Security of Radioactive Sources in Radiation Facilities
Security of Radioactive Sources in Radiation Facilities
Security of Radioactive Sources in Radiation Facilities
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
4.4 <strong>Security</strong> <strong>of</strong> <strong>Radioactive</strong> <strong>Sources</strong> dur<strong>in</strong>g their Transport<br />
A radioactive source could be <strong>in</strong> storage at the facility or <strong>in</strong> use there. It<br />
could also be <strong>in</strong> transport either from the supplier <strong>of</strong> the source to the facility,<br />
or from one location to another for operational reasons, or the source is be<strong>in</strong>g<br />
sent to a disposal facility. As mentioned earlier, transport <strong>of</strong> a radioactive<br />
source needs special consideration from the view <strong>of</strong> safety and security. The<br />
guidance for this purpose are available separately <strong>in</strong> the AERB safety guide<br />
No. AERB/NRF-TS/SG-10 [7] and these should be used by the licencee<br />
whenever the source is <strong>in</strong> transport.<br />
4.5 Measures Common to <strong>Security</strong> Levels A and B<br />
There are several measures, which are common to achieve the performance<br />
objectives <strong>of</strong> <strong>Security</strong> Levels A and B. These are outl<strong>in</strong>ed <strong>in</strong> the follow<strong>in</strong>g<br />
paragraphs:<br />
4.5.1 Availability <strong>of</strong> Formal <strong>Security</strong> Plans<br />
Formal security plan should be prepared for facilities possess<strong>in</strong>g Category-1<br />
sources, got duly registered with District Law and Enforcement Authority<br />
and submitted to Competent Authority for review. The specimen format for<br />
registration <strong>of</strong> security plan is given is Appendix-VI. For facility possess<strong>in</strong>g<br />
sources <strong>of</strong> category 2 to 5, the security plan should be submitted to competent<br />
authority for review. This plan should describe how the security provisions<br />
<strong>in</strong> this document are met for the source(s) under consideration. It should be<br />
reviewed at least annually to ensure that it is still current and applicable.<br />
Appendix-VII outl<strong>in</strong>es some <strong>of</strong> the issues that should be considered <strong>in</strong> a<br />
security plan. <strong>Security</strong> systems are effective only if they are fully implemented<br />
and are periodically tested and evaluated. System evaluations should be<br />
performed and documented as part <strong>of</strong> a quality assurance system. Whenever<br />
any component <strong>of</strong> the security system has been compromised, steps should<br />
be taken to suitably rectify the system. Towards this, there should mechanisms<br />
to detect any attempt to tamper the security system.<br />
4.5.2 Ensur<strong>in</strong>g <strong>Security</strong> <strong>of</strong> Critical Information<br />
Ensur<strong>in</strong>g <strong>in</strong>formation security is a critical factor for any security plan.<br />
Particular attention should be paid to this aspect. The ‘need to know’ pr<strong>in</strong>ciple<br />
should be adopted <strong>in</strong> the dissem<strong>in</strong>ation <strong>of</strong> such <strong>in</strong>formation and the distribution<br />
<strong>of</strong> relevant documents has to be controlled. Information, <strong>in</strong> this regard, applies<br />
to those perta<strong>in</strong><strong>in</strong>g to source locations, specific security measures or<br />
weaknesses <strong>in</strong> the licencee’s system <strong>of</strong> management <strong>of</strong> sources, etc. Typically,<br />
this would <strong>in</strong>clude:<br />
(a)<br />
specific locations <strong>of</strong> sources;<br />
15