You are on page 1of 9

SECURITY MANAGEMENT PLAN

FOR

QIT CRUDE/CONDENSATE STORAGE AND


SETTLING TANKS REVAMP PROJECT
PHASE II (CSTR II)

PROPOSED BY:

SHOTECH ENGINEERING NIGERIA LIMITED

PLOT M2, ROAD 22A, VICTORIA GARDEN CITY

LEKKI - EPE EXPRESSWAY

LAGOS, NIGERIA.

www.shotechgroup.com

SUBMISSION TO:

EXXON MOBIL / NNPC


CLIENT: PROJECT TITLE: CONTRACTOR:

EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL

*ENGINEERING * PROCUREMENT
*CONSTRUCTION

DATE: 02/11/14
SECURITY MANAGEMENT PLAN

1. INTRODUCTION
This document describes the Security Management program that will be used by SHOTECH
Engineering Nigeria Limited within the QIT Crude/ Condensate Storage and Settling Tanks
Revamp Project Phase II in Qua Iboe Terminal for Mobil Producing Nigeria Unlimited.

SHOTECH Engineering Nigeria Limited together with our sub-contractors and


employees, are committed to providing a secure working environment by protecting
ourselves, our assets, and our operations against risk of injury, loss or damage from criminals
and hostile or malicious acts.

In line with SHOTECH Engineering Nigeria Limited policies and directives:

We ensure that security policies, procedures and criteria are fully designed and
updated; and the means fully available to ensure security and protection for all in our
business activities and at all times within our companies facilities.

It is a duty for everybody to take advantage of these means, and to conduct


themselves in a manner that would not compromise their security, the company and
other peoples security.

Security, like safety, is everybodys business. These rules guide the implementation of
this policy.

Page 2 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:

EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL

*ENGINEERING * PROCUREMENT
*CONSTRUCTION

DATE: 02/11/14
SECURITY MANAGEMENT PLAN

SECURITY RULES

1. Respect of Laws and Regulations


In all operations, our companies laws in compliance with National and International
Laws and Regulations, SHOTECH Engineering Nigeria Limited Policies and Directives.
2. Responsibilities

Every employee is responsible for managing the risks pertaining to his specific activity
and to the activities of his team members at every level of company operation.
Rationale:
It is essential that SHOTECH Engineering Nigeria Limited manage the physical and
personal security of staff (including addressing the risks of violence in the workplace)
and individuals coming to the organizations facilities. In addition, security of the
established environment, equipment, supplies, and information is also important. To
achieve this, the organization shall:

A. Develop and maintain a Security Management Plan describing the processes


it implements to effectively manage the security of staff, and other people
coming to the organizations facilities.

B. Identify a person(s), as designated by leadership, to coordinate the development,


implementation, and monitoring of the security management activities. The
person(s) designated are:

Administrative Manager ensure that all persons are aware of the need for constant
vigilance, care and compliance with security procedures, and the necessity to report any
incident or suspicion to the appropriate entity, authority or person.

SHE Manager defines and implements Security Policy and Objectives for the Company and
communicates to personnel at all levels within the organisation.

Page 3 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:

EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL

*ENGINEERING * PROCUREMENT
*CONSTRUCTION

DATE: 02/11/14
SECURITY MANAGEMENT PLAN

Contract Security Guard Manager: Outsourced staff of SHOTECH Engineering Nigeria


Limited who is the contracted guard representative and liaison to administration of
SHOTECH Engineering Nigeria Limited.

Company Chief Security officer: A staff of the SHOTECH Engineering Nigeria


Limited who oversees all operational issues.

Site Security Procedures

1. Site Facilities / Services Work Group: A subcommittee of the Safety Committee, this
group is charged with reviewing all requests relating to security on site.
Recommendations and implementation of security upgrades throughout the project
vicinity are processed through this subcommittee. SHOTECH Engineering Nigeria
Limited engage contracted security guard or capable host community guard monitored
and controlled by the subcommittee group. This group meets routinely, compiles minutes
of each meeting and reports significant findings to the SHOTECH Engineering Nigeria
Limited Safety Committee (SENLSC). Departments represented are: Engineering and
Operations, Fire Safety, Company Administration, Facility Planning and Design Office,
and Clients Police/Security outfit.
2. Perimeter Fencing: SHOTECH Engineering Nigeria Limited shall provide temporary
perimeter fence with chain link to protect unauthorised access to its site facilities in
accordance with the client recommendation for type of barrier to be used.

3. Access Control and Lighting: SHOTECH Engineering Nigeria Limited Provide


Control access to and egress from security sensitive areas, as determined by the
client. The following areas have been determined to be security sensitive. The
specific access and egress practices are listed for each.

Page 4 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:

EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL

*ENGINEERING * PROCUREMENT
*CONSTRUCTION

DATE: 02/11/14
SECURITY MANAGEMENT PLAN

4. Main Entrance: The public main entrance to the site facility is staffed by contracted
security guard. They are given general order to screen individuals and their personal
items before entering through this entrance. Additionally, the locked exit gate for
emergency is controlled by security personnel.

5. Offices with Unauthorized Access: All entrances are equipped with a traditional key
or electronic locking mechanism and secured 24/7.

Lighting system for the entire site facility is imperative to illuminate the surrounding for
Safety, Security and Grounds tours
Security Officer nightly checks

Office Security Procedures


SHOTECH Engineering Nigeria Limited identifies and manages its security risks associated
with it office environment. The risks are identified from internal sources such as ongoing
monitoring of the environment, results of root cause analyses, results of annual proactive
assessments of high-risk processes, and from credible external sources.
The Administration department is a branch of the SHOTECH Engineering Nigeria Limited
that makes recommendations to mitigate security risks. These recommendations are
presented to Managing Director and sometimes initiate changes to policy, procedures,
and/or training.

Identify, as appropriate, staff, and other people entering the organizations facilities.
Credentialing standards have been established for the following groups:

1. Contractors: The Project Manager must coordinate with the Facilities Planning,
Design and Construction Office to ascertain credentials for long-term contractors.
Short-term contractors will wear their company identification badge and/or logo

Page 5 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:

EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL

*ENGINEERING * PROCUREMENT
*CONSTRUCTION

DATE: 02/11/14
SECURITY MANAGEMENT PLAN

apparel. Contractors doing work in off-site facilities will communicate with the
Project Manager as to how their employees will be identified.
2. Employees: The procedure for identifying SHOTECH Engineering Nigeria Limited
Staff is outlined in the SHOTECH Engineering Nigeria Limited Policy Employee
Identification Badge. All employees must wear their ID badge per Company Policy
while on duty. SHOTECH Engineering Nigeria Limited Security Officers in uniform
will have their Identification badge with them while on duty. Officers out of uniform
must wear their ID badge on the outer clothing between shoulder and waist with the
photo side facing out when they are in an official capacity.
3. Visitors: Security officers on duty help ensure compliance to SHOTECH
Engineering Nigeria Limited visitation policy.
4. Office Access Control: All entrances are equipped with a traditional key or
electronic locking mechanism. A digital surveillance system with cameras placed
strategically on the main entrance and reception, records activity 24/7 and stores
data on a DVR for 30 days.
5. Information Security Measure: In the area of information technology, potential risks
shall be identified and the potential impact of the risk taken into consideration. Network
administrators routinely search through confidential electronic records in search of
unauthorized users. Software programs scan computer networks for unidentified IP
addresses and new software program installations that might change the network settings to
allow unauthorized access. Cybercrimes involving hacking are reported to the local police
station.
6. Restricted Access: Unauthorized employees who access restricted information must
receive disciplinary action and possibly termination in response to the breach.
Workers also must be fully informed about what they are permitted to access to
avoid penalties.
7. Property: In addition to protecting people, security management often is
responsible for protecting property. Workshop/offices often have materials and
equipment that can be stolen or vandalized, and regular inspections sometimes are

Page 6 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:

EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL

*ENGINEERING * PROCUREMENT
*CONSTRUCTION

DATE: 02/11/14
SECURITY MANAGEMENT PLAN

needed to indicate if anything has been stolen.


8. Analysis: After potential risks have been identified in the information technology
systems, methodologies shall be developed so these threats can be prevented. These
methodologies are developed by security managers and network administrators working
for the organization.

Incident Management and Emergency Response System


1. Risk and Threat Evaluation Review
Before the implementation of procedure, a risk and threat assessment is carried out to
justify appropriate levels of security for which procedures are to be applied. The risks in
each site is reviewed regularly, immediately if a situation evolves and once a year for the
company.
2. Incident Analysis
Every incident and, or breach of security is reported, investigated, analysed and necessary
measures including legal and/or disciplinary action taken to prevent reoccurrence.

3. Emergency Preparedness
The Potentially most serious situations are identified and systematically analysed to
prepare adequate emergency response procedures, appropriate personnel and material to
face crisis. In the event of an emergency or an apparent crime, security personnel must
call for backup. Security managers are responsible for training security personnel on how
to properly radio for backup, including whom to call and under what circumstances.
During serious security breaches, security management is responsible for overseeing how
the threat is resolved.

4. Confidentiality: Company propriety information, including Security Document, is


protected and handled line with security procedures and company Communications
Policy.
5. Competence of Personnel
Security personnel are properly trained and their effectiveness and knowledge regularly

Page 7 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:

EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL

*ENGINEERING * PROCUREMENT
*CONSTRUCTION

DATE: 02/11/14
SECURITY MANAGEMENT PLAN

assessed. Security awareness and co-operation by our personnel, contractors and


employees are continuously renewed.

6. Documentation
After a security threat, security personnel are responsible for writing reports that detail
what happened. Security management is responsible for determining how these reports
should be filled out and that personnel properly fill out the reports. These reports often are
used by the courts, and security personnel sometimes need to interview witnesses to get a
full account of what occurred.

Security Training Plan


Security personnel are properly trained and their effectiveness and knowledge regularly
assessed. Security awareness and co-operation by our personnel, contractors and employees
are continuously renewed.

Training and Recruitment The Administrative Manager of the SHOTECH Engineering


Nigeria Limited maintains all records of training for each member of the personnel.
Supervisors perform evaluations and are responsible to ensure each member demonstrates
competency in the performance of duties. Security Officers receive the following training
annually and/or when required by job description or law:

Dealing with assaultive and/or difficult people


Community Relations
First Aid
Legal updates

Evaluation of Plan
The contracted Chief Security Officer and his management team will evaluate the Security
Management Plan for its scope, objectives, performance and effectiveness. Any changes in
the scope will be addressed during the annual update of the Plan and any changes in the

Page 8 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:

EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL

*ENGINEERING * PROCUREMENT
*CONSTRUCTION

DATE: 02/11/14
SECURITY MANAGEMENT PLAN

range of application or interactions will be incorporated into the updated Security


Management Plan. Annual planning objectives will be developed through interactions with
SHOTECH Engineering Nigeria Limited Staff. These objectives will address the primary
operational initiatives for maintaining and enhancing the security of the Environment. The
performance of the Plan will be assessed through progress in achieving both the objectives
and the Performance Improvement project(s) defined within the Plan. The annual
evaluations, updates, and planning efforts will be presented for Committee review and
action during the first quarter of the new calendar year. This information will be provided to
the Company Directors through the routine reporting channels.

Internal Security Audit


The implement of our Security Policy is periodically checked and performance assessed
during audits and internal reviews.

Page 9 of 9

You might also like