29.01.2015 Views

Security of Radioactive Sources in Radiation Facilities

Security of Radioactive Sources in Radiation Facilities

Security of Radioactive Sources in Radiation Facilities

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Security</strong><br />

Functions<br />

Detect<br />

Delay<br />

Response<br />

<strong>Security</strong><br />

management<br />

APPENDIX-III<br />

SECURITY LEVELS AND SECURITY OBJECTIVES<br />

<strong>Security</strong> Level A<br />

(To prevent<br />

unauthorised<br />

removal)<br />

<strong>Security</strong> objectives<br />

<strong>Security</strong> Level B<br />

(To m<strong>in</strong>imise<br />

likelihood <strong>of</strong><br />

unauthorised<br />

removal)<br />

Provide immediate detection <strong>of</strong> unauthorised<br />

access to the secured area/source location<br />

Provide immediate detection <strong>of</strong> any attempted<br />

unauthorised removal <strong>of</strong> the source<br />

Provide immediate assessment <strong>of</strong> detection<br />

Provide immediate communication to<br />

response personnel<br />

Provide a means to detect loss through<br />

verification<br />

Provide delay after Provide delay to<br />

detection sufficient for m<strong>in</strong>imise the<br />

response personnel to likelihood <strong>of</strong> unauthorised<br />

<strong>in</strong>terrupt the unauthorised<br />

removal<br />

removal<br />

Respond to assess<br />

alarm <strong>in</strong> time and with<br />

sufficient resources to<br />

<strong>in</strong>terrupt and prevent<br />

the unauthorised<br />

removal<br />

Provide immediate<br />

<strong>in</strong>itiation <strong>of</strong> response<br />

<strong>Security</strong> Level C<br />

(To reduce<br />

likelihood <strong>of</strong><br />

unauthorised<br />

removal)<br />

------<br />

Provide detection <strong>of</strong><br />

unauthorised removal<br />

<strong>of</strong> the source<br />

Impede the unauthorised<br />

removal<br />

Implement appropriate<br />

action <strong>in</strong> the<br />

event <strong>of</strong> unauthorised<br />

removal <strong>of</strong> a source<br />

Provide access controls to source location that permits access to<br />

authorised persons only<br />

Ensure trustworth<strong>in</strong>ess for <strong>in</strong>dividuals <strong>in</strong>volved <strong>in</strong> the management<br />

<strong>of</strong> sources<br />

Identify and protect sensitive <strong>in</strong>formation<br />

Provide a security plan<br />

Ensure a capability to manage security events covered by security<br />

cont<strong>in</strong>gency plans<br />

Establish security event report<strong>in</strong>g system<br />

41

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!