Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Security Act /TWIC
●Abandoned option of making only restricted areas secure areas.
●Equating the restricted area to the secure area would have required that the readers and biometric verification be used at the entry points of each restricted area
(Ref: Federal Register/Vol. 72, No 16 p.3498)
●Defining the secure area beyond the restricted areas makes the event of an intentional TSI less likely (Significant loss of life, environmental damage, transportation system disruption, or economic disruption in a particular area)
● Decision made to define the secure area as the access control area thus limiting the number of readers required, as well as the number of times biometric verification would need to take place, and providing for the necessary level of security outside of restricted areas.
● Facility owners/operators have the discretion to designate their entire facility as a restricted area. In this situation, the restricted area and secure area would be one and the same.
Includes: Piers, tanks farms, storage areas (warehouses), container yards
U.S. Coast Guard