{"id":343967,"date":"2024-10-20T00:09:05","date_gmt":"2024-10-20T00:09:05","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-187882015\/"},"modified":"2024-10-25T23:29:15","modified_gmt":"2024-10-25T23:29:15","slug":"bs-iso-187882015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-187882015\/","title":{"rendered":"BS ISO 18788:2015"},"content":{"rendered":"

This International Standard provides a framework for establishing, implementing, operating, monitoring, reviewing, maintaining and improving the management of security operations.<\/p>\n

It provides the principles and requirements for a security operations management system (SOMS). This International Standard provides a business and risk management framework for organizations conducting or contracting security operations and related activities and functions while demonstrating:<\/p>\n

    \n
  1. \n

    conduct of professional security operations to meet the requirements of clients and other stakeholders;<\/p>\n<\/li>\n

  2. \n

    accountability to law and respect for human rights;<\/p>\n<\/li>\n

  3. \n

    consistency with voluntary commitments to which it subscribes.<\/p>\n<\/li>\n<\/ol>\n

    This International Standard also provides a means for organizations and those who utilize security services to demonstrate commitment to the relevant legal obligations, as well as to the good practices provided in the Montreux Document on Pertinent International Legal Obligations and Good Practices for States related to Operations of Private Military and Security Companies during Armed Conflict<\/i>, and conformance with the principles and commitments outlined in the International Code of Conduct for Private Security Service Providers (ICoC)<\/i>. This International Standard is specifically aimed at any organization operating in circumstances where governance may be weak and the rule of law undermined due to human or naturally caused events.<\/p>\n

    \n

    NOTE 1 This International Standard is not intended to place additional burdens on general guarding services outside these specific circumstances.<\/p>\n<\/blockquote>\n

    Applicable laws can include all kinds of laws including, but not limited to, national, regional, international or customary laws. It is the sole responsibility of the user of this International Standard to determine the applicable laws and to abide by them. This International Standard does not provide any advice or guidance concerning applicable laws, the conflict between laws, or the interpretation of the laws, codes, treaties or documents mentioned within it.<\/p>\n

    This International Standard is applicable to any organization that needs to:<\/p>\n

      \n
    1. \n

      establish, implement, maintain and improve an SOMS;<\/p>\n<\/li>\n

    2. \n

      assess its conformity with its stated security operations management policy;<\/p>\n<\/li>\n

    3. \n

      demonstrate its ability to consistently provide services that meet client needs and are in conformance with applicable international, national and local laws and human rights requirements.<\/p>\n<\/li>\n<\/ol>\n

      The generic principles and requirements of this International Standard are intended to be incorporated into any organization\u2019s integrated management system based on the Plan-Do-Check-Act (PDCA) model; it is not intended to promote a uniform approach to all organizations in all sectors. The design and implementation of security operations plans, procedures and practices are expected to take into account the particular requirements of each organization: its objectives, context, culture, structure, resources, operations, processes, products and services.<\/p>\n

      \n

      NOTE 2 Consistent with the goal of public and private organizations to comply with all applicable laws and respect human rights, it is intended that clients refer to this International Standard when retaining private security services. It is intended that organizations use this International Standard\u2019s management system principles and requirements to conduct their own due diligence and management of services and to construct their contracting and contract administration process to support conformance with this International Standard.<\/p>\n<\/blockquote>\n

      PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
      PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
      7<\/td>\nForeword <\/td>\n<\/tr>\n
      8<\/td>\nIntroduction <\/td>\n<\/tr>\n
      13<\/td>\n1\tScope <\/td>\n<\/tr>\n
      14<\/td>\n2\tNormative references
      3\tTerms and definitions <\/td>\n<\/tr>\n
      26<\/td>\n4\tContext of the organization
      4.1\tUnderstanding the organization and its context
      4.1.1\tGeneral
      4.1.2\tInternal context
      4.1.3\tExternal context <\/td>\n<\/tr>\n
      27<\/td>\n4.1.4\tSupply chain and subcontractor mapping and analysis
      4.1.5\tDefining risk criteria
      4.2\tUnderstanding the needs and expectations of stakeholders <\/td>\n<\/tr>\n
      28<\/td>\n4.3\tDetermining the scope of the security operations management system
      4.4\tSecurity operations management system <\/td>\n<\/tr>\n
      29<\/td>\n5\tLeadership
      5.1\tLeadership and commitment
      5.1.1\tGeneral
      5.1.2\tStatement of Conformance <\/td>\n<\/tr>\n
      30<\/td>\n5.2\tPolicy
      5.3\tOrganization roles, responsibilities and authorities <\/td>\n<\/tr>\n
      31<\/td>\n6\tPlanning
      6.1\tActions to address risks and opportunities
      6.1.1\tGeneral <\/td>\n<\/tr>\n
      32<\/td>\n6.1.2\tLegal and other requirements
      6.1.3\tInternal and external risk communication and consultation <\/td>\n<\/tr>\n
      33<\/td>\n6.2\tSecurity operations objectives and planning to achieve them
      6.2.1\tGeneral <\/td>\n<\/tr>\n
      34<\/td>\n6.2.2\tAchieving security operations and risk treatment objectives
      7\tSupport
      7.1\tResources
      7.1.1\tGeneral <\/td>\n<\/tr>\n
      35<\/td>\n7.1.2\tStructural requirements <\/td>\n<\/tr>\n
      36<\/td>\n7.2\tCompetence
      7.2.1\tGeneral
      7.2.2\tCompetency identification <\/td>\n<\/tr>\n
      37<\/td>\n7.2.3\tTraining and competence evaluation
      7.2.4\tDocumentation
      7.3\tAwareness
      7.4\tCommunication
      7.4.1\tGeneral <\/td>\n<\/tr>\n
      38<\/td>\n7.4.2\tOperational communications
      7.4.3\tRisk communications
      7.4.4\tCommunicating complaint and grievance procedures
      7.4.5\tCommunicating whistle-blower policy <\/td>\n<\/tr>\n
      39<\/td>\n7.5\tDocumented information
      7.5.1\tGeneral
      7.5.2\tCreating and updating <\/td>\n<\/tr>\n
      40<\/td>\n7.5.3\tControl of documented information <\/td>\n<\/tr>\n
      41<\/td>\n8\tOperation
      8.1\tOperational planning and control
      8.1.1\tGeneral <\/td>\n<\/tr>\n
      42<\/td>\n8.1.2\tPerformance of security-related functions
      8.1.3\tRespect for human rights
      8.1.4\tPrevention and management of undesirable or disruptive events
      8.2\tEstablishing norms of behaviour and codes of ethical conduct
      8.3\tUse of force
      8.3.1\tGeneral <\/td>\n<\/tr>\n
      43<\/td>\n8.3.2\tWeapons authorization
      8.3.3\tUse of force continuum <\/td>\n<\/tr>\n
      44<\/td>\n8.3.4\tLess-lethal force
      8.3.5\tLethal force
      8.3.6\tUse of force in support of law enforcement <\/td>\n<\/tr>\n
      45<\/td>\n8.3.7\tUse of force training
      8.4\tApprehension and search
      8.4.1\tApprehension of persons
      8.4.2\tSearch
      8.5\tOperations in support of law enforcement
      8.5.1\tLaw enforcement support <\/td>\n<\/tr>\n
      46<\/td>\n8.5.2\tDetention operations
      8.6\tResources, roles, responsibility and authority
      8.6.1\tGeneral
      8.6.2\tPersonnel <\/td>\n<\/tr>\n
      48<\/td>\n8.6.3\tProcurement and management of weapons, hazardous materials and munitions
      8.6.4\tUniforms and markings
      8.7\tOccupational health and safety
      8.8\tIncident management
      8.8.1\tGeneral <\/td>\n<\/tr>\n
      49<\/td>\n8.8.2\tIncident monitoring, reporting and investigations
      8.8.3\tInternal and external complaint and grievance procedures <\/td>\n<\/tr>\n
      50<\/td>\n8.8.4\tWhistle-blower policy
      9\tPerformance evaluation
      9.1\tMonitoring, measurement, analysis and evaluation
      9.1.1\tGeneral <\/td>\n<\/tr>\n
      51<\/td>\n9.1.2\tEvaluation of compliance
      9.1.3\tExercises and testing
      9.2\tInternal audit <\/td>\n<\/tr>\n
      52<\/td>\n9.3\tManagement review
      9.3.1\tGeneral
      9.3.2\tReview input <\/td>\n<\/tr>\n
      53<\/td>\n9.3.3\tReview output
      10\tImprovement
      10.1\tNonconformity and corrective action <\/td>\n<\/tr>\n
      54<\/td>\n10.2\tContinual improvement
      10.2.1\tGeneral
      10.2.2\tChange management
      10.2.3\tOpportunities for improvement <\/td>\n<\/tr>\n
      55<\/td>\nAnnex\u00a0A (informative) Guidance on the use of this International Standard <\/td>\n<\/tr>\n
      101<\/td>\nAnnex\u00a0B (informative) General principles <\/td>\n<\/tr>\n
      104<\/td>\nAnnex\u00a0C (informative) Getting started \u2013 Gap analysis <\/td>\n<\/tr>\n
      105<\/td>\nAnnex\u00a0D (informative) Management systems approach <\/td>\n<\/tr>\n
      108<\/td>\nAnnex\u00a0E (informative) Qualifiers to application <\/td>\n<\/tr>\n
      109<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

      Management system for private security operations. Requirements with guidance for use<\/b><\/p>\n\n\n\n\n
      Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
      BSI<\/b><\/a><\/td>\n2015<\/td>\n114<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":343974,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-343967","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/343967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/343974"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=343967"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=343967"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=343967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}