File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)
|
|
|
- Lynn Hicks
- 10 years ago
- Views:
Transcription
1 File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014) Appendix A -- Minimum Security Standards for Level Federal Facilities [This is an appendix to 36 CFR Note: A Level facility has between 151 and 450 Federal employees. In addition, the facility likely has from 80,000 to 150,000 square feet; A moderate / high volume of public contact; and tenant agencies that may include law enforcement agencies, court / related agencies and functions, and government records and archives.] Reproduced from Section 2.3 (pp. 2-6 through 2-9) of U.S. Department of Justice, United States Marshals Service report Vulnerability Assessment of Federal Facilities RECOMMENDED STANDARDS CHART PERIMETER SECURITY CONTROL OF FACILITY CONTROL OF ADJACENT AVOID LEASES WHERE CANNOT BE CONTROLLED LEASES SHOULD PROVIDE SECURITY CONTROL FOR ADJACENT POST SIGNS AND ARRANGE FOR TOWING UNAUTHORIZED VEHICLES ID SYSTEM AND PROCEDURES FOR AUTHORIZED (PLACARD, DECAL, CARD KEY, ETC.) ADEQUATE LIGHTING FOR AREAS CLOSED CIRCUIT TELEVISION (CCTV) MONITORING CCTV SURVEILLANCE CAMERAS WITH TIME LAPSE VIDEO RECORDING POST SIGNS ADVISING OF 24 HOUR VIDEO SURVEILLANCE LIGHTING LIGHTING WITH EMERGENCY POWER BACKUP PHYSICAL BARRIERS EXTEND PHYSICAL PERIMETER WITH BARRIERS (CONCRETE AND/OR STEEL COMPOSITION) BARRIERS ENTRY SECURITY RECEIVING / SHIPPING REVIEW RECEIVING/SHIPPING PROCEDURES (CURRENT) IMPLEMENT RECEIVING/SHIPPING PROCEDURES (MODIFIED) ACCESS CONTROL EVALUATE FACILITY FOR SECURITY GUARD REQUIREMENTS SECURITY GUARD PATROL INTRUSION DETECTION SYSTEM WITH CENTRAL MONITORING CAPABILITY UPGRADE TO CURRENT LIFE SAFETY STANDARDS (FIRE DETECTION, FIRE SUPPRESSION SYSTEMS, ETC.) ENTRANCES / EXITS X-RAY & MAGNETOMETER AT PUBLIC ENTRANCES 1
2 REQUIRE X-RAY SCREENING OF ALL MAIL/PACKAGES HIGH SECURITY LOCKS INTERIOR SECURITY EMPLOYEE / VISITOR IDENTIFICATION AGENCY PHOTO ID FOR ALL PERSONNEL DISPLAYED AT ALL TIMES VISITOR CONTROL/SCREENING SYSTEM VISITOR IDENTIFICATION ACCOUNTABILITY SYSTEM ESTABLISH ID ISSUING AUTHORITY UTILITIES PREVENT UNAUTHORIZED ACCESS TO UTILITY AREAS PROVIDE EMERGENCY POWER TO CRITICAL SYSTEMS (ALARM SYSTEMS, RADIO COMMUNICATIONS, COMPUTER FACILITIES, ETC.) OCCUPANT EMERGENCY PLANS EXAMINE OCCUPANT EMERGENCY PLANS (OEP) AND CONTINGENCY PROCEDURES BASED ON THREATS OEPs IN PLACE, UPDATED ANNUALLY, PERIODIC TESTING EXERCISE ASSIGN & TRAIN OEP OFFICIALS (ASSIGNMENT BASED ON LARGEST TENANT IN FACILITY) ANNUAL TENANT TRAINING DAYCARE CENTERS EVALUATE WHETHER TO LOCATE DAYCARE FACILITIES IN BUILDINGS WITH HIGH THREAT ACTIVITIES COMPARE FEASIBILITY OF LOCATING DAYCARE IN OUTSIDE LOCATIONS SECURITY PLANNING INTELLIGENCE SHARING ESTABLISH LAW ENFORCEMENT AGENCY/SECURITY LIAISONS REVIEW/ESTABLISH PROCEDURE FOR INTELLIGENCE RECEIPT/DISSEMINATION ESTABLISH UNIFORM SECURITY/THREAT NOMENCLATURE TRAINING CONDUCT ANNUAL SECURITY AWARENESS TRAINING ESTABLISH STANDARDIZED UNARMED GUARD QUALIFICATIONS/ TRAINING REQUIREMENTS ESTABLISH STANDARDIZED ARMED GUARD QUALIFICATIONS/ TRAINING REQUIREMENTS TENANT ASSIGNMENT CO-LOCATE AGENCIES WITH SIMILAR SECURITY NEEDS DO NOT CO-LOCATE HIGH/LOW RISK AGENCIES ADMINISTRATIVE PROCEDURES ESTABLISH FLEXIBLE WORK SCHEDULE IN HIGH THREAT/ HIGH RISK AREAS TO MINIMIZE EMPLOYEE VULNERABILITY TO CRIMINAL ACTIVITY ARRANGE FOR EMPLOYEE IN/NEAR BUILDING AFTER NORMAL WORK HOURS CONDUCT BACKGROUND SECURITY CHECKS AND/OR ESTABLISH SECURITY CONTROL PROCEDURES FOR SERVICE CONTRACT PERSONNEL CONSTRUCTION/RENOVATION INSTALL MYLAR FILM ON ALL EXTERIOR WINDOWS (SHATTER PROTECTION) REVIEW CURRENT PROJECTS FOR BLAST STANDARDS 2
3 REVIEW/ESTABLISH UNIFORM STANDARDS FOR CONSTRUCTION REVIEW/ESTABLISH NEW DESIGN STANDARD FOR BLAST RESISTANCE ESTABLISH STREET SET-BACK FOR NEW CONSTRUCTION Vulnerability Assessment U.S. Department of Justice United States Marshals Service B.1 Perimeter Security Appendix B Details of Security Standards CONTROL OF FACILITY CONTROL OF ADJACENT AVOID LEASES WHERE CANNOT BE CONTROLLED LEASE SHOULD PROVIDE CONTROL FOR ADJACENT POST SIGNS AND ARRANGE FOR TOWING UNAUTHORIZED VEHICLES ID SYSTEM AND PROCEDURES FOR AUTHORIZED ADEQUATE LIGHTING FOR AREAS Access to government parking should be limited where possible to government vehicles and personnel. At a minimum, authorized parking spaces and vehicles should be assigned and identified. Where feasible, parking areas adjacent to federal space should also be controlled to reduce the potential for threats against Federal facilities and employee exposure to criminal activity. Avoid leasing facilities where parking cannot be controlled. If necessary, relocate offices to facilities that do provide added security through regulated parking. Endeavor to negotiate guard services as part of lease. Procedures should be established and implemented to alert the public to towing policies, and the removal of unauthorized vehicles. Procedures should be established for identifying vehicles and corresponding parking spaces. (placard, decal, card key, etc.) Effective lighting provides added safety for employees and deters illegal or threatening activities. CLOSED CIRCUIT TELEVISION (CCTV MONITORING CCTV SURVEILLANCE CAMERAS WITH TIME LAPSE VIDEO RECORDING POST SIGNS ADVISING OF 24 HOUR VIDEO SURVEILLANCE Twenty-four hour CCTV surveillance and recording is desirable at all locations as a deterrent. Requirements will depend on assessment of the security level for each facility. Time-lapse video recordings are also highly valuable as a source of evidence and investigative leads Warning signs advising of twenty-four hour surveillance act as a deterrent in protecting employees and facilities. LIGHTING LIGHTING WITH EMERGENCY POWER BACKUP PHYSICAL BARRIERS EXTEND PHYSICAL PERIMETER, WITH BARRIERS BARRIERS Standard safety code requirement in virtually all areas. Provides for safe evacuation of buildings in case of natural disaster, power outage, or criminal/terrorist activity. This security measure will only be possible in locations where the Government controls the property and where physical constraints are not present. (barriers of concrete and/or steel composition) to prevent unauthorized vehicle access. B.2 Entry Security 3
4 RECEIVING / SHIPPING REVIEW RECEIVING/SHIPPING PROCEDURES (CURRENT) IMPLEMENT RECEIVING/SHIPPING PROCEDURES (MODIFIED) ACCESS CONTROL EVALUATE FACILITY FOR SECURITY GUARD REQUIREMENTS SECURITY GUARD PATROL INTRUSION DETECTION SYSTEM WITH CENTRAL MONITORING CAPABILITY UPGRADE TO CURRENT LIFE SAFETY STANDARDS Audit current standards for package entry and suggest ways to enhance security. After auditing procedures for receiving/shipping, implement improved procedures for security enhancements. If security guards are required, the number of guards at any given time will depend on the size of the facility, the hours of operation, and current risk factors, etc. for level I and II facilities and may be included as lease option. Level, IV and V facilities will have security guard patrol based on facility evaluation. in Level I facilities, based on evaluation for Level II facilities, and required for Levels, IV and V. for all facilities as part of GSA design requirements, (e.g. fire detection, fire suppression systems, etc.) ENTRANCES / EXITS X-RAY AND MAGNETOMETER AT PUBLIC ENTRANCES REQUIRE X-RAY SCREENING OF ALL MAIL/PACKAGES HIGH SECURITY LOCKS May be impractical for Level I and II facilities. Level and IV evaluations would focus on tenant agencies, public interface, and feasibility. for Level V. All packages entering building should be subject to x-ray screening and/or visual inspection. Any exterior entrance should have a high security lock as determined by GSA specifications and/or agency requirements. B.3 Interior Security EMPLOYEE/VISITOR IDENTIFICATION AGENCY PHOTO ID FOR ALL PERSONNEL DISPLAYED AT ALL May not be required in smaller facilities. TIMES VISITOR CONTROL/SECURITY SYSTEM VISITOR ID ACCOUNTABILITY SYSTEM ESTABLISH ID ISSUING AUTHORITY Visitors should be readily apparent in Level I facilities. Other facilities may ask visitors to sign-in with a receptionist or guard, or require an escort, or formal identification/badge. Stringent methods of control over visitor badges will ensure that visitors wearing badges have been screened and are authorized to be at the facility during the appropriate time frame. Develop procedures and establish authority for issuing employee and visitor IDs. UTILITIES 4
5 PREVENT UNAUTHORIZED ACCESS TO UTILITY AREAS PROVIDE EMERGENCY POWER TO CRITICAL SYSTEMS Smaller facilities may not have control over utility access, or locations of utility areas. Where possible, assure that utility areas are secure and that only authorized personnel can gain entry. Tenant agency is responsible for determining which computer and communication systems require back-up power. All alarm systems, CCTV monitoring devices, fire detection systems, entry control devices, etc. require emergency power sources. (ALARM SYSTEMS, RADIO COMMUNICATIONS, COMPUTER FACILITIES, ETC.) OCCUPANT EMERGENCY PLANS EXAMINE OCCUPANT EMERGENCY PLAN (OEP) AND CONTINGENCY PROCEDURES BASED ON THREATS ASSIGN AND TRAIN OEP OFFICIALS ANNUAL TENANT TRAINING DAY CARE CENTER RE-EVALUATE CURRENT SECURITY AND SAFETY STANDARDS ASSESS FEASIBILITY OF LOCATING DAY CARE WITHIN FEDERAL FACILITY Review and update current OEP procedures for thoroughness. OEPs should reflect the current security climate. Assignment based on GSA requirement that largest tenant in facility maintain OEP responsibility. Officials should be assigned, trained and a contingency plan established to provide for the possible absence of OEP officials in the event of emergency activation of the OEP All tenants should be aware of their individual responsibilities in an emergency situation. Conduct a thorough review of security and safety standards. If a facility is being considered for a day care center, an evaluation should be made based on the risk factors associated with tenants and the location of the facility. B.4 Security Planning INTELLIGENCE SHARING ESTABLISH LAW ENFORCEMENT AGENCY/SECURITY LIAISONS REVIEW/ESTABLISH PROCEDURES FOR INTELLIGENCE RECEIPT/DISSEMINATION ESTABLISH UNIFORM SECURITY/THREAT NOMENCLATURE TRAINING CONDUCT ANNUAL SECURITY AWARENESS TRAINING ESTABLISH STANDARDIZED ARMED Intelligence sharing between law enforcement agencies and security organizations should be established in order to facilitate the accurate flow of timely and relevant information between appropriate government agencies. Agencies involved in providing security must be part of the complete intelligence process. Determine what procedures exist to ensure timely delivery of critical intelligence. Review and improve procedures to alert agencies and specific targets of criminal/terrorist threats. Establish standard administrative procedures for response to incoming alerts. Review flow of information for effectiveness and time critical dissemination. To facilitate communication, standardized terminology for Alert Levels should be implemented. (Normal, Low, Moderate, and High - As recommended by Security Standards Committee) Provide security awareness training for all tenants. At a minimum, selfstudy programs utilizing videos, and literature, etc. should be implemented. These materials should provide up-to-date information covering security practices, employee security awareness, and personal safety, etc. Requirements for these positions should be standardized government 5
6 AND UNARMED GUARD QUALIFICATIONS/ TRAINING REQUIREMENTS TENANT ASSIGNMENT CO-LOCATE AGENCIES WITH SIMILAR SECURITY NEEDS DO NOT CO-LOCATE HIGH/LOW RISK AGENCIES wide. To capitalize on efficiencies and economies, agencies with like security requirements should be located in the same facility if possible. Low risk agencies should not take on additional risk by being located with high risk agencies. ADMINISTRATIVE PROCEDURES ESTABLISH FLEXIBLE WORK SCHEDULE IN HIGH THREAT/HIGH RISK AREA TO MINIMIZE EMPLOYEE VULNERABLITY TO CRIMINAL ACTIVITY. ARRANGE FOR EMPLOYEE IN/NEAR BUILDING AFTER NORMAL WORK HOURS CONDUCT BACKGROUND SECURITY CHECKS AND/OR ESTABLISH SECURITY CONTROL PROCEDURES FOR SERVICE CONTRACT PERSONNEL Flexible work schedules can enhance employee safety by staggering reporting and departure times. As an example flexible schedules might enable employees to park closer to the facility by reducing the demand for parking at peak times of the day. Minimize exposure to criminal activity by allowing employees to park at or inside the building. Establish procedures to ensure security where private contract personnel are concerned. Procedures may be as simple as observation or could include sign-in/escort. Frequent visitors may necessitate a background check with contractor ID issued. CONSTRUCTION/RENOVATION INSTALL MYLAR FILM ON ALL EXTERIOR WINDOWS (SHATTER PROTECTION) REVIEW CURRENT PROJECTS FOR BLAST STANDARDS REVIEW/ESTABLISH UNIFORM STANDARDS FOR CONSTRUCTION REVIEW/ESTABLISH NEW DESIGN STANDARD FOR BLAST RESISTANCE ESTABLISH STREET SET-BACK FOR NEW CONSTRUCTION Application of shatter resistant material to protect personnel and citizens from the hazards of flying glass as a result of impact or explosion. Design and construction projects should be reviewed if possible, to incorporate current technology and blast standards. Immediate review of ongoing projects may generate savings in the implementation of upgrading to higher blast standards prior to completion of construction. Review, establish, and implement uniform construction standards as it relates to security considerations. In smaller facilities or those that lease space, control over design standards may not be possible. However, future site selections should attempt to locate in facilities that do meet standards. New construction of government controlled facilities should review, establish, and implement new design standards for blast resistance. Every foot between a potential bomb and a building will dramatically reduce damage and increase the survival rate. Street set-back is always desirable, but should be used in conjunction with barriers in Level IV and V facilities. Questions? Contact Rick Blondo by at [email protected], by phone on (301) , or by fax on (301)
FACILITY SECURITY CERTIFICATION FORM DOJ SECURITY LEVEL II
FACILITY SECURITY CERTIFICATION FORM DOJ SECURITY LEVEL II AGENCY: FACILITY: ADDRESS: LEASED/OWNED: UPGRADE COSTS: REVIEW TEAM: REVIEW DATE: FACILITY POC: CERTIFIED Y/N: I. PERIMETER SECURITY A.. PARKING
PHASED FACILITY SECURITY PROGRAM DEVELOPMENT HANDBOOK
DEPARTMENT OF COMMERCE OFFICE OF SECURITY HOMELAND SECURITY GUIDANCE PHASED FACILITY SECURITY PROGRAM DEVELOPMENT HANDBOOK HOMELAND SECURITY ADVISORY SYSTEM LOW Low Risk of Terrorist Attacks GUARDED General
Court Security Guidelines
July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative
IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN
IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department
1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.
2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must
Does a fence or other type physical barrier define the perimeter of the facility?
PHYSCIAL SECURITY SURVEY CHECKLIST PERIMETER BARRIERS TRANSIT FACILITIES Does a fence or other type physical barrier define the perimeter of the facility? (1) Specify type and height of physical barrier
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism
Lease Security Standards: Instructions for Lease Acquisitions
Addendum 1 Lease Security Standards: Instructions for Lease Acquisitions 1. Summary. a. The Interagency Security Committee (ISC) Standards will provide a consistent level of security to federal tenants
Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM
BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade
BUILDING DESIGN FOR HOMELAND SECURITY. Unit IV Vulnerability Assessment
Unit IV Vulnerability Assessment Vulnerability Any weakness that can be exploited by an aggressor or, in a non-terrorist threat environment, make an asset susceptible to hazard damage Unit IV-2 Unit Objectives
Security Management Plan
Effective Date: 03/2015 1 of 10 I. Table of Contents: I Table of Contents II Authority III Purpose & Scope IV Policy Statement V The Joint Commission Standards VI Performance Standards VII DUPD Services
A Self-Audit of Your Current Campus Security Systems
A Self-Audit of Your Current Campus Security Systems Security Solutions for Education, Business & Public Safety Free Consultations on ID Card Systems, Access Control, Call Recording, Video Surveillance,
C-TPAT Importer Security Criteria
C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources
Security at San Onofre
Security at San Onofre April 16, 2015 Ross Quam Security Manager Overview 1. Mission 2. Adversary Characteristics 3. Plans and Procedures 4. Insider Mitigation 5. Local Law Enforcement Agency Support 2
Intermec Security Letter of Agreement
Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism
Physical Security for Drinking Water Facilities
Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland
How To Ensure Security At A Site Security Site
Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers
How To Protect A Water System
SECURITY OFFICER & PATROL OFFICER PROTOCOL SECURITY OFFICER LOCATIONS AND SHIFTS La Entrada Main Security Center 24 hour coverage 7 days per week Plant 1 Main Gate Monday Friday, 5:00 AM 6:00 PM Patrol
Current as of 11/10/08 1 of 1
BEST PRACTICES STANDARDS FOR SCHOOLS UNDER CONSTRUCTION OR BEING PLANNED FOR CONSTRUCTION I. Site Layout A. School buildings shall be provided with a securable perimeter. A securable perimeter means that
SCHEME OF EXAMINATION PG DIPLOMA IN CORPORATE AND INDUSTRIAL SECURITY MANAGEMENT (PGDCISM) ONE YEAR PROGRAMME
62 SCHEME OF EXAMINATION PG DIPLOMA IN CORPORATE AND INDUSTRIAL SECURITY MANAGEMENT (PGDCISM) ONE YEAR PROGRAMME Note: 1. There will be 70 multiple choice questions (MCQ s) in the question paper consisting
Todd & Cue Ltd Your Business Continuity Partner
Todd & Cue Ltd Your Business Continuity Partner Preparation and Planning We provide strategies, tools and resources to help you prepare for a business interruption whether it is caused by fire, water,
RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING
U.S. Department of Homeland Security Arlington, VA 22202 RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING Recurrent FSSA Training for Flight School Employees and independent Certified Flight
Security Criteria for C-TPAT Foreign Manufacturers in English
Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building
UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS
UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS 1 DIPLOMATIC SECURITY PROTECTS The Bureau of Diplomatic Security is the security and law enforcement arm of
MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION
MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION 1.0 Objective The purpose of this procedure is to ensure that Toys R Us, Inc. and its manufacturers, suppliers, and warehousemen
APEC Private Sector. Supply Chain Security Guidelines
APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation
C-TPAT Security Criteria Sea Carriers
C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Conducting Security System Site Surveys
Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM
Customs & Trade Partnership Against Terrorism (C TPAT)
Customs & Trade Partnership Against Terrorism (C TPAT) Bristol Myers Squibb Company Customs & Trade & Corporate Security Departments As a result of the events of September 11, 2001, the United States Customs
Statement of objective MALLS & MULTIPLEXES
//1// Statement of objective Security is an important factor today and in establishments that have large numbers of people visiting; it is necessary that they have a basic infrastructure of security. With
CITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
SYRACUSE CITY SCHOOL DISTRICT
SYRACUSE CITY SCHOOL DISTRICT EMERGENCY OPERATIONS PLAN Sharon L. Contreras, Superintendent of Schools Effective Date: September 2014 1 Table of Contents Contents Section I. Introduction:... 4 1.1 Purpose...
EMERGENCY MANAGEMENT IN SCHOOLS
EMERGENCY MANAGEMENT IN SCHOOLS Michelle Roberts and Mark Stephens Emergency and Security Management Branch Department of Education and Training Victoria Paper presented at the The Role of Schools in Crime
Remote Monitoring offers a comprehensive range of services, which are continually
Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have
State of Vermont. Physical Security for Computer Protection Policy
State of Vermont Physical Security for Computer Protection Policy Date Approved: 04-02-10 Approved by: Tom Pelham Policy Number: 0501.012005 Contents 1.0 Introduction... 3 1.1 Authority... 3 1.2 Purpose...
RESOLUTION NO. 13-16 TO ADOPT COURT SECURITY MANUAL
RESOLUTION NO. 13-16 TO ADOPT COURT SECURITY MANUAL WHEREAS, the Wisconsin Supreme Court has rule making authority under Wis. Stat. 751.12 and under its administrative authority over all courts conferred
Silent Safety: Best Practices for Protecting the Affluent
Security Checklists Security Checklists 1. Operational Security Checklist 2. Physical Security Checklist 3. Systems Security Checklist 4. Travel Protocol Checklist 5. Financial Controls Checklist In a
Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.
Business Owner s Security Buyers Guide Everything you need to know before purchasing a security system Business Owners Security Buyer s Guide You re a business owner. That means you wear a lot of hats
Supply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff
85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff Because a business continuity plan affects all functional units within the organization, each functional unit must participate
Healthcare Security Solutions. Building Technologies
Healthcare Security Solutions Building Technologies s Meeting the Challenge More than ever before, security is one of healthcare s fundamental infrastructure needs. The security requirements of a hospital,
This directive establishes Department of Homeland Security (DHS) policy regarding the physical protection of facilities and real property.
Department of Homeland Security Management Directives System MD Number: 11030.1 Issue Date: 04/21/2003 PHYSICAL PROTECTION OF FACILITIES AND REAL PROPERTY I. Purpose This directive establishes Department
A Message for Warehouse Operators And Security Guidelines for Warehouse Operators
A Message for Warehouse Operators And Security Guidelines for Warehouse Operators Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint
BRANCH SECURITY REVIEW CHECKLIST
BRANCH: Date: Section 1 Physical Vulnerability 1. Do all office windows permit an unobstructed view of the bank s interior? 2. Are all exterior doors and windows equipped with tamper-resistant locks? 3.
Global Supply Chain Security Recommendations
Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed
Risk Management Report
Risk Management Report Main Street, White Plains, NY 060 Member: Joan Smith Policy No.: 45678 Agency: ABC Insurance Brokers, Inc. Date of Visit: January, 0 Prepared By: Tim Arone Summary of Scheduled Changes
Physical Security Assessment Form
Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...
Security Service de Services sécurité. Security Alarm Monitoring Protocol
Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings
POINT UNIVERSITY CAMPUS SECURITY Emergency Response Plan
POINT UNIVERSITY CAMPUS SECURITY Emergency Response Plan Introduction The Point University Emergency Response Plan establishes guidelines for campus-wide communication, service coordination and safety
Introduction. Industry Changes
Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise
The Interagency Security Committee and Security Standards for Federal Buildings
Order Code RS22121 Updated November 23, 2007 The Interagency Security Committee and Security Standards for Federal Buildings Summary Stephanie Smith Analyst in American National Government Government and
MONROE COUNTY SHERIFF S OFFICE. General Order. NO. PAGES: 5 REVIEWED/REVISED: December 18, 2014 RESCINDS:
MONROE COUNTY SHERIFF S OFFICE General Order CHAPTER: 61 TITLE: Court Security EFFECTIVE DATE: October 26, 2007 REFERENCE: CALEA 73.1.1 a,b 73.2.1a,c,73.3.1, 73.3.2, 73.4.1, 73.4.3 CFA 31.01, 31.0.4,31.0.5,31.0.8
Security Alarm Monitoring Protocol
Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or
"DOT IN-DEPTH HAZMAT SECURITY TRAINING"
PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow
Security Policy and Procedures
The British Section SHAPE International School Aims Security Policy and Procedures The aim of this policy is to ensure that the school can operate on a day-to-day basis in an environment that is safe and
www.lgrmg.ca Setting the Standard in Risk Management Consulting and Investigation Services
www.lgrmg.ca Setting the Standard in Risk Management Consulting and Investigation Services Setting the Standard in Risk Management Consulting and Investigation Services AN INTRODUCTION Lions Gate Risk
Policing requirements for Closed Circuit Television
Policing requirements for Closed Circuit Television 1 Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 2 Closed circuit television (CCTV) systems
New York State Unified Court System. Workplace Safety Assessment
New York State Unified Court System Workplace Safety Assessment WORKPLACE SAFETY ASSESSMENT COURTHOUSE/FACILITY INFORMATION... 2 WORKPLACE SAFETY TRAINING PROTOCOLS... 3 Workplace Violence Policy, Exposure
AN ORDINANCE GOVERNING RANDOLPH COUNTY COURTHOUSE SECURITY AND BUILDING PROCEDURES
AN ORDINANCE GOVERNING RANDOLPH COUNTY COURTHOUSE SECURITY AND BUILDING PROCEDURES Section I. Purpose. This courthouse security and building procedures ordinance is designed to maintain a safe and contraband-free
OHIO COURT SECURITY STANDARDS
OHIO COURT SECURITY STANDARDS APPENDIX C PREAMBLE The following Ohio Court Security Standards represent the efforts of the Supreme Court Advisory Committee on Court Security & Emergency Preparedness. The
Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing
KSU Police Converged Security: A holistic approach to cyber safety and security Cyber Security through Education & Awareness by Community Policing Community Policing Community Policing Initial meeting
Security Guidelines for. Agricultural distributors
Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole
C-TPAT Self-Assessment - Manufacturing & Warehousing
Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
Physical Security Checklist and Inventory
Tool 1: Assessing Robbery Risk Physical Security Checklist and Inventory Any assessment of robbery risk begins with an evaluation and inventory of the measures you are already taking as a financial institution.
Commercial or Business Security Survey
Exterior Grounds Commercial or Business Security Survey Is there a fence around the property or a clear definition of Territoriality? If there is a fence, is it tall enough and maintained in good repair?
Upon completion of the module, you will be issued an electronic training certificate.
Introduction The US Department of Transportation mandates security awareness training as part of their security requirements found in Subpart I of Part 172 of the Hazardous Materials Regulations. The requirement
Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings
Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over
Site security evaluation guide
Site security evaluation guide Table of contents Introduction...1 Site information...3 Site security evaluation summary...4 Site security evaluation guide...8 1. Risk assessment...8 2. Management policies...9
Middleborough Police Electronic Security Narrative
Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of
Mitigating the threat of terrorist attacks against high
ASSET VALUE, THREAT/HAZARD, VULNERABILITY, AND RISK 1 Mitigating the threat of terrorist attacks against high occupancy buildings is a challenging task. It is difficult to predict how, why, and when terrorists
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 TABLE OF CONTENTS SECTION I: INDEPENDENT PRACTITIONERS TRUST SERVICES
Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No:
ISLE OF PALMS POLICE DEPARTMENT Thomas E. Buckhannon, III, Chief of Police 30 J. C. Long Boulevard Isle of Palms, South Carolina 29451 (843) 886-6522 BUSINESS SECURITY SURVEY Date: Business Name: Business
Security Device Installation Protocol
Security Device Installation Protocol Security Services TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General. Page 4 4.2 Requisition Process Page 5 4.3
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Seventh Avenue Inc. 1
Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).
Newton Public Schools Security Audits Executive Summary
Newton Public Schools Security Audits Executive Summary February 2013 Security audit process January 3 Email to administrators on school security January 4 Email to all staff on school security January
REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY
LI_M_POPO PROVINCIAL GOVERNMENT :;:ED.JBl-C ()F SO"';-H AFR;IC. ':.,. DEPARTMENT OF CO-OPERATIVE GOVERNANCE, HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL
National Archives and Records Administration (NARA) Facility Standards for Federal Records Storage Facilities
National Archives and Records Administration (NARA) Facility Standards for Federal Records Storage Facilities A quick overview of what Federal Records Officers need to know about: What the Records Storage
