for compliance with FAR travel guidelines and for compliance with the offer letter but there is no financial review for allowability of costs nor is there a single point where the total relocation costs are reviewed. Through the e-pay system the check is processed by the CFO organization but there is no review by that organization. ISSUE 2: Impact of involuntary separation on current and future activities. 3 risks are: (1) Loss of internal controls--with the upcoming involuntary reductions there will be a loss of personnel with institutional knowledge which will increase the risk of losing internal control on some processes. The organization needs to be cognizant of this risk and take measures to minimize financial risk and ensure on-going A-123 compliance. (2) Project Costing Implementation (PCI) delay--the implementation of PCI is key to achieving integration and reporting of financial data. Presently, business analysts spend half of their time collecting and compiling data and 94% of the labs financial management reports are created using spreadsheets. Currently, the PCI project is on schedule but the involuntary reductions may result in loss of support in this area. (3) Financial Performance Milestones not met--for FY-08 there are fixed, base and stretch financial performance milestones for the laboratory. With reductions in staff the risk of missing key milestones increases. ISSUE 3: Strategically growing the Work for Others (WFO) Portfolio. A key objective of the laboratory is to increase WFO. Greater reliance on WFO will result in additional funding sources and increase the number of control points and financial activities to be monitored thus increasing the level of financial complexity at the lab. The CFO organization should work now to improve controls and processes to accommodate these changes. In particular the following areas should be focused on: (1) Cost reporting needs to be streamlined; (2) Cost Transfer controls need to be increased; and (3) Timely monitoring and close out of contracts needs occur.

  15. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Aldridge, Hal; Duren, Mike; Ricci, Tracy; Bertino, Elisa; Kulatunga, Athula; Navaratne, Uditha Sudheera

    2011-01-01

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  16. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  17. Environmental Management Associates | Open Energy Information

    Open Energy Info (EERE)

    Environmental Management Associates (Redirected from EMA Associates) Jump to: navigation, search Name: Environmental Management Associates Abbreviation: EMA Website:...

  18. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision applications to Systems assessment over the last three decades, Snl has developed and applied a Systems Engineering (SE) approach that includes performance assessment (pa) expertise to inform key decisions concerning radioactive waste management both in the US and internationally. the result of these efforts is a pa-based SE

  19. NNSA Awards Information Technology Contract | National Nuclear...

    National Nuclear Security Administration (NNSA)

    Information Technology Contract | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

  20. Waste Information Management System-2012 - 12114

    SciTech Connect (OSTI)

    Upadhyay, H.; Quintero, W.; Shoffner, P.; Lagos, L.; Roelant, D. [Applied Research Center, Florida International University, 10555 West Flagler Street, Suite 2100, Miami, FL 33174 (United States)

    2012-07-01

    The Waste Information Management System (WIMS) -2012 was updated to support the Department of Energy (DOE) accelerated cleanup program. The schedule compression required close coordination and a comprehensive review and prioritization of the barriers that impeded treatment and disposition of the waste streams at each site. Many issues related to waste treatment and disposal were potential critical path issues under the accelerated schedule. In order to facilitate accelerated cleanup initiatives, waste managers at DOE field sites and at DOE Headquarters in Washington, D.C., needed timely waste forecast and transportation information regarding the volumes and types of radioactive waste that would be generated by DOE sites over the next 40 years. Each local DOE site historically collected, organized, and displayed waste forecast information in separate and unique systems. In order for interested parties to understand and view the complete DOE complex-wide picture, the radioactive waste and shipment information of each DOE site needed to be entered into a common application. The WIMS application was therefore created to serve as a common application to improve stakeholder comprehension and improve DOE radioactive waste treatment and disposal planning and scheduling. WIMS allows identification of total forecasted waste volumes, material classes, disposition sites, choke points, technological or regulatory barriers to treatment and disposal, along with forecasted waste transportation information by rail, truck and inter-modal shipments. The Applied Research Center (ARC) at Florida International University (FIU) in Miami, Florida, developed and deployed the web-based forecast and transportation system and is responsible for updating the radioactive waste forecast and transportation data on a regular basis to ensure the long-term viability and value of this system. WIMS continues to successfully accomplish the goals and objectives set forth by DOE for this project. It has replaced the historic process of each DOE site gathering, organizing, and reporting their waste forecast information utilizing different databases and display technologies. In addition, WIMS meets DOE's objective to have the complex-wide waste forecast and transportation information available to all stakeholders and the public in one easy-to-navigate system. The enhancements to WIMS made since its initial deployment include the addition of new DOE sites and facilities, an updated waste and transportation information, and the ability to easily display and print customized waste forecast, the disposition maps, GIS maps and transportation information. The system also allows users to customize and generate reports over the web. These reports can be exported to various formats, such as Adobe{sup R} PDF, Microsoft Excel{sup R}, and Microsoft Word{sup R} and downloaded to the user's computer. Future enhancements will include database/application migration to the next level. A new data import interface will be developed to integrate 2012-13 forecast waste streams. In addition, the application is updated on a continuous basis based on DOE feedback. (authors)

  1. Knowledge information management toolkit and method

    DOE Patents [OSTI]

    Hempstead, Antoinette R.; Brown, Kenneth L.

    2006-08-15

    A system is provided for managing user entry and/or modification of knowledge information into a knowledge base file having an integrator support component and a data source access support component. The system includes processing circuitry, memory, a user interface, and a knowledge base toolkit. The memory communicates with the processing circuitry and is configured to store at least one knowledge base. The user interface communicates with the processing circuitry and is configured for user entry and/or modification of knowledge pieces within a knowledge base. The knowledge base toolkit is configured for converting knowledge in at least one knowledge base from a first knowledge base form into a second knowledge base form. A method is also provided.

  2. Information flow in the DAMA Project beyond database managers: Information flow managers

    SciTech Connect (OSTI)

    Russell, L.; Wolfson, O.; Yu, C.

    1996-03-01

    To meet the demands of commercial data traffic on the information highway, a new look at managing data is necessary. One projected activity, sharing of point-of-sale information, is being considered in the Demand Activated Manufacturing Project of the American Textile Partnership project. A scenario is examined in which 100,000 retail outlets communicate over a period of days. They provide the latest estimate of demand for sewn products across a chain of 26,000 suppliers through the use of bill-of-materials explosions at four levels of detail. A new paradign the information flow manager, is developed to handle this situation, including the case where members of the supply chain fail to communicate and go out of business. Techniques for approximation are introduced to keep estimates of demand as current as possible.

  3. Property:MineralManager | Open Energy Information

    Open Energy Info (EERE)

    MineralManager Jump to: navigation, search Property Name MineralManager Property Type Page Pages using the property "MineralManager" Showing 25 pages using this property. (previous...

  4. EDIG Construction Management | Open Energy Information

    Open Energy Info (EERE)

    Name: EDIG Construction Management Place: Israel Product: String representation "E.D.I.G. is a p ... pment projects." is too long. References: EDIG Construction Management1...

  5. Greenstone Carbon Management Ltd | Open Energy Information

    Open Energy Info (EERE)

    solutions provider to measure, manage and mitigate their carbon emissions and realise business and financial benefits. References: Greenstone Carbon Management Ltd.1 This...

  6. Environmental Resources Management ERM | Open Energy Information

    Open Energy Info (EERE)

    Resources Management ERM Jump to: navigation, search Name: Environmental Resources Management (ERM) Place: United Kingdom Sector: Services Product: ERM is a provider of consulting...

  7. Guinness Asset Management | Open Energy Information

    Open Energy Info (EERE)

    Guinness Asset Management Jump to: navigation, search Name: Guinness Asset Management Place: London, England, United Kingdom Zip: SW1H 9AA Product: String representation "UK based,...

  8. Southern Energy Management | Open Energy Information

    Open Energy Info (EERE)

    Energy Management Jump to: navigation, search Name: Southern Energy Management Place: Morrisville, NC Website: www.southernenergymanagement.c References: Southern Energy...

  9. Oregon Coastal Management Program | Open Energy Information

    Open Energy Info (EERE)

    Program Jump to: navigation, search Logo: Oregon Coastal Management Program Name: Oregon Coastal Management Program Address: 635 Capitol St. NE Place: Salem, Oregon Zip: 97301-2540...

  10. Century Asset Management | Open Energy Information

    Open Energy Info (EERE)

    Century Asset Management Jump to: navigation, search Name: Century Asset Management Place: Sydney, New South Wales, Australia Zip: 2000 Sector: Solar, Vehicles Product: String...

  11. NPS Management Policies 2006 | Open Energy Information

    Open Energy Info (EERE)

    Management Policies 2006 Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: NPS Management Policies 2006Permitting...

  12. Pacific Power Management | Open Energy Information

    Open Energy Info (EERE)

    Power Management Jump to: navigation, search Name: Pacific Power Management Place: Auburn, California Zip: 95602-9022 Product: A specialist provider of commercial PV systems;...

  13. California Groundwater Management Plans | Open Energy Information

    Open Energy Info (EERE)

    Groundwater Management Plans Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: California Groundwater Management PlansLegal Published...

  14. Diverso Management Ltd | Open Energy Information

    Open Energy Info (EERE)

    Diverso Management Ltd Jump to: navigation, search Name: Diverso Management Ltd Place: Shanghai Municipality, China Product: An investment firm focusing on clean energy in China....

  15. Envisory Financial Risk Management | Open Energy Information

    Open Energy Info (EERE)

    Envisory Financial Risk Management Jump to: navigation, search Name: Envisory Financial Risk Management Place: Mnchen, Bavaria, Germany Zip: 80331 Sector: Renewable Energy...

  16. EKO Asset Management Partners | Open Energy Information

    Open Energy Info (EERE)

    EKO Asset Management Partners Jump to: navigation, search Name: EKO Asset Management Partners Place: New York, New York Zip: 10019 Sector: Services Product: EKO is a specialised...

  17. Clean Energy Asset Management | Open Energy Information

    Open Energy Info (EERE)

    Asset Management Jump to: navigation, search Name: Clean Energy Asset Management Place: Santa Monica, California Zip: 94040 Sector: Efficiency, Renewable Energy Product: String...

  18. Wista Management GMBH | Open Energy Information

    Open Energy Info (EERE)

    Wista Management GMBH Jump to: navigation, search Name: Wista-Management GMBH Place: Germany Sector: Services Product: General Financial & Legal Services ( Private ...

  19. Commercial Algae Management | Open Energy Information

    Open Energy Info (EERE)

    Algae Management Jump to: navigation, search Name: Commercial Algae Management Address: 320 Arbor Lane Place: Franklin, NC Zip: 28734 Year Founded: 2002 Phone Number: 828-634-7070...

  20. Gardner Energy Management | Open Energy Information

    Open Energy Info (EERE)

    Gardner Energy Management Jump to: navigation, search Name: Gardner Energy Management Place: Bristol, United Kingdom Zip: BS1 2HS Product: UK-based steam trap manufacturer....

  1. Wind Management LLC | Open Energy Information

    Open Energy Info (EERE)

    Management LLC Jump to: navigation, search Name: Wind Management LLC Place: South Yarmouth, Massachusetts Zip: 2664 Sector: Wind energy Product: Massachussets wind project...

  2. Winslow Management Company LLC | Open Energy Information

    Open Energy Info (EERE)

    Management Company LLC Jump to: navigation, search Name: Winslow Management Company LLC Place: Boston, Massachusetts Zip: 2110 Product: Boston-based, environmentally focused...

  3. Applied Energy Management | Open Energy Information

    Open Energy Info (EERE)

    Energy Management Jump to: navigation, search Name: Applied Energy Management Place: Huntersville, North Carolina Zip: 28078 Sector: Efficiency, Renewable Energy Product: North...

  4. Demand Management Institute (DMI) | Open Energy Information

    Open Energy Info (EERE)

    Demand Management Institute (DMI) Jump to: navigation, search Name: Demand Management Institute (DMI) Address: 35 Walnut Street Place: Wellesley, Massachusetts Zip: 02481 Region:...

  5. Windelectric Management Ltd | Open Energy Information

    Open Energy Info (EERE)

    Windelectric Management Ltd Jump to: navigation, search Name: Windelectric Management Ltd Place: United Kingdom Zip: PL33 9BZ Sector: Wind energy Product: Developed the first wind...

  6. Sarsia Seed Management | Open Energy Information

    Open Energy Info (EERE)

    Sarsia Seed Management Jump to: navigation, search Name: Sarsia Seed Management Place: Norway Sector: Services Product: General Financial & Legal Services ( Private ...

  7. California Coastal Management Program | Open Energy Information

    Open Energy Info (EERE)

    Management Program Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: California Coastal Management ProgramLegal Abstract California...

  8. Affiliated International Management (AIM) | Open Energy Information

    Open Energy Info (EERE)

    Affiliated International Management (AIM) Jump to: navigation, search Name: Affiliated International Management (AIM) Place: Newport Beach, CA Zip: 92658 Coordinates: 33.6392245,...

  9. Calpine Power Management LLC | Open Energy Information

    Open Energy Info (EERE)

    (Redirected from Calpine Power Management) Jump to: navigation, search Name: Calpine Power Management LLC Place: Texas Phone Number: 713.830.2000 Website: www.calpine.com Outage...

  10. Enfinity Management BVBA | Open Energy Information

    Open Energy Info (EERE)

    Management BVBA Jump to: navigation, search Name: Enfinity Management BVBA Place: Ghent, Belgium Zip: 9051 Sector: Renewable Energy Product: Belgium-based financial engineer in...

  11. Ethanol Management Company | Open Energy Information

    Open Energy Info (EERE)

    Ethanol Management Company Place: Colorado Product: Biofuel blender located in Denver, Colorado. References: Ethanol Management Company1 This article is a stub. You can help...

  12. Viresco International Capital Management | Open Energy Information

    Open Energy Info (EERE)

    International Capital Management Jump to: navigation, search Name: Viresco International Capital Management Place: San Diego, California Zip: 92130 Product: San Diego-based hedge...

  13. Planetary Emissions Management | Open Energy Information

    Open Energy Info (EERE)

    Management Jump to: navigation, search Name: Planetary Emissions Management Place: Cambridge, Massachusetts Sector: Carbon Product: US-based, company offering measurements of...

  14. Guardian Energy Management Solutions | Open Energy Information

    Open Energy Info (EERE)

    Guardian Energy Management Solutions Jump to: navigation, search Name: Guardian Energy Management Solutions Address: 753 Forest Street, Suite 110 Place: Marlborough, Massachusetts...

  15. The theory of diversity and redundancy in information system security : LDRD final report.

    SciTech Connect (OSTI)

    Mayo, Jackson R.; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C.; Allan, Benjamin A.; Pierson, Lyndon George

    2010-10-01

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  16. Information Management Division (HC-14) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Management Division (HC-14) Information Management Division (HC-14) Mission Statement This division provides operational support and consultative advice to the Chief Human Capital Officer and Departmental Senior Management on matters pertaining to the acquisition, deployment and maintenance of enabling technology to support the tactical and strategic management of human capital related to accomplishing Department goals and program objectives. The mission also entails establishing and

  17. Recommendation 171: Commendation for Waste Information Management System |

    Office of Environmental Management (EM)

    Department of Energy 1: Commendation for Waste Information Management System Recommendation 171: Commendation for Waste Information Management System The ORSSAB commends DOE and Florida International University for development of the Waste Information Management System and strongly recommends that it be periodically updated and improved. PDF icon Recommendation 171 PDF icon DOE response to recommendation 171 PDF icon DOE Gelles response to recommendation 171 More Documents & Publications

  18. Materials and Security Consolidation Complex Facilities Radioactive Waste Management Basis and DOE Manual 435.1-1 Compliance Tables

    SciTech Connect (OSTI)

    Not Listed

    2011-09-01

    Department of Energy Order 435.1, 'Radioactive Waste Management,' along with its associated manual and guidance, requires development and maintenance of a radioactive waste management basis for each radioactive waste management facility, operation, and activity. This document presents a radioactive waste management basis for Idaho National Laboratory's Materials and Security Consolidation Center facilities that manage radioactive waste. The radioactive waste management basis for a facility comprises existing laboratory-wide and facility-specific documents. Department of Energy Manual 435.1-1, 'Radioactive Waste Management Manual,' facility compliance tables also are presented for the facilities. The tables serve as a tool for developing the radioactive waste management basis.

  19. GIDAP Best Management Practice | Open Energy Information

    Open Energy Info (EERE)

    GIDAP Best Management Practice Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: GIDAP Best Management PracticeLegal Abstract Generator...

  20. Vencon Management Inc | Open Energy Information

    Open Energy Info (EERE)

    Management Inc Jump to: navigation, search Name: Vencon Management Inc Address: 65 West 55th Street Place: New York, New York Zip: 10019 Region: Northeast - NY NJ CT PA Area...

  1. Vencon Management, Inc | Open Energy Information

    Open Energy Info (EERE)

    Management, Inc Jump to: navigation, search Name: Vencon Management, Inc Address: 301 West 53rd Street Place: New York, New York Zip: 10019 Region: New York Area - NY NJ CT PA...

  2. NNSA's Warhead Dismantlement Process | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information's (AFEI) "Excellence in Enterprise Information Award" | National Nuclear Security Administration NNSA's G2 Management Information System Wins Association for Enterprise Information's (AFEI) "Excellence in Enterprise Information Award" February 17, 2016 The G2 team and the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information Award. (WASHINGTON, D.C) - The National Nuclear Security Administration (NNSA) has received the 2015

  3. Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  4. Guidance for FY2014 Facilities Information Management System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Guidance for Fiscal Year 2015 Facilities Information Management System Data Validations Deputy Secretary Memo on Improving DOE-wide Recruitment and Hiring Processes FY2012 Three ...

  5. Final Report Implementing Office of Management and Budget Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Dissemination Quality Guidelines (DOE, 2002) Final Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines (DOE, 2002) These DOE ...

  6. LM Records and Information Management Transition Guidance (January...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2015) More Documents & Publications Information and Records Management Transition Guidance LM Environmental Policy (PO 436.1a) Site Transition Process Upon Cleanup Completion

  7. Oregon Coastal Management Program Website | Open Energy Information

    Open Energy Info (EERE)

    Program Website Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Oregon Coastal Management Program Website Abstract Provides information on...

  8. Audit of Bonneville Power Administration's Management of Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AUDIT OF BONNEVILLE POWER ADMINISTRATION'S MANAGEMENT OF INFORMATION RESOURCES The Office of Inspector General wants to make the distribution of its reports as customer friendly ...

  9. G2 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    G2 NNSA's G2 Management Information System Wins Association for Enterprise Information's (AFEI) "Excellence in Enterprise Information Award" The G2 team and the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information Award. (WASHINGTON, D.C) - The National Nuclear Security Administration (NNSA) has received the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information

  10. The use of information technology security assessment criteria to protect specialized computer systems

    SciTech Connect (OSTI)

    Lykov, V.A.; Shein, A.V.; Piskarev, A.S.; Devaney, D.M.; Melton, R.B.; Hunteman, W.J.; Prommel, J.M.; Rothfuss, J.S.

    1997-10-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry.

  11. Energy Management Centre | Open Energy Information

    Open Energy Info (EERE)

    Centre Jump to: navigation, search Name: Energy Management Centre Place: Trivandrum, Kerala, India Zip: 695014 Sector: Efficiency Product: Focussed on energy efficiency and...

  12. Vermont Stormwater Management Rule | Open Energy Information

    Open Energy Info (EERE)

    LibraryAdd to library Legal Document- RegulationRegulation: Vermont Stormwater Management RuleLegal Abstract This Rule: (1) Establishes a state permit program for...

  13. Energy Management Inc EMI | Open Energy Information

    Open Energy Info (EERE)

    Inc EMI Jump to: navigation, search Name: Energy Management Inc (EMI) Place: Boston, Massachusetts Zip: 21160 Sector: Wind energy Product: Independent project developer and parent...

  14. Pacesetter Management Group | Open Energy Information

    Open Energy Info (EERE)

    Wisconsin Product: Wisconsin based Pacesetter manages construction and operation of ethanol plants, as well as marketing the ethanol produced at the plant. Coordinates:...

  15. Building Management System Integrators | Open Energy Information

    Open Energy Info (EERE)

    Place: Berkshire, England, United Kingdom Zip: SL1 5AU Product: Service and maintenance provider. References: Building Management System Integrators1 This article is a...

  16. RAM Capital Management Group | Open Energy Information

    Open Energy Info (EERE)

    Hydrogen Product: Private VC fund and investment banking advisory firm investing in fuel cells and hydrogen. References: RAM Capital Management Group1 This article is a...

  17. Information Technology Specialist (Infrastructure Operations Manager)

    Broader source: Energy.gov [DOE]

    The Office of Science manages fundamental research programs in basic energy sciences, biological and environmental sciences, and computational science. In addition, the Office of Science is the...

  18. BUILDER | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    BUILDER NNSA Achieves Major Milestone in BUILDER Implementation WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) achieved a major milestone in improving the management of the Nuclear Security Enterprise's infrastructure through the successful migration of all current information on building

  19. Guidance for Fiscal Year 2015 Facilities Information Management System Data

    Energy Savers [EERE]

    Validations | Department of Energy Fiscal Year 2015 Facilities Information Management System Data Validations Guidance for Fiscal Year 2015 Facilities Information Management System Data Validations PDF icon FIMS VALIDATION GUIDANCE_FY 2015 with MEMO 141120 FINAL.pdf More Documents & Publications Three-year Rolling Timeline Three Year Rolling Timeline WAPA Recovery Act Implementation Appropriation

  20. Nevada National Security Site 2013 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    Hudson, David B

    2014-02-13

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2013 results. Beginning with this report, analysis results for leachate collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included.

  1. contracts | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    contracts NNSA Demonstrates its Commitment to Small Business The National Nuclear Security Administration (NNSA) recently selected three small businesses for its new Information Technology (IT) Infrastructure and Cyber Security Support Blanket Purchase Agreement. The contract covers a wide spectrum of IT and Cyber Security support for NNSA's Office of... NNSA Makes Up to $200 Million in Awards to Five Small Business Teams for Enterprise-Wide Management, Organizational and Administrative Support

  2. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    SciTech Connect (OSTI)

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan‚Äôs purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs‚ÄĒthe Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)‚ÄĒand their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  3. Arming leaders with Y-12 information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Arming leaders with Y-12 ... Arming leaders with Y-12 information Posted: May 12, 2016 - 11:41am Leadership Oak Ridge Class of 2016 toured the historic Building 9731, one of the buildings at Y-12 designated to become a part of Manhattan Project National Historical Park. During their visit to Y-12 on March 29, the 2016 class of Leadership Oak Ridge learned about Y-12's history and current missions. As a part of their efforts to learn about Oak Ridge, the Y-12 National Security Complex tour has

  4. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    physical security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  5. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nuclear security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear ...

  6. Calpine Power Management LLC | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search Name: Calpine Power Management LLC Place: Texas Phone Number: 713.830.2000 Website: www.calpine.com Outage Hotline: 713.830.2000 References: EIA Form...

  7. Community Management Company | Open Energy Information

    Open Energy Info (EERE)

    Community Management Company Address: 1 St. Nicholas Terrace Place: New York, New York Zip: 10029 Region: Northeast - NY NJ CT PA Area Coordinates: 40.812561, -73.952389 Show...

  8. Technology Management Inc | Open Energy Information

    Open Energy Info (EERE)

    Place: Cleveland, Ohio Zip: 44108 Product: Ohio-based, developer of solid oxide fuel cell systems. References: Technology Management Inc1 This article is a stub. You can help...

  9. CONTACT INFORMATION: Steve Karsjen Public Affairs Manager

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Manager karsjen@ameslab.gov 515.294.5643 111 TASF, Ames, IA 50011 Solder is the glue that holds many of our gadgets together. Unfortunately, much of the solder used today is made...

  10. Final Report Implementing Office of Management and Budget Information

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Dissemination Quality Guidelines (DOE, 2002) | Department of Energy Final Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines (DOE, 2002) Final Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines (DOE, 2002) These DOE guidelines sets forth policy and procedures to ensure and maximize the quality, utility, objectivity, and integrity of the information that DOE disseminates to members of the public. DOE

  11. Guide to the Management of Scientific and Technical Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-11-23

    This Guide to the management of scientific and technical information (STI) provides nonmandatory guidelines for implementing the objective, requirements, and responsibilities of Department of Energy (DOE) O 241.1A, Scientific and Technical Information Management. Cancels DOE G 241.1-1. Canceled by DOE N 251.83. Best practices, instructions, and additional information are now accessible at www.osti.gov/stip.

  12. Information Collection Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    All ICRs, with the exception of statistical collections which are handled by the Energy Information Administration, must be submitted to the ICM. The ICM program works directly ...

  13. Nohemi Brewer Transportation Program Manager U.S. Department of Energy (DOE), National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Working Group Meeting November 16, 2012 Welcome! Page 2 Page 2Title ID 411- 11/16/2012 - Page 2 Meeting Purpose Provide forum for information exchange related to the Site-Wide Environmental Impact Statement (SWEIS) analysis of low-level/mixed low-level radioactive waste (LLW/MLLW) transportation to the Nevada National Security Site (NNSS) Page 3 Page 3Title ID 411- 11/16/2012 - Page 3 Transportation Working Group Members * State of Nevada * Counties * Cities * Tribal * Nevada

  14. Strategic plan for Hanford Site Environmental Restoration Information Management

    SciTech Connect (OSTI)

    Cowley, P.J.; Beck, J.E.; Gephart, R.E.

    1994-06-01

    This strategic plan addresses information management for the Environmental Restoration (ER) Program at the Hanford Site. This Program leads the cleanup of the Hanford Site`s soil, groundwater, buried waste, and the decontamination and decommissioning of facilities. The vision that drives this strategic plan is to ensure that quality information is available to the people who need it, when they need it, at a convenient location, in a usable form, and at an acceptable cost. Although investments are being made in managing the vast amounts of information, which include data, records and documents associated with the Hanford Site`s production history and new cleanup mission, it is widely recognized that efforts to date have not accomplished the vision. Effective information management involves more than the compilation of massive amounts of electronic and non-electronic information. It also involves integrating information management into business processes that support user`s needs and decisionmaking. Only then can information management complement and enable environmental restoration priorities and practices, help identify environmental restoration requirements, and enable communication within the Environmental Restoration Program and between the Program and its stakeholders. Successfully accomplishing the Hanford Site mission requires an integrated approach to information management that crosses organizational boundaries, streamlines existing systems, and builds new systems that support the needs of the future. This plan outlines that approach.

  15. Information Technology Standards Program management plan

    SciTech Connect (OSTI)

    1998-05-01

    This document presents a logical and realistic plan to implement the Information Technology (IT) Standards Program throughout the Department of Energy (DOE). It was developed by DOE Chief Information Officer (CIO) staff, with participation from many other individuals throughout the DOE complex. The DOE IT Standards Program coordinates IT standards activities Department-wide, including implementation of standards to support the DOE Information Architecture. The Program is voluntary, participatory, and consensus-based. The intent is to enable accomplishment of the DOE mission, and the Program is applicable to all DOE elements, both Federal and contractor. The purpose of this document is to describe the key elements of the DOE IT Standards Program.

  16. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  17. Kansas City National Security Campus | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Operations Acquisition and Project Management M & O Support Department Kansas City National Security Campus Kansas City National Security Campus National Security Campus ...

  18. NNSA's G2 Management Information System Wins Association for...

    National Nuclear Security Administration (NNSA)

    Apply for Our Jobs Our Jobs Working at NNSA Blog Home Library Press Releases NNSA's G2 Management Information System ... the U.S. Department of Energy responsible for enhancing ...

  19. The Bureau of Land Management's Well Information System (WIS...

    Open Energy Info (EERE)

    Bureau of Land Management's Well Information System (WIS) How-To Guide Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Guide...

  20. Energy Department Seeks Information on Geothermal Risk and Uncertainty Management

    Broader source: Energy.gov [DOE]

    The Energy Department's Office of Energy Efficiency and Renewable Energy (EERE) has issued a Request for Information (RFI) to help quantify and manage risk in geothermal exploration, in an effort...

  1. The Personnel Security Clearance Process | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration The Personnel Security Clearance Process A security clearance, also known as an access authorization, is an administrative determination that an individual is eligible for access to classified information or special nuclear material. The clearance process involves collecting and evaluating information about an individual's background to determine their judgment, reliability, and honesty. In order to accomplish this, the Office of Personnel Management (OPM) or the Federal

  2. Audit of Bonneville Power Administration's Management of Information

    Energy Savers [EERE]

    Resources, WR-B-96-06 | Department of Energy Bonneville Power Administration's Management of Information Resources, WR-B-96-06 Audit of Bonneville Power Administration's Management of Information Resources, WR-B-96-06 PDF icon wr-b-96-06.pdf More Documents & Publications Audit Report: WR-B-96-06 Audit Report: IG-0675 Audit Report: ER-B-99-04

  3. Chemical Biological Emergency Management Information System

    Energy Science and Technology Software Center (OSTI)

    2004-06-15

    CB-EMIS is designed to provide information and analysis to transit system operators and emergency responders in the event of a chemical attack on a subway system. The software inforporates detector data, video images, train data, meteorological data, and above- and below-ground plume dispersion models, hight of the liquid level.

  4. Federal Sustainable Print Management (Informational Purposes Only)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-09-21

    This draft has been scheduled for final review before the Directives Review Board on 10-1-15. All major comments and concerns should be provided to your DRB representative, following your organization process. If you do not know who your representative is, please see the list of DRB members at https://www.directives.doe.gov/beta/references/directives-review-board. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-4014). All major comments and concerns should be submitted by COB 9-29-15.

  5. Attachment J-16 Portfolio Management Task Order 13-002 Title: DOE-HQ Security System Review and Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Section J Contract No. DE-AC06-09RL14728 Modification 280 Attachment J-16 Portfolio Management Task Order 13-002 Title: DOE-HQ Security System Review and Assessment Revision Number: 0 Date: 04/11/2013 Start: 05/01/2013 Finish: 07/30/2013 1.0 DESCRIPTION The DOE Office of Environmental Management (EM) Headquarters Security System (HQSS) is installed at the EM Consolidated Business Center (CBC) in Cincinnati, OH and administered from DOE Headquarters in Washington, DC. HQSS has been running as a

  6. Office of Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  7. Security Control Assessor | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Control Assessor Security Control Assessor Cyber-security-300x199.jpg The Security Control Assessor (SOA) is responsible for assessing the management, operational, ...

  8. Acquisition Career Management Program (Informational Purposes Only)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-11-21

    This draft has been scheduled for final review before the Directives Review Board on 4-2-15 (delayed from 12-4-14 session). All major comments and concerns should be provided to your DRB representative, following your organization process. If you do not know who your representative is, please see the list of DRB members at https://www.directives.doe.gov/beta/references/directives-review-board. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-4014). All major comments and concerns should be submitted by COB 3-31-15.

  9. PIA - Foreign Travel Management System (FTMS) | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Foreign Travel Management System (FTMS) More Documents & Publications PIA - INL PeopleSoft - Human Resource System PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE

  10. Control Systems Security Standards: Accomplishments & Impacts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... key outcomes? * 5.1.4 What key issues did this uncover? * ... October 2004. AGA Report No. 12 Part 1 Cryptographic ... for information security management, June 2005. ISO 27001 ...

  11. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access

    Broader source: Energy.gov [DOE]

    This security update resolves a vulnerability in the HP Service Manager which allows people to have access to unauthorized information

  12. About the Archives and Information Management Team (LM-10.2)...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    About the Archives and Information Management Team (LM-10.2) The Archives and Information Management Team is responsible for policies and protocols for the creation, collection, ...

  13. Computerized map-based information management system for natural resource management

    SciTech Connect (OSTI)

    Miller, K.

    1995-12-01

    Federal agencies, states and resource managers have control and stewardship responsibility over a significant inventory of natural resources. A number of federal regulations require the review, protection and preservation of natural resource protection. Examples of such actions include the reauthorization of the Clean Water Act and the modification of the National Contingency Plan to incorporate the requirements of the Oil Pollution Act of 1990. To successfully preserve conserve and restore natural resources on federal reservations, and state and private lands, and to comply with Federal regulations designed to protect natural resources located on their sites, and the type of information on these resources required by environmental regulations. This paper presents an approach using a computerized, graphical information management system to catalogue and track data for the management of natural resources under Federal and state regulations, and for promoting resource conservation, preservation and restoration. The system is designed for use by Federal facility resource managers both for the day-to-day management of resources under their control, and for the longer-term management of larger initiatives, including restoration of significant or endangered resources, participation in regional stewardship efforts, and general ecosystem management. The system will be valuable for conducting natural resource baseline inventories an implementing resource management plans on lands other than those controlled by the Federal government as well. The system can provide a method for coordinating the type of natural resource information required by major federal environmental regulations--thereby providing a cost-effective means for managing natural resource information.

  14. Radiological Security Partnership | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership Information

  15. CNS securing success across both sites | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    securing success across ... CNS securing success across both sites Posted: April 13, 2016 - 12:31pm Pantex Emergency Services members (from left) Maribel Martinez, Brenda Graham and Greg Roddahl learn how to use the Emergency Management Information System, or EMInS. Safeguards, Security and Emergency Services integrated, consolidated and standardized processes at Pantex and Y-12 in 2015. According to Gary Wisdom, SS&ES senior director at Pantex, "The exchange of information has been our

  16. PIA - Security Clearance Work Tracking and Budget System | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Work Tracking and Budget System PIA - Security Clearance Work Tracking and Budget System PIA - Security Clearance Work Tracking and Budget System PDF icon PIA - Security Clearance Work Tracking and Budget System More Documents & Publications Freedom of Information and Privacy Act Database PIA, Idaho Operations Office PIA - INL Education Programs Business Enclave Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory

  17. Precision Information Environments Envisioning the future of emergency management

    SciTech Connect (OSTI)

    2010-04-01

    Researchers at Pacific Northwest National Laboratory are developing future work environments for the emergency management community called Precision Information Environments (or PIEs). PIEs will provide tailored access to information and decision support capabilities in a system that supports the multiple user roles, contexts, and phases of emergency management, planning, and response. This video gives you a look at one vision for the future. To view an annotated version that describes each of the technology concepts you'll see as well as the end user needs that motivated them and the research challenges that must be addressed to make them a reality visit http://precisioninformation.org.

  18. Laboratory information management system at the Hanford Site

    SciTech Connect (OSTI)

    Leggett, W.; Barth, D.; Ibsen, T.; Newman, B.

    1994-03-01

    In January of 1994 an important new technology was brought on line to help in the monumental waste management and environmental restoration work at the Hanford Site. Cleanup at the Hanford Site depends on analytical chemistry information to identify contaminates, design and monitor cleanup processes, assure worker safety, evaluate progress, and prove completion. The new technology, a laboratory information management system (LIMS) called ``LABCORE,`` provides the latest systems to organize and communicate the analytical tasks: track work and samples; collect and process data, prepare reports, and store data in readily accessible electronic form.

  19. Requirements for security signalling

    SciTech Connect (OSTI)

    Pierson, L.G.; Tarman, T.D.

    1995-02-05

    There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

  20. Best Management Practice #2: Information and Education Programs |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 2: Information and Education Programs Best Management Practice #2: Information and Education Programs Educating users about water conservation is essential to sustain the savings of water-efficient technologies and practices. It is not enough to install water-saving technology in a facility. New operation procedures, retrofits, and replacements are most effective when employees, contractors, and the public know what the new technologies or methods are and how to use them

  1. Information Center | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Center Information Center The U.S. Department of Energy's (DOE) Office of Enterprise Assessments (EA) provides expert evaluations of management performance in safety, security and other areas by seasoned experts who are independent of line management. Information related to enforcement, safety, security, emergency management and cyber performance management is made available to the public in the EA Information Center. Enforcement Info Center The Department's Enforcement Office conducts

  2. Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).

    SciTech Connect (OSTI)

    Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

    2004-11-01

    Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

  3. Audit of Bonneville Power Administration's Management of Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management of Information Resources, WR-B-96-06 PDF icon wr-b-96-06.pdf More Documents & Publications Audit Report: WR-B-96-06 Audit Report: IG-0675 Audit Report: ER-B-99-04

  4. Information Resources Management Strategic Plan Appendix FY2014-2018

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Plan Appendix FY2014-2018 IRM 2 U.S. Department of Energy FY 2014-2018 doe irm strategic plan Appendix: Strategic Planning Process The FY 2014-2018 Department of Energy (DOE) Information Resources Management (IRM) Strategic Plan creates a cohesive connection among more than 15 Federal, DOE, and Office of the Chief Information Officer (OCIO) strategic documents that provide guidance to the Department on issues related to information and IT. Guidance Documents for the FY 2014-2018 DOE IRM

  5. Computer Security Risk Assessment

    Energy Science and Technology Software Center (OSTI)

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore¬†¬Ľ deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.¬ę¬†less

  6. infrastructure | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    infrastructure NNSA Achieves Major Milestone in BUILDER Implementation WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) achieved a major milestone in improving the management of the Nuclear Security Enterprise's infrastructure through the successful migration of all current information on building... Extended Life Program asks 'How do you make your buildings last?' The challenge is this: Preserve two key processing facilities at Y-12 National

  7. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  8. Exercise Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Organization Categorization & Classification Notifications & Communications ... HQ Emergency Management Team (EMT) Homeland Security and Emergency Management Coordination ...

  9. System and method for acquisition management of subject position information

    DOE Patents [OSTI]

    Carrender, Curt

    2005-12-13

    A system and method for acquisition management of subject position information that utilizes radio frequency identification (RF ID) to store position information in position tags. Tag programmers receive position information from external positioning systems, such as the Global Positioning System (GPS), from manual inputs, such as keypads, or other tag programmers. The tag programmers program each position tag with the received position information. Both the tag programmers and the position tags can be portable or fixed. Implementations include portable tag programmers and fixed position tags for subject position guidance, and portable tag programmers for collection sample labeling. Other implementations include fixed tag programmers and portable position tags for subject route recordation. Position tags can contain other associated information such as destination address of an affixed subject for subject routing.

  10. System and method for acquisition management of subject position information

    DOE Patents [OSTI]

    Carrender, Curt

    2007-01-23

    A system and method for acquisition management of subject position information that utilizes radio frequency identification (RF ID) to store position information in position tags. Tag programmers receive position information from external positioning systems, such as the Global Positioning System (GPS), from manual inputs, such as keypads, or other tag programmers. The tag programmers program each position tag with the received position information. Both the tag programmers and the position tags can be portable or fixed. Implementations include portable tag programmers and fixed position tags for subject position guidance, and portable tag programmers for collection sample labeling. Other implementations include fixed tag programmers and portable position tags for subject route recordation. Position tags can contain other associated information such as destination address of an affixed subject for subject routing.

  11. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  12. Towards improving software security by using simulation to inform requirements and conceptual design

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Nutaro, James J.; Allgood, Glenn O.; Kuruganti, Teja

    2015-06-17

    We illustrate the use of modeling and simulation early in the system life-cycle to improve security and reduce costs. The models that we develop for this illustration are inspired by problems in reliability analysis and supervisory control, for which similar models are used to quantify failure probabilities and rates. In the context of security, we propose that models of this general type can be used to understand trades between risk and cost while writing system requirements and during conceptual design, and thereby significantly reduce the need for expensive security corrections after a system enters operation

  13. Los Alamos National Security, LLC Request for Information from industrial entities that desire to commercialize Laboratory-developed Extremely Low Resource Optical Identifier (ELROI) tech

    SciTech Connect (OSTI)

    Erickson, Michael Charles

    2015-11-10

    Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.

  14. Ms. Elizabeth Withers, EIS Document Manager U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (NNSA)

    August 14, 2002 Ms. Elizabeth Withers, EIS Document Manager U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) Office of Los Alamos Site Operations (OLASO) 528 35 th Street Los Alamos, NM 87544 Re: Comments regarding the scope of the Environmental Impact Statement (EIS) for the proposed Chemistry and Metallurgy Research (CMR) Building Replacement (CMRR) Project (CMRRP) at Los Alamos National Laboratory (LANL) (the "CMRRP EIS") Dear Elizabeth - I won't be

  15. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  16. Implementation of Unclassified Controlled Nuclear Information guidelines for fixed-site safeguards and security (FSSS) at Los Alamos National Laboratory

    SciTech Connect (OSTI)

    Rood, P.L.

    1995-02-01

    Unclassified Controlled Nuclear Information (UCNI) is one type of sensitive information that DOE employees, including computer users, must now identify and protect. Guidelines to identify information as UCNI are gradually being put in place. The publication of Unclassified Controlled Nuclear Information Topical Guideline for Fixed-Site Safeguards and Security, TG-FSSS-1, is a major step in the development of UCNI guidelines. This DOE published guide cuts across and addresses many different programmatic areas including automated data processing. Our local guideline, Los Alamos National Laboratory Unclassified Controlled Nuclear Information Guideline for Fixed-Site Safeguards and Security, IG-LAFSSS-1, is based on TG-FSSS-1. In this paper, I plan to discuss the background of UCNI, the definition of UCNI, information that qualifies as UCNI, the consequences of information being UCNI, the development of UCNI guidelines, TG-FSSS-1 and IG-LAFSSS-1, the relationship of UCNI to classification, and the implementation of the IG-LAFSSS-1 at Los Alamos.

  17. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  18. Nevada National Security Site 2013 Waste Management Monitoring Report Area 3 and Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    Hudson, D. B.

    2014-08-19

    Environmental monitoring data are collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) within the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, and vadose zone. This report summarizes the 2013 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports (National Security Technologies, LLC, 2013; 2014a; 2014b). Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Slightly elevated exposure levels outside the Area 3 RWMS are attributed to nearby historical aboveground nuclear weapons tests. Air monitoring data show tritium concentrations in water vapor and americium and plutonium concentrations in air particles are close to detection limits and background levels. The measured levels of radionuclides in air particulates and moisture are below Derived Concentration Standards for these radionuclides. Groundwater monitoring data indicate the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by RWMS operations. Results of groundwater analysis from wells around the Area 5 RWMS were all below established investigation levels. Leachate samples collected from the leachate collection system at the mixed low-level waste cell were below established contaminant regulatory limits. The 105.8 millimeters (mm) (4.17 inches [in.]) of precipitation at the Area 3 RWMS during 2013 is 30% below the average of 150.3 mm (5.92 in.), and the 117.5 mm (4.63 in.) of precipitation at the Area 5 RWMS during 2013 is 5% below the average of 123.6 mm (4.86 in.). Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Automated vadose zone monitoring on Area 5 and Area 3 RWMS cell covers show no evidence of precipitation percolating through the cover to the waste. Moisture from precipitation did not percolate below 60 centimeters (cm) (2 feet [ft]) in the vegetated final cover on the U-3ax/bl disposal unit at the Area 3 RWMS, and moisture from precipitation and irrigation did not percolate below 45 cm (1.5 ft) on the 92-Acre Area final cover. Irrigation was applied to this cover for seed germination and plant growth. During 2013, there was no drainage through 2.4 meters (8 ft) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Twenty percent of the applied precipitation and irrigation drained from the bare-soil drainage lysimeter that received 3-times natural precipitation. All 2013 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

  19. Nevada National Security Site 2010 Waste Management Monitoring Report Area 3 and Area 5 Radioactive Waste Management Sites

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2011-06-01

    Environmental monitoring data were collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, vadose zone, subsidence, and biota. This report summarizes the 2010 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports (National Security Technologies, LLC, 2010a; 2010b; 2011). Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Air monitoring data at the Area 3 and Area 5 RWMSs indicate that tritium concentrations are slightly above background levels. All gamma spectroscopy results for air particulates collected at the Area 3 and Area 5 RWMS were below the minimum detectable concentrations, and concentrations of americium and plutonium are only slightly above detection limits. The measured levels of radionuclides in air particulates and moisture are below derived concentration guides for these radionuclides. Groundwater monitoring data indicate that the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by facility operations. The 246.9 millimeters (mm) (9.72 inches [in.]) of precipitation at the Area 3 RWMS during 2010 is 56 percent above the average of 158.7 mm (6.25 in.), and the 190.4 mm (7.50 in.) of precipitation at the Area 5 RWMS during 2010 is 50 percent above the average of 126.7 mm (4.99 in.). Soil-gas tritium monitoring at borehole GCD-05 continues to show slow subsurface migration consistent with previous results. Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Data from the automated vadose zone monitoring system for the operational waste pit covers show that moisture from precipitation did not percolate below 90 centimeters (cm) (3 feet [ft]) before being removed by evaporation. Moisture from precipitation did not percolate below 61 cm (2 ft) in the vegetated final mono-layer cover on the U-3ax/bl disposal unit at the Area 3 RWMS before being removed by evapotranspiration. During 2010, there was no drainage through 2.4 meters (8 ft) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Water drained from both the bare-soil drainage lysimeter and the invader species drainage lysimeter that received 3 times natural precipitation. All 2010 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

  20. Nevada National Security Site 2012 Waste Management Monitoring Report Area 3 and Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    Hudson, David B.

    2013-09-10

    Environmental monitoring data are collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, and vadose zone. This report summarizes the 2012 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports (National Security Technologies, LLC, 2012; 2013a; 2013b). Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Slightly elevated exposure levels outside the Area 3 RWMS are attributed to nearby historical aboveground nuclear weapons tests. Air monitoring data show tritium concentrations in water vapor and americium and plutonium concentrations in air particles are only slightly above detection limits and background levels. The measured levels of radionuclides in air particulates and moisture are below Derived Concentration Standards for these radionuclides. Groundwater monitoring data indicate the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by RWMS operations. Results of groundwater analysis from wells around the Area 5 RWMS were all below established investigation levels. Leachate samples collected from the leachate collection system at the mixed low-level waste cell were below established contaminant regulatory limits. The 133.9 millimeters (mm) (5.27 inches [in.]) of precipitation at the Area 3 RWMS during 2012 is 12% below the average of 153.0 mm (6.02 in.), and the 137.6 mm (5.42 in.) of precipitation at the Area 5 RWMS during 2012 is 11% below the average of 122.4 mm (4.82 in.). Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Automated vadose zone monitoring on Area 5 and Area 3 RWMS cell covers show no evidence of precipitation percolating through the cover to the waste. Moisture from precipitation did not percolate below 60 centimeters (cm) (2 feet [ft]) in the vegetated final cover on the U-3ax/bl disposal unit at the Area 3 RWMS, and moisture from precipitation and irrigation did not percolate below 45 cm (1.5 ft) on the 92-Acre Area final cover. Irrigation was applied to this cover for seed germination and plant growth. During 2012, there was no drainage through 2.4 meters (8 ft) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Twenty percent of the applied precipitation and irrigation drained from the bare-soil drainage lysimeter that received 3 times natural precipitation. All 2012 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

  1. Information Collection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Collection Information Collection The Office of Environment, Health, Safety and Security (EHSS) continues to seek for ways to minimize the burden of information collection on DOE and its contractors. DOE collects information concerning the health, safety and security of DOE employees including its contractors and facilities. The information collected will be used by DOE to exercise management oversight over Management and Operating (M&O) contractors of DOE's Government-Owned

  2. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  3. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  4. ENHANCING SEISMIC CALIBRATION RESEARCH THROUGH SOFTWARE AUTOMATION AND SCIENTIFIC INFORMATION MANAGEMENT

    SciTech Connect (OSTI)

    Ruppert, S D; Dodge, D A; Ganzberger, M D; Hauk, T F; Matzel, E M

    2007-07-06

    The National Nuclear Security Administration (NNSA) Ground-Based Nuclear Explosion Monitoring Research and Engineering (GNEM R&E) Program at LLNL has made significant progress enhancing the process of deriving seismic calibrations and performing scientific integration, analysis, and information management with software automation tools. Several achievements in schema design, data visualization, synthesis, and analysis were completed this year. Our tool efforts address the problematic issues of very large datasets and varied formats encountered during seismic calibration research. As data volumes have increased, scientific information management issues such as data quality assessment, ontology mapping, and metadata collection that are essential for production and validation of derived calibrations have negatively impacted researchers abilities to produce products. New information management and analysis tools have resulted in demonstrated gains in efficiency of producing scientific data products and improved accuracy of derived seismic calibrations. Significant software engineering and development efforts have produced an object-oriented framework that provides database centric coordination between scientific tools, users, and data. Nearly a half billion parameters, signals, measurements, and metadata entries are all stored in a relational database accessed by an extensive object-oriented multi-technology software framework that includes elements of stored procedures, real-time transactional database triggers and constraints, as well as coupled Java and C++ software libraries to handle the information interchange and validation requirements. Significant resources were applied to schema design to enable recording of processing flow and metadata. A core capability is the ability to rapidly select and present subsets of related signals and measurements to the researchers for analysis and distillation both visually (JAVA GUI client applications) and in batch mode (instantiation of multi-threaded applications on clusters of processors). Development of efficient data exploitation methods has become increasingly important throughout academic and government seismic research communities to address multi-disciplinary large scale initiatives. Effective frameworks must also simultaneously provide the researcher with robust measurement and analysis tools that can handle and extract groups of events effectively and isolate the researcher from the now onerous task of database management and metadata collection necessary for validation and error analysis. Sufficient information management robustness is required to avoid loss of metadata that would lead to incorrect calibration results in addition to increasing the data management burden. Our specific automation methodology and tools improve the researchers ability to assemble quality-controlled research products for delivery into the NNSA Knowledge Base (KB). The software and scientific automation tasks also provide the robust foundation upon which synergistic and efficient development of, GNEM R&E Program, seismic calibration research may be built.

  5. D and D Knowledge Management Information Tool - 2012 - 12106

    SciTech Connect (OSTI)

    Upadhyay, H.; Lagos, L.; Quintero, W.; Shoffner, P.; DeGregory, J.

    2012-07-01

    Deactivation and decommissioning (D and D) work is a high priority activity across the Department of Energy (DOE) complex. Subject matter specialists (SMS) associated with the different ALARA (As-Low-As-Reasonably-Achievable) Centers, DOE sites, Energy Facility Contractors Group (EFCOG) and the D and D community have gained extensive knowledge and experience over the years in the cleanup of the legacy waste from the Manhattan Project. To prevent the D and D knowledge and expertise from being lost over time from the evolving and aging workforce, DOE and the Applied Research Center (ARC) at Florida International University (FIU) proposed to capture and maintain this valuable information in a universally available and easily usable system. D and D KM-IT provides single point access to all D and D related activities through its knowledge base. It is a community driven system. D and D KM-IT makes D and D knowledge available to the people who need it at the time they need it and in a readily usable format. It uses the World Wide Web as the primary source for content in addition to information collected from subject matter specialists and the D and D community. It brings information in real time through web based custom search processes and its dynamic knowledge repository. Future developments include developing a document library, providing D and D information access on mobile devices for the Technology module and Hotline, and coordinating multiple subject matter specialists to support the Hotline. The goal is to deploy a high-end sophisticated and secured system to serve as a single large knowledge base for all the D and D activities. The system consolidates a large amount of information available on the web and presents it to users in the simplest way possible. (authors)

  6. U.S. DEPARTMENT OF ENERGY Information Collection Clearance Manager Appointment

    Energy Savers [EERE]

    1.5 (05-2014) U.S. DEPARTMENT OF ENERGY Information Collection Clearance Manager Appointment SECTION I. Appointment Information Pursuant to DOE Order 200.2, Information Collection Management Program, (Name) _______________________________________________ is hereby appointed to serve as the Information Collection Clearance Manager representing (DOE Element) _______________________________________________. The incumbents' responsibilities include providing varying levels of administrative and

  7. Nevada National Security Site 2014 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    Hudson, David

    2015-02-19

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2014 results. Analysis results for leachate contaminants collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included. During 2014, groundwater samples were collected and static water levels were measured at three wells surrounding the Area 5 RWMS. Groundwater samples were collected at wells UE5PW-1, UE5PW-2, and UE5PW-3 on March 11 and August 12, 2014, and static water levels were measured at each of these wells on March 10, June 2, August 11, and October 14, 2014. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. General water chemistry (cations and anions) was also measured. Results from samples collected in 2014 are within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. The data from the shallow aquifer indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS, and there were no significant changes in measured groundwater parameters compared to previous years. Leachate from above the primary liner of Cell 18 drains into a sump and is collected in a tank at the ground surface. Cell 18 began receiving waste in January 2011. Samples were collected from the tank when the leachate volume approached the 3,000-gallon tank capacity. Leachate samples have been collected 16 times since January 2011. During 2014, samples were collected on February 25, March 5, May 20, August 12, September 16, November 11, and December 16. Each leachate sample was analyzed for toxicity characteristic contaminants and polychlorinated biphenyls (PCB). Beginning with the sample from July 31, 2013, pH and specific conductance were also measured. Leachate analysis results show no evidence of contamination. Results for toxicity characteristic contaminants are all below regulatory levels and analysis quantification limits. No quantifiable PCB levels were detected in any sample. Results for pH and specific conductance are also within expected ranges. After analysis, leachate was pumped from the collection tank and used in Cell 18 for dust control. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  8. Towards best practices for strategic information technology management

    SciTech Connect (OSTI)

    Westerback, L.K.

    2000-07-01

    Federal agencies are under pressure to do more with less--to improve the services they provide to the public, with greater accountability for achieving results, more quickly and at lower cost. In a 1994 study of leading organizations, the General Accounting Office (GAO) identified 11 strategic information management (SIM) practices, which became the foundation of the Clinger-Cohen Act of 1996. In 1997, the Federal Chief Information Officers (CIO) Council and the Industry Advisory Council prepared 20 case studies demonstrating the use of information technology to achieve a positive return on investment within the federal government. Focusing on these 20 case studies, this research first looked for evidence that supported or refuted each of GAO's SIM practices. Second, the research looked for best practices that may be unique to a federal environment. Third, the study identified other best practices.

  9. National Security & Safety Reports | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    IG-0787 The Department's Cyber Security Incident Management Program January 2, 2008 Inspection Report: IG-0785 Incident of Security Concern at the Y-12 National Security Complex...

  10. Safeguards and Security Program - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4B Admin Chg 1, Safeguards and Security Program by Marc Brooks Functional areas: Administrative Change, Safeguards, Security, and Emergency Management, Safety, Safety and Security,...

  11. sfo | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    sfo Sandia National Laboratory Sandia Field Office Contact the Field Office Contract Administration & Business Management Emergency Information Facilities & Projects Nuclear Operations Environment, Safety & Health Public Affairs Safeguards & Security Performance and Quality Assurance Programs NEPA Reading Room... Sandia National Laboratories

  12. Request for Investigation or Inspection of Safety or Classified Information Security Violations

    Broader source: Energy.gov [DOE]

    Form allows for any DOE contractor employee or employee representative to submit a request to the Department of Energy’s Office of Enforcement, within the Office of Health, Safety, and Security, to initiate an enforcement investigation or inspection into a potential violation of DOE regulatory requirements.

  13. Storing and managing information artifacts collected by information analysts using a computing device

    DOE Patents [OSTI]

    Pike, William A; Riensche, Roderick M; Best, Daniel M; Roberts, Ian E; Whyatt, Marie V; Hart, Michelle L; Carr, Norman J; Thomas, James J

    2012-09-18

    Systems and computer-implemented processes for storage and management of information artifacts collected by information analysts using a computing device. The processes and systems can capture a sequence of interactive operation elements that are performed by the information analyst, who is collecting an information artifact from at least one of the plurality of software applications. The information artifact can then be stored together with the interactive operation elements as a snippet on a memory device, which is operably connected to the processor. The snippet comprises a view from an analysis application, data contained in the view, and the sequence of interactive operation elements stored as a provenance representation comprising operation element class, timestamp, and data object attributes for each interactive operation element in the sequence.

  14. ADP computer security classification program

    SciTech Connect (OSTI)

    Augustson, S.J.

    1984-01-01

    CG-ADP-1, the Automatic Data Processing Security Classification Guide, provides for classification guidance (for security information) concerning the protection of Department of Energy (DOE) and DOE contractor Automatic Data Processing (ADP) systems which handle classified information. Within the DOE, ADP facilities that process classified information provide potentially lucrative targets for compromise. In conjunction with the security measures required by DOE regulations, necessary precautions must be taken to protect details of those ADP security measures which could aid in their own subversion. Accordingly, the basic principle underlying ADP security classification policy is to protect information which could be of significant assistance in gaining unauthorized access to classified information being processed at an ADP facility. Given this policy, classification topics and guidelines are approved for implementation. The basic program guide, CG-ADP-1 is broad in scope and based upon it, more detailed local guides are sometimes developed and approved for specific sites. Classification topics are provided for system features, system and security management, and passwords. Site-specific topics can be addressed in local guides if needed.

  15. Tag: global security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  16. Tag: Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  17. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  18. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  19. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  20. January 2014 Cybersecurity Awareness Campaign - Secure Online Shopping |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 4 Cybersecurity Awareness Campaign - Secure Online Shopping January 2014 Cybersecurity Awareness Campaign - Secure Online Shopping The January 2014 Cybersecurity Awareness Campaign featured issues surrounding secure online shopping. For more information on privacy issues, contact Jerry Hanley at Jerry.Hanley@hq.doe.gov. For information on Supply Chain Risk Management, contact Sue Farrand at Susan.Farrand@hq.doe.gov. PDF icon Cybersecurity Front Burner Issue 15 PDF icon

  1. Quantifiably secure power grid operation, management, and evolution : a study of uncertainties affecting the grid integration of renewables.

    SciTech Connect (OSTI)

    Gray, Genetha Anne; Watson, Jean-Paul; Silva Monroy, Cesar Augusto; Gramacy, Robert B.

    2013-09-01

    This report summarizes findings and results of the Quantifiably Secure Power Grid Operation, Management, and Evolution LDRD. The focus of the LDRD was to develop decisionsupport technologies to enable rational and quantifiable risk management for two key grid operational timescales: scheduling (day-ahead) and planning (month-to-year-ahead). Risk or resiliency metrics are foundational in this effort. The 2003 Northeast Blackout investigative report stressed the criticality of enforceable metrics for system resiliency - the grid's ability to satisfy demands subject to perturbation. However, we neither have well-defined risk metrics for addressing the pervasive uncertainties in a renewable energy era, nor decision-support tools for their enforcement, which severely impacts efforts to rationally improve grid security. For day-ahead unit commitment, decision-support tools must account for topological security constraints, loss-of-load (economic) costs, and supply and demand variability - especially given high renewables penetration. For long-term planning, transmission and generation expansion must ensure realized demand is satisfied for various projected technological, climate, and growth scenarios. The decision-support tools investigated in this project paid particular attention to tailoriented risk metrics for explicitly addressing high-consequence events. Historically, decisionsupport tools for the grid consider expected cost minimization, largely ignoring risk and instead penalizing loss-of-load through artificial parameters. The technical focus of this work was the development of scalable solvers for enforcing risk metrics. Advanced stochastic programming solvers were developed to address generation and transmission expansion and unit commitment, minimizing cost subject to pre-specified risk thresholds. Particular attention was paid to renewables where security critically depends on production and demand prediction accuracy. To address this concern, powerful filtering techniques for spatio-temporal measurement assimilation were used to develop short-term predictive stochastic models. To achieve uncertaintytolerant solutions, very large numbers of scenarios must be simultaneously considered. One focus of this work was investigating ways of reasonably reducing this number.

  2. Nevada National Security Site 2011 Waste Management Monitoring Report, Area 3 and Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2012-07-31

    Environmental monitoring data are collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, and vadose zone. This report summarizes the 2011 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports. Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Slightly elevated exposure levels outside the Area 3 RWMS are attributed to nearby historical aboveground nuclear weapons tests. Air monitoring data show tritium concentrations in water vapor and americium and plutonium concentrations in air particles are only slightly above detection limits and background levels. The measured levels of radionuclides in air particulates and moisture are below derived concentration guides for these radionuclides. During the last 2 weeks of March 2011, gamma spectroscopy results for air particles showed measurable activities of iodine-131 (131I), cesium-134 (134Cs), and cesium-137 (137Cs). These results are attributed to the release of fission products from the damaged Fukushima Daiichi power plant in Japan. The remaining gamma spectroscopy results for air particulates collected at the Area 3 and Area 5 RWMS were below minimum detectable concentrations. Groundwater monitoring data indicate the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by RWMS operations. Results of groundwater analysis from wells around the Area 5 RWMS were all below established investigation levels. The 86.3 millimeters (mm) (3.40 inches [in.]) of precipitation at the Area 3 RWMS during 2011 is 44% below the average of 154.1 mm (6.07 in.), and the 64.8 mm (2.55 in.) of precipitation at the Area 5 RWMS during 2011 is 47% below the average of 122.4 mm (4.82 in.). Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Automated vadose zone monitoring on Area 5 RWMS operational waste covers was not done during 2011 due to construction of the final evapotranspiration cover at these monitoring locations. Moisture from precipitation did not percolate below 122 centimeters (4 feet) in the vegetated final mono-layer cover on the U-3ax/bl disposal unit at the Area 3 RWMS before being removed by evapotranspiration. During 2011, there was no drainage through 2.4 meters (8 feet) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Ten percent of the applied precipitation and irrigation drained from the bare-soil drainage lysimeter that received 3 times natural precipitation. All 2011 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

  3. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  4. Safeguards & Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    cyber system operations and security, and business and budget operations including property management. Supports EM headquarters with safeguards and security assistance. ...

  5. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  6. DOE technology information management system database study report

    SciTech Connect (OSTI)

    Widing, M.A.; Blodgett, D.W.; Braun, M.D.; Jusko, M.J.; Keisler, J.M.; Love, R.J.; Robinson, G.L.

    1994-11-01

    To support the missions of the US Department of Energy (DOE) Special Technologies Program, Argonne National Laboratory is defining the requirements for an automated software system that will search electronic databases on technology. This report examines the work done and results to date. Argonne studied existing commercial and government sources of technology databases in five general areas: on-line services, patent database sources, government sources, aerospace technology sources, and general technology sources. First, it conducted a preliminary investigation of these sources to obtain information on the content, cost, frequency of updates, and other aspects of their databases. The Laboratory then performed detailed examinations of at least one source in each area. On this basis, Argonne recommended which databases should be incorporated in DOE`s Technology Information Management System.

  7. First Capitol Risk Management LLC | Open Energy Information

    Open Energy Info (EERE)

    Capitol Risk Management LLC Jump to: navigation, search Name: First Capitol Risk Management, LLC Place: Galena, Illinois Zip: 61036 Product: First Capitol Risk Management...

  8. Enhancing Seismic Calibration Research Through Software Automation and Scientific Information Management

    SciTech Connect (OSTI)

    Ruppert, S D; Dodge, D A; Ganzberger, M D; Harris, D B; Hauk, T F

    2009-07-07

    The National Nuclear Security Administration (NNSA) Ground-Based Nuclear Explosion Monitoring Research and Development (GNEMRD) Program at LLNL continues to make significant progress enhancing the process of deriving seismic calibrations and performing scientific integration, analysis, and information management with software automation tools. Our tool efforts address the problematic issues of very large datasets and varied formats encountered during seismic calibration research. New information management and analysis tools have resulted in demonstrated gains in efficiency of producing scientific data products and improved accuracy of derived seismic calibrations. In contrast to previous years, software development work this past year has emphasized development of automation at the data ingestion level. This change reflects a gradually-changing emphasis in our program from processing a few large data sets that result in a single integrated delivery, to processing many different data sets from a variety of sources. The increase in the number of sources had resulted in a large increase in the amount of metadata relative to the final volume of research products. Software developed this year addresses the problems of: (1) Efficient metadata ingestion and conflict resolution; (2) Automated ingestion of bulletin information; (3) Automated ingestion of waveform information from global data centers; and (4) Site Metadata and Response transformation required for certain products. This year, we also made a significant step forward in meeting a long-standing goal of developing and using a waveform correlation framework. Our objective for such a framework is to extract additional calibration data (e.g. mining blasts) and to study the extent to which correlated seismicity can be found in global and regional scale environments.

  9. Risk Informed Margins Management as part of Risk Informed Safety Margin Characterization

    SciTech Connect (OSTI)

    Curtis Smith

    2014-06-01

    The ability to better characterize and quantify safety margin is important to improved decision making about Light Water Reactor (LWR) design, operation, and plant life extension. A systematic approach to characterization of safety margins and the subsequent margin management options represents a vital input to the licensee and regulatory analysis and decision making that will be involved. In addition, as research and development in the LWR Sustainability (LWRS) Program and other collaborative efforts yield new data, sensors, and improved scientific understanding of physical processes that govern the aging and degradation of plant SSCs needs and opportunities to better optimize plant safety and performance will become known. To support decision making related to economics, readability, and safety, the Risk Informed Safety Margin Characterization (RISMC) Pathway provides methods and tools that enable mitigation options known as risk informed margins management (RIMM) strategies.

  10. Program and Project Management for the Acquisition of Capital Assets (Informational Purposes Only)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-01-11

    The purpose of this Order is to a) provide the Department of Energy (DOE) Elements, including the National Nuclear Security Administration (NNSA), with program and project management direction for the acquisition of capital assets with the goal of delivering projects within the original performance baseline (PB), cost and schedule, and fully capable of meeting mission performance, safeguards and security, and environmental, safety, and health requirements unless impacted by a directed change; and b) implement Office of Management and Budget (OMB) Circulars to include: A-11, Part 7, Capital Programming Guide, which prescribes new requirements and leading practices for project and acquisition management; A-123, Management's Responsibility for Internal Control, which defines management's responsibility for internal control in Federal agencies; and A-131, Value Engineering, which requires that all Federal agencies use Value Engineering (VE) as a management tool. The Page Change is a limited update to incorporate recent Secretarial policies and issues raised by external stakeholders.

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individualsí eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  12. Safeguards & Security (S&S) Program | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safeguards & Security (S&S) Program Operations Program Management (OPM) OPM Home About Science Laboratories Infrastructure (SLI) Program Safeguards & Security (S&S) Program Sustainability Contact Information Operations Program Management U.S. Department of Energy SC-33/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-8429 F: (301) 903-7047 More Information ¬Ľ Safeguards & Security (S&S) Program Print Text Size: A A A FeedbackShare Page

  13. Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)

    SciTech Connect (OSTI)

    Jesse Schrieber

    2008-07-01

    In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America‚Äôs nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization and improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in ‚Äúgreen‚ÄĚ technology.

  14. Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)

    SciTech Connect (OSTI)

    Jesse Schreiber

    2008-03-01

    In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet Americaís nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in ďgreenĒ technology.

  15. FTCP Site Specific Information ‚Äď Office of Environmental Management

    Broader source: Energy.gov [DOE]

    Site Specific Information including Contact Information, and Annual Workforce Analysis & Staffing Plan Reports.

  16. Nohemi Brewer Transportation Program Manager U.S. Department of Energy (DOE), National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    November 16, 2012 Nevada National Security Site (NNSS) Radioactive Waste Shipment Update Page 2 Page 2Title ID 412- 11/16/2012 - Page 2 Log No 2012-263 Updated Generator Forecasts for Disposal at the NNSS in FY 2012 (cubic feet*) * Currently, there are 25 approved generator programs at 19 sites that can send low-level waste (LLW) and mixed low level waste (MLLW) to the NNSS * Based on actual disposal volumes received, total FY 2012 disposal was less than the April forecast update *Rounded to the

  17. Headquarters Facilities Master Security Plan

    Energy Savers [EERE]

    0-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Ôā∑ Title 32, CFR, Part 2001, Classified National Security Information Ôā∑ Executive Order 13526, Classified National Security Information Ôā∑ DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3 Ôā∑ DOE Order 475.2A, Identifying Classified Information Ôā∑ DOE Order 475.1, Counterintelligence Program The Security Awareness

  18. AgFe Management Ltd | Open Energy Information

    Open Energy Info (EERE)

    AgFe Management Ltd Jump to: navigation, search Name: AgFe Management Ltd Place: London, England, United Kingdom Zip: W11 1QF Product: London-based, Financial Asset Management and...

  19. Property:ManagingFieldOffice | Open Energy Information

    Open Energy Info (EERE)

    ManagingFieldOffice Jump to: navigation, search Property Name ManagingFieldOffice Property Type Page Pages using the property "ManagingFieldOffice" Showing 25 pages using this...

  20. Property:ManagingDistrictOffice | Open Energy Information

    Open Energy Info (EERE)

    ManagingDistrictOffice Jump to: navigation, search Property Name ManagingDistrictOffice Property Type Page Pages using the property "ManagingDistrictOffice" Showing 25 pages using...

  1. Insurance as a Risk Management Instrument for Energy Infrastructure Security and Resilience Report Now Available

    Broader source: Energy.gov [DOE]

    The Office of Electricity Delivery and Energy Reliability has released a report that examines the key risks confronting critical energy infrastructure and ways in which the insurance industry can help manage these risks. In most developed countries, insurance is one of the principal risk management instruments for aiding in recovery after a disaster and for encouraging future investments that are more resilient to potential hazards.

  2. USAID-Forestry Conflict Management Training | Open Energy Information

    Open Energy Info (EERE)

    Forestry Conflict Management Training Jump to: navigation, search Tool Summary LAUNCH TOOL Name: USAID-Forestry Conflict Management Training AgencyCompany Organization: United...

  3. Macquarie Funds Management USA Inc | Open Energy Information

    Open Energy Info (EERE)

    Macquarie Funds Management USA Inc Jump to: navigation, search Name: Macquarie Funds Management (USA) Inc. Place: Carlsbad, California Zip: 92008 Product: Fund of funds arm of...

  4. Incubator Management GmbH | Open Energy Information

    Open Energy Info (EERE)

    Management GmbH Jump to: navigation, search Name: Incubator Management GmbH Place: Austria Sector: Services Product: General Financial & Legal Services ( Private ...

  5. Shenzhen City Zhongcai Energy Management Co | Open Energy Information

    Open Energy Info (EERE)

    Zhongcai Energy Management Co Jump to: navigation, search Name: Shenzhen City Zhongcai Energy Management Co. Place: China Product: EMC using the energy cost contract model...

  6. National Bald Eagle Management Guidelines | Open Energy Information

    Open Energy Info (EERE)

    National Bald Eagle Management Guidelines Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: National Bald Eagle Management...

  7. Norway-Indonesia-Forest Management Agreement | Open Energy Information

    Open Energy Info (EERE)

    Norway-Indonesia-Forest Management Agreement Jump to: navigation, search Name Norway-Indonesia-Forest Management Agreement AgencyCompany Organization Government of Norway,...

  8. India-Natural Resource Management Plan | Open Energy Information

    Open Energy Info (EERE)

    Natural Resource Management Plan Jump to: navigation, search Name India-Natural Resource Management Plan AgencyCompany Organization Government of India Sector Land Focus Area...

  9. CommonWealth Resource Management Corporation | Open Energy Information

    Open Energy Info (EERE)

    CommonWealth Resource Management Corporation Jump to: navigation, search Name: CommonWealth Resource Management Corporation Place: Boston, Massachusetts Zip: MA 02132 Product:...

  10. WAC - 173-204 Sediment Management Standards | Open Energy Information

    Open Energy Info (EERE)

    4 Sediment Management Standards Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: WAC - 173-204 Sediment Management...

  11. Beijing Sky Solar Investment Management Co | Open Energy Information

    Open Energy Info (EERE)

    Sky Solar Investment Management Co Jump to: navigation, search Name: Beijing Sky Solar Investment & Management Co. Place: Beijing, China Sector: Solar Product: Beijing based...

  12. Shanghai Xintan Investment Management Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Xintan Investment Management Co Ltd Jump to: navigation, search Name: Shanghai Xintan Investment Management Co. Ltd. Place: Shanghai, Shanghai Municipality, China Zip: 200135...

  13. Nature and Waste Management P Ltd | Open Energy Information

    Open Energy Info (EERE)

    Waste Management P Ltd Jump to: navigation, search Name: Nature and Waste Management (P) Ltd. Place: Kolkata, West Bengal, India Zip: 700027 Product: Kolkatta-based MSW composting...

  14. RRC - Surface Waste Management Manual | Open Energy Information

    Open Energy Info (EERE)

    Surface Waste Management Manual Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: RRC - Surface Waste Management...

  15. Guwahati Waste Management Company Ltd GWMCL | Open Energy Information

    Open Energy Info (EERE)

    Guwahati Waste Management Company Ltd GWMCL Jump to: navigation, search Name: Guwahati Waste Management Company Ltd. (GWMCL) Place: Guwahati, Assam, India Product: Setting up 6MW...

  16. Oregon Land Management Division - Easements | Open Energy Information

    Open Energy Info (EERE)

    Division - Easements Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Oregon Land Management Division - Easements Author Oregon Land Management...

  17. Ground Water Management District Rules | Open Energy Information

    Open Energy Info (EERE)

    Water Management District Rules Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Ground Water Management District Rules Abstract This webpage provides...

  18. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information related to the Building Performance Database (BPD) security and software controls. PDF icon Building Performance Database (BPD) Security More Documents & Publications ...

  19. Solid waste information and tracking system server conversion project management plan

    SciTech Connect (OSTI)

    MAY, D.L.

    1999-04-12

    The Project Management Plan governing the conversion of Solid Waste Information and Tracking System (SWITS) to a client-server architecture. The Solid Waste Information and Tracking System Project Management Plan (PMP) describes the background, planning and management of the SWITS conversion. Requirements and specification documentation needed for the SWITS conversion will be released as supporting documents.

  20. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  1. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  2. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  3. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  4. accountability | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    accountability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  5. emergencyresponse | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    emergencyresponse | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  6. whistleblower | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    whistleblower | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  7. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  8. Security and Use Control of Nuclear Explosives and Nuclear Weapons (Informational Purposes Only)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-02-24

    This draft has been scheduled for final review before the Directives Review Board on 3-5-15. All major comments and concerns should be provided to your DRB representative, following your organization process. If you do not know who your representative is, please see the list of DRB members at https://www.directives.doe.gov/beta/references/directives-review-board. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-1014). All major comments and concerns should be submitted by COB 3-3-15.

  9. Operations Security (OPSEC) Reminder

    Broader source: Energy.gov [DOE]

    DOE O 471.6, Section 4.f, Information Security Manual and the DOE Headquarters Facilities Master Security Plan, Section 8, OPSEC, require that each element review information before it is posted to their publicly accessible website to ensure the data does not contain Controlled Unclassified Information and/or sensitive (critical information).

  10. Acquisition Information Management system telecommunication site survey results

    SciTech Connect (OSTI)

    Hake, K.A.; Key, B.G.

    1993-09-01

    The Army acquisition community currently uses a dedicated, point-to-point secure computer network for the Army Material Plan Modernization (AMPMOD). It must transition to the DOD supplied Defense Secure Network 1 (DSNET1). This is one of the first networks of this size to begin the transition. The type and amount of computing resources available at individual sites may or may not meet the new network requirements. This task surveys these existing telecommunications resources available in the Army acquisition community. It documents existing communication equipment, computer hardware, associated software, and recommends appropriate changes.

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individualsí eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  12. Site Information--Updates 2-3-15 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Site Information--Updates 2-3-15 KCFO ES&H Surveillance Plan NSC Emergency Plan (Available through request to SEB4@nnsa.doe.gov) Bannister Federal Complex Emergency Plan (Available through request to SEB4@nnsa.doe.gov) NSC Spill Control Plan KCP Annual Site Environmental Study KCP Final Environmental Assessment KCP Environmental Assessment FONSI EPA Hazardous and Solid Waste Amendments Permit Kansas City MO Wastewater Discharge Permit for KCP Air Pollution Control Program New Source Review

  13. HSEMC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Blog Home HSEMC HSEMC Homeland Security and ... of Emergency Management assists the NNSA and Department of Energy sites in ... the NNSA Emergency Management System (EMS). ...

  14. KlimaINVEST Management GmbH | Open Energy Information

    Open Energy Info (EERE)

    KlimaINVEST Management GmbH Jump to: navigation, search Name: KlimaINVEST Management GmbH Place: Hamburg, Germany Zip: 20095 Product: Hamburg based investment company targeting...

  15. Graveson Energy Management Ltd GEM | Open Energy Information

    Open Energy Info (EERE)

    Graveson Energy Management Ltd GEM Jump to: navigation, search Name: Graveson Energy Management Ltd (GEM) Place: Wales, United Kingdom Zip: SA13 2EZ Product: UK based company that...

  16. ADEQ Nonpoint Source State Management Plan | Open Energy Information

    Open Energy Info (EERE)

    Nonpoint Source State Management Plan Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: ADEQ Nonpoint Source State Management PlanLegal...

  17. TxDOT Access Management Manual | Open Energy Information

    Open Energy Info (EERE)

    Access Management Manual Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: TxDOT Access Management ManualLegal Abstract Manual prepared...

  18. TNRC 33 - Management of Coastal Public Land | Open Energy Information

    Open Energy Info (EERE)

    33 - Management of Coastal Public Land Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: TNRC 33 - Management of Coastal...

  19. Umwelt Management AG UMaAG | Open Energy Information

    Open Energy Info (EERE)

    Management AG UMaAG Jump to: navigation, search Name: Umwelt Management AG (UMaAG) Place: Cuxhaven, Germany Zip: 27478 Sector: Wind energy Product: RE project developer, esp. wind...

  20. ASM Asset Management DTVM SA | Open Energy Information

    Open Energy Info (EERE)

    Asset Management DTVM SA Jump to: navigation, search Name: ASM Asset Management DTVM SA Place: Rio de Janeiro, Rio de Janeiro, Brazil Zip: 22640-100 Sector: Carbon, Services...

  1. Pulse Asset Management GmbH | Open Energy Information

    Open Energy Info (EERE)

    Asset Management GmbH Jump to: navigation, search Name: Pulse Asset Management GmbH Place: Hamburg, Germany Zip: 20354 Sector: Solar Product: Hamburg-based investor in solar...

  2. Title 50 CFR 29 Land Use Management | Open Energy Information

    Open Energy Info (EERE)

    9 Land Use Management Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: Title 50 CFR 29 Land Use ManagementLegal Abstract...

  3. ADEQ Managing Hazardous Waste Handbook | Open Energy Information

    Open Energy Info (EERE)

    Managing Hazardous Waste Handbook Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: ADEQ Managing Hazardous Waste HandbookLegal...

  4. ADEQ Hazardous Waste Management website | Open Energy Information

    Open Energy Info (EERE)

    Hazardous Waste Management website Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: ADEQ Hazardous Waste Management websiteLegal...

  5. Title 10 Chapter 159 Waste Management | Open Energy Information

    Open Energy Info (EERE)

    159 Waste Management Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: Title 10 Chapter 159 Waste ManagementLegal Abstract Statute...

  6. Regional Water Board NPDES Program Manager | Open Energy Information

    Open Energy Info (EERE)

    search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Regional Water Board NPDES Program ManagerLegal Abstract Regional Water Board NPDES Program Manager,...

  7. Energy Management and Information Systems, BBA Technical Team

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    associated energy savings; 2) limited understanding of technology uses for maximum ... 2425 TBtu annual energy use Audience Enterprise energysustainability managers; ...

  8. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  9. Deactivation & Decommissioning Knowledge Management Information Tool (D&D

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    KM-IT) | Department of Energy Knowledge Management Information Tool (D&D KM-IT) Deactivation & Decommissioning Knowledge Management Information Tool (D&D KM-IT) Deactivation & Decommissioning Knowledge Management Information Tool (D&D KM-IT) The Deactivation and Decommissioning Knowledge Management Information Tool (D&D KM-IT) serves as a centralized repository providing a common interface for all D&D related activities. It assists users in gathering, analyzing,

  10. Final Report Implementing Office of Management and Budget Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... when that term is applied to financial, scientific, or statistical information. ... DOE also disseminates a large volume of statistical reports through its Energy Information ...

  11. PIA - HSS Electronic Visitor Management System (HSEVMS) | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy HSS Electronic Visitor Management System (HSEVMS) PIA - HSS Electronic Visitor Management System (HSEVMS) PIA - HSS Electronic Visitor Management System (HSEVMS) PDF icon PIA - HSS Electronic Visitor Management System (HSEVMS) More Documents & Publications PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL PeopleSoft - Human Resource System PIA - Human Resources - Personal Information Change Request - Idaho National Engineering Laboratory

  12. Chapter_14_Cyber_Security

    Office of Environmental Management (EM)

    4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters

  13. Audit Report National Nuclear Security Administration Nuclear Weapons

    Energy Savers [EERE]

    National Nuclear Security Administration Nuclear Weapons Systems Configuration Management DOE/IG-0902 March 2014 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 March 26, 2014 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "National Nuclear Security Administration Nuclear Weapons Systems Configuration Management" BACKGROUND The National

  14. Office of Safety Infrastructure & Operations | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Safety Infrastructure & Operations NNSA's G2 Management Information System Wins Association for Enterprise Information's (AFEI) "Excellence in Enterprise Information Award" The G2 team and the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information Award. (WASHINGTON, D.C) - The National Nuclear Security Administration (NNSA) has received the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise

  15. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security

  16. Bureau of Land Management - NEPA Handbook | Open Energy Information

    Open Energy Info (EERE)

    to library PermittingRegulatory Guidance - GuideHandbook: Bureau of Land Management - NEPA HandbookPermittingRegulatory GuidanceGuideHandbook Abstract The purpose of...

  17. Project Management Development Company PMD | Open Energy Information

    Open Energy Info (EERE)

    Development Company PMD Jump to: navigation, search Name: Project Management & Development Company (PMD) Place: Jubail Industrial City, Saudi Arabia Zip: 31961 Product: Saudi-based...

  18. New England Energy Management Inc | Open Energy Information

    Open Energy Info (EERE)

    Inc Jump to: navigation, search Name: New England Energy Management Inc Address: 5 Shelter Rock Road Place: Danbury, Connecticut Zip: 06810 Region: Northeast - NY NJ CT PA Area...

  19. Energy Management Company Association EMCA | Open Energy Information

    Open Energy Info (EERE)

    Company Association EMCA Jump to: navigation, search Name: Energy Management Company Association (EMCA) Place: Beijing, Beijing Municipality, China Zip: 100053 Product: ESCOEMC...

  20. FSM 2500 Watershed and Air Management | Open Energy Information

    Open Energy Info (EERE)

    FSM 2500 Watershed and Air ManagementLegal Abstract Forest Service manual setting forth policy for protection and development of soil and water resources shall be components...

  1. INFORMATION ON THE SYSTEM FOR AWARD MANAGEMENT (SAM)

    Broader source: Energy.gov (indexed) [DOE]

    THE SYSTEM FOR AWARD MANAGEMENT (SAM) Eight federal procurement systems and the Catalog of Federal Domestic Assistance will be combined into one new system, the System for Award...

  2. TNRC 63 - Beach Dunes Management | Open Energy Information

    Open Energy Info (EERE)

    TNRC 63 - Beach Dunes ManagementLegal Published NA Year Signed or Took Effect 1977 Legal Citation TNRC 63 (1977) DOI Not Provided Check for DOI availability: http:...

  3. Information Resources Management Strategic Plan Appendix FY2014...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Plan, and 2014 Enterprise Roadmap. Senior Staff Discussions: Leadership ... Further context may be found in the DOE Enterprise Roadmap. Alignment to DOE Strategic ...

  4. Washington Coastal Zone Management Webpage | Open Energy Information

    Open Energy Info (EERE)

    Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Washington Coastal Zone Management Webpage Abstract Provides overview of Washington's coastal...

  5. Evapotranspiration Cover for the 92-Acre Area Retired Mixed Waste Pits, Area 5 Waste Management Division, Nevada National Security Site, Final CQA Report

    SciTech Connect (OSTI)

    NSTec Environmental Management; The Delphi Groupe, Inc.; J. A. Cesare and Associates, Inc.

    2012-01-31

    The report is the Final Construction Quality Assurance (CQA) Report for the 92-Acrew Evapotranspiration Cover, Area 5 Waste Management Division Retired Mixed Waste Pits, Nevada National Security Site, Nevada, for the period of January 20, 2011, to January 31, 2012 The Area 5 RWMS uses engineered shallow-land burial cells to dispose of packaged waste. The 92-Acre Area encompasses the southern portion of the Area 5 RWMS, which has been designated for the first final closure operations. This area contains 13 Greater Confinement Disposal (GCD) boreholes, 16 narrow trenches, and 9 broader pits. With the exception of two active pits (P03 and P06), all trenches and pits in the 92-Acre Area had operational covers approximately 2.4 meters thick, at a minimum, in most areas when this project began. The units within the 92-Acre Area are grouped into the following six informal categories based on physical location, waste types and regulatory requirements: (1) Pit 3 Mixed Waste Disposal Unit (MWDU); (2) Corrective Action Unit (CAU) 111; (3) CAU 207; (4) Low-level waste disposal units; (5) Asbestiform low-level waste disposal units; and (6) One transuranic (TRU) waste trench.

  6. Enterprise Assessments Review of the Y-12 National Security Complex...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Enterprise Assessments Review of the Y-12 National Security Complex Emergency Management ... Security Administration's (NNSA) Y-12 National Security Complex (Y-12) exercise program. ...

  7. sandia national labotartory | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    sandia national labotartory Sandia National Laboratory Sandia Field Office Contact the Field Office Contract Administration & Business Management Emergency Information Facilities & Projects Nuclear Operations Environment, Safety & Health Public Affairs Safeguards & Security Performance and Quality Assurance Programs NEPA Reading Room

  8. Nevada National Security Site 2012 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2013-02-11

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2012 results. During 2012, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Groundwater samples were collected at UE5PW-1, UE5PW-2, and UE5PW-3 on March 21, August 7, August 21, and September 11, 2012, and static water levels were measured at each of the three pilot wells on March 19, June 6, August 2, and October 15, 2012. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Final results from samples collected in 2012 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  9. Nevada National Security Site 2010 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2011-01-01

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2010 results. During 2010, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Samples were collected at UE5PW-1 on March 10 and August 10, 2010; at UE5PW-2 on March 10, August 10, and August 25, 2010; and at UE5PW-3 on March 31, August 10, and August 25, 2010. Static water levels were measured at each of the three pilot wells on March 1, April 26, August 9, and November 9, 2010. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Results from all samples collected in 2010 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  10. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  11. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    material that it protects. Y-12 is the "Fort Knox" of uranium. We oversee the secure management and storage of strategic and special nuclear materials that have been removed...

  12. Nevada National Security Site 2011 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2012-02-27

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2011 results. During 2011, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Samples were collected at UE5PW-1 on March 8, August 2, August 24, and October 19, 2011; at UE5PW-2 on March 8, August 2, August 23, and October 19, 2011; and at UE5PW-3 on March 8, August 2, August 23, and October 19, 2011. Static water levels were measured at each of the three pilot wells on March 1, June 7, August 1, and October 17, 2011. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Initial total organic carbon and total organic halides results for samples collected in August 2011 were above previous measurements and, in some cases, above the established investigation limits. However, after field sample pumps and tubing were disinfected with Clorox solution, the results returned to normal levels. Final results from samples collected in 2011 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  13. Trends in Energy Management Technology - Part 4: Review ofAdvanced Applications in Energy Management, Control, and InformationSystems

    SciTech Connect (OSTI)

    Yee, Gaymond; Webster, Tom

    2003-08-01

    In this article, the fourth in a series, we provide a review of advanced applications in Energy Management, Control, and Information Systems (EMCIS). The available features for these products are summarized and analyzed with regard to emerging trends in EMCIS and potential benefits to the Federal sector. The first article [1] covered enabling technologies for emerging energy management systems. The second article [2] serves as a basic reference for building control system (BCS) networking fundamentals and includes an assessment of current approaches to open communications. The third article [3] evaluated several products that exemplify the current state of practice in EMCIS. It is important for energy managers in the Federal sector to have a high level of knowledge and understanding of these complex energy management systems. This series of articles provides energy practitioners with some basic informational and educational tools to help make decisions relative to energy management systems design, specification, procurement, and energy savings potential.

  14. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  15. Manhattan Team | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Team Section Chief Global Security Analysis & Training 865.574.0877 (office) Casey Cole Program Manager III Manhattan Team Deputy Global Security Analysis & Training...

  16. Luxcara Asset Management GmbH | Open Energy Information

    Open Energy Info (EERE)

    investment solutions in the field of renewable energy, with a special focus on photovoltaics. References: Luxcara Asset Management GmbH1 This article is a stub. You can help...

  17. Nuclear Management Partners Ltd NMP PBO | Open Energy Information

    Open Energy Info (EERE)

    Partners Ltd NMP PBO Jump to: navigation, search Name: Nuclear Management Partners Ltd (NMP) (PBO) Place: Cumbria, England, United Kingdom Zip: CA24 3HX Product: England-based...

  18. National Forest Management Act of 1976 | Open Energy Information

    Open Energy Info (EERE)

    The National Forest Management Act of 1976 is a federal law that governs the administration of national forests. This act requires the United States Forest Service to use a...

  19. Title 43 CFR 4120: Grazing Management | Open Energy Information

    Open Energy Info (EERE)

    Title 43 CFR 4120: Grazing Management Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: Title 43 CFR 4120: Grazing...

  20. Bureau of Land Management - NEPA Website | Open Energy Information

    Open Energy Info (EERE)

    Website Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Bureau of Land Management - NEPA Website Abstract This page links to the BLM NEPA website....