An alarm was triggered at the Mati branch of Enterprise Bank around 8:30PM on July 25th, 2017. The outsourced security monitoring company, SSMI, informed the fire department as per their standard procedure. However, when the branch head checked, there were no signs of fire or hazard. It was later learned that there had been power outages in Mati City that evening. The security monitoring company does not provide monthly reports of incidents to the bank as required. The security chief recommends reviewing contracts with SSMI, establishing clear incident response protocols, and recalibrating security devices.
13 Initial Project Site Office Set-up Risk Assessment Templates
Working adjacent to public areas
Vehicles/Plant Equipment movements
Groundworks / excavations
Excavation in site area
Trial trenches, septic tank excavation etc.
Works at Height
(Office cabin set-up)
Use of Ladders and stepladders
Mobile Crane operation
(Cabin/unit placing)
Temporary electrics - offices
Site generators – offices and site
Introduction ………………………………………………………………………….…….......04
1.1 Purpose and Objective……………………………………………………………..........04
1.2 Legislation and References………………………………………………………..........04
1.3 Scope & Project Details……………………………………………………………….…..04
1.4 Revisions…………………………………………..…………………………...……………05
2. Roles and Responsibilities…………………………………………………………….……..05
2.1 Person(s) Responsible for Ensuring Compliance with this Plan………….…......…….08
3. Strategy…………………………………………………………………………………….……..08
3.1 Procedure for the Implementation of the Strategy…………..…………….....……...09
3.1.1 Good Housekeeping, Waste Management & Waste Disposal………………09
3.1.2 Proper Use & Safe Guarding of Ignition Sources…...………………..……...10
3.1.2.1 Classification of Fire (Based On the Type of Materials Involved)………..13
3.1.3 Training………………………………………..………………………………….….15
3.1.4 Use of Fire Retardant Materials………………….………………………….…....15
3.1.5 Cable Management……….……………………………………………………...…16
3.1.6 Equipment Inspection and Maintenance…………………………………….....16
3.1.7 Permit To Work Systems – Emphasis on Strict implementation of Fire
Prevention & protection plan……………………………………………...…..…16
3.1.8 Portable Fire Extinguishers………………………………….………………….…16
4. Fire & Safety during Construction…………………………………………………………….19
5. Summary of Fire Protection Program…………………………………………………...……20
6. Fire Prevention, Control, Containment and Fire Fighting………….………………………20
7. Initial Notification Procedure…………………………………………………………………...21
8. Termination of Fire Threat……………….……………………………………………….…….22
9. Fire Action Summary (For Site and Offices)………………………………………………..22
10. Assembly Points and First Aid Facility……………………………….……………………23
13 Initial Project Site Office Set-up Risk Assessment Templates
Working adjacent to public areas
Vehicles/Plant Equipment movements
Groundworks / excavations
Excavation in site area
Trial trenches, septic tank excavation etc.
Works at Height
(Office cabin set-up)
Use of Ladders and stepladders
Mobile Crane operation
(Cabin/unit placing)
Temporary electrics - offices
Site generators – offices and site
Introduction ………………………………………………………………………….…….......04
1.1 Purpose and Objective……………………………………………………………..........04
1.2 Legislation and References………………………………………………………..........04
1.3 Scope & Project Details……………………………………………………………….…..04
1.4 Revisions…………………………………………..…………………………...……………05
2. Roles and Responsibilities…………………………………………………………….……..05
2.1 Person(s) Responsible for Ensuring Compliance with this Plan………….…......…….08
3. Strategy…………………………………………………………………………………….……..08
3.1 Procedure for the Implementation of the Strategy…………..…………….....……...09
3.1.1 Good Housekeeping, Waste Management & Waste Disposal………………09
3.1.2 Proper Use & Safe Guarding of Ignition Sources…...………………..……...10
3.1.2.1 Classification of Fire (Based On the Type of Materials Involved)………..13
3.1.3 Training………………………………………..………………………………….….15
3.1.4 Use of Fire Retardant Materials………………….………………………….…....15
3.1.5 Cable Management……….……………………………………………………...…16
3.1.6 Equipment Inspection and Maintenance…………………………………….....16
3.1.7 Permit To Work Systems – Emphasis on Strict implementation of Fire
Prevention & protection plan……………………………………………...…..…16
3.1.8 Portable Fire Extinguishers………………………………….………………….…16
4. Fire & Safety during Construction…………………………………………………………….19
5. Summary of Fire Protection Program…………………………………………………...……20
6. Fire Prevention, Control, Containment and Fire Fighting………….………………………20
7. Initial Notification Procedure…………………………………………………………………...21
8. Termination of Fire Threat……………….……………………………………………….…….22
9. Fire Action Summary (For Site and Offices)………………………………………………..22
10. Assembly Points and First Aid Facility……………………………….……………………23
1. Project Information: (To be filled by initiator/originator)
Project Name: Permit No.:
Project Location:
Requesting Contractor/Company
2. Permit Issuance Details: (To be filled by initiator/originator)
THIS PERMIT IS ONLY FOR ONE SHIFT AND NOT EXTENDABLE
Description of Task:
Detail of Surroundings:
Permit Validity:
Time (from): __________Hrs.
Time (To): __________Hrs.
Date:
3. Excavation Details: (To be filled by initiator/originator)
Location of Excavation:
Click here to enter text.
Excavation Dimensions:
☐ Depth: Enter Depth
☐ Width: Enter Width
☐ Length: Enter Length
☐ Other(s): Enter Others
Type of Excavation: ☐ Ditches
☐ Trenches
☐ Shafts
☐ Tunneling (drilling /Boring)
☐ Well
☐ Post Driving
☐ Other(s): Enter Others
Excavation Tools/ Equipment ☐ Hand Shovel
☐ Pickaxe
☐ Excavator
☐ Shovel
☐ Skid steer Loader
☐ Backhoe Loader
☐ Other(s): Enter Others
Identified Underground Service(s): ☐ Electrical
☐ Sewer/ Water
☐ Drainage
☐ Communication/Data
☐ Gas
☐ Other(s): Enter Others
Underground Condition(s): ☐ Water Table, Depth: Enter Depth
☐ Tanks
☐ Vaults
☐ Wells
☐ Void & structure
☐ Chemicals
☐ Volatile Fuels
☐ Toxic Gases
☐ Other(s): Enter Others
Excavation Protection(s) By: ☐ Slope, (in degrees from horizontal) Enter Angle as per soil condition
☐ Benching
☐ Sheet, Waling, Strutting
☐ Soldier piling
☐ Void & structure
☐ Proprietary support system
☐ Other(s): Enter Others
Notification(s) given to( If Required): ☐ Relevant Authorities: Click here to enter text.
☐ Utility Service Provider(s): Click here to enter text.
☐ Owner Of Adjoining Properties :
☐ Other(s): Click here to enter text.
4. Control Measures: (To be filled by initiator/originator and verified by Evaluator)
Checks Yes-No-NA Checks Yes-No-NA
Applicable NOCs available ☐ ☐ ☐
Safe means of access/egress provided ☐ ☐ ☐
Method statement & Risk assessment developed, approved & communicated? ☐ ☐ ☐
Ladder are secured, fixed & maintained ☐ ☐ ☐
Operatives are trained and competent? ☐ ☐ ☐
Workplace appropriately illuminated ☐ ☐ ☐
Site is surveyed correctly, marked and identified ☐ ☐ ☐
Ventilation means are available ☐ ☐ ☐
All underground services checked & validated ☐ ☐ ☐
Proper signage are posted ☐ ☐ ☐
Certified cable detector used to verify above ☐ ☐ ☐
Adequate barricade to prevent fall of person/vehicle ☐ ☐ ☐
Ground conditions are examined with bore/trial pit ☐ ☐ ☐
Flash light are fixed on the barricades ☐ ☐ ☐
Water table is located ☐ ☐ ☐
Trained flagman deputed to caution traffic ☐ ☐ ☐
Adjacent properties/services exist? Inspected? ☐ ☐ ☐
Adequate traffic diversion is provided ☐ ☐ ☐
Stability of adjacent property structure ensured/secured ☐ ☐ ☐
Trained banksman available for plants ☐ ☐ ☐
Adequate arrangement to prevent Cave-in ☐ ☐ ☐
Mandatory/specific good condition PPEs are available ☐ ☐ ☐
Dewatering arrangem
Emergency Response Training has been implemented to many corporate giants and are being used by some of my counter parts. This programme involves earth quake, fire fighting, tsunami, armed intruder and bomb threat. The second version of this programme is called Workplace Emergency Preparedness Training (WEPT) soon will be launched in this Slide Share
CONSULTATION AND COMMUNICATION MANAGEMENT
HSE-01
1. Glossary of Terms & Abbreviation 4
2. Scope 5
3. Process Owner 5
4. Reference and Record Documentation 5
5. Notes 5
6. Process Map 6
7. Process Description 8
Discuss the sub elements of worksite hazard analysis
Identify typical hazards in the workplace
Review various techniques that can be used to identify hazards in the workplace
1. Project Information: (To be filled by initiator/originator)
Project Name: Permit No.:
Project Location:
Requesting Contractor/Company
2. Permit Issuance Details: (To be filled by initiator/originator)
THIS PERMIT IS ONLY FOR ONE SHIFT AND NOT EXTENDABLE
Description of Task:
Detail of Surroundings:
Permit Validity:
Time (from): __________Hrs.
Time (To): __________Hrs.
Date:
3. Excavation Details: (To be filled by initiator/originator)
Location of Excavation:
Click here to enter text.
Excavation Dimensions:
☐ Depth: Enter Depth
☐ Width: Enter Width
☐ Length: Enter Length
☐ Other(s): Enter Others
Type of Excavation: ☐ Ditches
☐ Trenches
☐ Shafts
☐ Tunneling (drilling /Boring)
☐ Well
☐ Post Driving
☐ Other(s): Enter Others
Excavation Tools/ Equipment ☐ Hand Shovel
☐ Pickaxe
☐ Excavator
☐ Shovel
☐ Skid steer Loader
☐ Backhoe Loader
☐ Other(s): Enter Others
Identified Underground Service(s): ☐ Electrical
☐ Sewer/ Water
☐ Drainage
☐ Communication/Data
☐ Gas
☐ Other(s): Enter Others
Underground Condition(s): ☐ Water Table, Depth: Enter Depth
☐ Tanks
☐ Vaults
☐ Wells
☐ Void & structure
☐ Chemicals
☐ Volatile Fuels
☐ Toxic Gases
☐ Other(s): Enter Others
Excavation Protection(s) By: ☐ Slope, (in degrees from horizontal) Enter Angle as per soil condition
☐ Benching
☐ Sheet, Waling, Strutting
☐ Soldier piling
☐ Void & structure
☐ Proprietary support system
☐ Other(s): Enter Others
Notification(s) given to( If Required): ☐ Relevant Authorities: Click here to enter text.
☐ Utility Service Provider(s): Click here to enter text.
☐ Owner Of Adjoining Properties :
☐ Other(s): Click here to enter text.
4. Control Measures: (To be filled by initiator/originator and verified by Evaluator)
Checks Yes-No-NA Checks Yes-No-NA
Applicable NOCs available ☐ ☐ ☐
Safe means of access/egress provided ☐ ☐ ☐
Method statement & Risk assessment developed, approved & communicated? ☐ ☐ ☐
Ladder are secured, fixed & maintained ☐ ☐ ☐
Operatives are trained and competent? ☐ ☐ ☐
Workplace appropriately illuminated ☐ ☐ ☐
Site is surveyed correctly, marked and identified ☐ ☐ ☐
Ventilation means are available ☐ ☐ ☐
All underground services checked & validated ☐ ☐ ☐
Proper signage are posted ☐ ☐ ☐
Certified cable detector used to verify above ☐ ☐ ☐
Adequate barricade to prevent fall of person/vehicle ☐ ☐ ☐
Ground conditions are examined with bore/trial pit ☐ ☐ ☐
Flash light are fixed on the barricades ☐ ☐ ☐
Water table is located ☐ ☐ ☐
Trained flagman deputed to caution traffic ☐ ☐ ☐
Adjacent properties/services exist? Inspected? ☐ ☐ ☐
Adequate traffic diversion is provided ☐ ☐ ☐
Stability of adjacent property structure ensured/secured ☐ ☐ ☐
Trained banksman available for plants ☐ ☐ ☐
Adequate arrangement to prevent Cave-in ☐ ☐ ☐
Mandatory/specific good condition PPEs are available ☐ ☐ ☐
Dewatering arrangem
Emergency Response Training has been implemented to many corporate giants and are being used by some of my counter parts. This programme involves earth quake, fire fighting, tsunami, armed intruder and bomb threat. The second version of this programme is called Workplace Emergency Preparedness Training (WEPT) soon will be launched in this Slide Share
CONSULTATION AND COMMUNICATION MANAGEMENT
HSE-01
1. Glossary of Terms & Abbreviation 4
2. Scope 5
3. Process Owner 5
4. Reference and Record Documentation 5
5. Notes 5
6. Process Map 6
7. Process Description 8
Discuss the sub elements of worksite hazard analysis
Identify typical hazards in the workplace
Review various techniques that can be used to identify hazards in the workplace
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1. INCIDENT REPORT
Security
Department
C O N F I D E
N T I A L
CASE : FALSE FIRE ALARM
VENUE : Mati Branch
FOR : ATTY. RONALD E. ALVIZO
Chief Executive Officer (CEO)
Enterprise Bank, Inc.
FROM : SECURITY DEPARTMENT
DATE : 26 July 2017
I. – FACT OF REFERENCE:
1. On or about 8:30PM (2000H) of 25 July 2017, a call received from SSMI
(outsourced security alarm monitoring) witch phone number 0928-524-6969,
informing that an alarm has been triggered at EBI Mati Branch.
An immediate action has been ordered to inform the nearest Fire Station
of the area, since they (SSMI) has the contact number. To gather the
veracity of the triggered alarm and deployment of firefighting personnel
and equipment.
2. Upon the received of the call from SSMI, as standard operating procedure
(SOP) the branch head of EBI Mati Branch has been inform thru contacting
with their provided mobile numbers.
Miss Minerva V. Moyet the branch head of EBI Mati, answered the call
guarantying to took actions and disseminate the information to its staff
since there are EBI employees stationed near the location of EBI
Branch.
II. – VERIFICATION AND IDENTIFICATION OF INCIDENT:
1. On or about 9:00PM (2100H) of that same date, Miss Minerva V. Moyet called
for the update of the triggered alarm, as for her ocular verification there is no
signs of fire and in any form of causes to trigger the alarm.
2. INCIDENT REPORT
Security
Department
C O N F I D E
N T I A L
III. – FURTHER ANALYSIS:
1. Information gathered that on 25 July 2017, there were electric interruptions at
Mati City. The power interruption lasted until the closure of the branch office.
Rest assured by the personnel of EBI Mati Branch that standard closing
procedure has been made and preventive measures have been apllied.
2. On or about 8:30AM (0800H) 26July 2017, a confirmation call from the EBI
Mati branch head (Miss Minerva V. Moyet) updating the incident that took
place, that the “smoke alarm” (fire alarm device) is intact and no signs of
eminent hazard occurred outside and inside the bank premises.
3. Later have known thru inquires of the previous event, that sometimes the
alarm has been triggered with uncertain cause.
The said incidents were reported and the SSMI assured to take actions,
as the SSMI sent technicians to resolve the verged errors.
IV. – DICUSSION:
Finding veracious information of the incident to be considered:
First, the SSMI as the monitoring system of entire EBI branches security
alarm and to minimize risk as its purpose, they have the rights and
prerogative to deploy the appropriate concern in regards of what kind of alarm
or incident arises under their watch.
It is about SSMI’s standard protocol of information that as common
practice to first call the EBI management officers to inform that an alarm
has been triggered and asking the opinion of the officer to its either to
call an assistance and deploy as needed.
As an understanding that the bank is a unique business governing
money transactions and transacting important matters and documents
which can an any incident could jeopardized the banking transaction.
And ranking the 3rd most risk establishment/business as criminal
centered of interest.
SSMI should implement the preliminary assessment of the event to
inform first the authorities to engage verification until such procedure
complied, inform the EBI management of the action taken.
3. INCIDENT REPORT
Security
Department
C O N F I D E
N T I A L
Second, the SSMI should furnish the EBI management a recaps report of
incident occurred bank-wide monthly, this is to federate files for future
references.
As of the present the monthly report has not been gratified by SSMI.
V. – RECOMMENDATION:
1. Review our service contract of SSMI for the service monthly reporting,
maintenance of security devices and alarms and its warranty.
2. Coordination with the EBI Management in-charge and SSMI Management
to establish information protocol on assessment of incident occurrence.
3. Re-calibration of all security devices, as record all the devices has been
pass-due to their warranty and peak of their performance.
FOR THE MANAGEMENT
Prepared by:
KIM RICHARD LOPEZ, CSP, CSMS
Chief Security Officer (CSO)
Enterprise Bank, Inc.