29.01.2015 Views

Security of Radioactive Sources in Radiation Facilities

Security of Radioactive Sources in Radiation Facilities

Security of Radioactive Sources in Radiation Facilities

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.4 <strong>Security</strong> <strong>of</strong> <strong>Radioactive</strong> <strong>Sources</strong> dur<strong>in</strong>g their Transport<br />

A radioactive source could be <strong>in</strong> storage at the facility or <strong>in</strong> use there. It<br />

could also be <strong>in</strong> transport either from the supplier <strong>of</strong> the source to the facility,<br />

or from one location to another for operational reasons, or the source is be<strong>in</strong>g<br />

sent to a disposal facility. As mentioned earlier, transport <strong>of</strong> a radioactive<br />

source needs special consideration from the view <strong>of</strong> safety and security. The<br />

guidance for this purpose are available separately <strong>in</strong> the AERB safety guide<br />

No. AERB/NRF-TS/SG-10 [7] and these should be used by the licencee<br />

whenever the source is <strong>in</strong> transport.<br />

4.5 Measures Common to <strong>Security</strong> Levels A and B<br />

There are several measures, which are common to achieve the performance<br />

objectives <strong>of</strong> <strong>Security</strong> Levels A and B. These are outl<strong>in</strong>ed <strong>in</strong> the follow<strong>in</strong>g<br />

paragraphs:<br />

4.5.1 Availability <strong>of</strong> Formal <strong>Security</strong> Plans<br />

Formal security plan should be prepared for facilities possess<strong>in</strong>g Category-1<br />

sources, got duly registered with District Law and Enforcement Authority<br />

and submitted to Competent Authority for review. The specimen format for<br />

registration <strong>of</strong> security plan is given is Appendix-VI. For facility possess<strong>in</strong>g<br />

sources <strong>of</strong> category 2 to 5, the security plan should be submitted to competent<br />

authority for review. This plan should describe how the security provisions<br />

<strong>in</strong> this document are met for the source(s) under consideration. It should be<br />

reviewed at least annually to ensure that it is still current and applicable.<br />

Appendix-VII outl<strong>in</strong>es some <strong>of</strong> the issues that should be considered <strong>in</strong> a<br />

security plan. <strong>Security</strong> systems are effective only if they are fully implemented<br />

and are periodically tested and evaluated. System evaluations should be<br />

performed and documented as part <strong>of</strong> a quality assurance system. Whenever<br />

any component <strong>of</strong> the security system has been compromised, steps should<br />

be taken to suitably rectify the system. Towards this, there should mechanisms<br />

to detect any attempt to tamper the security system.<br />

4.5.2 Ensur<strong>in</strong>g <strong>Security</strong> <strong>of</strong> Critical Information<br />

Ensur<strong>in</strong>g <strong>in</strong>formation security is a critical factor for any security plan.<br />

Particular attention should be paid to this aspect. The ‘need to know’ pr<strong>in</strong>ciple<br />

should be adopted <strong>in</strong> the dissem<strong>in</strong>ation <strong>of</strong> such <strong>in</strong>formation and the distribution<br />

<strong>of</strong> relevant documents has to be controlled. Information, <strong>in</strong> this regard, applies<br />

to those perta<strong>in</strong><strong>in</strong>g to source locations, specific security measures or<br />

weaknesses <strong>in</strong> the licencee’s system <strong>of</strong> management <strong>of</strong> sources, etc. Typically,<br />

this would <strong>in</strong>clude:<br />

(a)<br />

specific locations <strong>of</strong> sources;<br />

15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!