Hotels and Restaurants.pdf

(2082 KB) Pobierz
Counter Terrorism Protective
Security Advice
for Hotels and Restaurants
produced by
NaCTSO
National Counter Terrorism Security Office
1148132927.015.png 1148132927.016.png 1148132927.017.png 1148132927.018.png 1148132927.001.png 1148132927.002.png 1148132927.003.png 1148132927.004.png 1148132927.005.png 1148132927.006.png 1148132927.007.png 1148132927.008.png
foreword
NaCTSO
National Counter Terrorism Security Office
The National Counter Terrorism Security Office (NaCTSO), on behalf of the Association of Chief
Police Officers, Terrorism and Allied Matters (ACPO TAM), works in partnership with the
Security Service to reduce the impact of terrorism in the United Kingdom by:
• Protecting the UK’s most vulnerable and valuable sites and assets.
• Enhancing the UK’s resilience to terrorist attack.
• Delivering protective security advice across the crowded places sectors.
NaCTSO aims to:
• Raise awareness of the terrorist threat and the measures that can be taken to reduce risks and
mitigate the effects of an attack.
• Co-ordinate national service delivery of protective security advice through the CTSA network and
monitor its effectiveness.
• Build and extend partnerships with communities, police and government stakeholders.
• Contribute to the development of CT policy and advice.
1
 
1148132927.009.png 1148132927.010.png 1148132927.011.png
2
1148132927.012.png
contents
1.
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.
Managing the Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.
Security Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.
Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.
Good Housekeeping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
6.
Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
7.
CCTV Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
8.
Mail Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
9.
Search Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
10.
Evacuation Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
11.
Personnel Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
12.
Information Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39
13. Vehicle Borne Improvised Explosive Devices (VBIEDs) . . . . . . . . . . . . . . . . . . . . . . . . . 43
14.
Chemical, Biological and Radiological (CBR) Attacks . . . . . . . . . . . . . . . . . . . . . . . . . .45
15. Suicide Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
16. Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
17. Hostile Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
18. High Profile Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
19.
Threat Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
APPENDIX ‘A’ Housekeeping Good Practice Checklist . . . . . . . . . . . . . . . . . . . . . . . . . 59
APPENDIX ‘B’ Access Control Good Practice Checklist . . . . . . . . . . . . . . . . . . . . . . . . 60
APPENDIX ‘C’ CCTV Good Practice Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
APPENDIX ‘D’ Searching Good Practice Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
APPENDIX ‘E’ Personnel Security Good Practice Checklist . . . . . . . . . . . . . . . . . . . . . . 63
APPENDIX ‘F’ Information Security Good Practice Checklist . . . . . . . . . . . . . . . . . . . . .64
APPENDIX ‘G’ Communication Good Practice Checklist . . . . . . . . . . . . . . . . . . . . . . . 65
Checklist Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Bomb Threat Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Useful Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Contacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
3
 
1148132927.013.png
4
1148132927.014.png
Zgłoś jeśli naruszono regulamin