Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
100,000 or greater
50,000-99,999
3,301-49,999
* EPA interprets "completion" to mean the date on which the vulnerability assessment and certification were sent to EPA. Community water systems that fail to comply
with their respective vulnerability assessment submission requirements 6 months after the deadline date may be liable for failing to comply with both the vulnerability
assessment submission requirements and the emergency response plan certification requirements of the Bioterrorism Act.
1/2
11/5/2014
Before receiving water utilities' vulnerability assessments, EPA is required to implement a protocol to protect these assessments from unauthorized disclosure. Through
coordination with federal law enforcement and intelligence officials, EPA has completed an information protection protocol that outlines measures to be taken to ensure
information security. The protocol includes restrictions on persons who are allowed access to the assessments, actions those persons must take to ensure the security of the
information, and security provisions regarding storage and handling of these documents. The security measures implemented include the following:
An EPA Information Security Manager with "Top Secret" clearance will oversee the protection of information, manage protocol implementation, and conduct routine
security checks.
Only persons designated by the Assistant Administrator for Water will have access to the vulnerability assessments and information derived from them (except as
specified under sections 1433(a)(6) and (7) of the Safe Drinking Water Act); all designees must have "Secret" clearance.
Potential designees must undergo security training and receive refresher training annually, and designees must sign an access agreement summarizing their
responsibilities and liabilities if information related to the vulnerability assessment is knowingly or recklessly disclosed.
Access will be withdrawn from a designee upon termination of employment or change in work duties or status, and the designee will be requested to sign a
confidentiality agreement before access is terminated.
All vulnerability assessments will be housed in a secure location at EPA headquarters and locked to restrict access when not in use.
A secure room will be installed for review and processing of the documents.
Documents will be covered and labeled as sensitive; a document tracking system will render the documents traceable at all times; and copying, faxing, and loaning
of the assessments will be prohibited except as authorized by the Director of the Office of Ground Water and Drinking Water.
http://water.epa.gov/infrastructure/watersecurity/lawsregs/bioterrorismact.cfm
2/2