Integrating security in major projects - principles & guidelines

Size: px
Start display at page:

Download "Integrating security in major projects - principles & guidelines"

Transcription

1 Integrating security in major projects - principles & guidelines OGP Report No. 494 April 2014 International Association of Oil and Gas Producers

2 Publications Global experience The International Association of Oil & Gas Producers has access to a wealth of technical knowledge and experience with its members operating around the world in many different terrains. We collate and distil this valuable knowledge for the industry to use as guidelines for good practice by individual members. Consistent high quality database and guidelines Our overall aim is to ensure a consistent approach to training, management and best practice throughout the world. The oil and gas exploration and production industry recognises the need to develop consistent databases and records in certain fields. The OGP s members are encouraged to use the guidelines as a starting point for their operations or to supplement their own policies and regulations which may apply locally. Internationally recognised source of industry information Many of our guidelines have been recognised and used by international authorities and safety and environmental bodies. Requests come from governments and non-government organisations around the world as well as from non-member companies. Disclaimer Whilst every effort has been made to ensure the accuracy of the information contained in this publication, neither the OGP nor any of its members past present or future warrants its accuracy or will, regardless of its or their negligence, assume liability for any foreseeable or unforeseeable use made thereof, which liability is hereby excluded. Consequently, such use is at the recipient s own risk on the basis that any use by the recipient constitutes agreement to the terms of this disclaimer. The recipient is obliged to inform any subsequent recipient of such terms. Copyright notice The contents of these pages are The International Association of Oil and Gas Producers. Permission is given to reproduce this report in whole or in part provided (i) that the copyright of OGP and (ii) the source are acknowledged. All other rights are reserved. Any other use requires the prior written permission of the OGP. These Terms and Conditions shall be governed by and construed in accordance with the laws of England and Wales. Disputes arising here from shall be exclusively subject to the jurisdiction of the courts of England and Wales.

3 Integrating security in major projects - principles & guidelines OGP Report No. 494 April 2014 Revision history Version Date Amendments 1 April 2014 First issued

4 International Association of Oil and Gas Producers Acknowledgements: This document was produced by OGP s Security Committee. ii

5 Integrating security in major projects - principles & guidelines Contents Introduction 1 Project management and security 1 1. Concept or initiation 2 2. Design and planning 4 3. Execution 6 4. Monitoring and control 7 5. Closure or look-back 8 iii

6 International Association of Oil and Gas Producers Concept Design Execution Monitoring Lookback OCountry threat analysis Change in threats Risk assessment Local security survey New assessment Security policy requirements Security requirements Amendments to security plan? Project security guidelines Project security plan Contractor security plan Sub-contractor security plan perationscommissioning iv

7 Integrating security in major projects - principles & guidelines Introduction Project management & security Throughout the oil and gas industry project management is a key and core skill, and critical for successful development of mineral resources. There are multiple project management models and methods, including individual processes developed for major operators as well as more generic, but no less useful, systems for smaller partners. What all have in common is a methodical and planned approach encompassing at least five phases in a project s life cycle. These are: Concept or initiation; Design & planning; Execution; Monitoring & control; and Closure or look-back. For the purposes of this document we will use this five-element model. Traditionally, security considerations have been brought into projects at a late stage, or even after the commissioning of the completed facility. In recent years it has become increasingly apparent that there are considerable benefits in terms of cost, efficiency and reliability to be gained if security is integrated into project management from the outset. The industry has found that retro-fitting security hardware is both costly and time-consuming, and that almost inevitably the results are less than satisfactory. We strongly recommend that significant security risks and challenges should be factored in to early project decisions, including the key decision on whether to proceed with a project or not. Failure to appreciate, understand, or plan for significant security eventualities can have major repercussions for a project and its owner, and will almost always lead to significant avoidable cost increases and delay. In this document we will set out best practice, based on actual experience, for integrating security planning and execution into the project lifecycle. Views expressed are those of the OGP Security Committee, and do not necessarily reflect those of individual member companies. 1

8 International Association of Oil and Gas Producers 1. Concept or initiation 1.1 Security planning for any major project should commence as early as possible in the project cycle. The level of security engagement will depend largely on the nature of the project, and on the geographical location(s) in which it will be conducted. The overriding purpose of integrating security provision and planning is to ensure that the project can be completed without avoidable delay or additional costs. As always, the priority for security planning is the protection of life and prevention of injury, followed by the protection of the company s assets, reputation and property. As a general guideline, the following points should always be considered when determining the level of security engagement required in any given project: The location of the completed project; The location(s) of critical elements of the project, such as fabrication yards, and transportation and supply chain routes; The availability of critical personnel or replacements for critical components or equipment; The size and composition of workforce required at various stages of the project; Prevailing security conditions and threats in all of the above; Criticality of the project to the company/ies concerned. 1.2 Having determined the factors to be considered in setting the level of security engagement in the project, it is now helpful to conduct the first assessment of security-related risks that could adversely affect it. Risk assessment processes are adequately documented, and there are several methodologies to choose from. The selected one should include an acceptable method of identifying threats, assessing the probability of a specific threat affecting the project, and determining the impact on the project if it does. 1.3 For major or complex projects early investment of time and effort is conducting a thorough assessment of the prevailing threat environment surrounding all stages of the project should prove worthwhile. The better the project team, and those responsible for security, and the better their understanding of real and potential security issues the better equipped they will be to mitigate them and complete the project successfully. 1.4 Proper security planning depends on good risk assessment, followed by a clear understanding of what measures are needed to reduce the threat, likelihood or impact of any given risk. The most effective tool for monitoring progress in this respect is a risk register. Different project managers have different approaches to recording risks, sometimes in a number of different locations or registers. Experience shows us that the ideal situation is for the most significant security risks, e.g. those which could cause significant delay or additional cost, or have some other major impact, should be recorded in the main project risk register, where they can be reviewed regularly by project decision-makers. Where this is not possible, an acceptable alternative would be to maintain a specific security risk register, but only 2

9 Integrating security in major projects - principles & guidelines where the risk owner has either the authority to deal with the risk or has direct access to someone who does. It is not advisable to incorporate security risks in sub-sets of other risk registers where they might easily be overlooked. 1.5 Major projects can have a lifecycle of many years. Conditions and threats can and do change considerably during the life of a project, but rarely should such changes be entirely unforeseen. To be best prepared to meet changing security challenges an open-minded view of the threat environment and associated risks is advised. Consequently, it may be that risks are reassessed periodically, or certain trigger events can be identified that initiate security risk reviews. We advise security professionals engaged in projects to develop agreed mechanisms to reassess risks during each and every stage of the process. 1.6 Effective security planning for major projects, and indeed in other industrial contexts, should have the best interests of the business at its core. In short, effective security planning will enable the business or project to succeed. To this end a rational appreciation of costs versus benefits should be clearly understood by security professionals and by management of both the project owner and any contractors involved. If the cost of security measures required ensuring the safety of personnel and protection of assets exceeds the value to the company of the project concerned it is better to understand this early in the planning cycle. For very high-value projects there may be complex considerations of ongoing benefits that would make investment in security measures worthwhile, but in any case the person responsible for security planning should be comfortable as a participant in the decisionmaking process. 1.7 Opportunities for early participation of security designers or architects exist during the concept or initiation phase of a project. Building in key features, such as safe-havens or access control equipment, can save significant cost and disruption later, as can selection of materials and design of facilities. 1.8 Finally, in the initiation stage of a project consideration should be given to the development of security management practices and procedures that allow for easy transition between the different stages of a project, and eventual incorporation within the security framework of the facility operator. This is best achieved through methodical documentation and reliance on common understanding of security practice. To this end early liaison between those responsible for security at differing stages and locations of the project can be seen as a sound investment of time and effort. 3

10 International Association of Oil and Gas Producers 2. Design & planning 2.1 Security risk assessment should be a constant activity throughout the life of a project. Considerations may change periodically, but if done effectively during the concept and initiation phase the original risk assessment should serve as a good foundation throughout. It can be adapted to meet specific circumstances, or to address specific requirements at different phases of the project. For example, if there is a fabrication phase in a project that will entail deployment of company personnel to a remote location on a temporary basis, there may be a need to include an assessment of security risks to those personnel in the overarching risk assessment document. 2.2 As a project progresses the need for active monitoring of security risks will become greater, and more significant. The recording and monitoring method developed in the initial project phase should continue, and the ideal situation would be where significant security risks are monitored and updated through the project s central risk register. 2.3 The design phase of a project presents the best opportunity to include physical security considerations in the most cost-effective manner. For example, anti-piracy measures can be built in to offshore platforms rather than added at a later date, or protective security measures can be designed into critical process components. It is advisable to have an understanding of the cost elements involved, and the likely differences that would be encountered if necessary security measures needed to be retro-fitted rather than installed at the construction phase. Likely cost-savings might be found in amending the specification of materials in construction, utilisation of a planned workforce as opposed to remobilising one at a later stage, or reduced loss of operational availability of a facility. 2.4 If security measures are considered appropriate, it is advisable to engage the services of qualified and experienced architects, engineers or designers with specialist security knowledge. These can often define accurately the specifications of materials for the design of a facility with specific risks in mind. Specialisms can include blast and ballistic effect modeling where there is a risk of terrorism or violent attack, perimeter construction, or anti-piracy measures. 2.5 The design phase also allows for the inclusion of measures to reduce the impact of a security incident should it occur; enhanced safety and life-support facilities for example. Often such facilities are stipulated by international regulations, but there may be opportunities to enhance or amend the specifications to a level above the regulatory requirements. For example, provision of one safe haven or citadel might be a requirement, but the risk assessment indicates that one or more additional safe havens, perhaps smaller in scale would provide better protection for personnel in the event of an emergency. Similarly, it might be preferable to build in facilities that would allow for shelter in place for an extended period above the minimum specified by regulations. 2.6 In a similar vein, inclusion of electronic devices and communication equipment, or wiring to facilitate their use, should be considered at the design stage. The ability to communicate with the outside world, or to control or shut down a facility from inside a safe haven can significantly reduce the impact of a major security incident. 4

11 Integrating security in major projects - principles & guidelines 2.7 With many facilities there is severe pressure on accommodation space when it becomes operational. If a risk assessment indicates that addition of security personnel in certain circumstances might be needed to reduce a risk, consideration can be given at the design stage to supplementary accommodation, either permanent or temporary, being made available from time to time. 2.8 The design and planning phase of a project is the time when thorough examination of project plans can be made to identify requirements for specific security plans at various stages of development and execution of a project. For example, there may be a need to transport items to the project site that are very difficult to replace, in which case attention should be given to security risks that could result in the loss, damage or delay of the items concerned. Often such items might be large and require seaborne transportation through hostile waters, in which case appropriate marine security plans should be agreed with all parties concerned. Similarly, as mentioned in paragraph 2.1 above, there may be fabrication yards in remote locations that produce critical items for the project. Security at these locations would probably be the responsibility of the site managers, but there is an opportunity to minimise risks to the project through security liaison and collaboration. 2.9 Another example of a project security risk that might need specific planning and attention might be supply chain fraud and integrity of components and materials. Major projects are attractive opportunities for criminals or unscrupulous businesses seeking to make or maximise profit. The design and planning stage of a project should be the time when appropriate due diligence enquiries are made on prospective suppliers, and the right audit and materials approval rights are built-in to contracts to prevent fraud and material substitutions This collaboration can often be encouraged or facilitated by including security provisions in contracts with suppliers, fabricators, and shippers. Capturing security provisions in contracts at the design phase reduces confusion and conflict at later stages, and consequently reduces unplanned cost and delay. Typical inclusions in contracts to mandate security as a consideration can include a requirement to share security plans and allow security audits, or to collaborate in the form of a security oversight group made up of the companies concerned in the project. The utility of these contractual agreements cannot be overstated when it comes to executing projects in higher risk environments A significant risk to major projects is industrial unrest and labour relations. These can cause significant delay and additional costs, as well as endangering individuals and reputations. It is advisable therefore to include security planning in mobilisation and demobilisation plans at the planning stage Finally, the project planning stage is the appropriate time to consider long-term security provision for the project facility and for its transfer to operational status once the project is concluded. It is important that processes and equipment involved in security provision are compatible with the security structures put in place by the eventual operator. 5

12 International Association of Oil and Gas Producers 3. Execution 3.1 Without doubt, the most demanding and complex period of any project is the execution phase. This is when all the preparation and planning are put to the test, and when variations can occur at short notice. Advice to security practitioners can be summarised briefly: review your previous assessments and planning, and implement them. Consequently, this section of the document is short. 3.2 If recorded properly, security risks would be monitored both by security professionals and by the project management team and any adjustments or remedial action would be generated by the risk monitoring process. The aim during a dynamic phase is always to reduce security risks to acceptable levels by minimising or removing one or more of the three components: threat, likelihood or impact. 3.3 Deployment of a dedicated security professional as a member of the project team is desirable, but not always possible. Across the industry there are examples of utilising non-security personnel as the responsible person on a project, with appropriate support from the project company or project management team. There are also examples of a security professional being deployed to cover security together with other roles where they are qualified and competent to do so. For example, a security manager might also be responsible for travel, accommodation and logistics, or a supply chain manager might also have the security portfolio. The important factor is the project owner s commitment to the security of the project, and its successful and timely completion. If security has been properly engaged during the concept and design and planning stages, the execution phase should present few unexpected challenges. Where this has not been the case, and there are security risks, those responsible for security in the project-owning company may need to condense all the steps recommended in the early phases into the execution phase. 3.4 Apart from the ongoing risk assessment process and implementation of security plans, there may be requirements in the execution phase to respond to changes, planned and unplanned, or to emergencies or incidents. To that end, it is advisable to practice drills and procedures with security personnel, e.g. guards, or government security forces as appropriate, bearing in mind local laws, company policies and the provisions of the Voluntary Principles on Security and Human Rights as applicable. In addition, it is important for the person responsible for security to be aware of developments on the project, and of any circumstances that could affect the security risk assessment, for example dissatisfaction among elements of the workforce. There should always be contingency plans in place to deal with arising situations, ideally considered in advance and included in the overall security planning package. If this is not the case, it is important that those responsible for security have the appropriate experience and leadership to respond rationally and proportionally to the situation in question. 6

13 Integrating security in major projects - principles & guidelines 4. Monitoring & control 4.1 The fourth phase of a project, for the purposes of this document the Monitoring & control phase, is the period of consolidation and quality assurance that takes place between the execution of a project and the commissioning of the finished product. In many ways this can be a period of increased risk; especially of there have been cost overruns or delays. It will also be the period in which unscrupulous individuals may wish to cause delay in order to extend contracts or increase revenue, or to extract additional benefits from the project owner. In any event, it is a time when security awareness and vigilance should be maintained at an appropriate level. 4.2 The risk assessment that has been constantly monitored and updated throughout the project remains the key element to maintaining the correct security posture at this stage. Some risks will have been eliminated, such as those pertaining to transportation and fabrication, while others, such as those concerning workforce demobilisation or the physical protection of critical assets will come to the fore. It is advisable to update security processes and procedures to meet changing risks, ideally in a manner that is planned and designed to facilitate the transition from project to operational status of the facility. As such, the operational security risk environment of the facility concerned becomes more prominent and relevant to security planning and practice during this phase. 4.3 As the project prepares for the transition to operations, so the security function should also be preparing for it. This might include inducting new personnel, or training security providers from the operational facility on aspects of the project. If security assessment and planning has been conducted as advised in this document there should be no untoward surprises and the transition will be smooth. Where there is any kind of disconnect between the security elements of the project and the operation it may be necessary to implement some remedial action to ensure the continued security of project personnel and assets. This is especially true if the project is now located in a relatively high risk area controlled by the operator, and protected by his security provisions. The remedial action referred to might include, for example, inclusion of the operator s security function in project security meetings, and vice-versa, or conducting a joint review of project and operation security procedures to ensure that there are no unresolved conflicts or contradictions. 4.4 Among the preparatory tasks for transition during this phase, the following are examples of the kinds of issue that might be considered: Defining and monitoring security performance metrics; Developing ongoing standard operating procedures to aid full integration with the operation; Adapting security plans to meet any remaining project deviations; and Defining critical components of security infrastructure if changes are needed. 7

14 International Association of Oil and Gas Producers 5. Closure or look-back 5.1 The final project phase entails bringing the project to a close, handing it over to the operation, and reviewing each phase retrospectively to identify opportunities for improvements in future projects, and to rectify any perceived flaws in project planning or execution. It is advisable to follow this path from the security perspective, as much as from any other. 5.2 One suggested method for achieving a comprehensive look-back is to reconvene the security oversight group referred to in paragraph 2.10 above, or to capture feedback obtained from its members at the relevant time. This, coupled with examination of risk assessments and any security incidents that occurred would provide an efficient narrative against which to measure the effectiveness of the security planning employed. 8

15 For further information and publications, please visit our website at:

16 About us: OGP is a global organisation that has been active for nearly 40 years, facilitating continual improvement in upstream (exploration and production) health safety and environmental issues as well as improvements in engineering and operations. OGP, with offices in London and Brussels, represents publicly-traded private and state-owned oil and gas companies, field service companies and industry associations. Its members produce more than half of the world s oil and over one-third of its gas. More information about OGP and the production of gas from shale can be found at: Blackfriars Road London SE1 8NL United Kingdom Telephone: +44 (0) Fax: +44 (0) Bd du Souverain 4th Floor B-1160 Brussels, Belgium Telephone: +32 (0) Fax: +32 (0) Website: reception@ogp.org.uk

Checklist for an audit of safety management

Checklist for an audit of safety management Checklist for an audit of safety management Report No. 6.15/160 February 1990 P ublications Global experience The International Association of Oil & Gas Producers (formerly the E&P Forum) has access to

More information

Guidelines for the use of the OGP P6/11 bin grid GIS data model

Guidelines for the use of the OGP P6/11 bin grid GIS data model Guidelines for the use of the OGP P6/11 bin grid GIS data model Report No. 483-6g July 2013 This document is a companion document to the OGP P6/11 Seismic bin grid data exchange format description (2012)

More information

HSE management guidelines for working together in a contract environment

HSE management guidelines for working together in a contract environment International Association of Oil & Gas Producers HSE management guidelines for working together in a contract environment Report No. 423 June 2010 P ublications Global experience The International Association

More information

Police use of Firearms

Police use of Firearms CODE OF PRACTICE ON Police use of Firearms and Less Lethal Weapons Contents 1. Introduction 1.1 Purpose of the code 1 1.2 Statutory basis of the code 1 1.3 Weapons covered by this code 2 1.4 Armed support

More information

Human factors is the term used to describe the interaction

Human factors is the term used to describe the interaction Human factors defined Human factors is the term used to describe the interaction of individuals with each other, with facilities and equipment, and with management systems. This interaction is influenced

More information

G M G. Terms and Conditions. Business Consulting

G M G. Terms and Conditions. Business Consulting G M G Terms and Conditions Business Consulting Overview Third Party Fair Use of t. + 44 ( 0 ) 1892 739 197 e. contact@ gmgbusiness.com www.gmgbusiness.com GMG Business Consulting is the trading name of

More information

Geomatics Guidance Note 3

Geomatics Guidance Note 3 Geomatics Guidance Note 3 Contract area description Revision history Version Date Amendments 5.1 December 2014 Revised to improve clarity. Heading changed to Geomatics. 4 April 2006 References to EPSG

More information

Welsh Government Response to the Report of the National Assembly for Wales Public Accounts Committee on Grant Management in Wales Final Report

Welsh Government Response to the Report of the National Assembly for Wales Public Accounts Committee on Grant Management in Wales Final Report Welsh Government Response to the Report of the National Assembly for Wales Public Accounts Committee on Grant Management in Wales Final Report The Welsh Government appreciates both the time and effort

More information

Glossary of HSE terms

Glossary of HSE terms Glossary of HSE terms Report No. 6.52/244 September 1999 P ublications Global experience The International Association of Oil & Gas Producers (formerly the E&P Forum) has access to a wealth of technical

More information

Operating Management System Framework

Operating Management System Framework International Association of Oil & Gas Producers Operating Management System Framework OGP Report No. 510 June 2014 for controlling risk and delivering high performance in the oil and gas industry Disclaimer

More information

Surveying & Positioning Guidance note 10

Surveying & Positioning Guidance note 10 Surveying & Positioning Guidance note 10 Geodetic Transformations Offshore Norway Revision history Version Date Amendments 1.0 April 2001 First release 1 Background European Datum 1950 (ED50) is the de

More information

The FIDIC Suite of Contracts

The FIDIC Suite of Contracts Less well know FIDIC contracts are also available such as the Turquoise Book for Dredging and Reclamation Works published in January 2006 and the White Book model services agreement published in October

More information

Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004

Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004 Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004 1. INTRODUCTION Financial institutions outsource business activities, functions and processes

More information

Statement of Guidance: Outsourcing All Regulated Entities

Statement of Guidance: Outsourcing All Regulated Entities Statement of Guidance: Outsourcing All Regulated Entities 1. STATEMENT OF OBJECTIVES 1.1. 1.2. 1.3. 1.4. This Statement of Guidance ( Guidance ) is intended to provide guidance to regulated entities on

More information

London STOCK EXCHANGE

London STOCK EXCHANGE London STOCK EXCHANGE 16 March 2006 For the attention of the Nominated Advisers/ Finance Directors/ Company Secretaries, all AIM Companies 10 Paternoster Square London EC4M 7LS Telephone 020 7797 1000

More information

THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world

THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world THE NEW INTERNATIONALS Updating perceptions of SMEs in an increasingly globalised world Contents Introduction 5 Born Global 6 International Futures 7 Supporting UK SMEs 8 UK Regions 9 Conclusion 10 About

More information

Stakeholder management and. communication PROJECT ADVISORY. Leadership Series 3

Stakeholder management and. communication PROJECT ADVISORY. Leadership Series 3 /01 PROJECT ADVISORY Stakeholder management and communication Leadership Series 3 kpmg.com/nz About the Leadership Series KPMG s Leadership Series is targeted towards owners of major capital programmes,

More information

GUIDELINES FOR THE PREPARATION OF A TRANSPORT EMERGENCY RESPONSE PLAN. Endorsed by ACTDG

GUIDELINES FOR THE PREPARATION OF A TRANSPORT EMERGENCY RESPONSE PLAN. Endorsed by ACTDG GUIDELINES FOR THE PREPARATION OF A TRANSPORT EMERGENCY RESPONSE PLAN Endorsed by ACTDG Commonwealth of Australia 2003 ISBN 0 642 45037 4 This work is copyright. You may download, display, print and reproduce

More information

Project organisation and establishing a programme management office

Project organisation and establishing a programme management office PROJECT ADVISORY Project organisation and establishing a programme office Leadership Series 1 kpmg.com/nz About the Leadership Series KPMG s Leadership Series is targeted towards owners of major capital

More information

A GOOD PRACTICE GUIDE FOR EMPLOYERS

A GOOD PRACTICE GUIDE FOR EMPLOYERS MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade

More information

Health, Security, Safety and Environment (HSE)

Health, Security, Safety and Environment (HSE) Health, Security, Safety and Environment (HSE) Content: 1 Objective 2 Application and Scope 21 Application of HSE Directive with underlying documents 22 Scope of HSE Management system 3 Framework for our

More information

Rating Consultancy RICS/IRRV/RSA Code of Practice. 3rd edition

Rating Consultancy RICS/IRRV/RSA Code of Practice. 3rd edition Rating Consultancy RICS/IRRV/RSA Code of Practice 3rd edition Copyright notice Copyright of this Code of Practice belongs to RICS. Purchasers of this Code of Practice are, however, permitted to reproduce

More information

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement. Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement June 2011 DISCLAIMER: This document is intended as a general guide only.

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

Info sheet : Considering labour standards in the procurement process

Info sheet : Considering labour standards in the procurement process Info sheet : Considering labour standards in the procurement process In line with the EU procurement rules and the Government s value for money principle, contracting authorities can take steps to consider

More information

Disability Employment Services Quality Framework Advice V 2.0

Disability Employment Services Quality Framework Advice V 2.0 Disability Employment Services Quality Framework Advice V 2.0 Disclaimer This document is not a stand-alone document and does not contain the entirety of Disability Employment Services Providers' obligations.

More information

Shepway District Council Risk Management Policy

Shepway District Council Risk Management Policy Shepway District Council Risk Management Policy Contents Section 1 Risk Management Policy... 3 1. Updates and amendments... 3 2. Definition... 3 3. Policy statement... 3 4. Objectives... 3 Section 2 Risk

More information

13. FPSO Operational Problems Don Smith, OGP

13. FPSO Operational Problems Don Smith, OGP OGP Marine Risks Workshop Proceedings 13. FPSO Operational Problems Don Smith, OGP FPSO Operational Problems Don Smith OGP Analysis of Accident Statistics for Floating Monohull and Fixed Installations

More information

An Introduction to Risk Management. For Event Holders in Western Australia. May 2014

An Introduction to Risk Management. For Event Holders in Western Australia. May 2014 An Introduction to Risk Management For Event Holders in Western Australia May 2014 Tourism Western Australia Level 9, 2 Mill Street PERTH WA 6000 GPO Box X2261 PERTH WA 6847 Tel: +61 8 9262 1700 Fax: +61

More information

COMMISSION REGULATION (EU)

COMMISSION REGULATION (EU) L 122/22 Official Journal of the European Union 11.5.2011 COMMISSION REGULATION (EU) No 445/2011 of 10 May 2011 on a system of certification of entities in charge of maintenance for freight wagons and

More information

Standard Form of Agreement Between Owner and Contractor where the basis of payment is a Stipulated Sum

Standard Form of Agreement Between Owner and Contractor where the basis of payment is a Stipulated Sum Document A101 2007 Standard Form of Agreement Between Owner and Contractor where the basis of payment is a Stipulated Sum AGREEMENT made as of the in the year (In words, indicate day, month and year.)

More information

Recommendations Relating to the Application of Requirements Governing Seafarers Hours of Work and Rest

Recommendations Relating to the Application of Requirements Governing Seafarers Hours of Work and Rest Oil Companies International Marine Forum s Relating to the Application of Requirements Governing Seafarers Hours of Work and Rest January 2012 The OCIMF mission is to be the foremost authority on the safe

More information

An Introduction to PRINCE2

An Introduction to PRINCE2 Project Management Methodologies An Introduction to PRINCE2 Why use a Project Methodology and What Does PRINCE2 Enable? PRINCE - PRojects IN Controlled Environments - is a project management method covering

More information

BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994

BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 Ref: BR/14/2009 OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 INTRODUCTION

More information

Enterprise Release Management

Enterprise Release Management Enterprise Release Management Plutora helps organizations manage complex IT Feature Pipeline, IT Releases and IT Test Environments in a simple and transparent manner. Enterprise Releases Transparency and

More information

Crisis Prevention and Response Services. NYA International. Crisis Prevention and Response Services. Crisis Prevention and Response Services

Crisis Prevention and Response Services. NYA International. Crisis Prevention and Response Services. Crisis Prevention and Response Services NYA International B Effective risk management begins with a comprehensive understanding of the threat and an organisation s vulnerability, and the application of appropriate mitigation measures. Operating

More information

Developing a New Care Home

Developing a New Care Home A Legal Guide Developing a New Care Home In this edition The trend towards new build Property and development The legal process Managing problems Developing a New Care Home Introduction At Elliot Mather,

More information

Module 7 Study Guide

Module 7 Study Guide Module 7 Study Guide Change Evaluation Welcome to your Study Guide. This document is supplementary to the information available to you online, and should be used in conjunction with the videos, quizzes

More information

CONTRACT FOR THE APPOINTMENT OF AN APPROVED INSPECTOR

CONTRACT FOR THE APPOINTMENT OF AN APPROVED INSPECTOR CONTRACT FOR THE APPOINTMENT OF AN APPROVED INSPECTOR CIC/AppInsp The Construction Industry Council - Association of Consultant Approved Inspectors contract for the appointment of an approved inspector

More information

Risk Assessment Data Directory. Report No. 434 A1 March 2010. Appendix 1

Risk Assessment Data Directory. Report No. 434 A1 March 2010. Appendix 1 Risk Assessment Data Directory Report No. 434 A1 March 2010 Appendix 1 I n t e r n a t i o n a l A s s o c i a t i o n o f O i l & G a s P r o d u c e r s P ublications Global experience The International

More information

V1.0 - Eurojuris ISO 9001:2008 Certified

V1.0 - Eurojuris ISO 9001:2008 Certified Risk Management Manual V1.0 - Eurojuris ISO 9001:2008 Certified Section Page No 1 An Introduction to Risk Management 1-2 2 The Framework of Risk Management 3-6 3 Identification of Risks 7-8 4 Evaluation

More information

INSURANCE ACT 2008 CORPORATE GOVERNANCE CODE OF PRACTICE FOR REGULATED INSURANCE ENTITIES

INSURANCE ACT 2008 CORPORATE GOVERNANCE CODE OF PRACTICE FOR REGULATED INSURANCE ENTITIES SD 0880/10 INSURANCE ACT 2008 CORPORATE GOVERNANCE CODE OF PRACTICE FOR REGULATED INSURANCE ENTITIES Laid before Tynwald 16 November 2010 Coming into operation 1 October 2010 The Supervisor, after consulting

More information

Business Continuity Policy. Version 1.0

Business Continuity Policy. Version 1.0 Business Continuity Policy Version.0 January 206 Contents Contents Version control Foreword Policy. Scope.2 Aim and objectives.3 Methods and standards.4 Responsibilities.5 Governance.6 Training and exercises

More information

Risk Management & Business Continuity Manual 2011-2014

Risk Management & Business Continuity Manual 2011-2014 ANNEX C Risk Management & Business Continuity Manual 2011-2014 Produced by the Risk Produced and by the Business Risk and Business Continuity Continuity Team Team February 2011 April 2011 Draft V.10 Page

More information

Managing Outsourcing Arrangements

Managing Outsourcing Arrangements Guidance Note GGN 221.1 Managing Outsourcing Arrangements 1. This Guidance Note provides further detail on the requirements for managing material outsourcing arrangements (refer Prudential Standard GPS

More information

Business Continuity Business Impact Analysis arrangements

Business Continuity Business Impact Analysis arrangements Aberdeen City Council Internal Audit Report 2012/2013 for Aberdeen City Council May 2013 Business Continuity Business Impact Analysis arrangements Final Report Contents Section Page 1. Executive Summary

More information

Review of Consultation Paper CP86 Consultation on Fund Management Company Effectiveness Delegate Oversight

Review of Consultation Paper CP86 Consultation on Fund Management Company Effectiveness Delegate Oversight Review of Consultation Paper CP86 Consultation on Fund Management Company Effectiveness Delegate Oversight The Central Bank of Ireland ( CBI ) issued a Consultation Paper on 19 September 2014 titled Fund

More information

CONFORMED COPY. Method Statement Helpdesk Services. Revision History. Revision Date Reviewer Status. 23 March 2007 Project Co Final Version

CONFORMED COPY. Method Statement Helpdesk Services. Revision History. Revision Date Reviewer Status. 23 March 2007 Project Co Final Version CONFORMED COPY Method Statement Revision History Revision Date Reviewer Status 23 March 2007 Project Co Final Version Table of Contents 1 Objectives... 3 2 Management Supervision and Organisation Structure...

More information

OMS in practice. A supplement to Report No. 510, Operating Management System Framework. OGP Report No. 511 June 2014

OMS in practice. A supplement to Report No. 510, Operating Management System Framework. OGP Report No. 511 June 2014 International Association of Oil & Gas Producers OMS in practice OGP Report No. 511 June 2014 A supplement to Report No. 510, Operating Management System Framework Disclaimer Whilst every effort has been

More information

PRIORITIZING CYBERSECURITY

PRIORITIZING CYBERSECURITY April 2016 PRIORITIZING CYBERSECURITY Five Investor Questions for Portfolio Company Boards Foreword As the frequency and severity of cyber attacks against global businesses continue to escalate, both companies

More information

Session 4. System Engineering Management. Session Speaker : Dr. Govind R. Kadambi. M S Ramaiah School of Advanced Studies 1

Session 4. System Engineering Management. Session Speaker : Dr. Govind R. Kadambi. M S Ramaiah School of Advanced Studies 1 Session 4 System Engineering Management Session Speaker : Dr. Govind R. Kadambi M S Ramaiah School of Advanced Studies 1 Session Objectives To learn and understand the tasks involved in system engineering

More information

Reporting Service Performance Information

Reporting Service Performance Information AASB Exposure Draft ED 270 August 2015 Reporting Service Performance Information Comments to the AASB by 12 February 2016 PLEASE NOTE THIS DATE HAS BEEN EXTENDED TO 29 APRIL 2016 How to comment on this

More information

AIA Document A141 TM - 2004 Standard From of Agreement Between Owner and Design- Builder

AIA Document A141 TM - 2004 Standard From of Agreement Between Owner and Design- Builder AIA Document A141 TM - 2004 Standard From of Agreement Between Owner and Design- Builder AGREEMENT made as of the day of in the year of (In words, indicate day, month and year) BETWEEN the Owner: (Name,

More information

Land transportation safety recommended practice

Land transportation safety recommended practice REPORT 365-6 JUNE 2016 Land transportation safety recommended practice Guidance note 6 Questionnaire/checklist assessment for the implementation of Report 365 Introduction This questionnaire/checklist

More information

ISA 620, Using the Work of an Auditor s Expert. Proposed ISA 500 (Redrafted), Considering the Relevance and Reliability of Audit Evidence

ISA 620, Using the Work of an Auditor s Expert. Proposed ISA 500 (Redrafted), Considering the Relevance and Reliability of Audit Evidence International Auditing and Assurance Standards Board Exposure Draft October 2007 Comments are requested by February 15, 2008 Proposed Revised and Redrafted International Standard on Auditing ISA 620, Using

More information

System of Governance

System of Governance CEIOPS-DOC-29/09 CEIOPS Advice for Level 2 Implementing Measures on Solvency II: System of Governance (former Consultation Paper 33) October 2009 CEIOPS e.v. Westhafenplatz 1-60327 Frankfurt Germany Tel.

More information

ITS specification Handover and commissioning process (ITS-10-01)

ITS specification Handover and commissioning process (ITS-10-01) ITS specification Handover and commissioning process (ITS-10-01) NZ Transport Agency Effective from September 2011 Copyright information This publication is copyright NZ Transport Agency (NZTA). Material

More information

SITPRO. International Trade Guides. Management. Managing the Risks of International Trade

SITPRO. International Trade Guides. Management. Managing the Risks of International Trade SITPRO International Trade Guides Management Managing the Risks of International Trade Managing the Risks of International Trade This guide provides information that will help you to put procedures in

More information

Final Draft Guidance on Audit Committees

Final Draft Guidance on Audit Committees Guidance Corporate Governance April 2016 Final Draft Guidance on Audit Committees The FRC is responsible for promoting high quality corporate governance and reporting to foster investment. We set the UK

More information

IT OUTSOURCING SECURITY

IT OUTSOURCING SECURITY IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

BLOOM AND WAKE (ELECTRICAL CONTRACTORS) LIMITED QUALITY ASSURANCE MANUAL

BLOOM AND WAKE (ELECTRICAL CONTRACTORS) LIMITED QUALITY ASSURANCE MANUAL 130 Wisbech Road Outwell Wisbech Cambridgeshire PE14 8PF Tel: (01945) 772578 Fax: (01945) 773135 Copyright 2003. This Manual and the information contained herein are the property Bloom & Wake (Electrical

More information

Project Management. Advice on the provision of Local Decontamination Units (LDUs) Decontamination Services

Project Management. Advice on the provision of Local Decontamination Units (LDUs) Decontamination Services Advice on the provision of Local Decontamination Units (LDUs) Decontamination Services January 2010 Contents Project Management Page Local Decontamination Units (LDUs) Construction Project Management...3

More information

Are you sure that s beef in your burger?

Are you sure that s beef in your burger? pwc.com.au PwC s supplier risk management services Are you sure that s beef in your burger? Giving you confidence in the performance of your supply chain The recent horse meat substitution scandal is just

More information

Policy Statement: Licensing Policy in respect of those activities that require a permit under the Insurance Business (Jersey) Law 1996

Policy Statement: Licensing Policy in respect of those activities that require a permit under the Insurance Business (Jersey) Law 1996 Policy Statement: Licensing Policy in respect of those activities that require a permit under the Insurance Business (Jersey) Law 1996 Issued: 11 February 2011 Glossary of terms: The following table provides

More information

7 Directorate Performance Managers. 7 Performance Reporting and Data Quality Officer. 8 Responsible Officers

7 Directorate Performance Managers. 7 Performance Reporting and Data Quality Officer. 8 Responsible Officers Contents Page 1 Introduction 2 2 Objectives of the Strategy 2 3 Data Quality Standards 3 4 The National Indicator Set 3 5 Structure of this Strategy 3 5.1 Awareness 4 5.2 Definitions 4 5.3 Recording 4

More information

INTERNATIONAL FRAMEWORK FOR ASSURANCE ENGAGEMENTS CONTENTS

INTERNATIONAL FRAMEWORK FOR ASSURANCE ENGAGEMENTS CONTENTS INTERNATIONAL FOR ASSURANCE ENGAGEMENTS (Effective for assurance reports issued on or after January 1, 2005) CONTENTS Paragraph Introduction... 1 6 Definition and Objective of an Assurance Engagement...

More information

CONCODE Guide to contract strategies for construction projects in the NHS STATUS IN WALES ARCHIVED

CONCODE Guide to contract strategies for construction projects in the NHS STATUS IN WALES ARCHIVED CONCODE Guide to contract strategies for construction projects in the NHS 1995 STATUS IN WALES ARCHIVED For queries on the status of this document contact info@whe.wales.nhs.uk or telephone 029 2031 5512

More information

Guide, Instructions and Commentary to the 2013 AIA Digital Practice Documents

Guide, Instructions and Commentary to the 2013 AIA Digital Practice Documents Guide, Instructions and Commentary to the 2013 AIA Digital Practice Documents AIA Document E203 2013, Building Information Modeling and Digital Data Exhibit AIA Document G201 2013, Project Digital Data

More information

Policy for delegating authority to foster carers. September 2013

Policy for delegating authority to foster carers. September 2013 Policy for delegating authority to foster carers September 2013 Purpose and scope of policy 1.1 Introduction Decision-making around the care of looked after children can be an area of conflict between

More information

APES GN 30 Outsourced Services

APES GN 30 Outsourced Services APES GN 30 Outsourced Services Prepared and issued by Accounting Professional & Ethical Standards Board Limited ISSUED: [DATE] Copyright 2012 Accounting Professional & Ethical Standards Board Limited (

More information

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,

More information

BANKING UNIT POLICY DOCUMENTS

BANKING UNIT POLICY DOCUMENTS BANKING UNIT POLICY DOCUMENTS POLICY DOCUMENT ON THE REGULATORY PROVISIONS FOR THE UNDERTAKING OF LENDING ACTIVITIES BY INSTITUTIONS AUTHORISED UNDER THE FINANCIAL INSTITUTIONS ACT 1994 FACTORING FORFAITING

More information

Risk Management Procedure

Risk Management Procedure Purpose of this document Develop and document procedures and work instructions for Risk Management to cover the project Stages set out in the Project Process Map. The purpose of this procedure is to identify

More information

Good Practice Guide: the internal audit role in information assurance

Good Practice Guide: the internal audit role in information assurance Good Practice Guide: the internal audit role in information assurance Janaury 2010 Good Practice Guide: the internal audit role in information assurance January 2010 Official versions of this document

More information

Trinity Online Application - Terms and Conditions of Use

Trinity Online Application - Terms and Conditions of Use IMPORTANT NOTICE PLEASE READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY. IF YOU DO NOT AGREE WITH THESE TERMS AND CONDITIONS, YOU MUST NOT USE THIS APPLICATION. BY USING THIS APPLICATION AND/OR ANY OF

More information

SUPERVISORY AND REGULATORY GUIDELINES: PU48-0809 GUIDELINES ON MINIMUM STANDARDS FOR THE OUTSOURCING OF MATERIAL FUNCTIONS

SUPERVISORY AND REGULATORY GUIDELINES: PU48-0809 GUIDELINES ON MINIMUM STANDARDS FOR THE OUTSOURCING OF MATERIAL FUNCTIONS SUPERVISORY AND REGULATORY GUIDELINES: PU48-0809 ISSUED: 4 th May 2004 REVISED: 27 th August 2009 GUIDELINES ON MINIMUM STANDARDS FOR THE OUTSOURCING OF MATERIAL FUNCTIONS I. INTRODUCTION The Central Bank

More information

requiring the insurers of the firm ceasing practice to continue insuring that firm for a prescribed period, or

requiring the insurers of the firm ceasing practice to continue insuring that firm for a prescribed period, or The Succeeding Practice Rule The professional indemnity insurance regulations are designed to prevent situations whereby a client s valid claims are not covered by any professional indemnity insurance

More information

Abu Dhabi EHSMS Regulatory Framework (AD EHSMS RF)

Abu Dhabi EHSMS Regulatory Framework (AD EHSMS RF) Abu Dhabi EHSMS Regulatory Framework (AD EHSMS RF) Technical Guideline Audit and Inspection Version 2.0 February 2012 Table of Contents 1. Introduction... 3 2. Definitions... 3 3. Internal Audit... 3 3.1

More information

DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions

DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions DRAFT Change History: Anti-Bribery and Anti-Corruption Policy Control Risks Group Ltd Commercial in confidence Introduction This document defines Control Risks policy on the avoidance of bribery and corruption.

More information

LICENCE FOR EMPLOYMENT APPLICATION. means Eversheds LLP whose registered office is at One Wood Street, London EC2V 7WS.

LICENCE FOR EMPLOYMENT APPLICATION. means Eversheds LLP whose registered office is at One Wood Street, London EC2V 7WS. LICENCE FOR EMPLOYMENT APPLICATION 1. DEFINITIONS Eversheds Licensee Application Intellectual Property Rights Use means Eversheds LLP whose registered office is at One Wood Street, London EC2V 7WS. means:

More information

NOTE FOR MINING AND OIL & GAS COMPANIES - JU N E 2 0 0 9

NOTE FOR MINING AND OIL & GAS COMPANIES - JU N E 2 0 0 9 NOTE FOR MINING AND OIL & GAS COMPANIES - JU N E 2 0 0 9 A G U I D E T O A I M U K TA X B E N E F I T S 2 AIM Note for Mining, Oil and Gas Companies Contents Introduction 1 Companies to which this Note

More information

REGULATORY AUDITS OF DISTRIBUTION BUSINESSES ELECTRICITY AND GAS INDUSTRIES

REGULATORY AUDITS OF DISTRIBUTION BUSINESSES ELECTRICITY AND GAS INDUSTRIES ESSENTIAL SERVICES COMMISSION '""- GUIDELINE No. 16 REGULATORY AUDITS OF DISTRIBUTION BUSINESSES ELECTRICITY AND GAS INDUSTRIES March 2004 ELECTRICITY AND GAS INDUSTRIES GUIDELINE No. 16 This guideline

More information

UKLPG APPROVED AUTOGAS INSTALLER CONSUMER CODE

UKLPG APPROVED AUTOGAS INSTALLER CONSUMER CODE UKLPG APPROVED AUTOGAS INSTALLER CONSUMER CODE e-mail autogas@uklpg.org Website www.drivelpg.co.uk Office 2.2, Christchurch Business Centre, Grange Road, Christchurch, Dorset, BH23 4JD. CONTENTS SECTION

More information

NHS ISLE OF WIGHT CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY POLICY

NHS ISLE OF WIGHT CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY POLICY NHS ISLE OF WIGHT CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY POLICY AUTHOR/ APPROVAL DETAILS Document Author Written By: Human Resources Authorised Signature Authorised By: Helen Shields Date: 20

More information

Client Alert. Global Information Technology & Communications Privacy, Data Protection and Information Management

Client Alert. Global Information Technology & Communications Privacy, Data Protection and Information Management Global Information Technology & Communications Privacy, Data Protection and Information Management Client Alert Umbrellas for Clouds: Risk Mitigation Strategies for SaaS Transactions www.bakermckenzie.com

More information

Risk Management Guide

Risk Management Guide Risk Management Guide Page(s) Introduction 3 The 5 steps to identifying risk 4 Risk Management Process - Step 1 5 Identify - Step 2 Assess Step 3 5-6 6 Control - Step 4 6 Monitor and Review -Step 5 6 Risk

More information

ITIL Introducing service transition

ITIL Introducing service transition ITIL Introducing service transition The goals of service transition Aligning the new or changed service with the organisational requirements and organisational operations Plan and manage the capacity and

More information

TO ALL CHIEF EXECUTIVE OFFICERS OF BANKS, BRANCHES OF FOREIGN BANKS AND MUTUAL BANKS

TO ALL CHIEF EXECUTIVE OFFICERS OF BANKS, BRANCHES OF FOREIGN BANKS AND MUTUAL BANKS 2004-09-20 BANKS ACT CIRCULAR 14/2004 TO ALL CHIEF EXECUTIVE OFFICERS OF BANKS, BRANCHES OF FOREIGN BANKS AND MUTUAL BANKS OUTSOURCING OF FUNCTIONS WITHIN BANKS This Office has received several approaches

More information

Financial Services Guidance Note Outsourcing

Financial Services Guidance Note Outsourcing Financial Services Guidance Note Issued: April 2005 Revised: August 2007 Table of Contents 1. Introduction... 3 1.1 Background... 3 1.2 Definitions... 3 2. Guiding Principles... 5 3. Key Risks of... 14

More information

TGA key performance indicators and reporting measures

TGA key performance indicators and reporting measures TGA key indicators and reporting measures Regulator Performance Framework Version 1.0, May 2015 About the Therapeutic Goods Administration (TGA) The Therapeutic Goods Administration (TGA) is part of the

More information

Document Commentary. AIA Document C191 2009, Standard Form Multi-Party Agreement for Integrated Project Delivery

Document Commentary. AIA Document C191 2009, Standard Form Multi-Party Agreement for Integrated Project Delivery Document AIA Document C191 2009, Standard Form Multi-Party Agreement for Integrated Project Delivery INTRODUCTION Current practice in the construction industry promotes inefficiency when the key project

More information

KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity

KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity INFORMATION RISK MANAGEMENT KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity ADVISORY Contents Agenda: Global trends and BCM

More information

form Consultation m Technical BIS/DfE Joint Orchard 1 1 Victoria Street SW1H 0ET

form Consultation m Technical BIS/DfE Joint Orchard 1 1 Victoria Street SW1H 0ET The Future of Apprenticeships in England: Funding Refor m Technical Consultation - response form A copy of the consultation on The Future of Apprenticeships in England: Funding Reform Technical Consultation

More information

Design Development Agreement

Design Development Agreement Design Development Agreement June 2010 prepared by Larry Kirkland, PAN Council Member and The Law Office of Sarah Conley Disclaimer The Public Art Commission Agreement is made available as a service of

More information

Delivering Excellence in Insurance Claims Handling

Delivering Excellence in Insurance Claims Handling Delivering Excellence in Insurance Claims Handling Guide to Best Practice Delivering Excellence in Insurance Claims Handling Contents Page 1. Introduction 1 2. Executive Summary 2 3. Components of Best

More information

DYNAMIC EXTRACTIONS TERMS AND CONDITIONS OF WEBSITE USE

DYNAMIC EXTRACTIONS TERMS AND CONDITIONS OF WEBSITE USE DYNAMIC EXTRACTIONS TERMS AND CONDITIONS OF WEBSITE USE BACKGROUND: This agreement applies as between you, the User of this Website and Dynamic Extractions Limited, the owner(s) of this Website. Your agreement

More information

The Code. for Crown Prosecutors

The Code. for Crown Prosecutors The Code for Crown Prosecutors January 2013 Table of Contents Introduction... 2 General Principles... 3 The Decision Whether to Prosecute... 4 The Full Code Test... 6 The Evidential Stage... 6 The Public

More information

Draft Guidance: Non-economic Regulators: Duty to Have Regard to Growth

Draft Guidance: Non-economic Regulators: Duty to Have Regard to Growth Draft Guidance: Non-economic Regulators: Duty to Have Regard to Growth January 2014 Purpose of this document The duty to have regard to the desirability of promoting economic growth (the growth duty )

More information

May 2013. Leases. Comments to be received by 13 September 2013

May 2013. Leases. Comments to be received by 13 September 2013 May 2013 Exposure Draft ED/2013/6 Leases Comments to be received by 13 September 2013 Exposure Draft Leases Comments to be received by 13 September 2013 Exposure Draft ED/2013/6 Leases is published by

More information

Aviation weather guidelines

Aviation weather guidelines Aviation weather guidelines Report o. 369 October 2005 P ublications Global experience The International Association of Oil & Gas Producers has access to a wealth of technical knowledge and experience

More information