International Labour OrganizationInternational Maritime Organization Summary of the ILO-IMO Code of Practice on Security in Ports.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Module N° 4 – ICAO SSP framework
Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
1 The Protocol on Water and Health: making a difference where health, environment and development policies meet The Protocol on Water and Health.
Homeland Security Ships and Ports © All Copyright GT Aviation 2004 G.T Consulting.
Bic river basin management plan and involvement of local authorities in the implementation of the program of measures Dumitru Drumea, Executive Director,
A regional initiative for managing the impacts of diving and snorkeling activities on coral reefs.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Experts workshop on Maritime Security: Addis Ababa EXPERTS WORKSHOP ON MARITIME SECURITY Addis Ababa, 6-7 April-2010.
October ISPS and SMDG What is the possible impact of the ISPS code on the messages controlled by SMDG?
Community Initiative Programme Interreg III A Greece – Italy February 2006.
1 Regulatory Challenges During and Following a Major Safety or Security Event Muhammad Iqbal Pakistan Nuclear Regulatory Authority Presentation at General.
Inter-Agency Crisis Management,28 June 2012 Inter-Agency Crisis Management in the Netherlands.
IMO Activities to enhance Maritime Security
Urban-Nexus – Integrated Urban Management David Ludlow and Michael Buser UWE Sofia November 2011.
Central Asia Regional Health Security Workshop Co-organized with the Command Surgeon, US Central Command and the George C. Marshall European Center for.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Unit 8:COOP Plan and Procedures  Explain purpose of a COOP plan  Propose an outline for a COOP plan  Identify procedures that can effectively support.
Disasters and Emergencies The Role of The Chaplain in the world of Emergency Management.
COMMUNITY AWARENESS / EMERGENCY RESPONSE BEST PRACTICE EXAMPLES AND TOOLS David Sandidge Director, Responsible Care American Chemistry Council May 31,
Chapter 3 資訊安全管理系統. 4.1 General Requirements Develop, implement, maintain and continually improve a documented ISMS Process based on PDCA.
PRESENTATION TO THE PORTFOLIO COMMITTEE OF AGRICULTURE, FORESTRY AND FISHERIES AGRIBEE CHARTER COUNCIL STRATEGIC PLAN AND BUDGET FOR 3 YEARS 2015/16 –
Presented by: Meg Boyd The Blue Mountains Drinking Water System: DWQMS Overview.
Module N° 8 – SSP implementation plan. SSP – A structured approach Module 2 Basic safety management concepts Module 2 Basic safety management concepts.
APEC Land International Security and Commuters’ Advocacy Protocol (Land IS-CAP) Plenary Conference Manila, Philippines July 15-16, 2009 APEC Land IS-CAP.
Emergency Exposure Situations Developing a National Capability for Response to a Nuclear Accident or Radiological Emergency Requirements for Infrastructure.
A National approach to Cyber security/CIIP: Raising awareness.
Transit Revitalization Investment Districts Planning and Implementation of Act 238 of 2004 July 2006 Getting to TRID Lynn Colosi Clear View Strategies.
Developing Plans and Procedures
Environmental Management System Definitions
OVERVIEW OF THE ROLES OF VARIOUS INSTITUTIONS AND REGULATORY FRAMEWORK FOR AFLATOXIN CONTROL IN TANZANIA RAYMOND N. WIGENGE DIRECTOR OF FOOD SAFETY TFDA.
SEVESO II transposition and implementation – possible approaches and lessons learned from MS/NMS SEVESO II transposition and implementation – possible.
CARTAGENA PROTOCOL ON BIOSAFETY NDA- DEAT BILATERAL MEETING 1 August 2003 Presenter : M. Mbengashe.
Management of Change ► The health, safety, security, environmental, technical and other impacts of temporary and permanent changes are formally assessed,
Community Resources Assessment Training 4-1. Community Resources Assessment Training 4-2.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Potential Disasters : Opportunities for Resilience.
SINGAPORE’S MARITIME SECURITY STRATEGY Mrs Mary Seet-Cheng Director (Special Duties) Maritime & Port Authority of Singapore.
RESPONSIBLE CARE ® SECURITY CODE Daniel Roczniak Senior Director, Responsible Care American Chemistry Council June 2010.
THE PROTOCOL ON WATER AND HEALTH: where health, environment and development policies meet.
PRESENTATION TO SELECT COMMITTEE ON ECONOMIC AND BUSINESS DEVELOPMENT 13 OCTOBER 2015 RATIFICATION OF THE AFRICAN MARITIME TRANSPORT CHARTER 1.
Тренировъчна сесия София 23 – 24 февруари 2006 Specific measures in support of international co-operation Overall presentation of the Work programme Karina.
TEFMA 2008 Sudhish Nayyar. AGENDA CRISIS –What is the worst thing that could happen? –Where? –When? Steps in effective Crisis Management Aon’s capabilities.
Guidance document on Water and Climate adaptation Jos G. Timmerman Rijkswaterstaat Centre for Water Management.
ISO CONCEPTS Is a management standard, it is not performance or product standard. The underlying purpose of ISO 1400 is that companies will improve.
Framework for establishing and promoting RPCM. Tentative Table of Contents 1.Defining culture and terminology – What is safety culture /attributes of.
Future needs for capacity building and recommendations to the OIE Dr Sarah Kahn Consultant to the OIE
System of Environmental-Economic Accounting Sokol Vako United Nations Statistics Division Training for the worldwide implementation of the System of Environmental.
Information Security tools for records managers Frank Rankin.
Public Consultation Session: Consultation and Transparency Requirements for Offshore Petroleum Activities Francesca Astolfi A/g General Manager, Offshore.
Lessons learned from the ILO/IMO Code of practice on security in ports in the context of inland terminal and inland port security By Marios Meletiou Technical.
1 Dr. Spyros Papastergiou, University of Piraeus (Greece)–Dept. of Informatics M. Zaharias Singular Logic (Greece) CYSM Risk Assessment Methodology.
Polish Critical Infrastructure Protection System.
APTA Rail Transit SMS Implementation Guide June, 2016.
Business Continuity Planning 101
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
Convention of the Protection and Use of Transboundary Watercourses and International Lakes Developing a guidance on water and climate adaptation for the.
XYZ Port Facility Maritime Security Exercise
Sendai Framework for Disaster Risk Reduction
Environmental Evaluation of Projects in Greece
Critical Infrastructure Protection Policy Priorities
Unit 2: Recovery Pre-Disaster Planning Guidance for Local Governments
Know Your Revised Alternate Security Program (ASP) Jen Wilk
XYZ Port Facility Maritime Security Exercise
Environmental Services Training Group
Nick Bonvoisin Secretary to the Convention on the
Importance of Law and Policies in the Environmental Management System
World Health Organization
Contingency Planning for Accidental Surface Water Pollution​ GROUP HSE RULE (CR-GR-HSE-705) EXECUTIVE SUMMARY This rule sets specific requirements to be.
Presentation transcript:

International Labour OrganizationInternational Maritime Organization Summary of the ILO-IMO Code of Practice on Security in Ports

Provisions in the Code of Practice

The LO-IMO Code of Practice on Security in Ports Contents PrefaceV Abbreviations XVI 1. Introduction 1 2. Scope and definitions4 3. Aim of security measures 7 4. Security policy 8 5. Roles and tasks9 6. Security level12 7. The port security assessment13

Contents 8.The port security plan14 9.Physical security of the port Security awareness and training Confidentiality and non-disclosure of information 19 Appendices A. The port security assessment 21 B. The port security plan 37 C. Selected references 44 The LO-IMO Code of Practice on Security in Ports

Summary  The provisions in the Code of Practice on Security in Ports may be represented as an activity flow-chart, reflecting the steps defined in the COP towards the attainment of an acceptable level of risk in port security.  These are then documented in a Port Security Plan.

Summary flow-chart 4.1 Member States produce Ports Security Policy Statement 4.2 Member States develop Security Policy and provide legal framework

Summary flow-chart 4.2 Member States develop Security Policy and provide legal framework Promote regional, international cooperation Encourage stakeholder participation Provide adequate resources Recognise the human element Recognise interdependence between security and public safety, economic development, environmental protection stakeholder participation Appoint Designated Authority for each port Establish PSAC and appoint PSO

Summary flow-chart Establish PSAC 5.3 Roles & Tasks of the PSAC Nominate PSO Approve Port Security Assessment & amendments 5.2 Roles & Tasks of the PSO

Summary flow-chart Approve Port Security Assessment & amendments Appendix A Port Security Assessment Develop Port Security Plans and implement 5.2 Prepare TRAM Appendix B Port Security Plan

The Port Security Assessment Step 8:Implementing measures to reduce vulnerability Potential Target 1: Port authority communications tower Scenario No. Threat Scenario ThreatVulnerabilityImpactRisk Score Action Priority ABCDEFG 1 Destroy port authority’s communications tower by explosives Destroy port authority’s communications tower by explosives 142

The Port Security Assessment Examples of Threat Scenarios Scenario No. Threat Scenario ThreatVulnerabilityImpactRisk Score Action Priority 1 Destroy port authority’s communications tower by explosives Attack ships/harbourside infrastructure with “boat bomb” Hostage taking: Attack passenger and tourist shopping and food centres Sabotage port water supply pipeline Destroy port authority’s communications tower by explosives Sabotage port water supply pipeline Hostage taking: Attack passenger and tourist shopping and food centres Attack ships/harbourside infrastructure with “boat bomb”

Summary flow-chart Develop Port Security Plans and implement Set and communicate Security Levels Appendix B Port Security Plan 6.1 Security level determined by Member States Response and Crisis Management PSP review and maintenance policy PSP security and control Training Drills, Exercises and Testing