Security Management Measures

Slides:



Advertisements
Similar presentations
Seven Bar Safe School Presentation Jan. 15, 2013.
Advertisements

To Halton Youth Service 
Secure Your Store Understand the measures used in securing a retail store.
Fox Hollow Safety Protocols. Fox Hollow Expectations Be Respectful Be Responsible Be Safe.
HIV/AIDS in Africa AWF Response. AWF’s Response Leadership Workplace Policy Employee benefits Awareness and education Links with.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Welcome! 1 Safe Harbor - Safe Schools, LLC - all rights reserved 2012.
TAPA BARRACKS AT/FP EVALUATION 5 JUNE 12.
Building 90 BET Meeting S.Synarski 6/11/14. Agenda Reminder: Sign up for Lab Alert (2 min) October Drop, Cover, Hold, Evacuate Drill: Oct 16, 10:16am.
SGTM 6: Personal Security Awareness
Three Lines of Defense Presented by the Arapahoe County Sheriff’s Office.
Personal Safety Take Responsibility. 2 Section I Introduction.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Student Briefing College Of Engineering February 2011.
Capistrano Unified School District School Safety March 8, 2013.
Waste Ban Compliance Training Program Safety Considerations April and May 2006.
Evacuation Units Training [school’s name here]. Evacuation Policy When a threat comes in, it is assessed by our Threat Assessment Team. The Team then.
PANTHER SECURITY AND PRIVATE INVESTIGATION Security is degree of protection against danger, damage, loss and crime.
Health and Safety Policy
Chapter 18 Institutional Security. Special Security Institutions  Hospitals and other health care facilities.  Educational institutions.  Libraries.
Roles and Responsibilities of School Principals. What is Management? Management is getting the work Done through others. It has to do with planning, directing,
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Security Induction Version 4.0 March 2013 Security & Logistics Department Departure Training Session.
© Plan Plan’s Security Framework – A Refresher. © Plan Understanding Ourselves Values - Child Rights, Impartial, Neutral, Sensitive Mandate - Child Centred,
ANGEL - Cooperation Model of the Accessible Environment for the Integration of the Disabled into the Labour Market.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Protecting Houses of Worship Security Plan Development Considerations Glenn Moore Protective Security Advisor – Oklahoma District National Protection and.
Safe Schools Program Campus Orientation August 15, 2016.
Child safe guarding Child protection in your organisation.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
SGTM 6: Personal Security Awareness Slide 1 SGTM 6: Personal Security Awareness.
Refuah Community Health Collaborative (RCHC) PPS
Physical and Technological Security
Volunteer Role Description for: Location: Main contact:
Safe Schools Program Campus Orientation
Together with our strategic partners, Secura held a survey for discovering the current challenges, trends and information needs that companies face today.
We always have time to work safely
Explaining strategies to ensure compliance with workplace legislation
2016 NC Teacher Working Conditions Survey Results
Emergency Codes Effective October 1, 2008.
Volunteer Role Description for: Location: Main contact:
SAFEGUARDING – MENTAL CAPAPCITY ACT.
Electronic Devices Policy
1. How do you promote wellbeing across your organisation?
Volunteers Governors New members of Staff
USA Hockey’s SafeSport Program
Volunteer Role Description for: Location: Main contact:
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
A Holistic Approach to School Security
Smart Employment Solutions is the trusted name in Apprenticeships and Traineeships across Brisbane and Gold Coast. For advice and options call us on 07.
People Responsible For Health and Safety
Refuah Community Health Collaborative (RCHC) PPS
USA Hockey’s SafeSport Program
Information management and communication
What Is Workplace Violence?
Gem Complete Health Services
(COLOR SYSTEMS FLOWCHART HANDOUT, fancier than book): LETS LOOK AT OUR RECOMMENDATIONS FOR A SYSTEM (LEVEL 1 AND LEVEL 2… THEN WE’LL DISCUSS YOUR SYSTEM.
MidAmerica Nazarene University
Home Visitor Safety Deb Palmer.
MidAmerica Nazarene University
Stakeholder Involvement in Nuclear issues Workshop: Milestones for Nuclear Power Infrastructure Development November 5-9, 2007 Why Stakeholders are.
MidAmerica Nazarene University
Unit 3 Overview This unit introduces you to the Incident Command System (ICS) Functional Areas and roles of the Incident Commander and Command Staff.
WORKPLACE VIOLENCE Making employees aware of security hazards and how to protect themselves and their co-workers Information provided for UAC members.
SITUATIONAL AWARENESS TRAINING
Gender Based Security For SHIs
Chapter 19 Crowd Procedures รศ.ดร.เสรี วงษ์มณฑา
Component 1: Introduction to Health Care and Public Health in the U.S.
High School 101: Safety Plan
Presentation transcript:

Security Management Measures UCD May 2016

Security Measures- Acceptability Never assume that our presence, actions or programmes are well understood, or that people can differentiate between us and other international organisations with different mandates and reasons for being present. ‘Acceptance’ is the pro-active gaining and maintaining of support for our presence and programmes by programme participants, the larger community in which we work, and local power-brokers.

Acceptability Disseminating consistent and accurate information about Concern Establishing and maintaining relations with a broad range of contacts. Respecting local culture Maintaining a distinct and separate identity, and a distance from military groups The choice of programmes and the style of their implementation Adherence to our policies and practices , P 4, HR, CRM etc. Do not accept funding for politically or militarily motivated programming

Protection –physical measures High perimeter walls Good external lighting Controlled access point for vehicles, staff and visitors escape route A safe room, Doors that have locks and windows that are barred Use of well-trained guards Use of shatter proof glass Protective bollards Choice of location of the compound, Use of video cameras Ensuring radios and mobile phones etc. work, in credit and staff know how to use them

Protection – procedural measures Major drawbacks are that it creates barriers between us and the local community, can encourage a bunker mentality and can give a false sense of security Control of visitors and vehicles Establishing ‘no go’ areas and curfews Establish communication protocols and contact lists Reducing or increasing visibility of offices, compounds and, vehicles, Training of staff in security awareness Hostile observation awareness Potential dangers of social networking sites Participate in security coordination

Security Measures – Deterrence The making of counter-threats including armed guards, legal sanctions and suspension or closure of programmes These are used but do not sit comfortably with Concern’s mandate and ethos.

Security - sources of information Concern Security Policy (approved 2016) Approach to security management, planning and practice SMP2 (Emergency Unit 2011) “Safety First - a field security handbook for NGO staff (2nd edition 2010) HPN Good Practice Review 8. (2nd Edition 2010)