ISO 27001:2022 A 5.5 Contact with authorities

Communication with the appropriate authorities must be kept open at all times. Processes should be put in place to define when and with whom officials should communicate and how identified information security violations will be reported as soon as possible by organisations.Organisations that have been attacked over the internet may compel authorities to take counter-measures. Maintaining these connections may also be required in information security to assist incident management or business continuity and contingency planning operations. Contacts with regulatory authorities are also beneficial in predicting and planning for any changes in the rules or regulations that the organisation must enforce. You can consider to contact with your data protection regulator that is likely mandated in law, utility companies for power and water, health and safety if relevant, fire departments for business continuity and incident management, perhaps your telecoms provider for routing if lines go down.You are going to have to ensure that:

  • you identify and document what authorities apply to you
  • in what circumstances you would contact them
  • how information security incidents should be reported if relevant
  • understand what expectations these authorities have, if any
  • include relevant contact steps in your incident management processes
  • include relevant contact steps in your business continuity and disaster recovery processes

A 5.5 Contact with authorities

Control

The organization should establish and maintain contact with relevant authorities.

Purpose

To ensure appropriate flow of information takes place with respect to information security between the organization and relevant legal, regulatory and supervisory authorities.

Guidance

The organization should specify when and by whom authorities (e.g. law enforcement, regulatory bodies, supervisory authorities) should be contacted and how identified information security incidents should be reported in a timely manner. Contacts with authorities should also be used to facilitate the understanding about the current and upcoming expectations of these authorities (e.g. applicable information security regulations).

Other information

Organizations under attack can request authorities to take action against the attack source. Maintaining such contacts can be a requirement to support information security incident management or the contingency planning and business continuity processes. Contacts with regulatory bodies are also useful to anticipate and prepare for upcoming changes in
relevant laws or regulations that affect the organization. Contacts with other authorities include utilities, emergency services, electricity suppliers and health and safety [e.g. fire departments (in
connection with business continuity), telecommunication providers (in connection with line routing and availability) and water suppliers (in connection with cooling facilities for equipment)].

The organization needs to maintain useful contact information with appropriate authorities.The purpose is to ensure appropriate flow of information take place with respect to information security between the organization and relevant legal, regulatory and supervisory authorities. An appropriate forum for dialogue and cooperation between the Company and relevant legal, regulatory and supervisory authorities must be in place.Obviously, with more significant organizations, the need for this is greater as the interruption of service to a larger part of the population increases. Particularly relevant to utilities, telecoms, banking organizations, and emergency services (and for smaller companies these might be on your list). It covers the requirement, purpose and implementation instructions on how to identify and report information security events in a timely way, as well as who and how to contact in the event of an incident.Where attacks stem from the internet various authorities and providers may need to be called to action in order to divert /suppress/mitigate the threat. You can’t fix everything, but you can be ready should the need arise. This will help with business continuity and security incident management. The objective is to identify which stakeholders (e.g., law enforcement, regulatory bodies, supervisory authorities) would need to be contacted in the event of a security event. It is important that you have already identified these stakeholders before an incident occurs.A protocol for engagement with law enforcement can be a part of the security incident response plan or a broader crisis management procedure for the organization. The plan should be clear about which situations require working with law enforcement, such as when laws are broken. The plan should also clearly state who contacts authorities and under what circumstances (e.g., when law enforcement should be contacted by the information security officer or safety officer). Contact with Authorities means that the organisation should establish and implement informal communication with authorities concerning information security issues, including:

  • Ongoing communication with relevant authorities to ensure that the organisation is aware of current threats and vulnerabilities.
  • Informing relevant authorities of vulnerabilities discovered in the organisation’s products, services or systems.
  • Receiving information from relevant authorities about threats and vulnerabilities.

The main objective of control is to establish the organisation’s relationship with law enforcement agencies as it relates to managing information security risks.To meet the requirements, it is expected that if an information security incident is discovered, the organisation should specify when and by which authorities (such as law enforcement, regulatory bodies, and supervisory authorities) should be notified, as well as how identified information security incidents are to be reported in a timely manner. The exchange of information with authorities should also be used to gain a better knowledge of the existing and forthcoming expectations of these agencies (e.g. applicable information security regulations). This requirement is designed to ensure that the organisation has a coherent strategy for its relationship with law enforcement agencies and that it has identified the most appropriate point of contact in these agencies. Contacts with regulatory bodies are also useful to anticipate and prepare for upcoming changes in relevant laws or regulations that affect the organisation.

Appropriate contacts with relevant authorities must be maintained and the legal responsibilities for contacting authorities such as the Police, the Information Commissioner’s Office or other regulatory bodies should always be continued particularly relevant to utilities, telecoms, banking organisations and the emergency services. Where attacks stem from the internet various authorities and providers may need to be called to action in order to divert /suppress / mitigate the threat. All authorities can be listed and retained in an appropriately shared and access controlled repository.
The ISMS coordinator can keep records up to date and identify which and when contact is made by the appropriate relationship owner with specific contact circumstances, and the nature of the information provided. It should clearly identify who is responsible for contacting authorities (e.g. law enforcement, regulatory bodies, supervisory authorities), which authorities should be contacted (e.g. which region/country), and in what cases this needs to happen. Specification of the manner and timing in which breaches shall be communicated to external authorities so as to ensure appropriate reporting.

.


ISO 27001:2022 A 5.3 Segregation of Duties

The purpose of segregation of duties in ISO 27001 is to ensure that a single point of compromise does not have significant impacts on the business.Conflicts can occur when two or more employees have similar or different responsibilities towards a particular task. When this happens, the employees may end up doing the same thing twice, or doing different things that cancel out each other’s efforts. This wastes corporate resources and reduces productivity, which affects both the company’s bottom line and morale.In order to make sure that your organisation does not suffer from this problem, it is important to understand what conflicting areas of responsibilities are, why they happen and how you can prevent them from occurring in your organisation. For the most part, this means separating duties so that different people handle different roles in the organisation.

Conflicting duties and areas of responsibility must be segregated in order to reduce the opportunities for unauthorized or unintentional modification or misuse of any of the organisation’s assets.The risk being that if a single post is responsible for highly privileged actions and is not monitored or controlled, then compromise of that role could result in disastrous impacts to the organisation. For example, malicious system or network admins managing the network could greatly disrupt or leak highly sensitive data if not controlled and monitored through controls. The organisation needs to ask itself whether or not the segregation of duties been considered and implemented where appropriate.To be compliant with this requirement, the organisation must be able to demonstrate that highly privileged role functions and conflicting duties/areas of responsibility are sufficiently segregated. For example, this may be achieved by providing additional layers of authorization for privileged tasks such as issuing or revoking user accounts, or system management functions. A two-man rule might be appropriate in certain circumstances, in others it may be appropriate to provide an extra layer of authorization before a task can be carried out supported by enhanced monitoring of user operations. This provides a defense in depth approach and means that any unauthorized activity can be tracked, monitored and alerted upon.

A 5.3 Segregation of Duties

Control

Conflicting duties and conflicting areas of responsibility should be segregated.

Purpose

To reduce the risk of fraud, error and bypassing of information security controls.

ISO 27002 Implementation Guidance

Segregation of duties and areas of responsibility aims to separate conflicting duties between different individuals in order to prevent one individual from executing potential conflicting duties on their own. The organization should determine which duties and areas of responsibility need to be segregated. The following are examples of activities that can require segregation:

  1. initiating, approving and executing a change;
  2. requesting, approving and implementing access rights;
  3. designing, implementing and reviewing code;
  4. developing software and administering production systems;
  5. using and administering applications;
  6. using applications and administering databases;
  7. designing, auditing and assuring information security controls.

The possibility of collusion should be considered in designing the segregation controls. Small organizations can find segregation of duties difficult to achieve, but the principle should be applied as far as is possible and practicable. Whenever it is difficult to segregate, other controls should be considered, such as monitoring of activities, audit trails and management supervision. Care should be taken when using role-based access control systems to ensure that persons are not granted conflicting roles. When there is a large number of roles, the organization should consider using
automated tools to identify conflicts and facilitate their removal. Roles should be carefully defined and provisioned to minimize access problems if a role is removed or reassigned.

Segregation of duties reduces the risk of intentional manipulation or error and increases the element of checking. Functions that should be separated include those of authorization, execution, custody, and recording and, in the case of a computer-based accounting system, systems development, and daily operations. Segregation of duties is the concept of having more than one person required to complete a task. Today’s automated solutions and information and communication technologies allow a few people to handle a great deal of information and processes (e.g., stock exchange operators and air traffic controllers). While this is good to improve productivity, a potential side effect is that these few people may end up gathering excessive knowledge and/or privilege over the operating environment and, in case they are absent or have malicious intent, this can prove to be an unacceptable risk, which must be handled.  This is a best practice, especially in cases where sensitive data is being handled. This is seemingly obvious, but often difficult to do in practice. Essentially try to eliminate processes or situations where someone can access, change or use information assets without detection. For example network access and logging should be conducted by someone different from those authorized to use the data. If in doubt – no-one holds the keys to something from which they could gain.

Segregation of duties is a control put in place by many organizations to mitigate the risk of an insider threat or accidental employee mistakes. Sometimes this isn’t practical or possible, but the institution should be aware of the risks of a single person having too much access. Ideally, critical processes or activities should be split up between multiple people. For example, the initiation of a process, its execution, and authorization should be separated when possible. When this is not possible, monitoring and auditing critical processes are very important. Segregation of duties refers to practices where the knowledge and/or privileges needed to complete a process are broken up and divided among multiple users so that no single one is capable of performing or controlling it by himself.

The main reason to apply segregation of duties is to prevent the perpetration and concealment of fraud and error in the normal course of the activities, since having more than one person to perform a task minimizes the opportunity of wrongdoing and increases the chances to detect it, as well as to detect unintentional errors. Wrongdoing requires three factors to be possible: means, motive, and opportunity. Extremely lean processes increase the risk of wrongdoing by concentrating means and opportunity (access to and privileges over the process). By implementing segregation of duties, an organization minimizes the risk by splitting knowledge and privileges. However, the benefits of segregation of duties to security must be balanced with the increased cost/effort required. By using the ISO 27001 requirements for risk assessment, an organization can identify the most vulnerable and the most mission-critical elements of the business to which segregation of duties will represent real added value to the business and other interested parties.

The principles that can be applicable to segregation of duties are:

  • Sequential separation, when an activity is broken into steps performed by different persons (e.g., solicitation, authorization and implementation of access rights)
  • Individual separation, when at least two persons must approve an activity before it is done (e.g., contractor payment)
  • Spatial separation, when different activities are performed in different locations (e.g., locations to receive and store raw material)
  • Factorial separation, when several factors contribute to activity completion (e.g., two-factor access authentication).

These principles can be used in isolation or together, depending upon the security an organization requires to protect its processes.

Segregation can be implemented by:

  1. 1.Identification of functions that are indispensable to the organization’s activities, and potentially subject to abuse, considering either business drivers or regulatory compliance (e.g., SOX)
  2. 2.Division of the function into separate steps, either considering the knowledge necessary for the function to work or the privileges that enable that function to be abused
  3. Definition of one or more segregation principles to be applied to the functions. Examples of functions and segregation principles to be applied are:
  • authorization function (e.g., two people need to authorize a payment)
  • documentation function (e.g., one person creates a document and another approves it)
  • custody of assets (e.g., backup media creation and storage in different sites)
  • reconciliation or audit (e.g., one person takes inventory and another validates it )

Sometimes the segregation of duties is impractical because the organization is too small to designate functions to different persons. In other cases, breaking down tasks can reduce business efficiency and increase costs, complexity, and staffing requirements. In these situations, compensating controls should be in place to ensure that even without segregation of duties the identified risks are properly handled. Examples of compensating controls are:

  1. Monitoring activities: these allow activities to be supervised while in progress, as a way to ensure they are being properly performed.
  2. Audit trails: these enable the organization to recreate the actual events from the starting point to its current status (e.g., who initiated the event, the time of day and date, etc.).

ISO 27001:2022 A 5.2 Information security roles and responsibilities

All information security and its responsibilities need to be defined and approved by the management. The responsibilities can be general (e.g. protecting information) or specific (e.g. the responsibility for accessing particular permissions). Consideration should be given to the ownership of information assets or groups of assets when identifying responsibilities. Access to information security should be granted to relevant staff members for eg; CEOs, Business Owners, General Manager; HR managers; and Internal auditors. The auditor will be looking to gain confidence that the organization has made clear who is responsible for, and what is adequate according to the size and nature of the organization. For smaller organisations, it is generally unrealistic to have full-time roles associated with these roles and responsibilities. To protect information security one can choose relevant authority with in the organisation to-hold the responsibly and implementing the process.

A.5.2 Information security roles and responsibilities

Control

Information security roles and responsibilities should be defined and allocated according to the organization needs.

Purpose

To establish a defined, approved and understood structure for the implementation, operation and management of information security within the organization.

ISO 27002 Implementation Guidance

Allocation of information security roles and responsibilities should be done in accordance with the information security policy and topic-specific policies. The organization should define and manage responsibilities for:

  1. protection of information and other associated assets;
  2. carrying out specific information security processes;
  3. information security risk management activities and in particular acceptance of residual risks (e.g. to risk owners);
  4. all personnel using an organization’s information and other associated assets.

These responsibilities should be supplemented, where necessary, with more detailed guidance for specific sites and information processing facilities. Individuals with allocated information security responsibilities can assign security tasks to others. However, they remain accountable and should determine that any delegated tasks have been correctly performed.
Each security area for which individuals are responsible should be defined, documented and communicated. Authorization levels should be defined and documented. Individuals who take on a specific information security role should be competent in the knowledge and skills required by the role and should be supported to keep up to date with developments related to the role and required in order to fulfill the responsibilities of the role.

Other information

Many organizations appoint an information security manager to take overall responsibility for the development and implementation of information security and to support the identification of risks and mitigating controls. However, responsibility for resourcing and implementing the controls often remains with individual managers. One common practice is to appoint an owner for each asset who then becomes responsible for its day-to-day protection. Depending on the size and resourcing of an organization, information security can be covered by dedicated roles or duties carried out in addition to existing roles.

All information security responsibilities need to be defined and allocated. Information security responsibilities can be general (e.g. protecting information) and/or specific (e.g. the responsibility for granting a particular permission). Information security is the responsibility of everyone at the organization. It is important to establish roles and responsibilities for staff, managers, and contractors/vendors so that everyone knows what is expected of them when handling information.Consideration should be given to the ownership of information assets or groups of assets when identifying responsibilities. Some examples of the business roles which are likely to have some information security relevance include; Departmental heads; Business process owners; Facilities manager; HR manager; and Internal Auditor. Leadership is also very important, and many institutions have at least one person who is primarily responsible for organizing the information security program. Typically this is a Chief Information Security Officer (CISO), Information Security Officer (ISO), Director of Information Security, although the title may vary depending on the Organization.As such, clarifying specific information security responsibilities within existing job roles is important e.g. the Operations Director or CEO might also be the equivalent of the CISO, the Chief Information Security Officer, with overarching responsibility for all of the ISMS. The CTO might own all the technology related information assets etc. No matter what title is selected, there should be someone at the organization who can provide a high level of decision-making support to leadership when considering information security issues and solutions. It is also important to establish data ownership and data handling roles (e.g., data owners, stewards, custodians, and users). Many institutions formally identify and document these roles within their information security policies and data management frameworks. The auditor will be looking to gain assurance that the organisation has made clear who is responsible for what in an adequate and proportionate manner according to the size and nature of the organisation.

Here are some of the vital IT security roles and the responsibilities associated with them. Don’t be surprised that sometimes, different roles share some responsibilities.

1) Information Security Board of Review

The Information Security Board of Review (ISBR) may an appointed administrative authority whose role is to provide oversight and direction regarding information systems security and privacy assurance campus-wide. In collaboration with the Chief Information Officer (CIO), the ISBR’s specific oversight responsibilities include the following:

  • Oversee the development, implementation, and maintenance of a strategic information systems security plan.
  • Oversee the development, implementation, and enforcement of information systems security policy and related recommended guidelines, operating procedures, and technical standards.
  • Oversee the process of handling requested policy exceptions
  • Advise the management on related risk issues and recommend appropriate actions in support of the risk management programs.

2) CISO

A CISO (Chief Information Security Officer) is the one whose task is to oversee corporate security strategy. The typical CISO’s responsibilities include:

  1. Planning long-term security strategy
  2. Planning and implementing data loss prevention measures
  3. Managing access
  4. Ensuring that the company implements proper safeguards to meet compliance requirements
  5. Investigating any incidents and preventing them in the future
  6. Assessing security risk
  7. Arranging security awareness training

3) Security and Information Compliance Officers

The Security and Information Compliance Officers may oversee the development and implementation of the ISP. Specific responsibilities can include:

  • To ensure related compliance requirements are addressed, e.g., privacy, security, and administrative regulations associated with federal and state laws.
  • To ensure appropriate risk mitigation and control processes for security incidents as required.
  • To document and disseminate information security policies, procedures, and guidelines
  • To coordinate the development and implementation of a information security training and awareness program
  • To coordinate a response to actual or suspected breaches in the confidentiality, integrity or availability of information assets.

4) Data Owner

A Data Owner is an individual or group or people who have been officially designated as accountable for specific data that is transmitted, used, and stored on a system or systems within a department, location or administrative unit .The role of the data custodians is to provide direct authority and control over the management and use of specific information. These individuals might be department heads, managers, supervisors, or designated staff. Responsibilities of a Data Owner include the following:

  1. Ensure compliance with Organizational polices and all regulatory requirements. Data Owners need to understand whether or not any Organizational policies govern their information assets. Data Owners are responsible for having an understanding of legal and contractual obligations surrounding information assets within their functional areas.
  2. Assign an appropriate classification to information assets. All information assets are to be classified based upon its level of sensitivity, value and criticality to the Organization.
  3. Determine appropriate criteria for obtaining access to sensitive information assets. A Data Owner is accountable for who has access to information assets within their functional areas. This does not imply that a Data Owner is responsible for day-to- day provisioning of access. Provisioning access is the responsibility of a Data Custodian.
  4. A Data Owner may decide to review and authorize each access request individually or may define a set of rules that determine who is eligible for access based on business function, support role, etc. Access must be granted based on the principles of least privilege as well as separation of duties. For example, a simple rule may be that all staff members are permitted access to their own health benefits information. A Data Custodian should document these rules in a manner that allows little or no room for interpretation.
  5. Approve standards and procedures related to management of information assets.While it is the responsibility of the Data Custodian to develop and implement operational procedures, it is the Data Owner’s responsibility to review and approve these standards and procedures. A Data Owner should consider the classification of the data and associated risk tolerance when reviewing and approving these standards and procedures. For example, high risk and/or highly sensitive data may warrant more comprehensive documentation and, similarly, a more formal review and approval process.
  6. Understand how information assets are stored, processed, and transmitted.Understanding and documenting how information assets are being stored, processed and transmitted is the first step toward safeguarding that data. Without this knowledge, it is difficult to implement or validate safeguards in an effective manner. One method of performing this assessment is to create a data flow diagram for a subset of data that illustrates the system(s) storing the data, how the data is being processed and how the data traverses the network. Data flow diagrams can also illustrate security controls as they are implemented. Regardless of approach, documentation should exist and be made available to the appropriate Data Owner.
  7. Implement appropriate physical and technical safeguards to protect the confidentiality, integrity and availability of information assets. Data Custodians should work with Data Owners to gain a better understanding of these requirements. Data Custodians should also document what security controls have been implemented and where gaps exist in current controls. This documentation should be made available to the appropriate Data Owner.
  8. Document and disseminate administrative and operational procedures to ensure consistent storage, processing and transmission of information assets. Documenting administrative and operational procedures goes hand in hand with understanding how data is stored, processed and transmitted. Data Custodians should document as many repeatable processes as possible. This will help ensure that information assets are handled in a consistent manner and will also help ensure that safeguards are being effectively leveraged.
  9. Provision and de-provision access as authorized by the Data Owner. Data Custodians are responsible for provisioning and de-provisioning access based on criteria established by the appropriate Data Owner.
  10. Understand and report security risks and how they impact the confidentiality, integrity and availability of information assets. Data Custodians need to have a thorough understanding of security risks impacting their information assets. For example, storing or transmitting sensitive data in an unencrypted form is a security risk. Protecting access to data using a weak password and/or not patching vulnerability’s in a system or application are both examples of security risks.
  11. Security risks need to be documented and reviewed with the appropriate Data Owner so that he or she can determine whether greater resources need to be devoted to mitigating these risks. Information Technology dept can assist Data Custodians with gaining a better understanding of their security risks.

5) Data Users

All users have a critical role in the effort to protect and maintain information systems and data. For the purpose of information security, a Data User is any employee, contractor or third-party provider of the who is authorized to access Information Systems and/or information assets. Responsibilities of data users include the following:

  1. Adhere to policies, guidelines and procedures pertaining to the protection of information assets.
  2. Users are also required to follow all specific policies, guidelines, and procedures established with which they are associated and that have provided them with access privileges.
  3. Report actual or suspected security and/or policy violations or breaches to IT. During the course of day-to-day operations, users may come across a situation where they feel the security of information assets might be at risk. For example, a user comes across sensitive information on a website that he or she feels shouldn’t be accessible. If this happens, it is the users responsibly to report the situation.

6) Application Security Engineer

The job of an app security engineer has two major aspects. Firstly, you will need to help developers to create more secure apps. Secondly, you’ll need to control third-party apps used by your company and ensure their safety. Some of the typical responsibilities and tasks include:

  • Configuring technical security controls
  • Conducting an app risk assessment
  • Whitelisting/blacklisting apps
  • Performing penetration testing

For app security engineers, it’s vital to control SaaS apps and the risks related to them. Risky and insecure apps should be blacklisted. To automate the job and remain time-efficient, he will probably need specialized software that helps with app security assessment and whitelisting/blacklisting.

7) Data Protection Officer(DPO)

Having a DPO may be one of the compliance requirements. A DPO must be appointed in organizations working with large-scale systematic monitoring or processing of sensitive data. Officers oversee corporate data protection measures and their effectiveness. A specialist, appointed to the DPO role, controls whether corporate security is of a sufficient level to meet compliance requirements, and recommends security upgrades if needed. That’s why an in-depth understanding of data security and compliance are essential skills. The DPO orchestrates, manages, and supervises all the activities that are aimed at protecting users’ data and communicates the status to both internal and external parties. This includes:

  • Creating an effective step-by-step privacy program
  • Supervising the entire implementation process of the program at all stages
  • Assuring that all the data processes are being conducted
  • Reporting to the management, stakeholders, and all the parties involved on how the implementation process goes
  • Reporting to the management on the potential threats to data security and general integrity, and what can be done to eliminate them
  • Educating employees on the matters of data privacy and data protection
  • Training staff that is directly related to or involved in the data collection, processing, or storing
  • Keeping track of and recording all the operations that involve users’ personal data and the reasons for these operations to take place
  • Auditing the data processes to assess their performance and address possible problems proactively
  • Reporting on the progress of the implementation and maintenance of the data privacy program in the company to the authorities, stakeholders, and public/customers
  • Being a connective link between the organization and data subjects (users/customers). Communicating with data subjects on how their data are being handled, what rights do they have, and addressing all their requests concerning their data
  • Communicating with supervisors and being a connecting link between the organization and authorities

8)Network Security Engineer

As the name suggests, a network security engineer’s job is to protect corporate networks from data breaches, human error, or cyberattacks. Engineers are responsible for:

  • Configuring network security settings
  • Performing penetration testing
  • Developing and implementing sufficient measures to detect cyber threats
  • Implementing network security policies
  • Installing and maintaining security software like firewalls or backups
  • Also, a deep understanding of cloud security may be required.

9)Security Administrator

An IT security admin is a role that includes a wide range of skills and responsibilities to manage the protection of the company’s data. Some of the most common admin’s responsibilities include:

  • Managing access
  • Ensuring that data migration is secure
  • Configuring security software
  • Monitoring data behavior for abnormal activities
  • Implementing security policies
  • Testing company’s systems to locate potential risks and vulnerabilities
  • Reporting security statuses and incidents (if any)
  • Using software tools to automate some of the tasks

An admin’s role is more significant than it may seem at first glance. An admin has to keep the whole organization’s security landscape in mind and ensure that even the tiniest processes are executed correctly. After all, even one careless click may be enough to initiate a cyberattack.

10) Security Analyst

What is the role of an information security analyst? This role is related to protecting corporate information against cyber attacks and insider threats. Generally, an analyst has to determine potential risks and vulnerabilities inside the system, so a deep understanding of data security threats and ways to prevent them is a must. As a security analyst, your responsibilities will include:

  • Analyzing and configuring corporate systems to improve their security
  • Analyzing data loss prevention measures
  • Looking for system vulnerabilities and ways to fix them
  • Monitoring data behavior for abnormal activities
  • Verifying security, availability, and confidentiality of corporate data
  • Also, the security analyst’s role requires an understanding of white hat hacking to design more advanced protection against cyber attacks. Analysts often work together with security architects.

11) Security Architect

A security architect is one of the senior-level IT security positions. An architect is focused on creating a secure-by-design environment. Unsurprisingly, this position requires a solid understanding of network, app, and hardware security, as well as experience with various systems. Generally, an architect’s responsibilities include:

  • Assessing the system’s security controls and processes to find potential security gaps
  • Planning changes and upgrades for corporate IT infrastructure
  • Maintaining system integrity
  • Implementing insider threat control measures
  • Choosing new security software if needed
  • Implementing disaster recovery measures
  • Analyzing previous incidents and creating an incident response plan
  • Analyzing the costs and benefits of security solutions

Of course, the exact scope of your tasks as an architect will vary depending on each organization’s unique infrastructure and needs. Often, an architect needs to assess corporate systems for meeting security compliance standards to decide what changes are needed to become compliant.

12) Security Specialist

An IT security specialist is a person responsible for keeping corporate data safe. Security specialists maintain and upgrade systems and procedures to prevent data loss or leakage. IT specialists have many sub-specializations. Depending on a specific environment, an information security specialist will have a stronger focus on cloud, network, app, database or device security. In some cases, especially in small businesses, an IT security specialist is an all-rounder with responsibilities combining many cyber security roles at the same time. That’s why a security specialist must have strong IT skills and a deep understanding of both software and hardware—and, of course, an ability to locate potential vulnerabilities and fix them.

ISO 9001 Example of Risk assessment

Risk assessment of MR department

Process FunctionPotential Failure ModePotential Effect(s) of FailuresseverityClassPotential Cause(s)/Mechanism(s) of FailuresOccurCurrent Process Controls PreventionCurrent Process Controls DetectionDetectRPNRecommended Action(s)Responsibility & Target Completion DateAction TakenSeverityOccurrenceDetectionRPN
Quality Management System & ImplementationExternal origin standards are not updatedAffects the quality and system3SCLack of checking in the new standards3Master list of external origin standards to be updated regularly.Master list of external origin standards are reviewed by MR frequently545
Quality Management System & ImplementationMaster lists are not maintained properlyAffects the system3SCLack of awareness4Master lists to be updated regularly.Master list are reviewed by MR frequently448
Quality Management System & ImplementationUnintended use of obsolete documentsAffects the system4CCObsolete documents are not removed from all points of use4Obsolete documents are identified and seperatedBy frequent checking580“Obsolete copy” is stamped in all obsolete documents for easy identificationManagement RepresentativeAction taken to be verified after three months43448
Quality Management System & ImplementationMRM not conducted at regular intervalsAffects the system3SCImproper communication4To follow the MRM planVerifying the conduction of MRM periodically336
Quality Management System & ImplementationInternal Audits not conducted on timeQuality system failure4SCAudit plan not followed2to follow the audit planReview of audit report18
Quality Management System & ImplementationManagement of change not doneAffect the system4SCLack of awareness3monitoring in review meetingsby reviewing the minutes of meeting336
Quality Management System & ImplementationNCR’s not closed on timeaffect the system4SCRoot cause analysis not done properly2Updated NCR tracking sheetperiodic review of NCR tracking sheet432

Risk assessment of HR department

Process FunctionPotential Failure ModePotential Effect(s) of FailuressevClassPotential Cause(s)/Mechanism(s) of FailuresOccurCurrent Process Controls PreventionCurrent Process Controls DetectionDetectRPNRecommended Action(s)Responsibility & Target Completion DateAction TakenSevOccDetRPN
Human Resources – CompetencyTraining not conducted properlyAffects the quality and system4SCImproper planning for training3Training to be planned appropriately and updated in the Annual Training CalendarVerified by Top management448
Human Resources – CompetencyNon availability of competent personnel (or) Selecting unskilled personnelAffects the quality and system5CCCompetence requirements are not defined for recruitment4Personnel recruited based on defined competence requirementsVerifying the personnel competence by process heads5100Competency standard to be defined before the recruitment processHuman Resource personnelAction taken to be verified after three months53460
Human Resources – CompetencyDecrease in employee efficiencyAffects the delivery3SCImproper communication and Employee not motivated4Motivate the employee through meetings to improve their efficiencyBy reviewing the operator efficency reports.448
Human Resources – CompetencyUpdation of Legal and other applicable requirement are not doneAffects the system4SCLegal requirements are not checked periodically3Monitoring the master list of Statutory and Regulatory requirements regularlyVerified by Top management560
Human Resources – CompetencyResidency not renewed on timeAffects the operations & planning4SCnot reviewing employee file periodically4residency to be processed on timeMonitoring of the employee file regularly232

Risk assessment of Sales

Process FunctionPotential Failure ModePotential Effect(s) of FailuressevClassPotential Cause(s)/Mechanism(s) of FailuresOccurCurrent Process Controls PreventionCurrent Process Controls DetectionDetectRPNRecommended Action(s)Responsibility & Target Completion DateAction TakenSevOccDetRPN
SalesWrong entry of size designationAffects the quality3SCType Error3Reviewing of Customers’ purchase order by Commercial officerDaily review of SOS order in plan usage436
SalesOrder without contract reviewAffects the quality and delivery4SCDelay in releasing contract review3Perform contract review as soon as possible once the job is completedVerified during operations planning336
SalesPSL Level, H2S Level, Material class, Temp not specified in customer POAffects the quality3SCCustomer requirements not clearly identified in the purchase order3Reviewing of customer purchase order against product requirements by Commercial officerReview of requirements in Contract Review436
SalesDelivery date committed without proper planningAffects the Delivery4SCDate committed based on Customer requirements3Review the Customer Requirements against Purchase Order by Commercial officerDuring operations planning448
SalesWrong delivery addressAffects the Delivery4SCType error and destination not reviewed2Reviewing of delivery information against purchase order before disptachReview before dispatch540
SalesDelay in invoicing of the jobAffects the cash flow2SCcommmunation gap1Communication through proper channelkeep record of all completed jobs in job register510
Salesno proper communication of the customer requirementDelay in quotation submission4SCNo proper follow up3monitoring & follow up of all enquiriesDaily review of enquiry register560
SalesCustomer complaints not handled properlyLoss of customer4SCpoor internal communication1Communication through proper channelproper communication to avoid complaints28

Risk assessment of Design

Process FunctionPotential Failure ModePotential Effect(s) of FailuressevClassPotential Cause(s)/Mechanism(s) of FailuresOccurCurrent Process Controls PreventionCurrent Process Controls DetectionDetectRPNRecommended Action(s)Responsibility & Target Completion DateAction TakenSevOccDetRPN
DesignError in design inputsAffects the product quality4SCInadequate operating conditions3Design inputs are to be reviewed based on the customer or standard requirements before performing the process to prevent errors.During design input review448
DesignInadequate design outputsAffects the product quality and delivery4SCRelevant personnel was not aware about the requirements3Training to be given to the concerned personnel.During design output review336
DesignError in drawingAffects the product quality5CCNecessary details not mentioned properly in the drawing4Verification of the drawing to be done before issue.During design output review5100During design output Machine shop Manager shall ensure that adequate details are available in the drawing and to be verified as per given the requirements.Machine shop ManagerActions taken verified53460
DesignPersonnel competencyAffects the product quality4CCFailure in design3Training to be given to the concerned personnel.During design output review448
DesignSelection of materialAffect the product integrity4CCProduct non conformance4Specifications / MTCs shall be reviewed during the design inputDuring design input review348
DesignTolerance level not mentioned properlyAffects the product quality4SCHuman error3All the design outputs are to be reviewed during design output review based on the inputs and to be verified before approval.During design output review448

Risk assessment of Procurement

Process FunctionPotential Failure ModePotential Effect(s) of FailuressevClassPotential Cause(s)/Mechanism(s) of FailuresOccurCurrent Process Controls PreventionCurrent Process Controls DetectionDetectRPNRecommended Action(s)Responsibility & Target Completion DateAction TakenSevOccDetRPN
ProcurementsSupplier late deliveryAffects the delivery3SCDelay in production process (Unavailability of Raw material)4Some amount of raw material to be maintained in stockRegular checking of stock list336
ProcurementsError in documents provided by the supplierAffects the quality3SCTypo error3Inform the supplier to prevent typo errorVerify the documents regularly once received from supplier436
ProcurementsIndent not raised in specified time intervalDelay in Receiving Raw Material. Affects the delivery3SCPlanning not done properly in Planning stage5Machine Manager shall provide the requirements to the procurement personnel in advanceDuring operations planning230
ProcurementsQuality requirements not specified clearly in the purchase orderIndent not raised in the specified time interval5SCMaterial received with the wrong specification. Affects the Quality4Monitoring the PO before approval. Based on the review during approval of PO.5100Training given to concerned personnel about the quality requirementsProcurement personnelAction taken to be verified after three months53460
ProcurementsImproper identification of supplierAffects the quality and delivery4SCThe Person who prepares PO was unaware of the quality requirements4Updating of such data to be done regularlyPeriodic checking of supplier rating580Prepare supplier delivery performance and rejection quantity data regularlyProcurement personnelAction taken to be verified after three months43448
ProcurementsSpecification not specified clearly in the purchase orderThe specification should be as per standard requirements.3SCItem Description not Created as Per Requirement4Delay in Receiving Bought Out Items. Affects the deliveryBefore approval of purchase orders, Quality dept. verifies the requirements560
ProcurementsSupplier performance rating is not done periodically due to delay in preparing data (such as delivery time and rejection quantities)Reliability of the goods and services4SCSupplier evaluation not done before purchase of critical goods & services2Critical goods and services are identified.Critical goods and services are purchased from the list of appoved suppliers only216
ProcurementsMaterial not available at regular supplieraffects the planning and delivery4SCDead stock at supplier premises3The goods and services are not considered as critical category.Master list of suppliers336

Risk assessment of Operation

Process FunctionPotential Failure ModePotential Effect(s) of FailuressevClassPotential Cause(s)/Mechanism(s) of FailuresOccurCurrent Process Controls PreventionCurrent Process Controls DetectionDetectRPNRecommended Action(s)Responsibility & Target Completion DateAction TakenSevOccDetRPN
OperationIneffective production planAffects delivery3SCImproper planning3Production plan to be prepared effectively in advance.By verifying Production Plan545
OperationNon Availability of Project Execution PlanAffects Quality3SCProject Process Sequence in  is not in Correct Order3Awareness on Job  Training  to be givenProject Execution Plan545
OperationNon availability of equipments, tools and insertsAffects production and delivery4SCPeriodic checking of tools and inserts used for production are not done.3Tools and inserts are to be maintained regularly in stock.By reviewing required tool and inserts336
OperationNon availability of raw materialAffects production and delivery3SCMaterial not available in stock4Some quantity of Materials are to be maintained in stocks.By reviewing the stock list.448
OperationInternal non-conformanceAffects quality and delivery5CCRequirements are not addressed properly in the daily production control sheet4Ensure that the requirements are to be addressed properlyBy reviewing through in-process inspection480Verification of the Production control sheet by the Quality Engineer for the proper addressing of the requirements before the issue of the documentsQuality EngineerAction taken to be verified after three months53345
OperationImproper handlingAffects the quality4SCUnskilled person3Training to be given for concerned personnelBy monitoring the personnel336
OperationEmergency requirement for any product / itemDifficulty in purchasing the items3SCImproper planning2Minimum 3 supplier for the critical items to be identifiedBy verifying the Approved supplier list424
OperationEmployee performance reduced (or)
Not competent enough to perform a new activity.
Affects the quality and timely delivery3SCAdequate training not provided3Required training to perform the job to be given for concerned personnelsTraining Matrix436
OperationShortage of work/office space inside our facilityAffects work2Adequate space not available.3Proper layout for the work space to be designedBy verifying layout318
OperationRequirement for changing of shiftsAffects the routine activities4SCImproper planning3Required shifts to be arrangedBy Production monitoring336
OperationWorking hours affected due to RamadanAffects the timely delivery4SCImproper planning3Proper planning to be done prior start of the jobBy verifying production plan112
OperationNot enough knowledge to perform the operationsQuality of the work will be affected.4SCIncompetent personnel on the job3Training to be given for concerned personnelSkill competency matrix336
OperationDifficulty in identifying the parts of the assembly product in dismantled conditionAffects the product quality & delivery4SCPart identification number not visible on the sub assembly parts3Identification tagging to be maintained throughout the processes with reference to production plan/Job NumberIdentification on each item by either SRV # or Job #448
OperationProducts damaged due to improper handling (within the facility / while transporting to the customer)Affects the product quality4SCImproper Handling of the material3Proper protection for critical components to be providedBy verifying at the time of dispatch336
OperationUnexpected Power cutsAffects the delivery1Ministry issue1Alternate power source to be made availableRequested for alternate power source arrangement22
OperationErrors identified in the Manufacturer provided features.Affects the customer satisfaction4SCPoor quality of products delivered by manufacturers3Supplier evaluation needs to be conducted periodicallyBy supplier evaluation336
OperationProductivity effects due to Climate changeAffect the quality & delivery4SCAdditional responsibility & authority to be provided to on-site personnel4Identify contingency plan to mitigate climate change by identifying alternated production siteAdditional responsibility & authority to be provided to on-site personnel116

Risk assessment of Maintenance

Process FunctionPotential Failure ModePotential Effect(s) of FailuressevClassPotential Cause(s)/Mechanism(s) of FailuresOccurCurrent Process Controls PreventionCurrent Process Controls DetectionDetectRPNRecommended Action(s)Responsibility & Target Completion DateAction TakenSevOccDetRPN
MaintenancePeriodic maintenance not doneAffects cost and delivery3SCCarelessness of the operator3Proper preventive maintenance shall be done as per the planFrequent checking to be done327
MaintenanceDelay in completion of break downAffects cost and delivery4SCNon availability of spares4Maintaining minimum stock (spare parts) in storeChecking with break down register580Critical spares shall be identified and maintained in stockMachine shop ManagerAction taken to be verified after three months43448
MaintenanceDelay in preventive maintenanceAffects cost and delivery4SCPreventive maintenance schedule not followed4Preventive maintenance to be done as per the scheduleFrequent checking to be done348
MaintenanceImproper preventive maintenanceAffects cost and delivery3SCChecklists prepared are inappropriate to the machine to be maintained3Checklists are to be prepared as per the manufacturer’s specificationChecking with Manufacturer’s specification545
MaintenanceIncompetent personnelAffects quality & cost4SCSelection criteria not defined3Skill competency matrix preparedReview of training effectiveness336
MaintenanceDelay in availability of machines sparesAffects cost and delivery4SCnon availability of spares locally3Plan to have spares in stockReview of the suppliers list448
MaintenanceNon availability of support from the manufacturer of the machineaffects cost and delivery4SCAuthorised services of manufacturer is not available locally4Outsourcing the serviceCommunication with service providers232

Risk assessment of Quality Control

Process FunctionPotential Failure ModePotential Effect(s) of FailuressevClassPotential Cause(s)/Mechanism(s) of FailuresOccurCurrent Process Controls PreventionCurrent Process Controls DetectionDetectRPNRecommended Action(s)Responsibility & Target Completion DateAction TakenSevOccDetRPN
Quality Control/ Quality AssuranceIndication found in Mill TCAffects the quality4SCTypo error3Inform the supplier to prevent typo error while preparing Mill TCBy checking MTC during incoming inspection448
Quality Control/ Quality AssuranceInstrument errorAffects the quality5SCImproper handling of the instuments4Training to be given to conerned personnel about instrument handlingMonitor the personnel while handling the instruments480Instrument to be sent for calibration.
Out of calibration requirements to be ensured.
QA/QC EngineerAction taken to be verified after three months53345
Quality Control/ Quality AssuranceSome instruments are not calibrated beyond due dateAffects the quality3SCCalibration plan not updated3Calibration due date to be checked by concerned personnel regularlyUsing calibration plan436
Quality Control/Quality Control/ Quality AssuranceDifficulty in identifying the materialAffects the system and quality4SCIdentification tag not tied on the product3Identification tag is tied after the completion of process.By verifying visually336
Quality Control/ Quality AssuranceImproper identification and traceabilityAffects the system4SCIdentification number not replaced when damaged3Identification number properly replaced when it is found damagedMonitored regularly by Concerned personnel448
Quality Control/Quality Control/ Quality AssuranceDelivery of Non-conforming productsCustomer dissatisfaction5CCFinal inspection not performed prior dispatch3Final inspection is performed by the QC Engineer prior to dispatchUsing Production and quality plan230Products to be called back and assessed as per control of NC products.QA/QC EngineerAction taken to be verified after three months51210
Quality Control/ Quality AssuranceWrong material taken for the productionProduct nonconformity5CCidentification of the material not done properly3Color code is assigned for the materials.By verifying color code & traceability of the material prior to use.230Precautions shall be taken to prevent such errors by verification of the traceability before use.QA/QC EngineerAction taken to be verified after three months51210
Quality Control/ Quality AssuranceIncompetent personnelAffect quality of the product4SCNo proper training provided to the personnel3Training matrix is preparedBy verifying the effectiveness of the training224

Risk assessment of Store

Process FunctionPotential Failure ModePotential Effect(s) of FailuressevClassPotential Cause(s)/Mechanism(s) of FailuresOccurCurrent Process Controls PreventionCurrent Process Controls DetectionDetectRPNRecommended Action(s)Responsibility & Target Completion DateAction TakenSevOccDetRPN
StoreMaterial received without Supplier Invoice Affects the system3SCSupplier unawareness3Inform the supplier to provide invoiceWhen receiving material436
StoreWrong entry of Part No. / heat codeAffects the system and quality3SCHuman error / Typo error3Create awareness about the importance of this activityCheck the store issue and receiving records545
StoreRust formation on machined partAffects the quality4SCRust preventive oil not applied / exposed to moisture4Rust preventive oil applied and stored after machiningVisual Inspection during cycle count580Instruction given to the concerned personnel about the rust prevention methodsQA/QC Engineer / Stores InchargeAction taken to be verified after three months43448
StoreExposed Sealing surfaces damagesAffects the quality3SCImproper preservation2Stored in a separate area to prevent damagesRegularly636
StoreDelivery note issued to customer with wrong information  Customer dissatisfaction4SCno proper information2store receipt voucher is prepared to identify the received itemsstore receipt voucher is prepared to identify the received items & verified by QA/QC432
StoreUnexpected Power cutsAffects the quallity2Ministry issue1Alternate power source to be made availableRequested for alternate power source arrangement36
StoreWrong shipment done to the customerCustomer dissatisfaction4SCCommunication Gap1Proper communication to be done through proper channelstore keeper to ensure the correct information is taken for the shipment312

Example of Procedure for Labeling of Information

1.0 Purpose:

The objective of this procedure to identify type of information , classification and labeling at XXX so that all the personnel follow a common framework and understanding of Information security.The purpose of this procedure is to establish a framework for classifying data based on its level of sensitivity, value and criticality to XXX as required by the information security policy. Classification of data will aid in determining baseline security controls for the protection of data.

2.0 Scope :

This procedure applies to all the business processes, its information and information system.

3.0 Responsibility:

  • IT dept.
  • Users
  • Process Owners/HOD

4.0 Procedure :

The following procedures cover how to label, store, dispose of, communicate, physically transfer or copy different types of information, depending on its classification and media (e.g. paper, electronic transmission (email) or electronic
storage/transfer).

The distribution of data should be kept to a minimum. However when data is required to be distributed it is required to be validated and have appropriate marking:

  • To the authorized recipient (a formal record shall be maintained and reviewed at appropriate intervals by the authorized recipients of data); and
  • Commensurate to its classification. That classification of data is split in to three categories as defined in the Information Classification and Handling Policy.

All information assets must be classified into one of three categories. The information asset must be appropriately labelled to ensure that its classification is readily identifiable.

Where information is grouped together, the highest classification shall be applied to all information in the group.

The agreed classification categories are:

CategoryInformation CategoryDescription
1ConfidentialInformation is restricted to management approved internal access and protected from external access. Unauthorized access could influence XXX’s operational effectiveness, cause an important financial loss, provide a significant gain to a competitor, or cause a major drop in customer confidence or customer confidentiality clause. Information integrity is vital. 
2AControlled (Internal –  Department)Information collected and used by respective department of XXX to the conduct its process and fulfill customer / client requirements. Access to this information is very restricted within the department. The highest possible levels of integrity, confidentiality, and restricted availability are vital.
2BControlled (Internal – XXX)Information that can be made shared to other departments within XXX without any implications for XXX, this information is not be shared outside XXX without authorizations.  Integrity within XXX is important.
3PublicInformation is not confidential and can be made public without any implications for XXX. Loss of availability due to system downtime is an acceptable risk. Integrity is important but not vital.

LABELING

Document authors will need to ensure that classification status markings are applied manually to all documents using the appropriate classifications of ‘PUBLIC’,‘INTERNAL’ or ‘CONFIDENTIAL’.

All data must be marked with the appropriate classification clearly as a minimum in the document header prior to printing. If the material is already printed or has not been word-processed, the marking ‘PUBLIC’, ‘INTERNAL’ or ‘CONFIDENTIAL’ as appropriate, must be written, at the top of every page as a minimum. Multiple page documents must be stapled together.

Any information that is not specifically marked as being ‘INTERNAL’ or ‘CONTROLLED’ will be deemed to be ‘PUBLIC’. Therefore, the person responsible for processing or handling a document, particularly if consideration is
being given as to whether a document should be disclosed, MUST consider the content of the document in determining how that document should be processed and not rely on its classification under this policy. The labeling of a document as Internal, Confidential or public does not override the XXX’s duties under the Data Protection Act or Information Act

Removable media such as CDs or DVDs, USB data sticks etc. used to store XXX information must always be classified as ‘CONFIDENTIAL’ and do not require individual labeling or marking.

STORAGE

Information should be stored in accordance with contractual or legislative requirements and in a manner commensurate to its classification, as follows:

  • PUBLIC data: Does not require any access restrictions or specific safe storage.
  • INTERNAL data: If information is removed from the xxx for use by home employee it must not be left unsecured in employee’s vehicles or left in public places. Information and data must be stored wherever possible, in a lockable area when at the employee’s home that cannot be accessed by any unauthorized person, including family members.
  • CONFIDENTIAL data: This information is sensitive information of which access must be restricted – securely locked away at the end of each working day or when no longer needed. This applies regardless of the format which this information is held on e.g. paper, disk, files, tapes, faxes, post.

When stored in an electronic format, data must be protected by the use of both technical and physical access controls.
The following must be in place for:

CONFIDENTIAL Data stored on servers:

  • Servers must be located within secure rooms at XXX premises and access must be restricted to authorized personnel only.
  • Logical access controls must be used with authorized user ID and strong passwords.
  • Data stored in defined areas of the network must only be available to those authorized users with a need-to-know
  • Encryption must be employed wherever possible

CONFIDENTIAL Data processed on laptops:

  • Laptop hard drives must have full disk encryption applied
  • Only authorised users with XXX network domain credentials are authorised to use laptops.
  • Authorised users viewing restricted data on a computer screen must observe the XXX guidance with particular attention to preventing the possibility of ‘Shoulder Surfing’ or casual viewing by unauthorised people
  • Data must be moved from the laptop to a secure area on the XXX network as soon as possible

CONFIDENTIAL Data held in hard copy:

  • Within XXX buildings must be locked away in secure storage
  • Within Employees homes must be stored, wherever possible, in a lockable area that cannot be accessed by any unauthorised person, including family members
  • At premises other than XXX locations if used for reference by third parties must remain within the XXX employee’s line of sight/possession and only made available to those with a need-to-know before retrieval
  • In transit must not be left unsecured in employee’s vehicles or left in public places.
  • Data held on portable (removable) media, such as (but not limited to) CD, DVD, USB and Tape (including backup media) must have protection and encryption measures in order to protect against loss, theft, unauthorised access and unauthorised disclosure or;
  • When stored in an other form, must be stored only in a locked drawer or room or an area where access control measures exist to provide adequate protection and prevent unauthorised access by members of the public, visitors, or other persons without a need-to-know.
  • When verbally discussing Confidential information in public places or on public transport (including mobile phone conversations) care should also be taken in order that the conversation is not overheard. These rules also apply to verbal messages that might be left on answering machines or voicemail and also to information which is sent or received by email, fax, text or multimedia messages sent by mobile phone or other messaging services.

DISPOSAL OF INFORMATION

Information which is no longer required must be disposed of safely and securely and in accordance with its protective marking. There are many reasons why care must be taken when sensitive information is to be disposed as follows:

  • It may cause damage to the Council’s reputation if the information fell into the wrong hands;
  • It would be a breach of the Data Protection Act .
  • It could result in costly litigation and financial loss to the XXX
  • It could cause irreparable damage to individuals and families.

The ways in which we can prevent the above scenarios from occurring include the following disposal methods:

  • To ensure that all information other than PUBLIC is securely shredded
  • Any media (tapes, USB memory sticks etc.) must be securely destroyed through the XXX’s disposal procedure

Records must be maintained of all media disposals and must be made readily available

COPYING

Employees should be aware that they should not copy by any means, information which is marked ‘INTERNAL’ or ‘CONFIDENTIAL’ unless they are authorized to do so, under the ‘need-to-know’ principle.

This procedure applies to all information and documents produced by the XXX which have been deemed to have a security classification applied to them. The information covered in this procedure includes, but is not limited to, information that is either stored or shared via any means. This includes electronic information, information on paper, and information shared orally or visually (e.g. telephone conversations or video conferencing).

All XXX information has a value to the organisation, however not all of the information has an equal value or required the same level of protection. Being able to identify the value of information assets is key to understanding the level of security that they require. Once the appropriate level of security is identified the appropriate control can be implemented to prevent loss, damage of compromise of the asset, disruption of business activities, and prevention of the compromise or theft of information and information processing facilities. Incorrect classification of assets might result in inadequate or incorrect controls being implemented to protect them.

Back to Home Page

If you need assistance or have any doubt and need to ask questions contact me at preteshbiswas@gmail.com. You can also contribute to this discussion and I shall be happy to publish them. Your comment and suggestion are also welcome.

Example of ISO 27001:2022 ISMS Risk Assessment Procedure

Process Flow

The following diagram shows the process flow for risk assessment as part of the overall ISMS framework.

1. Risk Assessment Definitions

For a given information asset, Risk is defined is a probability of a threat materializing as a result of a vulnerability compromise resulting in the undesired impact. In other words the assessment of risk includes the following key elements:

  1. An Asset (1)
  2. Applicable Threat category (2)
  3. Threat & Impact (3)
  4. Threat & Vulnerability (4)
  5. Threat & Probability (5)
  6. Overall Risk (to an asset against a specific threat)

This is illustrated in Table 1.

For the process of Risk assessment the following table has been used:

Asset Group(I)Threat Categories(II)Impact (III)
(1- Low, 2- Medium, 3 – High, 4 – Very High)
Vulnerability (IV)
(1- Low, 2- Medium, 3 – High, 4 – Very High)
Probability (V)
(1- Low, 2- Medium, 3 – High, 4 – Very High)
Risk (VI)
(1 – 64)
Examples (Personnel, (Breach of) Confidentiality (Intentional or Accidental)
paper, Business Applications)(Breach of) Integrity (Intentional, Accidental)
(Source: Asset Master)(Breach of) Availability (Intentional, or Accidental)
Table 1: Risk Assessment Formula

Asset GroupsThreatImpactVulnerabilityProbabilityRisk Value
This includes all forms of assets including personnel, paper, software, hardware, internal service providers, external service providersAny disaster event due to loss of confidentiality, integrity, and/or availability (CIA) (not exhaustive)Measured on a 4-point scale (4-Very High, 3 – High, 2-Med, 1- Low), the impact value represents the scale of business impact to the organization in the event of security compromiseMeasured on a 4-point scale (4-Very High, 3 – High, 2-Med, 1- Low), the vulnerability value represents the state of control for a given asset. Management takes action on all vulnerability greater than equal to 2.Measured on a 4-point scale (4-Very High, 3 – High, 2-Med, 1- Low), the probability value represents the likelihood of a threat realization in the near future (next year). For all probabilities greater than equal to 3, management defines a continuity plan.Measured on a 64-point scale (>12-High, 8-12 – Med, <8-Low), the risk value represents the state of risk for a given asset.
Table 2: Risk Assessment Terminology explained

  1. (Information) Asset Groups

An Asset is defined as any business asset, which has information contents. Examples of asset (not exhaustive) are listed below:

  • Personnel
  • Paper
  • Business applications hosting information
  • IT infrastructure items supporting information
  • Office Infrastructure supporting Operation
  • Office Infrastructure supporting Security operations
  • Documents – electronic and Paper
  • Services
  • External Service providers

Each department head creates and maintains their asset masters.

1.2          Risk Assessment Formula

Risk Assessment for each asset is carried out using the following formula.

Risk = Threat X Business Impact or loss of “Value” X Vulnerability X Probability. Each component of the risk assessment also undergoes a qualitative valuation based on the judgment of the risk analyst.

Listed below is an explanation of each of these terms.

1.1.1       Threat X (Business) Impact (valuation)

Each asset undergoes three major classifications of threat analysis – Confidentiality, integrity and availability. The risk analyst defines the appropriateness of the asset and the commensurate threat applicable to the asset. Each threat so chosen also undergoes a business impact or “valuation” on a range of 1(one) to 4(four) based on the following guideline. The risk analyst takes into consideration the worst scenario for valuation purposes:

Information Valuation/Rating

InformationConfidentiality Rating
New Business & Project opportunities4
Company Risk Register4
Joint Operations Agreement – JOA3
Production Sharing Contracts – PSC3
Sales Purchase Agreement3
G & G data including Seismic data3
Skills & Competency matrix of people (competitive advantage)3
Oil & Gas Reserve data numbers (competitive advantage)3
Oil & Gas sales report2
Employee compensations & employee personal information (privacy of information)4
Reservoir Data (e.g. Eclipse)3
Table 3: Confidentiality Rating

Availability Rating

Availability RequirementAvailability Rating
< 4 Hours   IT infrastructure and communication services and supporting utilities (Air-conditioning, Power etc.) Active directory serversShare pointFirewall and VPN servicesAll data & voice supporting network devicesCloud Services – Microsoft office 365 suite, Email  4 = Very High   Essential Infrastructure Services   # XXX is more connectivity driven as they need to remain in contact with their area & regional offices to fulfill all their requirements.          
< 8 hours Oracle e-business suits          3 = High # Access to and availability of data stored on server mapped G: drive is paramount to XXX business operations in additions to specific business applications they connect to  
> 8 hours and within 1 day (24 hours) – Shared drive – LiveQuest – Petrel, G & G, Petrel RE – REP 5, Pansystem, – Rose, Questor – Geoframe2 = Medium  Delayed Start Service
All other information that does not fall in the above categories  1 = Low  
Table 4: Availability Rating

Integrity Rating

InformationIntegrity Rating
Inaccuracy in content accessible to employees concerning health & safety4
Inaccuracy results in financial loss to company or its employees or legal/regulatory reporting obligations4
Inaccuracy in content accessible to public3
Inaccuracy in content accessible to employees but not financial/health/safety in nature3
No available category2 & 1
  
Table 5: Integrity Rating

The asset ‘impact’ rating is performed based on enterprise context.

1.3    Threat X Vulnerability

Vulnerability is by definition, an inherent weakness by which a treat can be exploited. Vulnerability is the base factor and covers absence (or existence) of controls or countermeasures. Vulnerability is rated on the following 4-point scale:

Impact ValuePurportGuideline
4Very High VulnerabilityRate 4 where there is more than 1 vulnerability but in the opinion of the analyst, the vulnerability is easy to exploit.
3High VulnerabilityRate 3 where there is more than 1 vulnerability
2Medium VulnerabilityRate 2 where there is at least one vulnerability.
1Low VulnerabilityRate 1 where there are no identified vulnerability.

Typical assessment (not exhaustive) made are presence of preventive, detective, maintenance and/or monitoring controls present to prevent the threat materialization. The risk owner and the risk analyst jointly agree on the valuation of asset.

1.4          Threat X Probability

Probability is the likelihood of a threat materializing for the given asset. The asset owner and the risk analyst jointly agree on the valuation of asset. Probability is rated on the following 4-point scale:

Impact ValuePurportGuideline
4Very High ProbabilityRate 4 when there are more than 2 incidents in the last one year.
3High ProbabilityRate 3 when there has been two incidents in the past one year.
2Medium ProbabilityRate 2 when there has been one incident in the past one year.
1Low ProbabilityRate 1 when there has been no incident in the past, nor likely in the future.

For a given asset the risk is therefore calculated by a measure of threat, business impact, vulnerability and probability.

1.5          Justification

Each element of risk assessment i.e. Impact, vulnerability and probability is provided with justification of their valuation or reference to Very High, High, Medium and Low probabilities.

2. Risk Assessment Process

The process of risk assessment for a given asset consists of three stages as explained below:

  • Asset Definition

The Asset owner (typically HOD) creates and maintains an Asset master. The Asset master contains provision to captures all forms of information asset (paper, people, documents, hardware, business applications, and external service providers)

  • CIA Impact Valuation

Each asset owner conducts an Impact valuation on the loss of Confidentiality, Integrity and Availability (CIA) to a given asset. While doing he/she looks at the CIA reference table to assess whether the asset correlates to the CIA criteria.

  • Risk Valuation

Assets with a value of 4 as a result of either C,I and/or A, where the impact of the security violation is Very High, has mandatory requirement to be assessed for the other values of risk, namely vulnerability and probability.

Risks that cannot be treated is considered to be ‘Residual Risks’ and subject to approval by risk owner.

2.2    Risk Assessment Worksheets

  • All assets which have an impact value of 4 are rated with their vulnerability and probability in a centralized record called – XXX-ISMS-RA record.
  • A risk revaluation is done for those assets where a decision has been identified as closed.

3. Risk Treatment Process

  1. Risk treatment process has the following parameter – All weakness areas are reported in a centralized vulnerability dashboard. ISMS QA/MR discusses each area of the weakness and reports to the applicable departments for closure.
  2. ISMS QA/MR discusses the vulnerability or the associated risk with the risk owner.
  3. Decisions to close an identified vulnerability are taken by either Head of Department. When the decision for implementation cannot be made by the department, the decision is moved up the chain of command, for senior management for final decision.
  4. Each decision so made are ensured implementation through allocation of responsibilities, which in turn is coordinated with Head of Departments/applicable enforcer,
  5. Areas wherein senior management/head of department does not take decisions or the implementation totality takes a certain period of time, it is considered as residual risk. However reference to senior management decision either as closed, work in progress (WIP) or residual risk (RR) is referred in the Gap dashboard.
  6. An annual plan of future initiatives is made available demonstrating the senior management commitment to ensure effective implementation of existing security framework.
  7. Reassessment of Risk values is done for those assets wherein decisions have been taken to reduce their Risk. This is an ongoing activity and ISMS QA/MR keeps track of all such Risk areas.

4. Risk Acceptance Criteria & Residual Risk Management

All risk values are rated on the 64-point scale. All attempts are being made to reduce the value of risk to the extent possible. However the following rule applies:

Risk Acceptance criteria is vulnerability value 1. When an asset’s vulnerability value is more than 1, it means that the asset has vulnerability. A vulnerability value of 1 reflects no known vulnerability, and is therefore becomes the benchmark for risk acceptance.

  • All vulnerabilities equal to 2 and above are presented to the management for reduction. Management includes department heads, and top management – depending on the areas of the risk.
  • All values of risk equal to greater than 12 are presented to the management
  • Upon the introduction of controls, there could be risks whose values do not come down below 12 and therefore, continue to remain on the higher side. Such values are part of the residual risk.
  • Risks are classified as High – if the value of the risk is >=12, Medium – if the value is =>8 and <12, and Low <8. Except for personnel assets, the objective of all remaining assets is to bring down the vulnerability value to <=2. For personnel, a HIGH Risk is acceptable, as they may be an operational requirement.
  • Residual risk are reflected against each asset group where risk assessment is performed.

4. Risk Communication

For those risks, where the vulnerability is 1, risk owners are communicated.  The risk owner is required to own and accept the residual risk.

5. Supporting Worksheets/reports

  1. XXX – Department-wise ISMS Compliance sheet
  2. XXX-ISMS-Risk Assessment record (Also includes revised RA values),
  3. Latest Statement of Applicability – reflects references to existing controls
  4. Management review records includes residual risk and future plan of action.

Example of ISMS Risk Assessment

RA-IDRisk OwnerInformation Asset/ infrastructure-Management (Risk Area)Form / Nature of AssetApplicable
Threats
(NEW)
RA DateImpact RatingJustificationExisting Controls (=Strengths)Missing Controls (=Weaknesses)VulnerabilityJustificationProbabilityJustificationRevised Risk ValueRecommendation (Yes or No)Revised Risk CategoryResidual Risks
xxx-RA-01All Departmentsxxx Employees (All personnel)Personnel – InternalLeak of Sensitive / Critical Data01.01.19004Teams has category 4 information1. Background Screening in place,
2. Most Employee undergo induction training,
3. All employees sign code of conduct, 
1. People have the opportunity to send emails. Consider DLP solution to reduce the opportunity of information theft. (Check whether DLP is implemented in office 365?)3One major vulnerability identified, however the ‘ease’ factor has high impact2Human behaviour is unpredictable24Yes – DLP verification is WIPHighOne major vulnerability identified, however the ‘ease’ factor has high impact
xxx-RA-02All Departmentsxxx Employees (All personnel)Personnel – InternalCritical Business activities get impacted01.01.19004Several teams are crucial for availability1.Leave control management in place,
2. Whenever there is an additional manpower requirement, it is addressed as part of HR planning
No known weakness1No identified vulnerability2Human behaviour is unpredictable8NolowNo identified vulnerability
xxx-RA-03All DepartmentsOperations Applications(Petrel 2012/Geo Frame – IESX/Geo Frame – Techlog Petrophysical Applications/ IHS Kingdom Suite/REP/Merak – Peep/Merak-Volts/Oil Field Manager/Eclipse/Interactive Petrophysics/Croker/Kingdom Suite/REP/Questor – Onshore/Offshore 9.8/Mbal 8.0/Pansystem 3.2/Rose Risk Multi-mode risk Analysis/Tellus Database/LiveQuest Solution/Zeh Composer Seisworks + Zmap/PEEP/GEM (Eco Software)/Eclipse-Office)Business ApplicationsConfidential data leakage01.01.19004Unauthorized access leading to information theft (by outsider)Access Controls in placed. Central AD protects primary authentication followed by application specific controls.No known weakness1No weakness identified1No incidents in the past one year, unlikely opportunity in the next year4NoLowNo weakness identified
xxx-RA-04All DepartmentsCommon User Applications (Active Directory/IP Telephony
Oracle HRMS/Sharepoint Portal/Asset Management System/Enterprise Document Management System/Share drive (G: Drive)/Cogness/RPSystem/Discover/Global Tax Management System (GTMS)/Sun System/Hyperion/Website)
Business ApplicationsInformation leakage and misuse, Virus impact on data/servers01.01.19004Applications are critical to business operations. Most information is rated as 3 Most products deployed are standard tools from recognized vendors/OEM. 1. OFI in change management process, 2. OFI in better access control32 Identified vulnerabilities1No suspected incidents of application performance or misuse in the last year12YesHigh1. OFI in change management process, 2. OFI in better access control
xxx-RA-05IT SupportSwitch configurationsLAN ManagementNetwork down / impact day to day business operations01.01.19004Internal connectivity outageRedundant network, secure configurationNo known weakness1No known weakness1No suspected incidents of application performance or misuse in the last year4NoLowNo weakness identified
xxx-RA-06IT SupportRouter ConfigurationsWAN Managementimpact day to day business operations
01.01.19004External connectivity outageRedundant network, secure configurationNo known weakness1No known weakness1No suspected incidents of application performance or misuse in the last year4NoLowNo weakness identified
xxx-RA-07IT SupportWireless ConfigurationsWireless ManagementData Leakage due to unauthorized access01.01.19003Office connectivity of mobile usersAlternate network based controls exist, limited accessNo known weakness1No known weakness1No suspected incidents of application performance or misuse in the last year3NoLowNo weakness identified
xxx-RA-08IT SupportAll Servers (Unix and Windows)
(Windows XP SP3/Windows 2003/Windows 2008/Solaris/Linux)
Server ManagementData Loss01.01.19004High Availability, High confidentialityCombination of policies exist that include patch management, and vulnerability in place, certified staff handling the changesNo known weakness1No known weakness1No suspected incidents of application performance or misuse in the last year4NoLowNo weakness identified
xxx-RA-09IT SupportDatabase Management (SQL and Oracle)Database Management Impact day to day business operations01.01.19004High Availability, High confidentialityCombination of policies exist that include patch management, and vulnerability in place, certified staff handling the changesNo known weakness1No known weakness1No suspected incidents of application performance or misuse in the last year4NoLowNo weakness identified
xxx-RA-10IT SupportSecurity Applications (Access Point – Card System/Access Point – Biometrics/Checkpoint-VPN/Firewall (Checkpoint)/AV (McAfee)/IPS/IDS (Cisco MARS)/Spam Filter (Symantec)/backup Management (Tivoli))Security ApplicationsData Leakage / corrupt due to unauthorized access01.01.19004Security Controls protecting the networkCombination of policies exist that include patch management, and vulnerability in place, certified staff handling the changesNo known weakness1No known weakness1No suspected incidents of application performance or misuse in the last year4NoLowNo weakness identified
xxx-RA-11IT SupportDesktop Management  (Dell)Desktop ManagementDaily business activities impacted / delayed01.01.19004End user infrastructureStandard list of software installed, malware protection that combines gateway and end user malware protectionNo known weakness1No known weakness1No suspected incidents of application performance or misuse in the last year4NoLowNo weakness identified
xxx-RA-12IT SupportLaptop Management (Dell / Apple)Laptop ManagementImpact day to day business operations01.01.19004End user infrastructureStandard list of software installed, malware protection that combines gateway and end user malware protectionNo known weakness1No known weakness2Laptop theft is an opportunity8NoMediumNo weakness identified
xxx-RA-13General ServicesPhysical Access Management (Building, Floors, Work area, Server Room/s, generator Areas)Physical Access ManagementPeople / business information or data impacted01.01.19004Availability infrastructureCombination of controls including manpower, CCTV, Access controls in placeNo known weakness1No known weakness1No suspected incidents of application performance or misuse in the last year4NoMediumNo weakness identified
xxx-RA-14IT SupportDocument Management System (Share drives/Folders/Enterprise Document Management System)Document ManagementData Leakage / corrupt / loss01.01.19004Storage areas for sensitive files/documentsAccess Controls in placed. Central AD protects primary authentication followed by application specific controls.No known weakness1No known weakness1No suspected incidents of application performance or misuse in the last year4NoMediumNo weakness identified
xxx-RA-15LegalExternal Service providers (OEMs providing technical problem and patch management support)External Service providers – ITFinancial Loss01.01.19004High Availability, their service are critical to application up timeSLA in place, most vendors are global, and provide 24-7 supportNo known weakness1No known weakness1No suspected incidents of application performance or misuse in the last year4NoMediumNo weakness identified
xxx-RA-16LegalExternal Service providers (IT Consultants)External Service providers – LegalFinancial / reputation Loss01.01.19004Teams has configurations which in turn has category 4 information1. Background Screening in place, 2. All vendors staff sign NDA1. People have the opportunity to send emails. Consider DLP solution to reduce the opportunity of information theft. (Check whether DLP is implemented in office 365?), 2. Consider bring vendor staff under the scope of induction on information security3Two major vulnerably identified2Human behaviour is unpredictable24Yes – DLP verification is WIP + Training on inductionHigh1. People have the opportunity to send emails. Consider DLP solution to reduce the opportunity of information theft. (Check whether DLP is implemented in office 365?), 2. Consider bring vendor staff under the scope of induction on information security
xxx-RA-17IT SupportExternal Service providers – IT + Hasibat information technologyExternal Service providers – ITFinancial Loss01.01.19004Several teams are crucial for availability1. SLA including manpower availability is in place. 2. Vendors whose support in the form of patch/problem exist, are covered in SLA/NDANo known weakness1No identified vulnerability2Human behaviour is unpredictable8NoLowNo identified vulnerability
xxx-RA-18Key Departments (Legal/ Operations/ Commercial/ Finance/Human Resources)Paper Document Management  (Agreements/new Contracts)Paper ManagementFinancial / reputation Loss01.01.19004Printed documents and design documents1. Printers have passwords, 2. Users follow clear desk and clear screen policy including paper shredding when no more in use.Awareness on handling of documents can be increase2Paper on desks1No incidents in the past one year, unlikely opportunity in te next year8NoLowAwareness on handling of documents can be increase

Procedure for Identification Of Legal And Other Requirements-OHSMS

1.0 PURPOSE:

To establish, implement and maintain a procedure for identification of legal and other requirements to which XXX subscribes & to identify how legal & other requirements are applicable to identified OH&S hazards covered under the scope of the Occupational Health and Safety Management system.

2.0 SCOPE: 

This procedure covers the method to identify and have access to applicable Legal and other requirements related to activities, processes, products, and services of XXX.

3.0 RESPONSIBILITY:

Legal Team Members (LTM). (EHS-ML-14) The legal Team Members consists of HS MR, DGM –HR, AM-Safety, Officer Admin

4.0   DEFINITION:

4.1 Legal Requirements: These are regulatory requirements as defined by the Central or State regulatory authorities to which the XXX is liable to identify and comply.

4.2 Other Requirements: Any customer-specific requirements, statutory requirements by financial bodies, corporate-specific requirements & any other agreements with public authorities. (Ex: Customer requirements)

5.0 PROCEDURE:

5.1 The details of the List of Applicable legal requirement & other requirements to be compiled by the Safety Officer, along with the frequency of retrieval and personnel responsible for maintaining the records are defined in the Legal Register

5.2 Head responsible for compliance to legal requirement shall obtain information on the legal requirement, by referring to any of the following agency.

  • Notification from Kuwait Ministries
  • Information in Newspapers.
  • Communication with the National Safety Council and Confederation of Kuwait Industry & Authorized Publishers.
  • Subscription/contact with Bureau of Indian Standard, Book Supply Bureau, etc.
  • By referring to various Factories Acts & Rules Book
  • Through visiting the website to get information on the latest updates and also through member

5.3 The application for renewal of Consents / License /Authorization under Government statutory requirements shall be submitted in advance as specified in the Acts / Rules. Renewal frequency mentioned in the list of legal & other requirements may subject to change/alter as per Notification / Intimation from the government authorities from time to time. Responsible persons shall communicate relevant information on legal and other requirements to all concerned.

5.4 The following are the other requirements pertaining to the OH&S Hazards of the activities, processes, products & services, which are to be complied with:

  • Customer Specific Requirements – Marketing & Quality Departments are responsible for receiving the requirement from the Customer and forwarding it to the concerned department to ensure fulfillment.
  • The statutory requirement by Financial Institutions – Some of the financial institutions, Banks, Insurance companies may require the organization to comply with certain statutory norms. The finance dept shall identify and comply with those requirements and they are responsible for receiving and responding to the fulfillment of the above.
  • Corporate specific Requirements – MR shall identify any corporate-specific requirements and incorporate the same and periodically check for compliance.
  • Agreement with public Authorities – Public authorities like social bodies OR Industrial development authorities may require the organization to comply with their requirements. HR is responsible for receiving and responding to ensure fulfillment of such requirements.

5.5 Legal & other requirements applicable to OH&S Hazards are determined during significant HIRA study. Description of legal requirements & how legal & other requirements applicable to OH&S hazards are also described in the significant HIRA study.

6.0 Document / Record reference: 

S. No.Document /Record DescriptionReference No.
1.Legal RegisterEHS-RG-01
2.List of Legal Team MembersEHS-ML-14

Procedure for Emergency Preparedness and Response-OHSMS

1.0 Objective

The objective is of this procedure is to establish and maintain a system for carrying out emergency preparedness and response actions within the premises of the company and areas of its operations, with the aim of minimizing the impacts of emergency situations on the environment, including risks & injury to employees, subcontractors, general public and other interested parties.

  • To locate the emergency, control it and prevent it spreading further.
  • To safe guard the employees and to minimize the effort of accident.
  • To minimize damage to property.
  • To attain normalcy at the earliest.
  • ensure minimum damage to environment

2.0 Scope

This procedure is applicable to all emergency situations which can have significant impacts to the environment, including occupational health & safety risk to employees. This procedure is applicable to ISO 45001:2018.

Ensuring safety is the prime responsibility of a company and its employees. Even though we try to ensure total safety in the plant, occurrence is unavoidable. Planning for meeting such as emergency situation is to be made and everyone should be aware of such an emergency plan, so that, all employees remain prepared for such emergency situation.

This plan aims at identifying possible accidents and explores ways and means to meet such an emergency situation.

3.0 Responsibility

MR has overall responsibility as unit head, Section In-charge and Emergency response team members and security personnel. The Safety Officer is responsible for ensuring that this procedure is executed consistently and effectively. Members of the Emergency Response Team (ERT) are responsible for ensuring proper implementation of the company’s emergency response plans.

4.0 Description

4.1 Mock Drills: Are practical drills designed to test the capability of personnel or organization to perform a specific function (i.e., Fire, Spill response, communications, First Aid and Rescue).

4.2 Emergency Response Team: Consists of personnel who are knowledgeable, trained and skilled in basic incident stage firefighting, first aid and rescue operations and other site specific hazard response.

5.0 Procedure

The Safety Engineer, in co-ordination with other departments, shall identify all potential emergency situations or scenarios arising from the risk assessment associated with the company’s activities, operations and processes, including the means to eliminate, control and minimize the hazards and risk associated with it.

5.1 Emergency Drills

5.1.1 The Safety Engineer, in coordination with the MR and GM, including all other departments in the organization, shall plan and conduct company-wide emergency drills at least once every 6 months.

5.1.2 Emergency drills shall cover all but not limited to different types of emergencies as follows:

  1. Evacuation
  2. Fire fighting
  3. First aid
  4. Oil or Chemical spills/leaks.

5.1.3 Designated fire exits and evacuation areas (or “assembly points”) within or near the company premises shall be clearly marked and made clear to all personnel. Selected and assigned personnel shall supervise the evacuation, including headcount.

5.1.4 Where appropriate, an evacuation plan and vicinity map or site layout shall be posted in strategic locations of the company premises for the general awareness of everyone. The maps should show evacuation routes, recovery routes, closest exits, fire protection equipment location, eye wash and shower station, spill control station and whatever is applicable. All employees should follow these instructions and be familiar with the evacuation map.

5.1.5 If planned results are not achieved, appropriate corrective actions shall be planned and carried out in accordance with “Non-conformance, Corrective & Preventive Action Procedure”.

5.1.6 The H&S Department shall prepare and maintain records of “Emergency Drill Report” duly signed by the MR.

5.2 Emergency Equipment Monitoring & Inspection

5.2.1 The MR/ Safety Officer shall ensure that appropriate emergency equipment is provided, deployed and easily accessible in strategic areas of the company premises, where a potential environmental emergency and associated risk could potentially occur.

5.2.2 Emergency equipment shall cover all but not limited to the following:

  • Fire Extinguishers
  • Fire Alarms
  • Fire Hose
  • Emergency Lights
  • Spill kits (in the event of chemical/oil spills)
  • First Aid Kit

5.2.3 The MR/Safety Officer and/or its assigned staff shall periodically check and monitor all emergency equipment. Frequency of inspection and maintenance shall be specified in the list.

5.2.4 It shall be the responsibility of the Safety Officer and his designated staff to ensure that all emergency equipment are in good operational condition and easily accessible in the event of an incident and other emergency situation.

5.3 Emergency Situations

 Emergency situation in the company can arise due to:

5.3.1 Fire

Sr.NoActivitiesResponsibility for Mitigation
AVulnerable areas for fire are identifiedMR
BAdequate first aid, fire fighting equipment is made available during emergency 
CFire alarm provided at security and relevant locationsSecurity
DOn information fire core group acts immediately.Emergency Response team
EEmergency escape routes are earmarked and Emergency Plans displayedMR
FEmergency power supplies cut-off system available.Maintenance Personnel
GEmployees are imparted awareness on emergency preparedness.MR, Core team
HAssess the loss/damage and submit report to the management.Supervisor
ITrain existing and new employees on emergency response/evacuation as part of their induction program.Core team

Steps for Mitigation:

  1. Conduct Fire mock drill
  2. Used Fire Extinguishers with low pressures /invalid ones are to be refilled.    
  3. Display Emergency contact information

5.3.2   Handling Fire Emergency:

5.3.2.1 The person who discovered the fire shall promptly report the matter to any ERT member and/or the MR/Safety Officer through telephone, mobile phone or any other means of communication. In the event of fire, the following guidelines shall be as follows:

  1. Call the ERT and report the location of fire.
  2. Use the nearest fire extinguisher.
  3. Wait for announcement.
  4. Move out of the affected area.
  5. Press the fire alarm.
  6. Or shout “fire, fire, fire!”

5.3.2.2 Upon receipt of emergency call, the ERT shall respond immediately and shall act according to the following:

  1. Use firefighting techniques.
  2. Responds to emergencies as required.
  3. Initiate orders and command activity with firefighting.
  4. Call external Fire Department if the situation is out of control.
  5. If situation is getting worse, evacuation shall be planned upon H&S’s recommendation and approval of the GM.

5.3.2.3 The ERT and/or designated personnel (referred to as “fire fighters”) shall direct and lead all personnel/workers towards the designated evacuation area (or “assembly point”).

5.3.2.4 Employees and visitors shall follow the following evacuation guidelines:

  1. Proceed to the nearest exits or stairs.
  2. Walk fast. Do not run.
  3.     Proceed to the designated evacuation area.
  4. Do not go back to get personal items.
  5. Wait for a further announcement.

5.3.2.5 The Safety Officer, in consultation with the Chairman/MR shall make a recommendation if there is to be suspension of work, and shall take any necessary action if suspension is announced.

5.3.3 Handling Injury/illness of Personnel

5.3.3.1 In case of serious injured:

  1. Shout for help.
  2. Recover the injured person and administer first Aid as per injury treatment.
  3. Do not attempt to move the injured person if you are not aware of handling back or neck injuries.
  4. Call the ambulance and report the accident to the management as well as to control room.
  5. If the injured person conscious ask if can walk, transport him to the nearest hospital.
  6. If injured person is unconscious wait for the arrival of the rescue team

5.3.3.2 In case of illness:

  1. Inform the supervisor.
  2. The Supervisor or first aid nominated person must transfer the sick person to the hospital for proper medical treatment.
  3. If vehicle not available call : AMBULANCE

5.3.3.3 Reporting & Meeting:

  1. The Safety Officer, MR and other relevant personnel shall review and discuss any reported incident and shall plan corrective measures to avoid recurrence of the same environmental and OH&S emergency situation and incident.
  2. Emergency procedures shall be reviewed and revised as necessary to reflect continual improvement on the company’s emergency preparedness and response plan
  3. All matters discussed shall be communicated to all employees, contractors and other person working for or on behalf of the company through meetings and bulletin boards for general awareness.

5.3.4 Handling Chemical/Oil Spills

The guidelines below shall be used in H&S emergencies such as oil or chemical spills and leaks resulting from handling, accidents and explosions that pose immediate danger to employees and environment:

  1. For minor spills, clean the spills or leaks with absorbent materials and put the contaminated materials in a hazardous waste bin.
  2. For major spills, call the ERT and report immediately the matter to Safety Officer and theSafety Engineer.
  3. Then identify the type of chemical or oil spilled in the area and determine the source of all spills or leaks.
  4. Use appropriate protections in handling spilled chemicals or oils.
  5. Stop the source of leaks or spills.
  6. Contain the spill or leaks using the techniques that best fit the situation.
  7. For oil leaks, place an empty container under the source of the leak.
  8. Tie-up the pipe or hose where a chemical comes out.
  9. Replaced the defective pipe or hose.
  10. Put the leaking container in a recovery or inside another container.
  11. Rotate or shift the container to a position that stops the leak.
  12. Use appropriate absorbent materials to remove the spills or leaks.
  13. Limit the spill or leak to as small an area as possible.
  14. Contain the spill chemicals within a salvage drum.
  15. Remove the contaminated clothing & dispose them accordingly, then shower.
  16. Decontaminate any tools used in the removal and clear-up of hazardous materials.
  17. ERT shall ensure that appropriate PPE (Personal Protective Equipment) is used when handling chemical or oil spills.

5.4 Preparedness

5.4.1 Test the plans and procedures for adequacy at least once in 6 months.

5.4.2 Ensure the effectiveness of the emergency training through exercises and Mock drills.

5.4.3 Regularly inspect the existing emergency facilities, supplies and equipment and rectify any deficiencies.

5.4.4 Ensure provisions for notification, initial assessment and communication during an emergency situation.

5.5 Response

5.5.1 Ensure a safe and efficient evacuation during emergencies.

5.5.2 Ensure to maintain right level of security during any emergencies.

5.5.3 Communicate to news media and general public in the event of any emergency, accident or other incident, only after seeking concurrence from Chairman.

5.5.4 The steps taken in response to a fire, hazardous material incident, and situations requiring medical and/or rescue response shall be documented in detail.

5.6 Duties and responsibilities

 5.6.1   Safety Officer

  1. He will be in-charge of handling any emergency under the overall guidance of the Chairman.
  2. Guiding the various controllers end and co-ordinates in carrying out their function effectively.
  3. Depending on the seriousness of the emergency ensure outside help.

5.6.2   Service Center Manager

  1. Immediately on knowing about the emergency he will proceed to the scene.
  2. Quickly assess the scale of emergency.
  3. To give instructions to managers for control of operations in other sections/shutdown
  4. Ensure safety of personnel at site. Evacuate all unwanted persons from the site through operators or supervisors

6.0 RECORDS

  • Emergency Response Plan
  • Emergency Contact Numbers
  • Mock Drill Record

Example of Emergency Preparedness Plan-OHSMS

1.0 EMERGENCY

An emergency is a situation, which may lead to or cause large-scale damage or destruction to life or property within or outside the factory. Sometimes the Emergency results in uncontrollable situations and leads to disaster. Such an unexpected severe situation may be too great for the normal workforce in the area within the plant. In any industry, an emergency can arise at any moment and this depends on the type of

  • Structure
  • Raw Materials
  • Machines / Plant
  • Nearby Industries etc.

2.0  NATURE OF EMERGENCY

The emergency has been identified and can be specified in one or more of the followings with source and effect:

Sr. No.EmergencySourceEffect
1Fire / ExplosionElectrical Panels, Flammable oil storage tanks, Compressors, coolants,  paints, etc.Small fires, complete equipment loss, complete Area burn out.
Dangers to Human beings
2Spillage of flammable / Hazardous Oils & coolants etc Hydraulic oil, Furnace Oil, Coolant etc.Fire
Burns
Soil pollution.
Injury by slippage
3Electric ShockElectrical panels, Power Distribution Board, DG Set, Overhead Crane, Voltage stabilizer, Electric Transformer & Machine Operated by electricity, etc.Burns, suffocation, Death. Toxic chemical ingestion into the bloodstream
4Accidents – Factory (Major)Fall from height & Falling of Heavy Materials, Dies, Bins or other Heavy objects.Fracture
5Accidents-TransportAccident due to the transportation of man & materialDeath or Injury to Body
6Personal confinementToilets, offices, BasementSuffocation
7Natural calamities such as storm,  earthquakes, etc.NatureStructural collapse, Death
8Structure collapseOffice building, & Any Wall or a part Of Factory building.Serious injury, Major Fracture, Death
9Riots, Arson, SabotationAnti-Social elements.Serious injury, major Fracture, Death.
10LPG leakageFire HazardSerious injury, Death
11TANK DYKE FireFire HazardSerious injury, Death
12Electric fireFire HazardSerious injury, Death
13Office fireFire HazardSerious injury, Death
14Person on flamesFire HazardSerious injury, Death
15Food/Water PoisoningHealth HazardPoisoning, Death
16Bomb hoaxBomb ThreatExplosion, Death, fear
17Burn-MinorHealth HazardBurn injury
18Electric shock casualtiesHealth HazardInjury, Death

3.0 OBJECTIVES:

The objective of the major emergency procedure should be to make maximum use of the combined resources of the works and the outside services to

  • Effect the rescue and treatment of casualties;
  • Safeguard other people;
  • Minimize damage to property and the environment;
  • Initially, contain and ultimately bring the incident under control;
  • Identify any deed and provide for the needs of relatives;
  • Provide authoritative information to news media;
  • Secure the safe rehabilitation of affected areas;
  • Preserve relevant records of equipment by the subsequent inquiry into the cause and circumstances of emergency;

4.0  EMERGENCY MANAGEMENT & KEY PERSONS                                        

During an emergency situation, it is generally seen that chaos and confusion rules leading to more damage. In Emergency Management, just like in normal operations where there are managers, engineers, supervisors, operators, etc., who are assigned specific tasks to run the business, similarly during an emergency also there are persons with specific duties. These persons are known as ‘Key Personnel’.

Following are the persons who are responsible to face the emergencies.

NAMEDESIGNATIONCONTACT NO
   
   
   
   
   
   
   

If required external help in case of an Emergency will be sought from appropriate sources. The required assistance from the probable sources has already been informed and consent obtained for the same.

5.0  ROLES & RESPONSIBILITIES:

5.1 Name & Address of the persons furnishing the information:

XXXXXX

XXXXXX

5.2 Any Individuals  

When an emergency occurs, the person who observes it must evaluate the gravity of the emergency and he should alert all the factory personnel by activating the Emergency Siren.  The emergency siren is activated just by pressing the Emergency Siren push button located at the main gate & other different locations. Then he immediately reports to the Emergency Control Centre (Main Security gate) and informs about the Emergency location.

5.3 Site Controller:

The Site Controller will assume overall responsibility for the factory/storage site and its personnel. His duties are to:

i) Assess the magnitude of the situation and decide if staff needs to be evacuated from their assembly points to identified safer areas

ii) Exercise direct operational control over areas other than those affected.

iii) Undertake a continuous review of possible developments and areas in consultation with key personnel as to whether shutting down of the plant or any section of the plant and evacuation of personnel are required.

iv) Liaise with senior officials of Police, Fire Brigade, Medical, and Factories Inspectorate and provide advice on possible effects on areas outside the factory premises.

v) Look after rehabilitation of affected persons on discontinuation of emergency.

vi) Issue authorized statements to news media and ensures that evidence is preserved for inquiries to be conducted by the statutory authorities.

5.4 Incident Controller:

The Head of the unit will act as an incident controller for that unit. Immediately on knowing about an emergency, he will rush to the incident site and take overall charge and report to the Site Controller. On arrival, he will assess the extent of emergency that exists and inform the Communication Officer accordingly. His duties will be to:

i) Direct all operations to stop within the affected area taking into consideration priorities for the safety of personnel, minimize damage to the plant, property and environment and minimize loss of materials

ii) Provide advice and information to the Fire/Security Officers and local fire service;

iii) Ensure that non-essential workers/staff of the areas affected are evacuated to the appropriate assembly point and the areas are searched for causalities

iv) Set up communication points and establish contact with the Emergency Control Centre in the event of failure of electric supply and internal telephones

v) Report on all significant developments to the communication officer and

vi) Have regard to the need to preserve the evidence so as to facilitate an enquiry into the cause and circumstances which caused or escalated the emergency.

5.5 Communication Officer:

He will also work as Liaison Officer and will be stationed at the main entrance (GateHouse) during the emergency. He will handle police, Press, and other inquiries, receive reports from roll-call leaders from assembly points, and pass on the absentee information to the Incident Controller. He shall maintain regular communication with the Incident Controller. He will:

  1. Ensure that casualties receive adequate attention/ to arrange additional help if required and inform relatives;
  2. Control traffic movements into the factory and ensure that alternative transport is available when the need arises; and
  3. When an emergency is prolonged, arrange for the relief of personnel and organize refreshments/food.
  4. Advise the Site controller of the situation, recommending evacuation of staff from assembly points if necessary.
  5. Maintain proper agreed inventory in the control room.
  6. Maintain a log of the incident on tape
  7. In case of a prolonged emergency involving risk to outside areas by wind-blown materials, he shall contact the local meteorological office to receive early notification of changes in weather conditions.

5.6 Security Officer-

Security Officer will be responsible for fire fighting. On hearing the fire alarm, he shall reach the fire station immediately and advise fire and security staff in the factory of the incident zone. He will convey the message to the communication officer, Incident Controller and Site Controller about the incident zone. He will direct emergency services. He shall

1) Announce over the PAS in which zone the incident has occurred and on the advice of the Shift Executive In-charge inform the staff to evacuate the assembly service.

2) Inform the Shift Executive In-charge

3) Call Incident Controller, Engineering/ Production Manager, Personnel and Administrative Manager, Departmental Head in whose plant the incident occurred.

4) Security Supervisor for each unit will act as the Security officer for that unit.

5.7 Receptionist:

On hearing the emergency alarm, the receptionist shall immediately contact the Site Controller and on his advice will call the local Fire-brigade and or Police station and safety committee members. In case the PAS and telephone system becomes inoperative, she shall inform the communication officer through the messenger. In case the fire is detected and the alarm is not in operation, she shall receive information about the location from the person who detected the fire and immediately consults the Incident Controller. On his advice, she shall contact the Security Guard and advised him to make an announcement on PAS about the incident and the location of the incident and to evacuate to their assembly point. She will continue to operate the switchboard advising the callers and pass all calls connected with the incident to the Communication Officer.

5,8 Departmental Heads:

The HODs will report to the Incident Controller and provide assistance as required. They will decide the staff they require at the incident site.

5.9 Maintenance In-Charge and Electricians: 

They will report the scene of the incident and close down the services as directed by the Incident Controller

  5.10 Shift Executive In-charge:

As soon as he becomes aware of the emergency and its location, he will proceed to the scene. He shall assess the scale of the incident and direct operations within the affected areas with the following priorities:

  1. Secure the safety of persons, which may require evacuation to the assembly points in the event of an escape of materials if the wind is from an adverse direction.
  2. Minimize damage to plant, property and the environment.
  3. Prevent spreading and damage to outside the premises.
  4. Minimize loss of materials;
  5. Have regard to the need for preserving evidence that may facilitate subsequent enquiry.
  6. Inform shift engineer-in-charge as to what services are needed or not needed.
  7. Hand over the charge of the operation to the Incident Controller when he arrives at the site.
  8. Advice the Security Officer at Gate whether to make an announcement on PAS or not to call the Senior Staff to the factory, if necessary.

5.11 First-Aid Teams:

The Personnel Manager shall keep the roll call lists for the fire and First Aid team on duty. The First Aid team is appointed by each Departmental Head for his shift team. Roll call leaders shall check their roles as a member of the services and report for emergency duty. The name of unaccounted persons or absentees will be informed to the Security Officer. Members of First Aid teams will report to the shift Executive In-Charge or Incident Controller on hearing the alarm and follow his directions.

3.12 Factory Fire Fighting Personnel:

The duty of the Fire Fighting personnel under the command of the Security Officer shall be responsible for fire fighting and rescue. On hearing the alarm they shall proceed to the place of the incident if know, or otherwise, they shall report to the Security Gate. The men at the security Gate shall find the location of the emergency, the equipment and proceed to the site or occurrence. At the site, the team will respond to the directions given by the Incident Controller

1

6.0  Roles  & Responsibilities for Safety Teams:                                                                         

After confirmation of the emergency location from the Emergency Control Centre, concerned teams will start functioning. The team leaders will coordinate and communicate with the management. The team member fights the emergency under the instructions of the leader. The team will ensure that:

  • The emergency does not spread.
  • The head count is taken in consultation with Liaison Manager and if necessary search operation for missing person/s. is undertaken.
  • Every member of the team uses the required Personal Protective Equipment while the operation is going on.
  • First aid is arranged.
  • Additional fire fighting equipment for the fire fighting team is arranged.
  • The smooth rescue operation is facilitated.
  • The emergency will be informed to fire brigade, neighbouring industries.
  • Medicines are provided.
  • Send injured to the hospital if necessary.
  • Records of first aid and hospitalization are maintained.
  • The help of other people is taken to control the emergency.
  • Remaining part of the plant is safe.
  • The area is cordoned off.
  • Necessary tools, equipment to handle any repair work are mobilized.
  • The main power supply line is cut – off if necessary.
  • Maintenance and repair are undertaken.
  • Conduct safety committee meetings every 3 months or in case of an emergency.

Team members of the safety committee:

NAMEDESIGNATIONCONTACT NO
   
   
   
   
   
   
   

7.0 EMERGENCY CONTROL CENTRE                                         

For the purpose of handling the emergency, Emergency Control Centre is very much essential. In the factory, Security Office at the Main Entrance is declared as Emergency Control Centre. All activities pertaining to the emergency will be carried out from this centre. The emergency Control Centre will be equipped with

  • Plant Layout indicating storages of hazardous material and fire fighting equipment and first aid box locations.
  • Material Safety Data Sheet of all chemicals handled in the premises.
  • List of all employees with addresses, tel. No., contact person and if possible blood group.
  • List of important telephone numbers such as police, fire brigade, hospitals, Directorate of Industrial Safety and Health, Pollution Control Board, etc.
  • A separate list of team members with their addresses and telephone numbers.
  • The facility of Direct Telephone Line.
  • Equipment such as Torch, Rope, and necessary Personal Protective Equipment, whistle, etc.
  • Note pads and pen/pencils to record the messages and record of activities pertaining to emergency
  • First aid box with proper medicines.

8.0 ASSEMBLY POINT      

Assembly point is displayed in front of the main gate and known to everyone which is ensured at the time of safety audit. The area of the assembly point has been set farther from the location of likely hazardous events, where employees, contractors, and visitors must assemble in case of emergency. Up- to date list of pre-designated employees must be available with the Site in charge at the assembly point in case of assembly of the employees.  The site in charge shall then do the roll call of the people present so that their presence can be marked.

9.0 ALARM RAISING SYSTEM

The factory Main “Emergency Siren” is located at the main gate. This will be used for raising the alarm and also for “All Clear” signals in case of emergency.

10.0 EMERGENCY RESPONDING PROCEDURE

In case of Fire / Explosion / natural calamity etc., any person noticing it must evaluate the severity of the emergency and he should alert all the factory personnel by activating the Emergency Siren.  The emergency siren is activated just by pressing the Emergency Siren push button located at the main gate. Then he immediately reports to the Emergency Control Centre and informs about the Emergency location. As soon as the alarm is heard, the safety team members will contact the Security office at the Main Entrance and the safety team will rush to the Emergency location. The safety Team & other team members will assemble at the assembly point.

11.0 Communication System:

Alarms should be followed by an announcement over the Public Address System or verbally by shouting. In case of failure of alarm system communication should be by the security guard who will make an announcement through the Public Address system. Mobile Phones, landlines, etc could be used as a mode of communication for an emergency. If everything fails a messenger could be used for sending the information.

12.0 Action Plan For Various Emergencies.

A) Fire

Actions to mitigate the emergencyResponsibility to Respond
Raising emergency alarmOne who observes Fire  or explosion
Shut down machines and Main power supplyOne who observes Fire  or explosion / Prod incharge
Evacuation, Assembly at Assembly Point.All employees
Fire fightingAll employees
Rescue OperationAll employees
First aid or HospitalizationAll employees
Final Declaration of  “All Clear” SituationMR / CEO

B) Major Spillage of flammable/ hazardous oils

Actions to mitigate the emergencyResponsibility to Respond
Raising emergency alarmOne who observes the major spill
Switch Off Power Supply of the equipmentConcerned supervisor, Maintenance engineers
Evacuation, Assembly at Assembly Point.All employees
Isolate & Barricade the area of spillSecurity
Control the spillage to avoid spreadDH
Stop all the work of welding, electrical etcDH
Fire fightingFire fighting team
Final Declaration of  “All Clear” SituationMR

C) Electric Shock

Actions to mitigate the emergencyResponsibility to Respond
Switch Off Power Supply of the equipmentConcerned supervisor, Maintenance engineers
Rescue the person.Concerned supervisor, Maintenance engineers
Call the ambulance, provide first aidDepartmental Head

D) Accidents – Factory (Major)

Actions to mitigate the emergencyResponsibility to Respond
Contact company doctor/hospitalDepartmental Head
Rescue OperationSafety  team

E) Accidents-Transport

Actions to mitigate the emergencyResponsibility to Respond
Contact Ambulance/ Hospital,
provide first aid
Inform HR Dept

Inform Police
Concerned Person    



HR dept

F) Personal confinement

Actions to mitigate the emergencyResponsibility to Respond
Call fire brigadeDepartmental Head
Raising emergency alarmOne who observes the calamity such as storm, earthquake

G) Natural calamities Such as storm, earthquakes, etc.

Actions to mitigate the emergencyResponsibility to Respond
Evacuation, Assembly at Assembly Point.All employees
Raising emergency alarmOne who observes the sabotage, terrorism or civil commotion
Isolate & Barricade if necessarySecurity
Fire fightingAll Employees
Rescue OperationAll Employees
HospitalizationAll Employees
Evacuation, Assembly at Assembly Point.All Employees
Final Declaration of  “All Clear” SituationChief controller

H) Structure collapse

Actions to mitigate the emergencyResponsibility to Respond
Raising emergency alarmOne who observes the calamity such as storm, earthquake
Evacuation, Assembly at Assembly Point.All employees
Isolate & Barricade if necessary,Security
Rescue Operation,Rescue team
Hospitalization,First aid team
Final Declaration of  “All Clear” SituationChief controller

I) Riots, Arson, Sabotaging (Inside the premises of the organization)

Actions to mitigate the emergencyResponsibility to Respond
Inform HR Head, Plant Head, MD, Security, Immediately.  Concern Person.      
Inform the Police immediately.HR Head
The Security shall isolate the area of Rioting with its total force.Security In charge
All work should stop immediately. The employees from rest of the premises shall be evacuated  immediately. The ambulance should be kept in Stand by to meet any eventually. Inform Hospital immediately to prepare for any emergencies. As soon as police arrives the area of rioting should be handed over to police.   Admin In charge.  

J) Riots, Arson, Sabotaging(Outside the premise)

Actions to mitigate the emergencyResponsibility to Respond
Inform HR Head, Plant Head, MD, Security, Immediately.Concerned person      
Inform the Police immediately.HR Head
The ambulance should be kept in Stand by to meet any eventually. Inform Hospital immediately to prepare for any emergencies.HR dept
The gates should be closed and no person and vehicle should be allowed to leave the company premises. Security should man the gates with full force and should prevent entry of any unauthorized person in side the company premises.Security In charge  
In case of more than 8 hours of riot situation the Admin should ensure adequate food and water is available for the employees. Admin In charge
Once all clear signal is received from the police, normal operation shall resume in the organization  Dept HOD  

K) LPG leakage

Actions to mitigate the emergencyResponsibility to Respond
1. Take immediate steps to stop LPG leakage
2. Stop all operations
3. All out effort should be made to contain the spread of leakage/fire
4. Saving the human shall get priority in comparison to stock/assets.
5. Plant personnel without specific duties should assemble at the nominated place.
6. All vehicles except those required for emergency use should be moved away from the operating area, in orderly manner at pressure –nominated route
7. Depending upon severity, electrical system except for control supplies, utilities, lighting and fire fighting system, should be isolated
8. If the feed to the fire cannot be cut off, the fire must be controlled and not extinguished.
9. Start water at areas involved in or exposed to fire risks.
10. In case of leakage of LPG without fire and inability to stop the flow, take all precautions to avoid source of ignition.
11. Block all roads in the adjacent area and render internal/external support for the purpose if warranted.
Fire Fighting Team

L) Tank Dyke Fire

Actions to mitigate the emergencyResponsibility to Respond
1. In case fire occurs in the dyke area due to flange leak in manifold area, the fire is to be extinguished with the help of foam.
2. Use of DCP if the fire is small, otherwise use water spray or foam.
3. Cooling of lines /flanges is to continued till incident/site controller gives the instructions to stop.
4. If tank collapses and product is spread in the dyke area with fire.
5. Withdraw manpower in and around the tank dyke area.
6. Use foam monitors of vehicles to spray and spread foam in the affected dyke area
If tank dyke area is on fire and full product is in the dyke then water to be used judiciously otherwise flooding of dyke area may cause overflow of oil from the dyke area to open drains.
Fire fighting team

M) Electrical Fire

Actions to mitigate the emergencyResponsibility to Respond
Disconnection of the electric supply of the affected area.Attempt to extinguish the fire with the help of DCP/CO2 fire extinguishersIf the fire still persists, ensure complete isolation of electric supply of that area and use of water.Maintenance and fire fighting team

N) Office Fire

Actions to mitigate the emergencyResponsibility to Respond
Disconnection the electric supply of the affected area.Attempt to extinguish the fire with the help of DCP/CO2 fire extinguishersSave all records from fire.  Office staff and fire fighting team

O) Person on Flames

Actions to mitigate the emergencyResponsibility to Respond
1) Bring the water gel blanket
2) Open the bag inside the container to remove blanket. If the bag is already open such blanket should not be used for burn victims
3) The blanket can be held as a screen between the victim and the fire
4) If possible lay down the victim and wrap the blanket around the victim. Leave the victim wrapped in blanket and seek medical help  
Fire fighting team

P) Food/Water Poisoning

Actions to mitigate the emergencyResponsibility to Respond
1) Persons observing the symptom should inform the location in charge for assessing the situation
2) Shift in charge should call the doctor and ambulances and also alert all hospitals to meet any exigencies
3) To render first aid and induce vomiting to the affected persons
4) The ambulances and vehicles available should be mobilized to be in readiness to transport large number of people if required Assistant Manager-SHE to report to location in charge for required sanitation and medical assistance.
First Aid team

Q) Bomb Hoax

Actions to mitigate the emergencyResponsibility to Respond
1) Person noticing on object like bomb, should bring it to the notice of the nearest available officer.
2) The officer should carefully observe the same from a distance and raise alarm
3) The area should cordon off.
4) Police control and fire control to be informed for their arrival and inspection of the area. After the bomb is diffused, all clear siren should be sounded by the watchmen.
Concerned person/ Admin dept

R) Burn –Minor

Actions to mitigate the emergencyResponsibility to Respond
Pour cool water on the burn area till the burning sensation is reduced.Cover it lightly with a clean cotton cloth.Do not apply butter, oil, ointments or any home remediesGet Medical help  First aid team

S) For Electric shock casualties

Actions to mitigate the emergencyResponsibility to Respond
Electric shock results in irreversible damage to brain cells followed by deterioration of the other organsRescue and first aidDo first thing first, quickly and without fuss or panic. Switch off the supply if this can be done at once. If not possible, use a dry stick, dry cloth or other non conductor to separate the victim of electrical contact. The rescuer must avoid receiving shock himself be wearing gloves or using a jacket to pull the victim.First aid team

12.0 DO’S AND DON’T’S

12.1 All Company Employees

Do’sDon’t’s
 Stop work on getting information or hearing the alarm.
 Switch off the machines and main power supply.
 Gather at assembly point.
 Contact Management
 Take visitors to safer place.
 Do not panic & cause stampede.
 Do not run and prevent others from doing so.
 Do not go anywhere else.
 Do not wait to collect personal belongings.

12.2 VISITORS & CONTRACTORS

After hearing the alarm they will follow the following steps:

  1. Give attention to all instructions.
  2. Stop work. Do not panic.
  3. Do not wait for personal belongings.
  4. Assemble at the assembly point.
  5. Do not go to the emergency site.
  6. Do not spread rumours.
  7. Do not engage in communication systems.

13.0 TRAINING

The employees will be informed about the ‘On–Site Emergency Plan’ in detail, with the help of training programs. For the success of this plan not only training will be organized but mock drills also will be organized a minimum of once a year. Mock drills will help to understand the role to be played by everyone during the emergency. The Core members of the Disaster / Emergency control will be given refresher training at the interval of every One Year.

14.0 MOCK DRILL PROCEDURE

The success of the “On-site emergency plan” is very much dependent on planned and unplanned mock drills. Mock drills help employees to be familiar with their roles and ensure accuracy of the onsite Emergency Plan. Following is the procedure for conducting a Mock drill.

  • Inform all the employees about mock drill procedures.
  • Fix the date and time for mock drill.
  • The mock drill will be monitored by the observer/s not involved in the exercise.
  • The emergency alarm will be raised.
  • After hearing the alarm, the Emergency Procedure will be followed. All clear signals will be given after the emergency is over.
  • Observer/s will note down the activities with respect to the time.
  • Lacunae observed in the system will be studied carefully.
  • Records of drills will be maintained.

After each drill, the plan will be thoroughly reviewed to take into account the omissions or shortcomings for improvement.

15.0 Details of liaison arrangement between the Organization:

All the organizations involved in assisting during the emergency were contacted and apprised of the details of the plant, like process; hazardous material handled; likely emergency incidents; steps taken to avoid/reduce risk mitigation methods, resource availability, etc. The details are as follows:

 15.1 POLICE

Sr.NoName of Police StationTel.No
   
   
   
   
   
   
   

15.2  FIRE BRIGADE STATION

SR. noFire StationTel no
   
   
   

15.3 HOSPITALS AND DOCTORS

Sr.NoName of HospitalTel No
   
   
   
   
   
   
   
   

16.0  UPDATING THE PLAN

As and when required, this ‘On–Site Emergency Plan’ will be updated and informed to all. If necessary, after each drill the plan will be thoroughly reviewed to take account of shortcomings.