RiskUKOctober2017
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Mail Room Security Management: Systems and Procedures<br />
Following on from the recent powder and<br />
Improvised Explosive Device (IED) attacks<br />
on Government and religious<br />
establishments, mail room security has now<br />
become one of the biggest challenges facing<br />
heads of risk and security. Indeed, any of the<br />
regular readers of Risk UK may be surprised to<br />
learn that suspected IEDs and other suspect<br />
packages are regularly discovered in the UK.<br />
As the methods by which suspect packages<br />
might be delivered are changing every day, it’s<br />
also very easy for organisations to become<br />
complacent in relation to their daily mail room<br />
operations. With effective training and the use<br />
of scanning devices, mail room operatives are<br />
the first line of defence against postal threats.<br />
Regularly reviewing and updating mail room<br />
security and personnel training should become<br />
a normal part of security planning for any large<br />
organisation, but what steps need to be taken?<br />
The first step for any business looking to<br />
secure its mail room is to undertake a threat<br />
assessment. That detailed assessment should<br />
begin by examining all current processes and<br />
equipment and identifying specifically how the<br />
organisation will combat any potential postal<br />
threats. Conducted on a regular basis, this<br />
process will ensure the business remains on<br />
the front foot and prepared for any evolving<br />
security threats.<br />
The threat assessment should examine risk<br />
at entry to the building and how visitors are<br />
screened and bags searched at this juncture.<br />
How post is delivered, the physical location of<br />
the mail room and pinpointing any potential<br />
surrounding threats that may be business<br />
critical are further considerations.<br />
Rather than a single point of entry, we often<br />
find that there are multiple points of entry for<br />
post in a building (for example, Royal Mail and<br />
courier deliveries into a loading bay and handdelivered<br />
items through reception). These<br />
access points – and the security level required<br />
at each of them – must be considered as part of<br />
the overall threat assessment.<br />
Organisations should then look at how they<br />
identify and handle each type of specific<br />
security threat. Current known threats include<br />
chemical or biological agents in powder or<br />
liquid form, as well as explosives and items<br />
deliberately designed to inflict physical and<br />
psychological harm.<br />
In addition, the location of the mail room and<br />
any critical services, such as computer servers<br />
or utilities, as well as any neighbouring<br />
personnel should be considered. If they’re<br />
within any potential blast area, changes may be<br />
required to ensure that any attack or<br />
detonation would have the minimum possible<br />
Signed, Sealed, Delivered<br />
Would your members of staff know precisely what to do if a<br />
situation should arise whereby a suspect package is found in<br />
the company’s building? Jason Wakefield shares his insights<br />
on this hugely important topic, explains the risks faced by<br />
today’s Mail Room operations and evaluates in detail how to<br />
effectively address them<br />
effect on the business and that the area<br />
affected can be closed off safely with ease.<br />
Containment issues<br />
Following the threat assessment,<br />
recommendations and an action plan should be<br />
produced detailing all required security<br />
measures, including what to do if a suspect<br />
package, weapons, powders or explosives<br />
should be found. This affords a thorough<br />
understanding of the threats and how to<br />
protect the building and the people within it.<br />
Full procedures with actions on finding<br />
suspect devices should be written, practised<br />
and updated on a regular basis such that<br />
operators and security staff know exactly what<br />
to do if a suspect device should be found.<br />
Following a threat assessment, many<br />
organisations will decide to invest in or<br />
upgrade the mail room scanning technology<br />
they have at their disposal. If an organisation<br />
currently owns an x-ray scanning machine that’s<br />
over eight years old, the chances are this<br />
machine will be inadequate for dealing with the<br />
advancing capabilities of today’s terror threats.<br />
There are various types of machine available<br />
to consider from a variety of manufacturers, but<br />
Jason Wakefield: Sales<br />
Director at Todd Research<br />
53<br />
www.risk-uk.com