UK SBS Physical Security Policy
|
|
|
- Opal Collins
- 10 years ago
- Views:
Transcription
1 UK SBS Physical Security Policy Version Date Author Owner Comments June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following TU consultation Next Review Date June 15
2 Contents: 1. Aim and Scope 2. Responsibilities 3. Risk Assessments 4. Physical Security Measures 5. Security Procedures 6. Housekeeping / Good Practice 7. Physical Security for Information Assets 8. New Build and Refurbishment 9. Monitoring and Review Relevant Policies: Information Assurance Policy Vetting Policy Health & Safety Policy Risk Management Policy Business Continuity Policy Visitor Policy Page 2 of 9
3 1. Aim and Scope Physical security measures aim to either prevent a direct assault on our premises or reduce the potential damage and injuries that can be inflicted should an assault occur. The aim of this policy is to ensure that our physical security stance involves an appropriate and layered mix of general good housekeeping, liaison with landlords and investment in processes, structures, equipment and systems that will deter, detect and delay any attacker - protecting against criminal acts such as theft, vandalism, unauthorised entry and terrorism, while addressing general health and safety concerns. Our primary guidance for physical security will be taken from the Cabinet Office Security Policy Framework. The policy applies to all company sites. Its priorities are to: Protect employees, contractors and visitors Protect the contents of our estate The Business Assets Protect the fabric of our estate It is recognised that many of the measures within this policy are relevant to the threats from terrorism and extremism. However, they will also assist in crime prevention, reducing crime and the fear of crime and improving the quality of life for staff and visitors. Some measures will only be implemented if the local or national threat levels demand it and there is a clear threat to our people, assets or buildings. Measures at this level will only be implemented on the authority of the CEO. 2. Responsibilities The company Senior Information Risk Owner (SIRO) has the overall responsibility for physical security and will liaise and obtain support at Director / Board level. The Head of Risk, Information and Security Compliance acts as the Departmental Security Officer (equivalent) with day to day responsibilities for security. He/she also acts as the company physical security specialist. The IT Security Officer (ITSO) has the day to day responsibility for technical security issues and will contribute to physical security risk assessments and decision making. The Protective Security Working Group (PSWG) will be advised by the Head of Risk, Information and Security Compliance and will assess threats/risks to all employees and visitors, buildings and equipment owned, supported or used by the company and will agree the implementation of effective and proportionate security tools. The group will carry out a 2 monthly (prior to the Audit, Risk and Controls Forum (ARC)) review of security risks, issues and actions and will escalate issues to the ARC as deemed appropriate by the Chair (SIRO). The Accommodation / H&S Manager will act as the physical security link to the company Estates Directorate. Information Asset Owners (IAO's) will understand and address risks to the information assets that they own and provide assurance to the SIRO on the security and use of those assets. Page 3 of 9
4 They will seek physical security guidance from the Head of Risk, Information and Security Compliance as required. All Managers are responsible for implementing relevant security policies within their business areas. All Employees, contractors and visitors must adhere to this and other security / H&S policies and procedures, report security incidents and ensure that they undergo security briefings as directed. Failure to comply with this policy may lead to disciplinary action. 3. Risk Assessments We recognise that physical security arrangements should be prioritised according to the prevailing Security Response Level 1, the security risks to sites and the risks to individual operations or the parts of the business that allow those operations to take place. This priority is based on: An assessment of site profile The importance of the site/operation to the continuity of company business The prevailing Security Response Level Physical security risk assessments will be carried out at all sites and guide the proportionate, appropriate and cost effective deployment of security measures. A physical security risk assessment template is at Appendix Physical Security Measures The deployment of physical security measures will be in line with the HMG document Guide to Producing Operational Requirements for Security Measures February 2010 and must not breach Health & Safety regulations. In liaison with landlords and contractors where appropriate, we will: Access Control: Ensure that an efficient reception area is in place to control access, staffed by appropriately trained personnel or invest in a good quality access control system operated by swipe or contact proximity cards supported by PIN verification if needed. Keep access control points to a minimum, denying access through side or rear entrances to all but authorised personnel. Security Passes: Implement a pass system, insisting that personnel wear their passes at all times while on site and ensure that the issue of passes is strictly controlled and regularly reviewed. 1 Response Levels are issued by HMG and provide a broad indication of protective security measures that should be applied at any particular time. Response levels tend to relate to sites, whereas threat levels relate to broad areas of activity. Page 4 of 9
5 Foster a culture where employees can challenge all those not showing security passes. Implement a visitor control policy. Screening and Patrolling: Maintain the ability to carry out the random searches of hand baggage on entry. These searches will only be implemented on the authority of the CEO and Corporate HR will ensure that the TU is fully briefed. Searches will only be implemented at the Exceptional response level, that being when an attack is expected imminently. Ensure that security contracts include the routine internal and external patrolling of sites. Ensure that mail receipt, screening and delivery is controlled in accordance with the security requirements of specific sites and is in line with prevailing threats. Traffic and Parking Controls: Ensure appropriate vehicle access control measures, traffic calming measures and well-lit parking areas. Keep vehicles away from buildings if the situation dictates. Doors, Windows and Walls: Ensure that the physical structure of our buildings is in line with the security requirements of the assets that we are protecting. Ensure that the fabric of our buildings is regularly maintained to ensure effectiveness. Ensure that all faults and deficiencies are rectified as soon as practical. Integrated Security Systems: Ensure that intruder alarms, CCTV systems and security lighting are integrated so that they work together in an effective and coordinated manner. Ensure that alarm systems are linked to an appropriate responding organistion (police or security company) and that relevant contracts are monitored to ensure compliance. 5. Security Procedures In Liaison with landlords and contractors where appropriate, we will ensure that we have appropriate and incremental security procedures in place and that these procedures are communicated, reviewed and tested regularly. Security procedures will include but will not be limited to: Mail screening and the delivery of post Bomb threats Page 5 of 9
6 Suspicious objects Building search Fire and explosion actions and evacuation / invacuation Demonstrations Chemical, Biological and Radiological ( White Powder ) attacks Crime Prevention Reducing the likelihood of theft and vandalism The incremental deployment of security measures. See Appendix Housekeeping / Good Practice Good housekeeping will improve the ambience of our sites and reduce the opportunity for criminal activity. In Liaison with landlords and contractors where appropriate, we will: Keep public and communal areas clean and tidy. Keep external areas clean and tidy. Prevent the concealment of suspicious objects as far as is practical. Ensure that our premises look well cared for, well maintained and controlled. 7. Physical Security for Information Assets We will ensure the physical security of our information assets by providing controls in line with specific Cabinet Office guidance for the protection of assets at different classification levels. Guidance will be taken from the Cabinet Office document Government Security Classifications. Annex Security Controls Framework. 8. New Build and Refurbishment We will work with landlords and contractors to ensure that the design of new builds and refurbished accommodation captures the security requirements of the assets that the accommodation will house. When planning new builds or considering refurbishments, we will review: Access and movement The building structure Methods of appropriate surveillance Ownership Physical protection Page 6 of 9
7 Activity and management Maintenance 9. Monitoring and Review The Head of Risk, Information and Security Compliance will review this policy at least annually or whenever legal or business reasons dictate. He/she will recommend changes as required to the SIRO and Senior Leadership Group for final approval. Changes will be implemented following consultation with the Trade Unions. Page 7 of 9
8 Appendix 1 to Physical Security Policy Dated 16 June 14 Site: Date: Conducted By: The Threat: Assets Protected: Vulnerabilities: Highest Protective Marking/Classification: Physical Measure Perimeter Fence Doors Walls Windows Intruder Alarms CCTV Lighting Access Control Housekeeping Procedures Telephone Threats Evacuation Delivered Items Fire Search Demonstration Business Continuity Internal Liaison for multi-occupancy Local Security Environment / Crime Mapping External Liaison - Emergency Services Comments - Detect, Delay, Deter Comments Page 8 of 9
9 Appendix 2 to Physical Security Policy Dated 16 June 14 This matrix provides guidance on our protective security measures and in particular sets an incremental approach to our response to the threat from terrorism. It should be noted that response will be in line with the national threat levels detailed below. THE MATRIX IS ISSUED SEPARATELY AND IS NOT TO BE CIRCULATED OUTSIDE OF THE COMPANY. The matrix is held and administered by the Head of Risk, Information and Security Compliance. There are 3 levels of response: Response Level Description Related Threat Level Normal Routine protective security Low and measures appropriate to the Moderate business concerned Description Low An attack is unlikely. Moderate An attack is possible but not likely. Heightened Additional and sustainable protective security measures reflecting the broad nature of the threat combined with specific business and geographical vulnerabilities and judgements on acceptable risk Substantial and Severe Substantial An attack is a strong possibility. Severe An attack is highly likely Exceptional Maximum protective security measures to meet specific threats and to minimise vulnerability and risk Critical An attack is expected imminently Page 9 of 9
Security Services Policy and Procedures
and Procedures January 2011 Contents Heading Page Policy Policy Statement: 3 Procedures Aims and objectives: 3 Responsibilities: 4 Introduction: 6 Security Service management remit: 6 Overall aims of the
Video surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
OAKPARK SECURITY SYSTEMS LIMITED. Health & Safety Policy. Requests or suggestions for amendment to this procedure
OAKPARK SECURITY SYSTEMS LIMITED Requests or suggestions for amendment to this procedure should be submitted to the owner of the process PROCESS OWNER: MANAGEMENT TEAM Current version: PREVIOUS VERSION
Physical Security Policy
London School of Economics & Political Science Physical Security Policy Final Draft: 06/11/12 Approved by Estates Strategy Committee: 22/05/13 Next Review Date: 22/05/14 London School of Economics Physical
EMERGENCY MANAGEMENT IN SCHOOLS
EMERGENCY MANAGEMENT IN SCHOOLS Michelle Roberts and Mark Stephens Emergency and Security Management Branch Department of Education and Training Victoria Paper presented at the The Role of Schools in Crime
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
Information Security Management System (ISMS) Policy
Information Security Management System (ISMS) Policy April 2015 Version 1.0 Version History Version Date Detail Author 0.1 18/02/2015 First draft Andy Turton 0.2 20/02/2015 Updated following feedback from
06100 POLICY SECURITY AND INFORMATION ASSURANCE
Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information
University of Brighton School and Departmental Information Security Policy
University of Brighton School and Departmental Information Security Policy This Policy establishes and states the minimum standards expected. These policies define The University of Brighton business objectives
Physical Security Policy Template
Physical Security Policy Template The Free iq Physical Security Policy Generic Template has been designed as a preformatted framework to enable your Practice to produce a Policy that is specific to your
SCHEME OF EXAMINATION PG DIPLOMA IN CORPORATE AND INDUSTRIAL SECURITY MANAGEMENT (PGDCISM) ONE YEAR PROGRAMME
62 SCHEME OF EXAMINATION PG DIPLOMA IN CORPORATE AND INDUSTRIAL SECURITY MANAGEMENT (PGDCISM) ONE YEAR PROGRAMME Note: 1. There will be 70 multiple choice questions (MCQ s) in the question paper consisting
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
European Investment Bank Group. Video-surveillance policy
Group TABLE OF CONTENTS 1. Purpose and scope of the video-surveillance policy... 2 2. Respect for privacy, data protection and compliance with the relevant rules... 2 2.1. Compliance status... 2 2.2.
Winning Initiatives and Best Practices for Physical Security
Winning Initiatives and Best Practices for Physical Security Today s Presentation 1. Using a risk-based strategy for security 2. The balanced security approach 3. Concentric circles of protection concept
CORPORATE PROCUREMENT UNIT SITE & SECURITY PROCEDURES BOSTON SPA VERSION 9 SEPT12
SITE PROCEDURES BSPA VERSION 9 PAGE 1 OF 9 CONTENTS PAGE 1. GENERAL INFORMATION 3 2. ACCESS 3 3. SECURITY 3 4. VEHICLE PARKING 4 5. PERMITS TO WORK 4 6. DELIVERY, UNLOADING AND STORAGE 4 7. HOURS OF WORK
TRUST SECURITY MANAGEMENT POLICY
TRUST SECURITY MANAGEMENT POLICY EXECUTIVE SUMMARY The Board recognises that security management is an integral part of good, effective and efficient risk management practise and to be effective should
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related
Counter Terrorism Protective Security Advice. for Commercial Centres. NaCTSO. produced by. National Counter Terrorism Security Office
Counter Terrorism Protective Security Advice for Commercial Centres produced by NaCTSO National Counter Terrorism Security Office foreword NaCTSO National Counter Terrorism Security Office The National
University Emergency Management Plan
University Emergency Management Plan This plan has been designed to be consistent with the format of the Emergency Action Plans held by the departments and buildings of the University. This will enable
University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement
University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement 1. Context The University security service provides night and weekend cover throughout the
Bus incident management planning: Guidelines
Bus incident management planning: Guidelines What is incident management planning? Incident management planning is everything your business does to prepare for potential disruptive or damaging incidents.
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012
UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one
Lauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L.
Document No: IG10d Version: 1.1 Name of Procedure: Third Party Due Diligence Assessment Author: Release Date: Review Date: Lauren Hamill, Information Governance Officer Version Control Version Release
HEALTH AND SAFETY POLICY AND PROCEDURES
HEALTH AND SAFETY POLICY AND PROCEDURES 1 Introduction 1. The Health and Safety at Work etc. Act 1974 places a legal duty on the University to prepare and revise as often as may be appropriate, a written
Court Security Guidelines
July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative
SCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY
SCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY UNIT DESCRIPTOR This unit covers the competencies required to create and maintain a safe and secure hotel property both inside the property and the surrounding
INCIDENT RESPONSE MANAGEMENT PLAN DECEMBER 2015
INCIDENT RESPONSE MANAGEMENT PLAN DECEMBER 2015 DOCUMENT CONTROL Document Controller: Resilience Coordinator Date of last update: December 2015 Date of next update: December 2016 HPRM reference: HW2007-900/27/9.009
SECURITY SURVEY AND RISK ASSESSMENT. any trends or patterns in the incidents occurring at the school; the efficiency of the chosen security measures.
SECURITY SURVEY AND RISK ASSESSMENT A security survey gives a rounded picture of the risks that your school faces and the security measures in existence. Without this information it is difficult to assess:-
Counter Terrorism Protective Security Advice. for Major Events. produced by
Counter Terrorism Protective Security Advice for Major Events produced by Copyright in this guide is (except where expressly stated held by third parties) vested in the Association of Chief Police Officers
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
Specification for Learning and Qualifications for Common Security Industry Knowledge
Specification for Learning and Qualifications for Common Security Industry Knowledge December 2014 Security Industry Authority PO Box 49768 London WC1V 6WY E-mail [email protected] www.the-sia.org.uk
Physical Security Assessment Form
Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
Remote Monitoring offers a comprehensive range of services, which are continually
Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have
Security Guidelines for. Agricultural distributors
Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole
CCTV CODE OF PRACTICE
CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,
Surveillance Equipment
University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of
Protection of unoccupied or void properties
Real Estate Issue one Protection of unoccupied or void properties Introduction The current economic downturn has lead to a greatly increased number of vacant properties. In some countries rates of unoccupancy
Health and Safety Policy
Health and Safety Policy 1. GENERAL STATEMENT OF INTENT The Headteacher and Governors of Castle Hill St. Philip s C.E. Primary School recognise they have overall responsibility for the organisation and
Aide-Mémoire Suspicious Objects and Bombs
Aide-Mémoire Suspicious Objects and Bombs Terrorists, criminals and dissatisfied individuals continue to make use of improvised explosive device (homemade bombs). These incidents involving shocking acts
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Risk Assessment tools for Food Defence. Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk lynn.patterson@btinternet.
Risk Assessment tools for Food Defence Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk [email protected] Reduce likelihood of attack Protect brand/ reputations Reassure customers
The remote CCTV monitoring specialists CCTV Monitoring
The remote CCTV monitoring specialists CCTV Monitoring Providing security and total peace of mind 24 hours a day, 365 days a year! Welcome to Valleywatch Valleywatch is a specialist CCTV monitoring station
This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.
FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should
REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES
REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES Definitions 1. In these requirements: C-NLOPB means the Canada-Newfoundland and Labrador Offshore Petroleum Board; Chief Safety Officer means
CPNI VIEWPOINT 02/2010 PROTECTION OF DATA CENTRES
CPNI VIEWPOINT 02/2010 PROTECTION OF DATA CENTRES APRIL 2010 CPNI in conjunction with the Sister Banks would like to acknowledge and thank ECA Ltd for their help in the preparation of this report. The
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures
SECURITY INCIDENT REPORTING AND MANAGEMENT Standard Operating Procedures Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme.
IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN
IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department
CITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
Watching Your Business Fire & Security Solutions
Watchdog Business Security Access Control CCTV Security Intruder Alarms Fire detection & Extinguishing Watching Your Business Fire & Security Solutions Watchdog Business Security Watching Your Business
Counter Terrorism Protective Security Advice for Hotels and Restaurants
Counter Terrorism Protective Security Advice for Hotels and Restaurants produced by Copyright in this guide is (except where expressly stated held by third parties) vested in the Association of Chief Police
Corporate Health and Safety Policy
Corporate Health and Safety Policy November 2013 Ref: HSP/V01/13 EALING COUNCIL Table of Contents PART 1: POLICY STATEMENT... 3 PART 2: ORGANISATION... 4 2.1 THE COUNCIL:... 4 2.2 ALLOCATION OF RESPONSIBILITY...
Security Policy and Procedures
The British Section SHAPE International School Aims Security Policy and Procedures The aim of this policy is to ensure that the school can operate on a day-to-day basis in an environment that is safe and
DEVONSHIRE HOUSE SCHOOL
DEVONSHIRE HOUSE SCHOOL Risk Assessment POLICY This policy is for the whole school including EYFS What is a risk assessment? A risk assessment is a tool for conducting a formal examination of the harm
Rail Carrier Security Criteria
Rail Carrier Security Criteria Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing that rail carriers
Reception Porters. Service Level Statement. Campus Services. Directorate of Estates & Campus Services
Reception Porters Service Level Statement Campus Services Directorate of Estates & Campus Services The Reception Porter provides a reception, portering, mail and security service to users of the University
Global Supply Chain Security Recommendations
Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed
Security Criteria for C-TPAT Foreign Manufacturers in English
Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security
Parliamentary Security Camera Policy
Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system
Method Statement Reception Services
CONFORMED COPY Method Statement Revision History Revision Date Reviewer Status 19 th March 2007 Project Co Final Version Table of Contents 1 Objectives... 3 2 Management Supervision and Organisation Structure...
<COMPANY> P01 - Information Security Policy
P01 - Information Security Policy Document Reference P01 - Information Security Policy Date 30th September 2014 Document Status Final Version 3.0 Revision History 1.0 09 November 2009: Initial release.
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
Health and Safety Policy
Health and Safety Policy October 2014 1 October 2014 Contents: Introduction 1. STATEMENT OF INTENT AND POLICY OBJECTIVES 2. RESPONSIBILITIES AND ACCOUNTABILITIES FOR HEALTH AND SAFETY 2.1 The Director
CRITICAL/NON CRITICAL INCIDENT MANAGEMENT AND REPORTING PROCEDURE
CRITICAL/NON CRITICAL INCIDENT MANAGEMENT AND REPORTING PROCEDURE This procedure must be read in conjunction and interpreted in line with the Critical/Non Critical Incident Management and Reporting policy.
Maintenance Strategy 2015 Owner: Kevin Bullimore Head of Infrastructure Next review 2020
Maintenance Strategy 2015 Owner: Kevin Bullimore Head of Infrastructure Next review 2020 Page 1 of 7 Maintenance Strategy Introduction The requirement for maintenance of premises, plant and equipment arises
SCHOOL EMERGENCY RESPONSE PLAN
HOLY TRINITY PRIMARY SCHOOL (Church of England/Methodist Voluntary Aided) Broad Croft, Bradley Stoke, Bristol BS32 OBD Telephone (01454) 866735 Fax: (01454) 866737 E-mail: [email protected]
Guidelines on the Use of Armed Security Services from Private Security Companies Annex A - Statement of Works
UNITED NATIONS SECURITY MANAGEMENT SYSTEM Security Management Operations Manual Guidelines on the Use of Armed Security Services from Private Security Companies Annex A - Statement of Works These guidelines
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version V.D. Closed Circuit Television Monitoring and Recording of Public Areas for Safety and Security Purposes (Source:
Health and Safety Policy Part 1 Policy and organisation
Health and Safety Policy Part 1 Policy and organisation ICO H&S Policy Policy and organisation, June 2014 Page 1 of 6 1. Scope 1.1 The Health and Safety policy applies to all employees of the Information
National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee
National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword
Security Management Plan
Effective Date: 03/2015 1 of 10 I. Table of Contents: I Table of Contents II Authority III Purpose & Scope IV Policy Statement V The Joint Commission Standards VI Performance Standards VII DUPD Services
UCL ESTATES SECURITY DEPARTMENT. CCTV, Intruder Alarm & Alarm Monitoring. Specification Guidance Document
UCL ESTATES SECURITY DEPARTMENT CCTV, Intruder Alarm & Alarm Monitoring Specification Guidance Document CCTV UCL has an extensive Pelco Endura CCTV system comprising of in excess of 500 cameras, a number
Ten Steps for Preventing a terrorist Attack
WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business
DataCentre Access Policies & Procedures
DataCentre Access Policies & Procedures Contents Purpose... 3 Overview... 3 DataCentre Access... 3 DataCentre Access Levels... 4 Periodic Review & Termination of Access... 5 DataCentre Access Log... 5
Information governance strategy 2014-16
Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope
National Approach to Information Assurance 2014-2017
Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version
Security Policy for ActionAid International Approved version
Security Policy for ActionAid International Approved version Introduction This document sets out the overall principles for managing security within ActionAid International (AAI), as set by the Board.
Site Security and Access Policy and Procedures. Written By. Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By
Site Security and Access Policy and Procedures Written By Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By David Neild Last Reviewed date Autumn 2014 (VERSION 4)
Appendix 1a: Facilities Management Guide elements of FM Soft FM
Catering Responsibility for the management of on site catering often falls within the remit of the Facilities Manager. In the public sector this can range from the provision of vending or coffee bar type
