Travel Security: A Corporate Perspective

  • 4,020 views
Uploaded on

Perspectives on setting up and maintaining a corporate travel security program. Presented at OSAC/ASIS Travel Security Perspectives Conference at Sands Hotel, Macau on 24 June 2010. See …

Perspectives on setting up and maintaining a corporate travel security program. Presented at OSAC/ASIS Travel Security Perspectives Conference at Sands Hotel, Macau on 24 June 2010. See http://events.linkedin.com/Travel-Security-Perspectives/pub/301751

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
4,020
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
171
Comments
0
Likes
2

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Travel Security: A Corporate Perspective Jeremy Stone, CPP Deputy Head – Group Corporate Security American International Assurance Group Travel Security Perspectives - Sands Hotel, Macau –24 June 2010
  • 2. Today’s Objectives
    • Look at aspects of planning, resourcing, implementing & maintaining a corporate travel security program
    • Provide perspectives on how employers can manage travel risks & exercise a moral & legal duty of care towards distressed personnel in foreign destinations.
  • 3. Perspectives include …
    • Defining Travel Security
    • Why we Need Travel Security?
    • Travel Security Risks
    • Why we Should Manage Travel Risks
    • Ways to Manage Travel Risks
    • Establishing a Travel Security Program
    • Getting Management Buy-in
    • Some Program Maintenance Tips
    • Q&A
  • 4. Defining Travel Security The preparedness, protection & preservation of travellers, their property & information from threat Adapted from Standards Australia. (2008, p. 8). Lexicon of key terms used in security Aims to provide a stable, relatively predictable environment in which travellers may pursue their ends without disruption or harm & without fear of disturbance or injury. Adapted from Fischer, R. J., & Green, G. (2004, p. 38). Introduction to security (7th ed.). Burlington, MA: Butterworth-Heinemann
  • 5. Why Travel Security?
    • Transact business
    • Meet clients
    • Host events,
    • Manage projects
    • Oversee operations
    • And key personnel need to:
    • Relocate
    • Station
    • Travel
    • Spend time in
    • overseas destinations.
    Because of globalization & depending on industry, strategy, structure, size, & business objectives, many Organizations need to: Exposing them to a wide range of risks!
  • 6. What Travel Risks? TERRORISM HIJACKING AIR DISASTER TSUNAMI CIVIL DISORDER INSURGENCY COUPS D’ ETAT MUGGING ASSAULTS HOTEL BURGLARY LOST TRAVEL DOCS DISEASE TRAFFIC ACCIDENT HOTEL FIRE TRAVEL DELAY TYPHOONS EARTHQUAKE K&R
  • 7. Why Manage Travel Risks Protect your most valuable asset Do the right thing – protect your employees Duty of Care In common law jurisdictions, an employer is obliged to apply all prudent measures to protect employees from all reasonably foreseeable harm. Otherwise may be liable in tort for negligence Avoid Criminal Liability Criminal negligence OHS laws UK Corporate Manslaughter Act Business Continuity Prevent/minimize business disruptions & promote continuity of operations Corporate Reputation Protect & maintain corporate reputation
  • 8. Ways to Manage Travel Risks Business Travel Insurance Cover all employees Protects company from economic impact Quantify travel program – how many travellers/expats, travel frequency, what high risk destinations, vehicle use, etc. Identifies risk, drives insurance premiums & helps to formulate travel policies Corporate Travel Policy Written, communicated & reviewed Defines who can travel, how to book & approval process Defines risk restrictions, non-compliance consequences, training requirements, travel & risk monitoring & communication tools, preferred airlines & hotels, ground transport, etc.
  • 9. Ways to Manage Travel Risks Travel Management Companies Restrict No. of TMCs Link TMCs to a travel tracking system Do staff know how to book travel/hotels with TMCs? Non compliance consequences Difficult to track staff when official TMC not used Manual update of travel tracker system Destination Intelligence Pre-travel info to plan trip & avoid risks Security, health, weather, transport, local info, etc. Risk is dynamic, situations change Timely, accurate & actionable info before, during & after trip How to communicate risk info? Briefings, Email, SMS & Website
  • 10. Ways to Manage Travel Risks Airline Safety EU Blacklist – inadequate airlines Knowledge of unsafe carriers helps reduce flight risks But knowing & failing to act can increase corporate duty of care liability Hotels Preferred hotel program Can reduce costs but can increase liability if something goes wrong Take security & fire/life safety issues into account Consider local crime situation Limit Passenger Nos. Don’t put all eggs in one basket How to enforce & monitor? What if threshold exceeded? Ground Transport Road travel riskier than air What providers used?
  • 11. Ways to Manage Travel Risks Hotline Assistance Who to call if something goes wrong? Travel, security & medical emergencies Local assistance, evacuation & shelter-in-place Incident escalation & response Call trees & useful numbers Many providers v. one stop shop? In-house v. outsource? Linked to travel insurance provider? Executive Protection Monitor executive travel plans Train & brief them Risk assessments – consider threats, vulnerabilities, likelihoods & consequences Consider need for EP escorts Train & Communicate Staff orientation & security awareness programs Security alerts & advisories CM Tabletop Exercises
  • 12. Establish a Travel Security Program
    • Establish Context
      • Organization’s geographical footprint
      • Organization’s strategic plan & business objectives
      • Travelling population
      • Expatriate locations & family members
      • Travel requirements
      • Consult stakeholders – HR, Legal, Security, Travel & Risk Managers
    • Conduct Risk Assessment:
      • Consider local security & safety risks, threats & vulnerabilities
      • Quantify & prioritize raw risks in terms of likelihood & consequences
      • Review adequacy of existing policies, controls & systems
      • Conduct gap analysis
    • Risk Treatment
      • Identify risk mitigation options – measures to avoid, modify, share, retain & treat risks
      • Consider organization’s risk tolerance appetitive
      • Consider cost-benefits & effects on residual risk
      • Communicate to management / decision makers
    • Implement Treatment Plan
      • Budget Allocation & RFP Exercise
      • Project Management
      • Change Management
      • Monitor, maintain, review & communicate
  • 13. Getting Management Buy-in Prepare Your Business Case Apply the Art of Rhetoric: Pathos – Ethos – Logos Highlight the Risks: Security, Safety, Legal & Reputational Present Case Studies: Real Incidents & Near Misses Highlight Moral & Legal Imperatives: Duty of Care, Right Thing to Do Identify Gaps: Vulnerabilities & deficiencies in existing program Present the Solution: Your proposal Run the Numbers: Cost-Benefits & Value Proposition Put Numbers in Context: Compare program cost to Snr. Mgrs Salary. Present costs on a per capita basis Aristotle: 384 BC – 322 BC
  • 14. Online Travel Locator System
    • Captures travel itineraries:
      • Flight details & hotel bookings
      • Of business travellers.
      • From official travel agency
    • Allows Security/Travel Managers to:
      • Track
      • Locate
      • Account
      • Communicate with business travellers
    • Travel must be booked via an official travel agency.
  • 15. Online Travel Tracker System
  • 16. Traveller’s Particulars Travellers (or arrangers) must pass following info to the travel agent E.g. VIP Status = “Yes” or VIP Status = “No” Indicates whether traveller holds an SVP (or equivalent) appointment or above to ensure compliance with policy requirement that no more than three VIPs travel on same aircraft. VIP status 7. E.g. “Traffic Dept.” or “Group HR”, etc. Traveller’s department name 6. E.g. “AIA Hong Kong Ltd.” or “AIA Co. Ltd.” Traveller’s company name 5. E.g. +852 12345678 Traveller’s mobile telephone number 4. E.g. John- [email_address] or [email_address] Traveller’s email address 3. E.g. 12345 Traveller’s Staff ID No. 2. In <SURNAME, Forenames> format E.g. “CHAN, Fat Sin John” or “SMITH, John James”. Traveller’s full name 1. Remarks Required Particulars
  • 17.
    • Once hotel is booked & air ticket is ready to be issued:
      • Provide Travel Agent with the FULL hotel name
    • If staying at more than one hotel during trip:
      • Provide FULL name of  ALL hotels together with CHECK-IN & CHECK-OUT dates for each hotel.
    • Ensures accurate data in Travel Locator System
    Hotel Booking Procedures
  • 18. Questions? Jeremy Stone, CPP Deputy Head – Group Corporate Security American International Assurance Co., Ltd. AIA Building, 1 Stubbs Road, Wanchai, HK T: +852 2832-8017 | M: +852 6277-7644 [email_address] | www.aia.com