Traveler Safety & Security in the Modern World Bruce McIndoe February 2012 You will learn… How Global Threats and Business Disruptions Impact Business About Organizational Liability and Duty of Care Travel Risk Management as a discipline About the Traveler Safety Continuum How to benchmark your TRM program and where to focus Precautions around social media, smartphones, and laptops The Top 10 Reasons Programs Fail iJET.com 2 Major Incidents Every Year… 3 iJET.com Escalating Global Threats SOURCES: Georgia Institute of Technology. National Center for Atmospheric Research. The Rand Corporation. The World Health Organization. iJET.com 4 Who do Your Employees Turn to? 1. Pre-trip / assignment destination – safety and security? 2. For immunizations and medical advice? 3. Hotel or residence property selection? 4. When they need help? 5. When an incident occurs? iJET.com 5 Who do You Turn to? 1. For country/city safety/security information? 2. Traveler or Expat safety/security training? 3. What to do in higher-risk environments? 4. Threat against an employee? 5. For a medical emergency? 6. Plane or vehicle crash? 7. Kidnapping? iJET.com 6 Management Questions • What’s really happening now? • Who can do it? • Who is impacted? • What is our liability if we • Where and how does this affect don’t? us? • • • What is our competition Are the right people aware? doing? What should we do? When? iJET.com 7 Legal Deposition – How would you answer? Death or serious injury to employee It is well known that this area was risky, why wasn’t the employee notified? What process do you have in place to understand the risks your employees may face? What information is provided to the employee before he or she went there? What did you do to mitigate these hazards? Who was notified and when? What did they do? iJET.com 8 Management Program Motivators Organizational Liability Risk Exposure Previous litigation history Duty of Care What is expected? Anxiety Management Standard of Care What are others doing? iJET.com 9 What is Travel Risk Management? Travel Risk Management … is a well defined process to identify risks, prepare travelers pretrip, monitor threats, and respond to incidents as they arise. Benefits include: • More productive and prepared employees • Reduced number of costly “incidents” • Lower cost of response • Reduced corporate liability iJET.com 11 Optimal Response Time The longer it takes an organization to respond to an incident or opportunity, the greater the risks and costs. Optimal Response iJET.com 12 Preparedness Impacts Response Time Planning Mitigation Communication Exercises/Drills PREPAREDNESS iJET.com 13 Multiple Functional Areas Support the Employee SECURITY TRAVEL Risk assessment Crisis & evacuation plans Emergency contact info Coordinates Response Advisor and knowledge base Books trips and handles travel issues Provides reporting HR/LEGAL Focus on expatriates Responsible for all employees Policy & procedures Corporate insurance / benefit programs iJET.com EMPLOYEE 14 MEDICAL Pre-trip health planning Immunizations Medical assistance & evacuations for international travelers Traveler Safety Continuum Pre-Trip/Assignment • Crisis management plans • Policy/compliance • Enterprise communication Training • All employees • Management team • Personal protection • Country/region specific Access to Intelligence • Travelers/Expatriates • Management (push) • Assess risks/set ratings • Pre-trip (pull) • During travel (Alerts) Track Employees • Employee profiles • Automated and verified • Real-time alerting • Communication options Hotline • 24 x 7 - One Number • Specific protocols • Travel, security, health Security Service • Executive Protection • Ground Transport • Guards • Evacuation iJET.com 15 Key Elements of Execution Feedback Planning Training Proactive iJET.com 24x7 Monitoring Incident Response Reactive How it works – Every Trip! Travel Agency/ Booking Tool Country & City Information Pre-trip/assignment Book Trip or Assignment Preparedness Help Provided Automated Risk Assessment Employee Report Trouble Automated Trip/Assignment Briefs & Alerts Worldcue® Risk System iJET.com Alerts & Notification Report Issue Travel/ Security/ HR Manager 24x7 Global Employee Hotline Implement Protocol Response TRM3 - 10 Key Process Areas Policy/Procedures Overarching KPAs Training Management KPAs Risk Assessment Risk Disclosure Risk Mitigation Risk Monitoring Notification Infrastructure KPAs Data Management Communication iJET.com 18 Response Measuring your Program Maturity Level Optimized (5) Managed (4) Proactive (3) Defined (2) Reactive (1) iJET.com Program integrated throughout organization Metrics collected and reviewed. Cross-organization support. Consistent execution of travel risk management processes. Basic travel risk management policies defined and documented. Primary focus on incident response. Ad hoc. Few policies. Chaotic in the event of an emergency. 19 Social Media Awareness Do not disclose travel plans on Facebook or other social media sites. Do not post while on travel – discloses where you are, and are not! Caution on using Twitter or other IM software in high risk countries Be cautious of who you “friend” – especially on travel Consider having two personalities – “Open You” and “Closed You” iJET.com 20 Be Aware! Your mobile telephone has four major vulnerabilities 1. Vulnerability to monitoring of your conversations while using the phone. 2. Vulnerability of your phone being turned into a microphone to monitor conversations in the vicinity of your phone while your phone is inactive. 3. Vulnerability to tracking your phone based on its emitter or GPS data. 4. Vulnerability to "cloning," or the use of your phone number by others to make calls that are charged to your account. iJET.com 21 Smart Phones - Vulnerabilities Smart phones are powerful computers… Complete with an Operating System and Applications Every PC vulnerability can be translated to the phone… and more! Cross-Service Attacks (LAN, Bluetooth, WiFi, GSM, etc.) Code vulnerabilities and exploits Malware Viruses iJET.com What to do? Backup contacts, email, and calendars Install latest OS and security updates Enable PIN/Password – And remote “Wipe” Record Make/Model/Serial Numbers Maintain continuous control of your devices Lock in safe if you leave in room Do not use unprotected networks Do not allow web browser to save login & password Consider using a travel phone with limited data to higher risk locations iJET.com 23 Guidelines for Laptops – Before Travel Leave all but essential storage devices at home – use encrypted USBs Enable “user authentication” -- requiring a password or PIN on your device to gain access. Use a strong (combination of number, digit, and special character) password Load encryption software and encrypt either the whole device (full-disk encryption) or any sensitive files or folders Ensure operating system, firewall/VPN and Anti-Virus are updated iJET.com Summary – Key Take-Away Thoughts Protection of human assets is a multidisciplinary effort Best approach is a risk management framework Training is critical to overall success Prevention and decision support through real-time intelligence & communication Planning for response minimizes impact iJET.com Top 10 Reasons Things Fail… #10 Company does not know what to do in an emergency Don’t be reactive. Get a basic plan in place and make sure you know where to get help. iJET.com 27 #9 Out of date contact numbers Get contact numbers (cell, home, office, email, IM, etc.) for the people that you need in an emergency. Periodically get them updated and verified. iJET.com 28 #8 Primary AND Backup Person are not available This happens frequently. Try to have multiple backup contacts. Think about people that are normally available. iJET.com 29 #7 Cell phones don’t always work We are becoming totally reliant on cell phones. Try to find a pay phone! Provide travelers with international cell phones or satellite phones. iJET.com 30 #6 No response resource retained Who would you turn to for a kidnapping? What about a threat against an employee? Medical emergency? Car accident? Incident on Vacation? Make a list of incident types and answer who would I turn to? iJET.com 31 #5 3rd Party response resource does not know what is going on Talk to your vendors. Include them in your planning. Run exercises and drills. iJET.com 32 #4 Protocols are not maintained Managers and organizations need to periodically review their plans and protocols. At least annually. Train staff on procedures. Run drills and exercises. iJET.com 33 #3 Protocol or procedure is too complex Many times the plans and procedures are way too complex. Look to streamline the process. In a time of emergency, you will only have time and bandwidth for the basics. iJET.com 34 #2 Inconsistent skill level within the team Crisis and emergency management is not the core competency of most travel managers and staff. Get training for the core team that will be called to deal with an emergency. iJET.com 35 #1 Cost sensitivity delays response Deal with where the funds will come from and who will pay BEFORE the event! Delay in response increases cost and can cost lives. iJET.com 36 THANK YOU! Every organization needs to address duty of care for all employees Bruce McIndoe, President, iJET International Bruce@iJET.com Resources www.ijet.com/GBTA iJET.com 37