fbpx

CIMSNex User Guides

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

8.5.1 Law Enforcement Support Procedures

This section outlines the procedures for providing support to law enforcement operations when specifically authorized. Here are the key components:

  1. Authorization and Compliance:

    • The organization shall only engage in law enforcement operations when authorized to do so by the relevant state's law enforcement or controlling military authority. These operations must strictly adhere to applicable and relevant laws and regulations.

  2. Uniforms and Vehicle Markings:

    • Procedures shall be developed to ensure that the organization's personnel use uniforms and vehicle markings as directed by the relevant law enforcement or controlling military authority. This helps clearly identify them as authorized support for law enforcement activities.

  3. Rendering Assistance and Medical Aid:

    • Procedures should detail how the organization will provide assistance and medical aid to any injured or affected persons during law enforcement operations. This ensures the safety and well-being of individuals involved.

  4. Incident Reporting:

    • The organization shall establish procedures for promptly reporting any incidents of injury or death resulting from the use of force and firearms during law enforcement activities. Reports should be made to both law enforcement authorities and the organization's supervisory personnel.

  5. Notification:

    • If known, the organization should notify the supported law enforcement authorities of the names of persons injured or otherwise affected by the organization's law enforcement activities.

These procedures ensure that the organization's support for law enforcement operations is conducted in a lawful, transparent, and accountable manner, with a focus on safety and compliance with regulations.

 

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

8.6.1 Resource Management and Team Establishment

This section emphasizes the importance of resource management and the establishment of teams to effectively manage security operations and respond to disruptive or undesirable events. Here's a detailed breakdown:

  1. Resource Availability:

Top management is responsible for ensuring the availability of essential resources to establish, implement, maintain, and improve the Security Operations Management System (SOMS). These resources encompass the following:

  • Information: Necessary data and knowledge required for security operations management.
  • Management Tools: Tools and systems to support effective management.
  • Human Resources: Skilled personnel with specialized knowledge and expertise.
  • Financial Support: Adequate financial resources to support security operations management.
  1. Roles, Responsibilities, and Authorities:

Roles, responsibilities, and authorities within the organization must be clearly defined, documented, and communicated. This clarity facilitates effective security operations management, including control, coordination, and supervision. Additionally, a defined line of succession should be established for continuity in case of role changes.

  1. Establishment of Teams:

To handle disruptive and undesirable events effectively, the organization must establish planning, security, incident management, response, and/or recovery teams. These teams should have the following characteristics:

  • Defined Roles: Each team member's responsibilities and roles should be well-defined.
  • Appropriate Authority: Team members should have the necessary authority to make decisions.
  • Adequate Resources: Teams should have access to the required resources, including effective and safe equipment.
  • Rehearsed Plans and Procedures: Operational plans and procedures should be rehearsed and well-understood by team members.
  1. Subcontracting or Outsourcing:

If the organization chooses to subcontract or outsource any process that impacts compliance with this International Standard, it must ensure that these processes are controlled. This control ensures that the outsourced activities align with the organization's security operations management requirements.

By addressing these aspects, organizations can better manage their resources, establish effective teams, and ensure control over outsourced processes, all contributing to the successful implementation of the Security Operations Management System (SOMS).

 

Image
SIMPLIFYING IMPLEMENTATION OF ISO STANDARDS, providing specialized guidance through reliable Expert Knowledge and Software to help you obtain and maintain your ISO certification.
ISO Compliance Software
Integrate . Mantain . Comply

Search