46
Training Module on Security Vital Installations: Depots and Terminals

Training Module on Security Vital Installations: Depots and Terminals

Embed Size (px)

Citation preview

Training Module on Security

Vital Installations: Depots and Terminals

Module Details

• Objective: To make participants aware of the things to be done to secure depots and plants

• Participants: A, B, C Grade Officers working in depots and terminals

• Method: Lecture

• Duration: One and half hour

• No of Participants: 20

Module Details Cont…

• Course Material: • Security Return cum Review• Red Alert Strengthening of Security• Bomb Threat Handling Procedure• 38 Recommendations to improve security• Protection Scheme• Write-up on FIR• Sample Work Instructions to Security Force

Overview of Security

• Our Pledge

• Definition

• Importance of Security

• Threat Perception

• Vulnerable Areas and Points

• What does security consist of?

Overview Cont…

• Physical Security

• Internal Security

• Special Situations

• Liaison with police

Our Pledge

• Uncompromising Security and Safety of our life and property

Definition

• The state of plant being secure from the real or potential dangers to which they are exposed.

What is security?

• Security is protection of life and property• It is a natural instinct of all living beings• Since beginning man has been devising

ways and means to protect himself and his family and his belongings

• Our workplace is a part of our extended family and hence every employee should be concerned about protection of our installation and our colleagues

Importance of Security

• Threat:

• 1) Miscreants’ Intentions

• 2) Their capability

• 3) Opportunity

• Not to provide opportunity to strike is in our hands

• Lax security provides soft target for attack

Importance of Security Cont.

• Non-availability of police and public utilities

• Lax security: heavy losses and damages

• A threat to the existence of plant

Why have security?

• Security provides a sense of well being and helps us focus our undivided attention on work

• Ours is a vital installation and it provides a vulnerable target for antinational and antisocial elements.

• A petty thief due to ignorance or nervousness may inadvertently cause a major fire that may cause widespread damage to life and property

Threat Perception

• Security begins with threat perception

• Check with local police station, SP, etc., for type of crimes, incidents that occur in the area and district

• Check past history of the location

• Check local newspapers

• Determine level of security basis the threat perception

Vulnerable Areas and Points

• Identify vulnerable areas and focus security efforts on them

• List of vulnerable areas / points– Gates– Tank truck / tank wagon gantry– Vehicle parking areas– Tank farms– Drinking water reservoir

What does security consist of?

• Physical Security

• Internal Security

Physical Security

• Defense in depth

• Perimeter Wall

• Gates

• Watch Towers

• Lighting

• Alarm System

Internal Security

• Access Control

• Security Force

• Communication

• Material Security

• Warehouse Security

Internal Security Cont…

• Document Security

• Records

• Intelligence Cell

• Investigation of Thefts

Perimeter Wall/Fencing

• Create a psychological deterrent to unauthorized entry

• Prevent / delay unlawful entry or trespass

• Make effective and economical use of guards

• Direct flow of personnel, goods, and vehicles through controlled access (gates)

Perimeter Wall/Fencing

• Chain Link Fence

• Brick/Stone Wall

• 20 ft clearance on either side

• Clear track for vehicles / walking

• No trees

• Periodic inspection

Gates

• Number of gates should be limited

• Gates should be topped with spikes

• Gates should have cabins and should be manned

• Redundant gates should be closed down

Watch Towers

• 15 Ft height

• Fitted out with communication and search lights with 360 degree rotation

• Staircase should have gradual incline

Lighting

• Good lighting provides safety and security

• Review lighting at intervals for improvements

• Lighting specifications are given in the security manual

Access control

• Need to know, Need to go

• Employees

• Visitors

• Contractors

• Vehicles

Employees

• ID should be issued to all employees carrying their latest photographs

• ID should be issued afresh every 5 years

• ID may be color coded according to need to go basis

• ID photo should be signed by issuer

Visitors

• Entry passes issued after checking with concerned official.

• Visitors should not be allowed in the plant area. If authorized, some official should accompany and visitor should not be shown vital areas

• Issue visitor’s badge

Contractors

• Prior approval of the list of casual / contract labor. Such list be given to security

• Check antecedents of contract/casual labor

• Issue badges to casual/contract labor• Frisk casual / contract labor• Written instructions about safety, fire,

security to all contractors

Vehicles

• Check for hidden explosives / stolen goods

• Employees’ and visitors’ vehicles should be parked outside plant area

• Issue entry permits to employees vehicles

• Use mirror trolley for inspection of underside

Security force

• Maintain a register of instructions to security force

• Define and specify scope and areas of responsibility and accountability

• Enforce DGR guidelines

• Train security force

• Use security guards for security jobs

• Use of fire-arms is not recommended

Communication

• Security should have access to direct telephone line.

• List of important telephone numbers should be prominently displayed.

Material Security

• Make gate-pass system fully functional

• Limit the approving authorities to a few senior people

• Separate file for returnable OGP

• Set up a procedure for regular review of ROGP

• Give a list of persons authorized to approve gate passes to security

Material Security Cont…

• Material leaving the location must be covered under approved gate pass

• Use flow meters for filling

• Check expiry dates of calibration certificates

• Keep details of all tank trucks or trucks attached to a location

• Verify accuracy of calibration at intervals

Material Security Cont…

• Valuable scrap may be closely protected

• Scrap yards containing valuable material may be fenced, locked and sealed

• Supervise removal of disposable waste material for hidden articles

• Check all empty tank wagons, tank trucks leaving the location

• Check vehicles leaving the premises

Warehouse Security

• Windows, ventilators, skylights, exhaust ports, etc., should be fitted with iron grills

• Entry be restricted to authorized employees

• Regular stock taking and tallying with ledger balances

• Use multi-levered lock and seal for the door

Warehouse Security Cont.

• Bolt and lock all windows and doors at the end of the day

• Security guards should cover warehouses in their patrolling rounds

Document Security

• Store vital documents in steel cupboards

• Restrict access to vital information to trust worthy employees

• Assign appropriate classification to documents and mark in bold

• Follow up dispatch of confidential documents meticulously to ensure that they reach destination in reasonable time

Document Security Cont.

• Obtain acknowledgement of receipt of confidential document

• Do not allow others to copy confidential documents

Records

• Maintain registers/records at the main gate of incoming outgoing vehicles, visitors, contractors’ men

• Maintain a record of surprise visits made or checks carried out for review and reference

• Maintain a record of incidents for use in the future

Intelligence Cell

• Form a close-knit group of informants

• Gather intelligence

• Liaise with CBI, IB, Police for information

Investigation of Thefts

• Thefts should be promptly reported.

• Maintain a written record of all thefts. Location in charge should review this record

• Make a complaint or FIR when there is outside intrusion or theft in collusion with outside sources

• Aid the police and magistrate

Investigation of Thefts Cont…

• Internal investigation

• Proper attitude for investigator

• Should a case be reported to police

• Method of conducting investigation– Visit to the location– Examination of witness– Questioning of suspect/accused

Investigation of Thefts Cont…

• Report on the result of internal investigation

• Steps in investigation– Visit scene of incident– List physical evidence/clues– Prepare list of documents to be examined– Prepare list of witnesses to be examined– Take charge of relevant materials and

documents

Investigation of Thefts Cont…

– Examine controls procedures and practices concerning the items lost

– Record statement of witnesses

Investigation of Thefts Cont…

• Right of private defense

• Limitations of right of private defense

Special Situations

• 38 Recommendations

• Beefing up security during red alerts

• Bomb threats

• Protection Scheme

Assistance of District Administration

• Police Station

• SP

• DySP

• District Collector

• DIG

• Range DIG

• IG

Thank You

»End