BS ISO 18788:2015+A1:2024
$215.11
Management system for private security operations. Requirements with guidance for use
Published By | Publication Date | Number of Pages |
BSI | 2024 | 112 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
7 | Foreword |
8 | Introduction |
13 | 1 Scope |
14 | 2 Normative references 3 Terms and definitions |
26 | 4 Context of the organization 4.1 Understanding the organization and its context 4.1.1 General 4.1.2 Internal context 4.1.3 External context |
27 | 4.1.4 Supply chain and subcontractor mapping and analysis 4.1.5 Defining risk criteria 4.2 Understanding the needs and expectations of stakeholders |
28 | 4.3 Determining the scope of the security operations management system 4.4 Security operations management system |
29 | 5 Leadership 5.1 Leadership and commitment 5.1.1 General 5.1.2 Statement of Conformance |
30 | 5.2 Policy 5.3 Organization roles, responsibilities and authorities |
31 | 6 Planning 6.1 Actions to address risks and opportunities 6.1.1 General |
32 | 6.1.2 Legal and other requirements 6.1.3 Internal and external risk communication and consultation |
33 | 6.2 Security operations objectives and planning to achieve them 6.2.1 General |
34 | 6.2.2 Achieving security operations and risk treatment objectives 7 Support 7.1 Resources 7.1.1 General |
35 | 7.1.2 Structural requirements |
36 | 7.2 Competence 7.2.1 General 7.2.2 Competency identification |
37 | 7.2.3 Training and competence evaluation 7.2.4 Documentation 7.3 Awareness 7.4 Communication 7.4.1 General |
38 | 7.4.2 Operational communications 7.4.3 Risk communications 7.4.4 Communicating complaint and grievance procedures 7.4.5 Communicating whistle-blower policy |
39 | 7.5 Documented information 7.5.1 General 7.5.2 Creating and updating |
40 | 7.5.3 Control of documented information |
41 | 8 Operation 8.1 Operational planning and control 8.1.1 General |
42 | 8.1.2 Performance of security-related functions 8.1.3 Respect for human rights 8.1.4 Prevention and management of undesirable or disruptive events 8.2 Establishing norms of behaviour and codes of ethical conduct 8.3 Use of force 8.3.1 General |
43 | 8.3.2 Weapons authorization 8.3.3 Use of force continuum |
44 | 8.3.4 Less-lethal force 8.3.5 Lethal force 8.3.6 Use of force in support of law enforcement |
45 | 8.3.7 Use of force training 8.4 Apprehension and search 8.4.1 Apprehension of persons 8.4.2 Search 8.5 Operations in support of law enforcement 8.5.1 Law enforcement support |
46 | 8.5.2 Detention operations 8.6 Resources, roles, responsibility and authority 8.6.1 General 8.6.2 Personnel |
48 | 8.6.3 Procurement and management of weapons, hazardous materials and munitions 8.6.4 Uniforms and markings 8.7 Occupational health and safety 8.8 Incident management 8.8.1 General |
49 | 8.8.2 Incident monitoring, reporting and investigations 8.8.3 Internal and external complaint and grievance procedures |
50 | 8.8.4 Whistle-blower policy 9 Performance evaluation 9.1 Monitoring, measurement, analysis and evaluation 9.1.1 General |
51 | 9.1.2 Evaluation of compliance 9.1.3 Exercises and testing 9.2 Internal audit |
52 | 9.3 Management review 9.3.1 General 9.3.2 Review input |
53 | 9.3.3 Review output 10 Improvement 10.1 Nonconformity and corrective action |
54 | 10.2 Continual improvement 10.2.1 General 10.2.2 Change management 10.2.3 Opportunities for improvement |
55 | Annex A (informative) Guidance on the use of this International Standard |
101 | Annex B (informative) General principles |
104 | Annex C (informative) Getting started – Gap analysis |
105 | Annex D (informative) Management systems approach |
108 | Annex E (informative) Qualifiers to application |
109 | Bibliography |