DEMA s Approach to Risk and Vulnerability Analysis for Civil Contingency Planning
|
|
|
- Janice Woods
- 10 years ago
- Views:
Transcription
1 DEMA s Approach to Risk and Vulnerability Analysis for Civil Contingency Planning On risk and vulnerability analysis in Denmark Risk management techniques, including risk and vulnerability analyses, are used by many private sector companies in Denmark and promoted by various industry associations. Such analyses are not uncommon in the public sector either, and are carried out regularly on subjects such as environmental impact studies, food safety, public health, transportation regulation, infrastructure projects, etc. Within most central government institutions in Denmark, however, systematic use of risk and vulnerability analysis is still not an integrated part of their wider civil contingency planning responsibilities. he Danish National Vulnerability Evaluation (National Sårbarhedsudredning) an inter-departmental, crosssector evaluation from 2004 aimed to alter this situation. he evaluation s main report and its seven subreports can in themselves be said to represent ambitious, but very general, risk and vulnerability analyses for the nation as a whole and for selected sectors of society. he evaluation stressed that risk assessment methods was a still a new area that more central government authorities ought to implement. And one of the 33 specific recommendations was that a generic risk and vulnerability analysis model should be developed for civil contingency planning. his project was subsequently assigned to DEMA, and the model (presented below) was completed in late he official launch took place at a 14 December 2005 National Preparedness Conference, where the model was made available in parallel with DEMA s first annual National Vulnerability Report. he model is (as yet) unfortunately only available in a Danish-language version. Although the tendency should not be exaggerated, interest in risk and vulnerability analysis is now rising among public sector organisations in general, whether to follow up on the National Vulnerability Evaluation, as a result of separate initiatives or to comply with new national and international legislation. A recent quick scan by DEMA has shown, that specific models for risk and/or vulnerability analysis are currently or will soon be used among local fire and rescue services, harbour authorities, electricity and natural gas suppliers, the Danish central bank, the police Security Intelligence Service, the National Centre for Biological Defence, and the National I-and elecom Agency. o further this trend, DEMA s office for Civil Sector Preparedness will actively promote its new model for risk and vulnerability analysis throughout 2006.
2 he benefits of risk and vulnerability analysis In DEMA s view, risk and vulnerability analysis is a tool that can serve the following seven functions: New knowledge and overview: he analysis increases participants knowledge and overview of threats, risks and vulnerabilities. his can in turn help them to identify and prioritise countermeasures, which may prevent incidents, limit impacts, and reduce vulnerabilities. he analysis can also help map unnecessary measures or more effective alternatives. A reliable basis for decision-making: he analysis gathers essential information and recommendations on risks, vulnerabilities and possible countermeasures. his provides an organisation s senior management with a solid background for making decisions about preparedness issues. Effective communication: he analysis can be used to argue the case for suggested or implemented countermeasures both internally and externally. his increases confidence in the organisations preparedness level among both employees and the surrounding society. Exercises: he analysis can be used in connection with scenario-based exercises, training and other competence-building activities Co-ordination between authorities: he analysis can uncover risks and vulnerabilities across society s sectors, organisations and critical functions. Knowledge of the crosscutting dependencies and interdependencies may be used to co-ordinate responses between the various authorities with preparedness responsibilities. Control: he analysis can assist in double-checking that the organisation conforms to relevant legislation, national and international security standards, etc. Strengthening of a preparedness culture : Systematic work with risk and vulnerability analysis may heighten the preparedness culture within an organisation, by making management and staff aware of the threat they could face, and what is required to handle them effectively. If the analyses are conducted regularly, they may also contribute to integrating safety and security issues into ordinary planning activities and business functions. DEMA s generic model for risk and vulnerability analysis Focus: According to the Danish preparedness act, the individual ministers are responsible for planning for the continuity of society s functions, each within their respective areas. However, the act does not specify exactly what these functions are. Correspondingly, DEMA s model focuses on the need for continuity of critical functions in case of large-scale disturbances, accidents or outright catastrophes. By critical functions the model refers to activities and services that are indispensable for society. heir importance is such, that any entire or partial loss could have grave consequences for life, health, property, or the environment. 2
3 arget group: Risk and vulnerability analyses are rarely required by law or regulation in Denmark, and use of DEMA s model will be on a voluntary basis. he model is primarily intended for central government departments and agencies, which hold political oversight and contingency planning responsibilities within their respective sectors. However, all interested parties are welcome to use the model, especially public and private sector owners and operators of critical infrastructure. Potential users may freely adopt the model in full, adapt it to individual requirements, or merely use it as an inspiration. Some will undoubtedly prefer alternative models that are much more detailed and tailored to specific needs. hey are encouraged to continue doing so, if experiences are satisfactory. It is the results that count. Structure and contents: DEMA s model presupposes a process with the three phases illustrated below: I. Preparation phase Organise and plan the work Decide required level of analysis Consider methodological issues III. Follow-up phase Prioritise and recommend countermeasures Report findings Update the analysis II. Analysis phase (use of the model) Determine the scope of the analysis Identify threats and create scenarios Analyse each scenario Compile risk and vulnerability profile Decision-making and implementation he model itself (phase II) consists of four main sections: 1. Determine the scope of the analysis: Initially it must be decided what to include and exclude. he goal for the user organisation should be to identify and focus on those critical functions that must be maintained in case of large-scale disturbances, accidents or catastrophes. his will invariably entail difficult choices as to what constitutes critical functions as opposed to merely important functions. 2. Identify threats and create scenarios: he model contains six pre-defined threat scenarios, along with a catalogue of threats to inspire users to formulate their own additional scenarios. he ideal is to outline realistic scenarios where critical functions are significantly affected ( breaking point ), and which therefore require extraordinary countermeasures. Both worst-case scenarios and frequently occurring events should thus be excluded from the analysis. 3. Analyse each scenario: In this section, users are asked to assess vulnerabilities that may exist in regards to upholding the critical functions under study as well as the risks associated with each scenario. Vulnerabilities are assessed according to existing capacities (or lack thereof) to prevent, mitigate, plan for, respond to and recover from the incident described in the scenario. In order to estimate overall risk levels, numerical values must subsequently be given to likelihood and consequence levels. hese values must be chosen with due consideration to the identified relative levels of vulnerability/robustness. 3
4 4. Compile a risk and vulnerability profile: he model s final section contains an overall risk-matrix (5 by 5). his provides an illustrative graphical comparison of the various threat scenarios analysed in section 3. Furthermore, the profile s diagrams present a visual overview of the most frequently occurring and crosscutting vulnerabilities. he risk and vulnerability profile can thus contribute to subsequent deliberations regarding which possible countermeasures that ought to be prioritised and recommended. erminology: Definitions of terms such as risk and vulnerability are notoriously inconsistent - as even the most sporadic review of literature on the subject will show. Given this fact, DEMA s finds it important not to get bogged down in detailed discussions about which precise definitions may be considered true. All definitions are true - per definition! he point of any definition is simply, that it must be useful, concise and mutually comprehensible in the specific context it is used in. In the context of DEMA s model, the following definitions are offered, with an explicit acknowledgement that alternative interpretations are fully possible. Risk and vulnerability analysis: An analytical tool with which users may systematically identify and evaluate threats, risks and vulnerabilities, with a view to formulating prioritised suggestions for countermeasures. hreat: Any adverse circumstance, indication, potential incident or other disruptive challenge. A threat may stem form natural, human, organisational, or technological factors. A threat may be malicious/intended or accidental/unintended, and it may be pre-warned on unexpected. A threat-scenario is an imagined sequence of events, where one or more threats may come into play. hreat-identification asks questions regarding the sources, characteristics, causes, and targets of threats. he likelihood and potential consequences if a threat materialises into an incident, on the other hand, are dealt with in the subsequent risk-assessment. Risk: Risk is a product of the likelihood of an incident (a materialised threat) and its possible consequences. However, both likelihood and consequences are affected by the vulnerabilities within the system the threat is directed against. Risk assessment can therefore not be carried out in isolation, but must take into account the relative degree of vulnerability/resilience. For malicious threats it is particularly difficult to produce likelihood assessments, due to the uncertain human factor and lack of historical data. It is typical therefore for these assessments to be treated as indications of the plausibility, and surrogate measures for likelihood. Vulnerability: A measure of a given systems strengths and weaknesses concerning its ability to function effectively, when faced by threats. A system is vulnerable if it lacks or has a significantly reduced capacity to plan for, prevent, mitigate, respond to or recover from a materialised threat. he opposite of vulnerability is resilience. Vulnerability assessment can be illustrated by the figure below (inspired be James Reasons Accident Causation Model (also known as the Swiss cheese model ). 4
5 Vulnerabilities H R E A A R G E Resilience: Capacities to plan for, prevent, mitigate, respond to, or recover from a threat Format and underlying principles: DEMA s model has been developed in a user-friendly electronic format. Practical use takes place via a team-based approach, where participants must reach consensus in formulating relatively short answers to the numerous questions in the model. he users are guided through this process by a combination of open-ended text fields, predefined checklists, drop-down menus and wizards. he team-based environment stimulates structured brainstorming sessions, and the composition of the analysis team is in many ways the prime guarantee for the success of the project. he broader the areas of expertise, the more credibility will be assigned to the results. Given that risk and vulnerability analysis will invariably be subject to a great degree of uncertainty, DEMA s model relies almost exclusively on qualitative rather than quantitative assessments. Rather than hard data and objective truths, perceptions of risks and vulnerabilities will depend on individual competencies, experiences, beliefs and even ethics among the users of the model. From this follows, that the process cannot be planned or carried out in a strictly scientific or objective manner. Or as Albert Einstein once put it: Not everything that can be counted counts and not everything that counts can be counted. Since normative elements cannot be avoided, the users should strive for the highest possible degree of transparency. A precondition for this is a free and open dialog throughout the process something that will also help avoid group-think, where critical thinking is suppressed in order to facilitate feelings of unity. Broader framework: he model can be treated as a stand-alone tool, but its use should ideally be viewed as an integrated part of wider risk management practices. As such, it may be seen at the first step in a process, which DEMA refers to, as the Comprehensive Preparedness Planning Cycle. he latter includes a total of six steps: i) he establishment of objectives and organisation; ii) Risk and vulnerability analysis; iii) Prevention; iv) Preparedness; v) Competence development; and vi) Evaluation. he development of DEMA s model and its methodology o ensure that the requirements of potential users of the model were taken into account, DEMA appointed a focus group with representatives from the Danish Security Intelligence Service, the National I and elecom Agency, the Danish Energy Authority, and the electricity and natural gas sectors. he broad guidelines agreed to by the focus group included that the forthcoming model should: 5
6 1. Be easy to use and operate with a concise and easily comprehensible terminology 2. Be scenario-based and primarily rely on qualitative rather than quantitative data 3. Involve structured, team-based, and preferably multi-disciplinary work processes 4. Adopt a flexible format which allows for sector-specific adjustments and modifications 5. Consist of an electronic tool rather than just a written guide - given that the latter often prove more difficult to operationalise when analyses are conducted in praxis In developing the model, DEMA also drew inspiration from the comprehensive literature on risk management and on risk and vulnerability analysis. In particular, we reviewed handbooks, manuals, self-assessment tools etc. from Canada, the US, the UK, Norway, Sweden, Switzerland, Germany and the Netherlands. Our studies included open-source material from both central and local governments, research institutions and private companies. Close attention was also paid to relevant on-going work within the EU, NAO and the OECD. On the above background, it was decided to base DEMA s model on the method known as Preliminary Hazard Analysis (PrHA). here are a number of advantages associated with this method, including that it: Does not require prior knowledge of risk and vulnerability analysis among users Can be applied in connection with general analyses of most systems and activities Can be applied even though users do not have access to detailed technical or statistical data Can be carried out by a small group by means of review meetings and, if applicable, field inspections In addition to relying on PrHA, DEMA s model is characterised by the so-called all-hazards approach, which means that it can take into account all types of threats regardless of their cause. Similarly, the model promotes an approach whereby contingency planning (where focus is mainly on risks, i.e. probabilities and consequences) complements continuity planning (where focus is mainly on vulnerability/resilience). Case Study: Adaptation of DEMA s model for the electricity and natural gas sectors Following new legislation issued in January 2005, vulnerability assessments will become mandatory within the Danish electricity and gas sectors from he vulnerability assessments must be carried out by each individual company, and subsequently used in collective vulnerability assessments by Energinet.dk - the state-owned transmission system operator for electricity and gas. he vulnerability assessments will form the basis for much more comprehensive contingency and continuity plans at both company and sector level. In order to assist the companies, Energinet.dk has adapted DEMA s model for risk and vulnerability analysis to sector-specific needs and requirements. Energinet.dk s model maintains the basic structure and content 6
7 but it has been modified in regards to certain scenarios, questions, and graphics. Moreover, the scope has been limited exclusively to risk and vulnerability with respect to upholding the provision of electricity and gas. A few differences of opinion emerged during the collaboration between DEMA and Energinet.dk, which illustrate that definitions of terms vary considerably. For instance, DEMA s model defines risk as a function of likelihood and consequences. hese two variables are divided into five levels, resulting in a risk matrix with 25 risk level categories. In contrast, Energinet.dk chose to concentrate on consequences and exclude likelihood, which they see as either predetermined in the scenarios or beyond the expertise of ordinary users to assess. As a result, Energinet.dk s model merely has a consequence matrix with 5 categories. Feedback from seven electricity companies participating in a pilot project has indicated overall satisfaction with the model. Some issues have been raised, however, demonstrating that a uniform understanding of all aspects of the model is not easily obtained. A few companies have, for example, expressed that they find the predefined scenarios lacking in detail whilst others find that they are in fact too detailed. he pilot project has also shown that the companies find it easier to assess consequence for their own business, than to assess derived consequences that failure to maintain energy supply may inflict on the surrounding society. 7
Danish Emergency Management Agency. Crisis Management in Denmark
Danish Emergency Management Agency Crisis Management in Denmark 1 Crisis Management in Denmark Published by: Danish Emergency Management Agency Datavej 16 3460 Birkerød Phone: +45 45 90 60 00 Fax: +45
ENGINEERING COUNCIL. Guidance on Risk for the Engineering Profession. www.engc.org.uk/risk
ENGINEERING COUNCIL Guidance on Risk for the Engineering Profession www.engc.org.uk/risk This guidance describes the role of professional engineers and technicians in dealing with risk, and their responsibilities
BUSINESS CONTINUITY PLANNING
Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,
Section A: Introduction, Definitions and Principles of Infrastructure Resilience
Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose
Business Continuity Business Continuity Management Policy
Business Continuity Business Continuity Management Policy : Date of Issue: 28 January 2009 Version no: 1.1 Review Date: January 2010 Document Owner: Patricia Hughes Document Authoriser: Tony Curtis 1 Version
Corporate Risk Management Policy
Corporate Risk Management Policy Managing the Risk and Realising the Opportunity www.reading.gov.uk Risk Management is Good Management Page 1 of 19 Contents 1. Our Risk Management Vision 3 2. Introduction
Guidance on Risk Management, Internal Control and Related Financial and Business Reporting
Guidance Corporate Governance Financial Reporting Council September 2014 Guidance on Risk Management, Internal Control and Related Financial and Business Reporting The FRC is responsible for promoting
Integrated Risk Management:
Integrated Risk Management: A Framework for Fraser Health For further information contact: Integrated Risk Management Fraser Health Corporate Office 300, 10334 152A Street Surrey, BC V3R 8T4 Phone: (604)
A Risk Management Standard
A Risk Management Standard Introduction This Risk Management Standard is the result of work by a team drawn from the major risk management organisations in the UK, including the Institute of Risk management
Volunteer Managers National Occupational Standards
Volunteer Managers National Occupational Standards Contents 00 Forward 00 Section 1 Introduction 00 Who are these standards for? 00 Why should you use them? 00 How can you use them? 00 What s in a Standard?
Business Continuity Policy. Version 1.0
Business Continuity Policy Version.0 January 206 Contents Contents Version control Foreword Policy. Scope.2 Aim and objectives.3 Methods and standards.4 Responsibilities.5 Governance.6 Training and exercises
Key functions in the system of governance Responsibilities, interfaces and outsourcing under Solvency II
Responsibilities, interfaces and outsourcing under Solvency II Author Lars Moormann Contact solvency [email protected] January 2013 2013 Münchener Rückversicherungs Gesellschaft Königinstrasse 107,
PSPSOHS606A Develop and implement crisis management processes
PSPSOHS606A Develop and implement crisis management processes Revision Number: 1 PSPSOHS606A Develop and implement crisis management processes Modification History Not applicable. Unit Descriptor Unit
Desktop Scenario Self Assessment Exercise Page 1
Page 1 Neil Jarvis Head of IT Security & IT Risk DHL Page 2 From reputation to data loss - how important is business continuity? Neil Jarvis Head of IT Security (EMEA) DHL Logistics IT Security Taking
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach Executing a Critical Infrastructure Risk Management Approach Risk is defined as the potential for an unwanted outcome resulting
The Danish Cyber and Information Security Strategy
February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives
Business Continuity Policy
Business Continuity Policy St Mary Magdalene Academy V1.0 / September 2014 Document Control Document Details Document Title Document Type Business Continuity Policy Policy Version 2.0 Effective From 1st
TERRITORIAL PLANNING FOR THE MANAGEMENT OF RISK IN EUROPE
, Territorial págs. Planning 383-388 for the Management of Risk in Europe TERRITORIAL PLANNING FOR THE MANAGEMENT OF RISK IN EUROPE Mark Fleischhauer, Stefan Greiving & Sylvia Wanczura Universität Dortmund
Sector Development Ageing, Disability and Home Care Department of Family and Community Services (02) 8270 2218
Copyright in the material is owned by the State of New South Wales. Apart from any use as permitted under the Copyright Act 1968 and/or as explicitly permitted below, all other rights are reserved. You
CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD
CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Click on tabs below FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Food and drink manufacturers
EBA final draft Regulatory Technical Standards
EBA/RTS/2014/11 18 July 2014 EBA final draft Regulatory Technical Standards on the content of recovery plans under Article 5(10) of Directive 2014/59/EU establishing a framework for the recovery and resolution
INDICATIVE GUIDELINES ON EVALUATION METHODS: EVALUATION DURING THE PROGRAMMING PERIOD
EUROPEAN COMMISSION DIRECTORATE-GENERAL REGIONAL POLICY Thematic development, impact, evaluation and innovative actions Evaluation and additionality The New Programming Period 2007-2013 INDICATIVE GUIDELINES
D 1. Working with people Develop productive working relationships with colleagues. Unit Summary. effective performance.
1 Develop productive working relationships with colleagues Unit Summary What is the unit about? This unit is about developing working relationships with colleagues, within your own organisation and within
Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative
Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following
OECD WATCH MULTISTAKEHOLDER CONFERENCE 1, April 2005, Brussels Putting the OECD Guidelines for MNEs into Practice
OECD WATCH MULTISTAKEHOLDER CONFERENCE 1, April 2005, Brussels Putting the OECD Guidelines for MNEs into Practice Working Group 3: GOVERNMENTS AND THE OECD GUIDELINES FOR MNEs Proposal for Improving the
13. Lifeline utilities
13. Lifeline utilities Summary Lifeline utilities are entities that provide infrastructure services to the community such as water, wastewater, transport, energy and telecommunications. Lifeline utilities
Public Health Emergency Preparedness Protocol, 2015
Public Health Emergency Preparedness Protocol, 2015 Preamble The Ontario Public Health Standards (OPHS) are published by the Minister of Health and Long- Term Care under the authority of the Health Protection
STRESS TESTING GUIDELINE
STRESS TESTING GUIDELINE JUIN 2012 Table of Contents Preamble... 2 Introduction... 3 Scope... 5 Coming into effect and updating... 6 1. Stress testing... 7 A. Concept... 7 B. Approaches underlying stress
Strategy for data collection
2007/21 Plans and reports Strategy for data collection Strategy for data collection The demand for statistics and public administrative information is increasing, as are the demands on quality in statistics
THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK
THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK ACCOUNTABLE SIGNATURE AUTHORISED for implementation SIGNATURE On behalf of Chief Executive Officer SAHRA Council Date Date
Strategic Alliance. Business Continuity Policy
Version 1.1 April 2016 Contents Contents Version control Foreword Policy Scope Aim and objectives Methods and standards Responsibilities Governance Training and exercises Page i ii 1 2 2 2 Version 1.1
BUSINESS CONTINUITY POLICY
BUSINESS CONTINUITY POLICY Document Type Corporate Policy Unique Identifier CO-038 Document Purpose To provide a structure through which: i. A comprehensive business continuity management system (BCMS)
Bus incident management planning: Guidelines
Bus incident management planning: Guidelines What is incident management planning? Incident management planning is everything your business does to prepare for potential disruptive or damaging incidents.
ENTERPRISE RISK MANAGEMENT FRAMEWORK
ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...
1.0 Policy Statement / Intentions (FOIA - Open)
Force Policy & Procedure Reference Number Business Continuity Management D269 Policy Version Date 23 July 2015 Review Date 23 July 2016 Policy Ownership Portfolio Holder Links or overlaps with other policies
HEALTH, SAFETY, ENVIRONMENT AND COMMUNITY MANAGEMENT STANDARDS. OCTOBER 2011- ISSUE No 01. Doc No: HSEC MS 001
HEALTH, SAFETY, ENVIRONMENT AND COMMUNITY MANAGEMENT S OCTOBER 2011- ISSUE No 01 Doc No: MS 001 Introduction Celtique Energie is in the business of exploring for oil and gas in proven basins in Europe.
CODE OF PRACTICE. Safety Management. Occupational Safety and Health Branch Labour Department CODE OF PRACTICE ON SAFETY MANAGEMENT 1
CODE OF PRACTICE On Safety Management Occupational Safety and Health Branch Labour Department CODE OF PRACTICE ON SAFETY MANAGEMENT 1 This Code of Practice is prepared by the Occupational Safety and Health
BUSINESS CONTINUITY PLAN
>Insert Company Logo Here< >Insert Company Name Here< BUSINESS CONTINUITY PLAN Date Version Author Address Telephone (Landline/Mobile) E-mail Plan Approval Approved By (Please print) Signature Date Page
10. Lifeline utilities
10. Lifeline utilities Summary Lifeline utilities are entities that provide infrastructure services to the community such as water, wastewater, transport, energy and telecommunications. Lifeline utilities
Framework for an Aviation Security Management System (SeMS)
Framework for an Aviation Security Management System (SeMS) CAP 1223 Civil Aviation Authority 2014 All rights reserved. Copies of this publication may be reproduced for personal use, or for use within
Enterprise Risk Management Framework 2012 2016. Strengthening our commitment to risk management
Enterprise Risk Management Framework 2012 2016 Strengthening our commitment to risk management Contents Director-General s message... 3 Introduction... 4 Purpose... 4 What is risk management?... 4 Benefits
Risk Management Policy Adopted by:
Risk Management Policy Adopted by: Infigen Energy Limited Infigen Energy (Bermuda) Limited Infigen Energy RE Limited in its capacity as Responsible Entity of Infigen Energy Trust Adopted: 17 December 2009
Title: Rio Tinto management system
Standard Rio Tinto management system December 2014 Group Title: Rio Tinto management system Document No: HSEC-B-01 Standard Function: Health, Safety, Environment and Communities (HSEC) No. of pages: 23
13 ENVIRONMENTAL AND SOCIAL MANAGEMENT SYSTEM
13 ENVIRONMENTAL AND SOCIAL MANAGEMENT SYSTEM This ESIA has identified impacts (both positive and negative) to the physical, natural and socio-economic environments, as well as to community and worker
Guidelines on operational functioning of colleges
EIOPA-BoS-14/146 EN Guidelines on operational functioning of colleges EIOPA Westhafen Tower, Westhafenplatz 1-60327 Frankfurt Germany - Tel. + 49 69-951119-20; Fax. + 49 69-951119-19; email: [email protected]
GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
Guide to. Risk and vulnerability analyses
Guide to Risk and vulnerability analyses 1 2 Guide to Risk and vulnerability analyses Guide to risk and vulnerability analyses Swedish Civil Contingencies Agency (MSB) Editors: Jonas Eriksson, Anna-Karin
FINAL DOCUMENT. Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Part 1: General Requirements
GHTF/SG4/N28R4:2008 FINAL DOCUMENT Title: Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Authoring Group: GHTF Study Group 4 Endorsed by: The Global Harmonization
Monitoring and Evaluation of. Interventions
Monitoring and Evaluation of Sports in Development (SiD) Interventions presented by: Pamela K. Mbabazi, Ph.D. Faculty of Development Studies, Department of Development Studies Mbarara University of Science
ISO 19600: The development
1 Baltzer Science Publishers ISO 19600: The development of a global standard on compliance management By Sylvie Bleker and Dick Hortensius* It has been a traditional complaint of the global compliance
BSO Board Director of Human Resources & Corporate Services Business Continuity Policy. 28 February 2012
To: From: Subject: Status: Date of Meeting: BSO Board Director of Human Resources & Corporate Services Business Continuity Policy For Approval 28 February 2012 The Board is asked to agree the attached
Business Continuity Management
Business Continuity Management Factsheet To prepare for change, change the way you prepare In an intensely competitive environment, a permanent market presence is essential in order to satisfy customers
Assurance Engagements
IFAC International Auditing and Assurance Standards Board March 2003 Exposure Draft Response Due Date June 30, 2003 Assurance Engagements Proposed International Framework For Assurance Engagements, Proposed
Master of Science in Risk Management and Safety Engineering at Lund University, Sweden. Johan Lundin & Robert Jönsson
The Risk Management and Safety Engineering Programme Johan Lundin Master of Science in Risk Management and Safety Engineering at Lund University, Sweden Johan Lundin & Robert Jönsson The Risk Management
CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT
CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT JANUARY 2008 GUIDELINE ON BUSINESS CONTINUITY GUIDELINE CBK/PG/14
The European and UK Space Agencies
The European and UK Space Agencies A response to the House of Commons Science and Technology Select Committee April 2013 Introduction The Royal Academy of Engineering is pleased to submit evidence to the
The promise and pitfalls of cyber insurance January 2016
www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped
SFJCCAD2 Promote business continuity management
Overview This unit is about providing advice and assistance on business continuity management, including general advice for the business and voluntary sectors, and specific advice and assistance to individual
Governance and Risk Management in the Public Sector. Fernando A. Fernandez Inter-American Development Bank (202) 623-1430 e-mail: fernandof@iadb.
Governance and Risk Management in the Public Sector Fernando A. Fernandez Inter-American Development Bank (202) 623-1430 e-mail: [email protected] 1 Agenda Governance, why is it important? Compliance
PRINCIPLES FOR EVALUATION OF DEVELOPMENT ASSISTANCE
PRINCIPLES FOR EVALUATION OF DEVELOPMENT ASSISTANCE DEVELOPMENT ASSISTANCE COMMITTEE PARIS, 1991 DAC Principles for Evaluation of Development Assistance Development Assistance Committee Abstract: The following
ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT
2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of
How to write a DISASTER RECOVERY PLAN. To print to A4, print at 75%.
How to write a DISASTER RECOVERY PLAN To print to A4, print at 75%. TABLE OF CONTENTS SUMMARY SUMMARY WHAT IS A DRP AND HOW CAN IT HELP MY COMPANY? CHAPTER PREPARING TO WRITE YOUR DISASTER RECOVERY PLAN
On the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation
Nuclear Safety Council Instruction number IS-19, of October 22 nd 2008, on the requirements of the nuclear facilities management system
Nuclear Safety Council Instruction number IS-19, of October 22 nd 2008, on the requirements of the nuclear facilities management system Published in the Official State Gazette (BOE) number 270 of November
Risk Management Strategy EEA & Norway Grants 2009-2014. Adopted by the Financial Mechanism Committee on 27 February 2013.
Risk Management Strategy EEA & Norway Grants 2009-2014 Adopted by the Financial Mechanism Committee on 27 February 2013. Contents 1 Purpose of the strategy... 3 2 Risk management as part of managing for
Frequently Asked Questions
Frequently Asked Questions The G4 FAQ document has been prepared by the Standards Division as supporting material for G4 stakeholders. However, the prime references for any interpretation and guidance
Business Continuity Planning and Disaster Recovery Planning
4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business
Checklist for Operational Risk Management
Checklist for Operational Risk Management I. Development and Establishment of Comprehensive Operational Risk Management System by Management Checkpoints - Operational risk is the risk of loss resulting
ISRE 2400 (Revised), Engagements to Review Historical Financial Statements
International Auditing and Assurance Standards Board Exposure Draft January 2011 Comments requested by May 20, 2011 Proposed International Standard on Review Engagements ISRE 2400 (Revised), Engagements
Business Continuity (Policy & Procedure)
Business Continuity (Policy & Procedure) Publication Scheme Y/N Can be published on Force Website Department of Origin Force Operations Policy Holder Ch Supt Head of Force Ops Author Business Continuity
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS CISM ITEM DEVELOPMENT GUIDE Content Page Purpose of the CISM Item Development Guide 2 CISM Exam Structure 2 Item Writing Campaigns 2 Why Participate as a CISM
ENTERPRISE RISK MANAGEMENT FRAMEWORK
ROCKHAMPTON REGIONAL COUNCIL ENTERPRISE RISK MANAGEMENT FRAMEWORK 2013 Adopted 25 June 2013 Reviewed: October 2015 TABLE OF CONTENTS 1. Introduction... 3 1.1 Council s Mission... 3 1.2 Council s Values...
Feasibility study for the Design and Implementation of Demandside Innovation Policy Instruments in Estonia
Feasibility study for the Design and Implementation of Demandside Innovation Policy Instruments in Estonia Case Study on the demand-side elements of the Danish innovation policy mix, the Market Development
FlyntGroup.com. Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk
Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk 2012 The Flynt Group, Inc., All Rights Reserved FlyntGroup.com Enterprise Risk Management and Business
Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery
Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and
Information Governance Strategy
Information Governance Strategy Document Status Draft Version: V2.1 DOCUMENT CHANGE HISTORY Initiated by Date Author Information Governance Requirements September 2007 Information Governance Group Version
BUSINESS CONTINUITY MANAGEMENT IN THE PUBLIC SECTOR A ROUGH GUIDE
BUSINESS CONTINUITY MANAGEMENT IN THE PUBLIC SECTOR A ROUGH GUIDE Introduction 1. Recently many organisations both public and private have directed much more time, money and effort towards protecting service
Call topics. September 2013. 2013 SAF RA joint call on Human and organizational factors including the value of industrial safety
Call topics 2013 SAF RA joint call on Human and organizational factors including the value of industrial safety September 2013 SAF RA is an ERA-NET on industrial safety funded by the European Commission
Practice guide. quality assurance and IMProVeMeNt PrograM
Practice guide quality assurance and IMProVeMeNt PrograM MarCh 2012 Table of Contents Executive Summary... 1 Introduction... 2 What is Quality?... 2 Quality in Internal Audit... 2 Conformance or Compliance?...
Reputation. Further excellence. business continuity. risk management. Data security
Reputation competitive advantage speed to market safety Further excellence trust Data security risk management business continuity HOW CAN YOU CREATE AND SECURE SUSTAINABLE BUSINESS? SOLUTIONS FOR MANAGING
POL ENTERPRISE RISK MANAGEMENT SC51. Executive Services Department BUSINESS UNIT: Executive Support Services SERVICE UNIT:
POL ENTERPRISE RISK MANAGEMENT SC51 POLICY CODE: SC51 DIRECTORATE: Executive Services Department BUSINESS UNIT: Executive Support Services SERVICE UNIT: Executive Support Services RESPONSIBLE OFFICER:
Insurer Governance Principles 1
Insurer Governance Principles 1 PREAMBLE The Governance Principles, referred to below as the Code, were drafted by the Dutch Association of Insurers (Verbond van Verzekeraars, also referred to as the Association
Oversight of payment and securities settlement systems by the Swiss National Bank
Oversight of payment and securities settlement systems by the Swiss National Bank May 2009 By Andy Sturm Over the past few decades, the Swiss National Bank (SNB) has devoted more attention to issues related
Sample Model Security Management Plan
Sample Model Security Management Plan Element #1: Policy Statement (Security Management is an important enough topic that developing a policy statement, and publishing it with the program, is a critical
Islamic Republic of Afghanistan, Post Disaster Need Assessment (PDNA) Training Manual
Islamic Republic of Afghanistan, Ministry of Rural Rehabilitation and Development (MRRD) Ministry of Rural Rehabilitation & Development Post Disaster Need Assessment (PDNA) Training Manual Social Protection
Victorian Government Risk Management Framework. March 2015
Victorian Government Risk Management Framework March 2015 This document reproduces parts of the AS/NZS ISO 31000:2099 Risk Management Principles and Guidelines. Permission has been granted by SAI Global
DG ENLARGEMENT SECTOR BUDGET SUPPORT GUIDELINES
Ref. Ares(2014)571140-04/03/2014 DG ENLARGEMENT SECTOR BUDGET SUPPORT GUIDELINES EXECUTIVE SUMMARY January 2014 TABLE OF CONTENTS Introduction 1. RATIONALE FOR BUDGET SUPPORT 1.1 What is Budget Support?
