3.37 SECURITY FENCING GERALDTON PORT

Size: px
Start display at page:

Download "3.37 SECURITY FENCING GERALDTON PORT"

Transcription

1 1.0 INTRODUCTION Security fencing protects the Port of Geraldton Landside Restricted Zone (MWPA LRZ commonly known MSIC area) assets from intrusion and potential attacks of vandalism and terrorism. This document provides guidelines and requirements regarding the installation or replacement of security fencing for perimeter boundary of the LRZ. Also provides guidelines for all other security fencing requirements within the Port precinct. 2.0 PRELIMINARY PHYSICAL SECURITY CONSIDERATIONS Security fences will not stop a determined intruder. To be effective, such barriers must be augmented by security force personnel and other means of protection, detection, delay, and assessment. Security fences are used primarily to: Define the perimeter of a restricted area, Provide a physical and psychological deterrent to entry with signage displayed that entry is not freely permitted, Prevent accidental entry, Optimize security force operations, Enhance detection and apprehension of intruders, Channel and control the flow of personnel and vehicles through designated routes and traffic managed areas. 3.0 LAND-SIDE RESTRICTED ZONE At Maritime Security (MARSEC) Level 1 the MWPA has established a land side restricted zone. The LRZ is designed to restrict access to the security regulated port area, to which only authorized Maritime Industry Participants (MIP) have access. The land-side restricted zone perimeter fence-line consists of chain mesh, with card operated gates where the gate crosses any port related road. The fence line is located than 30m from the face of any berth and will run parallel to the berth face except when sides of the fence will turn at right angles and run to the point of the berth face. The boundary of the LRZ is shown in Attachment A. 3.1 Responsibility Maintenance of access control to the security regulated port land-side restricted zone rests with MWPA and Port Facility Operators who have management control over a facility within the security regulated port. Uncontrolled when printed or in hard copy Page 1 of 7

2 3.1.2 On each occasion that boundaries of a restricted zone are altered, MWPA Port Security Officer (PSO) shall notify Department of Infrastructure and Regional Development (DIRD) advising the reason(s) for alteration, its new boundaries and any additional measures. 3.2 Variation to Boundary The onus is on the proponent to develop a variation proposal complete with detailed plans and photos including project methodology and procedures MWPAs PSO and Deputy Port Security Officer (DPSO) will conduct an internal review of all information submitted and will advise if there are any areas of concern or any additional specific requirements The confirmation of approval notice would take approximately four weeks after the proposal has been submitted to Office of Transport Security (OTS) Any minor changes or alterations shall require written permission and confirmation of approval will be given less than 24hrs from PSO or DPSO Where tasks or projects involve construction or maintenance activities then the work is deemed to be works on roads and specific traffic management requirements apply. Refer 2.20 Traffic Management Geraldton Port. Also refer the following documents outline how to safely manage traffic for construction and maintenance work on roads. AS Manual of uniform traffic control devices Part 3: Traffic control for works on roads. Main Roads Traffic Management for Works on Roads Code of Practice. You can obtain this document from LRZ Protection LRZ shall be protected by an 1800mm high chain-link fabric fence with three barbed wire strands on straight posts. Additional components are included in Attachment B. 4.0 REPORTING The primary function of roving security is detection and reporting of any incidents or breaches of security, which are to be reported immediately to the PSO or Duty Wharf Supervisor. A detailed written report using F3.13j Security Incident Report Form is to be completed as soon as possible following the incident. Perimeter areas shall be clear of vegetation and debris that could obscure clear observation and which could be used to breach fences. Access gates at the boundary shall be kept locked permanently when not guarded and to be kept clear of all obstructions. Contractors, Shift Supervisors and Project Coordinators are responsible for checking fencing in their work area and report any breaches or damage to fencing to the PSO or Duty Wharf Supervisor immediately once observed. Uncontrolled when printed or in hard copy Page 2 of 7

3 The Port is equipped with video surveillance cameras. These cameras are operated remotely from the security gate house to scan the roadways, perimeter fencing and to seaward and are monitored by security guards 24/ Lock and restricted keys The PSO is the only person authorized to issue restricted keys for specific areas of the Port. The key forms part of the MSIC arrangements and must be kept in your possession whilst working at the port, as well as safe and secure at all other times Any gates/padlocks opened, must be closed and secured after use. The key is to be used only for operational requirements associated with MWPA business. The key remains the property of the MWPA and must be returned on request or at time of cessation of contract or employment with the MWPA It is the responsibility of the key holder opening the gate to ensure all personnel transiting through possess an MSIC or visitor card Damaged or inoperable keys must be reported and returned as soon as practicably possible There is to be no access for visitors unless the visitors have been registered in the MWPA visitor s log. Fines, set out in legislation, apply to any individual if visitors are not registered. MWPA security must be immediately informed if: Any gate, padlock or key is damaged. Any gate or padlock does not close. You will be required to supervise the gates until security arrives. 4.2 Penalty Under the Maritime Transport and Offshore Facilities Security Regulations 2003 it is a federal offence to compromise the security of the Geraldton Port and significant penalties apply Key holders should understand that the issue of any restricted key is a privilege, which the Mid West Ports Authority has the right to revoke at any time without warning Key holders should be aware that the security gates are monitored 24/7 by security cameras and that footage could be used as contemporaneous evidence to determine offenders Any breaches of either the Maritime Transport and Offshore Facilities Security Act 2003 or the Mid West Ports Authority Maritime Security Plan may result in penalty and cancellation of your MSIC. 5.0 ASSOCIATED DOCUMENTS 2.20 Traffic Management Geraldton Port F3.13j Security Incident Report Uncontrolled when printed or in hard copy Page 3 of 7

4 6.0 REFERENCES AS Manual of uniform traffic control devices Main Roads Code of Practice Traffic Management for Works on Roads Maritime Transport and Offshore Facilities Security Regulations 2003 Maritime Transport and Offshore Facilities Security Act 2003 Occupational Safety and Health (OHS) Regulations 7.0 ADMINISTRATION Custodian: Approval: Harbour Master Leon Strydom Harbour Master Date: 03 January 2018 Uncontrolled when printed or in hard copy Page 4 of 7

5 ATTACHMENT A Uncontrolled when printed or in hard copy Page 5 of 7

6 ATTACHMENT B Security Fencing Requirements LRZ Protection Fence height 2100mm Fabric height 1800mm Barbed selvedge top & bottom (B-B) Fabric service duty Heavy duty Wire coating Plastic coatings either poly vinyl chloride (PVC) or polyethylene (PE) over a zinc coating of W02Z min. Pipe grade Class 1 (Medium quality) Fence posts & spacing DN50 (60.3OD) External Cranked, Internal - Straight (non-cranked), fitted with tight fitting galvanised knobs. Distance between posts is 3.3m maximum. Fence type Type 1 Rail-less/Barbed wires top three (3) strands. Barbed wire 3 strands equally spaced in top 300mm of fence. Any deviation to the above requirement is subject to PSO approval. 1.0 Chain-Link Fence Fabric Mounting 1.1 Fence fabric will be mounted on steel posts. 1.2 Tie wire for posts shall be the same coating quality as selected for chain link fabric and comprise of either single-strand 2.0 mm diameter core wire or double-strand 1.57 mm diameter core wire, to secure chain link fabric or barbed wire to pipe posts and rails. 1.3 Where security fencing adjoins structures, should be permanently fixed or attached. Uncontrolled when printed or in hard copy Page 6 of 7

7 2.0 Personal Access Gate Minimum 1.0m single leaf with barbed wire top (3 strands) and galvanised 8mm chain for locking is required. Gates shall be capable of opening in either direction. 3.0 Temporary fencing 3.1 All temporary fence systems should be supported with a base plate, block, counterweight or other fixing methods. Temporary fencing shall remain erect and stable 24/ All temporary fences shall be height of 1800 mm with three barbed wire strands on straight posts. Chain link fencing fabric, weldmesh or other infill material, barbed wire and tie wire used in panel and fencing systems shall comply, in all respects, with the relevant Australian Standards to ensure that the temporary fence system remains secure and maintains its integrity. 3.3 Temporary fence installation shall comply with regional wind categories and all components shall be of a good condition and maintained regularly to prevent injury to the port users. 4.0 Safety All relevant safety procedures shall be adopted on site in accordance with safe work practices or Occupational Safety and Health (OHS) Regulations. Uncontrolled when printed or in hard copy Page 7 of 7

STORAGE OF SSAN. Security Risk Assessment and SECURITY PLAN. (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date)

STORAGE OF SSAN. Security Risk Assessment and SECURITY PLAN. (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date) STORAGE OF SSAN Security Risk Assessment and SECURITY PLAN (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date) IMPLEMENTED: (insert date) LICENCE DETAILS: No: Issue date: (Note: You

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Compliance with ISPS and The Maritime Transportation Security Act of 2002

Compliance with ISPS and The Maritime Transportation Security Act of 2002 Mr. Melchor Becena Security Administrator Port Everglades SecurePort Conference Miami, Florida 25-27 27 February, 2004 Compliance with ISPS and The Maritime Transportation Security Act of 2002 Overview

More information

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV

More information

Ulster University Policy Cover Sheet

Ulster University Policy Cover Sheet Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective

More information

Automated Traffic Enforcement Technology Guidelines. Province of Alberta

Automated Traffic Enforcement Technology Guidelines. Province of Alberta Automated Traffic Enforcement Technology Guidelines Province of Alberta Automated Traffic Enforcement Technology Guidelines Province of Alberta A. PREAMBLE Automated traffic enforcement technology is an

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Site Visitor Requirements Practice

Site Visitor Requirements Practice Health & Safety Site Visitor Requirements Practice Content Owner Custodian H&S Discipline Program COMS Document Number Manager, Health and Safety Solutions Health and Safety Solutions H&S Programs & Projects

More information

Document Control Identification. Document History. Authorisation. Rail Safety Manager Brookfield Rail

Document Control Identification. Document History. Authorisation. Rail Safety Manager Brookfield Rail Document Control Identification Document History Authorisation Rail Safety Manager Brookfield Rail Table of Contents Glossary for this Rule... 4... 7... 7... 8... 9... 10... 10... 11... 11... 12... 12...

More information

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services

More information

Document Control Identification. Document History. Authorisation. Rail Safety Manager Brookfield Rail

Document Control Identification. Document History. Authorisation. Rail Safety Manager Brookfield Rail Document Control Identification Document History Authorisation Rail Safety Manager Brookfield Rail Table of Contents Glossary for this Rule... 4... 7... 7... 8... 9... 10... 10... 11... 11... 12... 12...

More information

PORT OF TAURANGA VISITOR REGISTER USER GUIDE

PORT OF TAURANGA VISITOR REGISTER USER GUIDE PORT OF TAURANGA VISITOR REGISTER USER GUIDE Table of Contents Port Entry Compliance... 3 Security Screening... 3 Access Requirements... 3 Bona fide Reason... 3 Access for Visitors... 3 The Visitor Register...

More information

Commercial Vehicle Mobile ANPR Policy

Commercial Vehicle Mobile ANPR Policy Commercial Vehicle Mobile ANPR Policy Road Safety Authority May 2015 Mobile ANPR System Data Protection Policy This document sets out the policy of the Road Safety Authority (the Authority ) regarding

More information

Facility Security Policy

Facility Security Policy 1. PURPOSE 1.1 The New Brunswick Institute for Research, Data and Training (NB-IRDT) is located in the University of New Brunswick. It consists of: (i) employee offices in Singer Hall and Keirstead Hall,

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

Fire Shutter Electrically Operated. Insert address here OPERATING AND MAINTENANCE MANUAL SAFETY, SERVICE & REPAIR. flexability is our strength

Fire Shutter Electrically Operated. Insert address here OPERATING AND MAINTENANCE MANUAL SAFETY, SERVICE & REPAIR. flexability is our strength flexability is our strength BIRMINGHAM GARAGE & INDUSTRIAL DOORS LTD UNITS 3,10 & 12 GRIFFIN INDUSTRIAL ESTATE PENNCRICKET LANE ROWLEY REGIS WEST MIDLANDS B65 0SN Tel: 0121 559 8666 Fax: 0121 561 1101

More information

TWIC or TWEAK The Transportation Worker Identification Credential:

TWIC or TWEAK The Transportation Worker Identification Credential: TWIC or TWEAK The Transportation Worker Identification Credential: Issues and Challenges for MTSA-Regulated Facility Owner/Operators THE USUAL DISCLAIMER By: Presentation at AAPA Administrative & Legal

More information

Fall Protection Certification Training Standard

Fall Protection Certification Training Standard Fall Protection Certification Training Standard Guard rails? Fall Arrest? Safety Nets? The Newfoundland and Labrador Occupational Health and Safety Regulations, Section 139 states that a person shall not

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

NASA Policy Directive

NASA Policy Directive NASA Policy Directive NPD 8820.2D Effective Date: July 02, 2013 Expiration Date: July 02, 2018 COMPLIANCE IS MANDATORY Subject: Design and Construction of Facilities Responsible Office: Facilities Engineering

More information

Eco Web Hosting Security and Data Processing Agreement

Eco Web Hosting Security and Data Processing Agreement 1 of 7 24-May-18, 11:50 AM Eco Web Hosting Security and Data Processing Agreement Updated 19th May 2018 1. Introduction 1.1 The customer agreeing to these terms ( The Customer ), and Eco Web Hosting, have

More information

ORDINANCE NO APPROVING A MAILBOX ORDINANCE FOR SHAWANO COUNTY

ORDINANCE NO APPROVING A MAILBOX ORDINANCE FOR SHAWANO COUNTY ORDINANCE NO. 2-12 APPROVING A MAILBOX ORDINANCE FOR SHAWANO COUNTY WHEREAS, mailboxes placed within the public right-of-way are owned by the property owner but are placed there at the owner s risk; and

More information

Policy No: I-AS 002/2014. Ind-Aussie Solar (P) Ltd outlines protocols to be followed in using the mobile phones. Purpose:

Policy No: I-AS 002/2014. Ind-Aussie Solar (P) Ltd outlines protocols to be followed in using the mobile phones. Purpose: Policy No: I-AS 002/2014 Purpose: Applicable to: Ind-Aussie Solar (P) Ltd outlines protocols to be followed in using the mobile phones All permanent, temporary employees and trainees First issue Date 20

More information

SECTION 9 POLICY AND PROCEDURES

SECTION 9 POLICY AND PROCEDURES SECTION 9 POLICY AND PROCEDURES This section contains links to Clackamas County Employment Policy & Practice (EPP) documents that have particular application to Risk Management. These are the same documents

More information

Chemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and

Chemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and Chemical Facility Anti-Terrorism Standards T. Ted Cromwell Sr. Director, Security and NJ ELG Operations Meeting Today s Presentation ACC Action Major Rule Components Select Risk-Based Performance Standards

More information

Security Awareness, Training, And Education Plan

Security Awareness, Training, And Education Plan Security Awareness, Training, And Education Plan Version 2.0 December 2016 TABLE OF CONTENTS 1.1 SCOPE 2 1.2 PRINCIPLES 2 1.3 REVISIONS 3 2.1 OBJECTIVE 4 3.1 PLAN DETAILS 4 3.2 WORKFORCE DESIGNATION 4

More information

CCBC is equipped with 3 computer rooms, one at each main campus location:

CCBC is equipped with 3 computer rooms, one at each main campus location: Policy: Computer Room Procedures Policy: Draft 12/14/2009 1.0 Purpose The purpose of this document is to establish procedures for the Community College of Baltimore County (CCBC) Information Technology

More information

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010 INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig

More information

SAFE USE OF MOBILE PHONES AT WORK POLICY

SAFE USE OF MOBILE PHONES AT WORK POLICY SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31

More information

A6 Training. A6.1 General. A6.2 Extract from the Health and Safety in Employment Act Training and supervision

A6 Training. A6.1 General. A6.2 Extract from the Health and Safety in Employment Act Training and supervision A6.1 General A6.1.1 Who must complete All personnel who have supervising responsibilities (TC, STMS and STMS- NP) must be trained to the appropriate standard for the: level of road, and tasks that they

More information

TELECOMMUNICATIONS ACCESS POLICY 2011

TELECOMMUNICATIONS ACCESS POLICY 2011 TELECOMMUNICATIONS ACCESS POLICY 2011 The Vice Chancellor and Principal, as delegate of the Senate of the University of Sydney, adopts the following policy. Dated: 31 January 2011 Signature: Name: Michael

More information

uanacia 1+1 MARINE SECURITY OPERATIONS BULLETIN No:

uanacia 1+1 MARINE SECURITY OPERATIONS BULLETIN No: 1+1 MARINE SECURITY OPERATIONS BULLETIN No: 2014-001 CLARIFICATION OF TRANSPORT CANADA (TC) MARINE SECURITY MANDATORY THREAT, BREACH AND INCIDENT REPORTING REOUIREMENTS THIS MARINE SECURITY OPERATIONS

More information

PROCEDURE - TUMUT ISOLATION & LOCKOUT VPP OP-049 INTENT. Why. How

PROCEDURE - TUMUT ISOLATION & LOCKOUT VPP OP-049 INTENT. Why. How VPP9-09-9.4-OP-049 INTENT This procedure defines the steps to be taken to isolate and lockout energy sources to manage the risks associated with working on mill plant and Why It is a regulatory and risk

More information

SECTION 114 MATERIALS CERTIFICATION SCHOOLS PROGRAM

SECTION 114 MATERIALS CERTIFICATION SCHOOLS PROGRAM VIRGINIA DEPARTMENT OF TRANSPORTATION MATERIALS DIVISION MEMORANDUM GENERAL SUBJECT: MATERIALS CERTIFICATION SCHOOLS PROGRAM SPECIFIC SUBJECT: Revisions to the Materials Certification Schools policies

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Severn Trent Water. Telecommunications Policy and Access Procedure

Severn Trent Water. Telecommunications Policy and Access Procedure Severn Trent Water Telecommunications Policy and Access Procedure Contents STW Telecommunications Policy: 5-12 Health and Safety: 13-18 Access Procedures:19-30 2 STW LSH Sites Access Policy [Controlled

More information

Security Guideline for the Electricity Sub-sector: Physical Security Response

Security Guideline for the Electricity Sub-sector: Physical Security Response Security Guideline for the Electricity Sub-sector: Physical Security Response Preamble: This guideline addresses potential risks that can apply to some electricity sub-sector organizations and provides

More information

Tempofor. Mobile fences

Tempofor. Mobile fences Tempofor Mobile fences Betafence Quality Betafence strives relentlessly for optimum quality, without losing sight of users own particular requirements. Quality is of prime importance: it begins at the

More information

Red Flag Policy and Identity Theft Prevention Program

Red Flag Policy and Identity Theft Prevention Program Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible

More information

Signature: Signed by GNT Date Signed: 5/26/2015

Signature: Signed by GNT Date Signed: 5/26/2015 Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date June 1, 2015 Mobile Video and Audio Recording Applicable To: All employees Approval Authority: Chief George N. Turner

More information

Select Agents and Toxins Security Plan Template

Select Agents and Toxins Security Plan Template Select Agents and Toxins Security Plan Template 7 CFR Part 331.11, 9 CFR Part 121.11, 42 CFR Part 73.11 Prepared by U.S. Department of Health and Human Services (HHS) Centers for Disease Control and Prevention

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

City of Ames Street Banner Policy

City of Ames Street Banner Policy The City of Ames is for regulating all banners to be placed in the following locations: Campustown, Downtown, University Boulevard - Lincoln Way to US 30, University Boulevard - ISU Research Park, South

More information

Confined Space Entry (CSE) Certification Training Standard

Confined Space Entry (CSE) Certification Training Standard Confined Space Entry (CSE) Certification Training Standard The Newfoundland and Labrador Occupational Health and Safety Regulations, Section 511 (3) states that a person shall not work in a Confined Space

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Information Security Policy for Associates and Contractors Version: 1.13 Date: 11 October 2016 Reference: 67972761 Location: Livelink Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

PHYSICAL PLANT OPERATIONAL & MAINTENANCE ADMINISTRATIVE PROCEDURE. Purpose

PHYSICAL PLANT OPERATIONAL & MAINTENANCE ADMINISTRATIVE PROCEDURE. Purpose PHYSICAL PLANT OPERATIONAL & MAINTENANCE ADMINISTRATIVE PROCEDURE Section Subject Effective date Procedure Number Administration Key(s) and Lock(s) May 30, 2013 A-01 Purpose To provide a procedure that

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

University Facilities Management (UFM) Access Control Procedure (non-residence areas)

University Facilities Management (UFM) Access Control Procedure (non-residence areas) University Facilities Management (UFM) Access Control Procedure (non-residence areas) Date of Issue: October 1, 2015 A. PURPOSE University Facilities Management s (UFM) Lock Shop Access Control Procedure

More information

TransLink Access Pass

TransLink Access Pass TransLink Access Pass Information and Application Form Effective 1 January 2018 3995_TAP_Applicationbooklet_20pp_Jan_2018_D.indd 1 2 TransLink Access Pass About the TransLink Access Pass The TransLink

More information

Governing Standards. All wiring and components shall meet the applicable requirements of the NEC.

Governing Standards. All wiring and components shall meet the applicable requirements of the NEC. 1.1 SCOPE. This section covers the furnishing and installation of Video Surveillance Systems (VSS), including Video Management System (VMS) software, Cameras, and all associated equipment, devices, and

More information

NDIS Quality and Safeguards Commission. Incident Management System Guidance

NDIS Quality and Safeguards Commission. Incident Management System Guidance NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the

More information

Mobile Working Policy

Mobile Working Policy Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of

More information

MATERIALS DIVISION MEMORANDUM SIGNATURE:

MATERIALS DIVISION MEMORANDUM SIGNATURE: MATERIALS DIVISION MEMORANDUM GENERAL SUBJECT: Revision of Materials MOI Chapter 1 General Instructions NUMBER: MD 359-13 SPECIFIC SUBJECT: Revision of Materials MOI Section 115 Materials Certification

More information

St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN

St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN ERP Lockdown may be initiated in response to incidents originating within the facility, or incidents occuring in the community that have the

More information

Information Bulletin

Information Bulletin Application of Primary and Secondary Reference Documents Version 1.1 Approved for release July 2014 Table of Contents 1.0 Purpose statement... 3 2.0 Audience... 3 3.0 BCA requirements and referenced documents...

More information

TELECOMMUNICATIONS AND DATA CABLING BUSINESSES

TELECOMMUNICATIONS AND DATA CABLING BUSINESSES DRAFT for RCWS, ADTIA & ICAA INDUSTRY CODE for TELECOMMUNICATIONS AND DATA CABLING BUSINESSES Registered by the ACMA on XX XXXXX 2016 TABLE OF CONTENTS TABLE OF CONTENTS 2 1. SCOPE AND OBJECTIVES 3 1.1

More information

Gallagher Critical Infrastructure Solutions

Gallagher Critical Infrastructure Solutions Gallagher Critical Infrastructure Solutions Gallagher secures from the perimeter including gates, through to the facility access points and interior areas security.gallagher.co 2 Introducing Gallagher

More information

Chapman Fence Company, Inc. (OC) UNIT PRICE

Chapman Fence Company, Inc. (OC) UNIT PRICE BID TABULATION Page 1 of 6 SECTION A - GALVANIZED CHAIN LINK FENCE 1 3 tall complete fence installation 10 lf $9.00 $90.00 $9.25 $92.50 $11.15 $111.50 2 4 tall complete fence installation 260 lf $10.72

More information

Guidelines for Certification under the Airside Driving Qualification Scheme for Specialized Ground Services Equipment

Guidelines for Certification under the Airside Driving Qualification Scheme for Specialized Ground Services Equipment Guidelines for Certification under the Airside Driving Qualification Scheme for Specialized Ground Services Equipment Issued by Airport Authority Hong Kong 29 December 2014 It is the responsibility of

More information

Hurricane and Storm Commercial Damage Assessment

Hurricane and Storm Commercial Damage Assessment Hurricane and Storm Commercial Continue to follow all evacuation orders. Stay up-to-date on current hurricane and storm information by visiting the U.S. National Hurricane Center. How to Conduct s:. PREPARE

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Data Processing Amendment to Google Apps Enterprise Agreement

Data Processing Amendment to Google Apps Enterprise Agreement Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google

More information

INTERNATIONAL SOS. Information Security Policy. Version 2.00

INTERNATIONAL SOS. Information Security Policy. Version 2.00 INTERNATIONAL SOS Information Security Policy Document Owner: LCIS Division Document Manager: Group General Counsel Effective: August 2009 Updated: April 2018 2018 All copyright in these materials are

More information

NATIONAL CERTIFICATE in Lifts and Escalators (Level 4) with strands in Installation, and Servicing Level 4

NATIONAL CERTIFICATE in Lifts and Escalators (Level 4) with strands in Installation, and Servicing Level 4 NZQF NQ Ref 0662 Version 2 Page 1 of 16 NATIONAL CERTIFICATE in Lifts and Escalators (Level 4) with strands in Installation, and Servicing Level 4 Credits 265 This qualification has been reviewed. The

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

Use of Personal Mobile Phone Whilst on Duty

Use of Personal Mobile Phone Whilst on Duty Use of Personal Mobile Phone Whilst on Duty (Incorporating Smartphones and Hand Held Devices) Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland

More information

PEFC N 04 Requirements for certification bodies and accreditation bodies

PEFC N 04 Requirements for certification bodies and accreditation bodies PEFC N 04 Requirements for certification and accreditation Organisation Articles of Association for PEFC Norway Forest certification PEFC N 01 Norwegian PEFC certification system for sustainable forestry

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

SPRING-FORD AREA SCHOOL DISTRICT

SPRING-FORD AREA SCHOOL DISTRICT No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Title: Status: Effective : Last Revised: Policy Point of Contact: Synopsis: Bring Your Own Device Policy Final 2017-Jan-01 2016-Nov-16 Chief Information Officer, Information and Instructional Technology

More information

RÉPUBLIQUE D HAÏTI Liberté Egalité - Fraternité

RÉPUBLIQUE D HAÏTI Liberté Egalité - Fraternité RÉPUBLIQUE D HAÏTI Liberté Egalité - Fraternité HAITI PORT SECURITY AND SAFETY: A SUCCESSFUL EXPERIENCE SCOPE OF THE PRESENTATION I- INTRODUCTION: IMPORTANCE OF MARITIME TRADE II- STATE OF GLOBAL PORT

More information

TELECOMMUNICATION FACILITIES SITING AND CONSULTATION POLICY

TELECOMMUNICATION FACILITIES SITING AND CONSULTATION POLICY POLICY P-22 TELECOMMUNICATION FACILITIES SITING AND CONSULTATION POLICY Preamble It is recognized that while reliable and sophisticated telecommunication facilities are a benefit to the citizens of (CSRD),

More information

UITS Data Center Access Policies and Procedures

UITS Data Center Access Policies and Procedures UITS Data Center Access Policies and Procedures Revision 5: 2/15/2017 2/15/17 Page 1 Author: Len Sousa, UConn/UITS Contents... 1 UITS Data Center Access Policies and Procedures... 1 1. Introduction...

More information

Mailbox Installation and Damage Replacement Policy

Mailbox Installation and Damage Replacement Policy Mailbox Installation and Damage Replacement Policy Mailboxes represent obstructions within road right-of-way and hazards to the traveling public and the Lawrence County Engineer encourages mailbox installations

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group, Port Security Management Second Edition KENNETH CHRISTOPHER CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Preface

More information

Mobile Phone Policy January 2014 January 2015 January 2016 Reviewed 2017 Reviewed 2018

Mobile Phone Policy January 2014 January 2015 January 2016 Reviewed 2017 Reviewed 2018 Mobile Phone Policy January 2014 January 2015 January 2016 Reviewed 2017 Reviewed 2018 CONTENTS PURPOSE OF THE POLICY... 3 RATIONALE... 3 PHONE USE... 3 SECURITY... 4 RESPONSIBILITIES... 4 POLICY RELEASE

More information

CYBER SECURITY POLICY REVISION: 12

CYBER SECURITY POLICY REVISION: 12 1. General 1.1. Purpose 1.1.1. To manage and control the risk to the reliable operation of the Bulk Electric System (BES) located within the service territory footprint of Emera Maine (hereafter referred

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Traffic Control Person Certification Training Standard

Traffic Control Person Certification Training Standard Traffic Control Person Certification Training Standard This standard provides minimum criteria for the development and delivery of Traffic Control Person ( TCP) certification training programs. It was

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

WYDOT Traffic Control Supervisor Certification Program

WYDOT Traffic Control Supervisor Certification Program Page 1 of 5 WYDOT Traffic Control Supervisor Certification Program INTRODUCTION The purpose of this program is to certify personnel involved in the layout, inspection and design of traffic control plans.

More information

April Appendix 3. IA System Security. Sida 1 (8)

April Appendix 3. IA System Security. Sida 1 (8) IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

Centeris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information

Centeris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information Section 01 Document Information Creation Date: 12/1/2016 Centeris Data Centers - Security Procedure Revision Date: 2/28/2018 Effective Date: 2/28/2018 Section 02 Site Information Site Information Document

More information

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) Security Risk Assessment Tool Physical Safeguards Content Version Date:

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

DESIGN PRACTICE NOTE AXLE COUNTER RESET

DESIGN PRACTICE NOTE AXLE COUNTER RESET Approval Amendment Record Approval Date Version Description 09/09/2015 1 Initial issue 01/02/2016 2 Updated with issue of Works Instruction & Signal Engineering comments 31/08/2017 3 Updates with Standard

More information

Meter Enclosure and Equipment Standards

Meter Enclosure and Equipment Standards Meter Enclosure and Equipment Standards (a) (b) General Requirements: CITY OF OCALA UTILITY SERVICES METER ENCLOSURE AND EQUIPMENT STANDARDS: (1) To avoid the costs associated with having to replace unacceptable

More information

Annexure: B INFORMATION. Responsible Executive Manager: Division/Unit Responsible for Formulation: Writer/s: Date + Number of Revision: Review Date:

Annexure: B INFORMATION. Responsible Executive Manager: Division/Unit Responsible for Formulation: Writer/s: Date + Number of Revision: Review Date: PROTOCOL FOR THE INSTALLATION OF TELECOMMUNICATION INFRASTRUCTURE IN THE KRUGER NATIONAL PARK Reference Ref: Number: 17/Pr/KNP/pro/telecom mast/vs2 (02-11) INFORMATION Responsible Executive Manager: Mr

More information

Standard CIP-006-3c Cyber Security Physical Security

Standard CIP-006-3c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3c 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security

More information

Mobile Phones and Electronic Devices Policy

Mobile Phones and Electronic Devices Policy Wetherby School Little Wetherby and Reception 19 Pembridge Villas London W11 3EP Wetherby School Years 1, 2 and 3 11 Pembridge Square London W2 4ED Mobile Phones and Electronic Devices Policy Policy reviewed

More information

TOWER CRANE EMPLOYER DECLARATION OF WORK EXPERIENCE

TOWER CRANE EMPLOYER DECLARATION OF WORK EXPERIENCE To qualify to challenge certification in this trade, you must: Have experience performing all of the tasks listed in Section D and Have worked a minimum of 1,024 documented hours of which 500 hours are

More information