Site Security Standards and Strategy
|
|
- Cuthbert Sherman
- 8 years ago
- Views:
Transcription
1 Site Security Standards and Strategy I. Background and Overview A. The City s Program Standards and Procedures (PSP) are intended to be used in conjunction with the data contained in related standards and procedures. They are not intended to be used as stand alone documents. It is the responsibility of the Designer to become familiar with all the PSP documents and comply with the criteria set forth as a whole. B. The primary objective of the Willow Lake Water Pollution Control Facility (WLWPCF) is to effectively treat wastewater and to discharge the treated water back to the environment. Improvement projects at WLWPCF will be designed with a security component consistent with this objective. C. Critical Assets: Critical Assets are defined as the key elements required for the WLWPCF to achieve its primary objective. Some of the Critical Assets to be secured are identified below: 1. Customers and employees 2. Pumps in the Raw Sewage Pump Station 3. Disinfection capability 4. Chemical tanks and associated buildings 5. Process Support Facility (PSF) 6. Distributed Control System (DCS) 7. Bar Screens 8. UNOX Facility 9. Primary and Secondary Digesters Site Security Standards and Strategy Page 1 of 10 January 3, 2005
2 10. Electrical Switchgear. D. Vulnerabilities: Vulnerabilities are defined as existing conditions or practices which make the facility vulnerable to attack. Current identified vulnerabilities to be considered in the security design process are listed below: 1. Unfamiliarity and non-compliance of employees with security requirements, policies, and procedures. 2. Potential of extremist acts. 3. Surreptitious entry of facility area or buildings. 4. Temporary on-site storage of explosive ordinances by local police. II. General Requirements A. Facility Needs: Some of the identified facility needs which must be met to successfully address site security requirements are listed below: 1. Site security strategy must coordinate security decisions for new and existing facilities. 2. On-site Contactors must lock up their compounds. 3. Berm screening view of the plant from the east is recommended. 4. Vehicular gates to be rolling type with proximity card reader and camera. 5. One layer of access control will be provided starting at the entrance and another layer of access control will be provided at the entrance to all internal access roads. 6. Entire plant site to be enclosed by a perimeter fence. 7. Access to all pump stations to be controlled. 8. Remote wet weather treatment facilities (PEFTF) will require motion detection for the interior when facility is unmanned. Site Security Standards and Strategy Page 2 of 10 January 3, 2005
3 9. Exterior entry doors on all facilities to be equipped with proximity card readers. B. Preliminary Design Decisions: Preliminary design decisions which will meet the goals and needs for site security and which should be further evaluated in the final design stages are listed below: 1. Perimeter Fencing: a. Full line fence, six feet high with three-strand barb wire, around entire compound. b. No detection or cameras required on exterior fencing unless requested by City s Project Manager (PM). c. Maintain approximately 50 feet clear zone around site perimeter fence. 2. Security Gates: A total of five vehicular gates are anticipated. The gate locations and their recommended features are described below. Reference attached schematic drawing S-001 for gate locations and attached drawing for proposed double gate configuration. Vehicular security gates will have proximity card readers, with the exception of Gate #5 at the rear entry. Some should have cameras on stanchions with intercoms a. Gate #1: Existing single gate with proximity card reader, camera and intercom. To be closed at all times. b. Gate #2: Security gate on existing access road off Windsor Island Road immediately west of entrance to demonstration wetlands double gate with proximity card reader, camera, and intercom to be open during plant working hours only. c. Gate #3: Staff parking entrance double gate with proximity card reader, camera, and intercom. To be closed at all times. d. Gate #4: Maintenance and delivery area double gate with proximity card reader, camera, and intercom. To be closed at all times. Site Security Standards and Strategy Page 3 of 10 January 3, 2005
4 e. Gate #5: Existing gate at back entry to site, padlocked at all times. f. Three existing pedestrian gates in perimeter fence are to remain. 3. Exterior Access Door. a. Exterior doors with ingress hardware, other than exterior electrical or mechanical rooms, will be equipped with proximity card readers. 4. Security Site Lighting. C. Critical Facilities. a. Provide area lighting at all access gates. b. Provide directional lighting for buildings and parking area. c. Provide directional and way finding lighting for site. d. Lighting on perimeter site fencing is not recommended due to light pollution. Security recommendations for each of the highest priority critical facilities are listed below. A common recommendation is the need to integrate the access control system with the plants Distributed Control System (DCS). Intrusion detection is not recommended for facilities on the WLWPCF property as staff is not trained nor available to respond to alarms. Specific recommendations include: 1. Main switchgear: a. Should be shielded from line of sight from perimeter. b. Switchgear eventually will be placed inside a building. c. Record of entry provided by proximity card readers on all exterior doors. 2. Raw sewage pump station: a. Proximity card access control on exterior doors. Site Security Standards and Strategy Page 4 of 10 January 3, 2005
5 b. Door position switches on all hatches and points of entry. 3. Hypochlorite/Chemical Storage: a. Monitor and detect low chemical levels in the event an adversary perforates a tank. b. Provide spill containment. c. Install proximity cards to all building exterior doors. Alarm liquid level to DCS to indicate leakage. d. Secure existing windows. 4. Bar screens: a. Provide proximity card access control to all exterior doors. b. Provide secure hardened enclosure around exterior bar screen controls. 5. Process Support Facilities: a. Provide interior surveillance camera in lobby. b. Provide proximity card access to building interior control rooms and laboratory. c. Proximity card access to all exterior ingress doors. d. Panic button at reception area. e. Provide monitoring in the control room. f. Provide badging station. 6. PEFTF (remote facility): Although this facility is not located on the WLWPCF site, PEFTF will be an extension of the WLWPCF security program and is an example of a facility that would have intrusion detection such as microwave. All exterior doors will have proximity card readers. Site Security Standards and Strategy Page 5 of 10 January 3, 2005
6 D. Process Training/Procedures/Protocol: 1. It is recognized that equally important to recommended security hardware upgrades, the WLWPCF needs to establish, communicate, and enforce security policy and procedures. Security awareness training will be a key element for both City and non-city personnel. In particular, it will be critical to review and update, if required, the security procedures for Contractors accessing the site. These procedures must be clear and consistently enforced to be effective. 2. Initial security policy will include: a. Proximity cards for internal use. b. Proximity cards for Contractor use. c. Communication and security awareness training. d. Modification of existing proximity cards to accommodate staff identification and access of WLWPCF by other City staff. e. Policy for after-hours shifts. f. Bio-gro and other vehicles to gain entry after hours by use of proximity cards at the gate. III. Site Security Strategy A. A Site Security Strategy for the WLWPCF will be used to direct the selection of security measures that apply to both existing facilities as well as future facilities at WLWPCF. In addition it is not anticipated that WLWPCF will be connected to the City-wide security network (the City of Salem has adopted the Lenell Access Control System). However, it is expected that any security hardware and software will be selected with an eye to future compatibility with the City security system. Unlike water treatment plants, currently there is not a federal regulatory program mandating security upgrades for wastewater treatment plants. However, in implementing a security strategy as outlined herein, WLWPCF is well positioned to address future potential mandates. Site Security Standards and Strategy Page 6 of 10 January 3, 2005
7 B. Threat Assumptions: The Site Security Strategy recognizes that the highest probability threat is presumed to be vandalism, theft, or actions by a disgruntled employee. While domestic terrorism is always a potential, it is not prudent to try to protect the facility from too extreme an adversary. While disruption to the wastewater treatment capacity could be environmentally, financially or politically problematic, it would probably not lead to a loss of life. Although the WLWPCF is an important facility, it is not as critical as a water treatment plant. The focus will be to minimize the targets of opportunity for an adversary. C. Critical Facilities: A Site Security Strategy will focus attention on potential single points of system failure. These elements should be identified and ranked in relation to their importance to the overall WLWPCF mission to effectively treat wastewater and to discharge the treated water back to the environment. Currently, in order of criticality, system elements such as staff, main switchgear, raw sewage pump station, effluent disinfection and the bar screens have been identified. In the future, additional system components will be brought online and their criticality should be ranked in comparison with existing critical systems. Protection of the public and WLWPCF staff will be the highest priority. Some systems, such as the proposed PEFTF system, may be ranked as critical elements, even if they are located offsite. D. Deterrence, Detection, Delay, and Response: With both the design basis threat and the critical facilities identified, security measures are selected. Security measures are typically selected to provide deterrence, detection, delay and/or response. For the WLWPCF, the emphasis is on deterrence and response. 1. Deterrence: a. One goal of the security strategy, is to provide sufficient security measures to deflect a determined adversary to another location. Fencing the entire plant perimeter has been selected as an appropriate deterrent measure. The fence would be a minimum of six feet high with three strands of barb wire. In addition to providing delay, if the fence is breached it will typically provide detection due to a bent or cut fencing material. Vehicle access past this perimeter fence will be through a double gate which will open Site Security Standards and Strategy Page 7 of 10 January 3, 2005
8 during the public hours and be closed at all other times. This double gate will be located on the plant side of the turn-off to the NRS wetlands viewing area and will be equipped with proximity card readers and an intercom and camera to facilitate remote operation of the gate. b. A defense in depth strategy with regards to interior vehicle gates has been adopted. There will be a primary security gate on the primary access road close to Windsor Island Road and gates on other internal site access roads. All gates will have proximity card readers and those with potential public access will be equipped with intercoms and cameras. c. Site security lighting will be limited to exterior of buildings as well as the parking areas. Security lighting will be provided for the gated entry locations with the intent of making visitors visible to the camera. In addition to security lighting, directional and way-finding lighting will also be provided and will consist of roadway lighting and bollard lighting. Lighting on the perimeter site fencing also provides a suitable deterrent, however, WLWPCF is concerned with light pollution affecting the neighboring properties and will therefore not consider its use. 2. Detection: a. A conscious decision has been made to not equip buildings with glass break detection or microwave intrusion detection or add numerous cameras to the plant perimeter. Without staff trained and available to observe cameras and monitor building occupancy or intrusion, an extensive detection system is not warranted. Cameras are recommended to monitor the highest risk locations such as the public entry lobby area and both the staff and public parking lots of the new PSF. Imagery from the camera will be recorded and monitored in the operations room of the PSF. It is expected that intercom buzzers associated with the entry gates will be directed to on call operators who will report to the operations room to view monitors and provide entry to visitors, vendors, and Contractors without access cards. b. The PSF, which will house the administration building, laboratory, and the maintenance/warehouse building, is a critical asset with the DCS system located in the administration area and with the bulk of Site Security Standards and Strategy Page 8 of 10 January 3, 2005
9 3. Delay: employees working in the building. The current plans for the building include operable windows for south facing office windows. Appropriate security measures must be included which will identify if a window is left open when staff goes home in the evening. Alternately, procedural rules could be established for an evening check to make sure the windows are closed. A third option is to incorporate hardware which effectively prevents the windows from opening wide enough to become a security risk. c. Some detection is recommended for specific process failures such as hypochlorite leaks. These devices will alarm to the DCS. Likewise, it is recommended that detection be evaluated for remote facilities, such as PEFTF. Such facilities should be evaluated on a case-by-case basis, taking into consideration the criticality of the asset, locations, and design of facility. a. A decision has been made to require proximity card readers on all exterior doors of most structures, which will control access and provide a record of entry. Exceptions will be allowed for doors designated as exit only, in which case hardware will not allow entry from the exterior, or in the case of storage areas with exterior entries which will have key entry. In the event these doors are left open or forced open, these doors will report and alarm to an Access Control Station (ACS) which is connected to the DCS. The ACS will make a record of all entries and also authorize entry to holders of specific cards. b. Where appropriate, emphasis may be placed on limiting construction activities to maintain site security. Segregation of Contractors from plant activities may be accomplished with proximity card gate entry, security watchmen and/or security fencing as necessary, depending upon the nature and duration of the construction activity. Separate pedestrian gates may be required for Contractor access to the site. 4. Response: a. City staff will not be used for any type of response in a security incursion. Staff is not available, or trained, to be dedicated to continuously monitoring security cameras and alarms. Staff will Site Security Standards and Strategy Page 9 of 10 January 3, 2005
10 report to the operations room to check the monitor and allow entry through gates when required, and may respond to door open alarms in the case that a door equipped with an electric strike is either propped open or forced open. b. All other responses will be left to the appropriate authorities. Given the approximate six minute response time by local police, external response is expected to be sufficient. An effective response will also include well thought out contingency and notifications plans. This may involve spare or redundant equipment in critical applications. Training is expected to be a major element in the development of a site security plan. IV. Attachments A. S Site Security Strategy Schematic Drawing. B. SK.EY Double Gate Concept Design Sketch END OF SECTION Site Security Standards and Strategy Page 10 of 10 January 3, 2005
11
12
Physical Security for Drinking Water Facilities
Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland
More informationSECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism
More informationHow To Ensure Security At A Site Security Site
Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers
More informationMiddleborough Police Electronic Security Narrative
Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of
More informationHow To Protect A Water System
SECURITY OFFICER & PATROL OFFICER PROTOCOL SECURITY OFFICER LOCATIONS AND SHIFTS La Entrada Main Security Center 24 hour coverage 7 days per week Plant 1 Main Gate Monday Friday, 5:00 AM 6:00 PM Patrol
More informationAppendix G. Security management plan
Appendix G Security management plan Security Management Plan Prepared by: Kann Finch Group Project Energy Australia Belmore Park Zone 1- Sub-station component General Design Requirements The perimeter
More informationUBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7
Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section
More informationCurrent as of 11/10/08 1 of 1
BEST PRACTICES STANDARDS FOR SCHOOLS UNDER CONSTRUCTION OR BEING PLANNED FOR CONSTRUCTION I. Site Layout A. School buildings shall be provided with a securable perimeter. A securable perimeter means that
More informationPhysical Security Checklist and Inventory
Tool 1: Assessing Robbery Risk Physical Security Checklist and Inventory Any assessment of robbery risk begins with an evaluation and inventory of the measures you are already taking as a financial institution.
More informationIOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN
IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department
More informationTen Tips for Completing a Site Security Plan
TRANSPORTATION LOGISTICS PETROCHEMICal Commercial Industrial Retail Federal Systems Banking Ten Tips for Completing a Site Security Plan Introduction The Chemical Facility Anti-Terrorism Standards (CFATS)
More informationHome Security Assessment Checklist DATE
Home Security Assessment Checklist DATE PREFACE The Home Security Assessment Checklist is designed to assist justices, judges, and other court officials in determining their level of security at home.
More informationPalm Beach State College Security Plan
Palm Beach State Security Plan Prepared by: J.E. Smith Date: September 17, 2008 INTRODUCTION This Security Plan describes the organization, activities, methodology, and documentation by which Palm Beach
More informationWantagh s Smart Schools Plan for Technology & Security
Wantagh s Smart Schools Plan for Technology & Security 1 How Can We Use Smart Schools Funds? The SMART SCHOOLS Act of 2014, as set forth in section one of part B of chapter 56 of the laws of 2014, authorizes
More informationEffective Solutions for Increased Security in NH Public Schools. State of New Hampshire Division of Homeland Security and Emergency Management
State of New Hampshire Division of Homeland Security and Emergency Management Effective Solutions for Increased Security in NH Public Schools 33 Hazen Drive Concord, NH 03305 Effective Date: June 25, 2014
More informationSecurity 101 For School Safety. Intertech Associates, Inc. Lunch & Learn
Security 101 For School Safety Intertech Associates, Inc. Lunch & Learn Safe & Secure Educational Environment What type of school is it? What type of security risks do schools see? How can traffic flows,
More informationWisconsin Wastewater Operators Association Physical Security for Facilities. Christopher P. Haase, P.E.
Wisconsin Wastewater Operators Association Christopher P. Haase, P.E. Introduction Welcome Security Planning and Evaluation Available Funding Sources Q&A Security Planning and Evaluation History Acropolis,
More informationKANSAS DEPARTMENT OF HEALTH AND ENVIRONMENT. Bureau of Water. Simplified Vulnerability Assessment Tool for Drinking Water
KANSAS DEPARTMENT OF HEALTH AND ENVIRONMENT Bureau of Water Simplified Vulnerability Assessment Tool for Drinking Water KANSAS DEPARTMENT OF HEALTH AND ENVIRONMENT Simplified Vulnerability Assessment Tool
More informationElectronic Security. For Financial Institutions
A partner you can bank on Our bank was growing. New branches. New card processing center. We wanted to tie access control, alarm monitoring and video surveillance into one system we could monitor from
More informationIntroduction. Industry Changes
Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise
More informationSecurity Alarm Monitoring Protocol
Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or
More informationProtection of unoccupied or void properties
Real Estate Issue one Protection of unoccupied or void properties Introduction The current economic downturn has lead to a greatly increased number of vacant properties. In some countries rates of unoccupancy
More informationPhysical Security Assessment Form
Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...
More informationA Self-Audit of Your Current Campus Security Systems
A Self-Audit of Your Current Campus Security Systems Security Solutions for Education, Business & Public Safety Free Consultations on ID Card Systems, Access Control, Call Recording, Video Surveillance,
More informationPHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX
PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX To ensure that policies, procedures, training and physical facilities improvements are implemented in a planned and logical
More informationElement D Services Electrical
Security Systems PART 1 - GENERAL 1.01 OVERVIEW A. The objective for each security design element is to help MD Anderson meet its mission and vision by promoting an environment in which higher education,
More informationCyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing
KSU Police Converged Security: A holistic approach to cyber safety and security Cyber Security through Education & Awareness by Community Policing Community Policing Community Policing Initial meeting
More informationDoes a fence or other type physical barrier define the perimeter of the facility?
PHYSCIAL SECURITY SURVEY CHECKLIST PERIMETER BARRIERS TRANSIT FACILITIES Does a fence or other type physical barrier define the perimeter of the facility? (1) Specify type and height of physical barrier
More informationSecurity Guidelines for. Agricultural distributors
Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole
More informationConducting Security System Site Surveys
Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM
More informationISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL
9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent
More informationSchool Security: What are you missing?
School Security: What are you missing? The need to keep our nation s children safe at school has become more urgent than ever. But this also puts pressure on both the school s administrators and its budget.
More informationGlobal Supply Chain Security Recommendations
Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed
More informationEnhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems
United States Environmental Protection Agency Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems Office of Water (M 140) EPA 817-B-15-002B May 2015 Introduction A Water
More informationSite Security and Access Policy and Procedures. Written By. Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By
Site Security and Access Policy and Procedures Written By Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By David Neild Last Reviewed date Autumn 2014 (VERSION 4)
More informationLincoln Minster School. Security
Lincoln Minster School Security Policy Statement Security plays a vital role in ensuring the effective management of Lincoln Minster School, which is committed to providing a safe and secure environment
More informationHow to Solve the Most Persistent Problem in Perimeter Security Systems
How to Solve the Most Persistent Problem in Perimeter Security Systems Duane Thompson General Manager of Fiber SenSys Carrondo, Antonio Commercial Manager, Teleprinta Perimeter Security Challenging!! More
More informationHome Security Inspection
Home Security Inspection This document sets forth conclusions and recommendations following a Crime Prevention Through Environmental Design inspection performed by the Thunderbolt Police Department. The
More informationSecurity Service de Services sécurité. Security Alarm Monitoring Protocol
Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings
More informationLAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
More informationProducts. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION
Products. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION THE ANIXTER DIFFERENCE Organizations responsible for building and maintaining critical infrastructures face
More informationTodd & Cue Ltd Your Business Continuity Partner
Todd & Cue Ltd Your Business Continuity Partner Preparation and Planning We provide strategies, tools and resources to help you prepare for a business interruption whether it is caused by fire, water,
More informationSecurity Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland
Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland B. Wieland Swiss Federal Office of Energy, CH 3003 Berne, Switzerland ABSTRACT: The presentation describes the
More informationSecurity System Proposal. Rich Destremps rdestremps@lutron.com 610-533
Security System Proposal Rich Destremps rdestremps@lutron.com 610-533 533-9482 Overview of Project Activity 1. Performed internet research to understand the basics of a public school security system 2.
More informationCITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
More informationDepending on building design and layout, access points will operate in the following manner:
Scope Electronic Access Guidelines AG-101 The scope of the keyless access upgrade project is to provide increased security and public safety by deploying electronic access controls, door status monitoring/security
More informationSecurity Criteria for C-TPAT Foreign Manufacturers in English
Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security
More information1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.
2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must
More informationVersion: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose
More informationSupplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
More informationBusiness Protection Online Activity Store Self Assessment
Business Protection Online Activity Store Self Assessment Complete each question in the Business Protection Online Activity Store Self Assessment. The selfassessment covers potential areas of vulnerability,
More informationDesigning Out Crime Assessment
Designing Out Crime Assessment New Flats (Affordable Housing) Yew Tree Road Moreton Wirral CH46 8UA Construction of flats complex. For Bernard Taylor Partnership Ltd o.iu@bernardtaylor.co.uk Tel 0161 443
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationUK SBS Physical Security Policy
UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following
More informationElement D Services Electrical
Security Systems PART 1 - GENERAL 1.01 OVERVIEW A. The objective for each security design element is to help MD Anderson meet its mission and vision by promoting an environment in which higher education,
More informationBeaver Dam Unified School District Request for Proposal Video Surveillance and Door Access Control Systems
Beaver Dam Unified School District Request for Proposal Video Surveillance and Door Access Control Systems The Beaver Dam Unified School District (BDUSD) is requesting proposals from qualified companies
More informationSECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS
500-54 Administrative Procedure 542 SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS Background Recognizing the significant investment in buildings, grounds, supplies and equipment, the District has a responsibility
More informationSecurity-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings
Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over
More informationMONROE POLICE DEPARTMENT
MONROE POLICE DEPARTMENT 104 Stage Road Monroe, NY 10950 Main: (845) 782-8644 - Fax: (845) 782-2227 A. Alex Melchiorre Website: www.monroepd.org Chief of Police BUSINESS BURGLARY PREVENTION TIPS Is your
More informationDIVISION 28 ELECTRONIC SAFETY AND SECURITY
DIVISION 28 ELECTRONIC SAFETY AND SECURITY CENTRALLY MANAGED ELECTRONIC ACCESS CONTROL, VIDEO SURVEILLANCE, AND INTRUSION ALARM SYSTEMS 1. All questions on equipment approvals in this section shall be
More informationElements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response
Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response International Biological Threat Reduction Department Sandia National Laboratories
More informationSurveillance Equipment
University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of
More informationChapter 8. EOC Security Concepts and Requirements:
: One of the primary objectives in the design and construction (or retrofit) of an Emergency Operations Center (EOC) is to provide a safe and secure environment that will enable the emergency management
More informationBusiness Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.
Business Owner s Security Buyers Guide Everything you need to know before purchasing a security system Business Owners Security Buyer s Guide You re a business owner. That means you wear a lot of hats
More informationBUILDING SECURITY & ACCESS CONTROL
Department of Facilities Management BUILDING SECURITY & ACCESS CONTROL OBJECTIVE: PERFORMANCE GUIDELINES AUGUST 19, 2011 The objective of this guideline is to limit the probability that, as a result of
More informationC-TPAT Self-Assessment - Manufacturing & Warehousing
Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name
More informationIntermec Security Letter of Agreement
Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism
More informationA Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
More informationCyber Security Response to Physical Security Breaches
Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically
More informationSuffolk County Department of Health Services. Division of Environmental Quality
Suffolk County Department of Health Services Division of Environmental Quality Guidelines For the Construction of Storage Areas for Portable Containers ~~~~ Clare B. Bradley, M.D., M.P.H. Suffolk County
More informationRESOLUTION NO. 13-16 TO ADOPT COURT SECURITY MANUAL
RESOLUTION NO. 13-16 TO ADOPT COURT SECURITY MANUAL WHEREAS, the Wisconsin Supreme Court has rule making authority under Wis. Stat. 751.12 and under its administrative authority over all courts conferred
More informationSecurity Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template
Security Tools Forms Physical Security Assessment Security Plan Template Traffic Control Plan Template 1 Physical Security Assessment (PSA) Date: I. PHYSICAL SECURITY ASSESSMENT (PSA): EXTERIOR OF THE
More informationU.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security
NUREG-0800 U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN 13.6.2 PHYSICAL SECURITY DESIGN CERTIFICATION REVIEW RESPONSIBILITIES Primary - Organization responsible for the review of physical security
More informationInvitation to Bid City of Perry Fire Alarm & Security Systems Bid Number 2015-24 (Part I & II) Due Date May 1, 2015 11:00 AM
Invitation to Bid City of Perry Fire Alarm & Security Systems Bid Number 2015-24 (Part I & II) Due Date May 1, 2015 11:00 AM The City of Perry, GA is soliciting sealed bids for a fire alarm and security
More informationTECHNICAL QUESTIONS AND ANSWERS ITN-DOT-14/15-7009RM TAMPA OPERATIONS CENTER VIDEO SURVEILLANCE/SECURITY ACCESS SYSTEM
TECHNICAL QUESTIONS AND ANSWERS ITN-DOT-14/15-7009RM TAMPA OPERATIONS CENTER VIDEO SURVEILLANCE/SECURITY ACCESS SYSTEM 1) Does the department have an estimate on the total number of cameras required and
More informationImporters must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
More informationSecurity Management Plan
Effective Date: 03/2015 1 of 10 I. Table of Contents: I Table of Contents II Authority III Purpose & Scope IV Policy Statement V The Joint Commission Standards VI Performance Standards VII DUPD Services
More informationSAMPLE FRACTION MITIGATION CONTINGENCY PLAN FOR DIRECTIONAL DRILLING
SAMPLE FRACTION MITIGATION CONTINGENCY PLAN FOR DIRECTIONAL DRILLING 1 TABLE OF CONTENTS 1.0 Introduction and Purpose 3 2.0 Description of Work 3 3.0 Site Supervisor/Foremen Responsibilities 4 4.0 Equipment
More informationNuclear Plant Security Systems
Nuclear Plant Security Systems Course Description Gary W Castleberry, PE This course will introduce the student into the design of security systems for commercial nuclear power plants. An overview of plant
More informationQuestions related to specific materials, methods, and services will be addressed at the conclusion of each presentation.
CEFPI is a Registered Provider with The American Institute of Architects Continuing Education Systems (AIA/CES). Credit(s) earned on completion of this program will be reported to AIA/CES for AIA members.
More informationRAD-SYS-NEMA4X-SMS Control Cabinet. Solution guide for SMS-based remote access control and intrusion detection system
Solution guide for SMS-based remote access control and intrusion detection system Contents Application: Remote access control and intrusion detection Page 1 Solution: SMS Relay control cabinet Page 2 System
More informationIMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry
IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry Needs analysis Reduce disputes over payouts Eliminate theft Detect misconduct and record it for use as evidence in
More information"DOT IN-DEPTH HAZMAT SECURITY TRAINING"
PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow
More informationWelcome to AISB Created by IT Facilities Manager, Lylah Shelor and Updated on July 28, 2015
Welcome to AISB Created by IT Facilities Manager, Lylah Shelor and Updated on July 28, 2015 Index Emergency Action Plan online at www.it.vt.edu Location of Fire Extinguishers, Emergency Pulls & AEDs..2
More informationPhysical Security Reliability Standard Implementation
Physical Security Reliability Standard Implementation Tobias Whitney, Manager of CIP Compliance (NERC) Carl Herron, Physical Security Leader (NERC) NERC Sub-Committee Meeting New Orleans, Louisiana CIP-014
More informationC-TPAT Security Criteria Sea Carriers
C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does
More informationDAtA security. the protection Of your INfORMAtION. Is OuR prime DIREctIVE
DAtA security the protection Of your INfORMAtION Is OuR prime DIREctIVE OVERVIEW building security theft alarms point of entry interior & exterior closed-circuit camera monitoring impact-resistant windows
More informationWESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business
Business Name: Owner Name: Business Address: Officer: Survey No.: WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business "Being There When Needed" DOORS 1. Is the exterior doors solid core
More informationFort Bend Independent School District. Safety and Security Master Plan Proposal
Fort Bend Independent School District Safety and Security Master Plan Proposal As of July 22, 2014 INTRODUCTION AND BACKGROUND The Fort Bend Independent School District s Safety and Security Master Plan
More informationSecurity Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
More informationDARTMOUTH COLLEGE DESIGN January 3, 2012 & CONSTRUCTION GUIDELINES
PART 1 DESIGN DIRECTIVES 1.1 OVERVIEW SECTION 13825 SECURITY MANAGEMENT SYSTEMS A. The access control, surveillance, and intrusion detection system implemented for use at Dartmouth College is a Lenel International
More informationOPERATOR - FACILITY ADDRESS - DATE
. Facility Criteria (RFP).0 Location Characteristics Criteria Requirements 1 Ownership and Management: Please identify the owner(s) and managers of the property and indicate if there is on-site management.
More informationA Remote Monitoring Service Provided by BEST Monitoring Ltd.NYS License #12000005036
A Remote Monitoring Service Provided by BEST Monitoring Ltd.NYS License #12000005036 What is Cyberdoorman? With our own Central Alarm Monitoring Station that has been operating for over fifteen years and
More informationManage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
More informationSupply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
More informationSecurity Profile. Business Partner Requirements, Security Procedures (Updated)
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
More informationCustoms -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview
Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority. Due to the attacks
More informationEnsuring Better Outcomes in Pharmaceutical Warehouse Security 2012 Supply Chain Security Seminar, Wilmington DE
Ensuring Better Outcomes in Pharmaceutical Warehouse Security 2012 Supply Chain Security Seminar, Wilmington DE Mike Elliot, Executive Vice President Managed Costs Regulatory Compliance Cargo Theft Product
More information