UNDERTAKING AN OFFSHORE OIL AND GAS SECURITY ASSESSMENT. A Guide. AIM To provide you with an understanding of the DOTARS Offshore Security Assessments Guidance material and how to use it to assist with the production of your Offshore Security Plans. . Note.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
To provide you with an understanding of the DOTARS Offshore Security Assessments Guidance material and how to use it to assist with the production of your Offshore Security Plans.
Maritime Transport and Offshore Facilities Security Regulations 2003(cont)
Requirements for Security Assessments (cont) Regulations 2003
risks and likelihood and consequences of
procedures and operations
A useful and simple rating system is Low, Medium or High with relation to the criticality of the asset in the continued productive operation of the offshore facility.
Network - a security assessment covering more than one individual facility for which they are legally responsible.
Covering – used for several facilities and/or offshore service providers within a single area.
Consideration of :
Specific issues to consider: Criticality Analysis)-example
Roles and responsibilities of various parts of the organisation participating in the risk management process; and
Relationships between the project or activity and other projects or parts of the organisation.
Template 8.4. Risk Management Context-examples Criticality Analysis)-example
Table 8. 11 Consequence Assessment Criteria - example Criticality Analysis)-example
Advanced version of consequence table p.33 Criticality Analysis)-example
IDENTIFYING SECURITY RISKS Criticality Analysis)-example
OIP’s should consider the following terrorist related risk areas:
RISK CATEGORIES AND SOURCES OF HARM Criticality Analysis)-example
RISK SCENARIOS - one method examples Cont..
RISK SCENARIOS example
* Note – only general information is required for risk treatment options. However, details of proposed security measures/procedures and desired outcomes should be outlined in table 8.16 Risk Treatment Implementation Schedule.
This Implementation Schedule must be included with assessment and plan