WHITE PAPER ROUTE RISK ASSESSMENT METHODOLOGY Securing Your Mobility. Document Date: March 2020, ADDRESS INFORMATION

Similar documents
Chapter 10 Transportation Managing the Flow of the Supply Chain

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010

High Speed Driver Competency and Training

IIS Asia Report Q1-2014

E3211. DOT Hazmat Security Awareness. Leader s Guide

Palm Beach State College Security Plan

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY

SECURITY IN TRUCKING

Designing an Effective Risk Matrix

A Risk Management Standard

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

Position Paper Cross Border e-logistics

Phase A Aleutian Islands Risk Assessment. Options and Recommended Risk Matrix Approach. April 27, 2010

11. Monitoring Performance monitoring in LTP2

Insurance as Operational Risk Management Tool

Optimize Fleet Efficiency and Lower Fuel and Operating Costs with Fleet Tracking

3.0 Risk Assessment and Analysis Techniques and Tools

University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

LOGISTICS FREIGHT FORWARDERS SUPPLEMENTAL APPLICATION

Changing Perceptions and the Skills Required by Security Managers

GENERAL GUIDE FOR MANAGING CASH-IN-TRANSIT SECURITY RISKS

Safety Regulation Group SAFETY MANAGEMENT SYSTEMS GUIDANCE TO ORGANISATIONS. April

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice

Weight and dimensions of heavy commercial vehicles as established by Directive 96/53/EC and the European Modular System (EMS)

QUALITY RISK MANAGEMENT (QRM): A REVIEW

The Trip Scheduling Problem

Project Risk Management. Presented by Stephen Smith

Protecting your business interests through intelligent IT security services, consultancy and training

Chapter 1 Introduction to International Logistics

Risk Management: Coordinated activities to direct and control an organisation with regard to risk.

Win by Losing: How to Respond Effectively to a Shipper s RFP

Deploying Road Safety In Europe A New Approach for managing Road Safety

INTERNATIONAL BUSINESS

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

Evaluating ship collision risks

Case Study. Reconfiguration of the Supply Chain Structure. European Commission

Crime Mapping and Analysis Using GIS

Space project management

Upon completion of the module, you will be issued an electronic training certificate.

Financial Planner Competency Profile

Guidelines on preparation for and management of a financial crisis

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Appendix B. NAICS Codes, Titles, and Descriptions

LSST Hazard Analysis Plan

An evaluation of the fire safety emergency cover toolkit

Leicestershire County Council Transport Trends in Leicestershire Transport Data and Intelligence (TDI)

HOW TO SELECT A LTL CARRIER

Route Planning and Optimization

Risk Management Guide

System Specification. Objectives

Risk Management Procedure

A Risk Assessment Methodology (RAM) for Physical Security

Risk Management Handbook

INTERIM ADVICE NOTE 185/15

RISK MANAGEMENT FOR INFRASTRUCTURE

From Smart Mobility to Supply Chain Management and Back. Ton de Kok School of IE

CAPACITY AND LEVEL-OF-SERVICE CONCEPTS

Analysis of Accidents by Older Drivers in Japan

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

Factors that Influence the Occupational Health and Safety Curricula. Jeffery Spickett. Division of Health Sciences Curtin University Australia

6wresearch

Highway Traffic Monitoring

An Introduction to Risk Management. For Event Holders in Western Australia. May 2014

Rulemaking Directorate. Preliminary Regulatory Impact Assessment Explanatory Note 2012/2013

8 Interpreting Crime Data and Statistics

DOT HAZMAT SECURITY AWARENESS TRAINING

BENEFIT OF DYNAMIC USE CASES TO EARLY DESIGN A DRIVING ASSISTANCE SYSTEM FOR PEDESTRIAN/TRUCK COLLISION AVOIDANCE

Trade risk management: a global approach

TRENDS IN IRISH TOURISM. A report for Dublin Port Company Limited

Waveney Lower Yare & Lothingland Internal Drainage Board Risk Management Strategy and Policy

FRE FRE IFT IFT S.A.

Version: 3.0. Effective From: 19/06/2014

How To Ensure That Sovini Is A Successful Business

Inventory Routing. An advanced solution for demand forecasting, stock replenishment, and route planning and execution

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

Risk Assessments and Risk Based Supply Chain Security. March, 2010

Automated Receiving. Saving Money at the Dock Door. Page 8

INTERNATIONAL COMPARISONS OF PART-TIME WORK

DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN. April 2009 SLAC I

TERRITORIAL PLANNING FOR THE MANAGEMENT OF RISK IN EUROPE

Winning Initiatives and Best Practices for Physical Security

Using GIS Network Analyst to Solve a Distribution Center Location Problem in Texas. Texas A&M University, Zachry Department of Civil Engineering

A Users Guide to Tolling

Global Supply Chain Security Recommendations

Position Paper: Effectiveness of Speed Cameras and Use in Western Australia, Victoria and New South Wales

NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00)

ROAD SAFETY GUIDELINES FOR TAH ROAD INFRASTRUCTURE SAFETY MANAGEMENT

SELECTING A COMPETENT FIRE RISK ASSESSOR

Safety Management Systems (SMS) guidance for organisations

Implementation progress of the EASEE-gas Common Business Practices (CBP's)

FMEA Failure Risk Scoring Schemes

Transcription:

WHITE PAPER ROUTE RISK ASSESSMENT METHODOLOGY Document Date: March 2020, ADDRESS INFORMATION 7, Sorou str., 14452, Metamorphosis Athens, Greece Phone: +30 210 28 96 300 Fax: +30 210 28 94 949 Web: https://en.telematix.gr/

CONTENT 3 Introduction 4 Theoretical Background 6 Data Intelligence 7 Methodology 9 Application AUTHORS Panagiotis LAIMOS Michael CHRONOPOULOS Chrysanthi LAIMOU Route Risk Assessment Methodology 2020 Page 2

INTRODUCTION Risks are inherent in any business. But there are differences in the way companies of various sizes and in different industries approach the issue. Supply Chain Risks are among the factors that most organizations into the Supply Chain Industry want to assess as correctly as possible in order to minimize the likelihood of disturbance normal operations and delivery of services. As the distribution networks of these companies continues to expand in order to reach existing growing markets as well as new ones, the complexity and impact of the management of the network has grown. With this growing complexity the need to optimize distribution network processes that affect Order Fulfillment Quality (OFQ) is critical to avoid lines being down at customer manufacturing sites Order Fulfillment Quality - OFQ OFQ is made up of four key elements: The right product was delivered to the right customer. The product arrived undamaged to the customer. The correct amount of product was received by the customer. The product arrived at the customer site at the agreed upon time. Complexity in quantification of risks is embedded into the risk assessment process for both transportation and warehousing of goods, therefore practical methods have been introduced to give the risk practitioners the opportunity to assess the Criticality and the Frequency of specific risks. These practical methods overcome the difficulty of applying complex and strict mathematical methods for risk assessment. Within these methods, Criticality of Cargo Loss can be calculated if the following factors are considered: The value of the cargo, considering the insurance coverage. The cost caused by late delivery of the goods until their replacement (with a new shipment). The cost caused by the rumor and spread of the cargo loss event among customers, retailers, etc. Whereas, the Likelihood of Occurrence (Frequency) can be calculated if the statistical data are used as a mean to measure the likelihood of occurrence for the past. Threat and Vulnerability are factors that affect the Frequency of a Risk. Route Risk Assessment Methodology 2020 Page 3

THEORETICAL BACKGROUND There are several internationally accepted techniques for the analysis and the assessment of risk that can be applied depending on the system under evaluation. These techniques differentiate from each other with respect of the approaching methodology of the risk assessment and the methodology used for the quantization of the analysis results. The most recognized internationally methodology for risk assessment is Preliminary Hazard Analysis (PHA) which usually is followed by Failure Mode, Effects and Criticality Analysis (FMECA). Preliminary Hazard Analysis is the foundation for effective systems hazard analysis. It should begin with an initial collection of raw data dealing with the design, production, and operation of the system. The purpose of this procedure is to identify any possible hazards inherent in the system. The four main categories of this approach are hazard, cause, main effects, and preventive control. The hazard effects and corrective/preventive measures are only tentative indicators of potential hazards and possible solutions. While PHA studies hazards in the entire system, failure mode, effects, and criticality analysis (FMECA) analyzes the components of the system and all of the possible failures which can occur. This form of analysis identifies items whose failures have a potential for hazardous consequences. Following that, these hazards are categorized relatively to their degree of criticality (Criticality Ranking) among CATASTROPHIC (I), CRITICAL (II), MARGINAL (III) and NEGLIGIBLE (IV) based on their consequences in the activity under investigation. Because the frequency of each potential occurrence is also an important factor, a risk assessment matrix can be used to codify the risk assignment, which in conjunction with the Risk Assessment Table present the total picture of the threats/hazards that the company faces, their consequences as well as their probability of occurrence. The calculation of risk can be implemented considering that: RISK = FREQUENCY of OCCURANCE x CRITICALITY and FREQUENCY of OCCURANCE = THREAT x VULNERABILITY Route Risk Assessment Methodology 2020 Page 4

RISK ASSESSMENT MATRIX Based on the above qualitative computations, the Risk Assessment Matrix is produced RISK INDEX The Risk Assessment Matrix is characterized according to the following color scheme that describes best the desired security level for each company. Beyond the qualitative calculation of the likelihood of occurrence for a catastrophic event, there is also the capability to quantitative computation of such a figure, in case valid statistical data are recorded. Furthermore, the use of modern specialized statistical methods and models (Extrapolation Interpolation) can offer significant increase in the reliability of the calculation of the frequency of risks, with a dramatic contribution in the overall reliability of the Risk Assessment under examination. It is obvious that to calculate risk, frequency is a crucial factor. Combined with the factor of Criticality, an organization can find out how urgent a certain risk is and then deal with it according to the priority it assigns to it. Basic Definitions In order to avoid ambiguity into the risk assessment process, the following definitions are considered essential: Criticality: The severity and the consequences of a cargo loss can be estimated if the following factors are considered: o The value of the cargo, considering the insurance coverage. o The cost caused by late delivery of the goods until their replacement (with a new shipment). o The cost caused by the rumor and spread of the cargo loss event among customers, retailers, etc. Frequency: Statistical data can be considered to be the measure of probability of the past. With this assumption, we could say that if we knew in the beginning of a period the cargo losses experienced actually during this period, we could calculate with certainty the probability - certainty that is required for the calculation of the above product. Threat: Threat is an external factor independent from the supply chain activities that depends on the environment in which the operations of supply chain (transport, storage, etc) take place. Vulnerability: It is reversely proportional to the protection/security measures in place to cover various activities of supply chain. It is decreased as long as additional protection and avoidance measures are Route Risk Assessment Methodology 2020 Page 5

established. Usually the reduction of vulnerability is associated with the increase of cost of protection measures. As far as the criticality is concerned, even if various costs from the delayed delivery until the replacement of goods are not calculated, there is an objective value of the goods as well as insurance coverage and deductible that can be used as the base for its quantification. Regarding the frequency, considering that statistical data from the past can offer an accurate approach of the actual figures provided that there is no significant change in the operational environment it is mandatory to identify a reliable data source in order to avoid complex mathematical models. DATA INTELLIGENCE Based on the reporting from members, TAPA Incident Information Database contains more than 30,000 security incidents for the last decade (2010-2020) classified by several categories, including: Date/Time of incident Date of Incident Registration Product Amount Incident Category Burglary Fraud Hijacking Robbery Theft Theft from Facility Theft from Vehicle Theft of Vehicle Truck Theft Modus Operandi Deception Deceptive Stop Forced Stop Fraud Internal Intrusion Pilferage Violent Geographical Information Country City Region ZIP Code Address The database offers also the SPOT (Secure Parking Online Tool) that allows the user to review selected routes on the basis of incidents history as well as availability of secure/certified parking locations Route Risk Assessment Methodology 2020 Page 6

METHODOLOGY Route planning/scheduling Once a carrier undertakes the execution of a particular route, the relevant departments gather all necessary information in order to schedule a secure route, such as: loading date and place unloading date and place type of road infrastructure along the way (highways, urban or rural roads) driving time restrictions secure parking available and risk assessment. The distance travelled by a vehicle strongly depends on the available road infrastructure, due to the different speed limits and capabilities in place. In general, and where possible, for high value transportations, highways will be preferred along with the rest of the criteria included in this risk assessment methodology. For this methodology, the speed of a vehicle in highways will be set and calculated at 80 km/h and in urban roads at 50 km/h. In order to incorporate any driving time restrictions, the European legislation has been taken into consideration both for driving time and in between breaks for driver rest. Based on the European Union driving rules, a limit of nine hours for an average HGV under free-flowing conditions, on motorways or dual carriageways, would give an absolute upper limit in terms of range of 765 km. For realistic, where drivers are using a range of road types, this limit would fall to around 700 km. If obstacles such as congestion are encountered for one hour per day, then the range fails to around 615-620 km. Therefore, an estimate of lower limit for HGV requiring long breaks has been calculated to be around 550 km. Risk Assessment Within this risk assessment, both internal as well as external threats and risks will be taken into consideration. Along with the actual risk, the methodology will also address the likelihood and impact of each threat materializing, as well as what the mitigation measures are that have been put in place to minimize both likelihood and impact. In this context, two major risk categories have been identified: loss of human life during a violent attack and loss of vehicle/cargo during a theft/robbery. Route Risk Assessment Methodology 2020 Page 7

Risk Category In order to place a risk in a column of the Risk Category table, the following criteria is put in place Average Monetary Loss ( ): Loss>100.001 : Category I 25.001 < Loss <100.000 : Category ΙΙ Incident Type: Hijacking/Hostage/Robbery: Category I < Loss <25.000 : Category ΙΙI Loss <1.000 : Category ΙV Vehicle Theft: Category ΙΙ Theft from vehicle: Category ΙΙI Theft: Category ΙV Modus Operandi: Forced Stop/Violence: Category I Deceptive Stop: Category ΙΙ Likelihood Index: LI<1: Unlikely Intrusion: Category ΙΙI Deception: Category ΙV 1<LI<1.75: Remote 1.75<LI<2.50: Occasional 2.50<LI<3.25: Likely LI>4: Frequent In order to place a risk in a row of the Risk Category table, the following criteria is put in place The Likelihood Index is calculated based on the following formula: Where:!"#$%"h''( *+($, = *+."($+/0/2$340 56/100 Km: Incidents: Years: = the length of the route in km *+."($+/0 100 56 2$340 the number of incidents across the route the time period that includes the incidents Route Risk Assessment Methodology 2020 Page 8

Risk Identification Identified risks along with their respective mitigation measures are listed below: Risk: Robbery attempt: loss of cargo from criminals on route Impact: loss of cargo, monetary loss, customer dissatisfaction, crew injury Measures: insurance, training, security equipment, trailer door monitoring, specific response protocols Risk: Hijacking/hostage situation: robbery from criminals disguised as members of LEA on route Impact: loss of cargo, monetary loss, customer dissatisfaction, crew injury Measures: insurance, training, security equipment, trailer door monitoring, specific response protocols Risk: Robbery attempt: loss of cargo when vehicle is parked in a non-secure parking location Impact: loss of cargo, monetary loss, customer dissatisfaction, crew injury Measures: insurance, training, security equipment, trailer door monitoring, specific response protocols Risk: Robbery attempt: internal attempt against cargo (from crew or company personnel) Impact: loss of cargo, monetary loss, customer dissatisfaction Measures: insurance, training, security equipment, trailer door monitoring, specific response protocols APPLICATION For the understanding of the application of this methodology, a sample route risk assessment is presented below. The sample route is from Ancona, Italy to Calais, France. Two routes have been scheduled to be evaluated. The intuitive operational decision would to cross as few borders as possible to avoid delays and take the shortest route. Route Risk Assessment Methodology 2020 Page 9

Route #1 (Dark Blue line) Point of Origin: Ancona, Italy Point of Destination: Calais, France Through: Vipiteno, Italy Innsbruck, Austria Stuttgart, Germany Reims, Calais, France Countries crossed: 4 Distance: 1734 km Estimated Total Duration: 56 hours Short breaks (<45 ): 2 Long breaks (>45 ): 1 Number of incidents: 110 Likelihood index = 3,17 According to the LI calculated above, this risk is classified as Likely. In order to reach the Risk Category, the average money loss, the incident type and the modus operandi of recorded incidents for countries crossed in this route will be taken into consideration according to the Route Risk Assessment Methodology. Average Money Loss: 23.635 from incidents reporting Money Loss Category III Risk Acceptance Category: Not desirable Incident Type: 65% of incidents reporting Incident Type are recorded as Theft from Vehicle Category III Risk Acceptance Category: Not desirable Modus Operandi: 88% of incidents reporting a Modus Operandi are recorded as Intrusion Category III Risk Acceptance Category: Not desirable According to the above, Route #1 is ranked at 9 for all assessment parameters. Route #2 (Light Blue line) Point of Origin: Ancona, Italy Point of Destination: Calais, France Through: Turin, Italy Lyon, Dijon, Reims, Calais, France Countries crossed: 2 Distance: 1631 km Estimated Duration: 50 hours Short breaks (<45 ): 1 Long breaks (>45 ): 1 Number of incidents: 214 Likelihood index = 6,56 According to the LI calculated above, this risk is classified as Frequent. In order to reach the Risk Category, the average money loss, the incident type and the modus operandi of recorded incidents for countries crossed in this route will be taken into consideration according to the Route Risk Assessment Methodology. Average Money Loss: 73.054 from incidents reporting Money Loss Category II Risk Acceptance Category: Not acceptable Incident Type: 47% of incidents reporting Incident Type are recorded as Theft from Vehicle Category III Risk Acceptance Category: Not desirable Modus Operandi: 73% of incidents reporting a Modus Operandi are recorded as Intrusion Category III Risk Acceptance Category: Not desirable According to the above, Route #2 is ranked at 3 for money loss, and 7 for incident type and modus operandi. Route Risk Assessment Methodology 2020 Page 10

Risk Assessment Outcome Given that: Route #1 is categorized as not desirable, Route #2 is categorized as not acceptable/not desirable, There are mitigation measures in place for the execution of the transportation Route #1 appears longer in distance and duration Route #1 is selected for execution, as scheduled above. Route Risk Assessment Methodology 2020 Page 11

+30 210 28 96 300 telematix@gr.g4s.com https://en.telematix.gr/