ISO/PAS 20858:2004
(Main)Ships and marine technology - Maritime port facility security assessments and security plan development
Ships and marine technology - Maritime port facility security assessments and security plan development
ISO/PAS 20858:2004 establishes a framework to assist marine port facilities in specifying the competence of personnel to conduct a marine port facility security assessment and developing a security plan as required by the ISPS Code, conducting the marine port facility security assessment, and drafting a Port Facility Security Plan (PFSP). In addition, ISO/PAS 20858:2004 establishes certain documentation requirements designed to ensure that the process used in performing the duties described above was recorded in a manner that would permit independent verification by a qualified and authorized agency (if the port facility has agreed to the review).
Navires et technologie maritime — Évaluation de la sécurité des installations portuaires maritimes et réalisation de plans de sécurité
General Information
Relations
Frequently Asked Questions
ISO/PAS 20858:2004 is a technical specification published by the International Organization for Standardization (ISO). Its full title is "Ships and marine technology - Maritime port facility security assessments and security plan development". This standard covers: ISO/PAS 20858:2004 establishes a framework to assist marine port facilities in specifying the competence of personnel to conduct a marine port facility security assessment and developing a security plan as required by the ISPS Code, conducting the marine port facility security assessment, and drafting a Port Facility Security Plan (PFSP). In addition, ISO/PAS 20858:2004 establishes certain documentation requirements designed to ensure that the process used in performing the duties described above was recorded in a manner that would permit independent verification by a qualified and authorized agency (if the port facility has agreed to the review).
ISO/PAS 20858:2004 establishes a framework to assist marine port facilities in specifying the competence of personnel to conduct a marine port facility security assessment and developing a security plan as required by the ISPS Code, conducting the marine port facility security assessment, and drafting a Port Facility Security Plan (PFSP). In addition, ISO/PAS 20858:2004 establishes certain documentation requirements designed to ensure that the process used in performing the duties described above was recorded in a manner that would permit independent verification by a qualified and authorized agency (if the port facility has agreed to the review).
ISO/PAS 20858:2004 is classified under the following ICS (International Classification for Standards) categories: 47.020.99 - Other standards related to shipbuilding and marine structures. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/PAS 20858:2004 has the following relationships with other standards: It is inter standard links to ISO 20858:2007. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase ISO/PAS 20858:2004 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
PUBLICLY ISO/PAS
AVAILABLE 20858
SPECIFICATION
First edition
2004-07-01
Ships and marine technology — Maritime
port facility security assessments and
security plan development
Navires et technologie maritime — Évaluation de la sécurité des
installations portuaires maritimes et réalisation de plans de sécurité
Reference number
©
ISO 2004
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.
© ISO 2004
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO 2004 – All rights reserved
Contents Page
Foreword. v
Introduction . vi
1 Scope. 1
2 Conformance. 1
3 Terms and definitions. 1
4 Performance of the security assessment. 3
4.1 Overview of the security assessment. 3
4.2 Classification of consequences . 3
4.3 Personnel conducting the security assessment . 4
5 Security assessment procedures. 5
5.1 General. 5
5.2 Scope of the security assessment . 5
5.3 Current status of security at the port facility . 5
5.3.1 Identification of assets and infrastructure . 13
5.3.2 Consultations. 13
5.4 Threat scenarios and security Incidents . 14
5.5 Classification of consequences . 15
5.6 Classification of likelihood of security incidents . 15
5.7 Security incident scoring . 15
5.8 Countermeasures. 16
5.8.1 General. 16
5.8.2 Countermeasure exceptions. 16
6 Port Facility Security Plan. 16
6.1 General. 16
6.2 Prioritization of countermeasures. 16
6.3 Port Facility Security Plan contents. 17
6.3.1 General. 17
6.3.2 Table of contents . 17
6.3.3 Items in facility plot plan . 17
6.3.4 Security administration and organization of the port facility. 17
6.3.5 Port Facility Security Officer. 17
6.3.6 Changes in security levels. 18
6.3.7 Procedures for interfacing with ships . 18
6.3.8 Declaration of Security (DoS) . 18
6.3.9 Additional requirements for port facility receiving passenger ship at security level 1. 18
6.3.10 Communications. 18
6.3.11 Security systems and equipment maintenance.18
6.3.12 Security measures for access control, including designated public access areas . 18
6.3.13 Security measures for access control, including designated public access areas at
Security Level 2. 20
6.3.14 Security measures for access control, including designated public access areas at
Security Level 3. 20
6.3.15 Security measures for restricted areas . 20
6.3.16 Access to restricted areas . 20
6.3.17 Security measures for handling cargo at Security Level 2. 21
6.3.18 Security measures for delivery of ship's stores/spare parts and bunkers. 22
6.3.19 Security measures for monitoring . 22
6.3.20 Security incident procedures. 22
6.3.21 Additional requirements for passenger and ferry port facilities. 23
6.3.22 Additional requirements at cruise ship terminals.23
6.3.23 Audits and security plan amendments .24
6.3.24 Skills, knowledge and competencies of security and port facility personnel .24
6.3.25 Drills and exercises.26
7 Documentation.26
7.1 Safeguarding the documents.26
7.2 Port Facility Security Assessment report.26
7.3 Marine Port Facility Security Plan .27
7.4 Security operations and security training records.27
7.5 Retention of records .28
Bibliography.29
iv © ISO 2004 – All rights reserved
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies
(ISO member bodies). The work of preparing International Standards is normally carried out through ISO
technical committees. Each member body interested in a subject for which a technical committee has been
established has the right to be represented on that committee. International organizations, governmental and
non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the
International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of technical committees is to prepare International Standards. Draft International Standards
adopted by the technical committees are circulated to the member bodies for voting. Publication as an
International Standard requires approval by at least 75 % of the member bodies casting a vote.
In other circumstances, particularly when there is an urgent market requirement for such documents, a
technical committee may decide to publish other types of normative document:
an ISO Publicly Available Specification (ISO/PAS) represents an agreement between technical experts in
an ISO working group and is accepted for publication if it is approved by more than 50 % of the members
of the parent committee casting a vote;
an ISO Technical Specification (ISO/TS) represents an agreement between the members of a technical
committee and is accepted for publication if it is approved by 2/3 of the members of the committee casting
a vote.
An ISO/PAS or ISO/TS is reviewed after three years in order to decide whether it will be confirmed for a
further three years, revised to become an International Standard, or withdrawn. If the ISO/PAS or ISO/TS is
confirmed, it is reviewed again after a further three years, at which time it must either be transformed into an
International Standard or be withdrawn.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO/PAS 20858 was prepared by Technical Committee ISO/TC 8, Ships and marine technology,
Subcommittee SC 11, Intermodal and short sea shipping.
Introduction
This Publicly Available Specification addresses the execution of marine port facility security assessments,
development of marine port facility security plans (including countermeasures), and skills and knowledge
required of the personnel involved. This Publicly Available Specification is designed to ensure that the
completed work meets the requirements of the ISPS Code and appropriate maritime security practices that
can be verified by an outside auditor.
Users of this Publicly Available Specification are encouraged to submit their comments and revision
suggestions.
vi © ISO 2004 – All rights reserved
PUBLICLY AVAILABLE SPECIFICATION ISO/PAS 20858:2004(E)
Ships and marine technology — Maritime port facility security
assessments and security plan development
1 Scope
This Publicly Available Specification establishes a framework to assist marine port facilities in specifying the
competence of personnel to conduct a marine port facility security assessment and developing a security plan
as required by the ISPS Code, conducting the marine port facility security assessment, and drafting a Port
Facility Security Plan (PFSP).
In addition, this Publicly Available Specification establishes certain documentation requirements designed to
ensure that the process used in performing the duties described above was recorded in a manner that would
permit independent verification by a qualified and authorized agency (if the port facility has agreed to the
review). It is not an objective of this Publicly Available Specification to set standards for a contracting
government or designated authority in designating a Recognized Security Organization (RSO), or to impose
the use of an outside service provider or other third party to perform the marine port facility security
assessment or security plan if the port facility personnel possess the expertise outlined in this specification.
A port infrastructure that falls outside the security perimeter of a marine port facility might affect the security of
the facility/ship interface. This Publicly Available Specification does not address the requirements of the ISPS
Code relative to such infrastructures. However, ship operators may be informed that ports receiving cargo
from other ports that do use this Publicly Available Specification meet an industry-determined level of
adequate security and the ISPS Code. State governments have a duty to protect their populations and
infrastructures from marine incidents occurring outside their marine port facilities. These duties are outside the
scope of this Publicly Available Specification.
2 Conformance
While compliance with the International Ship and Port Facility Security (ISPS) Code is internationally
mandated for all signatory countries, the use of this Publicly Available Specification is voluntary. If a
contracting government establishes requirements that preclude the use of this Publicly Available Specification,
local law takes precedence and compliance with this Publicly Available Specification should not be claimed.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
cargo
items that are placed on the ship to be transported to another port, such as boxes, pallets, cargo transport
units, and bulk liquid and non-liquid matter
3.2
consequence
likely loss of life, damage to property, economic disruption (including disruption to transport systems) caused
by an attack on or at the marine port facility
3.3
International Maritime Organization
IMO
a specialized agency of the United Nations whose purpose is “to provide machinery for cooperation among
governments in the field of governmental regulation and practices relating to technical matters of all kinds
affecting shipping engaged in international trade; to encourage and facilitate the general adoption of the
highest practicable standards in matters concerning maritime safety, efficiency of navigation, and prevention
and control of marine pollution from ships.”
3.4
ISPS Code
the international code for the security of ships and port facilities consisting of Part A (the provisions of which
shall be treated as mandatory), and Part B (the provisions of which shall be treated as recommendatory), as
adopted on 12 December 2002 by Resolution 2 of the Conference of Contracting Governments to the
International Convention for the Safety at Sea, 1974, as may be amended by the Organization
3.5
likelihood
probability of a threat scenario becoming a security incident, considering the resistance that physical and
operational security measures in place at the marine port facility provide
3.6
marine port facility
those areas of the port and harbour where the ship/port interface takes place
NOTE 1 The ship/port interface means the interactions that occur when a ship is directly and immediately affected by
actions involving the movement of persons and/or goods, or the provisions of port services to and from the ship. This
includes areas such as anchorages, waiting berths, and approaches from seaward. The marine port facility extends
landside to the security perimeter. It should be noted that, for the purposes of this Publicly Available Specification, there
can be more than one marine port facility in a harbour. In that case, only the anchorages, waiting berths, and approaches
from seaward that are used to service the marine port facility using this Publicly Available Specification are included.
There can be areas of ports and harbours that are addressed in the ISPS Code, but that are not addressed in this Publicly
Available Specification.
NOTE 2 This Publicly Available Specification specifically addresses the marine port facility. Because other standards
may address non-marine port facilities and ship security, “marine” usually appears before port facilities in this Publicly
Available Specification.
3.7
Port Facility Security Plan
PFSP
a plan to ensure the application of measures designed to protect the people, port facility, ships, cargo, cargo
transport units, and ship stores within the port facility from the risks of a security incident
3.8
risk
a level of consequence and likelihood of occurrence of a security incident
3.9
security
resistance to intentional, unauthorized acts designed to cause harm or damage to ships and ports
3.10
security crisis management team
a group of people who have the knowledge and authority to bring the necessary resources to bear in the event
of an imminent security threat or actual security incident
3.11
security incident
any suspicious act or circumstance threatening the security of a ship or port facility
2 © ISO 2004 – All rights reserved
3.12
security personnel
individuals who have assigned security duties defined in the port facility and who may or may not be
employees
3.13
ship's stores
supplies and spare parts intended for use by a ship calling on a marine port facility
3.14
target
personnel, ships, cargo, physical assets, and control/documentation systems within a marine port facility
3.15
threat scenario
potential means by which a security incident might occur. Because attack methods are nearly infinite, several
general postulated threat scenarios are specified to address the full range of attack scenarios. Local
authorities, port facility management, and personnel conducting the security assessment may add more
specific threat scenarios to the list of general threat scenarios, depending on local circumstances
4 Performance of the security assessment
4.1 Overview of the security assessment
The principle intent of this clause is to provide informative guidance for the drafters, and later the users, of
PFSAs and their accompanying plans (PFSPs), to illustrate flow logic, originating from the conceptual need to
assess existing security, and produce a viable and threat-reducing plan.
The authorized maritime security group convened to compose the PFSA shall be collectively knowledgeable
in port/facility operations, security and the potential threats that could occur at the specific site. From their
experience and training, they shall review current conditions (using a provided Performance Review) and
produce a realistic list of threat scenarios that could adversely affect the facility. These potential security-
incidents shall be thoroughly studied, and then charted with regard to the likelihood of an occurrence and
subsequent consequences, should it occur. The resultant risk chart for each of these incidents shall indicate
which are of such gravity as to need effective human and/or physical countermeasures. The formulating team
will increasingly apply these countermeasures until the identified risk is reduced to an acceptable level
(meeting with the approval of the contracting government).
At this stage, the PFSA evolves into the PFSP. The aforementioned process is dealt with in more detail within
this document, and forms the route toward a site-specific facility plan. Although basically stated, nothing here
is intended to oversimplify the effort needed to construct a comprehensive quality plan. The above sequence
will establish a plan for effective security for the standard Security Level 1, following which the group will
reapply the countermeasures required for the higher Security Levels 2 and 3, as described herein. The
contracting government shall review and approve the prepared plan for submission to the IMO.
4.2 Classification of consequences
Care should be taken in establishing values of “high”, “medium” and “low” consequences. The use of
excessively low threshold values may result in the requirement that countermeasures be considered for more
threat scenarios than are needed. However, using excessively high threshold values may omit
countermeasures for threat scenarios involving consequences that the port facility or nation cannot afford.
A “high” consequence classification may be considered as a consequence that would be unacceptable in all
but low likelihood situations.
A “medium” classification of consequence may be considered as a consequence that would be unacceptable
in a high likelihood situation.
A “low” classification of consequence may be considered as a consequence that is normally acceptable.
Acceptability should not be confused with desirability or approval. Rather, acceptability could be considered as
a judgment of the amount of possible damage that a port facility or port state is willing to accept under certain
conditions related to probability. A nation may determine that the possibility of a certain level of damage may
be undesirable yet acceptable. The relative affluence of a port state can affect its acceptable threshold of
consequences. A less affluent nation might be unable to recover from the same level of damage than a more
affluent nation could, thus it would have a lower damage threshold. A more affluent nation may demand lower
threshold values for issues because of public opinion, for example, potential damage to the environment. A
developing nation may have to accept higher threshold values in spite of potential environmental damage.
4.3 Personnel conducting the security assessment
Those involved in a Port Facility Security Assessment (PFSA) shall be able to draw upon expert assistance
relative to
knowledge of current security threats and patterns,
recognition and detection of weapons, dangerous substances, and devices,
recognition, on a non-discriminatory basis, of characteristics and behavioral patterns of persons who are
likely to threaten security,
techniques used to circumvent security measures,
methods used to cause a security incident,
effects of explosives on structures and port facility services,
port business practices,
contingency planning, emergency preparedness, and response,
physical security measures (e.g. fences),
radio and telecommunications systems, including computer systems and networks,
transport and civil engineering,
ship and port operations,
maintenance of appropriate measures to avoid unauthorized disclosure of, or access to, sensitive security
material,
knowledge of the requirements in Chapter XI-2 and part A of the ISPS Code and relevant national and
international legislation and security requirements,
knowledge of security and surveillance equipment and systems, as well as their operational limitations.
All personnel involved in a PFSA, including those called on to provide the expertise listed above, shall be
listed in the Port Facility Security Assessment Report as specified in 6.2.
4 © ISO 2004 – All rights reserved
5 Security assessment procedures
5.1 General
A security assessment provides the basis for developing the Marine Port Facility Security Plan. The
methodology used in the assessment is not specified in this Publicly Available Specification. However, the
methodology used in the assessment shall meet the requirements of this Publicly Available Specification.
5.2 Scope of the security assessment
The scope of the assessment extends to those port facilities and port infrastructures that could be threatened
or be used to threaten maritime trade.
The port facility security assessment shall include, as a minimum, all areas
where port facility/ship operations are conducted within the port facility,
where cargo is staged, stowed or handled before/following marine transportation within the port facility,
where cargo documentation for marine transportation is handled/accessible within the port facility,
attached to the port facility without an intervening security perimeter, and
including ship channels used to approach the port facility.
5.3 Current status of security at the port facility
The person(s) conducting the security assessment shall review all current security operations and emergency
plans used by the port facility. All reviewed plans shall be listed. The person(s) conducting the security
assessment shall, in addition, conduct an on-site review of the port facility and surrounding vicinity. As a
minimum, the person(s) conducting the security assessment should examine and document items in the
following performance review list during the port facility security assessment.
This performance review list is not all-inclusive, nor does a negative indication concerning any specific factor
indicate that security is inadequate. Some items on the list are not appropriate for certain port facilities. The
performance review list is a generalized method for assessing the current status of a port facility’s security; it
is not intended to set security requirements.
A copy of the completed performance review list shall be included in the assessment report.
In the following Performance Review List, if the factor indicated is in effect at the port facility, the “yes” block
should be checked. If the factor is not in effect, the “no” block should be checked. If the factor is not applicable,
put “NA” in the “Comments” column (additional comment pages may be added as needed).
Factors Yes No Comments
Do the current port facility security documents address the following?
1 Security organization of the port facility
2 Organization's links with other relevant authorities and the necessary
communication systems to enable an effective, continuous operation of the
organization and its links with others, including ships in port
Basic Security Level 1 measures, both operational and physical, that will be in
place
4 Additional security measures that will enable the port facility to progress
without delay to Level 2 and, when necessary, to Level 3
5 Regular reviews or audits of the PFSP or its amendments in response to
current experiences or changing circumstances
6 Reporting procedures, including lists of appropriate contracting governments’
contact points
Role and structure of the port facility security organization
8 Duties, responsibilities, and training requirements of all port facility personnel
who have security roles, and the performance measures needed to assess
their effectiveness
9 Port facility security organization's links with other national or local authorities
with security responsibilities
10 Communication systems provided to enable effective and continuous
communication among port facility security personnel, ships in port, and when
appropriate, with national or local authorities with security responsibilities
11 Procedures or safeguards necessary to enable such continuous
communications to be maintained at all times
12 Procedures and practices to protect security-sensitive information held in
paper or electronic format
Maintenance frequency of security equipment and procedures to assess the
continuing effectiveness of security measures and equipment, including
identification of, and responses to, equipment failures or malfunctions
14 Procedures that require submission and assessments of reports relating to
possible breaches of security or security concerns
Procedures relating to traffic flow within the facility
16 Procedures covering the delivery of spare parts and ship's stores
17 Procedures to maintain and update records of dangerous goods and
hazardous substances, including their location within the port facility
18 Means of alerting and obtaining the services of waterside patrols and specialist
search teams, including bomb searches and underwater searches
Procedures for assisting ship security officers in confirming the identity of
those seeking to board the ship when requested
20 Procedures for facilitating shore leave for ship personnel or personnel
changes, as well as access of visitors to the ship (including representatives of
seafarers, welfare, and labour organizations)
6 © ISO 2004 – All rights reserved
Factors Yes No Comments
21 Procedures for internal and external notifications for the following (if
applicable):
bomb/terrorist threats
an actual explosion or detonation
fire on the port facility or berthed ship
hostage situation
civil disturbance/violent labour dispute
emergency evacuation
informing employees to/not to report to work
accounting for all personnel on the port facility, including their names
specific safety guidance on the proper use of fire arms by authorized
personnel in the port facility
Sketches of the port facility, access points, working areas, cargo stowage
areas
23 Security organization of the port facility
Are the following true for the organization and performance of port facility
security duties?
24 Security force is as described in the PFSP’s “Security Force” and is
adequately equipped with vehicles to patrol, respond to alarms and
emergencies, and maintain supervision.
Personnel with security roles or access to restricted areas have passed
background checks performed at the time of employment and periodically
thereafter. This has been documented and the process used explained.
26 Security personnel are provided with security updates at the beginning of each
work shift.
Security force orders are reviewed monthly and revised as needed.
28 Security personnel wear distinct/authoritative uniforms.
29 Security personnel patrols routinely cover all portions of the port facility,
including all exterior and principal interior access points.
30 Port facility has an organized/equipped security crisis management team or
local community has an organized/equipped crisis management team.
Procedures are in place to bring in additional security in an emergency or
crisis situation.
32 Liaison has been established between the port security officer and local
government.
33 Security personnel report their status to a designated contact during their
security patrols.
34 Security personnel assignments and patrol times and routes are varied to
prevent predictability.
Training records for security personnel are maintained.
36 Armed security personnel are properly trained in the use of force and weapons
and certified by appropriate authorities.
Vehicles intended for use in security patrols are conspicuously marked.
38 Only approved personnel are allowed to carry firearms.
39 Security force inspects security barriers and clear zones at least monthly.
Factors Yes No Comments
40 Records of security inspections are maintained and accessible to authorized
personnel.
If fitted, intrusion detection system signals are monitored at a central location
and a security response can be initiated from that point.
42 All external access points are guarded or secured and locked when not in use.
Security measures are in effect to protect electrical power supplies and
transmission facilities. (If equipped with an emergency generator, it should be
within a restricted area.)
44 Security measures are in effect to protect communications systems.
45 Non-compliance with the security plan is noted and remedial action is promptly
taken.
46 Security measures are in place where water bodies form part of the perimeter
barrier to prevent/detect illegal unauthorized access.
Port facility has effective after-hours/weekend restricted area security checks.
Access to the port facility
48 Perimeter fencing is adequate to prevent unauthorized entry and meets
recognized industry standards or government standards (explain which
standard).
49 If masonry or brick walls form part of the perimeter barrier, they are inspected
regularly for effectiveness.
50 Buildings, floors or roofs that form part of the perimeter barrier are
complemented by intrusion-detection equipment.
51 Perimeter fences/walls have a 3 m unobstructed zone on each side.
52 Access points through the perimeter are kept to the minimum needed for safe
and efficient operations.
53 Gates provide equivalent level of security as perimeter fencing.
54 Pass system is used to identify all personnel entering the port facility and
indicate their degrees of access to portions of the port facility.
55 Employees display passes when working in restricted areas.
56 Security personnel certify passes of bearers upon entry.
57 Personnel pass system is managed to prevent unauthorized issuance of
passes.
58 Lost passes are replaced with passes bearing different serial numbers.
59 Passes are designed to enable security and other personnel to recognize
individuals quickly and positively identify the authorizations and limitations
applicable to the bearer.
Pass procedures cover the resolution of queries by the pass checker.
61 Procedures ensure the return or disablement of passes upon termination of
employment or assignment.
Procedures are in place to control the whereabouts of visitors.
63 Procedures are in place to provide security for the port facility to meet
international agreements on the humane treatment of ship crews.
Truck drivers, vendors and other visitors are permitted access only to those
areas required to conduct their business; only authorized personnel are
permitted in warehouses.
8 © ISO 2004 – All rights reserved
Factors Yes No Comments
65 Permanent records of visitors, vendors, and truck drivers entering the port
facility are maintained and easily accessible by authorized personnel for a
defined period.
66 Random screening (at a minimum) of trucks for explosives and weapons are
made of vehicles entering the port facility.
67 If parking is allowed on the port facility, access to parking areas is supervised
and restricted by a pass system for all vehicles.
Parking-pass records that match personnel with pass number and motor
vehicle identification are maintained.
69 All vehicles are required to be parked in designated parking areas. Employees,
vendors and visitors going to or from parking areas are required to pass
through an area under the supervision of security personnel.
70 Parking for employees, dockworkers and visitors is at least 15 m away from
docks, wharfs and piers, and outside of fenced operational, cargo handling,
and designated storage areas.
71 Temporary parking passes are issued to vendors and visitors for parking in
designated areas.
All openings that permit access to the port facility (such as drainage ditches,
tunnels, manholes for sewers and utility access, and sidewalk elevators) are
properly secured.
Restricted areas within the facility
73 Restricted areas of the port facility have been designated in the port security
plan by the port facility operator.
74 All restricted-area access points are appropriately posted.
75 All restricted areas have clearly marked perimeters.
76 All restricted areas have pass systems and entrances and exits are guarded,
controlled, or closed and secured.
77 Only those personnel whose duties require access to information or equipment
are allowed within restricted areas.
78 Security personnel perform routine patrols of restricted areas.
79 At Security Level 2, procedures are in place to
enhance the effectiveness of barriers or fencing surrounding restricted
areas by using either patrols or automatic intrusion-detection devices,
reduce the number of access points to restricted areas and increase the
controls applied at the remaining accesses; restrict parking adjacent to
berthed ships,
increase supervision of personnel and cargo movement/storage in the
restricted areas,
continuously monitor and record surveillance equipment,
enhance the number and frequency of patrols, including waterside patrols
undertaken on the boundaries of restricted areas and within those areas,
establish and restrict access to areas adjacent to restricted areas, and
enforce restrictions on access by unauthorized craft to the waters
adjacent to ships using the port facility
80 At Security Level 3, procedures are in place to
set up additional restricted areas within the port facility in proximity to the
security incident or potential location of the security threat to which
access is denied, and
prepare for the searching of restricted areas as part of a search of all, or
part, of the port facility
Factors Yes No Comments
Handling of cargo
81 The port facility has measures in place that
prevent cargo tampering, and
prevent cargo that is not meant for carriage from being accepted and
stored within the port facility.
82 Security measures in place include inventory-control procedures at access
points to the port facility, once cargo within the port facility has been identified
as having been checked and accepted for loading onto a ship or for temporary
storage in a restricted area while awaiting loading. Cargo that does not have a
confirmed date for loading is clearly identified as such, segregated from cargo
to be loaded, or is prohibited from the port facility.
At Security Level 1
Cargo, cargo transport units, and cargo storage areas are routinely
checked within the port facility prior to and during cargo handling
operations.
Checks are performed to ensure that cargo entering the port facility
matches the delivery notes or equivalent cargo documentation.
Vehicle screenings for explosives and weapons are conducted.
When cargo enters the port facility, and upon storage there, checks are
conducted of the container seals that are used to prevent tampering.
84 Restricted areas are designated for the safe inspection of cargo.
85 Cargo stored in open areas within 3 m of a fence or port facility perimeter shall
be spaced to enable security personnel to see between the perimeter barrier
and the cargo, to minimize the use of stacked cargo to transit over the
perimeter barrier.
86 Cargo stored in warehouse facilities is properly stacked and placed so that
security personnel may observe it. (This will minimize areas where people can
hide.)
87 Cargo information and delivery orders for cargo, cargo transport units, and
containers are checked for accuracy and verified before acceptance.
88 Access to areas where documentation is processed is limited to authorized
personnel; ship documents are safeguarded from theft and documentation
fraud.
89 The placement of cargo on the port facility is controlled and all cargo can be
readily identified by security and management personnel.
90 Drivers entering the port facility are issued gate passes to control and identify
those authorized to pick up or deliver cargo.
Cargo is only released to drivers who have proper documentation and
authorization.
92 Before receiving a shipment, personnel processing delivery orders verify the
identity of the trucker and trucking company.
93 Cargo is moved directly from railcars or ships to storage facilities and directly
from storage facilities to railcars and ships.
94 The master flow and drain valves, and valves that would permit direct outward
flow of a bulk liquid or gas storage tank contents to the surface, are securely
locked in the closed position when in a non-operating or non-standby status.
95 The starter controls on all bulk liquid and gas transfer pumps are locked in the
“off” position, or located at a site accessible to authorized personnel only.
10 © ISO 2004 – All rights reserved
Factors Yes No Comments
96 Loading and unloading connections of pipelines, loading arms, or transfer
hoses are securely capped or blank-flanged when not in actual service or
standby service.
97 Security personnel are kept aware of locations of high-consequence and
dangerous goods. The following is an indicative list of such goods:
Class 1, Division 1.1 explosives
Class 1, Division 1.2 explosives
Class 1, Division 1.3 Compatibility Group C explosives
Class 1, Division 1.5 explosives
Class 2.1, flammable gases in bulk
Class 2.3, toxic gases (excluding aerosols)
Class 3, flammable liquids in bulk of packing Groups I and II
Class 3 and Class 4.1, desensitized explosives
Class 4.2, goods of Packing Group I in bulk
Class 4.3, goods of Packing Group I in bulk
Class 5.1, oxidizing liquids in bulk of Packing Group I
Class 5.1, perchlorates, ammonium nitrate, and ammonium ni
...








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...