Security of Radioactive Sources in Radiation Facilities
Security of Radioactive Sources in Radiation Facilities
Security of Radioactive Sources in Radiation Facilities
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
5.3 Supplier <strong>of</strong> the Source<br />
The source supplier should possess a licence from the Competent Authority<br />
(Chairman, AERB) to supply radioactive material as required <strong>in</strong> the Atomic<br />
Energy (<strong>Radiation</strong> Protection) Rules, 2004 and should further ensure that the<br />
radioactive material is be<strong>in</strong>g supplied only to the person authorised to receive<br />
and handle the source. Further, appropriate security measures should be<br />
implemented <strong>in</strong> the supplier’s facility on the basis <strong>of</strong> an approved security<br />
plan. The responsibilities <strong>of</strong> the employer, licencee, RSO, workers and other<br />
personnel <strong>in</strong>clud<strong>in</strong>g the security personnel should be identified <strong>in</strong> the security<br />
plan.<br />
5.4 Role <strong>of</strong> Law and Enforcement Agencies<br />
The government agencies deal<strong>in</strong>g with law and enforcement constantly review<br />
the prevail<strong>in</strong>g security scenario and communicate the necessary warn<strong>in</strong>gs/<br />
alerts/advisories about perceived security threats, sufficiently <strong>in</strong> advance to<br />
the concerned agencies. The licencee is required to work out a coord<strong>in</strong>ation<br />
mechanism with the concerned law and enforcement agencies as mentioned<br />
<strong>in</strong> this document to ensure that the facility us<strong>in</strong>g the radioactive source gets<br />
these warn<strong>in</strong>gs/alerts/advisories <strong>in</strong> time so that appropriate security measures<br />
could be implemented. The threat assessment process adopted by the law<br />
and enforcement authority would generally be based on their knowledge <strong>of</strong><br />
the characteristics <strong>of</strong> the potential <strong>of</strong>fender(s), who may be an <strong>in</strong>ternal or an<br />
external adversary. The law and enforcement authority is also expected to<br />
extend the necessary support <strong>in</strong> the event <strong>of</strong> a theft <strong>of</strong> a source. Where<br />
necessary, police protection should be available to personnel <strong>in</strong>vestigat<strong>in</strong>g<br />
cases <strong>of</strong> theft <strong>of</strong> a source.<br />
31