Part B - Content of the Ship security assessment (ISPS Code, paragraphs
B/8.3, B/8.4, B/8.6 to B/8.13)
|
|
Yes
|
No
|
Other
|
|
|
|
|
.10 Does the CSO ensure that the ship security
assessments address the following elements on board or within the ship:
(ISPS Code, paragraph B/8.3)
|
|
|
|
.1 Physical security?
|
|
|
|
.2 Structural integrity?
|
|
|
|
.3 Personnel protection systems?
|
|
|
|
.4 Procedural policies?
|
|
|
|
.5 Radio and telecommunication systems, including
computer systems and networks?
|
|
|
|
.6 Other areas that may, if damaged or used for illicit
observation, pose a risk to persons, property, or operations on board the
ship or within a port facility?
|
|
|
|
Comments:
|
|
|
|
|
|
|
|
.11 Does the CSO ensure that those involved in
conducting a ship security assessment are able to draw upon expert
assistance in relation to the following: (ISPS Code,
paragraph B/8.4)
|
|
|
|
.1 Knowledge of current security threats and
patterns?
|
|
|
|
.2 Recognition and detection of weapons, dangerous
substances and devices?
|
|
|
|
.3 Recognition, on a non-discriminatory basis, of
characteristics and behaviour patterns of persons who are likely to threaten
security?
|
|
|
|
.4 Techniques used to circumvent security measures?
|
|
|
|
.5 Methods used to cause a security incident?
|
|
|
|
.6 Effects of explosives on ship's structures and
equipment?
|
|
|
|
.7 Ship security?
|
|
|
|
.8 Ship/port interface business practices?
|
|
|
|
.9 Contingency planning, emergency preparedness and
response?
|
|
|
|
.10 Physical security?
|
|
|
|
.11 Radio and telecommunication systems, including
computer systems and networks?
|
|
|
|
.12 Marine engineering?
|
|
|
|
.13 Ship and port operations?
|
|
|
|
Comments:
|
|
|
|
|
|
|
|
.12 Does the CSO ensure that ship security assessments
examine each identified point of access, including open weather decks, and
evaluate its potential for use by individuals who might seek to breach
security? This includes points of access as well as those who seek to obtain
unauthorized entry. (ISPS Code, paragraph
B/8.6)
|
|
|
|
Comments:
|
|
|
|
|
|
|
|
.13 Does the CSO ensure that ship security assessments
consider the continuing relevance of the existing security measures and
guidance, procedures and operations, under both routine and emergency
conditions, and have determined security guidance including the following:
(ISPS Code, paragraph B/8.7)
|
|
|
|
.1 The restricted areas?
|
|
|
|
.2 The response procedures to fire or other emergency
conditions?
|
|
|
|
.3 The level of supervision of the ship's personnel,
passengers, visitors, vendors, repair technicians, dock workers, etc?
|
|
|
|
.4 The frequency and effectiveness of security
patrols?
|
|
|
|
.5 The access control systems, including identification
systems?
|
|
|
|
.6 The security communications systems and
procedures?
|
|
|
|
.7 The security doors, barriers and lighting?
|
|
|
|
.8 The security and surveillance equipment and systems,
if any?
|
|
|
|
Comments:
|
|
|
|
|
|
|
|
.14 Does the CSO ensure that ship security assessments
consider the persons, activities, services and operations that it is
important to protect, which includes the following: (ISPS Code, paragraph
B/8.8)
|
|
|
|
.1 The ship's personnel?
|
|
|
|
.2 Passengers, visitors, vendors, repair technicians,
port facility personnel, etc?
|
|
|
|
.3 The capacity to maintain safe navigation and emergency
response?
|
|
|
|
.4 The cargo, particularly dangerous goods or hazardous
substances?
|
|
|
|
.5 The ship's stores?
|
|
|
|
.6 The ship's security communication equipment and
systems, if any?
|
|
|
|
.7 The ship's security surveillance equipment and
systems, if any?
|
|
|
|
Comments:
|
|
|
|
|
|
|
|
.15 Does the CSO ensure that ship security assessments
consider all possible threats, which may include the following types of
security incidents: (ISPS Code, paragraph
B/8.9)
|
|
|
|
.1 Damage to, or destruction of, the ship or of a port
facility, e.g. by explosive devices, arson, sabotage or vandalism?
|
|
|
|
.2 Hijacking or seizure of the ship or of persons on
board?
|
|
|
|
.3 Tampering with cargo, essential ship equipment or systems or
ship's stores?
|
|
|
|
.4 Unauthorized access or use including presence of
stowaways?
|
|
|
|
.5 Smuggling weapons or equipment, including weapon of
mass destruction?
|
|
|
|
.6 Use of the ship to carry those intending to cause a
security incident and/or their equipment?
|
|
|
|
.7 Use of the ship itself as a weapon or as a means to
cause damage or destruction?
|
|
|
|
.8 Attacks from seaward whilst at berth or at
anchor?
|
|
|
|
.9 Attacks whilst at sea?
|
|
|
|
Comments:
|
|
|
|
|
|
|
|
.16 Does the CSO ensure that ship security assessments
take into account all possible vulnerabilities, which may include the
following: (ISPS Code, paragraph
B/8.10)
|
|
|
|
.1 Conflicts between safety and security measures?
|
|
|
|
.2 Conflicts between shipboard duties and security
assignments?
|
|
|
|
.3 Watchkeeping duties, number of ship’s personnel,
particularly with implications on crew fatigue, alertness and
performance?
|
|
|
|
.4 Any identified security training deficiencies?
|
|
|
|
.5 Any security equipment and systems, including
communication systems?
|
|
|
|
Comments:
|
|
|
|
|
|
|
|
.17 Do the CSO and the SSO always have regard to the
effect that security measures may have on ship's personnel who will remain
on the ship for long periods? (ISPS Code, paragraph B/8.11)
|
|
|
|
Comments:
|
|
|
|
|
|
|
|
.18 Does the CSO ensure that, upon completion of the
SSA, a report is prepared consisting of a summary of how the assessment was
conducted, a description of each vulnerability found during the assessment
and a description of counter measures that could be used to address each
vulnerability?Is this report protected from unauthorized access or
disclosure? (ISPS Code, paragraph
B/8.12)
|
|
|
|
Comments:
|
|
|
|
|
|
|
|
.19 Does the CSO review and accept the report of the SSA
when the SSA has not been carried out by the Company? (ISPS Code, paragraph
B/8.13)
|
|
|
|
Comments:
|
|
|
|