Agencies Offer Ideas for Preventing Chemical Disasters

Gerard Koudenburg/Shutterstock.com

Eight months after last spring’s chemical fertilizer explosion that took 15 lives in West, Texas, the Obama administration has released a set of new regulatory safety options.

The nonprofit advocacy community appears encouraged, but industry less so.

An August 2013 executive order set a deadline of 90 days for an analysis from a working group including the Bureau of Alcohol, Tobacco, Firearms and Explosives, Environmental Protection Agency, Homeland Security Department and Occupational Safety and Health Administration. But October’s 16-day government shutdown, among other factors, delayed the release of nine options for comment, including some that would shift industry compliance with preventive measures from a voluntary to a mandatory basis.

The chemical facility safety and security working group defined its responsibility as seeking to “harmonize the collection and exchange of information to streamline enforcement, inform decision makers at all levels of government and first-responders and avoid duplication of regulatory requirements.”

The result is a set of possible changes addressing the safe and secure storage, handling, and sale of ammonium nitrate; options for expanding risk standards and risk management programs at OSHA and EPA; and possibilities for adding chemicals to the list of those monitored for potential terrorist use.

The feedback has been eagerly awaited by environmental and safety specialists in the Coalition to Prevent Chemical Disasters, which comprises 100 nonprofit groups that seek more mandatory safety requirements from industry. “The report is encouraging in two respects,” said Rick Hind, legislative director at Greenpeace, a coalition member. “It’s broader in its scope of options for addressing unfinished business that has allowed for gaps in regulatory protections that could help prevent future disasters. And it includes a number of changes involving the overarching issue of risk management,” he said.

Hind added that the coalition would like to see  a shift toward risk prevention, adding that  “volunteerism is fine” in some areas, but “isn’t cutting it” during a time when one in three Americans lives near a facility at risk of an industrial accident or terrorist strike, and “the only thing protecting us is pure dumb luck,” he said. The coalition hopes that “regulatory authorities have the political will to work with stakeholders to make sure we don’t miss a golden opportunity to prevent another West, Texas,” said Hind.

In a contrasting view, the American Chemistry Council issued a statement saying it was encouraged to see the working group considering some of the strategies it recommended, “including opportunities to improve the interaction of existing regulatory programs, leverage industry programs, identify outlier facilities and create better mechanisms for sharing information with first responders. However, we are concerned that [the group] is looking at possibly pursuing options that will further complicate an overly complex regulatory system by creating requirements for assessing safer alternatives, as well as considering a regulatory model that would exceed the authority the agencies have today instead of focusing on how to improve current programs.”

The independent U.S. Chemical Safety Board also has been coordinating with the multi-agency working group.

(Image via Gerard Koudenburg/Shutterstock.com)

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.