119 results for "Asset"
Information on the protective security measures that can achieve the protective security principles of Deter, Detect, Delay, Mitigate and Response in relation to an asset.
This Asset Identification Guide has been developed to assist anyone responsible for identifying an organisation’s critical assets as part of the Protective Security Risk Assessment process
A SCA should be carried out when undertaking a significant modification or improvement of an existing built asset, whether a building or infrastructure. The asset owner(s) should therefore ensure that...
A SCA should be undertaken at the end of life of a built asset, including a change of owner or occupier, where failure to take appropriate measures could result in precise details about security risks...
This guide is for those procuring construction contracts within government and more widely who may be unfamiliar with the principles and practice behind information management (IM).
Built Asset Security Strategy Template
A suggested job description for a Built Asset Security Manager. Areas covered include understanding of security, risk management, policy development and management, delivery and general guidance.
Built Asset Security Management Plan Template
The need to reduce the cost of delivering, managing and maintaining built assets is driving a period of evolution in the architectural, construction and engineering industries
A SCA can be carried out during the ongoing operation, management and maintenance of an existing built asset, whether a building or infrastructure, to look at the nature of the security-minded approac...
All organisations need to be aware of the risks associated with poorly configured and maintained systems, as well as the limitations of contractual arrangements with system providers. These issues are...
Security officers play a crucial role in the protection of an asset and consideration of their safety and protection is needed