Professional Documents
Culture Documents
FOR
PROPOSED BY:
LAGOS, NIGERIA.
www.shotechgroup.com
SUBMISSION TO:
EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL
*ENGINEERING * PROCUREMENT
*CONSTRUCTION
DATE: 02/11/14
SECURITY MANAGEMENT PLAN
1. INTRODUCTION
This document describes the Security Management program that will be used by SHOTECH
Engineering Nigeria Limited within the QIT Crude/ Condensate Storage and Settling Tanks
Revamp Project Phase II in Qua Iboe Terminal for Mobil Producing Nigeria Unlimited.
We ensure that security policies, procedures and criteria are fully designed and
updated; and the means fully available to ensure security and protection for all in our
business activities and at all times within our companies facilities.
Security, like safety, is everybodys business. These rules guide the implementation of
this policy.
Page 2 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:
EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL
*ENGINEERING * PROCUREMENT
*CONSTRUCTION
DATE: 02/11/14
SECURITY MANAGEMENT PLAN
SECURITY RULES
Every employee is responsible for managing the risks pertaining to his specific activity
and to the activities of his team members at every level of company operation.
Rationale:
It is essential that SHOTECH Engineering Nigeria Limited manage the physical and
personal security of staff (including addressing the risks of violence in the workplace)
and individuals coming to the organizations facilities. In addition, security of the
established environment, equipment, supplies, and information is also important. To
achieve this, the organization shall:
Administrative Manager ensure that all persons are aware of the need for constant
vigilance, care and compliance with security procedures, and the necessity to report any
incident or suspicion to the appropriate entity, authority or person.
SHE Manager defines and implements Security Policy and Objectives for the Company and
communicates to personnel at all levels within the organisation.
Page 3 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:
EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL
*ENGINEERING * PROCUREMENT
*CONSTRUCTION
DATE: 02/11/14
SECURITY MANAGEMENT PLAN
1. Site Facilities / Services Work Group: A subcommittee of the Safety Committee, this
group is charged with reviewing all requests relating to security on site.
Recommendations and implementation of security upgrades throughout the project
vicinity are processed through this subcommittee. SHOTECH Engineering Nigeria
Limited engage contracted security guard or capable host community guard monitored
and controlled by the subcommittee group. This group meets routinely, compiles minutes
of each meeting and reports significant findings to the SHOTECH Engineering Nigeria
Limited Safety Committee (SENLSC). Departments represented are: Engineering and
Operations, Fire Safety, Company Administration, Facility Planning and Design Office,
and Clients Police/Security outfit.
2. Perimeter Fencing: SHOTECH Engineering Nigeria Limited shall provide temporary
perimeter fence with chain link to protect unauthorised access to its site facilities in
accordance with the client recommendation for type of barrier to be used.
Page 4 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:
EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL
*ENGINEERING * PROCUREMENT
*CONSTRUCTION
DATE: 02/11/14
SECURITY MANAGEMENT PLAN
4. Main Entrance: The public main entrance to the site facility is staffed by contracted
security guard. They are given general order to screen individuals and their personal
items before entering through this entrance. Additionally, the locked exit gate for
emergency is controlled by security personnel.
5. Offices with Unauthorized Access: All entrances are equipped with a traditional key
or electronic locking mechanism and secured 24/7.
Lighting system for the entire site facility is imperative to illuminate the surrounding for
Safety, Security and Grounds tours
Security Officer nightly checks
Identify, as appropriate, staff, and other people entering the organizations facilities.
Credentialing standards have been established for the following groups:
1. Contractors: The Project Manager must coordinate with the Facilities Planning,
Design and Construction Office to ascertain credentials for long-term contractors.
Short-term contractors will wear their company identification badge and/or logo
Page 5 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:
EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL
*ENGINEERING * PROCUREMENT
*CONSTRUCTION
DATE: 02/11/14
SECURITY MANAGEMENT PLAN
apparel. Contractors doing work in off-site facilities will communicate with the
Project Manager as to how their employees will be identified.
2. Employees: The procedure for identifying SHOTECH Engineering Nigeria Limited
Staff is outlined in the SHOTECH Engineering Nigeria Limited Policy Employee
Identification Badge. All employees must wear their ID badge per Company Policy
while on duty. SHOTECH Engineering Nigeria Limited Security Officers in uniform
will have their Identification badge with them while on duty. Officers out of uniform
must wear their ID badge on the outer clothing between shoulder and waist with the
photo side facing out when they are in an official capacity.
3. Visitors: Security officers on duty help ensure compliance to SHOTECH
Engineering Nigeria Limited visitation policy.
4. Office Access Control: All entrances are equipped with a traditional key or
electronic locking mechanism. A digital surveillance system with cameras placed
strategically on the main entrance and reception, records activity 24/7 and stores
data on a DVR for 30 days.
5. Information Security Measure: In the area of information technology, potential risks
shall be identified and the potential impact of the risk taken into consideration. Network
administrators routinely search through confidential electronic records in search of
unauthorized users. Software programs scan computer networks for unidentified IP
addresses and new software program installations that might change the network settings to
allow unauthorized access. Cybercrimes involving hacking are reported to the local police
station.
6. Restricted Access: Unauthorized employees who access restricted information must
receive disciplinary action and possibly termination in response to the breach.
Workers also must be fully informed about what they are permitted to access to
avoid penalties.
7. Property: In addition to protecting people, security management often is
responsible for protecting property. Workshop/offices often have materials and
equipment that can be stolen or vandalized, and regular inspections sometimes are
Page 6 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:
EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL
*ENGINEERING * PROCUREMENT
*CONSTRUCTION
DATE: 02/11/14
SECURITY MANAGEMENT PLAN
3. Emergency Preparedness
The Potentially most serious situations are identified and systematically analysed to
prepare adequate emergency response procedures, appropriate personnel and material to
face crisis. In the event of an emergency or an apparent crime, security personnel must
call for backup. Security managers are responsible for training security personnel on how
to properly radio for backup, including whom to call and under what circumstances.
During serious security breaches, security management is responsible for overseeing how
the threat is resolved.
Page 7 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:
EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL
*ENGINEERING * PROCUREMENT
*CONSTRUCTION
DATE: 02/11/14
SECURITY MANAGEMENT PLAN
6. Documentation
After a security threat, security personnel are responsible for writing reports that detail
what happened. Security management is responsible for determining how these reports
should be filled out and that personnel properly fill out the reports. These reports often are
used by the courts, and security personnel sometimes need to interview witnesses to get a
full account of what occurred.
Evaluation of Plan
The contracted Chief Security Officer and his management team will evaluate the Security
Management Plan for its scope, objectives, performance and effectiveness. Any changes in
the scope will be addressed during the annual update of the Plan and any changes in the
Page 8 of 9
CLIENT: PROJECT TITLE: CONTRACTOR:
EXXONMOBIL/ NNPC QIT CRUDE/ CONDENSATE STORAGE AND SETTLING SHOTECH ENGRG. NIG. LTD
TANKS REVAMP PROJECT PHASE II AT QUA-IBOE
TERMINAL
*ENGINEERING * PROCUREMENT
*CONSTRUCTION
DATE: 02/11/14
SECURITY MANAGEMENT PLAN
Page 9 of 9