Plan South Sudan did not previously have a formalized security management system in place. They have since established a comprehensive security system that includes continuously assessing risks, developing security plans and procedures, providing security training to staff, establishing communication systems, and ensuring security measures are in place at offices and facilities. The new security management system aims to reduce vulnerabilities by implementing recommendations from risk assessments and adapting plans based on changes in the security environment.
NGOs Field Security Management Approach & Systems 2.pptxLouison Malu-Malu
The document provides information on security risk management and security risk assessments for NGOs operating in unstable environments. It defines key terms like strategy, planning, tactics, security risk management, and security risk assessment. It also discusses developing a security risk assessment, identifying threats and vulnerabilities, and using risk assessments to effectively manage security risks. The document provides examples of how to classify risk levels in different areas and outlines contingency plans, relocation thresholds, and evacuation procedures.
NGOs security management system implementation is facilitated by the NGOs security management framework.
The Security Risk Management model
is the managerial tool of NGOs for the analysis of safety and security hazards that may affect its personnel, assets and operations.
The definition of Security Risk Management is:
SRM is an analytical procedure that assists in assessing the operational context of the NGO; and identifies the risk level of undesirable events that may affect personnel, assets, and operations; providing guidance on the implementation of solutions in the form of specific mitigation strategies and measures with the aim of lowering the risk levels for the NGO by reducing the impact and likelihood of an undesirable event.
The document provides an overview of the Incident Command System (ICS) for responding to emergencies. It describes the basic features and management functions of ICS including command, operations, planning, logistics, and finance/administration. It also outlines steps for incident notification, situation analysis, developing an incident action plan, and transferring command responsibility.
This document discusses contingency planning for events. It emphasizes identifying potential risks and developing safety and security measures to protect attendees. A safety and security team should assess risks at the event venue and develop an emergency plan. Hazards are identified for different areas like structures, effects, electricity, and transportation. Crowd control and sanitation are also important factors to consider. Developing contingency plans can help minimize effects if problems do occur.
The document provides an overview of the Incident Command System (ICS). It discusses the history and origins of ICS in the 1970s from the FIRESCOPE project. ICS can be used to manage both small and large emergency and non-emergency events. The key components of ICS include the incident commander, command and general staff, organizational structure with sections, branches, divisions and units, facilities like the incident command post, and concepts like the incident action plan, span of control, and unified command. ICS provides a standardized approach to the command, control, and coordination of emergency response.
1) The document outlines an emergency preparedness plan and evacuation process for fire safety. It discusses identifying fire risks, developing an emergency plan, and establishing evacuation procedures.
2) Key components of the emergency plan include defining roles and responsibilities, reporting procedures, designating control centers, work shutdown processes, evacuation routes, and training emergency response teams.
3) In the event of a fire, the plan provides steps like sounding alarms, gathering at safe assembly points, switching off power, notifying security and emergency services, and accounting for all personnel after evacuation. Regular drills are emphasized to prepare effectively for emergencies.
Safety guidelines by ec 12 risk management r 4Mumbai Hiker
The document outlines safety guidelines for risk management in adventure activities. It states that organizations should implement risk management processes to identify, assess, and mitigate risks. This includes preparing emergency response plans for high-risk activities and reviewing them prior to events. Guidelines are provided for conducting risk assessments, classifying participants' experience levels, and determining acceptable risk levels for different types of activities. An emergency handling mechanism is also defined that includes assessing incidents, determining the appropriate response level, and having pre-determined emergency response plans for high-risk activities.
The Incident Command System (ICS) is a model for command, control, and coordination of emergency response at the site level.
ICS is “Organized Common Sense”
NGOs Field Security Management Approach & Systems 2.pptxLouison Malu-Malu
The document provides information on security risk management and security risk assessments for NGOs operating in unstable environments. It defines key terms like strategy, planning, tactics, security risk management, and security risk assessment. It also discusses developing a security risk assessment, identifying threats and vulnerabilities, and using risk assessments to effectively manage security risks. The document provides examples of how to classify risk levels in different areas and outlines contingency plans, relocation thresholds, and evacuation procedures.
NGOs security management system implementation is facilitated by the NGOs security management framework.
The Security Risk Management model
is the managerial tool of NGOs for the analysis of safety and security hazards that may affect its personnel, assets and operations.
The definition of Security Risk Management is:
SRM is an analytical procedure that assists in assessing the operational context of the NGO; and identifies the risk level of undesirable events that may affect personnel, assets, and operations; providing guidance on the implementation of solutions in the form of specific mitigation strategies and measures with the aim of lowering the risk levels for the NGO by reducing the impact and likelihood of an undesirable event.
The document provides an overview of the Incident Command System (ICS) for responding to emergencies. It describes the basic features and management functions of ICS including command, operations, planning, logistics, and finance/administration. It also outlines steps for incident notification, situation analysis, developing an incident action plan, and transferring command responsibility.
This document discusses contingency planning for events. It emphasizes identifying potential risks and developing safety and security measures to protect attendees. A safety and security team should assess risks at the event venue and develop an emergency plan. Hazards are identified for different areas like structures, effects, electricity, and transportation. Crowd control and sanitation are also important factors to consider. Developing contingency plans can help minimize effects if problems do occur.
The document provides an overview of the Incident Command System (ICS). It discusses the history and origins of ICS in the 1970s from the FIRESCOPE project. ICS can be used to manage both small and large emergency and non-emergency events. The key components of ICS include the incident commander, command and general staff, organizational structure with sections, branches, divisions and units, facilities like the incident command post, and concepts like the incident action plan, span of control, and unified command. ICS provides a standardized approach to the command, control, and coordination of emergency response.
1) The document outlines an emergency preparedness plan and evacuation process for fire safety. It discusses identifying fire risks, developing an emergency plan, and establishing evacuation procedures.
2) Key components of the emergency plan include defining roles and responsibilities, reporting procedures, designating control centers, work shutdown processes, evacuation routes, and training emergency response teams.
3) In the event of a fire, the plan provides steps like sounding alarms, gathering at safe assembly points, switching off power, notifying security and emergency services, and accounting for all personnel after evacuation. Regular drills are emphasized to prepare effectively for emergencies.
Safety guidelines by ec 12 risk management r 4Mumbai Hiker
The document outlines safety guidelines for risk management in adventure activities. It states that organizations should implement risk management processes to identify, assess, and mitigate risks. This includes preparing emergency response plans for high-risk activities and reviewing them prior to events. Guidelines are provided for conducting risk assessments, classifying participants' experience levels, and determining acceptable risk levels for different types of activities. An emergency handling mechanism is also defined that includes assessing incidents, determining the appropriate response level, and having pre-determined emergency response plans for high-risk activities.
The Incident Command System (ICS) is a model for command, control, and coordination of emergency response at the site level.
ICS is “Organized Common Sense”
The document discusses command systems used in emergency operations. It introduces the Incident Command System (ICS), which was developed in California in the 1970s in response to wildfires. ICS establishes a standardized organizational structure and common terminology to coordinate multi-agency emergency response. It is a modular system with five main sections: command, operations, planning, logistics, and finance/administration. The ICS aims to integrate the different organizations responding to an incident under a unified command structure to efficiently manage resources and improve information sharing. While ICS provides an effective framework when objectives are clear and organizations collaborate well, it also faces some criticism around flexibility and its ability to manage large-scale, prolonged emergencies.
Fire Life Safety- Evacuation Drills- By Richard Garrity 2015Richard Garrity
This presentation covers high rise evacuation drills and emergency equipment storage plans. It discusses developing an emergency action plan with evacuation procedures, rally points, plans for assisting handicapped individuals, and accounting for all employees. The importance of training employees, conducting drills, and designating fire wardens is emphasized. Guidelines are provided for the roles and responsibilities of employers, as well as considerations for emergency equipment, supply kits, and storage areas.
The document provides information on workplace emergency planning and preparedness based on the 2007 Oregon Fire Code. It discusses occupancy classification groups and when fire evacuation and safety plans are required. The plans must include elements like emergency egress routes, staff responsibilities, and procedures for different emergency scenarios. The document also covers requirements for emergency evacuation drills, staff training, and fire prevention measures. It emphasizes the importance of emergency planning to save lives and property in the event of fires or other emergencies.
The Incident Command System (ICS) is a standardized approach to the command, control, and coordination of emergency response that provides a common hierarchy within which responders from multiple agencies can be effective. ICS defines chain of command, management, and operational structures and addresses weaknesses of the past like lack of accountability, poor communication, and an overloaded incident commander. The system establishes common terminology, modular organization, management by objectives, and a unified command structure to coordinate response while maintaining unity of command.
The document discusses implementing an Incident Command System (ICS) within a multi-company organization. Some key points:
- The ICS will integrate three operating companies under common terminology and standards to improve coordination during emergencies.
- The system establishes an Incident Command structure for each affected area and an Area Command to coordinate company-wide response.
- Over 70 ICS roles have been defined, including roles for planning, operations, logistics, safety, public information and public liaison.
- An Incident Position Guide details each role and how the ICS structure would function during an emergency response.
This document provides a summary of key aspects that should be considered when developing a disaster preparedness plan for mission-critical facilities. It discusses the types of disasters that can occur and how to prevent failures through comprehensive design, maintenance programs, and addressing human errors. The disaster planning process involves preparation, detection and response, and recovery. Critical information and resources need to be backed up and stored at multiple locations. Assessments of hazards, vulnerabilities, risks, recovery capabilities, and safety are recommended to identify weaknesses and improve the disaster preparedness plan.
Incident Command System in the Private Sector - An OverviewReginaPhelps
The document discusses the Incident Command System (ICS), an organizational structure for managing emergencies and incidents. It describes the key components of ICS including the five main teams (Command, Operations, Planning/Intelligence, Logistics, Finance), their roles, and the benefits of using a standardized ICS structure. The presentation provides an overview of ICS and examples of how different organizations have implemented ICS teams within their own structures.
Lorne Murphy has over 20 years of experience in physical security, law enforcement, and emergency management. He currently works as a Senior Watch Officer for the Domestic Nuclear Detection Office, where he manages a team monitoring the Global Nuclear Detection Architecture. Previously, he served as an Operations Officer and Training Manager for a Navy squadron, where he oversaw antiterrorism training and ensured security clearances. Murphy seeks a new challenging career drawing on his leadership experience and specialized skills in areas like physical security, explosives handling, and incident response.
Gold Silver Bronze Command By J Mc CannJames McCann
The UK uses a gold-silver-bronze command structure for emergency management. The gold commander is overall in control from a distant command center, silver commander is in charge on scene, and bronze commander directly controls resources on scene. An example is the 2005 Buncefield oil depot fire, where the strategic operation was run from gold command off site, silver was initially on site then moved, and bronze was on the fire ground. Emergency management involves mitigation, preparation, response, and recovery phases.
School Incident Management Presentationguestd6096bf
The document discusses key principles of the National Incident Management System (NIMS) and Incident Command System (ICS) and how they can be applied to school-based emergencies. It explains that NIMS provides a standardized framework for incident response that improves coordination between responding agencies. The ICS establishes clear lines of command, management sections, common terminology and organizational structures to effectively respond to various incidents. The document outlines ICS roles and responsibilities and how schools can integrate NIMS and ICS principles into their emergency plans.
The document provides an overview of loss prevention, covering its historical development, key tools and concepts. It discusses risk analysis, planning, evaluation, research, standards, crime analysis, the role of loss prevention managers, environmental design strategies, insurance, threats from internal and external sources, safety issues, and planning and budgeting processes in loss prevention.
Risk management is important for construction projects. It involves identifying potential risks, assessing their likelihood and consequences, and developing responses to manage risks. The risk management process includes four steps: identifying hazards, assessing risks, controlling risks, and monitoring control measures. It aims to reduce the probability or impact of negative events. Key risks in construction relate to costs, time, and quality going over budget or being delayed. Risk management benefits projects by improving decision making and providing clear understanding of risks.
This document provides an overview of the Incident Command System (ICS) and how it relates to emergency communications. It explains that ICS training is required for various emergency response roles, with higher levels of training needed for more senior positions. The document outlines where communications functions fit within the ICS structure, typically within the Logistics Section. It also discusses forms used for communications planning and gives an example scenario of planning radio communications for a large parade event.
This document discusses how to bulletproof meetings and events from disasters and risks. It outlines steps for risk management, including forming a risk team to assess potential internal and external risks through a vulnerability analysis. The risk assessment and analysis informs the development of an emergency response plan with procedures, contact lists, and supporting documents. The plan aims to reduce the probability and consequences of emergencies through preparedness, training, contracts, and other mitigation strategies. Managing risks is important for meeting operations and safety.
This document summarizes the services provided by RSB International to safeguard clients and their assets globally. RSB offers a range of protection services including overt protection with highly trained agents, secure transportation, covert protection, and medical services. They also provide intelligence services such as threat assessments, trend analysis, targeted monitoring and actionable intelligence briefings. RSB offers tactical training programs in Israel and internationally on topics like canine operations, counterterrorism, and covert protection.
This document outlines the importance of emergency response planning. It defines emergencies and disasters, and discusses the key steps in developing an emergency response plan, including understanding hazards, conducting risk assessments, formulating response teams, and creating procedures to address communications, evacuation, and continuity of operations. An effective emergency response plan is comprehensive, addresses all potential emergency situations, and includes training employees and practicing the plan through exercises.
- The document provides a summary of a Jordanian security manager's qualifications, including over 20 years of experience managing security operations and personnel in both public sector and private industry roles. His experience includes positions as a security manager, police commander, training officer, and international peacekeeping roles. He seeks a new position utilizing his skills in security risk assessment, policy enforcement, safety planning, and leading security procedure implementation.
The document provides an overview of the Hazardous Waste Operations and Emergency Response (HAZWOPER) standard under 29 CFR 1910.120. It defines the standard's application, general requirements, emergency response plan requirements, and training requirements for different response levels - awareness, operations, technician, and specialist. Training must be tailored to employees' duties and increases with response level from a minimum of 8 hours for awareness to 24 hours for technician and specialist levels. Annual refresher training is also required.
The document discusses strategies for moving beyond tokenism and promoting full participation and inclusion of self-advocates on boards. It provides 10 tools for boards including providing hospitality, orientation and training, defining roles, reviewing agendas in advance, ensuring accessible materials and communication, and establishing supportive policies. The overall goal is to help self-advocates feel respected, listened to, and able to contribute and influence decisions.
This document discusses conceptualizing an integration between Enterprise Architecture Management (EAM) and Information System Security Risk Management (ISSRM). It proposes mapping concepts from an ISSRM domain model to the ArchiMate enterprise architecture modeling language. This would allow security risks and their impacts on business services to be represented and analyzed within an enterprise's architecture. Key concepts from ISSRM like assets, security goals, risks and treatments are mapped to equivalent concepts in ArchiMate's business, application and technology layers. The mapping is meant to support a risk-oriented design of an enterprise architecture that meets business services' security goals.
The document discusses command systems used in emergency operations. It introduces the Incident Command System (ICS), which was developed in California in the 1970s in response to wildfires. ICS establishes a standardized organizational structure and common terminology to coordinate multi-agency emergency response. It is a modular system with five main sections: command, operations, planning, logistics, and finance/administration. The ICS aims to integrate the different organizations responding to an incident under a unified command structure to efficiently manage resources and improve information sharing. While ICS provides an effective framework when objectives are clear and organizations collaborate well, it also faces some criticism around flexibility and its ability to manage large-scale, prolonged emergencies.
Fire Life Safety- Evacuation Drills- By Richard Garrity 2015Richard Garrity
This presentation covers high rise evacuation drills and emergency equipment storage plans. It discusses developing an emergency action plan with evacuation procedures, rally points, plans for assisting handicapped individuals, and accounting for all employees. The importance of training employees, conducting drills, and designating fire wardens is emphasized. Guidelines are provided for the roles and responsibilities of employers, as well as considerations for emergency equipment, supply kits, and storage areas.
The document provides information on workplace emergency planning and preparedness based on the 2007 Oregon Fire Code. It discusses occupancy classification groups and when fire evacuation and safety plans are required. The plans must include elements like emergency egress routes, staff responsibilities, and procedures for different emergency scenarios. The document also covers requirements for emergency evacuation drills, staff training, and fire prevention measures. It emphasizes the importance of emergency planning to save lives and property in the event of fires or other emergencies.
The Incident Command System (ICS) is a standardized approach to the command, control, and coordination of emergency response that provides a common hierarchy within which responders from multiple agencies can be effective. ICS defines chain of command, management, and operational structures and addresses weaknesses of the past like lack of accountability, poor communication, and an overloaded incident commander. The system establishes common terminology, modular organization, management by objectives, and a unified command structure to coordinate response while maintaining unity of command.
The document discusses implementing an Incident Command System (ICS) within a multi-company organization. Some key points:
- The ICS will integrate three operating companies under common terminology and standards to improve coordination during emergencies.
- The system establishes an Incident Command structure for each affected area and an Area Command to coordinate company-wide response.
- Over 70 ICS roles have been defined, including roles for planning, operations, logistics, safety, public information and public liaison.
- An Incident Position Guide details each role and how the ICS structure would function during an emergency response.
This document provides a summary of key aspects that should be considered when developing a disaster preparedness plan for mission-critical facilities. It discusses the types of disasters that can occur and how to prevent failures through comprehensive design, maintenance programs, and addressing human errors. The disaster planning process involves preparation, detection and response, and recovery. Critical information and resources need to be backed up and stored at multiple locations. Assessments of hazards, vulnerabilities, risks, recovery capabilities, and safety are recommended to identify weaknesses and improve the disaster preparedness plan.
Incident Command System in the Private Sector - An OverviewReginaPhelps
The document discusses the Incident Command System (ICS), an organizational structure for managing emergencies and incidents. It describes the key components of ICS including the five main teams (Command, Operations, Planning/Intelligence, Logistics, Finance), their roles, and the benefits of using a standardized ICS structure. The presentation provides an overview of ICS and examples of how different organizations have implemented ICS teams within their own structures.
Lorne Murphy has over 20 years of experience in physical security, law enforcement, and emergency management. He currently works as a Senior Watch Officer for the Domestic Nuclear Detection Office, where he manages a team monitoring the Global Nuclear Detection Architecture. Previously, he served as an Operations Officer and Training Manager for a Navy squadron, where he oversaw antiterrorism training and ensured security clearances. Murphy seeks a new challenging career drawing on his leadership experience and specialized skills in areas like physical security, explosives handling, and incident response.
Gold Silver Bronze Command By J Mc CannJames McCann
The UK uses a gold-silver-bronze command structure for emergency management. The gold commander is overall in control from a distant command center, silver commander is in charge on scene, and bronze commander directly controls resources on scene. An example is the 2005 Buncefield oil depot fire, where the strategic operation was run from gold command off site, silver was initially on site then moved, and bronze was on the fire ground. Emergency management involves mitigation, preparation, response, and recovery phases.
School Incident Management Presentationguestd6096bf
The document discusses key principles of the National Incident Management System (NIMS) and Incident Command System (ICS) and how they can be applied to school-based emergencies. It explains that NIMS provides a standardized framework for incident response that improves coordination between responding agencies. The ICS establishes clear lines of command, management sections, common terminology and organizational structures to effectively respond to various incidents. The document outlines ICS roles and responsibilities and how schools can integrate NIMS and ICS principles into their emergency plans.
The document provides an overview of loss prevention, covering its historical development, key tools and concepts. It discusses risk analysis, planning, evaluation, research, standards, crime analysis, the role of loss prevention managers, environmental design strategies, insurance, threats from internal and external sources, safety issues, and planning and budgeting processes in loss prevention.
Risk management is important for construction projects. It involves identifying potential risks, assessing their likelihood and consequences, and developing responses to manage risks. The risk management process includes four steps: identifying hazards, assessing risks, controlling risks, and monitoring control measures. It aims to reduce the probability or impact of negative events. Key risks in construction relate to costs, time, and quality going over budget or being delayed. Risk management benefits projects by improving decision making and providing clear understanding of risks.
This document provides an overview of the Incident Command System (ICS) and how it relates to emergency communications. It explains that ICS training is required for various emergency response roles, with higher levels of training needed for more senior positions. The document outlines where communications functions fit within the ICS structure, typically within the Logistics Section. It also discusses forms used for communications planning and gives an example scenario of planning radio communications for a large parade event.
This document discusses how to bulletproof meetings and events from disasters and risks. It outlines steps for risk management, including forming a risk team to assess potential internal and external risks through a vulnerability analysis. The risk assessment and analysis informs the development of an emergency response plan with procedures, contact lists, and supporting documents. The plan aims to reduce the probability and consequences of emergencies through preparedness, training, contracts, and other mitigation strategies. Managing risks is important for meeting operations and safety.
This document summarizes the services provided by RSB International to safeguard clients and their assets globally. RSB offers a range of protection services including overt protection with highly trained agents, secure transportation, covert protection, and medical services. They also provide intelligence services such as threat assessments, trend analysis, targeted monitoring and actionable intelligence briefings. RSB offers tactical training programs in Israel and internationally on topics like canine operations, counterterrorism, and covert protection.
This document outlines the importance of emergency response planning. It defines emergencies and disasters, and discusses the key steps in developing an emergency response plan, including understanding hazards, conducting risk assessments, formulating response teams, and creating procedures to address communications, evacuation, and continuity of operations. An effective emergency response plan is comprehensive, addresses all potential emergency situations, and includes training employees and practicing the plan through exercises.
- The document provides a summary of a Jordanian security manager's qualifications, including over 20 years of experience managing security operations and personnel in both public sector and private industry roles. His experience includes positions as a security manager, police commander, training officer, and international peacekeeping roles. He seeks a new position utilizing his skills in security risk assessment, policy enforcement, safety planning, and leading security procedure implementation.
The document provides an overview of the Hazardous Waste Operations and Emergency Response (HAZWOPER) standard under 29 CFR 1910.120. It defines the standard's application, general requirements, emergency response plan requirements, and training requirements for different response levels - awareness, operations, technician, and specialist. Training must be tailored to employees' duties and increases with response level from a minimum of 8 hours for awareness to 24 hours for technician and specialist levels. Annual refresher training is also required.
The document discusses strategies for moving beyond tokenism and promoting full participation and inclusion of self-advocates on boards. It provides 10 tools for boards including providing hospitality, orientation and training, defining roles, reviewing agendas in advance, ensuring accessible materials and communication, and establishing supportive policies. The overall goal is to help self-advocates feel respected, listened to, and able to contribute and influence decisions.
This document discusses conceptualizing an integration between Enterprise Architecture Management (EAM) and Information System Security Risk Management (ISSRM). It proposes mapping concepts from an ISSRM domain model to the ArchiMate enterprise architecture modeling language. This would allow security risks and their impacts on business services to be represented and analyzed within an enterprise's architecture. Key concepts from ISSRM like assets, security goals, risks and treatments are mapped to equivalent concepts in ArchiMate's business, application and technology layers. The mapping is meant to support a risk-oriented design of an enterprise architecture that meets business services' security goals.
Modeling Enterprise Risk Management and Security with the ArchiMate LanguageIver Band
The document provides an overview of how the ArchiMate modeling language can be used to model enterprise risk management and security concepts and relationships. It summarizes relevant risk and security standards and frameworks and extracts a set of core concepts. It then demonstrates how these concepts can be modeled using the ArchiMate language by mapping the concepts to ArchiMate elements and including examples from case studies. The document concludes that the ArchiMate language allows for modeling of the majority of common risk and security concepts and their relationships to other enterprise architecture concepts.
This Case Study demonstrates the value of the ArchiMate® 2.1 modeling language for planning and expressing complex business transformation. The Case Study is about a fictitious manufacturer named ArchiMetal. Through high-level architecture modeling, the ArchiMate language illuminates the coherence between an organization, and its processes, applications, and infrastructure. This Case Study presents examples of ArchiMate models that can be elaborated as necessary for analysis, communication, decision support, and implementation.
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
IBM Pulse 2012 presentation by Alex Ivkin (Prolifics) and Grey Thrasher (IBM)
Synthesizing the business view of IT resources with the technical implementation of Role Based Access Control remains one of the toughest challenges in Identity Management today. We will walk through a real-world use case to understand how organizations can utilize the new IBM Role and Policy Modeler (RaPM) tool to discover essential business relationships and map them to IT access permissions, creating the schema for a comprehensive RBAC system. We will explain how the design criteria provided by RaPM has enabled the foundation of a comprehensive Identity and Role Lifecycle Management structure. The follow-on implementation of an RBAC system in the Identity Provisioning platform, IBM Tivoli Identity Manager, will be explored, as well as how this organization is automating access privileges, simplifying internal security controls and reducing the complexity of audit and compliance enforcement.
An Enterprise Risk Management (ERM) programme can help organizations achieve strategic objectives more effectively by taking a systematic approach to identifying, assessing, and addressing risks across the whole organization rather than operating in silos. Key aspects of an effective ERM programme include linking risk strategy to business strategy, establishing clear risk management responsibilities, and using risk information to improve decision-making and investment choices. Regular risk assessment and monitoring can optimize risk management and control activities while supporting organizational learning and competitiveness.
FADA Local Audit Compliance Check Amended by Richard Trupp 15.4.2015James Vetch Dip Grad
This document summarizes the results of a health and safety audit conducted at the Faculty of Art, Design and Architecture at Kingston University. It finds that the faculty has implemented several improvements to its health and safety policies, procedures, and documentation since an initial review in 2014. A faculty health and safety policy has been established with clear responsibilities assigned. Training and inductions are now provided to staff and students. Risk assessments have been performed for each workshop area and risks are documented in a risk register. Regular health and safety meetings are now held to review incidents and ensure compliance. While some record keeping of trainings could be improved, overall the audit finds that the faculty has taken positive steps to strengthen its management of health and safety issues since the
1. The NTPC safety policy outlines its commitment to providing a safe working environment and striving for zero incidents. Safety is a core value and all accidents are considered preventable.
2. Key responsibilities include the top management being accountable for safety standards and audits. Project heads are responsible for identifying hazards and internal audits. Department heads must ensure safety training and equipment, identify unsafe areas, and ensure rules and procedures are followed.
3. The policy framework coordinates safety across the organization. Corporate Safety develops and reviews safety frameworks and shares best practices. Training is provided. Safety officers report to Corporate Safety.
Crowd Management at Nashik Kumbh Mela by Rajeev ChoubeyRajeev Choubey
The document provides details of the hazard, vulnerability, and risk assessment conducted for crowd management and security planning for the Kumbh Mela festival in Nashik in 2015-16. Key points include:
- Identifying hazards associated with the festival and prioritizing risks, with a focus on mitigating the highest risks first.
- Conducting extensive training for police and other personnel on crowd control, disaster management, and other emergency response techniques.
- Developing contingency plans to ensure normal operations can continue or quickly resume in case of any disruptions.
The document provides an overview of guarding roles and responsibilities according to a holistic security model. It discusses various aspects of guarding including management procedures, training, physical security measures, risk management, and standard operating procedures. The goal is to implement proactive and reactive guarding through comprehensive training, procedures, and coordination across different security elements.
This document outlines the responsibilities of a safety and security role. The responsibilities include: 1) Coordinating safety and security services and monitoring operations; 2) Performing security assessments and reviewing safety procedures; 3) Planning and coordinating security escorts. Additional responsibilities are staff management and training, security management including risk assessments and standard operating procedures, and investigation of security incidents.
This document outlines plans for developing Denizli, Turkey into a disaster resistant city through various information systems and earthquake studies. It discusses establishing teams to manage disaster mitigation, preparedness, response and recovery. A Geographical Information System (GIS) will be implemented to help with disaster response planning and tracking events. An Information and Management Centre is proposed to integrate all projects from one location. Earthquake studies conducted in Denizli by Pamukkale University are also summarized, including analysis of seismic risk and structural testing. The overall goal is to design integrated systems to help the city prepare for and manage disasters.
This document provides a summary of Rogelio Montalbo's experience and qualifications for safety roles. He has over 15 years of experience in various safety positions, including Safety Manager, Safety Engineer, and Safety Officer. His responsibilities have included ensuring workplace safety, conducting inspections, investigating accidents, developing safety programs and policies, and ensuring compliance with regulations. He aims to promote a safety culture and protect employees from hazardous situations.
This curriculum vitae summarizes Saif-ur-Rehman Bhatti's professional experience and qualifications. He has over 20 years of experience in finance, administration, and project management roles with organizations such as Intercooperation Pakistan, GIZ, World Food Program, and Frontier Foundry. He holds an MBA in finance and is a qualified chartered accountant. Bhatti is currently the Financial Administrator for Intercooperation Pakistan and has held several consultancy roles providing financial expertise.
India faces many natural and man-made disasters that hinder growth. The Incident Response System (IRS) provides a standardized framework to efficiently manage disaster response through coordinated communication and flexible organization. IRS follows ICS principles with an incident commander and sections for operations, planning, logistics, and information/media to effectively meet incident objectives.
Safety Officer role and responsibilkities .pptxHrkHrk1
A safety officer is responsible for identifying hazards, assessing risks, developing safety policies and training employees to maintain safety standards and prevent accidents. They conduct inspections, investigate incidents, ensure compliance with regulations, and develop emergency plans. Safety officers also monitor performance, generate reports, and foster communication to continuously improve safety management and culture.
The document provides an introduction to the Incident Command System (ICS) for federal workers. ICS is a standardized approach to incident management that is flexible, scalable and used for all hazard incidents in the US. It aims to coordinate response to any type of incident through clear management structures, common terminology, unified command and multi-agency collaboration. The key components of ICS include clear management functions, standardized position titles, an incident action plan and facilities to support response operations.
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docxjoyjonna282
(
CDC
IT Security Staff BCP Policy
) (
[
CSIA 413,
) (
Professor Last Name:
) (
Policy Document
)
(
IT
Business Continuity Plan Policy
)
Document Control
Organization
Center for Disease and Control (CDC)
Title
CDC IT Security Staff BCP Policy
Author
Owner
IT Security Staff Manager
Subject
Business Continuity Plan Policy
Review date
Revision History
Revision Date
Reviser
Previous Version
Description of Revision
No Revisions
Document Approvals
This document requires the following approvals:
Sponsor Approval
Name
Date
Approved
Document Distribution
This document will be distributed to:
Name
Job Title
Email Address
All CDC Security Staff
Information Security Specialist
Contributors
Development of this policy was assisted through information provided by the following organization:
· CDC and Department of Defense, Health and Homeland Security
Table of Contents
Policy Statement4
1Purpose4
2Objective4
3Scope5
4Compliance5
5Terms and Definitions7
6Risk Identification and Assessment7
7Policy8
Policy Statement
The Center for Disease and Control mission is to protect America from health, safety and security threats, both foreign and in the U.S whether the diseases starts at home or abroad, are chronic or acute, curable or preventable, human error or deliberate attack, it fights disease and supports communities and citizens to do the same. It is this sensitive mandate that makes CDC infrastructure critical. CDC is both a source and repository of information.
It is thus critical to secure the information and control access to it, not to mention what information departs the organisation. CDC has to contend with IT regulations and laws that control how sensitive information is used. Given the sources of some of this information, CDC has to contend with the threat of this information being compromised since not all its operations are in one place. Thus CDC conducts critical science and provides health information that protects the nation against expensive and dangerous health threats and responds when these arise.
Unfortunately in life, things do not always follow the ideal and predictable path. Actions may conspire to affect the smooth running of CDC and at the worst case, the relocation to a new site and the continuation of the work that was being done. With the increased security threat, CDC finds itself not able to avoid having to plan for instances where its operations may be disrupted. The plan in intended to achieve efficient and effective operational continuity in order to have all data recovered and restored thus firewalling critical operations. This plan is referred to as the business continuity plan.Purpose
Given the identified risks referred to above, the document is developed for the sole purpose of offering a roadmap to be followed by CDC to recover and restore its operations. The business continuity plan is to be activated should the center be hit by a natural disaster, emergency or delibera ...
This document outlines a disaster recovery and business continuity policy. The objective is to efficiently reconstitute systems following disasters like hurricanes or floods. Both business and IT personnel are involved. The policy procedure includes project initiation, business impact analysis, recovery strategy design, plan development, and testing/awareness. The business impact analysis identifies critical processes and applications to determine appropriate recovery strategies like hot sites. The plan is then tested and awareness is ensured among personnel.
Hani El Boushi is a security manager based in Doha, Qatar with over 10 years of experience. He oversees security operations for Qatar Gas, including over 200 guards. He is responsible for risk assessments, developing security policies and procedures, overseeing guard training, and investigating incidents. He has also managed security programs for oil and gas facilities, corporate offices, and residential developments in Qatar.
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE360 BSI
The Advanced Certificate in Live Streaming & Tracking is specifically designed to train Security and Incident Response team in managing and responding to incidents and emergencies in real time.
One of the biggest present day issue facing security and incident response managers is the ability to have accurate and first-hand information quickly so that decisions can be made to respond effectively.
Security and Incident Response Managers often rely on third-hand information and it is not until much later in the response that they fully understand the actual situation.
Course participants will be able to :
• develop skills in using various new technologies in communication during a critical situation and emergencies
• learn the best strategy in sending real-time information to control centre,headquarters and among team members
• using powerful tracking and streaming tool during routine, patrolling, observation, surveillance and evenmonitoring suspect etc.
• communicate effectively in emergency situations
• effectively using live streaming audio-video, tracking and messaging during major incidents
• improve self-confidence in handling scenarios and day-to-day routine
• develop their leadership skill
• prevent loss of life and damage to critical infrastructure
WHO SHOULD ATTEND
- Security Professionals, Heads, Managers
- Risk Management specialists
- Emergency Response Team
- Emergency Dispatch Personnel
- First Responders
- Plant Security Head, Managers, Incharge
- Former and serving police investigators
- Facility Managers
- Investigation officers & others
Contact us to register today!
The document discusses emergency preparedness and response. It defines emergencies and lists common emergency types. It then describes the key elements of an Emergency Response Plan (ERP): planning, practicing, evaluating, and adjusting. The planning process involves determining emergency procedures, roles, communication methods, and more. Practicing ensures employee participation in simulations and training. Evaluation assesses performance to identify areas for adjustment to the ERP.
Yearly Achievement, Plan SS Securitym before and after.
1. Tuesday, July 15, 2014
Saturday, 31 May 2014
Plan South Sudan didn’t have a security system A security system means a managerial and
programmatic approach to staff security and safety management in the field that include:
1 Continuously assessing the country operational context and making sure that people
know who we are as an organisation and what we do
2. Continuously assessing risks associated to programmes locations and determine in a
professional manner those risks by applying the use of SRA (Security Risks Assessment) tool
enhancing as well the security approach that Plan South Sudan must reduce its vulnerabilities
against assessed risks
3. Engage in 2 levels planning layers: 1. Standards Operating Procedures (SOPs) and
Contingency Planning (C.Ps) SOPs have been developed not only covering the whole
country operations but as well specific programmes locations. Assuming that no matter the
preventive protocols, things might turn wrong a second layer od Contingency Plans
supplement the SOPs. Contingency Plans have been developed and implemented:
Hibernation, relocation, evacuation and how in practise they can be enabled to address a crisis
situation
4. A field information Management System has been established in a way allowing Plan
South Sudan decision makers to be briefed information collected from various sources in a
pro-active approach, thus allowing to assess the threat level and risk acceptability (Threshold
of acceptable risks)
5. Equipping for security has been the main focus and attention has been given to having
redundant field communication and tracking staff movement with the support of the radio room
that was not there before.. More staff accountability and movements’ protocols have been put
in place to make sure that the organisation exercise a control over its employees and
compliance to security and safety measure is ensured.
To ensure that staffers acquire field security skills, training have been provided at country
office and field level.
Security awareness is consistent and staff are always reminded that the operational
environment is volatile and outbreak of violence is often at short notice.
DETAILS OF WHAT WAS NOT THERE BEFORE AND WHAT HAS BEEN ACHIEVED IS PROVIDED
BELOW
Plan South Sudan, Safety and Security
2. “Field Security Management System and Achievements”
The road map for PLAN South Sudan functioning Security Management Systems
Our overall security management approach will focus on reducing PLAN SS
vulnrabilities against assessed threats by implementing recommendations for
improvement that have/are/will been formulated/formulated/will be formulated..
A. Security Administrative Procedures
1. Record of emergency data form is on file for each staff member?
2. All staff registered with their embassies?
3. Emergency contact numbers are posted and accessible to ALL staff?
4. All expat staff with appropriate documentation from relevant authorities for entries,
employment and exit from country?
5. Procedures for reporting safety and security incidents are in place and
documented and all staff briefed?
6. Approved medical services have been identified. For each location and information
available to all staff?
7. Signal for emergency exists, first aid kits, fire extinguisher and others safety
notices prominently displayed in all facilities?
8. Safety and Security is a standing agenda item for all management meetings?
9. Cash management is considered and sensitive procedures are in place. For
transactions?
10. Security costs are factored into new projects proposals and budgets?
11. The crisis management team is understood by the CD and the Security Team
BEFORE AND AFTER.
A Administrative Procedures Evaluation
1. Before After
2. Record of emergency data form is on file
for each staff member and dependents of
expatriate staff?
Was not there In progress with Human
Resources as annex to
Medical and casualty
evacuation plan
No in: Human Resources
3. All staff registered with their embassies? Was not there In progress with Human
Resources as annex to
Evacuation plan.
4. Emergency contact numbers are posted
and accessible to ALL staff?
Was not there Posted in CSC Office and
shared with comms Plan.
Ref Contingency Plan
dossier/ Emergency Contact
are accessible to all staff.
Security and medical
3. contacts.
5. All expat staff with appropriate
documentation from relevant authorities
for entries, employment and exit from
country?
Y/N Yes: in place with Human
Resources
6. Procedures for reporting safety and
security incidents are in place and
documented and all staff briefed?
Was not there Yes:
Plan South Sudan SOPs on
Incident reporting has been
developed and in place.
Country staffers have been
trained and reminders
security notices sent to
outline the importance or
incident reporting.
7. Approved medical services have been
identified. For each location and
information available to all staff?
Was not there Yes.
Shared by Human
Resources and are annex
part of Contingency plans:
medevac and secuvac.
8. Signal for emergency exists, first aid kits,
fire extinguisher and others safety notices
prominently displayed in all facilities?
Was not there Yes, in place
9. Safety and Security is a standing agenda
item for all management meetings?
Was not there Yes, in place and security
issues are debates in all
CMT and SRT meetings
10. Cash management is considered and
sensitive procedures are in place. For
transactions?
Was not there Yes, in place Plan South
Sudan SOPs on Cash
Security has been
developed and in place.
Country staffers have been
trained and reminders
security notices sent to
outline the importance or
cash security
11. Security costs are factored into new
projects proposals and budgets?
Was not there Yes. Was not therehe
Country Security
Coordinator is posted and
developed the security
budget. Example Room To
Learn Project.
12. The crisis management team is
understood by the CD and the Security
Team Review.?
Was not there In progress and need
training
B. Security Management.
1. A security Focal Point is identified for each office and sub-office?
4. 2. A Security Review Team is existent for the CO or other Program Units. Minutes for
these meetings are documented.?
3. Relevant country security and safety planning docs are distributed and accepted
by all staffs?
4. Staff at all levels are encouraged to engage in security process, forums at all
levels have been established so that staff can report security concerns and be
informed of new security & safety directives.?
5. The security plan is updated accordingly to country security plan phase
requirements and change of context.?
6. The level acceptance for Plan program is constantly being assessed at community
level through evaluation of staff practices and interactions with beneficiary community?
7. Regular risks assessment activities and mitigation processes are in practice and
regularly conducted dependant on the security phases.?
8. Incident reporting is diligently encouraged as is confidentiality?
9. Stress management personal are identified and introduced to staff for support?
10. Interagency communication is established and maintained?
11. Interaction with Un agencies is established and maintained?
12. Sensitive security files are maintained and kept locked with limited access?
13. Plan safety and Security handbook is distributed to all staff (electronically or
printed locally)?
14. Crisis team is assembled, briefed on roles and procedures and at least one crisis
management rehearsal is simulated?
15. safety and Security policies from security documentation are adhered to
B. Security Management Evaluation
1. A security Focal Point is identified for each
office and sub-office?
Was not there Now all Pan South Sudan 8
locations (PU, Sub-Offices,
and Field Offices) have
Field a Security Focal
Point.
2. A Security Review Team is existent for the
CO or other Program Units. Minutes for
these meetings are documented.?
Was not there Yes, in place and minutes
are documented.
3. Relevant country security and safety
planning docs are distributed and accepted
by all staffs?
Was not there Plan Global Policies, Plan
South Sudan SOPs are
disseminated.
4. Staff at all levels are encouraged to engage
in security process, forums at all levels
have been established so that staff can
report security concerns and be
informed of new security & safety
directives.?
Was not there In progress and being
enhanced.
5. The security plan is updated accordingly to
country security plan phase requirements
and change of context.?
Was not there The Security plan as a
comprehensive security
management document is
in place and security
5. phases as well.
6. The level acceptance for Plan program is
constantly being assessed at community
level through evaluation of staff practices
and interactions with beneficiary
community?
Was not there In continuous progress with
CMT and Programmes
managers support. The
communication department
is immensely involved in
acceptance strategy.
7. Regular risks assessment activities and
mitigation processes are in practice and
regularly conducted dependant on the
security phases.?
Was not there SRAS have been
developed for all locations
and continuously being
reviewed. Mitigations
measures are being
continuously upgraded:
communications
equipment, bases facilities
security, staff movements,
pro-active security
information collection,
implementations of
annexes of contingency
plans etc.
8. Incident reporting is diligently encouraged
as is confidentiality?
Was not there Yes, in place
9. Stress management personal are identified
and introduced to staff for support?
Y/N No, Human resources
10. Interagency communication is established
and maintained?
Was not there Plan South Sudan has
regular membership in
NGO Security Forum and
others informal inter-agency
networks.
11. Interaction with Un agencies is established
and maintained?
Was not there Plan South Sudan regularly
interact with the UN either
directly or indirectly via
NGO Security Forum as per
UN requirements’
membership in NGO
Security Forum and others
informal inter-agency
networks.
12. Sensitive security files are maintained and
kept locked with limited access?
Was not there Now in place
13. Plan safety and Security handbook is
distributed to all staff (electronically or
printed locally)?
Was not there The SOPs or security book
has been electronically
distributed.
14. Crisis team is assembled, briefed on roles
and procedures and at least one crisis
Was not there In progress and need only
training, drills and
6. management rehearsal is simulated? rehearsals.
15. safety and Security policies from security
documentation are adhered to
Was not there Adherence is now enforced
and staff reminded of risks
to not adhering.
C. Security Briefing and Training.
1. A safety and security orientation is undertaken for each new staff member
immediately on arrival (within 24 H)?
2. Staff have been made aware of inherent risks beyond Plan reasonable ability to
manage and have consented to work with informed knowledge of these risks?
3. Dependants of international staff receive appropriate safety and security briefing
immediately upon arrival in the country?
4. Safety training and briefing are undertaken regularly for all staff and their
attendance at training and briefing recorded?
5.All staff receive and appropriate training to their positions and responsibilities and
appropriate to contextual threats?
6. Most staff (minimum of one staff) in each location has received recognised first aid
training?
7. Staff are briefed on how to arrange and implement a medical evacuation?
8. All plan staff are trained on how to maintain and improve Plan’s image and
acceptance levels with beneficiaries and local populations?
9. Stress management workshops and discussions are provided?
C. Briefing and
Training Evaluation
1. A safety and security orientation is
undertaken for each new staff member
immediately on arrival (within 24 H)?
Was not there Yes, in place and
undertaken by the country
security coordinator.
2. Staff have been made aware of inherent risks
beyond Plan reasonable ability to manage
and have consented to work with informed
knowledge of these risks?
Was not there Yes, in place and
programmes benefits and
staff deployments is now
continuously assessed
against staff risks.
3. Dependants of international staff receive
appropriate safety and security briefing
immediately upon arrival in the country?
Y/N Non-family duty station
4. Safety training and briefing are undertaken
regularly for all staff and their attendance at
training and briefing recorded?
Was not there Trainings have been
delivered to staffs at
country offices and fields
levels.
5.
6. All staff receive and appropriate training to
their positions and responsibilities and
appropriate to contextual threats?
Was not there Yes. Trainings have been
delivered to staffs at
country offices and fields
levels.
7. 7. Most staff (minimum of one staff) in each
location has received recognised first aid
training?
Was not there First aid trainings with
RedR have been delivered
8. Staff are briefed on how to arrange and
implement a medical evacuation?
Was not there Yes, in progress
9. All plan staff are trained on how to maintain
and improve Plan’s image and acceptance
levels with beneficiaries and local
populations?
Was not there Yes in progress with
communication department
support.
10. Stress management workshops and
discussions are provided?
Was not there Yes and now planned for.
D. Security Related Communications.
1. Communications policies and procedures are documented, accessible and all staff
are briefed?
2. All offices and remote locations have access to reliable communications facilities?
3. All staff have access to reliable communication in case of emergency?
4. Alternative means of communications to and from staff in remote locations have
been identified and the means documented?
5. All staff are capable of using communications equipment?
6. All communication equipment in use is appropriately licensed by relevant
authorities?
7. All staff with direct safety and security responsibilities and senior staff can be
reached on a 24-hour basis?
8. Essential emergency contact information is posted in offices, residences and on a
card for each staff person to carry ?
9. Communications problems within areas of operations such as mobile phone “dead
spots” are known to all staff?
10. An emergency contact system has been established to enable contact with all staff
and dependents in the event of an emergency?
D. Communications Ev
aluation
1. Communications policies and procedures are
documented, accessible and all staff are
briefed?
Was not there Yes. There is an SOPs on
communications
2. All offices and remote locations have access
to reliable communications facilities?
Was not there Yes and in constant
progress. We have more
Sat phones, We have
BGANS, Torit, Kapoeta
and Awerial field office
have internet connection.
HF system is covering the
whole country.
3. All staff have access to reliable
communication in case of emergency?
Was not there Yes. More Thurayas, HF
and VHF radios purchases
8. 4. Alternative means of communications to and
from staff in remote locations have been
identified and the means documented?
Was not there Yes. Manpack and BGAN
5. All staff are capable of using communications
equipment?
Was not there In progress and more
trining planned for,
6. All communication equipment in use is
appropriately licensed by relevant
authorities?
Was not there Yes
7. All staff with direct safety and security
responsibilities and senior staff can be
reached on a 24-hour basis?
Was not there Yes
8. Essential emergency contact information is
posted in offices, residences and on a card
for each staff person to carry ?
Was not there In place now,
9. Communications problems within areas of
operations such as mobile phone “dead
spots” are known to all staff?
Was not there Yes
10. An emergency contact system has been
established to enable contact with all staff
and dependents in the event of an
emergency?
Was not there Yes. Communication tree
using modern technology.
E. Evacuations
1. The Plan emergency evacuation is up to date?
2. The Plan evacuation plan has been coordinated with UN and/or appropriate
embassy evacuation plans?
3. The lines of authority during and evacuation have been specified, documented
and briefed to all staff?
4. Staffs are briefed on the evacuation plan and any amendments?
E. Evacuations. E
valuation
1. The Plan emergency evacuation is up to
date?
Was not there Yes
2. The Plan evacuation plan has been
coordinated with UN and/or appropriate
embassy evacuation plans?
Was not there Yes. Hibernations venues
provided by NPA,
TEARFUND and MERCY
CORPS
3. The lines of authority during and
evacuation have been specified,
documented and briefed to all staff?
Was not there Crisis roles and
responsibilities are
designed now.
4. Staffs are briefed on the evacuation plan
and any amendments
Was not there Yes
F. Facilities
9. 1. All facilities and residences are provided with appropriate safety equipment?
2. A well stocked first aid kit is accessible and maintained in each facility?
3. Office evacuation procedures are established?
4. Fire extinguishers and smoke alarms are installed in all facilities and personal
residences?
5. Each facility has primary and alternate fire exits and these are clearly marked with
appropriate signage?
6. All staff members and dependents know the location of fire equipment, fire
escapes and emergency exits?
7. The office entrance is monitored?
8. Offices safes are affixed to the floor or wall?
9. A person is responsible for securing all facility windows, doors, and other
entrances at the end of each day?
10. Visitor accommodation such as hotels and guesthouses are inspected to ensure
safety and that they provide safe and secure accommodation?
11. Background and reference check have been performed on all guards?
12. Guards know how to use fire and other safety equipment and have documented
procedures to follow in case of emergency?
13. Fuel or other flammable materials are stored in a protected manner with safety in
mind?
14. Appropriate exterior lighting is installed and functioning on all facilities and
residences?
15. All doors and windows locks are of a high quality and operate correctly?
F Facilities Ev
aluation
1. All facilities and residences are provided with
appropriate safety equipment?
Was not there Yes
2. A well stocked first aid kit is accessible and
maintained in each facility?
Was not there Yes
3. Office evacuation procedures are
established?
Was not there Yes
4. Fire extinguishers and smoke alarms are
installed in all facilities and personal
residences?
Was not there Yes for fire
extinguishers. No for
smoke alarms
5. Each facility has primary and alternate fire
exits and these are clearly marked with
appropriate signage?
Y/N Yes
6. All staff members and dependents know the
location of fire equipment, fire escapes and
emergency exits?
Y/N Yes in the country office
7. The office entrance is monitored? Y/N Yes: private security
company
Offices safes are affixed to the floor or wall? Y/N Yes
8. A person is responsible for securing all facility
windows, doors, and other entrances at the
Was not there Yes
10. end of each day?
9. Visitor accommodation such as hotels and
guesthouses are inspected to ensure safety
and that they provide safe and secure
accommodation?
Was not there Monthly updated with
UN coordination
10 Background and reference check have been
performed on all guards?
Y/N Yes
11. Guards know how to use fire and other safety
equipment and have documented procedures
to follow in case of emergency?
Was not there No Yes
12. Fuel or other flammable materials are stored
in a protected manner with safety in mind?
Was not there Yes but need
improvement due to
available space in the
rented compound
13. Appropriate exterior lighting is installed and
functioning on all facilities and residences?
Was not there Yes, now in place.
14. All doors and windows locks are of a high
quality and operate correctly
Y/N Yes
G. Travel
1. There is a clear policy on modes of commercial transport (air, boat, road, taxi, rail)
and approved carriers?
2. Staff are fully briefed on the risks associated with travels on commercial transport?
3. Whenever possible staff travel with at least one other person?
4. Staff have been briefed with regards to personal security and counter
surveillance?
5. Systems are in place to take appropriate action if staff travelling do not arrive
within reasonable time of their estimated time of arrival?
6. Missions procedures are known to staff and mission planning takes place?
G. Travel
Evacuation
1.
There is a clear policy on modes of
commercial transport (air, boat, road, taxi,
rail) and approved carriers?
Was not there Yes. Travel SOP in place
2. Staff are fully briefed on the risks associated
with travels on commercial transport?
Was not there Yes
3. Whenever possible staff travel with at least
one other person?
Was not there Yes, in place now
4. Staff have been briefed with regards to
personal security and counter surveillance?
Was not there Yes, security notices
regylarly shared.
5. Systems are in place to take appropriate
action if staffs travelling do not arrive within
reasonable time of their estimated time of
arrival?
Was not there Yes. Movement protocols
in place. Contingency
plans in place for loss of
communications.
11. Missions procedures are known to staff and
mission planning takes place?
Was not there In place now.
H. Vehicles
1. Policy and procedures for driving and travelling in Plan vehicles are
documented and all staff briefed?
2. There is a clear policy on the use of Plan vehicles outside working hours?
3. There is a clear policy who may be carried in Plan vehicles?
4. there is a policy on protective equipment to be used on motorcycles on Plan
business and the policy is enforced?
5. Vehicles accident procedures and reporting procedures are documented and all
staff briefed?
6. Vehicles are checked daily and vehicles maintenance is undertaken as
necessary?
7. Vehicles fuel tank are maintained above fuel tank?
8. Seat belts are accessible and always worn by drivers and passengers front and
rear?
9. All vehicles have appropriate legal documentation and insurance covering the
vehicle, third party property and third party persons?
10. National staff and international staff have recognized driving licences?
11. All drivers observe local driving laws and regulations and drive in a manner
appropriate to safety in the conditions?
12. All plan vehicles are equipped with spares tyres and fitting equipment?
13. Logbooks are maintained for each vehicle including all vehicle maintenance?
14. All vehicle have Plan Logo and decals fitted?
H. Vehicles Ev
aluation
1. Policy and procedures for driving and travelling
in Plan vehicles are documented and all staff
briefed?
Was not there Yes in place now.
2. There is a clear policy on the use of Plan
vehicles outside working hours?
Was not there Yes but need to be
reaffirm by ops
department.
3. There is a clear policy who may be carried in
Plan vehicles?
Was not there Yes. Vehicles and
travel SOPs.
4.
there is a policy on protective equipment to be
used on motorcycles on Plan business and the
policy is enforced?
Was not there Yes, in place now
5. Vehicles accident procedures and reporting
procedures are documented and all staff
briefed?
Was not there Yes. There is an
Contingency Plan in
case of road traffic
accident.
6. Vehicles are checked daily and vehicles
maintenance is undertaken as necessary?
Y/N Yes
7. Vehicles fuel tank are maintained above fuel Was not there Yes, in place now
12. tank?
8. Seat belts are accessible and always worn by
drivers and passengers front and rear?
Y/N Yes
9. All vehicles have appropriate legal
documentation and insurance covering the
vehicle, third party property and third party
persons?
Y/N Yes
10. National staff and international staff have
recognized driving licences?
Y/N Yes
11. All drivers observe local driving laws and
regulations and drive in a manner appropriate
to safety in the conditions?
Y/N Yes
12. All plan vehicles are equipped with spares
tyres and fitting equipment?
Y/N Yes, now in place.
13. Logbooks are maintained for each vehicle
including all vehicle maintenance?
Y/N Yes
14 All vehicle have Plan Logo and decals fitted? Y/N Yes
I. Visitors
1. Safety and security information is provided to all visitors prior to their journey to the
country?
2. Visitors are briefed on essential safety and security information prior to
undertaking any work in the country? This includes an orientation/visitors package and
verbal briefing in country?
3. Visitors are provided with emergency contact information in English and local
language in a form that can be easily carried out with them all times?
4. Visitors are registered with their embassy as per guidelines established by the
embassy?
5. Visitors are lodged in accommodation inspected and approved by the Country
Office?
I Visitors Ev
aluation
1. Safety and security information is provided
to all visitors prior to their journey to the
country?
Was not there Yes, a comprehensive
PreDeparture briefing is sent
to visitor before let them
travel
2.
Visitors are briefed on essential safety and
security information prior to undertaking any
work in the country? This includes an
orientation/visitors package and verbal
briefing in country?
Was not there Yes.Pre_Departure briefing
shared. Visitor receive a
tailored security and safety
briefing upon arrival.
3. Visitors are provided with emergency
contact information in English and local
language in a form that can be easily
Was not there Yes in place now
13. carried out with them all times?
4. Visitors are registered with their embassy
as per guidelines established by the
embassy?
Y/N In progress and depending on
stay length
5.
Visitors are lodged in accommodation
inspected and approved by the Country
Office?
Was not there Yes in place now.
Malu-Malu Nzundu Louison
PLAN International
South Sudan Security and Safety Coordinator
Email: L.Malumalu@plan-international.org
+211956600908 (VIVACELL)
Skype: malu.malu.louison
Satphone:
www.plan-international.org