Framework Requirements for Product Security in the German Automotive Industry (Prototype Protection)

Size: px
Start display at page:

Download "Framework Requirements for Product Security in the German Automotive Industry (Prototype Protection)"

Transcription

1 Framework Requirements for Product Security in the German Automotive Industry (Prototype Protection) Version: 1.0 As at: 13 Dec Status: Released Authors: Audi: Mr. Jablonowski BMW: Mr. Ackermann, Mr. Driftmann, Mr. Himpsl DaimlerChrysler: Mr. Amend, Mr. Wittmann, Opel: Mr. Mannel VW: Mr. Maretzke TGA: Mr. Goertz 1/14

2 Table of Contents 1 General Information Requirements for handling prototypes The management process for product security General requirements Strategy Responsibility Process / organization Resources Camouflage General requirements Strategy Responsibility Process / organization Resources Notes: Testing grounds, test stations / simulations General requirements Strategy Responsibility Process / organization Resources Testing and experimental operations General requirements Strategy Responsibility Process / organization Resources Notes Photography / photographic equipment General requirements Strategy Responsibility Process / organization Resources Transport Strategy Responsibility Process / organization Resources Notes /14

3 1 General Information The framework requirements for product security were drawn up on behalf of the VDA Working Group Integral Information Protection with IT Security, Prototype Protection and Risk Management. These requirements are intended to act as a basis for product protection in the German automotive industry and to complement the requirements set down in ISO The developing and testing of prototypes and automotive components require special protection for the design and the innovations, as does the construction of design models. In the processes special attention should be paid to analyzing the risks, putting effective protection measures in place and monitoring the efficacy of the protection measures. Suitable procedures have to be applied to ensure that all this is carried out. These framework requirements do not apply to car clinics, photoshoots and media events (marketing / presentations). Such events are regulated by the OEMs individually. 3/14

4 2 Requirements for handling prototypes Prototypes are subject to confidentiality, but they have to be moved and tested in various environments (e.g. testing on test tracks and public roads, transportation by agencies, experiments at partner companies, etc.). These situations necessitate appropriate technical, organizational and awarenessbuilding measures. 2.1 The management process for product security General requirements To ensure that prototypes are protected, appropriate management processes must be in place at the OEMs and the development partners Strategy The departments involved in development and the users of prototypes must be made aware of how to deal with confidential prototypes and enabled to comply with the requirements. Technical and organizational protection measures must be defined and implemented Responsibility a) The company must have a central office or department that organizes and implements the security process for prototype protection. b) There must be a specific body at the OEMs (representatives from development, security office, sales) that decides on the technical and organizational protection measures (camouflage and handling regulations) for each project. c) The organization of the vehicle project must include a person responsible for prototype protection Process / organization a) A vehicle s development process must include a description of milestones used for defining and imposing protection measures, dependent upon the degree of maturity and the purpose of the prototypes. b) All persons involved in the project and all vehicle users must be familiar with the regulations on how to handle prototypes currently in force in their area of work. c) When prototypes are entrusted to external co-developers and / or other partners, the security process must be extended to include them (confidentiality, voluntary personal information, security certificate, on-site check by the security organization responsible). 4/14

5 2.1.5 Resources a) There must be sufficient personnel available (both centrally and in the project itself). b) There must be sufficient funding available (awareness-building and training, compiling and communicating the handling regulations, etc.). 5/14

6 2.2 Camouflage General requirements The scope of the camouflage and the amount of work/resources involved must be based on an assessment of the protection requirements for the object in question (vehicle). The camouflage must be determined. Typical design features must be either altered or hidden. The camouflage on the prototype must not be altered or removed without consultation with the person responsible for the project Strategy a) The company s camouflage philosophy and camouflage strategy must be described (orientation framework for specific project camouflage). b) The camouflage concept must be drawn up and implemented for each product on a case-by-case basis. It must be adapted to the development status of the vehicle Responsibility There must be a specific body (representatives of the departments involved in development, project managers, etc.) with responsibility for decisions concerning the camouflage concept specific to the project and its development status; if such a body does not exist already, one must be set up Process / organization a) The camouflage required for the prototypes at the various stages must be determined. b) A document for decision must be drawn up (virtual / graphic or hardwarerelated). c) Acquisition of the items used for camouflage must be organized. d) The camouflage must be accepted and passed by representatives of the body responsible (e.g. for the first vehicle to be built). e) The responsible technical departments must accept each case individually. f) If applicable, comparative wind tunnel measurements must be carried out (with and without camouflage) Resources a) The camouflage materials for the interior and the exterior (hard shell or plastic film camouflage) must be available. b) Lockable protective tarpaulin and interior covering must be available. c) The necessary costs must be planned. 6/14

7 2.2.6 Notes: The following additional requirements must also be met by the individual company: a) A non-local registration must be used as camouflage if required. b) If required, a coding / indicator must be applied to allow prototypes appearing in publications to be identified. c) During the period of confidentiality, recycling / disposal must be secure. 7/14

8 2.3 Testing grounds, test stations / simulations General requirements The experimental requirements for new products make it essential to drive the vehicles on testing grounds. When protection is being considered, a distinction must be made between the company s own testing grounds and those that are hired Strategy a) Testing grounds must offer special protection (e.g. from unauthorized photography) against both internal and external attacks (unauthorized persons / spy photographers), and allow screened off / undisturbed testing. b) In the case of mixed operations with other vehicle projects (the company s own products together with the competition) or at hired testing grounds, special protection measures must be put into effect Responsibility a) For each location, the security organization responsible must draw up a security concept in consultation with the operator. b) The relevant operator must ensure compliance on site with the measures in the protection concept. c) The project manager / test manager is responsible for compliance on site with the protection measures for each vehicle Process / organization a) Testing by the operator on the testing grounds must be centrally recorded, documented and coordinated. b) Protection measures must be defined in writing and communicated to the relevant persons. c) Additional measures may be required for individual products: 1. Use of camouflaged or uncamouflaged prototypes according to the need for protection. 2. Night drives according to the need for protection. 3. Security patrols if required. d) Access checks (general) and control and documentation are essential each time a prototype is used. e) Alarm and emergency planning measures (radio link, protective tarpaulins, bunker-type garages concealing the prototype, etc.) must be in place. 8/14

9 2.3.5 Resources a) Fenced-off grounds / buildings must have physical perimeter protection (protection against visibility and climbing, secure parking spaces for prototypes, etc.). b) Surveillance measures must be in operation (CCTV, infrared cameras or patrols, etc.). c) Signs indicating that photography is prohibited must be attached to the perimeter fence if required. d) All persons involved must agree to abide by the security regulations (e.g. prohibition of photography); the regulations must be posted at the entrance. 9/14

10 2.4 Testing and experimental operations General requirements It may also be necessary to move and test prototypes on public roads, close to customers Strategy The proving grounds / tracks must be analyzed and assessed for risk. The scope of the protection measures (camouflage, screening personnel, night-time drives, etc.) depends on this assessment Responsibility The following responsibilities must be allocated: a) The test manager is responsible for prototype protection on site. b) The driver of a prototype is personally responsible for compliance with the defined protection measures during experimental operations. c) Risk analyses of the proving grounds / tracks must be carried out by the departments responsible (security, test manager, etc.) Process / organization a) Experimental drives must comply with the current protection measures / handling regulations (see 2.1 above). b) Test runs on public roads must be approved by the departments responsible (project management, security, etc.). c) The testing team must be sensitized to the following aspects: 1. Current security situation and risks associated with travel. 2. Confidentiality concerning the destination and scope of testing, when dealing with unauthorized persons. 3. Regulations concerning the handling of new developments (interior covers, etc.). 4. Appropriate behavior in specific situations (e.g. photographers, accidents, breakdowns) and at neuralgic points / weaknesses in the routes. 5. Information to be given to people who are curious must be coordinated (story, e.g. driver training by automobile clubs, etc.). d) Changes to the camouflage must be coordinated with the persons responsible (security, project manager) on a case-by-case basis. e) Individual corporate regulations for prohibiting photography of prototypes must be observed. f) For PCs / laptops, etc. the relevant IT security guidelines (virus check, data security, encryption, theft protection, etc.) must be observed Resources 10/14

11 Testing grounds and workshops at the proving grounds must be made secure in relation to visibility and unauthorized access, using construction, technical and / or personnel measures Notes a) Any emblems / signs indicating company facilities must be avoided. The same also applies to personnel (e.g. clothing, hotel registration, etc.). b) Transfer of confidential data must conform to the requirements of ISO /14

12 2.5 Photography / photographic equipment General requirements Unauthorized persons must be prevented from photographing confidential objects Strategy If any devices for recording or transmitting images (camera phones, PDAs, compact cameras, video cameras, etc.) are brought on site, this must be regulated appropriately, especially in zones requiring a special level of protection. When picture documentation is essential, the owner of the property / client (OEM) is required to have a photography permit and to produce evidence of this if required Responsibility a) The management is responsible for regulation. Every member of staff (of the company and of partners) and every visitor must be familiarized with the procedure. b) The series development partner must comply with the requirements of the client OEM. c) Every member of staff is responsible for compliance with the regulations on photography / photographic equipment Process / organization a) The procedure for issuing permits for photography (applications for the purposes of documentation during development, testing, events, etc.) must be defined and regulated. b) Any authorized picture documentation must be kept securely and protected from viewing by unauthorized persons. c) Secure disposal of the picture / data material must be arranged. d) To protect against unauthorized copying, if required the client must demand from the development partner technical / optical source protection measures as needed. e) Zones requiring a special level of protection must be marked as such (signs, posters, etc.). f) Compliance with the procedure must be monitored Resources The following relevant resources (including costs) must appear in the planning: a) Deposit box / safe, b) Secure access-protected data storage devices and systems, c) Shredder, secure deletion tool. 12/14

13 2.6 Transport Strategy During transport (by air, water, overland) prototypes must be protected from unauthorized viewing, unauthorized photography and access Responsibility a) The coordination office / logistics department of the relevant company is responsible for engaging suitable transport companies that have been approved by the OEM s security organization. b) The department of the OEM awarding the contract must define the need for protection. c) If the contract for transport is not awarded by the coordination office / logistics department but instead directly by the technical department, the OEM s responsible security office must approve the transport company. d) The department awarding the contract must ensure that the management of the transport company obliges its staff and subcontractors to maintain confidentiality, and that it informs them regularly (at least once a year), or when changes are made to the protection measures, of the correct way to handle prototypes. Upon request from the security department of the OEM, evidence of this must be provided Process / organization a) The transport company must be aware of the confidentiality status and comply with the defined protection goals. b) Confidential transports must be carried out in accordance with the OEM s requirements. c) The transport company must report all risk situations and incidents to the appropriate office or person Resources The following resources (including costs) must appear in the planning: a) Suitable means of transport that is secure in traffic (e.g. enclosed / locked, under seal, air-conditioned, alarmed). b) Suitable means of communication (e.g. cell phone without photo function, radio). 13/14

14 2.6.5 Notes a) When the contract is awarded by the coordination office / logistics department, attention must be paid to restrictions on approval imposed by the security organization. b) Image-recording devices brought onto the premises (e.g. to document damage involving the transport company) must be declared spontaneously upon entry to the plant / proving ground / testing ground. 14/14

Home Security Assessment Checklist DATE

Home Security Assessment Checklist DATE Home Security Assessment Checklist DATE PREFACE The Home Security Assessment Checklist is designed to assist justices, judges, and other court officials in determining their level of security at home.

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided

More information

C-TPAT Self-Assessment - Manufacturing & Warehousing

C-TPAT Self-Assessment - Manufacturing & Warehousing Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...

More information

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)

More information

Guidance Notes FSR 2014

Guidance Notes FSR 2014 Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a

More information

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators A Message for Warehouse Operators And Security Guidelines for Warehouse Operators Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint

More information

Supply Chain Security Audit Tool - Warehousing/Distribution

Supply Chain Security Audit Tool - Warehousing/Distribution Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:

More information

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

C-TPAT Security Criteria Sea Carriers

C-TPAT Security Criteria Sea Carriers C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does

More information

How To Destroy Data From A Hard Drive

How To Destroy Data From A Hard Drive Safe, Secure and Certified Data Destruction Solutions to meet your individual needs Whether you require data destruction supplementary or exclusively to our IT disposal solution, our fully security screened

More information

Identity Theft Prevention Program Compliance Model

Identity Theft Prevention Program Compliance Model September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All

More information

Security Overview. A guide to data security at AIMES Data Centres. www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes.

Security Overview. A guide to data security at AIMES Data Centres. www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes. Security Overview A guide to data security at AIMES Data Centres www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes.net Page 1 of 10 Contents I. Protecting our clients data...2 II. Information

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors. Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY Putting Barnsley People First BARNSLE CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLIC Version: 2.0 Approved By: Governing Body Date Approved: Feb 2014 (initial approval), March

More information

MODESTO CITY SCHOOLS Administrative Regulation

MODESTO CITY SCHOOLS Administrative Regulation MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized

More information

Intermec Security Letter of Agreement

Intermec Security Letter of Agreement Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism

More information

Surveillance Equipment

Surveillance Equipment University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of

More information

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template Security Tools Forms Physical Security Assessment Security Plan Template Traffic Control Plan Template 1 Physical Security Assessment (PSA) Date: I. PHYSICAL SECURITY ASSESSMENT (PSA): EXTERIOR OF THE

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same POLICY TEMPLATE Video Surveillance Category: Approval: Responsibility: Date: Operations PVP VP Finance and Administration Date initially approved: November 5, 2013 Date of last revision: same Definitions:

More information

Title of the Policy: Surveillance Policy

Title of the Policy: Surveillance Policy Title of the Policy: Surveillance Policy Functional Area: University Police Applies To: All Faculty and Staff Policy Reference(s): Number: Version 1.0 Date First Issued: March 15, 2016 Date Last Reviewed:

More information

C-TPAT Importer Security Criteria

C-TPAT Importer Security Criteria C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources

More information

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department

More information

Chapter 8 Security Systems

Chapter 8 Security Systems Chapter 8 Security Systems 8.1 Robbery and Burglar Alarm Systems (RAS and BAS) 148 8.2 Video Surveillance Systems (CCTV) 150 8.3 Access Control 150 8.4 Danger Management System 151 8 Security Systems There

More information

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

SECURITY IN TRUCKING

SECURITY IN TRUCKING SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS This checklist for fleet security has been compiled by the Private Motor Truck Council of Canada

More information

Safety and Environmental Information for External Companies Koehler Oberkirch

Safety and Environmental Information for External Companies Koehler Oberkirch and al and at Work 1. Delivery, Notice, Signature After receiving the following information sheets, the team leader from every external company is required to read through them, explain them to their employees,

More information

CORPORATE PROCUREMENT UNIT SITE & SECURITY PROCEDURES BOSTON SPA VERSION 9 SEPT12

CORPORATE PROCUREMENT UNIT SITE & SECURITY PROCEDURES BOSTON SPA VERSION 9 SEPT12 SITE PROCEDURES BSPA VERSION 9 PAGE 1 OF 9 CONTENTS PAGE 1. GENERAL INFORMATION 3 2. ACCESS 3 3. SECURITY 3 4. VEHICLE PARKING 4 5. PERMITS TO WORK 4 6. DELIVERY, UNLOADING AND STORAGE 4 7. HOURS OF WORK

More information

Physical Security for Drinking Water Facilities

Physical Security for Drinking Water Facilities Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland

More information

SAFETY AND ENVIRONMENTAL INFORMATION FOR EXTERNAL COMPANIES. Koehler Kehl

SAFETY AND ENVIRONMENTAL INFORMATION FOR EXTERNAL COMPANIES. Koehler Kehl 1. Delivery, Notice, Signature After receiving the following information sheets, the team leader from every external company is required to read through them, explain them to their employees, and after

More information

LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO

LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles

More information

How To Ensure Security At A Site Security Site

How To Ensure Security At A Site Security Site Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.0 October 1, 2012 Procurement Group, Manufacturing Enhancement Center, Global Manufacturing Division Information Security Group,

More information

Business Protection Online Activity Store Self Assessment

Business Protection Online Activity Store Self Assessment Business Protection Online Activity Store Self Assessment Complete each question in the Business Protection Online Activity Store Self Assessment. The selfassessment covers potential areas of vulnerability,

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business Business Name: Owner Name: Business Address: Officer: Survey No.: WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business "Being There When Needed" DOORS 1. Is the exterior doors solid core

More information

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

Partners in Protection / C-TPAT Supply Chain Security Questionnaire Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

SECURITY SURVEY AND RISK ASSESSMENT. any trends or patterns in the incidents occurring at the school; the efficiency of the chosen security measures.

SECURITY SURVEY AND RISK ASSESSMENT. any trends or patterns in the incidents occurring at the school; the efficiency of the chosen security measures. SECURITY SURVEY AND RISK ASSESSMENT A security survey gives a rounded picture of the risks that your school faces and the security measures in existence. Without this information it is difficult to assess:-

More information

Home Security Inspection

Home Security Inspection Home Security Inspection This document sets forth conclusions and recommendations following a Crime Prevention Through Environmental Design inspection performed by the Thunderbolt Police Department. The

More information

Cellular/Smart Phone Use Procedure

Cellular/Smart Phone Use Procedure Number 1. Purpose This procedure is performed as a means of ensuring the safe and efficient use of cell/smart phones throughout West Coast District Health Board (WCDHB) facilities. 2. Application This

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

Best Practices For. Supply Chain Security

Best Practices For. Supply Chain Security Best Practices For Supply Chain Security Document Information Created By: Family Dollar Imports Updated On: 10.21.2015 2 Contents What is C-TPAT? 5 Family Dollar s Distribution Network 6 Distribution Centers

More information

Crime Prevention through Environmental Design (CPTED) - Checklist

Crime Prevention through Environmental Design (CPTED) - Checklist Crime Prevention through Environmental Design (CPTED) - Checklist * Where relevant, each item is to be shown on the architectural plans. A description of how the development complies, together with the

More information

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV

More information

Hazardous Material Security Training and Testing for CDL Drivers and HAZMAT Employees

Hazardous Material Security Training and Testing for CDL Drivers and HAZMAT Employees Hazardous Material Security Training and Testing for CDL Drivers and HAZMAT Employees The United States Department of Transportation s Research and Special Programs Administration (RSPA) issued final regulations

More information

For the 8th time will take place International Exhibition INDELEX which is organized with great success since 2002.

For the 8th time will take place International Exhibition INDELEX which is organized with great success since 2002. GENERAL INFO For the 8th time will take place International Exhibition INDELEX which is organized with great success since 2002. Along with INDELEX will take place and the 2nd International Exhibition

More information

Guide for Non-Profit Housing Societies Security Guide Table of Contents

Guide for Non-Profit Housing Societies Security Guide Table of Contents Guide for Non-Profit Housing Societies Security Guide Table of Contents Chapter 1 - General Security Guidelines Chapter 2 - Target hardening Chapter 3 - Security window bars Chapter 4 - Anti-Graffiti solutions

More information

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt.

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt. TO: International Suppliers shipping to the United States PPG Industries, Inc., and its affiliates have been certified as a member of the U. S. Customs Trade Partnership Against Terrorism ( C-TPAT ). C-TPAT

More information

SCHOOL SECURITY POLICY & PROCEDURES

SCHOOL SECURITY POLICY & PROCEDURES ORWELL PARK SCHOOL Nacton, Ipswich IP10 0ER SCHOOL SECURITY POLICY & PROCEDURES Date: January 2013 Status: Approved Review Date: January 2014 1 ORWELL PARK SCHOOL SECURITY POLICY AND PROCEDURES 1. PURPOSE

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose

More information

E3211. DOT Hazmat Security Awareness. Leader s Guide

E3211. DOT Hazmat Security Awareness. Leader s Guide E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the

More information

REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES

REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES Definitions 1. In these requirements: C-NLOPB means the Canada-Newfoundland and Labrador Offshore Petroleum Board; Chief Safety Officer means

More information

Policy for the Design and Operation of Closed-Circuit Television (CCTV) in Advanced Traffic Management Systems September 4, 2001

Policy for the Design and Operation of Closed-Circuit Television (CCTV) in Advanced Traffic Management Systems September 4, 2001 I. Introduction. Traffic Engineering and Highway Safety Division Policy for the Design and Operation of Closed-Circuit Television (CCTV) in Advanced Traffic Management Systems September 4, 2001 The New

More information

Security Profile. Business Partner Requirements, Security Procedures (Updated)

Security Profile. Business Partner Requirements, Security Procedures (Updated) Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

Corporate Policy and Procedure

Corporate Policy and Procedure Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install

More information

Wellesley College Written Information Security Program

Wellesley College Written Information Security Program Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as

More information

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE AbbVie is a participant in the U.S. Customs supply chain security program called the Customs-Trade Partnership Against Terrorism (C-TPAT). Participation in C-TPAT requires AbbVie to ensure that its overseas

More information

Seventh Avenue Inc. 1

Seventh Avenue Inc. 1 Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).

More information

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority. Due to the attacks

More information

Safety and Environmental Information for External Companies

Safety and Environmental Information for External Companies Health and and al Health and at 1. Delivery, Notice, Signature After receiving the following information sheets, the assembly leader from every external company is required to read through them, explain

More information

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer: Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011

More information

Security Systems Surveillance Policy

Security Systems Surveillance Policy Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy

More information

Policy Rules for Business Partners of Siemens

Policy Rules for Business Partners of Siemens Information Security Policy Rules for Business Partners of Siemens Basic rules regulating access to Siemens-internal information and systems Policy Rules for business Partners of Siemens Edition P-RBP-2007-02-05-E

More information

KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm

KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm HOUSTON AUSTIN KIMMONS INVESTIGATIVE SERVICES, INC. HIGHLY RESPECTED, SKILLED TEAM OF INVESTIGATORS Rob Kimmons,

More information

KIMMONS INVESTIGATIVE SERVICES, INC.

KIMMONS INVESTIGATIVE SERVICES, INC. KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm HOUSTON AUSTIN National & Worldwide Affiliates KIMMONS INVESTIGATIVE SERVICES, INC. HIGHLY RESPECTED, SKILLED TEAM

More information

RULES OF THE DEPARTMENT OF PUBLIC SAFETY

RULES OF THE DEPARTMENT OF PUBLIC SAFETY RULES OF THE DEPARTMENT OF PUBLIC SAFETY 570-6 TRANSPORTATION Chapter 1 Non-Consensual Towing TABLE OF CONTENTS 570-6-1-.01 Definitions 570-6-1-.02 Procedures 570-6-1-.03 Fees Charged for Nonconsensual

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

Appendix G. Security management plan

Appendix G. Security management plan Appendix G Security management plan Security Management Plan Prepared by: Kann Finch Group Project Energy Australia Belmore Park Zone 1- Sub-station component General Design Requirements The perimeter

More information

Middleborough Police Electronic Security Narrative

Middleborough Police Electronic Security Narrative Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Security for. Industrial. Automation. Considering the PROFINET Security Guideline Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures

More information

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 Table of Contents 1. Operational Security 2. Physical Security 3. Network

More information

County Identity Theft Prevention Program

County Identity Theft Prevention Program INTRODUCTION CHAPTER OSCEOLA COUNTY IDENTITY THEFT PREVENTION PROGRAM The Osceola County Board of County Commissioners is committed to protecting consumers who do business with Osceola County, and as such

More information

BRANCH SECURITY REVIEW CHECKLIST

BRANCH SECURITY REVIEW CHECKLIST BRANCH: Date: Section 1 Physical Vulnerability 1. Do all office windows permit an unobstructed view of the bank s interior? 2. Are all exterior doors and windows equipped with tamper-resistant locks? 3.

More information

Current as of 11/10/08 1 of 1

Current as of 11/10/08 1 of 1 BEST PRACTICES STANDARDS FOR SCHOOLS UNDER CONSTRUCTION OR BEING PLANNED FOR CONSTRUCTION I. Site Layout A. School buildings shall be provided with a securable perimeter. A securable perimeter means that

More information

Our Hosting Infrastructure. An introduction to our Platform, Data Centres and Data Security. www.in-tuition.net

Our Hosting Infrastructure. An introduction to our Platform, Data Centres and Data Security. www.in-tuition.net Our Hosting Infrastructure An introduction to our Platform, Data Centres and Data Security www.in-tuition.net UK Infrastructure Infrastructure Overview Intuition Networks has provided managed Internet

More information

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT Office of Employee Benefits Administrative Manual PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT 150 EFFECTIVE DATE: AUGUST 1, 2009 REVISION DATE: PURPOSE: Ensure that the Office of Employee Benefits

More information

How To Protect A Water System

How To Protect A Water System SECURITY OFFICER & PATROL OFFICER PROTOCOL SECURITY OFFICER LOCATIONS AND SHIFTS La Entrada Main Security Center 24 hour coverage 7 days per week Plant 1 Main Gate Monday Friday, 5:00 AM 6:00 PM Patrol

More information

Volkswagen Aktiengesellschaft strategy for compliance with recycling and recovery rates

Volkswagen Aktiengesellschaft strategy for compliance with recycling and recovery rates Volkswagen Aktiengesellschaft strategy for compliance with recycling and recovery rates Dr. Frank Welsch Head of Technical Development signature see German version Peter Maiwald Head of Sales Service signature

More information

DEFINITION OF INTELLIGENT TRANSPORTATION SYSTEMS

DEFINITION OF INTELLIGENT TRANSPORTATION SYSTEMS INFORMATION TECHNOLOGY AND TRANSPORTATION SYSTEM Amir Karimbakhsh 1 Kosro Ganizadegan 2 1-2 M.A student, Department of Management, Islamic Azad University, Rasht, Iran ABSTRACT Transportation and movement

More information

Camera Use. Policy Statement and Purpose. Table of Contents

Camera Use. Policy Statement and Purpose. Table of Contents Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing

More information

Safety and Environmental Information for External Companies

Safety and Environmental Information for External Companies 1. Delivery, Notice, Signature After receiving the following information sheets, the team leader from every external company is required to read through them, explain them to their employees, and after

More information

Cyber Security Response to Physical Security Breaches

Cyber Security Response to Physical Security Breaches Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically

More information

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION 1.0 Objective The purpose of this procedure is to ensure that Toys R Us, Inc. and its manufacturers, suppliers, and warehousemen

More information

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities. 2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must

More information

KCI Communications, Inc. 1050 Ensell Road, Suite 100 Lake Zurich, IL 60047 847.550.9885

KCI Communications, Inc. 1050 Ensell Road, Suite 100 Lake Zurich, IL 60047 847.550.9885 ADR-3000 KCI Communications, Inc. 1050 Ensell Road, Suite 100 Lake Zurich, IL 60047 847.550.9885 DIGITAL BLACK BOX BOX RECORDER Dual high resolution color camera system with wide angle view and infrared

More information

Site Security and Access Policy and Procedures. Written By. Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By

Site Security and Access Policy and Procedures. Written By. Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By Site Security and Access Policy and Procedures Written By Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By David Neild Last Reviewed date Autumn 2014 (VERSION 4)

More information

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation

More information

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,

More information

CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY

CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY The Council s document management policy is intended to cover all documents produced and held by the

More information

Site Security Standards and Strategy

Site Security Standards and Strategy Site Security Standards and Strategy I. Background and Overview A. The City s Program Standards and Procedures (PSP) are intended to be used in conjunction with the data contained in related standards

More information

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008 AUBURN WATER SYSTEM Identity Theft Prevention Program Effective October 20, 2008 I. PROGRAM ADOPTION Auburn Water System developed this Identity Theft Prevention Program ("Program") pursuant to the Federal

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

New Hanover County welcomes your interest in filming in our location. Our mission is to provide service and assistance to all film, television,

New Hanover County welcomes your interest in filming in our location. Our mission is to provide service and assistance to all film, television, New Hanover County welcomes your interest in filming in our location. Our mission is to provide service and assistance to all film, television, music, commercial production and still photography businesses

More information