Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

Assets Management and Site Access Protocols

524 vues

Publié le

Rules that governs how to legitimately access sites and properly manage all site assets against theft.

Publié dans : Technologie
  • Visit this site: tinyurl.com/sexinarea and find sex in your area for one night)) You can find me on this site too)
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • I m looking to meet interesting and adventurous guys to make new friends with. I m 29 year old female wants discreet and clean fun with a married or horny, bored, no strings attached, just looking for fun! Send me a letter so I know your serious on ----- http://diaria.club/id466639 Copy this link in your browser
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Sex in your area for one night is there tinyurl.com/hotsexinarea Copy and paste link in your browser to visit a site)
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Girls for sex are waiting for you https://bit.ly/2TQ8UAY
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Meetings for sex in your area are there: https://bit.ly/2TQ8UAY
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici

Assets Management and Site Access Protocols

  1. 1. Assets Management Security Issues and Site Access protocol
  2. 2. ASSET MANAGEMENT  Asset management, broadly defined as any system that monitors and maintains things of value to an entity or group. It may apply to both tangible assets (such as buildings) and to intangible assets (such as human capital, intellectual property, goodwill and/or financial assets. Asset management is a systematic process of developing, operating, maintaining, upgrading, and disposing of assets cost- effectively.
  3. 3. OUR ASSETS  Generators  Diesel  Batteries  Rectifiers  OPV  Antenna  Cables  BUB  Sola Panel  Maintenance materials  ETC
  4. 4. what does this mean to you?
  5. 5. SECURITY  Taking charge of our sites (SECURITY) has been a major challenge we face which has opened our sites to multiple dangers through our unfair attitude towards our most prioritized business.
  6. 6. ANALOGY  A mother cares so much for the child that she does not want the child to suffer any inch of sickness or discomfort.  Give your site (child) the required attention at all times  Give your site (child) regular food (Diesel)  Give your site (child) comprehensive health care (PPM)  Give your site (child) the best treatment against any sickness (regular maintance)
  7. 7. STEPS TO HAVING A SECURED SITE  Ensure there’s a guard on site always if not, escalate.  Know your guards (give them a sense of belonging)  Always ensure a good relationship/bond with your guards.  Protect their rights (ensure they get paid regularly)  Ensure there’s no loop hole attackers can easily get access to the site (check for weak or broken palisade, broken mesh wires etc)  Ensure your site is always locked.  Cultivate the habit of following the right protocol on site. I.e. Sign in, sign out, and ensure site is locked before leaving the site.  Ensure no asset is left unsecured on site.  Ensure that decommissioned assets are taken out of sites immediately.  Always escalate any form of threat.
  8. 8. ACCESS PROTOCOLS  Always Sign in and out  Always ensure you access and leave the site with the presence of the guard on duty.  Always get your access refs for every access to site and indicate in the log book.  Always get your PARN for all planned activity  Always wear your ID cards unless where there’s a security threat.  Always check, take note and write down the exact diesel level at every site visit.
  9. 9. OTHER SECURITY PROCEDURES  All sites must be locked at all times.  All sites must have log books  Report any issue of theft or threats to the office  It’s mandatory for all FSEs to carry or put on your staff ID cards  No diesel supply must take place without the presence of the security supervisor of the cluster.  No guard must be allowed to sign on behalf of the security supervisor.  Non-compliance of any security supervisor not to witness and co-supply diesel must be immediately escalated.  No asset (diesel or others) is allowed to be moved out of any site without an approval mail.  All FSEs are to immediately escalate any form of mis-conduct noticed within their colleagues or the security vendor.  Any site that is noticed for have 1 guard instead of 2 must be immediately escalated.  Any site without guard or guards not on duty must be immediately reported.
  10. 10. HINTS  Buy & share intelligence  Always escalate  Always ask questions  Always take note & document.
  11. 11. THANK YOU

×