Professional Documents
Culture Documents
Sample Special Report
Sample Special Report
Prepared for:
Prepared by:
Approved by:
1. INTRODUCTION
1.1 Commitment
1.2 Principles
1.2.1. Goals
1.2.2 Employee Participation
1.2.3 Problem Prevention
3. Management Planning
3.1. On Planning
3.2 On Policy
3.3. On Prevention
3.4. On Records
3.5. On Review
3.6. On Risk Acceptance
3.7. On Risk Analysis
3.8. On Risk Assessment
3.9. On Risk Criteria
3.10. On Risk Evaluation
3.11. On Risk Identification
3.12. On Risk Management
3.13. On Risk Register
3.14. On Risk Tolerance
3.15. On Risk Treatment
4. Management Commitment
5.1. Applications
5.2. Policy Statements
6. Quality Standards
9. Corrective Actions
1.1 Commitment
1. 2. Principles
Encourages Managers and staff to take pride in their work and responsibility for ensuring that the
work is done correctly. The program is designed to reduce the incidence of problems related to
the result in implementation, where necessary, of corrective actions and modification of work
procedures, where necessary, to reduce the incidence of future problems.
1.2.1. The principles here are based upon the following goals:
• Creating a safe and secure working environment for the employees of the institution;
• Creating a safe and secure environment for members of the public visiting the institution;
Managed the utilization of tactics, techniques, procedures, and equipment, including weapons,
in such a way as to achieve both operational and risk management objectives.
Client satisfaction is achieved when SOSA meets or exceeds the expectations of the client
typically established on business practice, regulatory requirements and professional standard of
care. SOSA Managers and Staff concentrate on management efforts on timely and
responsiveness.
SOSA recognizes the value of having its employees at all levels participate in the program.
Opportunities are continuously sought for encouraging employees to improve the quality of their
work. SOSA’s General Manager encourages participative management by soliciting input from
Operations Manager and staff before issuing company policies and procedures.
1.2.4. Problem Prevention
SOSA reduces the potential problems to occur. The procedures based on the principles of
problem prevention, liability reduction, risk management, and loss prevention. The steps
necessary to assure the quality of work products and services are summarized below:
Make sure the work performed will satisfy the client's objectives;
To improve and identifying problems, monitoring corrective action and studying its
effectiveness will be implemented.
To study specific root causes and analyzes objective to identify improvements in
organizational structure and function.
The multidisciplinary approach enhanced staff cooperation and satisfaction, as well as
opportunities to solve problems jointly. Meetings are held as necessary to improve activities.
Establish objective criteria for use in monitoring; develop plans for improvement based on
findings.
Assess the effectiveness of plans after implementation and refine the plans as necessary.
Responsibility and authority to implement the Roles and responsibility of personnel. All staff
levels have responsibilities under the program. Training and Development, awareness seminars
are part of the SOSA
Procedures of client in relation to liability issues and loss prevention. In addition, training on
the fundamentals of project management problem/loss prevention is available.
2.1.2. Written Policies and Guidance - The company maintains written guidance
including procedures for many commonly performed work activities. It serves to assist
Operations manager and staff to provide a quality of service that meets or exceeds the standard
of practice.
Project processes and documents have been properly reviewed by qualified Agency Director.
Problems are communicated to the Operations Manager and corrected.
Work Process where a need for improvement is identified.
Analyze the problem and develop ways to improve SOSA management and operational
systems.
2.2. Objectives
To monitor the effectiveness of SOSA’s data collection on admin and operations; report
preparation designed to correct situations where corrective actions are required.
Formulated that defines conditions that would choose alternative actions. Specifies the
characteristic needs to know about the problem is defined for action.
3. Management System
Established policies and objectives and processes with discipline. Management depends on its
personnel, information and assets to deliver services that ensure safety and security. It managed
resources with due diligence and take appropriate measures to protect the clients.
3.1. On Planning
3.2. On Policy
3.2. On Prevention
3.4. On Records
Activity undertaken to determine the suitability, adequacy and effectiveness of the management
system and its component elements to achieve established objectives.
Informed decision to take a particular acceptance that can occur without risk treatment or during
the process of risk treatment. Accepted risks are subject to monitoring and review.
Comparing the results of risk analysis with risk criteria to determine whether the risk and/or its
magnitude is acceptable or tolerable
Finding, recognizing and describing risks, can involve historical data, theoretical
analysis, informed and expert opinions, and stakeholder's needs.
Record of information about identified risks. Compilation for all risks identified, analyzed and
evaluated in the risk assessment process including likelihood , consequences , treatments and risk
owners.
3.14. Risk tolerance
Organization’s or stakeholder’s readiness to bear the risk after risk treatment in order to achieve
its objectives.
Modify risk, avoiding the risk by deciding not to start or continue with the activity that gives
rise to the risk. In order to pursue an opportunity, remove the risk source; change the likelihood
and consequences. Risk treatments that deal with negative consequences are sometimes referred
to as “risk mitigation”, “risk elimination”, “risk prevention” and “risk reduction”.
4. Management Commitment
SOSA management is committed to the principles and practices at the highest level. It recognizes
and accepts its responsibility to identify the quality requirements that will meet client needs and
expectations and create the business and professional environment where all employees take
responsibility for the quality of their work. SOSA’s Program focuses on preventing quality
problems.
Ultimately responsible for all the conduct of Admin and Operational activities.
Authorize the issuance of thePolicy;
Direct the implementation of objectives, plans, and policies;
Exercise direct supervision over the development, administration and implementation of the
security program, operation, maintenance of security equipment in accordance with the standards
prescribed or envisioned by the Company. Orchestrated the Development and Training of
personnel.
Key Responsibilities
Assist the Security Manager in the formulation and supervision of operational activities.
Received all calls/communications from Security Officers In-charge in the field for immediate
support.
Checking DTR’s/Overtime and authorization of Security personnel
To facilitate newly hired and rehiring of security for orientations and training.
To closely supervise the duty performances, Physical appearances of Security personnel in the
area.
To conduct Information and dissemination to all Security personnel on program/Policies
approved.
Responsible on reporting of Daily Operational Activities in the area.
Responsible for the Agency’s intelligence, surveillance, back ground investigation
and other special project.
To perform other task on orders.
SILENT OPTIONS SECURITY depends on its personnel, information and assets to deliver
services that ensure safety and security of its stakeholders. It must therefore manage these
resources with due diligence and take appropriate measures to protect them.
Threats that can cause harm include acts of terror and sabotage, espionage, unauthorized access
to buildings and premises, theft, armed robbery, fraud and corruption, vandalism, fire, natural
disasters, technical failures and accidental damage. The threat of cyber attack and malicious
activity through the Internet is prevalent and can cause severe harm to electronic services and
critical infrastructure. Threats to the national interest, such as transnational criminal activity,
foreign intelligence activities and terrorism, continue to evolve as the results of changes in the
international environment.
The Security Policy of SILENT OPTION SECURITY prescribes the application of security
measures to reduce the risk of harm that can be caused to the institution if the above threats
should materialize. It has been designed to protect SMI leaders, employees, preserve the
confidentiality, integrity, availability and value of information and assets, and assure the
continued services.
5.1. This policy applies to the following (individuals and entities) resources:
• All contractors, consultants and service providers delivering a service to the Project including
their employees who may interact with this institution.
General
• Protect the Executive officers of SMI, VIP visitors, Consultants and all employees and visitors
to SMI against identified threats according to baseline security requirements and continuous risk
management.
• To secure the information and assets of SMI against identified threats according to baseline
security requirements and continuous risk management.
6. QUALITY STANDARDS
Ensure suitable and sufficient operational controls based on identified risks to enhance the
occupational health and safety and the welfare of persons working on behalf of the organization;
Ensure that the use of force is reasonably necessary, proportional and lawful;
Conduct performance evaluations of services rendered and the achievement of objectives;
Develop and implement systems for reporting and investigating allegations of violations on
local law or human rights, as well as mitigating and remedying the consequences of undesirable
events.
6.2. On Target
Detailed performance requirement applicable that needs to be set and met in order to achieve
those objectives.
Process of identifying, qualifying and quantifying the potential cause of an unwanted event
which may result in harm to individuals, assets , environment, or the community.
Increasing or decreasing the level of force applied as a continuum relative to the response of the
adversary, using the amount of force reasonable and necessary. Force used should be the
minimum reasonable amount needed to eliminate the threat presented, thereby minimizing
the risk and severity of any injury that may occur
6.7. On Integrity
Quantifiable measure that uses to gauge or compare performance in terms of meeting its strategic
and operational objectives.
Administers a health and safety program for its employees in compliance with Occupational
Safety and Health Administration regulations. SOSA provides detailed health and safety
information and guidelines for a project. Detachment Cmdr assigned in the area assist in
implementing the HASP policy, control and prevention maintenance procedures.
The objective is to prevent, reduce losses/damages and misuse assets and leakage of information
of SILENT OPTION SECURITY.
Burglary, theft, damage and misuse of assets in progress must be reported immediately to
the Security Manager.
Any employee who is aware or becomes aware of any deficiencies, losses, damages and
misuse whether caused by his/her improper application of security measures or not must
immediately, in writing inform the Security Manager. The following facts must be included in
the report submitted to the Security Manager; - Serial number and description of assets - Full
details pertaining to the circumstances that led to the loss, damage and misuse of assets - &ame
of eyewitnesses
An employee who is aware or becomes aware of any person who commits security
breach by not adhering to the security measures shall immediately inform the Security Manager.
The Security Manager shall conduct an investigation to determine the circumstances that led to
the security breach and advice the person accordingly. Should that person still not observe the
security measures even after receiving advice, the incident will be reported to the to the
immediate Director to institute corrective measures in terms of Human Resources prescripts.
In cases where a person is aware of the irregularity suspect that his/her identity may become
known, or where the Security Manager is involved, he/she shall report the irregularity to the
Agency Director.
Reporting of loss, damage, stolen and misuse of assets - All incidents of loss, damage, stolen
and misuse of assets of SMI must be reported by the employee concerned to the Security
Manager. - All losses of SMI assets such as safe keys, access tags etc, must be reported to the
immediate the Security Manager and thereafter to the Director. The Security Manager must
ensure lost items mentioned above are reported to the Police Service. Before any claim can be
made, a case number with a police statement on the cause of the loss or damage must be
submitted. - A written statement or where applicable, a reporting form, must be completed as
soon as possible and be handed in to the Security Manager. - The Security Manager shall
conduct an internal investigation and/or simultaneously, or at the later stage refer the matter to
the Police Service.
The Security Manager will develop and implement security breach response mechanisms for
the institution in order to address all security breaches/alleged security breaches which are
reported.
The Security Manager will ensure that the SMI Security Officer is informed and advised as
soon as possible.
It shall be the responsibility of the OIC to conduct an investigation on reported security
breaches and provide feedback with recommendations to SMI.
Access privileges to classified information, assets and/or to premises may be suspended by
the Security Manager until administrative, disciplinary and/or criminal processes have been
concluded.
The end result of these investigations, disciplinary actions or criminal prosecutions may be
taken into consideration by the Security Manager in determining whether to restore or limit the
security access privileges of an individual or whether to revoke or alter the security clearance of
the individual.
7.3. Information Security
The Security Manager will ensure that a comprehensive information classification system is
developed and implemented in the institution. All sensitive information produced or processed in
the institution must be identified, categorized and classified according to the origin of its source
and contents and according to its sensitivity to loss or disclosure.
All sensitive information must be categorized into one of the following categories.
• Company Secret
• Trade Secret: and
• Personal Information
• Shared information and subsequently classified according to its level of sensitivity by using one
of the recognized levels of classification:
• Confidential
• Secret: and
• Top Secret
7.4.1. Specific rules for handling classified information to be implemented that can apply to
everyone.
8. PHYSICAL SECURITY
Access control will be applied in terms of the Control of Access to Public Premises and
Vehicle Act. Vehicles should be safeguarded and also the protection of people therein or
thereon.
Persons without the permission of the Security Officer will not enter any of the buildings
occupied by SMI.
Furnish his/her name, address and any other relevant information required by the
authorized Officer; - Produce his/her identity to the satisfaction of the authorized Officer,
Declare whether he/she has any dangerous object i.e. Firearm in his/her possession or
custody,
Declare the nature of the contents of any suitcase, attaché` case, bag, handbag, folder,
envelope, parcel or container of any nature which is in his/her possession or custody or under
his/her control and show those contents to the Security Officer
Subject him/her and anything that he/she has in possession or custody or under his/her
control for examination by electronic or other apparatus in order to determine the presence of
any dangerous object(s),
Hand to an authorized Officer anything that he/she has in his /her possession or custody
for examination or custody until he/she leaves the premises.
8.3. Exit control and movements of assets
All vehicles (private or SMI owned) may be searched when leaving the PROJECT
occupied by SMI. Equipments, parcels, documents etc shall be taken out of the building with
official removal permit signed by authorized official.
All identified Very Important Persons (VIPs) and their crew/team may be subjected to
access control and exit procedure in exceptional cases.
Apart from the control of employees entering and leaving the premises, visitors will be
subjected to access control,
When a visitor arrives at the security main reception area of the building the normal
access control procedures will be applied. When the visit/appointment is confirmed with the
host, the security officer responsible will open and refer him/her to the floor
secretary/host/receptionist. The security officer will accredit the visitor with the access card that
will be displayed visibly at all the times whilst in building.
Visitors found in the building shall be requested to produce their visitor`s cards, failing
which, they shall be requested to vacate the premises.
All Visitors entering the building of SMI will use the main entrance and pass through the
designated reception for necessary security checks, where the normal access control procedure
will be followed. All visitors shall park at the parking bays which are clearly reserved for
visitors.
The host will collect the visitor from the main reception and escort them back on
departure. The security will escort the visitor to the host. The mentioned visitor will be escorted
when a notice of their visit is registered.
Visitor will be allowed in the work station/ areas after the meeting, the host will take the
visitor back to the security/reception area.
The employee being visited will ensure that his/her visitor does not wonder around the
project. Visitors found loitering in the building will be taken to the Security for questioning.
In the event the visitors are a group of people attending a workshop or meeting, the host
will inform the Security Manager in writing and compile a list of all visitors to attend to that
effect submit it to the Security Manager as soon as possible.
The reason for this practice shall be to ease unnecessary pressure at access point and to
ensure that everybody is properly registered before entry is gained.
No Cameras that are carried by visitors allowed into the project.
9. Corrective Actions
Actions shall be consistent with the Policies and Procedures described. Any issue for corrective
action must be specified and it requires verification to be successfully corrected.
The general approach for defining corrective action requirements should involve:
In the field, corrective action is initiated by the Operations Manager and/or Detachment
Commander. All problems should be identified and reported. All deviations from Policies and
Guidelines should be noted in the field logbooks for justification of changes. Corrective actions
should be always implemented when SOPs are not met, when non-representative conditions are
indicated, and/or when specific tasks have not been performed.
----- END-----
CONFIDENTIAL