Preview

Ship Security Plan

Powerful Essays
Open Document
Open Document
9286 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ship Security Plan
SHIP SECURITY PLAN

Version 1.0
January 2003

SHIP NAME
Company
Address
{Ship security plans should be plainly marked to warn personnel having access to the plan that it needs to be protected and should not be released.}

Ship Security Plan

Confidential

[SHIP NAME] Security Plan
Revision Record
Revision
Number

Name/Rank of Person
Making the Revision

Date of Revision

ii

Signature

Ship Security Plan

Confidential

INDEX
SECTION 1 INTRODUCTION AND PURPOSE

1

SECTION 2 DEFINITIONS

2

SECTION 3 SHIP OPERATOR AND VESSEL DETAILS

3

SECTION 4 SECURITY POLICIES

4

SECTION 5 SHIP ACCESS POINTS

9

SECTION 6 PERSONNEL IDENTIFICATION / VISITOR CONTROL /
CREW RECRUITMENT

11

SECTION 7 SECURITY EQUIPMENT

15

SECTION 8 COMMUNICATIONS

17

SECTION 9 RESTRICTED AREAS

19

SECTION 10 REPORT ON AN UNLAWFUL ACT

21

SECTION 11 SPECIFIC SECURITY ACTIONS TO BE IMPLEMENTED BASED ON THE
SECURITY LEVEL

23

SECTION 12 SCREENING FOR WEAPONS, INCENDIARIES AND EXPLOSIVES

26

SECTION 13 GANGWAY AND GANGWAY CONTROL

27

SECTION 14 CONTINGENCY PROCEDURES

30

iii

Ship Security Plan

Confidential

SECTION 1
INTRODUCTION AND PURPOSE
1.1

Purpose and Regulatory Basis

The purpose of this Ship Security Plan (SSP) is to contribute to the prevention of illegal acts against the ship, its crew, and passengers. It has been prepared in accordance with:


Chapter XI-2 of SOLAS and the International Ship and Port Security Code



The ABS Ship Security Guide



{Note: Here the plan should list any specific flag state or port state regulatory requirements that the ship plan is designed to meet.}

1.2

Plan Documentation and Control

Authorized copies of this SSP must be controlled so all authorized holders of the plan have the current revision. The Ship Security Officer (SSO) is responsible for issuing revisions to this plan, after the revisions have been approved

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bieg 6b-2

    • 1297 Words
    • 6 Pages

    | 22222 | Void | a Employee’s social security | For Official Use Only |…

    • 1297 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this Multi-Layered Security Plan, I will provide information on how to better improve the security of each domain and protect the data of Richman Investments. We shall secure all ports for incoming and outgoing traffic, only allowing the information that is needed through certain ports and to conduct business fast and efficiently. We will also be using the latest and most updated firewall protection and anti-virus software to add a better degree of security. This will be implemented throughout the entire company and we will inform all employees of this MLS plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Kong ships are not required to pay any tax on profits made overseas and are also…

    • 264 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hansa vs Swahili

    • 346 Words
    • 2 Pages

    armed ships will be set up ay sea ports and this is to be in effect…

    • 346 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    ISA 650 Final Exam Paper

    • 4435 Words
    • 18 Pages

    73. Requires the creation of computer security plans, and the appropriate training of system users or…

    • 4435 Words
    • 18 Pages
    Satisfactory Essays
  • Good Essays

    Sop Example

    • 502 Words
    • 3 Pages

    You will apply a TOP SECRET classification to an SOP in which the unauthorized disclosure of its contents could reasonably be expected to cause exceptionally grave damage to the nation’s national security…

    • 502 Words
    • 3 Pages
    Good Essays
  • Better Essays

    References: Ortmeier, P.J. 2009. Introduction to Security: Operations and Management. (3rd ed). Upper Saddle River, N.J.: Pearson Prentice Hall…

    • 1495 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Ortmeier, P. (2009). Introduction to security: Operations and management (3rd ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.…

    • 1225 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Mgm365 Phase 1 Ip

    • 996 Words
    • 4 Pages

    Most of us have either taken or wanted to take a vacation on a cruise ship. For the most part we don’t ever really think about the legality of any crimes at sea. How safe are you and your belongings on a cruise ship? In fact, Alexander Anolik, a lawyer, based in San Francisco, specializing in travel law, states ships try to handle crimes internally and reports taken on the ship are not always reported to the proper authorities. (Elliott, 2006) So there may not be any valid statistics for the average vacationer to even look at. Whose responsibility is it to make these customers aware of the laws at sea? As the Vice President of Risk Management for International Industries, it is important to mitigate the risks associated with crimes at sea by ensuring we have sufficient plans and controls in place.…

    • 996 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Shipman2009

    • 21870 Words
    • 88 Pages

    The following table sets out a comparison between the text of SHIPMAN 2009 and SHIPMAN 98. The clauses of each agreement are laid out side by side to indicate…

    • 21870 Words
    • 88 Pages
    Powerful Essays
  • Good Essays

    Jad Session

    • 369 Words
    • 2 Pages

    Control: The system must operate with existing employee ID's and apply the principle of least privilege security.…

    • 369 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    America (”Plan”), OR, if Registrant has a primary business in another country, complete the information below:…

    • 3510 Words
    • 29 Pages
    Powerful Essays
  • Satisfactory Essays

    Logistics Plan

    • 353 Words
    • 2 Pages

    This is the implementation phase of the key start-up actions of the logistics plan. The logistics system needs to be designed to provide the ILMS which will execute the logistics plan. It is this ILMS which will work in a coordinated manner to execute the logistics plan developed in response to the business operations strategy and CS goals.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays

Related Topics