Iosa checklist security management (sec)



Download 327.46 Kb.
Page5/5
Date02.02.2017
Size327.46 Kb.
#16073
1   2   3   4   5



 



SEC 3.7.3 If the Operator transports revenue or non-revenue cargo and/or mail on passenger flights, the Operator shall have processes to ensure cargo and/or mail for transport on passenger flights is protected from unauthorized interference from the point security screening or other security controls are applied, or from the point of acceptance after screening or security controls already have been applied, until departure of the aircraft. (GM)


Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)

N/A


Auditor Comments:
     

When cargo and/or mail has been screened by a regulated agent or known shipper/consignor prior to acceptance by the operator, the operator, among other protective actions, would typically examine the documentation and check the shipment for evidence of tampering prior to loading onto the aircraft.





 


SEC 3.7.4 If the Operator transports revenue cargo and/or mail on passenger flights, and if the Operator accepts such cargo and/or mail from a regulated agent or known shipper/consignor, the Operator shall have a process to ensure cargo and/or mail is not accepted for transport on a passenger flight unless:

  1. Shipments have been subjected to appropriate security controls through a known shipper/consignor program or by the Operator, and thus have become known cargo;

  2. The application of security controls has been confirmed or accounted for by the Operator or a regulated agent.

Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)

N/A


Auditor Comments:
     

Refer to the IRM for the definitions of Known Cargo and Unknown Cargo.
States typically determine what constitutes “appropriate security controls.” Some states may not permit acceptance of cargo or mail from other than regulated agents and/or known shippers/consignors.
As part of its Security Program, an operator may consider a cargo shipment accepted from a regulated agent and/or known shipper/consignor as meeting required security provisions unless such shipment is identified as unknown cargo.
Additional guidance may be found in the IATA Security Manual.

 



SEC 3.7.5 If the Operator accepts revenue cargo and/or mail from a regulated agent for transport on passenger flights, the Operator shall have a process to ensure cargo and/or mail for transport on such flights is accepted only from a regulated agent that is approved by the relevant state(s), regulatory authority(ies) or designee(s).


Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)

N/A


Auditor Comments:
     

 

SEC 3.7.6 If the Operator accepts unknown cargo for transport on passenger flights, the Operator shall have a process to ensure the application of appropriate security controls as required by the applicable state. (GM)





Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)

N/A


Auditor Comments:
     

ICAO requirements specify that cargo and mail is to be accounted for by a regulated agent program or be subjected to appropriate security controls. Individual states determine what constitutes “appropriate security controls.” Some states may not permit acceptance of cargo or mail from other than regulated agents/known consignors.
Additional guidance may be found in the IATA Security Manual.

 

SEC 3.7.7 If the Operator transports revenue or non-revenue cargo and/or mail on passenger flights, and if the Operator accepts cargo and/or mail where cargo security is not accounted for through a regulated agent and/or known shipper/consignor program, the Operator shall have a process to ensure cargo and/or mail shipments transported on a passenger flight are subjected to the application of appropriate security controls to make the shipments known cargo and:


  1. The application of security controls is confirmed and accounted for by the Operator;

  2. Security controls are in compliance with:

    1. The state where such shipments are accepted;

    2. Other states with requirements applicable to such shipments. (GM)




Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)

N/A


Auditor Comments:
     

It is recommended that consideration be given to implementation of a cargo security regime that meets or exceeds the recommendations of IATA Cargo Services Conference (CSC) RP 1630 and/or the IATA Security Manual.

ICAO requirements specify that cargo and mail is to be accounted for through a regulated agent or known shipper/consignor program or subjected to appropriate security controls. Individual states determine what constitutes “appropriate security controls.” Some states do not require implementation of a regulated agent or known shipper/consignor program. Ideally, an operator would have a program in place that is consistent with recommendations contained in IATA CSC RP 1630 and/or the IATA Security Manual.

Typically, screening is the preferred type of security controls applied to cargo shipments.





 

SEC 3.7.9 If the Operator transports revenue or non-revenue cargo on passenger flights, the Operator shall have a process to ensure known cargo shipments for transport on a such flights are:


  1. Delivered by a nominated person of the known shipper/consignor, regulated agent or the Operator;

  2. Free from any signs of tampering;

  3. Presented with all required information (paper or electronic) that corresponds to the cargo being delivered;

  4. Subjected to additional security controls as required by risk assessment. (GM)

Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)

N/A


Auditor Comments:
     

The IATA Security Manual outlines specific provisions covering the basic acceptance of all known cargo to be carried on commercial passenger flights.

The CSC RP 1630 contains guidance related to the required information and a standard consignment security declaration in paper and electronic format.

Known cargo, when presented to an operator for transport on an aircraft, has by definition been subjected to appropriate security controls by a regulated agent, operator or known shipper/consignor. An operator, as a minimum, implements the steps specified in this provision to maintain or protect the “known” status of the shipment from the time the shipment is accepted until it is finally loaded into an aircraft.

If for some reason a shipment is not properly maintained or protected in its known status, the shipment then reverts to unknown cargo. In such case, the operator, in order to return the shipment to known cargo status, would have to ensure the shipment is again subjected to the appropriate security controls.





 

SEC 3.8.1 If the Operator conducts passenger flights, the Operator shall have a process to ensure in-flight, catering and/or other supplies intended for transport on a passenger flight are subjected to appropriate security controls as established by the appropriate state, and are thereafter protected from unauthorized interference until loaded onto the aircraft. (GM)


Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)

N/A


Auditor Comments:
     

Catering supplies are frequently prepared by an external service provider at an off-airport location.
Additional guidance may be found in the IATA Security Manual.


SEC 3.9.2 The Operator shall have a process to ensure merchandise and supplies introduced into security restricted areas are subject to appropriate security controls, which may include screening. (GM)

Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)

N/A


Auditor Comments:
     

Protection measures might include sealing, visual monitoring or any other method that will detect or physically prevent unauthorized interference.



 


Security Threat and Contingency Management



SEC 4.1.1 The Operator shall have a process to identify security threats directed against the Operator, to include:

i) Assessment of associated risks;

ii) Development of appropriate response measures. (GM)


Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)

N/A


Auditor Comments:
     

Procedures would typically include instructions for communicating security threats to persons responsible for making decisions and taking action, as well as providing advice to the flight crew. Means of communication and details of telephone numbers, emergency radio channels and contact persons would be readily available to ensure a response to threats without delay.




SEC 4.1.2 The Operator shall have a process to ensure the implementation of appropriate security measures in response to:

i) Security threats directed against the Operator;

ii) Threat levels issued by applicable aviation security authorities. (GM)


Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)

N/A


Auditor Comments:
     

The contingency plan for response to an increased threat to operations is included in the Security Program.
An assessment of increased threat could come from the authorities or from an operator's own threat assessment process.
Procedures typically set out the increase in security measures appropriate to counter a situation of increased threat, as well as methods used to communicate any changes in threat level to the flight crew, operational personnel, management and overseas stations. There is also normally a verification process to ensure required measures have been implemented without delay.

 



SEC 4.2.1 The Operator shall have a contingency plan that provides for a comprehensive and managed response to aviation security incidents. (GM)

Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)

N/A


Auditor Comments:
     

The primary objective of a contingency plan is the protection of life and property and the resumption of normal operations. The secondary objective is investigation to determine if the crisis was an accident or a crime; the latter typically requires those found responsible to be taken into custody.

 



SEC 4.3.1 The Operator shall have a process for the investigation of incidents involving:

  1. Threats or acts of unlawful interference;

  2. Failure of implementation of security controls under the responsibility of the Operator.




Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)

N/A


Auditor Comments:
     



SEC 4.3. The Operator shall have a process that ensures notification to the applicable aviation security authorities when an act of unlawful interference against the Operator has occurred. (GM)



Documented and Implemented (Conformity)

Documented not Implemented (Finding)

Implemented not Documented (Finding)

Not Documented not Implemented (Finding)



N/A

Auditor Comments:
     

Procedures are in place to immediately notify local security and civil aviation authorities and to provide information relevant to threats and events of unlawful interference. Contact information and checklists for this purpose are readily available.
Procedures typically specify an initial verbal notification followed by a written notification.



IOSA ISM Ed 6 SEC -



Download 327.46 Kb.

Share with your friends:
1   2   3   4   5




The database is protected by copyright ©ininet.org 2024
send message

    Main page