Management System Description:
Safeguards, Security, and Emergency Management
Management System Owner: | EARL HICKS | |
Secondary Management System Owner: |
THOMAS GRADLE JOHN MEDLOCK |
|
Point of Contact: | MARK THORNOCK |
Issue Date: 10/17/2012
SCMS Revision: 1.10
1.0 Purpose
The purpose of the Office of Science (SC) Safeguards, Security, and Emergency Management System is to assure that effective programs are in place for the protection of SC interests from loss, damage, or other harm, whether intentional or unintentional. This includes assets in the possession or control of SC Headquarters, the Site Offices, SC Chicago Office (SC‑CH), and SC Oak Ridge Office (SC‑OR), as well as third parties under various types of agreements with the Office of Science: management and operating (M&O) and non‑M&O contracts, grants, cooperative agreements, Interagency Agreements, etc.
2.0 Responsibilities
The table below represents roles and responsibilities specific to this Management System. For a detailed description of SCMS roles and responsibilities, please see the SCMS R2A2.
Roles |
Responsibilities |
Director, Office of Science (SC‑1) |
|
Deputy Director for Field Operations (SC‑3) |
|
SC Site Office Managers |
|
SC‑CH and SC‑OR Managers (Integrated Support Center [ISC]) |
|
3.0 Management System Operation
3.1 Overview
The Office of Science implements SS&EM programs and activities to protect its assets, human and physical, utilizing the principles and functions of Integrated Safeguards and Security Management (ISSM). SC staff:
Ensure that applicable security and emergency management requirements are followed by SC personnel;
Ensure that appropriate security and emergency management requirements are placed into contracts;
Provide oversight of contractor work planning and controls;
Integrate continuous feedback and improvement mechanisms into their work; and
Perform the necessary oversight/assessments of both the Federal staff and contractors.
This Management System addresses the training requirements for SC personnel in the relevant aspects of SS&EM and performance of SS&EM functions that are Federal responsibilities. Furthermore, this Management System serves to ensure that SC SS&EM requirements and methods of accomplishment are identified, communicated, and implemented by both SC staff and contractors. This includes the oversight, assessment, and evaluation of both Federal staff and contractor performance and reporting of SS&EM performance data to SC and other DOE entities. Effective implementation of this Management System will ensure the security and safety of SC staff, contractor personnel, and the public, and protection of the environment.
The processes for addressing contractor SS&EM performance expectations are outlined in the SC MSD: M&O Contracting.
3.2 Key Functions/Services and Processes
3.2.1 SC Safeguards and Security
This component includes a variety of formal and informal safeguards and security systems and processes for the protection and management of all SC interests.
3.2.1.1 Program Management and Support
Each SC Site Office is considered a “Lead Responsible Office” per DOE Directive (see Section 4.0, “Requirements”). Accordingly, Site Office Managers are responsible for:
Approving all safeguards and security plans;
Approving the Training Approval Program Plan;
Ensuring that the appropriate Foreign, Ownership or Influence (FOCI) determinations are made prior to allowing any classified work to occur;
Ensuring appropriate facility clearances are granted and Facility Data and Approval Records (FDARs) and Contract Security Classification Specification (CSCS) forms are completed;
Maintaining the Safeguards and Security Information Management System (SSIMS);
Ensuring that safeguards and security surveys are conducted at facilities under their purview;
Ensuring that any deficiencies identified during the surveys are corrected appropriately; and
Approving/concurring on deviations to DOE Directives.
3.2.1.2 Protective Force
The Site Office Manager ensures that all protective force personnel employed to protect DOE interests meet all requirements.
3.2.1.3 Physical Security
Site Office Managers are responsible for approving, for the facility under their cognizance, any vulnerability assessments conducted on the physical security (not limited to barriers, locks, systems, alarms), access controls, protective force operations, performance testing, transportation security, and badging.
3.2.1.4 Information Protection
Site Office Managers have the responsibility for the activities in the Classification, Operations Security (OPSEC), Technical Surveillance Counter Measures (TSCM), Classified Matter Protection and Control Program, and Integrated Safeguards and Security (ISS) Programs for the protection of classified matter, Unclassified Controlled Nuclear Information and Official Use Only documents to ensure that classified and sensitive activities conducted at facilities under their purview are in accordance with the Atomic Energy Act and its implementing regulations (and related DOE Directives) and the National Industrial Security Policy. This necessitates the appointment of a DOE employee as FOCI Program Manager, Technical Surveillance Countermeasures Program Manager, Facility Clearance Operations Manager, and a Designated Accrediting Authority for classified computer operations. These appointments could be individuals on their staff, or individuals in the ISC.
3.2.1.5 Cyber Security
Site Office Managers, with appropriate support from the ISC, are responsible for implementing all cyber security mandates and guidance to ensure that cyber‑generated and stored information, and the systems housing them, are adequately protected from unauthorized intrusion, disruption, damage, and destruction.
3.2.1.6 Personnel Security
The ISC is responsible for determining eligibility for access to classified matter and/or special nuclear material, and to implement the Human Reliability Program. The clearance requests are for initial access authorizations, extensions, transfers, upgrades, downgrades, reinstatements, and reinvestigations. To the extent consistent with the regulation (see Section 4.0, “Requirements”), SC‑CH and SC‑OR Managers retain the authority to suspend or decline to grant an access authorization.
3.2.1.7 Unclassified Visits and Assignments by Foreign Nationals
The SC Laboratory Directors are responsible for the Unclassified Foreign Visits and Assignments Program consistent with the related DOE Directive. The Site Office Manager is responsible for assuring that the facilities under their cognizance comply with the appropriate requirements. This means assuring that all unclassified foreign visits and assignments are tracked in the Foreign Access Central Tracking System (FACTS); indices checks are favorably completed, security plans are completed when required, the visa/passport information are obtained and that the appropriate subject matter experts review all visits and assignments.
3.2.1.8 Nuclear Materials Control and Accountability
If nuclear materials are managed by the contractor under his or her cognizance, the Site Office Manager is responsible for approving a Material Control and Accountability Plan. This means assuring that:
MC&A requirements are considered in all phases of design of new facilities and operations;
Nuclear material transactions, inventories, and material balances are documented and submitted to the Nuclear Materials Management and Safeguards System (NMMSS); and
Material balances held in the contractor’s systems are reconciled with NMMSS in the March and September reporting periods.
3.2.2 Emergency Management
This component is comprised of a series of more rigorous processes designed to enhance SC response capabilities, graded in approach, to mitigate a variety of events or conditions that jeopardize or may jeopardize the health and safety of workers, the public, and the environment.
3.2.2.1 Operational Emergency Program
Each DOE facility/site is required to have an Operational Emergency Program, which provides the framework for response to all events or conditions that involve the health and safety of workers, the public, and the environment. The objective of the program is to achieve an effective integration of emergency planning and preparedness requirements into an Emergency Management Program that provides response capabilities for all emergencies, through communication, coordination, and an efficient and effective use of resources. The Emergency Management Program for a specific facility/site shall be commensurate with the hazards present at that facility/site.
3.2.2.2 Hazards Survey
A Hazards Survey is used to identify the generic emergency events or conditions that define the scope of the emergency management program at a facility/site. It is a site‑specific qualitative examination of the events or conditions which may require an emergency response. The description of the potential impacts of such events or conditions contained in the Hazards Survey determines the planning and preparedness requirements that apply.
3.2.2.3 Hazards Assessment
Hazards Assessment is conducted for each DOE facility/site where hazardous materials are present in quantities exceeding the specified threshold quantities. It is a quantitative analysis that includes the identification and characterization of hazardous materials specific to a facility/site, analyses of potential accidents or events, and evaluation of potential consequences. The results of the Hazards Assessment determine whether an Operational Emergency Hazardous Materials Program is required.
4.0 Requirements
4.1 Primary Responsibility
This Management System has primary responsibility for ("owns") the following requirements:
Document |
Title |
Requirement Decision Record |
---|---|---|
10 CFR 710 | Criteria and Procedures for Determining Eligibility for Access to Classified Matter or Special Nuclear Material | Completed |
10 CFR 810 | Assistance to Foreign Atomic Energy Activities | Completed |
10 CFR 1046 | Physical Protection Of Security Interest | Completed |
NRC 10 CFR 110 | U.S. Nuclear Regulatory Commission Part 110—Export and Import of Nuclear Equipment and Material | Completed |
DEAR 952.204-2 | Security Requirements | Completed |
DEAR 952.204-70 | Classification/Declassification | Completed |
DEAR 952.204-73 | Facility Clearance | Completed |
DoD 5220.22-M | National Industrial Security Program Operating Manual | Completed |
DOE M 142.2-1 | Manual For Implementation Of The Voluntary Offer Safeguards Agreement And Additional Protocol With The International Atomic Energy Agency | Completed |
DOE O 142.2A | Voluntary Offer Safeguards Agreement And Additional Protocol With The International Atomic Energy Agency | Completed |
DOE O 142.3A | Unclassified Foreign Visits and Assignments Program | Completed |
DOE O 142.5 | Committee on Foreign Investment in the United States | Completed |
DOE O 150.1 | Continuity Programs | Completed |
DOE O 151.1C | Comprehensive Emergency Management System | Completed |
DOE M 200.1-1, Chapter 9 (restricted access) | Public Key Cryptography And Key Management (Unclassified) | Completed |
DOE P 205.1 | Departmental Cyber Security Management Policy | Completed |
DOE M 205.1-3, Admin. Change 1 | Telecommunications Security Manual | Pending Acceptance |
DOE O 205.1B, Admin. Change 1 | Department of Energy Cyber Security Program | In Progress |
DOE N 251.87 | Extension of DOE N 470.4, Reciprocal Recognition of Existing Personnel Security Clearances/Access Authorizations | Completed |
DOE O 410.2 | Management of Nuclear Materials | Completed |
DOE O 452.8 | Control of Nuclear Weapon Data | Completed |
DOE O 457.1 | Nuclear Counterterrorism | Completed |
DOE M 457.1-1 | Control Of Improvised Nuclear Device Information (Official Use Only) | Completed |
DOE P 470.1A | Safeguards and Security Program | Completed |
DOE O 470.3B | Graded Security Protection Policy | Completed |
DOE O 470.4B, Admin. Change 1 | Safeguards and Security Program | Pending Acceptance |
DOE O 471.1B | Identification and Protection of Unclassified Controlled Nuclear Information | Completed |
DOE O 471.3, Admin. Change 1 | Identifying and Protecting Official Use Only Information | Completed |
DOE M 471.3-1, Admin. Change 1 | Manual for Identifying and Protecting Official Use Only Information | Completed |
DOE O 471.6, Admin. Change 1 | Information Security | In Progress |
DOE O 472.2 | Personnel Security | Completed |
DOE O 473.3 | Protection Program Operations | Completed |
DOE O 474.2, Admin. Change 2 | Nuclear Material Control and Accountability | Pending Acceptance |
DOE O 475.1 | Counterintelligence Program | Completed |
DOE O 475.2A | Identifying Classified Information | Completed |
DOE O 5670.1A | Management And Control Of Foreign Intelligence | Completed |
DOE CG-SS-4, Change 6 | Classification and UNCI Guide for Safeguards and Security Information (Official Use Only) | Completed |
E.O. 13467 | Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information | Completed |
DOC-EAR-0001 | U.S. Department of Commerce - Export Administration Regulation | Completed |
DOT-TFI-OFAC | U.S. Department of Treasury - Terrorism and Financial Intelligence, Office of Foreign Assets Control (OFAC) | Completed |
DOS-ECR 121 | U.S. Department of State Export Control Regulations International Traffic In Arms Regulations Part 121 - The U.S. Munitions List | Completed |
DOE-HQ Memo 06/25/2010 | Office of Science (SC) Program Cyber Security Plan (PCSP) | Completed |
Memo Malosh (03/27/2007) | Memorandum from George J. Malosh, SC Chief Operating Officer, to Distribution, title Preparation of Continuity of Operations Plans, dated 03/27/2007 | Completed |
NISP | National Industrial Security Policy | Completed |
NSD 42 | National Policy for the Security of National Security Telecommunications and Information Systems | Completed |
NSDD 298 | National Operations Security Program | Completed |
OMB M-04-25 | FY 2004 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management | Completed |
OMB M 04-26 | Personal Use Policies and "File Sharing" Technology | Completed |
P.L. 83-703 (68 stat. 919) | The Atomic Energy Act of 1954 | Completed |
4.2 Parsed Responsibility
This Management System is responsible for a part of the following high-level requirements:
Document |
Title |
Parsed Unit RDR Status |
---|---|---|
OMB Circular A-130 | Management of Federal Information Resources — Appendix III, Security of Federal Automated Information Resources | Completed |
DOE O 206.1 | Department of Energy Privacy Program — Appendix A, “Privacy Impact Assessments” and Appendix B, “Response and Notification Procedures for Data Breaches Involving Personally Identifiable Information” | Completed |
DOE O 227.1 | Independent Oversight Program | Completed |
DOE O 241.1B | Scientific and Technical Information Management — 4.c. | Completed |
OMB M-06-19 | Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency Information Technology Investments — Not specified | Completed |
P.L. 107-347, 116 Stat. 289 | E-Government Act of 2002 - Federal Information Security Management Act (FISMA) — FISMA specific portion (Title III Information Security) | Completed |
5.0 Subject Areas, Program Descriptions, and Guidance Documents
The following Subject Areas are maintained by this Management System:
- Access Authorizations
- Procedure 1. Requesting an Access Authorization (AA)
- Procedure 2. Implementing the Human Reliability Program (HRP)
- Procedure 3. Maintaining Security Awareness
- Procedure 4. Authorizing Access to Sensitive Compartmented Information (SCI)
- Procedure 5. Implementing the Homeland Security Presidential Directive (HSPD-12)
- Procedure 6. Requesting Classified Visits
- Committee on Foreign Investments in the United States
- Emergency Operations
- Export Control
- Facility Clearance - Establishment/Termination
- Procedure 1. Addressing and Identifying Foreign Ownership, Control, or Influence (FOCI)
- Procedure 2. Developing, Reviewing, and Approving Site Security Plans (SSPs) and Site Safeguards and Security Plans (SSSPs)
- Procedure 3. Reviewing and Approving Nuclear Material Control and Accountability (NMC&A) Plans
- Procedure 4. Appointing a Facility Security Officer (FSO)
- Procedure 5. Establishing Access Authorizations (AA) for certain Key Management Personnel (KMP) and Exclusion Procedures
- Procedure 6. Establishing RIS (Reporting Identification Symbols)
- Procedure 7. Terminating Registrations
- Facility Operations
- Procedure 1. Managing A Classified Matter Protection and Control (CMPC) Program
- Procedure 2. Implementing and Managing an Incident of Security Concern (IOSC) Program
- Procedure 3. Managing An Operations Security (OPSEC) Plan
- Procedure 4. Reviewing and Approving Shipper/Receiver Agreements
- Procedure 5. Reviewing Significant Shipper/Receiver Differences
- Procedure 6. Establishing and Updating Nuclear Material Project Numbers
- Procedure 7. Submitting Nuclear Materials Inventory Assessments
- Procedure 8. Identifying and Facilitating Classification Documentation
- Safeguards and Security Oversight Activities
- Unclassified Visits and Assignments by Foreign Nationals
- Procedure 1. Entering a Request into the Foreign Access Central Tracking System (FACTS)
- Procedure 2. Verifying the Indices Check
- Procedure 3. Preparing a Specific Security Plan
- Procedure 4. Preparing a Cyber Security Plan
- Procedure 5. Notifying the Host of a Foreign National Visitor’s Arrival
- Procedure 6. Approving a Visit or Assignment of a National from a State Sponsor of Terrorism in the Foreign Access Central Tracking System (FACTS)
- Procedure 7. Verifying Approval of an Unclassified Foreign Visit or Assignment
- Cyber Security
- Procedure 1. Maintaining the Office of Science (SC) Threat and Risk Statement
- Procedure 2. Monitoring for Unclassified Systems
- Procedure 3. Monitoring for Classified Systems
- Procedure 4. Identifying Cyber Security Requirements for Unclassified Systems
- Procedure 5. Identifying Cyber Security Requirements for Classified Systems
- Procedure 6. Performing Designated Approving Authority (DAA) Responsibilities
- Procedure 7. Maintaining the Office of Science (SC) Program Cyber Security Plan (PCSP)
- Procedure 8. Privacy Impact Assessments
- Procedure 9. Response and Notification Procedures for Data Breaches Involving Personally Identifiable Information
6.0 References
-
CNSS Instruction No. 1253, Security Categorization and Control Selection for National Security Systems
-
CNSS Policy No. 22, Information Assurance Risk Management Policy for National Security Systems
-
NSTISSI No. 1000, National Information Assurance Certification and Accreditation Process (NIACAP)
-
DOE CG‑SS‑6, Classification and UCNI Guide for Safeguards And Security Information (Official Use Only)
-
DOE G 151.1-1A, Emergency Management Fundamentals and the Operational Emergency Base Program
-
DOE G 151.1-2, Technical Planning Basis
-
DOE G 151.1-3, Programmatic Elements
-
DOE G 151.1-4, Response Elements
-
DOE G 151.1-5, Biosafety Facilities
-
DOE M 205.1-8, Administrative Change 2, Cyber Security Incident Management Manual
-
DOE G 226.1-1, Safeguards and Security Oversight and Assessments Implementation Guide
-
DOE G 413.3-3, Safeguards and Security for Program and Project Management
-
DOE G 470.4-1, Asset Protection Analysis Guide
-
DOE G 471.3‑1, Guide to Identifying Official Use Only Information
-
DOE G 473.2‑1, Guide for Establishment of a Contingency Protective Force
-
DOE‑STD‑1171‑2009, Safeguard and Security Functional Area Qualification Standard
-
DOE‑STD‑1177‑2004, Emergency Management Functional Area Qualification Standard
-
Executive Order 13526, Classified National Security Information
- Information Security
- Presidential Policy Directive 19 (PPD-19), Protecting Whistleblowers with Access to Classified Information, dated 10/10/2012
Material Control and Accountability (MCA)
-
National Institute of Standards and Technology (NIST) Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems
-
NIST FIPS 2000, Minimum Security Requirements for Federal Information and Information Systems
-
NIST FIPS 201‑1, Change Notice 1, Personal Identity Verification (PIV) of Federal Employees and Contractors
-
NIST Special Publication (SP) 800‑26, Security Self‑Assessment Guide for Information Technology Systems, was withdrawn on 02/2007 and superceded by NIST FIPS 200, NIST SP 800-53, and NIST SP 800-53A.
-
NIST SP 800‑30, Risk Management Guide for Information Technology Systems
-
NIST SP 800‑34, Revision 1, Contingency Planning Guide for Information Technology Systems
-
NIST SP 800‑37, Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems, A Security Life Cycle Approach
-
NIST SP 800‑40, Version 2.0, Creating a Patch and Vulnerability Management Program
-
NIST SP 800‑47, Security Guide for Interconnecting Information Technology Systems
-
NIST SP 800‑50, Building an Information Technology Security Awareness and Training Program
-
NIST SP 800‑53, Revision 3, Recommended Security Controls for Federal Information Systems and Organizations
-
NIST SP 800-53A, Revision 1, Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Building Effective Security Assessment Plans
-
NIST SP 800‑59, Guideline for Identifying an Information System as a National Security System
-
NIST SP 800-60, Volume 1, Revision 1 , Guide for Mapping Types of Information and Information Systems to Security Categories, Volume 1: Guide
-
NIST SP 800-60, Volume 2, Revision 1, Guide for Mapping Types of Information and Information Systems to Security Categories, Volume 2: Appendices
-
NIST SP 800‑61, Computer Security Incident Handling Guide
-
NIST SP 800‑64, Revision 1, Security Consideration in the System Development Life Cycle
-
NIST SP 800‑65, Integrating IT Security into the Capital Planning and Investment Control Process
-
NIST SP 800‑68, Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
-
NIST SP 800‑73‑2, Interfaces for Personal Identity Verification
-
NIST SP 800‑76‑1, Biometric Data Specification for Personal Identity Verification
-
Office of Management and Budget (OMB) M-06-15, Safeguarding Personally Identifiable Information
-
Office of Science (SC) Security Program Management Plan, dated 05/2011
-
SC Unclassified Foreign Visits and Assignments
7.0 Delegations
These requirements may have been superceded or canceled and may not be currently active.
For the official active requirement list, please reference the SCMS Management System Descriptions.
The following delegations affect this Management System:
Date Issued | Delegated By | Delegated To | Topic (Click to view the Delegation) | Basis/Source |
---|---|---|---|---|
01/22/2010 | Chu, Steven (S-1) | Deputy Secretary (S-2) |
Personnel Actions, Legal Hearings and Proceedings, CFO, Management Functions, Energy Services, Emergency Authorities, ES&H, Security Operations | |
02/24/2011 | Brinkman, W. F. (SC-1) | Binkley (SC-1) Dehmer (SC-2) Gillo (SC-26.2) Hallman (SC-26) Hitchcock (SC-21) Jones (SC-31) Kung (SC-22) Lehman (SC-28) Malosh (SC-3) McBrearty (SC-3) O'Malley (SC-2) Procario (SC-25) Salmon (SC-4) Short (SC-31.3) Streit (SC-32) Synakowski (SC-24) Thornock (SC-31.3) Valdez (SC-27) Warnick (SC-44) Weatherwax (SC-23) |
Unclassified Foreign Visits and Assignments | DOE O 142.3 DOE O 142.3A |
08/17/2012 | McBrearty, Joseph (SC-3) | Purucker (CH) |
Delegations of Authority for Office of Science Operations and Safety, Property Management, and Safeguards and Security | 10 CFR 10 CFR 600 10 CFR 600.321 10 CFR 830 10 CFR 830, Subpart A 10 CFR 830, Subpart B 10 CFR 835 DEAR 952 DEAR 952.217-70 DOE O 205.1B DOE O 232.2 DOE O 361.1B DOE O 414.1D DOE O 420.1B DOE O 420.1B, Change 1 DOE O 422.1 DOE O 425.1D DOE O 430.1B DOE O 430.1B, Admin. Change 2 DOE O 433.1 DOE O 433.1B DOE O 450.2 DOE O 470.4 DOE O 470.4B DOE O 473.3 DOE O 474.2 DOE O 474.2, Admin. Change 1 DOE O 580.1 DOE O 580.1A 10 CFR 600.132 10 CFR 600.231 DEAR 917.74
|
08/17/2012 | McBrearty, Joseph (SC-3) | Kelly (OR) |
Delegations of Authority for the Office of Science Operations and Safety, Property Management, and Safeguards and Security | 10 CFR 10 CFR 600 10 CFR 600.321 DEAR 952 DEAR 952.217-70 DOE O 205.1B DOE O 232.2 DOE O 361.1B DOE O 414.1D DOE O 422.1 DOE O 470.4 DOE O 470.4B DOE O 473.3 DOE O 474.2 DOE O 474.2, Admin. Change 1 DOE O 580.1 DOE O 580.1A 10 CFR 600.132 10 CFR 600.231 DEAR 917.74 DOE O 430.1B, Change 2
|
08/25/2012 | McBrearty, Joseph (SC-3) | Moore (ORSO) |
Delegations of Authority for the Office of Science Operations and Safety, Property Management, and Safeguards and Security | 10 CFR 10 CFR 600 10 CFR 600.321 10 CFR 830 10 CFR 830, Subpart A 10 CFR 830, Subpart B DEAR 952 DEAR 952.217-70 DOE O 205.1B DOE O 232.2 DOE O 361.1B DOE O 414.1D DOE O 420.1B DOE O 420.1B, Change 1 DOE O 422.1 DOE O 425.1D DOE O 426.2 DOE O 430.1B DOE O 430.1B, Admin. Change 2 DOE O 450.2 DOE O 470.4 DOE O 470.4B DOE O 473.3 DOE O 474.2 DOE O 474.2, Admin. Change 1 DOE O 580.1 DOE O 580.1A 10 CFR 600.132 10 CFR 600.231 10 CFR 835 Subpart B DEAR 917.74
|
09/12/2012 | Jones, Marcus (SC-31) | McBrearty (SC-3) Williams (EM-1) Moore (ORSO) |
Official Designated Federal Security Authority for Building 3019 | 2006 Energy and Water Development Appropriations Act (H. R. 2419) Memorandum of Agreement between Science and Emergency Management
|
08/17/2012 | McBrearty, Joseph (SC-3) | Snyder (PNSO) |
Delegations of Authority for the Office of Science Operations and Safety, Property Management, and Safeguards and Security | 10 CFR 10 CFR 600 10 CFR 600.321 10 CFR 830 10 CFR 830, Subpart A 10 CFR 830, Subpart B 10 CFR 835 DEAR 952 DEAR 952.217-70 DOE O 205.1B DOE O 232.2 DOE O 361.1B DOE O 414.1D DOE O 420.1B DOE O 420.1B, Change 1 DOE O 422.1 DOE O 425.1D DOE O 430.1B DOE O 430.1B, Admin. Change 2 DOE O 450.2 DOE O 470.4 DOE O 470.4B DOE O 473.3 DOE O 474.2 DOE O 474.2, Admin. Change 1 DOE O 580.1 DOE O 580.1A 10 CFR 600.132 10 CFR 600.231 DEAR 917.74
|
08/17/2012 | McBrearty, Joseph (SC-3) | Richards (BSO) |
Delegations of Authority for Office of Science Operations and Safety, Property Management, and Safeguards and Security | 10 CFR 10 CFR 600 10 CFR 600.321 DEAR 952 DEAR 952.217-70 DOE O 205.1B DOE O 232.2 DOE O 361.1B DOE O 414.1D DOE O 422.1 DOE O 430.1B DOE O 430.1B, Admin. Change 2 DOE O 470.4 DOE O 470.4B DOE O 473.3 DOE O 474.2 DOE O 474.2, Admin. Change 1 DOE O 580.1 DOE O 580.1A 10 CFR 600.132 10 CFR 600.231 10 CFR 835 Subpart B DEAR 917.74
|
08/17/2012 | McBrearty, Joseph (SC-3) | Baebler (AMSO) |
Delegations of Authority for Office of Science Operations and Safety, Property Management, and Safeguards and Security | 10 CFR 600.321 DEAR 952.217-70 DOE O 205.1B DOE O 232.2 DOE O 361.1B DOE O 414.1D DOE O 422.1 DOE O 430.1B, Admin. Change 2 DOE O 470.4B DOE O 473.3 DOE O 474.2, Admin. Change 1 DOE O 580.1A 10 CFR 600.132 10 CFR 600.231 10 CFR 835 Subpart B
|
08/17/2012 | McBrearty, Joseph (SC-3) | Golan (SSO) |
Delegations of Authority for Office of Science Operations and Safety, Property Management, and Safeguards and Security | 10 CFR 10 CFR 600 10 CFR 600.321 DEAR 952 DEAR 952.217-70 DOE O 205.1B DOE O 232.2 DOE O 361.1B DOE O 414.1D DOE O 422.1 DOE O 430.1B DOE O 430.1B, Admin. Change 2 DOE O 470.4 DOE O 470.4B DOE O 473.3 DOE O 474.2 DOE O 474.2, Admin. Change 1 DOE O 580.1 DOE O 580.1A 10 CFR 600.132 10 CFR 600.231 10 CFR 835 Subpart B
|
08/17/2012 | McBrearty, Joseph (SC-3) | Crescenzo (BHSO) |
Delegations of Authority for Office of Science Operations and Safety, Property Management, and Safeguards and Security | 10 CFR 10 CFR 600 10 CFR 600.321 DEAR 952 DEAR 952.217-70 DOE O 205.1B DOE O 232.2 DOE O 361.1B DOE O 414.1D DOE O 422.1 DOE O 430.1B DOE O 430.1B, Admin. Change 2 DOE O 470.4 DOE O 470.4B DOE O 473.3 DOE O 474.2 DOE O 474.2, Admin. Change 1 DOE O 580.1 DOE O 580.1A 10 CFR 600.132 10 CFR 600.231 10 CFR 835 Subpart B DEAR 917.74
|
08/17/2012 | McBrearty, Joseph (SC-3) | Arango (TJSO) |
Delegations of Authority for Office of Science Operations and Safety, Property Management, and Safeguards and Security | 10 CFR 10 CFR 600 10 CFR 600.321 DEAR 952 DEAR 952.217-70 DOE O 205.1B DOE O 232.2 DOE O 361.1B DOE O 414.1D DOE O 422.1 DOE O 430.1B DOE O 430.1B, Admin. Change 2 DOE O 470.4 DOE O 470.4B DOE O 473.3 DOE O 474.2 DOE O 474.2, Admin. Change 1 DOE O 580.1 DOE O 580.1A 10 CFR 600.132 10 CFR 600.231 10 CFR 835 Subpart B DEAR 917-74
|
08/17/2012 | McBrearty, Joseph (SC-3) | Dikeakos (PSO) |
Delegations of Authority for Office of Science Operations and Safety, Property Management, and Safeguards and Security | 10 CFR 600.321 DEAR 952.217-70 DOE O 205.1B DOE O 232.2 DOE O 361.1B DOE O 414.1D DOE O 422.1 DOE O 430.1B, Admin. Change 2 DOE O 470.4B DOE O 473.3 DOE O 474.2, Admin. Change 1 DOE O 580.1A 10 CFR 600.132 10 CFR 600.231 10 CFR 835 Subpart B DEAR 917.74
|
08/17/2012 | McBrearty, Joseph (SC-3) | Weis (FSO) |
Delegations of Authority for Office of Science Operations and Safety, Property Management, and Safeguards and Security | 10 CFR 600.321 DEAR 952.217-70 DOE O 205.1B DOE O 232.2 DOE O 361.1B DOE O 414.1D DOE O 422.1 DOE O 430.1B, Admin. Change 2 DOE O 470.4B DOE O 473.3 DOE O 474.2, Admin. Change 1 DOE O 580.1A 10 CFR 600.132 10 CFR 600.231 10 CFR 835 Subpart B DEAR 917.74
|
10/25/2012 | McBrearty, Joseph (SC-3) | Livengood (ASO) |
Delegations of Authority for Office of Science Operations and Safety, Property Management, and Safeguards and Security | 10 CFR 600.321 10 CFR 830, Subpart A DEAR 952.217-70 DOE O 205.1B DOE O 221.3A DOE O 361.1B DOE O 414.1D DOE O 420.1B, Change 1 DOE O 422.1 DOE O 425.1D DOE O 430.1B, Admin. Change 2 DOE O 450.2 DOE O 470.4B DOE O 473.3 DOE O 474.2, Admin. Change 1 DOE O 580.1A 10 CFR 600.132 10 CFR 600.231 10 CFR 835 Subpart B DEAR 917.74
|
05/18/2012 | Chu, Steven (S-1) | Under Secretary of Science (S-4) |
Condemnation Proceedings, Comm. Applications of Energy Tech., Suspension of Nuclear Operations, Program Opportunity Notices, Altering Organization Units, Fed. Advisory Committee Members, AMSE, Sales/Lease Real Propery, Cost-Sharing, Reduction in Cost Sharing, Intervention of utility matters, and Operate DOE Isotope Program | 42 USC 2011 42 USC 5907 42 USC 7234 42 USC 7252 42 USC 7253 5 USC App.2 50 USC 2811 Public Law 101-101 Public Law 103-316 Public Law 106-554 Public Law 109-58 Public Law 93-577
|
05/18/2012 | Chu, Steven (S-1) | Director, Office of Science (SC-1) |
New Energy Technologies; Program Opportunity notices, Establish Organizational units, Nominate Federal Advisory Committees, AMSE, Leasing space, Sale and lease of real property, Intervention of utility matters, Operate DOE Isotope Program | 18 U.S.C., Section 208 P.L. 95-91 42 USC 2011 42 USC 5907 42 USC 7234 42 USC 7252 42 USC 7253 5 USC App.2 50 USC 2811 Public Law 101-101 Public Law 103-316 Public Law 106-554 Public Law 93-577
|
Last Annual Review: 10/15/2012
Annual Review Period:
Second Quarter
This is not the online OFFICIAL SCMS COPY of this file. Before using this printed copy, verify that it is the most current version by checking the Last Major Revision and Last Minor Revision dates (at the bottom of each document) on the SCMS Web site.
This is the online OFFICIAL SCMS COPY of this file. Before using a printed copy, verify that it is the most current version by checking the Last Major Revision and Last Minor Revision dates (at the bottom of each document) on the SCMS Web site.
Send a question or comment to the SCMS Help Desk.
Disclaimer
Last Major SCMS Revision: 06/15/2009