OUR TEAM OF EXPERTS ARE DEDICATED TO PROVIDING COMPREHENSIVE, PLANT-WIDE SECURITY FOR PETROCHEMICAL, ENERGY AND CHEMICAL FACILITIES.WE OFFER COMPREHENSIVE PROTECTION FOR CHEMICAL AND ENERGY FACILITIES, FROM PLANTS AND TERMINALS TO CHEMICAL MANUFACTURING FACILITIES AND CORPORATE HEADQUARTERS AROUND THE WORLD.
Increased perimeter protection
Improved critical asset protection
More secure entry at external and internal access points
Increased operational compliance and safety
Ease of monitoring on or off site
Employee safety tracking
Project Management & Engineering
System Installation & Commissioning
General Security System Construction
Mobile Access Control
MARITIME TRANSPORTATION SECURITY ACT (MTSA)
MTSA, which became law in 2002, was actually drafted prior to 9/11. It’s primary intent was to prevent crime; cargo theft and smuggling that could threaten business operations and commerce. After 9/11, it was expanded to also encompass the threat of terrorism. The Department of Homeland Security, specifically by the US Coast Guard (USCG), manages MTSA.
MTSA is a broad-based regulation that applies to a variety of industries, including petrochemical and chemical businesses. Facilities and vessels located in the US ports or waterways are legally required to comply with security standards designed to identify and deter threats. The security regulations under the Act primarily focus on areas of the maritime industry that pose a higher risk of involvement in a transportation security incident.
MTSA regulated waterfront facilities face many unique challenges because perimeter security technologies must distinguish between the continuous movement of water and movements made by potential perpetrators. Breakthroughs in fiber-based technology, thermal imaging/infrared (IR) and video analytics software have created more effective yet affordable solutions. Region 6’s experts have hands-on experience with advanced perimeter security technologies and how to apply them to your specific compliance needs. Region 6 Security has secured more than 100 MTSA regulated sites. We take security and regulatory compliance as seriously as you do. Our team members have had extensive training on handling MTSA, Sensitive Security Information (SSI). We also have experience in working with Port Security Grant Program Recipient’s stringent requirements, and can help you leverage these funds to support your compliance requirements.
TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL (TWIC™)
TWIC, which initially deployed in 2008, is a key security requirement designed to prevent individuals who pose a threat from gaining unescorted access to secure areas of the nation’s maritime transportation system. TWIC itself is tamper-resistant, photo credential card issued to workers who require unescorted access to ports, vessels, outer continental shelf facilities and all credentialed merchant mariners. TWIC was established by Congress through MTSA and is administered by the Transportation Security Administration (TSA) and USCG.
TWIC has physical security features intended to provide a high level of surety that the cardholder is the same person it was issued to and that card being presented is valid. However, because the Coast Guard has yet to mandate the use of TWIC readers, most facilities have been unable to leverage the full scope of its security benefits.
Region 6 Security has expertise in TWIC integration with physical access control systems (PACS) and also for installing TWIC Readers that are on the USCG ICE list.
CHEMICAL FACILITY ANTI-TERRORISM STANDARDS (CFATS)
In 2007, DHS established CFATS legislation outlining security standards for facilities considered high-risk. CFATS affects more than petrochemical plants, it also encompasses industries or facilities using a list of about 323 Chemicals of Interest (COIs) above the Screening Threshold Quantities (STQ). Affected industries include petrochemical manufacturing, refining, storage and distribution, energy and utilities, agriculture and food, paints and coatings, paper, plastics, explosives, mining, electronics, higher education and healthcare. Tier ratings are based on a combination of COI type, amount and proximity to a populated area. Exemptions include facilities regulated by MTSA, public water or water treatment facilities, facilities operated by Department of Defense or the Department of Energy and those that are subject to regulation by the Nuclear Regulatory Commission.
After a facility submits a Top Screen, DHS determines if a facility falls into one of four preliminary risk tiers. If they do, then they will need to submit a Security Vulnerability Assessment (SVA). After SVA is reviewed, they are notified that they need to submit a Site Security Plan (SSP) for review, inspection and approval.
DHS has published guidelines known as Risk-Based Performance Standards (RBPS) for developing the CFATS SSP. There are 18 RBPS in total and each tier has a specific set of standards to meet. For CFATS regulated facilities, perimeter protection and perimeter detection solutions must help satisfy Risk-Based Performance Standards (RBPS) 1 —“Restrict Area Perimeter” and RBPS 4 — “Deter, Detect and Delay.” The security strategy that is developed correlates to the facilities’ level of risk.
Creating an SSP has been a challenging task for most facilities. Security and safety managers need to leverage the expertise of a security integrator that has deep regulatory know-how. Region 6’s industry professionals have assisted more than 200 CFATS Tier 1 – 4 sites with CFATS security compliance requirements. The Region 6 team of experts has an extensive background in chemical plant security with an understanding of the industry’s needs and complexities. We fully understand RBPS requirements and CFATS Tiering and can help you to develop an effective, complaint yet cost effective security plan. Compliance is a serious business and all of our employees have DHS Chemical-terrorism Vulnerability Information certificates (CVI). To we take it a step further — and provide mandatory advanced training as to what needs to be kept private and how. This helps to ensure that your facility’s information does not fall into public hands.
NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION, CRITICAL INFRASTRUCTURE PROTECTION (NERC – CIP)
NERC is a non-profit corporation created to ensure that the bulk electric system in North America is reliable, satisfactory and secure. In June 2006, NERC adopted Cyber Security Standards CIP-002 through 009 specifying the minimum requirements needed to safeguard the security of the cyber assets and information to support the bulk power system. NERC-CIP identifies standards in critical areas designed to protect power plants and all other facets of electric utility operations and their assets.
These standards include measures for identifying critical cyber assets, developing security management controls, training, perimeter and physical security, incident reporting and response planning, and recovery plans.
Your security team needs an integrator that understands the relationship and between cyber and physical electronic security and the experience to help you develop a solid plan. We have worked on more than 300 NERC-CIP sites. Region 6’s team of professional has the experience, risk based methodology and the know-how to translate it into a security strategy to help you meet NERC-CIP security compliance requirements.