SPM IV B Security Level System Approved08Apr11

Transcript

1 UNITED NATIONS SECURITY MANAGEMENT SYSTEM Security Policy Manual Chapter SECURITY MANAGEMENT V I SECTION Security Level System (SLS) B . Date: 08 April 2011

2 UNSMS Security Policy Manual - 1 A. Introduction: a grade or level to areas 1. The Security Level System is a system for assigning where the United Nations operates in order to ident ify the overall level of danger in that area. The Security Level System is a tool f or United Nations security professionals to: a. More accurately identify and measure the level of s ecurity threat that exists in a geographic location, b. nd Produce a Security Level (1-6) for that location, a c. Give an overall impression to staff and managers of how the security her. environment in one area/location compares with anot B. Purpose: 2. ale for the Security Level System The purpose of this policy is to outline the ration ted with it. and the relevant roles and responsibilities associa C. Application/Scope: The policy is applicable to all individuals covered 3. by the United Nations Security Security Policy Manual Management System, as defined in Chapter III of the nt System”). (“Applicability of United Nations Security Manageme D. Conceptual Framework: The Security Level System is an integral part of th 4. e Security Risk Management process and is designed to accurately describe the security environment that exists in an area or location (“Security Level Area”) in w hich the United Nations operates. The Security Level System is based on threat and no t risk. The Security Level 5. ty , threat-based security environment. Because securi System describes the general measurers must be designed to solve specific security problems, the Security Level System is not used to make specific security decisions. The Security Level System objectively describes the threat environment and uses this objective evaluation to inform the Security Risk Assessment, from which security decisions are made. 6. hreat Assessment. The A Security Level is determined using a Structured T Structured Threat Assessment evaluates five categor ies: Armed Conflict, tegory is evaluated using a Terrorism, Crime, Civil Unrest and Hazards. Each ca evaluations automatically point system, and the combination of these separate ndicates the level of danger determines the Security Level. The Security Level i ale of 1 to 6. that exists in the defined area or location on a sc Chapter IV: SECURITY MANAGEMENT – B. Security Level System (SLS)

3 UNSMS Security Policy Manual - 2 To be reliable, a Structured Threat Assessment must 7. have a clearly defined geographical area of analysis. A Security Level Are a should define the It is rare for threats and hazards geographical scope of similar threats and hazards. ore most countries require to be the same throughout an entire country, theref more than one Security Level Area, although the num ber of Security Level Areas in a country should be kept to a manageable number. 8. there is a significant The Structured Threat Assessment is updated anytime change in the security environment, either an impro vement or a worsening of the situation. The Security Level System provides secur ity decision makers with a d environment in the defined very important snapshot of the existing threat-base area or location in which they need to operate. All Structured Threat Assessments makers receive the added are conducted in the same way, so security decision value of being able to compare their locations with other locations in the world. E. Security Levels 9. onment) to 6 (most The SLS has 6 Levels, from 1 (least dangerous envir e Security Levels also have dangerous environment). In addition to numbers, th accompanying titles and colors as described in Anne x A below. System F. Roles and Responsibilities in the Security Level All Chief Security Advisors, Security Advisors and 10. Chief Security Officers, along with the Security Cell, are responsible for prepari ng the Structured Threat reas, using all applicable Assessment, including establishing Security Level A threat-related information. to 5. The Secretary General, The Designated Official approves Security Levels 1 11. through the Under-Secretary-General for Safety and Security, approves Level 6. e Department of Safety and Upon approval, the Security Level is recorded in th in the DSS Travel Advisory. Security (DSS) database and automatically included item for all Security 12. The Security Level System must be a standing agenda Management Team meetings, where the Designated Offi cial, in consultation with tructured Threat the Security Management Team, either confirms the S Assessment as it stands, or approves any modificati on to it due to changes in the security environment, as per paragraph 7 above. curity is responsible for 13. The Headquarters of the Department of Safety and Se validating all Structured Threat Assessments and re sulting Security Levels. G. Training Requirements Requirements for Basic Security in the Field (BSITF ) and Advanced Security in 14. . All United Nations personnel the Field (ASITF) are not linked to Security Levels must successfully complete “Basic Security in the F ield” (BSITF) training. United Nations personnel being assigned to, or visiting on official travel, any field Chapter IV: SECURITY MANAGEMENT – B. Security Level System (SLS)

4 UNSMS Security Policy Manual - 3 1 location , regardless of Security Level, must successfully c omplete “Advanced Security in the Field” (ASITF) training. BSITF and ASITF certificates are valid for three years, at which point staff members must recertify. H. Security Clearance vel to any location regardless of Security clearance is required for all official tra 15. 2 . The Designated Official has the delegated authori ty to grant the Security Level security clearances for official travel to areas de signated Security Level 1 to 5. The Under-Secretary General for Safety and Security may rescind this delegation in which Security Level 6 is in as required. Security clearance authority for areas effect is not delegated and will be granted only by the Under-Secretary General for Safety and Security on behalf of the Secretary- General. , “Security 16. As explained in detail in Chapter V of the Security Policy Manual tion Process (TRIP)”, TRIP Clearance Procedures and the Travel Request Informa for granting security allows for both “automatic” and “manual” processes tion requires security clearance clearances. If the security plan for a certain loca Designated Officials have the only to track traveller numbers and movement, then option of setting “automatic” clearances in TRIP. When the security plan requires control over the nu 17. mber of travellers in a specific location, Designated Officials can set the TRIP sys tem so that all official travel nual security clearance into a specific area has to be cleared manually. Ma procedures can be established at any location in an y Security Level if the that all areas in Designated Official requires it, and it is highly r ecommended Security Level 4 or higher have manual security cle arance procedures. I. Relocation and Evacuation: The Security Level System does not deal with evacua tion and relocation of staff 18. or eligible family members. This issue is categoriz ed as a risk management option and is considered after the Security Risk Assessmen t has been conducted. See d Security Policy Manual , Chapter IV, Section D, “Relocation, Evacuation an Alternate Work Modalities - Measures to Avoid Risk” for the procedures on 1 s any location not designated as an “H” (Headquarte rs) For the purpose of this policy, “field location” i established by the International Civil Service duty station under the mobility and hardship scheme Commission (ICSC). 2 The HLCM, at its 20th Session "endorsed the object ered in ive of requiring that all official travel be regist of TRIP, on the basis of full integration between TRIP and each organization’s travel system, by the end ganization’s travel system is not integrated, offic 2011" (CEB/2010/5). Until the end of 2011, if an or ial " duty station, as defined by the mobility and hard ship travel of its personnel from "H" duty station to "H scheme established by the International Civil Servi ce Commission (ICSC), will not require security ed systems are integrated, this footnote will be remov clearance. [By the end of 2011, or when all travel from the policy]. Chapter IV: SECURITY MANAGEMENT – B. Security Level System (SLS)

5 UNSMS Security Policy Manual 4 - as for issuing “All Agency making relocation and evacuation decision, as well Communiqués” to this effect. System (SLS) Chapter IV: SECURITY MANAGEMENT – B. Security Level

6 UNSMS Security Policy Manual - 5 Annex A: Security Levels System overview 3 Authority Security Level Level of Oversight Recommended Management Actions weekly (at DO discretion) SMT meets at least • Secretary- • Re-evaluation of staffing needs and security 4 General Extreme 6 clearance based on the “Acceptable Risk Model” and (as the new “concept of operations” and security plan delegated) External Security Clearance approved by USG/ DSS • • weekly (at DO discretion) SMT meets at least • Re-evaluation of staffing needs based on the USG/DSS High DO 5 ts “Acceptable Risk Model” (Staff in non-critical pos (validation within 7 days) relocated/evacuated) Security clearance required • SMT meets at least • bi-weekly (at DO discretion) DO USG/DSS Re-evaluation of staffing needs and security • 4 Substantial (validation within 7 days) clearance based on the “Acceptable Risk Model” • No external conferences monthly Director DRO/DSS SMT meets at least • DO 3 Moderate (validation within 7 days) • External conferences must be authorized by DO Director DRO/DSS t twice a year SMT meets at leas • DO Low 2 (validation within 7 days) • External conferences organizer must notify DO twice a year SMT meets at least • 1 Minimal Director DRO/DSS DO • TRIP entry for all official travel 3 Every SMT meeting must review the Structured Threa t Assessment as part of the required validation of tured Threat Assessment launches the Security Risk the Security Risk Assessment. A change in the Struc Management process, the result of which will be spe cific and appropriate security management actions. 4 number of staff may remain in a Level 6 location, Should the Secretary-General decide that a minimum the Executive Heads will decide whether their staff may operate in this environment. Chapter IV: SECURITY MANAGEMENT – B. Security Level System (SLS)

Related documents

CityNT2019TentRoll 1

CityNT2019TentRoll 1

STATE OF NEW YORK 2 0 1 9 T E N T A T I V E A S S E S S M E N T R O L L PAGE 1 VALUATION DATE-JUL 01, 2018 COUNTY - Niagara T A X A B L E SECTION OF THE ROLL - 1 CITY - North Tonawanda TAX MAP NUMBER ...

More info »
The Rate of Return on Everything, 1870–2015

The Rate of Return on Everything, 1870–2015

FEDERAL RESERVE BANK OF SAN FRANCISCO WORKING PAPER SERIES –2015 The Rate of Return on Everything, 1870 Òscar Jordà Reserve Bank of San Francisco Federal University of California, Davis Katharina Knol...

More info »
OperatorHoursReport

OperatorHoursReport

John Bel Edwards Rebekah E. Gee MD, MPH SECRETARY GOVERNOR State of Louisiana Louisiana Department of Health Office of Public Health Certified Water and Wastewater Operators 2018 - 2019 Hours Hours li...

More info »
Fourth National Report on Human Exposure to Environmental Chemicals Update

Fourth National Report on Human Exposure to Environmental Chemicals Update

201 8 Fourth National Report on Human Exposure to Environmental Chemicals U pdated Tables, March 2018 , Volume One

More info »
aldine.indd

aldine.indd

Aldine Press Books at the Harry Ransom Humanities Research Center The University of Texas at Austin A Descriptive Catalogue by Craig W. Kallendorf ‡ Maria X. Wells Austin Harry Ransom Humanities Resea...

More info »
SIZE CHARTS

SIZE CHARTS

CUTTER & BUCK MEN'S SIZE CHARTS CHARTS SIZE How to Measure your Body for Size How to Measure your Body for Size point Measure around your neck NECK: at the a where collar neck. shirt the encircles ban...

More info »
theaeroshellbook

theaeroshellbook

Shell Aviation THE AEROSHELL BOOK THE AEROSHELL BOOK EDITION 19. 2012 RRP £65.00 $100.00 €78.00 EDITION 19. 2012

More info »
untitled

untitled

U E T C K N N T Y O Y T R E E T D I R E C T O R S LISA POSTHUMUS LYONS R Y HO A A KE M LLI NR KENT COUNTY CLERK / REGISTER OF DEEDS U NT Y C LE R K/R EG IS TER O F D EED S KENT C O 2017 - 2018 2007-20...

More info »
7B HubCityWormGearDrives

7B HubCityWormGearDrives

Hub City Worm Gear Drives Worm Gear Features B-2 to B-6 Worm Gear Drives B-7 Factory Options Rating Parameters B-8 Pre-Selection Information B-9 How To Select and Order Standard Models B-10 B-11 to B-...

More info »
ClubsListing

ClubsListing

1 of 127 Resident Lifestyle Group Company Listing Ctrl+F Search box will appear. Type in keyword,then hit Enter. Location Address Account Name City State Zip Primary Phone First Name Last Name 129 Ami...

More info »
Microsoft Word   December 2015   11   Baude

Microsoft Word December 2015 11 Baude

ESSAY IS ORIGINALISM OUR LAW? William Baude * This Essay provides a new framework for criticizing originalism or its alternatives—the framework of positive law. Existing debates are either conceptual ...

More info »
Is Originalism Our Law?

Is Originalism Our Law?

Univ ersit hic ago L aw Sc hool y of C ago U un d Chic nbo Journal Articles Faculty Scholarship 2015 rigin ali sm Our L Is O aw? W aude illiam B s and additional works at: Follow thi gounbound .uchica...

More info »
Numerical Recipes

Numerical Recipes

Sample page from NUMERICAL RECIPES IN C: THE ART OF SCIENTIFIC COMPUTING (ISBN 0-521-43108-5) Permission is granted for internet users to make one paper copy for their own personal use. Further reprod...

More info »
435 441 458 467r e

435 441 458 467r e

WT/DS435/R, WT/DS441/R WT/DS458/R, WT/DS467/R 28 June 2018 Page: (18 - 1/884 4061 ) Original: English AUSTRALIA CERTAIN MEASURES CON CERNING TRADEMARKS, – PACKAGING IONS AND OTHER PLAIN GEOGRAPHICAL I...

More info »
Threads and Threading

Threads and Threading

Machinery's Handbook 27th Edition TABLE OF CONTENTS THREADS AND THREADING METRIC SCREW THREADS SCREW THREAD SYSTEMS 1783 American Standard Metric Screw 1725 Screw Thread Forms V-Thread, Sharp V-thread...

More info »
Monographie BIPM 5 Tables Vol3

Monographie BIPM 5 Tables Vol3

Monographie BIPM-5 Table of Radionuclides (Vol. 3 – A = 3 to 244) M.-M. Bé, V. Chisté, C. Dulieu E. Browne, C. Baglin V. Chechev, N. Kuzmenco R. Helmer F.Kondev D. MacMahon K.B. Lee 2006 BUREAU INTERN...

More info »
Lawyers OPM electronic

Lawyers OPM electronic

LAWYERS AND OTHER MONEY PEOPLE’S Fifth Edition AN K A . T FR S , II I HOMA Shackelford , Tho m a s & G regg O ange, Vi r g inia r KA T H LEE N M . U ST O N Virginia State Bar Alexand r ia , Vi r ginia

More info »
vol9 organic ligands

vol9 organic ligands

C HERMODYNAMICS HEMICAL T OMPOUNDS AND C OMPLEXES OF OF C U, Np, Pu, Am, Tc, Se, Ni and Zr O ELECTED WITH RGANIC L IGANDS S Wolfgang Hummel (Chairman) Laboratory for Waste Management Paul Scherrer Ins...

More info »
233 242 Online

233 242 Online

First Amendment — Freedom of Speech — Public Forum Doctrine — Packingham v. North Carolina 1 the Supreme Court , In Southeastern Promotions, Ltd. v. Conrad advised that “[e]ach medium of expr ession ....

More info »
ERG2016

ERG2016

2016 A guidebook intended for use by first responders A guidebook intended for use by first responders transportation incident during the initial phase of a during the initial phase of a transportatio...

More info »