Overview of Electronic Security Systems

Size: px
Start display at page:

Download "Overview of Electronic Security Systems"

Transcription

1 Overview of Electronic Security Systems NAVFAC Far East Presented by: Richard Cofer, P.E. Naval Facilities Engineering Command Atlantic Capital Improvements Business Line Engineering Criteria and Programs July 2014

2 UFC Electronic Security Systems Purpose: Provide effective and efficient criteria for designing Electronic Security Systems (ESS) in support of the Department of Defense (DoD) physical security program requirements. Lead Agency: Navy Point of contact: Richard Cofer Current Document Status: Originally Published 2006, Available on the Revision Published 1 October 2013 Unification Format Technology Lessons learned Whole Building Design Guide Website ( 3 Electronic Security Systems July 2014 Physical Security System Definition: That part of security concerned with physical measures designed to safeguard personnel; to prevent unauthorized access to equipment, installations, material, and documents; and to safeguard them against espionage, sabotage, damage, and theft. 4 Electronic Security Systems July 2014

3 Physical Security System Comprised of three major sub-functions: Detect, Delay, and Respond. Physical Security System Functions Detect Delay Respond Protective Measures Electronic Security System Intrusion detection Alarm communication Alarm assessment Access control Electronic Harbor Security Systems Security Forces Security Lighting DoD Personnel Responsible Citizens Military Working Dogs Barriers Fences Facility roof, walls, and floors Doors Windows Locks Distance Vegetation Procedures Interruption Communication to response force Deployment of response force Neutralization 5 Electronic Security Systems July 2014 Physical Security System Security professionals design systems by: Combining protective measures and operational procedures into an integrated system that works within a installation s, facility s, and user s constraints Components should complement each other and correct for vulnerabilities. Contain supporting elements coordinated to prevent gaps or overlaps in responsibilities and performance. 6 Electronic Security Systems July 2014

4 What dictates a Physical Security System The decision when and where to provide a Physical Security Equipment is based upon the following criteria: DoD policy/regulations Operational procedures Asset value (Relative value of items being protected) Availability of security forces to patrol and observe protected areas. Availability of fiscal resources (procurement, installation, energy conservation, and maintenance costs) Risk 7 Electronic Security Systems July 2014 The Problem 8 Electronic Security Systems July 2014

5 Assets Determining the assets is the first step in establishing any protective system 9 Electronic Security Systems July 2014 What Generates the Requirement for ESS? The Asset being protected and the associated policy generates the requirement. Arms, Ammunitions, and Explosives (AA&E) Sensitive Compartmented Information (SCI) Special Access Program Information(SAPI) Classified Materials (Secret and above) Classified Communications System SIPRNet JWICS May Electronic Security Systems July 2014

6 POLICY AA&E: OPNAV INSTRUCTION C Department of the Navy Physical Security Instruction for Conventional Arms, Ammunition, and Explosives SCI & SAPI: Director of National Intelligence, Intelligence Community Standard (ICS) Physical and Technical Security Standards for Sensitive Compartmented Information Facilities. IC Tech Spec for ICD/ICS 705, Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities Classified Materials (Secret and above)/classified Communication Systems: SECNAV M Department of the Navy Information Security Program May Electronic Security Systems July 2014 What dictates an Physical Security System The requirements for Physical Security Systems must be established during the project planning stage. Establish an interdisciplinary planning team with local considerations to include the following: Planning Supported Command Site Security Manager (SSM) Communications Security: Installation/Region N3 Engineering 8 July Electronic Security Systems July 2014

7 Project Development The planning team must: Determine what assets require protection Understand related DoD/Service policy/regulations Understand the objectives of the system Understand the facility and user s operational requirements and limitations. Understand the security force s capabilities Determine and document the Design Basis Threat Determine and document the Level of Protection Incorporate protective measures and related costs in project scope and budget. 13 Electronic Security Systems July 2014 Electronic Security System (ESS) The integrated electronic security system that encompasses interior and exterior Intrusion Detection Systems (IDS), Closed Circuit Television (CCTV) systems for assessment of alarm conditions, Automated Access Control Systems (ACS), Data Transmission Media (DTM), and alarm reporting systems for monitoring, control, and display. IDS: A system consisting of interior and exterior sensors, surveillance devices, and associated communication subsystems that collectively detect an intrusion of a specified site, facility, or perimeter and annunciate an alarm. CCTV: The system interior and exterior cameras, monitors, archiving hardware, and associated communication subsystems that allow video archiving and assessment of alarm conditions via remote monitoring. ACS: The system consisting of card readers, electronic locks, and the associated communication subsystem that ensures only authorized personnel are permitted ingress and egress into the protected area. May Electronic Security Systems July 2014

8 Intrusion Detection System (IDS) 15 Electronic Security Systems July 2014 Closed Circuit Television (CCTV) 16 Electronic Security Systems July 2014

9 Access Control System (ACS) 17 Electronic Security Systems July 2014 AA&E Policy Base Requirements All perimeter doors and man-passable openings into the storage area shall be protected by High Security Switch (HSS) and a motion detection sensor. Duress alarm at all issue ports. Keypad at entrance and for all separated (unit-based) interior storage areas that require an independent IDS capability. Perimeter emergency exit doors shall be secured, alarmed, and monitored 24 hours per day. IDS shall be installed in accordance with UL 681 and consist of: Level 2 high security switches (HSS) that meet UL 634, and/or other government approved sensors. Motion detection sensors UL 639 listed. Premise Control Units (PCUs) shall be located within the protected area. May Electronic Security Systems July 2014

10 Notional Layout: Arms Storage May Electronic Security Systems July 2014 SCIF Policy Base Requirements Perimeter doors shall be protected by High Security Switch (HSS) and a motion detecting sensor. Emergency exit doors shall be secured, alarmed, and monitored 24 hours per day. Interior areas through which reasonable access could be gained such as walls, doors, or windows shall be protected by an IDS. IDS shall be installed in accordance with UL 681 and consist of: Level 2 high security switches (HSS) that meet UL 634, and/or other government approved sensors Motion detection sensors that meet UL 639 listed, or approved by the CSA. Dual-Technology Sensors are authorized when each technology transmits alarm conditions independent of the other technology. Premise Control Units (PCUs) shall be located within a SCIF May Electronic Security Systems July 2014

11 Notional Layout: SCIF or SAPF May Electronic Security Systems July 2014 TS Policy Base Requirements All perimeter doors and man-passable openings into the secure area shall be protected by High Security Switch (HSS) and a motion detection sensor. Keypad at Primary Entrance. Perimeter emergency exit doors shall be secured, alarmed, and monitored 24 hours per day. IDS shall be installed in accordance with UL 681 and consist of: Level 2 high security switches (HSS) that meet UL 634, and/or other government approved sensors. Motion detection sensors UL 639 listed. Dual-Technology Sensors are authorized when each technology transmits alarm conditions independent of the other technology. Premise Control Units (PCUs) shall be located within the protected area. May Electronic Security Systems July 2014

12 Notional Layout: Top Secrete Open Storage May Electronic Security Systems July 2014 Word of Caution! Don t go Crazy! May Electronic Security Systems July 2014

13 Project Development 25 Electronic Security Systems July 2014 ESS for Navy MCON Military Construction for Navy (MCON): For FY06 MCON projects and beyond, NAVFAC's goal, is to fully integrate the design, procurement, installation and testing of Electronic Security Systems (ESS) into MCON design and construction contracts. MCON/MCNR project funds procure the supporting infrastructure. OP or O&M funds procure, install and test the equipment. 26 Electronic Security Systems July 2014

14 ESS/PSE Funding NAVFAC ATFP Ashore addresses Physical Security Equipment requirements and funding for the Equipment associated with Navy MCON. NAVFAC ATFP Ashore Program may provide funding for ESS related to Navy MCON when required for the protection of critical assets. Justification must be based on DoD or OPNAV policy, not based on command s operational preferences. In the case of a SCIF, armory, top secret open storage or similar spaces, ATFP Ashore may fund processing control unit, point sensors at the perimeter access points, volumetric sensors within the space, card readers and video assessment (CCTV) at the perimeter access points. In general, ATFP Ashore will not fund card readers for compartmented areas within the space or exterior surveillance or fence line (perimeter) electronic security systems. 27 Electronic Security Systems July 2014 ESS/PSE Funding 28 Electronic Security Systems July 2014

15 ESS/PSE Funding Refer to BMS B-1.3 Operational Outfitting Considerations Types of projects typically funded under the ATFP Ashore Program include assets such as: Arms, Ammunitions, and Explosives (AA&E) Sensitive Compartmented Information (SCI) Special Access Program Information(SAPI) Classified Materials (Secret and above) Classified Communication Systems Secret Internet Protocol Router Network (SIPRNet) Joint Worldwide Intelligence Communications System (JWICS) 29 Electronic Security Systems July 2014 ESS/PSE Funding Types of facility projects or programs that may require ESS, but are not funded by the ATFP Ashore program include: Marine Corps and Marine Corps Reserve Facilities SOCOM Missile Defense Agency Strategic Systems Program (SSP) Strategic Weapons Facilities (SWF) Base Realignment and Closure (BRAC) Projects Bachelor Quarters Medical Facilities Housing MWR and Retail Facilities 30 Electronic Security Systems July 2014

16 Project Development Document the ESS/PSE requirements Block 10 (scope) of DD 1391 and backup documentation should be utilized to describe PSE requirements/assets. Does this facility contain critical assets? AA&E? SCI? SAPI? Classified Information SIPRnet/JWICS? Utilize 1391 Team Checklist to document requirements 31 Electronic Security Systems July 2014 Physical Security Equipment (PSE) Funding Types of facility projects or programs that may require ESS, but are not funded by the ATFP Ashore program include: Marine Corps and Marine Corps Reserve Facilities SOCOM Missile Defense Agency Strategic Systems Program (SSP) Strategic Weapons Facilities (SWF) Base Realignment and Closure (BRAC) Projects Bachelor Quarters Medical Facilities Housing MWR and Retail Facilities 32 Electronic Security Systems July 2014

17 PSE Funding For Marine Corps, Army, Air Force other Defense Agency projects: Coordinate the PSE, ESS and IDS requirements and funding with the resource sponsor and/or supported command s representative Provide empty conduit systems for PSE with MILCON design and Construction. Agency s PSE Program provides the design, installation and testing of the Physical Security Equipment. 33 Electronic Security Systems July 2014 Project Development The planning team must: Understand related DoD/Service policy/regulations Understand the objectives of the system Understand the facility and user s operational requirements and limitations. Understand the security force s capabilities Determine funding source(s) Determine and Document the Design Basis Threat Determine and Document the Level of Protection Incorporate protective measures and related costs in project scope and budget. 34 Electronic Security Systems July 2014

18 AT Standards Funding Physical Security Equipment (PSE) infrastructure efforts are considered built-in and can be funded with project funds regardless of funding source. Interior infrastructure includes conduit, junction boxes, electronic door strikes, door hardware, mounting hardware, and power connections. Exterior infrastructure includes items such as exterior duct banks, manholes, utility poles, exterior communication cabling, and power connections. 35 Electronic Security Systems July 2014 PSE Funding For MILCON Physical Security Equipment (PSE) is classified as equipment and cannot be funded with Military Construction (MILCON) dollars. Equipment (Active Devices) includes items such as central processing units, control panels, interior sensors, exterior sensors, cameras, monitors, and the interior communications cabling connecting these devices together. 36 Electronic Security Systems July 2014

19 1391 Team Checklist - PS Insure Physical Security issues been addressed appropriately (Coordinate closely with NAVFACHQ CI ATFP, User/Operator, and Installation/Base Security): a Is the entire facility required to be a Controlled Access Area? Example: a facility that would be classified as Top Secret Open Storage b Does this project require a Sensitive Compartmented Information Facility (SCIF)? If so, indicate the number and square footage of each SCIF. SCIFs have special security requirements such as opening restrictions, special walls, and sound attenuation c Does this project require a Controlled Access Area (CAA) other than a SCIF within the facility? If so, indicate the number and square footage of each CAA d Will mission to be performed in facility require Electronic Security System (ESS) or Physical Security Equipment (PSE) such as a Intrusion Detection System (IDS)? Generally IDS is considered collateral equipment to be funded and installed after completion of the MILCON Project or as TurnKey Contract Option using Other-Than-MILCON funds. However, need to provide sufficient space (may need monitoring station/room), power supply, cable runs (sometimes both interior and exterior to central monitoring station), and support points for attachment of equipment. Coordinate closely with NAVFACHQ CI ATFP, User/Operator, and Installation/Base Security f Does this project include fencing with physical security requirements? Is appropriate physical security criteria being complied with (type, height, stand-off)? g Any other physical security features in this project? Coordinate with Installation/Base Security and User/Operator (sometimes User/Operator is responsible for sufficient security measures to conduct operations) Does this project include interior access control system (card readers, etc) that are not considered Physical Security Equipment? 37 Electronic Security Systems July 2014 Project Development Document the Cost Associated with Physical Security Requirements Block 9 (Project Cost) of DD 1391 and backup documentation should be utilized to document costs of the PSE requirements. Cost for PSE infrastructure must be included in Block 9 of the DD 1391 under primary facilities (Built-in Equipment). Cost for PSE (Actual Equipment) must be include in block 9 of the DD 1391 under Equipment Under Other Appropriations. Remember: PSE cannot be paid for with Military Construction funds. 38 Electronic Security Systems July 2014

20 Project Development Tools for Establishing Budgets for ESS ESS Budget Estimator: Excel Spreadsheet intended to provide DoD facility planners, cost estimators and designers a unified method of budgeting for Electronic Security Systems for facilities. This tool is intended to be used for budget estimating only and work within OSD and DD 1391 guidelines. Tool will output budget cost for ESS equipment and the associated infrastructure. Gate Automation Equipment Estimator: Excel Spreadsheet intended to provide DoD facility planners, cost estimators and designers a unified method of budgeting for Gate Automation equipment only. This tool does not provide infrastructure costs. 39 Electronic Security Systems July 2014 ESS Budget Estimator 40 Electronic Security Systems July 2014

21 ESS Budget Estimator 41 Electronic Security Systems July 2014 ESS Budget Estimator (Output) 42 Electronic Security Systems July 2014

22 Gate Automation Equipment Estimator 43 Electronic Security Systems July 2014 RFP/Design Development Physical Security Equipment (PSE) for Navy Military Construction (MCON/MCNR) Projects: Include PSE and associated infrastructure into the MILCON construction contracts. PSE must be identified as a contract option and paid for with OP or O&M funds. Coordinate requirements and funding with ATFP Ashore Program. Provide Cost Estimates with PSE identified as a separate cost item (Contract Option). 44 Electronic Security Systems July 2014

23 Program Roles and Responsibilities NAVFAC HQ Program Oversight Prioritization with Commander Fleet Forces Command (CFFC) and Commander Naval Installations (CNI)/Annual Planning Funding and Requirement Validation for IDS Funding management Execution Plan/Budgeting 45 Electronic Security Systems July 2014 Program Roles and Responsibilities (Cont.) FEC Project Team: Planning/DD1391 Development Coordinate with supported command to establish requirement for ESS/PSE (Program Manager to validate requirement and funding) Program for ESS/PSE infrastructure Include the appropriate OP or O&M cost Determine appropriate fund source and procurement strategy for ESS/PSE NAVFAC ATFP Ashore or Supported Command Option to contract Follow on contract 46 Electronic Security Systems July 2014

24 Program Roles and Responsibilities (Cont.) FEC Project Team (cont.) Project design Validate planning criteria Coordinate with supported command, security POC to refine ESS/PSE requirements. Include ESS/PSE infrastructure to support equipment For Navy MCON: Include ESS/PSE procurement, installation, testing and training as an option to the contract. 47 Electronic Security Systems July 2014 Program Roles and Responsibilities (Cont.) FEC Project Team (cont.) Construction oversight Coordinating required ESS/PSE infrastructure prior to equipment installation Coordinate site surveys by Site Security Manager when required for SCIF, TS, or SAPF spaces Coordinate site surveys for ESS/PSE contractor when separate from prime contract Coordinate procurement Testing and evaluation Training 48 Electronic Security Systems July 2014

25 49 Electronic Security Systems July 2014

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over

More information

Middleborough Police Electronic Security Narrative

Middleborough Police Electronic Security Narrative Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction Chapter 1 provides background information on electronic safety and secuirty (ESS), including the definition and areas of knowledge required for an ESS designer. Information contained

More information

U.S. DoD Physical Security Market

U.S. DoD Physical Security Market U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request

More information

Introduction. Industry Changes

Introduction. Industry Changes Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise

More information

3.0 Nonsystem Based Design Descriptions and ITAAC

3.0 Nonsystem Based Design Descriptions and ITAAC 3.0 Nonsystem Based Design Descriptions and ITAAC 3.1 Security 3.1.1 Design Features The physical security system provides physical features to detect, delay, assist response to, and defend against the

More information

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7 Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section

More information

UNIFIED FACILITIES CRITERIA (UFC) SECURITY ENGINEERING: WATERFRONT SECURITY

UNIFIED FACILITIES CRITERIA (UFC) SECURITY ENGINEERING: WATERFRONT SECURITY UNIFIED FACILITIES CRITERIA (UFC) SECURITY ENGINEERING: WATERFRONT SECURITY APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED UNIFIED FACILITIES CRITERIA (UFC) SECURITY ENGINEERING: WATERFRONT SECURITY

More information

UNIFIED FACILITIES CRITERIA (UFC) ELECTRONIC SECURITY SYSTEMS

UNIFIED FACILITIES CRITERIA (UFC) ELECTRONIC SECURITY SYSTEMS UNIFIED FACILITIES CRITERIA (UFC) ELECTRONIC SECURITY SYSTEMS APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED UNIFIED FACILITIES CRITERIA (UFC) ELECTRONIC SECURITY SYSTEMS Any copyrighted material

More information

DIVISION 28 ELECTRONIC SAFETY AND SECURITY

DIVISION 28 ELECTRONIC SAFETY AND SECURITY DIVISION 28 ELECTRONIC SAFETY AND SECURITY CENTRALLY MANAGED ELECTRONIC ACCESS CONTROL, VIDEO SURVEILLANCE, AND INTRUSION ALARM SYSTEMS 1. All questions on equipment approvals in this section shall be

More information

BUILDING SECURITY & ACCESS CONTROL

BUILDING SECURITY & ACCESS CONTROL Department of Facilities Management BUILDING SECURITY & ACCESS CONTROL OBJECTIVE: PERFORMANCE GUIDELINES AUGUST 19, 2011 The objective of this guideline is to limit the probability that, as a result of

More information

Does a fence or other type physical barrier define the perimeter of the facility?

Does a fence or other type physical barrier define the perimeter of the facility? PHYSCIAL SECURITY SURVEY CHECKLIST PERIMETER BARRIERS TRANSIT FACILITIES Does a fence or other type physical barrier define the perimeter of the facility? (1) Specify type and height of physical barrier

More information

Conducting Security System Site Surveys

Conducting Security System Site Surveys Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM

More information

Physical Security for Drinking Water Facilities

Physical Security for Drinking Water Facilities Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland

More information

How to Solve the Most Persistent Problem in Perimeter Security Systems

How to Solve the Most Persistent Problem in Perimeter Security Systems How to Solve the Most Persistent Problem in Perimeter Security Systems Duane Thompson General Manager of Fiber SenSys Carrondo, Antonio Commercial Manager, Teleprinta Perimeter Security Challenging!! More

More information

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities. 2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must

More information

UNIFIED FACILITIES GUIDE SPECIFICATIONS

UNIFIED FACILITIES GUIDE SPECIFICATIONS USACE / NAVFAC / AFCEC / NASA UFGS-28 20 02 (November 2008) ----------------------------- Preparing Activity: USACE Superseding UFGS-13729 (April 2006) UNIFIED FACILITIES GUIDE SPECIFICATIONS References

More information

Physical Security of Sensitive Compartmented Information Facilities (SCIF)

Physical Security of Sensitive Compartmented Information Facilities (SCIF) Physical Security of Sensitive Compartmented Information Facilities (SCIF) NAVFAC Atlantic Presented by: Richard Cofer, P.E. Naval Facilities Engineering Command Atlantic Capital Improvements Business

More information

Frankfurt Data Centre Overview

Frankfurt Data Centre Overview Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use

More information

Crime Prevention through Environmental Design (CPTED) - Checklist

Crime Prevention through Environmental Design (CPTED) - Checklist Crime Prevention through Environmental Design (CPTED) - Checklist * Where relevant, each item is to be shown on the architectural plans. A description of how the development complies, together with the

More information

Physical Security Reliability Standard Implementation

Physical Security Reliability Standard Implementation Physical Security Reliability Standard Implementation Tobias Whitney, Manager of CIP Compliance (NERC) Carl Herron, Physical Security Leader (NERC) NERC Sub-Committee Meeting New Orleans, Louisiana CIP-014

More information

Appendix G. Security management plan

Appendix G. Security management plan Appendix G Security management plan Security Management Plan Prepared by: Kann Finch Group Project Energy Australia Belmore Park Zone 1- Sub-station component General Design Requirements The perimeter

More information

Subj: NAVY IMPLEMENTATION OF DEPARTMENT OF DEFENSE INTELLIGENCE INFORMATION SYSTEM (DODIIS) PUBLIC KEY INFRASTRUCTURE (PKI)

Subj: NAVY IMPLEMENTATION OF DEPARTMENT OF DEFENSE INTELLIGENCE INFORMATION SYSTEM (DODIIS) PUBLIC KEY INFRASTRUCTURE (PKI) DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 IN REPLY REFER TO OPNAVINST 5239.3A N2 OPNAV INSTRUCTION 5239.3A From: Chief of Naval Operations

More information

U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security

U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security NUREG-0800 U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN 13.6.2 PHYSICAL SECURITY DESIGN CERTIFICATION REVIEW RESPONSIBILITIES Primary - Organization responsible for the review of physical security

More information

Science/Safeguards and Security. Funding Profile by Subprogram

Science/Safeguards and Security. Funding Profile by Subprogram Safeguards and Security Safeguards and Security Funding Profile by Subprogram (dollars in thousands) Protective Forces 35,059 37,147 Security Systems 11,896 10,435 Information Security 4,655 4,595 Cyber

More information

Physical Security. Paul Troncone CS 996

Physical Security. Paul Troncone CS 996 Physical Security Paul Troncone CS 996 NSTISSI 4011 Building Construction Alarms Access Controls Information Systems Centers Personnel Security Tamper Resistance Goals of Physical Security Safeguard personnel

More information

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 Table of Contents 1. Operational Security 2. Physical Security 3. Network

More information

Defense Contract Management Agency

Defense Contract Management Agency Fiscal Year (FY) 2011 Budget Estimates February 2010 Procurement, Defense-Wide Page Intentionally Blank PROCUREMENT, DEFENSE WIDE DEFENSE CONTRACT MANAGEMENT AGENCY EXHIBIT TITLE PAGE Purpose and Scope/Justification

More information

FACILITY SECURITY CERTIFICATION FORM DOJ SECURITY LEVEL II

FACILITY SECURITY CERTIFICATION FORM DOJ SECURITY LEVEL II FACILITY SECURITY CERTIFICATION FORM DOJ SECURITY LEVEL II AGENCY: FACILITY: ADDRESS: LEASED/OWNED: UPGRADE COSTS: REVIEW TEAM: REVIEW DATE: FACILITY POC: CERTIFIED Y/N: I. PERIMETER SECURITY A.. PARKING

More information

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department

More information

Critical Asset Security Enhancementation - A Review

Critical Asset Security Enhancementation - A Review U.S. Department of Energy Office of Inspector General Office of Audit Services Audit Report Report on Critical Asset Vulnerability and Risk Assessments at the Power Marketing Administrations--Followup

More information

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010

More information

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014) File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014) Appendix A -- Minimum Security Standards for Level Federal

More information

Security at San Onofre

Security at San Onofre Security at San Onofre April 16, 2015 Ross Quam Security Manager Overview 1. Mission 2. Adversary Characteristics 3. Plans and Procedures 4. Insider Mitigation 5. Local Law Enforcement Agency Support 2

More information

Site Security Standards and Strategy

Site Security Standards and Strategy Site Security Standards and Strategy I. Background and Overview A. The City s Program Standards and Procedures (PSP) are intended to be used in conjunction with the data contained in related standards

More information

Subj: U.S. NAVAL ACADEMY RIFLE AND PISTOL TEAM ARMORY STANDARD OPERATING PROCEDURES

Subj: U.S. NAVAL ACADEMY RIFLE AND PISTOL TEAM ARMORY STANDARD OPERATING PROCEDURES DEPARTMENT OF THE NAVY COMMANDANT OF MIDSHIPMEN U.S. NAVAL ACADEMY 101 BUCHANAN ROAD ANNAPOLIS, MARYLAND 21402-5100 COMMANDANT OF MIDSHIPMEN INSTRUCTION 8000.2C COMDTMIDNINST 8000.2C OPS Subj: U.S. NAVAL

More information

YOUR TRUSTED PARTNER FOR SECURITY AROUND THE GLOBE

YOUR TRUSTED PARTNER FOR SECURITY AROUND THE GLOBE YOUR TRUSTED PARTNER FOR SECURITY AROUND THE GLOBE CORPORATE SNAPSHOT: Stock Symbol: SWK Year Founded: 1843 Current Revenue: $11 B Number of Employees: 45,000+ Global Presence: 60+ Countries GLOBAL REACH,

More information

J 1 6 2. AMENDMENT/MODIFICATION NO. 3. EFFECTIVE DATE 4. REQUISITION/PURCHASE REQ. NO. PROJECT NO. (If applicable) 0004 18 -Aug-2014

J 1 6 2. AMENDMENT/MODIFICATION NO. 3. EFFECTIVE DATE 4. REQUISITION/PURCHASE REQ. NO. PROJECT NO. (If applicable) 0004 18 -Aug-2014 1. CONTRACT ID CODE PAGE OF PAGES J 1 6 2. AMENDMENT/MODIFICATION NO. 3. EFFECTIVE DATE 4. REQUISITION/PURCHASE REQ. NO. PROJECT NO. (If applicable) 0004 18 -Aug-2014 6. ISSUED BY Code OPHA3 7. ADMINISTERED

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

NATIONAL NUCLEAR SECURITY ADMINISTRATION

NATIONAL NUCLEAR SECURITY ADMINISTRATION NNSA Policy Letter NAP 70.2 Approved: PHYSICAL PROTECTION NATIONAL NUCLEAR SECURITY ADMINISTRATION Office of Defense Nuclear Security AVAILABLE ONLINE AT: http://www.nnsa.energy.gov INITIATED BY: Office

More information

DIVISION 28 ELECTRONIC SAFETY AND SECURITY

DIVISION 28 ELECTRONIC SAFETY AND SECURITY DIVISION 28 ELECTRONIC SAFETY AND SECURITY CENTRALLY MANAGED ELECTRONIC ACCESS CONTROL, VIDEO SURVEILLANCE, AND INTRUSION ALARM SYSTEMS 1. All questions on equipment approvals in this section shall be

More information

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS 1 DIPLOMATIC SECURITY PROTECTS The Bureau of Diplomatic Security is the security and law enforcement arm of

More information

CHAPTER A-5 ELECTRICAL POWER, LIGHTING, GROUNDING, COMMUNICATIONS AND ALARM SYSTEMS

CHAPTER A-5 ELECTRICAL POWER, LIGHTING, GROUNDING, COMMUNICATIONS AND ALARM SYSTEMS 5.1 GENERAL CHAPTER A-5 ELECTRICAL POWER, LIGHTING, GROUNDING, COMMUNICATIONS AND ALARM SYSTEMS 5.2 APPLICABLE CRITERIA 5.2.1 Unified Facilities Criteria (UFC) 5.2.2 Army Criteria 5.2.3 Air Force Criteria

More information

retail Partners Here is an example of one of

retail Partners Here is an example of one of Your First Choice in Retail Security retail Partners Here is an example of one of over 350,000 retailers STANLEY secures. Lowe s Companies, Inc. Stanley Security is Lowe s vendor of choice for locks and

More information

Current as of 11/10/08 1 of 1

Current as of 11/10/08 1 of 1 BEST PRACTICES STANDARDS FOR SCHOOLS UNDER CONSTRUCTION OR BEING PLANNED FOR CONSTRUCTION I. Site Layout A. School buildings shall be provided with a securable perimeter. A securable perimeter means that

More information

Security System Owner s Manual

Security System Owner s Manual Security System Owner s Manual Interactive Technologies Inc. 2266 North 2nd Street North St. Paul, MN 55109 FCC Notices FCC Part 15 Information to the User Changes or modifications not expressly approved

More information

Security Systems Intrusion Alarm

Security Systems Intrusion Alarm Dufferin-Peel Catholic District School Board STANDARD TEXT GUIDELINE FOR Security Systems for SECONDARY AND ELEMENTARY SCHOOLS Prepared by the Plant Department With Assistance from Vision Dynamics Formatted

More information

Georgia Tech Aerospace Server French building Server Room. Server Room Policy Handbook: Scope, Processes and Procedure

Georgia Tech Aerospace Server French building Server Room. Server Room Policy Handbook: Scope, Processes and Procedure Georgia Tech Aerospace Server French building Server Room Server Room Policy Handbook: Scope, Processes and Procedure Version History Version/Status Release Date Comments 1.1/Draft 1.2 1.3 1.4 1.5 1.6

More information

Element D Services Electrical

Element D Services Electrical Security Systems PART 1 - GENERAL 1.01 OVERVIEW A. The objective for each security design element is to help MD Anderson meet its mission and vision by promoting an environment in which higher education,

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Title of the Policy: Surveillance Policy

Title of the Policy: Surveillance Policy Title of the Policy: Surveillance Policy Functional Area: University Police Applies To: All Faculty and Staff Policy Reference(s): Number: Version 1.0 Date First Issued: March 15, 2016 Date Last Reviewed:

More information

CalMod Design-Build Electrification Services

CalMod Design-Build Electrification Services SECTION 28 16 00 INTRUSION DETECTION SYSTEM PART 1 - GENERAL 1.1 DESCRIPTION A. This section describes the detailed technical requirements for the Intrusion Detection System (IDS), where the Contractor

More information

Integration of Alarm Systems

Integration of Alarm Systems Integration of Alarm Systems Ing. Jan Valouch Tomas Bata University in Zlin, Faculty of Applied Informatics, Department of Security Engineering, Zlín, Czech Republic valouch@fai.utb.cz Abstract Integrated

More information

DENVER PUBLIC SCHOOLS DESIGN AND CONSTRUCTION STANDARDS This Standard is for guidance only. SECTION 17650 SECURITY SYSTEMS

DENVER PUBLIC SCHOOLS DESIGN AND CONSTRUCTION STANDARDS This Standard is for guidance only. SECTION 17650 SECURITY SYSTEMS PART 0 DESIGN STANDARDS 0.01 GENERAL DESIGN GUIDELINES A. Inspections and observations by the Owner do not relieve the A/E of contract responsibilities. B. Chain of command 1. The DPS Project Manager is

More information

INTELLIGENCE COMMUNITY STANDARD NUMBER 705-1

INTELLIGENCE COMMUNITY STANDARD NUMBER 705-1 ICS 705-1 INTELLIGENCE COMMUNITY STANDARD NUMBER 705-1 PHYSICAL AND TECHNICAL SECURITY STANDARDS FOR SENSITIVE COMPARTMENTED INFORMATION FACILITIES (EFFECTIVE: 17 SEPTEMBER 2010) A. AUTHORITY: The National

More information

Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn

Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn Security 101 For School Safety Intertech Associates, Inc. Lunch & Learn Safe & Secure Educational Environment What type of school is it? What type of security risks do schools see? How can traffic flows,

More information

SECURITY ENGINEERING:

SECURITY ENGINEERING: UNIFIED FACILITIES CRITERIA (UFC) SECURITY ENGINEERING: ENTRY CONTROL FACILITIES / ACCESS CONTROL POINTS DISTRIBUTION STATEMENT A: Approved for Public Release; Distribution unlimited. UNIFIED FACILITIES

More information

AUTOMATED TELLER MACHINE (ATM) COVERAGE SUPPLEMENT

AUTOMATED TELLER MACHINE (ATM) COVERAGE SUPPLEMENT AUTOMATED TELLER MACHINE (ATM) COVERAGE SUPPLEMENT FOR USE WITH COMMERCIAL CRIME APPLICATION Applicant: Description of Business (please check all that apply): Own ATMs installed in own premises Lease or

More information

Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai

Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai RCDD CISA CFOT Consulting Specialist Communication Cabling. Auditor Information Systems & Technology. Convergence

More information

Totally Wireless Video Security

Totally Wireless Video Security Traditional Video Surveillance ($50,000+) vs. Event-Based Videofied Solution ($2,500) Executive Summary: Totally Wireless Video Security has been effective but cost and complexity has limited deployment

More information

Access Professional Edition Selection Guide

Access Professional Edition Selection Guide Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base

More information

DLA Corporate Intern Program

DLA Corporate Intern Program DLA Corporate Intern Program The Program is a 2-year corporate training program designed to train entry-level personnel for subsequent advancement to the journey-level in professional, administrative,

More information

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD

More information

DORMA MODEL PS-406BB POWER SUPPLY INSTALLATION INSTRUCTIONS

DORMA MODEL PS-406BB POWER SUPPLY INSTALLATION INSTRUCTIONS Features: INSTALLATION Install in accordance with NFPA 70. DORMA MODEL PS-406BB POWER SUPPLY INSTALLATION INSTRUCTIONS Up to 1.95 Amps Load Capacity Class 2 Rated Outputs Overload, Over Voltage, and Short

More information

visit us on the web at: www.strategicsecuritycorp.com

visit us on the web at: www.strategicsecuritycorp.com CAMERAS & ALARMS Closed Circuit Television (CCTV) / SMART Home Structured Wiring & Systems Commercial and Residential Alarm Systems / Central Monitoring Integrated Access Control Systems (Proximity Cards,

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Guidance Notes FSR 2014

Guidance Notes FSR 2014 Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a

More information

Home Security Assessment Checklist DATE

Home Security Assessment Checklist DATE Home Security Assessment Checklist DATE PREFACE The Home Security Assessment Checklist is designed to assist justices, judges, and other court officials in determining their level of security at home.

More information

Appendix A - Cost Estimate Spreadsheet

Appendix A - Cost Estimate Spreadsheet CCTV Camera, PTZ Per Each $18,500 $1,250 12 $33,500 Closed circuit television (CCTV) camera with pan, tilt, zoom (PTZ) functionality in a dome enclosure. CCTV Camera, Fixed Per Each $14,000 $1,250 12 $29,000

More information

Surveillance and Security Technologies for Bridges and Tunnels

Surveillance and Security Technologies for Bridges and Tunnels Surveillance and Security Technologies for Bridges and Tunnels Sheila Rimal Duwadi, P.E., Team Leader Bridge Safety, Reliability and Security, Federal Highway Administration, 6300 Georgetown Pike, McLean

More information

C-TPAT Self-Assessment - Manufacturing & Warehousing

C-TPAT Self-Assessment - Manufacturing & Warehousing Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name

More information

DARTMOUTH COLLEGE DESIGN January 3, 2012 & CONSTRUCTION GUIDELINES

DARTMOUTH COLLEGE DESIGN January 3, 2012 & CONSTRUCTION GUIDELINES PART 1 DESIGN DIRECTIVES 1.1 OVERVIEW SECTION 13825 SECURITY MANAGEMENT SYSTEMS A. The access control, surveillance, and intrusion detection system implemented for use at Dartmouth College is a Lenel International

More information

MODESTO CITY SCHOOLS Administrative Regulation

MODESTO CITY SCHOOLS Administrative Regulation MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized

More information

Abu Dhabi, United Arab Emirates COMPANY PROFILE

Abu Dhabi, United Arab Emirates COMPANY PROFILE Abu Dhabi, United Arab Emirates COMPANY PROFILE INDEX Introduction Letter Company Overview Licenses Project Reference List Contacts Subject: Introduction to Dynamic Security Est. Dear Sir, We would like

More information

How To Ensure Security At A Site Security Site

How To Ensure Security At A Site Security Site Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers

More information

A Risk Assessment Methodology (RAM) for Physical Security

A Risk Assessment Methodology (RAM) for Physical Security A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the TOTAL WORKFORCE MANAGEMENT SERVICES (TWMS) Department of the Navy - CNIC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system

More information

the best prescription for security

the best prescription for security the best prescription for security healthcare Partners Here is an example of one of over 11,000 healthcare facilities STANLEY secures. baycare health system BayCare Health System is a leading community-based

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management Building Integration System Your platform for customized security and safety management 2 One platform for everything Efficient building management is becoming not only more important, but also a more

More information

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Cyber Threats in Physical Security Understanding and Mitigating the Risk Cyber Threats in Physical Security Understanding and Mitigating the Risk Synopsis Over the last few years, many industrial control systems, including security solutions, have adopted digital technology.

More information

Wisconsin Wastewater Operators Association Physical Security for Facilities. Christopher P. Haase, P.E.

Wisconsin Wastewater Operators Association Physical Security for Facilities. Christopher P. Haase, P.E. Wisconsin Wastewater Operators Association Christopher P. Haase, P.E. Introduction Welcome Security Planning and Evaluation Available Funding Sources Q&A Security Planning and Evaluation History Acropolis,

More information

This directive establishes Department of Homeland Security (DHS) policy regarding the physical protection of facilities and real property.

This directive establishes Department of Homeland Security (DHS) policy regarding the physical protection of facilities and real property. Department of Homeland Security Management Directives System MD Number: 11030.1 Issue Date: 04/21/2003 PHYSICAL PROTECTION OF FACILITIES AND REAL PROPERTY I. Purpose This directive establishes Department

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management A Tradition of Quality and Innovation For 12 years, the Bosch name stands for quality and reliability. Bosch is the global supplier of choice for innovative technology, backed by the highest standards

More information

DEPARTMENT OF THE ARMY ER 1110-1-8162 U.S. Army Corps of Engineers CECW-CE Washington, DC 20314-1000

DEPARTMENT OF THE ARMY ER 1110-1-8162 U.S. Army Corps of Engineers CECW-CE Washington, DC 20314-1000 DEPARTMENT OF THE ARMY ER 1110-1-8162 U.S. Army Corps of Engineers CECW-CE Washington, DC 20314-1000 Regulation 31 January 2014 No. 1110-1-8162 Engineering and Design DESIGN AND CONSTRUCTION POLICY FOR

More information

NeuStar Ultra Services Physical Security Overview

NeuStar Ultra Services Physical Security Overview NeuStar Ultra Services Physical Security Overview Mission-critical network operations must have the highest standards of quality, security and reliability. NeuStar Ultra Services currently locates its

More information

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template Security Tools Forms Physical Security Assessment Security Plan Template Traffic Control Plan Template 1 Physical Security Assessment (PSA) Date: I. PHYSICAL SECURITY ASSESSMENT (PSA): EXTERIOR OF THE

More information

Tradition of quality and innovation

Tradition of quality and innovation Bosch Security Systems 130 Perinton Parkway Fairport, New York 14450 phone: 800.289.0096 fax: 585.223.9180 www.boschsecurity.us All rights reserved Printed in U.S.A. Part # F01U008588B Tradition of quality

More information

... ... Why All Data Centers are Not Created Equal

... ... Why All Data Centers are Not Created Equal ... Las Vegas SuperNAP INFOSHEET... Why All Data Centers are Not Created Equal The Las Vegas SuperNap Auto-Graphics Data Center of Choice Auto-Graphics (A-G) offers its customers absolute flexibility when

More information

DEFENSE CONTRACT MANAGEMENT AGENCY PROCUREMENT, DEFENSE WIDE Fiscal Year (FY) 2002 Amended President's Budget

DEFENSE CONTRACT MANAGEMENT AGENCY PROCUREMENT, DEFENSE WIDE Fiscal Year (FY) 2002 Amended President's Budget PROCUREMENT, DEFENSE WIDE Fiscal Year (FY) 2002 Amended President's Budget EXHIBIT TITLE PAGE Purpose and Scope/Justification of Funds 2 P-1 Summary 6 P-1C Comparison Report 7 PB-1 Summary of FY 2002-2003

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

Defense Security Service (DSS)

Defense Security Service (DSS) Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) ADMINISTRATIVE INQUIRY (AI) PROCESS JOB AID July 2011 TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Scope... 1 2. PRELIMINARY

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

IPP offering with Bosch access control Access Professional Edition integration into Milestone XProtect

IPP offering with Bosch access control Access Professional Edition integration into Milestone XProtect IPP offering with Bosch access control Access Professional Edition integration into Milestone XProtect 1 M.Wings, 02 Sept. 2014 Broad range of innovative quality products from a single supplier Bosch s

More information

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL 9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent

More information

TechNet Land Forces South Small Business Opportunities. Carey Webster Director, Federal Information Solutions Deltek

TechNet Land Forces South Small Business Opportunities. Carey Webster Director, Federal Information Solutions Deltek TechNet Land Forces South Small Business Opportunities Carey Webster Director, Federal Information Solutions Deltek Agenda Review of Upcoming Opportunities for Small Businesses Army 8 Small Business Navy

More information

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism

More information

CONSULTANT PROCEDURES & DESIGN GUIDELINES 28 13 00 ACCESS CONTROL SYSTEM

CONSULTANT PROCEDURES & DESIGN GUIDELINES 28 13 00 ACCESS CONTROL SYSTEM GENERAL: To provide minimum standards for Access Control Systems. PART 1 Common Work Results for Access Control System 1.1 Owner will provide server and software for connecting control panels through the

More information

Vindicator Security Solutions. Security for Mission-Critical Applications

Vindicator Security Solutions. Security for Mission-Critical Applications Vindicator Security Solutions Security for Mission-Critical Applications About Vindicator Security Solutions Photo courtesy of U.S. Department of Defense. Military, Federal and State Governments Ports

More information