BS 10800 pdf free download
BS 10800-2020 pdf free download.Provision of security services – Code of practice.
4 Context of the organization
4.1 Understanding the organization and its context
The organization should determine external and internal issues that are relevant to its purpose and that affect Its ability to achieve the intended outcome(s) of Its provision of security services.
4.2 Understanding the needs and expectations of interested parties The organization should determine:
a) the interested parties that are relevant to the provision of security services; and
b) the relevant requirements of those interested parties.
4.3 Determining the scope
When determining the scope of the provision of security services, the organization should take into account:
a) the external and internal issues referred to in 4.1;
b) the interested parties referred to in 4.2;
c) the products and services of the organization;
d) sector-specific codes of practice; and
e) boundaries, e.g. other offices or units.
The scope should be available as documented information.
5 Top management commitment
5.1 General
Top management should demonstrate leadership and commitment with respect to the security services provided by the organization by:
a) setting clear aims and objectives for service provision;
b) setting achievable targets for service provision;
c) identifying and providing resources and putting infrastructure in place to achieve contractual obligations, where applicable;
d) monitoring and managing service delivery; and
e) promoting continual improvement.
5.2 Policy
Top management should identify and document establish policies that are relevant to the purpose of the organization and its provision of service delivery
5.3 Organizational roles, responsibilities and authorities
Top management should assign the responsibilities and authorities for relevant roles and communicate these within the organization.
Top management should assign responsibility and authority for reporting on the performance of the services provided.
6 Planning
6.1 Risks and opportunities
When planning for the provision of security services, the organization should determine the risks and opportunities that need to be addressed, plan mitigations to address these risks and opportunities, and evaluate the effectiveness of these mitigations.
NOTE I Forfurtherguidance on sector-s pecsfic risks and opportunities, see the applicable British Standards, such as BS 7499 for static guarding or BS 7984-3 for mobile patrolling.
The organization should be aware of the customer’s management policy and strategy document that mitigates the customer’s security risks, threats and opportunities. The organization’s risk and threat assessment should highlight specific areas to be included in the customer’s management policy and strategy document.
NOTE 2 These areas are specific to each business, e.g. terrorism, theft, single-issue extremists.
If a customer’s management policy and strategy document does not exist, the organization should work with the customer and agree an approach to safeguarding their assets and security solutions.
6.2 Objectives and planning
The organization should establish objectives for the provision of security services, including provision for its own business continuity and disaster recovery
The objectives should:
a) be consistent with customer requirements;
b) be measurable;
c) take into account applicable requirements;
d) be monitored;
e) be communicated; and
0 be updated, as needed.
The organization should retain documented information on the objectives.
NOTE 1 The organization could ask the customer the following questions (This list is not exhaustive.)
a) Incident(s) of crime: What are the risks (actual and perceived)? Assess the type, scale and pattern of incidents that have occurred in the last 12 months.
b) Environment and buildings: Where are the customer’s vulnerable points? (e.g. access and egress points and other high-risk security areas) Assess the environmental and building factors that contribute to the customer’s security.
c) Security measures: What level ofsecurity is required to counteract those risks eff ectively? Assess the effectiveness of the security measure.BS 10800 pdf download.