Compliance with ISPS and The Maritime Transportation Security Act of 2002

Similar documents
Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

How AlienVault ICS SIEM Supports Compliance with CFATS

Port Facility Cyber Security

Inter-American Port Security Cooperation Plan

Port Facility Cyber Security

RÉPUBLIQUE D HAÏTI Liberté Egalité - Fraternité

MEASURES TO ENHANCE MARITIME SECURITY. Cyber risk management in Safety Management Systems. Submitted by United States, ICS and BIMCO SUMMARY

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

uanacia 1+1 MARINE SECURITY OPERATIONS BULLETIN No:

IMO MEASURES TO ENHANCE MARITIME SECURITY. Outcome of the 2002 SOLAS conference. Information on the current work of the ILO

Chemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

STRATEGIC PLAN. USF Emergency Management

The Common Controls Framework BY ADOBE

Procedure for the Selection, Training, Qualification and Authorisation of Marine Management Systems Auditors

DEMOCRATIC SOCIALIST REPUBLIC OF SRI LANKA MERCHANT SHIPPING SECRETARIAT MINISTRY OF PORTS AND SHIPPING

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Virginia Department of Transportation Hampton Roads Bridge-Tunnel Action Plan Implementing the Independent Review Panel Recommendations

Privacy Breach Policy

FORMALITIES CONNECTED WITH THE ARRIVAL, STAY AND DEPARTURE OF PERSONS. Stowaways

Forensics and Active Protection

Why C-TPAT? An Overview

Security Guideline for the Electricity Sub-sector: Physical Security Response

TWIC or TWEAK The Transportation Worker Identification Credential:

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014

NASA Policy Directive

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

UNSCR 1540 Compliance From Policy to Implementation

Securing Data Centers: The Human Element

Course No. S-3C-0001 Student Guide Lesson Topic 5.1 LESSON TOPIC 5.1. Control Measures for Classified Information

Marine Security Overview

Global Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc.

SECURITY & PRIVACY DOCUMENTATION

Guidelines. on the security measures for operational and security risks of payment services under Directive (EU) 2015/2366 (PSD2) EBA/GL/2017/17

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

Cellular Site Simulator Usage and Privacy

OPERATIONS SEAFARER CERTIFICATION STANDARD OF TRAINING & ASSESSMENT. Security Awareness STCW A-VI/6-1

Navigation and Vessel Inspection Circular (NVIC) 05-17; Guidelines for Addressing

Select Agents and Toxins Security Plan Template

DHS Cybersecurity: Services for State and Local Officials. February 2017

Employee Security Awareness Training Program

Red Flags/Identity Theft Prevention Policy: Purpose

Policies and Procedures Date: February 28, 2012

Standard CIP 004 3a Cyber Security Personnel and Training

TransLink Video Surveillance & Audio Recording Privacy Statement

Subject: University Information Technology Resource Security Policy: OUTDATED

Port Facility Security Assessments & Port Facility Security Plans

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

01.0 Policy Responsibilities and Oversight

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

Resiliency & Maritime Security Preparedness Planning

State of Rhode Island Department of Administration Division of Information Technol

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

Number: USF System Emergency Management Responsible Office: Administrative Services

Business Continuity Management Standards A Side-by-Side Comparison

Department of Homeland Security

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Security and Privacy Governance Program Guidelines

HPE DATA PRIVACY AND SECURITY

The University of British Columbia Board of Governors

PIPELINE SECURITY An Overview of TSA Programs

Checklist: Credit Union Information Security and Privacy Policies

Cyber Risks in the Boardroom Conference

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

OPERATIONALIZATION OF COORDINATED BORDER MANAGEMENT. Presenter: Joel Osinta. Presenter Title: Head of Joint Operations Centers. (JOCs) in Kenya.

Data Backup and Contingency Planning Procedure

SECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011

INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015

Virginia Commonwealth University School of Medicine Information Security Standard

Highway & Motor Carrier Orientation & Modal Overview. June 2018

ADIENT VENDOR SECURITY STANDARD

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

Information Security Policy

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

Standard CIP Cyber Security Critical Cyber Asset Identification

Welcome & Housekeeping. Marie-Christine Haubert

Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General

Standard CIP Cyber Security Critical Cyber Asset Identification

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

Information Bulletin

Member of the County or municipal emergency management organization

INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA and PACIFIC OFFICE ASIA/PAC RECOMMENDED SECURITY CHECKLIST

Oracle Data Cloud ( ODC ) Inbound Security Policies

2 ESF 2 Communications

Annual Report on the Status of the Information Security Program

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cincinnati/Northern Kentucky International Airport. Partnership for Nuclear Security Insider Threat Summit September, 2015

Information Security and Cyber Security

Google Cloud & the General Data Protection Regulation (GDPR)

Version 1/2018. GDPR Processor Security Controls

Centeris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information

Transcription:

Mr. Melchor Becena Security Administrator Port Everglades SecurePort Conference Miami, Florida 25-27 27 February, 2004 Compliance with ISPS and The Maritime Transportation Security Act of 2002

Overview Security policy Aim of security measures Security levels Physical Protective System Design Port Security Officer (roles and tasks) Port Security Advisory Committee Port Security Assessment Port Security Plan Security awareness and training

Security Policy Port security policies should take into account relevant international conventions, codes and other established national practices The security policy should address measures to: Provide adequate resources to effectively implement and sustain security policy Recognize the importance of the human element: safety and security awareness, training and skill development The security policy should be periodically reviewed and updated to reflect changing circumstances

Aim of Security Measures Maintain an acceptable level of risk at all security levels while maintaining the flow of commerce Security measures should be devised to reduce risks, establish procedures and control access to restricted or vulnerable areas or functions of the port. Some examples of the aim of security measures: Prevent access to unauthorized persons and prevent persons with legitimate reasons to be in the port from gaining unauthorized access to restricted areas/operations

Aim of Security Measures Prevent introduction of unauthorized weapons, dangerous or hazardous substances and devices into the port or vessels using the port Prevent personal injury or death, or damage to ships or port infrastructure Prevent tampering with cargo, essential equipment, utilities, protection systems and communications systems affecting the port Prevent smuggling of contraband and narcotics Protect against the unauthorized disclosure of classified or security sensitive information

Physical Protective System Deterrence Design Risk Based Assessment Characterize Facility Identify Target Define Threats System Functions Detect Assess Delay Respond Design Goals Protection in Depth Minimum impact of component failure Balanced protection

Security Levels In the event of a change in security level, the PSO must act in accordance with the PSP, and verify that additional security procedures appropriate to the particular threat are implemented. For example: Security level 1 measures may include random personnel, baggage, material, stores, vehicle screening, and implementation of access and movement control Security level 2 measures may include increased frequency of screening, more robust monitoring of the port, and more stringent access and movement control measures Security level 3 measures may include 100 per cent screening, increased identification checks, temporary cessation of certain port activities and/or imposing vessel traffic control measures, restricting access to certain areas, deployment of security personnel to key infrastructure, etc.

Security Levels The security measures to be adopted appropriate to the security level should be outlined in the port security plan Changes in the security level should be quickly communicated to those with a need to know in response to a perceived or actual change in threat information

Port Security Officer Roles and Tasks Tasks should include: Conducting or ensuring the conduct of a port security assessment Ensuring the development and maintenance of the port security plan Coordinating implementation of the port security plan with the appropriate persons or organizations Implementing the port security plan Undertaking regular security inspections of the port, to ensure the implementation of appropriate measures

Port Security Officer Roles and Tasks (cont) Recommending and incorporating modifications to the port security plan in order to correct deficiencies and update the plan to take into account relevant changes to the port Enhancing security awareness and vigilance of the port s personnel Ensuring that adequate training has been provided to personnel responsible for the security of the port Reporting to the relevant authorities and maintaining records of security incidents that affect the security of the port Ensuring that security equipment is properly operated, tested, calibrated and maintained

Port Security Committee A Port Security Committee (PSC) should be established for every port (where applicable) The PSC should act as a consultative and advisory body with a designated chairperson. The PSC should cooperate with applicable safety and health committees, as appropriate Advise on the implementation of the port security plan and assist in conducting the port security assessment Coordinate and facilitate implementation of the applicable security measures required by the port security plan Provide feedback on the implementation, drills and exercises, testing, security training and periodic updates of the port security plan

Port Security Committee Ensure its membership reflects the operational functions of the port and includes, as appropriate: The PSO National and local law enforcement and security agencies Labor representatives Ship operator representatives Representatives of commercial concerns and tenants Trade associations Other relevant parties

Port Security Assessment (PSA) The port security assessment should be carried out by persons with the appropriate skills and should include the following: Identification of threats to assets and infrastructure Identification and evaluation of critical assets and infrastructure Identification of weaknesses, including human factors, in the infrastructure, policies and procedures Identification, selection and prioritization of measures to reducing vulnerability Bottom line: Determine What to protect against whom

Port Security Plan (PSP) The PSP should be based on the PSA and include: Details of the security organization of the port Identification of the PSO and 24-hour contact details Details of the port s links with other relevant authorities and the necessary communications systems Details of security level 1 measures, both operational and physical, that will be in place Details of the additional security measures that will allow the port to progress without delay to security level 2 and 3 Provision for the regular review, audit and amendment of the PSP

Port Security Plan (PSP) Identification of restricted areas and measures to protect them at different security levels Procedures for the verification of identity documents Requirements for drills and exercises carried out at appropriate intervals The PSP should take into account any other existing port emergency plan or other security plans The PSP should be protected from unauthorized access or disclosure

Port Security Plan (PSP) The PSP should define the procedures for: The issuance, verification and return of ID badges The appropriate authorized access control requirements for each restricted area The reporting of lost, missing or stolen documents These procedures should also cover temporary personnel, contractors and visitors at each security level Procedures for periodic review and updating of the plan Procedures for reporting security incidents Measures to ensure the security of information contained in the plan

The Port Security Plan (PSP) The PSP should address at least the following for each security level: Measures designed to prevent unauthorized weapons or any dangerous substances and devices from being introduced into the port Identify restricted areas of the port and measures designed to prevent unauthorized access Procedures for responding to security threats to the port or breaches of security Procedures for evacuation in the event of a security incident Duties of port personnel assigned security responsibilities

Security Awareness and Training Security awareness is vital to the safety, security and health of port personnel and others working in the port Appropriate training of personnel working in the port should maximize personal awareness of suspicious behavior, incidents, events or objects when going about their daily tasks Included should be clear lines for reporting such matters to supervisors, managers or appropriate authorities Additional or special training may be required for people in particular roles

Security Awareness and Training Training may be focused on particular roles and tasks in the port or at external facilities serving the port such as: Security and law enforcement personnel Stevedores and all those handling, storing and transporting or coming into contact with passengers, freight, cargo, material and stores or ships Other associated roles and tasks where personnel do not come into direct contact with passengers, freight, cargo, material and stores or ships Consideration should also be given to circumstances where it would be ineffective or contrary to good security practice to train or give additional information to those without a direct need to know

Port Everglades Security Challenges Port security operating costs (Projected Annual security operating costs for FY 04 $13M +) Compatibility between International, Federal and State security regulations and standards Port must also comply with international initiatives from the International Maritime Organization and the International Convention on Safety of Life at Sea (SOLAS), ISPS code