Displaying results 41 - 50 of 52

… in bomb threat handling procedures, or at least have access to instructions, and know where these are kept review … should consider a secondary secure location for use as a control room as part of their contingency planning security … equipment such as fire detection equipment and alarms, control rooms, and operational equipment) create (both …
… a range of procedures and measures, for example regarding access control measures and evacuation procedures. However, these … to higher education premises which are usually more openly accessible to members of the public and are more frequently …
… car part. UVIEDs are likely to be placed in reasonably accessible locations, as those placing them will typically … considered. To mitigate these risks, consider limiting and controlling vehicle access to your site as far as possible. For those vehicles …
… that can operate without a pilot being on-board A Ground Control System (GCS) which allows the pilot to remotely … to erect signage prohibiting the use of UAS at points of access to identified likely launch sites and nearby … for example, concealment, disguise, preventing physical access or hardening. The selection of the physical security …
… for any improvements identified and putting any additional control measures in place. This person should have … Dedicated channels should be established, with backups if access to the organisation’s intranet or message channels is …
… to contractors and visitors, especially those with frequent access to your site. Full CBR protection can be extremely … and physical security of air-handling systems, such as access to intakes and outlets, avoiding the use of ground … and immediately inform the security supervisor or security control room. It is true that the exact nature of the …
… The sharing of information and intelligence needs to be controlled and it is necessary to validate any … single point of contact should be identified over who will control and coordinate any information sharing activities. …

Travel

… on a rack between packing your bags and check-in, maintain control of all items, both checked and carry-on luggage …
… if the CCTV system is monitored, or there is remote access to the system, what software or other technology is … surveillance technology has given security professionals access to a much broader functionality such as traffic monitoring, car parking control and enforcement linked to ANPR. Video analytic …
… with security screws to prevent them being removed and access gained this way windows should have key operated … entry ensure tools and ladders, which could be used to access your home, are locked away or securely fixed (i.e. … if you need to identify keys, use a random colour-code keep control of your keys, make sure you know who has copies and …