Safety and security of the enterprise: instruction, organization of work

In the conditions of instability of the Russian economy, the process of the successful functioning of any company is affected by a number of factors. One of them is ensuring the proper level of safety and labor protection at the enterprise. The RF Law "On Security" interprets this concept as a state of protection of interests, which can be called vital.

The topic of safety and labor protection at the enterprise is very extensive, and today we will talk in detail about the first component - the prevention and elimination of various kinds of negative factors that can cause serious damage to the economic activity of the organization.

Unfortunately, many people (business owners are no exception) still adhere to stereotypes according to which security is the competence of special state bodies. But since entrepreneurial activity belongs to those areas where all the risks of work are borne by the owner, one of the priorities of the latter is not only to establish proper labor protection equipment at the enterprise, but also to take measures to determine the key interests of the company that need protection . And also to develop and implement a set of measures to fulfill this need.

How to achieve this?

The most important tool for ensuring the safety and security of an enterprise is the creation on its own base of a service that is in charge of all these issues. And today we will talk about its structure and functions, determine its main goals. But first of all, you should make a list of those objects for which protection measures will be required.

What concerns them?

This is the territory of the enterprise itself, and in addition - those objects (buildings or structures) that are located on it. The following is about media of confidential nature in the form of documents or objects (goods) and valuables of a material nature.

Another special object of protection is company management and personnel who have access to confidential information. The organization of personnel and management protection is guided by a separate instruction (regulation) approved by the management and agreed, if necessary, with the bodies of internal affairs and security on a territorial basis. It, like the instructions on labor protection at the enterprise, is developed and approved as a binding normative act.

enterprise security organization

The main purpose of such protection of personnel and management can be called ensuring the personal safety of the latter both in everyday activities and in the case of the likelihood of an emergency. We are talking about preventing attempts by cybercriminals to capture protected information by means of violent influence (physical or other nature) on these persons, as well as making recommendations to these personnel on the rules of conduct in emergency situations.

What else is the guard doing

Other important goals of the organization of security services at the enterprise:

  1. Prevent attempts by intruders (outsiders) to get to the site.
  2. Timely detect and detain those who penetrate the territory entrusted or are trying to do so.
  3. Ensure the safety of material assets and carriers of important confidential information available at the facility in order to prevent damage to the enterprise.
  4. Prevent accidents and eliminate their consequences.

The most important points of instructions for the protection of the enterprise

The tasks solved by the service for the implementation of the above goals are as follows:

  1. To control the entire protected area of ​​the facility, including the one on which the special access control mode operates.
  2. Ensure confidentiality and keep secret the planned and ongoing activities of a closed nature at the facility, as well as issues discussed and discussed at them.
enterprise management security

Accompany and protect secret information carriers (official documents, cargo, material assets) during transportation.

Also:

  1. Protect the territory and the facility from a possible armed attack or violent actions that could lead to damage to the enterprise.
  2. If necessary, perform special tasks, the purpose of which is to provide personal protection for the enterprise’s management and personnel admitted to important confidential information.
  3. Provide access control for vehicles, goods and visitors in a protected area. Its purpose is to establish the identity and keep records of visitors, control the import and export of storage media, material assets and goods, prevent their illegal movement, as well as monitor open or hidden attempts to steal enterprise property.
  4. To systematically analyze the degree of effectiveness of the security system and the measures that are taken by officials regarding the protection of the facility, to develop proposals for improving the entire security system.

What does an enterprise security system consist of?

First of all, from personnel (guards, security units). Then - from the entire set of technical means used to protect the places where it is located, as well as the methods by which the facility is protected. We remind once again that this is not only about protecting state enterprises.

One of the main elements of the access control system used as a location for personnel is a checkpoint.

Means of a technical nature that are used in the organization of enterprise security can be divided into two separate groups:

  1. Those that relate to detection tools (we are talking about security and fire alarms, "alarm" alerts, security lighting and television, equipment for checking mail, radio communications and direct intercom, as well as telephone communications with the police, etc.
  2. Detection and elimination tools (fire extinguishing equipment, personal protective equipment, gas traps, weapons, vehicles and other engineering equipment).
security service at the enterprise

What are the options for organizing the protection of the enterprise? Enterprises and organizations of various capacities and sizes can organize their own activities by servicing with special security centers or by creating on their territory a full-fledged defense service with its own staff.

In the second version of the organization of enterprise security, its independent staff units can be combined into a separate service. It consists of security posts, groups of employees (including units for personal security of personnel and management), a group of escort and protection of goods and material assets, GDB (quick response group), also called "alarm". If necessary, guard dogs are used.

If you create your own security service at the enterprise, it most often becomes an independent unit of an organizational nature, which is directly subordinate to its management. The security service is headed by a chief, whose position, as a rule, is deputy. Security Manager.

If there are a lot of employees

In case of a large number of personnel of this service, the appointment of deputy chiefs of at least three (by the number of units) is required. Each of them manages one of the most important departments of the security service and relies in his activity, in turn, on one or several of his own deputies.

For the security service, it is advisable to create your own office and accounting, as well as introduce the position of referent - assistant chief.

If normative lists on labor protection at the enterprise exist for any industry, then the structure, number and composition of the security service of the company (company, enterprise) in each case are affected by the real needs of the organization together with the degree of confidentiality of classified information. That is why recommendations for creating a universal structure of such a service do not exist.

Main units

Nevertheless, it is possible to single out the most important structural units, the presence of which is expected when creating a model security service of a large state or joint-stock industrial enterprise, holding or industrial and financial group.

safety instructions for the enterprise

These structural units include:

- departments of security and regime;

- the department in charge of information security;

- engineering and technical group;

- a group to ensure the safety of external activities.

What does each of these units do?

What is the security and regime department?

This is an independent structural unit of the security service, which is subordinate to its head. Its objectives are:

  1. Define a list of the information that makes up commercial and state secrets, and take measures to ensure their safety.
  2. Develop a system to prevent unauthorized access to such information, adopt appropriate instructions.
  3. Organize and maintain access control at the enterprise, passage of employees and various categories of visitors to separate zones accessible for this.
  4. Protect confidential (certified for this) premises.
  5. Personal protection of management and leading employees, ensure the safe transportation of documents and goods.
  6. Observe the situation both at and around the facility.
  7. Monitor the performance of any protection elements - both in everyday conditions and in the alleged special ones - in case of natural disaster, accident, breakdown, etc.
security service at the enterprise

Let's talk about the information protection department.

Its task is to organize and physically ensure the effective functioning of the entire system for protecting information. The department is working in the form of:

  1. Organization of special works for the protection of the enterprise, designed to protect important documentary materials.
  2. Development of automated systems for information processing and electronic document management.
  3. Distribution of the necessary protection details among users.
  4. Training of users of all automated systems for safe work with information.
  5. Taking measures to respond to attempts to malfunction the protective system.
  6. Testing the protective system and monitoring its performance.
  7. Elimination of defects in its design and improvement of security mechanisms.

What is the engineering team doing?

The main purpose of its creation is to ensure safety in the organization’s activities through the use of technical protective equipment. To do this, the group takes the following actions:

  1. The boundaries of the protected area or zone are determined and the capabilities of technical means for monitoring potential attackers are established.
  2. A list of technical means that can be used to work with confidential information (reception, transmission, processing) within the controlled area is established.
  3. A survey of the designated premises is carried out to establish possible channels for the leak of confidential information due to the peculiarities of the construction of equipment, buildings and used technical means.
  4. The degree of danger of such technical channels (through which information leakage is possible) is identified and evaluated.
  5. Measures are being developed for their localization and complete elimination using for this means both physical, hardware, and software nature, as well as mathematical methods.
protection of state enterprises

About the security group of external activities

Its employees develop and conduct special events aimed at studying the immediate environment of the object. We can talk about visitors, customers, competitors, etc. For this purpose, they:

  1. The situations of trade and market nature in the area of ​​activity of customers (partners, founders and potential competitors) are studied.
  2. The situation is analyzed according to the state and forecasting of all financial and trading activities, as well as those likely consequences that suggest the possibility of illegal actions by competitors.
  3. Information is collected and processed regarding the activities of real and potential competitors to prevent possible actions to steal protected information.
  4. The alleged nature and direction of industrial espionage directed against the enterprise is determined.
  5. Records and analysis of cases of unauthorized acquisition of trade secrets by competitors are kept.
  6. The solvency of individuals and legal entities is checked in the light of ensuring the timely fulfillment by them of their financial obligations.

The indicated standard structure of the enterprise security service is not universal and must be adjusted for each specific organization. It can be supplemented with new departments (for example, a fire safety department or a cargo escort group).

List of critical security tasks

What can be called the main functions inherent in the activities of any security service of an enterprise? Here is a sample list of them:

  1. To establish and suppress the circumstances of unfair competition of third-party enterprises. By such are understood the application for the purpose of competition of methods and means that violate current legislation or the rules of the relationship between competitors adopted on the market - false advertising, secret conspiracies in the bidding process, violation of standards for the supply of services and goods, etc.
  2. Collect information on those criminal cases to which the security service is connected. There are two categories of these: crimes against personnel and against the property of the founder. Examples of actions of the second group are robberies, thefts, arson and minor thefts.
instructions for the protection of the enterprise

Moreover:

  1. Investigate the facts about the disclosure of trade secrets.
  2. Collect information about those individuals with whom the company has contracts. There can be two types of such documents - commercial (contracts for the supply of goods or the provision of services) and labor related to permanent or temporary workers. Among the contractual conditions may be the written consent of the contracting person to collect information about his personal and biographical data.
  3. To find the lost property of the enterprise and investigate the facts of unlawful use of its company or trademarks.
  4. If necessary, look for employees who are missing. Such a search is carried out only if there is reason to believe that the absence of a missing employee is fraught with real or potential damage to the organization. In this case, the security service carries out a set of measures to search for the missing in close cooperation with the police.
  5. Identify partners recognized as insolvent and inform management in a timely manner.
  6. Detect unreliable counterparties. The reliability criterion of a business partner is determined by the large number of transactions with other companies that were torn down due to his fault, poor-quality fulfillment of the terms of the contracts, the presence of persons previously convicted in the staff, etc.
  7. Collect information on civil cases in case of possible interaction at the court hearings. The need for such collection of information may arise in the event of the discovery of new documents and witnesses, verification of the authenticity of the evidence provided in court, assistance to the authorities in the actual search for participants in the process or the property of the opposing party claimed for compensation for damage, etc.
  8. Collect information required for business negotiations. This may include information about the strengths and weaknesses of the positions and plans of potential partners, their competitiveness and solvency. The security service should provide for possible attempts to bribe or blackmail by negotiators and other unexpected actions.
  9. Protect the health and life of personnel from any offenses of an unlawful nature. Such protection can be organized in relation to either all personnel during working hours, or to certain categories - cashiers, managers, etc. The duration of this protection function is clearly defined (day, round-the-clock, etc.)

The most important goals of the guard are, first of all, to prevent or stop violent crimes (racketeering, attempted murder, etc.), as well as administrative offenses in the form of, for example, petty hooliganism regarding a protected category of persons. For this, protective equipment of a technical nature is widely used.

Also follows:

  1. Protect the property of the organization.
  2. Ensure order in those places where the company holds events of a representative, confidential or mass nature.
  3. Advise staff and management on all matters relating to the safety and security of the enterprise.
  4. Design, install and maintain facilities related to the fire alarm system.

Source: https://habr.com/ru/post/B2763/


All Articles