{"id":454493,"date":"2024-10-20T09:35:49","date_gmt":"2024-10-20T09:35:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-187882015a12024\/"},"modified":"2024-10-26T17:48:41","modified_gmt":"2024-10-26T17:48:41","slug":"bs-iso-187882015a12024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-187882015a12024\/","title":{"rendered":"BS ISO 18788:2015+A1:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 1\tScope <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 2\tNormative references 3\tTerms and definitions <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 4\tContext of the organization 4.1\tUnderstanding the organization and its context 4.1.1\tGeneral 4.1.2\tInternal context 4.1.3\tExternal context <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 4.1.4\tSupply chain and subcontractor mapping and analysis 4.1.5\tDefining risk criteria 4.2\tUnderstanding the needs and expectations of stakeholders <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 4.3\tDetermining the scope of the security operations management system 4.4\tSecurity operations management system <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5\tLeadership 5.1\tLeadership and commitment 5.1.1\tGeneral 5.1.2\tStatement of Conformance <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.2\tPolicy 5.3\tOrganization roles, responsibilities and authorities <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6\tPlanning 6.1\tActions to address risks and opportunities 6.1.1\tGeneral <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.1.2\tLegal and other requirements 6.1.3\tInternal and external risk communication and consultation <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.2\tSecurity operations objectives and planning to achieve them 6.2.1\tGeneral <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.2.2\tAchieving security operations and risk treatment objectives 7\tSupport 7.1\tResources 7.1.1\tGeneral <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 7.1.2\tStructural requirements <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 7.2\tCompetence 7.2.1\tGeneral 7.2.2\tCompetency identification <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 7.2.3\tTraining and competence evaluation 7.2.4\tDocumentation 7.3\tAwareness 7.4\tCommunication 7.4.1\tGeneral <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 7.4.2\tOperational communications 7.4.3\tRisk communications 7.4.4\tCommunicating complaint and grievance procedures 7.4.5\tCommunicating whistle-blower policy <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 7.5\tDocumented information 7.5.1\tGeneral 7.5.2\tCreating and updating <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 7.5.3\tControl of documented information <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 8\tOperation 8.1\tOperational planning and control 8.1.1\tGeneral <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 8.1.2\tPerformance of security-related functions 8.1.3\tRespect for human rights 8.1.4\tPrevention and management of undesirable or disruptive events 8.2\tEstablishing norms of behaviour and codes of ethical conduct 8.3\tUse of force 8.3.1\tGeneral <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 8.3.2\tWeapons authorization 8.3.3\tUse of force continuum <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 8.3.4\tLess-lethal force 8.3.5\tLethal force 8.3.6\tUse of force in support of law enforcement <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 8.3.7\tUse of force training 8.4\tApprehension and search 8.4.1\tApprehension of persons 8.4.2\tSearch 8.5\tOperations in support of law enforcement 8.5.1\tLaw enforcement support <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 8.5.2\tDetention operations 8.6\tResources, roles, responsibility and authority 8.6.1\tGeneral 8.6.2\tPersonnel <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 8.6.3\tProcurement and management of weapons, hazardous materials and munitions 8.6.4\tUniforms and markings 8.7\tOccupational health and safety 8.8\tIncident management 8.8.1\tGeneral <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 8.8.2\tIncident monitoring, reporting and investigations 8.8.3\tInternal and external complaint and grievance procedures <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 8.8.4\tWhistle-blower policy 9\tPerformance evaluation 9.1\tMonitoring, measurement, analysis and evaluation 9.1.1\tGeneral <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 9.1.2\tEvaluation of compliance 9.1.3\tExercises and testing 9.2\tInternal audit <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 9.3\tManagement review 9.3.1\tGeneral 9.3.2\tReview input <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 9.3.3\tReview output 10\tImprovement 10.1\tNonconformity and corrective action <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 10.2\tContinual improvement 10.2.1\tGeneral 10.2.2\tChange management 10.2.3\tOpportunities for improvement <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Annex A (informative) Guidance on the use of this International Standard <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | Annex B (informative) General principles <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Annex C (informative) Getting started \u2013 Gap analysis <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | Annex D (informative) Management systems approach <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | Annex E (informative) Qualifiers to application <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Management system for private security operations. Requirements with guidance for use<\/b><\/p>\n |