• No results found

RISK ASSESSMENT AND SECURITY PROCEDURES

N/A
N/A
Protected

Academic year: 2021

Share "RISK ASSESSMENT AND SECURITY PROCEDURES"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

RISK ASSESSMENT AND SECURITY PROCEDURES

Many organisations, particularly those that send volunteers overseas, will probably have need to develop policies and procedures specifically for overseas working in addition to the usual internal ones. The following documents provide some ideas for basic security and risk assessment procedures for use in connection with international volunteer placements.

Security and risk assessment procedures may contain a number of steps as suggested below:

1. General procedures and checklist for creating risk assessments and security procedures

2. Assessing specific risks in a particular country or region

3. Drawing up specific risk assessments and security procedures for those countries or regions

4. Keeping procedures 2 and 3 (above) up-to-date

5. Periodically reviewing specific and general procedures 1. GENERAL PROCEDURES CHECKLIST

This is a checklist of example questions that organisations may ask themselves when evaluating the security procedures in place for sending volunteers or staff overseas. It has been adapted from VSO’s internal procedures. You may need to develop country or region specific procedures if working in different areas.

Roles and Responsibilities Roles and Responsibilities Roles and Responsibilities Roles and Responsibilities

• Are all staff aware of their specific roles in managing security?

• Who has overall responsibility for security procedures in the organisation? • Who has overall responsibility for security in a country/region?

Organisations use a vast array of internal policies and procedures, but the most appropriate policies will always depend on the size and nature of the individual organisation. It is often ineffective to copy model policies, rather than taking time to develop them individually. Policies are effective if they are developed and reviewed on an ongoing basis with the involvement of staff, and are tailored to suit the specific needs of an organisation and its activities. However, some guidance and examples mean that you don’t have to start from scratch.

With this in mind NIDOS has provided a number of example generic policies which can be used as guides

as guidesas guides

as guides when developing your own policies. We hope that these example policies may help to save time in developing your own policies, but we stress that they are only examples and should they are only examples and should they are only examples and should they are only examples and should not simply be copied

not simply be copiednot simply be copied not simply be copied.

Disclaimer DisclaimerDisclaimer Disclaimer

NIDOS accepts no responsibility for any third party loss or consequences arising from the use of these example policies.

(2)

Staff training Staff training Staff training Staff training

• Have all programme coordinating staff, field staff and relevant administrative staff completed

the relevant training on security?

• How do you ensure this is kept up-to-date?

Intelligence G Intelligence G Intelligence G

Intelligence Gatheringatheringatheringathering

• Do coordinating staff consult relevant embassies/high commissions on security at least

quarterly? Named post responsible:

• Is the programme office a member of an NGO forum on security or how do they secure

information from such a forum?

• Where is the intelligence from these sources recorded?

Security Briefings for V Security Briefings for V Security Briefings for V

Security Briefings for Volunteersolunteersolunteersolunteers

• What procedures are in place for regular (at least every arrival cycle) updates to the security

briefing in volunteers’ briefing packs? How are these updates distributed to volunteers?

• How often is the travel and security advice from the Foreign and Commonwealth Office web

page downloaded? (Monthly downloads are recommended)

• How is new security information made available to volunteers? • Is this method effective?

Placement D Placement D Placement D

Placement Documentationocumentationocumentationocumentation

• Are local risks explicitly documented in placement information?

• How are changes in local risks monitored and fed back to coordinating staff?

Bri Bri Bri

British Vtish Vtish Vtish Volunteersolunteersolunteersolunteers

• Are all UK volunteers registered with the British High Commission?

• Are programme coordination and field staff aware of British High Commission emergency

evacuation procedures?

Non Non Non

Non----British VolunteersBritish VolunteersBritish VolunteersBritish Volunteers

• Are all non-UK volunteers registered with their own Embassies/Consulates?

• Is there a record of what emergency evacuation procedures the relevant non-British

Embassies’ have in place for their nationals?

In In In

In----country trainingcountry trainingcountry trainingcountry training

• Does in-country training include a session on security? For programme staff and for

volunteers?

Emergency Contacts List Emergency Contacts List Emergency Contacts List Emergency Contacts List

• How often is the emergency contact list (including medical, embassy, volunteer contacts)

updated? Quarterly? Six-monthly?

• Where is it stored?

• When was the last update?

• What procedures are in place to ensure that all volunteers and relevant staff members have

the latest version of the emergency contacts list?

(3)

Annual Management Report Annual Management Report Annual Management Report Annual Management Report

• Does the latest report provide a review of last year’s security strategy?

• Was at least one volunteer involved in the annual review of the security strategy?

Evacuation and Emergency P Evacuation and Emergency P Evacuation and Emergency P Evacuation and Emergency Planslanslanslans

• When was the plan for evacuation and emergency procedures last updated?

• What types of emergencies does it cover? (There may be typical ones for each country) • Where is it stored?

• Where is the plan for evacuation in the event of Avian Flu stored?

2. COUNTRY/REGION SPECIFIC RISKS

It may be necessary to draw up separate check lists for each country or region, for example some countries or regions may be prone to particular risks such as:

• hurricanes • earthquakes • flooding • conflict

• drug trafficking and other organised crime • kidnapping

• political unrest • human rights abuses

Training for volunteers may also include country/region specific health and personal safety advice covering such things as infectious diseases (including HIV/AIDS) and medical services, illegal substances, theft, the law and money.

(4)

3. EXAMPLE RISK ASSESSMENT FRAMEWORK

The form below is a simple framework for use in risk assessment exercises. It can be used to record each hazard identified under various sub-headings, along with the severity of the risk it presents and the measures which are implemented in order to mitigate the risk. Two examples of risks have been added in order to show how the template might be used. The severity or level of risk is calculated using the risk assessment matrix on the following page.

Hazard Risk Control Measure

Political

• Rapidly rising fuel prices could trigger anti-government protests in some parts of the partner country.

Risk of injury or death if protests develop and lead to violent civil unrest Vulnerability =3 Impact = 5

Risk level = 3 x 5 = 15

• Situation monitored through local staff and volunteers, other NGO partners/networks, national news, embassies etc

• Volunteers already in country advised of situation and urged to avoid protests should they develop

• Volunteer pre-departure briefing includes specific information about economic/political sensitivities in the region – and is regularly updated with new developments • Procedures in place for when/how to go about

postponing new arrivals of volunteers or evacuating current volunteers in the event of widespread civil unrest Human & behavioural

• Areas of city in which volunteers work are quiet and muggings have been reported after dark.

Risk of mugging Vulnerability = 4 Impact = 3

Risk level = 4 x 3 = 12

• Volunteers advised through placement briefings of unsafe areas based on local intelligence and urged to avoid walking in these areas after dark. Placement briefing also includes advice on safer behaviour e.g. not carrying conspicuous money/valuables.

• Volunteers urged to seek advice from host organisations on safe forms of transport

(5)

Risk Assessme Risk Assessme Risk Assessme

Risk Assessment Matrixnt Matrixnt Matrix nt Matrix

This tool may be used to assess the severity of each risk identified in connection with an activity. The risk factor is the Impact of Threat multiplied by Vulnerability. If a risk is plotted in the lower left corner it has the minimum risk factor of 1 and in the top right, the maximum risk factor of 25. If the risk factor is above 9, measures should be put in place to mitigate the risk. If the risk factor is above 16, immediate action must be taken to minimise the risk or the activity should be stopped.

4. UPDATES

A system should be in place to keep the documents under step 3 and step 4 up-to-date

5. REVIEW

Both the general procedures and the country/region specific procedures should be fully reviewed on a regular basis.

These templates have been developed using risk assessment procedures from VSO and Challenges Worldwide. VSO is currently VSO is currently VSO is currently VSO is currently

reviewing its security/risk assessment procedures and will make new documents available when the process is complete.

reviewing its security/risk assessment procedures and will make new documents available when the process is complete.reviewing its security/risk assessment procedures and will make new documents available when the process is complete.

reviewing its security/risk assessment procedures and will make new documents available when the process is complete. Impact of Impact of Impact of Impact of Threat Threat Threat Threat 5 – Very High 4 - High 3 - Medium 2 - Low 1 – Very Low 1 – Very Low 2 - Low 3 - Medium 4 - High 5 – Very High

References

Related documents

• Implement only approved firewall rules which are in line with the Office of Enterprise Technology’s (OET) firewall default security policy.. • Evaluate risk and

If syllable structure is available in the acoustic signal, we should find that vowel measurements in words containing medial onsets are different from those containing medial

Security process Plan Do Check Risk Assessment Information Security Program: Policy, Plans, Procedures Audits.. Information

The BIA and risk assessment procedures are documented in Chapter 3 of the Security Officer Instruction Guide ( http://www.nitc.state.ne.us/tp/workgroups/security/documents.htm

Through inspection of the security policies and procedures and inquiry of management, determined that the security policies and procedures were in place and communicated to

Failure to Provide Service: If ISP fails to provide Service or Services to Members as specified in the Agreement, fails to perform the other duties specified

As BMI increases, maximum MRI intensity of the ligamentum lavum is seen to decrease based on analysis of ROI at the presumed insertion level of the epidural needle (Figure

In this paper, various higher-order shear deformation beam theories for bending and free vibration of FG beams are developed based on the assumption of a constant transverse