lastID = -291636
Skip to main content Skip to top navigation Skip to site search
Top of page
  • My citations options
    Web Back (from Web)
    Chicago Back (from Chicago)
    MLA Back (from MLA)
Close action menu

You need to login to use this feature.

Please wait a moment…
Please wait while we update your results...
Please wait a moment...
Description: Access Water
Context Menu
Description: Book cover
Securing Your Wastewater System
  • Browse
  • Compilations
    • Compilations list
  • Subscriptions
Tools

Related contents

Loading related content

Workflow

No linked records yet

X
  • Current: 2020-02-01 04:01:25 Administrator
  • 2020-02-01 04:01:24 Administrator
Description: Access Water
  • Browse
  • Compilations
  • Subscriptions
Log in
0
Accessibility Options

Base text size -

This is a sample piece of body text
Larger
Smaller
  • Shopping basket (0)
  • Accessibility options
  • Return to previous
Description: Book cover
Securing Your Wastewater System

Securing Your Wastewater System

Securing Your Wastewater System

  • New
  • View
  • Details
  • Reader
  • Default
  • Share
  • Email
  • Facebook
  • Twitter
  • LinkedIn
  • New
  • View
  • Default view
  • Reader view
  • Data view
  • Details

This page cannot be printed from here

Please use the dedicated print option from the 'view' drop down menu located in the blue ribbon in the top, right section of the publication.

screenshot of print menu option

Description: Book cover
Securing Your Wastewater System
Abstract
This is a timely topic on Wastewater System Security, which will be facing the Nation's municipal wastewater collection and treatment systems in 2004 and beyond. Congress passed the Bio-Terrorism Act of 2002, which addressed the security of our Nation's Drinking Water Utilities serving populations over 3,300. Congress has been working throughout 2003 on similar legislation that will apply to the Nation's Wastewater Systems. This paper will provide the latest information about the pending federal wastewater security legislation and will provide information on complying with vulnerability assessment and emergency response planning including case study information of a few Wastewater Vulnerability Assessments that were completed in advance of the federal legislation. The paper will be broken down into the following sections and a brief overview of each section is provided:New Federal Legislation (Pending) on Wastewater System Security Vulnerability Assessments for Wastewater Systems: This new legislation is likely to pass through both houses of Congress in 2004 and will also likely result in Wastewater Utilities compliance starting as early as 2005. We will discuss the current status of the legislation at the time of the WEFTEC 2004 Conference (October 2004) and the requirements that Utilities will need to meet including any deadlines.Potential EPA Grants for Wastewater Systems serving 20,000 population or greater for Security Vulnerability Assessments, Emergency Operations Planning, Security Enhancement Designs, and Minor Security Enhancements: The pending federal legislation has potential grant funding similar to that provided for drinking water systems under the Bio-Terrorism Act of 2002. However, it appears that the funding may stretch down to smaller communities with populations above 20,000 versus the drinking water legislation, which only provided grants to large water systems serving over 100,000 people. Important information about these grants will be provided during the presentation including amounts available, grant application process, deadlines, …etc.Review of Risk Assessment Methodologies and Tools for performing Vulnerability Assessments: A discussion of the various methodologies and tools available to perform vulnerability assessments will be given including RAM-W, VSAT, NRWA, and other recently developed or improved methodologies and tools. Information on how to obtain training in the various methodologies and tools will also be provided.Discussion of the major elements of the Vulnerability Assessment process: All vulnerability assessments typically follow a similar process with key components such as planning, threat assessment, facility characterization, system effectiveness, consequence/mitigation, and risk analysis. This presentation will cover each of these key steps in performing a vulnerability assessment and discuss the need to follow a process that will insure successful compliance with federal regulations for completing a vulnerability assessment of your wastewater system.Case History of recent Wastewater System Security Vulnerability Assessments: Lessons learned from a couple of wastewater vulnerability assessments conducted prior to any actual federal legislation for wastewater systems will be presented. These wastewater vulnerability assessments were performed for both large and small utilities that have both water and wastewater systems. One of the utilities performed their vulnerability assessment prior to the Bio-Terrorism Act of 2002, while the others performed their VAs in response to that Act.Emergency Operations/Response Planning: A discussion will be provided on emergency response planning and the need to update existing emergency response plans to include results of the wastewater vulnerability assessment. It will also cover coordination with Local Emergency Planning Committees and the need for training and exercises of the updated emergency response plan. This discussion will also be tied into the new federal legislative requirements.
This is a timely topic on Wastewater System Security, which will be facing the Nation's municipal wastewater collection and treatment systems in 2004 and beyond. Congress passed the Bio-Terrorism Act of 2002, which addressed the security of our Nation's Drinking Water Utilities serving populations over 3,300. Congress has been working throughout 2003 on similar legislation that will apply to the...
Author(s)
Bryon O. Elwell
SourceProceedings of the Water Environment Federation
SubjectSession 90: Security
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2004
ISSN1938-6478
SICI1938-6478(20040101)2004:8L.726;1-
DOI10.2175/193864704784136883
Volume / Issue2004 / 8
Content sourceWEFTEC
First / last page(s)726 - 734
Copyright2004
Word count568

Purchase price $11.50

Get access
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'Securing Your Wastewater System'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: Book cover
Securing Your Wastewater System
Pricing
Non-member price: $11.50
Member price:
-291636
Get access
-291636
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'Securing Your Wastewater System'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.

Details

Description: Book cover
Securing Your Wastewater System
Abstract
This is a timely topic on Wastewater System Security, which will be facing the Nation's municipal wastewater collection and treatment systems in 2004 and beyond. Congress passed the Bio-Terrorism Act of 2002, which addressed the security of our Nation's Drinking Water Utilities serving populations over 3,300. Congress has been working throughout 2003 on similar legislation that will apply to the Nation's Wastewater Systems. This paper will provide the latest information about the pending federal wastewater security legislation and will provide information on complying with vulnerability assessment and emergency response planning including case study information of a few Wastewater Vulnerability Assessments that were completed in advance of the federal legislation. The paper will be broken down into the following sections and a brief overview of each section is provided:New Federal Legislation (Pending) on Wastewater System Security Vulnerability Assessments for Wastewater Systems: This new legislation is likely to pass through both houses of Congress in 2004 and will also likely result in Wastewater Utilities compliance starting as early as 2005. We will discuss the current status of the legislation at the time of the WEFTEC 2004 Conference (October 2004) and the requirements that Utilities will need to meet including any deadlines.Potential EPA Grants for Wastewater Systems serving 20,000 population or greater for Security Vulnerability Assessments, Emergency Operations Planning, Security Enhancement Designs, and Minor Security Enhancements: The pending federal legislation has potential grant funding similar to that provided for drinking water systems under the Bio-Terrorism Act of 2002. However, it appears that the funding may stretch down to smaller communities with populations above 20,000 versus the drinking water legislation, which only provided grants to large water systems serving over 100,000 people. Important information about these grants will be provided during the presentation including amounts available, grant application process, deadlines, …etc.Review of Risk Assessment Methodologies and Tools for performing Vulnerability Assessments: A discussion of the various methodologies and tools available to perform vulnerability assessments will be given including RAM-W, VSAT, NRWA, and other recently developed or improved methodologies and tools. Information on how to obtain training in the various methodologies and tools will also be provided.Discussion of the major elements of the Vulnerability Assessment process: All vulnerability assessments typically follow a similar process with key components such as planning, threat assessment, facility characterization, system effectiveness, consequence/mitigation, and risk analysis. This presentation will cover each of these key steps in performing a vulnerability assessment and discuss the need to follow a process that will insure successful compliance with federal regulations for completing a vulnerability assessment of your wastewater system.Case History of recent Wastewater System Security Vulnerability Assessments: Lessons learned from a couple of wastewater vulnerability assessments conducted prior to any actual federal legislation for wastewater systems will be presented. These wastewater vulnerability assessments were performed for both large and small utilities that have both water and wastewater systems. One of the utilities performed their vulnerability assessment prior to the Bio-Terrorism Act of 2002, while the others performed their VAs in response to that Act.Emergency Operations/Response Planning: A discussion will be provided on emergency response planning and the need to update existing emergency response plans to include results of the wastewater vulnerability assessment. It will also cover coordination with Local Emergency Planning Committees and the need for training and exercises of the updated emergency response plan. This discussion will also be tied into the new federal legislative requirements.
This is a timely topic on Wastewater System Security, which will be facing the Nation's municipal wastewater collection and treatment systems in 2004 and beyond. Congress passed the Bio-Terrorism Act of 2002, which addressed the security of our Nation's Drinking Water Utilities serving populations over 3,300. Congress has been working throughout 2003 on similar legislation that will apply to the...
Author(s)
Bryon O. Elwell
SourceProceedings of the Water Environment Federation
SubjectSession 90: Security
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2004
ISSN1938-6478
SICI1938-6478(20040101)2004:8L.726;1-
DOI10.2175/193864704784136883
Volume / Issue2004 / 8
Content sourceWEFTEC
First / last page(s)726 - 734
Copyright2004
Word count568

Actions, changes & tasks

Outstanding Actions

Add action for paragraph

Current Changes

Add signficant change

Current Tasks

Add risk task

Connect with us

Follow us on Facebook
Follow us on Twitter
Connect to us on LinkedIn
Subscribe on YouTube
Powered by Librios Ltd
Powered by Librios Ltd
Authors
Terms of Use
Policies
Help
Accessibility
Contact us
Copyright © 2024 by the Water Environment Federation
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: WWTF Digital Boot 180x150
WWTF Digital (180x150)
Created on Jul 02
Websitehttps:/­/­www.wef.org/­wwtf?utm_medium=WWTF&utm_source=AccessWater&utm_campaign=WWTF
180x150
Bryon O. Elwell. Securing Your Wastewater System. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Web. 29 Jun. 2025. <https://www.accesswater.org?id=-291636CITANCHOR>.
Bryon O. Elwell. Securing Your Wastewater System. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Accessed June 29, 2025. https://www.accesswater.org/?id=-291636CITANCHOR.
Bryon O. Elwell
Securing Your Wastewater System
Access Water
Water Environment Federation
December 22, 2018
June 29, 2025
https://www.accesswater.org/?id=-291636CITANCHOR