 Is the process of conducting an exhaustive physical examination and thorough inspection of all operational systems and procedures of a facility.

Slides:



Advertisements
Similar presentations
Basic Principles of GMP
Advertisements

Museum Presentation Intermuseum Conservation Association.
Checking & Corrective Action
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
A Brief Overview of Emergency Management Office of Emergency Management April 2006 Prepared By: The Spartanburg County Office of Emergency Management.
More CMM Part Two : Details.
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
Auditing Concepts.
How OSHA Conducts Inspections
Auditing Computer Systems
Auditing Computer-Based Information Systems
Determining the True Root Cause(s) of Accidents and Safety Incidents Incident Investigation and Analysis.
ISO General Awareness Training
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Information Systems Security Officer
1 OSHA Compliance Inspections INSY 6010 FALL 2003.
Buffalo State College Internal Control Program Presented to: Buffalo State College Line Staff Delivered by: BSC IC Program & Department Managers.
Chapter 11: Follow-up Reviews and Audit Evaluation ACCT620 Internal Auditing Otto Chang Professor of Accounting.
Network security policy: best practices
Security Assessments FITSP-M Module 5. Security control assessments are not about checklists, simple pass-fail results, or generating paperwork to pass.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
System-Based SH&E Management Case Study
Ship Recycling Facility Management System IMO Guideline A.962
Introduction Research indicates benefits to companies who establish effective worker safety and health programs: –Reduction in the extent and severity.
Security Assessments FITSP-A Module 5
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Our Team consists of :  Judith  Kylie  Dylan  Fabian 19/09/20151 Bee Inspired Web Designers Team-Bega Tafe 2012 We desire to Inspire.
Considering Internal Control
Internal Control in a Financial Statement Audit
Best Practices: Financial Resource Management February 2011.
Evaluation of Internal Control System
Important informations
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Audit Planning Process
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
Periodic Review of JHA Reviewing job hazard analysis ensures that it remains current and continues to prevent accidents and injuries. It is possible that.
Division of Risk Management State of Florida Loss Prevention Program.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Internal environmental audit procedure Purpose: To ensure that the environmental management system is used and is effective Scope: The entire environmental.
OSHA – What to Expect When You’re Inspected (Following Federal Guidelines)
1 The Future Role of the Food and Veterinary Office M.C. Gaynor, Director, FVO EUROPEAN COMMISSION HEALTH & CONSUMER PROTECTION DIRECTORATE-GENERAL Directorate.
AUDIT OF INTERNAL CONTROL Day V Sessions I & II. Session Overview Periodical audit of existence of internal control in order to examine its effectiveness.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Module 2Slide 1 of 26 WHO - EDM Quality Management Basic Principles of GMP Part One.
TOTAL QUALITY MANAGEMENT
13 Implementing a Security Plan Implementing a Security Plan
Copyright © 2007 Pearson Education Canada 1 Chapter 11: Overall Audit Plan and Audit Program.
SAA Preservation Section, Equalizing Preservation and Security Collections Protection at Every Level Brittany Turner.
Week 4 Seminar Investigating Significant Injuries and Lessons Learned.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Chapter 3-Auditing Computer-based Information Systems.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Safety and Health Program Don Ebert- Risk Manager (509)
Internal Control Process at Geneseo. Objectives Understand the objectives of effective internal controls Describe Geneseo’s internal control program Accurately.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
INMM Nuclear Security and Physical Protection Technical Division.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
1 Aswathy V S Sr.DAG, O/o AG Lucknow. Internal control is the overall control environment established by management of an enterprise FFor effective.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
- HEMIC Facility Inspections. Common Losses A fire breaks out in a 16 story office building An employee had the tips of two fingers amputated Could these.
For more course tutorials visit
For More Best A+ Tutorials CMGT 400 Entire Courses (UOP Course) CMGT 400 Week 1 DQ 1 (UOP Course)  CMGT 400 Week 1 Individual Assignments.
Module 7 | Slide 1 of Self-Inspection and quality audits Basic Principles of GMP.
Campus Wide Safety Committee Initial Meeting 11/9/16
Auditing Concepts.
How to conduct Effective Stage-1 Audit
Accident Investigation
Presentation transcript:

 Is the process of conducting an exhaustive physical examination and thorough inspection of all operational systems and procedures of a facility.

 To determine existing state of security  To locate weakness in defenses  To determine recommendations establishing a total security program

 Staff personnel or  Qualified security specialists(both of whom should have had training in the field)

A security survey is known by a number of different terms such as: - Risk analysis - Risk assessment

 Key steps in a risk assessment process: - To determine value, impact and cost of any asset should it be lost due to natural or man- made forces. - To determine the degree of probability that natural or man-made forces will strike at any given facility.

 The “vulnerability of a facility” to damage or attack may be determined by a number of ways: - An inspection of the facility by the experienced inspector. - Examination of the facility’s record of losses. - A determination whether the high-value property or items are properly safeguarded from theft by insiders.

 Security Surveys as a general rule cover one or more of the following objectives: - To determine existing vulnerabilities to injury, death, damage or destruction by natural causes. - To determine existing vulnerabilities of corporate assets due to outside criminal activity. - To determine existing vulnerabilities of corporate assets due to criminal activity within organizations.

- To determine existing conditions of physical security of corporate property. - To measure effectiveness of current security police. - To measure compliance of employees to security rules. - To conduct internal audit to determine fraud. - To inspect overall condition within facility which cause security problems. - To investigate environmental conditions in the community from a standpoint of interaction within the facility.

 Some key points relative to conducting a security survey: - Written authority to conduct the survey should be obtained. - Any previous surveys should be reviewed. - An orientation tour should be made. - Photographs should be taken of objects or situations that are difficult to describe. - There should be a review with local plant supervisors of all deficiencies noted during the survey so immediate corrective action can be taken.

- Follow-up survey should be conducted to ascertain if deficiencies have been corrected. - A cost-benefit analysis should be prepared. - A cost-benefit analysis is a direct comparison of the costs of the operation of the security unit and all security measures with the amount of corporate property saved or recovered as well as reduction of losses caused by injuries and lost production time. - No security measure be recommended which is not cost-effective.

- is a process of conducting physical examination to determine compliance with established security policies and procedures as a result of a security survey.

 Security Survey - Defensive type process/service. - Detailed study of the existing security measures. - Conducted to determine the level of security required consistent with the mission. - Broader in scope. - Non-recurring type of service.

 Security Inspection - Defensive type service. - Limited check of the security measures already adopted. - Conducted to determine the degree of compliance with directed security measures. - Limited in scope. - Recurring type of service.

 Announced – conducted normally on duty hours.  Unannounced – conducted normally on non- duty hours.  Penetration.