Security Conception for GD

Содержание

Слайд 2

Content 1 2 Map of Risks 4 3 5 Map of

Content

1

2

Map of Risks

4

3

5

Map of Responsibility

Basics Principles of Security Activity

Structure of

Security Department

Decision of General Director

Слайд 3

1. Map of Risks law ecology social resources informa tion liquidity

1. Map of Risks


law

ecology

social

resources

informa
tion

liquidity

property

Employees / Contractors / Production / Supply

chain
Etc.

credits

investments

markets

management

Unfavorable/Issues/Problems/Troubles

20% of all events are connected with equipment/tools/machines failures

80% of all events are connected with human mistakes and a human factors

operational

others

Слайд 4

1.1. Map of Risks law ecology social resources informa tion liquidity

1.1. Map of Risks


law

ecology

social

resources

informa
tion

liquidity

property

Employees / Contractors / Production / Supply

chain
Etc.

credits

investments

markets

management

Unfavorable/Issues/Problems/Troubles

operational

others

each case can have corruption in a basis

Слайд 5

2. Map of Responsibility Responsibility of Security Dept Government Agencies &

2. Map of Responsibility

Responsibility of Security Dept

Government Agencies & Courts

Laws &

Regulations

Management

Investments & Credits

Markets

Property, Resources, Liquidity

Responsibility
of other function

Financial Dept

Information

IT Dept

Law Dept

Operational Risks
- employees
- contractors
- parts of equipment
- finished product
- supply chain
- ecology
- fire
- other operational risks

HR Dept
Law Dept
Financial Dept
HSE

Social

HR Dept

All Depts

GENERAL DIRECTOR

Responsibility
of Security Dept
(including
Antikickback, Bribery, Fraud, Steal, Financial crimes)

Слайд 6

3. Basic principles of Security Activity If necessary receive and exchange

3. Basic principles of Security Activity

If necessary receive and exchange of

information
with
Great Wall
and
HMRus
(Sales)
Слайд 7

4. Structure of Security Department Economic Security Access Cntrl & CCTV

4. Structure of Security Department

Economic Security

Access Cntrl & CCTV

Information Security

Internal Audit

Risk


Management
Use of any legal methods of receipt of information.
We need to watch all functions and
all information, to control all employees,
all contacts with our contactors
and manage all our risks.

Enterprise Risk Management

Слайд 8

4.1. Structure of Security Department Suggested solution (for whole produce process)

4.1. Structure of Security Department

Suggested solution (for whole produce process)
Head of

Security (including Internal Audit)


1. Senior Specialist of Economic Security
2. Specialist of Access control and CCTV
3. Specialist of Information Security
4. Specialist of Internal Audit
5. Specialist of Risk Management
takes duties of a part of functions if the employee is absent
(annual vacation or sick-list)

Слайд 9

4.2. Economic security/anticorruption Check of personnel Check of contractors Watching of

4.2. Economic security/anticorruption

Check of
personnel

Check of contractors

Watching of processes and collection

of data, information and documents.
Monitoring of all available resources.
Collection of data, information and documents about criminal records.
Anticorruption planning and anticorruption activity (including Antikickback, Bribery, Fraud, Steal, Financial crimes).
Analytical work.
Internal investigations.
Generalization of results.
Preparation of Report to General Director.

Economic Security

anticorruption

Слайд 10

4.2.1. Economic security/anticorruption Check of personnel Personnel Check of the hired

4.2.1. Economic security/anticorruption

Check of
personnel

Personnel
Check of the hired personnel.
Collection of

data, information and documents about criminal records.
Holding interview with TOP & Managers & other employees.
Relationships with Government Authorities (Internal Affairs Department, Federal Secret Service, Prosecutor`s Office, Federal Bailiff Services, Federal Prison Services, etc).
Relationships with operational level specialists level at Government Authorities.

Economic Security

Anti
corruption

Слайд 11

4.2.2. Economic security/anticorruption Contracts Counterparts Risks Contracts/Counterparts/Risks Updating, development and deployment

4.2.2. Economic security/anticorruption

Contracts
Counterparts
Risks

Contracts/Counterparts/Risks
Updating, development and deployment of new

functions and procedures.
Collection of data, information and documents about criminal records.
Verification of new agreements and contracts.
Check of the acting counterparts (documentary checks of activities of the entity).
Check of new counterparts (documentary checks of activities of the entity, visit in the location of offices, shops, warehouses, checks of founders (owners), top management of the entities regarding possible fraudulent schemes).

Economic Security

Anti
corruption

Слайд 12

4.2.3. Economic security/anticorruption Contracts Counterparts Risks Contracts/Counterparts/Risks Check of new counterparts

4.2.3. Economic security/anticorruption

Contracts
Counterparts
Risks

Contracts/Counterparts/Risks
Check of new counterparts (documentary checks

of activities of the entity).
Visits in companies locations.
Holding conversations with the staff of clients of suppliers.
Receipt of information. Holding conversations with the staff of other companies.
Relationship with stakeholders regarding identification of new risks, the project work.
Assessment of Regional Risk ratings for business.
Monitoring and analysis of the business-field including contractors.
Receivables (Debts). Collection of data, information and documents.
Conducting investigations.

Economic Security

Anti
corruption

Слайд 13

4.3. Information security/anticorruption Commer sial and Trade secrets Informa tion security

4.3. Information security/anticorruption

Commer
sial and Trade secrets

Informa
tion security

AntiDataLoss C&TS planning and AntiDataLoss

C&TS activity.
Monitoring of various resources and social media for identification of cases of disclosure of commercial and trade secrets.
Collection of data, information and documents about criminal records.
Control: internal and external traffic, ports of computers, use of passwords (including unauthorized use of passwords), etc.
Internal investigations.
Generalization of results.
Preparation of Report to General Director.

Economic Security

anticorruption

Слайд 14

4.4. Access control/CCTV CCTV Access control Updating, development and deployment of

4.4. Access control/CCTV

CCTV

Access control

Updating, development and deployment of new functions and

procedures Access control and CCTV.
Issue of electronic admittance cards for employees, visitors and contractors.
Examination of the arriving and departing staff and transport.
Control of entering of data into system.
Control of timely change of data in system.
Unloading of data.
Development of the access levels.
Control of the access levels.
Internal investigations.
Generalization of results.
Preparation of Report to General Director.

Economic Security

Safety and Security of property of the Company

Слайд 15

4.5. Security Service Provider (Guards) CCTV Access control Maintain relationship with

4.5. Security Service Provider (Guards)

CCTV

Access control

Maintain relationship with Director and Guards

of SSP.
Conducting spot checks of guards’ service (including weekend, holidays and night time shifts).
Conducting recurring (planned) checks of job and result of employees SSP (including weekend, holidays and night time shifts).
Check of compliance of conditions of agreements about SSP in a documentary part, control of timeliness and completeness of provision of services SSP.
Benchmark with other security service providers.
Collection of data, information and documents about criminal records.

Economic Security

Security
Service
Provider
(Guards)

Слайд 16

4.6.1. Control the incoming and outgoing of goods Staff Devices Procedures

4.6.1. Control the incoming and outgoing of goods

Staff

Devices

Procedures

Safety and Security of

property of the Company

Procedures
Availability of all procedures for staff.
Staff know and correctly use all procedures.
All procedures are relevant and are timely updated.

Слайд 17

4.6.2.Control the incoming and outgoing of goods Staff Devices Procedures Safety

4.6.2.Control the incoming and outgoing of goods

Staff

Devices

Procedures

Safety and Security of property

of the Company

Staff
We timely study our staff to all procedures.
Staff know and correctly use all procedures.
We check staff know procedures.

Слайд 18

4.6.3.Control the incoming and outgoing of goods Staff Devices Procedures Safety

4.6.3.Control the incoming and outgoing of goods

Staff

Devices

Procedures

Safety and Security of property

of the Company

Devices
Examination of transport and staff.
Check and reconciliation of serial numbers of spare parts and cars.
Use of stationary surveillance cameras, mobile surveillance cameras, models of surveillance cameras, of the hidden cameras of video surveillance.
Use of Special Devices for observation of the hidden cavities of vehicles on each GuardPost:
use of Special Search Mirrors on each GuardPost;
use of Endoscopes for observation of the hidden cavities of vehicles on each GuardPost.
Selective control of actions of employees SSP (Guards).
Use check-sheets, storage and the analysis the check-sheets.
Conducting of sudden checks (including at night and on the weekend).

Слайд 19

4.7. Emergency situation Procedures Trainings Emergency situations. Immediate response in case

4.7. Emergency situation

Procedures

Trainings

Emergency situations.
Immediate response in case of emergency situation (including

weekend, holidays, night time).
Urgent call to the responsible person and relevant State Bodies.
The responsible person for situation and undertakes measures for minimization of damage.
Relevant lists of responsibility persons for interaction in case of emergency situations
Procedures for Emergency situations.
Availability of all Emergency Procedures for our staff.
Staff know and correctly use all Emergency Procedures.
All Emergency Procedures are relevant and are timely updated.
Trainings for Emergency situations.
Development of trainings for Emergency situations.
Participates in training development.
Deliver training to department and section leaders.
Deliver trainings to staff members including staff of Guards.

Emergency situation

Safety and Security of
Property, Staff, Visitors of the Company

Слайд 20

4.8. Other Security Services Trainings Personal security. Escort of the guests

4.8. Other Security Services

Trainings

Personal security.
Escort of the guests (Top Management of

GWM, Government).
Interaction with State authorities.
Trainings.
Development of trainings.
Participates in training development.
Deliver training to department and section leaders.
Deliver trainings to staff members including staff of Guards.
Budgeting.
Planning and control of the budget of Security.

Budgeting

Personal
security

Слайд 21

5. Decision of General Director Approve Don`t approve

5. Decision of General Director

Approve
Don`t approve

Слайд 22

Notice: Laws and Regulations Basic Laws and Regulations (international and local)

Notice: Laws and Regulations


Basic Laws and Regulations
(international and

local)
ISO 26000 Guidance on Social Responsibility.
ISO/IEC 27000 ISMS Information security management systems.
ISO 28 000 SMS Security management systems for the supply chain.
ISO 31000 General guidelines for principles and implementation of risk management.
IEC/ ISO 31010 Risk management — Risk assessment techniques.
BS 31100 Risk management. Code of practice.
BS 25999 Business continuity management (part 1, part 2).
IEC 61160 Risk management. Formal design review.
ISO 19011:2011 Guidelines for auditing management systems.
etc.
notice: ISO -
International Organization for Standardization