Access Control Manual
Access Control Manual
ACCESS CONTROL
General:
In any facility, the personnel in charge of Access Control, form the first circle of security of
the system with the support of physical barriers and electronic elements designed to
prevent, delay or delay the access of hostile elements or unauthorized persons, which
could violate the system, partially or totally altering it with their actions.
From the above, it is clear that the proper functioning of the Access Control scheme
foreseen for a facility will depend on its complete security and the degree of protection
provided to persons, goods or facilities.
For all these reasons, an effective Access Control must be based on a study that clearly
determines the following stages:
a) Identity Verification.
b) Authorization.
c) Confirmation of authorization.
d) Access and registration.
e) Destination verification.
f) Exit
Each stage should be geared toward limiting the possibility of access by unauthorized
persons and channeling visitors through pre-established checkpoints to examine their
need to enter the area they intend to visit.
The personnel in charge of an Access Control must base their actions on the principle of
"never departing from the established procedure". Improvising usually leads to confusing
and potentially dangerous situations.
The general mission of the personnel in an Access Control must be framed in the following
basic purposes:
Identification Systems:
Access Control points must have a way to recognize each person who intends to enter,
has authorization to do so and at the same time must have a means to identify those
people.
Any type of identification card can be subject to counterfeiting, but the use of these cards
is nevertheless very advantageous.
2.- Access authorization system:
After determining their reliability, those persons who perform their duties or who need to
enter certain areas for reasons related to their activities are allowed to pass the
established protection barriers.
The authorization to enter granted to a person must be limited only to those areas in which
his or her attendance is necessary to fulfill his or her functions or meet the specific needs
that justify his or her presence in that place.
a)Identity verification:
As its name indicates, its purpose is to identify the person who wishes to enter the
premises.
Identity verification is carried out by means of physical inspection of the official identity
document or, failing that, of the credential that proves the official capacity of the person,
depending on whether the person is a visitor or an employee of the company, respectively.
This verification is the first line of action in the access control process, therefore reliable
identity instruments will be those that contain at least a photograph of the bearer.
b)Authorization/Confirmation:
Its purpose is to verify internally if the person is authorized to enter the premises. In certain
cases, this is done by means of computer or manual listings, memorandums or other
documents. The alternative of resorting to an executive or person empowered to authorize
or confirm the entry authorization is considered.
This step defines whether or not the income proceeds or not. It is necessary to establish
that if access is denied to a particular person, this does not imply that the applicant will be
detained or that the personal effects, materials or belongings he/she is carrying will be
confiscated.
Each Security Office shall determine the procedure to be followed in the event that a
subject is caught attempting to enter with false identity documentation or authorization
credentials, which shall be in accordance with the legal regulations related to deprivation
of liberty.
c)Access / Registration:
Once the above steps have been carried out as established internally, a badge (credential,
pass or card) will be issued, which must expressly indicate the area to which the visitor
has access (floors, sectors, rooms, etc.).
Subsequently, their personal data must be recorded in the respective Record Book,
including the time of arrival and departure; the name and position of the person who made
the authorization/confirmation, if applicable. In the latter case, it is advisable that the
official sign the register or certify such authorization by means of a document or standard
form intended for this purpose.
d)Destination verification:
Once the visitor has entered the premises, the destination check must be carried out. This
verification can be performed through various procedures, among them:
- Making a call by intercom or intercom from the Access Control to the destination office.
- By means of a standard form on which the contact person at the destination notes the
time at which he/she left his/her office, signing it as a sign of agreement.
e)Exit:
Once the visit is over, the visitor will return the access badge, receiving his or her personal
badge or the corresponding document.
The actual time of departure from the facility shall be recorded in the log book.
- Manual.
- Semiannual.
- Automatic.
a) Manual Controls:
These systems are based on people, whether they are security guards, security guards,
administrative personnel and/or receptionists.
For this system to work efficiently, a high percentage of effort, planning and proper
distribution of restricted areas is required, in addition to full compliance with the criteria
defined by management to allow or deny access to specific areas and zones.
As this system bases its efficiency on visual observation by the participants in the process,
the best method would be for the personnel in charge to know all the persons authorized
to enter, but such a modality would only work adequately when the authorized group is
very small and the control personnel never change.
b) Semi-annual controls:
A semi-manual Access Control uses electromechanical equipment or elements to support
staff in evaluating the access request and making the decision to allow or deny entry.
These equipment or elements are incorporated at any stage of the process. The most
commonly used elements or devices are digital keypads.
However, the role played by the people who carry out this control is relevant, because no
stage can fail, since the failure of one component or stage will affect the others and
ultimately, the total system will fail.
c) Automatic controls:
These are those in which the verification and access stages are carried out entirely by
electronic equipment or systems, which are pre-programmed to make decisions when
someone requires them.
IDENTIFICATION SYSTEMS
- Passes or credentials:
The systems established must ensure that only authorized persons are admitted to an
enclosure, and that unauthorized persons who may eventually evade controls and are
caught wandering in restricted areas or zones are excluded from them as quickly as
possible, or are kept under security control while they are inside the facility or enclosure.
The extent of controls will vary on a case-by-case basis and authorization to access one
location does not necessarily imply that access to others will be permitted. It is also
necessary to clearly state that access or entry to a building does not mean that a person
has unlimited access to the entire interior of the building.
The entry authorization granted to a person must be limited only to those areas and/or
zones in which his/her attendance is necessary to fulfill his/her functions or satisfy his/her
needs that justify his/her presence in that place.
Access authorization systems cannot base their effectiveness solely on electronic means,
no matter how complete and advanced they may be, since the information on which they
base their actions may be modified or adulterated. It is therefore essential that security
personnel be provided with adequate procedures to enable them to satisfactorily complete
the various stages of the electronic system.
CONTROL STATES
Every checkpoint must be equipped with specific instructions and have facsimiles of each
type of approved and valid credential or pass, which must not be visible to the public.
3. When a person is caught inside the facility or in a restricted area or zone, without having
a credential or pass and tries to leave, he/she must be politely prevented from doing so by
requesting the authorization document. If he/she does not present it, he/she should be
asked for his/her official identification document and requested in polite terms to explain
and/or justify his/her presence in that place. If such explanations are not satisfactory, it
may be suggested that you agree to wait for the Carabineros to clarify the situation with
them. Under no pretext may he be forced to remain against his will.
4. At Access Controls, a log shall be kept of all persons leaving or entering a building or
facility. The data to be considered will be different depending on whether they are
employees, customers or visitors, but in all cases the full name, time of arrival and
departure must be recorded.
A facility or enclosure in which there is a technically planned Access Control, must also
have a classification of these based on the importance of the activities carried out there or
the nature of the materials used, which will determine the level of access in terms of
people, both employees and customers, visitors or contractors. For this purpose, the
enclosure is divided into areas.
- Public Areas.
- Employee Areas.
Each area, in turn, must be subdivided into Zones, which according to their operational
and/or strategic importance, are classified as follows:
- General areas.
- Restricted areas.
- Sensitive areas.
Public Areas:
a) General Zones:
General zones are those in which no authorization is required for entry. These are usually
the dependencies of merchandise sales, payment of customer accounts, etc.
b) Restricted Zones:
These are those in which the public may use the facilities, but must first consult an
employee to see if it is possible to use them. Ex. the bathrooms.
c) Sensitive Areas:
These are those premises where only certain members of the public, duly qualified by a
pre-established procedure, may enter, but always in the company of an employee. Access
to this area must be registered both at the entrance and exit. Ex. Managers' offices, vault
areas or safety deposit boxes, etc.
Employee Areas.
a) General Zones:
They are all those in which the employee can enter by the mere fact of being an employee.
Ex. casinos, restrooms, etc.
b) Restricted Zones:
These are those in which the employee requires prior authorization for admission. Ex-
Accounting Offices, Archives, Senior Executives' Offices.
c) Sensitive Areas:
They are those whose stoppage causes interruption of the facility's activities. Ex.
Computer Centers, Electrical Boards, etc.
Access levels are the responsibility of management, which must determine them in
accordance with the general security policies applied by the company.
Its mission consists of directing, coordinating, executing and controlling everything related
to the protection and defense of the company's personnel and assets.
In order to carry out this mission, the Surveillance Department is responsible for preparing
the necessary plans for an effective protection and defense of the company's assets and
personnel; it will be in charge of directing the actions leading to the aforementioned
defense, when appropriate; it will be responsible for the internal and external coordination
of the established plans and procedures; it will be responsible for controlling compliance
with said plans and the rules issued by the company for their effective implementation. It
shall be responsible for the internal and external coordination of the plans and procedures
established; it shall be responsible for controlling the compliance with such plans and the
rules issued by the company for their effective implementation; it shall also be responsible
for the investigation of losses and proceedings aimed at recovering them.
General Standards:
a) It is the obligation of all members, without distinction of position, to ensure that their
actions are surrounded by the greatest guarantee of equity, justice and correctness.
Therefore, all remarks should be made in correct and clear language and in accordance
with the strictest standards imposed by education, without phrases that undermine the
personality of the person receiving them.
b) Consequently, under no circumstances should language that may irritate or humiliate be
used, since such conduct only provokes resistance, arouses antipathy and hostile feelings,
not only in the person concerned but also in all those who witnessed it.
c) The management will be much more meritorious when the consummation of a crime or
infraction is prevented than when the offender is caught, since the main function is to
prevent rather than repress. It is an inherent right of the position, to demand respect and
consideration, but all within the correctness, avoiding falling into extemporaneous
attitudes.
d) In his relations both in his private life and in the sphere of his work, he shall conform to
ethical standards, in accordance with the functions he performs; in sequence, he shall
maintain in all his acts an invariable rule of conduct that makes him invulnerable to
criticism.
Punctuality
He/she shall be punctually on duty, shall not be absent from duty without having previously
obtained leave, nor shall he/she leave his/her post before being relieved or receiving
express orders to that effect.
Presentation
Your personal appearance will always be irreproachable. Short hair, shaved, clean hands
and nails, clean and ironed clothes. You must use only the garments provided without
modifying their appearance or shape. You may not use them for any purpose other than to
provide services to the company. In general and permanently your appearance will be an
example of neatness and correctness.
Reservation
He/she shall keep in reserve the orders and instructions given to him/her for the
performance of his/her duties, as well as all circumstances that come to his/her knowledge
in the exercise of his/her functions. Also, as a general rule, all the company's operations
must be kept strictly confidential, and it is absolutely forbidden to provide information on
matters of any nature.
The following is a transcription of some models of general and specific instructions for
surveillance personnel in the different positions, having taken as a guide the
circumstances that normally occur in a typical industrial company.
General instructions.
Loss prevention
- To repress the theft or robbery of products, tools, merchandise and/or elements of the
establishment or of third parties deposited therein.
- Control tools, materials, etc., from contractors entering and leaving the plant, verifying
quantities, quality and condition.
- Strict control of people or visitors who come to the plant for different reasons.
- Strict control of vehicles in general entering and leaving the plant.
- Control the loading sectors of any product or material and make the necessary
verifications.
- Adopt all measures aimed at clarifying, preventing and avoiding deteriorations or losses,
irregularities or anomalies that may damage the company's assets.
Accident Prevention.
Fire prevention.
General Prevention.
Particular consignments.
The following model of particular instructions has been developed based on a typical
facility, where there is a main entrance covered by two guards. As in the previous cases,
these instructions should be adjusted to the structural characteristics of each facility and to
the specific needs arising from its specific vulnerabilities.
Main access.
Surveillance personnel.
Tasks:
- He/she shall be in charge of examining the documentation that proves the identity of the
persons who are to enter the facility.
- It will ask whoever is authorized to grant permission for the entry of persons and vehicles
to the facility.
- Record the entry of persons and vehicles in the corresponding form.
- It will deliver the identification card corresponding to the entrance and exit of persons and
vehicles.
- He/she shall keep up to date the post news book.
- Operate the door opening and closing and alarm systems.
- Collaborate in the general surveillance of the access area.
Order Service.
It is advisable to provide in writing the special instructions that will govern the procedures
of the Guards personnel in different situations that arise on a daily basis with employees
and workers, so that their actions are consistent and in accordance with the legal
standards. In this way, conflicts with plant personnel that may arise from abuses or
arbitrary actions attributable to the security service will be avoided.
Intoxicated personnel.
Theft or robbery.
- Arrest the perpetrator or perpetrators at the place where they are caught.
- Proceed to the recovery of the elements or goods owned by the company, which will
remain at its disposal according to the company's instructions.
- If the company so decides, the perpetrators will be brought to justice.
- If he/she surrenders to justice, the corresponding record will be drawn up.
- To keep a record of all the work carried out in the news book.
One of the most important tasks of the Surveillance Service is the control of access of
people, vehicles and merchandise.
The following is a transcription of the rules that in general terms apply in these cases and
that may be adjusted or modified according to the characteristics and modality of each
company.
People Control.
The surveillance service will be in charge of controlling access to the plant for all persons,
whether or not they are not part of the facility, and will have primary responsibility for all
matters related to the control, entry and exit of persons and vehicles.
In-house personnel.
- Control that these personnel comply with the rules established for their entry and exit.
- It will require the presentation of the identification card at the entrance to the facility.
- Proceed to search bags, packages, bundles, etc., of the personnel upon entering the
establishment, in order to prevent the introduction of alcoholic beverages or elements of
any nature, unrelated to the worker's activity.
- Check bags, packages, bundles, etc., of personnel upon leaving the facility, in
accordance with current legal regulations.
Upon admission to the ward, the Security Service will request the identification card that
proves the person's identity and will inquire about the reasons for the visit.
- In the case of hierarchical personnel, the surveillance employee will identify and
accompany them to the unit they wish to visit.
- Communicate to the hierarchical personnel of the plant the reason for the visit, the
identity of the visit, for its subsequent authorization.
- The respective form shall include name and surname, ID card number, company code,
reasons for the visit, the person being interviewed and the time of arrival and departure.
Regular visitors.
Persons outside the establishment who visit it regularly for billing, maintenance and other
reasons.
- With the authorization of the person in charge, the Surveillance Service personnel will
issue the identification card to those named.
- They must identify those named each time they visit the facility.
- In order to keep track of the visits, the Surveillance Service will have forms in the form of
spreadsheets, recording day by day all the visits and their personal data, number of
documents, name and surname, reason for the visit, the company they represent, with
whom they will meet and the time of entry and exit.In order to keep track of the visits, the
Surveillance Service will have spreadsheet forms, recording day by day the total number
of visits and their personal data, number of documents, name and surname, reason for the
visit, the company they represent, with whom they will meet and the time of entry and exit.
Non-Habitual Visitors.
The Surveillance Service will proceed to identify the visitor, verify the reasons for the visit
and, with the prior approval of the Plant's hierarchical personnel, will grant access,
accompanying them to the area or unit that authorized their entry.
The identification card will be provided to those appointed without omitting any information
and, once the procedure is completed, they must hand it in to the Surveillance office upon
their departure. Thepersonal identity document will not be retained.
The Surveillance Service will use the same type of form mentioned above, observing the
same indications.
Protocol visits.
The Surveillance Service, in accordance with the authority's orders, shall take the
necessary measures as circumstances may require, observing personal cleanliness,
politeness and courtesy as a rule, and shall take care of the correct sanitation of the
building.
These visits will be communicated in due time to the Surveillance Service, indicating the
day and time of their entry, names and the executive who will accompany them. Security
personnel should ensure that they have easy access to the plant, and should only carry
out a visual check on these people.
Visits by delegations.
With the prior approval of the facility's authorities, he/she shall observe the indications
given by them in due course.
These persons will be politely informed of the prohibition, indicating that they may wait for
their eventual clients at the exit of the facilities.
The entry of recruiters or salespersons will be allowed when they need to meet with an
executive and the executive expressly authorizes it, in which case a written record will be
left.
Also strictly prohibited are persons soliciting public charity, persons who are intoxicated or
under the influence of alcohol or drugs, political proselytizers or religious preachers.
Authorities: if any authority (Ministers, Intendant, Senators, Deputies, Mayors, etc.) who
are conducting business related to their position, appear at the gate, they will immediately
inform the corresponding authority of the facility according to the instructions received,
indicating their name, position and reason for their visit.
The authority will be treated with the utmost deference and will be facilitated entry (in your
vehicle). It will be the concern of the Guardsmen that your departure is expeditious.
Civil Servants: When a civil servant (Labor Inspectors, Health Service Inspectors, Internal
Revenue Service, Municipal Inspectors, Customs Service Inspectors, etc.)needs to enter
the plant to perform his or her duties,the Group Manager will inform the General
Management. You will be treated in a friendly manner and once your admission is
authorized, you will be given all the necessary facilities so that your admission is
expedited,without retaining your ID card or Identity Card at the Porter's Office.
During non-working hours and days, the shift manager will be informed and will be asked
to attend to them. The foregoing is without prejudice to the request for the credential that
certifies their status as such.
Carabineros: As a general rule, the personnel of Carabineros de Servicio (or who identify
themselves as such by means of their card), will have the facilities granted to them by the
higher levels of the Company.
Investigations: When these personnel need to enter to carry out judicial procedures
(summons, notifications, etc.) during administrative hours, they will be attended by the
Group Chief who will ask them for the corresponding credential. Once they have been duly
identified, they will be asked the reason for their visit.
When it is a matter of delivering summons or notification orders (from a Court), the Group
Leader will accompany them to reception, where they will be attended by the person
required.
In the case of arrest warrants, the contact person or Head of Security will be informed, as
appropriate, who must go to the Access Control to attend to them.
In such a case, the officer in charge of the proceeding is obliged, at the end of the same,
to draw up a report stating the circumstances that motivated it, a list of the damages
caused to the property during the proceeding (if any), individualization of the officer in
charge (name, grade and police unit to which he belongs), the number of the report and
the court to which he will inform of the proceedings.
When Carabineros or Investigaciones must enter a closed enclosure by virtue of this legal
authority (regardless of the time), the Surveillance Service Personnel must not oppose this
and will limit themselves to requesting the respective Institutional Credential from the
police officers.
The entrance to the Fire and Public Assistance facilities will be necessary when an
emergency arises, for which reason the Shift Manager and the Guardsmust provide them
with all the necessary facilities to ensure that their entrance and exit is as
expeditious and quick as possible. No special authorization will be required and
they will not be identified.
Identification Credentials.
They are an important link in the security system, in order to be able to effectively control
the access and exit of personnel to plants, warehouses or other company facilities.
The availability of a computer with the personnel lists allows for a quick preparation of the
credentials and will only be completed with the photograph and signature of the bearer.
The Personnel Management, together with the Surveillance Service, has primary
responsibility for all matters related to the preparation, authorization, delivery and control
of the same.
Normal or definitive.
Temporary.
Contractors.
Visits.
Normal or definitive.
Temporary.
It will be given to the newly incorporated personnel, while the normal or definitive
credential is being made.
Visit
The Surveillance Service, after complying with the regulations and procedures in force, will
issue the corresponding credentials to the visitors.
At the end of the procedures, the credential must be picked up at the time of leaving the
plant.
The Surveillance Service will verify that all the personnel of the facility use the
corresponding credential, requesting it at the entrance of the personnel.
Control that all personnel, whether external or not to the company, use the credential in a
visible place during the hours of activity or permanence in the plant.
Contractors.
These credentials shall be provided to persons outside the Company who, for service
reasons, must enter the Company.
The Security Service will hand out the credentials at the entrance, and they will be
removed at the exit for better control.
Upon delivery, the Plant Surveillance Service will request the personal background of the
causers to register them.
All areas of the Company that for work reasons require the services of external personnel
shall indicate in writing to the Surveillance Service who are the persons or Companies
authorized to enter the Plant and the tasks to be performed.
The credential for contractors will be granted to persons with whom there is a service
contract for a period of more than 14 days or whose presence on a regular basis occurs at
least twice a week.
Vehicle Control.
The entry and exit of vehicles shall be in accordance with the following:
Company-owned vehicles:
Third-party vehicles.
It shall exercise strict control over the entry and exit of the same to and from the plant.
It will identify the driver and passengers.
It will indicate parking places, loading places, etc. and speed limit.
It will control the loading sectors of merchandise or any other product.
The form shall include the name and surname of the driver and passengers, number of
documents, make of vehicle, license plate number, reasons for entry, who authorizes
entry, time of entry and exit.
He/she will check at any place of the installation and in a surprise manner all the vehicles
mentioned above, controlling specifications, tickets, merchandise, packages, parcels,
tools, etc.
Object:
Establish the procedure to be followed by the Company's personnel, upon leaving the
Plant to comply with the review, this obligation must be indicated in the Internal
Regulations.
Establish the procedure to be followed by the Surveillance Personnel for the revision of the
facility's personnel, their briefcases, packages and bags, for which purpose it is essential
to draw up an Operations Manual.
Company personnel who are to be inspected, in accordance with the internal rules known
to all, must go to the inspection room, adapted for this purpose. The review will be carried
out in private, with the door closed and always in the presence of a witness, who may be a
person from the union, a co-worker and if there is no other person, it will be done in the
presence of a Security Guard.
This review must be carried out in accordance with existing legal regulations, which means
that the person performing this work may not, under any circumstances, touch the person's
body with his or her hands; the packages, bags or briefcases carried by the person being
reviewed must be reviewed. The contents of the aforementioned items must be removed
in their entirety in order to check everything, it is not enough to look inside the package or
bag, in this case the person being searched is asked to remove the items inside.
When the person being inspected is carrying any of the Company's or his own items that
should not have entered the Plant, they shall be removed and deposited at the gate,
except when there is an authorization to leave signed by authorized personnel, in which
case the signatures must be compared with the record of authorized signatures. It should
be clear that each area at the supervisory level authorizes the departure of elements from
its sector.
Non-necessary elements are understood as everything that is not necessary for the
function to be performed by the personnel entering the facility, for example: gifts, photos,
clothes that are not normal (recently purchased, bags containing sports equipment),
radios, personal stereos, records, etc., or for sale within the plant. Any item not required
must be deposited in the Guardhouse under a control number and removed when leaving
the facility.
The control must be carried out at the entrance of the personnel to avoid problems at the
exit, paying attention to the surveillance personnel to those who carry packages out of the
normal, limiting themselves to clarify that they should not bring in unnecessary items and if
they insist on bringing them in, leave a record in the log book indicating the time, complete
identification of the subject and other clarifications regarding the package that are relevant
and inform their Supervisor.
Portable radios, pocket calculators, personal stereos, etc., shall be authorized by the
heads of each area by means of a written communication to the Surveillance Service. The
departure of these items shall be authorized by means of the corresponding authorization,
and if their departure is necessary every day, the authorization shall state in printed letters
the legend "In Transit".
Photographic equipment, as well as any other equipment that must enter the facility to be
used in the facility, shall only be authorized through the Surveillance Service and shall be
indicated in the log book, number and brand of the equipment, the exit of which shall be
done with the corresponding authorization with the legend "Your Property".
Procedures for the exit of items from the Company and others.
This will be compared with the sector responsible for the outgoing item, e.g.: the workshop
sends a motor of the installation for repair. Although the motor belongs to the facility, it is
the workshop that sends it for repair, therefore the workshop prepares the document in
question.
This authorization must state to whom it is addressed, a complete detail of the item
leaving, equipment number, brand, type, quantity, especially in what capacity it is leaving
(on loan, for repair, return or whatever), signature of the authorized person appearing in
the register intended for this purpose. Items that go in and out every day, such as
suitcases, pocket calculators, etc., must have the corresponding authorization with
complete details and the legend in transit, thus avoiding daily confection.
Metal detector.
It is an extremely useful element for the inspection of people, offering great advantages
over the manual palpation system, which should be reserved for the case of inspection of
non-metallic elements, such as fabrics, plastics, etc.
When entering the premises, personnel must carry the minimum essential metallic items
(watch, watchbands, coins).
All personnel who come to perform their duties bringing items for their own use must report
this to the security personnel.
Upon discharge, if any person is detected as having metallic elements, he/she will be
invited to go to the examination room in order to establish his/her situation.
The surveillance service records a significant amount of information on the entry and exit
of people, vehicles, products and materials on a daily basis, which must be carefully filed
in order to be used in the investigation or clarification of crimes and/or control with other
records kept in other areas of the plant and warehouse. Therefore, the following concept is
established for their safekeeping and archiving.
Visiting ticket.
It is filed daily in correlative form according to its number and is kept in the surveillance
service for two calendar months. Once this period has elapsed, it is sent to security for
centralized archiving for twelve months.
It is filed daily in correlative form for three calendar months. Once this period has elapsed,
it is sent to Security for centralized filing for twelve months.
It is filed under surveillance for one calendar month, at the end of which it is archived in the
plant for twelve months.
Visitor registration.
The original is given to the authorizing party and the copy is filed with the Facility
Management.
Exit permit.
The original is forwarded to the personnel office the next business day or the first business
day after holidays.
Quarterly report.
Security will send to the Plant Managements a quarterly statistical report on the number of
people received in the plants, time spent in their attention, vehicles entered, as well as
other data of interest arising from the analysis of the surveillance documentation.
RISK PREVENTION
Risk is inherent to all human activity and therefore we must act to avoid and/or minimize
them, thus preventing the occurrence of unfortunate situations for man, his property and
the environment.
The first step is to adopt a "safe attitude" as a result of a process of living and learning.
The "safe attitude" is a permanent disposition of alertness and action in the face of risk.
To have a safe attitude is, originally, to assume a personal responsibility that must
necessarily be coordinated in order to transform it into a collective one.
Risk prevention is a set of activities aimed at preventing accidents, illnesses and damage
to people, property, institutions and the environment.
It should be noted that when an incident occurs, it does not necessarily result in an injury.
If there is knowledge of an incident that has not resulted in injuries, the causes should still
be investigated promptly and rigorously to correct them and avoid a repetition of the same
event with consequences of injuries to be regretted.
It has been corroborated that in many accidents in which there has been bodily detriment
to the injured party, these had occurred previously without the pertinent measures being
taken to eliminate the adverse conditions that caused them.
Every accident has a precise cause. If not, it is not an accident. Therefore, there are no
accidents due to bad luck or fate. All of these can be avoided by training people and
maintaining direct control over activities, the environment, facilities and equipment.
The causes can be innumerable, however, we can summarize them in just two:unsafe
acts and unsafe conditions.
Examples:
a) Failure to comply with established safety rules and regulations.
b) Not using personal protection elements.
c) Using machines and tools without having the appropriate knowledge.
d) Failure to give timely notice of unsafe conditions.
Unsafe conditions are those that are present in the environment.
Example:
a) Deteriorated tools
b) Poor lighting.
c) Poorly executed installations.
d) Unorganized storage.
e) Stairs with rungs in poor condition
There is a close relationship between both types of causes, since the presence of unsafe
conditions in the environment will generally be the consequence of a negligent attitude or
unsafe act on the part of individuals.
In an incident in this area of human activity, there may be consequences such as injury to
one or more persons, damage to facilities or equipment, loss of time due to interruption of
some activity, all three together, a combination of two of them, or simply none of them.
The occurrence of incidents irremediably causes direct and indirect costs. In the first case,
we can point out the medical and economic benefits to the affected party. And for the
second, the interruption of activities, loss of materials, deterioration of facilities, etc.
In order to understand the sequence of events that can lead to an unwanted loss, it is
essential to first understand what you are trying to prevent or control.
The idea is to show that the same effective management principles can be used to control
incidents that affect production and quality, as well as safety and health.}}} By preventing
and controlling incidents and risks through the loss control system, the overall safety of
people, equipment, material and the environment is protected.
DEFINITIONS
Operational failure: it is a minor incident that does not involve damage but loss of time,
waste of energy, loss of economic resources, etc.
Near Miss: is an undesired event that, under slightly different circumstances, could have
resulted in physical harm or property damage. Generally yields a loss.
CAUSES OF ACCIDENTS
Consequence of accidents:
Objective:
a) To understand the principles of prevention: to establish and eliminate the causes of
accidents.
b) Know the means to eliminate unsafe conditions: observe the tasks and the workplace.
c) To know the active role of the worker in the elimination of unsafe conditions.
First of all, all actions and hazardous conditions in the workplace must be reported.
Once the above has been achieved, the causes of all actions and risk conditions that have
been found must be established.
Once we know the reasons or causes of risks, we can apply techniques that allow us to
eliminate or control the risk, fundamentally by eliminating the causes that produce it.
Use of checklists
Preventive and area review activities can be programmed to help whoever performs the
action to detect the existing risk(s).
These search and check procedures can be oriented to detect not only risk conditions that
exist in the environment in which the individual will interact, but more importantly, to detect
which are those actions that voluntarily or involuntarily committed by the individual, with
danger to their own physical integrity, that of third parties or work elements or machinery
that are being used.
All the actions that the human being performs in his life in a continuous way, lead him to
assume certain behaviors called habits.
As human behaviors, there are good and bad habits.
Bad habits are acquired through ignorance or imitation.
Most of the time, the individual believes that these habits are easier and more comfortable.
Good habits require great willpower from the individual to adopt them and, at the same
time, knowledge that allows the use of correct and efficient methods and procedures.
Many of the accidents that occur regularly are due to the repetition of bad habits.
The acquisition of Good Habits, slowly and painstakingly, will lead us to perform our work
activities with SAFE WORKING HABITS.
SOCIAL RISKS: Those that can be caused by people in an intentional and premeditated
way, such as intrusions, assaults, robberies, attacks, disturbances, etc.
2.-HEALTH RISKS: These are those that can cause damage to people's health, such as
contamination, epidemics, pests and plagues, which are the most frequent problems that
can occur.
TECHNICAL HAZARDS: These are those that can be produced by machines, equipment,
energy sources and systems. These respond to accidents, i.e., they are undesired and
unintentional events. Among the most representative are for example: fires, accidental
explosions, gas leaks, toxic fumes, floods due to burst pipes, humidity, elevator failures,
boilers, air conditioning equipment, etc.
4.-NATURAL HAZARDS: These are those produced by natural phenomena such as:
earthquakes, tidal waves or tsunamis, volcanic eruptions, and hydrometeorological risks
such as: rain, wind and snow storms, electrical storms, floods, alluvium, etc.
SOCIAL RISKS:
THEFT: Appropriation of another's movable property, against the owner's will, with the
intention of benefiting oneself or a third party, through the use of force, intimidation or
violence.
THEFT: It has the same definition as robbery, but differs in that in this case there is no use
of force on things, no violence or intimidation on persons.
ASSAULT: It is the same definition of Robbery, but committed only with violence or
intimidation to persons.
ATTACK: Selective criminal act, directed against persons, institutions and movable or
immovable property, perpetrated by individuals, organized armed groups, explosive or
incendiary devices.
DISTURBANCE: Disturbance of order generally caused by numerous people out of
control, which may lead to acts of vandalism.
Most of these social behaviors are classified as crimes in the Penal Code, so it is very
important to record as much background information as possible to allow for subsequent
judicial intervention.
It is advisable, in the face of these events and others that may affect the facility, to
establish procedural standards and security plans that allow security personnel to prevent,
neutralize or impede their execution.
1.- Keep calm. Do not panic or run. No bomb explodes immediately. If it really was an
attack, it is very likely that they would not have taken the trouble to warn you.
2.- Try to keep the communication friendly, trying to obtain the maximum of information
such as:
- Pump location
- Probable time of explosion
- Shape and external appearance
- Materials with which it was made
- Reasons for placement
3.- Write down the most relevant aspects of this communication, indicating the time of the
warning call.
During your conversation, make the interlocutor see that the time available to evacuate the
facility is insufficient and this may cost the lives of many innocent people, also try to retain
data, such as whether it is a man's or woman's voice, the tone, if it is loud or haughty, if it
is difficult to pronounce some letters, if there are noises, try to distinguish them, etc. In
short, try to memorize all the useful information to try to individualize or recognize the
interlocutor.
5.- Once the conversation is over, report the event immediately to the appropriate parties,
following the indications of your facility's security plan.
6.- If during the search you find a suspicious package or bundle, do not touch it and report
it immediately in order to proceed accordingly.
Although the facilities are equipped with modern and sophisticated protection and security
systems, antisocial elements can breach them and commit various crimes.
The abnormal state of mind, fear, impotence, indignation, nervousness, etc., that the
victims of these outrages experience at the moment of suffering the attack, does not allow
them to describe correctly what they observed, making errors that hinder the clarification of
what happened.
The following are some basic indications that allow a good observation and description of
the criminals involved in these events, in order to facilitate their capture and neutralization.
This requires:
1.-Observe with a determined order, from one feature to another. For example, from head
to toe.
2.- Always keep in mind that an incomplete but accurate description is better than an
inaccurate complete one.
3.- When there is not enough time, priority should be given to the most outstanding
aspects.
TECHNICAL RISKS:
FIRE
The risk of fire is latent in every activity and place where man is present, so we will always
be under its threat and its terrifying consequences.
What is fire?
It is the result of the combination of fuel, heat and oxygen, under certain special
conditions. Fire is produced when something burns (fuel) due to a sufficient heat source
and in the presence of air, which provides oxygen (combustive agent) to this chemical
process, generating a chain reaction.
For combustion to occur, all three elements must be present simultaneously. If one of
them is missing or separated, there is no combustion.
Therefore, the methods to control or eliminate it will be oriented to prevent these three
components from merging or to separate them if they have already merged.
When the above conditions are met, the so-called "Fire Triangle" is generated.
Another more modern theory is the so-called "Fire Tetrahedron". To the components of
the first hypothesis, fuel, comburent (oxygen) and heat, a fourth element is added, which is
thechain reaction. This theory is explained by saying that when bodies raise their
temperature, "active species" (capable of reacting chemically) are formed and move from
the combustible material to the flame front. As these "active species" react, they increase
the temperature, which in turn increases the reaction rate and the fire increases. If the
temperature drops, these species lose their active character and combustion does not
proceed.
In this last theory, the heat factor plays a fundamental role since its feedback will generate
the maintenance of the fire with an open and permanent flame.
SOLIDS
Wood, paper, plastics, light metals. These fuels require a high gasification and ignition
temperature to release their vapors and start burning.
LIQUIDS
Gasoline, acetone, alcohol, benzene. Liquid fuels generally gasify at ambient temperatures
and burn easily. It is therefore important to keep containers and containers that contain
these elements closed.
GASEOSOS
Acetylene, butane, chlorine. Gaseous fuels are naturally in this state, so they only need to
reach their ignition temperature by means of any heat source to explode and burn.
The mere fact of smelling the odor of a gas means being in the presence of an
environment that is not only toxic, but also flammable.
HEAT TRANSFER
a) Conduction: It is the transfer of heat from one element to another by direct contact.
Example: fire of clothes put to dry in contact with a stove.
It is important to note that during a fire heat is transmitted simultaneously by all three
forms.
OXYGEN
When the percentage of oxygen is less than 16%, a fire should not occur. That is why it is
important to avoid opening doors or windows in a smoky and hot environment.
MASTERY OF FIRE
Fire is controlled when any of the elements of the fire triangle (fuel, heat and oxygen) can
be separated from combustion, thus inhibiting the chain reaction, and extinguishing
methods are based on this principle:
EXTINCTION METHODS
a)COOLING: This method attacks the heat. It consists of adding an element that lowers
the temperature of what is burning. The most commonly used extinguishing agent for
cooling is water. Class "A" fires are generally attacked by this modality.
b)SOPHOCATION: With this system oxygen is attacked. It consists of adding an element
that chokes the burning material. The extinguishing agent used is a special chemical foam.
We can also, in some cases, eliminate oxygen by covering or covering the product that is
on fire. Class "B" fires are normally controlled by this method.
c)ELIMINATION OF THE FUEL(SEGREGATION): Consists of eliminating or isolating the
fuel that burns, since in this way the fire will not find more elements with which to maintain
itself.
d)INHIBITION OF THE CHAIN REACTION: There are certain chemical substances that
act on some combustion products, producing their extinction. The most representative
agent is dry chemical powder. It is normally multipurpose and can attack class "A", "B" and
"C" fires.
CLASSIFICATION OF FIRES
Chilean standard NCH No. 934 classifies fires according to the combustible material being
burned, in order to identify their nature and facilitate firefighting.
CLASS A
These are fires produced by ordinary solid fuels such as wood, paper, cardboard, textiles,
rubber and certain plastics.
Its symbol is a green triangle with a white letter "A" inside.
CLASS B
Fires caused by flammable materials, liquids and gases (oils, greases, petroleum
derivatives, solvents, paints, etc.).
Its symbol is a red square with a white letter "B" inside.
CLASS C
These are fires produced by systems and equipment energized with electric current. It is
important that the extinguishing element is not electrically conductive. Once the power is
disconnected, the fire can be attacked as a class A or B fire.
Its symbol is a blue circle with a white letter "C" inside.
CLASS D
These are fires produced by the combustion of certain metals as particles or chips, such
as aluminum, titanium, zirconium, etc., and non-metals such as magnesium, sodium,
potassium, sulfur, phosphorus, etc.
Its symbol is a yellow five-pointed star with a white letter "D" inside.
CAUSES OF FIRES
As this is a type of accident, we can start by pointing out that they can be caused by an
unsafe act or an unsafe condition. However, we will give some examples that will help us
to be even clearer about their possible causes:
a) Gas leakage: From pipes and flexible hoses, from elements accessory to the
installations, from the heater, from the kitchen appliance, from stoves, etc.
b) Open flames: Presence of combustible materials near the burners of a cooking
appliance, fireplace, candle, lighter, stove, etc.
c) Electricity: Due to equipment in poor condition, faulty installations and repairs,
overloading of sockets and installations, etc.
d) Static electricity: The friction produced by certain bodies and materials in motion, with a
deficient ground connection, can produce sparks and under certain environmental
conditions, produce an ignition.
e) Welding work: Without taking precautions to isolate the area from all easily combustible
materials.
f) Cigarettes, matches: carelessly leaving cigarette butts and matches half extinguished.
g) Hot surfaces: By heat transmission they can ignite combustible elements near furnaces,
boilers, heaters, stoves, grills, griddles, irons, etc.
h) Spontaneous ignition: Storing certain chemical elements and petroleum derivatives
without taking the necessary precautions.
FIRE PREVENTION, HOW YOU CAN AVOID IT
Actively participate in training programs to learn about the phenomenon of fire, its risks
and procedures for dealing with it.
Participate in your company's safety and emergency plans.
Maintaining order and cleanliness. Waste is a potential fire hazard. The entrances and
corridors must remain free of objects that impede a smooth transit.
Storing flammable liquids, paints, etc. In appropriate places and without exposing them to
possible flames or fires.
Keeping combustible elements (cloths, papers, etc.) away from stoves and/or heat
sources.
Respecting the smoking ban, especially near flammable liquids and combustible materials
(sawdust, paper, rags, etc.). Smokers should make sure that cigarette butts and matches
are properly extinguished.
Throwing cigarette butts, matches or lighted items in appropriate receptacles and never in
containers with residues.
Using flammable products only in open or sufficiently ventilated places.
Keep all combustible liquids in perfectly closed containers, in cool and ventilated
environments.
Covering spills of combustible liquids detected with sand (Do not use water).
Keeping all flammable objects away from the place where you work, when using devices
that produce sparks and/or the release of ignited particles.
Using specialized personnel to repair electrical or gas appliances and installations, heating
and/or cooling systems, etc.
Carefully observing that cigarette butts, lights, electrical appliances, stoves, stoves, etc.,
are turned off at the end of the workday.
Using the electrical installations properly without overloading the electrical lines.
Take care to maintain the electrical installations in good condition, do not overload them,
do not make temporary repairs. Fuses or plugs should not be repaired with "wires", nor
should circuit breakers be immobilized. Line overheating leads fatally to a fire.
The use of multiple, triple or "thief" current, should be avoided, since due to the bad
contact and recharge of the line to which it is connected, it will cause overheating and
short circuit.
Immediately ventilate the environment where flammable vapors or gases have
accumulated and interrupt, if possible, the emanation. Under no circumstances should
lights or electrical appliances be turned on or off until it is certain that the risk of explosion
has disappeared.
The cleaning of kitchens and extraction hoods should be done periodically. Fat
accumulation often causes inflammatory fires.
Keeping gas appliances and/or installations in perfect working order. To check for leaks,
use detergent foam, NEVER FIRE. The revision, maintenance and repair of these devices
require the presence of qualified personnel.
FIRE CONTROL: HOW TO DEAL WITH THE EMERGENCY DURING AND AFTER THE
EMERGENCY
If you have already made it out, NEVER go back to retrieve an object. Your life is worth
more than material goods. In addition, their attempt to return may cause a serious
hindrance to the exit of other people and to the firefighting procedure.
If your clothes are ignited by flames, DO NOT run, lie down on the ground and roll over to
smother the flames, covering your face with your hands. If you find it impossible, get wet. If
a person near you is in this situation, do the same with him/her and/or cover him/her with a
blanket to smother the fire.
If you are unable to leave, try to call attention to your presence by telephone or by
signaling through a window with a visible cloth.
NEVER jump from a burning building. Many people lose their lives in this way without
taking into account that they could have been rescued within minutes. the steps and
without looking down.
18. If you are rescued by a fire department ladder, climb down the ladder facing the ladder
and never look down.
FIRE EQUIPMENT RECOGNITION
1.-FIRE EXTINGUISHERS
d)GAS-BASED EXTINGUISHERS. The most commonly used gas for fire extinguishing is
mainly carbon dioxide (CO2), an odorless, non-corrosive, colorless, non-conductive gas,
40 times heavier than air, which is used to extinguish class "B" and "C" fires.
Procedure:
WET NETWORK
3.-DRY NETWORK
Corresponds to a system of dry pipes distributed throughout the length and height of a
building or facility and is for the exclusive use of firefighters.
4.-DETECTION SYSTEM
Corresponds to an automatic system that alerts in case of fire (smoke detectors, manual
push buttons).