Introduction
Scope
Introduction
The ISO 9001:2008 standard has been used as a basis for managing
the security process. It does not however address all of the essential
requirements of a sound security management system. The IMO ISPS
Code has been written specifically for Port Facilities and Shipping
and is not applicable to other vulnerable land based facilities.
Items not addressed in the ISO 9001 standard are information
gathering on potential threats, identification of potential
targets and vulnerable activities and facilities and subsequent
risk assessment, security levels and when to change levels,
testing of plans including security drills, security equipment
and its testing and maintenance and measurement of performance.
It recognizes that whilst ISO 9001:2008 the current standard
used for certification does cover many of the activities, it
falls short in a number of specific areas, and further detailed
requirements have been identified and incorporated in this standard
that has been written specifically for organizations who need
security management for their facilities.
This facility security management systems standard is based
on the principles of the IMO ISPS code, ISO 9001:2008, ISO 14001:2004
and OHSAS 18001:1999 standards.
Scope
This Facility Security Management Systems Standard ( FSMS1 ) gives
requirements for a security management system, to enable an organization
to control consistently its security risks and improve its performance.
It does not state specific security performance criteria, nor
does it give detailed specifications for the design of a management
system.
The FSMS 1 standard is applicable to any organization that wishes
to:
| a) |
establish a security management system
to recognize, assess and minimize risks to visitors, employees,
operational facilities, property and other interested
parties who may be exposed to the security risks associated
with its activities. |
| b) |
implement, maintain and continually
improve a security management system; |
| c) |
to be able to control, manage, measure
and assure itself of its conformity with its stated security
policy. |
| d) |
to establish the respective roles
and responsibilities to all parties and to ensure that
these responsibilities are understood and fulfilled. |
| e) |
To ensure the early and efficient
collection and exchange of security information. |
| f) |
Demonstrate such conformance to others; |
| g) |
Seek certification/registration of
its security management system by an external organization
to give confidence that security measures are in place. |
| h) |
Make a self-determination and self-declaration
of conformity with this FSMS 1 security management system
standard. |