Many of the recommended practices contained within the CGA’s Best Practices Manual require the sharing of critical infrastructure information. This sharing is an important aspect of ensuring that parties involved with the identification of, the excavation around, and the general protection of underground facilities have adequate information to protect underground infrastructures. However, in the interest of Homeland Security, all parties must ensure that such information is shared only with individuals who truly require this critical information.
To this end, parties who employ or contract with individuals who may have access to such information should ensure that those individuals or contractors have the appropriate credentials to prevent the information from being accessed by individuals or groups that may intend to damage, alter, or destroy the infrastructure in question. 1