Download:
pdf |
pdf73502
Federal Register / Vol. 85, No. 223 / Wednesday, November 18, 2020 / Notices
community are accessible online
through the FEMA Map Service Center
at https://msc.fema.gov for comparison.
(Catalog of Federal Domestic Assistance No.
97.022, ‘‘Flood Insurance.’’)
Michael M. Grimm,
Assistant Administrator for Risk
Management, Department of Homeland
Security, Federal Emergency Management
Agency.
Community
Community map repository address
Bay County, Florida and Incorporated Areas
Project: 11–04–1987S Preliminary Date: October 25, 2019
City of Callaway ........................................................................................
City of Lynn Haven ...................................................................................
City of Mexico Beach ...............................................................................
City of Panama City .................................................................................
City of Panama City Beach ......................................................................
City of Parker ............................................................................................
City of Springfield .....................................................................................
Unincorporated Areas of Bay County ......................................................
Planning and Zoning Department, 324 South Berthe Avenue, Callaway,
FL 32404.
Planning and Zoning Department, 825 Ohio Avenue, Lynn Haven, FL
32444.
City Hall, 201 Paradise Path, Mexico Beach, FL 32410.
Planning Department, 501 Harrison Avenue, Panama City, FL 32401.
Building Department, 116 South Arnold Road, Panama City Beach, FL
32413.
City Hall, 1001 West Park Street, Parker, FL 32404.
City Hall, 408 School Avenue, Springfield, FL 32401.
Bay County Planning and Zoning Department, 840 West 11th Street,
Panama City, FL 32401.
Charles City County, Virginia (All Jurisdictions)
Project: 16–03–2426S Preliminary Date: May 29, 2020
Unincorporated Areas of Charles City County .........................................
Charles City County Courthouse, 10900 Courthouse Road, Charles
City, VA 23030.
Surry County, Virginia and Incorporated Areas
Project: 16–03–2426S Preliminary Date: May 29, 2020
Town of Dendron ......................................................................................
Unincorporated Areas of Surry County ....................................................
[FR Doc. 2020–25344 Filed 11–17–20; 8:45 am]
BILLING CODE 9110–12–P
DEPARTMENT OF HOMELAND
SECURITY
Transportation Security Administration
[Docket No. TSA–2009–0018]
Intent to Request Extension From OMB
of One Current Public Collection of
Information: Certified Cargo Screening
Standard Security Program
Transportation Security
Administration, DHS.
ACTION: 60-day notice.
AGENCY:
The Transportation Security
Administration (TSA) invites public
comment on one currently approved
Information Collection Request (ICR),
OMB control number 1652–0053,
abstracted below that we will submit to
the Office of Management and Budget
(OMB) for an extension in compliance
with the Paperwork Reduction Act. The
ICR describes the nature of the
information collection and its expected
burden. The collections of information
khammond on DSKJM1Z7X2PROD with NOTICES
SUMMARY:
VerDate Sep<11>2014
19:10 Nov 17, 2020
Jkt 253001
Town Hall, 2855 Rolfe Highway, Dendron, VA 23839.
Surry County Government Center, 45 School Street, Surry, VA 23883.
that make up this ICR include: (1)
Applications from entities that wish to
become Certified Cargo Screening
Facilities (CCSFs), Third-Party CanineCargo (3PK9–C) Certifiers or Certified
Cargo Screening Program-Canine
(CCSP–K9) Holders; (2) personally
identifiable information to allow TSA to
conduct security threat assessments
(STA) and/or Criminal History Records
Check (CHRC) on certain individuals
employed by the CCSFs, 3PK9–C
Certifiers, Certified Cargo Screening
Facilities-K9 (CCSF–K9) and those
authorized to conduct 3PK9–C Program
activities; (3) standard security program
or submission of a proposed modified
security program or amendment to a
security program by CCSFs and CCSF–
K9s or standards provided by TSA or
submission of a proposed modified
standard by 3PK9–C Certifiers; (4)
recordkeeping requirements for CCSFs,
CCSF–K9s and 3PK9–C Certifiers; (5)
designation of a Security Coordinator
(SC) by CCSP Holders, CCSP–K9
Holders and 3PK9–C Certifiers; and (6)
significant security concerns detailing
information of incidents, suspicious
activities, and/or threat information by
CCSP Holders, CCSP–K9 Holders and
PO 00000
Frm 00048
Fmt 4703
Sfmt 4703
CCSP–K9 Holders. TSA is seeking an
extension of this ICR for the
continuation of the Certified Cargo
Screening Program (CCSP) in order to
secure passenger aircraft carrying cargo.
Send your comments by January
19, 2021.
DATES:
Comments may be emailed
to [email protected] or delivered to the
TSA PRA Officer, Information
Technology, TSA–11, Transportation
Security Administration, 6595
Springfield Center Drive, Springfield,
VA 20598–6011.
ADDRESSES:
FOR FURTHER INFORMATION CONTACT:
Christina A. Walsh at the above address,
or by telephone (571) 227–2062.
SUPPLEMENTARY INFORMATION:
Comments Invited
In accordance with the Paperwork
Reduction Act of 1995 (44 U.S.C. 3501
et seq.), an agency may not conduct or
sponsor, and a person is not required to
respond to, a collection of information
unless it displays a valid OMB control
E:\FR\FM\18NON1.SGM
18NON1
Federal Register / Vol. 85, No. 223 / Wednesday, November 18, 2020 / Notices
khammond on DSKJM1Z7X2PROD with NOTICES
number. The ICR documentation will be
available at www.reginfo.gov upon its
submission to OMB. Therefore, in
preparation for OMB review and
approval of the following information
collection, TSA is soliciting comments
to—
(1) Evaluate whether the proposed
information requirement is necessary for
the proper performance of the functions
of the agency, including whether the
information will have practical utility;
(2) Evaluate the accuracy of the
agency’s estimate of the burden;
(3) Enhance the quality, utility, and
clarity of the information to be
collected; and
(4) Minimize the burden of the
collection of information on those who
are to respond, including using
appropriate automated, electronic,
mechanical, or other technological
collection techniques or other forms of
information technology.
Consistent with the requirements of
Executive Order (E.O.) 13771, Reducing
Regulation and Controlling Regulatory
Costs, and E.O. 13777, Enforcing the
Regulatory Reform Agenda, TSA is also
requesting comments on the extent to
which this request for information could
be modified to reduce the burden on
respondents.
Information Collection Requirement
OMB Control Number 1652–0053,
Certified Cargo Screening Standard
Security Program, 49 CFR Parts 1515,
1540, 1544, 1546, 1548, and 1549.
Section 1602 of The Implementing
Recommendations of the 9/11
Commission Act of 2007 (Pub. L. 110–
53, 121 Stat. 266, Aug. 3, 2007) (August
2007) (9/11 Act) required the
development of a system to screen 100
percent of such cargo no later than
August 2010. TSA currently requires
100 percent screening of all cargo
transported on passenger aircraft.1 The
screening of air cargo must be in a
manner approved by TSA and be
commensurate with the level of security
for the screening of passenger checked
baggage.2
TSA’s regulations in 49 CFR part 1549
for the Certified Cargo Screening
Program (CCSP) support the 9/11 Act
mandate by providing an alternative
means of compliance with the 100%
screening requirement. In order to
comply with the statutory mandate, the
CCSP allows shippers, indirect air
carriers, and other entities to voluntarily
participate in a program through which
TSA certifies entities to screen air cargo
off-airport before it is tendered to air
1 See
2 Id.
49 CFR 1544.205(g) and 1546.205(g)(1).
See also 49 U.S.C. 44901(g)(2).
VerDate Sep<11>2014
19:10 Nov 17, 2020
Jkt 253001
carriers for transport on passenger
aircraft. CCSFs may screen cargo offairport and must implement measures to
ensure a secure chain of custody from
the point of screening to the point at
which the cargo is tendered to the
aircraft operator. The collection of
information under the CCSP (see OMB
number 1652–0053) are incorporated
into this ICR.
As a signatory to the Convention on
International Aviation, the United States
has agreed to apply the standards
contained in Annex 17 as promulgated
by the International Civil Aviation
Organization (ICAO). Amendment 14 of
Annex 17 removed the distinction
between passenger and cargo operations
and now requires that all cargo be
subject to security controls, including
screening where practicable, on all
commercial air transport operations.3
ICAO has provided until June 30, 2021
for member states to implement the
above standard. When considering the
current requirement to screen 100% of
air cargo transported on passenger and
all cargo aircraft, TSA expects that there
will be an increase in demand for more
options to mitigate the cost of screening
cargo as the United States begins to
build up and implement security
controls to meet the June 30, 2021
deadline to implement Annex 17,
Standard 4.6.1.
In the Spring 2020, OMB approved
TSA’s request to revise the ICR in
response to changing conditions in the
air cargo industry. Consistent with the
need to expand screening capabilities to
meet the ICAO standards that take effect
in 2021, the TSA Modernization Act
required TSA to develop a program for
TSA to certify 3PK9–C Teams to screen
air cargo.4 TSA incorporated this
capability under the framework of the
CCSP, providing an opportunity for
canine team providers to choose to be
regulated as CCSFs under 49 CFR part
1549 and approved to use Certified
3PK9–C Teams to screen cargo for TSA
regulated entities.
All CCSFs are required to allow TSA
to assess whether a person or entity
meets the standards of the applicable
security program requirements. A
CCSF–K9 is an inherently mobile
capability that can screen cargo at the
facility owned and operated by one of
TSA’s regulated entities. As holders of
a TSA-approved security program
issued pursuant to 49 CFR part 1549,
canine providers participating in this
3 See Convention of International Civil Aviation,
Amendment 14, Annex 17, Standard 4.6.1.
4 See sec. 1941 of the FAA Reauthorization Act
of 2019, Division K, Title I (Pub. L. 115–254; 132
Stat. 3186; Oct. 5, 2018).
PO 00000
Frm 00049
Fmt 4703
Sfmt 4703
73503
program can contract with air carriers
and standard CCSFs to screen air cargo,
on or off airport, with canine explosives
detection teams certified as meeting
TSA’s standards. The 3PK9–C program
approves third-party (nongovernmental) certifiers, operating
under the 3PK9–C Certifier Order, to
evaluate canine teams to determine
whether these teams meet the TSA
certification standards.
Recognizing non-governmental
entities to evaluate 3PK9–C Teams to
determine whether these teams meet
TSA’s standards for the certification of
explosives detection canine teams
approved to screen air cargo serves two
purposes. First, it ensures effective
security. TSA must have confidence that
the screening conducted by Certified
3PK9–C Teams will protect air cargo by
identifying unauthorized explosives,
incendiaries, and other destructive
substances and protect the air cargo
from the introduction of these
destructive substances from the time the
cargo is screened until it is accepted by
an aircraft operator or a foreign air
carrier for transport. To provide this
confidence, TSA established uniform
processes and standards for approval of
3PK9–C Certifiers, including
qualification of personnel who will
evaluate canine teams and consistent
application of TSA’s criteria for canine
teams seeking certification or
recertification as a Certified 3PK9–C
Team. Second, the use of third-party
certifiers allows for market-driven
expansion of the program. As required
by section 1941 of the TSA
Modernization Act, no federal funds can
be expended for the training or
certification of canine teams operating
under this program. As with the CCSF–
K9s, qualified persons may apply to
become a 3PK9–C Certifier. If approved,
the 3PK9–C Certifier agrees to comply
with an Order issued by TSA under the
authority of 49 U.S.C. 46105.
There are three primary programs
issued under 49 CFR part 1549 that
ensure compliance with TSA’s
requirements by persons choosing to
participate in the program: (1) The
Certified Cargo Screening Security
Program, applicable to facilities-based
CCSFs; (2) the Certified Cargo Security
Program-Canine, applicable to canine
team providers; and (3) the 3PK9–C
Certifier Order, applicable to third-party
certifiers. The collections of information
under the CCSP are incorporated into
this ICR. The following are required to
maintain participation under the
programs available under the CCSP:
(1a) CCSF Applications. A CCSF and
CCSF–K9 applicant is required to submit an
E:\FR\FM\18NON1.SGM
18NON1
khammond on DSKJM1Z7X2PROD with NOTICES
73504
Federal Register / Vol. 85, No. 223 / Wednesday, November 18, 2020 / Notices
application to become a CCSF at least 90
days before the intended date of operation. In
addition, once certified as a CCSF, the CCSF
is required to submit any changes to the
application information as they occur. CCSFs
must renew their certification every 36
months by submitting a new complete
application. CCSF applicants are required to
provide TSA access to their records,
equipment, and facilities necessary for TSA
to conduct an eligibility assessment. (49 CFR
1549.7). A CCSF–K9 applicant must also
submit an Operational Implementation Plan
(OIP), described within the CCSP–K9 and
any changes to the plan information as they
occur.
(1b) 3PK9–C Certifier Applications. TSA
requires submission of initial applications,
and updates to information in an application,
by any person interested in being a 3PK9–C
Certifier under the 3PK9–C Certifier Order.
(2a) STA Applications. TSA regulations
require CCSF applicants to ensure that
individuals performing cargo screening and
related functions, and their supervisors have
completed an STA conducted by TSA. In
addition, TSA regulations require CCSF
Security Coordinators and their alternates to
successfully have completed an STA. TSA
regulations further require these individuals
to submit personally identifiable information
so that TSA can perform STAs. See TSA
Form 419F, previously approved under OMB
control number 1652–0040 (49 CFR 1549.111
and 1549.103).
(2b) CHRC. TSA requires collection of
personally identifiable information including
fingerprints as necessary to conduct a CHRC
from 3PK9–C Certifiers, CCSF–K9s,
employees and authorized representatives,
and those authorized to conduct 3PK9–C
Program activities with unescorted access to
a Security Identification Display Area,
screening of air cargo, or carrying of
explosives in the air cargo environment.
(3) Recordkeeping. TSA requires CCSFs,
CCSF–K9s, (49 CFR 1549.105), and 3PK9–C
Certifiers to maintain records of compliance
and make them available for TSA inspection.
(4a) Security Programs. TSA requires
CCSFs and CCSF–K9s to accept and operate
under a standard security program provided
by TSA, or submit a proposed modified
security program or amendment(s) to the
designated TSA official for approval initially
and periodically thereafter as required (49
CFR 1549.7).
(4b) The 3PK9–C Certifier Order. TSA
requires 3PK9–C Certifiers to accept
standards provided by TSA, or submit a
proposed modified standard to the
designated TSA official for approval initially
and periodically thereafter as required.
(5) Significant Security Concerns
Information. TSA requires CCSP Holders,
CCSP–K9 Holders, and 3PK9–C Certifiers to
report to TSA incidents, suspicious activities,
and/or threat information.
(6) Security Coordinator. TSA requires
CCSP Holders, CCSP–K9 Holders, and 3PK9–
C Certifiers to provide the name and contact
information of the SC and one or more
designated alternates at the corporate or
ownership level.
VerDate Sep<11>2014
17:59 Nov 17, 2020
Jkt 253001
Estimated Burden Hours
TSA estimates the annual respondents
for CCSF, CCSP–K9, and 3PK9–C
Certifier to be 2,527 and the total annual
hour burden to be 16,189.98 hours.
Dated: November 12, 2020.
Christina A. Walsh,
TSA Paperwork Reduction Act Officer,
Information Technology.
[FR Doc. 2020–25368 Filed 11–17–20; 8:45 am]
BILLING CODE 9110–05–P
DEPARTMENT OF THE INTERIOR
Fish and Wildlife Service
[FWS–R1–ES–2020–N143;
FXES11140100000–212–FF01E00000]
Draft Safe Harbor Agreements and
Draft Environmental Assessments for
the Marbled Murrelet in Washington
State
Fish and Wildlife Service,
Interior.
ACTION: Notice of availability; request
for comments.
AGENCY:
We, the U.S. Fish and
Wildlife Service (Service), received two
applications for enhancement of
survival permits (permits) pursuant to
the Endangered Species Act of 1973, as
amended. The permits would authorize
the incidental take of the threatened
marbled murrelet associated with forest
management actions on private lands.
The applications each include a safe
harbor agreement (SHA), describing the
actions the applicants will take to
achieve a net conservation benefit on
their lands for the species. We also
announce the availability of two draft
environmental assessments (EAs)
addressing the effects of the proposed
permits and SHAs on the human
environment in accordance with the
National Environmental Policy Act. We
invite comments from all interested
parties.
SUMMARY:
To ensure consideration, please
submit written comments by December
18, 2020.
ADDRESSES: You may view or download
copies of the SHAs and draft EAs and
obtain additional information on the
internet at http://www.fws.gov/wafwo/.
To request further information or submit
written comments, please use one of the
following methods, and note that your
information request or comments are in
reference to ‘‘Marbled Murrelet SHAs in
Washington:’’
• Email: [email protected].
• U.S. Mail: Public Comments
Processing, Attn: FWS–R1–ES–2020–
DATES:
PO 00000
Frm 00050
Fmt 4703
Sfmt 4703
N143 U.S. Fish and Wildlife Service;
Washington Fish and Wildlife Office,
510 Desmond Drive SE, Suite 102;
Lacey, WA 98503.
FOR FURTHER INFORMATION CONTACT: Tim
Romanski, Conservation Planning and
Hydropower Branch Manager,
Washington Fish and Wildlife Office
(see ADDRESSES); telephone: 360–753–
5823 or 360–951–4303. If you use a
telecommunications device for the deaf,
please call the Federal Relay Service at
800–877–8339.
SUPPLEMENTARY INFORMATION: The
Service received applications from the
Rayonier Operating Company, LLC
(Rayonier), and the Sierra Pacific Land
& Timber Company Operating Company
(Sierra Pacific) (jointly, the applicants)
for enhancement of survival permits
(permits) pursuant to section 10(a)(1)(A)
of the Endangered Species Act (ESA; 16
U.S.C. 1531 et seq.). The applications
each request a permit that would
authorize ‘‘take’’ of the threatened
marbled murrelet associated with forest
management actions on private lands,
with implementation of a Safe Harbor
Agreement (SHA). The SHAs describe
actions the applicants will take to
achieve a net conservation benefit for
the covered species on the applicants’
lands. The Service also announces the
availability of two draft environmental
assessments (EAs) addressing the effects
of the proposed permits and SHAs on
the human environment in accordance
with the National Environmental Policy
Act (NEPA; 42 U.S.C. 4321 et seq.). We
invite comments from all interested
parties regarding the permit
applications, including the SHAs and
draft EAs.
Background
Section 9 of the ESA prohibits ‘‘take’’
of fish and wildlife species listed as
endangered (16 U.S.C. 1538(a)(1)).
Section 4 of the ESA allows FWS to
issue regulations which prohibit the
take of any fish and wildlife species
listed as threatened, as well (16 U.S.C.
1533(d)). The take prohibition has been
extended to the marbled murrelet.
Under the ESA, the term ‘‘take’’ means
to harass, harm, pursue, hunt, shoot,
wound, kill, trap, capture, or collect, or
to attempt to engage in any such
conduct (16 U.S.C. 1532(19)). The term
‘‘harm,’’ as defined in our regulations,
includes significant habitat modification
or degradation that results in death or
injury to listed species by significantly
impairing essential behavioral patterns,
including breeding, feeding, or
sheltering (50 CFR 17.3). The term
‘‘harass’’ is defined in our regulations as
an intentional or negligent act or
E:\FR\FM\18NON1.SGM
18NON1
File Type | application/pdf |
File Modified | 2020-11-18 |
File Created | 2020-11-18 |