0% found this document useful (0 votes)
33 views9 pages

Safety and Security Guidelines For EP

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views9 pages

Safety and Security Guidelines For EP

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Police Licensing & Regulatory Department

391, New Bridge Road, #02 701


Police Cantonment Complex Block D
Singapore 088762
Tel No: +65 68350000
Fax No: +65 62234704
www.police.gov.sg

Annex A – Security Guidelines Premises Storing/Handling Security Sensitive Materials (SSMs)

S/N Area of Interest Description Recommended Measures


1 Perimeter Perimeter Perimeter barriers are measures Barriers to humans (such
Security barriers adopted along the boundary of barriers should be at least 2.4m
the facility. They are normally high)
the first layer of protection and • Concrete wall
provide both physical and • Brick wall
psychological deterrents to • Welded-mesh
unauthorised entry, thereby • Pedestrian turnstiles fence
deterring or delaying such
incidents from occurring. Barriers to vehicles
• Bollards
Different objectives for a • Drop arm barriers
perimeter barrier include: • Vehicular gates
• Marking an administrative • Planters
border line of a private area.
• Preventing unintended entry Natural or landscaping barriers
of vehicles or people. • Hedge rows
• Creating a stand-off line for • Rocks
a variety of threats.
• Timber
• Deterring possible intruders.
• Water feature
• Preventing or delaying the
intrusion of a person.
• Preventing the intrusion of a
vehicle.
• Preventing or delaying an
illegal exit from a confined
area.
• An operative defence line for
security guards or police.
• A line-of-sight blocking
element.
• An architectural or
landscape feature.

Monitoring Monitoring and detection Fence-mounted or open-area


and equipment are key components sensors
detection of effective perimeter security. • Vibration detection sensors
Often, facilities will monitor for • Video motion detection
security incidents through a • Infrared sensors
combination of human oversight • Acoustic sensors
and one or more electronic
sensors or other intrusion Remote surveillance
detection systems. Typically,
when a sensor identifies an • Thermal images
event of interest, an alarm • Internet Protocol (IP)
notifies the security personnel or cameras
assigned staff who will then
assess the event directly at the

1
location or remotely through Human-based monitoring via
surveillance images. security sentry or mobile patrol.

To increase the reliability of a


monitoring system, one may
elect to deploy multiple
interactive, redundant measures
at the location of interest.

Security Security lighting increases Continuous lighting is the most


lighting visibility around perimeters, commonly used form of
buildings, and sensitive locations security lighting systems,
and acts as a deterrent and consisting of a series of fixed
detection tool. It should therefore light sources arranged to
be provided at the perimeter to illuminate a given area on a
allow security personnel to continuous basis during the
maintain visual observation hours of darkness with
during darkness both by direct overlapping cones of light.
surveillance and through the
CCTV system. Sufficient lighting The recommended illumination
should be provided to ensure standards are:
that the perimeter is well-lighted • 2 lux for large open areas
and that there are no blind spots. • 5 lux for surveillance of
confined areas
At a minimum, all access points, • 10 lux for surveillance of
the perimeter and restricted vehicle/pedestrian
areas should be illuminated from entrances
sunset to sunrise or during
periods of low visibility. In some Standby lighting is similar to
circumstances, lighting may not continuous lighting and meets
be required, but these the same security lighting
circumstances must be specifications but is used only
addressed in the building’s in certain circumstances. When
security plan. Lighting however, a possible intruder is detected,
also needs to be matched to the the security system or guard
operating environment and this force can activate the standby
should be taken into lighting system for extra
consideration during planning. illumination. It can also be
deployed at
unattended/attended gates for
extra lighting. Standby lighting
differs from the continuous
lighting in that only security
personnel or the security
system software have control
over the system.

This lighting system consists of


manually operated movable
light sources such as
searchlights, which can be
activated during the hours of
darkness to cover specific
areas as needed. Moveable
lights are normally used to
supplement continuous or
standby systems.

The emergency lighting system


may duplicate the other three
systems in whole or in part. Its
use is normally limited to
periods of main power failure or
other emergencies. While
security lighting should be
connected to an uninterruptible
power system when possible,
emergency lighting should
depend on a separate,
alternate power source, such
as portable generators or
batteries.

Access Wherever a perimeter line is Position the entry control point


control planned, points of access for to allow adequate visual
vehicles and pedestrians are assessment of approaching
required at various points along vehicles.
the line. These points are usually
regarded as the weak links of the Allow adequate passage for a
perimeter as they require a vehicle that has been denied
breach in the protective line access at the security check to
every time they are opened. exit without having to enter the
Access points control the time site or move vehicles in queue.
and people permitted to enter a
building or facility. In addition to Any vehicle/pedestrian gate on
controlling passage, access the perimeter line should
management usually includes provide the same level of
the ability to observe and track protection against vehicles and
movement in and out of intruders as that provided by
controlled areas. the rest of the perimeter line.

The entry points through a Entrances should be designed


perimeter line will typically in such a way as to enable
consist of vehicle gates, access control to be
pedestrian gates, and in some implemented either for
cases, a guard post. The entry unattended entry using an
points provide places where the access control system or by
required level of vehicle or guards.
pedestrian screening and access
control can be implemented. The
challenge of designing an entry Sufficient space should be
point is to prevent unauthorised allocated for proper inspection
access while maximising the flow and for communication (which
of authorised access by may be at a distance) between
pedestrians or vehicles. the people entering and those
responsible for approving
access.

Ascertain and verify the


purpose of the visit such as
checks of government issued
photo identification or letters of
appointment.

Providing company or facility


issued photo IDs to individuals
permitted access to the facility
or restricted areas of the facility
that identify:
• Employees
• Regular contractors
• Temporary contractors
• Visitors

2 General Access This is focused on the Providing company-issued


Premise Control identification and securing of photo IDs to individuals
Security cleared personnel who have permitted access to the facility
already been granted permission or restricted areas of the facility
to enter the facility. The primary that identify different group of
component of a successful personnel
access control system if knowing • Employees
who is allowed on-site. • Regular contractors
Personnel identification • Temporary contractors
measures help a facility quickly • Visitors
determine whether or not an
individual is permitted access to An individual should not be
a facility or a restricted area. allowed access an area other
than those permitted.

As far as possible, visitors and


temporary contractors should
be escorted when moving
within the facility.

Monitoring Monitoring and detection Open-area sensors


and equipment are key components • Vibration detection sensors
detection of effective perimeter security. • Video motion detection
Often, facilities will monitor for • Infrared sensors
security incidents through a • Acoustic sensors
combination of human oversight
and one or more electronic Remote surveillance
sensors or other intrusion • CCTV cameras
detection systems. Typically, • Thermal images
when a sensor identifies an • Internet Protocol (IP)
event of interest, an alarm cameras
notifies the security personnel or
assigned staff who will then Human-based monitoring
assess the event directly at the • Staff to keep a look out for
location or remotely through unfamiliar, suspicious
surveillance images. characters and suspicious
activities within the facility
To increase the reliability of a and notify relevant staff
monitoring system, one may upon detection.
elect to deploy multiple
interactive, redundant measures
at the location of interest.
General Prescribe a company security Regular training and
security policy to inculcate a security awareness for new and existing
policy mindset and enhance security employees.
awareness.
Identify suspicious indicators
and report incidents to relevant
staff and authorities.

Develop SOPs specifying


response during contingencies,
and hold periodic exercises to
ensure staff are familiar

3 Critical Access This is focused on the Providing company-issued


Facility Control identification and securing of photo IDs to individuals
Security cleared personnel who have permitted access to the facility
already been granted permission or restricted areas of the facility
to enter the facility, particularly that identify different group of
the critical site/facility. The personnel
primary component of a • Employees
successful access control • Regular contractors
system if knowing who is allowed • Temporary contractors
on-site. Personnel identification • Visitors
measures help a facility quickly
determine whether or not an Electronic access control
individual is permitted access to measures
a facility or a restricted area. • Tap card readers
• Biometric readers
• Open door detectors
(magnetic switches)
• Access control
management software
• Access control
management stations
Manual access control
measures
• Regulated key access
• Sign-in and sign-out
procedures

Monitoring Monitoring and detection Open-area sensors


and equipment are key components • Vibration detection sensors
detection of effective perimeter security. • Video motion detection
Often, facilities will monitor for • Infrared sensors
security incidents through a • Acoustic sensors
combination of human oversight
and one or more electronic Remote surveillance
sensors or other intrusion • CCTV cameras
detection systems. Typically, • Thermal images
when a sensor identifies an • Internet Protocol (IP)
event of interest, an alarm cameras
notifies the security personnel or
assigned staff who will then Human-based monitoring
assess the event directly at the
• Staff to keep a look out for
location or remotely through
unfamiliar, suspicious
surveillance images.
characters and suspicious
activities within the facility
To increase the reliability of a
and notify relevant staff
monitoring system, one may
upon detection.
elect to deploy multiple
interactive, redundant measures
at the location of interest.
Inventory Stock keeping refers to the Lists all the hazardous
control maintenance of a system, either materials at the covered facility
and stock electronic or manual, of keeping
keeping track of the SSMs which are Provides tracking of the
stored/handled/processed in the quantity and the physical
facility. Such information can location of each hazardous
include but is not limited to the material
following: type of SSMs, amount
used, amount disposed and Monitors use by authorized
location. Information should be personnel
readily available.
Tracks disposal and maintains
a record of disposed containers

Contains purchasing/receiving
records for materials
management

Provision of a locked rack or


other tamper-evident, physical
means of securing man
portable containers of
theft/diversion hazardous
materials. Examples include:
• Chains and locks that
cannot be cut or breached
with man-powered tools
• Entry/motion detectors and
alarms for the buildings or
rooms where the
containers are stored

Quality Prevent attempts to intentionally Develop a written procedure to


Control disrupt the operations of the regularly inspect, test,
facility to cause harm and calibrate, repair, and maintain
injuries. security systems and systems
related to security, such as
communications and
emergency notification
equipment. The procedure
should identify responsibilities,
tasks, their frequencies of
occurrence, and the
documentation required

Perform inspection, testing,


and maintenance tasks on a
regular basis and in
accordance with the
manufacturer’s instructions

Include all security equipment,


such as gates, cameras, lights,
alarms, and keypad entry
systems, in the routine
inspection and maintenance

Employ appropriate security


measures when performing
maintenance, as well as in
response to non-routine
outages, equipment failures
and malfunctions

Document non-routine
incidents and promptly report
them to the Security Officer in
charge

Have procedures to verify the


identity and each occurrence of
contractor personnel who
perform inspection, testing, and
maintenance of security
equipment
CCTV Specification
a) CCTV cameras covering all entrances and exits directly leading to/from the approved
storage area and the interior of the approved storage area where the stocks are stored.
b) Ensure that all the conditions below are met:
i. each CCTV camera is positioned and angled in such a way that it can capture the
face of every person entering or exiting through that doorway, or depositing,
removing or handling any SSM in the approved storage area;
ii. there is a clear line of sight from the CCTV cameras to the locations they are
covering; and
iii. the CCTV cameras’ line of sight shall not be obstructed in any way.
c) All CCTV cameras and recording system(s) meet or exceed the following specifications:
i. records colour images at the resolution of HD 1080p: 1920x1080 pixels or its
equivalent;
ii. records at 12 frames per second;
iii. supports the exporting of CCTV camera recordings via a USB port in open-source
formats such as *.avi (Microsoft), *.mov (Apple QuickTime), *.mp4 (MPEG), or such
format as approved by the Licensing Officer in writing;
iv. is switched on and in a recording mode at all times; and
v. is able to store all CCTV camera recordings for at least 30 days from the date of
recording.
d) All CCTV cameras and recording system(s) remain in good working condition at all times.
Annex B – Safety Guidelines for Management of Explosive Precursors (EP)

1. Ensure compliance to the SS586:2014 – Specification for hazard communications for


hazardous chemicals and dangerous goods.
2. Carry out periodic review on the types and quantities of EPs required for operations.
3. Ask your chemical supplier if safer substitute is available. Choose the least hazardous material
and process that can do the job effective and safely.
4. Obtain the Safety Data Sheets (SDS) for the EPs and brief staff handling the EPs of the
hazards.
5. Store EPs in containers and storage conditions (e.g must be well-ventilated) recommended by
the chemical supplier in the SDS.
6. Store EPs away from in incompatible materials, especially flammable substances, organic or
other oxidizable materials.
7. Do not use wooden pallets or other combustible pallets for storing EPs.
8. Walls, floors, fittings, storage cabinets, etc of the EP storages should be constructed of non-
combustible materials.
9. Inspect EP stocks to ensure that they are properly labelled, undamaged or unexpired. Dispose
excess, damaged or expired EPs without delay.
10. Do not stockpile. Keep the amount as small as possible.
11. Ensure adequate firefighting system and equipment are in place.
12. Allow only trained and authorised staff into the EP storage area or to handle EP.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy