60 Day Notice

60-Day FR_Notice.pdf

Sensitive Security Information Threat Assesment Application

60 Day Notice

OMB: 1652-0042

Document [pdf]
Download: pdf | pdf
emcdonald on DSK67QTVN1PROD with NOTICES

50076

Federal Register / Vol. 78, No. 159 / Friday, August 16, 2013 / Notices

clearance in accordance with the
Paperwork Reduction Act of 1995 (Pub.
L. 104–13, 44 U.S.C. Chapter 35).
DATES: Comments are encouraged and
will be accepted until October 15, 2013.
This process is conducted in accordance
with 5 CFR 1320.1.
ADDRESSES: Written comments and
questions about this Information
Collection Request should be forwarded
to DHS/NPPD/CS&C/OEC, 245 Murray
Lane SW., Mail Stop 0640, Arlington,
VA 20598–0640. Emailed requests
should go to Serena Maxey,
[email protected]. Written
comments should reach the contact
person listed no later than October 15,
2013. Comments must be identified by
‘‘DHS–2013–0023’’ and may be
submitted by one of the following
methods:
• Federal eRulemaking Portal: http://
www.regulations.gov.
• Email: Include the docket number
in the subject line of the message.
Instructions: All submissions received
must include the words ‘‘Department of
Homeland Security’’ and the docket
number for this action. Comments
received will be posted without
alteration at http://www.regulations.gov,
including any personal information
provided.
SUPPLEMENTARY INFORMATION: The
Department of Homeland Security,
Office of Emergency Communications
(OEC), formed under Title XVIII of the
Homeland Security Act of 2002, 6
U.S.C. 571 et seq., is required, pursuant
to 6 U.S.C. 572, to develop the National
Emergency Communications Plan
(NECP), which includes identification of
goals, timeframes, and appropriate
measures to achieve interoperable
communications capabilities. In 2010,
the Statewide Communication
Interoperability Plan (SCIP)
Implementation Report was cleared in
accordance with the Paperwork
Reduction Act of 1995 and will expire
in September of 2013. The SCIP
Template and Annual Progress Report
will replace the previous SCIP Template
and SCIP Implementation Report. These
updated documents (SCIP Template and
Annual Progress Report) streamline the
information collected by OEC to track
the progress states are making in
implementing milestones and
demonstrating goals of the NECP. The
process for completing the SCIP
Template and Annual Progress Report
will not change.
The SCIP Template and Annual
Progress Report will assist states in their
strategic planning for interoperable and
emergency communications while
demonstrating each state’s achievements

VerDate Mar<15>2010

19:06 Aug 15, 2013

Jkt 229001

and challenges in accomplishing
optimal interoperability for emergency
responders. In addition, certain
government grants may require states to
update their SCIP Templates and
Annual Progress Reports to include
broadband efforts in order to receive
funding for interoperable and
emergency communications. Statewide
Interoperability Coordinators (SWICs)
will be responsible for the development
and incorporation of input from their
respective stakeholders and governance
bodies into their SCIP Template and
Annual Progress Report. SWICs will
complete and submit the reports
directly to OEC through unclassified
electronic submission.
OMB is particularly interested in
comments that:
1. Evaluate whether the proposed
collection of information is necessary
for the proper performance of the
functions of the agency, including
whether the information will have
practical utility;
2. Evaluate the accuracy of the
agency’s estimate of the burden of the
proposed collection of information,
including the validity of the
methodology and assumptions used;
3. Enhance the quality, utility, and
clarity of the information to be
collected; and
4. Minimize the burden of the
collection of information on those who
are to respond, including through the
use of appropriate automated,
electronic, mechanical, or other
technological collection techniques or
other forms of information technology,
e.g., permitting electronic submissions
of responses.
Analysis
Agency: Department of Homeland
Security, National Protection and
Programs Directorate, Office of
Cybersecurity and Communications,
Office of Emergency Communications.
Title: Statewide Communication
Interoperability Plan Template and
Annual Progress Report.
OMB Number: 1670–0017.
Frequency: Annually.
Affected Public: Statewide
Interoperability Coordinators.
Number of Respondents: 56
respondents.
Estimated Time per Respondent: 10
hours.
Total Burden Hours: 560 annual
burden hours.
Total Burden Cost (capital/startup):
$0.
Total Recordkeeping Burden: $0.
Total Burden Cost (operating/
maintaining): $28,918.40.

PO 00000

Frm 00055

Fmt 4703

Sfmt 4703

Dated: August 12, 2013.
Scott Libby,
Deputy Chief Information Officer, National
Protection and Programs Directorate,
Department of Homeland Security.
[FR Doc. 2013–20025 Filed 8–15–13; 8:45 am]
BILLING CODE 9910–9P–P

DEPARTMENT OF HOMELAND
SECURITY
Transportation Security Administration
Intent To Request Renewal From OMB
of One Current Public Collection of
Information: Sensitive Security
Information Threat Assessments
Transportation Security
Administration, DHS.
ACTION: 60-day Notice.
AGENCY:

The Transportation Security
Administration (TSA) invites public
comment on one currently approved
Information Collection Request (ICR),
Office of Management and Budget
(OMB) control number 1652–0042,
abstracted below that we will submit to
OMB for renewal in compliance with
the Paperwork Reduction Act (PRA).
The ICR describes the nature of the
information collection and its expected
burden. The collection involves TSA
determining whether the party or
representative of a party seeking access
to sensitive security information (SSI) in
a civil proceeding in federal court may
be granted access to the SSI.
DATES: Send your comments by October
15, 2013.
ADDRESSES: Comments may be emailed
to [email protected] or delivered to the
TSA PRA Officer, Office of Information
Technology (OIT), TSA–11,
Transportation Security Administration,
601 South 12th Street, Arlington, VA
20598–6011.
FOR FURTHER INFORMATION CONTACT:
Susan L. Perkins at the above address,
or by telephone (571) 227–3398.
SUPPLEMENTARY INFORMATION:
SUMMARY:

Comments Invited
In accordance with the Paperwork
Reduction Act of 1995 (44 U.S.C. 3501
et seq.), an agency may not conduct or
sponsor, and a person is not required to
respond to, a collection of information
unless it displays a valid OMB control
number. The ICR documentation is
available at http://www.reginfo.gov.
Therefore, in preparation for OMB
review and approval of the following
information collection, TSA is soliciting
comments to—
(1) Evaluate whether the proposed
information requirement is necessary for

E:\FR\FM\16AUN1.SGM

16AUN1

Federal Register / Vol. 78, No. 159 / Friday, August 16, 2013 / Notices

emcdonald on DSK67QTVN1PROD with NOTICES

the proper performance of the functions
of the agency, including whether the
information will have practical utility;
(2) Evaluate the accuracy of the
agency’s estimate of the burden;
(3) Enhance the quality, utility, and
clarity of the information to be
collected; and
(4) Minimize the burden of the
collection of information on those who
are to respond, including using
appropriate automated, electronic,
mechanical, or other technological
collection techniques or other forms of
information technology.
Information Collection Requirement
OMB Control Number 1652–0042;
Sensitive Security Information Threat
Assessments. TSA is seeking to renew
the control number (1652–0042) for the
maximum three-year period in order to
continue compliance with sec. 525(d) of
the Department of Homeland Security
Appropriations Act of 2007 (DHS
Appropriations Act, Public Law 109–
295, 120 Stat 1382), as reenacted, and to
continue the process TSA developed
whereby a party seeking access to SSI in
a civil proceeding in federal court who
demonstrates a substantial need for
relevant SSI in the preparation of the
party’s case, and who is unable without
undue hardship to obtain the substantial
equivalent of the information by other
means, may request that the party or
party’s representative be granted
conditional access to the SSI at issue in
the case. The procedures also apply to
witnesses retained by a party as experts
or consultants and court reporters that
are required to record or transcribe
testimony containing specific SSI and
do not have a current security threat
clearance required for access to
classified national security information
as defined by E.O. 12958 as amended.
In order to determine if the individual
may be granted access to SSI for this
purpose, TSA will conduct a threat
assessment that includes: (1) A
fingerprint-based criminal history
records check (CHRC), (2) a name-based
check to determine whether the
individual poses or is suspected of
posing a threat to transportation or
national security, including checks
against terrorism, immigration, or other
databases TSA maintains or uses; and
(3) a professional responsibility check
(for attorneys and court reporters).
TSA will use the information
collected to conduct the security threat
assessment for the purpose of
determining whether the provision of
such access to the information for the
proceeding presents a risk of harm to
the Nation. The results of the security
threat assessment will be used to make

VerDate Mar<15>2010

19:06 Aug 15, 2013

Jkt 229001

a final determination on whether the
individual may be granted access to the
SSI at issue in the case. TSA estimates
that the total annual hour burden for
this collection will be 120 hours, based
on an estimated 120 annual respondents
and a one-hour burden per respondent.
Dated: August 9, 2013.
Susan L. Perkins,
TSA Paperwork Reduction Act Officer, Office
of Information Technology.
[FR Doc. 2013–19973 Filed 8–15–13; 8:45 am]
BILLING CODE 9110–05–P

DEPARTMENT OF HOMELAND
SECURITY
Transportation Security Administration
Intent To Request Renewal From OMB
of One Current Public Collection of
Information: Pipeline Operator Security
Information

50077

unless it displays a valid OMB control
number. The ICR documentation is
available at http://www.reginfo.gov.
Therefore, in preparation for OMB
review and approval of the following
information collection, TSA is soliciting
comments to—
(1) Evaluate whether the proposed
information requirement is necessary for
the proper performance of the functions
of the agency, including whether the
information will have practical utility;
(2) Evaluate the accuracy of the
agency’s estimate of the burden;
(3) Enhance the quality, utility, and
clarity of the information to be
collected; and
(4) Minimize the burden of the
collection of information on those who
are to respond, including using
appropriate automated, electronic,
mechanical, or other technological
collection techniques or other forms of
information technology.

Transportation Security
Administration, DHS.
ACTION: 60-day Notice.

Information Collection Requirement

The Transportation Security
Administration (TSA) invites public
comment on one currently approved
Information Collection Request (ICR),
Office of Management and Budget
(OMB) control number 1652–0055,
abstracted below that we will submit to
OMB for renewal in compliance with
the Paperwork Reduction Act (PRA).
The ICR describes the nature of the
information collection and its expected
burden. Specifically, the collection
involves the submission of contact
information for a pipeline company’s
primary and alternate security manager
and the telephone number of the
security operations or control center, as
well as data concerning pipeline
security incidents.
DATES: Send your comments by October
15, 2013.
ADDRESSES: Comments may be emailed
to [email protected] or delivered to the
TSA PRA Officer, Office of Information
Technology (OIT), TSA–11,
Transportation Security Administration,
601 South 12th Street, Arlington, VA
20598–6011.
FOR FURTHER INFORMATION CONTACT:
Susan L. Perkins at the above address,
or by telephone (571) 227–3398.
SUPPLEMENTARY INFORMATION:

OMB Control Number 1652–0055;
Pipeline Operator Security Information.
Under the Aviation and Transportation
Security Act (ATSA) (Pub. L. 107–71,
115 Stat. 597 (November 19, 2001)) and
delegated authority from the Secretary
of Homeland Security, TSA has broad
responsibility and authority for
‘‘security in all modes of transportation
. . . including security responsibilities
. . . over modes of transportation that
are exercised by the Department of
Transportation.’’
In executing its responsibility for
modal security, TSA produced the
Pipeline Security Guidelines in
December 2010 following extensive
consultation with its government and
industry partners (the document was
updated and re-issued in April 2011
following implementation of the
National Terrorism Advisory System).
Participants in this discussion included
industry and government members of
the Pipeline Sector and Government
Coordinating Councils, industry
association representatives, and other
interested parties. These primary
Federal guidelines for pipeline security
include recommendations for the
voluntary submission of pipeline
operator security manager contact
information to TSA and the reporting of
security incident data to the
Transportation Security Operation
Center (TSOC).
The Pipeline Security Guidelines
recommend that each operator provide
TSA with the 24/7 contact information
of the company’s primary and alternate

AGENCY:

SUMMARY:

Comments Invited
In accordance with the Paperwork
Reduction Act of 1995 (44 U.S.C. 3501
et seq.), an agency may not conduct or
sponsor, and a person is not required to
respond to, a collection of information

PO 00000

Frm 00056

Fmt 4703

Sfmt 4703

Purpose and Description of Data
Collection

E:\FR\FM\16AUN1.SGM

16AUN1


File Typeapplication/pdf
File Modified2013-08-16
File Created2013-08-16

© 2024 OMB.report | Privacy Policy