BS ISO 18788:2015
$215.11
Management system for private security operations. Requirements with guidance for use
Published By | Publication Date | Number of Pages |
BSI | 2015 | 114 |
This International Standard provides a framework for establishing, implementing, operating, monitoring, reviewing, maintaining and improving the management of security operations.
It provides the principles and requirements for a security operations management system (SOMS). This International Standard provides a business and risk management framework for organizations conducting or contracting security operations and related activities and functions while demonstrating:
-
conduct of professional security operations to meet the requirements of clients and other stakeholders;
-
accountability to law and respect for human rights;
-
consistency with voluntary commitments to which it subscribes.
This International Standard also provides a means for organizations and those who utilize security services to demonstrate commitment to the relevant legal obligations, as well as to the good practices provided in the Montreux Document on Pertinent International Legal Obligations and Good Practices for States related to Operations of Private Military and Security Companies during Armed Conflict, and conformance with the principles and commitments outlined in the International Code of Conduct for Private Security Service Providers (ICoC). This International Standard is specifically aimed at any organization operating in circumstances where governance may be weak and the rule of law undermined due to human or naturally caused events.
NOTE 1 This International Standard is not intended to place additional burdens on general guarding services outside these specific circumstances.
Applicable laws can include all kinds of laws including, but not limited to, national, regional, international or customary laws. It is the sole responsibility of the user of this International Standard to determine the applicable laws and to abide by them. This International Standard does not provide any advice or guidance concerning applicable laws, the conflict between laws, or the interpretation of the laws, codes, treaties or documents mentioned within it.
This International Standard is applicable to any organization that needs to:
-
establish, implement, maintain and improve an SOMS;
-
assess its conformity with its stated security operations management policy;
-
demonstrate its ability to consistently provide services that meet client needs and are in conformance with applicable international, national and local laws and human rights requirements.
The generic principles and requirements of this International Standard are intended to be incorporated into any organization’s integrated management system based on the Plan-Do-Check-Act (PDCA) model; it is not intended to promote a uniform approach to all organizations in all sectors. The design and implementation of security operations plans, procedures and practices are expected to take into account the particular requirements of each organization: its objectives, context, culture, structure, resources, operations, processes, products and services.
NOTE 2 Consistent with the goal of public and private organizations to comply with all applicable laws and respect human rights, it is intended that clients refer to this International Standard when retaining private security services. It is intended that organizations use this International Standard’s management system principles and requirements to conduct their own due diligence and management of services and to construct their contracting and contract administration process to support conformance with this International Standard.
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | Foreword |
8 | Introduction |
13 | 1 Scope |
14 | 2 Normative references 3 Terms and definitions |
26 | 4 Context of the organization 4.1 Understanding the organization and its context 4.1.1 General 4.1.2 Internal context 4.1.3 External context |
27 | 4.1.4 Supply chain and subcontractor mapping and analysis 4.1.5 Defining risk criteria 4.2 Understanding the needs and expectations of stakeholders |
28 | 4.3 Determining the scope of the security operations management system 4.4 Security operations management system |
29 | 5 Leadership 5.1 Leadership and commitment 5.1.1 General 5.1.2 Statement of Conformance |
30 | 5.2 Policy 5.3 Organization roles, responsibilities and authorities |
31 | 6 Planning 6.1 Actions to address risks and opportunities 6.1.1 General |
32 | 6.1.2 Legal and other requirements 6.1.3 Internal and external risk communication and consultation |
33 | 6.2 Security operations objectives and planning to achieve them 6.2.1 General |
34 | 6.2.2 Achieving security operations and risk treatment objectives 7 Support 7.1 Resources 7.1.1 General |
35 | 7.1.2 Structural requirements |
36 | 7.2 Competence 7.2.1 General 7.2.2 Competency identification |
37 | 7.2.3 Training and competence evaluation 7.2.4 Documentation 7.3 Awareness 7.4 Communication 7.4.1 General |
38 | 7.4.2 Operational communications 7.4.3 Risk communications 7.4.4 Communicating complaint and grievance procedures 7.4.5 Communicating whistle-blower policy |
39 | 7.5 Documented information 7.5.1 General 7.5.2 Creating and updating |
40 | 7.5.3 Control of documented information |
41 | 8 Operation 8.1 Operational planning and control 8.1.1 General |
42 | 8.1.2 Performance of security-related functions 8.1.3 Respect for human rights 8.1.4 Prevention and management of undesirable or disruptive events 8.2 Establishing norms of behaviour and codes of ethical conduct 8.3 Use of force 8.3.1 General |
43 | 8.3.2 Weapons authorization 8.3.3 Use of force continuum |
44 | 8.3.4 Less-lethal force 8.3.5 Lethal force 8.3.6 Use of force in support of law enforcement |
45 | 8.3.7 Use of force training 8.4 Apprehension and search 8.4.1 Apprehension of persons 8.4.2 Search 8.5 Operations in support of law enforcement 8.5.1 Law enforcement support |
46 | 8.5.2 Detention operations 8.6 Resources, roles, responsibility and authority 8.6.1 General 8.6.2 Personnel |
48 | 8.6.3 Procurement and management of weapons, hazardous materials and munitions 8.6.4 Uniforms and markings 8.7 Occupational health and safety 8.8 Incident management 8.8.1 General |
49 | 8.8.2 Incident monitoring, reporting and investigations 8.8.3 Internal and external complaint and grievance procedures |
50 | 8.8.4 Whistle-blower policy 9 Performance evaluation 9.1 Monitoring, measurement, analysis and evaluation 9.1.1 General |
51 | 9.1.2 Evaluation of compliance 9.1.3 Exercises and testing 9.2 Internal audit |
52 | 9.3 Management review 9.3.1 General 9.3.2 Review input |
53 | 9.3.3 Review output 10 Improvement 10.1 Nonconformity and corrective action |
54 | 10.2 Continual improvement 10.2.1 General 10.2.2 Change management 10.2.3 Opportunities for improvement |
55 | Annex A (informative) Guidance on the use of this International Standard |
101 | Annex B (informative) General principles |
104 | Annex C (informative) Getting started – Gap analysis |
105 | Annex D (informative) Management systems approach |
108 | Annex E (informative) Qualifiers to application |
109 | Bibliography |