Security Systems Surveillance Policy
|
|
|
- Prosper Reed
- 10 years ago
- Views:
Transcription
1 Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy No: PD/33 TRIM File No: Date approved: 03/12/2013 Next review: 03/12/ Summary The State Library of NSW collects, maintains and preserves items of historical importance on behalf of the people of New South Wales. As custodian of these objects the State Library has a role in providing public access to them. It is the responsibility of the State Library to provide a safe and secure environment for collection material, visitors and clients and staff. The Mitchell Library is a heritage building that the State Library maintains and protects for the Government and people of New South Wales. State Library security systems provide controlled access to sensitive areas and surveillance of State Library environs, contributing towards this safe and secure environment. The security systems: act as a deterrent, reducing the likelihood of theft or damage to Library collections or property, and of aggressive or inappropriate behaviour towards staff, clients and visitors permit real-time monitoring, allowing Security Staff to respond quickly and effectively to incidents provide a record of events which may be used to identify perpetrators and support evidence provided by witnesses. 2. Policy statement This policy identifies the security systems used at the State Library and describes how they are used, in accordance with the Workplace Surveillance Act 2005 and other relevant legislation and policies. This policy applies to all persons within the State Library s precinct. 3. Legislative and Policy Framework Most relevant legislation: Crimes Act 1990 Government Information (Public Access) Act 2009 Library Act 1939 Library Regulation 2010 Privacy and Personal Information Protection Act 1998 Public Sector Employment and Management Act 2002 SecuritySystemsSurveillancePolicy_v1.0_ /8
2 State Records Act 1998 Work Health and Safety Act 2011 Workplace Surveillance Act 2005 Workplace Surveillance Regulation 2012 Related State Library policies: Client Code of Conduct Code of Conduct Collection & Services Disaster Response Plan Use of the State Library Under the Library Regulation 2010 Part 3 Information and Communications Technology (ICT) Services Policy Information Security Policy Privacy Management Plan Records Management Policy Work Health and Safety Policy This policy supports the State Library s information security management framework under standard AS/NZS ISO/IEC 27001:2006 and AS/NZS ISO/IEC 27002: Policy This policy covers the security systems including camera, and tracking surveillance at the State Library. Computer, internet and surveillance is covered by the ICT Services Policy. The following security surveillance systems are in place at the State Library: Closed circuit television (CCTV) cameras, with video recording equipment Gallagher Access Control Monitoring and Reporting Gallagher Security Alarm Monitoring System (including Passive Infrared Detectors (PIRs) and Reed Switch sensors) Photographic identification cards Kwiklook Data-Base & Visitor Contractor Attendance Kiosk Surveillance from all security systems is continuous and ongoing, 24 hours per day, 7 days per week. Surveillance is not used to monitor employees work performance. Surveillance of change rooms and bathrooms is prohibited. Printouts from the Alarm Monitoring System are used to monitor and investigate incidents, such as unauthorised access or where there is considered to be reasonable suspicion of corrupt practice or illegal activity. Where there is considered to be reasonable suspicion of corrupt practice or illegal activity, the Manager, Facilities & Security in consultation with the Director, Operations & CFO may seek authorisation from a Magistrate for covert surveillance. Computers connected to the Security network are used solely for monitoring alarm points and Gallagher access via ID cards. SecuritySystemsSurveillancePolicy_v1.0_ /8
3 4.1 CCTV Cameras a. The State Library is equipped with both internal and external CCTV cameras, positioned at various locations throughout the Library complex, and connected to video image recording equipment. b. CCTV cameras provide Security staff with the means to monitor multiple areas of the State Library at any one time and allow them to monitor activities around the site without exposing themselves to personal danger. c. CCTV cameras are visible to staff and visitors. Details of the types and locations of the fixed State Library cameras are in Attachment One. d. Signage has been installed at appropriate points to inform staff and the public of the presence of security surveillance cameras with recording capability. Details of sign locations and a copy of the signage currently used are in Attachment One. e. Additional CCTV cameras may be installed under certain circumstances and in accordance with this policy, including: new exhibitions: to cover specific objects of high value or importance or in areas considered to contain potential risks perceived risks: to either the State Library s collections or its staff, or to visitors, or to areas within the buildings. f. CCTV cameras may be used to track the movements of members of the public where there is reasonable suspicion of a threat or risk to the security of the State Library or other people within the Library precinct. g. Cameras are operated from the Security Control Room and are only used for the maintenance of security within the State Library and around the State Library s perimeters. Only authorised staff, with the appropriate Security Licence, may operate camera equipment. 4.2 Video Recording a. The State Library undertakes continuous and ongoing recording of visual images from certain CCTV cameras, recording the time and date at which images are taken. b. Security staff are able to sequence through CCTV cameras located throughout the site for monitoring purposes only. Access to video recording equipment is restricted to authorised staff only. c. Images are recorded on a hard disk and are retained for up to 14 days. Overwriting of the disk commences after 14 days. d. Recorded images are not available to members of the public. Access to recorded images by Library staff is limited. e. The Manager, Facilities & Security, in consultation with the Director, Operations & CFO, may approve the release of still images from video images to staff in order to alert them to possible risks or obtain their assistance in identification. SecuritySystemsSurveillancePolicy_v1.0_ /8
4 f. The Manager, Enterprise Information or the Privacy Contact Officer in consultation with the Director Operations & CFO and the Security Controller, may approve the copying of a recorded incident which is then set aside in a secure cabinet. These circumstances include: where there is footage of an incident with the potential to result in a breach of Library Regulation 2010, or that may be subject to investigation or legal proceedings or a civil claim as a result of a reasonable request from a solicitor (pending a court order for the release of the footage). g. Video recordings of a specific incident may be released to the NSW Police Service or other law enforcement agency, subject to the execution of a search warrant or where another Act or law authorises or requires us to do so and, only with the approval of the NSW State Librarian & Chief Executive or delegate, in consultation with the Manager, Enterprise Information or the Privacy Contact Officer. Refer to the CCTV footage release procedure on the Intranet. 4.3 Photographic ID Cards a. All staff, volunteers and contractors must wear a State Library Identification card or pass at all times when onsite. b. Staff must challenge/query or report immediately to security anyone seen in non-public areas without an ID card or temporary pass. c. The digitised photographs are maintained within the Gallagher Security System. The following information is stored with the digitised image, within the same database: name division, branch, section nature of employment (permanent/temporary/volunteer etc) date of card issue expiry date of card building access level. d. Information maintained within this database is available only to Security staff. Photographic images may not be used for any other purpose, or disclosed to any other person or body, without the consent of the individual to whom the information relates or unless another Act or law authorises or requires us to do so. e. The database is backed up in accordance with the ICT Services Policy. 4.4 Gallagher Access Monitoring and Reporting a. The Gallagher system collects and stores information on the time and date a personal ID was swiped in a particular Gallagher reader. b. Reports on access to areas of the Library may be produced by either individual card number or by area under the following circumstances: for individual cards, only with the approval of the Manager, Facilities & Security where there is reasonable suspicion of improper use/conduct, or for example, to trace a lost card in the event of an incident to determine who may have accessed the area and/or SecuritySystemsSurveillancePolicy_v1.0_ /8
5 as part of a regular review of access to an area e.g. staff offices. 4.5 Gallagher Access Control Security Alarm Monitoring System a. This system uses door alarm devices and passive infra-red detectors to monitor the State Library site. When these devises are triggered, an alarm sounds and Security staff are alerted. b. This system records the location of the alarm and the time and date when it was triggered. This information is stored locally on the system and can only be accessed by authorised staff. 4.6 Kwiklook Data-Base & Visitor-Contractor Attendance System a. The Kwiklook Data-Base is used to record all occurrences that occur on-site during a 24hour period. This information is entered manually by Security staff and is stored on the State Library SQL Network Database. This information can only be accessed by authorised staff. b. Kwiklook Tours Patrol Recording Device is used by Security staff when performing after-hour building patrols. This device is used to confirm that Security patrols are taking place. c. The Kwiklook visitor and contractor attendance kiosk is used to record the arrival and departure times of all visitors and contractors that visit the State Library. The system captures basic contact details and issues an adhesive photo identification pass. 5. Responsibilities The NSW State Librarian & Chief Executive is accountable for: approving this policy and for authorising the release of video footage, in accordance with this policy. The Executive is accountable for ensuring that this policy: meets all legislative requirements; is implemented and regularly reviewed; and is communicated to managers and supervisors. The Manager, Facilities & Security is accountable for: managing the State Library s security systems; ensuring that all complaints about breaches of this policy are investigated and appropriate action taken; and monitoring the work practices of Security staff. The Manager, Facilities & Security is responsible for updating and implementing this policy. The Security Controller are responsible for: administering the installation and maintenance of all security systems and surveillance equipment; and for advising on the review and amendment of this policy. Security Controller are also accountable for monitoring and reporting on security breaches. Security staff are responsible for: advising on the review and amendment of the security surveillance policy as required. The Manager, Enterprise Information and/or the Privacy Contact Officer are responsible for: approving the copying of a recorded incident; and for processing all requests from the NSW Police Service or other law enforcement agency for the release of footage from CCTV cameras. SecuritySystemsSurveillancePolicy_v1.0_ /8
6 Managers and supervisors are accountable for: ensuring their staff understand and comply with the requirements of this policy; and notifying the Manager Facilities & Security or a Security Controller as soon as practicable whenever their staff report an incident. Staff are accountable for: understanding and complying with this policy; and must report all security incidents or breaches of this policy to the Manager, Facilities & Security or a Security Controller. 6. Privacy The privacy and personal information pertaining to security systems surveillance is maintained and managed in accordance with the requirements of the Privacy and Personal Information Protection Act 1998 and the Library s Privacy Management Plan and procedures. 7. Right to Information Under some circumstances, information pertaining to security systems surveillance may be released, subject to consultation, in response to an application request made in accordance with the Government Information (Public Access) Act Recordkeeping Full and accurate records of all activities regarding surveillance such as monitoring or investigating incidents, authorising copying of footage or processing requests from law enforcement agencies are to be maintained securely and are to be registered in the State Library s recordkeeping system in accordance with the Records Management Policy and the State Records Act Reporting requirements The Manager, Facilities & Security will report to the Executive on any breaches of this policy. 10. Approval This policy was approved by the Executive on 4 December Implementation This policy is implemented on 16 December History This policy replaces Prepared by: Security Coordinator 2 December Document History and Version Control Version Date approved Approved by Brief description December 2013 Executive First release SecuritySystemsSurveillancePolicy_v1.0_ /8
7 Attachment One: CCTV Cameras CCTV Security cameras are installed within the State Library buildings and environs. Several security cameras have the capacity to be panned, tilt & zoomed (PTZ). The CCTV system is monitored from the State Library Security Control Room. The system can also be monitored remotely from the following locations: State Reference Library Security desk Loading Dock Security Office. A digital image recording system has been installed and connected to record images from specific cameras. Location of Cameras Connected to Video Recording Equipment Cameras connected to digital recording equipment are located as follows: Macquarie Street Wing Cameras External environs Public areas including corridors and reading rooms Cafe TRIM including the public seated area Macquarie Room Staff corridors All high, medium and low security stack areas Mitchell Wing Cameras External environs Public areas including corridors and reading rooms Exhibition Galleries Friends Room Dixson Room Staff corridors All high, medium and low security stack areas Loading dock entrances A current list of recording cameras is maintained by the Security Coordinator. SecuritySystemsSurveillancePolicy_v1.0_ /8
8 Signage Location and Wording Signage has been installed at all entrances to the State Library premises and in all rooms where CCTV cameras have been installed. The signs inform staff and the public of the presence of security surveillance cameras with recording capability. SecuritySystemsSurveillancePolicy_v1.0_ /8
COBAR SHIRE COUNCIL FILE:P5-90
COBAR SHIRE COUNCIL WORKPLACE SURVEILLANCE POLICY FILE:P5-90 Table of Contents POLICY STATEMENT... 3 INTRODUCTION 3 POLICY RESPONSIBILITIES 4 DEFINITIONS.. 5 REASONS AND REQUIREMENTS FOR SURVEILLANCE...
Bring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
CCTV Cameras Policy. Policy Guidelines
CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes
Lawlink NSW: Guide to the Workplace Video Surveillance Act
Guide to the Workplace Video Surveillance Act A Guide to the Workplace Video Surveillance Act 1998 (NSW) Privacy NSW February 2002 CONTENTS The Workplace Video Surveillance Act 1998 Coverage of the Act
UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012
UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one
UNIVERSITY OF MANITOBA POLICY CLOSED CIRCUIT TV (CCTV) MONITORING. Part I Reason for Policy
UNIVERSITY OF MANITOBA POLICY Policy: Effective Date: October 1, 2012 Revised Date: November 20, 2012 Review Date: October 1, 2022 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:
Video surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
Policy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles
Surveillance Equipment
University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of
2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY. WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA
2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA OVERVIEW The objects of this Bill are to ensure that employers
Title of the Policy: Surveillance Policy
Title of the Policy: Surveillance Policy Functional Area: University Police Applies To: All Faculty and Staff Policy Reference(s): Number: Version 1.0 Date First Issued: March 15, 2016 Date Last Reviewed:
CCTV CODE OF PRACTICE
CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,
University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement
University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement 1. Context The University security service provides night and weekend cover throughout the
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
CITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk
Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV
Corporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
Western Australia Legislation for Video Surveillance Devices
Western Australia Legislation for Video Surveillance Devices This document is an analysis of the Western Australia Surveillance Devices Act 1998; its purpose is to highlight some widely held misconceptions
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent
How To Protect Your Privacy In The Workplace
Review of the Workplace Surveillance Act 2005 (NSW) Submission to the NSW Attorney- General s Department January 2011 e m a i l: m a i l @ p r i v a c y. o r g. a u w e bsite : w w w. p r i v a c y. o
Photography and filming in schools Code of Practice
Photography and filming in schools Code of Practice Data Protection compliance September 2010 Photography and filming in schools September 2010 1 Contents 1. About this code 3 2. Complying with the Data
Policing requirements for Closed Circuit Television
Policing requirements for Closed Circuit Television 1 Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 2 Closed circuit television (CCTV) systems
Privacy Policy Draft
Introduction Privacy Policy Draft Please note this is a draft policy pending final approval Alzheimer s Australia values your privacy and takes reasonable steps to protect your personal information (that
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version V.D. Closed Circuit Television Monitoring and Recording of Public Areas for Safety and Security Purposes (Source:
Information Security Incident Management Policy September 2013
Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective
GYMNASTICS NSW PHOTOGRAPHY ACQUIRING AND DISPLAYING IMAGES OF CHILDREN POLICY
GYMNASTICS NSW PHOTOGRAPHY ACQUIRING AND DISPLAYING IMAGES OF CHILDREN POLICY POLICY NAME: DATE OF ISSUE: POLICY COVERAGE: DATE OF REVIEW: CONTROLLING BODY: Gymnastics NSW Photography Acquiring and Displaying
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
TRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales
TRANSPORT NSW Guidelines for the Use of Taxi Security Cameras in New South Wales (Pursuant to Schedule 1, Passenger Transport Regulation 2007) July, 2010 Transport Services Division 16-18 Wentworth Street
Data Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
Mobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
Other Review Dates: 15 July 2010, 20 October 2011
POLICY:- Policy Title: Mobile Telephone Policy File reference: F10/618-04 Date Policy was adopted by Council initially: 18 December 2008 Resolution Number: 404/08 Other Review Dates: 15 July 2010, 20 October
5.00 Employee in relation to the university, includes a volunteer and a service provider.
PROTECTION OF PRIVACY POLICY University Policy No: GV0235 Classification: Governance Approving Authority: Board of Governors Effective Date: January 1, 2010 Supersedes: June 2008 Last Editorial Change:
AASA Online Privacy Policy CRP.020
Introduction Alzheimer s Australia SA Inc values your privacy and takes reasonable steps to protect your personal information (that is, information which identifies or may reasonably be used to identify
06100 POLICY SECURITY AND INFORMATION ASSURANCE
Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information
Court Security Guidelines
July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative
CCTV PROCEDURES To support Information Security Policy Framework
CCTV PROCEDURES To support Information Security Policy Framework Section HERIOT-WATT UNIVERSITY PROCEDURES FOR OPERATION OF CCTV ON UNIVERSITY PREMISES TO SUPPORT INFORMATION SECURITY POLICY FRAMEWORK
European Investment Bank Group. Video-surveillance policy
Group TABLE OF CONTENTS 1. Purpose and scope of the video-surveillance policy... 2 2. Respect for privacy, data protection and compliance with the relevant rules... 2 2.1. Compliance status... 2 2.2.
Corporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install
Security Alarm Monitoring Protocol
Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or
Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response
Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response International Biological Threat Reduction Department Sandia National Laboratories
Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings
Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over
Video surveillance at EFSA Implementing rules and technical specifications
Video surveillance at EFSA Implementing rules and technical specifications PUBLIC version 1 Introduction EFSA operates a video surveillance system (hereafter VSS) for the safety and security of its buildings,
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises)
NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises) A. NMSU Entities requesting security cameras will be required to follow the procedures outlined below. 1. Justification
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
Camera Use. Policy Statement and Purpose. Table of Contents
Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing
MARULENG LOCAL MUNICIPALITY
MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details
Community Lifestyle Support Inc.
HUMAN SERVICES QUALITY FRAMEWORK STANDARDS DOCUMENT REFERENCE: Q:/6 WORKPLACE SURVEILLANCE POLICY DATE REVIEWED: August 2014 NEXT REVIEW DATE: August 2015 AUTHORISATION: Management Committee STANDARD REFERENCE:
Physical Security Assessment Form
Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...
Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely.
Remote Guarding Remote Guarding The traditional guarding functions that you depend on can now be performed remotely. When you have Remote Guarding managed by Securitas USA, we act on incidents in real-time
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
University of London CCTV Policy UNIVERSITY OF LONDON CCTV POLICY. Academic Buildings, Libraries and Residences. Page 1 of 10
UNIVERSITY OF LONDON CCTV POLICY Academic Buildings, Libraries and Residences Page 1 of 10 Contents The CCTV system... 3 Responsible officers... 3 Data Protection Act 1998... 3 The system... 3 Purpose
Lauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L.
Document No: IG10d Version: 1.1 Name of Procedure: Third Party Due Diligence Assessment Author: Release Date: Review Date: Lauren Hamill, Information Governance Officer Version Control Version Release
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
For personal use only
CONTENTS Introduction Objective Scope Standards of Behaviour Work Environment Community Engagement Financial Information and Integrity Company Property and Information Bribery and Corruption Breaches Approval
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
Security Licensing Process and Licence Conditions Policies
Security Licensing Process and Licence Conditions Policies Table of Contents Table of Contents...1-4 Updates... 5 Section 1 Section 1.1 How to use the Policies... 6 Section 1.2 How the Policies are Organized...
Witness Protection Act 1995 No 87
New South Wales Witness Protection Act 1995 No 87 Status information Currency of version Current version for 5 October 2012 to date (generated 10 October 2012 at 19:15). Legislation on the NSW legislation
UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public
Defence Security Manual DSM Part 2:61 Access Control and Identity Management Version 7 ation date July 2015 Amendment list 16 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements
Security Service de Services sécurité. Security Alarm Monitoring Protocol
Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings
REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY
LI_M_POPO PROVINCIAL GOVERNMENT :;:ED.JBl-C ()F SO"';-H AFR;IC. ':.,. DEPARTMENT OF CO-OPERATIVE GOVERNANCE, HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL
SWIMMING AUSTRALIA LIMITED GAMBLING, BETTING AND MATCH FIXING POLICY. Swimming Australia Limited - Gambling, Betting and Match Fixing Policy Page 1
SWIMMING AUSTRALIA LIMITED GAMBLING, BETTING AND MATCH FIXING POLICY Swimming Australia Limited - Gambling, Betting and Match Fixing Policy Page 1 CONTENTS PAGE BACKGROUND 3 REVIEW HISTORY 4 GAMBLING,
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Safety & Security Intruder Fire Access CCTV VeriSafe Alarms Alarms Systems Systems Keeping people safe & businesses compliant www.veriserv.co.
Safety & Security VeriSafe Intruder Alarms Fire Alarms Access Systems CCTV Systems Keeping people safe & businesses compliant www.veriserv.co.uk Security is about more than complying with standards and
University of Essex Automatic Number Plate Recognition (ANPR) Policy
& Standards for ANPR Operation at The University of Essex (Colchester Campus) Index 1. Introduction 1.1 System Description 1.2 Purpose of the System 1.3 Operating Principles 1.4 To Whom this Document Applies
Remote Monitoring offers a comprehensive range of services, which are continually
Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have
Policy for Management of CCTV on Waste Operation Vehicles
Policy for Management of CCTV on Waste Operation Vehicles 1.0 POLICY 1.1 CCTV cameras are fitted to refuse vehicles for the purposes of Health and Safety of employees and members of the public, and for
I N T E LLIGENCE WATC H. Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities
I N T E LLIGENCE WATC H Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities WELCOME TO I-WATCH i-watch (Intelligence Watch) provides monitoring services for residential
Northwest Cardiology Associates 400 W. Northwest Hwy Barrington, IL 60010 847.382.4600 Fax 847.382.1771. HIPAA Notice of Privacy Practices ( Notice )
Northwest Cardiology Associates 400 W. Northwest Hwy Barrington, IL 60010 847.382.4600 Fax 847.382.1771 HIPAA Notice of Privacy Practices ( Notice ) THIS NOTICE DESCRIBES HOW INFORMATION ABOUT YOU MAY
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
UK SBS Physical Security Policy
UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following
Gallagher Command Centre
DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software
POLICY ON USE OF INTERNET AND EMAIL
POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic
Watching Your Business Fire & Security Solutions
Watchdog Business Security Access Control CCTV Security Intruder Alarms Fire detection & Extinguishing Watching Your Business Fire & Security Solutions Watchdog Business Security Watching Your Business
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
Version Date Comments / Changes 1.0 February 2008 Initial Policy Released 2.0 September 2013 Policy Revised
Page 1 of 5 APPROVED (S) REVISED / REVIEWED SUMMARY Version Date Comments / Changes 1.0 Initial Policy Released 2.0 Policy Revised POLICY As part of an overall strategy to continuously improve workplace
SYRACUSE CITY SCHOOL DISTRICT
SYRACUSE CITY SCHOOL DISTRICT EMERGENCY OPERATIONS PLAN Sharon L. Contreras, Superintendent of Schools Effective Date: September 2014 1 Table of Contents Contents Section I. Introduction:... 4 1.1 Purpose...
RESOLUTION NO. 13-16 TO ADOPT COURT SECURITY MANUAL
RESOLUTION NO. 13-16 TO ADOPT COURT SECURITY MANUAL WHEREAS, the Wisconsin Supreme Court has rule making authority under Wis. Stat. 751.12 and under its administrative authority over all courts conferred
