nexus Top-flight solutions for airports



Similar documents
Ch. 435a KEY, GAMING & NONGAMING EMPLOYEES a.1. CHAPTER 435a. KEY, GAMING AND NONGAMING EMPLOYEES; BOARD-ISSUED CREDENTIALS

Pacom Systems. All rights reserved.

Future Directions for the Border Sector

Disclosure and Authorization to Obtain Information

Security guide. VerSion

The Business Case for Electronic Visitor Management

LUXURY TRANSPORTATION & PROTECTIVE SERVICES FOR THE DISCERNING CLIENT. Transportation Services For: A Veteran Owned and Managed Business.

Existing Facilities. Current and Forecast Demand

GENERAL AVIATION AIRPORT RULES AND REGULATIONS

U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010)

Fraport: Integrating Key System Management with SAP Software

ProCert X PROFESSIONAL CERTIFICATE EXCHANGE

Quality Standards Program

Vehicle Security Professional Registry -- Frequently Asked Questions in Canada

IDaaS: Managed Credentials for Local & State Emergency Responders

REAL ID Act Title II H.R.1268

Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008

Driving in Texas. 1. Driver s License 2. Auto Insurance 3. Parking 4. Getting Stopped by the Police

RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING

How To Protect The Time System From Being Hacked

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Policies of the University of North Texas Health Science Center. Chapter 14 UNT Health Credentialing and Privileging Licensed Practitioners

FAA / NAA DISPATCHER CERTIFICATE TRAINING PROGRAM

Emirates Airline. Cargo Security The EK Experience

Remote Tower Solutions. BY SEARIDGE TECHNOLOGIES AND NAVCANatm. The cost-effective alternative for airport monitoring and control

Health Insurance Portability and Accountability Policy 1.8.4

Office of Fleet and Asset Management (OFAM) (Reserve a State Vehicle) Online Vehicle Reservation Instructions

Materna Integrated Passenger Services (Materna ips)

August 23, Dr. Eugene Trinh Director, NASA Management Office, Jet Propulsion Laboratory

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Class 3 Registration Authority Charter

Basic Airport Security Awareness

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

TENDER FOR IT INTEGRATION AT THE BVI AIRPORTS AUTHORITY

AVIATION TRANSPORTATION SPECIALISTS WHATEVER IT TAKES. WHEREVER IT S GOING.

Canter Brokerage implements a unique cloud-based platform that makes HyperOffice technology work for the real estate industry.

Keywords: German electronic ID card, e-government and e-business applications, identity management

OCCUPATIONAL GROUP: Facilities Support. CLASS FAMILY: Facility Management CLASS FAMILY DESCRIPTION:

20 AIRPORT SECURITY RULES AND REGULATIONS

CLT KEY SYSTEMS. Questions regarding CLT Key Systems, contact the Airport Locksmith by calling Maintenance Dispatch at or

Dnata Airport Operations

Cooperative for Human Services, Inc.

AMS Asset Management Redkite Asset Management System When only the best will do.

FAQs - New German ID Card. General

Appendix 7 Student Parking permits

Title 10 DEPARTMENT OF HEALTH AND MENTAL HYGIENE

Qualified Electronic Signatures Act (SFS 2000:832)

Port Authority of New York/New Jersey Secure Worker Access Consortium Vetting Services

Room for growth DÜSSELDORF INTERNATIONAL AIRPORT CUSTOMER STORY

Sydney Airport District

ORDINANCE NO

ID Theft Toolkit and Affidavit

Info NEWS MEDIA GUIDE

The TxDMV s Role in Transportation Funding

Crimes Related to Sex Offender Registration

Radio Communications in Class D Airspace by Russell Still, Master CFI

3.Prescriber DEA: 4.Board Registration Number: 5.Business Tel:

PRIVATE SECTOR ESSENTIAL EMPLOYEE REGISTRATION PROJECT POLICY AND PROCEDURES GUIDELINES

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

FAQs Electronic residence permit

BERMUDA STATUTORY INSTRUMENT MOTOR CAR INSURANCE (THIRD-PARTY RISKS) REGULATIONS 1948

DRAFT. Date: DRAFT Initiated by: AFS-300

All references to "Internet Banking" reflect the CU Online services offered by FORUM Credit Union.

How can Identity and Access Management help me to improve compliance and drive business performance?

BRIDGEVALLEY COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS POLICY F-3 REGULATION OF PARKING AND TRAFFIC

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.

VEHICLE ACCIDENT REPORTING KIT

ELECTRONIC SIGNATURES AT BANK REPUBLIC SEARCHING THE ORIGINAL COPY OF ELECTRONICALLY SIGNED DOCUMENT CARE FOR THE ENVIRONMENT

Web Site Download Carol Johnston

MASTERCARD PROCUREMENT PROGRAM Cardholder s Guide

Electronic Signature Law of the People s Republic of China

Vehicle Policy Underwriting. Bizagi Suite

Dallas/Fort Worth International Airport

For the purpose of this chapter the following definitions shall apply:

REPUBLIC OF INDONESIA MINISTRY OF TRANSPORTATION

Texas A&M University - Commerce: Review of Faculty Human Resources Processes PROJECT SUMMARY. Summary of Significant Results

310 Seymour Lansing, MI Telephone: (517) Fax: (517) Lansing Housing Commission. Policy No Resolution 1098

LUBBOCK PRESTON SMITH INTERNATIONAL AIRPORT EMERGENCY CONTINGENCY PLAN

Aerodrome Advisory Circular

DISCLAIMER HEALTH INFORMATION PRIVACY POLICIES & PROCEDURES

Identity Cards Act 2006

MOUNT CARMEL HEALTH SYSTEM MEDICAL EDUCATION POLICY/PROCEDURE

GPG13 Protective Monitoring. Service Definition

Employment Services for Switzerland.

Neutralus Certification Practices Statement

The leading workforce management solution in Facilities management

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy

REPORT 2016/035 INTERNAL AUDIT DIVISION

Adobe PDF for electronic records

A guide to access control for manufacturing sites

Transcription:

A world of its own Airports have highly specific security requirements that differ extensively from those typically encountered in the industrial sector. Not only are their processes exceptionally complex, airports must also comply with strict statutory regulations. In Germany, these regulations are footed to a large extent in the Aviation Security Act, which determines the procedures surrounding personnel, the classes of ID cards persons may hold, and the airport areas they are authorized to access. Thus, airports have particularly rigorous requirements for ID card and entitlement management. A centralized view of ID cards and entitlements nexus is a leading supplier of ID cards and entitlement management systems for the aviation sector. The IT security company offers a platform solution that provides a singular, vendor-independent view of all access control systems and enables administrators to manage all user groups and their credentials centrally, in one unified system. The solution covers everything from ID card offices and access control points to parking facilities and canteen management. The benefits are considerable: The solution eliminates the laborious, errorprone manual processes and work duplication commonly associated with bureaucratic data handling. As a result, data is not only consistent but also instantly available across all subsystem. The result is a significant gain in efficiency, with improvements in speed and cost, and an unparalleled increase of airport security. A further benefit is that, in contrast to large organizations, where the process of ordering and issuing ID cards is generally free of charge, airports usually charge for these and similar processes. The nexus solution automatically records all chargeable costs, generates reports, and shares the information with the airports' SAP or other back-end systems. ID card office By and large, airports distinguish between personnel who require a special ID card granting access to the restricted contact@ 1

airside area and those for whom a regular ID for the remaining, landside areas is sufficient. In Germany, this distinction is governed by Section 8 of the Aviation Security Act. Persons applying to the ID card office for a badge with access to the restricted area must submit a background check certifying their integrity. Their applications are forwarded to the regional aviation authority in the relevant federal state, which has the applicants vetted by security and law enforcement agencies like the Federal Intelligence Agency, the Federal Bureau of Criminal Investigation and the State Office of Criminal Investigation, as well as local and fiscal authorities. Background checks can take between six and eight weeks to complete. Visitor ID cards, too, are tightly regulated, and a person is only granted access for a set number of visits per week, month or year, depending on the airport's own or federal state policy. The nexus solution supports these policies and secures compliance airport-wide. E-learning certificates The software also keeps track of certificates issued by e-learning programs. Airport personnel are required to take a number of trainings and tests, for example for safe conduct in restricted areas. Registrations for a test or training on the e-learning platform are submitted through the nexus software. When a staff member passes one of these tests, the result is recorded in the system and a certificate is printed automatically. Test failures are recorded in the same fashion. If a staff member fails a test repeatedly, they are summoned to attend an individual training. Because trainings of this kind are generally subject to charges, the system automatically initiates the charging process. Blacklists Once staff members have passed a background check and successfully completed security training, their identity and personal details have to be verified by the ID card office against the aviation authority's security list. This is a nationwide list, updated continuously for all airports, that names individuals who are banned from working in airports' restricted areas. contact@ 2

Parallel to this, airports maintain their own in-house blacklists. When an individual's personal data record is opened in the software, their details can be checked easily against current global and local blacklists. External companies A large proportion of the workforce at airports is employed by external service providers - which represents an important aspect of airport security management. For every regular member of airport staff, there may be as many as nine external employees working, say, for airline companies or for ground services operators in areas like baggage handling and catering. These people are all subject to the same security procedures as the airport operator's own employees. The nexus solution features a self-service portal that enables external companies to register their employees and to request and conduct background checks and security trainings. Here, too, external companies are charged automatically for fee-based services. Access control points Following the ID card office, access control points are next in line in terms of importance. Anyone wishing to enter the restricted airside area employees, suppliers and visitors alike has to pass through one of these control points. Here, too, the contact@ 3

regulations are strict: For instance, under the terms of the Aviation Security Act, an visitor may only enter the restricted area on 12 days during the calendar year. In addition to that, each federal state has its own local regulations on the frequency of visits. But it is not just people who are screened at the access control points cars and trucks need clearance as well. To enter the restricted area, vehicles must be authorized by the ID card office or an access control point. These entitlement management procedures are managed centrally by the nexus software and can be logged for cost-tracking purposes if required. Expiration monitoring The expiration of ID cards and entitlements is monitored airport-wide. At airports, security ID cards are only valid until the earliest expiration date of any of the linked certificates. If, for instance, an individual's background check has expired, their ID card for the restricted areas has to be revoked immediately. The same applies if the supervising aviation authority adds a person's name to the blacklist. When the system is alerted to a banned individual, that person is immediately excluded from all areas that require security clearance. In addition, if someone's certificate for mandatory security training expires, their ID card is revoked for zones that require a valid certificate ramp areas, for example. Other functions and features of the platform solution include: ID card production: The solution produces security ID badges that are not just encoded as appropriate but also incorporate visual identifiers to denote specific groups of persons. Other options available range from adding special markers to visitor ID cards to dispatching vehicle escorts and managing their automatic payment. Notifications: In all the situations described, the persons involved card holders and security operations staff alike can be notified automatically by e-mail or serial letter about events or procedures of any kind, such as forthcoming security reviews or ID card expiration dates. contact@ 4

Visitor groups: Airports often need to accommodate large groups of visitors such as schools. Groups like these can be easily pre-registered to the system. Biometric verification: The software also supports biometric screening systems. Electronic signatures: Integration of signature pads for capturing electronic signatures is easily possible. Driver's permits: All airside areas accessible by vehicle, including aprons and runways, have their own traffic regulations, and anyone driving in these areas must have a special permit. Ramp area licenses mandatory for jet bridge operators, for instance, are printed directly onto the ID card by the software. Handheld terminals: The solution can incorporate handheld terminals used to validate security ID cards or ramp area driver's permits. Vehicle badges: Vehicles with full-time access to airside areas require permit badges. These must be applied for in much the same way as security ID cards for personnel. The software supports all needed processes. Keys: The solution can incorporate key cabinet and key management systems for keys issued at airports. A flexible solution for Germany's ATC operator Besides numerous airports, nexus' customers include DFS Deutsche Flugsicherung GmbH, Germany's air traffic control operator. The security requirements that apply to DFS employees and non-dfs personnel are similar to those commonly in place at airports. Given that the organization's control towers, for example, are sited directly on airport campuses, employees need to be background-checked and issued with ramp area driving permits. For the ATC operator, the exceptional flexibility of the nexus solution has proved especially compelling. "What we particularly appreciate about the solution is that nexus tailored it to match our requirements we didn't have to align our processes to suit the software," remarks a spokesperson of the DFS. contact@ 5

nexus: At home in the world of airports Effective security management at airports calls for an indepth understanding of the operational complexities and the extensive statutory regulations on-site. nexus has the requisite expertise in this field and speaks the same language as its customers. nexus' entire employee base is backgroundchecked in accordance with the Aviation Security Act and the group offers a proven solution designed specifically to cover the full gamut of airport security needs and unite the many separate systems currently in operation at m any airports. contact@ 6