SlideShare une entreprise Scribd logo
1  sur  55
managing a community building ,[object Object]
the day ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],break lunch break
introduction ,[object Object],[object Object]
good buildings are... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
bad buildings have... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
common problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
accessibility  (h) things to consider when developing a disability access audit
accessibility  (h) things to consider when developing a disability access audit publicity (different formats / web design) signs (high visibility, wayfinder, braille, lowercase)  entrance (tactile paving, doorbells, ramp gradients, automatic doors / door width, handrails, lighting, seating, contrasting colours, reception desk height) hearing loops (test them / consider overspilling) toilets (alarms, peninsula access, handrails, floor space, taps) lifts  fire safety (visual alarms, refuge areas, phone links evac chairs) parking for blue badge holders (marked out) adjustable equipment (flip charts etc) assistive technology support dogs governance, recruitment and employment staff training
 
legal matters ,[object Object],[object Object],[object Object],[object Object]
key areas of law ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],health and safety
health and safety health and safety  at work act working at heights regulations coshh  control of substances hazardous to health gas safety electrical safety regulations (periodic/pat tests) regulatory reform act (fire safety) puwer  provision and use of work equipment regulations   first aid provision / first aid kits / accident books riddor  reporting of incidents, diseases and dangerous occurrences regulations hse/cqc - powers to close buildings down health and safety
health and safety   health and safety  should be principled  rather than pragmatic  duty of care
risk assessments general risk assessments looking at all aspects of safety vdu risk assessments  h lone working risk assessments (need to consider cleaners or maintenance staff) fire risk assessments / fire evacuation procedures  h (prevention, evacuation, fire suppression and need to include risks to fire fighters and other property nearby) fire refuge points are deemed as places of relative safety individual risk assessments should be conducted for disabled people, younger people and pregnant women
risk assessments hazard:  anything with potential to cause harm risk:  the likelihood of the hazard causing harm a) identify hazards that could affect anyone b) assess the risk of occurrence c) evaluate the severity of the outcome d) eliminate the hazard if possible or  reduce them to the lowest level of risk possible step by step look for the hazard > decide who might be harmed and how > evaluate the risk arising from the hazard and decide if existing measures are adequate or should more be done >  record your findings and inform people  > review and update
risk assessments risk assessments should enable one size does not fit all - be adaptable it can be hard to be objective about something you use every day develop an organisational workplan in relation to  h &s  have a plan ‘b’ (business continuity measures and insurance)
business continuity disaster recovery usually relates to IT systems and buildings business continuity plan focuses on being able to provide services (human resources - financial management) disasters fall into three categories   value of data: can you operate without email for a day (or week) what if all your accounting data is lost what if your entire client list is lost
business continuity disaster recovery usually relates to IT systems and buildings business continuity plan focuses on being able to provide services (human resources - financial management) disasters fall into three categories   natural disasters -  hurricanes, earthquakes, etc technical disasters -  hardware failure, power cuts human disasters -  disgruntled employee, virus etc fire can fall into any of the three   value of data: can you operate without email for a day (or week) what if all your accounting data is lost what if your entire client list is lost
plans should consider  physical destruction (fire, flood damage, earthquake) data destruction (system failures, hackers) where to start... prevention - fire fighting equipment, structural surveys, backing up data, secure networks, using anti virus. create a contact list covering... staff, tenants, it professionals, emergency services, utility companies, plumbers, electricians, glaziers and other contractors  business continuity
decide what is critical to the organisation what order to restore back up systems or make repairs keep an assets register include serial numbers and activation codes keep all this information off site (ideally with two people)  test your plan - data etc make sure contacts are updated  business continuity
let’s do lunch
one of the biggest issues buildings encounter  unless you know who is responsible for doing a repair then it generally doesn’t get done who’s job is it to report repairs  don’t assume you can maintain a building ‘on the cheap’ broken windows develop a maintenance plan (include time scale and anticipated costs)  painting and decorating/carpet replacement/window cleaning   building maintenance
use maintenance as an opportunity to make improvements  should consider environment / access (lighting/decorating/taps) as you repair and replace undertake regular maintenance checks  ‘walkrounds’ / develop workplans  know the location of fuse boxes / meters / water stopcocks / keep records  (keys / master codes / paint colours)   keep an up to date list of contractors  try to build a relationship with them electricians / plumbers / window cleaners / carpet cleaners / glaziers / fire fighting equipment / cleaning consumables / it support / telephone contractors / water companies / fire alarms / burglar alarms / locksmiths / decorators / heating engineers / plasterers / catering suppliers / flooring specialists / automatic doors / audio visual repairs / joiners / vending machines / gas engineers / pest control / waste management and  recycling / sewerage and drains / signs  / hygiene suppliers  / lift maintenance /  roofers / office systems  maintenance will become increasingly technical building maintenance
integrated systems  “ wi-fi   is going to be the fourth utility…landlords need to view it that way and are increasingly doing just that.” Bob Cringle  open standards like oBIX are just beginning to evolve and will likely break down the silos between building systems ranging from security to lift controls open standards like oBIX are just beginning to evolve and will likely break down the silos between building systems ranging from security to lift controls
well being and comfort security and safety energy performance human - building interaction information and communication   integrated systems
jhghjg SENSORS &  ALARMS INTRUSION DETECTION
jhghjg SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT
jhghjg CCTV SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS EMERGENCY COMMUNICATION ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security  Technologies
VIDEO SURVILLANCE SENSORS &  ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS &  ALARMS EMERGENCY COMMUNICATION ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],integrated systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],environmental impact
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],environmental impact
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],funding
[object Object],sustainable income
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],sustainable income
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],sustainable income
 
[object Object],[object Object],[object Object],[object Object],connecting... with communities
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],connecting... with communities
connecting... with stakeholders
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],evaluation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],summary
online toolkits
publications
useful links

Contenu connexe

Similaire à Buildings

Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfBilal Ahmad
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docxDarkKnight367793
 
Discussion Command and Control ArchitectureNow that you hav.docx
Discussion Command and Control ArchitectureNow that you hav.docxDiscussion Command and Control ArchitectureNow that you hav.docx
Discussion Command and Control ArchitectureNow that you hav.docxmadlynplamondon
 
Take Location Intelligence Into the Field With Easy-to-Build Mobile Apps
Take Location Intelligence Into the Field With Easy-to-Build Mobile AppsTake Location Intelligence Into the Field With Easy-to-Build Mobile Apps
Take Location Intelligence Into the Field With Easy-to-Build Mobile AppsPrecisely
 
01 facility management definition and scope opt
01   facility management definition and scope opt01   facility management definition and scope opt
01 facility management definition and scope optArya Wirabhuana
 
Access Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptxAccess Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptxMarcelPitelli1
 
Ibm+ +bc-dr+-+28apr2010
Ibm+ +bc-dr+-+28apr2010Ibm+ +bc-dr+-+28apr2010
Ibm+ +bc-dr+-+28apr2010Agora Group
 
a) In terms of software risk,an event is any situation or happening .pdf
a) In terms of software risk,an event is any situation or happening .pdfa) In terms of software risk,an event is any situation or happening .pdf
a) In terms of software risk,an event is any situation or happening .pdfanushafashions
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Narudom Roongsiriwong, CISSP
 
Showcase Begin With The End In Mind
Showcase   Begin With The End In MindShowcase   Begin With The End In Mind
Showcase Begin With The End In Mindbmenden52
 
Digital Transformation by William Poos
Digital Transformation by William PoosDigital Transformation by William Poos
Digital Transformation by William PoosNRB
 
Why Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of SafetyWhy Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of Safetytim_owen
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructurePallavi Agarwal
 
Knowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & ManagementKnowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & ManagementAmr El-Ganainy
 

Similaire à Buildings (20)

Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdf
 
PPT for CEO.pptx
PPT for CEO.pptxPPT for CEO.pptx
PPT for CEO.pptx
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docx
 
Discussion Command and Control ArchitectureNow that you hav.docx
Discussion Command and Control ArchitectureNow that you hav.docxDiscussion Command and Control ArchitectureNow that you hav.docx
Discussion Command and Control ArchitectureNow that you hav.docx
 
Take Location Intelligence Into the Field With Easy-to-Build Mobile Apps
Take Location Intelligence Into the Field With Easy-to-Build Mobile AppsTake Location Intelligence Into the Field With Easy-to-Build Mobile Apps
Take Location Intelligence Into the Field With Easy-to-Build Mobile Apps
 
01 facility management definition and scope opt
01   facility management definition and scope opt01   facility management definition and scope opt
01 facility management definition and scope opt
 
S36169184
S36169184S36169184
S36169184
 
Access Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptxAccess Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptx
 
Ibm+ +bc-dr+-+28apr2010
Ibm+ +bc-dr+-+28apr2010Ibm+ +bc-dr+-+28apr2010
Ibm+ +bc-dr+-+28apr2010
 
a) In terms of software risk,an event is any situation or happening .pdf
a) In terms of software risk,an event is any situation or happening .pdfa) In terms of software risk,an event is any situation or happening .pdf
a) In terms of software risk,an event is any situation or happening .pdf
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Showcase Begin With The End In Mind
Showcase   Begin With The End In MindShowcase   Begin With The End In Mind
Showcase Begin With The End In Mind
 
Digital Transformation by William Poos
Digital Transformation by William PoosDigital Transformation by William Poos
Digital Transformation by William Poos
 
NAME's Appendix - H
NAME's Appendix - HNAME's Appendix - H
NAME's Appendix - H
 
Why Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of SafetyWhy Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of Safety
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Knowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & ManagementKnowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & Management
 
S3_List
S3_ListS3_List
S3_List
 

Plus de kennylieske

Plus de kennylieske (6)

Fire
FireFire
Fire
 
Wordpress
WordpressWordpress
Wordpress
 
Web2.0
Web2.0Web2.0
Web2.0
 
Healthsafe
HealthsafeHealthsafe
Healthsafe
 
FaBworkshop
FaBworkshopFaBworkshop
FaBworkshop
 
Technology
TechnologyTechnology
Technology
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Buildings

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. accessibility (h) things to consider when developing a disability access audit
  • 8. accessibility (h) things to consider when developing a disability access audit publicity (different formats / web design) signs (high visibility, wayfinder, braille, lowercase) entrance (tactile paving, doorbells, ramp gradients, automatic doors / door width, handrails, lighting, seating, contrasting colours, reception desk height) hearing loops (test them / consider overspilling) toilets (alarms, peninsula access, handrails, floor space, taps) lifts fire safety (visual alarms, refuge areas, phone links evac chairs) parking for blue badge holders (marked out) adjustable equipment (flip charts etc) assistive technology support dogs governance, recruitment and employment staff training
  • 9.  
  • 10.
  • 11.
  • 12. health and safety health and safety at work act working at heights regulations coshh control of substances hazardous to health gas safety electrical safety regulations (periodic/pat tests) regulatory reform act (fire safety) puwer provision and use of work equipment regulations first aid provision / first aid kits / accident books riddor reporting of incidents, diseases and dangerous occurrences regulations hse/cqc - powers to close buildings down health and safety
  • 13. health and safety health and safety should be principled rather than pragmatic duty of care
  • 14. risk assessments general risk assessments looking at all aspects of safety vdu risk assessments h lone working risk assessments (need to consider cleaners or maintenance staff) fire risk assessments / fire evacuation procedures h (prevention, evacuation, fire suppression and need to include risks to fire fighters and other property nearby) fire refuge points are deemed as places of relative safety individual risk assessments should be conducted for disabled people, younger people and pregnant women
  • 15. risk assessments hazard: anything with potential to cause harm risk: the likelihood of the hazard causing harm a) identify hazards that could affect anyone b) assess the risk of occurrence c) evaluate the severity of the outcome d) eliminate the hazard if possible or reduce them to the lowest level of risk possible step by step look for the hazard > decide who might be harmed and how > evaluate the risk arising from the hazard and decide if existing measures are adequate or should more be done > record your findings and inform people > review and update
  • 16. risk assessments risk assessments should enable one size does not fit all - be adaptable it can be hard to be objective about something you use every day develop an organisational workplan in relation to h &s have a plan ‘b’ (business continuity measures and insurance)
  • 17. business continuity disaster recovery usually relates to IT systems and buildings business continuity plan focuses on being able to provide services (human resources - financial management) disasters fall into three categories value of data: can you operate without email for a day (or week) what if all your accounting data is lost what if your entire client list is lost
  • 18. business continuity disaster recovery usually relates to IT systems and buildings business continuity plan focuses on being able to provide services (human resources - financial management) disasters fall into three categories natural disasters - hurricanes, earthquakes, etc technical disasters - hardware failure, power cuts human disasters - disgruntled employee, virus etc fire can fall into any of the three value of data: can you operate without email for a day (or week) what if all your accounting data is lost what if your entire client list is lost
  • 19. plans should consider physical destruction (fire, flood damage, earthquake) data destruction (system failures, hackers) where to start... prevention - fire fighting equipment, structural surveys, backing up data, secure networks, using anti virus. create a contact list covering... staff, tenants, it professionals, emergency services, utility companies, plumbers, electricians, glaziers and other contractors business continuity
  • 20. decide what is critical to the organisation what order to restore back up systems or make repairs keep an assets register include serial numbers and activation codes keep all this information off site (ideally with two people) test your plan - data etc make sure contacts are updated business continuity
  • 22. one of the biggest issues buildings encounter unless you know who is responsible for doing a repair then it generally doesn’t get done who’s job is it to report repairs don’t assume you can maintain a building ‘on the cheap’ broken windows develop a maintenance plan (include time scale and anticipated costs) painting and decorating/carpet replacement/window cleaning building maintenance
  • 23. use maintenance as an opportunity to make improvements should consider environment / access (lighting/decorating/taps) as you repair and replace undertake regular maintenance checks ‘walkrounds’ / develop workplans know the location of fuse boxes / meters / water stopcocks / keep records (keys / master codes / paint colours) keep an up to date list of contractors try to build a relationship with them electricians / plumbers / window cleaners / carpet cleaners / glaziers / fire fighting equipment / cleaning consumables / it support / telephone contractors / water companies / fire alarms / burglar alarms / locksmiths / decorators / heating engineers / plasterers / catering suppliers / flooring specialists / automatic doors / audio visual repairs / joiners / vending machines / gas engineers / pest control / waste management and recycling / sewerage and drains / signs / hygiene suppliers / lift maintenance / roofers / office systems maintenance will become increasingly technical building maintenance
  • 24. integrated systems “ wi-fi is going to be the fourth utility…landlords need to view it that way and are increasingly doing just that.” Bob Cringle open standards like oBIX are just beginning to evolve and will likely break down the silos between building systems ranging from security to lift controls open standards like oBIX are just beginning to evolve and will likely break down the silos between building systems ranging from security to lift controls
  • 25. well being and comfort security and safety energy performance human - building interaction information and communication integrated systems
  • 26. jhghjg SENSORS & ALARMS INTRUSION DETECTION
  • 27. jhghjg SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT
  • 28. jhghjg CCTV SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT
  • 29. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT Safety/Security Technologies
  • 30. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security Technologies
  • 31. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security Technologies
  • 32. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security Technologies
  • 33. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security Technologies
  • 34. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION Safety/Security Technologies
  • 35. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
  • 36. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
  • 37. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
  • 38. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS EMERGENCY COMMUNICATION ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
  • 39. VIDEO SURVILLANCE SENSORS & ALARMS INTRUSION DETECTION INFORMATION SECURITY CCTV SENSORS & ALARMS EMERGENCY COMMUNICATION ACCESS CONTROL INTRUSION DETECTION INFORMATION SECURITY SHARED DATABASES ASSET MANAGEMENT VISITOR MANAGEMENT & IDENTITY RECOGNITION UNIFIED REPORTING Safety/Security Technologies
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.  
  • 48.
  • 49.
  • 51.
  • 52.

Notes de l'éditeur

  1. handouts