Railroads Aim to Block Maryland on Crude-Oil Shipment Disclosure


As various states and local governments continue to pressure railroad companies that transport crude oil on safety and transparency issues, railroad executives have argued that disclosing information about hazardous rail shipments poses a security risk and should be protected proprietary information.

In May, the U.S. Department of Transportation issued an emergency order mandating that railroads transporting more than 1 million gallons of Bakken crude from North Dakota disclose details about those shipments to emergency response commissions in the states where the trains will travel through.

Two major railroads, Norfolk Southern and CSX Transportation have sued the Maryland Department of Environment to block it from disclosing information about its rail shipments to media organizations, according to The Sun newspaper in Baltimore.

At issue is whether Tom Levering, the department’s director of emergency preparedness who serves as the state’s emergency point of contact with the railroads, can disclose that information through a public records requests when he signed a confidentiality agreement with the railroads.

According to the Sun:

. . . [A]fter reporters with McClatchy and the Associated Press filed state Public Information Act requests for the reports last month, the agency notified the railroads that it would be releasing the documents on July 24 unless the companies took legal action. Attorneys for the agency said Levering was not authorized to sign an agreement in conflict with the public information law.

Norfolk Southern filed a complaint for injunctive relief July 23. CSX did the same the following day. Both have since filed for temporary restraining orders in the case.

McClatchy reported recently:

Rail companies prefer to keep details about crude oil shipments confidential and some states have agreed, but others have decided that the records can be made public.

Several states — including California, Washington, Illinois and Florida — have fulfilled open records requests from news organizations and others. Though rail companies didn’t want the information made public, none had pursued a legal challenge to block its release.

But Maryland appears to be the first state where the disclosure is being challenged by the railroads.

Initially, federal officials asked states to honor confidentiality agreements but the Transportation Department “eventually conceded that no federal law protected the information from public disclosure,” according to McClatchy.

Maryland is no stranger to the dangers and impacts of freight rail derailments.

Rail tunnels built through Baltimore in the 19th century are a choke point for freight trains traveling up and down the East Coast and connecting to the city’s port facilities. In 2001, a freight train carrying hazardous chemicals derailed in CSX’s Howard Street Tunnel and caused a massive underground fire that snarled rail shipments through the city.

In May 2013, a trash truck was struck by CSX freight train in a Baltimore suburb, causing a derailment and massive fire ball.

This spring, the same day a CSX train carrying crude oil derailed in a fiery explosion in Lynchburg, Virginia, an aging railroad embankment in Baltimore gave way after heavy rains, temporarily cutting off the lone CSX freight-rail link between the city and Philadelphia.

This month, federal authorities announced that they were considering new freight-rail safety rules for crude-oil shipments.

(Image via satephoto/Shutterstock.com)


Get daily news from Route Fifty

Top stories on how innovation is driving smarter government across the country.

Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.