Time Sensitive Standards Presented by RPM Vince Dauro.

Slides:



Advertisements
Similar presentations
University Safety Office 10 Parks Road Oxford OX1 3PD Health and Safety Self Assurance Toolkit Directly.
Advertisements

Analysis to support CALEA Standards Prepared by: Christie Goddard.
Contractor Code of Business Ethics and Conduct Laura K. Kennedy Senior Vice President, Ethics and Compliance SAIC.
GCEAG Meeting January 12,  NPR Issued September 14, 2011  Comments were due November 14, 2011  Focuses on six new or expanded items  Stop work.
© Business Review - Arabian Peninsula January 24, 2010 / Slide 1 ABB Contractors Business Partners John Hartnett May, 2010.
Cleveland School District Gerald Finley, Property Manager Friday, July 27, 2012.
Property Management Overview
Administrative Review Requirements September 17, 2014.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Contractor Safety Management
Participant Challenge Pilot Program Participant Stage One Assess, Learn and Develop.
Contractor Management and ISO 14001:2004
Safety and Health Programs
Office of Inspector General (OIG) Internal Audit
Prepared by: Christie Goddard. Course Objectives  Definitions  Values of Written Directives and Proofs  How to write policy/procedures  Building the.
Obligations of the Company
1.2.1 > ISPS Module ISPS Code Responsibilities
Developing a Chemical Risk Management Program
Supplier Ethics: Program Checklist
Safety and Health Programs
TELLEFSEN AND COMPANY, L.L.C. SEC Regulation SCI and Automation Review Policy Compliance March 2013 Proprietary and Confidential.
Session 6: Data Integrity and Inspection of e-Clinical Computerized Systems May 15, 2011 | Beijing, China Kim Nitahara Principal Consultant and CEO META.
Controlling Risk by Managing Change Jessica Blaydes & Gary Fobare Honeywell Aerospace 2013 Region IX Workshop.
Network security policy: best practices
OH&S Management System
CASCOM -TRAINING DIRECTORATE QUARTERMASTER TRAINING DIVISION
IMPROVING TRANSPORTATION SERVICES IN EARLY EDUCATION AND CARE SETTINGS EEC Board Meeting - December 13, 2011.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Overview of NPG Social Responsibility Audit Process
Continuity of Operations Planning COOP Overview for Leadership (Date)
Authorization and Inspection of Cyclotron Facilities Inspections.
1 Effective Safety & Health Assessments: Audits and Inspections Disclaimer: These safety materials, resources and PowerPoint ® presentations are not intended.
Effective Management and Compliance 1 ANA GRANTEE MEETING  FEBRUARY 5, 2015.
ALL INFORMATION IS SUBMITTED WITHOUT PREJUDICE!!! MMAH… A “Qualification Process” That Varied Based On… “Who Was Paying The Fees…”
Risk Management, Assessment and Planning Committee III-4.
Coding Compliance Plan July 12, Benefits of a compliance program  To demonstrate our commitment to honest and responsible conduct, decrease the.
Kathy Alexander, Ph.D. Technical Specialist Water Availability Division Texas Commission on Environmental Quality.
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
Environmental Management Systems (EMS) Update Region 5 February 27, 2006.
An introduction to records management at Clemson University Records Management Office 139 Anderson Hwy, Suite 100 Clemson, S.C
Problem Areas Updates Penalties FRCC Compliance Workshop September / October
QUALITY MANAGEMENT STATEMENT
Division of Risk Management State of Florida Loss Prevention Program.
Active Corrosion Process Nisource – COH/CKY. Objectives  Understanding the terminology –Active Corrosion –& Suspected Areas of “Active Corrosion”  Developing.
HOKLAS th Edition HOKLAS th Edition Vs. 8 th Edition Major Changes HOKLAS th Edition.
Copyright FDA Inspections: Where Do Things Go Wrong? Diana Naser RN, MS, CCRP Executive Director Clinical Research Administration Clinical Research.
MULTIPLE PROGRAMS Presented by: Vince Dauro Southeast Regional Program Manager.
Texas Law Enforcement Best Practices Mid Year Training Conference.
An introduction to records management at Clemson University Records Center is located at the Library Depot 103 Clemson Research Blvd Anderson, S.C
Data Coordinators Conference – 2014 Laura Marroquin CASEWORKER/JCMS Specialist Everything New Data Coordinators Should Know.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Safety and Health Program Don Ebert- Risk Manager (509)
IIPP An Overview of the Injury and Illness Prevention Program.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Lenoir County Public Schools New North Carolina Principal Evaluation Process 2008.
Professional Services for.  Desire to evaluate policies, procedures, and practices of LCPD  Hired Justice and Security Strategies (JSS) to: 1.Evaluate.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Texas Law Enforcement Recognition Program
MANAGING TIME SENSITIVE AND ACTIVITY REQUIRED STANDARDS
Field Inventory Services-Sanofi Inventory and Audit Training
MANUALS READ THE MANUALS!!
Training Appendix for Adult Protective Services and Employment Supports June 2018.
Red Flags Rule An Introduction County College of Morris
Contents subject to change.
Continuity of Operations Planning
Lake Dallas Police Department 2018 Racial Profiling Report
UNUSUAL INCIDENT REPORTS AND MAJOR UNUSUAL INCIDENTS
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Time Sensitive Standards Presented by RPM Vince Dauro

LOGO Important information ! If at any time during this program your neighbor starts falling asleep, please make sure that they are comfortable.

What is a Time Sensitive Standard? Communications Standard The agency has an independent backup communications system and a documented test is performed at least monthly.

Timeframes Annual: Once a year Triennial: Every three years Semi annual: Every six months / twice a year Quarterly: Every three months Biennial: Every two years Monthly: Once a month / every 30 days Weekly: Once a week / every 7 days Per Incident: Each occurrence

Appendix E (Comm.)

Prioritizing Standards What standards should be addressed first? When, in self assessment, should time sensitive standards be addressed?

Campus Security: A documented survey of campus community perceptions and opinions is conducted at least once every three years with respect to…..

A written directive requires a documented report of all incidents that threaten the facility or any person therein. Commentary: None (MMM)

True or False?

An agency just signed a CALEA contact. The accreditation manager should immediately recognize all time sensitive standards and establish compliance.

Of all of the 8 types of standards, time sensitive standards are the most popular.

Most issues that stem from assessments are from agencies not complying with time sensitive standards.

If the agency’s procedure exceeds the standard timeframe, it takes priority over the standard statement.

The Commentary can also give you binding timeframes for time sensitive standards.

Potential Problematic Standards All standards listed in Appendix E!!

The number one problem! Law Enforcement In order to maintain a high degree of evidentiary integrity over agency controlled property and evidence; the following documented inspections, inventory, and audits shall be completed:

a.An inspection to determine adherence to procedures used for the control of property is conducted semi-annually by the person responsible for the property and evidence control function or his/her designee; b.An audit of property occurs whenever the property and evidence custodian is assigned to and/or transferred from the position and is conducted jointly by the newly designated property and evidence custodian and a designee of the CEO to ensure that records are correct and properly annotated;property and evidence custodian c.An annual audit of property and evidence held by the agency is conducted by a supervisor not routinely or directly connected with control of property and evidence; and d.Unannounced inspections of property storage areas are conducted, as directed by the agency’s chief executive officer, at least once a year.

Establishing Timeframes  What happens if an activity is not shown in the timeframe indicated by the agency?  Can time sensitive activities be generated early?  How much time should I give to produce an analysis or review after the data is generated?

Analysis  Definition: A systematic, structured process for dissecting an event into its basic parts to identify any patterns or trends. Analysis should reveal patterns or trends that could be predictive or could indicate program effectiveness, training needs, equipment upgrade needs and/or policy modification needs. (Christies class this morning.)  If no occurrences, an analysis is still needed.

Analysis Requirements Analysis Requirements

Resources CALEA Regional Program Manager CALEA Electronic Standards Manual PowerDMS™ Lite

Appendix G Exercise

24 Law enforcement A written directive governs pursuit of motor vehicles, to include: i. requiring a written report and an administrative review of each pursuit. (MMMM) Appendix G

25 The Anywhere Sheriff’s Office did not allow deputies to participate in pursuits prior to a policy change implemented by the new Sheriff. The new Sheriff changed the pursuit policy allowing deputies to engage in pursuits, given the right circumstances, in August Since implementation, and prior to the agency’s April 2014 assessment, 4 pursuits have occurred. The Sheriff’s office will be reviewed for reaccreditation at the Schaumburg, IL conference in July According to Appendix G, how many proofs should be in the file? 1

26 Communications A documented inspection of the computer records and security system is conducted on all passwords or access codes for violations and improper use at least quarterly. (MMM)

27 The Any State Communications Center signed a CALEA contract in January The center had all policies and procedures in place when they signed the contract. The agency conducted their initial assessment in February According to Appendix G, how many proofs should be in the file? 2

28 Training Academy The safety officer has written policies or procedures that are annually reviewed and approved by the academy that address the issues in standard (M) The Anytown Training Academy was reaccredited at the March 2013 CALEA Conference. According to Appendix G how many proofs were in the file for standard 9.1.7? 3