0% found this document useful (0 votes)
25 views

Comprehensive Security Plan - 2019

This document presents a comprehensive security plan for a building. Describes the building characteristics, risk analysis, and proposed security systems for access control, intrusion detection, CCTV, personal protection, information protection, and fire protection. The plan also includes a coordination system with objectives, human and technical resources, and procedures. The annex provides a summary for the direction and technical specifications for the
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Comprehensive Security Plan - 2019

This document presents a comprehensive security plan for a building. Describes the building characteristics, risk analysis, and proposed security systems for access control, intrusion detection, CCTV, personal protection, information protection, and fire protection. The plan also includes a coordination system with objectives, human and technical resources, and procedures. The annex provides a summary for the direction and technical specifications for the
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 101

HIGHER SECURITY

DIRECTOR COURSE
PREPARATION OF THE COMPREHENSIVE SECURITY PLAN

José Antonio Fernández Marín

July 15, 2019


Security Director Higher Course

Comprehensive Security Plan

José A. Fernandez Marin

Index

HIGHER SECURITY DIRECTOR COURSE...........................................................................1


Index.......................................................................................................................................1
1.1.

Comprehensive Security Plan

José A. Fernandez Marin

HIGHER SECURITY DIRECTOR COURSE...........................................................................1


Index.......................................................................................................................................1
1.1.1.
Security Director Higher Course

Comprehensive Security
José A. Fernandez Marin
Plan
HIGHER SECURITY DIRECTOR COURSE...........................................................................1
Index.......................................................................................................................................1

ANNEX VIII. Risk Classification…………………………………………………………. 104

Comprehensive Security Plan

José A. Fernandez Marin

INTRODUCTION
This comprehensive security plan will try to develop an effective protection system, in order to protect
and guarantee both the safety of people and the tangible and intangible assets of the main headquarters
of the company Team Navigation Control (TNC). To do this, it will be necessary to define and delimit
the human resources, technical means, protection materials, as well as the organizational measures
necessary to guarantee said security.

In order to achieve the most optimal and economically viable level of security for the company's
management, the security plan will be based mainly on the regulations currently in force in Spain
regarding private security.

This Project is developed, since it wishes to establish a comprehensive security system (PSI), with the
purpose of implementing the necessary Security systems.

This project will encompass both the physical security of people, property and real estate in the
factory, as well as occupational security, along with the protection of the company's knowledge and
development of new technologies.

How to get it
The design of a comprehensive Security Plan is an alternative solution that allows the use of the
necessary technical, practical and conceptual elements so that the security requirements exposed and
observed in the entity are satisfied, this is done through the design of a adequate set of controls,
encompassing policies, practices, procedures, organizational structures and functions. These controls
are established to ensure that the specific objectives in the security of the organization are achieved
and to achieve the preservation of the following characteristics or pillars on which the quality of the
service is based.

The means to be able to face these risks must be defined in a Comprehensive Security Plan and
include the following types:

•Human Resources: Private Security Personnel.

•Technical Means: Passive safety and active safety systems, including auxiliary means.

•Organizational Means: Regulations, action plan and procedures.

An attempt will be made to integrate all existing security resources and measures and to implement
2
Security Director Higher Course

them to create a homogeneous and technically and economically viable security system.

Comprehensive Security Plan

José A. Fernandez Marin

This project is carried out by the Security Director D. José A. Fernández, authorized by the Ministry
of the Interior with TIP no. 1000000, developing the comprehensive security plan for the Spanish
subsidiary of the multinational Team Navigation Control (TNC).

1. BUILDING CHARACTERISTICS
This building is located in the Ruzafa neighborhood of the city of Valencia, ave. de la Plata, no. 243.

The facilities are located next to a depressed area, occupied by old houses with a marginal population
and a high crime rate. The entire area is undergoing a profound transformation in recent years. Low-
quality buildings have been demolished and office buildings, high-rise residential-type homes with
common areas and hotels are being built.

It is a construction, consisting of a single building five stories above ground level and a basement. The
building is almost free-standing, except for its west façade which adjoins, starting from the first floor,
with a 4-star hotel, whose roof is 2 meters higher than the roof floor.

The facility has been completely renovated and is awaiting the Comprehensive Security Plan to
provide it with security and fire detection and extinguishing measures and to proceed with its
inauguration and opening.

1.1 Situation
The facilities are located next to an area occupied by old houses. The entire area is undergoing a
profound transformation in recent years. Office buildings, residential-type high-rise homes with
common areas and hotels are being built.

Given the proximity to the Port, the forecasts are for a total transformation of the environment.

About 1,500 meters away is the CNP Ruzafa Police Station. and at the beginning of the Avenue. de la
Plata (2Km) the closest fire station. 300 meters away, heading north, is the Saler Highway, a fast road
that crosses the city.

1.2 Outer space


It is located on a 2,500 m2 plot with a building of 1,800 m2 per floor, from the 1st to the 4th. The
basement has a surface area of 1,500m2 and the ground floor has 750 m2, the rest is made up of
parking for visitors (12 vehicles) and a garden area. The plot is delimited by a metal fence, partially
covered with vegetation, with an average height of 2.50 m. There is a manhole hydrant on the
sidewalk, very close to the entrance to the visitor parking lot.

Comprehensive Security Plan

3
Security Director Higher Course

José A. Fernandez Marin

It consists of a parking lot in the basement for workers and another on the ground floor used by
visitors.

The access doors to both (Pv-1 and Pv-3) are located on Avda. de la Plata, have a 4 m passageway,
made of sheet metal, sliding, manually operated. Pedestrian access is through P-2, located between the
previous ones and with similar characteristics.

1.3 Property description


It is a construction, consisting of a single building five stories above ground level and a basement. The
building is almost free-standing, except for its west façade which adjoins, starting from the first floor,
with a 4-star hotel, whose roof is 2 meters higher than the roof floor.

The accesses are located on Avda. de la Plata, two-way, has 12 meters of road and three meters each
of the sidewalks and online parking is permitted next to both.

On the opposite sidewalk, buildings of similar height rise, dedicated to offices.

José Pérez Street is one way, towards the South, with lower residential buildings. It has a width of 7
meters plus 1.70 of each sidewalk. Line parking is permitted on the opposite sidewalk.

Pedro López Street, in one direction, to the West, is 8.5 meters wide and has similar sidewalks and
buildings as the previous one. Battery parking is permitted next to the sidewalk of the property.

The transformer, with high input, is located in the basement and on all floors vertically is the
distribution board for each floor.

Parallel to the main entrance, under the sidewalk, one meter from the gate, runs a gallery of services
that can be visited, with a red height of –3 meters.

Access to it is about 80 meters west of the entrance to the plot. Electrical and telephone wiring runs
through it. The drinking water pipe is 0.80 m. further away than the previous gallery and the general
water cut within the garden, next to the fence.

On José Pérez Street, on the opposite façade of our building, there is a Repsol pump, which operates
from 6 to 24 hours, and about 500 meters to the east, there is a Social Center for humanitarian aid,
where food and accommodation are provided. free to the homeless, very frequented by drug addicts,
who tend to spend the night in the area.

Comprehensive Security Plan

José A. Fernandez Marin

1.3.1 Constructive features


The structure of the building is made of concrete pillars with a flat slab and the exterior enclosure is
made of solid brick. The double glazed windows are practicable and occupy 30% of the surface of the
facades.

4
Security Director Higher Course

1.3.2 Distribution and use by plants


• The basement, most of which is occupied by a parking lot for 62 employee vehicles that access via
a 4.5 m ramp. From this you can access the interior by two stairs, two elevators and a freight elevator.

In addition to the parking there is a 420 m3 archive, with a large amount of documentation (paper), a
280 m3 material warehouse, the building's electrical distribution panel (high voltage) and the boiler
room. During working hours, 2 people remain in the archive and another two in the warehouse.

• The ground floor consists of a large lobby in which access control is installed, an assembly hall
with a capacity for 320 people, a cafeteria-restaurant for 60 people, with a kitchen, in addition to
parking for visitors, under the which is the diesel tank with 15,000 liters and two water tanks of
20,000 liters each. At the back is the caretaker's house.

• The company's management is located on the first floor (the General Director and a Deputy
Director with their respective secretaries and board room) and the administration and personnel
department has 32 people.

• On the second floor, there is the Data Processing Center, with all the computerized files, the
research room and the Communications Center with the outside. It is occupied by 60 people.

• On the third and fourth floors are the assembly and handling rooms and their occupancy is about
sixty technicians per floor. Most of the physical components of the equipment come from abroad.

• On the roof, there are the elevator and air conditioning boxes and a frosted glass skylight that
provides natural light to all floors above ground. It is accessed through a sheet metal door with a Fac
type lock.

Comprehensive Security Plan

José A. Fernandez Marin

1.3.3 Common traffic elements


It has three stairs:

• E-1: connects the basement with the 2 m roof. hole and 3.5m. of travel between floors, except from
the basement to the ground floor, which is 4.5 m. The access door to the independence lobby on all
floors is RF-60.

• E-2: open, connecting the ground floor with the 4th floor of 1.6m. wide and 3.5m between floors.
From the first floor its location varies.

• E-3: starts in the basement and ends on the ground floor, 1m wide and 4.5 m. travel. The access
door to the lobby on both floors is RF-60. It is located behind Ps-4, next to elevator shaft A-1.

It has four elevators and a freight elevator, all of them with pulley:

• Two go from the ground floor to the 4th floor and the others and the forklift start in the basement.

The vertical conduits are made through a corridor with untreated wooden doors and an exit on each
floor, and the horizontal conduits run through a false plaster ceiling.

5
Security Director Higher Course

The entrance doors to the building are:

• Pb-1 and Pb-2: with opening towards the interior and 1.20 meters of passage space each. They are
made of anti-shock glass on a metal frame and conventional lock.

• Pb-3 and Pb-4: emergency with anti-panic lock. Both with 1 m. of leaf. Carbon fiber and
conventional lock.

• The access to the underground parking (Psv-1) is sliding, made of sheet metal and manually
operated.

• Pb-5, Pb-6, Pb-7 and Pb-8, (entrance to the janitor's house, the cafeteria and merchandise,
respectively. They are made of chipboard and a conventional lock, all with a single leaf with a 1.10 m
gap.

• Pb-9, entrance, to the building from the visitor parking, with two 1 m leaves. each. It is made of
glass on a metal frame and conventional lock.

Comprehensive Security Plan

José A. Fernandez Marin

1.3.4 Technical installations and special risk premises


The following are considered special risk technical installations:

Basement:

420 m 3 archive, with a large amount of documentation (paper), a 280 m 3 material warehouse, the
building's electrical distribution panel (high voltage) and the boiler room.

Low level:

Diesel tank with 15,000 liters.

Second floor:

Data Processing Center (CPD), with all computerized files.

Third and fourth floor:

On the third and fourth floors are the assembly and handling rooms, with their corresponding files and
security rooms.

Cover plant:

On the roof are the elevator and air conditioning boxes.

2. EXTERNAL ANALYSIS
Circumstances that occur in this security plan:

- There have been evictions from substandard housing, to adapt the building to the activity it carries

6
Security Director Higher Course

out, which has generated reactions and protests from those affected.

- The area has a very high crime rate, with several robberies taking place in neighboring warehouses
by organized groups.

- The substandard housing that remains in the vicinity, about 500 meters away, constitutes a focus of
crime, since it is frequented by drug addicts and marginal personnel.

- The eastern area of the industrial estate, used for prostitution, is very frequented at night, which
creates a source of risk.

Comprehensive Security Plan

José A. Fernandez Marin

3. ANALYSIS OF THE ORGANIZATION

3.1 Activity and functions


General Director - The General Director has recently joined, from an important position in the North
American administration, which has been echoed by the press that has criticized the appointment.

Deputy Director General - Replaces the Director General in his absence, and directly supervises
investigations.

Laboratory heads- They are in charge of the research teams in the laboratory departments.

Technical staff - 60 people including researchers and IT staff, plus 120 people in the assembly and
handling rooms.

Department heads - Personnel of various nationalities who are responsible for directing the personnel
in the departments from which this building is supplied, and controlling total production.

Administrative staff - 2 secretaries (management and deputy management), 28 administration people.

Junior staff- Janitor.

Cleaning, cafeteria-restaurant and maintenance staff - 3 cleaners and a glassman, 3 waiters and 1 cook,
2 maintenance people; all subcontracted personnel.

3.2 Work staff


The Spanish subsidiary of the multinational Team Navigation Control has a total of 223 people,
distributed as follows:

Basement:

2 people in the archive and 2 more in the warehouse. The maintenance staff is made up of 2
technicians.

Low level:

7
Security Director Higher Course

4 people in the cafeteria, including the cook, plus the janitor who has the house located there.

Comprehensive Security Plan

José A. Fernandez Marin

First floor:

On the first floor is the company management, director and deputy director, with their respective
secretaries, and the administrative part with the department staff, a total of 32 people.

Second floor:

A total of 60 people work in the data control center and the research room, including technicians and
department heads.

Third and fourth floor:

There are 60 technicians per plant (120), who are in the assembly and handling rooms.

3.3 Working hours


Company staff- 08:30 to 17:00, Monday to Friday.

Cleaning staff- 5:30 p.m. to 8:00 p.m., Monday to Friday.

• Address, Monday to Friday from 8:30 a.m. to 5:00 p.m.


• Rest of our own staff: Monday to Friday from 8:00 a.m. to 5:00 p.m.
• Maintenance and special services: uninterrupted 24-hour shifts.
• Cleaning: Monday to Friday from 5:30 p.m. to 8:00 p.m.
• Cafeteria and dining room service: Monday to Friday from 7:30 a.m. to 5:00 p.m.

4. EXISTING SECURITY MEASURES


Given the complete renovation of the building, there are no security measures, and we are waiting for
this comprehensive security plan to provide it with them. It only has what was previously there before
its renovated installation.

4.1 on the perimeter


Delimitation by metal fence, partially covered with vegetation, with an average height of 2.50 m.

Comprehensive Security Plan

José A. Fernandez Marin

4.2 At the entrances

4.3 Inside

8
Security Director Higher Course

4.4 In the protection of information

4.5 In fire safety


Manhole hydrant on the sidewalk, very close to the entrance to the visitor parking lot.

5. RISK ANALYSIS AND EVALUATION

5.1 Previous considerations


The parent company of the Spanish subsidiary is a multinational with North American capital, closely
linked to Jewish interests, which has been greatly favored by the war conflicts in the Middle East,
since it supplies communications and electronic equipment for military use to the American army and
the situation has brought him a very beneficial contract. This, together with the fact that it is the main
supplier of precision electronic material to the Israeli Armed Forces, has caused it to appear among
the objectives threatened by Islamic fundamentalism.

The media have covered the upcoming inauguration of the Spanish subsidiary, which is why graffiti
has appeared in the area referring to its activity in support of North America and Israel.

In this section, threats and vulnerabilities are analyzed, considering the probability of their occurrence;
That is, they become risks, in order to be able to estimate the possible impact of the damage and,
subsequently, adopt the most appropriate measures for each case.

For our project we will use the Mosler method of risk analysis. For the risks of robbery, theft, bomb
threats, acts of vandalism, fire risks.

5.2 Application of methods for risk identification


In this case, the methodology that we are going to use for risk analysis is studied:

Mossler Methodology, which aims to identify, analyze and evaluate the factors that can influence the
manifestation of a risk, with the aim that the information obtained allows us to calculate the type of
risk.

Comprehensive Security Plan

José A. Fernandez Marin

In order to understand the development phases of the different tables, and to see where the values for
risk analysis and evaluation come from, in this chapter we will proceed to explain the development of
the Mosler method, which is the one we will use for our project. The tables with the analysis of said
methodology are in annex VIII.

5.2.1 Mossler method


Phase 1: RISK DEFINITION

9
Security Director Higher Course

To carry it out, it is necessary to define what risks the area to be protected is exposed to (investment
risk, information risk, accident risk, or any other risk that may arise), making a list in each case, which
will be taken into account. counts as long as conditions do not change (life cycle)

Phase 2: RISK ANALYSIS

A series of coefficients (criteria) are used for this analysis:

Function Criterion (F)

Which measures the negative consequence or damage that may alter the activity and whose
consequence has an associated score, from 1 to 5, ranging from “Very slightly serious” to “Very
serious”:

• Very seriously (5)

• Seriously (4)

• Moderately (3)

• Slightly (2)

• Very slightly (1)

Substitution Criterion (S)

Which measures how easily the assets can be replaced if any of the risks occur and whose
consequence has an associated score, from 1 to 5, ranging from “Very easily” to “Very difficult.”

• Very difficult (5)

• Hardly (4)

• Without many difficulties(3)

Comprehensive Security Plan

José A. Fernandez Marin

• Easily (2)

• Very easily (1)

Depth or Disturbance Criterion (P)

Which measures the disturbance and psychological effects depending on whether any of the risks are
present (Measures the image of the firm) and whose consequence has an associated score, from 1 to 5,
ranging from “Very mild” to “Very serious.” .

• Very serious disturbances (5)

• Serious disturbances (4)

1
Security Director Higher Course

• Limited disruption (3)

• Minor disturbances (2)

• Very minor disturbances (1)

Extension criterion (E)

Which measures the extent of damage, in the event that a risk occurs at a geographic level and whose
consequence has an associated score, from 1 to 5, ranging from “Individual” to “International”.

• International in nature (5)

• National in nature (4)

• Regional in nature (3)

• Local (2)

• Individual (1)

Aggression criterion (A)

Which measures the probability that the risk manifests itself and whose consequence has an associated
score, from 1 to 5, ranging from “Very low” to “Very high”.

• Very high (5)

• High (4)

• Normal (3)

Comprehensive Security Plan

José A. Fernandez Marin

• Low (2)

• Very low (1)

Vulnerability criterion (V)

Which measures and analyzes the possibility that, given the risk, there is actually damage and whose
consequence has an associated score, from 1 to 5, ranging from “Very low” to “Very high”.

• Very high(5)

• High (4)

• Normal (3)

• Low (2)

• Very low (1)

1
Security Director Higher Course

Phase 3: RISK ASSESSMENT

Depending on the analysis (phase 2) the results are calculated according to the following formulas:

Calculation of the nature of risk “C”:

It is based on the data obtained, applying:

YO. Importance of the event

I= F x S

d. Caused damages

D= P x E

Risk C= R & D

Calculation of Probability “PR”:

It is based on the data obtained in the 2nd phase, applying:

TO. Aggression criterion

V. Vulnerability criteria

Probability PR= A x V

Comprehensive Security Plan

José A. Fernandez Marin

Quantification of the risk considered “ER”:

It will be obtained by multiplying the values of “C” and “PR”.

ER = C x PR

Phase 4: RISK CALCULATION AND CLASSIFICATION

It is important to understand that, although the result is numerical, this scale is QUALITATIVE.

Risk Basis Calculation:

One of the usable scales is the following:

SCORE RISK
BETWEEN 1 AND 200 LOW RISK
BETWEEN 201 AND 600 MEDIUM RISK
BETWEEN 600 OR MORE HIGH RISK

RISK IDENTIFICATION

1
Security Director Higher Course

Nº1 ROBBERY- THEFT

Nº2 INSTRUTION

Nº3 VANDALIC ACTS

Nº4 ATTACKS ON INFORMATION

Nº5 FIRE

Nº6 BOMB THREAT

5.3 Conclusions
The risks presented by the Spanish subsidiary of Team Navigation Control, given the threats it has
received from Islamic fundamentalism and the attacks received at the headquarters of other countries,
are the following:

Catalog of threats, risks and vulnerabilities. Risks derived from antisocial attitudes

Comprehensive Security Plan

José A. Fernandez Marin

IDENTIFICATION 1 - THEFT AND THEFT

Assets to be protected - All Team Navigation Control facilities, small electrical machinery, office
supplies, computer equipment, vehicles parked inside the premises and personal belongings of the
company's workers

Possible cause - The causes of the theft are mainly due to company personnel and the rest of the
contract personnel and the intrusion of strangers into the premises. Given the proximity of marginal
housing to the building, this is the most likely cause.

Signs that it has occurred - Lack of tools or other utensils, signs of forced doors or windows,
imbalance in inventory, tripping of the alarm system.

Damage effects:

• Damage to the company's image.


• Loss of small financial sums.
• Concern among company staff.
• Misgivings.

Measures to take:

• To mitigate or reduce this risk, the following measures will be taken:


• Infrared barriers will be placed on the entrance fence.
• Security locks will be installed on all main doors, both the
administrative building as well as in the basement warehouses.

1
Security Director Higher Course

• A theft and intrusion alarm system will be installed on the exterior perimeter, interior of
the administrative building and warehouses.
• An exterior and interior video surveillance system will be installed.
• An access control system will be installed.
• Security guards will be hired to be able to patrol both the exterior perimeter and the
interior of the administrative building.

Vulnerable Points:

• Vehicle parking the company and the staff.


• Production and office buildings.
• Lockers and changing rooms.
• Exterior and interior parking.
• Plants and warehouses.

Comprehensive Security Plan

José A. Fernandez Marin

IDENTIFICATION 2 - INTRUSION

Assets to protect: All Team Navigation Control facilities.

Possible cause: As a general rule, intrusion is a risk that occurs at night, but the possibility of an
intrusion occurring during the day cannot be ruled out.
Highlight the access from the hotel through the roof, a critical point of intrusion.

Signs that it has occurred: Forced doors or windows, tripping of the security system, lack of
equipment or material.

Damage effects:

• Damage to the company's image.


• Loss of small financial sums.
• Concern among company staff.
• Misgivings.

To mitigate or reduce this risk, the following measures will be taken:

• Security locks will be installed on all main doors, both in the administrative building and
in the exterior cafeteria and dining room premises.
• A theft and intrusion alarm system will be installed on the exterior perimeter, interior of
the administrative building and surrounding areas.
• An exterior and interior video surveillance system will be installed.
• An access control system will be installed.
• Security guards will be hired to be able to patrol both the exterior perimeter and the
interior of the administrative building.
• Parking for company and staff vehicles.
• Production and office buildings.

1
Security Director Higher Course

• Lockers and changing rooms.

IDENTIFICATION 3 - VANDALIC ACTS

Assets to protect:

• The entire Team Navigation Control plot.


• The image of the Company.

Possible cause:

• Vandals for fun.


• Criminals who, in order to steal, cause unnecessary destruction for the purpose.
• Graffiti artists, etc.
Comprehensive Security Plan

José A. Fernandez Marin

Indications that it has occurred:

• painted on walls exteriors.


• Glass breakage.
• Systems Trigger of alarm.
• Etc.

Damage effects:

• Damage to company structures or furniture.


• Damage to the Company's image

Measures to take:

• Installation of video surveillance systems


• Exterior security lighting will be installed.
• Installation of alarm systems.
• Patrols by Security Guards, both inside the administrative building and the existing
buildings on the plot.

Vulnerable Points:

• Parking for company and staff vehicles.


• Production and office buildings.
• Especially the outer perimeter of the company.

IDENTIFICATION 4 – ATTACKS ON INFORMATION

Assets to protect:

• Image and information of Team Navigation Control, computer equipment and data
carriers

1
Security Director Higher Course

Possible cause:

• Own personal
• Personnel outside the company, but authorized (subcontractors) who can access areas not
authorized for this purpose.
• Intrusion of strangers into the premises.

Indications that it has occurred:

• Forced doors and/or windows, loss of computer support, tripping of the security system,
strange use of computer media

Comprehensive Security Plan

José A. Fernandez Marin

Damage effects:

• Forced doors and/or windows


• Loss of computer support
• Security system trip
• Strange use of computer media

Measures to take:

• Control of doors and access to warehouses.


• Access control system on building doors, floors and the premises.
• 24 hour surveillance.
• Security cameras (CCTV) and sensors.
• Lockers with their corresponding lock.
• Prohibition of entry into the company of storage devices (pendrive, etc.)
• Prohibition of removing computer equipment from the building.
• Computer security measures and installation of paper shredders
• Effective lighting and sensors
• Random rounds and control of vehicles at exit and entry.

Vulnerable Points:

• Parking for company and staff vehicles.


• Production and office buildings.
• Address dispatch.
• IT and R&D Department.

Risks derived from the activity itself

IDENTIFICATION 5 - FIRES

Assets to protect:

• The life and integrity of the people and assets of the company.

1
Security Director Higher Course

• All the material assets of the building.


• Company staff, suppliers and visitors.

Possible cause:

• Negligences.
• Carelessness.
• Short circuits.
• Etc.

Comprehensive Security Plan

José A. Fernandez Marin

Indications that it has occurred:

• Alarm in the fire detection system.


• Smoke.
• Fire.
• Explosions.

Damage effects:

• Injuries to people.
• Damage to company assets.
• Loss of information.
• Possible personal losses.
• Economic losses.
• Material losses.

Measures to take:

• Installation of fire detection system.


• Installation of fire extinguishing systems.
• Self-protection plan.
• Installation of video surveillance systems.
• Rounds inside and outside the administrative building and surrounding areas by security
guards to be hired.
• Insurance Policies.

Possible cause:

• Parking for company and staff vehicles.


• Production and office building.
• Especially production building due to welding work and storage of various materials.
• The entire area is susceptible to fire, the risk is much higher in fuel tank areas.

Vulnerable Points:

1
Security Director Higher Course

• Parking for company and staff vehicles.


• Production and office buildings.
• Production plants due to welding work.
• Electrical control booth and transformation.
• The entire facility is susceptible to fire.

Comprehensive Security Plan

José A. Fernandez Marin

Special risks

IDENTIFICATION 6 - BOMB THREAT

Assets to protect:

• All Team Navigation Control buildings.


• The people who focus on it.

Possible cause:

• Possible radical groups with the purpose of vindication, requests, beliefs, etc.
• Dissatisfied employees.

Indications that it has occurred:

• Explosion sound.
• Fire.
• Smoke.
• Landslides, etc.

Damage effects:

• Material losses.
• Human casualties.
• Depending on the magnitude of the explosion, possible closure of the factory.

Measures to take:

• Installation of video surveillance systems.


• Installation of access control systems.
• Installation of alarm systems.
• Check that the evacuation exits are correct according to regulations.
• Self-protection plan.
• Patrols by Security Guards, both inside and outside the administrative building and
parking lot.

Vulnerable Points:

• Parking for company and staff vehicles.

1
Security Director Higher Course

• Production building since all types of materials are stored in this place.
• The risk is much higher in areas such as the basement parking lot of the
administrative building, where an explosion can increase its effectiveness.
• Proximity in the accesses and the perimeter of the company.

Comprehensive Security Plan

José A. Fernandez Marin

6. SECURITY PLAN
Given the complete renovation of the building, there are no security measures, and we are waiting for
this comprehensive security plan to provide it with them. It only has what was previously in it.

To achieve an adequate level of security for the building, its occupants and assets, this security plan
will be made by acting on the observed risks to mitigate their consequences. To this end, a series of
measures are contemplated to achieve the objectives of security, prevention and detection of any
threat that threatens people and the heritage of said building.

6.1 Access control system


Set of teams and people, whose objectives will be, automatically, totally or partially:

• Identify people who intend to access a controlled area of the building.


• Control of vehicle passage to areas enabled for this purpose.
• Reception of packages that intend to access the building's departments.

6.1.1 System Specific Objectives


An access control system based on proximity cards will be installed.

The main objective of the Access Control system must be to provide the facility with the means so
that in the event of intrusion or access by unauthorized persons, it is detected as soon as possible and
that these accesses can be controlled from the Control Center. .

For this reason, an electronic access control system will be installed on all interior and exterior doors.
With this, in addition to limiting access by unauthorized personnel to the facilities, we will have
control of who has entered any of the facilities and when.

Regardless of the fact that all electronic security systems will be integrated into systems management
software that we will detail in later chapters, the access control system will have its own software for
managing cards, personnel lists, etc.

This software will be installed on a PC located in the Rack cabinet located in the server room (CPD),
which is located on the second floor of the administrative building for these media.

Comprehensive Security Plan

José A. Fernandez Marin

1
Security Director Higher Course

6.1.2 Human resources


The security director, in agreement with the company's management body and having evaluated the
risks, will be the one who implements the measures to be taken for the correct functioning of the
building and the comprehensive security of its occupants and property.

Access control will be carried out starting at 07:00 by a security guard supported by another in the
systems control center, controlling the passage of personnel and merchandise inside the building, as
well as the entry of vehicles to the parking lot. which will be controlled by the software installed for it.
And a concierge who will issue the necessary accreditations for the entry of personnel, whether from
the subcontracted company or visitors, and know the hierarchies of the areas that can be accessed.

6.1.3 Technical means


The building will be attended to with the appropriate technical means, and according to the budget, for
the total safety of the occupants and assets to be protected.

For said access control, the following measures are proposed:

Proximity card readers will be installed in:

• External perimeter people control turnstiles


• All doors to exterior buildings within the plot
• All doors to offices, warehouses and archives inside the building
administrative.

The total number of proximity card readers to be installed is 13.

The card readers to be installed will have the following characteristics:

• Integrated audible buzzer


• Host system LED control and anti-intrusion output
• Optical anti-intrusion mechanism that alerts the host system
• Hidden anti-vandal mounting screws
• Designed for greater outdoor resistance
• Anti-vandal security and an installation tool.

For vehicle access control, a license plate recognition system will be installed.

Comprehensive Security Plan

José A. Fernandez Marin

The recognition system, in addition to its main objective of opening the vehicle barrier, is very useful
for us to have control and registration that allows us to associate the images of the license plates with
the recording of the images, in addition to having real-time of a list of the vehicles that are inside the
factory.

For this purpose, license plate recognition cameras will be installed in:

2
Security Director Higher Course

• Vehicle entry/exit indoor parking.


• Vehicle entry/exit outside parking.

Features of license plate recognition cameras

• We can establish white and black lists: With a maximum of 512 license plates per camera,
to carry out specific actions against the license plates registered on those lists. Their
management is very simple since it is enough to download a table from the camera itself
in which we will fill in the alphanumeric data of the license plates.
• Programmable calendar: These types of actions can also be carried out or activated based
on a programmable calendar.
• Time and date printing: Within the license plate captures we can establish the printing of
text such as the time and date, the camera number or the license plate number, even
establishing the order of appearance.
• Real-time visualization of screenshots with associated text:
• By entering the configuration of the camera itself through a web browser, we can even
view the captures in real time with the associated image and text and the country of origin
of the license plate.

The building's Control Center will be where all postal shipments and parcel reception will be received,
for this reason an X-ray Scanner will be installed to control parcels.

All incoming small packages and mail will pass through this scanner.

This compact X-ray equipment is used, among others, for the inspection of Explosives, Weapons and
Narcotics. It is a sophisticated, fast and reliable X-ray inspection equipment.

At the entrances:

For the perimeter, 4 infrared barriers of 60 m, on the façade, (north, south, east and west).

At access Pb1, Pb2 and Pb9, security locks and magnetic contacts, with connection to the CCS, plus a
video intercom connected to the CCS.

On Pb3 and Pb4 magnetic contacts, security locks, connected to CCS.

Comprehensive Security Plan

José A. Fernandez Marin

On Pb5, 6, 7 and 8, respectively, security doors.

Boom barrier from 4 to 4.8 m, for access to the visitor parking located outside, with an anti-vandal
intercom, magnetic detector loop and 2-channel inductive loop analyzer.

Feather barrier for access to outdoor parking for visiting vehicles, with its magnetic detector loop to
control the vehicles that want to access and bypass that requirement in the CCS room. Vandal-proof
intercom with a button and camera.

Each stair or elevator access will also have a card reader for adequate employee access control. The

2
Security Director Higher Course

elevators will operate with these cards from the hall to the different floors.

Inside the building, Hall:

Staff for access control and personnel entry, metal detector arch, with the x-ray scanner next to it.

Automatic access control systems will have insertion card readers, and at some certain points they will
have an added keyboard to enter your PIN, which will provide added security to the system.

Each department will provide the security department with a weekly list of the personnel that works
with it, whether permanent or contracted. Likewise, they must send the registrations and cancellations
of said personnel as soon as possible, in order to accredit or suppress their access levels.

Each employee's personal access control card includes the make, model, color and license plate of the
vehicle(s) authorized to enter the facility with said driver.

All receipt of merchandise, packages and correspondence must be carried out by the security guard,
and prior to access or delivery to the corresponding department, they will go through the X-ray
scanner. The security guard at the checkpoint will verify if your reception was planned and, if not, will
notify the security department.

Manual metal detector for arch support.

In the underground parking:

Card reader for access to the security levels requested and registration of events in the archive,
material warehouse and technical rooms. Another reader for vehicle access to the interior. And the
security locks that are needed for this.

Comprehensive Security Plan

José A. Fernandez Marin

The vehicle that wishes to access the facility may only do so with its authorized driver. Previously, it
will stop at the access barrier, at which time, while the driver is accredited by the security guard, the
vehicle will be automatically inspected using the explosive detection loop. Once the security guard
has verified that both the driver and the vehicle are authorized, he will allow you to pass.

First floor:

Biometric fingerprint reader for offices of the director and deputy director.

Card reader for file entry.

Second floor.

Chip card reader for access and registration of events in IT, research rooms, offices, CPD and
communications biometric fingerprint reader.

Third and fourth floor:

2
Security Director Higher Course

Card reader for access to the archive and security warehouse, biometric reader for entry to the offices
of department heads.

On the cover:

Security door for access and magnetic contact.

Infrared barrier 60 m, (2) for the area bordering the hotel.

Electronic vibration detector with magnetic contact for the skylight and glass breakage detector.

6.1.4 Procedures
All access to the building, and entry of personnel, will be operational from 07:00 to 17:30, Monday to
Friday.

The alarm will be active in restricted zones or areas, the other areas will be monitored by CCTV and
controlled during periodic rounds.

It will be the security guard, with the mastering of all the doors by magnetic card with chip, who
manages these openings and closings.

Comprehensive Security Plan

José A. Fernandez Marin

The accreditations, previously described for workers, will all be magnetic for access to the floors and
hall of the building. Following Features:

CARDS WITHOUT CHIP:

Green zone with free access: Those areas of the building to which access and circulation is allowed
for anyone who has been previously registered in access control, generally they will be visits.

Controlled access amber zone: Those areas of the building to which access and circulation is only
permitted to those in possession of an amber card, external employees.

CARDS WITH CHIP:

Class I restricted access red zone: Those areas of the building to which access and circulation is only
permitted to those in possession of a red card and job description that qualifies them to work in a
Class I zone, internal employees with permits to certain areas, specifically warehouse, generator and
common transit areas.

Class II restricted access red zone: Those areas of the building to which access and circulation is only
permitted to those in possession of a red card and job description that qualifies them to work in a
Class II zone: Specifically This area is limited to the research, administration, communications and
personnel room.

Class III restricted access red zone: Those areas of the building to which access and circulation is only

2
Security Director Higher Course

permitted to those in possession of a red card and job description that qualifies them to work in a
Class III zone: Specifically This area is limited to the management area, data processing center access,
IT and CPD.

The entry and access of people to the interior of the building will be carried out with the following
premises:

Employees entering through pedestrian access will use magnetic identification cards, placed in a
visible place, for control by security personnel.

They will pass through the security arch, introducing the objects carried through the X-ray scanner.

Those who access the employee parking lot, located in the basement, by vehicle will identify
themselves with the same magnetic cards, for access to floors by stairs or elevator.

Comprehensive Security Plan

José A. Fernandez Marin

Visitors will only be able to access through doors Pb1, Pb2 and Pb9, access doors located in the Hall,
for security control and must be checked in there. The concierge will give you the identification card
that will be collected upon exit, noting all the required data in the computer program that controls
access to the building.

The director's secretary will have a list of visits scheduled for each day in advance. All visitors who
want to access the ground floor parking must have been authorized in advance, so that when they
access they have the data corresponding to the vehicle, license plate, model, etc. And the door can be
opened by the security guard at the CCS.

Upon entering the building through door Pb1, they will go to the access control for verification by the
concierge and collection of the corresponding accreditation.

6.1.5 Indicators
A history of information referring to the following issues will be kept in a computerized file:

• Accreditations issued to workers.


• Monthly accreditations issued for visits.
• Damaged or lost cards monthly, and annually.
• Number of accredited vehicles that have accessed the interior of the parking lot.
• Access to the building through the pedestrian access doors, by door and day.
• Number of visits, without prior notice, accredited by the CCS monthly.
• Total number of employee vehicles that access the interior of the parking lot.
• History of accesses accredited and denied monthly.
• Suspicious letters or parcels detected.
• Breakdowns caused by the mechanisms in the building for access control and package
verification. And repair time of said mechanisms.

2
Security Director Higher Course

6.2 Anti-intrusion system


The objective of the intrusion detection system is to detect any unwanted intrusion attempt in time;
punctually report the fact so that security personnel intervene quickly and deter or arrest criminals.
Comprehensive Security Plan

José A. Fernandez Marin

All systems and means to be installed at TNC will be carried out under the rules and regulations
established for private security, adhering to the following for the project at hand:

• Law 5/2014, of April 4, on Private Security


• Royal Decree 2364/1994, of December 9, which approves the Private Security
Regulations
• Order INT/316/2011, of February 1, on the operation of alarm systems in the field of
private security
• Order INT/317/2011, of February 1, on private security measures.

6.2.1 System Specific Objectives


Special attention will be paid to the protection of the subsoil, basement, parking lot and ground floor,
as these are the places where intrusion is easiest to occur.

The primary objectives of the intrusion is theft, therefore the purpose of the measures taken is to
neutralize the corresponding threats in said building.

The proposed objectives to achieve these objectives are:

• Strengthen physical and personal security, such as anti-intrusion barriers, mechanical and
logical access controls, and private security personnel.
• Installation of technical measures, such as volumetric detectors, alarms, security doors.

Main panel – Alarm Center

An Alarm Center will be installed in the CCS, located in the reception on the ground floor of the
administrative building. This center will be connected to an alarm receiving center from an external
security company and will be certified in GRADE II, as provided in Order INT/316/2011, of February
1, on the operation of alarm systems in the field of security. private security in CHAPTER I “Security
facilities”

The alarm center is the nerve center of the system; it has a microprocessor that is responsible,
according to its programming, for receiving signals from the sensors and taking actions such as, for
example, activating a siren.

The plant has an automatic battery charger that will be responsible for powering the entire system in
the event of a power outage.

Comprehensive Security Plan

2
Security Director Higher Course

José A. Fernandez Marin

It constantly collects information on the status of the different sensors (volumetric detectors, magnetic
contacts, etc.) and, if it detects an intrusion in the protected area, it will activate the warning systems
(whether acoustic or optical).

The alarm center will be protected in a cabinet protected against tampering.

The alarm system will be divided into Areas and these in turn into zones, each of these zones can be
activated and deactivated independently, with this we can protect the areas in which there should be
no presence of people and deactivate the detectors in those areas that are being occupied by personnel
who are working outside the building's normal hours.

Alarm panel control keyboard

Although the system supports up to eight keyboards, on TNC, only one keyboard will be installed.

This keyboard will be installed in the CCS and will only be used for programming and maintenance
purposes of the alarm system, since the system will be operated from the security systems
management and integration software.

The keyboard will have the following features:

• LCD alphanumeric keyboard.


• Backlit display, with adjustable brightness and tilt.
• Texts in Spanish and English.
• Programmable description for each zone.
• Illuminated key system. 5 quick function keys. 3 direct emergency keys.
• Independently adjustable sounds.
• The central unit permanently monitors the operation of all keyboards.

SUB-SYSTEM AGAINST EXTERIOR PERIMETER INTRUSION

The perimeter will be protected with a system based on microwave barriers and infrared barriers, these
barriers will be controlled by the alarm center located in the CCS.

The configuration and reading of the events will be carried out centrally from the CCS, allowing the
option from a maintenance point of view to adjust the entire system from any perimeter connection
cabinet.

Comprehensive Security Plan

José A. Fernandez Marin

Microwave Barriers

Each volumetric or microwave barrier consists of a transmitter and a receiver.

The transmitter emits amplitude modulated energy in X band, which is transmitted to the receiver
where it is detected. The received energy is amplified and processed, which causes the alarm relay to

2
Security Director Higher Course

be activated. When an intruder approaches the beam, the received energy changes causing the relay to
be deactivated, producing an alarm.

6 transmitter-receiver units will be installed; placed on the perimeter fence and two on the west
façade, on the roof that borders the hotel, and will be mounted on galvanized steel tube.

Characteristics:

• Microwave detection with a maximum range of 100 m.


• Unaffected by vibration, wind, fog, rain, snow, dust or extreme temperatures
• Low consumption: 40 mA at 12 VD
• Broadcast frequency selection among four available channels
• Sensitivity level selection.
• Selection of response speed and alarm pulse duration
• Intrusion and sabotage alarm

Infrared barriers

The infrared barriers will be used as support elements for the opening system of the physical perimeter
barriers, that is, they will be installed inside the north and south entrance gates.

Active infrared sensors, better known as infrared barriers, are made up of an infrared light transmitter
and receiver and are devices specifically designed for perimeter protection.

The infrared barriers to be installed will be made up of an emitter block made up of four double
emitters inside a 3 meter standard column, and a receiver block made up of four double receivers
inside another column with characteristics identical to those of the emitter. . The column will have
heaters and anti-scale tamper.

The receiver module transmits an alarm signal when the four beams of any of the three elements
installed inside are simultaneously interrupted. This prevents false noises due to small animals and
small objects carried by the wind (leaves, papers...)

Comprehensive Security Plan

José A. Fernandez Marin

A sabotage signal is transmitted when an attempt is made to manipulate both the transmitter and the
receiver. Likewise, infrared barriers transmit a self-exclusion signal in situations of intense fog.

Each transmitter-receiver module has the following characteristics:

• Four synchronized infrared emission beams


• Protection up to 50 m
• Frequency and beam transmission levels selectable
• Automatic gain system to optimize detection within the area to
monitor, self-adapting to different weather conditions
• Alarms are indicated for: intrusion, sabotage and environmental failure, produced in situations
of excess fog.

2
Security Director Higher Course

Sub-System against intrusion


Dual technology volumetric detectors

To avoid false alarms, dual-technology volumetric "infrared/microwave" detectors will be installed,


these detectors provide an analysis of environmental conditions across the spectrum of movement
speeds, allowing you to focus on intruders and eliminate Environmental factors typical of false alarms.
For these detectors to trigger, two circumstances must occur at the same time, movement and heat in
motion.

Volumetric detectors will be installed in the following locations:

• Basement parking administrative building: 3 dual-technology volumetric detector

• Low level:

o Cafeteria: 1 dual-technology volumetric detector

o Kitchen: 1 dual-technology volumetric detector

o Dining room: 2 dual-technology volumetric detectors

o Lobby: 1 dual-technology volumetric detector

• First floor: this floor is located at a height of three meters above ground, so it is easy to climb
and access through the windows, which is why a total of 5 dual-technology volumetric detectors will
be installed in all offices with windows, as well as in the hallway and offices.

Comprehensive Security Plan

José A. Fernandez Marin

• Second and third floors: as preventive measures, dual-technology volumetric detectors will be
installed in all rooms with exterior windows, as well as in the hallways and lobbies.

magnetic contacts

On all access doors to the administrative building, doors on the ground floor and windows on the first
floor, to obtain early detection before the intruder enters the premises, magnetic contacts will be
installed.

A total of 28 magnetic contacts will be installed

The operation of these contacts is simple, but effective. Magnetic contacts are made up of two parts, a
magnet that is attached to the door leaf and the emitting equipment that is attached to the frame. When
the door is removed from its frame by a few millimeters, the transmitting equipment produces an
alarm to the central unit.

Characteristics:

• High security industrial magnetic contact Grade 2.

2
Security Director Higher Course

• Anodized aluminum housing.

• Cable protected with corrugated stainless steel tube.

• Cable length 2 m.

• Admissible distance between 5 and 15 mm.

• NC/NO contact.

• Mounting tamper.

• CM dimensions: 108 x 38 x 19 mm.

• EN50131-2-6 Grade 2 Certification.

6.2.2 Human resources


The security director is responsible for the exercise of the following functions:

a) The analysis of risk situations and the planning and programming of the necessary actions for the
implementation and performance of security services.

b) The organization, direction and inspection of private security personnel and services.

Comprehensive Security Plan

José A. Fernandez Marin

c) The proposal of the security systems that are relevant, as well as the supervision of their use,
operation and conservation.

d) The control of the permanent training of the security personnel who depend on them, proposing to
the company's management the adoption of appropriate measures or initiatives to fulfill said purpose.

The security guard will ensure that anyone who wants to access the building is identified by means of
a DNI or similar card.

The corresponding department will have to report the visit, as well as their identification, so that when
carrying out the control the security guard can make a comparison and it corresponds to the person
they are really waiting for. You must check bags and luggage when you deem it appropriate.

The function of the CCS guard will include image control, fire alarm central, connection and
disconnection of lights and air conditioning through software. It will also have an access control
system in which it will supervise any unauthorized access to a restricted area and control of anti-
intrusion alarms installed throughout the building and perimeter. Act diligently in emergency
situations, in support of the evacuation and emergency plans of the Comprehensive Security Plan.

The company contracted to manage alarms (CRA) will be the one who manages said alarms during
non-working hours.

2
Security Director Higher Course

Hiring this service is totally necessary in said security plan.

6.2.3 Technical means


To guarantee security throughout the building and having detected security deficiencies therein,
implementation of coherent measures to correct them:

• Placing 100 m infrared barriers on the top of the fence (2.50 meters of it), allowing the
detection of intruders inside it, connected to the ARC.
• Cameras for 24-hour recording of said perimeter, connected to CCTV.
• Security locks on the perimeter doors and access to the property; Pb1, Pb2, Pb3, Pb4, Pb5,
Pb6, Pb7, Pb8 and Pb9.
• Volumetric detectors distributed throughout the floors, in the common passage areas, cafeteria
and kitchen. The Hall is the only area free of volumetric detectors because the CCS and
security guards are located 24 hours a day.

Comprehensive Security Plan

José A. Fernandez Marin

6.2.4 Operational and organizational measures


At the end of the working day of the building staff and the cleaning staff, the security guard will make
a round of the entire building, checking the interior of the building, floor by floor, observing that no
one is left inside, that all the doors are closed. properly and that all areas of special sensitivity are
correctly closed and alarmed, while the person in the CCS checks all the security parameters and that,
according to the access control software, no one is authorized in the building.

Once all this has been verified, the building will be alarmed, connecting the interior, exterior or
perimeter alarms with CRA, using a numerical keypad.

Private security personnel will also be in charge of disarming said alarm at 8:00, carrying out the
subsequent round to ensure that no anomaly has occurred inside.

During the night, rounds will be carried out, checking all the floors and the alarm switchboards that
are located at the access to each of them.

Access to the roof will also be checked, that the barriers are connected, that the skylight is in perfect
condition and that no one has attempted to access the building through the façade of the adjacent
hotel.

6.2.5 Indicators
A history of information regarding the following issues will be kept in a computerized file:

• Number of intrusion detectors installed in the building.


• Number of detectors damaged or with malfunctions per year.
• False alarms recorded monthly.
• Number of intrusion attempts detected in the perimeter or building, annually.

3
Security Director Higher Course

• Number of thefts in said building, reported by staff, annually.


• Incidents that occurred during the week and on the weekend.
• Reports of police presence requested as a result of possible intrusion attempts.

Comprehensive Security Plan

José A. Fernandez Marin

6.3 CCTV system


The main objective of the CCTV (Closed Circuit Television) system is to have supervision and
control of the entire company. A good CCTV system allows security personnel to monitor a large area
with few personnel and thus make surveillance of the area to be covered more effective.

Likewise, with the video surveillance system it will be possible to quickly detect possible fire
outbreaks that may occur throughout the company and thus be able to intervene as quickly as possible.

The video surveillance system reduces, but does not eliminate, the need for security personnel. With
the video surveillance system, both the exterior and interior of the Company can be covered from the
operational control unit.

For the installation of video surveillance, the provisions of the Organic Law on Data Protection
(LOPD) will be taken into account.

As indicated by the LOPD, the video surveillance system “will follow the principle of proportionality
established by the LOPD, proposing only the cameras necessary for video surveillance of the premises
without the intention of collecting personal data such as images.”

6.3.1 System Specific Objectives


The video surveillance system to be installed in Team Navigation Control is based on an IP (Internet
Protocol) camera system. This system, in addition to providing us with high definition images, when
installing the network infrastructure, requires a lower economic cost in cabling, since the video signal
from all the cameras is transmitted through a single optical fiber in the trunk, with the savings in
wiring and labor that this entails.

In an analog video surveillance system, in addition to not having the same video quality, it is
necessary to run as many lines of RG type wiring, from each camera to the recorder, as cameras we
want to install, which increases the budgets for wiring and labor. installation, in addition to the
increase in future breakdowns in wiring runs.

Outside we will install motorized dome cameras and fixed cameras in the locations that we will
describe, and inside we will install minidome cameras, since they are more discreet than the Bullet
type. This type of cameras offers the following advantages:

• Discretion and less aggressiveness towards the public


• It is not possible to guess which direction they are focusing in and therefore creates
doubts for the offender.

Comprehensive Security Plan

3
Security Director Higher Course

José A. Fernandez Marin

The video surveillance system must not be invasive and must not be “inconvenient” for staff and
visitors.

All cameras will be connected to a high definition Digital IP recorder, but will also be integrated into
an alarm management system to be installed.

6.3.2 Human resources


The security director is responsible for the design and implementation of the CCTV system for the
adequate security of the building, using technical means depending on the building's needs.

The CCS security guard will manage these means, being the first response to a possible incident that
may arise, relying on the service colleague for its resolution, or being the one who notifies the FCSE,
for rapid intervention.

6.3.3 Technical means


The video recorders will have IP technology, and 4TB capacity Hard Drives will be installed. These
TB of hard drives are not for storage volume, since according to the LOPD we cannot record more
than 30 days, but rather to be able to record images in high definition, since the higher the image
quality, the more hard drive space we will need.

To view the live images and view the recordings, a PC will be located in the rack provided for this
purpose in the CPD where the video server software will be installed from the video application.

Interconnected to this PC, two 32” monitors will be installed, located in the CCS, where all the
company's cameras will be displayed simultaneously, being able to interact on these monitors to see,
for example, a single camera on a full screen monitor and the rest of the cameras, in multiquadrant, on
the other monitor.

Regardless of being able to view the images on the aforementioned monitors through the video
application, the video recorder will be integrated into security system management software that we
will talk about in later chapters.

The recorder to be installed will meet the following characteristics:

• 32-channel IP recorder compatible with cameras up to 12 Mpx.

• Maximum recording bandwidth of 300 Mbps and 512 Mbps streaming.

• Compression H.265, H.264, MJPEG, Wisestream (optimizes compression up to 50%)

Comprehensive Security Plan

José A. Fernandez Marin

• Failover N+1 backup mode.

3
Security Director Higher Course

• Supports VCA events generated by cameras (motion detection, crossing line, tampering, noise
detection, face detection...).

• USB ports for backup. HDMI (4K resolution) and VGA monitor output.

• 2 Gigabit RJ45 ethernet ports.

• Capacity for 8 internal S-ATA HDDs ('hot-swap', RAID 5) up to 8 TB.

• Web server and management and visualization software (SSM and SmartViewer). Compatible
with iPhone, iPad and Android. Watermark.

Joystick control

As a supplement to the video recorder, a joystick console will be installed on the CCS control desk.
With this console we will be able to control the motorized cameras that are part of the video
surveillance system.

This joystick will have these features:

• IP Keyboard with 3D Joystick

• TFT LCD screen (800mm x 400mm) for controlling DVR/NVRs and motorized IP domes

• Ability to manage 15 operators, up to 256 devices (4096 channels)

• USB port. 1 vision channel (supports MPEG4/H.264).

• RS-485/RS232 port (for configuration and maintenance

motorized cameras

The motorized cameras will have the following characteristics:

• D&N IP PTZ dome 1/2.8" CMOS 2Mpx progressive scan.

• Zoom optic x32 (4.4 - 142.6 mm).

• Resolution 1920x1080, 60 ips.

• Illumination 0.5 lux color and 0.01 Lux B/W with ICR. WDR (120dB), BLC and HLC
backlight compensation. SSDR, SSNRIII.

• Supports FTP and DHCP.

Comprehensive Security Plan

José A. Fernandez Marin

• Motion detection (4 zones)

• Privacy masks (32 zones).

3
Security Director Higher Course

• Advanced motorized dome functions: Presets/Rounds/Home, OSD menu configurable via


RS485 (Pelco D) or IP (IExplorer).

Motorized cameras will be installed on the outer perimeter of the plot located in the following
locations:

• West façade of the perimeter: on the east façade of the perimeter, the rear of the exterior
buildings, 6 motorized cameras with the characteristics described above will be installed. One will be
located in each corner of the wall next to the microwave barriers and another in the center of the
outdoor parking lot. These cameras will be located on poles, installed for this purpose, which will
exceed the perimeter wall by two meters.

• On the roof part, another will be placed to display the adjacent façade of the hotel.

With the help of the joystick, these cameras can be rotated and oriented to the area to be protected, as
well as zoomed in and zoomed in to bring the scene to be viewed closer.

6.3.4 Procedures
The system The CCTV elements, for perimeter surveillance and common areas and interior rooms of
the building, allowing intrusions and fire outbreaks to be detected, checking the situation of the rooms
at all times and allowing the possible intruder to be identified.

It will be used in the company for Access control, Presence control, Control of wandering individuals,
Video surveillance, Parking management, Vehicle identification, Visitor control, etc. The images
captured will be treated according to LOPD 5/2018.

6.3.5 Indicators
A history of information regarding the following issues will be kept in a computerized file:

• Number of cameras in service failure per month.


• Repair time for said cameras.
• Incidents detected by the CCTV system.
• Number of sabotage attempts on the CCTV system annually.
Comprehensive Security Plan

José A. Fernandez Marin

Fixed outdoor cameras

Fixed cameras have the peculiarity, compared to motorized cameras, of showing us certain areas at all
times, if there is a need to view a specific area, you know that you have a camera focused on that
place without the need to have to look for that area. image with the motorized camera.

The motorized camera would be a support for these cameras, in order to see the details previously
displayed with the fixed cameras.

During the day they will serve to visualize in real time the movement of people inside the plot in case

3
Security Director Higher Course

there is an incident or accident, fire, etc. and during the night to detect possible intruders, even before
an intruder alarm occurs.

• Fixed outdoor cameras will be installed in the following locations:


• Interior garage entrance: 3 fixed exterior cameras
• Main entrance: 1 fixed outdoor camera
• Building facade: 1 fixed outdoor camera
• South facade: 1 fixed exterior camera
• Building facade, kitchen: 1 fixed outdoor camera
• Personal entrance: 1 fixed outdoor camera.
• First floor and second: stairs access.
• Third floor: IT and stairs access
• Fourth floor: security warehouse and access to stairs.
• Cover: entrance door to the building.

The fixed cameras will have the following characteristics:

• D&N 1/3" CMOS IP tubular camera


• 2 Mpx progressive scan.
• 32 IR LEDs with 30 meters range.
• IP66 protection for outdoors.
• DC Iris varifocal optics of 2.8 - 10 mm,
• 0.005 lux color illumination with integration of x60 and 0 Lux fields in B/W, with ICR.
• Resolution 1280x1024, H.264 compression, MPEG-4, MJPEG, up to 25ips.
• Backlight compensation SSDR and HLC, S/N ratio 50dB,
• Image stabilizer
• Video analysis
• Private zones (up to 12 zones) and character generator.
• Analog video output in BNC.
• Visor and support with internal cable passage.

Comprehensive Security Plan

José A. Fernandez Marin

Fixed indoor minidome camera

For greater discretion inside the administrative building, so that staff do not feel “watched” or
intimidated by the cameras, there will be mini-dome cameras inside, these will be provided with a
smoked glass dome in order to so that you cannot see where the optics are looking.

These minidomes will be installed in:

• All interior access to the administrative building


• In the lobbies and hallways on all floors
• Security Control Center for having recordings of what could happen there
• Server room (CPD)

3
Security Director Higher Course

• Inside the garage.

Like the rest of the elements that make up the video surveillance subsystem, these mini domes will
have the following characteristics:

• D&N 1/3" CMOS 1.3 Mpx IP mini-dome with progressive scan.


• IR LEDs with 30 meters range.
• Minimum illumination 0.05 lux (SSLE) with ICR
• Resolution 1280x1024, H.264 compression, MJPEG, up to 60ips
• 3 - 8.5 mm varifocal optics with autofocus
• BLC and SSDR backlight compensation. WDR (130dB)
• Private zones (32 zones)
• Motion detection (4 zones).
• Character generator, video analysis

15 indoor mini-domes will be installed distributed as follows in the different rooms:

• Indoor parking: 2 minidome-type indoor cameras.


• Lobby: 1 minidome-type interior chambers.
• First floor: 3 minidome-type interior chambers.
• Second floor: 3 minidome-type interior chamber.
• Third and fourth floor: 6 minidome-type interior chambers.
Comprehensive Security Plan

José A. Fernandez Marin

6.4 Personal protection system


The set of means, measures and forms of action required by the security of a senior official constitute
a Personal Protection Plan and, like any security plan, requires a prior study, consisting of a risk
analysis and the application of means of protection. protection,

It is necessary to define the elements of any Security issue. The security director will be the one to
undertake said personal protection plan, following the following guidelines:

The Object to protect (What we protect)

The Threats, or Risks (From what, or from whom, we protect it)

The dimensional elements: Space and Time (Where and when we protect it)

The Means of Protection (How, with what, we protect it)

6.4.1 System Specific Objectives


For each of the people corresponding to the group, it will be necessary to prepare a Personal
Protection Plan that, in summary, will include:

A selection of the truly potential risks that affect the person, carried out on the threats described, as
well as those other risks that the study of the person requires to incorporate.

3
Security Director Higher Course

A rigorous study of the physical space in which the life and activities of the person to be protected
take place; Typically, it will include:

• Home.
• Workplace.
• Leisure areas.
• Itineraries on foot and by vehicle.
• Trips.

An interrelated study of the risks and spaces described, which will provide all existing vulnerabilities.

An evaluation of these vulnerabilities, as well as an estimate of the foreseeable times for the
development of the risks or threats, will result in a logical application of the means of protection.

The establishment of protection levels, with the application of the necessary measures and procedures,
and the assignment of technical and human security means.

Comprehensive Security Plan

José A. Fernandez Marin

For all corresponding persons, it is necessary, at least, to establish some standards of conduct, or
recommendations, which, duly assumed, will make it very difficult to carry out threats of attack or
kidnapping, such as:

• General measures.
• Security measures on the street.
• Safety measures with the vehicle.
• Security measures at home.
• Security measures for family members.
• Behaviors is a case of kidnapping.

6.4.2 Human resources


Being approved by the entity's management bodies, the security director will be in charge of
implementing and supervising it.

Inside the building, security guards stationed at access control will ensure the safety of the managers
inside the building.

In the case of increased security for the entity's directors, the security director will propose to the
company management the hiring of private escorts, with the corresponding armored vehicle.

As previously indicated in the risk table, if the possibility of kidnapping or assault towards
management personnel is contemplated, they must be assigned a personal security team, made up of
two bodyguards and a driver.

3
Security Director Higher Course

6.4.3 Technical means


Reflective and anti-fragmentation plastic sheets will be placed on the windows of the first floor, where
the offices of the director and deputy director are located. Alarm buttons will also be placed in both
offices, placed under their tables.

A location and alarm system will be installed on their mobile phones, which will be directly connected
to the CCS, so that if the case arises, they can be located and go to the security director, who will be in
charge of calling the FCSE in case of need.

6.4.4 Procedures
The security director of the entity will recommend a series of actions to be carried out to devise good
security measures against the commission of criminal acts.

Comprehensive Security Plan

José A. Fernandez Marin

The proposed films on the windows of the entity's directors and the anti-panic buttons will be
measures to be taken for the personal safety of said directors, a task that the security director has.

It is also the security director who communicates to the FCS the different occasions in which said
governing body may be the target of illegal actions by detractors, such as in the case of an occasional
celebration in the building.

Therefore, it is the security director who requests the police presence in the surrounding area when
said building is inaugurated, given the concentration of personalities there.

6.4.5 Indicators
A history of information referring to the following issues will be kept in a computerized file:

• Number of written threats received by the TNC management team.


• Times that the entity's directors have resorted to the anti-panic device.
• Incidents in which TNC company personnel have been involved.
• Number of management positions that have attended events organized by the entity.
• Calls to the police forces, in relation to the safety of the people who
attend the TNC building.

6.5 Information protection system


The company's information is another of the component elements subject to protection.

It is an asset of incalculable value, whose loss or improper dissemination can cause serious damage to
image, confidentiality, financial, corporate, seriousness and, ultimately, to trust or loss of credibility.

The company's official information will be treated strictly confidential, and its copying, disclosure or
distribution by any means, be it spoken, written, visual, telematic or any other means of dissemination
that exists or exists, is strictly prohibited.

3
Security Director Higher Course

The main objective of computer security will be to protect our entity's computer resources from
damage, alteration, theft and loss of data, computer equipment, storage media and software.

There must be a formal data access control policy, detailing at least:

- The level of confidentiality of the data and its sensitivity.

Comprehensive Security Plan

José A. Fernandez Marin

- The procedures for granting user passwords to access the system.

- The standards set for user identification and authentication.

The minimum and necessary permissions will be assigned, according to the department and work
performed by the user.

Users will only be able to access the system from authorized terminals.

Access to the system or the use of resources will be restricted in a specific time slot, taking into
account that:

- User accounts must not be able to access the system during non-business hours, except authorized
users

- During vacations and holidays, user accounts will be deactivated.

- The terminals must have a screen saver with a password installed.

- The number of user profiles with maximum privileges should be reduced to the essential minimum.

To log in to the system, the following data must be displayed:

• Username.
• Password (password).
• Option to change the password.

Firewall (Firewall):

The company's firewall must present a pre-established denial posture, configured in a way that
prohibits all protocols and services, enabling the necessary ones. If there is a fault in the firewall, it
must be a “secure fault”, which means that all access to the internet server must be blocked.

6.5.1 System Specific Objectives


This system will try to establish an optimal level of security so that there are no interferences, internal
or external, capable of destroying or altering the company's information.

All computers will have a network identification. The people responsible for each computer will only
be able to access the network from their own computers, and not from other terminals without express

3
Security Director Higher Course

authorization to do so.

Comprehensive Security Plan

José A. Fernandez Marin

Access to the networks will be with client privileges, and you cannot access with administrator rights
or modify access privileges.

All staff will access from their position using a password and a password.

Both will be private, and cannot be communicated or disclosed among the rest of the staff.

The privileges of each team will be defined by the person responsible for the Department. of
computing, and cannot be altered.

Access to the company's web services will also be restricted by password and password.

6.5.2 Human resources


The security director, advised by the head of the IT department, will develop the information security
system.

The head of the IT department will respond to the security director for the following issues:

• You will be responsible for maintaining the company's computer system.


• He will be responsible for preparing authorization reports for the acquisition of equipment and
software, recommending or denying their acquisition, so that the Security Director acts
accordingly.
• Will be responsible for investigating violations of the system, preparing the corresponding
reports.
• Will be responsible, together with the Security Director, for developing an Operations
Continuity Plan, which guarantees the continuity of processes in adverse conditions.
• It will authorize access and monitor the maintenance of the security levels established in the
company's computer system, proposing improvements and measures that solve the problems
that arise most frequently.

6.5.3 Technical means


Computer files must have the necessary measures implemented to ensure the confidentiality, integrity
and availability of the information.

There will be a fireproof security cabinet with a security lock, for the storage of backup copies, to
which only the head of the IT department, security director or TNC management will have a key and
access.

Comprehensive Security Plan

4
Security Director Higher Course

José A. Fernandez Marin

Two closets will be placed, one on the management floor and another in IT.

A safe in the deputy director's office for the deposit of the most sensitive documentation that the
directors deem appropriate.

The keys to the security cabinets and safes will be kept in custody by the management team and the
security director.

Paper shredders will also be placed on each plant, thus ensuring that the information that these
documents may carry do not leave the entity.

6.5.4 Procedures
The IT manager will be in charge of making the registrations, cancellations or modifications of the
personnel's access to the company's information, especially when the employment relationship with
the company ends.

It will control employee access security levels, restrictions and employee security levels.

Three levels of information security are established:

Level 1- this is information that circulates freely and can be accessed by any worker.

Level 2- data not available to workers, restricted to part of them. Need for a password to access said
information.

Level 3- privileged information, in possession only of the company's directors, access only by the
management body through a biometric fingerprint reader.

Users and those responsible for processing the information must report any anomaly found, and
ensure the confidentiality of the information in their possession, given their business relationship.
Access to it can be audited, user accounting can be carried out and relevant events can be recorded for
security purposes.

The worker will have the following premises based on the company information that they handle daily
in their positions:

• Each worker must be responsible for their assigned equipment, hardware and software.
• You may not use the equipment, web access, emails, software or hardware for purposes other
than the interests of the company.
Comprehensive Security Plan

José A. Fernandez Marin

• In any case, you are prohibited from using the company's computer systems for personal or
private purposes, especially email and Internet access.
• When you detect any violation in your equipment or in your access protocols, you must notify

4
Security Director Higher Course

the person in charge of the Department. IT and the security director.


• He must properly safeguard his access codes and passwords, preventing anyone from using
them by impersonating him.
• You will not access any equipment, services, data banks or any company system using access
codes and passwords that do not belong to you.
• Access from another computer other than the one assigned is prohibited, unless authorized in
writing.
• You are prohibited from tracking, accessing or attempting to circumvent keys, accesses,
encryptions in the system.
• You must be responsible for the backup copies assigned to you, regarding the information you
provide to the system, respecting all the procedures defined for this.
• You will not be able to make security backups without the prior written authorization of the
person responsible for the Department. of Informatics.

6.5.5 Indicators
The control method will be a history of information related to the following issues:

• Number of registrations, cancellations or modifications in the level of user access to company


information annually.
• Restricted daily access to the computer system.
• Changes made to passwords by users monthly.
• Attempts to connect to external printers or hardware.
• Number of times backup copies are used to replace lost information, annually.
• Viruses detected on the entity's computer media.
Comprehensive Security Plan

José A. Fernandez Marin

6.6 Fire protection system

6.6.1 System Specific Objectives


In accordance with the Technical Building Code, DI SI Basic Document, section 4 “Detection, control
and extinction of fire”, buildings must have the fire protection equipment and facilities indicated in
table 1.1 of Chapter 1 of the Section 1 of DB SI.

The design, execution, commissioning and maintenance of said facilities, as well as their materials,
components and equipment, must comply with the provisions of the “Fire Protection Facilities
Regulations”, in its complementary provisions and in any other specific regulations that apply to it.
The commissioning of the facilities requires the presentation, before the competent body of the
Autonomous Community, of the certificate of the installation company referred to in article 18 of the
aforementioned regulation.

As far as fire protection systems are concerned, TNC will be governed by the standards established in:

• The Fire Safety Regulations in industrial establishments, approved by Royal Decree

4
Security Director Higher Course

2267/2004, of December 3
• Technical Building Code (CTE), approved by Royal Decree 314/2006, of March 17
• Royal Decree 513/2017, of May 22, which approves the Regulation of fire protection
installations.
• Basic Document SI - Safety in case of fire

The main objective of fire protection systems is the physical protection of the contents and container
of the factory.

These systems are intended to minimize the damage that a possible fire outbreak may cause.

For them, our company will take into account both passive safety (intumescent paints on beams and
columns, fabrics and carpets that do not spread flames, etc.), which will not be the subject of this
project, and active safety (electronic detection equipment and extinguishing equipment).

4
Security Director Higher Course

Comprehensive Security Plan

José A. Fernandez Marin

The purpose of the firefighting subsystem will be to detect and support extinction, as well as delay its
spread. The implemented firefighting subsystem is expressed in the following organizational chart:

6.6.2 Human resources


The safety director will be in charge of designing, developing, implementing, organizing and
controlling the fire systems involved in the fire safety plan.

The CCS security guard will manage and check these systems so that their functionality is correct at
all times. You will always have the alarm switchboard in operation.

Comprehensive Security Plan

José A. Fernandez Marin


The emergency teams, as in any building that has a fire emergency plan, will be the workers
themselves, who will be entrusted with the corresponding functions in case of emergency, as specified
in the self-protection plan outline:

4
Security Director Higher Course

Foreign aid teams, firefighters, medical services, police, etc., will be notified by the security director
when appropriate, depending on the type of emergency and its evolution.

6.6.3 Technical means


Obligated according to Basic Document SI Safety in case of fire in Table 1.1. Provision of fire
protection facilities for administrative use and general use For our project, we will follow fire
measures.

Table 1.1. Provision of fire protection facilities


Intended use of the building or Conditions
establishment
Facility
In general
Portable fire extinguishers One of effectiveness 21A -11 3B:
- A maximum of 15 m of travel on each floor, from all eva origins cuation.
- In special risk areas in accordance with Chapter 2 of Section 1" of this DB.

4
Security Director Higher Course

Comprehensive Security Plan

José A. Fernandez Marin

Equipped fire hydrants In high special risk areas, in accordance with Chapter 2 of Section SI1, where the risk is
mainly due to solid combustible materials 121

emergency elevator In plants whose evacuation height exceeds 28 m


Exterior hydrants
If the descending evacuation height exceeds 28 m or if the ascending one exceeds 6 m,
as well as in establishments with an occupancy density greater than 1 person every 5 m
2
and whose constructed surface is between 2,000 and 10,000 m2.
At least one hydrant up to 10,000 m 2 of constructed area and one more for each
additional 10,000 m 2 or fraction.)

Automatic extinguishing Unless otherwise indicated in relation to the use, in any building whose height of
installation eva cation exceeds 80 m.
In kitchens in which the installed power exceeds 20 kW in Hospital or Public
Residential use or 50 KW in any other use."
In transformation centers whose devices have dielectric insulation with a flash point
less than 300 °C and installed power greater than 1,000 kVA in each device or
greater than 4,000 kVA in all devices. If the dinner tro is integrated into a building for
Public Use and has access from inside the building, these powers are 630 kVA and
2,520 kVA respectively.

Administrative
Equipped fire hydrants If the constructed area exceeds 2,000 m 2 . 0
Dry column 15 ' If evacuation height exceeds 24 m.
6
' ' alarm system If the constructed area exceeds 1,000 m 2 .

Ingress detection system fire If the constructed area exceeds 2,000 m2, detectors in high risk areas in accordance
with Chapter 2 of Section 1 of this DB. If it exceeds 5,000 m 2 . throughout the building.

One if the total constructed area is between 5,000 and 10,000 m 2 .


Exterior hydrants
One more for every additional 10,000 m 2 or fraction. 13 '

To comply with the provisions of the Basic Document SI Safety in case of fire in Table 1.1. Provision
of fire protection facilities for general use and administrative use, TNC facilities will be equipped with
the following measures and equipment for fighting fires:

• Detection system and fire alarm.


• Portable fire extinguishers
• Equipped Fire Hydrants
• Exterior hydrants

FIRE DETECTION SUB-SYSTEM

The fire detection system is responsible for identifying and warning that there is a fire in a certain
place.

Comprehensive Security Plan

4
Security Director Higher Course

José A. Fernandez Marin

In order for the alarm to be triggered as quickly as possible in the event of a fire, the design of the fire
detection system must cover the largest possible area of the area to be protected.

Fire detection systems allow the automatic location of the outbreak, which facilitates the early
implementation of the procedures established in the self-protection plans. Fire detection systems must
be monitored 24 hours a day.

The fire detection system to be installed will be of the analog/intelligent type. This type of system
individually recognizes each of the buttons, detectors, sirens or modules that make up the system, so,
when an alarm is detected , indicates the exact point where the possible attempt has occurred, since all
the elements are previously named through programming.

Analog detection system type diagram

This makes it the most suitable type of installation for a company the size of TNC, where it would be
very difficult to locate the alarm point with zone detection due to the great compartmentalization of
our company.

In addition, analog fire detection allows the control of elements of other facilities that have an
important role in a possible evacuation of the building, such as emergency fire doors, air conditioning
systems, etc.

The main components of a fire detection system are:

• Detection center
• Detector
• Button

Comprehensive Security Plan

José A. Fernandez Marin

• Evacuation siren or public address system

Fire detection center

4
Security Director Higher Course

In the CCS, located in the TNC Reception, a fire detection center will be installed, with a repeater
panel and IP module for fire detection and alarms.

It has an alphanumeric LCD liquid crystal display with 2 lines of 40 characters, a membrane keyboard
with function and control keys and LEDs for displaying the status of the system and individual
indication of the 16 alarm and fault/fault/cancelled zones.

It will be mounted in a metal cabin with the capacity to house 2 12Vdc, 12Ah batteries.

Fire detectors

Two types of fire detectors will be installed at TNC, optical smoke detectors and thermovelocimetric
detectors.

• Optical smoke detectors: They will be installed in all offices and in all hallways,
warehouses, etc. taking into account that their coverage is approximately 60m2 and that
they cannot be installed in places where there may be suspended dust or smoke may be
produced from, for example, welding work, etc.
• Thermal Detectors: These detectors are not triggered by the effect of smoke, but by a
sudden increase in temperature or when the temperature gradually reaches 67ºC. This type
of detector will be installed in:
• In production and handling plants, for example, welding work can be done that can produce
smoke and trigger the fire detection system.
• Parking in the basement of the administrative building: if we installed optical detectors in the
parking lot, the smoke from the vehicles would cause constant false alarms, for this reason
Thermovelocimetric and CO 2 detectors will be installed.

The Thermovelocimetric detectors will be distributed in such a way that each detector covers
approximately 30m2.

The following number of optical smoke detectors will be installed:

• Building ground floor: 2 optical smoke detectors


• First floor building: 2 optical smoke detectors
• Second floor building: 4 optical smoke detectors
• Third floor building: 2 optical smoke detectors
• Fourth floor building: 2 optical smoke detectors

Comprehensive Security Plan

José A. Fernandez Marin

The following number of Thermovelocimetric detectors will be installed:

• Building parking floor: 7 Thermovelocimetric detectors.


• Building ground floor: 5 Thermovelocimetric Detectors.
• First floor building: 8 Thermovelocimetric detectors.
• Second floor building: 7 Thermovelocimetric detectors.
• Third floor building: 7 Thermovelocimetric detectors.

4
Security Director Higher Course

• Fourth floor building: 7 Thermovelocimetric detectors.


• Building covered floor: 5 Thermovelocimetric detectors.

Fire alarm pushbuttons

Alarm call points are classified as manual fire alarm systems.

They must be easily identifiable and red in color, from any point of travel they cannot be more than 25
meters until reaching a button and at a height no higher than 1.50 meters from the ground, if possible
they will also be installed less than 5 meters from the exits.

Pushbuttons will be installed in all evacuation routes of the buildings, distributed in such a way that
they comply with the aforementioned distances and heights.

A total of 27 manual fire alarm call points will be installed

Alarm and evacuation public address system

Fire alarm notices will be broadcast by an evacuation public address system.

Alarm and evacuation public address systems guarantee, in large buildings, the correct dissemination
of the alarm message and help the correct evacuation of the occupants.

The evacuation public address system will comply with the provisions of the RIPCI 2017 (Regulation
of fire protection facilities)

ANNEX I - Characteristics and installation of fire protection equipment and systems - Section 1.
Active fire protection - 1. Detection systems and fire alarm

“7. The alarm communication system will allow the transmission of differentiated signals, which will
be generated, either manually from a control post, or automatically, and its management will be
controlled, in any case, by the eci.

Equipment for transmitting alarms and fault messages must bear the CE marking, in accordance with
the EN 54-21 standard.

Comprehensive Security Plan

José A. Fernandez Marin

When signals are transmitted to an integrated system (public address), fire protection systems will
have a maximum priority level.” and standard EN-60849 “Public Address Systems for Emergency and
Evacuation Applications”, Standard EN 54, Fire Detection and Alarm System, among others.

An IP public address system will be installed. These are systems with IP-based audio and data with
specific security features, adaptable to any type of installation. IP-type control centers include
connectivity via Ethernet and allow the installation to be decentralized to control and configure it from
any point on the network.

It is important to keep in mind that all the features of these IP public address systems include all the
requirements demanded by the IEC60849 standard for voice alarm and emergency evacuation

4
Security Director Higher Course

systems.

The purpose of this type of IP Public Address systems is:

• TRANSMIT audio signals at the highest possible level of quality, availability and flexibility.

• INTEGRATE security equipment through input/output signals, to control video cameras, light
switches, door actuators, detector input signals, etc.

• RESPOND to on-site situations and acoustically control the area under surveillance if
necessary.

Some of the benefits of IP Public Address are:

• Speakers can be addressed and configured individually

• Good sound quality for announcements, music, notifications, etc.

• Comfortable and variable audio levels depending on ambient noise

• Playback of recorded messages, manual playback or time control

• Interaction with on-site security teams

Speakers will be installed in all hallways on all floors of the main building. The location of these
speakers will be distributed in such a way that in the “walking test” we have the same sound level
throughout the hallway.

With respect to outdoor warehouses, a speaker will be installed in each room.

Comprehensive Security Plan

José A. Fernandez Marin

FIRE EXTINGUISHING SUBSYSTEMS

Portable Fire Extinguishers

Portable ABC type fire extinguishers will be installed in all facilities.

ABC powder extinguishers are valid for extinguishing the following types of fire:

• Type A: (solid material fires, involving wood, fabrics, rubber, paper and some types of plastic
or synthetics).

• Type B: (liquid fires, involving gasoline, oils, paint, gases and flammable liquids and
lubricants).

5
Security Director Higher Course

• Type C: (gaseous material fires, such as most combustible gases).

6 Kg fire extinguishers will be installed. Efficiency 27A-183B-C, the location and placement of the
extinguishers will be as established in the RIPCI 2017 (Regulation of fire protection facilities)

Fire extinguishers will be installed every 15 meters of horizontal travel, they will be installed in such a
way that they are easily visible and close to places with a probability of fire, near the evacuation exits
and, if possible, fixed to vertical parameters in such a way that the top of the extinguisher It is located
between 80cm and 120cm above the ground.

“Its distribution will be such that the maximum horizontal path, from any point in the fire sector,
which must be considered the origin of evacuation, to the extinguisher, does not exceed 15 m.”

A 6 kg powder extinguisher will also be installed. 27A-183B-C effectiveness in:

• In all lobbies on all floors of the administrative building

• Each and every one of the buildings outside the administrative building.

In addition to these powder extinguishers, CO2 (carbonated snow) extinguishers will be installed for
electrical fires in:

• electrical room

• Generator Set

• Boiler room

• Server room

Comprehensive Security Plan

José A. Fernandez Marin

• Next to each electrical panel or subpanel

Automatic extinguishing system

In the server room, a fire extinguishing system will be installed using a NOVEC 1230 agent (FK-5-1-
12) based on the displacement of oxygen from the air. What the Novec 1230 product mainly does is
“steal” energy. of the heat of the flame and thus interrupts the combustion reaction. Only a small part
of the extinguishing effect of this gas is based on its chemical characteristics.

Benefits:

• Clean gaseous agent, leaves no residue

• Safe use in occupied rooms (low design concentration, and no significant reduction in oxygen

5
Security Director Higher Course

levels)

• Does not impair vision, and is not electronically conductive

• Compact system, few components, minimal space requirement

• Quick flood time (<10 seconds)

• Does not destroy the ozone layer (ODP = 0)

• Minimum Global Warming Potential (GWP = 1)

• Very little space requirement

BIE (Fire Hydrant Equipped)

To comply with the provisions of the Basic Document SI Safety in case of fire in Table 1.1. Provision
of fire protection facilities for administrative use described in previous chapters, which specifies that
buildings for administrative use whose constructed area exceeds 2,000m2 must be provided with
equipped fire hydrants, BIE,S will be installed as described below.

There are two types of fire hydrants, they differ especially in terms of the flow of water they are
capable of supplying.

• Equipped 25mm Fire Hydrant: They have 25mm diameter, with a 20-meter semi-rigid hose
with the capacity to supply a flow rate of 100 liters per minute at 3.5 bar pressure at the tip of the
spear. It is characterized by its easy use and maneuverability, even for people who do not have
experience in using these devices.

Comprehensive Security Plan

José A. Fernandez Marin

It is not necessary to unroll them completely to be able to use them, you unroll them just enough to
reach the point of fire.

• Equipped 45mm Fire Hydrant: In this case the diameter is 45mm, with a 20-meter flexible
hose with the capacity to supply 200 liters per minute at 3.5 bar pressure at the tip of the spear. In
order to use this hose, you must unroll it completely and make sure that there are no folds that prevent
the passage of water. These fire hydrants are to be used by professional firefighting services.

Due to the above, 25 mm Equipped Fire Hydrants will be installed. In the entire administrative
building, parking lots and outdoor warehouse areas.

The Fire Hydrants will be installed as stipulated in Royal Decree 513/2017, of May 22, which
approves the Regulation of fire protection installations (RIPCI).

They must be placed on a rigid support, so that the center is at a maximum height of 1.5 m in relation

5
Security Director Higher Course

to the ground.

They will preferably be located near doors or exits and at a maximum distance of 5 m. An entrance
will always be installed, taking into account that they should not constitute an obstacle to the use of
said doors.

In fire hydrants equipped with 25 mm, the height above the ground may be higher, as long as the
nozzle and the manual valve, if any, are at a maximum height of 1.50 meters in relation to the ground.

The determination of the number of equipped fire hydrants and their distribution will be done in such
a way that the entire surface to be protected is protected by at least one equipped fire hydrant.

The maximum separation between each equipped fire hydrant and its closest one will be 50 meters,
and the distance from any point of a protected premises to the nearest equipped fire hydrant must not
exceed 25 meters. These distances will be measured on real routes.

The equipped fire hydrants will be marked in accordance with current regulations.

An area free of obstacles must be maintained around each equipped fire hydrant that allows access and
maneuver without difficulty.

Comprehensive Security Plan

José A. Fernandez Marin

If the network of pipes for the water supply of the fire hydrants that must be exposed will be made of
steel, and may be made of another material when buried or suitably protected, it will be for exclusive
use for fire protection installations and must be designed in such a way that the following operating
conditions are guaranteed in any of the equipped fire hydrants:

The dynamic pressure at the tip of the spear will be a minimum of 3.5 kg/cm2 (344 kPa) and a
maximum of 5 kg/cm2 (490 kPa).

• The minimum flow rates will be 1.6 l/s for 25 mm mouths, and 3.3 l/s for 45 mm mouths.

• These pressure and flow conditions must be maintained for one hour, under the hypothesis of
simultaneous operation of the two most hydraulically unfavorable nozzles.

• The network will be protected against corrosion, frost and mechanical actions, at the points
considered necessary.

The installation of equipped fire hydrants will be subjected to a tightness and mechanical resistance
test before receipt, subjecting the network to a hydrostatic pressure equal to the maximum service
pressure plus 3.5 kg/cm 2 (344 kPa) and as at least 10 kg/cm 2 (980 kPa), maintaining said test pressure
for at least 2 hours, and no leaks should appear at any point in the installation.

Hydrant Network

According to table 1.1 of Chapter 1 of Section 1 of the DB SI, it is established that, for administrative

5
Security Director Higher Course

establishments, they must be equipped with a hydrant if the surface is between 2,000 and 10,000
square meters, one or more for every 10 square meters. additional or fraction. Our plot has a total of
2,500 square meters, therefore, for our enclosure the installation of two exterior hydrants will be
necessary.

A hydrant will be placed on the North façade and another on the South façade of the company. These
hydrants are manhole hydrants, distributed in a perimeter ring and connected to the company's fire
fighting group. The hydrants arranged are each provided with two 70 mm outlets, with a 100 mm
Firefighter type fitting, with cover and chain in straight mode. Adjusted to UNE 23407.

Their purpose is to have a series of water hydrants to which hoses will be connected with suitable
equipment to launch water, in such a way that all points of the facades are beaten by it, in the form of
a jet or sprayed water.

Comprehensive Security Plan

José A. Fernandez Marin

The hydrants have been placed in such a way that their location is more than 5 m. of façade and less
than 15 m., except in the case where it is not possible to respect the minimum, due to the layout of
circulation routes. The flow rate of each hydrant will be 500 l/min. (30 m3/h).

The pipe that corresponds to the network of exterior hydrants will be buried at sufficient depth and
sufficiently far from the exterior perimeter wall of the building to be protected. The network will be
provided with sectioning valves, in order to ensure maximum efficiency in the event of a breakdown.

Distribution of fire extinguishers per floor:

CO2
PLANT ABC POWDER TOTAL

Parking: 7 2 9

Low flat: 6 2 8

First floor: 7 1 8

Second floor: 5 3 8

Third plant: 7 7

Fourth floor: 7 7

5
Security Director Higher Course

Deck: 3 1 4

Installation of equipped fire hydrants:

• In this building, the equipped fire hydrant systems and their characteristics and specifications
comply with the following requirements:
• They are made up of a water supply source, a network of pipes for the water supply and the
necessary equipped fire hydrants (BIE).
• Depending on the case, they are of the 45 mm BIE and 25 mm BIE types.

Comprehensive Security Plan

José A. Fernandez Marin

• The BIE have been mounted on a rigid support so that the height of their center is a maximum
of 1.50 m above ground level or higher if it is a 25 mm BIE, always ensuring that the nozzle
and valve manual opening, are located within the mentioned height.
• The BIE are located at a maximum distance of 5 m from the exits of each fire sector, without
constituting an obstacle to their use.
• The number and distribution of the BIE in the fire sectors, in an open space, is such that the
entire surface of the fire sector in which they are installed is covered by a BIE, considering
the length of its radius of action as its radius of action. hose increased by 5 m.
• The maximum separation between each BIE and its closest one is 50 m. The distance from
any point of the protected premises to the nearest BIE does not exceed 25 m.
• An obstacle-free area is maintained around each BIE that allows access to it and its maneuver
without difficulty.
• The established conditions of pressure, flow and water reserve are adequately guaranteed.

Hydrant installation:

To calculate the established amount, the hydrants that are on public roads can be considered; in this
case there is one on the sidewalk next to the visitor parking lot, less than 100 m from the accessible
façade of the building.

Detection and alarm installation (SI4.2)

The building will have fire detection and alarm devices, both automatically and manually, detectors or
pushbuttons, connected to the fire control panel in the CCS, and can be connected both automatically
and manually. Detectors will be installed throughout the building, special security areas and manual
push buttons.

Thermovelocimetric and optical detectors will be placed on the floors and, in addition, in the
basement or parking lot, there will be optical, CO2, or gas detectors, and alarm buttons, with their
corresponding acoustic bell. All of this centralized in the CCS, by security guards.

5
Security Director Higher Course

In any case, the system must allow the transmission of local alarms, general alarms and verbal
instructions. These devices will voluntarily and manually send a fire alarm signal to the Signaling and
Control Central.

The buttons will be easily visible (red) and the distance to be traveled from any point in the building
protected by a button installation, to reach the nearest button, must be less than 25 m.

Comprehensive Security Plan

José A. Fernandez Marin

Emergency lighting installation:

Emergency lighting will be found throughout the building, with the following areas:

• All premises that have, in all means of access (corridors, stairs and ramps), evacuation and
extinction, emergency lighting that, in the event of failure of normal lighting, provides the
necessary lighting to facilitate visibility to those users so that they can leave the building,
avoid panic situations and allow them to see the signs indicating the exits and the location of
the existing equipment and means of protection.
• The following areas and elements will have emergency lighting:
• Any venue whose occupancy is greater than 100 people
• The routes from all evacuation origins to the safe outdoor space and to the refuge areas,
including the refuge areas themselves.
• Car parks whose constructed area exceeds 100 m2, including corridors and stairs leading to
the exterior or to the general areas of the building;
• The premises that house general equipment of fire protection facilities and those of special
risk, indicated in DB-SI 1.
• General floor toilets in buildings for public use
• The places where distribution panels or control panels for the lighting installation in the
aforementioned areas are located.
• Safety signs
• Accessible itineraries.

Facilities intended for emergency lighting must ensure, in the event of failure of normal lighting,
lighting in the premises and access to the exits, to guarantee the safety of people evacuating an area,
and allow the identification of equipment and existing means of protection.

The emergency lighting installations will comply with the specifications established in the Low
Voltage Electrotechnical Regulation, approved by Royal Decree 842/2002, of August 2, and in the
Complementary Technical Instruction ITC-BT-28.

Automatic extinguishing:

Extinguishing system located in areas that must be protected due to special importance and where it is
not possible to use another type of extinguishing agent.

The cases in which this system will be installed are:

5
Security Director Higher Course

• Emergency Generator, due to the gas-oil tank.


Comprehensive Security Plan

José A. Fernandez Marin

• Data processing center.


• Kitchen.
• Garage.

Foam in the kitchen and parking, and water spray for the garage.

In the CPD room for extinguishing by gaseous agents.

In the diesel tank, water spray.

6.6.4 Procedures
The procedures applicable in case of emergency are included in the self-protection plan, relative to the
emergency plan.

6.6.5 Indicators
• Number of detection elements broken monthly, out of the total number of them.
• Number of portable fire extinguishers that have lost their properties.
• Occasions of bad pressure in the BIEs.
• Monthly false alarms.
• Annual fire outbreaks.
• Annual real alarms.
• Number of times the generating equipment (UPS) has come into operation.
• Action time of the intervention team.
• Time to recover normality after an alarm.
• Calls to external equipment.

7. COORDINATION SYSTEM
This chapter contemplates the different emergency hypotheses and the action plans for each of them.
Classification of emergencies based on the type of risk, severity and occupation of the media.
Emergency detection and alert procedures, as well as alarm mechanisms, will be indicated.

The functions of the people and teams that will carry out the procedures and the identification of the
person responsible for the implementation of the Self-Protection Plan are also identified.

The coordination of personal and material resources is essential for the proper functioning of the
systems that make up any security plan.
Comprehensive Security Plan

5
Security Director Higher Course

José A. Fernandez Marin

7.1 System Specific Objectives


Define the training, structure, dependency and specific functions of the security department.

Establish rules and procedures for action so that everyone works correctly.

Means and measures to ensure that other systems function properly, including:

Participate in the evaluation of the actions proposed in the emergency plan.

Propose to the Team Leader the activities that complement the formation of the emergency plan.

Disseminate the knowledge acquired in the Civil Protection courses to the company staff, with the
purpose of raising staff awareness of self-protection.

Participate and motivate staff in drill exercises carried out in a property, as part of their functions
within the Emergency Plan.

Collaborate with other team members to execute activities in an organized manner.

Participate in data collection to carry out the diagnosis of the property and surroundings, thus
determining the needs and available resources.

Participate in the training of the community surrounding the property.

Inform managers of the activities carried out, as well as the needs detected.

They will attend all training events such as: first aid, fire control, evacuation exercises and drills, risk
prevention and rescue and rescue techniques.

Periodically check that the firefighting equipment and auxiliary resources are in optimal operating and
maintenance conditions to be used to mitigate an eventuality; in the event that anomalies occur,
immediately report them to management.

Follow the instructions that are indicated regarding Civil Protection.

The functions of the security director will be according to the Team, but at the time of emergency his
function will be determined as multifunctional.

Comprehensive Security Plan

José A. Fernandez Marin

7.2 Human resources


The personnel who provide services in the building of the Spanish TNC branch will be guided by
current legislation, and must be personnel authorized by private security.

The security department will be in charge of analyzing the measures to be implemented, reporting
directly to the deputy director, the security director will manage everything related to the security of
said building.

5
Security Director Higher Course

The need to hire security guards covers the consequent actions, which have already been analyzed and
contemplated in this Comprehensive Security Plan.

Security director

According to Law 5/2014, of April 4, on Private Security, it has the following functions:

a) The organization, direction, inspection and administration of available private security services
and resources.

b) The identification, analysis and evaluation of risk situations that may affect the life and integrity
of people and assets.

c) The planning, organization and control of the precise actions for the implementation of measures
leading to preventing, protecting and reducing the manifestation of risks of any nature with precise
means and measures, through the preparation and development of applicable security plans.

d) Control of the operation and maintenance of private security systems.

e) The provisional validation, until verification, where appropriate, by the Administration, of the
security measures regarding their adaptation to private security regulations.

f) Verification that the private security systems installed and the private security companies hired
comply with the approval requirements of the competent organizations.

g) Communication to the competent Security Forces and Bodies of the circumstances or information
relevant to citizen security, as well as the criminal acts of which they become aware in the exercise of
their functions.

Comprehensive Security Plan

José A. Fernandez Marin

h) Interlocution and liaison with the Administration, especially with the Security Forces and Bodies,
regarding the comprehensive security function of the entity, company or business group that has
contracted them, in relation to regulatory compliance on management of all types of risks. .

i) Checks of the necessary aspects regarding the personnel who, due to the exercise of the entrusted
functions, need to access areas or information, to guarantee the effective protection of their entity,
company or business group.

The security director is in charge of security matters for the building in question, both in the hiring of
private security personnel and the rest of the security workers of the entity in question.

These lines include the measures of the activities that the security director must systematically carry
out:

5
Security Director Higher Course

Once agreed upon with the building management (TNC), access to the areas of the building will be
prioritized, and the hours of activity in it.

It will establish the daily mechanics of access control, depending on the planned visits to the building
and acts or events within it.

The accreditations will be supervised by the same, regarding the system to be implemented.

It will decide which actions within the building should be undertaken by the FCSE.

It will designate the access codes to secure or restricted access areas, changing them whenever it
deems appropriate, for the security of said areas.

The personal security of the governing body of the Conservancy building will necessarily be his
concern as security director.

You will have a direct link with the head of the IT department to be up to date on information security
in the building, on issues that relate to cybersecurity or possible attacks on the company, both external
and internal.

He will be in charge of training courses for labor and private security personnel, to update knowledge
regarding possible emergencies or risk situations for the entity.

He will be the visible person of the TNC company for reports of acts of vandalism, crimes committed
against the entity or misdemeanors, with regard to the FCSE.

Comprehensive Security Plan

José A. Fernandez Marin

Ultimately, he will be the person empowered to adopt security measures, both for people and for the
facility itself.

The director's profile, according to current regulations, will be as follows:

j) Man or woman.
k) That they are in possession of an official university degree in the field of security that accredits
the acquisition of the skills determined, or the title of the security management course,
recognized by the Ministry of the Interior.
l) That for 5 years they have had experience in management positions or
m)public or private security management.
n) Computer knowledge.
o) Language proficiency, English essential, given the nature of this entity.
Security guards

Security guards will be hired, two on the morning shift from 7:00 a.m. to 3:00 p.m., on the afternoon
shift there will be only one from 3:00 p.m. to 11:00 p.m. and on the night shift also one from 11:00
p.m. 07:00. One of them will always be in the security control center, verifying the security of the
building, through cameras, alarms, fire control units and infrared barriers. All technical and logical

6
Security Director Higher Course

security will be carried out from that control center.

Due to its special characteristics, explained in the introduction of the security plan, this building will
be guarded 24 hours a day by private security personnel.

According to Law 5/2014, of April 4, on Private Security, it has the following functions:

p) Exercise surveillance and protection of assets, establishments, places and events, both private
and public, as well as the protection of people who may be there, carrying out the checks,
records and preventions necessary to fulfill its mission.
q) Carry out identity checks on personal objects, packages, merchandise or vehicles, including
their interior, at the access or inside buildings or properties where they provide services,
without, in any case, being able to retain personal documentation, but yes prevent access to
said buildings or properties.
r) Refusal to display identification or allow control of personal items, packages, merchandise or
vehicles will entitle individuals to prevent access or order them to abandon the property or
property that is the object of their protection.

Comprehensive Security Plan

José A. Fernandez Marin

s) Avoid the commission of criminal acts or administrative infractions in relation to the object of
their protection, carrying out the necessary checks to prevent them or prevent their
consummation, and must oppose them and intervene when they witness the commission of
some type of infraction or their help is required. for humanitarian or emergency reasons.
t) In relation to the purpose of their protection or their actions, detain and immediately place at
the disposal of the competent Security Forces and Bodies the criminals and the instruments,
effects and evidence of the crimes, as well as report those who commit administrative
infractions. They will not be able to interrogate them, although the annotation of their
personal data for communication to the authorities will not be considered as such.

They will functionally report to the security director.

They must also undertake the following functions:

u) Manage the CCS, located on the ground floor of the building, following the rules of action and
procedures imposed by the security director.
v) Resolve, to the extent possible, incidents that occur in the building, communicating to the
security director all actions, as well as the response given in said events.
w) Access control of people, packages and vehicles, as explained in the comprehensive security
plan.
x) In the provision of the private security service, by said security guards, their good image will
be essential. It is the first visible image of the entity to be protected.

7.3 Technical means


All security systems installed in the building will be centralized in the CCS, located on the ground

6
Security Director Higher Course

floor of the building, having immediate access to any anomaly detected in its security.

The surveillance post will be the coordination point for the entire work group since from here it will
control the building and receive any calls that may be made to security.
Control of keys to the building will also be carried out from the CCS.

The security measures at the checkpoint will be designed by the security director, which will be:

• A metal counter, raised with armored glass up to 2.50 m, its access door will have a security
lock and electronic opening from the inside.
Comprehensive Security Plan

José A. Fernandez Marin

• The counter will have a Document Pass, a console where the monitors and other electronic
systems and equipment detailed below will be installed.
• Two modular and anti-fatigue chairs.
• An AACC console.

Its function will include image control, fire alarm central, connection and disconnection of lights and
air conditioning through software. It will also have an access control system in which it will supervise
any unauthorized access to a restricted area and control of anti-intrusion alarms installed throughout
the building and perimeter. Act diligently in emergency situations, in support of the evacuation and
emergency plans of the Comprehensive Security Plan.

This position will have a 24-hour stay. uninterrupted.

It will have the following equipment and features:

• Interrupted power supply system (UPS).


• Workstation, keyboard, printer and 23" monitor.
• Management software, with video recorders on a 4 TB hard drive, control keyboard and
installed fire alarm, anti-intrusion and anti-panic buttons.
• Four 32” color monitors.
• Anti-vandal Intercom system terminal.
• External access buttons to the building.
• Switchboard telephones, with exterior and interior lines (corporate).
• Flashlights with chargers and batteries for communication between guards during the relevant
rounds.
• Fire extinguishers, CO2, ABC powder.

7.4 Support subsystems


The building will be supported by an information security subsystem, with the contracting of a
computer antivirus license, for the security of communications and computer equipment. Security
against cyberattacks is a priority for the management team and the security director.

6
Security Director Higher Course

7.4.1 Communications subsystems


The communications subsystem will be made up of radio transmitters, which will be distributed by the
security director among the security guards and the janitor.
Comprehensive Security Plan

José A. Fernandez Marin

The night shift guard will be permanently in communication with the CCS colleague with a corporate
mobile phone.

The building will have TV and radio frequency antennas for communications.

7.4.2 Energy and fluid subsystem


It will be made up of auxiliary electrical power equipment, water pressure pumps for fire fighting, for
the proper functioning of the building's own equipment.

The comprehensive security plan integrates the following energy support equipment:

• Extended power supply (UPS).


• Electrical panel, where the generating set and the energy necessary for the operation of the fire
fighting equipment are controlled.
• Stopcocks and energy control of the pressure group where the flow and pressure of the BIEs
and the operation of the cistern or common water supply of the building are controlled.

It will also have a lightning rod for safety.

7.4.3 Subsystem for civil works


Some basic elements for the operation of the plan require some subsystems, for example: the
installation of fire doors, anti-panic locks and UPS and supplementary energy installations. All these
new actions are described in this plan, in its different sections.

As the public electricity supply is the main energy source, auxiliary equipment will be available for
emergency electricity supply. This will be done using a 200 KW diesel generator engine, which will
have an autonomy of 48 hours, and will start automatically. It will be located in the basement of the
building.

The power equipment for the fire fighting system has an emergency generator for the correct
operation of said equipment.

The security team will be aware of any structural modifications that affect the comprehensive security
plan.

The director himself will give approval to any of the modifications planned for the building.

Comprehensive Security Plan

6
Security Director Higher Course

José A. Fernandez Marin

7.5 Procedures
The control center will be permanently attended by a security guard, there will be rotating relief shifts
every two hours.

These guards will have sufficient technical training to attend to said CCS.

Only the security director and security guards will be able to access the interior of the CCS; for this
purpose, the security lock and electronic opening access from the inside have been installed. All
entries and exits will be recorded in the record book that has been enabled for this purpose. The
documentation found inside will be the following:

• Security systems procedure manuals.


• Plans and descriptions of the building.
• List of center workers and subcontracted companies.
• List of vehicles with access to the indoor parking and daily vehicle authorizations for
arranged visits.
• Daily agenda of visitors and personalities who access the interior.
• Self-protection plan and building security plan.
• Incident record book, which will be sent by email to the security director at the end of each
shift.

7.6 Indicators
For the comprehensive security plan to effectively fulfill all its functions, this system must harmonize
all its actions, with the following indicators:

• Reaction time of security guards to an incident or event, until it is resolved.


• Annual calls to the police from the CCS.
• False alarms from any CCS system.
• Complaints made by the security director on behalf of the TNC company.

8. GLOBAL BALANCE
The Team Navigation Control headquarters presents a series of variables that indicate that security is a
primary element in the proper development of its activity and overall image. These variables are:

• The security needs that the security director has expressed to the entity's board of directors.
• The background of this entity, the constant threats of Islamic fundamentalism, have put this
company in its sights.
Comprehensive Security Plan

José A. Fernandez Marin

• Activities of an internal and public nature, with the participation of personalities from
different fields.

6
Security Director Higher Course

The priority of the management team and its security director to be able to guarantee employees and
customers an image of stability and a safe environment, given the background of Jakarta and the
headquarters in Baltimore.

The plan, due to the activity of the TNC entity, and the use given to the building, the risk analysis
carried out by the security director and the budget with which it is provided, is committed to the
implementation of the latest technical means in matters of security and the best existing human
resources.

There are two most significant elements in the design of the comprehensive security plan:

Magnified importance is given to the human element, since it is this element that makes the company
improve its overall security image in front of its clients, and exemplifies the security principle that
must prevail in the actions it carries out.

The appropriate technical means proportional to the risk of the building, based on the criteria of
effectiveness and efficiency, 100%.

This comprehensive security plan can boast of being modern and implementing the measures
proposed by the security director, integrated into a single and harmonious management.

This plan is aimed at resolving all possible events that occur in the building, without altering the daily
activity of the company, creating an ideal safety environment for the center's workers.

The plan is aimed at becoming something dynamic, modifying if necessary the strategy of the security
director, in the need to take new measures or hiring auxiliary services, which increase the desired level
of security, in the face of new threats or uncertainties in terms of security. security.

Comprehensive Security Plan

José A. Fernandez Marin

ANNEXES

Annex I. Summary for the direction


Security is a concept widely used today, however, it is as old as man. We must not forget the growing
concern for security that, in recent years, has made us aware of the real situation, that is, of the need
for prevention and protection, concepts that are so ancient and so linked equally to man, to its
existence and its economic and social development.

In general, as has been said, if total security does not exist, our approach will be aimed at making an
effort to reduce damage or loss, if the risk occurs or materializes, in the company that concerns us in
this comprehensive safety plan. security.

In conclusion, it can be said that protection, whose result will be security, must integrate two basic
aspects such as prevention and fight. Prevention, whose primary objective is the elimination or
reduction of the circumstances or causes that trigger the risk or threat and the fight against the incident
or accident itself, whose primary objective is to avoid or reduce the damage or losses that may be

6
Security Director Higher Course

generated, once the risk has materialized.

The technical means and protection and security facilities, applicable in companies, are in themselves
an investment that is difficult to make profitable without the support and complement of personal
means and appropriate organizational measures.

Therefore, it should not be seen as a factor that represents an expense, but as an added value that
provides benefits, both for the people who carry out their work activity on a daily basis, and for the
image of prestige that the entity projects in front of the client in particular. and to society in general.

The comprehensive security plan aims to respond to all those deficiencies, which in the Spanish
subsidiary of TNC, have caused the concern of its managers, both for their personal safety, and for
that of the workers attending the building, as well as that of their own image.

It must always be considered that the TNC company, both due to its activity and the relevance of its
managers, constitutes a target for terrorist, anti-social organizations and other detractors, who have
unequivocally demonstrated in other countries their disagreement with the activity it develops.

The fire protection plan, according to current legislation, includes the set of means and measures
intended for the prevention, protection and fight against fires, as well as the actions that guarantee the
evacuation of personnel and immediate intervention in the event of an incident.

Comprehensive Security Plan

José A. Fernandez Marin

Regarding access control, the aim is to implement a set of devices for the verification, inspection,
intervention or supervision of the passage or circulation of people, vehicles or objects to a previously
defined area or enclosure, for prevention and protection against the risk that may arise. affect people,
property or the facility itself.

Likewise, these systems will tell us in real time if access to the building is authorized or unauthorized,
avoiding any attempted intrusion into protected areas, both day and night.

A CCTV system will be installed that allows surveillance in all sensitive areas of the building, from
the perimeter, interior or exterior, and areas designated as maximum security, recording each incident
in real time by the CCS.

On the other hand, a series of both technical and organizational measures are adopted to address the
personal safety of the members of the entity's board of directors, a structure of human and material
resources, whose sole direction aims to prevent risks that may affect to them. It will have a deterrent
nature, protective effectiveness and preventive purpose.

A specific plan is designed for the protection of information and communications.

Information is one of the most important assets of the TNC company, therefore the objective of this
plan is to address all aspects related to the physical protection of classified materials and documents,
as well as personnel, transportation and transmission of the themselves. Its purpose is to ensure that
the information is used appropriately, that it is accessed, and that no type of filtration, theft,

6
Security Director Higher Course

manipulation, etc. occurs.

All systems will be connected to a CCS, located on the ground floor of the building and manned by a
24-hour security guard.

In said CCS, the necessary elements will be installed so that all the information generated is
immediately known to the security guard, which will offer a quick response to any event or incident.

The creation of a security department, made up of the security director and the security guards, will
allow the entity to effectively manage the proposed security systems, implementing a comprehensive
security plan, thus raising the level of security in the building. Its purpose is to coordinate efforts,
assign responsibilities and tasks, as well as determine the human and material resources necessary for
its preparation, development and implementation, in order to face the risks and threats to which they
may be subject.

Comprehensive Security Plan

José A. Fernandez Marin

All of this was carried out with a budget adjusted to the needs of the entity, since the potential
incidents that could occur would cause more economic damage than the investment made in this
comprehensive security plan, without taking into account the human damage of impossible valuation.

Annex II. Minimum technical specifications required for the security elements to be installed
The characteristics for the elements proposed in this installation are the following:

• Access and intrusion control:

A barrier will be installed to facilitate vehicle control. The barriers are powered by a low voltage
motor-reducer (24 Vdc) and controlled by a dedicated control unit (LOG-BR-ACR) that follows their
movement, speed, accelerations and decelerations using an encoder. It contains a device for security,
especially in the closing phase (according to EN12453 standards), as required in mixed accesses.

For the entry and exit of personnel entering or leaving the factory on foot, through both entrances, a
blade turnstile will be installed to control people. The lathe to be installed will be ACCESOR brand,
model 600 E-ACR.

The main access door to the administrative building will be replaced with a security door. This door,
from the manufacturer KIUSO, will have a security level of 5.

Microwave barriers, transmitter-receivers. Characteristics:

• Microwave detection with a maximum range of 150 m.


• Unaffected by vibration, wind, fog, rain, snow, dust or extreme temperatures.
• Low consumption: 40 mA at 12 VD.
• Broadcast frequency selection among four available channels.

To avoid false alarms, dual-technology volumetric "infrared/microwave" detectors will be installed,

6
Security Director Higher Course

these detectors provide an analysis of environmental conditions across the spectrum of movement
speeds, allowing you to focus on intruders and eliminate Environmental factors typical of false alarms.
For these detectors to trigger, two circumstances must occur at the same time, movement and heat in
motion.

Comprehensive Security Plan

José A. Fernandez Marin

Magnetic contacts will be installed

The operation of these contacts is simple, but effective. Magnetic contacts are made up of two parts, a
magnet that is attached to the door leaf and the emitting equipment that is attached to the frame. When
the door is removed from its frame by a few millimeters, the transmitting equipment produces an
alarm to the central unit. Characteristics:

• High security industrial magnetic contact Grade 2.


• Anodized aluminum housing.
• Cable protected with corrugated stainless steel tube.

The access control system will have its own software for managing cards, personnel lists, etc. This
software will be installed on a PC located in the Rack cabinet located in the server room (CPD), which
is located on the second floor of the administrative building for these media.

To manage the system, AMADEUS 5 Access Control Software will be installed.

Amadeus 5 is a Security and Access Control software that allows you to centrally and in real time
control the flow of employees and visitors through TNC facilities, monitor and react to each alarm.

Scanner: This compact X-ray equipment is used, among others, for the inspection of Explosives,
Weapons and Narcotics. It is a sophisticated, fast and reliable X-ray inspection equipment. It is a
compact, robust and lightweight tape X-ray equipment, designed to inspect: briefcases, bags, cameras,
laptops, backpacks, shoes, mail and packages.

The video surveillance system to be installed is based on an IP (Internet Protocol) camera system.
This system, in addition to providing us with high definition images, when installing the network
infrastructure, requires a lower economic cost in cabling, since the video signal from all the cameras is
transmitted through a single optical fiber in the trunk, with the savings in wiring and labor that this
entails.

The video recorders will have IP technology, 8 S-ATA Hard Drives of 6TB capacity will be installed,
specific for video applications.

The motorized cameras will have the following characteristics:

• D&N IP PTZ dome 1/2.8" CMOS 2Mpx progressive scan.


• Zoom optic x32 (4.4 - 142.6 mm).
• Resolution 1920x1080, 60 ips.
• Illumination 0.5 lux color and 0.01 Lux B/W with ICR. WDR (120dB), BLC and HLC

6
Security Director Higher Course

backlight compensation. SSDR, SSNRIII.

6
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez Marin

• Supports FTP and DHCP.

The cameras will have the ability to view images both in daylight and at night with little or no light
thanks to infrared LEDs.

The fixed cameras will have the following characteristics:

• D&N 1/3" CMOS IP tubular camera


• 2 Mpx progressive scan.
• 32 IR LEDs with 30 meters range.
• IP66 protection for outdoors.
• DC Iris varifocal optics of 2.8 - 10 mm.
• 0.005 lux color illumination with integration of x60 and 0 Lux fields in B/W, with ICR.
• Resolution 1280x1024, H.264 compression, MPEG-4, MJPEG, up to 25ips.

The minidomes will have the following characteristics:

• D&N 1/3" CMOS 1.3 Mpx IP mini-dome with progressive scan.


• IR LEDs with 30 meters range.
• Minimum illumination 0.05 lux (SSLE) with ICR
• Resolution 1280x1024, H.264 compression, MJPEG, up to 60ips
• 3 - 8.5 mm varifocal optics with autofocus
• BLC and SSDR backlight compensation. WDR (130dB).

• Fire protection:

EI 60 fire doors will be installed, as indicated in the Basic Fire Safety Document, for the fire
resistance of doors in Administrative use whose evacuation height above ground does not exceed 15
meters.

The server room (CPD) will be provided with special protection measures to protect the equipment
numbered below:

• The interior furniture will be fireproof.


• Fire prevention systems, smoke detectors, gas sprinklers, CO2 extinguishers, etc. will be
installed. to put out the fire in the shortest possible time and thus prevent it from
spreading, causing numerous losses of equipment and, with it, information.
• An automatic extinguishing system will be installed.

Comprehensive Security Plan

7
0
Security Director Higher Course

José A. Fernandez Marin

Fire detectors: Two types of fire detectors will be installed, optical smoke detectors and temperature
detectors

• Optical smoke detectors: They will be installed in all offices and in all hallways,
warehouses, etc. taking into account that their coverage is approximately 60m2 and
that they cannot be installed in places where there may be suspended dust or smoke
may be produced from, for example, welding work, etc.
• Thermal Detectors: These detectors are not triggered by the effect of smoke, but by a
sudden increase in temperature or when the temperature gradually reaches 67ºC.

Alarm and evacuation public address systems guarantee, in large buildings, the correct dissemination
of the alarm message and help the correct evacuation of the occupants. The evacuation public address
system will comply with the provisions of the RIPCI 2017 (Regulation of fire protection facilities).

6 Kg fire extinguishers will be installed. Efficiency 27A-183B-C, the location and placement of the
fire extinguishers will be as established in the RIPCI 2017 (Regulation of fire protection facilities)

Equipped 25mm Fire Hydrant: They have 25mm diameter, with a 20-meter semi-rigid hose with the
capacity to supply a flow rate of 100 liters per minute at 3.5 bar pressure at the tip of the spear. It is
characterized by its easy use and maneuverability, even for people who do not have experience in
using these devices.

The hydrants have been placed in such a way that their location is more than 5 m. of façade and less
than 15 m., except in the case where it is not possible for each hydrant to respect the minimum, due to
the layout of traffic routes. The flow rate of 500 l/min. (30 m3/h).

For the installation of emergency lighting, the provisions of the current Technical Building Code
(CTE) will be followed. Where the types of lighting are specified when and where it is mandatory.

7
Security Director Higher Course

Comprehensive Security
Plan

Annex
José A.III. Budget
Fernandez
Marin

ACCESS CONTROL SYSTEM

EQUIPMENT YOU € / unit TOTAL


Chip cards 100 0,90 € 90€
Magnetic cards 300 0,10 € 30€
card reader 13 260,00 € 3.380€
Access control software 1 110,00 € 110€
Alphanumeric keyboard 4 60,00 € 240€
Biometric fingerprint reader 5 350,00 € 1.750€
Boom barrier from 4 to 4.8 m 1 679,50 € 679,50€
Access staff 1 777,27 € 777,27€
Magnetic detector loop 2x1 m 1 91,28 € 91,28€
2-channel inductive loop analyzer 1 192,19 € 192,19€
Vandal-proof intercom with one button and 3 camera 800,00 € 2.400€
Monitor, PC and accessories (mouse, 2 995,00 € 1.990€
keyboard)
Metal detector arch 1 4.125,00 € 4.125€
Handheld metal detector 1 200,00 € 200€
X-ray scanner 1 15.275,00 € 15.275€
Video goalkeepers 2 225,00 € 450€
TOTAL 31.780,24 €

INTRUSION SYSTEM

EQUIPMENT YOU € / unit TOTAL


Infrared barriers 100 m 3 659,05€ 1.977,15€
Infrared barriers 60 m 10 614,21€ 6.142,10€
Infrared barrier fixing columns 300 cm 2 757,35 € 1.514,07€
Barrier beam alignment unit 7 2.815,50€ 19.708,50€
Solar battery for barriers 10 675,72 € 6.757,2€
Infrared barrier accessories 8 557,44 € 4.459,52€
Security locks 13 90,00 € 1.170€
magnetic contacts 28 35,84 € 215,04€
Electronic vibration detectors with contact
magnetic 1 32,45 € 32,45€

7
2
Security Director Higher Course

Comprehensive Security
Plan

Seismic
José detectors
A. Fernandez 2 60,00€ 120€
Marin
Glass break detectors 1 60,00 € 60€
Passive interior volumetric detectors with
anti masking 31 47,00 € 1,457€
Security door 6 950,00 € 5.700€
Alarm system keyboard 1 121,37 € 121,37€
alarm center 1 1.750,00 € 1.750€
TOTAL 51.184,40€

CCTV SYSTEM

EQUIPMENT YOU € / unit TOTAL


Fixed cameras 25 400,00 € 10.000€
Dome 7 767,06 € 5.369,42€
mini domes 17 249,36 € 4.239,12€
Tape recorder 2 765,16 € 1.530,32€
32" LCD HD monitors 4 450,00 € 1.800€
Workstation, keyboard and 23" monitor 1 2.660,45 € 2.660,45€
Control keyboard 1 733,80 € 733,80€
4 TB hard drive 2 301,51 € 603,02€
Management software 1 1.737,97 € 1.737,97€
Video Hard Disk Recorder (VDR) 2 1.800,00 € 3.600€
Video-detection license 1 1.200,00 € 1.200€
video recording software 1 1.500,00 € 1.500€
TOTAL 34.974,01€

PERSONAL PROTECTION SYSTEM

EQUIPMENT YOU € / unit TOTAL


Reflective and anti-fragmentation plastic sheets 40 30,25 € 1.210€
Alarm button 2 15,00 € 30€
Director Mobile Location System 2 500,00€ 1.000€
TOTAL 2.240€

7
3
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez INFORMATION PROTECTION SYSTEM


Marin
EQUIPMENT YO € / unit TOTAL
Document shredder 4U 2.000,00 € 8.000€
Safe 1 626,00 € 626€
Fireproof Security Cabinet for Documents 2 1.700,00 € 3.400€
Frequency detector 2 4.500,00 € 9.000€
TOTAL 21.026€

FIRE PROTECTION SYSTEM

EQUIPMENT YOU € / unit TOTAL


Powder fire extinguishers 6 kg 42 25,50 € 1.071€
Powder extinguishers 9 kg 36,50 €
Powder extinguisher cart 25 kg 1 120,00 € 120€
CO2 fire extinguishers 5 kg 9 99,50 € 895,50€
25mm BIEs 13 400,00 € 5.200€
Automatic aerosol extinguishing 3 1.881,00 € 5.643€
Optical detectors 5 51,30 € 256,50€
Automatic gas extinguishing systems – modular x
90 liter bottle 4 1.200,00 € 4.800€
Velocimeter detectors 113 46,65 € 5.271,45€
Pushbuttons 17 62,98€ 1.070,66€

Sirens with flash 6 170,69€ 1.024,14€


Fire detection center, with repeater panel and
IP module 1 1.190,00 € 1.190€
Central monitoring software 1 711,91 € 711,91€
TOTAL 27.254,16€

SECURITY SERVICES

V.S. You €/hour Total year


V.S. no weapon daytime general 2 15 €/7.816 117.240€
V.S. with general day weapon 17 €/
V.S. without weapon 1 18 €/ 2.920 52.560€
night/holiday

7
4
Security Director Higher Course

Comprehensive Security
Plan

José A. with
V.S. Fernandez
weapon night/holiday 20 €/
Marin
ARC connection for receiving alarms 1 600€
TOTAL 170.400€

TOTAL BUDGET COST


ACCESS CONTROL SYSTEM 31.555,24 €
INTRUSION SYSTEM 51.184,40€
CCTV SYSTEM 34.974,01€
PERSONAL PROTECTION SYSTEM 2.240€
INFORMATION PROTECTION SYSTEM 21.026€
FIRE PROTECTION SYSTEM 27.505,15€
SECURITY SERVICES 170.400€
TOTAL 338.884,8 €

PRESIDENT PROTECTION SYSTEM


EQUIPMENT YOU € / unit TOTAL
Armored car 1 1.500,00 € 1.500€
Car 1 145,00 € 145€
V.S. with gun 4 245,00 € 980€
TOTAL 2.625€

Annex IV. Recommendations for personal protection


During the last year, terrorist threats have been received on several occasions from a well-known
international terrorist group. For this reason, self-protection measures for personnel have been
increased, as well as the contracting of an authority protection service from a private security
company.

The authority protection service will be made up of two company or reaction escorts depending on the
level of risk, as well as the place and activity to be carried out.

From the risk analysis carried out, it is deduced that the risk of suffering an attack by members of the
board on the day of the building's inauguration is quite high.

As mentioned previously, there is currently an authority protection service contracted to a private


security company. This service depends on the security director.

Comprehensive Security Plan

José A. Fernandez Marin

7
5
Security Director Higher Course

Comprehensive Security
Plan

The
Josémission of the authority protection service is:
A. Fernandez
Marin
• Ensure the personal protection of the President and executives of the Team Navigation
company.
• Ensure the personal protection of each of the personalities inside the building on the day of
the inauguration.
• The vehicles will have a regular driver assigned. Likewise, they will have frequency
inhibitors, as well as a radio link between all of them (with the systems control center
listening).
• The vulnerabilities to which our senior managers may be exposed are:
• Regular or scheduled activities and trips.
• Unscheduled activities and trips.
• In the workplace.
• At your home.

VIP visit protocol.

Team Navigation Control, in order to sign important agreements that will guarantee and increase jobs,
is expected to receive high-ranking personalities from the political sphere.

To give a good image of our organization, strict security protocols will be established.

For this purpose, a special Protection Plan will be prepared, with the purpose of preserving the safety
of the guests, with special attention to the figure of high political figures, as well as the TNC board of
directors.

On the day of the event, all work in the factory will be suspended.

Program of activities for the day of the event.

• Reception and welcome of guests

• Guided tour of the facilities

• Speech by the President of TNC and Politicians.

• Cocktail on the outdoor plot

7
6
Security Director Higher Course

Comprehensive Security Plan

José A. Fernandez Marin

The Security Director will inform the state Security Forces, Civil Protection, Firefighters, etc. of
the event to be held, in case external help becomes necessary in case of emergency.

One week before the event, there will be a meeting at the TNC offices, between the company's
Security Director, the State Security Corps and Forces, Local Police and Civil Protection, to
together set the guidelines for action to follow.

The company's security department secretary will prepare a list of the guests. Annexed to this list
will be a map with the internal routes of people and vehicles, parking distribution, location of the
press, etc. This list will be given to the guards.

It will also be the responsibility of the security secretariat to prepare proximity identification
cards. These cards must be carried by all attendees, except for the great personalities invited and
senior TNC officials.

TNC's senior managers and big personalities will access the parking lot in the basement of the
administrative building and from there, take the elevators to the reception on the ground floor of
the building.

The rest of the guests will access the company through the same access, but they will park in the
existing outdoor parking on the plot.

The access protocol will be carried out following the same organizational access control

measures adopted daily for the company's personnel. All personnel on foot will enter through the

turnstile and their bags will be passed through the X-ray machine, the vehicles will be inspected

internally and the underside of the vehicles with the mirrors.

Regarding the Coordination and Control Center, this will be established, as indicated in the

self-protection plan, in the CCS. from the ground floor of the main building and the

supervision of the Security Director.

Meeting points and security areas will be established at the entrance to the building.

Special human means

For the day of the event, the external private security company that the company has contracted
will be requested to provide security personnel, four armed security guards and a team of escorts
with a vehicle.

Comprehensive Security Plan

7
Security Director Higher Course

José A. Fernandez Marin

The day before the event, this team will carry out an exhaustive reconnaissance of all the
facilities, both the exterior perimeter of the plot and the interior of all the buildings.

On the day of the event, the four additional armed security guards will be distributed at the
access control posts to receive guests and guide them where they need to go. The bodyguards
will be made available to the Security Director, carrying out personal protection actions for TNC
senior managers.

Special technical means

In the days prior to the event, extraordinary exhaustive maintenance will be carried out on all
electronic security means by the security company in charge of the TNC's mandatory
maintenance.

Distribution of the Watchers for the event

Four of these Guards will control the interior perimeter of the plot, with one Guard patrolling
each facade.

• Two Guards on patrol around the main building.


• A Vigilante hanging around the cocktail area.
• Two Guards in the Control Center

Security for senior managers

For the personal safety of the members of the board of directors, a Private Escort will be hired
for each member.

The escorts will pick up the TNC senior executives at their homes, accompany them throughout
the event and will be with them until they return to their homes. For this purpose, special
vehicles will be available for the custody of senior executives.

The Minister of Industry, the President of the Generalitat, the Mayor and other national and local
authorities will have Escorts from the FFCCSS.

Comprehensive Security Plan

José A. Fernandez Marin

Annex V. Regulations applicable to the security plan


• Organic Law 5/2014, of April 4, on Private Security.
• Royal Decree 2364/1994, of December 9, which approves the Private Security
Regulation.
• Order INT/314/2011, of February 1, on private security companies.
• Order INT/315/2011, of February 1, which regulates the Joint Commissions for the
Coordination of Private Security.
• Order INT/316/2011, of February 1, on the operation of alarm systems in the field of

7
Security Director Higher Course

private security.
• Order INT/317/2011, of February 1, on private security measures.
• Order INT/318/2011, of February 1, on private security personnel.
• Royal Decree 195/2010, of February 26, which modifies Royal Decree 2364/1994, of
December 9, which approves the Private Security Regulation, to adapt it to the
modifications introduced in Law 23/ 1992, of July 30, on Private Security, by Law
25/2009, of December 22, modifying various laws to adapt them to the law on free
access to service activities and their exercise.
• Royal Decree 2364/1994, of December 9, which approves the Private Security
Regulation.
• Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016
on measures to ensure a high common level of security of networks and information
systems in the Union.
• Regulation (EU) 2016/679 of the European Parliament and of the Council of April 27,
2016 on the protection of natural persons with regard to the processing of personal data
and the free circulation of these data and repealing the Directive 95/46/EC (General
Data Protection Regulation).
• Organic Law 3/2018, of December 5, on the Protection of Personal Data and guarantee
of digital rights.
• Royal Decree 1720/2007, of December 21, which approves the Regulation for the
development of Organic Law 15/1999, of December 13, on the protection of personal
data.
José A. Fernandez Marin

Annex VI. Installation, contracting and maintenance regulations


Attached are the highlights of the regulations on security contracts, equipment maintenance and
the current regulations on this matter:

• Law 31/1995 (Occupational Risk Prevention Law), is included in Annex 2 of this


Comprehensive Safety Plan, the company's Occupational Risk Prevention Plan.
• Order INT/316/2011, of February 1, on the operation of alarm systems in the field of
private security.
• Order INT/314/2011, of February 1, on private security companies.
• Royal Decree 195/2010, of February 26, which modifies Royal Decree 2364/1994, of
December 9, which approves the Private Security Regulation, to adapt it to the
modifications introduced in Law 23/ 1992, of July 30, on Private Security, by Law
25/2009, of December 22, modifying various laws to adapt them to the law on free
access to service activities and their exercise.
• Royal Decree 513/2017, of May 22, which approves the Regulation of fire protection
installations.

7
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

Annex VII. Planimetry

8
0
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

MIOG CTR HI
FLAT BM

8
1
Security Director Higher Course

Comprehensive Security Plan

José A. Fernandez Marin

8
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

8
3
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

8
4
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

8
5
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

8
6
Security Director Higher Course

Comprehensive Security Plan

José A. Fernandez Marin

8
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

8
8
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

LEGEND

CATITA

HO
t0M to CTOS
I RAISED

WIO& LDTF H E UP

FLATA EM mm

8
9
Security Director Higher Course

Comprehensive Security Plan

José A. Fernandez Marin

9
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

CONUNCAQNES

NNNN
NN

INYESTKGACKN SALk

ALWACEH

LEGEND

9
1
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

9
2
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

9
3
Security Director Higher Course

Comprehensive Security Plan

José A. Fernandez Marin

9
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

Annex VIII. Risk classification

RISK DEFINITION:
THEFT IDENTIFICATION Nº 1

PHASES 2nd, 3rd and ANALYSIS, EVAULATION AND RISK CALCULATION


4th PERIMETER AND BASEMENT
ZONES F Yes Yo Q AND d c TO V
PR E.R. RISK LEVEL

FxS PxE R&D AxV CxPR


9 6
Basement parking 3 3 2 3
15 4 4
16 240 HALF

Access control 3 2 6 3 1 3 9 3 4 12 108 LOW


Exterior Perimeter 1 2 2 1 1 1 3 2 2 4 12 LOW
Outdoor Parking 2 3 6 1 1 1 7 4 3 12 84 LOW
9 6
basement warehouse 3 3 2 3
15 4 4
16 240 HALF
Boiler room 3 3 9 2 3 6 15 4 4 16 240 HALF
HALF
Archive 5 5 25 2 2 4 29 3 5 15 435

ADMINISTRATIVE BUILDING
F Yes Yo Q AND d c TO V
PR E.R. RISK LEVEL

ZONES FxS PxE R&D AxV CxPR

Ground floor and hall 4 4 16 3 2 6 22 2 5 10 220 HALF


Concierge 2 3 6 2 2 4 10 4 3 12 120 LOW
1 1 2 6
Café 1 1 1 1 3 2
12 LOW

Dept. administrative 4 5 20 4 4 16 36 4 4 16 576 HALF


2 4 8
Common zones 1 1 1 1 1 1 2 2
LOW
Dept. security 3 4 12 4 5 20 32 4 5 20 640 HIGH
3 4 12 3 2 6 18 4 4 16 288 HALF
diesel tank
PRODUCTION AND MANAGEMENT PLANTS
ZONES F Yes Yo Q AN d c TO V PR E.R. RISK LEVEL
D
FxS PxE R&D AxV CxPR
Dept. address 5 5
25 5 5
25 50 3 5
15 750 HIGH
Communications 3 3 9 3 5 15 24 4 4 16 240 HALF

research room 1 1 1 1 1 1 2 2 2 4 8 LOW


Data processing 3 3 9 2 3 6 15 4 4 16 240 HALF

9
5
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

Computerized files 3 3 9 3 5 15 24 4 4 16 384 HALF

Production offices 5 5 25 5 5 25 50 3 5 15 750 HIGH


Assembly and handling
5 5 25 5 5 25 50 3 5 15 750 HIGH
room
Deck 3 3 9 2 3 6 15 4 4 16 240 HALF

RISK DEFINITION:
INTRUSION IDENTIFICATION Nº 2

PHASES 2nd, 3rd and ANALYSIS, EVAULATION AND RISK CALCULATION


4th
PERIMETER AND BASEMENT

F Yes Yo Q AN d c TO V PR E.R.
ZONES D RISK LEVEL
FxS PxE R&D AxV CxPR

4 4 16 3 3 9 27 3 3 9 243 HALF
Basement parking

Access control 2 3 6 3 2 6 12 2 4 8 96 LOW


4 4 16 3 3 9 27 3 3 9 243 HALF
Exterior Perimeter
5 5 25 3 3 9 34 3 3 9 306 HALF
Outdoor Parking

3 3 9 3 3 9 18 3 3 9 162 LOW
basement warehouse
3 3 9 3 3 9 18 3 3 9 162 LOW
Boiler room

3 3 9 3 3 9 18 3 3 9 162 LOW
Archive
ADMINISTRATIVE BUILDING

F Yes Yo Q AN d c TO V PR E.R.
ZONES D RISK LEVEL
FxS PxE R&D AxV CxPR

Ground floor and hall 5 5 25 5 5 25 50 3 5 15 750 HIGH


1 1 1 1 2 2 3 3 2 6 18 LOW
Concierge

3 3 9 4 3 12 21 4 4 16 336 HALF
Café

Dept. administrative 1 1 1 1 2 2 3 3 2 6 18 LOW


3 3 9 4 3 12 21 4 4 16 336 HALF
Common zones
1 1 1 1 2 2 3 2 2 4 12 LOW
Dept. security

9
6
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

33 9 44 16 25 4 5 20 500 HALF
diesel tank
PRODUCTION AND MANAGEMENT PLANTS

F Yes Yo Q AN d c TO V PR E.R.
ZONES D RISK LEVEL
FxS PxE R&D AxV CxPR

1 1 1 1 1 1 2 3 3 9 18 LOW
Dept. address
1 1 1 1 1 1 2 2 2 4 8 LOW
Communications

research room 2 3 6 2 1 2 8 4 4 16 128 LOW


3 4 12 3 2 6 18 4 4 16 288 HALF
Data processing

Computerized files 3 3 9 4 3 12 21 4 4 16 336 HALF

Production offices 1 1 1 1 1 1 2 2 2 4 8 LOW


Assembly and handling
3 3 9 4 3 12 21 4 4 16 336 HALF
room
Deck 3 3 9 2 3 6 15 4 4 16 240 HALF

RISK DEFINITION:
VANDALIC ACTS IDENTIFICATION Nº 3

PHASES 2nd, 3rd and ANALYSIS, EVAULATION AND RISK CALCULATION


4th PERIMETER AND BASEMENT
F Yes
Yo Q
AN d c TO
V PR E.R. RISK LEVEL
ZONES
D
FxS PxE R&D AxV CxPR

Basement parking 2 2 4 2 3 6 10 4 4 16 160 LOW

Access control 2 2 4 2 3 6 10 4 4 16 160 LOW


5 5 25 5 5 25 50 3 5 15 750 HIGH
Exterior Perimeter
5 5 25 5 5 25 50 3 5 15 750 HIGH
Outdoor Parking
2 2 4 4
basement warehouse 2 1 2 1 2 2
16 LOW
Boiler room 2 3 12 2 2 4 16 4 4 16 256 HALF
4
Archive 2 3
12 2 2
16 4 4
16 256 HALF
ADMINISTRATIVE BUILDING
ZONES F Yes Yo Q
AN d c TO
V PR E.R.
FxS D PxE R&D AxV CxPR RISK LEVEL
Ground floor and hall
2 2 4 2 3 6 10 4 4 16 160 LOW

9
7
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

Concierge 2 2 4 2 3 6 10 4 4 16 160 LOW


3 4 12 3 2 6 18 4 4 16 288 HALF
Café

Dept. administrative 2 1 2 2 1 2 4 2 2 4 16 LOW

Common zones 1 1 1 2 1 2 3 1 1 1 3 LOW


Dept. security 2 1 3 2 1 2 5 2 2 4 20 LOW

diesel tank 5 5 25 5 5 25 50 3 5 15 750 HIGH


PRODUCTION AND MANAGEMENT PLANTS
ZONES F Yes Yo Q
AN d c TO
V PR E.R. RISK LEVEL
D
FxS PxE R&D AxV CxPR

1 1 1 1 1 1 2 3 3 9 18 LOW
Dept. address
3 4 12 3 2 6 18 4 4 16 288 HALF
Communications

research room 2 3 6 2 1 2 8 4 4 16 128 LOW

Data processing 3 4 12 3 2 6 18 4 4 16 288 HALF

Computerized files 3 3 9 4 3 12 21 4 4 16 336 HALF

Production offices 1 1 1 1 1 1 2 2 2 4 8 LOW


Assembly and handling
3 3 9 4 3 12 21 4 4 16 336 HALF
room
5 5 25 5 5 25 50 3 5 15 750 HIGH
Deck

RISK DEFINITION:
FIRE IDENTIFICATION Nº 5

PHASES 2nd, 3rd and ANALYSIS, EVAULATION AND RISK CALCULATION


4th PERIMETER AND BASEMENT
ZONES F Yes Yo Q AND d c TO V
PR E.R. RISK LEVEL

FxS PxE R&D AxV CxPR

Basement parking 5 5 25 5 5 25 50 3 5 15 750 HIGH

Access control 2 2 4 2 3 6 10 4 4 16 160 LOW


Exterior Perimeter
3 3 9 2 1 2 11 3 3 9 99 LOW
Outdoor Parking 2 2 4 2 1 2 6 3 4 12 72 LOW
2 2 4 4
basement warehouse 2 1 2 1 2 2
16 LOW
Boiler room 5 5 25 5 5 25 50 3 5 15 750 HIGH

9
8
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

224
Archive 23
12 16 44
16 256 HALF
ADMINISTRATIVE BUILDING
ZONES
F Yes Yo Q AN d c TO V PR E.R.
D RISK LEVEL
FxS PxE R&D AxV CxPR

Ground floor and hall 5 5 25 5 5 25 50 3 5 15 750 HIGH


Concierge 2 2 4 2 3 6 10 4 4 16 160 LOW
5 5 25 5 5 25 50 3 5 15 750 HIGH
Café

Dept. administrative 2 1 2 2 1 2 4 2 2 4 16 LOW


3 4 12 3 2 6 18 4 4 16 288 HALF
Common zones

Dept. security 2 1 3 2 1 2 5 2 2 4 20 LOW

diesel tank 5 5 25 5 5 25 50 3 5 15 750 HIGH


PRODUCTION AND MANAGEMENT PLANTS

ZONES F Yes Yo Q AN d c TO V PR E.R.


D RISK LEVEL
FxS PxE R&D AxV CxPR
1 1 1 1 1 1 2 3 3 9 18 LOW
Dept. address
3 4 12 3 2 6 18 4 4 16 288 HALF
Communications

research room 2 3 6 2 1 2 8 4 4 16 128 LOW

Data processing 3 4 12 3 2 6 18 4 4 16 288 HALF

Computerized files 3 3 9 4 3 12 21 4 4 16 336 HALF

Production offices 1 1 1 1 1 1 2 2 2 4 8 LOW


Assembly and handling
5 5 25 5 5 25 50 3 5 15 750 HIGH
room
Deck 3 3 9 2 3 6 15 4 4 16 240 HALF

RISK DEFINITION:
BOMB THREAT IDENTIFICATION Nº 9

PHASES 2nd, 3rd and ANALYSIS, EVAULATION AND RISK CALCULATION


4th PERIMETER AND BASEMENT
ZONES F Yes
Yo Q
AN d c TO
V PR E.R. RISK LEVEL
D
FxS PxE R&D AxV CxPR
4 6
Basement parking 2 2 2 3
10 4 4
16 160 LOW

9
9
Security Director Higher Course

Comprehensive Security
Plan

José A. Fernandez
Marin

Access control 5 5 25 5 5 25 50 3 5 15 750 HIGH

Exterior Perimeter 3 4 12 3 2 6 18 4 4 16 288 HALF


5 5 25 5 5 25 50 3 5 15 750 HIGH
Outdoor Parking
2 2 4 4
basement warehouse 2 1 2 1 2 2
16 LOW
Boiler room 2 3 12 2 2 4 16 4 4 16 256 HALF
4
Archive 2 3
12 2 2
16 4 4
16 256 HALF
ADMINISTRATIVE BUILDING
ZONES
F Yes Yo Q AN d c TO V PR E.R.
D RISK LEVEL
FxS PxE R&D AxV CxPR

Ground floor and hall 5 5 25 5 5 25 50 3 5 15 750 HIGH


Concierge 2 2 4 2 3 6 10 4 4 16 160 LOW
5 5 25 5 5 25 50 3 5 15 750 HIGH
Café

Dept. administrative 2 1 2 2 1 2 4 2 2 4 16 LOW


2 3 3
Common zones 1 1 1 2
1 1 1 1 LOW
Dept. security 2 1 3 2 1 2 5 2 2 4 20 LOW

diesel tank 5 5 25 5 5 25 50 3 5 15 750 HIGH

PRODUCTION AND MANAGEMENT PLANTS

ZONES F Yes Yo Q AN d c TO V PR E.R.


D RISK LEVEL
FxS PxE R&D AxV CxPR
5 5 25 5 5 25 50 3 5 15 750 HIGH
Dept. address
1 1 1 1 1 1 2 2 2 4 8 LOW
Communications

research room 2 3 6 2 1 2 8 4 4 16 128 LOW

Data processing 3 4 12 3 2 6 18 4 4 16 288 HALF

Computerized files 3 3 9 4 3 12 21 4 4 16 336 HALF

Production offices 1 1 1 1 1 1 2 2 2 4 8 LOW


Assembly and handling
3 3 9 4 3 12 21 4 4 16 336 HALF
room
5 5 25 5 5 25 50 3 5 15 750 HIGH
Deck

1
0
0

You might also like