Answered step by step
Verified Expert Solution
Link Copied!

Question

...
1 Approved Answer

Security Policy Global Security Framework The NGO, through our advocacy and activities globally, aims to raise awareness about the importance of women's sexual health, to

Security Policy Global Security Framework The NGO, through our advocacy and activities globally, aims to raise awareness about the importance of women's sexual health, to promote policies that support women's access to quality healthcare, and to advance the rights and well-being of women worldwide. To achieve our aim and to protect our assets, our actions and plans are based on, and guided by, our Security Policy. This security policy document outlines the measures, protocols, and guidelines that the NGO will undertake to ensure the safety and security of its assets, employees, and stakeholders. The document is designed to provide the basis for a comprehensive and effective framework for managing security risks and threats, and to ensure that the organization is prepared to respond to any security incidents that may occur. The security policy document provides guidance on a range of security issues. It outlines the roles and responsibilities of different stakeholders, including security personnel, employees, and third-party partners, and specifies the procedures and protocols that they are expected to follow. This security policy document is a critical component of our security strategy, as it provides a clear and consistent framework for managing security risks and threats. By implementing the measures and protocols outlined in the document, we can ensure that assets, employees, and stakeholders are protected from harm and that we can respond effectively to any security incidents that may occur. B-1 This document supports and is part of the Global Security Framework (GSF) that consists of policies, protocols, an Essential Security Plan (ESP) and a Resource planning section, as illustrated in Figure 1. Figure 1 - The Global Security Framework (GSF) The GSF is our basis and framework for our security management approach to a complex and challenging risk landscape, and the essential foundation component of our overall strategic, tactical, and operational planning. The security policy, GSF, ESP, and associated plans, protocols and procedures are to be followed by all NGO staff, employees, venture, and contractor partners, and are subject to regulatory management for compliance and audit by the NGO Compliance Team. B-2

Introduction and Policy Purpose NGOs have to work in risk locations for a variety of reasons. Firstly, NGOs often operate in areas where there is a high level of need for humanitarian or development assistance, such as in conflict zones or in areas affected by natural disasters. These locations may be inherently dangerous due to ongoing violence, instability, or lack of basic infrastructure and services, which can pose significant risks to the safety and security of our staff. We need to plan for operating in challenging locations because we believe in having a positive impact on the global female community. We want to support marginalized or vulnerable populations who are particularly affected by conflict, natural disasters, or poverty. In these cases, we need to consider additional risks to ensure that we can provide critical support and assistance to those who need it most. We have a moral obligation to support women's sexual health and wellbeing and to advocate for human rights and social justice in areas where these are under threat. In such cases, we may need to face additional risks to ensure that we can fulfil our mission and contribute to positive social change. The NGO is a member of Accountable Now and as such has signed up to that organization's 12 Commitments which encompass our core behaviours and expectations. B-3

Figure 2: The 12 Commitments Because we work in countries with differing security environments, we have a duty of care to keep our team members safe and secure. Effective security and safety management plans, policies and processes, effectively managed and implemented, allow us to deliver our services in benign and hostile environments. The purpose of the Policy is to support our team members to deliver sexual and reproductive health services across the world, while minimising the risks to individuals and the organisation. Scope The Security Policy laid out in this document applies globally to all team members, country programmes and dependents of international assignees. Our Risk Tolerance The NGO is not risk-averse; because of the nature of our business we must be prepared and capable in managing risk and its consequences rather than allowing those risks to halt our activities. Risk tolerance does not mean that we accept all risks and dangers, but that we recognise that these are inevitably linked to our work; and that where possible our work must continue in areas and times of need. Our mission, services and operating locations inherently involve risk exposure and threats of various types and at different levels. When risk exposure is extreme, the physical impact on our team members may be significant and potentially fatal. Naturally, this does not mean that we tolerate such risks as a routine approach; and our risk decisions will always take account of our mission and programme objectives, as well as the impact of other strategic factors (e.g. impact of key relationships, donor interests). Most importantly we must consider the safety and security of our people and of those that we seek to help and support. When Sexual and Reproductive Health unmet needs are high, we may accept a higher level of risk; with additional and commensurate risk mitigations in place before committing assets 'on the ground'. However, when working in situations that are difficult to interpret, unpredictable and highly volatile, we may not accept a higher level of risk. Our risk owners, the Executive Team, will decide on a case-by-case basis whether the specific programme objectives and intended outcomes justify accepting the assessed level of risk. Such decisions will consider all of the general mission requirements and aims of the NGO as well as the general, specific and current intelligence and risk information from verified and reliable sources that will allow them to take and direct informed actions. It should be clearly understood, therefore, that we are neither uniformly risk tolerant or risk- averse, but rather we take an informed and dynamic approach to risk management based on multiple, sometimes competing and challenging influencing factors. Our focus will always be to protect our people primarily, and our assets, through risk mitigation, keeping our risks as B-4

low as reasonably practicable. 'Practicable' is not interchangeable with 'possible'; which means that although in some situations reducing risk to the lowest possible level may be an option, it may affect our practicable ability to complete the mission. In such cases, the decision-making process based on effective information flow and communication are essential for success. Our detailed consultation and communication plans are designed to ensure that decision processes are timely and as fully informed as they can be. Our Security Strategies in the Humanitarian Settings Protection is our primary security strategy. We will put in place protective physical, personal, information and governance measures when required to ensure that risks are mitigated to the lowest practicable level. The risks to our personnel are not confined to 'in-country' activity, although that is the main focus of our overall security strategy. Therefore, we take a holistic view with the understanding that risks can be physical or virtual and that security breaches that do not directly involve deployed and in-country personnel can have significant damaging impacts. Therefore 'protection' can involve risks from cyber and information management issues to those from violence or natural disasters. We seek to maximise acceptance from the communities in the areas of our programme operations by maintaining transparent, dignified and respectful relations with them. As such our secondary security strategy is to gain Acceptance from not only the communities that we support but also their local, regional and national governments, agencies, businesses and influencing actors. However, this acceptance can rarely be gained or guaranteed from all of the stakeholders mentioned or at all levels, which requires us to adopt other, additional and supplementary security strategies. These may be used in isolation but in most cases will be part of a multi-level approach to meet the risk and dynamic and local, current challenges. Low-profile activity is our tertiary security strategy. In general, we will only conduct high profile operations when Acceptance and Protection are in place and guaranteed to acceptable risk levels. The maintenance of low-profile approaches can avoid drawing unwanted attention from armed groups, criminals, or other actors who may perceive us as a threat or target. By not taking a high-profile approach, we can avoid being perceived as taking sides in a conflict or being aligned with a particular political agenda. This can help to build trust with all parties involved and complement the Acceptance strategy. A low-profile approach can also help us to gain access to hard-to-reach areas or communities that may be sceptical about external aid. Our fourth and final level of approach is Deterrence, used when we cannot gain acceptance, cannot protect ourselves and are actively targeted. We will always seek non-armed deterrence options first. When working in conflict locations, we seek to obtain negotiated access from key actors in a conflict. However, this is not always possible, and we may choose to work in areas where that access and acceptance is not guaranteed. Because of this there may be a need to ensure that potential adversaries will perceive the risk of targeting us to B-5

outweigh the potential rewards. Deterrence is our final layer of strategy as it does acknowledge that our people will be operating in potentially dangerous situations. Decisions on taking the Deterrence approach will be heavily dependent on thorough risk assessment and careful consideration, as it raises our profile and therefore has the potential in itself to draw attention to our activities. Armed Security Where we are explicitly targeted or threatened, programme activities and presence in the area may be reduced or ceased. Only where the Deterrence strategy level is in place would we be seeking to use high profile protection, including armed security. In order not to associate ourselves with any armed group or with the use of violence we do not normally use armed guards, armed escorts and armed protection of transport, residences or other premises. We will not participate in armed or military convoys or use the services of any armed forces - including government or non-government armies, UN bodies, militias or armed private security services. Also, we will not accept the integration of military personnel on humanitarian mission into our programmes or the transportation of military personnel (armed or unarmed) in our vehicles or premises, unless injured and thus non- combatants. Although this is our policy approach and preference not to operate in armed, military or similar support contexts we recognise that in exceptional circumstances there will be some compromise necessary in order to meet our primary Protection strategy or Deterrence profile. The decisions to use such armed support will only be approved by the Executive Team based on advice and requests from country teams and careful consideration of the risk impacts. Threat Levels We use a threat level system to fully identify the threats in each country programme. This allows our people in all areas of the NGO to have a clear indication of the risk type and the assessed reason for the allocation to a particular level. The allocation of a level is used to inform our planning and implementation of safe and security activity. There are 5 threat levels: 1. Very Low 2. Low 3. Medium 4. High 5. Very High Each characterises the level of threat in a country or in parts of a country based on the following key factors: 1. Crime risk (physical harm, assault, robbery, rape, murder, burglary, theft, B-6

SRMC LEVEL 6 Annex B to ATHE Level 6 Award in Security Risk Management Consultancy vandalism, fraud, embezzlement, information, scams, and identity theft) 2. Terrorism risk 3. Travel risk (travelling to, from and within countries) 4. Conflict risk (collateral damage, war crimes, targeting vulnerable groups and civilians) 5. Political and ideology risk (regime change, opposition, or hostility towards our mission or those we support) 6. Abduction risk 7. Natural disaster risk 8. Health and disease risk Threat local and contract information and intelligence analysis, and approved by the Country Director, Global Security, and the Regional Director. Countries will be assessed for their threat level and those that are assessed to be at High or Very High threat level must complete threat level exercises for their geographic operational locations. This means that the full and detailed assessments for the impact of threats on our people and assets are to be conducted by Global Security, who are to recommend action to the Executive Team and prepare deploying and deployed personnel for operations in the affected environments. Our threat levels are used for internal communication and understanding. Whilst they are validated against UN, government and private intelligence organisations, they are not linked to them and neither support nor endorse the policies or methods of those entities This is to ensure independence and to reflect our specific concerns rather than wider national and generic threats. Duty of Care For us, Duty of Care refers to the legal obligation of an individual or organization to take reasonable measures to prevent harm or injury to others. It is a common law concept that is based on the principle that everyone has a responsibility to ensure that their actions, or lack of action, do not cause harm to others. In order to meet their duty of care, individuals and organisations must take reasonable steps to identify and address any potential risks or hazards that may cause harm to others. This includes providing appropriate training and supervision, maintaining safe and secure activities, and ensuring that products and services are safe and fit for purpose. To ensure that we fully achieve our legal duty of care across our range of activities, we are committed to providing differing levels of safety and security management for different duty bearers. The Executive Team sets the duty of care policy through the Global Security Framework, all branches, subsidiaries and affiliates are required to provide the duty of care as described below: International and national team members B-7 levels are determined through a threat level template which is completed based on

As an organisation we commit to inform team members of threats and measures to prevent and mitigate risks. We will inform team members of their safety and security responsibilities and obligations. We will manage the safety and security of team members working in their home environments during working hours. We will manage the safety and security of team members working internationally during and outside of working hours. We will provide robust security measures and where appropriate and possible, insurance. We will provide International Assignee team members with pre- and post- deployment medicals (physical, resilience and travel health consultations). We will provide all team members with access to psychosocial support following traumatic incidents. We will provide access to threat level appropriate safety, security and first aid training. We will ensure that all team members are able to freely decline the risk entailed in a country programme, when they feel that the work poses an unreasonable level of risk, by asking to not travel to a country programme, not travel to areas within the programme, or be withdrawn from an area or a country programme. However, if the risks are constant, or personal withdrawal is likely to be frequent or long- term, we will undertake a review between the team member and their line manager to determine an appropriate course of action which could include assessment as to whether employment in that position should continue, in line with organisational procedures. The use of armed guards, armed escorts and armed protection may be considered in certain exceptional situations and in line with our Protection and Deterrence risk strategy options. These exceptions must be approved by the Director International Operations and only on the authority of the Executive Team. Country Directors may authorise the short-term use of armed protection without Director International Operations approval ONLY in situations where there is an immediate threat to the safety of team members and where armed protection is necessary to avoid violence or physical harm to team members and where prior approval not possible due to the nature of the circumstances. Consultants and Individual Contractors (CIC) B-8

As an organisation we commit to assessing the safety and security management capabilities of CIC; and where capacity or capability is low, provide appropriate travel briefings, guidance and support. We will provide a Welcome Pack to all CIC travelling to our programmes and inform them of recommended and required safety and security training. Sub-awardees As an organisation we commit to conducting a rapid due diligence review of safety and security policies, protocols and practices of potential sub-awardees prior to contractual agreement ensuring that contracts with sub-awardees clearly explain the necessity for appropriate safety and security policies, protocols and practices. Donors As an organisation we commit to understanding donor duty of care requirements and implementing the necessary procedures and mitigations to achieve the requirements Roles and Responsibility To ensure that this Policy is effectively implemented and that we are compliant with all legislative and duty of care requirements and obligations the responsibilities for security and risk management within the organisation follow. Country Directors are responsible for: Ensuring that the programme fully meets duty of care requirements and operates in accordance with the Global Security Framework Maintaining an up-to-date Essential Security Plan (ESP) Meeting the minimum security standards specified in their country and as detailed in their ESP. Resourcing safety and security activities, including personnel and equipment through appropriate identification of need and utilizing organisational funding applications. Ensuring all team members and visitors are briefed on context, threats, and security rules within 24 hours of arrival or employment. Ensuring all team members in Very High threat level countries are briefed on and complete proof of life forms. Reporting all security incidents and 'near-miss' incidents in accordance with the Security Incident Reporting Protocol (SIRP) Regional Directors are responsible for ensuring the region fully meets duty of care requirements and operates within the Global Security Framework Global Security are responsible for: Maintaining and updating the Global Security Framework B-9

Disseminating the Global Security Framework to all support offices and country programmes Providing security technical assistance to country programmes Ensuring all team members and visitors to High and Very High threat level countries are briefed on security risks pre and post travel. Ensuring all team members visiting Very High threat level countries (and where the abduction threat is considered highly elevated) are briefed on and complete proof of life forms. Setting and assessing minimum security standards International Programmes Support Director is responsible for: Ensuring that the Global Crisis Management Team is convened as necessary. Reducing, suspending, or terminating programme activities when safety and security risks are considered too high or if risk minimising measures are considered unacceptable. Director International Operations is responsible for deciding when team members can return after an international evacuation based on intelligence, advice and guidance from Global Security Evacuation All team members that are not in their country of origin or at their normal duty station are entitled to evacuation and support for that evacuation until returned to a place of safety. The decision to evacuate is binding for all team members entitled to evacuation. If any of these team members refuse to evacuate, they do so on the understanding that their employment contract is immediately terminated, and the organisation no longer has a duty of care to that team member. The decision to evacuate can be made by a Line Manager in that location, the Country Director, the Regional Director, Director International Programme Support Director or the Director International Operations The decision to evacuate cannot be overruled by line management, except where the more senior line manager determines that the evacuation would expose the team to greater danger than remaining in the current location. The evacuation of team members at their normal duty station will only be considered in cases where their work has placed them in danger and is at the discretion of the Country Director. Where an evacuation is deemed necessary but there is no possibility of evacuating all team members, those who are deemed to be at the highest risk will be given priority, based on a recorded risk assessment by the Country Director. Team members may only return to an area post-evacuation following a full security risk assessment and on receipt of an updated Essential Security Plan. The decision to return after B-10

a domestic relocation is made by the Country Director. The decision to return after an international evacuation is made by the Director International Operations Abduction The Global Crisis Management Team provides advice and expertise in the handling of abduction guided by the primary objectives of ensuring the safety of the individual abductees and their release. Global Security promotes preventive measures and means in high threat areas. We will not pay ransoms or concede to other demands from groups that threaten employees in order to obtain the release of abducted team members. We will not facilitate ransom payments on behalf of others, including family members. Policy Statement The following statement affirms that this Policy applies to the NGO and is applicable throughout, and that detailed plans are the responsibilities of the nominated levels and roles throughout the organisation: "This Policy applies to the NGO and is applicable throughout. It is the responsibility of all employees, volunteers, and stakeholders to adhere to the principles and guidelines outlined in this Policy. Detailed plans for the implementation of this Policy, including specific responsibilities and timelines, will be developed by the nominated levels and roles throughout the organisation. Each level and role has a duty to ensure that their specific responsibilities are met in accordance with this Policy."

using Annex B above critically analyse the frameworks that the NGO uses against the use of ISO31000:2018 and identify where they align.

Demonstrate the use of ISO 31000 risk management principles in a Security Risk Management context within an organisation

Explain the importance of a structured Security Risk Management (SRM) Framework

must include: This topic is discussed clearly within the task with an appropriate degree of depth of research. IS0 31000 Risk Management Principles and guidelines have been discussed in a security context and best practice demonstrated against the client's (Annex A & B) structure, objectives and needs

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Economics

Authors: R. Glenn Hubbard

6th edition

978-0134106243

Students also viewed these General Management questions

Question

How is the NDAA used to shape defense policies indirectly?

Answered: 1 week ago