28/09/2016

Safety and Security For Travel and Tourism.


Safety and security have always been indispensable condition for travel and tourism. But it is an incontestable fact that safety and security issues gained a much bigger importance in the last two decades in tourism. Changes in the World during the last two decades were enormous. Due terrorist acts, local wars, natural disasters, epidemics and pandemics, that we were witnesses to, security has significantly decreased. Safety and security issues have been treated as important condition of tourism.
Safety and security issues in travel and tourism came to the front by the evolution of the mass tourism from the beginning of the 1950s. The main reasons determining this evolution process are enumerated hereinafter:
1. Travel and tourism is not any more an activity of a narrow social stratum or class but the whole widening middle class is getting progressively involved into it. This is direct result of the growth of personal incomes and free time in the developed countries.
2. Tourism scope covers more and more countries and regions in the world and not only highly developed countries enabled to generate out-going tourism flows are getting involved in tourism but also countries of the so called third world. For them tourism is part of their economic development strategy.

3. The rapid and scenic development of transport (aviation, automotive industry) contributed to the rise of (geographical) mobility. Due to these reasons the safety and security issues gained a bigger and bigger importance as the tourism itself became one of the largest industries in the world economy.

27/09/2016

Crowd physical security Services



Crowd physical security Services identifies common safety problems and suggests solutions to ensure
crowd control work is conducted as safely as it reasonably can be. It also provides numerous recommendations and tools to effectively secure the health, safety and welfare of crowd control staff, as well as other staff and patrons, when:
• controlling entry into venues or events;
• monitoring and communicating on crowd and individual behaviour;
• dealing with potentially aggressive, abusive or violent behaviour;
• physically managing aggressive, abusive or violent behaviour;
• administering and coordinating ‘first response’ first aid or critical care; or
• coordinating emergency evacuation of a venue or event.
In preparing this publication, Work Safe sought the input of representatives

26/09/2016

Personnel security



Personnel Security is a system of policies and procedures which seek to manage the risk of staff (permanent, temporary or contract staff) exploiting, or intending to exploit, their legitimate access to an organisation's assets or premises for unauthorized purposes.
Although many organisations regard personnel security as an issue resolved during the recruitment process, it is a discipline that needs to be maintained throughout a member of staff’s time in employment. This includes robust pre-employment screening, effective line management, employee welfare, clear lines of communication, and a strong security culture. It should also include a formal process for managing staff leaving the business.
When applied consistently, personnel security measures not only reduce operational vulnerabilities, they can also help build a hugely beneficial security culture at every level of an organisation. Robust personnel security helps organisations to
• Employ reliable people;
• Minimize the chances of staff becoming unreliable once they have been employed;
• Detect suspicious behaviour and resolve security concerns once they emerge.

22/09/2016

The Firefighter’s Uniform:



Firefighters risk their lives daily to save our lives and properties. They face many hazards including the exposure to fire and therefore they need a protective uniform to help them perform their job. The uniform is composed of:
Helmet:
Firefighters wear a helmet to protect their heads from fire and from any falling things like debris. The helmet is made of Kevlar which is a very hard plastic. Helmets are equipped with a face shield. The color, number and wording on the helmet identify the rank, department and the fire company. A torch or a helmet light may be used by the firefighters in dark places, at night or to help them keep in contact with each others.
Jacket and trousers:
They are made up of NOMEX which is strong, light and easy to wear. The clothes are fire proof. They are called turnouts. The trousers are turned inside out and the boots are attached to it, in case of an emergency, the firefighter quickly jumps into the boots and pull the trousers up, these trousers have snaps and Velcro, they also have side pockets to put equipment, gloves and other things that the firefighter needs. These trousers have reflective stripes so that firefighters can be seen at night.
Gloves:
They are thick gloves made of fire resistant material that protect the hands of the firefighters from heat and from sharp objects like broken glass.
Boots:
Firefighter’s boots are made of rubber material. These boots have a steal toe covering to protect the toes of the firefighters; the shank in the sole is very thick and made of steel to protect the firefighters if they step on sharp objects such as nails. The boots have rubber handles at the top in order to help the firefighter pull the boots on very quickly.
Self contained breathing apparatus:
It is a cylinder filled with air carried on the back of the firefighter and made of fire resistant material. This cylinder is attached to a tube that runs to a rubber face mask twitch allows the firefighter to breath fresh air in cases where there is hazardous materials in the environment such as toxic gases and smoke.

16/09/2016

Crowd Security




Controlling a crowd is one thing. Managing a crowd something entirely different.
We at PLN9 Security do not want to make a standardized product out of our activities. One size fits all does not work in our industry. Profiling the event, the audience and the venue itself always leads to a Security Management plan fit for the task. Our management plan will go far beyond the numbers of staff, but will lead to a dedicated structure, solid channels of communications, expert briefings as to security-visitor relationships and most important of all, always remembering we are there as hosts on behalf of the organizer, making people feel welcome and safe at your event on your behalf.



Having looked at the risk of the event, we will then look at establishing our managerial needs towards representing you as hosts and how crowd control can become integrated as the crucial spear-point of our activities, from the permanent vigilance throughout the event to decisive calm action when the crowd or individuals are at risk.



PLN9  Security staff are committed to the Safety and Security of the Event itself and of your guests, with a smile and comfort inspiring confidence.

13/09/2016

Security at Monuments:



Security of a site or a monument is integral to its protection. The Security Agency is also assigned the responsibility of security of the centrally protected monuments from the risk of encroachments, unauthorized access, damage of the site and theft of parts. Many of these protected sites are symbols of our nation and are therefore vulnerable to attacks and damage by miscreants. These monuments have varying security needs. The ASI (Archaeological Survey of India) should make rules and issued several notifications to avoid any unauthorized construction in and around the monuments.


Besides threats from persons who had carried out the unauthorized construction, the ASI was also required to safeguard from risks arising from visitors to the monuments. These sites were also vulnerable to terrorist attacks and such other destructive activities. To fulfill this objective, the ASI (Archaeological Survey of India) provided security to the monuments through 

(i) The monument attendants, watch and ward staff; 
(ii) Government security agencies e.g.CISF; 
(iii) State police forces; and 
(iv) Private security guards appointed.



There should be regular monitoring of existing encroachment cases by the Ministry at the highest level. Encroachment by State Government agencies or other Government of India agencies should be sorted out in a time bound manner by raising the matter at higher levels.

12/09/2016

Airport Security


Airport Security is a necessary nuisance travelers must accept if they wish to be able to fly around the world safely. The best any flier can hope for is to get through security as quickly and painlessly as possible. That means being prepared and avoiding mistakes that will slow you and everyone else down, and maybe even get you into trouble with the Transportation Security Administration.

Our 10 suggestions of what not to do at the security checkpoint will make a savvier flier, capable of breezing through airport security like a pro.


1. Don't bring more than 3.4 ounces of any liquid.
2. Don't leave liquids and gels deep in your carry-on.
3. Don't forget to have your boarding pass and ID in hand.
4. Don't wait to take off your belt, watch, jacket and shoes.
5. Don't remove items you don't need.
6. Don't choose the wrong security lane.
7. Don't overlook less busy checkpoints.
8. Don't give the security folks a hard time.
9. Don't joke about national security or bombs.
10. Don't forget about the Pre-Check program.

10/09/2016

Tie up Strategy of Physical Security Solutions:



PLN9 Security Services provide a distinct edge above the rest due to its Strategic Tie ups:
  • Converged Access Services: This framework allows client to access all services from a single smart card. Services like physical access, domain access, web application access, HRIS access, VPN access etc. All PKIs, Digital Certification gets stored on the card level. This framework increases efficiency in an organization from user enrollment to application access to log assessment to user de-provisioning. 
  • Command & Control Services: This framework allows customers to control all their existing or future planned physical security controls from various vendors into a single application. This system supports customer's ground staff by enforcing automated rules from various systems to fight terrorism, incidents by enforcing automated pre-defined workflows based on threat perception, regulatory requirements or business requirements. 
  • Video Analytics Services: This framework helps customize to optimize their current or planned IP-CCTV investments by building an intelligent video management system. This system helps customers to focus on incident in a real-time using artificial intelligence as enforced by video analytical engine.

09/09/2016

Physical Security Measures




Physical security measures aim to either prevent a direct assault on premises or reduce the potential damage and injuries that can be inflicted should an incident occur.

For most organisations the recommended response will involve a sensible mix of general good housekeeping alongside appropriate investments in CCTV, intruder alarms and lighting that deter as well as detect – measures that will also protect against other criminal acts such as theft and vandalism and address general health and safety concerns.


In some locations these measures may already be in place to some degree. However, external and internal threats to organisations (and their staff) will constantly evolve and so all procedures and technology should be kept under constant review.


Before designing a physical security scheme, it is recommended that security practitioners read the "Guide to producing operational requirements" . An Operational Requirement (OR) is a statement of need based upon a thorough and systematic assessment of the problem to be solved and the hoped for solutions

08/09/2016

Guidelines on Security zones and risk mitigation control



The Government physical security management guidelines—Security zones and risk mitigation control measures provide guidance on achieving a consistent approach to determining physical security controls in agency facilities.
These guidelines cover:
  • risk mitigation and assurance measures
  • security zones
  • individual physical security control elements including:
    • building construction
    • security alarm systems
    • access control systems
    • visitor control
    • guards and receptionists
    • locks and door hardware
    • Closed-circuit television (CCTV)
    • perimeter access control
    • security containers and cabinets
    • security rooms, strongrooms and vaults
    • mailrooms
    • technical surveillance countermeasures and audio security
  • physical security elements in administrative security.

07/09/2016

Audit Methodology



The audit was carried out in accordance with the Institute of Internal Auditors , International Standards for the Professional Practice of Internal Auditing, as outlined in the International Professional Practices Framework , and conforms to the Internal Auditing Standards for the Government, as supported by the results of the quality assurance and improvement program. The planning phase of the audit included the conduct of preliminary interviews and the collection and review of documentation in order to understand the current state of security management within the Agencies.

The audit program, including detailed audit criteria and procedures, was then designed based on the information gathered during planning, and focused on the objectives and the lines of inquiry defined above. Subsequently, during the conduct phase of the audit, the audit team interviewed security practitioners, program managers and employees; observed the physical safeguards in different areas and locations; and, examined and assessed current security practices against best practices 

05/09/2016

Ways of Employee Satisfaction:



 1. Consistent Values. In some organizations, employees observe that core values appear to be abandoned when the economy is poor. Leadership values seemed to apply in good times, but to dwindle or even disappear during stress. This organization, however, held tightly to its core values as the economy turned. Employees began to more fully appreciate those values as well when they saw what was happening in other companies during difficult times.
2. Long Term Focus. This company clearly saw the recession as a temporary problem, and maintained its focus on the long-term objectives. The recession had a significant impact on the long-term objectives, but it created new opportunities as well. Employees don’t mind going through difficult times when they believe there is a brighter future ahead.
3. Local Leadership. Company recognized that the major source of satisfaction or dissatisfaction came from what happen in each work group. Every manager and supervisor received a clear assessment of the satisfaction of their employees and was challenged to find opportunities to improve.
4. Continuous Communication. People tend to communicate less during bad times, when in actuality, they need to communicate even more. This company increased its efforts to communicate and share important information. If there was no good news to share, they would share the reality of their current situation. 
5. Collaboration. Groups made significant improvements in their ability to share resources and work together. This reduced costs and increased efficiency. 
6. Opportunities for Development. Because the pace of work was slower, people had the opportunity to learn new skills and develop new capabilities. 
7. Speed and Agility. With less budget, everyone saw the need to move quickly and take advantage of opportunities in the marketplace. Speed of decision was emphasized.

03/09/2016

PLN9 Safety & Security:





An organisation uses such security management procedures as information classification, risk assessment, and risk to identify threats, categories assets, and rate system vulnerabilities so that they can implement effective controls.
Management of security risks applies the principles of risk management to the management of security threats. 

It consists of identifying threats (or risk causes), assessing the effectiveness of existing controls to face those threats, determining the risks' consequence(s), prioritizing the risks by rating the likelihood and impact, classifying the type of risk and selecting an appropriate risk option or risk response.