Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

PROGRAM SECURITY

Table of Contents
1. Introduction .......................................................................................................................................................................................................................... 2
1.1. Rationale ........................................................................................................................................................................................................................ 2
1.2. Applicability of Plan ....................................................................................................................................................................................................... 2
1.3. Project Background ........................................................................................................................................................................................................ 2
2. Project Component ............................................................................................................................................................................................................... 2
3. Security Management ........................................................................................................................................................................................................... 3
3.1 General Provisions........................................................................................................................................................................................................... 3
3.2 Training ........................................................................................................................................................................................................................... 4
3.3 Means of Security and Equipment ................................................................................................................................................................................... 4
3.4 Use of Force and Weapons .............................................................................................................................................................................................. 5
3.5 Treatment of Intruders / Trespassers ................................................................................................................................................................................ 6
3.6 Access Log ...................................................................................................................................................................................................................... 6
3.7 Incident Log .................................................................................................................................................................................................................... 6
3.8 Grievance Mechanism ..................................................................................................................................................................................................... 6
3.9 Monitoring ...................................................................................................................................................................................................................... 7
4. Construction Phase Impacts & Management ......................................................................................................................................................................... 7
4.1 Recommended Mitigation Activities ................................................................................................................................................................................ 7

TABLE OF FIGURES

Table 1.1 Construction Impacts and Management Activities ...................................................................................................................................................... 8


PROGRAM SECURITY

1. Introduction

1.1. Rationale
This Plan is one of a number of plans which comprise PT. Tri Brata Abadi (TBA)’s
HSE Management Plan (HMP). The HMP is a compendium of documents that
have been compiled with the express purpose of demonstrating TBA’s application of (and

conformance with) the provisions of international lenders’ standards as listed in Section 1.5 below.
Each plan presents a comprehensive assessment of the management, mitigation and monitoring
requirements necessary to manage the relevant environmental and socioeconomic impacts as
identified in the Environmental and Social Impact Assessment (ESIA) documents.

1.2. Applicability of Plan


The management measures and actions as documented in this Plan are applicable for the construction phase only.

1.3. Project Background


PT. Tri Brata Abadi (TBA) is a company provision in Engineering, Procurement, Civil Construction, Mechanical & Electrical Installation
Services. TBA’s plan to participate in a construction of mine facility belong to PT. MIFA

The Project comprises of:


Preparation and Engineering Work according to MIFA’s Terms of Reference (TOR).
Construction Works according to MIFA’s Terms of Reference (TOR).

2. Project Component
The Project will have the following major facilities that will require security from intruders, both human and animals:
PROGRAM SECURITY

Construction Site
Work Shop
Pipelines
Transmission line
Site office
Contractor’s offices and campsites, including lay down areas during construction phase and
Site security post.

While the above project facilities are needed to be secured, the security of the workers and the affected community are also paramount.
TBA will ensure that the accommodation camp has adequate fencing and 24 hour security to comply with ADB requirements.

3. Security Management

3.1 General Provisions


Security for TBA’s projects will be provided in accordance with the laws of Indonesia.
Security for TBA’s staff, project sites and assets will be provided in accordance with the principles of international good practice, respect for
human rights and proportionality.
TBA will carry out a detailed assessment of risks to those within and outside its project sites posed by its security arrangements and review the
risk assessment on an annual basis or following security incidents.
All contractors providing security at any facility related to the Project will wear a uniform and an identification card so that they may
easily be identified.
TBA does not sanction any use of force except when used as a last resort for preventive and defensive purposes in proportion to the
nature and extent of the threat.
TBA will provide a grievance mechanism by which complaints against their security providers can be received and responded to as
appropriate.
PROGRAM SECURITY

TBA will consider and, where appropriate, investigate all allegations of unlawful or abusive acts of security personnel, take action (or urge
appropriate parties to take action) to prevent recurrence, and report unlawful and abusive acts to public authorities.

3.2 Training
Training for security personnel will be provided by the security contractor including for the control of access and egress to sites, health, safety
and first aid.
Security personnel will also receive training from the security contractor in dealing with workers and communities, including conducting
respectful dialogue and acting with respect for human rights and dignity.
Training will be given on methods of persuasion, negotiation and mediation, peaceful settlement of conflicts, limiting use of force and fire-
arms so that they are a last resort, ethics and corruption. Training will also be given on the site specific emergency preparedness and response
plan and the security personnel’s role in an emergency. TBA will review the training given by the security contractor and require them to
provide additional training where needs are identified.
Refresher training will be given not less than once every six months. Records of all training will be kept in individual personnel files.

3.3 Means of Security and Equipment


Access to projects will be restricted, depending on site-specific situations, security measures will include fencing/security barriers, signage,
adequate lighting, manning of security personnel.

3.3.1 At worker’s accommodations


As described in Section 1, TBA will ensure that the accommodation camp has adequate fencing and 24 hour security to comply with ADB
requirements.

3.3.2 At Vehicle entry/exit points


A drop bar will be installed at the vehicle entry / exit points to control the vehicles from entry / exit from site.
Manning vehicle gates to screen all incoming/outgoing vehicles and to prevent unauthorized entry or parking.
Direct traffic and parking of vehicles for loading/unloading at the gate area.
Ensure no obstruction along all vehicular access to the site.
PROGRAM SECURITY

Prevent personnel or visitors from using the vehicular access for entry into the site and re-direct them to designated personnel entry
points.
Check all outgoing vehicles to ensure that no property is removed without endorsement of authorized person.
To maintain proper records of movement of vehicles e.g. Vehicle No, Number of passengers, Time In/Out, Purpose of entry etc.

3.3.3 At entry/egress points


For safety reasons, the personnel entry/egress points will be separated from vehicular entry/exit points.
Prevent unauthorized entry of personnel. Unauthorized worker will be recognized and screened by his Security Pass. No person is
allowed enter to site without Security Pass
Ensure all personnel entering the premises have the necessary security passes issued by Security personnel – on duty.
Screen and issue security passes to visitors and maintain proper records of such entries. Maintain an up to date register of worker and
visitors working on worksite.
To check out visitors’ belonging and vehicle when they leave the site.
Check and screen all personnel leaving the site and conduct random checks for stolen property.
To carry out any other instruction issued by management.

3.3.4 Equipment
Security personnel might be provided with weapons such as batons (but no firearms) which are only to be used a last resort (as discussed further
below). Security personnel will be provided with personal protective equipment (PPE’s) such as protective vests and helmets as appropriate to
avoid the need for use of weapons.

3.4 Use of Force and Weapons


Force, including the use of batons, will only be used as a last resort.
Proportionate force may need to be used to remove trespassers from a site or to safeguard health, safety and security of workers, and assets.
All weapons will be logged and security personnel will not be allowed to take these items off site when not on duty.
PROGRAM SECURITY

3.5 Treatment of Intruders / Trespassers


TBA's security personnel will treat any detainees humanely and call for police help should any trespasser need to be detained. All security
personnel to be vetted and trained in the use of force, emergency procedures and relevant equipment, as discussed above. Any reports of
unlawful behaviour by security personnel will be investigated

3.6 Access Log


A log will be maintained at all access gates to Project sites to record access and egress of persons and vehicles. This will help to prevent
unauthorised access to site and to protect TBA’s staff and assets. The access log will also be used in emergency situations to account for the
number of people on site so that they can be located or evacuated as necessary.

3.7 Incident Log


A daily incident log will be maintained for each site to record any incidents of note at the site.

Incidents of note may include:


Altercations with a worker or community member
Attempted uninvited access to site
Trespassing
Theft
Breach of or damage to fencing

If a weapon is used, the security guard will be responsible for reporting the incident to their superior whereupon an investigation will be carried
out. The incident log will be reviewed weekly and incidents will be followed up accordingly.

3.8 Grievance Mechanism


TBA’s External Grievance Mechanism is designed to allow the affected community to express concerns about security arrangements and acts or
conduct of security personnel. TBA will inform communities of the availability of the grievance mechanism through TBA’s Community Liaison
Officer’s communication with the village representatives. In general, grievances are communicated by the community to TBA through two
primary channels:
PROGRAM SECURITY

Oral communications such as to community representatives in each sub-district. These representatives appointed by TBA.
Written communications to TBA’s External Relations Department; this includes grievances registered with the village head (Kepala
Desa) and/or at village community centres.

Please refer to TBA’s External Grievance Mechanisms for more details. Possible incidents (relating to security) to be reported by the community
as a grievance may include:
Abusive and/or unlawful acts by the security personnel;
Excessive or inappropriate use of force;
Unprofessional conduct;
Undue or unreasonable harassment; and
Obstruction / restriction of access to common public areas.

3.9 Monitoring
The security contractor will be required to provide internal auditing reports semi-annually and will be subject to annual external monitoring
arranged by TBA. All monitoring reports will be provided to site project managers and TBA’s headquarters for review and action.

4. Construction Phase Impacts & Management

4.1 Recommended Mitigation Activities


Mitigation measures identified in Table 4.1 will be implemented by TBA throughout the construction phase to manage the appointed security
contractor.
It should be noted that whilst the below table indicates the implementing responsibilities for each action/mitigation by the respective parties,
TBA recognises that the ultimate environmental/social responsibility of the Project still lies with TBA.
PROGRAM SECURITY

Table 1.1 Construction Impacts and Management Activities

Monitoring Responsibility
Activity Action / management Time frame
requirements MIFA TBA SUB Comment

TBA and SUB


Ensure that the
will be
accommodation camp has
Throughout the responsible
adequate fencing and 24 - X X
construction for their
hour security to comply
respective
with ADB requirements.
sites/activities.

Carry out a detailed


assessment of risks to
MIFA will
those within and outside its
comply with
project sites posed by its
this measure.
General Provisions security arrangements and Risk Assessment Annual X
TBA and SUB
review the risk assessment
to support as
on an annual basis or required.
following security
incidents.
- Security for MIFA’s MIFA, TBA
Project will be provided in and SUB will
accordance with the laws During be responsible
of Indonesia. Audit X X X
Construction for their
respective
- Security for staff, project sites/activities.
sites and assets will be
PROGRAM SECURITY

provided in accordance
with the principles of
international good practice,
respect for huan rights and
proportionality.

- All contractors providing


security at any facility
related to the Project will
wear a uniform and an
identification card so that
they may easily be
identified.

- Do not sanction any use


of force except when used MIFA, TBA
as a last resort for and SUB will
preventive and defensive Throughout the be responsible
purposes in proportion to - construction
X X X
for their
the nature and extent of the respective
threat. sites/activities.
- Consider and, where
appropriate, investigate all
allegations of unlawful or
abusive acts of security
personnel, take action (or
urge appropriate parties to
take action) to event
recurrence, and report
unlawful and abusive acts
PROGRAM SECURITY

to public authorities.

Provide and implement the MIFA will


External Grievance comply with
Mechanism for the this measure.
community, on possible TBA and SUB
X X X
grievances relating to the to support as
security personnel. Refer required.
to MIFA’s External
Grievance Mechanism.
The certificates for each MIFA, TBA
security guard working on and SUB will
will be checked and kept in be responsible
individual personnel files
X X X
for their
at MIFA’s headquarters respective
and on the Project site sites/activities.
office.
Training - Training for security Training Records Semi-annual MIFA, TBA
personnel will be provided and SUB will
by the security contractor be responsible
X X X
including for the control of for their
access and egress to sites, respective
health, safety and first aid. sites/activities.
PROGRAM SECURITY

- Security personnel will


also receive training from
the security contractor in
dealing with workers and
communities, including
conducting respectful
dialogue and acting with
respect for human rights
and dignity.

- Refresher training will be


given not less than once
every six months. Records
of all training will be kept
in individual personnel
files.

Means of Security and Acess to projects will be - Throughout the MIFA, TBA
Equipment restricted, depending on construction and SUB will
site-specific situations be responsible
(including H2S areas), for their
security measures will X X X respective
include fencing/security sites/activities.
barriers, signage, adequate
lighting, manning of
security personnel.
PROGRAM SECURITY

Security personnel will be - Prior to MIFA, TBA


provided with: commencement and SUB will
'- Batons which are only to be responsible
be used a last resort; and for their
'- Personal protective X X X respective
equipment (PPE's) such as sites/activities.
protective vests and
helmets to avoid need for
use weapons.

Treatment of Treat any detainees - Throughout the MIFA, TBA


intruders/trespassers humanely anc call for construction and SUB will
police for help should any be responsible
trespasser need to be for their
detained All security respective
X X X
personnel to be sites/activities.
vetted and trained in the
use of force, emergency
procedures and relevant
equipment.

Access Log A log will be maintained at Visitor Log Book Throughout the MIFA, TBA
all access gates to Project construction and SUB will
sites to record access and be responsible
egress of persons and for their
vehicles. respective
X X X sites/activities.
The access log will also be
used in emergency
situations to account for
the number of people on
site so that they can be
PROGRAM SECURITY

located or evacuated as
necessary.

Incident Log - A daily incident log will Incident Log Throughout the MIFA, TBA
be maintained for each site construction and SUB will
to record any incidents of be responsible
note at the site. for their
'- If a weapon (or escalated respective
use of force incidents) is sites/activities.
used, the security guard
will be responsible for
reporting the incident to X X X
their superior whereupon
an investigation will be
carried out.
'- The incident log (for use
of weapon) will be
reviewed weekly and
incidents will be followed
up accordingly.

Monitoring The security contractor - Audit Report Semi-annually BEL, TBA


will be required to provide '- Grievance and SUB will
X X X
internal auditing reports Record Log be responsible
semi-annually. for their
PROGRAM SECURITY

The security contractor Annually respective


will be subject to annual sites/activities.
external monitoring.

The External Grievance Throughout the


Mechanism are designed to construction
allow the affected
community and workers to
express concerns about
security arrangements and
acts or conduct of security
personnel.

You might also like