tag:blogger.com,1999:blog-3033288879708780106.post1374498578958310623..comments2023-04-07T05:19:44.951-04:00Comments on Yes Vermont Yankee: NRC Reviews Proprietary Data From Vermont Yankee. Opponents Express OutrageMeredith Angwinhttp://www.blogger.com/profile/02737538041807740424noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-3033288879708780106.post-67542868333640699692011-07-14T18:21:51.777-04:002011-07-14T18:21:51.777-04:00Having provided proprietary data to the NRC, the f...Having provided proprietary data to the NRC, the fact is quite publicly available. Every time we had to sign an affidavit attesting to the need. That affidavit is publicly filed.<br /><br />Companies spend a great deal of money developing innovative products that the NRC must approve. Without protection of their intellectual property, they can't receive a fair return. They also pay the NRC to perform the review.Margaret Hardinghttp://www.4factorconsulting.comnoreply@blogger.comtag:blogger.com,1999:blog-3033288879708780106.post-1314603235959022962011-07-14T16:09:25.415-04:002011-07-14T16:09:25.415-04:00When I was working at the US EPA, as a federal emp...When I was working at the US EPA, as a federal employee, in the 1980s, one of my jobs was as a project manager for a network of minicomputers used by the hazardous waste program. <br /><br />I had a policy that prohibited the use of the networked computers for hoolding proprietary data related to RCRA permits. <br /><br />Cyber security was primitive by today's standards. The operating system for the mini-computers had no method of locking out access to data on any machine once the user was on the network. <br /><br />As it turned out deadbolt securtiy was better than computer security. I insisted that any propritary data be kept in a locked room with a method for logging access. We had a computer in there, but it wasn't connected to any network. <br /><br />Today we would call that an "air gap," but in those days, computers that were not connected to each other were more often the norm. Even so there were numerous attempts to "hack" into EPA's computerized enforcement case information systems.Space Fissionhttps://www.blogger.com/profile/05205432236787777330noreply@blogger.com