Comprehensive Security Plan - 2019
Comprehensive Security Plan - 2019
DIRECTOR COURSE
PREPARATION OF THE COMPREHENSIVE SECURITY PLAN
Index
Comprehensive Security
José A. Fernandez Marin
Plan
HIGHER SECURITY DIRECTOR COURSE...........................................................................1
Index.......................................................................................................................................1
INTRODUCTION
This comprehensive security plan will try to develop an effective protection system, in order to protect
and guarantee both the safety of people and the tangible and intangible assets of the main headquarters
of the company Team Navigation Control (TNC). To do this, it will be necessary to define and delimit
the human resources, technical means, protection materials, as well as the organizational measures
necessary to guarantee said security.
In order to achieve the most optimal and economically viable level of security for the company's
management, the security plan will be based mainly on the regulations currently in force in Spain
regarding private security.
This Project is developed, since it wishes to establish a comprehensive security system (PSI), with the
purpose of implementing the necessary Security systems.
This project will encompass both the physical security of people, property and real estate in the
factory, as well as occupational security, along with the protection of the company's knowledge and
development of new technologies.
How to get it
The design of a comprehensive Security Plan is an alternative solution that allows the use of the
necessary technical, practical and conceptual elements so that the security requirements exposed and
observed in the entity are satisfied, this is done through the design of a adequate set of controls,
encompassing policies, practices, procedures, organizational structures and functions. These controls
are established to ensure that the specific objectives in the security of the organization are achieved
and to achieve the preservation of the following characteristics or pillars on which the quality of the
service is based.
The means to be able to face these risks must be defined in a Comprehensive Security Plan and
include the following types:
•Technical Means: Passive safety and active safety systems, including auxiliary means.
An attempt will be made to integrate all existing security resources and measures and to implement
2
Security Director Higher Course
them to create a homogeneous and technically and economically viable security system.
This project is carried out by the Security Director D. José A. Fernández, authorized by the Ministry
of the Interior with TIP no. 1000000, developing the comprehensive security plan for the Spanish
subsidiary of the multinational Team Navigation Control (TNC).
1. BUILDING CHARACTERISTICS
This building is located in the Ruzafa neighborhood of the city of Valencia, ave. de la Plata, no. 243.
The facilities are located next to a depressed area, occupied by old houses with a marginal population
and a high crime rate. The entire area is undergoing a profound transformation in recent years. Low-
quality buildings have been demolished and office buildings, high-rise residential-type homes with
common areas and hotels are being built.
It is a construction, consisting of a single building five stories above ground level and a basement. The
building is almost free-standing, except for its west façade which adjoins, starting from the first floor,
with a 4-star hotel, whose roof is 2 meters higher than the roof floor.
The facility has been completely renovated and is awaiting the Comprehensive Security Plan to
provide it with security and fire detection and extinguishing measures and to proceed with its
inauguration and opening.
1.1 Situation
The facilities are located next to an area occupied by old houses. The entire area is undergoing a
profound transformation in recent years. Office buildings, residential-type high-rise homes with
common areas and hotels are being built.
Given the proximity to the Port, the forecasts are for a total transformation of the environment.
About 1,500 meters away is the CNP Ruzafa Police Station. and at the beginning of the Avenue. de la
Plata (2Km) the closest fire station. 300 meters away, heading north, is the Saler Highway, a fast road
that crosses the city.
3
Security Director Higher Course
It consists of a parking lot in the basement for workers and another on the ground floor used by
visitors.
The access doors to both (Pv-1 and Pv-3) are located on Avda. de la Plata, have a 4 m passageway,
made of sheet metal, sliding, manually operated. Pedestrian access is through P-2, located between the
previous ones and with similar characteristics.
The accesses are located on Avda. de la Plata, two-way, has 12 meters of road and three meters each
of the sidewalks and online parking is permitted next to both.
José Pérez Street is one way, towards the South, with lower residential buildings. It has a width of 7
meters plus 1.70 of each sidewalk. Line parking is permitted on the opposite sidewalk.
Pedro López Street, in one direction, to the West, is 8.5 meters wide and has similar sidewalks and
buildings as the previous one. Battery parking is permitted next to the sidewalk of the property.
The transformer, with high input, is located in the basement and on all floors vertically is the
distribution board for each floor.
Parallel to the main entrance, under the sidewalk, one meter from the gate, runs a gallery of services
that can be visited, with a red height of –3 meters.
Access to it is about 80 meters west of the entrance to the plot. Electrical and telephone wiring runs
through it. The drinking water pipe is 0.80 m. further away than the previous gallery and the general
water cut within the garden, next to the fence.
On José Pérez Street, on the opposite façade of our building, there is a Repsol pump, which operates
from 6 to 24 hours, and about 500 meters to the east, there is a Social Center for humanitarian aid,
where food and accommodation are provided. free to the homeless, very frequented by drug addicts,
who tend to spend the night in the area.
4
Security Director Higher Course
In addition to the parking there is a 420 m3 archive, with a large amount of documentation (paper), a
280 m3 material warehouse, the building's electrical distribution panel (high voltage) and the boiler
room. During working hours, 2 people remain in the archive and another two in the warehouse.
• The ground floor consists of a large lobby in which access control is installed, an assembly hall
with a capacity for 320 people, a cafeteria-restaurant for 60 people, with a kitchen, in addition to
parking for visitors, under the which is the diesel tank with 15,000 liters and two water tanks of
20,000 liters each. At the back is the caretaker's house.
• The company's management is located on the first floor (the General Director and a Deputy
Director with their respective secretaries and board room) and the administration and personnel
department has 32 people.
• On the second floor, there is the Data Processing Center, with all the computerized files, the
research room and the Communications Center with the outside. It is occupied by 60 people.
• On the third and fourth floors are the assembly and handling rooms and their occupancy is about
sixty technicians per floor. Most of the physical components of the equipment come from abroad.
• On the roof, there are the elevator and air conditioning boxes and a frosted glass skylight that
provides natural light to all floors above ground. It is accessed through a sheet metal door with a Fac
type lock.
• E-1: connects the basement with the 2 m roof. hole and 3.5m. of travel between floors, except from
the basement to the ground floor, which is 4.5 m. The access door to the independence lobby on all
floors is RF-60.
• E-2: open, connecting the ground floor with the 4th floor of 1.6m. wide and 3.5m between floors.
From the first floor its location varies.
• E-3: starts in the basement and ends on the ground floor, 1m wide and 4.5 m. travel. The access
door to the lobby on both floors is RF-60. It is located behind Ps-4, next to elevator shaft A-1.
It has four elevators and a freight elevator, all of them with pulley:
• Two go from the ground floor to the 4th floor and the others and the forklift start in the basement.
The vertical conduits are made through a corridor with untreated wooden doors and an exit on each
floor, and the horizontal conduits run through a false plaster ceiling.
5
Security Director Higher Course
• Pb-1 and Pb-2: with opening towards the interior and 1.20 meters of passage space each. They are
made of anti-shock glass on a metal frame and conventional lock.
• Pb-3 and Pb-4: emergency with anti-panic lock. Both with 1 m. of leaf. Carbon fiber and
conventional lock.
• The access to the underground parking (Psv-1) is sliding, made of sheet metal and manually
operated.
• Pb-5, Pb-6, Pb-7 and Pb-8, (entrance to the janitor's house, the cafeteria and merchandise,
respectively. They are made of chipboard and a conventional lock, all with a single leaf with a 1.10 m
gap.
• Pb-9, entrance, to the building from the visitor parking, with two 1 m leaves. each. It is made of
glass on a metal frame and conventional lock.
Basement:
420 m 3 archive, with a large amount of documentation (paper), a 280 m 3 material warehouse, the
building's electrical distribution panel (high voltage) and the boiler room.
Low level:
Second floor:
On the third and fourth floors are the assembly and handling rooms, with their corresponding files and
security rooms.
Cover plant:
2. EXTERNAL ANALYSIS
Circumstances that occur in this security plan:
- There have been evictions from substandard housing, to adapt the building to the activity it carries
6
Security Director Higher Course
out, which has generated reactions and protests from those affected.
- The area has a very high crime rate, with several robberies taking place in neighboring warehouses
by organized groups.
- The substandard housing that remains in the vicinity, about 500 meters away, constitutes a focus of
crime, since it is frequented by drug addicts and marginal personnel.
- The eastern area of the industrial estate, used for prostitution, is very frequented at night, which
creates a source of risk.
Deputy Director General - Replaces the Director General in his absence, and directly supervises
investigations.
Laboratory heads- They are in charge of the research teams in the laboratory departments.
Technical staff - 60 people including researchers and IT staff, plus 120 people in the assembly and
handling rooms.
Department heads - Personnel of various nationalities who are responsible for directing the personnel
in the departments from which this building is supplied, and controlling total production.
Cleaning, cafeteria-restaurant and maintenance staff - 3 cleaners and a glassman, 3 waiters and 1 cook,
2 maintenance people; all subcontracted personnel.
Basement:
2 people in the archive and 2 more in the warehouse. The maintenance staff is made up of 2
technicians.
Low level:
7
Security Director Higher Course
4 people in the cafeteria, including the cook, plus the janitor who has the house located there.
First floor:
On the first floor is the company management, director and deputy director, with their respective
secretaries, and the administrative part with the department staff, a total of 32 people.
Second floor:
A total of 60 people work in the data control center and the research room, including technicians and
department heads.
There are 60 technicians per plant (120), who are in the assembly and handling rooms.
4.3 Inside
8
Security Director Higher Course
The media have covered the upcoming inauguration of the Spanish subsidiary, which is why graffiti
has appeared in the area referring to its activity in support of North America and Israel.
In this section, threats and vulnerabilities are analyzed, considering the probability of their occurrence;
That is, they become risks, in order to be able to estimate the possible impact of the damage and,
subsequently, adopt the most appropriate measures for each case.
For our project we will use the Mosler method of risk analysis. For the risks of robbery, theft, bomb
threats, acts of vandalism, fire risks.
Mossler Methodology, which aims to identify, analyze and evaluate the factors that can influence the
manifestation of a risk, with the aim that the information obtained allows us to calculate the type of
risk.
In order to understand the development phases of the different tables, and to see where the values for
risk analysis and evaluation come from, in this chapter we will proceed to explain the development of
the Mosler method, which is the one we will use for our project. The tables with the analysis of said
methodology are in annex VIII.
9
Security Director Higher Course
To carry it out, it is necessary to define what risks the area to be protected is exposed to (investment
risk, information risk, accident risk, or any other risk that may arise), making a list in each case, which
will be taken into account. counts as long as conditions do not change (life cycle)
Which measures the negative consequence or damage that may alter the activity and whose
consequence has an associated score, from 1 to 5, ranging from “Very slightly serious” to “Very
serious”:
• Seriously (4)
• Moderately (3)
• Slightly (2)
Which measures how easily the assets can be replaced if any of the risks occur and whose
consequence has an associated score, from 1 to 5, ranging from “Very easily” to “Very difficult.”
• Hardly (4)
• Easily (2)
Which measures the disturbance and psychological effects depending on whether any of the risks are
present (Measures the image of the firm) and whose consequence has an associated score, from 1 to 5,
ranging from “Very mild” to “Very serious.” .
1
Security Director Higher Course
Which measures the extent of damage, in the event that a risk occurs at a geographic level and whose
consequence has an associated score, from 1 to 5, ranging from “Individual” to “International”.
• Local (2)
• Individual (1)
Which measures the probability that the risk manifests itself and whose consequence has an associated
score, from 1 to 5, ranging from “Very low” to “Very high”.
• High (4)
• Normal (3)
• Low (2)
Which measures and analyzes the possibility that, given the risk, there is actually damage and whose
consequence has an associated score, from 1 to 5, ranging from “Very low” to “Very high”.
• Very high(5)
• High (4)
• Normal (3)
• Low (2)
1
Security Director Higher Course
Depending on the analysis (phase 2) the results are calculated according to the following formulas:
I= F x S
d. Caused damages
D= P x E
Risk C= R & D
V. Vulnerability criteria
Probability PR= A x V
ER = C x PR
It is important to understand that, although the result is numerical, this scale is QUALITATIVE.
SCORE RISK
BETWEEN 1 AND 200 LOW RISK
BETWEEN 201 AND 600 MEDIUM RISK
BETWEEN 600 OR MORE HIGH RISK
RISK IDENTIFICATION
1
Security Director Higher Course
Nº2 INSTRUTION
Nº5 FIRE
5.3 Conclusions
The risks presented by the Spanish subsidiary of Team Navigation Control, given the threats it has
received from Islamic fundamentalism and the attacks received at the headquarters of other countries,
are the following:
Catalog of threats, risks and vulnerabilities. Risks derived from antisocial attitudes
Assets to be protected - All Team Navigation Control facilities, small electrical machinery, office
supplies, computer equipment, vehicles parked inside the premises and personal belongings of the
company's workers
Possible cause - The causes of the theft are mainly due to company personnel and the rest of the
contract personnel and the intrusion of strangers into the premises. Given the proximity of marginal
housing to the building, this is the most likely cause.
Signs that it has occurred - Lack of tools or other utensils, signs of forced doors or windows,
imbalance in inventory, tripping of the alarm system.
Damage effects:
Measures to take:
1
Security Director Higher Course
• A theft and intrusion alarm system will be installed on the exterior perimeter, interior of
the administrative building and warehouses.
• An exterior and interior video surveillance system will be installed.
• An access control system will be installed.
• Security guards will be hired to be able to patrol both the exterior perimeter and the
interior of the administrative building.
Vulnerable Points:
IDENTIFICATION 2 - INTRUSION
Possible cause: As a general rule, intrusion is a risk that occurs at night, but the possibility of an
intrusion occurring during the day cannot be ruled out.
Highlight the access from the hotel through the roof, a critical point of intrusion.
Signs that it has occurred: Forced doors or windows, tripping of the security system, lack of
equipment or material.
Damage effects:
• Security locks will be installed on all main doors, both in the administrative building and
in the exterior cafeteria and dining room premises.
• A theft and intrusion alarm system will be installed on the exterior perimeter, interior of
the administrative building and surrounding areas.
• An exterior and interior video surveillance system will be installed.
• An access control system will be installed.
• Security guards will be hired to be able to patrol both the exterior perimeter and the
interior of the administrative building.
• Parking for company and staff vehicles.
• Production and office buildings.
1
Security Director Higher Course
Assets to protect:
Possible cause:
Damage effects:
Measures to take:
Vulnerable Points:
Assets to protect:
• Image and information of Team Navigation Control, computer equipment and data
carriers
1
Security Director Higher Course
Possible cause:
• Own personal
• Personnel outside the company, but authorized (subcontractors) who can access areas not
authorized for this purpose.
• Intrusion of strangers into the premises.
• Forced doors and/or windows, loss of computer support, tripping of the security system,
strange use of computer media
Damage effects:
Measures to take:
Vulnerable Points:
IDENTIFICATION 5 - FIRES
Assets to protect:
• The life and integrity of the people and assets of the company.
1
Security Director Higher Course
Possible cause:
• Negligences.
• Carelessness.
• Short circuits.
• Etc.
Damage effects:
• Injuries to people.
• Damage to company assets.
• Loss of information.
• Possible personal losses.
• Economic losses.
• Material losses.
Measures to take:
Possible cause:
Vulnerable Points:
1
Security Director Higher Course
Special risks
Assets to protect:
Possible cause:
• Possible radical groups with the purpose of vindication, requests, beliefs, etc.
• Dissatisfied employees.
• Explosion sound.
• Fire.
• Smoke.
• Landslides, etc.
Damage effects:
• Material losses.
• Human casualties.
• Depending on the magnitude of the explosion, possible closure of the factory.
Measures to take:
Vulnerable Points:
1
Security Director Higher Course
• Production building since all types of materials are stored in this place.
• The risk is much higher in areas such as the basement parking lot of the
administrative building, where an explosion can increase its effectiveness.
• Proximity in the accesses and the perimeter of the company.
6. SECURITY PLAN
Given the complete renovation of the building, there are no security measures, and we are waiting for
this comprehensive security plan to provide it with them. It only has what was previously in it.
To achieve an adequate level of security for the building, its occupants and assets, this security plan
will be made by acting on the observed risks to mitigate their consequences. To this end, a series of
measures are contemplated to achieve the objectives of security, prevention and detection of any
threat that threatens people and the heritage of said building.
The main objective of the Access Control system must be to provide the facility with the means so
that in the event of intrusion or access by unauthorized persons, it is detected as soon as possible and
that these accesses can be controlled from the Control Center. .
For this reason, an electronic access control system will be installed on all interior and exterior doors.
With this, in addition to limiting access by unauthorized personnel to the facilities, we will have
control of who has entered any of the facilities and when.
Regardless of the fact that all electronic security systems will be integrated into systems management
software that we will detail in later chapters, the access control system will have its own software for
managing cards, personnel lists, etc.
This software will be installed on a PC located in the Rack cabinet located in the server room (CPD),
which is located on the second floor of the administrative building for these media.
1
Security Director Higher Course
Access control will be carried out starting at 07:00 by a security guard supported by another in the
systems control center, controlling the passage of personnel and merchandise inside the building, as
well as the entry of vehicles to the parking lot. which will be controlled by the software installed for it.
And a concierge who will issue the necessary accreditations for the entry of personnel, whether from
the subcontracted company or visitors, and know the hierarchies of the areas that can be accessed.
For vehicle access control, a license plate recognition system will be installed.
The recognition system, in addition to its main objective of opening the vehicle barrier, is very useful
for us to have control and registration that allows us to associate the images of the license plates with
the recording of the images, in addition to having real-time of a list of the vehicles that are inside the
factory.
For this purpose, license plate recognition cameras will be installed in:
2
Security Director Higher Course
• We can establish white and black lists: With a maximum of 512 license plates per camera,
to carry out specific actions against the license plates registered on those lists. Their
management is very simple since it is enough to download a table from the camera itself
in which we will fill in the alphanumeric data of the license plates.
• Programmable calendar: These types of actions can also be carried out or activated based
on a programmable calendar.
• Time and date printing: Within the license plate captures we can establish the printing of
text such as the time and date, the camera number or the license plate number, even
establishing the order of appearance.
• Real-time visualization of screenshots with associated text:
• By entering the configuration of the camera itself through a web browser, we can even
view the captures in real time with the associated image and text and the country of origin
of the license plate.
The building's Control Center will be where all postal shipments and parcel reception will be received,
for this reason an X-ray Scanner will be installed to control parcels.
All incoming small packages and mail will pass through this scanner.
This compact X-ray equipment is used, among others, for the inspection of Explosives, Weapons and
Narcotics. It is a sophisticated, fast and reliable X-ray inspection equipment.
At the entrances:
For the perimeter, 4 infrared barriers of 60 m, on the façade, (north, south, east and west).
At access Pb1, Pb2 and Pb9, security locks and magnetic contacts, with connection to the CCS, plus a
video intercom connected to the CCS.
Boom barrier from 4 to 4.8 m, for access to the visitor parking located outside, with an anti-vandal
intercom, magnetic detector loop and 2-channel inductive loop analyzer.
Feather barrier for access to outdoor parking for visiting vehicles, with its magnetic detector loop to
control the vehicles that want to access and bypass that requirement in the CCS room. Vandal-proof
intercom with a button and camera.
Each stair or elevator access will also have a card reader for adequate employee access control. The
2
Security Director Higher Course
elevators will operate with these cards from the hall to the different floors.
Staff for access control and personnel entry, metal detector arch, with the x-ray scanner next to it.
Automatic access control systems will have insertion card readers, and at some certain points they will
have an added keyboard to enter your PIN, which will provide added security to the system.
Each department will provide the security department with a weekly list of the personnel that works
with it, whether permanent or contracted. Likewise, they must send the registrations and cancellations
of said personnel as soon as possible, in order to accredit or suppress their access levels.
Each employee's personal access control card includes the make, model, color and license plate of the
vehicle(s) authorized to enter the facility with said driver.
All receipt of merchandise, packages and correspondence must be carried out by the security guard,
and prior to access or delivery to the corresponding department, they will go through the X-ray
scanner. The security guard at the checkpoint will verify if your reception was planned and, if not, will
notify the security department.
Card reader for access to the security levels requested and registration of events in the archive,
material warehouse and technical rooms. Another reader for vehicle access to the interior. And the
security locks that are needed for this.
The vehicle that wishes to access the facility may only do so with its authorized driver. Previously, it
will stop at the access barrier, at which time, while the driver is accredited by the security guard, the
vehicle will be automatically inspected using the explosive detection loop. Once the security guard
has verified that both the driver and the vehicle are authorized, he will allow you to pass.
First floor:
Biometric fingerprint reader for offices of the director and deputy director.
Second floor.
Chip card reader for access and registration of events in IT, research rooms, offices, CPD and
communications biometric fingerprint reader.
2
Security Director Higher Course
Card reader for access to the archive and security warehouse, biometric reader for entry to the offices
of department heads.
On the cover:
Electronic vibration detector with magnetic contact for the skylight and glass breakage detector.
6.1.4 Procedures
All access to the building, and entry of personnel, will be operational from 07:00 to 17:30, Monday to
Friday.
The alarm will be active in restricted zones or areas, the other areas will be monitored by CCTV and
controlled during periodic rounds.
It will be the security guard, with the mastering of all the doors by magnetic card with chip, who
manages these openings and closings.
The accreditations, previously described for workers, will all be magnetic for access to the floors and
hall of the building. Following Features:
Green zone with free access: Those areas of the building to which access and circulation is allowed
for anyone who has been previously registered in access control, generally they will be visits.
Controlled access amber zone: Those areas of the building to which access and circulation is only
permitted to those in possession of an amber card, external employees.
Class I restricted access red zone: Those areas of the building to which access and circulation is only
permitted to those in possession of a red card and job description that qualifies them to work in a
Class I zone, internal employees with permits to certain areas, specifically warehouse, generator and
common transit areas.
Class II restricted access red zone: Those areas of the building to which access and circulation is only
permitted to those in possession of a red card and job description that qualifies them to work in a
Class II zone: Specifically This area is limited to the research, administration, communications and
personnel room.
Class III restricted access red zone: Those areas of the building to which access and circulation is only
2
Security Director Higher Course
permitted to those in possession of a red card and job description that qualifies them to work in a
Class III zone: Specifically This area is limited to the management area, data processing center access,
IT and CPD.
The entry and access of people to the interior of the building will be carried out with the following
premises:
Employees entering through pedestrian access will use magnetic identification cards, placed in a
visible place, for control by security personnel.
They will pass through the security arch, introducing the objects carried through the X-ray scanner.
Those who access the employee parking lot, located in the basement, by vehicle will identify
themselves with the same magnetic cards, for access to floors by stairs or elevator.
Visitors will only be able to access through doors Pb1, Pb2 and Pb9, access doors located in the Hall,
for security control and must be checked in there. The concierge will give you the identification card
that will be collected upon exit, noting all the required data in the computer program that controls
access to the building.
The director's secretary will have a list of visits scheduled for each day in advance. All visitors who
want to access the ground floor parking must have been authorized in advance, so that when they
access they have the data corresponding to the vehicle, license plate, model, etc. And the door can be
opened by the security guard at the CCS.
Upon entering the building through door Pb1, they will go to the access control for verification by the
concierge and collection of the corresponding accreditation.
6.1.5 Indicators
A history of information referring to the following issues will be kept in a computerized file:
2
Security Director Higher Course
All systems and means to be installed at TNC will be carried out under the rules and regulations
established for private security, adhering to the following for the project at hand:
The primary objectives of the intrusion is theft, therefore the purpose of the measures taken is to
neutralize the corresponding threats in said building.
• Strengthen physical and personal security, such as anti-intrusion barriers, mechanical and
logical access controls, and private security personnel.
• Installation of technical measures, such as volumetric detectors, alarms, security doors.
An Alarm Center will be installed in the CCS, located in the reception on the ground floor of the
administrative building. This center will be connected to an alarm receiving center from an external
security company and will be certified in GRADE II, as provided in Order INT/316/2011, of February
1, on the operation of alarm systems in the field of security. private security in CHAPTER I “Security
facilities”
The alarm center is the nerve center of the system; it has a microprocessor that is responsible,
according to its programming, for receiving signals from the sensors and taking actions such as, for
example, activating a siren.
The plant has an automatic battery charger that will be responsible for powering the entire system in
the event of a power outage.
2
Security Director Higher Course
It constantly collects information on the status of the different sensors (volumetric detectors, magnetic
contacts, etc.) and, if it detects an intrusion in the protected area, it will activate the warning systems
(whether acoustic or optical).
The alarm system will be divided into Areas and these in turn into zones, each of these zones can be
activated and deactivated independently, with this we can protect the areas in which there should be
no presence of people and deactivate the detectors in those areas that are being occupied by personnel
who are working outside the building's normal hours.
Although the system supports up to eight keyboards, on TNC, only one keyboard will be installed.
This keyboard will be installed in the CCS and will only be used for programming and maintenance
purposes of the alarm system, since the system will be operated from the security systems
management and integration software.
The perimeter will be protected with a system based on microwave barriers and infrared barriers, these
barriers will be controlled by the alarm center located in the CCS.
The configuration and reading of the events will be carried out centrally from the CCS, allowing the
option from a maintenance point of view to adjust the entire system from any perimeter connection
cabinet.
Microwave Barriers
The transmitter emits amplitude modulated energy in X band, which is transmitted to the receiver
where it is detected. The received energy is amplified and processed, which causes the alarm relay to
2
Security Director Higher Course
be activated. When an intruder approaches the beam, the received energy changes causing the relay to
be deactivated, producing an alarm.
6 transmitter-receiver units will be installed; placed on the perimeter fence and two on the west
façade, on the roof that borders the hotel, and will be mounted on galvanized steel tube.
Characteristics:
Infrared barriers
The infrared barriers will be used as support elements for the opening system of the physical perimeter
barriers, that is, they will be installed inside the north and south entrance gates.
Active infrared sensors, better known as infrared barriers, are made up of an infrared light transmitter
and receiver and are devices specifically designed for perimeter protection.
The infrared barriers to be installed will be made up of an emitter block made up of four double
emitters inside a 3 meter standard column, and a receiver block made up of four double receivers
inside another column with characteristics identical to those of the emitter. . The column will have
heaters and anti-scale tamper.
The receiver module transmits an alarm signal when the four beams of any of the three elements
installed inside are simultaneously interrupted. This prevents false noises due to small animals and
small objects carried by the wind (leaves, papers...)
A sabotage signal is transmitted when an attempt is made to manipulate both the transmitter and the
receiver. Likewise, infrared barriers transmit a self-exclusion signal in situations of intense fog.
2
Security Director Higher Course
• Low level:
• First floor: this floor is located at a height of three meters above ground, so it is easy to climb
and access through the windows, which is why a total of 5 dual-technology volumetric detectors will
be installed in all offices with windows, as well as in the hallway and offices.
• Second and third floors: as preventive measures, dual-technology volumetric detectors will be
installed in all rooms with exterior windows, as well as in the hallways and lobbies.
magnetic contacts
On all access doors to the administrative building, doors on the ground floor and windows on the first
floor, to obtain early detection before the intruder enters the premises, magnetic contacts will be
installed.
The operation of these contacts is simple, but effective. Magnetic contacts are made up of two parts, a
magnet that is attached to the door leaf and the emitting equipment that is attached to the frame. When
the door is removed from its frame by a few millimeters, the transmitting equipment produces an
alarm to the central unit.
Characteristics:
2
Security Director Higher Course
• Cable length 2 m.
• NC/NO contact.
• Mounting tamper.
a) The analysis of risk situations and the planning and programming of the necessary actions for the
implementation and performance of security services.
b) The organization, direction and inspection of private security personnel and services.
c) The proposal of the security systems that are relevant, as well as the supervision of their use,
operation and conservation.
d) The control of the permanent training of the security personnel who depend on them, proposing to
the company's management the adoption of appropriate measures or initiatives to fulfill said purpose.
The security guard will ensure that anyone who wants to access the building is identified by means of
a DNI or similar card.
The corresponding department will have to report the visit, as well as their identification, so that when
carrying out the control the security guard can make a comparison and it corresponds to the person
they are really waiting for. You must check bags and luggage when you deem it appropriate.
The function of the CCS guard will include image control, fire alarm central, connection and
disconnection of lights and air conditioning through software. It will also have an access control
system in which it will supervise any unauthorized access to a restricted area and control of anti-
intrusion alarms installed throughout the building and perimeter. Act diligently in emergency
situations, in support of the evacuation and emergency plans of the Comprehensive Security Plan.
The company contracted to manage alarms (CRA) will be the one who manages said alarms during
non-working hours.
2
Security Director Higher Course
• Placing 100 m infrared barriers on the top of the fence (2.50 meters of it), allowing the
detection of intruders inside it, connected to the ARC.
• Cameras for 24-hour recording of said perimeter, connected to CCTV.
• Security locks on the perimeter doors and access to the property; Pb1, Pb2, Pb3, Pb4, Pb5,
Pb6, Pb7, Pb8 and Pb9.
• Volumetric detectors distributed throughout the floors, in the common passage areas, cafeteria
and kitchen. The Hall is the only area free of volumetric detectors because the CCS and
security guards are located 24 hours a day.
Once all this has been verified, the building will be alarmed, connecting the interior, exterior or
perimeter alarms with CRA, using a numerical keypad.
Private security personnel will also be in charge of disarming said alarm at 8:00, carrying out the
subsequent round to ensure that no anomaly has occurred inside.
During the night, rounds will be carried out, checking all the floors and the alarm switchboards that
are located at the access to each of them.
Access to the roof will also be checked, that the barriers are connected, that the skylight is in perfect
condition and that no one has attempted to access the building through the façade of the adjacent
hotel.
6.2.5 Indicators
A history of information regarding the following issues will be kept in a computerized file:
3
Security Director Higher Course
Likewise, with the video surveillance system it will be possible to quickly detect possible fire
outbreaks that may occur throughout the company and thus be able to intervene as quickly as possible.
The video surveillance system reduces, but does not eliminate, the need for security personnel. With
the video surveillance system, both the exterior and interior of the Company can be covered from the
operational control unit.
For the installation of video surveillance, the provisions of the Organic Law on Data Protection
(LOPD) will be taken into account.
As indicated by the LOPD, the video surveillance system “will follow the principle of proportionality
established by the LOPD, proposing only the cameras necessary for video surveillance of the premises
without the intention of collecting personal data such as images.”
In an analog video surveillance system, in addition to not having the same video quality, it is
necessary to run as many lines of RG type wiring, from each camera to the recorder, as cameras we
want to install, which increases the budgets for wiring and labor. installation, in addition to the
increase in future breakdowns in wiring runs.
Outside we will install motorized dome cameras and fixed cameras in the locations that we will
describe, and inside we will install minidome cameras, since they are more discreet than the Bullet
type. This type of cameras offers the following advantages:
3
Security Director Higher Course
The video surveillance system must not be invasive and must not be “inconvenient” for staff and
visitors.
All cameras will be connected to a high definition Digital IP recorder, but will also be integrated into
an alarm management system to be installed.
The CCS security guard will manage these means, being the first response to a possible incident that
may arise, relying on the service colleague for its resolution, or being the one who notifies the FCSE,
for rapid intervention.
To view the live images and view the recordings, a PC will be located in the rack provided for this
purpose in the CPD where the video server software will be installed from the video application.
Interconnected to this PC, two 32” monitors will be installed, located in the CCS, where all the
company's cameras will be displayed simultaneously, being able to interact on these monitors to see,
for example, a single camera on a full screen monitor and the rest of the cameras, in multiquadrant, on
the other monitor.
Regardless of being able to view the images on the aforementioned monitors through the video
application, the video recorder will be integrated into security system management software that we
will talk about in later chapters.
3
Security Director Higher Course
• Supports VCA events generated by cameras (motion detection, crossing line, tampering, noise
detection, face detection...).
• USB ports for backup. HDMI (4K resolution) and VGA monitor output.
• Web server and management and visualization software (SSM and SmartViewer). Compatible
with iPhone, iPad and Android. Watermark.
Joystick control
As a supplement to the video recorder, a joystick console will be installed on the CCS control desk.
With this console we will be able to control the motorized cameras that are part of the video
surveillance system.
• TFT LCD screen (800mm x 400mm) for controlling DVR/NVRs and motorized IP domes
motorized cameras
• Illumination 0.5 lux color and 0.01 Lux B/W with ICR. WDR (120dB), BLC and HLC
backlight compensation. SSDR, SSNRIII.
3
Security Director Higher Course
Motorized cameras will be installed on the outer perimeter of the plot located in the following
locations:
• West façade of the perimeter: on the east façade of the perimeter, the rear of the exterior
buildings, 6 motorized cameras with the characteristics described above will be installed. One will be
located in each corner of the wall next to the microwave barriers and another in the center of the
outdoor parking lot. These cameras will be located on poles, installed for this purpose, which will
exceed the perimeter wall by two meters.
• On the roof part, another will be placed to display the adjacent façade of the hotel.
With the help of the joystick, these cameras can be rotated and oriented to the area to be protected, as
well as zoomed in and zoomed in to bring the scene to be viewed closer.
6.3.4 Procedures
The system The CCTV elements, for perimeter surveillance and common areas and interior rooms of
the building, allowing intrusions and fire outbreaks to be detected, checking the situation of the rooms
at all times and allowing the possible intruder to be identified.
It will be used in the company for Access control, Presence control, Control of wandering individuals,
Video surveillance, Parking management, Vehicle identification, Visitor control, etc. The images
captured will be treated according to LOPD 5/2018.
6.3.5 Indicators
A history of information regarding the following issues will be kept in a computerized file:
Fixed cameras have the peculiarity, compared to motorized cameras, of showing us certain areas at all
times, if there is a need to view a specific area, you know that you have a camera focused on that
place without the need to have to look for that area. image with the motorized camera.
The motorized camera would be a support for these cameras, in order to see the details previously
displayed with the fixed cameras.
During the day they will serve to visualize in real time the movement of people inside the plot in case
3
Security Director Higher Course
there is an incident or accident, fire, etc. and during the night to detect possible intruders, even before
an intruder alarm occurs.
For greater discretion inside the administrative building, so that staff do not feel “watched” or
intimidated by the cameras, there will be mini-dome cameras inside, these will be provided with a
smoked glass dome in order to so that you cannot see where the optics are looking.
3
Security Director Higher Course
Like the rest of the elements that make up the video surveillance subsystem, these mini domes will
have the following characteristics:
It is necessary to define the elements of any Security issue. The security director will be the one to
undertake said personal protection plan, following the following guidelines:
The dimensional elements: Space and Time (Where and when we protect it)
A selection of the truly potential risks that affect the person, carried out on the threats described, as
well as those other risks that the study of the person requires to incorporate.
3
Security Director Higher Course
A rigorous study of the physical space in which the life and activities of the person to be protected
take place; Typically, it will include:
• Home.
• Workplace.
• Leisure areas.
• Itineraries on foot and by vehicle.
• Trips.
An interrelated study of the risks and spaces described, which will provide all existing vulnerabilities.
An evaluation of these vulnerabilities, as well as an estimate of the foreseeable times for the
development of the risks or threats, will result in a logical application of the means of protection.
The establishment of protection levels, with the application of the necessary measures and procedures,
and the assignment of technical and human security means.
For all corresponding persons, it is necessary, at least, to establish some standards of conduct, or
recommendations, which, duly assumed, will make it very difficult to carry out threats of attack or
kidnapping, such as:
• General measures.
• Security measures on the street.
• Safety measures with the vehicle.
• Security measures at home.
• Security measures for family members.
• Behaviors is a case of kidnapping.
Inside the building, security guards stationed at access control will ensure the safety of the managers
inside the building.
In the case of increased security for the entity's directors, the security director will propose to the
company management the hiring of private escorts, with the corresponding armored vehicle.
As previously indicated in the risk table, if the possibility of kidnapping or assault towards
management personnel is contemplated, they must be assigned a personal security team, made up of
two bodyguards and a driver.
3
Security Director Higher Course
A location and alarm system will be installed on their mobile phones, which will be directly connected
to the CCS, so that if the case arises, they can be located and go to the security director, who will be in
charge of calling the FCSE in case of need.
6.4.4 Procedures
The security director of the entity will recommend a series of actions to be carried out to devise good
security measures against the commission of criminal acts.
The proposed films on the windows of the entity's directors and the anti-panic buttons will be
measures to be taken for the personal safety of said directors, a task that the security director has.
It is also the security director who communicates to the FCS the different occasions in which said
governing body may be the target of illegal actions by detractors, such as in the case of an occasional
celebration in the building.
Therefore, it is the security director who requests the police presence in the surrounding area when
said building is inaugurated, given the concentration of personalities there.
6.4.5 Indicators
A history of information referring to the following issues will be kept in a computerized file:
It is an asset of incalculable value, whose loss or improper dissemination can cause serious damage to
image, confidentiality, financial, corporate, seriousness and, ultimately, to trust or loss of credibility.
The company's official information will be treated strictly confidential, and its copying, disclosure or
distribution by any means, be it spoken, written, visual, telematic or any other means of dissemination
that exists or exists, is strictly prohibited.
3
Security Director Higher Course
The main objective of computer security will be to protect our entity's computer resources from
damage, alteration, theft and loss of data, computer equipment, storage media and software.
The minimum and necessary permissions will be assigned, according to the department and work
performed by the user.
Users will only be able to access the system from authorized terminals.
Access to the system or the use of resources will be restricted in a specific time slot, taking into
account that:
- User accounts must not be able to access the system during non-business hours, except authorized
users
- The number of user profiles with maximum privileges should be reduced to the essential minimum.
• Username.
• Password (password).
• Option to change the password.
Firewall (Firewall):
The company's firewall must present a pre-established denial posture, configured in a way that
prohibits all protocols and services, enabling the necessary ones. If there is a fault in the firewall, it
must be a “secure fault”, which means that all access to the internet server must be blocked.
All computers will have a network identification. The people responsible for each computer will only
be able to access the network from their own computers, and not from other terminals without express
3
Security Director Higher Course
authorization to do so.
Access to the networks will be with client privileges, and you cannot access with administrator rights
or modify access privileges.
All staff will access from their position using a password and a password.
Both will be private, and cannot be communicated or disclosed among the rest of the staff.
The privileges of each team will be defined by the person responsible for the Department. of
computing, and cannot be altered.
Access to the company's web services will also be restricted by password and password.
The head of the IT department will respond to the security director for the following issues:
There will be a fireproof security cabinet with a security lock, for the storage of backup copies, to
which only the head of the IT department, security director or TNC management will have a key and
access.
4
Security Director Higher Course
Two closets will be placed, one on the management floor and another in IT.
A safe in the deputy director's office for the deposit of the most sensitive documentation that the
directors deem appropriate.
The keys to the security cabinets and safes will be kept in custody by the management team and the
security director.
Paper shredders will also be placed on each plant, thus ensuring that the information that these
documents may carry do not leave the entity.
6.5.4 Procedures
The IT manager will be in charge of making the registrations, cancellations or modifications of the
personnel's access to the company's information, especially when the employment relationship with
the company ends.
It will control employee access security levels, restrictions and employee security levels.
Level 1- this is information that circulates freely and can be accessed by any worker.
Level 2- data not available to workers, restricted to part of them. Need for a password to access said
information.
Level 3- privileged information, in possession only of the company's directors, access only by the
management body through a biometric fingerprint reader.
Users and those responsible for processing the information must report any anomaly found, and
ensure the confidentiality of the information in their possession, given their business relationship.
Access to it can be audited, user accounting can be carried out and relevant events can be recorded for
security purposes.
The worker will have the following premises based on the company information that they handle daily
in their positions:
• Each worker must be responsible for their assigned equipment, hardware and software.
• You may not use the equipment, web access, emails, software or hardware for purposes other
than the interests of the company.
Comprehensive Security Plan
• In any case, you are prohibited from using the company's computer systems for personal or
private purposes, especially email and Internet access.
• When you detect any violation in your equipment or in your access protocols, you must notify
4
Security Director Higher Course
6.5.5 Indicators
The control method will be a history of information related to the following issues:
The design, execution, commissioning and maintenance of said facilities, as well as their materials,
components and equipment, must comply with the provisions of the “Fire Protection Facilities
Regulations”, in its complementary provisions and in any other specific regulations that apply to it.
The commissioning of the facilities requires the presentation, before the competent body of the
Autonomous Community, of the certificate of the installation company referred to in article 18 of the
aforementioned regulation.
As far as fire protection systems are concerned, TNC will be governed by the standards established in:
4
Security Director Higher Course
2267/2004, of December 3
• Technical Building Code (CTE), approved by Royal Decree 314/2006, of March 17
• Royal Decree 513/2017, of May 22, which approves the Regulation of fire protection
installations.
• Basic Document SI - Safety in case of fire
The main objective of fire protection systems is the physical protection of the contents and container
of the factory.
These systems are intended to minimize the damage that a possible fire outbreak may cause.
For them, our company will take into account both passive safety (intumescent paints on beams and
columns, fabrics and carpets that do not spread flames, etc.), which will not be the subject of this
project, and active safety (electronic detection equipment and extinguishing equipment).
4
Security Director Higher Course
The purpose of the firefighting subsystem will be to detect and support extinction, as well as delay its
spread. The implemented firefighting subsystem is expressed in the following organizational chart:
The CCS security guard will manage and check these systems so that their functionality is correct at
all times. You will always have the alarm switchboard in operation.
4
Security Director Higher Course
Foreign aid teams, firefighters, medical services, police, etc., will be notified by the security director
when appropriate, depending on the type of emergency and its evolution.
4
Security Director Higher Course
Equipped fire hydrants In high special risk areas, in accordance with Chapter 2 of Section SI1, where the risk is
mainly due to solid combustible materials 121
Automatic extinguishing Unless otherwise indicated in relation to the use, in any building whose height of
installation eva cation exceeds 80 m.
In kitchens in which the installed power exceeds 20 kW in Hospital or Public
Residential use or 50 KW in any other use."
In transformation centers whose devices have dielectric insulation with a flash point
less than 300 °C and installed power greater than 1,000 kVA in each device or
greater than 4,000 kVA in all devices. If the dinner tro is integrated into a building for
Public Use and has access from inside the building, these powers are 630 kVA and
2,520 kVA respectively.
Administrative
Equipped fire hydrants If the constructed area exceeds 2,000 m 2 . 0
Dry column 15 ' If evacuation height exceeds 24 m.
6
' ' alarm system If the constructed area exceeds 1,000 m 2 .
Ingress detection system fire If the constructed area exceeds 2,000 m2, detectors in high risk areas in accordance
with Chapter 2 of Section 1 of this DB. If it exceeds 5,000 m 2 . throughout the building.
To comply with the provisions of the Basic Document SI Safety in case of fire in Table 1.1. Provision
of fire protection facilities for general use and administrative use, TNC facilities will be equipped with
the following measures and equipment for fighting fires:
The fire detection system is responsible for identifying and warning that there is a fire in a certain
place.
4
Security Director Higher Course
In order for the alarm to be triggered as quickly as possible in the event of a fire, the design of the fire
detection system must cover the largest possible area of the area to be protected.
Fire detection systems allow the automatic location of the outbreak, which facilitates the early
implementation of the procedures established in the self-protection plans. Fire detection systems must
be monitored 24 hours a day.
The fire detection system to be installed will be of the analog/intelligent type. This type of system
individually recognizes each of the buttons, detectors, sirens or modules that make up the system, so,
when an alarm is detected , indicates the exact point where the possible attempt has occurred, since all
the elements are previously named through programming.
This makes it the most suitable type of installation for a company the size of TNC, where it would be
very difficult to locate the alarm point with zone detection due to the great compartmentalization of
our company.
In addition, analog fire detection allows the control of elements of other facilities that have an
important role in a possible evacuation of the building, such as emergency fire doors, air conditioning
systems, etc.
• Detection center
• Detector
• Button
4
Security Director Higher Course
In the CCS, located in the TNC Reception, a fire detection center will be installed, with a repeater
panel and IP module for fire detection and alarms.
It has an alphanumeric LCD liquid crystal display with 2 lines of 40 characters, a membrane keyboard
with function and control keys and LEDs for displaying the status of the system and individual
indication of the 16 alarm and fault/fault/cancelled zones.
It will be mounted in a metal cabin with the capacity to house 2 12Vdc, 12Ah batteries.
Fire detectors
Two types of fire detectors will be installed at TNC, optical smoke detectors and thermovelocimetric
detectors.
• Optical smoke detectors: They will be installed in all offices and in all hallways,
warehouses, etc. taking into account that their coverage is approximately 60m2 and that
they cannot be installed in places where there may be suspended dust or smoke may be
produced from, for example, welding work, etc.
• Thermal Detectors: These detectors are not triggered by the effect of smoke, but by a
sudden increase in temperature or when the temperature gradually reaches 67ºC. This type
of detector will be installed in:
• In production and handling plants, for example, welding work can be done that can produce
smoke and trigger the fire detection system.
• Parking in the basement of the administrative building: if we installed optical detectors in the
parking lot, the smoke from the vehicles would cause constant false alarms, for this reason
Thermovelocimetric and CO 2 detectors will be installed.
The Thermovelocimetric detectors will be distributed in such a way that each detector covers
approximately 30m2.
4
Security Director Higher Course
They must be easily identifiable and red in color, from any point of travel they cannot be more than 25
meters until reaching a button and at a height no higher than 1.50 meters from the ground, if possible
they will also be installed less than 5 meters from the exits.
Pushbuttons will be installed in all evacuation routes of the buildings, distributed in such a way that
they comply with the aforementioned distances and heights.
Alarm and evacuation public address systems guarantee, in large buildings, the correct dissemination
of the alarm message and help the correct evacuation of the occupants.
The evacuation public address system will comply with the provisions of the RIPCI 2017 (Regulation
of fire protection facilities)
ANNEX I - Characteristics and installation of fire protection equipment and systems - Section 1.
Active fire protection - 1. Detection systems and fire alarm
“7. The alarm communication system will allow the transmission of differentiated signals, which will
be generated, either manually from a control post, or automatically, and its management will be
controlled, in any case, by the eci.
Equipment for transmitting alarms and fault messages must bear the CE marking, in accordance with
the EN 54-21 standard.
When signals are transmitted to an integrated system (public address), fire protection systems will
have a maximum priority level.” and standard EN-60849 “Public Address Systems for Emergency and
Evacuation Applications”, Standard EN 54, Fire Detection and Alarm System, among others.
An IP public address system will be installed. These are systems with IP-based audio and data with
specific security features, adaptable to any type of installation. IP-type control centers include
connectivity via Ethernet and allow the installation to be decentralized to control and configure it from
any point on the network.
It is important to keep in mind that all the features of these IP public address systems include all the
requirements demanded by the IEC60849 standard for voice alarm and emergency evacuation
4
Security Director Higher Course
systems.
• TRANSMIT audio signals at the highest possible level of quality, availability and flexibility.
• INTEGRATE security equipment through input/output signals, to control video cameras, light
switches, door actuators, detector input signals, etc.
• RESPOND to on-site situations and acoustically control the area under surveillance if
necessary.
Speakers will be installed in all hallways on all floors of the main building. The location of these
speakers will be distributed in such a way that in the “walking test” we have the same sound level
throughout the hallway.
ABC powder extinguishers are valid for extinguishing the following types of fire:
• Type A: (solid material fires, involving wood, fabrics, rubber, paper and some types of plastic
or synthetics).
• Type B: (liquid fires, involving gasoline, oils, paint, gases and flammable liquids and
lubricants).
5
Security Director Higher Course
6 Kg fire extinguishers will be installed. Efficiency 27A-183B-C, the location and placement of the
extinguishers will be as established in the RIPCI 2017 (Regulation of fire protection facilities)
Fire extinguishers will be installed every 15 meters of horizontal travel, they will be installed in such a
way that they are easily visible and close to places with a probability of fire, near the evacuation exits
and, if possible, fixed to vertical parameters in such a way that the top of the extinguisher It is located
between 80cm and 120cm above the ground.
“Its distribution will be such that the maximum horizontal path, from any point in the fire sector,
which must be considered the origin of evacuation, to the extinguisher, does not exceed 15 m.”
• Each and every one of the buildings outside the administrative building.
In addition to these powder extinguishers, CO2 (carbonated snow) extinguishers will be installed for
electrical fires in:
• electrical room
• Generator Set
• Boiler room
• Server room
In the server room, a fire extinguishing system will be installed using a NOVEC 1230 agent (FK-5-1-
12) based on the displacement of oxygen from the air. What the Novec 1230 product mainly does is
“steal” energy. of the heat of the flame and thus interrupts the combustion reaction. Only a small part
of the extinguishing effect of this gas is based on its chemical characteristics.
Benefits:
• Safe use in occupied rooms (low design concentration, and no significant reduction in oxygen
5
Security Director Higher Course
levels)
To comply with the provisions of the Basic Document SI Safety in case of fire in Table 1.1. Provision
of fire protection facilities for administrative use described in previous chapters, which specifies that
buildings for administrative use whose constructed area exceeds 2,000m2 must be provided with
equipped fire hydrants, BIE,S will be installed as described below.
There are two types of fire hydrants, they differ especially in terms of the flow of water they are
capable of supplying.
• Equipped 25mm Fire Hydrant: They have 25mm diameter, with a 20-meter semi-rigid hose
with the capacity to supply a flow rate of 100 liters per minute at 3.5 bar pressure at the tip of the
spear. It is characterized by its easy use and maneuverability, even for people who do not have
experience in using these devices.
It is not necessary to unroll them completely to be able to use them, you unroll them just enough to
reach the point of fire.
• Equipped 45mm Fire Hydrant: In this case the diameter is 45mm, with a 20-meter flexible
hose with the capacity to supply 200 liters per minute at 3.5 bar pressure at the tip of the spear. In
order to use this hose, you must unroll it completely and make sure that there are no folds that prevent
the passage of water. These fire hydrants are to be used by professional firefighting services.
Due to the above, 25 mm Equipped Fire Hydrants will be installed. In the entire administrative
building, parking lots and outdoor warehouse areas.
The Fire Hydrants will be installed as stipulated in Royal Decree 513/2017, of May 22, which
approves the Regulation of fire protection installations (RIPCI).
They must be placed on a rigid support, so that the center is at a maximum height of 1.5 m in relation
5
Security Director Higher Course
to the ground.
They will preferably be located near doors or exits and at a maximum distance of 5 m. An entrance
will always be installed, taking into account that they should not constitute an obstacle to the use of
said doors.
In fire hydrants equipped with 25 mm, the height above the ground may be higher, as long as the
nozzle and the manual valve, if any, are at a maximum height of 1.50 meters in relation to the ground.
The determination of the number of equipped fire hydrants and their distribution will be done in such
a way that the entire surface to be protected is protected by at least one equipped fire hydrant.
The maximum separation between each equipped fire hydrant and its closest one will be 50 meters,
and the distance from any point of a protected premises to the nearest equipped fire hydrant must not
exceed 25 meters. These distances will be measured on real routes.
The equipped fire hydrants will be marked in accordance with current regulations.
An area free of obstacles must be maintained around each equipped fire hydrant that allows access and
maneuver without difficulty.
If the network of pipes for the water supply of the fire hydrants that must be exposed will be made of
steel, and may be made of another material when buried or suitably protected, it will be for exclusive
use for fire protection installations and must be designed in such a way that the following operating
conditions are guaranteed in any of the equipped fire hydrants:
The dynamic pressure at the tip of the spear will be a minimum of 3.5 kg/cm2 (344 kPa) and a
maximum of 5 kg/cm2 (490 kPa).
• The minimum flow rates will be 1.6 l/s for 25 mm mouths, and 3.3 l/s for 45 mm mouths.
• These pressure and flow conditions must be maintained for one hour, under the hypothesis of
simultaneous operation of the two most hydraulically unfavorable nozzles.
• The network will be protected against corrosion, frost and mechanical actions, at the points
considered necessary.
The installation of equipped fire hydrants will be subjected to a tightness and mechanical resistance
test before receipt, subjecting the network to a hydrostatic pressure equal to the maximum service
pressure plus 3.5 kg/cm 2 (344 kPa) and as at least 10 kg/cm 2 (980 kPa), maintaining said test pressure
for at least 2 hours, and no leaks should appear at any point in the installation.
Hydrant Network
According to table 1.1 of Chapter 1 of Section 1 of the DB SI, it is established that, for administrative
5
Security Director Higher Course
establishments, they must be equipped with a hydrant if the surface is between 2,000 and 10,000
square meters, one or more for every 10 square meters. additional or fraction. Our plot has a total of
2,500 square meters, therefore, for our enclosure the installation of two exterior hydrants will be
necessary.
A hydrant will be placed on the North façade and another on the South façade of the company. These
hydrants are manhole hydrants, distributed in a perimeter ring and connected to the company's fire
fighting group. The hydrants arranged are each provided with two 70 mm outlets, with a 100 mm
Firefighter type fitting, with cover and chain in straight mode. Adjusted to UNE 23407.
Their purpose is to have a series of water hydrants to which hoses will be connected with suitable
equipment to launch water, in such a way that all points of the facades are beaten by it, in the form of
a jet or sprayed water.
The hydrants have been placed in such a way that their location is more than 5 m. of façade and less
than 15 m., except in the case where it is not possible to respect the minimum, due to the layout of
circulation routes. The flow rate of each hydrant will be 500 l/min. (30 m3/h).
The pipe that corresponds to the network of exterior hydrants will be buried at sufficient depth and
sufficiently far from the exterior perimeter wall of the building to be protected. The network will be
provided with sectioning valves, in order to ensure maximum efficiency in the event of a breakdown.
CO2
PLANT ABC POWDER TOTAL
Parking: 7 2 9
Low flat: 6 2 8
First floor: 7 1 8
Second floor: 5 3 8
Third plant: 7 7
Fourth floor: 7 7
5
Security Director Higher Course
Deck: 3 1 4
• In this building, the equipped fire hydrant systems and their characteristics and specifications
comply with the following requirements:
• They are made up of a water supply source, a network of pipes for the water supply and the
necessary equipped fire hydrants (BIE).
• Depending on the case, they are of the 45 mm BIE and 25 mm BIE types.
• The BIE have been mounted on a rigid support so that the height of their center is a maximum
of 1.50 m above ground level or higher if it is a 25 mm BIE, always ensuring that the nozzle
and valve manual opening, are located within the mentioned height.
• The BIE are located at a maximum distance of 5 m from the exits of each fire sector, without
constituting an obstacle to their use.
• The number and distribution of the BIE in the fire sectors, in an open space, is such that the
entire surface of the fire sector in which they are installed is covered by a BIE, considering
the length of its radius of action as its radius of action. hose increased by 5 m.
• The maximum separation between each BIE and its closest one is 50 m. The distance from
any point of the protected premises to the nearest BIE does not exceed 25 m.
• An obstacle-free area is maintained around each BIE that allows access to it and its maneuver
without difficulty.
• The established conditions of pressure, flow and water reserve are adequately guaranteed.
Hydrant installation:
To calculate the established amount, the hydrants that are on public roads can be considered; in this
case there is one on the sidewalk next to the visitor parking lot, less than 100 m from the accessible
façade of the building.
The building will have fire detection and alarm devices, both automatically and manually, detectors or
pushbuttons, connected to the fire control panel in the CCS, and can be connected both automatically
and manually. Detectors will be installed throughout the building, special security areas and manual
push buttons.
Thermovelocimetric and optical detectors will be placed on the floors and, in addition, in the
basement or parking lot, there will be optical, CO2, or gas detectors, and alarm buttons, with their
corresponding acoustic bell. All of this centralized in the CCS, by security guards.
5
Security Director Higher Course
In any case, the system must allow the transmission of local alarms, general alarms and verbal
instructions. These devices will voluntarily and manually send a fire alarm signal to the Signaling and
Control Central.
The buttons will be easily visible (red) and the distance to be traveled from any point in the building
protected by a button installation, to reach the nearest button, must be less than 25 m.
Emergency lighting will be found throughout the building, with the following areas:
• All premises that have, in all means of access (corridors, stairs and ramps), evacuation and
extinction, emergency lighting that, in the event of failure of normal lighting, provides the
necessary lighting to facilitate visibility to those users so that they can leave the building,
avoid panic situations and allow them to see the signs indicating the exits and the location of
the existing equipment and means of protection.
• The following areas and elements will have emergency lighting:
• Any venue whose occupancy is greater than 100 people
• The routes from all evacuation origins to the safe outdoor space and to the refuge areas,
including the refuge areas themselves.
• Car parks whose constructed area exceeds 100 m2, including corridors and stairs leading to
the exterior or to the general areas of the building;
• The premises that house general equipment of fire protection facilities and those of special
risk, indicated in DB-SI 1.
• General floor toilets in buildings for public use
• The places where distribution panels or control panels for the lighting installation in the
aforementioned areas are located.
• Safety signs
• Accessible itineraries.
Facilities intended for emergency lighting must ensure, in the event of failure of normal lighting,
lighting in the premises and access to the exits, to guarantee the safety of people evacuating an area,
and allow the identification of equipment and existing means of protection.
The emergency lighting installations will comply with the specifications established in the Low
Voltage Electrotechnical Regulation, approved by Royal Decree 842/2002, of August 2, and in the
Complementary Technical Instruction ITC-BT-28.
Automatic extinguishing:
Extinguishing system located in areas that must be protected due to special importance and where it is
not possible to use another type of extinguishing agent.
5
Security Director Higher Course
Foam in the kitchen and parking, and water spray for the garage.
6.6.4 Procedures
The procedures applicable in case of emergency are included in the self-protection plan, relative to the
emergency plan.
6.6.5 Indicators
• Number of detection elements broken monthly, out of the total number of them.
• Number of portable fire extinguishers that have lost their properties.
• Occasions of bad pressure in the BIEs.
• Monthly false alarms.
• Annual fire outbreaks.
• Annual real alarms.
• Number of times the generating equipment (UPS) has come into operation.
• Action time of the intervention team.
• Time to recover normality after an alarm.
• Calls to external equipment.
7. COORDINATION SYSTEM
This chapter contemplates the different emergency hypotheses and the action plans for each of them.
Classification of emergencies based on the type of risk, severity and occupation of the media.
Emergency detection and alert procedures, as well as alarm mechanisms, will be indicated.
The functions of the people and teams that will carry out the procedures and the identification of the
person responsible for the implementation of the Self-Protection Plan are also identified.
The coordination of personal and material resources is essential for the proper functioning of the
systems that make up any security plan.
Comprehensive Security Plan
5
Security Director Higher Course
Establish rules and procedures for action so that everyone works correctly.
Means and measures to ensure that other systems function properly, including:
Propose to the Team Leader the activities that complement the formation of the emergency plan.
Disseminate the knowledge acquired in the Civil Protection courses to the company staff, with the
purpose of raising staff awareness of self-protection.
Participate and motivate staff in drill exercises carried out in a property, as part of their functions
within the Emergency Plan.
Participate in data collection to carry out the diagnosis of the property and surroundings, thus
determining the needs and available resources.
Inform managers of the activities carried out, as well as the needs detected.
They will attend all training events such as: first aid, fire control, evacuation exercises and drills, risk
prevention and rescue and rescue techniques.
Periodically check that the firefighting equipment and auxiliary resources are in optimal operating and
maintenance conditions to be used to mitigate an eventuality; in the event that anomalies occur,
immediately report them to management.
The functions of the security director will be according to the Team, but at the time of emergency his
function will be determined as multifunctional.
The security department will be in charge of analyzing the measures to be implemented, reporting
directly to the deputy director, the security director will manage everything related to the security of
said building.
5
Security Director Higher Course
The need to hire security guards covers the consequent actions, which have already been analyzed and
contemplated in this Comprehensive Security Plan.
Security director
According to Law 5/2014, of April 4, on Private Security, it has the following functions:
a) The organization, direction, inspection and administration of available private security services
and resources.
b) The identification, analysis and evaluation of risk situations that may affect the life and integrity
of people and assets.
c) The planning, organization and control of the precise actions for the implementation of measures
leading to preventing, protecting and reducing the manifestation of risks of any nature with precise
means and measures, through the preparation and development of applicable security plans.
e) The provisional validation, until verification, where appropriate, by the Administration, of the
security measures regarding their adaptation to private security regulations.
f) Verification that the private security systems installed and the private security companies hired
comply with the approval requirements of the competent organizations.
g) Communication to the competent Security Forces and Bodies of the circumstances or information
relevant to citizen security, as well as the criminal acts of which they become aware in the exercise of
their functions.
h) Interlocution and liaison with the Administration, especially with the Security Forces and Bodies,
regarding the comprehensive security function of the entity, company or business group that has
contracted them, in relation to regulatory compliance on management of all types of risks. .
i) Checks of the necessary aspects regarding the personnel who, due to the exercise of the entrusted
functions, need to access areas or information, to guarantee the effective protection of their entity,
company or business group.
The security director is in charge of security matters for the building in question, both in the hiring of
private security personnel and the rest of the security workers of the entity in question.
These lines include the measures of the activities that the security director must systematically carry
out:
5
Security Director Higher Course
Once agreed upon with the building management (TNC), access to the areas of the building will be
prioritized, and the hours of activity in it.
It will establish the daily mechanics of access control, depending on the planned visits to the building
and acts or events within it.
The accreditations will be supervised by the same, regarding the system to be implemented.
It will decide which actions within the building should be undertaken by the FCSE.
It will designate the access codes to secure or restricted access areas, changing them whenever it
deems appropriate, for the security of said areas.
The personal security of the governing body of the Conservancy building will necessarily be his
concern as security director.
You will have a direct link with the head of the IT department to be up to date on information security
in the building, on issues that relate to cybersecurity or possible attacks on the company, both external
and internal.
He will be in charge of training courses for labor and private security personnel, to update knowledge
regarding possible emergencies or risk situations for the entity.
He will be the visible person of the TNC company for reports of acts of vandalism, crimes committed
against the entity or misdemeanors, with regard to the FCSE.
Ultimately, he will be the person empowered to adopt security measures, both for people and for the
facility itself.
j) Man or woman.
k) That they are in possession of an official university degree in the field of security that accredits
the acquisition of the skills determined, or the title of the security management course,
recognized by the Ministry of the Interior.
l) That for 5 years they have had experience in management positions or
m)public or private security management.
n) Computer knowledge.
o) Language proficiency, English essential, given the nature of this entity.
Security guards
Security guards will be hired, two on the morning shift from 7:00 a.m. to 3:00 p.m., on the afternoon
shift there will be only one from 3:00 p.m. to 11:00 p.m. and on the night shift also one from 11:00
p.m. 07:00. One of them will always be in the security control center, verifying the security of the
building, through cameras, alarms, fire control units and infrared barriers. All technical and logical
6
Security Director Higher Course
Due to its special characteristics, explained in the introduction of the security plan, this building will
be guarded 24 hours a day by private security personnel.
According to Law 5/2014, of April 4, on Private Security, it has the following functions:
p) Exercise surveillance and protection of assets, establishments, places and events, both private
and public, as well as the protection of people who may be there, carrying out the checks,
records and preventions necessary to fulfill its mission.
q) Carry out identity checks on personal objects, packages, merchandise or vehicles, including
their interior, at the access or inside buildings or properties where they provide services,
without, in any case, being able to retain personal documentation, but yes prevent access to
said buildings or properties.
r) Refusal to display identification or allow control of personal items, packages, merchandise or
vehicles will entitle individuals to prevent access or order them to abandon the property or
property that is the object of their protection.
s) Avoid the commission of criminal acts or administrative infractions in relation to the object of
their protection, carrying out the necessary checks to prevent them or prevent their
consummation, and must oppose them and intervene when they witness the commission of
some type of infraction or their help is required. for humanitarian or emergency reasons.
t) In relation to the purpose of their protection or their actions, detain and immediately place at
the disposal of the competent Security Forces and Bodies the criminals and the instruments,
effects and evidence of the crimes, as well as report those who commit administrative
infractions. They will not be able to interrogate them, although the annotation of their
personal data for communication to the authorities will not be considered as such.
u) Manage the CCS, located on the ground floor of the building, following the rules of action and
procedures imposed by the security director.
v) Resolve, to the extent possible, incidents that occur in the building, communicating to the
security director all actions, as well as the response given in said events.
w) Access control of people, packages and vehicles, as explained in the comprehensive security
plan.
x) In the provision of the private security service, by said security guards, their good image will
be essential. It is the first visible image of the entity to be protected.
6
Security Director Higher Course
floor of the building, having immediate access to any anomaly detected in its security.
The surveillance post will be the coordination point for the entire work group since from here it will
control the building and receive any calls that may be made to security.
Control of keys to the building will also be carried out from the CCS.
The security measures at the checkpoint will be designed by the security director, which will be:
• A metal counter, raised with armored glass up to 2.50 m, its access door will have a security
lock and electronic opening from the inside.
Comprehensive Security Plan
• The counter will have a Document Pass, a console where the monitors and other electronic
systems and equipment detailed below will be installed.
• Two modular and anti-fatigue chairs.
• An AACC console.
Its function will include image control, fire alarm central, connection and disconnection of lights and
air conditioning through software. It will also have an access control system in which it will supervise
any unauthorized access to a restricted area and control of anti-intrusion alarms installed throughout
the building and perimeter. Act diligently in emergency situations, in support of the evacuation and
emergency plans of the Comprehensive Security Plan.
6
Security Director Higher Course
The night shift guard will be permanently in communication with the CCS colleague with a corporate
mobile phone.
The building will have TV and radio frequency antennas for communications.
The comprehensive security plan integrates the following energy support equipment:
As the public electricity supply is the main energy source, auxiliary equipment will be available for
emergency electricity supply. This will be done using a 200 KW diesel generator engine, which will
have an autonomy of 48 hours, and will start automatically. It will be located in the basement of the
building.
The power equipment for the fire fighting system has an emergency generator for the correct
operation of said equipment.
The security team will be aware of any structural modifications that affect the comprehensive security
plan.
The director himself will give approval to any of the modifications planned for the building.
6
Security Director Higher Course
7.5 Procedures
The control center will be permanently attended by a security guard, there will be rotating relief shifts
every two hours.
These guards will have sufficient technical training to attend to said CCS.
Only the security director and security guards will be able to access the interior of the CCS; for this
purpose, the security lock and electronic opening access from the inside have been installed. All
entries and exits will be recorded in the record book that has been enabled for this purpose. The
documentation found inside will be the following:
7.6 Indicators
For the comprehensive security plan to effectively fulfill all its functions, this system must harmonize
all its actions, with the following indicators:
8. GLOBAL BALANCE
The Team Navigation Control headquarters presents a series of variables that indicate that security is a
primary element in the proper development of its activity and overall image. These variables are:
• The security needs that the security director has expressed to the entity's board of directors.
• The background of this entity, the constant threats of Islamic fundamentalism, have put this
company in its sights.
Comprehensive Security Plan
• Activities of an internal and public nature, with the participation of personalities from
different fields.
6
Security Director Higher Course
The priority of the management team and its security director to be able to guarantee employees and
customers an image of stability and a safe environment, given the background of Jakarta and the
headquarters in Baltimore.
The plan, due to the activity of the TNC entity, and the use given to the building, the risk analysis
carried out by the security director and the budget with which it is provided, is committed to the
implementation of the latest technical means in matters of security and the best existing human
resources.
There are two most significant elements in the design of the comprehensive security plan:
Magnified importance is given to the human element, since it is this element that makes the company
improve its overall security image in front of its clients, and exemplifies the security principle that
must prevail in the actions it carries out.
The appropriate technical means proportional to the risk of the building, based on the criteria of
effectiveness and efficiency, 100%.
This comprehensive security plan can boast of being modern and implementing the measures
proposed by the security director, integrated into a single and harmonious management.
This plan is aimed at resolving all possible events that occur in the building, without altering the daily
activity of the company, creating an ideal safety environment for the center's workers.
The plan is aimed at becoming something dynamic, modifying if necessary the strategy of the security
director, in the need to take new measures or hiring auxiliary services, which increase the desired level
of security, in the face of new threats or uncertainties in terms of security. security.
ANNEXES
In general, as has been said, if total security does not exist, our approach will be aimed at making an
effort to reduce damage or loss, if the risk occurs or materializes, in the company that concerns us in
this comprehensive safety plan. security.
In conclusion, it can be said that protection, whose result will be security, must integrate two basic
aspects such as prevention and fight. Prevention, whose primary objective is the elimination or
reduction of the circumstances or causes that trigger the risk or threat and the fight against the incident
or accident itself, whose primary objective is to avoid or reduce the damage or losses that may be
6
Security Director Higher Course
The technical means and protection and security facilities, applicable in companies, are in themselves
an investment that is difficult to make profitable without the support and complement of personal
means and appropriate organizational measures.
Therefore, it should not be seen as a factor that represents an expense, but as an added value that
provides benefits, both for the people who carry out their work activity on a daily basis, and for the
image of prestige that the entity projects in front of the client in particular. and to society in general.
The comprehensive security plan aims to respond to all those deficiencies, which in the Spanish
subsidiary of TNC, have caused the concern of its managers, both for their personal safety, and for
that of the workers attending the building, as well as that of their own image.
It must always be considered that the TNC company, both due to its activity and the relevance of its
managers, constitutes a target for terrorist, anti-social organizations and other detractors, who have
unequivocally demonstrated in other countries their disagreement with the activity it develops.
The fire protection plan, according to current legislation, includes the set of means and measures
intended for the prevention, protection and fight against fires, as well as the actions that guarantee the
evacuation of personnel and immediate intervention in the event of an incident.
Regarding access control, the aim is to implement a set of devices for the verification, inspection,
intervention or supervision of the passage or circulation of people, vehicles or objects to a previously
defined area or enclosure, for prevention and protection against the risk that may arise. affect people,
property or the facility itself.
Likewise, these systems will tell us in real time if access to the building is authorized or unauthorized,
avoiding any attempted intrusion into protected areas, both day and night.
A CCTV system will be installed that allows surveillance in all sensitive areas of the building, from
the perimeter, interior or exterior, and areas designated as maximum security, recording each incident
in real time by the CCS.
On the other hand, a series of both technical and organizational measures are adopted to address the
personal safety of the members of the entity's board of directors, a structure of human and material
resources, whose sole direction aims to prevent risks that may affect to them. It will have a deterrent
nature, protective effectiveness and preventive purpose.
Information is one of the most important assets of the TNC company, therefore the objective of this
plan is to address all aspects related to the physical protection of classified materials and documents,
as well as personnel, transportation and transmission of the themselves. Its purpose is to ensure that
the information is used appropriately, that it is accessed, and that no type of filtration, theft,
6
Security Director Higher Course
All systems will be connected to a CCS, located on the ground floor of the building and manned by a
24-hour security guard.
In said CCS, the necessary elements will be installed so that all the information generated is
immediately known to the security guard, which will offer a quick response to any event or incident.
The creation of a security department, made up of the security director and the security guards, will
allow the entity to effectively manage the proposed security systems, implementing a comprehensive
security plan, thus raising the level of security in the building. Its purpose is to coordinate efforts,
assign responsibilities and tasks, as well as determine the human and material resources necessary for
its preparation, development and implementation, in order to face the risks and threats to which they
may be subject.
All of this was carried out with a budget adjusted to the needs of the entity, since the potential
incidents that could occur would cause more economic damage than the investment made in this
comprehensive security plan, without taking into account the human damage of impossible valuation.
Annex II. Minimum technical specifications required for the security elements to be installed
The characteristics for the elements proposed in this installation are the following:
A barrier will be installed to facilitate vehicle control. The barriers are powered by a low voltage
motor-reducer (24 Vdc) and controlled by a dedicated control unit (LOG-BR-ACR) that follows their
movement, speed, accelerations and decelerations using an encoder. It contains a device for security,
especially in the closing phase (according to EN12453 standards), as required in mixed accesses.
For the entry and exit of personnel entering or leaving the factory on foot, through both entrances, a
blade turnstile will be installed to control people. The lathe to be installed will be ACCESOR brand,
model 600 E-ACR.
The main access door to the administrative building will be replaced with a security door. This door,
from the manufacturer KIUSO, will have a security level of 5.
6
Security Director Higher Course
these detectors provide an analysis of environmental conditions across the spectrum of movement
speeds, allowing you to focus on intruders and eliminate Environmental factors typical of false alarms.
For these detectors to trigger, two circumstances must occur at the same time, movement and heat in
motion.
The operation of these contacts is simple, but effective. Magnetic contacts are made up of two parts, a
magnet that is attached to the door leaf and the emitting equipment that is attached to the frame. When
the door is removed from its frame by a few millimeters, the transmitting equipment produces an
alarm to the central unit. Characteristics:
The access control system will have its own software for managing cards, personnel lists, etc. This
software will be installed on a PC located in the Rack cabinet located in the server room (CPD), which
is located on the second floor of the administrative building for these media.
Amadeus 5 is a Security and Access Control software that allows you to centrally and in real time
control the flow of employees and visitors through TNC facilities, monitor and react to each alarm.
Scanner: This compact X-ray equipment is used, among others, for the inspection of Explosives,
Weapons and Narcotics. It is a sophisticated, fast and reliable X-ray inspection equipment. It is a
compact, robust and lightweight tape X-ray equipment, designed to inspect: briefcases, bags, cameras,
laptops, backpacks, shoes, mail and packages.
The video surveillance system to be installed is based on an IP (Internet Protocol) camera system.
This system, in addition to providing us with high definition images, when installing the network
infrastructure, requires a lower economic cost in cabling, since the video signal from all the cameras is
transmitted through a single optical fiber in the trunk, with the savings in wiring and labor that this
entails.
The video recorders will have IP technology, 8 S-ATA Hard Drives of 6TB capacity will be installed,
specific for video applications.
6
Security Director Higher Course
6
Security Director Higher Course
Comprehensive Security
Plan
The cameras will have the ability to view images both in daylight and at night with little or no light
thanks to infrared LEDs.
• Fire protection:
EI 60 fire doors will be installed, as indicated in the Basic Fire Safety Document, for the fire
resistance of doors in Administrative use whose evacuation height above ground does not exceed 15
meters.
The server room (CPD) will be provided with special protection measures to protect the equipment
numbered below:
7
0
Security Director Higher Course
Fire detectors: Two types of fire detectors will be installed, optical smoke detectors and temperature
detectors
• Optical smoke detectors: They will be installed in all offices and in all hallways,
warehouses, etc. taking into account that their coverage is approximately 60m2 and
that they cannot be installed in places where there may be suspended dust or smoke
may be produced from, for example, welding work, etc.
• Thermal Detectors: These detectors are not triggered by the effect of smoke, but by a
sudden increase in temperature or when the temperature gradually reaches 67ºC.
Alarm and evacuation public address systems guarantee, in large buildings, the correct dissemination
of the alarm message and help the correct evacuation of the occupants. The evacuation public address
system will comply with the provisions of the RIPCI 2017 (Regulation of fire protection facilities).
6 Kg fire extinguishers will be installed. Efficiency 27A-183B-C, the location and placement of the
fire extinguishers will be as established in the RIPCI 2017 (Regulation of fire protection facilities)
Equipped 25mm Fire Hydrant: They have 25mm diameter, with a 20-meter semi-rigid hose with the
capacity to supply a flow rate of 100 liters per minute at 3.5 bar pressure at the tip of the spear. It is
characterized by its easy use and maneuverability, even for people who do not have experience in
using these devices.
The hydrants have been placed in such a way that their location is more than 5 m. of façade and less
than 15 m., except in the case where it is not possible for each hydrant to respect the minimum, due to
the layout of traffic routes. The flow rate of 500 l/min. (30 m3/h).
For the installation of emergency lighting, the provisions of the current Technical Building Code
(CTE) will be followed. Where the types of lighting are specified when and where it is mandatory.
7
Security Director Higher Course
Comprehensive Security
Plan
Annex
José A.III. Budget
Fernandez
Marin
INTRUSION SYSTEM
7
2
Security Director Higher Course
Comprehensive Security
Plan
Seismic
José detectors
A. Fernandez 2 60,00€ 120€
Marin
Glass break detectors 1 60,00 € 60€
Passive interior volumetric detectors with
anti masking 31 47,00 € 1,457€
Security door 6 950,00 € 5.700€
Alarm system keyboard 1 121,37 € 121,37€
alarm center 1 1.750,00 € 1.750€
TOTAL 51.184,40€
CCTV SYSTEM
7
3
Security Director Higher Course
Comprehensive Security
Plan
SECURITY SERVICES
7
4
Security Director Higher Course
Comprehensive Security
Plan
José A. with
V.S. Fernandez
weapon night/holiday 20 €/
Marin
ARC connection for receiving alarms 1 600€
TOTAL 170.400€
The authority protection service will be made up of two company or reaction escorts depending on the
level of risk, as well as the place and activity to be carried out.
From the risk analysis carried out, it is deduced that the risk of suffering an attack by members of the
board on the day of the building's inauguration is quite high.
7
5
Security Director Higher Course
Comprehensive Security
Plan
The
Josémission of the authority protection service is:
A. Fernandez
Marin
• Ensure the personal protection of the President and executives of the Team Navigation
company.
• Ensure the personal protection of each of the personalities inside the building on the day of
the inauguration.
• The vehicles will have a regular driver assigned. Likewise, they will have frequency
inhibitors, as well as a radio link between all of them (with the systems control center
listening).
• The vulnerabilities to which our senior managers may be exposed are:
• Regular or scheduled activities and trips.
• Unscheduled activities and trips.
• In the workplace.
• At your home.
Team Navigation Control, in order to sign important agreements that will guarantee and increase jobs,
is expected to receive high-ranking personalities from the political sphere.
To give a good image of our organization, strict security protocols will be established.
For this purpose, a special Protection Plan will be prepared, with the purpose of preserving the safety
of the guests, with special attention to the figure of high political figures, as well as the TNC board of
directors.
On the day of the event, all work in the factory will be suspended.
7
6
Security Director Higher Course
The Security Director will inform the state Security Forces, Civil Protection, Firefighters, etc. of
the event to be held, in case external help becomes necessary in case of emergency.
One week before the event, there will be a meeting at the TNC offices, between the company's
Security Director, the State Security Corps and Forces, Local Police and Civil Protection, to
together set the guidelines for action to follow.
The company's security department secretary will prepare a list of the guests. Annexed to this list
will be a map with the internal routes of people and vehicles, parking distribution, location of the
press, etc. This list will be given to the guards.
It will also be the responsibility of the security secretariat to prepare proximity identification
cards. These cards must be carried by all attendees, except for the great personalities invited and
senior TNC officials.
TNC's senior managers and big personalities will access the parking lot in the basement of the
administrative building and from there, take the elevators to the reception on the ground floor of
the building.
The rest of the guests will access the company through the same access, but they will park in the
existing outdoor parking on the plot.
The access protocol will be carried out following the same organizational access control
measures adopted daily for the company's personnel. All personnel on foot will enter through the
turnstile and their bags will be passed through the X-ray machine, the vehicles will be inspected
Regarding the Coordination and Control Center, this will be established, as indicated in the
self-protection plan, in the CCS. from the ground floor of the main building and the
Meeting points and security areas will be established at the entrance to the building.
For the day of the event, the external private security company that the company has contracted
will be requested to provide security personnel, four armed security guards and a team of escorts
with a vehicle.
7
Security Director Higher Course
The day before the event, this team will carry out an exhaustive reconnaissance of all the
facilities, both the exterior perimeter of the plot and the interior of all the buildings.
On the day of the event, the four additional armed security guards will be distributed at the
access control posts to receive guests and guide them where they need to go. The bodyguards
will be made available to the Security Director, carrying out personal protection actions for TNC
senior managers.
In the days prior to the event, extraordinary exhaustive maintenance will be carried out on all
electronic security means by the security company in charge of the TNC's mandatory
maintenance.
Four of these Guards will control the interior perimeter of the plot, with one Guard patrolling
each facade.
For the personal safety of the members of the board of directors, a Private Escort will be hired
for each member.
The escorts will pick up the TNC senior executives at their homes, accompany them throughout
the event and will be with them until they return to their homes. For this purpose, special
vehicles will be available for the custody of senior executives.
The Minister of Industry, the President of the Generalitat, the Mayor and other national and local
authorities will have Escorts from the FFCCSS.
7
Security Director Higher Course
private security.
• Order INT/317/2011, of February 1, on private security measures.
• Order INT/318/2011, of February 1, on private security personnel.
• Royal Decree 195/2010, of February 26, which modifies Royal Decree 2364/1994, of
December 9, which approves the Private Security Regulation, to adapt it to the
modifications introduced in Law 23/ 1992, of July 30, on Private Security, by Law
25/2009, of December 22, modifying various laws to adapt them to the law on free
access to service activities and their exercise.
• Royal Decree 2364/1994, of December 9, which approves the Private Security
Regulation.
• Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016
on measures to ensure a high common level of security of networks and information
systems in the Union.
• Regulation (EU) 2016/679 of the European Parliament and of the Council of April 27,
2016 on the protection of natural persons with regard to the processing of personal data
and the free circulation of these data and repealing the Directive 95/46/EC (General
Data Protection Regulation).
• Organic Law 3/2018, of December 5, on the Protection of Personal Data and guarantee
of digital rights.
• Royal Decree 1720/2007, of December 21, which approves the Regulation for the
development of Organic Law 15/1999, of December 13, on the protection of personal
data.
José A. Fernandez Marin
7
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
8
0
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
MIOG CTR HI
FLAT BM
8
1
Security Director Higher Course
8
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
8
3
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
8
4
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
8
5
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
8
6
Security Director Higher Course
8
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
8
8
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
LEGEND
CATITA
HO
t0M to CTOS
I RAISED
WIO& LDTF H E UP
FLATA EM mm
8
9
Security Director Higher Course
9
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
CONUNCAQNES
NNNN
NN
INYESTKGACKN SALk
ALWACEH
LEGEND
9
1
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
9
2
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
9
3
Security Director Higher Course
9
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
RISK DEFINITION:
THEFT IDENTIFICATION Nº 1
ADMINISTRATIVE BUILDING
F Yes Yo Q AND d c TO V
PR E.R. RISK LEVEL
9
5
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
RISK DEFINITION:
INTRUSION IDENTIFICATION Nº 2
F Yes Yo Q AN d c TO V PR E.R.
ZONES D RISK LEVEL
FxS PxE R&D AxV CxPR
4 4 16 3 3 9 27 3 3 9 243 HALF
Basement parking
3 3 9 3 3 9 18 3 3 9 162 LOW
basement warehouse
3 3 9 3 3 9 18 3 3 9 162 LOW
Boiler room
3 3 9 3 3 9 18 3 3 9 162 LOW
Archive
ADMINISTRATIVE BUILDING
F Yes Yo Q AN d c TO V PR E.R.
ZONES D RISK LEVEL
FxS PxE R&D AxV CxPR
3 3 9 4 3 12 21 4 4 16 336 HALF
Café
9
6
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
33 9 44 16 25 4 5 20 500 HALF
diesel tank
PRODUCTION AND MANAGEMENT PLANTS
F Yes Yo Q AN d c TO V PR E.R.
ZONES D RISK LEVEL
FxS PxE R&D AxV CxPR
1 1 1 1 1 1 2 3 3 9 18 LOW
Dept. address
1 1 1 1 1 1 2 2 2 4 8 LOW
Communications
RISK DEFINITION:
VANDALIC ACTS IDENTIFICATION Nº 3
9
7
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
1 1 1 1 1 1 2 3 3 9 18 LOW
Dept. address
3 4 12 3 2 6 18 4 4 16 288 HALF
Communications
RISK DEFINITION:
FIRE IDENTIFICATION Nº 5
9
8
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
224
Archive 23
12 16 44
16 256 HALF
ADMINISTRATIVE BUILDING
ZONES
F Yes Yo Q AN d c TO V PR E.R.
D RISK LEVEL
FxS PxE R&D AxV CxPR
RISK DEFINITION:
BOMB THREAT IDENTIFICATION Nº 9
9
9
Security Director Higher Course
Comprehensive Security
Plan
José A. Fernandez
Marin
1
0
0