3.37 SECURITY FENCING GERALDTON PORT
|
|
- Claud McCormick
- 6 years ago
- Views:
Transcription
1 1.0 INTRODUCTION Security fencing protects the Port of Geraldton Landside Restricted Zone (MWPA LRZ commonly known MSIC area) assets from intrusion and potential attacks of vandalism and terrorism. This document provides guidelines and requirements regarding the installation or replacement of security fencing for perimeter boundary of the LRZ. Also provides guidelines for all other security fencing requirements within the Port precinct. 2.0 PRELIMINARY PHYSICAL SECURITY CONSIDERATIONS Security fences will not stop a determined intruder. To be effective, such barriers must be augmented by security force personnel and other means of protection, detection, delay, and assessment. Security fences are used primarily to: Define the perimeter of a restricted area, Provide a physical and psychological deterrent to entry with signage displayed that entry is not freely permitted, Prevent accidental entry, Optimize security force operations, Enhance detection and apprehension of intruders, Channel and control the flow of personnel and vehicles through designated routes and traffic managed areas. 3.0 LAND-SIDE RESTRICTED ZONE At Maritime Security (MARSEC) Level 1 the MWPA has established a land side restricted zone. The LRZ is designed to restrict access to the security regulated port area, to which only authorized Maritime Industry Participants (MIP) have access. The land-side restricted zone perimeter fence-line consists of chain mesh, with card operated gates where the gate crosses any port related road. The fence line is located than 30m from the face of any berth and will run parallel to the berth face except when sides of the fence will turn at right angles and run to the point of the berth face. The boundary of the LRZ is shown in Attachment A. 3.1 Responsibility Maintenance of access control to the security regulated port land-side restricted zone rests with MWPA and Port Facility Operators who have management control over a facility within the security regulated port. Uncontrolled when printed or in hard copy Page 1 of 7
2 3.1.2 On each occasion that boundaries of a restricted zone are altered, MWPA Port Security Officer (PSO) shall notify Department of Infrastructure and Regional Development (DIRD) advising the reason(s) for alteration, its new boundaries and any additional measures. 3.2 Variation to Boundary The onus is on the proponent to develop a variation proposal complete with detailed plans and photos including project methodology and procedures MWPAs PSO and Deputy Port Security Officer (DPSO) will conduct an internal review of all information submitted and will advise if there are any areas of concern or any additional specific requirements The confirmation of approval notice would take approximately four weeks after the proposal has been submitted to Office of Transport Security (OTS) Any minor changes or alterations shall require written permission and confirmation of approval will be given less than 24hrs from PSO or DPSO Where tasks or projects involve construction or maintenance activities then the work is deemed to be works on roads and specific traffic management requirements apply. Refer 2.20 Traffic Management Geraldton Port. Also refer the following documents outline how to safely manage traffic for construction and maintenance work on roads. AS Manual of uniform traffic control devices Part 3: Traffic control for works on roads. Main Roads Traffic Management for Works on Roads Code of Practice. You can obtain this document from LRZ Protection LRZ shall be protected by an 1800mm high chain-link fabric fence with three barbed wire strands on straight posts. Additional components are included in Attachment B. 4.0 REPORTING The primary function of roving security is detection and reporting of any incidents or breaches of security, which are to be reported immediately to the PSO or Duty Wharf Supervisor. A detailed written report using F3.13j Security Incident Report Form is to be completed as soon as possible following the incident. Perimeter areas shall be clear of vegetation and debris that could obscure clear observation and which could be used to breach fences. Access gates at the boundary shall be kept locked permanently when not guarded and to be kept clear of all obstructions. Contractors, Shift Supervisors and Project Coordinators are responsible for checking fencing in their work area and report any breaches or damage to fencing to the PSO or Duty Wharf Supervisor immediately once observed. Uncontrolled when printed or in hard copy Page 2 of 7
3 The Port is equipped with video surveillance cameras. These cameras are operated remotely from the security gate house to scan the roadways, perimeter fencing and to seaward and are monitored by security guards 24/ Lock and restricted keys The PSO is the only person authorized to issue restricted keys for specific areas of the Port. The key forms part of the MSIC arrangements and must be kept in your possession whilst working at the port, as well as safe and secure at all other times Any gates/padlocks opened, must be closed and secured after use. The key is to be used only for operational requirements associated with MWPA business. The key remains the property of the MWPA and must be returned on request or at time of cessation of contract or employment with the MWPA It is the responsibility of the key holder opening the gate to ensure all personnel transiting through possess an MSIC or visitor card Damaged or inoperable keys must be reported and returned as soon as practicably possible There is to be no access for visitors unless the visitors have been registered in the MWPA visitor s log. Fines, set out in legislation, apply to any individual if visitors are not registered. MWPA security must be immediately informed if: Any gate, padlock or key is damaged. Any gate or padlock does not close. You will be required to supervise the gates until security arrives. 4.2 Penalty Under the Maritime Transport and Offshore Facilities Security Regulations 2003 it is a federal offence to compromise the security of the Geraldton Port and significant penalties apply Key holders should understand that the issue of any restricted key is a privilege, which the Mid West Ports Authority has the right to revoke at any time without warning Key holders should be aware that the security gates are monitored 24/7 by security cameras and that footage could be used as contemporaneous evidence to determine offenders Any breaches of either the Maritime Transport and Offshore Facilities Security Act 2003 or the Mid West Ports Authority Maritime Security Plan may result in penalty and cancellation of your MSIC. 5.0 ASSOCIATED DOCUMENTS 2.20 Traffic Management Geraldton Port F3.13j Security Incident Report Uncontrolled when printed or in hard copy Page 3 of 7
4 6.0 REFERENCES AS Manual of uniform traffic control devices Main Roads Code of Practice Traffic Management for Works on Roads Maritime Transport and Offshore Facilities Security Regulations 2003 Maritime Transport and Offshore Facilities Security Act 2003 Occupational Safety and Health (OHS) Regulations 7.0 ADMINISTRATION Custodian: Approval: Harbour Master Leon Strydom Harbour Master Date: 03 January 2018 Uncontrolled when printed or in hard copy Page 4 of 7
5 ATTACHMENT A Uncontrolled when printed or in hard copy Page 5 of 7
6 ATTACHMENT B Security Fencing Requirements LRZ Protection Fence height 2100mm Fabric height 1800mm Barbed selvedge top & bottom (B-B) Fabric service duty Heavy duty Wire coating Plastic coatings either poly vinyl chloride (PVC) or polyethylene (PE) over a zinc coating of W02Z min. Pipe grade Class 1 (Medium quality) Fence posts & spacing DN50 (60.3OD) External Cranked, Internal - Straight (non-cranked), fitted with tight fitting galvanised knobs. Distance between posts is 3.3m maximum. Fence type Type 1 Rail-less/Barbed wires top three (3) strands. Barbed wire 3 strands equally spaced in top 300mm of fence. Any deviation to the above requirement is subject to PSO approval. 1.0 Chain-Link Fence Fabric Mounting 1.1 Fence fabric will be mounted on steel posts. 1.2 Tie wire for posts shall be the same coating quality as selected for chain link fabric and comprise of either single-strand 2.0 mm diameter core wire or double-strand 1.57 mm diameter core wire, to secure chain link fabric or barbed wire to pipe posts and rails. 1.3 Where security fencing adjoins structures, should be permanently fixed or attached. Uncontrolled when printed or in hard copy Page 6 of 7
7 2.0 Personal Access Gate Minimum 1.0m single leaf with barbed wire top (3 strands) and galvanised 8mm chain for locking is required. Gates shall be capable of opening in either direction. 3.0 Temporary fencing 3.1 All temporary fence systems should be supported with a base plate, block, counterweight or other fixing methods. Temporary fencing shall remain erect and stable 24/ All temporary fences shall be height of 1800 mm with three barbed wire strands on straight posts. Chain link fencing fabric, weldmesh or other infill material, barbed wire and tie wire used in panel and fencing systems shall comply, in all respects, with the relevant Australian Standards to ensure that the temporary fence system remains secure and maintains its integrity. 3.3 Temporary fence installation shall comply with regional wind categories and all components shall be of a good condition and maintained regularly to prevent injury to the port users. 4.0 Safety All relevant safety procedures shall be adopted on site in accordance with safe work practices or Occupational Safety and Health (OHS) Regulations. Uncontrolled when printed or in hard copy Page 7 of 7
STORAGE OF SSAN. Security Risk Assessment and SECURITY PLAN. (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date)
STORAGE OF SSAN Security Risk Assessment and SECURITY PLAN (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date) IMPLEMENTED: (insert date) LICENCE DETAILS: No: Issue date: (Note: You
More informationSecurity Standards for Electric Market Participants
Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system
More informationCompliance with ISPS and The Maritime Transportation Security Act of 2002
Mr. Melchor Becena Security Administrator Port Everglades SecurePort Conference Miami, Florida 25-27 27 February, 2004 Compliance with ISPS and The Maritime Transportation Security Act of 2002 Overview
More informationThe City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.
Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV
More informationUlster University Policy Cover Sheet
Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective
More informationAutomated Traffic Enforcement Technology Guidelines. Province of Alberta
Automated Traffic Enforcement Technology Guidelines Province of Alberta Automated Traffic Enforcement Technology Guidelines Province of Alberta A. PREAMBLE Automated traffic enforcement technology is an
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationSite Visitor Requirements Practice
Health & Safety Site Visitor Requirements Practice Content Owner Custodian H&S Discipline Program COMS Document Number Manager, Health and Safety Solutions Health and Safety Solutions H&S Programs & Projects
More informationDocument Control Identification. Document History. Authorisation. Rail Safety Manager Brookfield Rail
Document Control Identification Document History Authorisation Rail Safety Manager Brookfield Rail Table of Contents Glossary for this Rule... 4... 7... 7... 8... 9... 10... 10... 11... 11... 12... 12...
More informationData Sharing Agreement. Between Integral Occupational Health Ltd and the Customer
Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services
More informationDocument Control Identification. Document History. Authorisation. Rail Safety Manager Brookfield Rail
Document Control Identification Document History Authorisation Rail Safety Manager Brookfield Rail Table of Contents Glossary for this Rule... 4... 7... 7... 8... 9... 10... 10... 11... 11... 12... 12...
More informationPORT OF TAURANGA VISITOR REGISTER USER GUIDE
PORT OF TAURANGA VISITOR REGISTER USER GUIDE Table of Contents Port Entry Compliance... 3 Security Screening... 3 Access Requirements... 3 Bona fide Reason... 3 Access for Visitors... 3 The Visitor Register...
More informationCommercial Vehicle Mobile ANPR Policy
Commercial Vehicle Mobile ANPR Policy Road Safety Authority May 2015 Mobile ANPR System Data Protection Policy This document sets out the policy of the Road Safety Authority (the Authority ) regarding
More informationFacility Security Policy
1. PURPOSE 1.1 The New Brunswick Institute for Research, Data and Training (NB-IRDT) is located in the University of New Brunswick. It consists of: (i) employee offices in Singer Hall and Keirstead Hall,
More informationCardiff University Security & Portering Services (SECTY) CCTV Code of Practice
Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date
More informationFire Shutter Electrically Operated. Insert address here OPERATING AND MAINTENANCE MANUAL SAFETY, SERVICE & REPAIR. flexability is our strength
flexability is our strength BIRMINGHAM GARAGE & INDUSTRIAL DOORS LTD UNITS 3,10 & 12 GRIFFIN INDUSTRIAL ESTATE PENNCRICKET LANE ROWLEY REGIS WEST MIDLANDS B65 0SN Tel: 0121 559 8666 Fax: 0121 561 1101
More informationTWIC or TWEAK The Transportation Worker Identification Credential:
TWIC or TWEAK The Transportation Worker Identification Credential: Issues and Challenges for MTSA-Regulated Facility Owner/Operators THE USUAL DISCLAIMER By: Presentation at AAPA Administrative & Legal
More informationFall Protection Certification Training Standard
Fall Protection Certification Training Standard Guard rails? Fall Arrest? Safety Nets? The Newfoundland and Labrador Occupational Health and Safety Regulations, Section 139 states that a person shall not
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationNASA Policy Directive
NASA Policy Directive NPD 8820.2D Effective Date: July 02, 2013 Expiration Date: July 02, 2018 COMPLIANCE IS MANDATORY Subject: Design and Construction of Facilities Responsible Office: Facilities Engineering
More informationEco Web Hosting Security and Data Processing Agreement
1 of 7 24-May-18, 11:50 AM Eco Web Hosting Security and Data Processing Agreement Updated 19th May 2018 1. Introduction 1.1 The customer agreeing to these terms ( The Customer ), and Eco Web Hosting, have
More informationORDINANCE NO APPROVING A MAILBOX ORDINANCE FOR SHAWANO COUNTY
ORDINANCE NO. 2-12 APPROVING A MAILBOX ORDINANCE FOR SHAWANO COUNTY WHEREAS, mailboxes placed within the public right-of-way are owned by the property owner but are placed there at the owner s risk; and
More informationPolicy No: I-AS 002/2014. Ind-Aussie Solar (P) Ltd outlines protocols to be followed in using the mobile phones. Purpose:
Policy No: I-AS 002/2014 Purpose: Applicable to: Ind-Aussie Solar (P) Ltd outlines protocols to be followed in using the mobile phones All permanent, temporary employees and trainees First issue Date 20
More informationSECTION 9 POLICY AND PROCEDURES
SECTION 9 POLICY AND PROCEDURES This section contains links to Clackamas County Employment Policy & Practice (EPP) documents that have particular application to Risk Management. These are the same documents
More informationChemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and
Chemical Facility Anti-Terrorism Standards T. Ted Cromwell Sr. Director, Security and NJ ELG Operations Meeting Today s Presentation ACC Action Major Rule Components Select Risk-Based Performance Standards
More informationSecurity Awareness, Training, And Education Plan
Security Awareness, Training, And Education Plan Version 2.0 December 2016 TABLE OF CONTENTS 1.1 SCOPE 2 1.2 PRINCIPLES 2 1.3 REVISIONS 3 2.1 OBJECTIVE 4 3.1 PLAN DETAILS 4 3.2 WORKFORCE DESIGNATION 4
More informationCCBC is equipped with 3 computer rooms, one at each main campus location:
Policy: Computer Room Procedures Policy: Draft 12/14/2009 1.0 Purpose The purpose of this document is to establish procedures for the Community College of Baltimore County (CCBC) Information Technology
More informationACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010
INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig
More informationSAFE USE OF MOBILE PHONES AT WORK POLICY
SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31
More informationA6 Training. A6.1 General. A6.2 Extract from the Health and Safety in Employment Act Training and supervision
A6.1 General A6.1.1 Who must complete All personnel who have supervising responsibilities (TC, STMS and STMS- NP) must be trained to the appropriate standard for the: level of road, and tasks that they
More informationTELECOMMUNICATIONS ACCESS POLICY 2011
TELECOMMUNICATIONS ACCESS POLICY 2011 The Vice Chancellor and Principal, as delegate of the Senate of the University of Sydney, adopts the following policy. Dated: 31 January 2011 Signature: Name: Michael
More informationuanacia 1+1 MARINE SECURITY OPERATIONS BULLETIN No:
1+1 MARINE SECURITY OPERATIONS BULLETIN No: 2014-001 CLARIFICATION OF TRANSPORT CANADA (TC) MARINE SECURITY MANDATORY THREAT, BREACH AND INCIDENT REPORTING REOUIREMENTS THIS MARINE SECURITY OPERATIONS
More informationPROCEDURE - TUMUT ISOLATION & LOCKOUT VPP OP-049 INTENT. Why. How
VPP9-09-9.4-OP-049 INTENT This procedure defines the steps to be taken to isolate and lockout energy sources to manage the risks associated with working on mill plant and Why It is a regulatory and risk
More informationSECTION 114 MATERIALS CERTIFICATION SCHOOLS PROGRAM
VIRGINIA DEPARTMENT OF TRANSPORTATION MATERIALS DIVISION MEMORANDUM GENERAL SUBJECT: MATERIALS CERTIFICATION SCHOOLS PROGRAM SPECIFIC SUBJECT: Revisions to the Materials Certification Schools policies
More informationINFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES
INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using
More informationJuniper Vendor Security Requirements
Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks
More informationData Protection Policy
Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...
More informationSevern Trent Water. Telecommunications Policy and Access Procedure
Severn Trent Water Telecommunications Policy and Access Procedure Contents STW Telecommunications Policy: 5-12 Health and Safety: 13-18 Access Procedures:19-30 2 STW LSH Sites Access Policy [Controlled
More informationSecurity Guideline for the Electricity Sub-sector: Physical Security Response
Security Guideline for the Electricity Sub-sector: Physical Security Response Preamble: This guideline addresses potential risks that can apply to some electricity sub-sector organizations and provides
More informationTempofor. Mobile fences
Tempofor Mobile fences Betafence Quality Betafence strives relentlessly for optimum quality, without losing sight of users own particular requirements. Quality is of prime importance: it begins at the
More informationRed Flag Policy and Identity Theft Prevention Program
Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible
More informationSignature: Signed by GNT Date Signed: 5/26/2015
Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date June 1, 2015 Mobile Video and Audio Recording Applicable To: All employees Approval Authority: Chief George N. Turner
More informationSelect Agents and Toxins Security Plan Template
Select Agents and Toxins Security Plan Template 7 CFR Part 331.11, 9 CFR Part 121.11, 42 CFR Part 73.11 Prepared by U.S. Department of Health and Human Services (HHS) Centers for Disease Control and Prevention
More informationVirginia State University Policies Manual. Title: Information Security Program Policy: 6110
Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including
More informationCity of Ames Street Banner Policy
The City of Ames is for regulating all banners to be placed in the following locations: Campustown, Downtown, University Boulevard - Lincoln Way to US 30, University Boulevard - ISU Research Park, South
More informationConfined Space Entry (CSE) Certification Training Standard
Confined Space Entry (CSE) Certification Training Standard The Newfoundland and Labrador Occupational Health and Safety Regulations, Section 511 (3) states that a person shall not work in a Confined Space
More informationInformation Security Policy for Associates and Contractors
Information Security Policy for Associates and Contractors Version: 1.13 Date: 11 October 2016 Reference: 67972761 Location: Livelink Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationPHYSICAL PLANT OPERATIONAL & MAINTENANCE ADMINISTRATIVE PROCEDURE. Purpose
PHYSICAL PLANT OPERATIONAL & MAINTENANCE ADMINISTRATIVE PROCEDURE Section Subject Effective date Procedure Number Administration Key(s) and Lock(s) May 30, 2013 A-01 Purpose To provide a procedure that
More informationGDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd
GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document
More informationUniversity Facilities Management (UFM) Access Control Procedure (non-residence areas)
University Facilities Management (UFM) Access Control Procedure (non-residence areas) Date of Issue: October 1, 2015 A. PURPOSE University Facilities Management s (UFM) Lock Shop Access Control Procedure
More informationTransLink Access Pass
TransLink Access Pass Information and Application Form Effective 1 January 2018 3995_TAP_Applicationbooklet_20pp_Jan_2018_D.indd 1 2 TransLink Access Pass About the TransLink Access Pass The TransLink
More informationGoverning Standards. All wiring and components shall meet the applicable requirements of the NEC.
1.1 SCOPE. This section covers the furnishing and installation of Video Surveillance Systems (VSS), including Video Management System (VMS) software, Cameras, and all associated equipment, devices, and
More informationNDIS Quality and Safeguards Commission. Incident Management System Guidance
NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the
More informationMobile Working Policy
Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of
More informationMATERIALS DIVISION MEMORANDUM SIGNATURE:
MATERIALS DIVISION MEMORANDUM GENERAL SUBJECT: Revision of Materials MOI Chapter 1 General Instructions NUMBER: MD 359-13 SPECIFIC SUBJECT: Revision of Materials MOI Section 115 Materials Certification
More informationSt. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN
St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN ERP Lockdown may be initiated in response to incidents originating within the facility, or incidents occuring in the community that have the
More informationInformation Bulletin
Application of Primary and Secondary Reference Documents Version 1.1 Approved for release July 2014 Table of Contents 1.0 Purpose statement... 3 2.0 Audience... 3 3.0 BCA requirements and referenced documents...
More informationTELECOMMUNICATIONS AND DATA CABLING BUSINESSES
DRAFT for RCWS, ADTIA & ICAA INDUSTRY CODE for TELECOMMUNICATIONS AND DATA CABLING BUSINESSES Registered by the ACMA on XX XXXXX 2016 TABLE OF CONTENTS TABLE OF CONTENTS 2 1. SCOPE AND OBJECTIVES 3 1.1
More informationGallagher Critical Infrastructure Solutions
Gallagher Critical Infrastructure Solutions Gallagher secures from the perimeter including gates, through to the facility access points and interior areas security.gallagher.co 2 Introducing Gallagher
More informationChapman Fence Company, Inc. (OC) UNIT PRICE
BID TABULATION Page 1 of 6 SECTION A - GALVANIZED CHAIN LINK FENCE 1 3 tall complete fence installation 10 lf $9.00 $90.00 $9.25 $92.50 $11.15 $111.50 2 4 tall complete fence installation 260 lf $10.72
More informationGuidelines for Certification under the Airside Driving Qualification Scheme for Specialized Ground Services Equipment
Guidelines for Certification under the Airside Driving Qualification Scheme for Specialized Ground Services Equipment Issued by Airport Authority Hong Kong 29 December 2014 It is the responsibility of
More informationHurricane and Storm Commercial Damage Assessment
Hurricane and Storm Commercial Continue to follow all evacuation orders. Stay up-to-date on current hurricane and storm information by visiting the U.S. National Hurricane Center. How to Conduct s:. PREPARE
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More informationData Processing Amendment to Google Apps Enterprise Agreement
Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google
More informationINTERNATIONAL SOS. Information Security Policy. Version 2.00
INTERNATIONAL SOS Information Security Policy Document Owner: LCIS Division Document Manager: Group General Counsel Effective: August 2009 Updated: April 2018 2018 All copyright in these materials are
More informationNATIONAL CERTIFICATE in Lifts and Escalators (Level 4) with strands in Installation, and Servicing Level 4
NZQF NQ Ref 0662 Version 2 Page 1 of 16 NATIONAL CERTIFICATE in Lifts and Escalators (Level 4) with strands in Installation, and Servicing Level 4 Credits 265 This qualification has been reviewed. The
More informationGeneral Data Protection Regulation
General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced
More informationUse of Personal Mobile Phone Whilst on Duty
Use of Personal Mobile Phone Whilst on Duty (Incorporating Smartphones and Hand Held Devices) Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland
More informationPEFC N 04 Requirements for certification bodies and accreditation bodies
PEFC N 04 Requirements for certification and accreditation Organisation Articles of Association for PEFC Norway Forest certification PEFC N 01 Norwegian PEFC certification system for sustainable forestry
More informationThe University of British Columbia Board of Governors
The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:
More informationTSA/FTA Security and Emergency Management Action Items for Transit Agencies
TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:
More informationSPRING-FORD AREA SCHOOL DISTRICT
No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In
More informationBring Your Own Device Policy
Title: Status: Effective : Last Revised: Policy Point of Contact: Synopsis: Bring Your Own Device Policy Final 2017-Jan-01 2016-Nov-16 Chief Information Officer, Information and Instructional Technology
More informationRÉPUBLIQUE D HAÏTI Liberté Egalité - Fraternité
RÉPUBLIQUE D HAÏTI Liberté Egalité - Fraternité HAITI PORT SECURITY AND SAFETY: A SUCCESSFUL EXPERIENCE SCOPE OF THE PRESENTATION I- INTRODUCTION: IMPORTANCE OF MARITIME TRADE II- STATE OF GLOBAL PORT
More informationTELECOMMUNICATION FACILITIES SITING AND CONSULTATION POLICY
POLICY P-22 TELECOMMUNICATION FACILITIES SITING AND CONSULTATION POLICY Preamble It is recognized that while reliable and sophisticated telecommunication facilities are a benefit to the citizens of (CSRD),
More informationUITS Data Center Access Policies and Procedures
UITS Data Center Access Policies and Procedures Revision 5: 2/15/2017 2/15/17 Page 1 Author: Len Sousa, UConn/UITS Contents... 1 UITS Data Center Access Policies and Procedures... 1 1. Introduction...
More informationMailbox Installation and Damage Replacement Policy
Mailbox Installation and Damage Replacement Policy Mailboxes represent obstructions within road right-of-way and hazards to the traveling public and the Lawrence County Engineer encourages mailbox installations
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationManagement. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,
Port Security Management Second Edition KENNETH CHRISTOPHER CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Preface
More informationMobile Phone Policy January 2014 January 2015 January 2016 Reviewed 2017 Reviewed 2018
Mobile Phone Policy January 2014 January 2015 January 2016 Reviewed 2017 Reviewed 2018 CONTENTS PURPOSE OF THE POLICY... 3 RATIONALE... 3 PHONE USE... 3 SECURITY... 4 RESPONSIBILITIES... 4 POLICY RELEASE
More informationCYBER SECURITY POLICY REVISION: 12
1. General 1.1. Purpose 1.1.1. To manage and control the risk to the reliable operation of the Bulk Electric System (BES) located within the service territory footprint of Emera Maine (hereafter referred
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More information2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY
2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on
More informationTraffic Control Person Certification Training Standard
Traffic Control Person Certification Training Standard This standard provides minimum criteria for the development and delivery of Traffic Control Person ( TCP) certification training programs. It was
More informationORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers
All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision
More informationWYDOT Traffic Control Supervisor Certification Program
Page 1 of 5 WYDOT Traffic Control Supervisor Certification Program INTRODUCTION The purpose of this program is to certify personnel involved in the layout, inspection and design of traffic control plans.
More informationApril Appendix 3. IA System Security. Sida 1 (8)
IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationCenteris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information
Section 01 Document Information Creation Date: 12/1/2016 Centeris Data Centers - Security Procedure Revision Date: 2/28/2018 Effective Date: 2/28/2018 Section 02 Site Information Site Information Document
More informationU.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)
U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) Security Risk Assessment Tool Physical Safeguards Content Version Date:
More informationPage 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES
002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission
More informationVersion 1/2018. GDPR Processor Security Controls
Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in
More informationDESIGN PRACTICE NOTE AXLE COUNTER RESET
Approval Amendment Record Approval Date Version Description 09/09/2015 1 Initial issue 01/02/2016 2 Updated with issue of Works Instruction & Signal Engineering comments 31/08/2017 3 Updates with Standard
More informationMeter Enclosure and Equipment Standards
Meter Enclosure and Equipment Standards (a) (b) General Requirements: CITY OF OCALA UTILITY SERVICES METER ENCLOSURE AND EQUIPMENT STANDARDS: (1) To avoid the costs associated with having to replace unacceptable
More informationAnnexure: B INFORMATION. Responsible Executive Manager: Division/Unit Responsible for Formulation: Writer/s: Date + Number of Revision: Review Date:
PROTOCOL FOR THE INSTALLATION OF TELECOMMUNICATION INFRASTRUCTURE IN THE KRUGER NATIONAL PARK Reference Ref: Number: 17/Pr/KNP/pro/telecom mast/vs2 (02-11) INFORMATION Responsible Executive Manager: Mr
More informationStandard CIP-006-3c Cyber Security Physical Security
A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3c 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security
More informationMobile Phones and Electronic Devices Policy
Wetherby School Little Wetherby and Reception 19 Pembridge Villas London W11 3EP Wetherby School Years 1, 2 and 3 11 Pembridge Square London W2 4ED Mobile Phones and Electronic Devices Policy Policy reviewed
More informationTOWER CRANE EMPLOYER DECLARATION OF WORK EXPERIENCE
To qualify to challenge certification in this trade, you must: Have experience performing all of the tasks listed in Section D and Have worked a minimum of 1,024 documented hours of which 500 hours are
More information