29.01.2015 Views

Security of Radioactive Sources in Radiation Facilities

Security of Radioactive Sources in Radiation Facilities

Security of Radioactive Sources in Radiation Facilities

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5.3 Supplier <strong>of</strong> the Source<br />

The source supplier should possess a licence from the Competent Authority<br />

(Chairman, AERB) to supply radioactive material as required <strong>in</strong> the Atomic<br />

Energy (<strong>Radiation</strong> Protection) Rules, 2004 and should further ensure that the<br />

radioactive material is be<strong>in</strong>g supplied only to the person authorised to receive<br />

and handle the source. Further, appropriate security measures should be<br />

implemented <strong>in</strong> the supplier’s facility on the basis <strong>of</strong> an approved security<br />

plan. The responsibilities <strong>of</strong> the employer, licencee, RSO, workers and other<br />

personnel <strong>in</strong>clud<strong>in</strong>g the security personnel should be identified <strong>in</strong> the security<br />

plan.<br />

5.4 Role <strong>of</strong> Law and Enforcement Agencies<br />

The government agencies deal<strong>in</strong>g with law and enforcement constantly review<br />

the prevail<strong>in</strong>g security scenario and communicate the necessary warn<strong>in</strong>gs/<br />

alerts/advisories about perceived security threats, sufficiently <strong>in</strong> advance to<br />

the concerned agencies. The licencee is required to work out a coord<strong>in</strong>ation<br />

mechanism with the concerned law and enforcement agencies as mentioned<br />

<strong>in</strong> this document to ensure that the facility us<strong>in</strong>g the radioactive source gets<br />

these warn<strong>in</strong>gs/alerts/advisories <strong>in</strong> time so that appropriate security measures<br />

could be implemented. The threat assessment process adopted by the law<br />

and enforcement authority would generally be based on their knowledge <strong>of</strong><br />

the characteristics <strong>of</strong> the potential <strong>of</strong>fender(s), who may be an <strong>in</strong>ternal or an<br />

external adversary. The law and enforcement authority is also expected to<br />

extend the necessary support <strong>in</strong> the event <strong>of</strong> a theft <strong>of</strong> a source. Where<br />

necessary, police protection should be available to personnel <strong>in</strong>vestigat<strong>in</strong>g<br />

cases <strong>of</strong> theft <strong>of</strong> a source.<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!