Telgian Management Technologies, LLC (TMT) is the leading supplier of cost-effective software solutions that enhance our customers’ management of the Department of Homeland Security Chemical Facility Anti-Terrorism Standards — or CFATS — and the American Chemistry Council’s Responsible Care® Security Code — or RCSC — compliance regulation requirements or as well as compliance best practice work processes. TMT’s Telgian Compliance Manager (TCM™) is a cloud-based relational database software application designed to track security compliance solutions in a concise and effective platform.
About Telgian Compliance Manager™
The Automated Security Compliance Solution
TCM provides consistent, effective, efficient and secure data management in real-time. Our compliance regulation software allows users such as chief security officers, site managers, facilities managers, CEOs and other qualified individuals to effectively manage all of their security protocols in one place and ensure compliance with regulatory requirements and nationally recognized codes and standards, including DHS’s Chemical Facility Anti-Terrorism Standards (CFATS) and the American Chemistry Council’s Responsible Care Security Code (RCSC)
TCM is a data collection portal, allowing organizations to submit, manage and track forms, documents and reports related to security compliance needs and requirements. In addition, TCM adheres to more than 50 global compliance IT standards and includes Microsoft Advanced Threat Analytics and distributed denial of services protection against outside threats and suspicious activity.
Telgian Compliance Manager™ The Proactive, Effective, Efficient Compliance Solution
Proactive Compliance Management
- Dashboard and Alerts provide managers at all levels of the enterprise with the ability to proactively manage compliance requirement resources, timing, and identification of systemic improvement opportunities.
Effective Demonstration of Compliance
- The TCM provides a secure centralized repository for compliance activities and documentation. Entered data is available throughout the enterprise in real-time and across geographic space. All data input into the TCM’s cloud-based platform is associated with the relevant user, as well as, the date and time of entry. This action provides you with an efficient means to effectively demonstrate both current and historical compliance.
Efficient Compliance Management
- Optimize your compliance support activities and minimize compliance management costs by reducing personnel hours and effort supporting compliance activity, through:
- Reduced employee travel time and expense,
- Reduced hours hosting audit events,
- Establishment of a data standard across functional alignments,
- More accurate and available documentation,
- Elimination of data-entry redundancy
Background on the Department of Homeland Security Chemical Facility Anti-Terrorism Standards
In 2007 Congress formally established the Chemical Facility Anti-Terrorism Standards (CFATS)regulatory program (6 CFR Part 27) to identify and regulate certain facilities deemed high risk by their possession of certain chemicals. Based upon the Chemical Facility Anti-Terrorism Standards (CFATS) screening process, facilities can be determined to be of a high-risk nature based upon their possession of certain chemicals of interest (COI) at specific quantities and concentrations. To help in the identification and protection of a facility that’s classified as high-risk, there are four steps to the Chemical Facility Anti-Terrorism Standards (CFATS) procedure:
- Step 1: Top-Screen — Chemical Facility Anti-Terrorism Standards (CFATS) has any facility that’s in possession of a Federally designated chemical of interest, or COI, complete a Top-Screen by entering all pertinent information via the Chemical Security Assessment Tool — a secure online web portal administered by the DHS.
- Step 2: Risk Tier Determination — Next, the DHS notifies facilities as to whether or not they are determined to be a security risk. Facilities that aren’t determined to be a risk aren’t required to meet any further Chemical Facility Anti-Terrorism Standards (CFATS) regulations. Those that are determined to be a security risk are assigned a risk Tiering level — between Tier 1 and Tier 4 — and are required to adhere to all Chemical Facility Anti-Terrorism Standards (CFATS) compliance regulations.
- Step 3: Submission of SVA and SSP or ASP — After receiving a security tier determination, facilities have 120 days to submit a security vulnerability assessment (SVA) and a site security plan (SSP) or alternative security program (ASP) by means of the online Chemical Security Assessment Tool (CSAT). The SSP, or ASP, addresses physical security measures, policies, practices and procedures that support compliance with the 18 Risk Based Performance Standards outlined in the Chemical Facility Anti-Terrorism Standards (CFATS) regulation
- Step 4: Inspection and Ongoing Compliance — Upon review of the SSP, or ASP, the DHS will conduct a formal inspection of the facility against the submitted plan, and if approved, a letter of compliance is issued. Inspectors will then conduct subsequent compliance inspections to ensure agreed upon security measures and protocols are being followed; that training, drills and exercises are being conducted, tracked and documented; vulnerability assessments and security plan reviews and revisions are conducted and documented; and appropriate personnel records are being maintained.
Telgian Compliance Manager CFATS Module
The TCM CFATS module assists client compliance with the Department of Homeland Security (DHS) Chemical Facility Anti-Terrorism Standards (CFATS) by:
- Identifying and organizing the requirements of the DHS-CFATS eighteen (18) Risk Based Performance Standards
- Is designed in alignment with CSAT 2.0, the DHS’s web platform for all CFATS submissions.
- Is designed for both Site Security Plan or Alternative Security Program approaches
- Provides continuous tracking of compliance activities, plan and document reviews and revisions
- Documenting and tracking the Required Annual Audit in parallel as you enter Site Security Plan or Alternative Security Program data into the TCM tool
- TCM is hosted in Microsoft Azure. Cloud Computing offers many benefits, such as:
- Availability – No maintenance-associated down-time
- Mobility – Access is available when and where you need it
- Scalability – Ready to meet the changing client demands
- Collaboration – Real-time collaboration across wide geographic space
- Security – The Microsoft Azure cloud offers comprehensive security support to include:
o Comprehensive adherence of over 50 global compliance IT standards
o Advanced Threat Analytics which monitor patterns of networks, systems and users, flagging suspicious activity
o Distributed denial-of service defense (DDoS) for continual monitoring of outside data attacks
o Data center facilities guarded by outer and inner perimeters with increasing security at each level, including perimeter fencing, security officers, locked server racks, multifactor access control, integrated alarm systems, and around-the-clock video surveillance by the operations center
Background of the Responsible Care® Security Code
Following 9/11 and building on the lessons learned from those tragic events, a range of organizations developed programs and anti-terrorism technologies to protect American citizens and commercial enterprises from new attacks on U.S. soil. As such, American Chemistry Council (ACC) member organizations established the Responsible Care® Security Code, or RCSC, to enhance the safety of U.S. chemical manufacturers and their products.
Since security is a priority for today’s chemical manufacturers; federal, state and local intelligence and law enforcement organizations quickly embraced the Responsible Care Security Code (RCSC) as an essential program to aid all interested parties in providing a more secure environment for our country by sharing essential information, conducting training and drills and by coordinating responses to potential emergency scenarios.
The Responsible Care Security Code sets out 13 best management practices aimed at identifying and addressing vulnerabilities associated with facilities, transport, supply chain logistics and matters of cybersecurity. Companies that are Responsible Care Security Code certified must complete comprehensive security vulnerability assessments — or SVAs — that employ recognized methods of data collection followed by security improvements that meet strict deadlines. In addition, companies that seek Responsible Care Security Code certification are required to have third-party verification of their SVAs.
As the Responsible Care Security Code predates CFATS, the DHS has officially recognized Responsible Care Security Code (RCSC) as a Qualified Anti-Terrorism Technology. This means RCSC certified partners may be provided with an extra level of liability protection via the DHS’s SAFETY Act in case certain terrorist-related activities were to occur on their premises.
Telgian Compliance Manager Responsible Care Security Code Module
- Creating a customizable compliance strategy framework according to the thirteen (13) Management Practices within the code
- Providing a data collection portal for uploading and managing appropriate forms, policies, practices & procedures, and related documentation.
- Facilitating the submission and tracking of impairment and incident reports
- Providing continuous monitoring of your organization’s progress
- Generating real-time email alerts based on programmable event triggers
- Delivering corporate executive leadership real time and verifiable confirmation of critical management practice compliance
- Demonstrating client company program compliance during required third-party audits, a valuable component of the Telgian Compliance Manager Responsible Care Security Code module
Telgian Management Technologies, LLC is a wholly owned subsidiary of Telgian Holdings, Inc.