11.10.2017 Views

RiskUKOctober2017

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Mail Room Security Management: Systems and Procedures<br />

Following on from the recent powder and<br />

Improvised Explosive Device (IED) attacks<br />

on Government and religious<br />

establishments, mail room security has now<br />

become one of the biggest challenges facing<br />

heads of risk and security. Indeed, any of the<br />

regular readers of Risk UK may be surprised to<br />

learn that suspected IEDs and other suspect<br />

packages are regularly discovered in the UK.<br />

As the methods by which suspect packages<br />

might be delivered are changing every day, it’s<br />

also very easy for organisations to become<br />

complacent in relation to their daily mail room<br />

operations. With effective training and the use<br />

of scanning devices, mail room operatives are<br />

the first line of defence against postal threats.<br />

Regularly reviewing and updating mail room<br />

security and personnel training should become<br />

a normal part of security planning for any large<br />

organisation, but what steps need to be taken?<br />

The first step for any business looking to<br />

secure its mail room is to undertake a threat<br />

assessment. That detailed assessment should<br />

begin by examining all current processes and<br />

equipment and identifying specifically how the<br />

organisation will combat any potential postal<br />

threats. Conducted on a regular basis, this<br />

process will ensure the business remains on<br />

the front foot and prepared for any evolving<br />

security threats.<br />

The threat assessment should examine risk<br />

at entry to the building and how visitors are<br />

screened and bags searched at this juncture.<br />

How post is delivered, the physical location of<br />

the mail room and pinpointing any potential<br />

surrounding threats that may be business<br />

critical are further considerations.<br />

Rather than a single point of entry, we often<br />

find that there are multiple points of entry for<br />

post in a building (for example, Royal Mail and<br />

courier deliveries into a loading bay and handdelivered<br />

items through reception). These<br />

access points – and the security level required<br />

at each of them – must be considered as part of<br />

the overall threat assessment.<br />

Organisations should then look at how they<br />

identify and handle each type of specific<br />

security threat. Current known threats include<br />

chemical or biological agents in powder or<br />

liquid form, as well as explosives and items<br />

deliberately designed to inflict physical and<br />

psychological harm.<br />

In addition, the location of the mail room and<br />

any critical services, such as computer servers<br />

or utilities, as well as any neighbouring<br />

personnel should be considered. If they’re<br />

within any potential blast area, changes may be<br />

required to ensure that any attack or<br />

detonation would have the minimum possible<br />

Signed, Sealed, Delivered<br />

Would your members of staff know precisely what to do if a<br />

situation should arise whereby a suspect package is found in<br />

the company’s building? Jason Wakefield shares his insights<br />

on this hugely important topic, explains the risks faced by<br />

today’s Mail Room operations and evaluates in detail how to<br />

effectively address them<br />

effect on the business and that the area<br />

affected can be closed off safely with ease.<br />

Containment issues<br />

Following the threat assessment,<br />

recommendations and an action plan should be<br />

produced detailing all required security<br />

measures, including what to do if a suspect<br />

package, weapons, powders or explosives<br />

should be found. This affords a thorough<br />

understanding of the threats and how to<br />

protect the building and the people within it.<br />

Full procedures with actions on finding<br />

suspect devices should be written, practised<br />

and updated on a regular basis such that<br />

operators and security staff know exactly what<br />

to do if a suspect device should be found.<br />

Following a threat assessment, many<br />

organisations will decide to invest in or<br />

upgrade the mail room scanning technology<br />

they have at their disposal. If an organisation<br />

currently owns an x-ray scanning machine that’s<br />

over eight years old, the chances are this<br />

machine will be inadequate for dealing with the<br />

advancing capabilities of today’s terror threats.<br />

There are various types of machine available<br />

to consider from a variety of manufacturers, but<br />

Jason Wakefield: Sales<br />

Director at Todd Research<br />

53<br />

www.risk-uk.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!