11.10.2017 Views

RiskUKOctober2017

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Mail Room Security Management: Systems and Procedures<br />

essentially there are two types, specifically<br />

conveyors and cabinets.<br />

A conveyor machine is similar to those seen<br />

at any airport used to scan hand luggage. It’s<br />

an effective scanner for when the flow of mail is<br />

constant and there are many large packages<br />

entering the business.<br />

Many of today’s conveyors have useful<br />

additional optional software options that<br />

should be considered, such as Advanced<br />

Detection Software (ADS) and Threat Image<br />

Projection (TIP). The former is advanced<br />

algorithm software that works by identifying<br />

the atomic number in explosive substances and<br />

contraband. Explosives are highlighted to the<br />

operator within a red box and contraband<br />

within a yellow box, making it easier for the x-<br />

ray machine user to identify potentially<br />

dangerous or banned substances.<br />

TIP technology is useful for quality control,<br />

risk analysis and the assessment of individual<br />

screener performance. It can show screeners<br />

artificial, but realistic x-ray images of threats<br />

during a routine baggage x-ray screening<br />

operation in order to aid and also test their<br />

security threat identification skills.<br />

Cabinet scanners<br />

Cabinet scanners are now also proving popular<br />

with many end user organisations because they<br />

create a lower carbon footprint and cost 50%<br />

less than a conveyor machine. As if to<br />

emphasise their popularity, every British<br />

Embassy across the world currently uses a<br />

cabinet scanner for security purposes.<br />

These scanners are operated by opening the<br />

chamber door and placing inside the items to<br />

be scanned. A single push-button operation<br />

then generates an image. Once the image has<br />

been generated, the advanced feature<br />

operating software makes the identification of<br />

suspect items easier.<br />

These advanced features can include<br />

Enhanced Powder Detection for the ease of<br />

identifying powders such as anthrax or ricin, as<br />

well as an e-mail facility to send the picture of a<br />

suspect package to a third party for<br />

assessment. Other useful advanced features<br />

can include zoom control, density alerts and<br />

three-point colour, all of which have been<br />

designed to help the user easily identify what’s<br />

inside the package they’re scanning.<br />

“The threat assessment should examine risk at entry to the<br />

building and how visitors are screened and bags searched<br />

at this juncture. How post is delivered and the physical<br />

location of the mail room are further considerations”<br />

Once any new scanning equipment is in<br />

place, it should be regularly reviewed as part of<br />

an ongoing threat assessment process to<br />

ensure that it’s maintained and upgraded to<br />

counter any new threats as required. Scanning<br />

operators should also be tested and training<br />

invested in to ensure that they’re up-to-date<br />

with all the latest security Best Practice. Often,<br />

the leading scanning machine providers will<br />

include introductory training for operators as<br />

part of the package when equipment is bought.<br />

Business continuity<br />

Once the assessment and action plan has been<br />

put into place, organisations should then look<br />

to consider the safety, information and<br />

business continuity implications.<br />

For example, it’s important that organisations<br />

achieve and maintain full Ionising Radiations<br />

Regulations 1999 (IRR99) compliance for staff<br />

using x-ray scanning security equipment. This<br />

document is aimed at the protection of the<br />

public and the health of those staff who work<br />

with ionising radiations and points directly at<br />

those employers with duties under IRR99.<br />

Organisations using x-ray security scanning<br />

machinery fall under these regulations.<br />

The organisation should also put in place<br />

mechanisms to ensure that all security staff are<br />

kept up-to-date with all current terror threats<br />

by following the countrywide alert status set by<br />

MI5. They should be aware of the location and<br />

contact details for the regional Counter-<br />

Terrorism Security Advisor should that person’s<br />

assistance be required. An overview of groups<br />

that may wish to target the organisation can be<br />

identified. In addition, it’s important to consider<br />

the lone activist, the disgruntled employee or<br />

customers with a grudge.<br />

A reporting schedule will need to be put into<br />

place, recording any mail attacks and tracking<br />

current trends and methods used by individuals<br />

or groups which can also be used as a staff<br />

training tool.<br />

Finally, the host organisation should make an<br />

assessment and ensure that it could still<br />

operate effectively if the mail room area had to<br />

be evacuated because of a security threat. This<br />

can be achieved by identifying and/or<br />

establishing a co-location either on another site<br />

or in a different part of the building.<br />

Implementing and continually checking on<br />

security measures for an organisation’s mail<br />

room can be a challenging task. As a result,<br />

many choose to work with professional security<br />

organisations to carry out some or all the tasks<br />

identified. There’s no simple answer as to which<br />

course your organisation should take, but help<br />

is at hand should assistance be required.<br />

54<br />

www.risk-uk.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!