Skip to main content

Currently Skimming:


Pages 9-14

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 9...
... Credential Synthesis The research team compiled all security credentialing literature in the Virginia Tech Transportation Institute (VTTI) HazMat library.
From page 10...
... The application for each credential was used to determine the requirements-to-obtain elements for that credential. Many of the credentials' applications were readily available on the issuing agencies' Web sites.
From page 11...
... Second, the research team collected pricing data from each issuing agency related to each credential. Consolidated Credential Questionnaire Since this was an examination of several security credentials across many transportation modes, a survey was designed that would allow for the analysis of the credentials themselves, as well as the use of the credentials across modes.
From page 12...
... Consolidated Credential Options and Evaluation Security credentials are just one part of the HazMat transportation security system. Figure 2-3 provides a high-level overview of the credentialing process.
From page 13...
... Consolidation could result in lowered costs 13 Applicant Submits Required Information to Acquire Credential Security Threat Assessment Notify Applicant Provide Applicant with Credential Verification Issuing Agency Review Immigration Status Drug Test User Requests Access to Facility or Secure Area Name Based Check of Relevant Databases Criminal Offenses Accept or Deny Applicant Applicant Denial Applicant Accepted Rejected Take Appropriate Steps for Rejection Immediate Verification All Vetting Information Reviewed at Regular Frequency Granted Remote Verification Access Granted or Rejected Allow Access Credential Acquisition Process Credential Use Process Figure 2-3. Application and use processes for security credentials.
From page 14...
... The consolidation of security credentials must maintain the highest level of security afforded by the individual credentials that were merged. Many of the existing credentials are issued by different agencies and cover different modes of transportation.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.