London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments
|
|
|
- Norah Morton
- 10 years ago
- Views:
Transcription
1 London 2012 Olympic Safety and Security Strategic Risk Assessment (OSSSRA) and Risk Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments
2
3 Introduction London 2012 Olympic & Paralympic Safety and Security Strategic Risk Assessment (OSSSRA) The London 2012 Olympic and Paralympic Games will be the largest sporting event ever to be staged in the United Kingdom. In securing the bid to host the Games, the UK Government guaranteed to undertake the measures necessary to ensure the safety and security of those participating in and attending the Games. We will take an intelligence led, risk based approach in achieving this. This summary outlines the methodology used to identify the types of risk being considered that those charged with delivering a safe and secure Games have to manage. The Olympic Security Directorate (OSD), part of the Office for Security and Counter Terrorism within the Home Office, is working with partners to coordinate delivery of the Olympic Safety and Security Strategy on behalf of the Government. The Olympic Safety and Security Strategic Risk Assessment (OSSSRA) will inform strategic level decision making by identifying and prioritising risk and the work required to mitigate the risks themselves or their potential consequences. 1
4 The OSSSRA: An Overview The OSSSRA is a classified cross-government document which incorporates expertise from a wide range of Government departments and agencies. It contains assessments of the relative severity of a wide range of major accidents or natural events (collectively known as hazards) and malicious attacks (known as threats), as well as assessments of the potential risks that serious and organised crime, public disorder and domestic extremism may pose to safety and security during the Games. Crucially, the OSSSRA identifies those aspects of safety and security that are unique to the hosting of the Games and that require specific planning, over and above that which is carried out under normal circumstances through the Government s and other agencies existing risk assessment processes. The scope of the OSSSRA aligns to the scope of the Olympic and Paralympic Safety and Security Strategy (the Strategy) which ensures that: it assesses risks that may occur both during the design and build stage and during Games time, acknowledging that the emphasis will be on impacts on safety and security during the period of the Games themselves; it assesses risks to all Games locations, whether that be the sporting venues or the physical or electronic infrastructure that supports them; it assesses risks for the purposes of all five objectives in the Strategy: Protect; Prepare; Identify and Disrupt; Command, Control, Plan and Resource; and Engage 1, and it only assesses those risks that have a safety and security element to them, not those risks that solely have an impact on the smooth running or continuity of the Games themselves; and it does not replace existing contingency and safety plans for Games venues or day to day emergency service activity. Types of Risk The OSSSRA considers threats and hazards to safety and security during the Games emanating from five distinct areas: Terrorism; Serious and organised crime; Domestic extremism; Public disorder; and Major accidents and natural events. In assessing the impacts of any potential risk, the OSSSRA will measures not only the harm that may be caused to individuals, for example through injury, death or damage to personal property, but also the disruption to critical services that support our ability to ensure a safe and secure Games, such as transport systems or the emergency services, and the reputational damage to the UK should a particular risk occur. 1 An unrestricted pdf version of the Strategy is available 2
5 The following section gives an indication of the types of risks that the UK might face during the London 2012 Games. They should be read in the context of the scope of the OSSSRA and in addition to the assessments made in the National Risk Register of Civil Emergencies: 2010 Edition. 2 Figure one below gives an indication of these risks. Figure 1: An illustration of the risks contained within the National Risk Register of Civil Emergencies 2 3
6 Due to its unrestricted classification, this summary document cannot expand on the exact nature of the threats specified within the OSSSRA. However, the full range of possibilities has been considered. Terrorism The UK faces a sustained threat from terrorism. Beyond traditional methods of attack, terrorists may have aspirations to conduct cyber attacks or use non-conventional methods such as chemical, biological, radiological and nuclear substances. As a high profile event, the Games are likely to present an appealing target to individuals or terrorist groups. Attacks on crowded places During the Games, London, in particular, will host large numbers of visitors in concentrated areas both within the Games venues and at organised events such as open air TV screenings Attacks on transport systems There is likely to be an increase in passengers on all types of travel during the Games. Historical evidence suggests that, of the different malicious attacks considered, conventional attacks on open transport systems, such as the Underground are some of the more likely to be attempted. Attacks on air and maritime transport are potentially less likely due to the higher levels of security which are able to be maintained. Non-conventional attacks These are defined as attacks using non-conventional - chemical, biological, radiological and nuclear (CBRN) - materials. The scale and impact of such an attack would depend on the substance used and also the location of the attack; on public transport, at a Games venue or elsewhere. It could cause longer lasting disruption than other types of attack because of the contamination of people and infrastructure. Proportionate levels of protective and other security measures will be put in place or enhanced during Games time to reduce the risks posed by terrorists identified in the OSSSRA. Crime, Public Disorder and Domestic Extremism Crime The experience at previous Games is that low-level crime falls at and in the vicinity of Olympic venues during their operational phase. An appropriate focus will be provided on the concentration of high-value assets and athletes at the Olympic Park and in the Athletes Villages. Organised crime The fact that the UK is hosting the Olympic and Paralympic Games offers a number of opportunities to domestically and internationally based organised criminals, who will seek to make a profit at the expense of individual spectators and/or the delivery organisations. One likely manifestation of this is an attempt to instill fraud within the ticketing system. 4
7 Cyber attack The Games will rely on internet technology to an unprecedented extent and such reliance will present opportunities from a variety of quarters. This could include direct attacks against the Olympic website, the electronic infrastructure supporting the Games and sites linked to sponsors, as well as cyber-enabled ticketing fraud and e-crime carried out by organised crime groups. Cyber attacks could also occur on IT, communication and transport systems causing them to fail or enabling data to be exported, modified or deleted. Public disorder The experience of previous Games is that they provide a global stage which protestors seek to use to publicise diverse causes in both lawful and unlawful ways. Although targeted at the Olympics, these issues may have little relevance to the Olympic movement. Domestic extremism: The Games potentially provide the opportunity for a range of activists (individuals or more organised groups) to seek to disrupt both preparation and delivery phases. Major accidents and natural Events Major accidents: The possibility of accidents, for example involving transport or other key infrastructure, during the Games cannot be ruled out. In addition, there are a number of natural events which could have an impact on the Games. These range from severe weather to human disease. Severe weather Given the timing and location of the Games, the Met Office predict that a heat wave (defined as temperatures of 32 C or more) is the most likely form of severe weather to affect the safety of those attending the games. Although less likely, flooding as a result of sudden intense summer storms, could also represent a risk at some of the Games venues and associated infrastructure. Human diseases These can take a variety of forms and their impacts can vary considerably. The likelihood of a new, or newly recognised, infectious disease like SARS (Severe Acute Respiratory Syndrome) spreading to the UK is low, but, with large numbers of visitors entering the UK at that time, we will need to be alert to these and to the more likely, but less serious, risk of a food borne illness or gastroenterinal outbreak such as norovirus. 5
8 Risks to Games Critical Infrastructure Critical infrastructure can be defined in the Olympic context as those facilities, systems, sites and networks necessary for the functioning of the Games and those protecting and supporting them. The OSSSRA specifically considers risks to this physical and electronic infrastructure which could impact on safety and security. It looks across a range of possible factors malicious or non-malicious which could disrupt the critical infrastructure: from accidents, to technical failure, severe weather and malicious attacks. The Risk Identification and Mitigation Process Phase 1 Identifying the Risks The OSSSRA uses existing risk assessment processes, tailored for the specific requirements of hosting the Games. Broadly, it follows a three stage approach. Identification: Up-to-date intelligence assessment of all threats to the build and delivery phases of the Games is used to create a comprehensive picture of potentially disruptive challenges. A wide range of experts across Government and other agencies is then convened and for each risk identified, a reasonable worst case scenario is agreed in order that it can be scored in the next stages. Assessment: The agreed reasonable worst case scenarios are assessed for impact and likelihood by the relevant experts. To assess the likelihood of natural events, statistical and scientific data are used. Where possible, the assessment looks forward to take account of known or probable developments in the run up to the Games that would affect likelihood. In the case of terrorism, the willingness of individuals or groups to carry out attacks is balanced against an assessment of their capacity now, leading up to and, as far as possible, in 2012 and the vulnerability of their intended target. Impact assessments are also undertaken to assess, for each scenario, the likely number of fatalities and casualties, damage to property and assets, disruption to services and financial losses. The effect on Games events and on the reputation of the UK should a risk occur is also considered. Comparison of the risks: Once assessed, risks are then mapped on to a risk matrix. In mitigating the risk, and planning for the impacts of emergencies, the Government must decide what types of risk, and what levels of consequence, to plan for. Putting a great deal of effort into mitigating risks that are either very unlikely to happen or are likely to cause relatively minor damage would not be the best use of time and resources. As all potential threats and hazards facing the Games are assessed against the same criteria, it is possible to make a comparative assessment of which of these present the greatest risk. Mapping the risks on an Impact/ likelihood matrix allows for at a glance comparisons to be made, as illustrated in figure 1 below. The table also allows those providing mitigation of particular risks to assess to what degree the risk has been reduced by charting its pre and post mitigation positions. 6
9 Risk G Risk d Risk C Relative Impact Risk E Risk H Risk F Risk A Risk B Relative Likelihood Figure 2: An illustration of the high consequence risks facing the Olympic Games The OSSSRA does not cover all of the possible safety and security risks to the Olympics; only those that meet the criteria outlined above and which are deemed significant enough for inclusion due to their likelihood or impact or both. However, as the likelihood of an event occurring or the potential impact of it increasing cannot be discounted as we approach the Games, threats and hazards will continue to be monitored on a regular basis and, if necessary, their status updated in future iterations of the OSSSRA. Nor does the OSSSRA drive all the activity taking place to ensure we have a safe and secure Games. Other work is being undertaken in response to international conventions, for example in relation to the protection of visiting Heads of State, to address commitments made by the UK when bidding for the Games and to comply with domestic and international law. Where crime is identified it is the duty of law enforcement to respond. Phase 2 Mitigating the Risks Strategic Design Requirements (SDRs): SDRs are high level statements of requirement needed to mitigate a particular risk by either reducing the likelihood of it occurring or reducing its impact should it occur. SDRs are similar to the planning assumptions used to aid planning to mitigate the risks within the government s normal national risk assessment process. In addition to making us prepared to deal with the consequences of a risk occurring, they also direct activity to prevent a risk from happening. 7
10 The SDRs are used by the OSD to create commissions to partner agencies, such as the police or United Kingdom Border Agency (UKBA). Our partners will then identify the tactical and operational requirements needed to be put in place to meet the requirements of the SDRs to ensure the most comprehensive mitigation possible will be delivered. There are currently 27 projects 3 under commission from the OSD to delivery partners. Phase 3 Understanding Residual Risk Risk reduction assessment: To ensure that projects deliver according to the commissions and that, as a combined whole, they provide a complete and proportionate safety and security overlay to the Games a risk reduction assessment (RRAt) process is being undertaken by the OSD. The RRAt process will ensure that duplication of effort and resource expenditure is avoided and that any gaps in safety and security mitigation are identified. After assessing the contributions the various projects and business as usual activity from the OSD and our partners make to mitigating the risks in the OSSSRA we are able to determine the level of residual risk. Whilst it is impossible to eliminate all risk, the RRAt process helps Ministers, senior officials and operational commanders decide if the level of residual risk is acceptable or if more work needs to be done, thereby providing confidence that we have met, as far as is possible, the Government s guarantee to deliver a safe and secure 2012 Games. Responsibilities and Review Cycle The OSSSRA process is managed by the Design Authority Team (DAT) within the Olympic Security Directorate. Working closely with the Civil Contingencies Secretariat (CCS) from the Cabinet Office, they use up to date intelligence assessment and bring together a range of subject matter experts from across Government, the security services and other agencies who are able to comment upon this assessment and the vulnerabilities which may lead to a threat becoming a risk. Once all the information and likelihood and impact scores relating to the identified risks has been agreed the OSSSRA document is produced. The OSSSRA is refreshed on a regular basis following on from a cycle of strategic threat assessment. This process can be speeded up to dynamically assess any new threat or hazard that may require immediate action either to change a current project or to commission a new project to mitigate its impact on the Games. The actual OSSSRA is a Secret document and circulated only to those involved in the safety and security planning for the Games. 3 The number of OSD projects will vary, in the run-up to the Games 8
11
12 ISBN: Crown Copyright 2011 HO_01727_G
THE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies
Aon Risk Solutions Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies A terrorist incident at or near your operations, could result in human casualties, property damage, business
Independent Assurance External evidence that risks are being effectively managed (e.g. planned or received audit reviews)
Total Risk Score Total Risk Score SHA Risk Matrix Risk Matrix Trust Details Name of Trust: NHS Address: Francis Crick House Post Code: NN3 6BF Name of Chief Executive: John Parkes Name of Person to contact
National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee
National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword
NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00)
NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00) Subject and version number of document: Serial Number: Business Continuity Management Policy
Section A: Introduction, Definitions and Principles of Infrastructure Resilience
Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
Bridge Parish Council Community Emergency Plan
BRIDGE Parish Council Caring for the village Bridge Parish Council Community Emergency Plan IF YOU ARE IN IMMEDIATE DANGER CALL 999 October 2014 All enquiries relating to this document should be sent to:
CONTEST: The United Kingdom s Strategy for Countering Terrorism
CONTEST: The United Kingdom s Strategy for Countering Terrorism July 2011 Introduction 3 1.01. This is the third published version of the United Kingdom s counter-terrorism strategy, CONTEST. This new
Version: 3.0. Effective From: 19/06/2014
Policy No: RM66 Version: 3.0 Name of Policy: Business Continuity Planning Policy Effective From: 19/06/2014 Date Ratified 05/06/2014 Ratified Business Service Development Committee Review Date 01/06/2016
Business Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
TRUST POLICY FOR EMERGENCY PLANNING
TRUST POLICY FOR EMERGENCY PLANNING Reference Number: CL-OP/ 2013/027 Version: 1.4 Status: New Draft Author: Ashley Reed Job Title: Head of Security and EPO Version / Amendment History Version Date Author
National Cyber Crime Unit
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme [email protected] Official Problem or opportunity Office for National Statistics In
Integrated Emergency Management and the Prior Notification of the Transportation of Radioactive Material
Integrated Emergency Management and the Prior Notification of the Transportation of Radioactive Material M. Fox International Transport, British Nuclear Fuels plc, Warrington, Cheshire, United Kingdom
Business Continuity Management Systems. Protecting for tomorrow by building resilience today
Business Continuity Management Systems Protecting for tomorrow by building resilience today Vital statistics 31% 40% of UK businesses have been affected by bad weather related transport problems, power
The Strategic Policing Requirement. March 2015
The Strategic Policing Requirement March 2015 Contents Foreword by the Home Secretary 3 1. Introduction 4 2. National threats 7 3. Policing response: 5Cs 9-14 4. Capacity and contribution 9 5. Capability
Working together to protect the Integrity of Sport. The role of the Joint Assessment Unit at the London 2012 Olympic Games
Working together to protect the Integrity of Sport The role of the Joint Assessment Unit at the London 2012 Olympic Games March 2013 1 Contents 1 Background 3 2 Overview of Operational Activity 3 3 Overview
University of Hong Kong. Emergency Management Plan
University of Hong Kong Emergency Management Plan (HKU emergency hotline: 3917 2882) Version 1.0 Oct 2014 (Issued by Safety Office) (Appendix 3 not included) UNIVERSITY OF HONG KONG EMERGENCY MANAGEMENT
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Playing Our Part in Responding to National Threats
Agenda Item 7 Report of: The Secretary of the Police and Crime Panel Date: 1 February 2016 1. Purpose of Report Playing Our Part in Responding to National Threats 1.1 This report provides Members with
THE ROLE OF LEAD GOVERNMENT DEPARTMENTS IN PLANNING FOR AND MANAGING CRISES
THE ROLE OF LEAD GOVERNMENT DEPARTMENTS IN PLANNING FOR AND MANAGING CRISES THE FRAMEWORK FOR ACTION 1. Most incidents are handled at a local level by the emergency services and by the appropriate local
South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy
South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy Reference No: CG 01 Version: Version 1 Approval date 18 December 2013 Date ratified: 18 December 2013 Name of Author
Business Continuity Policy
Page 1 of 16 Business Continuity Policy Issue Date: Aug 2013 Document Number: 00241 Prepared by: Business Management and Continuity Senior Manager Next Review Date: April 2014 Page 2 of 16 NHS England
Enhanced resilience for major emergencies Proven capability solutions to deliver the resilience you need
Enhanced resilience for major emergencies Proven capability solutions to deliver the resilience you need 1 The Alliance Value Proposition Alliance Value Proposition The threat posed today Terrorist threats
BUSINESS CONTINUITY POLICY
BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility
Business Continuity Policy
Business Continuity Policy Page 1 of 15 Business Continuity Policy First published: Amendment record Version Date Reviewer Comment 1.0 07/01/2014 Debbie Campbell 2.0 11/07/14 Vicky Ryan Updated to include
Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative
Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following
Planning for an Influenza Pandemic
Overview It is unlikely that a new pandemic influenza strain will first emerge within Elgin County. The World Health Organization (WHO) uses a series of six phases, as outlined below, of pandemic alert
EMERGENCY PREPAREDNESS POLICY
EMERGENCY PREPAREDNESS POLICY CONTROLLED DOCUMENT CATEGORY: CLASSIFICATION: Policy Emergency Planning PURPOSE This document sets out the strategic framework for the management of emergency preparedness
Risk Management & Business Continuity Manual 2011-2014
ANNEX C Risk Management & Business Continuity Manual 2011-2014 Produced by the Risk Produced and by the Business Risk and Business Continuity Continuity Team Team February 2011 April 2011 Draft V.10 Page
Business Continuity Business Continuity Management Policy
Business Continuity Business Continuity Management Policy : Date of Issue: 28 January 2009 Version no: 1.1 Review Date: January 2010 Document Owner: Patricia Hughes Document Authoriser: Tony Curtis 1 Version
STRATEGIC POLICING REQUIREMENT
STRATEGIC POLICING REQUIREMENT Briefing to the Police and Crime Panel Assistant Chief Constable James Vaughan WHAT IS IT? Issued by Home Secretary as part of her statutory duty Outlines national threats
REPORT 4 FOR DECISION. This report will be considered in public
REPORT 4 Subject: Safety Readiness for the Summer 2013 Events Programme Agenda item: Public Item 7 Report No: 4 Meeting date: 28 May 2013 Report to: Board Report of: Mark Camley, Interim Executive Director
LONDON 2012: CYBER SECURITY
LONDON 2012: CYBER SECURITY SHARING OUR EXPERIENCES Oliver Hoare Former Head of Cyber Security Government Olympic Executive UNCLASSIFIED 1 GREAT BRITAIN CONGRATULATES TOKYO 2020 UNCLASSIFIED THEMES Scale
Mass Gatherings Medical Strategies for Weapons of Mass Destruction
Mass Gatherings Medical Strategies for Weapons of Mass Destruction Kristi L. Koenig, MD, FACEP Professor of Clinical Emergency Medicine Director of Public Health Preparedness Co-Director, EMS and Disaster
CBRN National Action Plans
Chemical Biological Radiological Nuclear Risk Mitigation - Centres of Excellence CBRN National Action Plans Irakli Beridze Senior Strategy and Policy Advisor UNICRI Jointly implemented by the EC JRC and
Compliance Toolkit. Protecting Charities from Harm. Chapter 2: Due Diligence, Monitoring and Verification of End Use of Charitable Funds SUMMARY
Compliance Compliance Toolkit Protecting Charities from Harm Chapter 2: Due Diligence, Monitoring and Verification of End Use of Charitable Funds SUMMARY The Charity Commission The Charity Commission is
The Strategic National Risk Assessment in Support of PPD 8: A Comprehensive Risk-Based Approach toward a Secure and Resilient Nation
The Strategic National Risk Assessment in Support of PPD 8: A Comprehensive Risk-Based Approach toward a Secure and Resilient Nation Overview The Strategic National Risk Assessment (SNRA) was executed
Department of Homeland Security Office for Domestic Preparedness. Campus Preparedness Assessment Process
Department of Homeland Security Office for Domestic Preparedness Campus Preparedness Assessment Process Campus Preparedness Assessment-Overview Purpose of the CPA Elements of the CPA How to use the CPA
Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry
Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry Templar Executives NIAS 2007 DHR 2008 IAMM 2008 1 st CSS 2009 2 nd CSS 2011 Advising Government & Industry
Major Incident Procedures. What businesses and the voluntary sector need to know
Major Incident Procedures What businesses and the voluntary sector need to know Introduction This guide is designed to increase the understanding of the roles and responsibilities of the emergency services
NHS Hardwick Clinical Commissioning Group. Business Continuity Policy
NHS Hardwick Clinical Commissioning Group Business Continuity Policy Version Date: 26 January 2016 Version Number: 2.0 Status: Approved Next Revision Due: January 2017 Gordon Stevens MBCI Corporate Assurance
When Risk become Reality: a Practical Application of Event Risk Management The Baku 2015 1 st European Games
When Risk become Reality: a Practical Application of Event Risk Management The Baku 2015 1 st European Games Peter Ashwin Director of Security Baku 2015 1 st European Games (October 2013 June 2015) Overview
SECURE AND RESILIENT A STRATEGIC FRAMEWORK FOR CRITICAL NATIONAL INFRASTRUCTURE IN SCOTLAND
SECURE AND RESILIENT A STRATEGIC FRAMEWORK FOR CRITICAL NATIONAL INFRASTRUCTURE IN SCOTLAND Preparing Scotland SECURE AND RESILIENT A STRATEGIC FRAMEWORK FOR CRITICAL NATIONAL INFRASTRUCTURE IN SCOTLAND
NHS Lancashire North CCG Business Continuity Management Policy and Plan
Agenda Item 12.0. NHS Lancashire North CCG Business Continuity Management Policy and Plan Version 2 Page 1 of 25 Version Control Version Reason for update 1.0 Draft for consideration by Executive Committee
University of Nottingham Emergency Procedures and Recovery Policy
University of Nottingham Emergency Procedures and Recovery Policy Guidelines for High Hazard Schools and Departments 1. Introduction The University of Nottingham is committed to the identification and
Business continuity plan
Business continuity plan CONTENTS INTRODUCTION 2 - Scope - Components BUSINESS IMPACT ANALYSIS 3 - Business Affairs - Information Technology RISK ASSESSMENT 5 - Broad Categories of Hazards - Hazard Table
1.0 Policy Statement / Intentions (FOIA - Open)
Force Policy & Procedure Reference Number Business Continuity Management D269 Policy Version Date 23 July 2015 Review Date 23 July 2016 Policy Ownership Portfolio Holder Links or overlaps with other policies
Emergency management in Cardiff. A practical guide
Emergency management in Cardiff A practical guide Emergency management in Cardiff Introduction It is very unlikely that any of us will ever be caught up in an emergency or disaster, but by being informed
IFE Level 3 Certificate for Operational Supervisory Managers in Fire and Rescue Services (VRQ)
IFE Level 3 Certificate for Operational Supervisory Managers in Fire and Rescue Services (VRQ) Introduction The IFE Level 3 Certificate for Operational Supervisory Managers in Fire and Rescue Services
UK Sport Gold Event Series Investment Guide 2013-2019
Gold Event Series Investment Guide 2013-2019 Introduction The guide outlines UK Sport s current approach to making investment decisions as part of its Gold Event Series. In the Guide we outline: > > The
A Guide to Hazard Identification and Risk Assessment for Public Health Units. Public Health Emergency Preparedness Protocol
A Guide to Hazard Identification and Risk Assessment for Public Health Units Public Health Emergency Preparedness Protocol Emergency Management Unit Public Health Division Ministry of Health and Long-Term
NGO security coordination and other sources of support WITHIN FIRST 1-2 WEEKS. Office/compound/ facility security
3 Risk assessment tool BEFORE DEPLOYMENT OR STARTING PROGRAMME Context analysis and actor mapping Risk assessment Security strategies Acceptance, protection and deterrence What is the context and who are
E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
Security Management Systems (SEMS) for Air Transport Operators. Executive Summary
Security Management Systems (SEMS) for Air Transport Operators Executive Summary March 2011 Security Management Systems (SeMS) for Air Transport Operators Introduction and Scope Executive Summary In early
River Stour (Kent) Internal Drainage Board Risk Management Strategy and Policy
River Stour (Kent) Internal Drainage Board Risk Management Strategy and Policy Page: 1 Contents 1. Purpose, Aims & Objectives 2. Accountabilities, Roles & Reporting Lines 3. Skills & Expertise 4. Embedding
Bus incident management planning: Guidelines
Bus incident management planning: Guidelines What is incident management planning? Incident management planning is everything your business does to prepare for potential disruptive or damaging incidents.
Overview TECHIS60241. Carry out risk assessment and management activities
Overview Information in all its forms is a vital component of the digital environment in which we live and work. The protection of information in its physical form is well understood but the protection
Enterprise Security Risk Assessments What are we trying to protect and why?
DSW Consulting Pty Ltd ABN: 88 131 241 113 NSW SECURITY MASTER LICENCE: 409991858 ACT SECURITY MASTER LICENCE: 17501699 VIC SECURITY REGISTRATION: 716 877 70S QLD SECURITY ADVISOR LICENCE: 3440620 www.dswconsulting.com.au
FSPCOMP3 Assess and mitigate the compliance risks relevant to your organisation
Assess and mitigate the compliance risks relevant to your Overview This unit is about assessing the probability and impact of compliance breaches occurring in your, and completing a risk assessment of
Strategic Alliance. Business Continuity Policy
Version 1.1 April 2016 Contents Contents Version control Foreword Policy Scope Aim and objectives Methods and standards Responsibilities Governance Training and exercises Page i ii 1 2 2 2 Version 1.1
A specification for security-minded building information modelling, digital built environments and smart asset management
Introduction to PAS 1192-5:2015 A specification for security-minded building information modelling, digital built environments and smart asset management Introduction PAS 1192-5:2015 is a specification
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
Preparedness in the Southwest
Preparedness in the Southwest Risk Assessment and Hazard Vulnerability Developed by The Arizona Center for Public Health Preparedness Cover Art www.azcphp.publichealth.arizona.edu Chapter 1 Importance
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Business Continuity Management Policy and Plan
Business Continuity Management Policy and Plan 1 Page No: Contents 1.0 Introduction 3 2.0 Purpose 3 3.0 Definitions 4 4.0 Roles, Duties & Responsibilities 4 4.1 Legal And Statutory Duties, Responsibilities
BUSINESS IMPACT ANALYSIS.5
Table of Contents I. GENERAL.3 Introduction.3 Scope.3 Components.3 II. BUSINESS IMPACT ANALYSIS.5 Academic Affairs...5 Finance and Administration.6 Planning and Accountability..8 Student Affairs.8 Institutional
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
Committees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
Shepway District Council Risk Management Policy
Shepway District Council Risk Management Policy Contents Section 1 Risk Management Policy... 3 1. Updates and amendments... 3 2. Definition... 3 3. Policy statement... 3 4. Objectives... 3 Section 2 Risk
Bedford Group of Drainage Boards
Bedford Group of Drainage Boards Risk Management Strategy Risk Management Policy January 2010 1 Contents 1. Purpose, Aims & Objectives 2. Accountabilities, Roles & Reporting Lines 3. Skills & Expertise
Section VI Principles of Laboratory Biosecurity
Section VI Principles of Laboratory Biosecurity Since the publication of the 4th edition of BMBL in 1999, significant events have brought national and international scrutiny to the area of laboratory security.
Risks and uncertainties
Risks and uncertainties Our risk management approach We have a well-established risk management methodology which we use throughout the business to allow us to identify and manage the principal risks that
RUAG Cyber Security. More security for your data
RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making
Walk around and identify the area to be assessed and look at what could reasonably be expected to cause harm.
Risk Assessment Introduction The assessment of risk is central to the management of health and safety. The purpose of this is to assist in identifying those measures which are needed to remove or otherwise
Sport and Sports Betting Integrity Action Plan Britain s approach to address risks to the integrity of sport and sports betting
Sport and Sports Betting Integrity Action Plan Britain s approach to address risks to the integrity of sport and sports betting Version 2.0 September 2015 Page 1 of 10 Sport and sports betting integrity
Cornell University PREVENTION AND MITIGATION PLAN
Cornell University PREVENTION AND MITIGATION PLAN Table of Contents Table of Contents Section 1 Prevention-Mitigation Introduction...2 Section 2 Risk Assessment...2 2.1 Risk Assessment Components...2 2.2
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Introduction. Clarification of terminology
Initiating a dialogue about the security of digital built assets: a guide for managers (with regard to PAS 1192-5, A Specification for security-minded building information modelling, digital built environments
Safety Management System (SMS) Guidelines
Safety Management System (SMS) Guidelines Pursuant to section 9D (2) (c) of the Passenger Transport Act 1990 For Bus and Coach Operators in NSW Roads and Maritime Services Level 5, 27-31 Argyle Street
Protective Marking: Overview:
1 Office of the Police Crime Commissioner Briefing Paper TITLE: Strategic Policing Requirement DATE: 1 st October 2015 AUTHORS: Vanessa Jardine, Russ Jackson, John O Hare, Anthony Mole Protective Marking:
Physical Security Services
Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,
Police use of Firearms
CODE OF PRACTICE ON Police use of Firearms and Less Lethal Weapons Contents 1. Introduction 1.1 Purpose of the code 1 1.2 Statutory basis of the code 1 1.3 Weapons covered by this code 2 1.4 Armed support
BUSINESS CONTINUITY PLAN
Business Logo or Name here BUSINESS CONTINUITY PLAN FOR RESIDENTIAL CARE HOMES PRODUCED BY DURHAM CIVIL CONTINGENCIES UNIT BUSINESS CONTINUITY PLAN LIST OF CONTENTS 1. DISCLAIMER...4 2. AIM...4 3. BUSINESS
UK SBS Physical Security Policy
UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following
Business Continuity Policy. Version 1.0
Business Continuity Policy Version.0 January 206 Contents Contents Version control Foreword Policy. Scope.2 Aim and objectives.3 Methods and standards.4 Responsibilities.5 Governance.6 Training and exercises
A GOOD PRACTICE GUIDE FOR EMPLOYERS
MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade
Intended Nationally Determined Contribution
Department of Environment Islamic Republic of Iran Intended Nationally Determined Contribution 19 November 2015 National Climate Change Committee: Iran INDC, page 1 1. Introduction The Islamic Republic
