Displaying results 1 - 10 of 105

… Our own security, and the safety of those close to us, is of great … precautions, albeit not exhaustive, and will depend on personal circumstances. In an emergency, the advice is … a police non-emergency response is required, dial 101. … Personal Security
… is to provide a suite of advice options when implementing a personal security plan. … Introduction This booklet may form part of a wider personal security package delivered by an accredited Counter …
… 1. What is personnel security? Personnel security is a system of policies and procedures which aim to … Regulation (GDPR) (2018) applies to the processing of personal information about individuals. Personnel security
… to do aspects of the event (e.g. to provide door security or ticketing).   For more detailed information on …
… you can undertake to help improve your site’s safety and security. It contains an introduction to See, Check and … from being groomed and exploited by extremists. … Security Culture …
… and professionalise the Counter Terrorism Protective Security and Preparedness sphere. … It’s development is … also be a register of verified counter terrorism protective security specialists, with the working title of the Counter Terrorism Security Specialists Register (CTSSR). This will provide …
… The Home Office, Security Industry Authority, National Counter Terrorism Security Office and National Protective Security Authority are the four key partners working …
… looking for NaCTSO-endorsed, CT-specific protective security and preparedness training will be able to enrol … design and develop suitable counter terrorism protective security and preparedness plans and mitigations. The …
… The Department for Transport has launched the Road Transport Security Standards. … The road network is used by hostile … threat to the transport sector.  The Road Transport Security Standards (RTSS) is designed to support the … to support transport operators, logistics providers and security managers to better protect their vehicles.  The …
… Implementing the SCA should lead to fewer security-related changes being required at a later stage. It … the chance of repeating mistakes that may have compromised security in the past. … The SCA process should be used by … or protect their commercial information, personal data and intellectual property.   For more …