Site Security Standards and Strategy

Size: px
Start display at page:

Download "Site Security Standards and Strategy"

Transcription

1 Site Security Standards and Strategy I. Background and Overview A. The City s Program Standards and Procedures (PSP) are intended to be used in conjunction with the data contained in related standards and procedures. They are not intended to be used as stand alone documents. It is the responsibility of the Designer to become familiar with all the PSP documents and comply with the criteria set forth as a whole. B. The primary objective of the Willow Lake Water Pollution Control Facility (WLWPCF) is to effectively treat wastewater and to discharge the treated water back to the environment. Improvement projects at WLWPCF will be designed with a security component consistent with this objective. C. Critical Assets: Critical Assets are defined as the key elements required for the WLWPCF to achieve its primary objective. Some of the Critical Assets to be secured are identified below: 1. Customers and employees 2. Pumps in the Raw Sewage Pump Station 3. Disinfection capability 4. Chemical tanks and associated buildings 5. Process Support Facility (PSF) 6. Distributed Control System (DCS) 7. Bar Screens 8. UNOX Facility 9. Primary and Secondary Digesters Site Security Standards and Strategy Page 1 of 10 January 3, 2005

2 10. Electrical Switchgear. D. Vulnerabilities: Vulnerabilities are defined as existing conditions or practices which make the facility vulnerable to attack. Current identified vulnerabilities to be considered in the security design process are listed below: 1. Unfamiliarity and non-compliance of employees with security requirements, policies, and procedures. 2. Potential of extremist acts. 3. Surreptitious entry of facility area or buildings. 4. Temporary on-site storage of explosive ordinances by local police. II. General Requirements A. Facility Needs: Some of the identified facility needs which must be met to successfully address site security requirements are listed below: 1. Site security strategy must coordinate security decisions for new and existing facilities. 2. On-site Contactors must lock up their compounds. 3. Berm screening view of the plant from the east is recommended. 4. Vehicular gates to be rolling type with proximity card reader and camera. 5. One layer of access control will be provided starting at the entrance and another layer of access control will be provided at the entrance to all internal access roads. 6. Entire plant site to be enclosed by a perimeter fence. 7. Access to all pump stations to be controlled. 8. Remote wet weather treatment facilities (PEFTF) will require motion detection for the interior when facility is unmanned. Site Security Standards and Strategy Page 2 of 10 January 3, 2005

3 9. Exterior entry doors on all facilities to be equipped with proximity card readers. B. Preliminary Design Decisions: Preliminary design decisions which will meet the goals and needs for site security and which should be further evaluated in the final design stages are listed below: 1. Perimeter Fencing: a. Full line fence, six feet high with three-strand barb wire, around entire compound. b. No detection or cameras required on exterior fencing unless requested by City s Project Manager (PM). c. Maintain approximately 50 feet clear zone around site perimeter fence. 2. Security Gates: A total of five vehicular gates are anticipated. The gate locations and their recommended features are described below. Reference attached schematic drawing S-001 for gate locations and attached drawing for proposed double gate configuration. Vehicular security gates will have proximity card readers, with the exception of Gate #5 at the rear entry. Some should have cameras on stanchions with intercoms a. Gate #1: Existing single gate with proximity card reader, camera and intercom. To be closed at all times. b. Gate #2: Security gate on existing access road off Windsor Island Road immediately west of entrance to demonstration wetlands double gate with proximity card reader, camera, and intercom to be open during plant working hours only. c. Gate #3: Staff parking entrance double gate with proximity card reader, camera, and intercom. To be closed at all times. d. Gate #4: Maintenance and delivery area double gate with proximity card reader, camera, and intercom. To be closed at all times. Site Security Standards and Strategy Page 3 of 10 January 3, 2005

4 e. Gate #5: Existing gate at back entry to site, padlocked at all times. f. Three existing pedestrian gates in perimeter fence are to remain. 3. Exterior Access Door. a. Exterior doors with ingress hardware, other than exterior electrical or mechanical rooms, will be equipped with proximity card readers. 4. Security Site Lighting. C. Critical Facilities. a. Provide area lighting at all access gates. b. Provide directional lighting for buildings and parking area. c. Provide directional and way finding lighting for site. d. Lighting on perimeter site fencing is not recommended due to light pollution. Security recommendations for each of the highest priority critical facilities are listed below. A common recommendation is the need to integrate the access control system with the plants Distributed Control System (DCS). Intrusion detection is not recommended for facilities on the WLWPCF property as staff is not trained nor available to respond to alarms. Specific recommendations include: 1. Main switchgear: a. Should be shielded from line of sight from perimeter. b. Switchgear eventually will be placed inside a building. c. Record of entry provided by proximity card readers on all exterior doors. 2. Raw sewage pump station: a. Proximity card access control on exterior doors. Site Security Standards and Strategy Page 4 of 10 January 3, 2005

5 b. Door position switches on all hatches and points of entry. 3. Hypochlorite/Chemical Storage: a. Monitor and detect low chemical levels in the event an adversary perforates a tank. b. Provide spill containment. c. Install proximity cards to all building exterior doors. Alarm liquid level to DCS to indicate leakage. d. Secure existing windows. 4. Bar screens: a. Provide proximity card access control to all exterior doors. b. Provide secure hardened enclosure around exterior bar screen controls. 5. Process Support Facilities: a. Provide interior surveillance camera in lobby. b. Provide proximity card access to building interior control rooms and laboratory. c. Proximity card access to all exterior ingress doors. d. Panic button at reception area. e. Provide monitoring in the control room. f. Provide badging station. 6. PEFTF (remote facility): Although this facility is not located on the WLWPCF site, PEFTF will be an extension of the WLWPCF security program and is an example of a facility that would have intrusion detection such as microwave. All exterior doors will have proximity card readers. Site Security Standards and Strategy Page 5 of 10 January 3, 2005

6 D. Process Training/Procedures/Protocol: 1. It is recognized that equally important to recommended security hardware upgrades, the WLWPCF needs to establish, communicate, and enforce security policy and procedures. Security awareness training will be a key element for both City and non-city personnel. In particular, it will be critical to review and update, if required, the security procedures for Contractors accessing the site. These procedures must be clear and consistently enforced to be effective. 2. Initial security policy will include: a. Proximity cards for internal use. b. Proximity cards for Contractor use. c. Communication and security awareness training. d. Modification of existing proximity cards to accommodate staff identification and access of WLWPCF by other City staff. e. Policy for after-hours shifts. f. Bio-gro and other vehicles to gain entry after hours by use of proximity cards at the gate. III. Site Security Strategy A. A Site Security Strategy for the WLWPCF will be used to direct the selection of security measures that apply to both existing facilities as well as future facilities at WLWPCF. In addition it is not anticipated that WLWPCF will be connected to the City-wide security network (the City of Salem has adopted the Lenell Access Control System). However, it is expected that any security hardware and software will be selected with an eye to future compatibility with the City security system. Unlike water treatment plants, currently there is not a federal regulatory program mandating security upgrades for wastewater treatment plants. However, in implementing a security strategy as outlined herein, WLWPCF is well positioned to address future potential mandates. Site Security Standards and Strategy Page 6 of 10 January 3, 2005

7 B. Threat Assumptions: The Site Security Strategy recognizes that the highest probability threat is presumed to be vandalism, theft, or actions by a disgruntled employee. While domestic terrorism is always a potential, it is not prudent to try to protect the facility from too extreme an adversary. While disruption to the wastewater treatment capacity could be environmentally, financially or politically problematic, it would probably not lead to a loss of life. Although the WLWPCF is an important facility, it is not as critical as a water treatment plant. The focus will be to minimize the targets of opportunity for an adversary. C. Critical Facilities: A Site Security Strategy will focus attention on potential single points of system failure. These elements should be identified and ranked in relation to their importance to the overall WLWPCF mission to effectively treat wastewater and to discharge the treated water back to the environment. Currently, in order of criticality, system elements such as staff, main switchgear, raw sewage pump station, effluent disinfection and the bar screens have been identified. In the future, additional system components will be brought online and their criticality should be ranked in comparison with existing critical systems. Protection of the public and WLWPCF staff will be the highest priority. Some systems, such as the proposed PEFTF system, may be ranked as critical elements, even if they are located offsite. D. Deterrence, Detection, Delay, and Response: With both the design basis threat and the critical facilities identified, security measures are selected. Security measures are typically selected to provide deterrence, detection, delay and/or response. For the WLWPCF, the emphasis is on deterrence and response. 1. Deterrence: a. One goal of the security strategy, is to provide sufficient security measures to deflect a determined adversary to another location. Fencing the entire plant perimeter has been selected as an appropriate deterrent measure. The fence would be a minimum of six feet high with three strands of barb wire. In addition to providing delay, if the fence is breached it will typically provide detection due to a bent or cut fencing material. Vehicle access past this perimeter fence will be through a double gate which will open Site Security Standards and Strategy Page 7 of 10 January 3, 2005

8 during the public hours and be closed at all other times. This double gate will be located on the plant side of the turn-off to the NRS wetlands viewing area and will be equipped with proximity card readers and an intercom and camera to facilitate remote operation of the gate. b. A defense in depth strategy with regards to interior vehicle gates has been adopted. There will be a primary security gate on the primary access road close to Windsor Island Road and gates on other internal site access roads. All gates will have proximity card readers and those with potential public access will be equipped with intercoms and cameras. c. Site security lighting will be limited to exterior of buildings as well as the parking areas. Security lighting will be provided for the gated entry locations with the intent of making visitors visible to the camera. In addition to security lighting, directional and way-finding lighting will also be provided and will consist of roadway lighting and bollard lighting. Lighting on the perimeter site fencing also provides a suitable deterrent, however, WLWPCF is concerned with light pollution affecting the neighboring properties and will therefore not consider its use. 2. Detection: a. A conscious decision has been made to not equip buildings with glass break detection or microwave intrusion detection or add numerous cameras to the plant perimeter. Without staff trained and available to observe cameras and monitor building occupancy or intrusion, an extensive detection system is not warranted. Cameras are recommended to monitor the highest risk locations such as the public entry lobby area and both the staff and public parking lots of the new PSF. Imagery from the camera will be recorded and monitored in the operations room of the PSF. It is expected that intercom buzzers associated with the entry gates will be directed to on call operators who will report to the operations room to view monitors and provide entry to visitors, vendors, and Contractors without access cards. b. The PSF, which will house the administration building, laboratory, and the maintenance/warehouse building, is a critical asset with the DCS system located in the administration area and with the bulk of Site Security Standards and Strategy Page 8 of 10 January 3, 2005

9 3. Delay: employees working in the building. The current plans for the building include operable windows for south facing office windows. Appropriate security measures must be included which will identify if a window is left open when staff goes home in the evening. Alternately, procedural rules could be established for an evening check to make sure the windows are closed. A third option is to incorporate hardware which effectively prevents the windows from opening wide enough to become a security risk. c. Some detection is recommended for specific process failures such as hypochlorite leaks. These devices will alarm to the DCS. Likewise, it is recommended that detection be evaluated for remote facilities, such as PEFTF. Such facilities should be evaluated on a case-by-case basis, taking into consideration the criticality of the asset, locations, and design of facility. a. A decision has been made to require proximity card readers on all exterior doors of most structures, which will control access and provide a record of entry. Exceptions will be allowed for doors designated as exit only, in which case hardware will not allow entry from the exterior, or in the case of storage areas with exterior entries which will have key entry. In the event these doors are left open or forced open, these doors will report and alarm to an Access Control Station (ACS) which is connected to the DCS. The ACS will make a record of all entries and also authorize entry to holders of specific cards. b. Where appropriate, emphasis may be placed on limiting construction activities to maintain site security. Segregation of Contractors from plant activities may be accomplished with proximity card gate entry, security watchmen and/or security fencing as necessary, depending upon the nature and duration of the construction activity. Separate pedestrian gates may be required for Contractor access to the site. 4. Response: a. City staff will not be used for any type of response in a security incursion. Staff is not available, or trained, to be dedicated to continuously monitoring security cameras and alarms. Staff will Site Security Standards and Strategy Page 9 of 10 January 3, 2005

10 report to the operations room to check the monitor and allow entry through gates when required, and may respond to door open alarms in the case that a door equipped with an electric strike is either propped open or forced open. b. All other responses will be left to the appropriate authorities. Given the approximate six minute response time by local police, external response is expected to be sufficient. An effective response will also include well thought out contingency and notifications plans. This may involve spare or redundant equipment in critical applications. Training is expected to be a major element in the development of a site security plan. IV. Attachments A. S Site Security Strategy Schematic Drawing. B. SK.EY Double Gate Concept Design Sketch END OF SECTION Site Security Standards and Strategy Page 10 of 10 January 3, 2005

11

12

Physical Security for Drinking Water Facilities

Physical Security for Drinking Water Facilities Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland

More information

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism

More information

How To Ensure Security At A Site Security Site

How To Ensure Security At A Site Security Site Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers

More information

Middleborough Police Electronic Security Narrative

Middleborough Police Electronic Security Narrative Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of

More information

How To Protect A Water System

How To Protect A Water System SECURITY OFFICER & PATROL OFFICER PROTOCOL SECURITY OFFICER LOCATIONS AND SHIFTS La Entrada Main Security Center 24 hour coverage 7 days per week Plant 1 Main Gate Monday Friday, 5:00 AM 6:00 PM Patrol

More information

Appendix G. Security management plan

Appendix G. Security management plan Appendix G Security management plan Security Management Plan Prepared by: Kann Finch Group Project Energy Australia Belmore Park Zone 1- Sub-station component General Design Requirements The perimeter

More information

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7 Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section

More information

Current as of 11/10/08 1 of 1

Current as of 11/10/08 1 of 1 BEST PRACTICES STANDARDS FOR SCHOOLS UNDER CONSTRUCTION OR BEING PLANNED FOR CONSTRUCTION I. Site Layout A. School buildings shall be provided with a securable perimeter. A securable perimeter means that

More information

Physical Security Checklist and Inventory

Physical Security Checklist and Inventory Tool 1: Assessing Robbery Risk Physical Security Checklist and Inventory Any assessment of robbery risk begins with an evaluation and inventory of the measures you are already taking as a financial institution.

More information

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department

More information

Ten Tips for Completing a Site Security Plan

Ten Tips for Completing a Site Security Plan TRANSPORTATION LOGISTICS PETROCHEMICal Commercial Industrial Retail Federal Systems Banking Ten Tips for Completing a Site Security Plan Introduction The Chemical Facility Anti-Terrorism Standards (CFATS)

More information

Home Security Assessment Checklist DATE

Home Security Assessment Checklist DATE Home Security Assessment Checklist DATE PREFACE The Home Security Assessment Checklist is designed to assist justices, judges, and other court officials in determining their level of security at home.

More information

Palm Beach State College Security Plan

Palm Beach State College Security Plan Palm Beach State Security Plan Prepared by: J.E. Smith Date: September 17, 2008 INTRODUCTION This Security Plan describes the organization, activities, methodology, and documentation by which Palm Beach

More information

Wantagh s Smart Schools Plan for Technology & Security

Wantagh s Smart Schools Plan for Technology & Security Wantagh s Smart Schools Plan for Technology & Security 1 How Can We Use Smart Schools Funds? The SMART SCHOOLS Act of 2014, as set forth in section one of part B of chapter 56 of the laws of 2014, authorizes

More information

Effective Solutions for Increased Security in NH Public Schools. State of New Hampshire Division of Homeland Security and Emergency Management

Effective Solutions for Increased Security in NH Public Schools. State of New Hampshire Division of Homeland Security and Emergency Management State of New Hampshire Division of Homeland Security and Emergency Management Effective Solutions for Increased Security in NH Public Schools 33 Hazen Drive Concord, NH 03305 Effective Date: June 25, 2014

More information

Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn

Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn Security 101 For School Safety Intertech Associates, Inc. Lunch & Learn Safe & Secure Educational Environment What type of school is it? What type of security risks do schools see? How can traffic flows,

More information

Wisconsin Wastewater Operators Association Physical Security for Facilities. Christopher P. Haase, P.E.

Wisconsin Wastewater Operators Association Physical Security for Facilities. Christopher P. Haase, P.E. Wisconsin Wastewater Operators Association Christopher P. Haase, P.E. Introduction Welcome Security Planning and Evaluation Available Funding Sources Q&A Security Planning and Evaluation History Acropolis,

More information

KANSAS DEPARTMENT OF HEALTH AND ENVIRONMENT. Bureau of Water. Simplified Vulnerability Assessment Tool for Drinking Water

KANSAS DEPARTMENT OF HEALTH AND ENVIRONMENT. Bureau of Water. Simplified Vulnerability Assessment Tool for Drinking Water KANSAS DEPARTMENT OF HEALTH AND ENVIRONMENT Bureau of Water Simplified Vulnerability Assessment Tool for Drinking Water KANSAS DEPARTMENT OF HEALTH AND ENVIRONMENT Simplified Vulnerability Assessment Tool

More information

Electronic Security. For Financial Institutions

Electronic Security. For Financial Institutions A partner you can bank on Our bank was growing. New branches. New card processing center. We wanted to tie access control, alarm monitoring and video surveillance into one system we could monitor from

More information

Introduction. Industry Changes

Introduction. Industry Changes Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise

More information

Security Alarm Monitoring Protocol

Security Alarm Monitoring Protocol Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or

More information

Protection of unoccupied or void properties

Protection of unoccupied or void properties Real Estate Issue one Protection of unoccupied or void properties Introduction The current economic downturn has lead to a greatly increased number of vacant properties. In some countries rates of unoccupancy

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...

More information

A Self-Audit of Your Current Campus Security Systems

A Self-Audit of Your Current Campus Security Systems A Self-Audit of Your Current Campus Security Systems Security Solutions for Education, Business & Public Safety Free Consultations on ID Card Systems, Access Control, Call Recording, Video Surveillance,

More information

PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX

PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX To ensure that policies, procedures, training and physical facilities improvements are implemented in a planned and logical

More information

Element D Services Electrical

Element D Services Electrical Security Systems PART 1 - GENERAL 1.01 OVERVIEW A. The objective for each security design element is to help MD Anderson meet its mission and vision by promoting an environment in which higher education,

More information

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing KSU Police Converged Security: A holistic approach to cyber safety and security Cyber Security through Education & Awareness by Community Policing Community Policing Community Policing Initial meeting

More information

Does a fence or other type physical barrier define the perimeter of the facility?

Does a fence or other type physical barrier define the perimeter of the facility? PHYSCIAL SECURITY SURVEY CHECKLIST PERIMETER BARRIERS TRANSIT FACILITIES Does a fence or other type physical barrier define the perimeter of the facility? (1) Specify type and height of physical barrier

More information

Security Guidelines for. Agricultural distributors

Security Guidelines for. Agricultural distributors Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole

More information

Conducting Security System Site Surveys

Conducting Security System Site Surveys Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM

More information

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL 9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent

More information

School Security: What are you missing?

School Security: What are you missing? School Security: What are you missing? The need to keep our nation s children safe at school has become more urgent than ever. But this also puts pressure on both the school s administrators and its budget.

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems United States Environmental Protection Agency Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems Office of Water (M 140) EPA 817-B-15-002B May 2015 Introduction A Water

More information

Site Security and Access Policy and Procedures. Written By. Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By

Site Security and Access Policy and Procedures. Written By. Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By Site Security and Access Policy and Procedures Written By Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By David Neild Last Reviewed date Autumn 2014 (VERSION 4)

More information

Lincoln Minster School. Security

Lincoln Minster School. Security Lincoln Minster School Security Policy Statement Security plays a vital role in ensuring the effective management of Lincoln Minster School, which is committed to providing a safe and secure environment

More information

How to Solve the Most Persistent Problem in Perimeter Security Systems

How to Solve the Most Persistent Problem in Perimeter Security Systems How to Solve the Most Persistent Problem in Perimeter Security Systems Duane Thompson General Manager of Fiber SenSys Carrondo, Antonio Commercial Manager, Teleprinta Perimeter Security Challenging!! More

More information

Home Security Inspection

Home Security Inspection Home Security Inspection This document sets forth conclusions and recommendations following a Crime Prevention Through Environmental Design inspection performed by the Thunderbolt Police Department. The

More information

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Security Service de Services sécurité. Security Alarm Monitoring Protocol Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Products. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION

Products. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION Products. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION THE ANIXTER DIFFERENCE Organizations responsible for building and maintaining critical infrastructures face

More information

Todd & Cue Ltd Your Business Continuity Partner

Todd & Cue Ltd Your Business Continuity Partner Todd & Cue Ltd Your Business Continuity Partner Preparation and Planning We provide strategies, tools and resources to help you prepare for a business interruption whether it is caused by fire, water,

More information

Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland

Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland B. Wieland Swiss Federal Office of Energy, CH 3003 Berne, Switzerland ABSTRACT: The presentation describes the

More information

Security System Proposal. Rich Destremps rdestremps@lutron.com 610-533

Security System Proposal. Rich Destremps rdestremps@lutron.com 610-533 Security System Proposal Rich Destremps rdestremps@lutron.com 610-533 533-9482 Overview of Project Activity 1. Performed internet research to understand the basics of a public school security system 2.

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

Depending on building design and layout, access points will operate in the following manner:

Depending on building design and layout, access points will operate in the following manner: Scope Electronic Access Guidelines AG-101 The scope of the keyless access upgrade project is to provide increased security and public safety by deploying electronic access controls, door status monitoring/security

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities. 2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Business Protection Online Activity Store Self Assessment

Business Protection Online Activity Store Self Assessment Business Protection Online Activity Store Self Assessment Complete each question in the Business Protection Online Activity Store Self Assessment. The selfassessment covers potential areas of vulnerability,

More information

Designing Out Crime Assessment

Designing Out Crime Assessment Designing Out Crime Assessment New Flats (Affordable Housing) Yew Tree Road Moreton Wirral CH46 8UA Construction of flats complex. For Bernard Taylor Partnership Ltd o.iu@bernardtaylor.co.uk Tel 0161 443

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

UK SBS Physical Security Policy

UK SBS Physical Security Policy UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following

More information

Element D Services Electrical

Element D Services Electrical Security Systems PART 1 - GENERAL 1.01 OVERVIEW A. The objective for each security design element is to help MD Anderson meet its mission and vision by promoting an environment in which higher education,

More information

Beaver Dam Unified School District Request for Proposal Video Surveillance and Door Access Control Systems

Beaver Dam Unified School District Request for Proposal Video Surveillance and Door Access Control Systems Beaver Dam Unified School District Request for Proposal Video Surveillance and Door Access Control Systems The Beaver Dam Unified School District (BDUSD) is requesting proposals from qualified companies

More information

SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS

SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS 500-54 Administrative Procedure 542 SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS Background Recognizing the significant investment in buildings, grounds, supplies and equipment, the District has a responsibility

More information

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over

More information

MONROE POLICE DEPARTMENT

MONROE POLICE DEPARTMENT MONROE POLICE DEPARTMENT 104 Stage Road Monroe, NY 10950 Main: (845) 782-8644 - Fax: (845) 782-2227 A. Alex Melchiorre Website: www.monroepd.org Chief of Police BUSINESS BURGLARY PREVENTION TIPS Is your

More information

DIVISION 28 ELECTRONIC SAFETY AND SECURITY

DIVISION 28 ELECTRONIC SAFETY AND SECURITY DIVISION 28 ELECTRONIC SAFETY AND SECURITY CENTRALLY MANAGED ELECTRONIC ACCESS CONTROL, VIDEO SURVEILLANCE, AND INTRUSION ALARM SYSTEMS 1. All questions on equipment approvals in this section shall be

More information

Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response

Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response International Biological Threat Reduction Department Sandia National Laboratories

More information

Surveillance Equipment

Surveillance Equipment University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of

More information

Chapter 8. EOC Security Concepts and Requirements:

Chapter 8. EOC Security Concepts and Requirements: : One of the primary objectives in the design and construction (or retrofit) of an Emergency Operations Center (EOC) is to provide a safe and secure environment that will enable the emergency management

More information

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco. Business Owner s Security Buyers Guide Everything you need to know before purchasing a security system Business Owners Security Buyer s Guide You re a business owner. That means you wear a lot of hats

More information

BUILDING SECURITY & ACCESS CONTROL

BUILDING SECURITY & ACCESS CONTROL Department of Facilities Management BUILDING SECURITY & ACCESS CONTROL OBJECTIVE: PERFORMANCE GUIDELINES AUGUST 19, 2011 The objective of this guideline is to limit the probability that, as a result of

More information

C-TPAT Self-Assessment - Manufacturing & Warehousing

C-TPAT Self-Assessment - Manufacturing & Warehousing Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name

More information

Intermec Security Letter of Agreement

Intermec Security Letter of Agreement Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism

More information

A Risk Assessment Methodology (RAM) for Physical Security

A Risk Assessment Methodology (RAM) for Physical Security A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to

More information

Cyber Security Response to Physical Security Breaches

Cyber Security Response to Physical Security Breaches Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically

More information

Suffolk County Department of Health Services. Division of Environmental Quality

Suffolk County Department of Health Services. Division of Environmental Quality Suffolk County Department of Health Services Division of Environmental Quality Guidelines For the Construction of Storage Areas for Portable Containers ~~~~ Clare B. Bradley, M.D., M.P.H. Suffolk County

More information

RESOLUTION NO. 13-16 TO ADOPT COURT SECURITY MANUAL

RESOLUTION NO. 13-16 TO ADOPT COURT SECURITY MANUAL RESOLUTION NO. 13-16 TO ADOPT COURT SECURITY MANUAL WHEREAS, the Wisconsin Supreme Court has rule making authority under Wis. Stat. 751.12 and under its administrative authority over all courts conferred

More information

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template Security Tools Forms Physical Security Assessment Security Plan Template Traffic Control Plan Template 1 Physical Security Assessment (PSA) Date: I. PHYSICAL SECURITY ASSESSMENT (PSA): EXTERIOR OF THE

More information

U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security

U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security NUREG-0800 U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN 13.6.2 PHYSICAL SECURITY DESIGN CERTIFICATION REVIEW RESPONSIBILITIES Primary - Organization responsible for the review of physical security

More information

Invitation to Bid City of Perry Fire Alarm & Security Systems Bid Number 2015-24 (Part I & II) Due Date May 1, 2015 11:00 AM

Invitation to Bid City of Perry Fire Alarm & Security Systems Bid Number 2015-24 (Part I & II) Due Date May 1, 2015 11:00 AM Invitation to Bid City of Perry Fire Alarm & Security Systems Bid Number 2015-24 (Part I & II) Due Date May 1, 2015 11:00 AM The City of Perry, GA is soliciting sealed bids for a fire alarm and security

More information

TECHNICAL QUESTIONS AND ANSWERS ITN-DOT-14/15-7009RM TAMPA OPERATIONS CENTER VIDEO SURVEILLANCE/SECURITY ACCESS SYSTEM

TECHNICAL QUESTIONS AND ANSWERS ITN-DOT-14/15-7009RM TAMPA OPERATIONS CENTER VIDEO SURVEILLANCE/SECURITY ACCESS SYSTEM TECHNICAL QUESTIONS AND ANSWERS ITN-DOT-14/15-7009RM TAMPA OPERATIONS CENTER VIDEO SURVEILLANCE/SECURITY ACCESS SYSTEM 1) Does the department have an estimate on the total number of cameras required and

More information

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors. Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

Security Management Plan

Security Management Plan Effective Date: 03/2015 1 of 10 I. Table of Contents: I Table of Contents II Authority III Purpose & Scope IV Policy Statement V The Joint Commission Standards VI Performance Standards VII DUPD Services

More information

SAMPLE FRACTION MITIGATION CONTINGENCY PLAN FOR DIRECTIONAL DRILLING

SAMPLE FRACTION MITIGATION CONTINGENCY PLAN FOR DIRECTIONAL DRILLING SAMPLE FRACTION MITIGATION CONTINGENCY PLAN FOR DIRECTIONAL DRILLING 1 TABLE OF CONTENTS 1.0 Introduction and Purpose 3 2.0 Description of Work 3 3.0 Site Supervisor/Foremen Responsibilities 4 4.0 Equipment

More information

Nuclear Plant Security Systems

Nuclear Plant Security Systems Nuclear Plant Security Systems Course Description Gary W Castleberry, PE This course will introduce the student into the design of security systems for commercial nuclear power plants. An overview of plant

More information

Questions related to specific materials, methods, and services will be addressed at the conclusion of each presentation.

Questions related to specific materials, methods, and services will be addressed at the conclusion of each presentation. CEFPI is a Registered Provider with The American Institute of Architects Continuing Education Systems (AIA/CES). Credit(s) earned on completion of this program will be reported to AIA/CES for AIA members.

More information

RAD-SYS-NEMA4X-SMS Control Cabinet. Solution guide for SMS-based remote access control and intrusion detection system

RAD-SYS-NEMA4X-SMS Control Cabinet. Solution guide for SMS-based remote access control and intrusion detection system Solution guide for SMS-based remote access control and intrusion detection system Contents Application: Remote access control and intrusion detection Page 1 Solution: SMS Relay control cabinet Page 2 System

More information

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry Needs analysis Reduce disputes over payouts Eliminate theft Detect misconduct and record it for use as evidence in

More information

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

DOT IN-DEPTH HAZMAT SECURITY TRAINING PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow

More information

Welcome to AISB Created by IT Facilities Manager, Lylah Shelor and Updated on July 28, 2015

Welcome to AISB Created by IT Facilities Manager, Lylah Shelor and Updated on July 28, 2015 Welcome to AISB Created by IT Facilities Manager, Lylah Shelor and Updated on July 28, 2015 Index Emergency Action Plan online at www.it.vt.edu Location of Fire Extinguishers, Emergency Pulls & AEDs..2

More information

Physical Security Reliability Standard Implementation

Physical Security Reliability Standard Implementation Physical Security Reliability Standard Implementation Tobias Whitney, Manager of CIP Compliance (NERC) Carl Herron, Physical Security Leader (NERC) NERC Sub-Committee Meeting New Orleans, Louisiana CIP-014

More information

C-TPAT Security Criteria Sea Carriers

C-TPAT Security Criteria Sea Carriers C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does

More information

DAtA security. the protection Of your INfORMAtION. Is OuR prime DIREctIVE

DAtA security. the protection Of your INfORMAtION. Is OuR prime DIREctIVE DAtA security the protection Of your INfORMAtION Is OuR prime DIREctIVE OVERVIEW building security theft alarms point of entry interior & exterior closed-circuit camera monitoring impact-resistant windows

More information

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business Business Name: Owner Name: Business Address: Officer: Survey No.: WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business "Being There When Needed" DOORS 1. Is the exterior doors solid core

More information

Fort Bend Independent School District. Safety and Security Master Plan Proposal

Fort Bend Independent School District. Safety and Security Master Plan Proposal Fort Bend Independent School District Safety and Security Master Plan Proposal As of July 22, 2014 INTRODUCTION AND BACKGROUND The Fort Bend Independent School District s Safety and Security Master Plan

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

DARTMOUTH COLLEGE DESIGN January 3, 2012 & CONSTRUCTION GUIDELINES

DARTMOUTH COLLEGE DESIGN January 3, 2012 & CONSTRUCTION GUIDELINES PART 1 DESIGN DIRECTIVES 1.1 OVERVIEW SECTION 13825 SECURITY MANAGEMENT SYSTEMS A. The access control, surveillance, and intrusion detection system implemented for use at Dartmouth College is a Lenel International

More information

OPERATOR - FACILITY ADDRESS - DATE

OPERATOR - FACILITY ADDRESS - DATE . Facility Criteria (RFP).0 Location Characteristics Criteria Requirements 1 Ownership and Management: Please identify the owner(s) and managers of the property and indicate if there is on-site management.

More information

A Remote Monitoring Service Provided by BEST Monitoring Ltd.NYS License #12000005036

A Remote Monitoring Service Provided by BEST Monitoring Ltd.NYS License #12000005036 A Remote Monitoring Service Provided by BEST Monitoring Ltd.NYS License #12000005036 What is Cyberdoorman? With our own Central Alarm Monitoring Station that has been operating for over fifteen years and

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

Supply Chain Security Audit Tool - Warehousing/Distribution

Supply Chain Security Audit Tool - Warehousing/Distribution Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:

More information

Security Profile. Business Partner Requirements, Security Procedures (Updated)

Security Profile. Business Partner Requirements, Security Procedures (Updated) Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority. Due to the attacks

More information

Ensuring Better Outcomes in Pharmaceutical Warehouse Security 2012 Supply Chain Security Seminar, Wilmington DE

Ensuring Better Outcomes in Pharmaceutical Warehouse Security 2012 Supply Chain Security Seminar, Wilmington DE Ensuring Better Outcomes in Pharmaceutical Warehouse Security 2012 Supply Chain Security Seminar, Wilmington DE Mike Elliot, Executive Vice President Managed Costs Regulatory Compliance Cargo Theft Product

More information