JAČANJE KAPACITETA LOKALNIH VLASTI U JUGOISTOČNOJ EUROPI
Na nacionalno susretu, 8-10 srpnja 2015 u organizaciji WORLD BANK-AUSTRIA , a u sklopu PROGRAMA URBANOG PARTNERSTVA (UPP II) održao sam malu prezentaciju o stanju imovine u vodnom sektoru i što budućnost u certificiranju donosi.
Građani Hrvatske,
sačuvajte naše rijeke i potoke, sačuvajte zdravlje sebe i okoliša, sačuvajte svoje novce, prijavite kriminalce.
Spasimo Hrvatsku od vodenog lobija koji masno zarađuje uništavajući Hrvatsku daleko od očiju javnosti!
Građani Hrvatske,
sačuvajte naše rijeke i potoke, sačuvajte zdravlje sebe i okoliša, sačuvajte svoje novce, prijavite kriminalce.
Spasimo Hrvatsku od vodenog lobija koji masno zarađuje uništavajući Hrvatsku daleko od očiju javnosti!
This document contains an assessment checklist used to evaluate assignments at several educational institutions in Malaysia. The checklist contains 13 criteria used to assess assignments, including whether learning outcomes, assessment criteria, and program outcomes are clear to students. Assignments are also evaluated based on appropriate task complexity, relevance to the program, realistic deadlines, and freedom from bias. The checklist is signed by an assessor and internal verifier upon review, and includes space for comments on specific assignment questions or tasks. A second section of the checklist is used specifically for English language assignments and focuses on grammatical accuracy.
Use this checklist to record evidence of conformance to the new and enhanced requirements of ISO/IEC 27001:2013. You may complete it
during one or more visits.
Implementing a Security Framework based on ISO/IEC 27002pgpmikey
The document discusses implementing an information security framework based on ISO/IEC 27002. It outlines the sections of the ISO 27002 standard, describes how to assess the scope and maturity of an organization's security practices, and discusses developing a policy framework, benchmarking, and tracking progress. The presentation covers next steps such as addressing other audits, risk assessment, and developing an information security program.
The document discusses the key differences between ISO 27001:2013 and the previous 2005 version. Some major changes include a new structure aligned with other standards, expanded risk assessment requirements, greater focus on measurement and evaluation of ISMS performance, new requirements around outsourcing, and controls grouped in a more logical way. The 2013 version aims to better integrate with other management standards and focuses more on organizational context, leadership commitment, and risk-based thinking.
Here are the ISO 27001:2013 documentation, implementation and audit requirements.
This document specified documentation, implementation and audit requirements for only ISO 27001, but not 114 controls specified in Annex A.
I request IS practitioners to comment and suggest improvements.
In this article I will provide an Overview of A new Information Security Management System
Standard ISO/IEC 27001:2013 , The new standard just Published from a few Days Earlier .
ISO/IEC 27001:2013 Provides requirements for Establishing, Implementing, Maintaining
and Continually Improving an Information Security Management System.
ISO/IEC 27001:2013 gives Organization a Perfect Information Security management framework for implementing
and maintaining security.
In this Article, I tried to shed some light on new standard and its Mandatory Requirements, Optional Requirements ,
Structure , Benefits , Certification Process and Estimated time for Implementation and Certification.
Information Security Management System ISO/IEC 27001:2005ControlCase
The document provides an overview of the ISO/IEC 27001 standard for information security management systems. It defines what ISO 27001 is, its history and development over time. It outlines the key parts of ISO 27001 including establishing an ISMS framework, conducting risk assessments, implementing controls, and monitoring/reviewing the system. The document explains benefits of ISO 27001 certification include improving security, ensuring regulatory compliance, and gaining external validation of security practices. It provides examples of specific controls defined in Annex A of the standard related to security policies, asset management, access control, and more.
This document contains an assessment checklist used to evaluate assignments at several educational institutions in Malaysia. The checklist contains 13 criteria used to assess assignments, including whether learning outcomes, assessment criteria, and program outcomes are clear to students. Assignments are also evaluated based on appropriate task complexity, relevance to the program, realistic deadlines, and freedom from bias. The checklist is signed by an assessor and internal verifier upon review, and includes space for comments on specific assignment questions or tasks. A second section of the checklist is used specifically for English language assignments and focuses on grammatical accuracy.
Use this checklist to record evidence of conformance to the new and enhanced requirements of ISO/IEC 27001:2013. You may complete it
during one or more visits.
Implementing a Security Framework based on ISO/IEC 27002pgpmikey
The document discusses implementing an information security framework based on ISO/IEC 27002. It outlines the sections of the ISO 27002 standard, describes how to assess the scope and maturity of an organization's security practices, and discusses developing a policy framework, benchmarking, and tracking progress. The presentation covers next steps such as addressing other audits, risk assessment, and developing an information security program.
The document discusses the key differences between ISO 27001:2013 and the previous 2005 version. Some major changes include a new structure aligned with other standards, expanded risk assessment requirements, greater focus on measurement and evaluation of ISMS performance, new requirements around outsourcing, and controls grouped in a more logical way. The 2013 version aims to better integrate with other management standards and focuses more on organizational context, leadership commitment, and risk-based thinking.
Here are the ISO 27001:2013 documentation, implementation and audit requirements.
This document specified documentation, implementation and audit requirements for only ISO 27001, but not 114 controls specified in Annex A.
I request IS practitioners to comment and suggest improvements.
In this article I will provide an Overview of A new Information Security Management System
Standard ISO/IEC 27001:2013 , The new standard just Published from a few Days Earlier .
ISO/IEC 27001:2013 Provides requirements for Establishing, Implementing, Maintaining
and Continually Improving an Information Security Management System.
ISO/IEC 27001:2013 gives Organization a Perfect Information Security management framework for implementing
and maintaining security.
In this Article, I tried to shed some light on new standard and its Mandatory Requirements, Optional Requirements ,
Structure , Benefits , Certification Process and Estimated time for Implementation and Certification.
Information Security Management System ISO/IEC 27001:2005ControlCase
The document provides an overview of the ISO/IEC 27001 standard for information security management systems. It defines what ISO 27001 is, its history and development over time. It outlines the key parts of ISO 27001 including establishing an ISMS framework, conducting risk assessments, implementing controls, and monitoring/reviewing the system. The document explains benefits of ISO 27001 certification include improving security, ensuring regulatory compliance, and gaining external validation of security practices. It provides examples of specific controls defined in Annex A of the standard related to security policies, asset management, access control, and more.
Information Security Management System ISO/IEC 27001:2005
Upravljanje imovinom
1. Upravljanje imovinom
komunalnih društava i nove
međunarodne norme za
upravljanje javnom imovinom
Josip Rukavina,dipl.ing. | Vectrino d.o.o. | Direktor i
voditelj posebnih projekata
JAČANJE KAPACITETA LOKALNIH VLASTI U JUGOISTOČNOJ EUROPI
WORLD BANK-AUSTRIA PROGRAM URBANOG PARTNERSTVA (UPP II)
NACIONALNI SUSRET, 8-10 SRPNJA, 2015, POREČ
2. Što je upravljanje imovinom?
Asset management (eng.) – pojavljuje se kao termin
80tih
PASS 55 (planiraj-napravi-provjeri-djeluj).
ISO 55000 (od 2014 godine).
Očekivana praksa respekatabilnih organizacija u
Zamjena/rehabilitacija - 1 minuta prije kolapsa
3. Stanje vodne infrastrukture u RH
Gotovo nepoznato
NALAS projekt 2014 “Izvještaj o upravljanju
praksama upravljanja koje se provode u RH”
Analizirana 4 isporučitelja vodne usluge
Područje jedne županije / nova uslužna područje
Vlade RH ljeto 2014)
5. Stanje vodne infrastrukture u RH
LIBURNIJSKE
d.o.o.
PONIKVE VODA
KTD ŽRNOVNICA
d.o.o.
KD VODOVOD I
KANALIZACIJA
Broj stanovnika
pokrivenih
uslugom
28.336 19.042 19.691 183.473
Broj zaposlenih 77 201 102 325
Broj vodovodnih
priključaka
13.449 22.000 3.754 39.441
Broj
kanalizacijskih
priključaka
5.707 9.044 2.001 14.682
Quality System
ISO 9001
ISO 22001
HACCP
ISO 9001
ISO 14001
-
ISO 9001
ISO 14001
ISO 18001
ISO 22001
ISO IEC 17025
6. Stanje po upitu Isporučiteljima
Posjedujemo imovinu
Ne poznamo njezino stanje
Ne upravljamo tom imovinom
Gradimo i održavamo na temelju osobne procjene
9. o pumpama
• Koliko imamo pumpnih stanica?
• Koliko imamo pumpi?
• Kada smo ih izgradili?
• Cijena jedne pumpe?
• Možemo li promijeniti sve pumpe
ove godine?
• Koliko će nas to koštati?
• Koliko smo godina “mirni”?.
17
3 po PSu
1964, 1975, 1892…
10.000€
Da
17 x 3 x 10.000€
20…
10. • Kada smo izgradili cjevovod?
• Koliko nas je koštao prilikom
izgradnje?
• Da li se amortizirao?
• Koliko nas je koštao u uporabi?
• Kakvo je njegovo stanje?
• Hoće li se u toj ulici nešto kopati?
• Hoćemo li ga rehabilitirati ili kopati?
• Koliko još može “izdržati”?
o cjevovodima
?
Možda?
Khm…
Zna šef.
????
?
?
???????
11. Amortizacija
Najčešće koristimo
lineranu amortizaciju
Stopa 2% - vijek
trajanja 50 godina
UKAS – zamjena
cjevovoda svakih 500
godina
Zamjena/rehabilitacija -
minuta prije kolapsa
Stvarnost
• Dioklecijanov akvadukt
• građen prije 1700 godina
• Izvan uporabe / potpuno funkcionalan
• Stopa amortizacije 0.058%
12. Što “donosi” ISO 55000
Upoznavanje sa postojećom imovinom
Odgovornost prema kupcima i vlasnicima
Smanjenje i procjena troškova
Promjene stope amortizacije (mijenja se očekivano
vrijeme trajanja cjevovoda)
14. …kupcu
• ISO 55001 daje sigurnost
da dobro upravljamo
imovinom
• osigurava kontinuiranu
vodoopskrbu/kvalitetu vode
za piće
• osigurava da nema
poremećaja u radu odvodnje
15. …vlasniku
• osigurava da će za svoj
novac dobiti (ugraditi)
najbolju imovinu
• “oslobađa” novac za
daljne investicije
• smanjuje iznose računa i
drži ih na najnižoj razini
17. Kako krenuti?
Integriranje planiranja održavanja imovine u
cjelokupne tvrtke
Strateški plan – što je bitno kod nove imovine, a što
postojeće (cilj u slijedećih 5 godina…)
Upoznavanje imovine – nove informacije o
imovini
Odabir PI-ja (broj puknuća po dužini, zabranjeno
zagađenje obalnog mora…)
Izrada radnih uputa za održavanje / preoblikovanje
postojećih za smanjenje troškova održavanja
18. Izazov
Uvjeravanje zaposlenika da se moraju
unaprijeđivati/mijenjati da bi postigli što bolje
Razumijevanje da nas kupci i vlasnici trebaju kao
operatere
Razumijevanje okoliša u kojem djelujemo
Kako biti PRVI u okolini u kojoj će održavanje
“termin” tek za 10 godina