Training Module on Security

Slides:



Advertisements
Similar presentations
C-TPAT SECURITY AWARENESS TRAINING
Advertisements

Barhale Procedure for Site Establishment
Emergency Preparedness and Response
Background Presenters Work done in preparation for WHS changes
Fire and Life Safety Systems Confidence Testing Fire and Life Safety Systems.
Secure Your Store Understand the measures used in securing a retail store.
Easy to use Ability to attach policies/procedures to call types Ability to schedule calls in advance Officer safety alerts Robust search capabilities.
ADR company checks in Romania
OSHA Recommendations for Workplace Violence Prevention Programs in Late-Night Retail Establishments.
Emergency Evacuation Zayed University, Dubai Campus.
WELCOME TO INNG EMERGENCY OPERATIONS LIAISON OFFICER OVERVIEW
UNIT PHYSICAL SECURITY PLAN
Family Dollar Stores Distribution Center Front Royal Virginia New Hire Security Orientation.
Ground Vehicle Operations Training April 16, 2014.
In-depth look at ISACS Stockpile Management: Weapons Photo: MAG.
The Legal Series: Employment Law I. Objectives Upon the completion of training, you will be able to: Understand the implications of Title VI Know what.
Terminal Safety. Objectives Identify main causes Outline terminal safety organization State the safe working practices.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Crane Operations Objective
Protecting Evidence Fire Cause Determination. Fire departments should investigate all fires to determine the cause of the fire. The cause of a fire is.
World Health Organization
Personal Injury Investigation and Transportation Claims Presented by The Office of Risk Management Loss Prevention Unit.
Understanding the management of risks to health and safety on the premises of a retail business Unit 352.
Developing a Chemical Risk Management Program
Network security policy: best practices
Topics of Discussion:  Introduction  Identify & describe the protocols & processes for: Lockouts Sheltering in Place Lockdown Evacuation  Active Shooter.
1 Perimeter Security System. 2 Performance Objectives 1. List the four key duty posts of the Perimeter Security System. 2. Explain the purpose of perimeter.
AMARI AIR BASE AT/FP EVAL 9 JUNE (No photos taken due to tight security)
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
/0503 Copyright ©2005 Business and Legal Reports, Inc. BLR’s Safety Training Presentations Hazardous Materials Transportation 49 CFR BLR’s.
Process Safety Management
Emergency Procedures at the Workplace Practicum in Human Services.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
The Paper Tree/ DUC Security Guard Internal Policies and Procedures.
Overview of Cover - Definition
February 2007 Commercial Vehicle Drivers Hours of Service Module 24: Daily Log Audits.
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
1 Test Security and Integrity of the Testing Program Mark Billingsley TSNAP Vice-President Austin ISD.
INITIAL OSHA & DOT TRAINING MODULE 10 Security. INITIAL OSHA & DOT TRAINING Module 10 – Security Introduction The Transportation Security Administration.
(Customs & Trade Partnership
Risk Management Guidelines. Not If, But When Injuries and medical emergencies can and WILL occur Injuries and medical emergencies can and WILL occur It.
2010 Test Security 2011 Campus Test Coordinator Training Test Security January 26, 2011 Freeport Intermediate school.
PANTHER SECURITY AND PRIVATE INVESTIGATION Security is degree of protection against danger, damage, loss and crime.
Online Test Security Training. Agenda Welcome Communication and Support Policy and Key Terms Scheduling Monitoring Preventing Plagiarism Testing Students.
Health and Safety Policy
Information Systems Security Operational Control for Information Security.
PROMOTE HEALTH AND SAFETY IN THE WORKPLACE Written and devised by John Eaton.
Chapter 6 Enhancing Security Through Procedural Controls.
 Is the process of conducting an exhaustive physical examination and thorough inspection of all operational systems and procedures of a facility.
Crime Scene Investigation. Basic Premise The actions taken at the onset of an investigation are vitally important to the successful resolution of the.
Online Test Security Training. Agenda Welcome Communication and Support Policy and Key Terms Scheduling Monitoring Preventing Plagiarism Testing Students.
Security Management Providing a Secure Environment.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
MODULE 3 Composition & Roles. TAT TEAM APPROACH UPON COMPLETION OF THIS MODULE, PARTICIPANTS SHOULD UNDERSTAND: 3 – 2  Composition of the Threat Assessment.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY
Security Awareness Training. What is security awareness training? Security awareness training is an overview of how to be more diligent in the use, management,
Security Concerns Chapter 4, Section 4. Receiving Lost and Found Items from a Guest Thank the guest for giving you the item. Ask where and when the item.
Security in Air Transportation
Scientific data storage: How are computers involved in the following?
Appropriate record of compliance with customs requirements Satisfactory system of managing commercial and, where appropriate, transport.
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
Health and Safety Policy
Vessels and Facilities that are Temporarily Out of Service or Laid-up
Safety and Security of Radiation Sources
XYZ Port Facility Maritime Security Drill
What Is Workplace Violence?
Science of Crime Scenes
Science of Crime Scenes
OSU Controlled Substances Training Module for Researchers
Presentation transcript:

Training Module on Security Vital Installations: Depots and Terminals

Module Details Objective: To make participants aware of the things to be done to secure depots and plants Participants: A, B, C Grade Officers working in depots and terminals Method: Lecture Duration: One and half hour No of Participants: 20

Module Details Cont… Course Material: Security Return cum Review Red Alert Strengthening of Security Bomb Threat Handling Procedure 38 Recommendations to improve security Protection Scheme Write-up on FIR Sample Work Instructions to Security Force

Overview of Security Our Pledge Definition Importance of Security Threat Perception Vulnerable Areas and Points What does security consist of?

Overview Cont… Physical Security Internal Security Special Situations Liaison with police

Our Pledge Uncompromising Security and Safety of our life and property

Definition The state of plant being secure from the real or potential dangers to which they are exposed.

What is security? Security is protection of life and property It is a natural instinct of all living beings Since beginning man has been devising ways and means to protect himself and his family and his belongings Our workplace is a part of our extended family and hence every employee should be concerned about protection of our installation and our colleagues

Importance of Security Threat: 1) Miscreants’ Intentions 2) Their capability 3) Opportunity Not to provide opportunity to strike is in our hands Lax security provides soft target for attack

Importance of Security Cont. Non-availability of police and public utilities Lax security: heavy losses and damages A threat to the existence of plant

Why have security? Security provides a sense of well being and helps us focus our undivided attention on work Ours is a vital installation and it provides a vulnerable target for antinational and antisocial elements. A petty thief due to ignorance or nervousness may inadvertently cause a major fire that may cause widespread damage to life and property

Threat Perception Security begins with threat perception Check with local police station, SP, etc., for type of crimes, incidents that occur in the area and district Check past history of the location Check local newspapers Determine level of security basis the threat perception

Vulnerable Areas and Points Identify vulnerable areas and focus security efforts on them List of vulnerable areas / points Gates Tank truck / tank wagon gantry Vehicle parking areas Tank farms Drinking water reservoir

What does security consist of? Physical Security Internal Security

Physical Security Defense in depth Perimeter Wall Gates Watch Towers Lighting Alarm System

Internal Security Access Control Security Force Communication Material Security Warehouse Security

Internal Security Cont… Document Security Records Intelligence Cell Investigation of Thefts

Perimeter Wall/Fencing Create a psychological deterrent to unauthorized entry Prevent / delay unlawful entry or trespass Make effective and economical use of guards Direct flow of personnel, goods, and vehicles through controlled access (gates)

Perimeter Wall/Fencing Chain Link Fence Brick/Stone Wall 20 ft clearance on either side Clear track for vehicles / walking No trees Periodic inspection

Gates Number of gates should be limited Gates should be topped with spikes Gates should have cabins and should be manned Redundant gates should be closed down

Watch Towers 15 Ft height Fitted out with communication and search lights with 360 degree rotation Staircase should have gradual incline

Lighting Good lighting provides safety and security Review lighting at intervals for improvements Lighting specifications are given in the security manual

Access control Need to know, Need to go Employees Visitors Contractors Vehicles

Employees ID should be issued to all employees carrying their latest photographs ID should be issued afresh every 5 years ID may be color coded according to need to go basis ID photo should be signed by issuer

Visitors Entry passes issued after checking with concerned official. Visitors should not be allowed in the plant area. If authorized, some official should accompany and visitor should not be shown vital areas Issue visitor’s badge

Contractors Prior approval of the list of casual / contract labor. Such list be given to security Check antecedents of contract/casual labor Issue badges to casual/contract labor Frisk casual / contract labor Written instructions about safety, fire, security to all contractors

Vehicles Check for hidden explosives / stolen goods Employees’ and visitors’ vehicles should be parked outside plant area Issue entry permits to employees vehicles Use mirror trolley for inspection of underside

Security force Maintain a register of instructions to security force Define and specify scope and areas of responsibility and accountability Enforce DGR guidelines Train security force Use security guards for security jobs Use of fire-arms is not recommended

Communication Security should have access to direct telephone line. List of important telephone numbers should be prominently displayed.

Material Security Make gate-pass system fully functional Limit the approving authorities to a few senior people Separate file for returnable OGP Set up a procedure for regular review of ROGP Give a list of persons authorized to approve gate passes to security

Material Security Cont… Material leaving the location must be covered under approved gate pass Use flow meters for filling Check expiry dates of calibration certificates Keep details of all tank trucks or trucks attached to a location Verify accuracy of calibration at intervals

Material Security Cont… Valuable scrap may be closely protected Scrap yards containing valuable material may be fenced, locked and sealed Supervise removal of disposable waste material for hidden articles Check all empty tank wagons, tank trucks leaving the location Check vehicles leaving the premises

Warehouse Security Windows, ventilators, skylights, exhaust ports, etc., should be fitted with iron grills Entry be restricted to authorized employees Regular stock taking and tallying with ledger balances Use multi-levered lock and seal for the door

Warehouse Security Cont. Bolt and lock all windows and doors at the end of the day Security guards should cover warehouses in their patrolling rounds

Document Security Store vital documents in steel cupboards Restrict access to vital information to trust worthy employees Assign appropriate classification to documents and mark in bold Follow up dispatch of confidential documents meticulously to ensure that they reach destination in reasonable time

Document Security Cont. Obtain acknowledgement of receipt of confidential document Do not allow others to copy confidential documents

Records Maintain registers/records at the main gate of incoming outgoing vehicles, visitors, contractors’ men Maintain a record of surprise visits made or checks carried out for review and reference Maintain a record of incidents for use in the future

Intelligence Cell Form a close-knit group of informants Gather intelligence Liaise with CBI, IB, Police for information

Investigation of Thefts Thefts should be promptly reported. Maintain a written record of all thefts. Location in charge should review this record Make a complaint or FIR when there is outside intrusion or theft in collusion with outside sources Aid the police and magistrate

Investigation of Thefts Cont… Internal investigation Proper attitude for investigator Should a case be reported to police Method of conducting investigation Visit to the location Examination of witness Questioning of suspect/accused

Investigation of Thefts Cont… Report on the result of internal investigation Steps in investigation Visit scene of incident List physical evidence/clues Prepare list of documents to be examined Prepare list of witnesses to be examined Take charge of relevant materials and documents

Investigation of Thefts Cont… Examine controls procedures and practices concerning the items lost Record statement of witnesses

Investigation of Thefts Cont… Right of private defense Limitations of right of private defense

Special Situations 38 Recommendations Beefing up security during red alerts Bomb threats Protection Scheme

Assistance of District Administration Police Station SP DySP District Collector DIG Range DIG IG

Thank You End