Download:
pdf |
pdfFederal Register / Vol. 89, No. 178 / Friday, September 13, 2024 / Notices
In
accordance with Federal regulations and
statutes, when protests are filed, the
contracting officer will require
information/documentation such as
detailed statements of legal and factual
grounds for the protests, copies of
relevant documents, solicitation or
contract number, and requests for a
ruling by the agency. The Federal
Acquisition Regulation (FAR) and 48
CFR chapter 1 provide general
procedures on handling protests
submitted by contractors to Federal
agencies. FAR part 33, Protests,
Disputes and Appeals, prescribes
policies and procedures for filing
protests and for processing contract
disputes and appeals. While the FAR
prescribes the procedures to be followed
for protests to the agency, it allows
agencies to determine the method of
receipt. DHS will utilize electronic
mediums (email or facsimile) for
collection of information and will not
prescribe a format or require more
information than what is already
required in the FAR. If DHS determines
there is a need to collect additional
information outside of what is required
in the FAR, DHS will submit a request
to the Office of Management and Budget
(OMB) for approval. The prior
information collection request for OMB
No. 1600–0004 was approved through
November 30, 2024, by OMB in a Notice
of OMB Action. This justification
supports a request for an extension of
the approval.
The information being collected will
be obtained from contractors as part of
their submissions whenever they file a
bid protest with DHS. The information
will be used by DHS officials in
deciding how the protest should be
resolved. Failure to collect this
information would result in delayed
resolution of protests. Agency protest
information is contained in each
individual solicitation document, and
provides the specified contracting
officer’s name, email, and mailing
address that the contractors would use
to submit its response. The FAR does
not specify the format in which the
contractor should submit protest
information. However, most contractors
use computers to prepare protest
materials and submit time sensitive
responses electronically (email or
facsimile) to the specified Government
point of contact. Since the responses
must meet specific timeframes, a
centralized mailbox or website would
not be a practical method of submission.
Submission of protest information
through contracting officers’ email or
through facsimile are the best methods
khammond on DSKJM1Z7X2PROD with NOTICES
SUPPLEMENTARY INFORMATION:
VerDate Sep<11>2014
17:53 Sep 12, 2024
Jkt 262001
to use to document receipt of protest
information, and are the methods most
commonly used in the Government
protest process. This information
collection may involve small business
contractors, depending on the particular
transaction. The burden applied to
small businesses is minimal and
consistent with the goals of achieving
timely resolution of agency protests.
This information is collected only when
contractors choose to file a protest to the
agency. The information is requested
from contractors so that the Government
will be able to evaluate protests
effectively and provide prompt
resolution of issues in dispute when
contractors file such claims.
DHS/ALL/PIA–006 General Contact
Lists covers the basic contact
information that must be collected for
DHS to address these protests. The other
information collected will typically
pertain to the contract itself, and not
individuals. However, all information
for this information collection is
submitted voluntarily. Technically,
because this information is not retrieved
by personal identifier, no SORN is
required. However, DHS/ALL–021 DHS
Contractors and Consultants provides
coverage for the collection of records on
DHS contractors and consultants, to
include resume and qualifying
employment information. There is no
assurance of confidentiality provided to
the respondents.
The burden estimates provided in
response to Item 12 above are based
upon the Department’s findings in its
FY 2022 Procurement Line of Business,
Operational Status Report. No program
changes have occurred or changes to the
information being collected, however,
the burden was adjusted to reflect an
agency adjustment increase of 33
respondents within DHS for fiscal year
2022, as well as an increase in the
average hourly wage rate.
Analysis
Agency: Department of Homeland
Security (DHS).
Title: Various Homeland Security
Acquisitions Regulations Forms.
OMB Number: 1600–0002.
Frequency: Annually.
Affected Public: Contractor.
Number of Respondents: 21,379.
Estimated Time per Respondent: 1
hour.
Total Burden Hours: 21,379.
Total Burden Cost (capital/startup):
$1,685,903.
PO 00000
Frm 00109
Fmt 4703
Sfmt 4703
74975
Total Burden Cost (operating/
maintaining):
Robert Dorr,
Executive Director, Business Management
Directorate.
[FR Doc. 2024–20793 Filed 9–12–24; 8:45 am]
BILLING CODE 9112–FL–P
DEPARTMENT OF HOMELAND
SECURITY
[Docket No. CISA–2024–0023]
Revision of a Currently Approved
Information Collection for ChemicalTerrorism Vulnerability Information
(CVI)
Cybersecurity and
Infrastructure Security Agency, DHS.
AGENCY:
60-Day notice and request for
comments; renewal of Information
Collection Request (ICR): 1670–0015.
ACTION:
The Infrastructure Security
Division (ISD) within the Cybersecurity
and Infrastructure Security Agency
(CISA) will submit the following
Information Collection Request to the
Office of Management and Budget
(OMB) for review and clearance in
accordance with the Paperwork
Reduction Act of 1995. The submission
proposes to renew the information
collection for an additional three years
and to update both the burden estimates
and the statutory authority for the
information collection.
SUMMARY:
Comments are encouraged and
will be accepted until November 12,
2024.
DATES:
You may send comments,
identified by docket number through the
Federal eRulemaking Portal: http://
www.regulations.gov. Follow the
instructions for sending comments.
Instructions: All submissions received
must include the agency name ‘‘CISA’’
and docket number CISA–2024–0023.
All comments received will be posted
without change to http://
www.regulations.gov, including any
personal information provided.
Comments that include trade secrets,
confidential commercial or financial
information, Chemical-terrorism
Vulnerability Information (CVI),1
Sensitive Security Information (SSI),2 or
Protected Critical Infrastructure
ADDRESSES:
1 For more information about CVI see 6 CFR
27.400 and the CVI Procedural Manual at
www.dhs.gov/publication/safeguarding-cvi-manual.
2 For more information about SSI see 49 CFR part
1520 and the SSI Program web page at www.tsa.gov/
for-industry/sensitive-security-information.
E:\FR\FM\13SEN1.SGM
13SEN1
74976
Federal Register / Vol. 89, No. 178 / Friday, September 13, 2024 / Notices
Information (PCII) 3 should not be
submitted to the public docket.
Comments containing trade secrets,
confidential commercial or financial
information, CVI, SSI, or PCII should be
appropriately marked and packaged in
accordance with applicable
requirements and submission must be
coordinated with the point of contact for
this notice provided in FOR FURTHER
INFORMATION CONTACT section.
Comments must be identified by docket
number CISA–2024–0023.
FOR FURTHER INFORMATION CONTACT:
Annie Hunziker Boyer, 703–603–5000,
CISARegulations@cisa.dhs.gov.
The
Chemical Facility Anti-Terrorism
Standards (CFATS) Program identified
and regulated the security of high-risk
chemical facilities using a risk-based
approach. Pursuant to section 5 of the
Protecting and Securing Chemical
Facilities from Terrorist Attacks Act of
2014 (Pub. L. 113–254, as amended by
Pub. L. 116–150; 6 U.S.C. 621 note),
authorization had been granted for
CFATS until July 27, 2023. Congress did
not act to reauthorize the program in
time and, as such, the authorization
expired on July 28, 2023. Therefore,
regulations written pursuant to CFATS
authority are not currently active. While
regulatory text for the CFATS
regulation, including information
protection requirements, is located in
part 27 of title 6 of the Code of Federal
SUPPLEMENTARY INFORMATION:
Regulations (CFR), the text is inactive
due to the lapse in authority.
CISA continues to possess and
safeguard the information provided to
CISA under the CFATS program prior to
the program’s lapse in authority on July
28, 2023. CISA also continues to receive
requests for these government records
and has continued to treat any
information previously designated as
CVI prior to the July 28, 2023 lapse
consistent with the previously
established CVI information handling
protection regime. As a result, prior to
granting access to information
safeguarded as CVI, CISA verifies that
the requestor is a CVI Authorized User.
If that requestor has a need to know but
is not a CVI Authorized User, CISA will
provide the requestor with CVI training.
The requestor then submits an
application to become a CVI Authorized
User.
CISA is authorized to safeguard
information provided to CISA under
CFATS prior to July 28, 2023 under 6
U.S.C. 652(e)(1)(J), which grants CISA
the authority to safeguard information
from unauthorized disclosure and to
ensure that the information is handled
and used only for the performance of
official duties.4
It is the Administration’s position that
CFATS should be reauthorized.
However, even without statutory
reauthorization, there is both a reason to
continue collecting this information
(i.e., enabling individuals with a need to
know but who are not CVI Authorized
Number of Respondents ..............................................................................................................
Due to past fluctuations and
uncertainty regarding the number of
future respondents, CISA believes that
20,000 continues to be a reasonable
estimate when CFATS is reauthorized.
Therefore, CISA proposes to retain the
estimated annual number of
respondents.6
The annual burden hours for the CVI
Authorization is [0.50 hours × 20,000
respondents × 1 response per
respondent], which equals 10,000 hours.
Total Capital/Startup Burden Cost
In the current information collection,
the estimated time per respondent to
prepare and submit a CVI Authorization
is 0.50 hours (30 minutes). CISA
proposes to retain the estimated time
per respondent.
Prior to the expiration of CFATS’
statutory authorization, the instrument
through which the information was
collected electronically was a web
interface incorporated into CISA’s
Chemical Security Assessment Tool
(CSAT). Since the lapse, and until
reauthorization, the instrument is a PDF
form sent via email to respondents. The
3 For more information about PCII see 6 CFR part
29 and the PCII Program web page at www.dhs.gov/
pcii-program.
4 6 U.S.C. 652(e)(1)(J): (J) To ensure that any
material received pursuant to this chapter is
protected from unauthorized disclosure and
handled and used only for the performance of
official duties.
5 The current information collection for CVI (i.e.,
IC 1670–0015) may be viewed at https://
www.reginfo.gov/public/do/PRAViewICR?ref_
nbr=202012-1670-001.
6 If the CFATS program is not reauthorized,
renewal of this IC under the authority of 6 U.S.C.
652(e)(1)(J) for the more limited purpose of issuing
CVI Authorized User Numbers and allowing
Estimated Time per Respondent
khammond on DSKJM1Z7X2PROD with NOTICES
Annual Burden Hours
VerDate Sep<11>2014
17:53 Sep 12, 2024
Jkt 262001
PO 00000
Frm 00110
Fmt 4703
Sfmt 4703
Users to access historical government
records safeguarded as CVI) as well as
existing statutory authority to do so
under 6 U.S.C. 652(e)(1)(J). Once CFATS
is reauthorized, the training and
application to become a CVI Authorized
User will be made accessible to the
public.
The current information collection for
the CVI program (IC 1670–0015) will
expire on November 30, 2024.5
CISA proposes three revisions from
the previously approved collection.
Specifically, to renew the information
collection for an additional three years,
increase the loaded average hourly wage
rate of respondents from $79.75 to
$101.87 based on updated BLS wage
and compensation data, and to cite 6
U.S.C. 652(e)(1)(J) as its statutory
authority rather than 6 U.S.C. 623.
This process is conducted in
accordance with 5 CFR 1320.8.
CISA’S Methodology in Estimating the
Burden for the Chemical-Terrorism
Vulnerability Information
Authorization
Number of Respondents
The current information collection
estimated that 20,000 respondents
submit a request to become a CVI
Authorized User Number annually. The
table below provides the number of
respondents over the past three years
(i.e., Calendar Year (CY) 2020 through
CY 2022).
CY 2020
CY 2021
CY 2022
11,444
12,931
14,252
PDF form is filled out by respondents
and returned to CISA via email. When
the CFATS program is reauthorized, a
web-enabled interface will be made
accessible to the public.
Thus, for the purposes of this notice,
CISA continues to assume there is no
annualized capital or start-up costs
incurred by respondents for this
information collection.
Total Recordkeeping Burden
There are no recordkeeping burden
costs incurred by respondents for this
information collection.
individuals to become CVI Authorized Users would
reduce the estimated number of respondents to 150.
It is CISA’s position that CFATS will be
reauthorized. Therefore, CISA proposes to retain the
estimate of 20,000 respondents.
E:\FR\FM\13SEN1.SGM
13SEN1
Federal Register / Vol. 89, No. 178 / Friday, September 13, 2024 / Notices
Total Annual Burden Cost
DEPARTMENT OF THE INTERIOR
CISA assumes that respondents are
generally Site Security Officers (SSOs),
although other types of respondents
may also complete this instrument (e.g.,
State, and local government employees
and contractors). For the purpose of this
notice, CISA maintains this assumption.
To estimate the total annual burden,
CISA multiplied the annual burden of
10,000 hours by the loaded average
hourly wage rate of SSOs of $101.87 per
hour.7 Therefore, the total annual
burden cost for the CVI Authorization
instrument is $1,018,700 [10,000 total
annual burden hours × $101.87 per
hour].
Fish and Wildlife Service
Analysis
Agency: Department of Homeland
Security, Cybersecurity and
Infrastructure Agency, Infrastructure
Security Division.
Title: CFATS Chemical-Terrorism
Vulnerability Information.
OMB Number: 1670–0015.
Instrument: Chemical-Terrorism
Vulnerability Information Training and
Authorized User Application.
Frequency: ‘‘On occasion’’ and
‘‘Other’’.
Affected Public: Business or other forprofit.
Number of Respondents: 20,000
respondents (rounded estimate).
Estimated Time per Respondent: 0.50
hours.
Total Burden Hours: 10,000 annual
burden hours.
Total Burden Cost (capital/startup):
$0.
Total Recordkeeping Burden: $0.
Total Burden Cost: $1,001,275.
Robert J. Costello,
Chief Information Officer, Department of
Homeland Security, Cybersecurity and
Infrastructure Security Agency.
[FR Doc. 2024–20828 Filed 9–12–24; 8:45 am]
khammond on DSKJM1Z7X2PROD with NOTICES
BILLING CODE 9111–LF–P
7 The wage used for an SSO equals that of
Managers, All (11–9199), with a load factor of
1.4481 to account for benefits in addition to wages
https://www.bls.gov/oes/2023/may/oes119199.htm.
The load factor is estimated by dividing total
compensation by total wages and salaries for the
Management, Professional and Related series ($72/
$49.72), which can be found at https://www.bls.gov/
news.release/ecec.t04.htm.
VerDate Sep<11>2014
17:53 Sep 12, 2024
Jkt 262001
[FWS–R4–ES–2024–N046;
FXES11140400000–245–FF04E00000]
Endangered Species; Recovery Permit
Applications
Fish and Wildlife Service,
Interior.
ACTION: Notice of receipt of permit
applications; request for comments.
AGENCY:
We, the U.S. Fish and
Wildlife Service, have received
applications for permits to conduct
activities intended to enhance the
propagation or survival of endangered
species under the Endangered Species
Act. We invite the public and local,
State, Tribal, and Federal agencies to
comment on these applications. Before
issuing any of the requested permits, we
will take into consideration any
information that we receive during the
public comment period.
DATES: We must receive written data or
comments on the applications by
October 15, 2024.
ADDRESSES:
Reviewing Documents: Submit
requests for copies of applications and
other information submitted with the
applications to Karen Marlowe (see FOR
FURTHER INFORMATION CONTACT). All
requests and comments should specify
the applicant’s name and application
number (e.g., Mary Smith,
ESPER0001234).
Submitting Comments: If you wish to
comment, you may submit comments by
one of the following methods:
• Email (preferred method):
permitsR4ES@fws.gov. Please include
your name and return address in your
email message. If you do not receive a
confirmation from the U.S. Fish and
Wildlife Service that we have received
your email message, contact us directly
at the telephone number listed in FOR
FURTHER INFORMATION CONTACT.
• U.S. mail: U.S. Fish and Wildlife
Service Regional Office, Ecological
Services, 1875 Century Boulevard,
Atlanta, GA 30345 (Attn: Karen
Marlowe, Permit Coordinator).
FOR FURTHER INFORMATION CONTACT:
Karen Marlowe, Permit Coordinator, via
telephone at 404–679–7097 or via email
at karen_marlowe@fws.gov. Individuals
in the United States who are deaf,
deafblind, hard of hearing, or have a
speech disability may dial 711 (TTY,
TDD, or TeleBraille) to access
telecommunications relay services.
Individuals outside the United States
should use the relay services offered
SUMMARY:
PO 00000
Frm 00111
Fmt 4703
Sfmt 4703
74977
within their country to make
international calls to the point-ofcontact in the United States.
SUPPLEMENTARY INFORMATION: We, the
U.S. Fish and Wildlife Service, invite
review and comment from the public
and local, State, Tribal, and Federal
agencies on applications we have
received for permits to conduct certain
activities with endangered and
threatened species under section
10(a)(1)(A) of the Endangered Species
Act of 1973, as amended (ESA; 16
U.S.C. 1531 et seq.), and our regulations
in the Code of Federal Regulations
(CFR) at 50 CFR part 17. Documents and
other information submitted with the
applications are available for review,
subject to the requirements of the
Privacy Act of 1974, as amended (5
U.S.C. 552a), and the Freedom of
Information Act (5 U.S.C. 552).
Background
With some exceptions, the ESA
prohibits take of listed species unless a
federal permit is issued that authorizes
such take. The definition of ‘‘take’’ in
the ESA includes hunting, shooting,
harming, wounding, or killing, and also
such activities as pursuing, harassing,
trapping, capturing, or collecting.
A recovery permit issued by us under
section 10(a)(1)(A) of the ESA
authorizes the permittee to take
endangered or threatened species while
engaging in activities that are conducted
for scientific purposes that promote
recovery of species or for enhancement
of propagation or survival of species.
These activities often include the
capture and collection of species, which
would result in prohibited take if a
permit were not issued. Our regulations
implementing section 10(a)(1)(A) of the
ESA for these permits are found at 50
CFR 17.22 for endangered wildlife
species, 50 CFR 17.32 for threatened
wildlife species, 50 CFR 17.62 for
endangered plant species, and 50 CFR
17.72 for threatened plant species.
Permit Applications Available for
Review and Comment
The ESA requires that we invite
public comment before issuing these
permits. Accordingly, we invite local,
State, Tribal, and Federal agencies, and
the public to submit written data, views,
or arguments with respect to these
applications. The comments and
recommendations that will be most
useful and likely to influence agency
decisions are those supported by
quantitative information or studies.
Proposed activities in the following
permit requests are for the recovery and
enhancement of propagation or survival
of the species in the wild.
E:\FR\FM\13SEN1.SGM
13SEN1
File Type | application/pdf |
File Modified | 2024-09-13 |
File Created | 2024-09-13 |