Model Safety Program DATE: _____________ SUBJECT: Physical Security Plan REGULATORY STANDARD: General Duty Clause (further detail Federal, State, and Local Requirements.) . RESPONSIBILITY: The company Security Officer is _________________. He/she is solely responsible for all facets of this program and has full authority to make necessary decisions to ensure success of the program. The Security Officer is the sole person authorized to amend these instructions and is authorized to halt any operation of the company where there is danger of security breach. Contents of the Physical Security Plan 1. Written Program. 2. Program Requirements. 3. Program Components. 4. Physical Security Committee. 5. Security Inspections and Surveys. 6. Security Risk Assessments. 7. Vulnerable Security Areas Listing. 8. Restricted Areas. 9. Security Measures. 10. General Access to Premises. 11. Policy for Passes and Badges. 12. Confiscating Passes and Badges. 13. Access by Local Law Enforcement Agencies. 14. Keys and Lock Controls (K&LC). 15. Personnel Monitoring. 16. Company Guard Program. 17. Individual Reliability Program for Guards. 18. Guardpost Orders. 19. Guardpost Evaluations. (YOUR COMPANY) Physical Security Plan 1. Written Program. (YOUR COMPANY) will review and evaluate this plan under the following conditions: (1) (2) (3) (4) (5) (6) (7) On an annual basis. When changes occur to applicable regulations. When changes occur to local directives. When facility operational changes occur. When the plan fails. _____________________________ _____________________________ Effective implementation of this program requires support from all levels of management within this company. This plan will be communicated to all personnel that are affected by it. It encompasses the total workplace, regardless of number of workers employed or the number of work shifts. It is designed to establish clear goals and objectives. 2. Program Requirements. Each level of management has specific responsibilities that allow the program to function effectively. The proper operation of this plan is an integrated process made up of the following components. (1) Assessing the threat. (2) Assigning specific physical-security duties. (3) Conducting security planning. (4) Conducting risk analysis. (5) Identifying vulnerable areas. (6) Designating restricted areas. (7) Coordinating security efforts. (8) Establishing physical-security councils. (9) Employing physical- and procedural-security measures. (10) Conducting inspections and surveys. 3. Program Components. 3.1 Employee responsibilities. Physical security is everyone’s responsibility. An effective physical-security program uses an approach that is methodical, deliberate, and ongoing at each management level. Employees at all levels will establish programs that include the components prescribed by this plan. Supervisors will periodically review and be prepared to adjust their programs to the changing threat. 3.2. Assessing the threat. Threat assessments must be developed and updated as necessary. 3.3. Duty assignments. Physical security officers will be designated accordingly. This company will designate individuals to serve on a working group, to establish the physical-security committee. 3.4 Key and lock control. Key and lock control (K&LC) will be a designated duty in every department. K&LC custodians will be appointed in writing to control keys to sensitive areas and high cost assets. 3.5 Security planning. The physical-security plan will tie security measures together. The plan will integrate security efforts by assigning responsibilities, establishing procedures, and ensuring subordinate plans complement each other. The physicalsecurity plan must have reasonable and affordable protective measures. Reliance on security guards should be a measure of last resort, with alternatives considered when possible. Associated costs should be in proportion to the value or criticality of the property being protected and the existing level of risk. 3.6. Risk analysis. Risk analyses are critical to security planning. Risk analyses are used to adapt physical protective measures and security procedures to local conditions. Risk analyses must be performed on vulnerable areas. Risk analyses will be considered when scheduling follow-on inspections and surveys. Analyses will be kept on file until the next risk analysis is conducted. 3.7 Vulnerable area listing. The vulnerable area list helps managers concentrate protection on the most important assets and prioritize the physical-security effort. The vulnerable areas list will include only areas and activities that have been determined to be essential to the operation or highly vulnerable based on a total assessment of the specific operation, environment, value and threat. To develop a vulnerable areas list, we will begin by identifying assets that are critical or subject to a particular threat, based on known or expected conditions. 3.8 Restricted areas. This company will safeguard assets by declaring high threat areas as restricted, thereby limiting access to that area. Access to restricted areas will be strictly controlled and notices will be posted in plain sight. Violations of restricted areas will be brought to the attention of the security officer. 3.9 Plan coordination. This plan will be coordinated with appropriate physicalsecurity plans with adjacent facilities when possible. Mutual support agreements will also be established with companies having security interests in the local area. 4. Physical Security Committee. 4.1 Charter for the (YOUR COMPANY) Security Committee. This security committee will encourage security awareness among all employees. It will be established to monitor physical security, security performance, security inspections, and aid the security officer in administering the company security program. The Committee is charged to: Reduce the security threat to employees and physical assets. Constantly be aware of conditions in work areas that can produce security violations. Aid the company in complying with all laws pertaining to security. Ensure that no employee is required to work at a job that is not safe or healthful. Place the security and health of each Employee in a position of primary importance. Aid management in providing all mechanical and physical facilities required for security in keeping with the highest standards. Maintain a security program conforming to the best management practices of organizations of this type. Review intrusion detection system (IDS) failures, including; causes, downtime, and repair problems. Review security modernization plans, status of proposed construction, and integration of security requirements. Review crime trends and conditions conducive to crime. Review threat assessments and facility inspections. Establish a program that instills the proper attitudes toward security not only on the part of employees, but also between each employee and his or her coworkers. Ultimately achieve a security program maintained in the best interest of all concerned. 4.2 Security Committee Composition. 4.2.1 Composition. The company security committee will be comprised of ( ) Employees of (YOUR COMPANY). The make up of the committee will consist of the following: Security Committee Title Chairman Vice Chairman Member Member Member Member Member Member Member Member Member ________________________________ ________________________________ ________________________________ ________________________________ ________________________________ ________________________________ ________________________________ ________________________________ ________________________________ ________________________________ 4.3 Principal Responsibilities. The principal responsibilities of the company security committee will be as follows: Assemble on a(n) ______ basis to conduct security meetings. Conduct and oversee departmental security inspections. Review security violations and discuss corrective actions. Direct and monitor departmental training and security meetings. Discuss and report on unfinished business from previous meetings. Discuss new business. Discuss old business. Maintain appropriate records of activities. 4.4 The Security Officer will be present to make notations of the meeting and offer advice. He/she will track open security items to conclusion. He/she will also act as chairman in the absence of the designated chairman or vice chairman. 4.5 Meeting Ground Rules. Company Security Committee meetings will be conducted in such a manner as to foster a productive work environment. The principal goal being to determine solutions to security issues affecting our company. The following ground rules apply. 4.5.1 A minute taker will be selected to serve on a rotating basis from assigned committee members. 4.5.2 Distribution of Minutes. Minutes will be distributed within ( ) working days to the following: 4.5.2.1 __________________________ 4.5.2.2 __________________________ 4.5.2.3 __________________________ 4.5.2.4 __________________________ 4.5.2.5 __________________________ 4.5.2.6 __________________________ 4.6 Discussion time limits. In order to establish and maintain a productive course of action on individual security issues, discussion time limits will be established and adhered to. Discussion time limits on each security topic will be typically kept to a ( ) minute time limit per security issue. 4.7 Subcommittee actions. Where an issue cannot be resolved in a reasonable amount of time, a subcommittee (composed of at least two people) will be selected and the issue turned over to the subcommittee for investigation and development of recommendations. Subcommittee actions will be classified as “old business” and integrated into the next Security Committee Meeting as appropriate. 4.8 Facility security committee representatives. Company security committee representatives will be designated in each department. The following positions will be designated as the security committee representative at each facility: FACILITY SECURITY COMMITTEE REPRESENTATIVES TITLE NAME LOCATION ____________________ ____________________ ____________________ ____________________ ____________________ ____________________ ______________ ______________ ______________ ______________ ______________ ______________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ 5. Security Inspections and Surveys. Inspections and surveys conducted by this company will conform to the highest requirements for physical security surveys, physicalsecurity inspections, and security engineering surveys. 5.1 Inspections are primarily for vulnerable areas; the frequency is every ( ) months 6. Security Risk Assessments. Risk assessments will be conducted routinely on a(n) ___ basis. Non-routine risk assessments will conducted whenever a significant loss occurs or other occurrence which has significant impact on the physical security of the facility. 6.1 Risk assessments are critical to security planning. Risk assessments are used to adapt physical protective measures and security procedures to current conditions. 6.2 Risk assessments must be performed on vulnerable areas. Risk assessments will be considered when scheduling follow-on inspections and surveys. Assessments will be kept on file until the next risk assessment is conducted. 7. Vulnerable Security Areas Listing. Vulnerable area listings will be developed and maintained. 7.1 The vulnerable areas list will enable the security officer to concentrate protection on the most important assets and prioritize the physical-security effort. The vulnerable areas list will include only areas and activities that have been determined to be essential to employee safety, high cost, essential to the operation or highly vulnerable based on a total assessment of the specific area. 7.2 To develop a vulnerable areas list, department heads (or other suitable title) will begin by identifying assets that are critical to employee safety, company operations or subject to other threats which impact the stability of this company. 7.3 Based on their analyses, managers at each level will develop a vulnerable security areas list and submit it to the Security Officer for consideration as a vulnerable area. Areas approved for addition to the vulnerable areas list will be scheduled for risk assessment and physical-security inspections within ___ days. 8. Restricted Areas. One way we can safeguard assets is by declaring an area restricted and, thereby, limiting access to that area. Restricted areas will be designated and posted in accordance with local laws. 8.1 This company will ensure all restricted areas have been assessed and local laws are complied with. Violations of restricted areas will be brought to the attention of the Security Officer. 9. Security Measures: There are two broad categories of security measures: procedural and physical. Measures instituted by this company should deter, detect, delay, or defeat the threat. Deterrence will be improved by using highly visible measures and randomness. This is cost-efficient and complicates the threatening person or group. Security measures will be integrated and layered by using a combination of fences, lights, electronic security systems (ESSs), and guards. 9.1 Procedural controls will include but are not limited to: Duty appointments, security checks, checklists, written procedures, etc. 9.2 Procedural controls will include but are not limited to: Fences, locks, lights, electronic security systems (ESSs), and guards. 10. General Access to Premises: 10.1 Unrestricted areas. Any of the documents listed below may be used to gain access to unrestricted areas. (detail corporate policy) 10.1.1 10.1.2 10.1.3 10.1.4 10.1.5 ___________________________________________ ___________________________________________ ___________________________________________ ___________________________________________ ___________________________________________ 10.2 Unrestricted areas. Any of the documents listed below may be used to gain access to unrestricted areas. (detail corporate policy) 10.2.1 10.2.2 10.2.3 10.2.4 10.2.5 ___________________________________________ ___________________________________________ ___________________________________________ ___________________________________________ ___________________________________________ 11. Policy for Passes and Badges. 11.1 Issuing authorities within this company will keep a record of each pass and badge issued or destroyed. Records will be maintained in the _______ office. 11.2 Passes and badges are company property and may not be transferred or altered after they are issued. Lost passes or badges will be reported promptly to the issuing authority. When the need for a pass or badge ends, the individual’s supervisor will ensure the pass or badge is voided and returned to the issuing authority. The issuing authority will destroy the pass or badge by cutting it into small pieces or shredding it, and recording its final disposition. Supervisors will report passes and badges that cannot be recovered as "lost." 11.3 Lost or stolen passes will be reported to the individual’s supervisor immediately. 11.4 The company may revoke passes with no prior notice. The employee will be notified within ( ) working days of the reason for the revocation. 11.5 To control and account for passes and badges, issuing authorities will: 11.5.1 Control procurement, storage, processing, issue, turn-in, recovery, expiration, and destruction of passes and badges. 11.5.2 Establish measures to reduce the possibility of theft, loss, counterfeiting, and improper use. 11.5.3 Establish a uniform method of wearing security badges. 11.5.4 Arrange entry-control points so arriving and departing personnel must pass in single file in front of access-control personnel. 11.5.5 Position racks or containers holding security badges and passes so they are accessible only to access-control personnel. 11.5.6 Authenticate security records as required. 11.5.7 Appoint a responsible custodian to perform control procedures. 11.5.8 Maintain written records that show the status of passes and badges, and the disposition of lost, stolen, and destroyed forms. Information will be recorded, maintained and destroyed according to company policy or on automated data files that include the same data elements. 11.5.9 The security officer will conduct unannounced inspections and inventories of issuing procedures and on-hand security management forms. These inspections and inventories will be conducted at least once a quarter (or detail other). The inspection will be documented and _____________ (Security Officer’s Supervisor) and department inspected will be provided a copy of the results. Discrepancies will be brought to the attention of the Security Committee. 11.5.10 Inventory temporary badges daily or at changes in shifts by accesscontrol personnel. 11.5.11 Promptly invalidate lost or stolen security badges and passes and maintain a current roster of invalidated badges and passes at access-control points. 11.5.12 Recover permanent and temporary badges at the exit point of restricted areas where the badge(s) were issued. 11.5.13 Maintain records at access-control points that enable access-control personnel to determine promptly and accurately the number and identity of persons in the area at any time. 11.6 Permanent Badges. Permanent badges may be issued to a person requiring continual access to restricted areas. The permanent badge will have a clip-on attachment allowing it to be worn at all times on an outer garment while the bearer is in the restricted area. 11.7 Temporary Badge. Temporary badges may be issued to visitors who require infrequent entry to a restrictive area or may also be used by personnel requiring continual access while a permanent badge is being prepared. Custodians may require visitors to release personal identification documents in exchange for a temporary badge or pass. When temporary badges are used, they will: (1) Be laminated and have a clip allowing them to be worn on outer garment while in the restricted area. (2) Be easily distinguishable from permanent security badges and passes. Visitors will be escorted at all times while in a restricted area. Entry and exit of visitors will be recorded. 12. Confiscating Passes and Badges. 12.1 Access-control personnel will avoid embarrassing situations and disturbances, but will deny access to persons with expired, severely damaged, or altered ID or access documents. If access is denied, access-control personnel will confiscate access passes and badges if that document is expired, severely damaged, or altered. Accesscontrol personnel will inform the individual’s supervisor when a passbearer refuses to surrender an expired, altered, or severely damaged access document. 13. Access by Local Law Enforcement Agencies. 13.1 The Security Officer will: 13.1.1 Establish and conduct liaison with local law enforcement agencies. 13.1.2 Establish procedures for access by local law enforcement agencies. 13.1.3 Entry to Restricted Areas. Access to restricted areas will be provided for local law enforcement to enter only if they are in a “hot-pursuit situation”. 14. Keys and Lock Controls (K&LC). 14.1 Keys providing access to restricted areas that are not in use or are not attended will be stored in approved security containers or equivalent. 14.2 Spare keys will not be kept with operational keys. 14.3 Maintenance keys for high-security padlocks will not be used as primary access keys. Maintenance keys will be secured and will be kept separate from spare keys. Placing maintenance keys in a separate, sealed envelope in a container with the spare keys usually constitutes acceptable separation. 15. Personnel Monitoring. 15.1 Security wands. Security wands that detect metal objects may be used for entry or egress from high security areas. Guards will use wands in accordance with established procedures for the specific area. Procedures will not be deviated from without prior approval of the Head Guard or Security Officer. Any deviations will be reported to all affected personnel accordingly. 15.2 Personnel searches. (detail local policy) 15.3 Other types of personnel monitoring. (detail local policy) 16. Company Guard Program. Guards are a valuable resource. They may be employed either in an active capacity (access control) or in a passive role (surveillance and detection). Guards are, however, a costly asset and, as such, should be employed only where alternative solutions are not practical or allowable and when the risk to the protected asset warrants such protection. Because of manpower and funding constraints, guards will be provided only to the level essential to meet minimum security standards. The Security Officer will seek reasonable alternatives, such as technology (for example, ESS), to the long-term employment of guards whenever possible. 16.1 Guards will be used at critical and sensitive locations to protect company assets. 16.2 Contract Guards. Security services may be contracted through competitive bids. Contracted security services must comply with a performance work statement developed in advance by this company. 16.3 Guard Force Standards. 16.3.1 Medical Reexamination. Guard personnel will take a medical reexamination each ___ (frequency), the Security Officer will recommend a medical reexamination at any time there is reason to believe a medical condition exists that could adversely affect job performance or jeopardize the employee's health while performing assigned duties. 16.3.2 Language Proficiency (further detail policy). Security guards must be able to converse in English to a degree that enables them to understand oral and written communications and express themselves in work-related matters. 16.3.3 Appearance. Security guards will maintain an acceptable standard of individual and duty-area appearance. Security personnel are particularly conspicuous in the performance of their duties and must present a high standard of appearance at all times. Formal inspections may be conducted before security personnel go on duty to ensure the highest standards of appearance are maintained. Informal inspections will be part of daily supervision. The following standards of appearance apply: (1) The prescribed uniform will be worn while on duty as directed by the supervisor. (2) Uniforms will be clean and well-pressed. Footwear will be polished. Required insignia will be worn. Unauthorized insignia or accouterments will not be worn with or on uniform work clothing. (3) Shirts, jackets, and coats will be buttoned. Shirts will be tucked into trousers, unless specifically designed to be worn outside the trousers. (4) Equipment (for example, pistolbelts, holsters, arm-band) will be clean. Leather, silver, and brass parts of the uniform will be polished. (5) Personal hygiene will be maintained. (6) Hair (including facial hair) will be well groomed. Hair length or fullness must not interfere with wearing required headgear. Mustaches and beards will be neatly trimmed and must not interfere with the performance of duty. Hair, mustaches, and beards will not be a length that causes a safety hazard. Where respirators are required beards will not be allowed. (7) Hands will not be kept in pockets while performing guard duty. Gloves will be issued and worn during bad weather, as appropriate. 17. Individual Reliability Program for Guards. 17.1 Drug Screening. (detail local policy) 17-2 Training. All guards, regardless of the source, will be formally trained in their duties before performing security functions. Guards must successfully complete Initial Training, before being assigned a weapon. (local laws apply) 17.3 Contract guards will be trained by the contractor according to the contract and will provide documentation of such training upon request. 17.4 Duress Procedures. Each guard will be trained on duress procedures and situations that might require those procedures. 17.5 First Aid. Security guards will receive a minimum level of instruction in firstaid and basic life-saving techniques. Qualified medical personnel will conduct the training. 17.6 Guardpost Orders. Security guards will be trained in each aspect of their assigned duties. Other aspects of a guard's functions, such as access-control procedures for gate-guards or building-security checks for roving security guards, will be included in the guard-training program. 17.7 Physical Training. Security guards should maintain an acceptable level of physical fitness so they can perform their assigned duties and will meet job description performance standards. 17.8 Weapons Qualification (determine local requirements). Security guards will qualify with their assigned weapons before they are assigned to security duty and at least ___ (frequency). 17.9 Use of Force. The decision to arm guards will be governed by the applicable physical-security standards established for the asset being guarded. Use of force will be in strict compliance with Federal, State and Local Regulations. The policy on use of force will be coordinated with the local law enforcement agency before being implemented. Security guards will use force only when they cannot conduct their duties without it. When use of force is necessary, only the minimum amount needed to resolve the situation is justified. Guards should attempt, through verbal persuasion, to resolve conflicts. If necessary, physical detention using unarmed defense techniques should be used when possible. Guards should request assistance from supervisory personnel when a situation appears to be escalating toward use of force, if time allows. Deadly force is seldom warranted and will be used only under conditions of extreme necessity (that is, when all lesser means of action have failed or cannot reasonably be used). 18. Guardpost Orders. 18.1 Guardpost directives. Each guardpost will have clear instructions in English that describes the scope of the post, functions to be performed, and parameters within which each guard will operate. Guardpost orders will address each aspect of the guard's duties. Orders will include at least the following information: 18.1.1 Area of Responsibility. The specific area for which the guard is responsible. Use of a detailed sketch will help clarify the limits of the post. 18.1.2 Use of Force. The Security Officer will oversee the preparation of instructions on the use of force (including deadly force). To include as a minimum: (a) The conditions justifying use of force and the appropriate level of force warranted for those conditions. (b) The specific conditions warranting use of deadly force. Conditions should include the protection of specific items (weapons and ammunition) that, if taken, could cause deadly harm to others in the hands of unauthorized individuals. (c) The legal protection provided to a guard who, in the most prudent application of assigned duties, uses deadly force to comply with guard orders. 18.2 Supervisory control. The supervisory chain will be defined. Conditions when a guard may be required to comply with instructions from personnel outside of their supervisory chain also will be clearly explained. 18.3 Reports and Forms. Clear instructions for using reports and forms, when such are required, will be provided; samples will be provided to each post. 18.4 Special Instructions. Unique situations and requirements of a specific post will be clearly detailed in the guard-post orders. 19. Guardpost Evaluations: Regular and routine evaluations of security-guard operations are essential to ensuring compliance with this plan, local policy, and guardpost orders. Regular and routine evaluations of security-guard operations are essential to ensuring compliance with this plan. The Security Officer will develop a policy to ensure Guard Supervisors will evaluate security guards before posting them to determine if they are fit and prepared for duty. Supervisors will also evaluate each guard-post at least once during the scheduled shift to ensure security guards know guard policies and guardpost orders.