Kirkpatrick & Lockhart LLP Homeland Security Bulletin SEPTEMBER 2003 Homeland Security Spurs New Regulatory Requirements for Over 5000 Businesses with Facilities Near Ports, Rivers, Lakes, Streams and Wetlands1 In an effort to improve homeland security, on November 25, 2002, President Bush signed the Maritime Transportation Security Act of 2002 (“MTSA”). Pub. L. 107-295 (November 25, 2002). The purpose of MTSA is to provide for efficient, coordinated, and effective action to deter and minimize damage associated with marine transportation security incidents2 —terrorist attacks— in the nation’s ports and waterways. See 46 U.S.C. § 70103(a)(2). The Coast Guard promulgated MTSA’s implementing regulations through an interim final rule on July 1, 2003. Implementation of National Maritime Security Initiatives, 68 Fed. Reg. 39,240 (2003). 3 MTSA subjects owners and operators of certain facilities and vessels to an additional layer of regulations, additional inspections, and possible penalties. MTSA requires owners and operators of certain facilities to, among other things, perform security assessments, implement or amend security plans, and conduct regular training and drills at the facility. Further, facilities may be subject to a number of unknown area-specific requirements under this new law. This Bulletin provides a brief overview of the core requirements of MTSA and its regulations. The reach of MTSA appears broad, reaching any facility that is near a “water” of the United States, regardless of its relationship to ships and other vessels. Although the security requirements are by regulation limited to facilities that interface with vessels, the area maritime security plan may impose obligations with a broader effect. BACKGROUND In December 2002, a month following the enactment of MTSA, the International Maritime Organization (“IMO”), which includes the United States, adopted new security amendments to the Convention for the Safety of Life at Sea (“SOLAS”) and a new International Ship and Port Facility Security (“ISPS”) Code. See 67 Fed. Reg. 79,742 (2002). The requirements of MTSA parallel the 1 This is the fourth in a series of articles discussing new federal environmental regulatory requirements arising in connection with Homeland Security. Background information can be found in the Homeland Security page of kl.com 2 A “transportation security incident” is a “security incident resulting in a significant loss of life, environmental damage, transportation system disruption, or economic disruption in a particular area.” 46 U.S.C. § 70101(6). 3 MTSA required the Coast Guard to issue an interim final rule as a temporary implementing regulation and expressly waived the requirements of the Administrative Procedure Act (“APA”). See 46 U.S.C. § 70117(d). The Coast Guard plans on issuing the final rule in on or about October 25, 2003. MTSA mandates that the final rule be issued within one year of its passage. Regardless of congressional limits on APA review, the rules are subject to challenge to the extent they exceed the statutory authority granted the agency. Leedom v. Kyne, 358 U.S. 184 (1953); Aid Ass’n for Lutherans v. United States Postal Service, 321 F.3d 1166 (D.C. Cir. 2003). Kirkpatrick & Lockhart LLP Homeland Security Bulletin security requirements set forth in the SOLAS amendments and the ISPS Code, but MTSA goes one step further—it applies to domestic vessels and facilities. Id. public or private entity, including any contiguous or adjoining property under common ownership or operation.” 68 Fed. Reg. at 39,280 (to be codified at 33 C.F.R. § 101.105). The Coast Guard, which is now part of the Department of Homeland Security, is responsible for implementing and enforcing MTSA. On December 30, 2002, the Coast Guard issued a notice in the Federal Register seeking comments in connection with its effort to establish requirements for security assessments, plans, and specific security measures for ports, vessels, and facilities as required by MTSA. See 67 Fed. Reg. 79,742. Following that comment period, on July 1, 2003, the Department of Homeland Security adopted an interim final rule, which became effective immediately. See 68 Fed. Reg. 39,240. With this definition, it appears that the Coast Guard is seeking to interpret MTSA expansively, just as other agencies have attempted to do when defining “waters of the United States” under legislation such as the Clean Water Act.4 This application also is consistent with the Coast Guard’s expanded jurisdiction under the Ports and Waterways Safety Act. See 33 U.S.C. § 1221 et seq. (where Congress defined “marine environment” as “navigable waters.”). Accordingly, it appears that the Coast Guard is asserting jurisdiction over any facility adjacent to any body of water that affects interstate commerce or body of water that is hydrologically connected to water that affects interstate commerce. This would include the Great Lakes and many rivers within the United States. A recent guidance document issued by the Coast Guard is consistent with this broad approach: MTSA’S BROAD REACH Unlike the SOLAS amendments and the ISPS Code, which apply only to port or waterfront facilities, MTSA applies to all “facilities.” See 46 U.S.C. § 70101 et seq. Congress defines “facility” as “any structure or facility of any kind located in, on, under or adjacent to any waters subject to the jurisdiction of the United States.” 46 U.S.C. § 70101(2) (emphasis added). Notably, this definition does not limit application to ports, wharves, docks, piers, and the like. Within the interim final rule, the Coast Guard attempted to clarify the definition by stating that facilities include those that are “used, operated, or maintained by a 4 [Congress] indicates the clear intent that the Coast Guard maritime security regulations should be aligned with our broader authority under the Ports and Waterways Security Act (33 U.S.C. § 1221 et seq.) related to any public or commercial structure located on or adjacent to the marine environment, rather than our traditional approach of focusing on installations and terminals that have accommodations for vessels. The United States has asserted Clean Water Act jurisdiction over isolated wetlands and other areas not apparently connected to interstate waters, such as rivers. This extensive jurisdictional reach was recently limited by the United States in Solid Waste Agency of Northern Cook County v. U.S. Army Corps of Engineers, 531 U.S. 159 (2001). 2 KIRKPATRICK & LOCKHART LLP HOMELAND SECURITY BULLETIN See Navigation and Vessel Inspection Circular (“NVIC”) entitled “Recommended Security Guidelines for Facilities,” NVIC No. 11-02 (Jan. 13, 2002) at p. 2 (www.uscg.mil/hq/g-m/nvic/ 11-02.pdf). APPLICABILITY The Department of Homeland Security has estimated that MTSA’s facility security requirements will affect the method by which over 5,000 facilities conduct business in the United States. See U.S. Department of Homeland Security Press Secretary Fact Sheet (July 2003). Under the interim final rule, and effective immediately, the Facility Security requirements apply to: 1. Facilities that interface with vessels and that handle: (i) Class 1 (explosive) materials or other dangerous cargoes regulated under 33 C.F.R. § 126; (ii) liquefied natural gas and liquefied hazardous gas regulated under 33 C.F.R. § 127; and (iii) oil and hazardous materials in bulk regulated under 33 C.F.R. § 154; 5 2. Facilities that receive vessels that are certified to carry more than 150 passengers; 3. Facilities that receive vessels subject to SOLAS, or certain commercial vessels subject to 46 C.F.R. § 90 (cargo and miscellaneous vessels), that are greater than 100 tons on international voyages, including vessels solely navigating the Great Lakes; or 4. Fleeting facilities that receive barges carrying, in bulk, cargoes regulated by 46 C.F.R. § 30 (tank vessels) and 46 C.F.R. § 150 (certain bulk 5 dangerous cargoes), or Certain Dangerous Cargoes as defined by 33 C.F.R. § 160.230 (certain explosive, oxidizing, radioactive, or hazardous materials). See 33 C.F.R. §105.105. As discussed below, these regulated facilities must prepare Facility Security Plans (“FSPs”) and submit the plans to the Coast Guard for review and approval. The Facility Security regulations do not apply to: 1. Certain facilities that are owned and operated by the United States; 2. Any oil and natural gas production, exploration, or development facility regulated by 33 C.F.R. § 126 or 154 if the facility is engaged solely in the exploration, development, or production of oil or natural gas and if it does not meet or exceed the following operating conditions: (i) hosts more than 150 persons for 12 hours or more in each 24hour period continuously for 30 days or more; (ii) produces greater than 100,000 barrels of oil per day; or (iii) produces greater than 200 million cubic feet of natural gas per day; 3. Any facility that supports the production, exploration or development of oil and natural gas regulated by 33 C.F.R. § 126 or 154 if the facility is engaged solely in the exploration, development, or production of oil or natural gas and (i) the facility transports or stores quantities of hazardous materials that do not meet or exceed those specified in 49 C.F.R. § 172.800(b)(1)-(6) or (ii) the facility stores less than 42,000 gallons of cargo regulated by 33 C.F.R. § 154; This is a clear deviation from the Coast Guard’s plans several months ago when it was considering a much more broad implementation of its regulatory powers and application of MTSA regulatory requirements. See 67 Fed. Reg. 79742 (2002) and NVIC No. 11-02, supra, at p. 2. SEPTEMBER 2003 Kirkpatrick & Lockhart LLP Homeland Security Bulletin 4. Mobile facilities regulated by 33 C.F.R. § 154; or 5. Isolated facilities that receive materials regulated by 33 C.F.R. § 126 or 154 by vessel due to lack of road access to the facility and do not distribute the material through secondary marine transfers. See 33 C.F.R. §105.105. “Non-regulated” facilities – i.e., facilities not specifically subject to the Facility Security regulations – are not exempt from MTSA’s reach. Non-regulated facilities must comply with Area Maritime Security requirements, as well as the general provisions of the MTSA regulations. See id. Further, as discussed below, a non-regulated facility may be subjected to requirements outlined in the Area Maritime Security Plan if the Area Maritime Security Committee identifies the facility as a “risk” and the Captain of the Port (“COTP”) issues an order to take certain security actions to ensure port security. Area Maritime Security, 68 Fed. Reg. 39,284, 39,291 (2003) (to be codified at 33 C.F.R. § 103.310).6 MTSA REQUIREMENTS MTSA sets forth numerous requirements of owners and operators of facilities. To provide some context to the new facility security requirements, we will first provide a brief review of the national and area maritime security requirements. National Maritime Security The Coast Guard is required to develop a National Maritime Transportation Security Plan (“National Plan”) for deterring and responding to a transportation security incident. The plan will identify areas that will be covered by each COTP acting as the Federal Maritime Security Coordinator for each area. Notably, the National Plan must include “a system of surveillance and notice designed to safeguard against as well as ensure the earliest possible notice of a transportation security incident and imminent threats of such a security incident to the appropriate State and Federal agencies.” 46 U.S.C. § 70103(a)(2)(E).7 Additionally, the National Plan will identify areas for which Area Maritime Security Plans must be prepared. See 46 U.S.C. § 70103(a)(2)(G). The Coast Guard has declined to publish rules in connection with the National Plan at this time, claiming that it is not necessary to implement the facility security rule requirements. See 68 Fed. Reg. 39,240, 39,270 (2003). Area Maritime Security Area Plan The COTP of each area assumes ultimate responsibility for creating and implementing the Area Maritime Transportation Security Plan (“Area Plan”) within his or her designated area for each of the 361 ports in the United States. See 33 C.F.R. § 6 The general and area maritime security provisions do not define “risk”; although, parenthetically, the Coast Guard indicates that the Area Maritime Security Committee should focus on “threats, vulnerabilities, and consequences” when developing an Area Security Plan. 33 C.F.R. §103.310(a)(2). The preamble to the general provisions defines “threat” as “a measure of the likelihood of an attack,” “vulnerability” as “the conditional probability of success given that a threat scenario occurs,” and “consequence” as “the estimation of adverse effect from the target/attack scenario.” 68 Fed. Reg. 39,244 (2003). 7 To the extent information collected by the Coast Guard implicates other statutes, there appears to be nothing to preclude the Coast Guard from sharing such information with agencies charged with administering these other statutes. 4 KIRKPATRICK & LOCKHART LLP HOMELAND SECURITY BULLETIN 103.300; see also U.S. Department of Homeland Security Press Secretary Fact Sheet (July 2003). Area Plans must describe the area and infrastructure covered by the Area Plan, and how it meshes with other Area Plans, and vessel and facility plans. See 46 U.S.C. § 70103(b)(2). The Area Plan must be adequate to deter a transportation security incident in or near the area to the maximum extent practicable, and be updated every 5 years. See id. The AMS Plan is primarily a communication and coordination document that includes: 1. Details of operational and physical measures that must be in place at all MARSEC8 levels; 2. Communications procedures; 3. Measures to ensure the security of non-regulated vessels, facilities, and operations; 4. Periodic review, audit and updating procedures; 5. Measures to ensure the security of AMS Plan information; and performed by the AMS Committee or its designee. See 33 C.F.R. §§ 103.300–103.400. Responsibilities of the AMS Committee include: 1. Identifying critical port infrastructure and operations; 2. Identifying risks; 3. Determining mitigation strategies and implementation methods; 4. Developing and describing the process to continually evaluate overall port security; and 5. Advising and assisting the COTP in developing the Area Plan. See 33 C.F.R. § 103.310(a). During preparation of the AMS Assessment, the AMS Committee must consider any areas that “may, if damaged, pose a risk to people, infrastructure or operations within the port,” including: 6. Procedures for reporting security incidents. 1. Physical security of the infrastructure and operations at the port; See 33 C.F.R. § 103.505. 2. Structures considered critical for the continued operation of the port; Area Maritime Security Committee and Assessments The COTP works closely with the local Area Maritime Security (“AMS”) Committee9 to prepare the Area Plan. The first step in developing an AMS Plan involves an AMS Assessment, which is 3. Existing security systems and equipment available to protect maritime personnel; 4. Procedural policies; 8 The Coast Guard will communicate heightened levels of alert using MARSEC levels 1, 2, and 3 that align with the now all-toofamiliar graduated color-coded threat condition levels defined by the Homeland Security Advisory System (“HSAS”). MARSEC is the maritime sector’s tool for communicating risk and in most cases will be linked to the HSAS. See 68 Fed. Reg. 39,240 (2003). 9 Each AMS Committee must have at least 7 members, each having at least 5 years of experience related to port or maritime security operations. See 33 C.F.R. §103.305. Members may be selected from Federal, State, or local government and stakeholders. See id. SEPTEMBER 2003 Kirkpatrick & Lockhart LLP Homeland Security Bulletin 5. Radio and telecommunication systems, including computer systems and networks; 6. Relevant transportation infrastructure; 7. Utilities; and 8. Security resources and capabilities. See 33 C.F.R. § 103.405(b). AMS Assessments may be performed by a third party approved by the AMS Committee. See 33 C.F.R. § 103.400(b). The information gathered during the AMS Assessment will be used by the COTP to develop the AMS Plan. See 33 C.F.R. § 103.500(a). The AMS Committee must prepare a written report of its findings upon completion of the Assessment. The report must detail (1) how the AMS Assessment was conducted, (2) all vulnerabilities and consequences found during the AMS Assessment, and 3) riskreducing strategies that could be used to ensure continued operation at an acceptable risk level. See 33 C.F.R. § 103.400(c). Exercises and Recordkeeping The COTP and AMS Committee will conduct periodic exercises to test the effectiveness of the Area Plan. See 33 C.F.R. § 103.515. Exercise documentation will be kept for 2 years. All records relating to the AMS Assessment or Area Plan will be kept for 5 years. See 33 C.F.R. § 103.520. Penalties No specific civil and criminal penalties are identified in the interim rule in connection with noncompliance with the AMS Plan, although the Coast Guard may have the authority to order the performance of a specific action required by an AMS Plan to ensure port, harbor and coastal facility security. See generally the Magnuson Act, 50 U.S.C. § 191 et seq.; the Ports and Waterways Safety Act, 33 U.S.C. § 1221 et seq.10 Should the Coast Guard attempt to use the Ports and Waterways Safety Act for enforcement, violations may result in civil penalties of up to $25,000 per violation and criminal penalties. See 33 U.S.C. § 1232. In light of this possibility, it would behoove non-regulated facilities, such as port stakeholders, to participate actively in AMS Committee activities. Facility Security Facility Security Plan Before December 30, 2003, owners or operators of regulated facilities must complete and submit FSPs to the Coast Guard for review and approval. See Facility Security, 68 Fed. Reg. 39,315, 39,323 (2003) (to be codified at 33 C.F.R. § 105.115). The FSP is the “plan developed to ensure the application of security measures designed to protect the facility and its servicing vessels or those vessels interfacing with the facility, their cargoes, and persons on board at the respective MARSEC levels.” 33 C.F.R. § 101.105. 10 Port and Waterways Safety Act regulations state that the Coast Guard, to prevent damage or destruction of “any bridge or other structure on or in the navigable waters of the United States, or any land structure or shore area immediately adjacent to such waters, and to protect the navigable waters and the resources therein from harm resulting from vessel or structural damage, destruction, or loss,” may “[d]irect the handling, loading, unloading, storage, and movement (including the emergency removal, control and disposition) of explosives or other dangerous articles or substances, including oil or hazardous material as those terms are defined in 46 U.S.C. 2101 on any structure or shore area immediately adjacent to those waters . . . .” 33 C.F.R. § 160.109. 6 KIRKPATRICK & LOCKHART LLP HOMELAND SECURITY BULLETIN FSPs must be consistent with the requirements of the National and Area Maritime Transportation Security Plans. See 46 U.S.C. § 70103(c)(3)(A). FSPs may be submitted and approved to cover more than one facility where “they share similarities in design and operations,” and if authorized by the COTP. 33 C.F.R. § 105.410. FSPs should align security measures with a national system of threat or MARSEC levels. 33 C.F.R. § 101.200. Generally, FSPs must also: 1. Identify the qualified individuals charged with the responsibility of implementing the FSP; 2. Include provisions for (i) establishing and maintaining physical security, passenger cargo security, and personnel security, (ii) establishing and controlling access to secure areas of the vessel facility, (iii) procedural security policies, and (iv) communications and other systems; 3. Identify, and ensure by other means approved by the Coast Guard, the availability of security measures necessary to deter, to the maximum extent practicable, a transportation security incident or a substantial threat of such a security incident; 4. Describe training, periodic unannounced drills, and security actions to be effectuated under the FSP; 5. Be resubmitted for approval for each change to the vessel or facility that may “substantially” affect the security of the vessel or facility; and 6. Be updated at least every 5 years. 46 U.S.C. § 70103(c)(3). Approved FSPs are valid for 5 years from the date of approval. See id. FSPs must be amended: (1) upon request by the COTP, (2) when changes in operations or procedures at the facility necessitate an SEPTEMBER 2003 amendment, or (3) upon a change in owner or operator. See 33 C.F.R. § 105.415. FSPs must be audited annually by the anniversary of approval, and when there has been a change in ownership or operations or modifications to the facility involving emergency response procedures, physical structure changes, security measures or operations. See id. Audits completed as a result of modifications to the facility need only be limited to affected sections. See id. If an audit results in a conclusion that an amendment is necessary, the FSO must submit to the COTP appropriate amendments for review and approval with a certification that the amendments satisfy the facility security rules. See id. Facility Security Officer (“FSO”) One of the first steps owners and operators must do to achieve compliance with MTSA is to designate an FSO. See 33 C.F.R. § 105.200. The FSO is the “person designated as responsible for the development, implementation, revision and maintenance of the facility security plan and for liaison with the COTP” and other security officers. 33 C.F.R. § 101.105. Facility owner or operators must designate, in writing, an FSO for each facility to assume compliance responsibility. See 33 C.F.R. § 105.200. FSOs must have general knowledge, through training or equivalent job experience, on a range of issues such as security administration, relevant international laws, domestic regulations, current security threats and patterns, risk assessment methodology, inspections, control procedures and conducting audits. See 33 C.F.R. §105.205. The FSO is responsible for implementing the FSP, periodically auditing and updating the FSA and FSP, ensuring that adequate training is provided to facility personnel, and ensuring that the facility is operating Kirkpatrick & Lockhart LLP Homeland Security Bulletin in accordance with the FSP and in continuous compliance with MTSA and its regulations. See id. The FSO may perform other duties within the organization, provided he or she is able to perform the function of an FSO. See 33 C.F.R. § 105.205. FSOs may also serve more than one facility. However, the facilities must be in the same COTP zone and not more than 50 miles apart. See id. All other employees responsible for security duties must possess the requisite knowledge, through training or equivalent job experience, as appropriate, to implement the FSP. See 33 C.F.R. § 105.210. Facility Security Assessment Production of an FSP begins with a Facility Security Assessment (“FSA”). The FSA is a written document that is based on the collection of background information, the completion of an onsite survey and analysis of that information. See 33 C.F.R. § 105.300. Owners and operators of facilities are required to complete FSAs, but third-party assistance is acceptable with the FSO’s blessing. See id. A common FSA may be conducted for more than one similar facility provided the FSA reflects any facility-specific requirements that are unique. See id. An “on-scene” survey must be conducted during the FSA process. See id. The FSA must consider and evaluate all “vulnerabilities” of the facility, such as access, existing facility procedures and policies, structural integrity of the facility, deficiencies, possible security threats, likely consequences of an attack, and access-restricted areas based on each MARSEC level. See id. A written report must be prepared upon completion of an FSA and must be made part of the written FSP.11 See id. Facility Personnel Training All non-security employees or contractors— including part-time, full-time, temporary, or permanent—must have knowledge, through training or equivalent job experience, of the relevant provisions of the facility’s FSP, MARSEC level requirements, recognition and detection of dangerous substances and devices, recognition of characteristics and behavioral patterns of persons who are likely to threaten security, and techniques used to circumvent security measures. See 33 C.F.R. § 105.215. Exercises and Drills Regulated facilities are required to conduct training exercises at least once per calendar year, with no more than 18 months between exercises. See 33 C.F.R. § 105.220. Exercises are a full test of the security program and must involve “substantial and active” participation by FSOs. Id. Exercises may include government authorities and vessels, and may be facility-specific, or part of a cooperative exercise program with applicable FSPs. See id. Drills, which are similar in scope to exercises, must be conducted at least every three months and test individual elements of the FSP. See id. 11 MTSA requires that documents related to security, especially security assessments and plans, be kept in a manner that is protected from unauthorized access or disclosure. See 46 U.S.C. § 70103(d). The Coast Guard has designated security-related material in this interim rule as Sensitive Security Information (“SSI”) in accordance with 49 C.F.R. § 1520. See 68 Fed. Reg. at 392,81. Information designated as SSI is generally exempt under the Freedom of Information Act. See 49 C.F.R. § 1520. Although the statute does not expressly preempt State disclosure laws in direct conflict with 49 C.F.R. § 1520, the Coast Guard believes that any such laws are preempted by 49 C.F.R. § 1520. See 68 Fed. Reg. at 39,256. 8 KIRKPATRICK & LOCKHART LLP HOMELAND SECURITY BULLETIN Waivers, Equivalents, and Alternative Security Programs Facility owners and operators may request the Coast Guard, in writing, for a “waiver” of any facility security requirement that is considered unnecessary “in light of the nature or operating conditions of the facility, prior to operating.” 33 C.F.R. § 105.130. In addition, when seeking approval of its FSP, facility owners and operators may seek approval of an “equivalent” security measure to substitute for any specific facility security requirement. See 33 C.F.R. § 105.135. Finally, an approved Alternative Security Program (“ASP”) may be used if the ASP is appropriate for the facility, implemented in its entirety, and a Facility Vulnerability and Security Measures Summary form is completed and submitted to the Coast Guard. See 33 C.F.R. § 105.140. If an ASP is used, it “must be comprehensive and based on a security assessment to demonstrate that it meets the intent of [the rule].” 68 Fed. Reg. 39,315, 39,317 (2003). The denial of a waiver is likely to constitute final agency action that is reviewable in federal district court, once all administrative appeals through the Coast Guard are exhausted. The Coast Guard will accept self-assessments or demonstration using any acceptable risk management tool to evaluate waivers, equivalents, and ASPs to show that the alternative is at least as effective as the rule. See id. that are required to prepare and submit FSPs are prohibited from operating after one year from issuance of the interim final regulations unless: (1) its FSP has been approved by the Coast Guard, and (2) the facility is operating in compliance with its FSP. 46 U.S.C. § 70103(c)(5). Plans that are deemed insufficient will be required to be amended. By July 1, 2004, facility owner and operators must produce one of the following to the Coast Guard upon request: 1. The approved FSP, including any revisions or amendments and a letter from the COTP approving the FSP dated within the past 5 years; 2. The FSP submitted for approval and an acknowledgement letter from the COTP stating that the Coast Guard is currently reviewing the FSP for approval, and that the facility may continue to operate so long as the facility remains in compliance with the submitted FSP; or 3. A copy of a Coast Guard-approved ASP and a letter signed by the facility owner or operator certifying that the ASP is in full compliance with its ASP. See 33 C.F.R. § 105.120. In addition to the above, the facility must keep records in connection with the following for 2 years: 1. Training; Compliance and Recordkeeping As mentioned, owners or operators of regulated facilities must complete and submit their FSPs to the Coast Guard for review and approval on or before December 30, 2003. See 33 C.F.R. § 105.115. By July 1, 2004, each facility owner or operator must be operating in compliance with MTSA’s implementing regulations. See id. According to MTSA, facilities SEPTEMBER 2003 2. Drills and exercises; 3. Incidents and breaches of security; 4. Changes in MARSEC levels; 5. Maintenance, calibration, and testing of security equipment; Kirkpatrick & Lockhart LLP Homeland Security Bulletin 6. Security threats; 7. Declarations of Security12 ; and 8. The annual audit of the FSP. See 33 C.F.R. § 105.225. The rule does not specify format and storage requirements for such records. Penalties Facilities that do not comply with MTSA may be subject to criminal penalties and civil penalties up to $25,000 per violation. Civil and criminal penalties for violations of control and compliance measures, including COTP orders and security zones, may be punishable under the Ports and Waterways Safety Act and the Magnuson Act. See 33 C.F.R. § 101.415(a).13 Civil penalties of up to $25,000 may also be assessed for non-compliance with any other requirement of MTSA, including those contained in MARSEC Directives. See 33 C.F.R. § 101.415(b).14 Finally, non-compliance may also result in : 1. Restrictions on facility access; 2. Conditions on facility operations; Compliance Inspections The Coast Guard will verify facility compliance through established inspection procedures already associated with: (1) Class 1 (explosive) materials or other dangerous cargoes regulated under 33 C.F.R. § 126, (2) liquefied natural gas and liquefied hazardous gas regulated under 33 C.F.R. § 127, and 3) oil and hazardous materials in bulk regulated under 33 C.F.R. § 154. See 68 Fed. Reg. 39315, 39316 (2003). Right to Appeal Any facility owner or operator directly affected by a decision or action taken by the Coast Guard pursuant to MTSA may appeal. See 33 C.F.R. § 101.420. Decisions made by the COTP may be appealed to the District Commander. See id. Decisions made by the District Commander or the Commanding Officer of the Marine Safety Center may be appealed to the Commandant (G-MP). See id. Decisions made by the Commandant (G-MP) are considered final agency action.15 See id. Final agency action by the Commandant is subject to review by a U.S. district court. 3. Suspension of facility operations; 4. Lesser administrative or corrective measures; or 5. Suspension or revocation of security plan approval. In light of the apparent broad scope of this new law, and the additional regulatory requirements and potential penalties associated with non-compliance, it is advisable for companies that are “in, on, under or adjacent to any waters subject to the jurisdiction See 33 C.F.R. § 101.410(c). 12 A Declaration of Security (“DoS”) is an agreement executed between a responsible vessel and FSO that provides a means for ensuring that all shared security concerns are properly addressed and security will remain in place during the time the vessel is moored to the facility. See 33 C.F.R. § 101.105. Only certain passenger vessels and vessels carrying certain dangerous cargoes, in bulk, will complete a DoS for every evolution regardless of the MARSEC level. See 33 C.F.R. § 105.245. At MARSEC Levels 2 and 3, all vessels and facilities would need to complete a DoS. See id. 13 Criminal penalties require knowledge that one is violating the order, etc. See 33 U.S.C. § 1232(b). 14 MTSA is silent on whether civil penalty assessments require knowledge of the violation. See 46 U.S.C. § 70117. It is likely that the Coast Guard will assert that strict liability applies. 15 Arguably, a third party may challenge the issuance of a waiver, equivalent or approval of an alternative security plan as a final agency action, if it has standing to do so. 10 KIRKPATRICK & LOCKHART LLP HOMELAND SECURITY BULLETIN of the United States” to review the forthcoming rule and, if necessary, take the appropriate steps to achieve full compliance with its requirements. K&L’s Homeland Security Practice includes attorneys with the experience and resources to assist clients in understanding and complying with this developing body of regulatory requirements. We presently represent a number of clients in the chemical, academic, water utilities, research institutions, and oil and natural gas transportation industries and are sensitive to the potential impacts of these new requirements on our clients’ activities. We can assist clients in commenting on proposed rules, counsel them on compliance with new regulations, and represent them before the agencies and in court when necessary to ensure that their views are heard or their interests are defended. For more information, please visit the Homeland Security Practice, Environmental and Natural Resources, and White Collar Criminal Defense areas on our website at www.kl.com. BARRY M. HARTMAN 202.778.9338 bhartman@kl.com CRAIG P. WILSON 717.231.4509 cwilson@kl.com JOHN A. ORLOWSKI 973.848.4037 jorlowski@kl.com For further information regarding this Homeland Security Bulletin, or our law firm’s Homeland Security practice, please contact: Boston Jeffrey S. King 617.261.3179 jking@kl.com Dallas Julie E. Lennon 214.939.4920 jlennon@kl.com Harrisburg Craig P. Wilson 717.231.4509 cwilson@kl.com Los Angeles David P. Schack 310.552.5061 dschack@kl.com Miami Daniel A. Casey 305.539.3324 dcasey@kl.com Troy J. Rillo 305.539.3355 trillo@kl.com Newark William H. Hyatt 973.848.4045 whyatt@kl.com Brian S. Montag 973.848.4044 bmontag@kl.com New York Eva M. Ciko 212.536.3905 eciko@kl.com Pittsburgh Thomas J. Smith 412.355.6758 tsmith@kl.com Mark A. Rush 412.355.8333 mrush@kl.com San Francisco Robert J. Sherry 415.249.1032 rsherry@kl.com Washington Barry M. Hartman 202.778.9338 bhartman@kl.com Dick Thornburgh 202.778.9080 dthornburgh@kl.com ® Kirkpatrick & Lockhart LLP Challenge us. ® www.kl.com BOSTON n DALLAS n HARRISBURG n LOS ANGELES n MIAMI n NEWARK n NEW YORK n PITTSBURGH n SAN FRANCISCO n WASHINGTON ......................................................................................................................................................... This bulletin is for informational purposes and does not contain or convey legal advice. The information herein should not be used or relied upon in regard to any particular facts or circumstances without first consulting a lawyer. SEPTEMBER 2003 LLP. ALL RIGHTS RESERVED. © 2003 KIRKPATRICK & LOCKHARTKirkpatrick & Lockhart LLP Homeland Security Bulletin 75 State Street Boston, Massachusetts 02109 TEL 617.261.3100 FAX 617.261.3175 2828 North Harwood Street Suite 1800 Dallas, Texas 75201 TEL 214.939.4900 FAX 214.939.4949 Payne Shoemaker Building 240 North Third Street Harrisburg, Pennsylvania 17101 TEL 717.231.4500 FAX 717.231.4501 10100 Santa Monica Boulevard Seventh Floor Los Angeles, California 90067 TEL 310.552.5000 FAX 310.552.5001 Miami Center - 20th Floor 201 South Biscayne Boulevard Miami, Florida 33131 TEL 305.539.3300 FAX 305.358.7095 The Legal Center One Riverfront Plaza, Seventh Floor Newark, New Jersey 07102 TEL 973.848.4000 FAX 973.848.4001 599 Lexington Avenue New York, New York 10022 TEL 212.536.3900 FAX 212.536.3901 Henry W. Oliver Building 535 Smithfield Street Pittsburgh, Pennsylvania 15222 TEL 412.355.6500 FAX 412.355.6501 Four Embarcadero Center, 10th Floor San Francisco, California 94111 TEL 415.249.1000 FAX 415.249.1001 1800 Massachusetts Avenue, N.W. Suite 200 Washington, D.C. 20036 TEL 202.778.9000 FAX 202.778.9100 ® www.kl.com Kirkpatrick & Lockhart LLP Challenge us. ® 12 KIRKPATRICK & LOCKHART LLP HOMELAND SECURITY BULLETIN