We have archived this page and will not be updating it.

You can use it for research or reference.

Language selection

Search


Archived Web Page: Draft for Public Consultation: RD/GD-338: Security Measures for Sealed Sources

Archived information

Archived information is provided for reference, research or recordkeeping purposes. It is not subject to the Government of Canada Web Standards and has not been altered or updated since it was archived. Please contact us to request a format other than those available.

Preface

Regulatory document RD/GD-338, Security Measures for Sealed Sources sets out the minimum physical security measures that licensees must implement to prevent the loss, sabotage, illegal use, illegal possession, or illegal removal of sealed sources in storage at the site of a licensed activity. This includes measures to prevent the loss, sabotage, illegal use, illegal possession, or illegal removal of sealed sources while they are in transport or being stored during transportation.

This document also provides information and guidance on how to meet the minimum physical security measures, including measures related to transport vehicles, containers and security plans. This document applies to transport by road within Canada only (there are other instruments and technical instructions that regulate the safe transport of dangerous goods by sea, air and rail).

In September 2003, the International Atomic Energy Agency (IAEA) approved the Code of Conduct on the Safety and Security of Radioactive Sources. Canada, along with many other countries, has undertaken to abide by this Code and work toward its full implementation. RD/GD-338, Security Measures for Sealed Sources supports the regulatory framework to enforce international guidelines set by the IAEA, and provides consistency in the application of security measures.

Most carriers are not licensed by the Canadian Nuclear Safety Commission (CNSC) and are not subject to the security requirements applicable to CNSC licensees when transporting or storing sealed sources while in transit. This document is intended to assist licensees with contracting carriers, so as to ensure that specific physical security measures are taken into consideration when transporting sealed sources, during storage or while in transit.

RD/GD-338, Security Measures for Sealed Sources reflects the security goals of United Nations specialized agencies and programs – including the International Maritime Organization (IMO), the International Civil Aviation Organization (ICAO) and other intergovernmental organizations such as the International Carriage by Rail – as they have taken similar steps to provide improved security in the transport of dangerous goods carried by sea, air and rail. These organizations have developed various instruments, such as the International Maritime Dangerous Goods Code, and technical instructions for the safe transport of dangerous goods by air.

This document applies to sealed radioactive sources (encapsulated or solid) and does not apply to unsealed radioactive substances. This document applies to Category 1, 2, and 3 sources and provides “best practices” for Category 4 and 5 sources. In this document, the terms Category 1 to 5 sources are used as defined in the IAEA’s Code of Conduct on the Safety and Security of Radioactive Sources or IAEA/TECDOC-1344, Categorization of Radioactive Sources.

Nothing contained in this document is to be construed as relieving any licensee from pertinent requirements. It is the licensee’s responsibility to identify and comply with all applicable regulations and licence conditions.

Table of Contents

1.0 Introduction

1.1 Purpose

This regulatory document sets out the minimum security measures that licensees must implement to prevent the loss, sabotage, illegal use, illegal possession, or illegal removal of sealed sources in storage at the site of a licensed activity. This also includes measures to prevent the loss, sabotage, illegal use, illegal possession, or illegal removal of sealed sources while they are in transport or being stored during transportation.

1.2 Scope

This document describes the minimum security measures required for the storage of sealed sources, and includes measures for both technical and administrative physical security. It also sets out the minimum security measures that a licensee must ensure a carrier of sealed sources meets while the sealed sources are in transport or being stored during transportation. It includes measures related to transport vehicles, containers and security plans.

This document also provides information and guidance on how to meet the security requirements.

This document applies to transport by road within Canada only (there are many instruments and technical instructions that regulate the safe transport of dangerous goods by sea, air and rail).

This document applies to sealed radioactive sources (encapsulated or solid) and does not apply to unsealed radioactive substances. This document applies to Category 1, 2, and 3 sources and provides “best practices” for Category 4 and 5 sources. In this document, the terms Category 1 to 5 sources are used as defined in the International Atomic Energy Agency’s (IAEA) Code of Conduct on the Safety and Security of Radioactive Sources [1] or IAEA/TECDOC-1344, Categorization of Radioactive Sources [2] (see also glossary).

1.3 Relevant regulations

The following provisions of the Nuclear Safety and Control Act (NSCA) and regulations made under the NSCA are relevant to this regulatory document:

  • paragraphs 3(1)(g) and (h) of the General Nuclear Safety and Control Regulations state that “an application for a licence shall contain the following information: […]
    (g) the proposed measures to control access to the site of the activity to be licensed and the nuclear substance, prescribed equipment or prescribed information;
    (h) the proposed measures to prevent loss or illegal use, possession or removal of the nuclear substance, prescribed equipment or prescribed information”
  • paragraphs 12(1)(c), (g), (h) and (j) of the General Nuclear Safety and Control Regulations state that “every licensee shall […]
    (c) take all reasonable precautions to protect the environment and the health and safety of persons and to maintain the security of nuclear facilities and of nuclear substances; […]
    (g) implement measures for alerting the licensee to the illegal use or removal of a nuclear substance, prescribed equipment or prescribed information, or the illegal use of a nuclear facility;
    (h) implement measures for alerting the licensee to acts of sabotage or attempted sabotage anywhere at the site of the licensed activity; […]
    (j) instruct the works on the physical security program at the site of the licensed activity and on their obligations under that program”
  • sections 21, 22, and 23 of the General Nuclear Safety and Control Regulations define prescribed information and provide details on which persons may possess, transfer, import, export, use, or disclose prescribed information
  • paragraphs 36(1)(a) and (d) of the Nuclear Substances and Radiation Devices Regulations state that “every licensee shall keep the following records:
    (a) a record of the following information in respect of any nuclear substance in the licensee’s possession that is referred to in the licence:
    (i) the name, quantity, form and location of the nuclear substance,
    (ii) where the nuclear substance is a sealed source, the model and serial number of the source,
    (iii) where the nuclear substance is contained in a radiation device, the model and serial number of the device,
    (iv) the quantity of the nuclear substance used, and
    (v) the manner in which the nuclear substance was used;

    (d) a record of the training received by each worker”
  • section 17 of the Packaging and Transport of Nuclear Substances Regulations states that “every consignor of radioactive material shall include in the transport documents for the consignment the information referred to in paragraph 549 of the IAEA Regulations [3] which shall be clearly and indelibly printed in the documents”

The Transportation of Dangerous Goods Regulations (Transport Canada) may also apply to sealed sources.

1.4 National and international standards

This regulatory document is consistent with modern national and international guides and standards for physical security measures for sealed sources. Publications relevant to physical security of sealed sources include:

  • IAEA, Code of Conduct on the Safety and Security of Radioactive Sources, 2004 [1]
  • IAEA, TECDOC-1344, Categorization of Radioactive Sources, 2003 (Revision of IAEA-TECDOC-1191, Categorization of Radiation Sources, 2000) [2]
  • IAEA, TS-R-1, Regulations for the Safe Transport of Radioactive Material, 1996 edition (revised) [3]
  • IAEA, TECDOC-1355, Security of Radioactive Sources – Interim Guidance for Comment, 2003 [4]
  • IAEA, TECDOC-1276, Handbook on the physical protection of nuclear materials and facilities, 2002
  • IAEA, Security in the Transport of Radioactive Material, 2008
  • IAEA, Nuclear Security Recommendations on Radioactive Material and Associated Facilities, 2011

2.0 Background

Radioactive sealed sources and prescribed equipment containing nuclear substances are regulated under the Nuclear Safety and Control Act (NSCA) and the regulations made under the NSCA, such as the General Nuclear Safety and Control Regulations, Class II Nuclear Facilities and Prescribed Equipment Regulation, Nuclear Substances and Radiation Devices Regulations and the Radiation Protection Regulations.

Additional regulations related to the transport of sources (such as packaging, documentation and safety markings) include:

  • Canadian Nuclear Safety Commission (CNSC), Packaging and Transport of Nuclear Substances Regulations
  • Transport Canada, Transportation of Dangerous Goods Regulations

This document uses a graded approach for the security of sealed sources. There are five levels of sealed sources (Categories 1 through 5). This document applies to radioactive sealed sources that may pose a significant risk to the environment and the health and safety of persons (i.e., Category 1, 2 and 3 sources). Because Categories 4 and 5 are least dangerous, this document provides prudent management practices for those categories.

2.1 Application

This regulatory document applies to sealed sources of nuclear substances identified in Table A. These substances and threshold values are based on the IAEA Code of Conduct on the Safety and Security of Radioactive Sources [1]. The main objective of this regulatory document is specific to radioactive sources that could be dangerous to the health and safety of persons and to the environment if they are not protected (that is, Category 1, 2 and 3 sources).

As outlined in IAEA TECDOC-1344 [2], if a practice involves the accumulation of several sources into a single storage or use location, where these sources are in close proximity (such as in storage facilities, manufacturing processes, or transport conveyance), the total activity is treated as a single source for the purpose of assigning a category.

The security requirements must be commensurate with the categorization, threat level and/or level of risk set by the licensee or the Government of CanadNote that mobile and portable radioactive sources may need to be treated differently, to ensure that any specific security requirements are fulfilled, thereby allowing the source to be used as intended.

2.2 Categorization of sources

The CNSC bases its categorization of sources on the IAEA source categorization as defined in IAEA/TECDOC-1344 [2]. This document recognizes that not all radioactive sources could (or should) be treated alike, and has established five source categories, ranging from Category 1 (extremely dangerous) to Category 5 (unlikely to be dangerous). The IAEA categorization methodology has found worldwide acceptance, and provides a uniform means of classifying the risk associated with the most commonly used radioactive sealed sources and radiation devices.

Sealed sources and radiation devices may be used in one location (for example, fixed gauges used on process equipment) or they may be mobile and used on different job sites (for example, radiography exposure devices and portable soil moisture density gauges).

Category 1 sources are the most dangerous sealed sources licensed by the CNSC. Because they pose the greatest risk to the health and safety of persons and to the environment, Category 1 sources are always used in a well-shielded and well-controlled location. Examples include cobalt-60 teletherapy sources used for cancer treatment and cobalt-60 sources used in pool-type irradiators to sterilize medical products. Such sources should be shielded and secured safely.

The most common example of a Category 2 source is an industrial radiography exposure devicThese devices are portable, and are widely used in pipeline work and in pressure vessel fabrication shops (particularly in the oil and gas industry).

More numerous are the fixed and portable radioactive gauges in Category 3 and Category Category 3 sources are often fixed gauges that are bolted to pipes, vessels and assembly lines where they operate reliably in harsh industrial environments, often for decades. Category 4 sources include the portable soil-moisture density gauges that are used in road construction.

Category 5 sources are low-risk. Examples include electron capture detectors used to measure pesticide residues in food, x-ray fluorescence analyzers, and low-dose brachytherapy implant sources. Some Category 5 sources may be used without a CNSC-issued licence.

Table A provides thresholds of Category 1, 2 and 3 sources, measured in activity level.

Table A: Activities corresponding to thresholds of Category 1, 2 and 3 sources
Nuclear substance Category 1 source Category 2 source Category 3 source
Terabecquerels
(TBq)
Curies
(Ci)
Terabecquerels
(TBq)
Curies
(Ci)
Terabecquerels
(TBq)
Curies
(Ci)
Americium-241 (241Am) 60 1,600 0.6 16 0.06 1.6
Americium-241) / Beryllium (241Am/Be) 60 1,600 0.6 16 0.06 1.6
Californium-252 (252Cf) 20 500 0.2 5 0.02 0.5
Cesium-137 (137Cs) 100 2,700 1 27 0.1 2.7
Cobalt-60 (60Co) 30 800 0.3 8 0.03 0.8
Curium-244 (244Cm) 50 1,300 0.5 13 0.05 1.3
Gadolinium-153 (153Gd) 1,000 27,000 10 270 1 27
Iridium-192 (192Ir) 80 2,100 0.8 21 0.08 2.1
Plutonium-238 (238Pu) 60 1,600 0.6 16 0.06 1.6
Plutonium-239 / Beryllium (239Pu/Be) 60 1,600 0.6 16 0.06 1.6
Promethium-147 (147Pm) 40,000 108,000 400 1,080 40 108
Radium-226 (226Ra) 40 1,100 0.4 11 0.04 1.1
Selenium-75 (75Se) 200 5,400 2 54 0.2 5.4
Strontium-90 (90Sr) (Yttrium-90 (90Y)) 1,000 27,000 10 270 1 27
Thulium-170 20,000 540,000 200 5,400 20 540
Ytterbium-169 300 8,100 3 81 0.3 8.1

2.2.1 Nuclear substances and thresholds for the activity levels

The materials and thresholds in Table A are based on the IAEA Code of Conduct on the Safety and Security of Radioactive Sources [1]. These thresholds aim to provide consistency between domestic and international requirements for the protection of radioactive material.

There are 16 nuclear substances that could pose a serious threat to the health and safety of people and to the environment. Irradiated fuel and mixed oxide fuel are not included in the list even though they contain quantities of radioactive material; these materials are covered by the Nuclear Security Regulations.

Terabecquerel (TBq) is the official measurement unit used for determining whether a radioactive material is a Category 1, 2, or 3 sourcBecause many licensees use Curies in their activities instead of Becquerels, the table also provides the equivalent Curie (Ci) measurement for practical usefulness.

IAEA RS-G-1.9, Categorization of Radioactive Sources [5] provides the methodology for the development of the Code of Conduct thresholds.

These regulatory requirements apply only to sealed sources. However, it is recommended that comparable security requirements be taken into account for open or unsealed sources when considering the suitability and adequacy of the storage arrangements.

2.2.2 Methodology for assigning a category

To assign a category, the total activity of all sources in one facility (storage or use) where sources are in close proximity must be equal to, or greater than, the number identified in the category. For example:

  • a teletherapy medical device with a sealed source up to 555 TBq of cobalt-60 is a Category 1 source (555 > 30)
  • a certified radiography exposure device with a sealed source of 2.5 TBq of iridium-192 is a Category 2 sealed source (80 > 2.5 > 0.8)
  • a high dose rate (HDR) brachytherapy medical device with a sealed source up to 0.44 TBq of iridium-192 is a Category 3 source (0.8 > 0.44 > 0.08)

For security control purposes, the aggregation of sources in a single storage (or use) facility can be used to determine a situation-specific sealed source category. This is done by adding the actual sealed source activities of the sources and determining the category from Table A. For example, one industrial level gauge containing a sealed source with 0.19 TBq of cesium-137 is a Category 3 source (1.0 > 0.19 > 0.1). However, when there are six of these sealed sources at a single licensed location, they can be treated as a Category 2 source (6 x 0.19 = 1.1 > 1.0).

3.0 Security Measures

3.1 General security measures

3.1.1 Requirements for general security measures

While in storage, licensees shall develop and implement technical and administrative security measures to protect the radioactive source against unauthorized removal (such as theft or loss) or sabotage.

As outlined in IAEA TECDOC-1355 [4], these measures shall integrate safety and security concepts involving industrial safety arrangements, radiation protection measures and appropriate design to achieve the necessary level of protection against unauthorized removal of radioactive sources.

3.1.2 Guidance for general security measures

The licensee should develop and maintain a threat and risk assessment to determine vulnerabilities in the existing physical protection systems designed to protect against the loss, sabotage, illegal use, illegal possession, or illegal removal during the storage or transportation of the sealed sourcThe threat and risk assessment, updated annually, is also used to determine mitigating security measures to address identified threats, manage risks or reduce/eliminate vulnerabilities.

Table B provides information on how security program subsections should be applied to Category 1 (high risk), Category 2 (high risk), Category 3 (medium risk), and Categories 4 and 5 (low risk).

Table B: Security levels and security objectives
Security program sub sections Category 1- high risk Category 2- high risk Category 3- medium risk Category 4 and 5- low risk
Facility security plan
  • updated annually or when important changes are done at the facility
  • classified prescribed and/or sensitive and stored appropriately
  • communicated on a need to know basis
  • indicate measures in case of increased threat
  • updated on a regular basis or when important changes are done at the facility
  • must be classified prescribed and/or sensitive and stored appropriately
  • communicated on a need to know basis
  • best practice
Perimeter and physical barrier (1st line of defense)
  • must be protected with at least two physical barriers (i.e., walls, cages, secure containers) to separate the source from unauthorized personnel and provide sufficient delay to allow for immediate detection, and for response personnel to intervene before the adversary can remove the source
  • source must be protected against unauthorized access and removal
Security of storage (2nd line of defense)
  • secured with good quality padlock or equivalent security system
  • equipped with a minimum of two intrusion detection systems
  • secure containers must be able to resist an attack by handheld tools
  • secured with good quality padlock or equivalent security system
  • equipped with a minimum of one intrusion detection system
  • must be stored in a secure container or location
Intrusion detection system
  • must be linked to a ULC-certified control room monitored by an operator 24/7 or an equivalent mechanism (i.e., continuous surveillance by operator) for detection, assessment, and communication with response personnel in case of security event
  • source must be protected against unauthorized access and removal
Access control
  • restrict access to authorized user only
  • two-person rule (optimal)
  • visitors, students, contractors must be escorted at all times
  • restrict access to authorized user only
  • visitors, students, contractors must be escorted at all times
  • restrict access to authorized user only
  • visitors, students, contractors must be escorted by authorized user
Transportation security plan
  • must develop and submit a specific Transport Security Plan to CNSC for review and approval
  • must develop and maintain a generic Transport Security Plan
  • best practice
  • source must be protected against unauthorized access and removal
Response protocol
  • specific response protocol and contingency plan
  • contact local law enforcement
  • effective response time
  • must develop a procedure in case of lost, stolen or malicious act involving radioactive sealed source
  • generic response protocol and contingency plan
  • must develop a procedure in case of lost, stolen or malicious act involving radioactive sealed source
Vehicle security
  • vehicle must be equipped with anti-theft or vehicle disabler and intrusion detection system, or equivalent measures
  • vehicle must be equipped with a minimum of two technical barriers to prevent unauthorized removal of the radioactive source/device
  • access must be restricted to authorized users only
  • GPS or tracking system (optimal)
  • drivers must be equipped with a means of communication in case of emergency
  • two-person rule (optimal)
  • drivers and operators must undergo a trustworthiness verification
  • vehicle must be equipped with anti-theft and intrusion detection system or equivalent measures
  • vehicle must be equipped with a minimum of two technical barriers to prevent unauthorized removal
Personal trustworthiness or background checks
  • criminal records name check
  • reference, education and employment verification
  • drivers and contractors (i.e., carriers) with unescorted access to radioactive sources must undergo this verification
  • reference, education and employment verification
  • criminal records name check
  • reference, education and employment verification
  • criminal records name check (best practice)
Information security
  • all prescribed information must be protected and be shared on a need to know basis
Maintenance and testing
  • maintenance and testing must be conducted at least every six months, and written records should be maintained
Security awareness program
  • all workers must receive security awareness training on a regular basis

3.2 Technical security measures

3.2.1 Requirements for technical security measures

Technical security measures for radioactive sources, devices or facilities shall include physical measures to:

  • prevent unauthorized personnel from gaining access to such sources
  • protect against an act or attempted act of unauthorized removal
  • protect against an act or attempted act of sabotage

Technical security measures shall also include hardware and/or security systems designed according to the principle of defence in depth and the physical protection system functions of “detection, delay and response”.

This section includes security requirements for the following measures:

  • access control
  • detection of unauthorized access
  • locking hardware and key control
  • physical barriers (secure containers, secure enclosures)
  • alarm response protocols
  • inspection, maintenance and testing of physical security-related equipment
  • security officers

Within each of the areas identified above, the licensee shall define appropriate security measures that are commensurate with the level of risk presented by the sealed source(s). Further details are provided in sections 3.2.2 to 3.2.8.

In support of paragraphs 3(1)(g) and 3(1)(h) of the General Nuclear Safety and Control Regulations, the licensee shall include in their licence application details pertaining to physical security measures for access control, physical barriers, detection of unauthorized access, maintenance and testing of physical security-related equipment.

3.2.2 Access control

3.2.2.1 Requirements for access control

The licensee shall implement access control measures (e.g., access card readers, personnel identification systems, manual or electronic locks) or use security officers to ensure that only authorized persons have access to storage areas containing sealed sources at all times.

Visitors, building maintenance staff, servicing companies and contractors who require access to the sealed source storage shall be escorted at all times if they do not possess a trustworthiness verification approved by the licensee.

3.2.2.2 Guidance for access control

To control access to the sealed sources, the licensee should:

  • prevent unauthorized access to the sources
  • monitor and maintain records of all personnel with access to secure storage areas, through the use of a log book or an access control system with tracking capabilities
  • implement effective access control measures, such as manually activated locking devices, padlocks, card reader access and biometric devices/systems, and through the use of “controlled” entry points
  • ensure the access control system incorporates measures to prevent unacceptable practices such as “pass back” or “tailgating”
  • assign individual personal identification number (PIN) codes if used in conjunction with an access control system
  • remove access rights for individuals as soon as access is no longer required
  • restrict access rights to the access control management system and software, to prevent unauthorized interference with the system database (hacking, software sabotage)
  • implement a means of duress signalling near the source storage, to provide notice to the alarm monitoring company or response personnel
  • implement a local alarm that triggers in the vicinity of the storage area, to alert nearby personnel of an intrusion or other problem in the source storage area

The security program should include security measures relating to detection, delay and response to security events (e.g., alarm detection devices, fencing, secured storage containers, immobilization of vehicles and/or trailers, security officers).

3.2.3 Detection of unauthorized access

3.2.3.1 Requirements for detection of unauthorized access

The licensee shall implement measures for the detection of attempted or actual unauthorized access in a timely manner, such as:

  • visual observation
  • video alarm assessment
  • detection devices
  • accountancy records, seals, or other tamper-indicating devices including process monitoring systems (for example, daily or twice-weekly audits, to ensure that the sources are present)

Note that, for mobile sources in use, continuous visual surveillance by operator personnel equipped with an appropriate communication link may substitute for one or both layers of barriers.

If an intrusion detection system is used, it must:

  • immediately detect any unauthorized intrusion into the sealed source storage area
  • immediately detect any tampering that may cause any of the alarm system devices to malfunction or cease to function
  • when an intrusion is detected, set off a continuous alarm signal that is both audible and visible at the licensee’s location and/or at an approved monitoring station, using a supervised communications link; the monitoring station shall be certified by a body accredited by the Standards Council of Canada, or other certification body deemed acceptable by the CNSC staff
  • include an uninterruptible power supply subject to routine testing, to ensure continuous operability of the security detection system

3.2.3.2 Guidance for detection of unauthorized access

To detect unauthorized access, the alarm system should:

  • activate immediately upon detecting an intrusion or tamper event
  • stay in an alarmed state until acknowledged by an authorized person
  • have two or more zones for each area of storage
  • have an acceptably low nuisance and/or false alarm rate
  • be certified by the Underwriters Laboratories (UL) or Underwriters Laboratories of Canada (ULC)

The licensee should:

  • ensure that alarm monitoring devices and back-up battery power are protected against tampering by unauthorized personnel (e.g., electronic panel or junction box)
  • ensure the keypad is installed within a secure environment, to prevent tampering
  • use dedicated alarm zones in the storage area (separate from any other alarm zones) and limit access to authorized users only
  • maintain an audit trail to record the cause of any alarms

For example, consider a radiography company that has a warehouse equipped with an alarm system. Two zones are set up: one zone for the warehouse and a second interior zone for the storage areDuring the day, the main alarm system for the warehouse is deactivated but the security system for the storage area remains activated and operates independently of the main system.

3.2.4 Locking hardware and key control

3.2.4.1 Requirements for locking hardware and key control

Access cards, door keys, or locks that control access to storage areas shall be restricted to personnel authorized by the licensee.

The licensee shall maintain records of all access control authorizations, including locking devices (either electronic or manual). Such records shall include the names of the individuals to whom the locking devices or combinations have been issued, and the date of issuance.

The licensee shall develop and maintain written procedures that include measures for repairing or replacing a locking device, key, access card or combination that is defective, lost, stolen, or unlawfully transferred, or has otherwise become compromised.

3.2.4.2 Guidance for locking hardware and key control

The licensee should develop, maintain and adhere to written procedures for issuing, repairing or replacing a securing device, key, access card or combination that is defective, lost, stolen or otherwise compromised.

If keys are used, the licensee should implement a key control policy to:

  • restrict the number of individuals with keys
  • restrict the number of master keys
  • prohibit employees from duplicating keys
  • use a patented key or dedicated keyway to prevent unauthorized duplication of keys
  • include a provision for employees to return keys when access is no longer required
  • ensure that key blanks are stored securely

For key control, the licensee should:

  • conduct a review of the key inventory and keyholders on a regular basis
  • note changes and additions to the key inventory and keyholders in their records
  • maintain accountability for all keys that have been issued and keys reported lost or stolen

Locks with combination codes or cipher-based keyless locks are not recommended.

When conventional locks and keys are used, they should be of good quality. Key management procedures should be designed to prevent unauthorized access or compromisThe locks should have shielded shackles, to prevent cutting of the lock.

3.2.5 Physical barriers

3.2.5.1 Requirements for physical barriers

For sealed sources whose activity is less than the threshold levels listed for Category 3 in Table A, the licensee shall store the sources in secure containers, as described in section 3.2.5.1.1.

For sealed sources whose activity is equal to or above the threshold levels listed for Categories 1, 2, or 3 in Table A, the licensee shall implement a minimum of two different physical barriers, to prevent unauthorized access to sealed sources in storage or provide delay sufficient to enable response personnel to intervene as required.

The physical barriers shall be any combination of secure containers or other secure enclosures. For example:

  • a licensee who stores a sealed source in a locked safe may locate the safe in an enclosed room that can be locked, and must secure the container in place (floor, wall or vehicle)
  • alternatively, the safe may be located within a locked metal cage or other suitable enclosure
  • the access-controlled perimeter of the licensee’s location may serve as the first secure enclosure, with a secondary secure enclosure or secure container inside, both with access control

Note that for a mobile source in use, it may not always be possible to achieve the security measures specified abovIn such cases, compensatory measures shall be implemented to provide other forms of protection (e.g., close supervision combined with an appropriate communication link).

3.2.5.1.1 Requirements for secure containers

Secure containers include items such as filing cabinets, metal boxes, safes, and wire mesh cages. For a container to be considered secure, it must be:

  • securely affixed in place
  • resistant to physical attack using handheld tools
  • fitted with a key or combination padlock, or similar lock, that can resist surreptitious or forced attack using handheld tools
  • when a wire mesh cage is used, the cage fabric must be expandable metal mesh no smaller than number 10 gauge [6]

3.2.5.1.2 Requirements for secure enclosures

Enclosures include rooms, buildings or cages that can be secureFor an enclosure to be considered secure, all exterior components (e.g., walls, doors and windows) are resistant to physical attack using handheld tools and access/egress points are equipped with access control devices, or access is controlled by security officers.

Windows that provide access to interior areas in proximity to sources must be equipped with bars (where the gap between the bars must be less than 15 cm), metal grill, expanded metal mesh, and/or retrofitted with a UL/ULC certified security film or glazinSecurity hardware attached to windows must be affixed from the inside to prevent tampering, or fitted with tamper-resistant devices if fitted from the outside.

Doors that provide access to areas where nuclear substances and radiation devices are used, processed or stored must be secured when left unattendeDoors must be solid-core wood or metal clad and installed in a reinforced frame of equivalent material. Doors must be maintained in good state of repair and fitted with non-removable pinned hinges, if the hinges are mounted on the outsidAny door glazing or large vents (grills) must be fitted with security glazing or bars, metal grills, or equivalent. Grills must be secured in place with tamper-resistant devices.

3.2.5.2 Guidance for physical barriers

Traditional barriers such as chain-link fences, locked doors, grilled windows, masonry walls and vaults are commonly used for storage of radioactive sealed sources. Barriers should be considered in relation to an adversary’s objectives.

The licensee should implement multiple physical barriers to protect the radioactive sources. Multiple barriers potentially force an adversary to bring a variety of tools to defeat each individual barrier, thereby delaying the adversary and providing the response personnel with time to intervenOne implementation of the concept of defence in depth is to have multiple layers of different barrier types along the path to complicate an adversary’s progress by requiring a variety of tools and skills (see Figure 1).

Adversary path to a storage area

Figure 1: Adversary path to a storage area

For example, multiple barriers may include:

  • a portable device (e.g., portable gauge, exposure device) stored inside a vault or safe that is bolted to the floor and capable of resisting common attack tools
  • a mobile device (e.g., a brachytherapy unit) may be chained to the floor within the storage areThe chain is made of material resistant to common attack tools and is secured with a good quality padlock that has the same level of robustness (e.g., shielded shackles)
  • a solid-core door made of wood or metal, installed with non-removable screws, pinned door hinges, a latch protector and an automatic door closer
  • a window equipped with laminated window-film resistant to burglar attacks, metal mesh or metal bars spaced at 15 centimetres or less, and installed with non-removable screws

3.2.5.2.1 Guidance for secure containers

The storage location and/or container should:

  • be secured with a locking mechanism or have other measures to prevent unauthorized removal
  • be secured when left unattended
  • be equipped with an alarm system to detect unauthorized entry or access
  • be sufficiently robust to resist common attack tools (e.g., sledgehammer, crowbar, drill, blowtorch)

3.2.5.2.2 Guidance for secure enclosures

Openings, such as windows or vent ducts, that could provide access to secure enclosures should be fitted with bars, a metal grill, expanded metal mesh, and/or retrofitted with a UL/ULC certified security film or glazinSecurity hardware attached to windows should be affixed from the inside, to prevent tampering, or be fitted with tamper-resistant anchors if affixed from the outside.

Doors that provide access to areas where radioactive sealed sources and/or radiation devices are used, processed or stored should be secured when unattendeThe material used for the door should be solid-core wood or metal-clad, and the door should be installed in a reinforced frame of equivalent material. Doors should be in a good state of repair. If the hinges are mounted on the non-secure side, the door should be fitted with non-removable pinned hinges. Any door glazing or large vents (grills) should be fitted with security glazing or bars, a metal grill, or equivalent. Grills should be secured in place with tamper-resistant anchors.

If continuous visual surveillance is done by an operator, the operator should be equipped with a means of communication (e.g., cell phone or radio) and should be aware of the response protocols to communicate rapidly to response personnel in the event of unauthorized access or removal.

If key pads are used to arm and disarm an intrusion detection system, the device and its electric junction box should be installed in a secure area, to reduce the risk of tampering.

To maintain continuous power to the alarm monitoring detection system in the event of a loss of primary power, the licensee should consider implementing an alternate or auxiliary power back-up source, or equivalent, to maintain detection capability.

3.2.6 Alarm response protocol

3.2.6.1 Requirements for alarm response protocol

The licensee shall respond immediately to any actual or attempted theft, diversion or sabotage to radioactive material or devices.

The licensee shall develop and maintain a documented alarm response protocol to record the cause and dispensation of alarms. The protocol shall include the role and responsibilities of the licensee’s emergency response staff and offsite response force, and shall be documented in a contingency plan or an equivalent document.

The licensee must notify the local police force of jurisdiction, informing them that sealed sources are onsite, and include an opportunity for onsite familiarization tours. The licensee shall develop and maintain written arrangements with offsite emergency responders, and update those arrangements annually or when changes to the facility design or operations affect the potential vulnerability of the sourcWritten arrangements are not required for temporary job sites.

3.2.6.2 Guidance for alarm response protocol

The licensee should develop and maintain a documented alarm response protocol that includes:

  • response procedures in case of theft, loss or sabotage of a radioactive sealed source
  • the role and responsibilities of the licensee’s staff
  • communication arrangements with local law enforcement and applicable authorities
  • incident reporting/notification
  • immediate reporting of any recovered source(s)

To facilitate arrangements with local or provincial law enforcement agencies, or mutual aid agreements with other sites, the licensee should consider written support arrangements such as a memorandum of understanding (MOU). This written arrangement should detail the interaction between site guards or onsite personnel with the agencies.

3.2.7 Inspection, maintenance and testing of security-related equipment

3.2.7.1 Requirements for inspection, maintenance and testing of security-related equipment

The licensee shall develop and implement written procedures for the testing of physical security equipment and a schedule for routine testing and maintenance in accordance with the manufacturer’s specifications. At a minimum, testing of security equipment including intrusion detection devices shall be conducted every six months. The licensee shall demonstrate that alarm testing was conductePreventive maintenance procedures shall include measures to replace defective equipment and devices in a timely manner.

3.2.7.2 Guidance for inspection, maintenance and testing of security-related equipment

All detection devices should be installed, operated and maintained in accordance with the manufacturers’ specifications and licensee processes. The licensee should test the performance of the detection devices on a regular basis, to ensure reliability and maintain documented records.

Licensees should ensure reliability through a preventive maintenance program that tracks detection device deficiencies. When the device is out of service for repair or replacement, compensatory measures must be implemented.

3.2.8 Security officers

3.2.8.1 Requirements for security officers

If the licensee uses a security guard service, the licensee shall develop and maintain written procedures and instructions specific to:

  • measures for controlling access to the licensed area
  • surveillance foot and vehicle patrols
  • assessment and response to alarms
  • apprehension and detainment of unarmed intruders
  • report suspicious activities, including armed intruders, to the police force of jurisdiction
  • security equipment operation
  • security training relating to assigned duties

3.2.8.2 Guidance for security officers

Security officers should be properly equipped and traineA formal training program should be established that is specific to the security officers. The training program should include:

  • requirements of provincial/territorial regulations (if applicable)
  • legislation and authorities
  • knowledge of the site
  • roles, responsibilities and functions
  • radiation protection emergency procedures and response protocols
  • first-aid training techniques

Security officers should be screened in accordance with the trustworthiness program and should possess a valid licence or certification recognized by the province or territory.

The licensee should consider performing exercises and drills on a regular basis, to validate onsite response force readiness.

For security officers, the licensee should establish and maintain an overall training policy and initial and continuing training programs, based on the long-term qualifications and competencies required for performing the job, and training goals that acknowledge the critical roles of safety and security.

3.3 Administrative security measures

3.3.1 General requirements for administrative security measures

Administrative security measures support technical measures, and shall include the programs, plans, policies, procedures, instructions and practices that the licensee implements to assist in securing licensed radioactive material from unauthorized removal or sabotage.

These measures shall include, but are not limited to, the following:

  • site security plan
  • security awareness program
  • personnel trustworthiness and reliability
  • protection of prescribed or sensitive information
  • inventory control
  • access control procedures

3.3.2 Site security plan

3.3.2.1 Requirements for a site security plan

For Category 1, 2 and 3 sources, technical and administrative measures shall be documented by the licensee in a site security plan, appropriately designated in accordance with section 12(1)(j) and 21 to 23 of the General Nuclear Safety and Control Regulations. The site security plan shall be updated and verified by the licensee at least once a year, to address any changes within the licensed facility.

3.3.2.2 Guidance for a site security plan

For information on a site security plan, and for a site security plan template, refer to Appendix A, Sample Site Security Plan.

3.3.3 Security awareness program

3.3.3.1 Requirements for a security awareness program

All persons with authorized access to sealed sources or prescribed information at the licensee’s location (including servicing companies, contractors and building maintenance staff) shall be made aware of the security policies, protocols and practices of the facility. Records of training and awareness sessions must be maintained for all workers (as required by section 36(1)(d) of the Nuclear Substances and Radiation Devices Regulations). The security awareness program shall be documented and updated by the licensee annually. The licensee shall implement an assured process for ensuring new employees participating in security awareness training, and refresher training shall be conducted on a regular basis for existing employees.

3.3.3.2 Guidance for a security awareness program

The security awareness training should include instructions on security practices/procedures to protect sealed sources and prescribed information, and on reporting suspicious events or security incidents (including during transport).

At a minimum, the security awareness program should:

  • ensure that staff understand their roles and responsibilities for security
  • ensure staff are trained to recognize and report suspicious activity, for example:
    • using false identification
    • individual exhibiting suspicious behavior
    • individual causing an alarm without authorization
    • lost or stolen uniforms or material within the organization
    • unsafe behavior at the workplace
  • ensure protection of prescribed and/or sensitive information
  • include training on measures for identifying suspicious activity and/or behavioral changes in personnel or contractors

For the security awareness program, the licensee should establish and maintain an overall training policy and initial and continuing training programs, based on the long-term qualifications and competencies required for performing the job, and training goals that acknowledge the critical role of safety and security.

For additional information on establishing a security culture in the organization, refer to the IAEA’s Nuclear Security Culture, section 3.3 [7].

3.3.4 Personal trustworthiness and reliability

3.3.4.1 Requirements for personal trustworthiness and reliability

The licensee shall verify the trustworthiness and reliability of all persons who require access to sealed sources at the licensee’s location or to prescribed/sensitive information [8] including servicing companies, contractors and building maintenance staff who require access without escort. Personnel who require access to such radioactive material or prescribed/sensitive information to perform job duties, but who are not approved by the licensee, must be escorted by an approved individual. The nature and depth of personnel screening practices [8] shall be based on the category of the radioactive material.

For Category 1, 2 and 3 sources, the licensee shall, at a minimum, verify the following information:

  1. confirm the identity of personnel from reliable original documentation such as passport or combination of other original documents (e.g., valid drivers license, health card or birth certificate)
  2. a record emanating from the Canadian Police Information Center, or from a police service servicing the area where the facility is located, showing the result of a criminal records name check (CRNC) on the person
  3. the person’s employment history, including their educational achievement, and professional qualifications, unless the person has been employed for more than 10 years at the facility
  4. if a person’s history cannot be established for at least the last five years, information relating to the trustworthiness of the person including, where available, a CRNC from each country in which the person has resided for one or more years in the last five years

The licensee shall retain documentation regarding trustworthiness and reliability for a minimum of two years for current employees and shall protect the information in accordance with section 3.3.5.

3.3.4.2 Guidance for personal trustworthiness and reliability

These personnel screening practices are based on the personnel security standard in the Policy on Government Security, Treasury Board of Canada Secretariat [8].

The licensee’s trustworthiness verification program should ensure individuals who have unescorted access to high-risk radioactive sealed sources are trustworthy and reliable, and do not pose an unreasonable risk to the health and safety of persons and security. The licensee should maintain copies of all documents provided by applicants and ensure they have been verified as original. The trustworthiness verification program should be reviewed on a regular basis.

The trustworthiness verification program should apply to:

  • individuals with unescorted access to Category 1, 2 and 3 sources
  • vehicle drivers and those accompanying the transport of Category 1 sources
  • any individual whose assigned duties provide access to prescribed and/or sensitive information or the handling of Category 1 sources (including onsite security officers)

3.3.5 Protection of prescribed and/or sensitive information

3.3.5.1 Requirements for protection of prescribed and/or sensitive information

The licensee shall provide protection measures to control access to prescribed information, pursuant to sections 21 to 23 of the General Nuclear Safety and Control Regulations, and to prevent loss, illegal use, illegal possession or illegal removal of such prescribed information. This information shall be managed on a “need to know” basis.

3.3.5.2 Guidance for protection of prescribed and/or sensitive information

“Prescribed information” is defined in the General Nuclear Safety and Control Regulations, section 21 (see glossary).

The following information is considered to be prescribed and should be protected:

  • the facility security plan, correspondence related to security, security response measures, contingency plans and transport security plan, if applicable
  • the specific location and inventory of sources, installation schematics and security systems including performance testing
  • threat and risk assessment and/or vulnerability assessment

Prescribed and/or sensitive information should be:

  • protected from unauthorized disclosure and secure when left unattended
  • disclosed only to individuals with a “need to know” basis to perform their assigned duties
  • stored in a manner that prevents removal or theft

Highly sensitive documents should be stored on a hard medium (diskette, CD-ROM or USB key) or in paper format only, and kept in a secure location that is accessible only to individuals with a “need to know”. This information should not be stored on an open or shared network without proper protection.

For prescribed and/or sensitive information, the licensee should:

  • use “portable” storage devices (i.e., computer, external hard drive, USB keys) that can be removed and secured
  • use storage devices that are “protected” via passwords or encryption, and are only accessible to authorized users via approved cyber security protocols
  • protect the confidentiality, availability and integrity of information or documents containing prescribed information

For transportation and transmission of prescribed and/or sensitive information:

  • the top right-hand corner of each page of the document should include the security classification level (i.e., “PRESCRIBED INFORMATION” or “SECURITY PROTECTED”) in bold, upper-case letters
  • the document and the related correspondence may be forwarded to the CNSC by mail, courier, or “secure facsimile”
  • electronic transmission (e.g., email) of this information is not acceptable, unless it is encrypted using proper technologies

Prescribed information and documents containing sensitive information that is obsolete or no longer relevant should be shredded or destroyed in accordance with the security rating of the material designated for destruction.

3.3.6 Inventory control

3.3.6.1 Requirements for inventory control

The licensee shall conduct regular inventory checks for detection purposes, to verify that the source(s) are secure and have not been altered or subject to illegal access or unauthorized removal. These inventory checks shall comply with section 36(1)(a) of the Nuclear Substances and Radiation Devices Regulations.

3.3.6.2 Guidance for inventory control

The operator should establish and maintain a list of sealed sources under their responsibility. Inventory verification can be used as part of detection measures. Regular inventory checking should consist of measures to ensure that the sources are present and have not been tampered witSuch measures could include physical checks that the source is in place, or remote observation through closed circuit television (CCTV), or verification of seals or other tamper devices. A process for inventory control should be in place, to ensure a robust verification process.

4.0 Security Measures for Sealed Sources during Transport

4.1 Vehicle security

4.1.1 Requirements for vehicle security

For the transport of a Category 1 source, the vehicle shall be equipped with:

  • a vehicle tracking device that enables the vehicle to be recovered if stolen
  • a duress alarm or an equivalent device that is continuously monitored; the licensee shall instruct the alarm monitoring station to alert the appropriate response force (e.g., police agency of jurisdiction)

For Category 1, 2 and 3 sources, the licensee’s vehicles shall be equipped with anti-theft devices. The anti-theft devices shall consist of:

  • a vehicle disabling device (e.g., starter disabler that prevents the start of the vehicle without a proper key or a similar start device)
  • if the vehicle is left unattended, a device that immediately detects unauthorized entry or attack to the vehicle and triggers an audible or visible alarm. If the vehicle operator is not within hearing or visual range of the alarm, the operator shall have the ability to monitor the alarm devices remotely

These anti-theft devices shall be activated automatically or manually by the operator at any time when the vehicle containing the package is left unattended.

While being stored during transportation, the package shall either be stored in a secure container in the vehicle, or in a location that is protected by physical security measures and is continuously monitored when the package is left unattended.

For Category 4 and 5 sources, the licensee shall implement prudent management practices by using effective access control and ensuring the security of radioactive material and devices at all times.

4.1.2 Guidance for vehicle security

If a licensee’s transport vehicle is left unattended while transporting Category 1, 2 and 3 sources, the licensee should have a means to immediately detect, assess and respond to actual or attempted theft or diversion of the sealed sources. An alarm system is an acceptable methoExamples of acceptable vehicle disabling devices that provide effective delay include trailer hitch locks, wheel locks (“boots”), or a method to disable the engine.

The licensee should ensure a secondary means to protect the vehicle, including a securing mechanism having a similar attack resistance (e.g., chain, locks, and seals).

4.2 Security measures for sealed sources during transport

4.2.1 Requirements for security measures for sealed sources during transport

As the licensee (the consignor) is responsible for the safety and security of sealed sources during transport, the licensee shall ensure the authorized carrier is capable of providing physical security measures for sealed sources while they are in transport or being stored during transportation.

As required by the Packaging and Transport of Nuclear Substances Regulations, the licensee shall provide the carrier with the appropriate shipping documents relating to the sealed sourcThe shipping documents shall include the corresponding description of security measures for sealed sources. Where more than one category of radionuclide applies (e.g., for shipments of multiple radionuclides) the applicable measures shall be based on the more restrictive category.

All packages containing sealed sources of Category 1, 2 or 3 shall be protected from unauthorized access, theft or unauthorized removal during transport and temporary storage during transport. The consignee should be notified when, where and by whom such packages are being moved, including tracking numbers and expected arrival times. The licensee, being the consignor, shall contract a carrier with a proven record for the safety and security of dangerous goods while in transport, and shall take the following precautions:

  1. The package containing the sealed source shall be stored in a secure container. Packages over 500 kg are considered secure due to the handling difficulties caused by their weight. The secure container does not replace any other packaging or labelling required by any existing regulations. A secure container:
    1. shall be made of steel or any other material that is resistant to a physical attack by handheld tools
    2. shall be equipped with a key, combination padlock or similar locking device that is resistant to an attack using handheld tools
    3. if transported in an open conveyance (e.g., open back of a half-ton truck, flatbed truck), it shall be securely affixed to the vehicle to prevent unauthorized removal of the container
    4. if containing a sealed source with an activity level less than Category 3 (see Table A), may be stored in the securely locked trunk or other cargo area of a vehicle while in storage and during transportation
  2. During a stopover while being transported, the package shall either be stored in a secure container in the vehicle (as described in list item 1, above), or in a location that is protected by physical security measures (as described in section 3).
  3. The vehicle operator shall have on his or her person, at all times, a reliable mobile communication capability (e.g., cell phone) and a list of contact persons and their contact numbers in the event of an emergency situation.

Alternate methodologies that provide a level of physical security equivalent to that described above may be submitted to the CNSC for review, or identified in a licence application or a request to amend a licence.

For transport of Category 1 or 2 sources and devices, the licensee shall verify that the carrier:

  • uses a package tracking system
  • implements methods to ensure trustworthiness and reliability of drivers
  • maintains constant control and/or surveillance during transit
  • has the capability for immediate communication to summon appropriate response or assistance

For transport of Category 3 sources, the licensee shall verify that the carrier:

  • implements methods to ensure trustworthiness and reliability of drivers
  • maintains constant control and/or surveillance during transit
  • has the capability for immediate communication to summon appropriate response or assistance

For transport of Category 4 and 5 sources, the licensee shall implement prudent management practices by using effective access control and ensuring the security of radioactive material and devices at all times.

4.2.2 Guidance for security measures for sealed sources during transport

The licensee should:

  • provide security awareness training to all individuals engaged in the handling or transport of sealed sources, including refresher training when required
  • verify that, before transporting Category 1 and 2 sources, all persons employed by the carrier transporting the sealed sources have successfully completed security screening for trustworthiness and reliability

The security awareness training should include the items listed for the transport security plan (see section 4.3) and specific information on:

  • the identified threats for the conveyance
  • security concerns and actions to be undertaken in the event of a security incident during transport

Security devices on the licensee’s transport vehicles should:

  • be inspected by the licensee regularly for any signs of tampering or deterioration that may adversely affect their designated function
  • be tested by the licensee at least every six months
  • be inspected by a qualified operator to ensure integrity of the security mechanism on the vehicle used to transport Category 1 or 2 sources

For sources in use or in transit, such measures may include a secured or fixed container, or placement of the source container inside a secured storage area (e.g., container chained or bolted to the vehicle). For mobile sources in use, continuous visual surveillance may be a substitute for one or two physical barriers. If a sealed source is temporarily stored while in transit (for example, in a warehouse), equivalent security measures should be applied that are consistent with those security measures discussed above for storage of Category 1 and 2 sources.

If packages are transported on an open conveyance, the packages should be shielded and secured to the vehicle for safety and security.

4.3 Transport security plan

4.3.1 Requirements for the transport security plan

In addition to the requirements in section 4.2.1, the following requirements apply to Category 1 and 2 sources:

  • For transport of Category 1 sources, the licensee shall implement enhanced security measures and submit a specific Transport Security Plan to the CNSC at least 60 days before the anticipated date of shipment, for approval by the Commission Tribunal or a designated officer authorized by the Commission Tribunal
  • For transport of Category 2 sources, the licensee shall implement enhanced security measures and develop a generic Transport Security Plan that shall be implemented and reviewed on a regular basis. The Transport Security Plan should be flexible to address changing threat levels, response protocols to a security event and the protection of sensitive information

For Category 1 sources, the Transport Security Plan shall include the following information:

  1. the name, quantity, chemical/physical characteristics of the radioactive material
  2. role and responsibilities of the licensee’s personnel, consignors, carriers
  3. mode(s) of transport
  4. the proposed security measures
  5. measures to monitor the location of the shipment
  6. provisions for information security
  7. communications arrangements made among the licensee, the carrier and the consignee
  8. communications arrangements made with any police agency along the transportation route
  9. the planned route
  10. alternate routes to be used in case of an emergency

4.3.2 Guidance for the transport security plan

For Category 1 sources, the transport security plan should include the following general information:

  1. contact information for the licensee or applicant
    • include the complete legal name and business address of the licensee or applicant who is submitting the plan
    • include all relevant contact information, such as telephone number, mobile phone number, and email address
  2. the name, quantity, chemical and physical characteristics of each of the sealed sources being transported
    • include a description of the radioactive sealed source and device
    • include the category and quantity of the radioactive sealed source being transported
  3. role and responsibilities of the licensee’s personnel, consignors, and carriers
    • describe who is responsible for security and the transport security plan (name and title)
    • ensure that security-related information is communicated to the consignors and carriers engaged in the transport of the sealed source(s). If transport is subcontracted, the licensee should ensure contractual arrangements exist for developing the security plan.
  4. mode(s) of transport
    • describe all types of transport used to convey the sealed source(s) from the time the shipment leaves its originating location until it is delivered at its planned destination
    • include the date, time and location of any planned transfers and the contact information (name, job title, and telephone number) for all persons responsible for ensuring the successful transfer of the sealed sources and for verifying the integrity of the associated shipments
  5. proposed security measures
    • describe the measures used to monitor the movement of packages and/or conveyances containing radioactive sealed sources (e.g., global positioning system, vehicle tracking and monitoring system)
    • describe the measures used for escort, security searches, and procedures with response force in case of breakdown or a failure of the shipment to arrive at its destination at the expected time
    • describe the procedures to be followed during any schedule stop, or unscheduled delay during transport
  6. measures to monitor the location of the shipment
  7. provisions for information security
    • describe how the information will be protected
    • describe how this information will be communicated to individuals who need to know this information to perform their duties
  8. the communications arrangements made between the licensee, the carrier, and the consignee
    • describe the communication arrangements between the licensee, the consignor, the operator of the vehicle transporting the radioactive sealed source, and the response force along the transport route
    • describe how the licensee plans to ensure that communication coverage is adequate along the entire route
    • indicate the action to be taken if communication contact with a vehicle carrying a radioactive sealed source is lost
  9. communication arrangements made with any police agency along the transportation route
    • the licensee should ensure that all responsible police agencies along the transportation route are notified prior to transporting the shipment
    • the consignor should notify the consignee, in advance, of the shipment’s departure time, the mode of transport, the expected delivery time and the allowable delivery period around that delivery time
    • the consignee should notify the consignor of receipt or non-receipt of the shipment within the expected delivery period
  10. the planned route
    • if the proposed route is to pass through an urban area, the licensee or applicant should describe the precise route to be taken through the area and how the shipment is to be schedule to avoid peak traffic times
    • include alternate routes to be used in case of an emergency

Appendix A: Sample Site Security Plan

This appendix provides a list of topics to be considered when developing a site security plan [4].

A threat and risk assessment identifies any potential threats and risks, and reveals possible vulnerabilities at a sitThe site security plan is developed to mitigate those threats, and to reduce/eliminate the risks and vulnerabilities. The site security plan includes physical protection measures to protect nuclear substances that are stored, processed, used or transported at the licensed facility.

Introduction

  • identify and briefly describe the business, the premises, the number of employees and the location
  • include a description of the environment, building and/or facility where the nuclear substance or radiation device is used or stored

Security organization

  • include a description of the radioactive sealed source and its use
  • identify the security zones (restricted area) and areas accessible by the public in the description of the building
  • describe the security protocols during routine and non-routine operations
  • identify the senior management personnel and the roles and responsibilities of staff and those responsible for security (including designating a person responsible for maintaining the site security plan)
  • provide the details of security arrangements for contractors or employed staff
  • provide the details of the management arrangements for the facility, especially where these relate to or involve a responsibility for security of the premises

Security policy

  • describe the corporate security policy (if applicable)
  • include a copy of the memorandum of understanding (MOU) with the jurisdictional police force

Site plan

  • provide a drawing, photograph or other accurate illustration of the site
  • include all relevant fence lines, boundaries and facilities
  • show the location of all security systems
  • show the location of all access and egress points

Perimeter

  • describe the perimeter, including, as appropriate, details of fences, gates/barriers, windows, security lighting, perimeter intrusion detection system (PIDS), closed circuit television camera (CCTV) or any other arrangements (such as reception or a gatehouse)
  • describe the access and egress points to the site for both pedestrians and vehicles, including access control measures

Access control

  • provide the number of employees on site who are authorized to access the radioactive sources or material (i.e., a list of authorized users and persons with unsupervised access to radioactive substances or material)
  • include details on access control systems (e.g., card readers or push-btn locks), key or code management, and other general access control procedures
  • describe the process for visitors and contractors accessing the facility (e.g., escort policy)
  • include details and processes for screening vehicles and searches for weapons and explosive substances

Interior security

  • provide information for testing assessment devices (e.g., cameras), access control, detection devices, delay measures, response and communication specific to areas where radioactive sources are located

Storage

  • provide a list of buildings, rooms or locations (by name and number or other identifier) where nuclear substances are used, stored or transported
  • for each building, room or location, include details on:
    • security arrangements for storage of equipment containing sources
    • means of detecting unauthorized intrusion, either to the equipment or to the storage location
    • processes or procedures for accessing the licensed facility
    • type and categorization of nuclear material

Transportation

  • provide a list of vehicles used for the transportation of radioactive sealed sources
  • describe the security measures in place for transporting sealed sources, including:
    • security arrangements while sources are being transported
    • means of detecting unauthorized removal of equipment
    • security processes or procedures to be applied while sources are being transported

Security of information

  • describe the arrangements for the protection of sensitive information regarding the location, nature, storage and movement of radioactive sources
  • all correspondence related to security (including the site security plan) is marked “PRESCRIBED INFORMATION” or “SECURITY PROTECTED” and as such, it must be safeguarded and labelled pursuant to sections 21 to 23 of the General Nuclear Safety and Control Regulations
  • if prescribed information is stored on a company server connected to the Internet, ensure that consideration is given to potential threat and vulnerabilities from IT systems

Background checks to determine trustworthiness and reliability

  • describe the arrangements for verifying the identity and reliability of staff having access to nuclear substances
  • describe the arrangements for verifying the identity and reliability of persons providing security protection for the facility, including contractors or building maintenance staff

Maintenance, repair and testing of security systems

  • describe the arrangements for the maintenance and testing of all security systems
  • include information on compensatory measures, performance testing and reliability verification of security systems
  • describe the process for evaluating the effectiveness of the security maintenance plan, including the frequency for updating the plan in accordance with CNSC expectations (e.g., semi-annual testing)

Contingency and security response plans

  • provide details on the security procedures and instructions to address security measures to respond to loss, theft, destruction, malevolent acts or any other security incident involving radioactive substances or material
  • include information on emergency plans and event reporting
  • describe agreements with offsite responders (e.g., police) for alarm response protocol or other security incidents
  • include procedures that address an increased threat level with details on any compensatory measures that may be required

Security awareness program

  • describe the security awareness program
  • include any instructions given to employees on security measures
  • include any restrictions concerning access, use, storage or transportation of radioactive substances or material (including restrictions on contractors, building maintenance staff, and temporary employees)

References, procedures and security instructions

  • include references to existing regulations or standards and/or any procedures related to security

Glossary

authorized access
Access that is granted in writing by the licensee.
Category 1 source
Sources that, if not safely managed or securely protected, would be likely to cause permanent injury to a person who handled them, or were otherwise in contact with them for more that a few minutes. It would probably be fatal to be close to this amount of unshielded material for a period of a few minutes to an hour. These sources are typically used in practices such as radiothermal generators, irradiators and radiation teletherapy.
Category 2 source
Sources that, if not safely managed or securely protected, could cause permanent injury to a person who handled them, or were otherwise in contact with them, for a short time (minutes to hours). It could possibly be fatal to be close to this amount of unshielded radioactive material for a period of hours to days. These sources are typically used in practices such as industrial gamma radiography, high dose rate brachytherapy and medium dose rate brachytherapy.
Category 3 source
Sources that, if not safely managed or securely protected, could cause permanent injury to a person who handled them, or were otherwise in contact with them, for some hours. It could possibly – although it is unlikely – be fatal to be close to this amount of unshielded radioactive material for a period of days to weeks. These sources are typically used in practices such as fixed industrial gauges involving high activity sources (for example, level gauges, dredger gauges, conveyor gauges and spinning pipe gauges) and well logging.
Category 4 source
Sources that are very unlikely to permanently injure anyonHowever, this amount of unshielded radioactive material, if not safely managed or securely protected, could possibly – although it is unlikely – temporarily injure someone who handled it or was otherwise in contact with it, or who was close to it for a period of many weeks.
Category 5 source
Sources that could not permanently injure someone.
criminal records name check (CRNC)
A search used to determine if a person has a criminal recorThe search can be based on name and date of birth or – for much greater assurance – on fingerprints, for positive identification.
designated officer
A person designated as a designated officer under section 37 of the NSCA.
encapsulated source
The radioactive material is permanently sealed in a capsule or closely bounded in a solid form.
handheld tools
Tools and equipment that may be used by an adversary to penetrate a security system or barrier. These tools may include hand tools such as bolt-cutters, pliers or hacksaw blades, power tools, burn bars or cutting torches, as well as any tool or equipment located at the facility.
prescribed information
Information that concerns any of the following, including a record of that information, is prescribed information for the purposes of the NSCA:
  • a nuclear substance that is required for the design, production, use, operation or maintenance of a nuclear weapon or nuclear explosive device, including the properties of the nuclear substance
  • the design, production, use, operation or maintenance of a nuclear weapon or nuclear explosive device
  • the security arrangements, security equipment, security systems and security procedures established by a licensee in accordance with the NSCA, the regulations made under the NSCA or the licence, and any incident relating to security
  • the route or schedule for the transport of Category I, II or III nuclear material, as defined in section 1 of the Nuclear Security Regulations

Information that is made public in accordance with the NSCA, the regulations made under the NSCA or a licence is not prescribed information for the purposes of the NSCA.

sabotage
Any deliberate act or omission, directed against a nuclear facility or nuclear substances, that:
  • endangers or is likely to endanger the health and safety of any person, or
  • results or is likely to result in contamination of the environment
sealed source
A radioactive nuclear substance in a sealed capsule or in a cover to which the substance is bonded, where the capsule or cover is strong enough to prevent contact with or the dispersion of the substance under the conditions for which the capsule or cover is designed.
storage
The holding of radioactive sources in an area that provides for their containment with the intention of retrieval.
temporary storage
Storage during the transportation cycle when a sealed source is unattended.
UL
Underwriters Laboratories (UL) is a global independent safety science company offering expertise across five key strategic businesses: product safety, environment, life and health, university and verification services.
ULC
Underwriters Laboratories of Canada (ULC) is an independent product safety testing, certification and inspection organization.
unsealed source
A source other than a sealed sourcCan be in liquid or solid form, and is commonly used in medical diagnostic and therapeutic treatments, as well as in laboratory research applications.

References

  1. International Atomic Energy Agency (IAEA), Code of Conduct on the Safety and Security of Radioactive Sources, Vienna, 2004.
  2. IAEA, TECDOC-1344, Categorization of Radioactive Sources, Revision of TECDOC-1191, Categorization of Radiation Sources, 2003.
  3. IAEA, TS-R-1, Regulations for the Safe Transport of Radioactive Material, 1996 edition (revised).
  4. IAEA, TECDOC-1355, Security of Radioactive Sources – Interim Guidance for Comment, 2003.
  5. IAEA, Safety Guide RS-G-1.9, Categorization of Radioactive Sources, 2005.
  6. ASTM F2548-06, Standard Specification for Expanded Metal Fence Systems for Security Purposes, ASTM International, West Conshohocken, PA, 2006, DOI: 10.1520/F2548-06.
  7. IAEA, Nuclear Security Series No. 7, implementing guide, Nuclear Security Culture, Vienna, 2008.
  8. Treasury Board of Canada Secretariat, Government of Canada, Policy on Government Security , July 2009.

Additional Information

The following documents contain additional information that may be of interest to persons involved in security measures for sealed sources.

  • Australian Radiation Protection and Nuclear Safety Agency (ARPANSA), Code of Practice for the Security of Radioactive Sources, Radiation Protection Series Publication No. 11, January 2007.
  • Canadian Nuclear Safety Commission, INFO-9999-4 (E) Revision 2, Working Safely with Nuclear Gauges, Ottawa, 2007.
  • IAEA, TECDOC-1276, Handbook on the physical protection of nuclear materials and facilities, 2002.
  • IAEA, INFCIRC/225/Rev 5, Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities, Nuclear Security Series No. 13, 2011 (draft).
  • IAEA, INFCIRC/663, Code of Conduct on the Safety and Security of Radioactive Sources and the Supplementary Guidance on the Import and Export of Radioactive Sources , 2005.
  • IAEA, TECDOC-953, Method for the Development of Emergency Response Preparedness for Nuclear or Radiological Accidents, 1997.
  • IAEA, Nuclear Security Series No. 14, Nuclear Security Recommendations on Radioactive Material and Associated Facilities, 2011.
  • IAEA, Nuclear Security Series No. 9, implementing guide, Security in the Transport of Radioactive Material, 2008.
  • National Counter Terrorism Security Office (UK), Security requirements for radioactive sources, restricted document, April 201
  • North Atlantic Treaty Organisation (NATO) Science for Peace and Security Series -C: Environmental Security, International Approaches to Securing Radioactive Sources Against Terrorism, edited by W. Duncan Wood and Derek M. Robinson, Springer Science+Business Media, 2009.
  • United States Nuclear Regulatory Commission (USNRC), Increased controls for licensees that possess sources containing radioactive material quantities of concerns , 2009.

Page details

Date modified: