Buch, Englisch, 28 Seiten, Format (B × H): 295 mm x 209 mm, Gewicht: 156 g
Procuring an Effective Facility Protective Security System
Buch, Englisch, 28 Seiten, Format (B × H): 295 mm x 209 mm, Gewicht: 156 g
ISBN: 978-1-84806-433-1
Verlag: IHS BRE Press
Buildings protect what is important to us and given that there will always be threats to building security, there is a need to deploy appropriate and proportionate protective security to protect people and assets from losses.
This guide, written for the procurement team, discusses the importance of establishing security objectives at the outset of a new project and the need for close collaboration between project team members and security advisers. It describes: - facility planning and design of a protective security system- how to integrate an effective protective security system into the procurement process for new building projects- key security tasks, information exchanges, and security roles and responsibilities- the need to protect information relating to buildings and their security, especially as the industry adopts BIM for procurement and asset management efficiencies.
The importance of testing, evaluating and reviewing security system performance to ensure the system remains fit for purpose through the life of the facility is highlighted.
Zielgruppe
Professional and Professional Practice & Development
Autoren/Hrsg.
Weitere Infos & Material
1. Introduction. 2. Background - Facility protective security; Why is security so important?; Setting protective security objectives; Summary. 3. Facility planning and design: a foundation for effective protective security - Examples of good planning and design. 4. Protective security design - What does ‘good’ protective security look like?; Adopting a performance-based approach and system-level thinking; Measuring security risk (R); Assessing the threat (T); Assessing vulnerability (V); Assessing consequences (C). 5. The procurement process: an integrated approach - Procurement process overview; Asking the right questions; Security tasks and information exchanges: stage-by-stage commentary. 6. System testing and evaluation. 7. Key messages. 8. References and further information.