BS 10800-2020 Provision of security services – Code of practice.
5.3 Organizational roles, responsibilities and authorities
Top management should assign the responsibilities and authorities for relevant roles and communicate these within the organization.
Top management should assign responsibility and authority for reporting on the performance of the services provided.
6.1 Risks and opportunities
When planning for the provision of security services, the organization should determine the risks and opportunities that need to be addressed, plan mitigations to address these risks and opportunities, and evaluate the effectiveness of these mitigations.
NOTE 1 For further guidance on sector-specific risks and opportunities, see the applicable British Standards, such as BS 7499 for static guarding orBS 79843 for mobile patrolling.
The organization should be aware of the customer’s management policy and strategy document that mitigates the customer’s security risks, threats and opportunities. The organization’s risk and threat assessment should highlight specific areas to be included in the customer’s management policy and strategy document.
NOTE 2 These areas are specific to each business, e.g. terrorism, theft, single-issue extremists.
If a customer’s management policy and strategy document does not exist, the organization should work with the customer and agree an approach to safeguarding their assets and security solutions.
6.2 Objectives and planning
The organization should establish objectives for the provision of security services, including provision for its own business continuity and disaster recovery.
The objectives should:
a) be consistent with customer requirements;
b) be measurable;
c) take into account applicable requirements;
d) be monitored;
e) be communicated; and
1) be updated, as needed.
The organization should retain documented information on the objectives. NOTE 1 The organization could ask the customer the following questions. (This list Is not exhaustive.)
a) Incident(s) of crime: What are the risks (actual and perceived)?Assess the type, scale and pattern of incidents that have occurred in the loct 12 inonthi
b) Environment and buildings: Where are the customer’s vulnerable points? (e.g. access and egress points and other high-risk security areas.) Assess the environmental and building factors that contribute to the customer’s security.
c) Security measures: What level of security is required to counteract those risks effecti vely? Assess the effectiveness of the security measure.BS 10800 pdf download.