Shopping Cart

No products in the cart.

BS ISO 18788:2015

$215.11

Management system for private security operations. Requirements with guidance for use

Published By Publication Date Number of Pages
BSI 2015 114
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This International Standard provides a framework for establishing, implementing, operating, monitoring, reviewing, maintaining and improving the management of security operations.

It provides the principles and requirements for a security operations management system (SOMS). This International Standard provides a business and risk management framework for organizations conducting or contracting security operations and related activities and functions while demonstrating:

  1. conduct of professional security operations to meet the requirements of clients and other stakeholders;

  2. accountability to law and respect for human rights;

  3. consistency with voluntary commitments to which it subscribes.

This International Standard also provides a means for organizations and those who utilize security services to demonstrate commitment to the relevant legal obligations, as well as to the good practices provided in the Montreux Document on Pertinent International Legal Obligations and Good Practices for States related to Operations of Private Military and Security Companies during Armed Conflict, and conformance with the principles and commitments outlined in the International Code of Conduct for Private Security Service Providers (ICoC). This International Standard is specifically aimed at any organization operating in circumstances where governance may be weak and the rule of law undermined due to human or naturally caused events.

NOTE 1 This International Standard is not intended to place additional burdens on general guarding services outside these specific circumstances.

Applicable laws can include all kinds of laws including, but not limited to, national, regional, international or customary laws. It is the sole responsibility of the user of this International Standard to determine the applicable laws and to abide by them. This International Standard does not provide any advice or guidance concerning applicable laws, the conflict between laws, or the interpretation of the laws, codes, treaties or documents mentioned within it.

This International Standard is applicable to any organization that needs to:

  1. establish, implement, maintain and improve an SOMS;

  2. assess its conformity with its stated security operations management policy;

  3. demonstrate its ability to consistently provide services that meet client needs and are in conformance with applicable international, national and local laws and human rights requirements.

The generic principles and requirements of this International Standard are intended to be incorporated into any organization’s integrated management system based on the Plan-Do-Check-Act (PDCA) model; it is not intended to promote a uniform approach to all organizations in all sectors. The design and implementation of security operations plans, procedures and practices are expected to take into account the particular requirements of each organization: its objectives, context, culture, structure, resources, operations, processes, products and services.

NOTE 2 Consistent with the goal of public and private organizations to comply with all applicable laws and respect human rights, it is intended that clients refer to this International Standard when retaining private security services. It is intended that organizations use this International Standard’s management system principles and requirements to conduct their own due diligence and management of services and to construct their contracting and contract administration process to support conformance with this International Standard.

PDF Catalog

PDF Pages PDF Title
7 Foreword
8 Introduction
13 1 Scope
14 2 Normative references
3 Terms and definitions
26 4 Context of the organization
4.1 Understanding the organization and its context
4.1.1 General
4.1.2 Internal context
4.1.3 External context
27 4.1.4 Supply chain and subcontractor mapping and analysis
4.1.5 Defining risk criteria
4.2 Understanding the needs and expectations of stakeholders
28 4.3 Determining the scope of the security operations management system
4.4 Security operations management system
29 5 Leadership
5.1 Leadership and commitment
5.1.1 General
5.1.2 Statement of Conformance
30 5.2 Policy
5.3 Organization roles, responsibilities and authorities
31 6 Planning
6.1 Actions to address risks and opportunities
6.1.1 General
32 6.1.2 Legal and other requirements
6.1.3 Internal and external risk communication and consultation
33 6.2 Security operations objectives and planning to achieve them
6.2.1 General
34 6.2.2 Achieving security operations and risk treatment objectives
7 Support
7.1 Resources
7.1.1 General
35 7.1.2 Structural requirements
36 7.2 Competence
7.2.1 General
7.2.2 Competency identification
37 7.2.3 Training and competence evaluation
7.2.4 Documentation
7.3 Awareness
7.4 Communication
7.4.1 General
38 7.4.2 Operational communications
7.4.3 Risk communications
7.4.4 Communicating complaint and grievance procedures
7.4.5 Communicating whistle-blower policy
39 7.5 Documented information
7.5.1 General
7.5.2 Creating and updating
40 7.5.3 Control of documented information
41 8 Operation
8.1 Operational planning and control
8.1.1 General
42 8.1.2 Performance of security-related functions
8.1.3 Respect for human rights
8.1.4 Prevention and management of undesirable or disruptive events
8.2 Establishing norms of behaviour and codes of ethical conduct
8.3 Use of force
8.3.1 General
43 8.3.2 Weapons authorization
8.3.3 Use of force continuum
44 8.3.4 Less-lethal force
8.3.5 Lethal force
8.3.6 Use of force in support of law enforcement
45 8.3.7 Use of force training
8.4 Apprehension and search
8.4.1 Apprehension of persons
8.4.2 Search
8.5 Operations in support of law enforcement
8.5.1 Law enforcement support
46 8.5.2 Detention operations
8.6 Resources, roles, responsibility and authority
8.6.1 General
8.6.2 Personnel
48 8.6.3 Procurement and management of weapons, hazardous materials and munitions
8.6.4 Uniforms and markings
8.7 Occupational health and safety
8.8 Incident management
8.8.1 General
49 8.8.2 Incident monitoring, reporting and investigations
8.8.3 Internal and external complaint and grievance procedures
50 8.8.4 Whistle-blower policy
9 Performance evaluation
9.1 Monitoring, measurement, analysis and evaluation
9.1.1 General
51 9.1.2 Evaluation of compliance
9.1.3 Exercises and testing
9.2 Internal audit
52 9.3 Management review
9.3.1 General
9.3.2 Review input
53 9.3.3 Review output
10 Improvement
10.1 Nonconformity and corrective action
54 10.2 Continual improvement
10.2.1 General
10.2.2 Change management
10.2.3 Opportunities for improvement
55 Annex A (informative) Guidance on the use of this International Standard
101 Annex B (informative) General principles
104 Annex C (informative) Getting started – Gap analysis
105 Annex D (informative) Management systems approach
108 Annex E (informative) Qualifiers to application
109 Bibliography
BS ISO 18788:2015
$215.11