SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Assets Management
Security Issues and Site Access protocol
ASSET MANAGEMENT
 Asset management, broadly
defined as any system that
monitors and maintains things of
value to an entity or group. It may
apply to both tangible assets (such
as buildings) and to intangible
assets (such as human capital,
intellectual
property, goodwill and/or financial
assets. Asset management is a
systematic process of developing,
operating, maintaining, upgrading,
and disposing of assets cost-
effectively.
OUR ASSETS
 Generators
 Diesel
 Batteries
 Rectifiers
 OPV
 Antenna
 Cables
 BUB
 Sola Panel
 Maintenance materials
 ETC
what does this mean to you?
SECURITY
 Taking charge of our sites
(SECURITY) has been a major
challenge we face which has
opened our sites to multiple
dangers through our unfair attitude
towards our most prioritized
business.
ANALOGY
 A mother cares so much for the child that she does not want the child to
suffer any inch of sickness or discomfort.
 Give your site (child) the required attention at all times
 Give your site (child) regular food (Diesel)
 Give your site (child) comprehensive health care (PPM)
 Give your site (child) the best treatment against any sickness (regular
maintance)
STEPS TO HAVING A SECURED SITE
 Ensure there’s a guard on site always if not,
escalate.
 Know your guards (give them a sense of
belonging)
 Always ensure a good relationship/bond with
your guards.
 Protect their rights (ensure they get paid
regularly)
 Ensure there’s no loop hole attackers can
easily get access to the site (check for weak
or broken palisade, broken mesh wires etc)
 Ensure your site is always locked.
 Cultivate the habit of following the right
protocol on site. I.e. Sign in, sign out, and
ensure site is locked before leaving the site.
 Ensure no asset is left unsecured on site.
 Ensure that decommissioned assets are taken
out of sites immediately.
 Always escalate any form of threat.
ACCESS PROTOCOLS
 Always Sign in and out
 Always ensure you access and leave the site with the presence of the guard
on duty.
 Always get your access refs for every access to site and indicate in the log
book.
 Always get your PARN for all planned activity
 Always wear your ID cards unless where there’s a security threat.
 Always check, take note and write down the exact diesel level at every site
visit.
OTHER SECURITY PROCEDURES
 All sites must be locked at all times.
 All sites must have log books
 Report any issue of theft or threats to the office
 It’s mandatory for all FSEs to carry or put on your staff ID cards
 No diesel supply must take place without the presence of the security supervisor of the cluster.
 No guard must be allowed to sign on behalf of the security supervisor.
 Non-compliance of any security supervisor not to witness and co-supply diesel must be immediately
escalated.
 No asset (diesel or others) is allowed to be moved out of any site without an approval mail.
 All FSEs are to immediately escalate any form of mis-conduct noticed within their colleagues or the
security vendor.
 Any site that is noticed for have 1 guard instead of 2 must be immediately escalated.
 Any site without guard or guards not on duty must be immediately reported.
HINTS
 Buy & share intelligence
 Always escalate
 Always ask questions
 Always take note & document.
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (14)

Diapocitivas 2
Diapocitivas 2Diapocitivas 2
Diapocitivas 2
 
TOOLS
TOOLSTOOLS
TOOLS
 
10 Rules for Working Safely Around Machines
10 Rules for Working Safely Around Machines10 Rules for Working Safely Around Machines
10 Rules for Working Safely Around Machines
 
Pascal Louis-Perez, Wealthfront
Pascal Louis-Perez, Wealthfront Pascal Louis-Perez, Wealthfront
Pascal Louis-Perez, Wealthfront
 
Towed Trailer Becomes Detached
Towed Trailer Becomes DetachedTowed Trailer Becomes Detached
Towed Trailer Becomes Detached
 
Doc sub 10
Doc sub 10Doc sub 10
Doc sub 10
 
Dead Body Cleanup Dallas
Dead Body Cleanup DallasDead Body Cleanup Dallas
Dead Body Cleanup Dallas
 
Near miss
Near missNear miss
Near miss
 
DSS and Cat smartband - Rodney Mudford
DSS and Cat smartband - Rodney Mudford DSS and Cat smartband - Rodney Mudford
DSS and Cat smartband - Rodney Mudford
 
Risk assesment
Risk assesmentRisk assesment
Risk assesment
 
Safety practices while sewing
Safety practices while sewing Safety practices while sewing
Safety practices while sewing
 
Question excerpt
Question excerptQuestion excerpt
Question excerpt
 
OSHA3842
OSHA3842OSHA3842
OSHA3842
 
Reducing failure of Component Critical Parts - Aug 2016
Reducing failure of Component Critical Parts -  Aug 2016Reducing failure of Component Critical Parts -  Aug 2016
Reducing failure of Component Critical Parts - Aug 2016
 

Ähnlich wie Assets Management and Site Access Protocols

Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016
Chris Morris
 
Steven_Mask_Jr_SecurityExp
Steven_Mask_Jr_SecurityExpSteven_Mask_Jr_SecurityExp
Steven_Mask_Jr_SecurityExp
Steven Mask Jr
 

Ähnlich wie Assets Management and Site Access Protocols (20)

Sec 2017 job-d
Sec 2017  job-dSec 2017  job-d
Sec 2017 job-d
 
How to use AUTEL MaxiSYS MS906
How to use AUTEL MaxiSYS MS906 How to use AUTEL MaxiSYS MS906
How to use AUTEL MaxiSYS MS906
 
Autel Maxisys MS906BT User's Manual
Autel Maxisys MS906BT User's ManualAutel Maxisys MS906BT User's Manual
Autel Maxisys MS906BT User's Manual
 
Autel Maxisys MS906BT User's Manual
Autel Maxisys MS906BT User's ManualAutel Maxisys MS906BT User's Manual
Autel Maxisys MS906BT User's Manual
 
Autel AP200 User’s Manual
Autel AP200 User’s ManualAutel AP200 User’s Manual
Autel AP200 User’s Manual
 
Autel MaxiSys MS906 user manual v1.00-obd365
Autel MaxiSys MS906 user manual v1.00-obd365Autel MaxiSys MS906 user manual v1.00-obd365
Autel MaxiSys MS906 user manual v1.00-obd365
 
Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.ppt
 
Steven_Mask_Jr_SecurityExp
Steven_Mask_Jr_SecurityExpSteven_Mask_Jr_SecurityExp
Steven_Mask_Jr_SecurityExp
 
Autel maxi sys user manual v1.03
Autel maxi sys user manual v1.03Autel maxi sys user manual v1.03
Autel maxi sys user manual v1.03
 
Autel Maxisys Pro MS908P User Manual
Autel Maxisys Pro MS908P User ManualAutel Maxisys Pro MS908P User Manual
Autel Maxisys Pro MS908P User Manual
 
1. HSE Training Induction & managing workplace.pptx
1. HSE Training Induction & managing workplace.pptx1. HSE Training Induction & managing workplace.pptx
1. HSE Training Induction & managing workplace.pptx
 
How to use autel maxisys ms906ts tpms tool
How to use autel maxisys ms906ts tpms toolHow to use autel maxisys ms906ts tpms tool
How to use autel maxisys ms906ts tpms tool
 
Autel MaxiCom MK808TS User Manual
Autel MaxiCom MK808TS User ManualAutel MaxiCom MK808TS User Manual
Autel MaxiCom MK808TS User Manual
 
Carwasher.net vendor saftey training
Carwasher.net vendor saftey trainingCarwasher.net vendor saftey training
Carwasher.net vendor saftey training
 
New AUTEL MaxiSYS Pro MS908P User Manual
New AUTEL MaxiSYS Pro MS908P User ManualNew AUTEL MaxiSYS Pro MS908P User Manual
New AUTEL MaxiSYS Pro MS908P User Manual
 
Autel-Maxisys-Pro-mini-MS905-user-manual-english
Autel-Maxisys-Pro-mini-MS905-user-manual-englishAutel-Maxisys-Pro-mini-MS905-user-manual-english
Autel-Maxisys-Pro-mini-MS905-user-manual-english
 
Autel Maxisys mini MS905 scanner user-manual v200-english
Autel Maxisys mini MS905 scanner user-manual v200-englishAutel Maxisys mini MS905 scanner user-manual v200-english
Autel Maxisys mini MS905 scanner user-manual v200-english
 
Autel DS808K User Manual
Autel DS808K User ManualAutel DS808K User Manual
Autel DS808K User Manual
 
Autel Maxidas DS808 User Manual
Autel Maxidas DS808 User ManualAutel Maxidas DS808 User Manual
Autel Maxidas DS808 User Manual
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Assets Management and Site Access Protocols

  • 1. Assets Management Security Issues and Site Access protocol
  • 2. ASSET MANAGEMENT  Asset management, broadly defined as any system that monitors and maintains things of value to an entity or group. It may apply to both tangible assets (such as buildings) and to intangible assets (such as human capital, intellectual property, goodwill and/or financial assets. Asset management is a systematic process of developing, operating, maintaining, upgrading, and disposing of assets cost- effectively.
  • 3. OUR ASSETS  Generators  Diesel  Batteries  Rectifiers  OPV  Antenna  Cables  BUB  Sola Panel  Maintenance materials  ETC
  • 4. what does this mean to you?
  • 5. SECURITY  Taking charge of our sites (SECURITY) has been a major challenge we face which has opened our sites to multiple dangers through our unfair attitude towards our most prioritized business.
  • 6. ANALOGY  A mother cares so much for the child that she does not want the child to suffer any inch of sickness or discomfort.  Give your site (child) the required attention at all times  Give your site (child) regular food (Diesel)  Give your site (child) comprehensive health care (PPM)  Give your site (child) the best treatment against any sickness (regular maintance)
  • 7. STEPS TO HAVING A SECURED SITE  Ensure there’s a guard on site always if not, escalate.  Know your guards (give them a sense of belonging)  Always ensure a good relationship/bond with your guards.  Protect their rights (ensure they get paid regularly)  Ensure there’s no loop hole attackers can easily get access to the site (check for weak or broken palisade, broken mesh wires etc)  Ensure your site is always locked.  Cultivate the habit of following the right protocol on site. I.e. Sign in, sign out, and ensure site is locked before leaving the site.  Ensure no asset is left unsecured on site.  Ensure that decommissioned assets are taken out of sites immediately.  Always escalate any form of threat.
  • 8.
  • 9. ACCESS PROTOCOLS  Always Sign in and out  Always ensure you access and leave the site with the presence of the guard on duty.  Always get your access refs for every access to site and indicate in the log book.  Always get your PARN for all planned activity  Always wear your ID cards unless where there’s a security threat.  Always check, take note and write down the exact diesel level at every site visit.
  • 10. OTHER SECURITY PROCEDURES  All sites must be locked at all times.  All sites must have log books  Report any issue of theft or threats to the office  It’s mandatory for all FSEs to carry or put on your staff ID cards  No diesel supply must take place without the presence of the security supervisor of the cluster.  No guard must be allowed to sign on behalf of the security supervisor.  Non-compliance of any security supervisor not to witness and co-supply diesel must be immediately escalated.  No asset (diesel or others) is allowed to be moved out of any site without an approval mail.  All FSEs are to immediately escalate any form of mis-conduct noticed within their colleagues or the security vendor.  Any site that is noticed for have 1 guard instead of 2 must be immediately escalated.  Any site without guard or guards not on duty must be immediately reported.
  • 11. HINTS  Buy & share intelligence  Always escalate  Always ask questions  Always take note & document.

Hinweis der Redaktion

  1. Give different meanings to this picture?
  2. An example of a mother to child
  3. LG0159 AJAH LG0171 Lagos Island