New York State Coastal Management Program and Final Environmental
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
S T a T E O F N E W Y O R K 3695--A 2009-2010
S T A T E O F N E W Y O R K ________________________________________________________________________ 3695--A 2009-2010 Regular Sessions I N A S S E M B L Y January 28, 2009 ___________ Introduced by M. of A. ENGLEBRIGHT -- Multi-Sponsored by -- M. of A. KOON, McENENY -- read once and referred to the Committee on Tourism, Arts and Sports Development -- recommitted to the Committee on Tour- ism, Arts and Sports Development in accordance with Assembly Rule 3, sec. 2 -- committee discharged, bill amended, ordered reprinted as amended and recommitted to said committee AN ACT to amend the parks, recreation and historic preservation law, in relation to the protection and management of the state park system THE PEOPLE OF THE STATE OF NEW YORK, REPRESENTED IN SENATE AND ASSEM- BLY, DO ENACT AS FOLLOWS: 1 Section 1. Legislative findings and purpose. The legislature finds the 2 New York state parks, and natural and cultural lands under state manage- 3 ment which began with the Niagara Reservation in 1885 embrace unique, 4 superlative and significant resources. They constitute a major source of 5 pride, inspiration and enjoyment of the people of the state, and have 6 gained international recognition and acclaim. 7 Establishment of the State Council of Parks by the legislature in 1924 8 was an act that created the first unified state parks system in the 9 country. By this act and other means the legislature and the people of 10 the state have repeatedly expressed their desire that the natural and 11 cultural state park resources of the state be accorded the highest 12 degree of protection. -
Validators Report
National Information Assurance Partnership ® TM Common Criteria Evaluation and Validation Scheme Validation Report IBM Global Security Kit (GSKit) 8.0.14 Report Number: CCEVS-VR-VID10394-2011 Dated: 2012-03-06 Version: 1.0 National Institute of Standards and Technology National Security Agency Information Technology Laboratory Information Assurance Directorate 100 Bureau Drive 9800 Savage Road STE 6740 Gaithersburg, MD 20899 Fort George G. Meade, MD 20755-6740 ACKNOWLEDGEMENTS Validation Team Jim Brosey Orion Security Fort Meade, Maryland Jandria S. Alexander Aerospace Fort Meade, Maryland Vicky Ashby The MITRE Corporation McLean, Virginia Evaluation Team Alejandro Masino, Trang Huynh, Courtney Cavness atsec Information Security Corporation Austin, Texas Table of Contents 1. EXECUTIVE SUMMARY ........................................................................................................................................ 4 2. IDENTIFICATION .................................................................................................................................................... 4 3. CLARIFICATION OF SCOPE ................................................................................................................................. 6 3.1. PHYSICAL SCOPE ................................................................................................................................................... 6 3.2. LOGICAL SCOPE .................................................................................................................................................... -
Of the American Falls at Niagara 1I I Preservation and Enhancement of the American Falls at Niagara
of the American Falls at Niagara 1I I Preservation and Enhancement of the American Falls at Niagara Property of t';e Internztio~al J5it-t; Cr?rn:n es-un DO NOT' RECda'dg Appendix G - Environmental Considerations Final Report to the International Joint Commission by the American Falls International Board June -1974 PRESERVATION AND ENHANCEMENT OF AMERICAN FALLS APPENDIX. G .ENVIRONMENTAL CONSIDERATIONS TABLE OF CONTENTS Paragraph Page CHAPTER G 1 .INTRODUCTION G1 CHAPTER G2 .ENVIRONMENTAL SETTING . NIAGARA RESERVATION AND SURROUNDING REGION GENERAL DESCRIPTION ............................................................... PHYSICAL ELEMENTS ..................................................................... GENERAL .................................................................................... STRATIGRAPHY ......................................................................... SOILS ............................................................................................ WATER QUALITY ........................................................................ CLIMATE INVENTORY ................................................................... CLIMATE ....................................................................................... AIR QUALITY .............................................................................. BIOLOGICAL ELEMENTS ................................................................ TERRESTRIAL VEGETATION ..................................................... TERRESTRIAL WILDLIFE ......................................................... -
Cen Workshop Agreement Cwa 14722-3
CEN CWA 14722-3 WORKSHOP August 2004 AGREEMENT ICS 35.240.15 Supersedes CWA 14722-3:2004 English version Embedded financial transactional IC card reader (embedded FINREAD) - Part 3: Functional and Security Specifications This CEN Workshop Agreement has been drafted and approved by a Workshop of representatives of interested parties, the constitution of which is indicated in the foreword of this Workshop Agreement. The formal process followed by the Workshop in the development of this Workshop Agreement has been endorsed by the National Members of CEN but neither the National Members of CEN nor the CEN Management Centre can be held accountable for the technical content of this CEN Workshop Agreement or possible conflicts with standards or legislation. This CEN Workshop Agreement can in no way be held as being an official standard developed by CEN and its Members. This CEN Workshop Agreement is publicly available as a reference document from the CEN Members National Standard Bodies. CEN members are the national standards bodies of Austria, Belgium, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Slovakia, Slovenia, Spain, Sweden, Switzerland and United Kingdom. EUROPEAN COMMITTEE FOR STANDARDIZATION COMITÉ EUROPÉEN DE NORMALISATION EUROPÄISCHES KOMITEE FÜR NORMUNG Management Centre: rue de Stassart, 36 B-1050 Brussels © 2004 CEN All rights of exploitation in any form and by any means reserved worldwide -
Part 3: Security Assurance Components
Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components September 2012 Version 3.1 Revision 4 CCMB-2012-09-003 Foreword This version of the Common Criteria for Information Technology Security Evaluation (CC v3.1) is the first major revision since being published as CC v2.3 in 2005. CC v3.1 aims to: eliminate redundant evaluation activities; reduce/eliminate activities that contribute little to the final assurance of a product; clarify CC terminology to reduce misunderstanding; restructure and refocus the evaluation activities to those areas where security assurance is gained; and add new CC requirements if needed. CC version 3.1 consists of the following parts: Part 1: Introduction and general model Part 2: Security functional components Part 3: Security assurance components Trademarks: UNIX is a registered trademark of The Open Group in the United States and other countries Windows is a registered trademark of Microsoft Corporation in the United States and other countries Page 2 of 233 Version 3.1 September 2012 Legal Notice: The governmental organisations listed below contributed to the development of this version of the Common Criteria for Information Technology Security Evaluation. As the joint holders of the copyright in the Common Criteria for Information Technology Security Evaluation, version 3.1 Parts 1 through 3 (called “CC 3.1”), they hereby grant non- exclusive license to ISO/IEC to use CC 3.1 in the continued development/maintenance of the ISO/IEC 15408 international standard. However, these governmental organisations retain the right to use, copy, distribute, translate or modify CC 3.1 as they see fit. -
LIS Impervious Surface Final Report
PROJECT COMPLETION REPORT Mapping and Monitoring Changes in Impervious Surfaces in the Long Island Sound Watershed March 2006 James D. Hurd, Research Associate Daniel L. Civco, Principal Investigator Sandy Prisloe, Co-Investigator Chester Arnold, Co-Investigator Center for Land use Education And Research (CLEAR) Department of Natural Resources Management & Engineering College of Agriculture and Natural Resources The University of Connecticut Storrs, CT 06269-4087 Table of Contents Introduction . 4 Study Area and Data . 5 Land Cover Classification . 7 Sub-pixel Classification Overview . 8 Initial Sub-pixel Classification . 10 Post-classification Processing . 10 Validation . 13 Reseults and Discussion. 15 References . 18 Appendix A: Per Pixel Comparison of Planimetric and Estimated Percent Impervious Surfaces .. 21 Appendix B: Comparison of Planimetric and Estimated Percent Impervious Surfaces Summarized Over Grid Cells of Various Sizes. 34 Appendix C: Summary of Impervious Surfaces per Sub-regional Watershed . 46 Appendix D: Table of Deliverables . 56 i List of Figures Figure 1. Hydrologic impact of urbanization flowchart . 5 Figure 2. Study area . 6 Figure 3. Examples of land cover for 1985, 1990, 1995, and 2002 . 8 Figure 4. IMAGINE Sub-pixel Classifier process . 9 Figure 5. Examples of raw impervious surface estimates for 1985, 1990, 1995, and 2002 11 Figure 6. Examples of final impervious surface estimates for 1985, 1990, 1995, and 2002 14 Figure A-1. 1990 West Hartford validation data (area 1) and difference graph . 22 Figure A-2. 1990 West Hartford validation data (area 2) and difference graph . 23 Figure A-3. 1995 Marlborough validation data and difference graph . 24 Figure A-4. 1995 Waterford validation data (area 1) and difference graph . -
Enviro-News May, 2015
Enviro-News May, 2015 Sponsored by Daemen College’s Center for Sustainable Communities and Civic Engagement and Global & Local Sustainability Program Newsletter Contents: Articles- including events, courses, local news, grants, positions Upcoming Activities Tips to Help the Environment; Lesley Haynes’ column Volunteer opportunities, recycling, CSAs and farms, organization links Articles: Idea Summit Hosted by One Region Forward Celebrate how citizens are creating sustainable change across our region. Participants in the Citizen Planning School offered by One Region Forward will present their ideas on Saturday, May 2 from 10am to noon at Sugar City (1239 Niagara St., Buffalo). Register One idea is the East Parade Circle Beautification Pilot Project which supports future community investment through environmentally sustainable community-based beautification efforts. These efforts aim to improve the built environment while creating socially and culturally relevant places that improve the perception of place on Buffalo’s East Side. Through investment in the built environment and in the people who live, work and play in there, we can attract private investments to turn the tide of economic decline in the neighborhood. A video of this project is viewable at https://www.youtube.com/watch?v=quwSpmsIQFc May Clothing Drive Clean out your closets and drop off your used textiles at sites around Western New York on May 2. Materials do not have to be in usable condition and will be recycled or reused. Sites will accept clothing, shoes, bedding and pillows, towels, curtains, throw-rugs, purses, belts, backpacks, stuffed animals and dolls. For a complete list of sites, see EARTH DAY in May 2015.pdf. -
Ccdb-2009-03-001
Supporting Document Mandatory Technical Document Application of Attack Potential to Smartcards March 2009 Version 2.7 Revision 1 CCDB-2009-03-001 Foreword This is a supporting document, intended to complement the Common Criteria version 3 and the associated Common Evaluation Methodology for Information Technology Security Evaluation. Supporting documents may be “Guidance Documents”, that highlight specific approaches and application of the standard to areas where no mutual recognition of its application is required, and as such, are not of normative nature, or “Mandatory Technical Documents”, whose application is mandatory for evaluations whose scope is covered by that of the supporting document. The usage of the latter class is not only mandatory, but certificates issued as a result of their application are recognized under the CCRA. Technical Editor: BSI Document History: V2.7 March 2009 (technical update of rating categories and update on usage of open samples based upon corresponding JIL document version 2.7) V2.5 December 2007 (explicit statements added that the points for identification and exploitation have to be added at the end to achieve the final attack potential value, references updated) V2.3 April 2007 (evaluation time guideline and rules regarding the use of open samples added and updated for use with both CC version 2 and 3) V2.1 April 2006 (classification as mandatory technical document, several updates to the tables) V1.1, July 2002 (draft indicator deleted, references updated, same content as V1.0) General purpose: The security properties of both hardware and software products can be certified in accordance with CC. To have a common understanding and to ensure that CC is used for hardware integrated circuits in a manner consistent with today’s state of the art hardware evaluations, the following chapters provide guidance on the individual aspects of the CC assurance work packages in addition to the Common Evaluation Methodology [CEM]. -
1 the Influence of Groyne Fields and Other Hard Defences on the Shoreline Configuration
1 The Influence of Groyne Fields and Other Hard Defences on the Shoreline Configuration 2 of Soft Cliff Coastlines 3 4 Sally Brown1*, Max Barton1, Robert J Nicholls1 5 6 1. Faculty of Engineering and the Environment, University of Southampton, 7 University Road, Highfield, Southampton, UK. S017 1BJ. 8 9 * Sally Brown ([email protected], Telephone: +44(0)2380 594796). 10 11 Abstract: Building defences, such as groynes, on eroding soft cliff coastlines alters the 12 sediment budget, changing the shoreline configuration adjacent to defences. On the 13 down-drift side, the coastline is set-back. This is often believed to be caused by increased 14 erosion via the ‘terminal groyne effect’, resulting in rapid land loss. This paper examines 15 whether the terminal groyne effect always occurs down-drift post defence construction 16 (i.e. whether or not the retreat rate increases down-drift) through case study analysis. 17 18 Nine cases were analysed at Holderness and Christchurch Bay, England. Seven out of 19 nine sites experienced an increase in down-drift retreat rates. For the two remaining sites, 20 retreat rates remained constant after construction, probably as a sediment deficit already 21 existed prior to construction or as sediment movement was restricted further down-drift. 22 For these two sites, a set-back still evolved, leading to the erroneous perception that a 23 terminal groyne effect had developed. Additionally, seven of the nine sites developed a 24 set back up-drift of the initial groyne, leading to the defended sections of coast acting as 1 25 a hard headland, inhabiting long-shore drift. -
Integrated Coastal Management Act: National Estuarine Management
26 No.35296 GOVERNMENT GAZETTE, 4 MAY 2012 DEPARTMENT OF ENVIRONMENTAL AFFAIRS No. 336 4 May 2012 NATIONAL ENVIRONMENTAL MANAGEMENT INTEGRA TED COASTAL MANAGEMENT ACT, 2008 (ACT NO. 24 OF 2008) INVITATION TO COMMENT ON THE DRAFT NATIONAL ESTUARINE MANAGEMENT PROTOCOL I, Bomo Edith Edna Molewa, the Minister of Water and Environmental Affairs, hereby in terms of section 33 (2) read with section 53 of the Integrated Coastal Management Act, 2008 (Act No. 24 of 2008) publish for comment the draft National Estuarine Management Protocol. Interested persons and organizations are invited to submit written commen~ on the draft National Estuarine Management Protocol as follows: Written comments may be submitted to the Department by no later than 16h00 on 04 June 2012, by mail, hand, e-mail or telefax transmission. Please note that comments received after the closing date may not be considered. 1.1.1 By mail 1.1.2 By hand 1.1.3 By E-mail Subject: Draft National Subject: Draft National Estuarine Subject: Draft NatiQ!]al Eswarine Estuarine Management Protocol Management Protocol Management Protocol The Deputy Director -General The Deputy Director-General; [email protected] .za Department of Environmental Department of Environmental Affairs: Telephonic enquiries Affairs: Oceans & Coasts; P.O Oceans & Coasts; East Pier 2; East Pier Mr Ayanda Matoti: +27 21 819 2476 Box 52126; V& A Waterfront, Road; V&A Waterfront CAPE TOWN, 8002 CAPETOWN The draft protocol is also available for download from the Departmenfs webs"e, www.environment.gov.za BOMO EDITH EDNA MOLEWA MINISTER OF WATER AND ENVIRONMENTAL AFFAIRS STAATSKOERANT, 4 MEl 2012 No. -
Microsoft Windows Common Criteria Evaluation Security Target
Windows 10, Server 2012 R2 Security Target Microsoft Windows Common Criteria Evaluation Microsoft Windows 10 Microsoft Windows Server 2012 R2 Security Target Document Information Version Number 1 Updated On March 17, 2016 Microsoft © 2016 Page 1 of 97 Windows 10, Server 2012 R2 Security Target This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The example companies, organizations, products, people and events depicted herein are fictitious. -
New York State Artificial Reef Plan and Generic Environmental Impact
TABLE OF CONTENTS EXECUTIVE SUMMARY ...................... vi 1. INTRODUCTION .......................1 2. MANAGEMENT ENVIRONMENT ..................4 2.1. HISTORICAL PERSPECTIVE. ..............4 2.2. LOCATION. .....................7 2.3. NATURAL RESOURCES. .................7 2.3.1 Physical Characteristics. ..........7 2.3.2 Living Resources. ............. 11 2.4. HUMAN RESOURCES. ................. 14 2.4.1 Fisheries. ................. 14 2.4.2 Archaeological Resources. ......... 17 2.4.3 Sand and Gravel Mining. .......... 18 2.4.4 Marine Disposal of Waste. ......... 18 2.4.5 Navigation. ................ 18 2.5. ARTIFICIAL REEF RESOURCES. ............ 20 3. GOALS AND OBJECTIVES .................. 26 3.1 GOALS ....................... 26 3.2 OBJECTIVES .................... 26 4. POLICY ......................... 28 4.1 PROGRAM ADMINISTRATION .............. 28 4.1.1 Permits. .................. 29 4.1.2 Materials Donations and Acquisitions. ... 31 4.1.3 Citizen Participation. ........... 33 4.1.4 Liability. ................. 35 4.1.5 Intra/Interagency Coordination. ...... 36 4.1.6 Program Costs and Funding. ......... 38 4.1.7 Research. ................. 40 4.2 DEVELOPMENT GUIDELINES .............. 44 4.2.1 Siting. .................. 44 4.2.2 Materials. ................. 55 4.2.3 Design. .................. 63 4.3 MANAGEMENT .................... 70 4.3.1 Monitoring. ................ 70 4.3.2 Maintenance. ................ 72 4.3.3 Reefs in the Exclusive Economic Zone. ... 74 4.3.4 Special Management Concerns. ........ 76 4.3.41 Estuarine reefs. ........... 76 4.3.42 Mitigation. ............. 77 4.3.43 Fish aggregating devices. ...... 80 i 4.3.44 User group conflicts. ........ 82 4.3.45 Illegal and destructive practices. .. 85 4.4 PLAN REVIEW .................... 88 5. ACTIONS ........................ 89 5.1 ADMINISTRATION .................. 89 5.2 RESEARCH ..................... 89 5.3 DEVELOPMENT .................... 91 5.4 MANAGEMENT .................... 96 6. ENVIRONMENTAL IMPACTS ................. 97 6.1 ECOSYSTEM IMPACTS.