Security Policy
Security Policy
Security Policy
TABLE OF CONTENTS
Subject Page no
Table of Content 2
Security Policy Introduction and Definition 3
Security Principles 3
Statement of purpose 4
Scope 4
Legislature and regulatory requirements 5
Policy statement 6
Compliance requirements 6
Staff accountability and acceptable use of assets 6
Specific baseline requirements: Security administration 7
Security incident/breaches reporting process 7
Security incident/breaches response process 7
Information security 8
Physical security 9
Personnel security 9
Polygraph screening 10
Transferability of security clearances 10
Security awareness and training 10
Information and Communication Technology Security 11
IT security 11
Internet access 12
Use of laptop computers 12
Communication security 12
Technical Surveillance Counter Measures (TSCM) 13
Business Continuity Planning (BCP) 13
Specific responsibilities 13-14
Line Management 14
Employees, contractors, consultants and other service providers 15
Stake holders 15
Enforcement 15
Exceptions 15
Other considerations 15
Communication policy 16
Parking policy 16
Policy 16
Procedures 18
Effective date 18
Review and update process 19
Implementation 19
Monitoring 19
Disciplinary actions 19
Definitions of terms 19-22
Supporting Documents and Directives 24-48
Emergency Management Plan and Evacuation Procedures 49-65
SDM Emergency Response Action Committee 66-73
Security Presentation
1.1 ITRODUCTIO
A security policy is the essential basis on which an effective and comprehensive security
program can be developed. The importance of this critical component of the overall
security system, however, is often overlooked. A security policy is the primary way in
which management’s expectations for security are translated into specific and measurable
goals and objectives. It is crucial to take a top down approach based on a well stated
policy in order to develop an effective security system.
On the contrary, if there isn’t a security policy defining and communicating those
decisions, then they will made by the individuals designing, installing and maintaining
security systems. This will result in a disparate and less than optimal security system
being implemented.
1.2 DEFIITIO
A security policy is a formal statement of the rules through which people are given access
to an institution’s premises, assets, and technology and information assets. The security
policy should define what business and security objectives management desires, but not
how these solutions are engineered and implemented.
1.3 PRICIPLES
2. STATEMET OF PURPOSE
Sedibeng District Municipality depends on its personnel, information and assets to deliver
services that ensure safety and security of its stakeholders. It must therefore manage these
resources with due diligence and take appropriate measures to protect them.
Threats that can cause harm to Sedibeng District Municipality, in South Africa and
abroad, include acts of terror and sabotage, espionage, unauthorized access to buildings
and premises, theft, armed robbery, fraud and corruption, vandalism, fire, natural
disasters, technical failures and accidental damage. The threat of cyber attack and
malicious activity through the Internet is prevalent and can cause severe harm to
electronic services and critical infrastructure. Threats to the national interest, such as
transnational criminal activity, foreign intelligence activities and terrorism, continue to
evolve as the results of changes in the international environment.
The main objective of this policy therefore is to support the interests of the community we
serve and Sedibeng District Municipality business objectives by protecting employees,
information and assets and assuring the continued delivery of services throughout the
Sedibeng jurisdiction area and to South African citizens.
This policy complements other policies of Sedibeng District Municipality (e.g. sexual
harassment, occupational health and safety, information management, asset control, real
property, financial resources, supply chain management policy and contract management
policy.)
3. SCOPE
3.1 This policy applies to the following (individuals and entities) resources:
3.2 The policy further covers the following seven elements of the security program of
the Municipality
• Security Organization
• Security Administration
• Information Security
• Physical Security
• Personnel Security
• Information and Communication Technology (ICT) Security
• Business Continuity Planning
4.1 This policy is informed by and complies with applicable National legislation,
National security policies and national security standards. A list of all applicable
regulatory documents in this regard are as follows:
5. POLICY STATEMET
5.1 General
All individuals mentioned in paragraph 3.1 above must comply with baseline
security requirements of this policy and it’s associated Security Directives as
contained in the Security Plan of Sedibeng District Municipality. These
requirements shall be based on integrated security Threat and Risk Assessments
(TRA’s) to the interest of the Municipality and employees, information and
assets of Sedibeng District Municipality. The necessity of security measures
above baseline levels will also be determined by the continual updating of the
security TRA’s.
5.3.1 The Municipal Manager shall ensure that information and assets of the institution
are used in accordance with procedures as stipulated in the Security Directives as
contained in the Security Plan of Sedibeng District Municipality.
5.3.2 All employees of Sedibeng District Municipality shall be accountable for the
proper utilization and protection of such information and assets. Employees that
misuse or abuse assets of the institution shall be held accountable therefore and
disciplinary action shall be taken against any such employee.
5.5.1 Whenever employees of the institution become aware of an incident that might
constitute a security breach or an unauthorized disclosure of information
(whether accidental or intentional), they must report this to the Security Manager See Security
Directive on
of the institution by utilizing the formal reporting procedure prescribed by the Reporting of
Security Breach Directive of the institution. Security
Breaches.
5.5.2 The Security Manager shall report to the appropriate authority (as indicated in the
Security Breach Directive) of the institution all cases or suspected cases of
security breaches for investigation.
5.5.3 The Security Manager of the institution shall ensure that all employees are
informed about the procedure for reporting security breaches.
5.6.1 The Security Manager shall develop and implement security breach response
mechanisms for the institution in order to address all security breaches/alleged
security breaches which are reported.
5.6.2 The Security Manager shall ensure that the Accounting Officer and ED:
Corporate Services are informed and advised as soon as possible.
5.6.3 It shall be the responsibility of the National Intelligence structures (e.g. NIA or
SAPS) to conduct an investigation on reported security breaches and provide
feedback with recommendations to the institution.
• State Secret
• Trade Secret: and
• Personal Information
• Shared information
• Confidential
• Secret: and
• Top Secret
5.7.1.4 The classification assigned to documents must be strictly adhered to and the
prescribed security measures to protect such documents must be applied at all
times.
5.8.1 Physical security involves the physical layout and design of facilities of Sedibeng
District Municipality and the use of physical security measures to delay and
prevent unauthorized access to assets of the institution. It includes measures to
See Security
detect attempted or actual unauthorized access and the activation of an Directive on
appropriate response. Physical security also includes the provision of measures Physical Security
to protect employees from bodily harm. Procedures.
5.8.3 Sedibeng District Municipality shall ensure that physical security is fully
integrated early in the process of planning, selecting, designing and modifying of
its facilities. The Municipality shall:
• Select, design and modify facilities in order to facilitate the effective control of
access thereto.
• Demarcate restricted areas and have the necessary entry barriers, security
systems and equipment to effectively control access thereto.
• Include the necessary security specifications in planning, request for proposals
and tender documentation.
• Incorporate related costs in funding requirements for the implementation of the
above.
5.9.1.1 All newly appointed employees, contractors and consultants attached to Sedibeng
District Municipality, who requires access to classified information and critical
assets in order to perform his/her duties or functions, must be subjected to a See Security
security screening investigation conducted by the National Intelligence Agency Directive on
(NIA) in order to be granted a security clearance at the appropriate level. Vetting/Personnel
Suitability
Checks.
5.9.1.2 The level of security clearance given to a person will be determined by the
contents of or access to classified information entailed by the post already
occupied or to be occupied in accordance with their respective responsibilities
and accountability.
5.9.1.3 A security clearance provides access to classified information subject to the need-
to-know principle.
5.9.1.4 A declaration of secrecy shall be signed by every individual issued with a
security clearance to complement the entire security screening process. This will
remain valid even after the individual has terminated his/her services with the
Municipality.
5.9.1.5 A security clearance will be valid for a period of ten years in respect of
Confidential level and five years for Secret and Top Secret. This does not
preclude re-screening on a more frequent basis as determined by the Municipal
Manager, based on information which impact negatively on an individual’s
security competency.
5.9.1.6 Security clearances in respect of all individuals who have terminated their
services with the Municipality shall be immediately withdrawn.
5.10.1 A polygraph examination shall be utilized to provide support for the security
screening process. All employees subjected to a Top Secret clearance will also
be subjected to a polygraph examination. The polygraph shall only be used to
determine reliability of the information gathered during the security screening
investigation and does not imply any suspicion or risk on the part of the person
being examined.
5.10.2 In the event of any negative information being obtained with regard to the person
being examined during the security screening investigation (all levels), such
person shall be given an opportunity to prove his/her honesty and/or innocence
by making use of a polygraph examination. Refusal by the applicant to undergo
the examination does not necessarily signify that a security clearance will not be
granted.
5.12.1 A security awareness and training program must be developed by the Security
Manager and implemented to effectively ensure that all personnel and service
providers of the Municipality remain security conscious.
5.12.2 All employees shall be subjected to the security awareness and training programs
and must certify that the contents of the program(s) have been understood and
will be complied with. The program must cover training with regard to specific
security responsibilities and sensitize employees and relevant contractors and
consultants about the security policy and security measures of the Office of the
Executive Mayor and the need to protect sensitive information against disclosure,
loss or destruction.
5.12.4 Regular surveys and walkthrough inspections will be conducted by the Security
Manager and members of the security component to monitor the effectiveness of
the security awareness and training program.
5.13.1 IT Security
5.13.1.1 A security network shall be established for the Municipality in order to ensure
that information systems are secured against rapidly evolving threats that have
the potential to impact on their confidentiality, integrity availability, intended use See IT and ICT
and value. Policy to be
compiled.
5.13.1.2 To prevent the compromise of IT systems, the Municipality shall implement
baseline security controls and any additional controls identified through the
security TRA. These controls, and the security roles and responsibilities of all
personnel, shall be clearly defined, documented and communicated to all
employees.
• Certify that all IT systems are secure after procurement, accredit IT systems
prior to operation and comply with minimum security standards and directives.
• Conduct periodic security evaluations of systems, including assessments of
configuration changes conducted on a routine basis.
• Periodically request assistance, review and audits from the National
Intelligence Agency (NIA) in order to get an independent assessment.
5.13.1.4 Server rooms and other related security zones where IT equipment are kept shall
be secured with adequate security measures and strict access control shall be
enforced and monitored.
5.13.1.5 Access to the resources on the network of the institution shall be strictly
controlled to prevent unauthorized access. Access to all computing and
information systems and peripherals of the institutions shall be restricted unless
explicitly authorized.
5.13.1.6 System hardware, operating and application software, the network and
communication systems of the institution shall all be adequately configured and
safeguarded against both physical attack and unauthorized network intrusion.
5.13.1.7 All employees shall make use of IT systems of the institution in an acceptable
manner and for business purposes only. All employees must comply with the IT
Security Directives in this regard at all times.
5.13.1.8 The selection of passwords, their use and management as a primary means of
access to systems is to strictly adhere to best practice guidelines as reflected in
the IT Security Directives; in particular, passwords shall not be shared with any
other person for any reason.
5.13.1.9 To ensure the ongoing availability of critical services, the institution shall
develop IT continuity plans as part of the overall Business Continuity Planning
(BCP) and recovery activities.
5.14.1 The IT Director of the Municipality, having the overall responsibility for setting
up Internet access for the institution, shall ensure that the network of the
institution is safeguarded from malicious external intrusion by deploying, as a
minimum, a configured firewall. Human Resources management shall ensure
that all personnel with Internet access (including e-mail) are aware of, and will
comply with, an acceptable code of conduct in their usage of the Internet.
5.14.2 The IT Director of the institution shall be responsible for controlling user access
to the Internet, as well as ensuring that users are aware of the threats, and trained
in the safeguards, to reduce the risk of Information Security Breaches and
incidents.
5.14.3 Incoming e-mail must be treated with the utmost care due to its inherent
Information Security risks. The opening of e-mail with file attachments is not
permitted unless such attachments have already been scanned for possible
computer viruses or other malicious code.
5.15.2 The information stored on a laptop computer of the institution shall be suitably
protected at all times, in line with the protection measures prescribed in the IT
Policy.
5.15.3 Employees shall also be responsible for implementing the appropriate security
measures for the physical protection of laptop computers at all times, inline with
the protection measures prescribed in the IT policy.
5.17.1 All offices, meeting, conference and boardroom venues of the Municipality
where sensitive and classified matters are discussed on a regular basis shall be
identified and shall be subjected to proper and effective physical security and See Security
Directive on
access control measures. Periodic electronic Technical Surveillance Counter TSCM.
Measures (sweeping) will be conducted by the National Intelligence Agency
(NIA) to ensure that theses areas are kept sterile and secure.
5.17.2 The Security Manager of the Municipality shall ensure that areas that are utilized
for discussion of a sensitive nature as well as offices or rooms that house
electronic communications equipment, are physically secured in accordance with
the standards laid down by National Intelligence Agency (NIA) in order to
support the sterility of the environment after a TSCM examination, before any
request for a TSCM is submitted.
5.18.1 Both the Security Manager and IT Director must establish a Business Continuity
Plan (BCP) to provide for the continued availability of critical services,
information and assets if a threat materializes and to provide for appropriate steps
and procedures to respond to an emergency situation to ensure the safety of the
employees, contractors, consultants and visitors. See Business
Continuity
Planning to be
5.18.2 The BCP shall be periodically tested to ensure that the management and compiled.
employees of the Municipality understand how it is to be executed.
5.18.3 All employees of the institution shall be made aware and trained on the content
of the BCP to ensure understanding of their own respective roles in terms thereof.
5.18.4 The Business Continuity Plan shall be kept up to date and re-tested periodically
by the Security Manager and IT Director.
6. SPECIFIC RESPOSIBILITIES
6.1.1 The Municipal Manger bears the overall responsibility for implementing and
enforcing the security program of the institution, Towards the execution of this
responsibility, the Executive Director:Coporate Services shall: See Security
Administration
• Establish the post of the Security Manager and appoint a well trained and and organization
Directives
competent security official in the post.
• Establish a security committee for the institution and to ensure the participation
of all senior management, members of all the core business functions of the
institution in the activities of the committee
• Approve and ensure compliance with this policy and its associated Security
Directives by all it is applicable to.
6.2.1 The delegated security responsibilities lies with the Security Manager of the
Municipality who will be responsible for the execution of the entire security
function and program of the institution (coordination, planning, implementation,
controlling, etc). Towards execution of his/her responsibilities, the Security
Manager shall, amongst others:
6.3.1 The Security Committee referred to in paragraph 5.1.1 above shall consist of
senior managers of the Municipality representing all the main business units of
the Municipality.
6.3.3 The Security Committee of the Municipality shall be responsible for, amongst
others:
6.3.4 Assisting the Security Manager in the execution of all security related
responsibilities of the Municipality, including completing tasks such as
drafting/reviewing of the Security Policy and Plan, conducting of a security
TRA, conducting of security audits, drafting of a BCP and assisting with security
awareness and training.
7. DIRECTORS/LIE MAAGERS
7.1 All managers on the Municipality shall ensure that their subordinates comply
with this policy and the Security Directives as contained in the Security Plan of
the Municipality.
7.2 All managers must ensure that appropriate measures are implemented and steps
are taken immediately to rectify any non compliance issues that may come to
their attention. This includes the taking of disciplinary action against employees
if warranted.
8.1 Every employee, Contractor, Consultant and other Service Providers of Sedibeng
District Municipality shall know what their security responsibilities are, accept it
as part of their normal job function, and not only cooperate but contribute to
improving and maintaining security at the institution at all times.
9. STAKEHOLDERS
10. EFORCEMET
10.1 The Municipal Manager, Executive Director: Corporate Services and the
appointed Security Manager are accountable for the enforcement of this policy.
10.2 All employees of the institution are required to fully comply with this policy and
it’s associated Security Directives as contained in the Security Plan. Non-
compliance with any prescript shall be addressed in term of the Disciplinary
Code/Regulations of the Municipality.
10.3 Prescripts to ensure compliance to this policy and the Security Directives by all
consultants, contractors or service providers of the Municipality shall be included
in the contracts with such individual/institutions/companies. The consequences
of any transgression/deviation or n on-compliance shall be clearly stipulated in
the said contract and shall be strictly enforced. Such consequences may include
the payment of prescribed penalties or termination of the contract, depending on
the nature of any non-compliance.
11. EXCEPTIOS
11.1 Deviations from this policy and its associated Security Directives will only be
permitted in the following circumstances:
• When security must be breached in order to save or protect the lives of people.
12.1 The following shall be taken into consideration when implementing this policy:
12.4 Disabled people shall not be inconvenienced by physical security measures and
must be catered for in such a manner they have access without compromising
security or the integrity of this policy.
13.1 The Security Manager of Sedibeng District Municipality shall ensure that the
content of this policy (or applicable aspects thereof) is communicated to all
employees, consultants, contractors, service providers, clients, visitors, members
of the public that may officially interact with the institution). The Security
Manager will further ensure that all security policy and directive prescription are
enforced and complied with.
13.2 The Security Manager must ensure that a comprehensive security awareness
program is developed and implemented within the Municipality to facilitate the
above said communication. Communication of this policy by means of this
program shall be conducted as follows:
14.1 Purpose
The purpose of the policy is to establish clearly the principles by which parking
administration and allocations are made at all Sedibeng District Municipality Offices and
Buildings. It is also intended to define the regulations for parking in municipal allocated
sites.
14.2 Scope
This policy applies to all transactions in which the Municipality provides parking spaces
for Councillors, Employees, Monthly Rental Customers and Visitors.
14.3 Responsibility
The overall responsibility for the administration and interpretation of this policy lies with
Facilities Management Directorate.
15. POLICY
a. Parking under the auspices of the Municipality will include all spaces on
Municipal property.
b. Parking will not be subsidised by the Municipality, but rates must be established
a. The Facilities Management Directorate will oversee the parking policy and
annually set a fee, including fines for use of the parking spaces.
b. The annual fee will include all direct costs of operating and maintaining
municipal owned properties used for parking.
c. The Department: Facilities Management Directorate will:
a. All employees and those with physical disability may apply for parking.
b. Parking spaces will be allocated, as space is available, to municipal employees
and to those with physical disability.
c. Some spaces will be reserved for Full Time Councillors and Senior Management.
• Physical disability.
• Seniority.
• Deliveries including IT.
• Other factors that are considered to be of importance.
e. The Municipality offers daytime parking only.
f. A municipality vehicle is automatically qualified for the allocation of a reserved
parking space on application by the relevant departmental manager
15.4 Penalties
a. Abuse of any of the parking regulations outlined above may result in a loss of
parking privileges, payment of a fine and or prompt removal of the vehicle by the
designated towing company at the cost of the employee.
16. PROCEDURES
a. All employees who wish to have parking space shall complete and sign a parking
application each year. Applications are available at Facilities Management
Directorate to security service provider.
b. Upon allocation of a parking space, the signed application shall become the
parking contract.
c. Normally, all parking spaces shall be allocated annually for the period of 01st
July to 30th June. Except in the case of termination of employment, cancellations
shall be accepted only if the space can be re-assigned from the waiting list. One
month notice must be given for cancellation.
a. All approved applicants shall be issued out with a formal parking permit signed
by Security Manager.
b. Parking permits are not transferable. However arrangements to lend a parking
space to another employee during a temporary absence may be allowed on
condition that it is reported to Security Manger.
c. An authorized parking permit must be displayed, totally unobstructed as per
instructions, when parked in municipal designated parking.
d. Parkers must use only those spaces to which they have been assigned.
e. The must only be one vehicle per authorized Parker parked in municipal
allocated space at any given time.
f. Any change in vehicle or licence number must be reported to Facilities
Management (Security Manger) as quickly as possible.
g. Where more than one vehicle is registered, the parking permit is transferable
from one vehicle to the other at the discretion of the holder of the parking permit
h. Except in the case of an emergency, maintenance and repairs to vehicles on
Municipal property is not permitted. All waste materials must be promptly
removed from Municipal property.
18.1 The Security Manager, assisted by the Security Committee of the Municipality,
must ensure that this policy and its associated Security Directives is reviewed and
updated on an annual basis. Amendments shall be made to the policy and
directives as the need arise.
19. IMPLEMETATIO
19.1 The Security Manager of the Municipality must manage the implementation
process of this policy and its associated Security Directives (contained in the
Security Plan) by means of an action plan (also to be included in the Security
Plan of the Municipality).
19.2 Implementation of the policy and its associated Security Directives is the
responsibility of each and every individual this policy is applicable to (see
paragraph 3.1 above).
20. MOITORIG
20.1 The Security Manager, with the assistance of the security component and the
Security Committee of the Municipality must ensure compliance with this policy
and it’s associated Security Directives by means of conducting internal security
audits and inspection on a frequent basis.
20.2 The findings of the said audits and inspections shall be reported to the Municipal
Manager forthwith after completion.
21.1 Non-compliance with this policy and its associated Security Directives shall
result in disciplinary action which may include but are not limited to :
• Re-training
• Verbal and written warnings
• Termination of contracts in the case of contractors or consultants delivering a
service to the institution.
• Dismissal
• Suspension
• Loss of institution information and asset resources access privileges.
21.2 Any disciplinary action taken in terms of non-compliance with this policy and its
associated directives will be in accordance with the disciplinary code/directives
of the institution.
22.2 Classification
22.2.1 The process whereby all official matters exempted from undue disclosure is
labelled Confidential, Secret or Top Secret.
23.3.1 The prior planning of any action that has the purpose to prevent, and or combat,
or counteract the effect and results of an emergency situation where lives,
property or information are threatened. This includes compiling, approving and
distributing a formal written plan, and the practise thereof, in order to identify
and rectify gaps in the plan, and to familiarise personnel and co-ordinators with
the plan.
22.4.1 That condition created in a computer environment by the conscious provision and
application of security measures. This includes information concerning the
procedure for procurement and protection of equipment.
22.4.2 Everything that could influence the confidentiality of data (an individual may
have access only to that data to which he/she is supposed to), the integrity of data
(data must not be tampered with and nobody may pose as another for example in
the electronic mail environment, etc) and or the availability of systems is
considered to be relevant to computer security.
22.5 Communication Security
22.5.1 The conscious provision and application of security measures for the protection
of classified/ sensitive communication.
2.6.1 An undertaking given by a person who will have, has or has had access to
classified/ sensitive information, that he/she will treat such information as secret.
22.7 Delegation
22.8 Document
22.8.1 In terms of the Protection of Information Act, 1982 (Act 84 of 1982), a document
is any note or writing, whether produced by hand or by printing, typewriting or
any other similar process, any copy, plan, sketch or photographic or other
representation of any place or article or any disc, tape, card, perforated roll or
other device, in, or on which sound or any signal has been recorded for
reproduction.
22.9.1 The conscious provision and application of security measures in order to protect
classified/ sensitive documents.
22.10 Employees
22.10.1 For the purpose of this policy the term employees includes:
Permanent staff;
Temporary staff; and
Contract staff.
22.11.1 That condition created by the conscious provision and application of a system to
document, personnel, physical, computer and communication security measures
to protect sensitive information.
22.12 Personnel security
22.12.1 Personnel security is that condition created by the conscious provision and
application of security measures in order to ensure that any person who gains
access to sensitive/classified information has the necessary security clearance,
and conducts himself/herself in a manner not exposing him/her or the
information to compromise. This could include mechanisms to effectively
manage/solve personnel grievances.
22.14 Premises
22.14.1 For the purpose of this policy, premises shall refer to any building, structure, hall,
room, office, land, enclosure or water surface which is the property of, or is
occupied by, or is under the control of Sedibeng District Municipality and to
which a member of the public has a right of access.
• SADF- South African National Defence Force
22.15.1 Screening institution are those institutions (the SAPS, NIA, SASS, and SANDF)
that, in terms of the rationalisation agreement, are responsible for the security
screening/vetting of persons within their jurisdictions. NIA has a legal mandate
to employees within the Public Service.
22.16 Security
22.16.1 Security is the condition free of risk or danger, created by the conscious
provision and application of security measures.
22.17 Security audit
22.17.1 That part of security control undertaken to determine the general standard of
information security and to make recommendations where shortcomings are
The objective is to prevent, reduce losses/damages and misuse assets and leakage
of information of Sedibeng District Municipality.
Reporting procedures
3. An employee who is aware or becomes aware of any person who commits security
breach by not adhering to the security measures shall immediately inform the
Security Manager. The Security Manager shall conduct an investigation to
determine the circumstances that led to the security breach and advice the person
accordingly. Should that person still not observe the security measures even after
receiving advice, the incident will be reported to the to the immediate Executive
Director and Director to institute corrective measures in terms of Human
Resources prescripts.
4. In cases where a person is aware of the irregularity suspect that his/her identity
may become known, or where the Security Manager is involved, he/she shall
report the irregularity to the Municipal Manager and Protected Disclosure Act 26
of 2000 will be invoked.
- All incidents of loss, damage, stolen and misuse of assets of Sedibeng District
Municipality must be reported by the employee concerned to the Chief
Financial Officer and Security Manager.
- All losses of Sedibeng District Municipality assets such as safe keys, access
tags etc, must be reported to the immediate Executive Director and thereafter
to the Security Manager. The Security Manager must ensure lost items
mentioned above are reported to the South African Police Service. Before any
claim can be made, a case number with a police statement on the cause of the
loss or damage must be submitted.
......................................... ............................
ED: Corporate Services Date
Adv Mosotho Petlane
........................................... ...........................
Municipal Manager Date
Mr Yunus Chamda
Categories of secrecy
5. Top secret
• This category should be reserved for use in exceptional circumstances only i.e.
instances where a document would be classified as such, would be if a document
contains information:
I. which forms the municipality secret and where the disclosure of the
information would cause serious and irreparable harm to the security
II. which constitutes a trade secret the disclosure of which would have
disastrous results with regard to the future existence of the
municipality, cause financial loss to the municipality or may cause
embarrassment to the municipality in its relations with its
clients,public,outside contractors, competitors and suppliers .
itself is classified, in which the case the classification must agree with that
of the document.
VIII. All Secret and Top Secret documents must be given copy numbers and an
indication must be given of the number of copies produced, e.g. Copy 1 of
7copies.
The Security Manager must brief employees on the specific rules for handling
classified information.SDM should adopt and implement the following standard
procedures that apply to everyone:
............................................................... .............................
Executive Director: Corporate Services Date
Adv Mosotho Petlane
............................................ ..........................
Municipal Manager Date
Mr Yunus Chamda
The following security procedures are compulsory and must be adhered to at all the
times.
8. Access control.
• &o persons shall, without the permission of the Security Steward/Officer enter any
of the buildings occupied by Sedibeng District Municipality.
• For the purpose of granting of permission the Security Officer may request that
the person concerned;
- Furnish his/her name, address and any other relevant information required by
the authorized Officer,
- Produce his/her identity to the satisfaction of the authorized Officer,
- Declare whether he/she has any dangerous object i.e. Firearm in his/her
possession or custody,
- Declare the nature of the contents of any suitcase, attaché` case, bag,
handbag, folder, envelope, parcel or container of any nature which is in
his/her possession or custody or under his/her control and show those
contents to the Security Officer
- Subject himself/herself and anything that he/she has in possession or custody
or under his/her control for examination by electronic or other apparatus in
order to determine the presence of any dangerous object(s),
- Hand to an authorized Officer anything, that he/she has in his/her possession
or custody for examination or custody until he/she leaves the premises
All vehicles (private or municipal owned) may be searched when leaving the building
occupied by SDM. Equipments, parcels, documents etc shall be taken out of the
building with official removal permit signed by authorized official.
(a) All identified Very Important Persons (VIPs) and their crew/team may be
subjected to access control and exit procedure in exceptional cases.
(a) Apart from the control of employees entering and leaving the premises, visitors
must also be subjected to access control,
(b) When a visitor arrives at the security main reception area of the building the
normal access control procedures will be applied. When the visit/appointment is
confirmed with the host, the security officer responsible will open and refer
him/her to the floor secretary/host/receptionist. The security officer will accredit
the visitor with the access card that will be displayed visibly at all the times whilst
in building.
Visitors found in the building shall be requested to produce their visitor`s cards,
failing which, they shall be requested to vacate the premises, should they refuse to
do so, the Trespass Act 6 of 1959 shall be applied.
All Visitors entering the building of Sedibeng District Municipality shall use the
main entrance and pass through the designated reception for necessary security
checks, where the normal access control procedure will be followed. All visitors
shall park at the parking bays which are clearly reserved for visitors.
(c) The host shall collect the visitor from the main reception and escort them back on
departure. The security shall escort the visitor to the host, only if the host is the
Executive Mayor, the Speaker, Member of the Mayoral Committee, the Municipal
Manager and Executive Directors. The mentioned visitor will be escorted when a
notice of their visit is registered with Security Services.
(e) After the meeting, the host will take the visitor back to the security/reception area.
The employee being visited shall ensure that his/her visitor does not wonder
around the building. Visitors found loitering in the building shall be taken to the
Security for questioning.
(f) In the event the visitors are a group of people attending a workshop or meeting,
the host must inform the Security Manager in writing and compile a list of all
visitors to attend to that effect submit it to the Security Manager as soon as
possible.
(g) The reason for this practise shall be to ease unnecessary pressure at access point
and to ensure that everybody is properly registered before entry is gained.
11. Cameras
(a) &o cameras that are carried by visitor’s area allowed into the building occupied
by SDM.
(b) Journalists with cameras visiting the building of SDM on official duty will be
allowed to specific area after positive identification and confirmation of invitation
by host.
12. Firearms
(a) The employees are not allowed to carry firearms during their official duties, see
(Firearms Control Act 60 of 2000).
(b) In case of the private person, the owner of the firearm will lock the firearm in the
gun safe provided at the entry points before entering the premises of SDM.
(c) The gun safe will have two keys; the owner will be requested to keep one key and
the Security Officer the other. The safe cannot be opened by without both keys.
(d) In terms of sec 3 of Access to Public Premises and Vehicles Act 53 of 1985, the
members of South African Police Service, &ational Intelligence Agency, South
African &ational Defence Force and Hawks are exempted from both access and
exit control if they are in the building to execute their official tasks.
(a) Control of access after normal business hours will include electronic and manual
recording of movements of all employees in and out of the premises of Sedibeng
District Municipality.
(b) Employees will only be given access to the areas where their offices are located
and should they need to access other areas (restricted) they must get permission
from the Security Personnel.
(c) Contractors or temporary staff will not be given access to premises unless the
arrangement is made with relevant Director and the Security Manager is
informed in that regard.
(d) The employee who has required services from contractors shall supervise and be
responsible for contractor’s movement while in the building and report any
irregularity to the Security Manager.
7.1 All access points (gates and entrances) must be strictly controlled and be
equipped with specific written post orders which define the responsibilities of
security personnel posted at the specific post, the authorized access of persons
(employees, visitors, contractors, deliveries, etc.), vehicles (employee and visitor
cars, etc.), and items (laptops, office furniture etc.) into and out of the facility at
the specific access point.
7.2 Warning signs such as the following must be posted (and be highly visible) at all
access points where they may be relevant:
• “Restricted Area”
• “Authorized Personnel Only”
• “Firearm Free Zone”
• “Identification Checkpoint”
• “Entry Constitutes Consent to Search of Person & Vehicle for Illegal
Items and Weapons”
• “The Control of Access to Public Premises and Vehicles Act is applicable
at these Premises”.
7.4 Employees must present their access cards to the security officer upon entrance
and exit and wear their cards at all times while present in the facility.
7.5 All visitors (clients, service providers, contractors, etc.) must be stopped at the
gate or entrance, their visit confirmed with the host, a visitor access card issued,
visitor register completed and any containers opened and inspected for illegal /
prohibited items. &o privately owned vehicles must be permitted inside (Head
Office) the facility (access must be restricted to the relevant parking or delivery
areas).
7.6.1.2 Official visitors (for official purposes – attending of meetings, etc.). Ad hoc
contractors, electricians, technicians, etc. are included, with the exception of
those mentioned in par. 7.6.1.3 below.
Official VIP's.
The hosts must arrange for the reception and departure of the VIP's. All
instructions from Management and Security regarding such a visitor has to be
complied with and strictly adhered to. Any assistant or helper accompanying
the VIP has to be provided with a visitor’s card for record purposes. The VIP
has to be made aware that such an assistant/helper has to accompany him/her
constantly and also leave the building with him/her.
Official Visitors.
This category of visitor (as described above) must report to the access control
point, goes through all applicable access control procedures (as described in
par 3. above) and be escorted to the venue of the meeting, workplace, etc.
For this purpose the host is responsible to meet this visitor at the access
control point and ensure that the visitor is accompanied /escorted for the full
duration of his/her presence on the premises.
This category of vetted visitors (as explained above) may be issued with
permanent access cards; which must be programmed to provide restricted
access privileges only. Escorting is not essential, although the security zones
to which they may have access must be strictly controlled and monitored by
security personnel.
Children under the age of 11 years will be allowed into the offices, after
obtaining approval from the Security Officer. This will only be allowed in
EXCEPTIO&AL CIRCUMSTA&CES (e.g. where a sick child has to be taken
to the doctor and an appointment cannot be secured outside working hours).
Children older than 11 years will be allowed into facility offices for not more
than two hours. They must wait to be attended to by their parents at reception.
Chairs will be placed in the reception area for this purpose. Children should
not be left alone at reception for more than two hours.
Call the visitor and get all his/her details required in the
“NOTIFICATION OF VISITOR” form.
Fill in “NOTIFICATION OF VISITOR” form and hand it in to SECURITY at the MAIN RECEPTION / ACCESS
POINT a day before the appointment. If the appointment is scheduled on the same day, the form must be
handed in three hours before the appointment.
Should employees require meeting facilities, it must be indicated in the form in the section “MEETING
FACILITIES BOOKING”, and select according to requirements. Such bookings must be communicated (and the
form must be handed in) before 15:00 a day before the meeting for proper facilitation of bookings.
• All visitors must be collected at the MAIN RECEPTION / ACCESS POINT by the employee hosting the
meeting.
• The visitor must be escorted by the employee hosting the visit at all times while on the premises.
• The visitors’ access card will be linked to that of the employee hosting the visitor.
• All visitors must be escorted back to the reception to unlink the cards and the employee must sign that
the visitor has been returned.
Each person authorized to work within the facility must be issued an access card
for entrance and exit purposes.
• a colour photo;
• the employee’s name and signature;
• pay number;
• the employee’s position; and
• an expiry date.
8.1.3 Each employee’s access card must be programmed (by the security officials
assigned with this specific responsibility) and be linked to HR system to allow
access to specific zones, this being based on his or her job or position
requirements.
8.1.4 Employees who have forgotten or lost their cards must be issued a temporary
card for the day or while a new card is being prepared at employees R50.00 fee.
9.1.1 The number of facility entrances and exits must be limited to a minimum and
their purposes specifically defined. There must be separate gates for pedestrians
and vehicles. Likewise, there must be separate gates for the entrance and exit of
those vehicles driven by employees, service providers, clients and visitors.
Physically, the gates must be constructed so as to meet the same minimum
standards as the perimeter fence. These gates must lock with heavy-duty security
padlocks. Keys to the gates must be controlled by security personnel.
• fire extinguisher;
• first aid kit;
• flashlight;
• belly scope;
• power points;
• communication equipment (radio, telephone);
• rain protection equipment;
• vehicle and visitor gate register;
• occurrence book;
• after-hours register;
• equipment control registers;
• emergency telephone notification list;
• security post orders;
• relevant contingency plan;
• screening equipment (x-ray machines, metal detectors);
• security booths and turnstiles at pedestrian entrances;
• CCTV surveillance cameras;
• panic alarms.
The functions of a security control room should include and but not restricted:
The following information sources should be available in the security control room:
The physical structure of the control room should have the following characteristics:
……………………………………………… ………………………….
Executive Director: Corporate Services Date
Adv Mosotho Petlane
.......................................................... ........................................
Municipal Manager Date
Mr. Yunus Chamda
The objective of this directive is to describe the minimum security measure that shall
be implemented to reduce the risk of human error and to prevent the personnel and
contractors from committing sabotage, espionage, subversion or actions posing the
security threat.
- The Municipal Manager shall ensure that personnel with access to classified
information are vetted.
- The Municipal Manager and ED: Corporate Services in consultation with the
Security Manager shall determine the level of security clearance for each
applicant.
- Every employee who has access to classified information must be vetted. The
Security Manager with assistance of Sedibeng District Municipality Security
Committee shall from time to time identify critical areas with regard to flow of
information and recommend to the Municipal Manager who must be vetted or re-
vetted.
(a) All prospective employees shall be subjected to security checks when they take
appointments with Sedibeng District Municipality. When security checks are
favourable, the prospective employee will be employed on probation, during
which proper vetting will be conducted.
(b) Permanent appointment of the prospective employee will depend on the outcome
of the results of vetting.
(a) Sedibeng District Municipality must indicate in advance on the documents to the
Bid Evaluation and Bid Adjudication Committee or Contractors the security
implications that should be taken into consideration/account when they perform
their duties. A reason must be given for the inclusion of a clause in the tender
document that indicating the degree of level, as well as the clause to ensure the
maintenance of security during performance of the contract. The clause should
read as follows;
- Acceptance of the tender is subject to the condition that both the contracting
company and its personnel providing the services to Sedibeng District
Municipality, must be subjected to record checking as the interim measure before
they can be cleared by &ational Intelligence Agency to the level of
CO&FIDE&TIAL, SECRET, TOP SECRET. If the principal contractor appoints a
subcontractor, the same provisions and measures will apply.
(b) Acceptance of the tender is also subject to the condition that the contractor will
implement such security measures as the safe performance of the contract
require.
(a) In the event where an official with clearance travels abroad, the ED: Corporate
Services or a person assigned for the preparations must keep record of such
visits. The appropriate form must be completed and submitted to the Security
Manager.
(b) When officials are travelling abroad, they must be on the guard against any
attempt by a foreign intelligence to recruit them. If a person is approached, he
/she must immediately on returning, report the fact to Municipal Manager and
Security Manager and such information will be conveyed to the &IA.
While travelling, officials must maintain a low profile and be careful not to place
themselves under compromising situations.
…………………………………………. ……………….
Executive Director: Corporate Services Date
Adv Mosotho Petlane
……………………………………………….. ……………………
Municipal Manager Date
Mr Yunus Chamda
The objective of this directive is to ensure the efficiency and effectiveness of security programs,
which must be able to administer within the particular mandates and according to Sedibeng
District Municipality’s priorities, budget, and organizational cultures and environments .These
principles are recognised by the MISS at the same time to respond to specific concerns and other
conditions by advocating a risk management approach to security.
Security Administration
(a) The Municipal Manager, Executive Director: Corporate Service, Director: Facilities
Management Directorate and Security Manager must ensure that Security Unit
implement an effective security program that is an integral part of the overall
institutional goals and objectives and that it meets the requirements of applicable
national legislation and Minimum Security Standards (MISS).
(b) Ensure that security measures applied for protection of sensitive information, assets and
employees are based on a risk management methodology and MISS.
(c) Ensure that effective security awareness and training programs are in place.
(d) Ensure that possible breaches of security are investigated, that action is taken to
minimize loss, and that appropriate administrative or disciplinary action is taken, if
warranted.
(e) Ensure that security requirements are included with other requirements in contracts
when they involve access to sensitive information and assets.
• Develop and implement security policy and security directives for municipal internal
security management.
• Management and monitoring of security service provider contract and performance.
Adhoc security service from all Clusters
• Security provision during the institution’s events: all employees should forward a
formal written memo to Security Manager signed by the relevant MA&CO member
or as delegated five (5) working days before the date of the event;
• Approved memo should indicate number of security personnel requested, vote
number, budget available for Security Manager to deduct charge out fee against the
relevant vote number.
• Security Manager to facilitate and co-ordinate the following:
o Security Committee
o Parking Committee
o Emergency Response Action Committee.
• To conduct security awareness and training programs twice a year for the all the
employees.
• SDM Security personnel must attend security course provided by &IA for minimum
security competency compliance.
• The Municipal Manager, Executive Director :Corporate Services,Director:Faclities
Management Directorate and Security Manager must implement minimum physical
security measures i.e. access control, camera’s are functioning for security breaches
investigations, control room in compliance with minimum standard.
............................................................... .............................
Executive Director: Corporate Services Date
Adv Mosotho Petlane
............................................ ..........................
Municipal Manager Date
Mr Yunus Chamda
Manager: Internal
Security Services
(ISS)
Senior Internal
Security Officer
(SISO)
Internal Security
Administrator (ISA)
The objective of this directive is to ensure that a specific office, boardroom or other
facility that will be or is frequently used for sensitive discussions can be used without the
possibility of the proceedings being intercepted or monitored. Secondly, to ensure long
term sterility by requiring proper security measures to such facilities as precondition for
the service.
Employee’s responsibilities
(a) Sensitive areas must always be under responsible control and comply with the
Minimum Information Security Standards.
(b) Effective access and key control to sensitive areas must be maintained before and
after TSCM inspection to ensure long term protection.
(c) Vulnerable areas must be identified in sensitive discussion areas and report to the
Security Manager.
(e) Records must be kept of all maintenance and installation personnel activities and
all other visits by outsiders to sensitive areas.
(f) Requests for TSCM services must be forwarded through the allocated security
advisor of the institution. Requests may under no circumstances forwarded
directly to &IA TSCM unit.
(g) Suspicions of electronic surveillance should never be discussed in the direct area
of concern. This includes requesting a TSCM service by telephone to or
questioning &IA investigators about sweeping, bugging or tapping in the target or
adjacent areas.
(h) Verbal requests must be followed up by means of a written request stating the
reason for concern.
(i) Security Manager must assist &IA TSCM team to effectively execute its function
by facilitating access to targeted areas and providing all pre survey information.
(j) Telephones and cellular phones must never be used for sensitive conversations.
(l) Agendas for meetings stating sensitive points of discussion must be properly
handled and secured in order to comply with the need-to-know principle and to
prevent non participants to know well in advance what is going to be discussed.
The same applies to the travelling of the Executive Mayor, the Speaker and
Municipal Manager, Executive Directors and Chief Financial Officer.
(m) Electronic equipment such as cellular phones and laptops computers should not
be allowed in sensitive discussion areas. All electronic equipment such as pagers,
electronic diaries and pocket calculators can be modified into transmitters.
Safekeeping should be arranged for such equipments and we should provide our
own electronic equipment that can be utilized for electronic presentations.
(n) Employees must be on the look-out for signs of tempering in their offices and/ or
unusual behaviour which may be an indication of an electronic surveillance
operation and report immediately to the Security Manager.
(o) Any signs of efforts to gain illegal or surreptitious entry to TSCM secured areas
must be reported immediately to the Security Manager.
................................................................
.......................
Executive Director: Corporate Services Date
Adv Mosotho Petlane
................................................
...........................
Municipal Manager Date
Mr Yunus Chamda
ANNEXURE: A
SEDIBENG DISTRICT
MUNICIPALITY
EMERGENCY
EVACUATION
PROCEDURES
O EMERGECY PROCEDURES
1 Emergency Contact Numbers
2 Client Contact Numbers
3 Emergency Contingency Plan
(Where does security staff fit in?)
3.1 Fire
3.2 Flooding
3.3 Injury
3.4 Evacuation
3.5 Telephonic Bomb Threat
3.6 Intrusion
4 ADDITIOAL TASKS/IFORMATIO
S A Police 10111
Fire Department 10177
Ambulance 10177
Flying Squad 10111
Company Directors
Mr. Rian van Zyl 082 854 8057
Mr. Paulos Mamuvila 082 386 8762
General Manager
Mr. Jaco Smith 072 144 1441
Operations Manager
Mr. Andries van Tonder 082 714 3905
SECTIO SUBJECT
2 IMPLEMENTATION AUTHORITY
3 EMERGENCY CONDITIONS
4 PRECAUTIONARY PHASE
5 ACTIVE PHASE
7 CONTROL CENTRE
8 EVACUATION PROCEDURES
9 FIRST AID
10 RENDEZVOUS POINT
12 FIRE
14 CIVIL DEFENCE
15 SITE PLANS
16 ALARM SIGNALS
EMERGENCY PROCEDURES
SECTION 1
1. AIM:
1.1 To provide procedures, equipment and manpower in the event of an emergency arising
at or near Sedibeng District Municipality.
1.2 To ensure the orderly and efficient transition from normal to emergency operations and to
maintain the continuity of production during periods of social or industrial unrest.
SECTION 2
2. IMPLEMENTATION AUTHORITY
The Emergency Plan may be activated either wholly or partially by any Executive Director or Futuris
Guarding Systems Site Manager.
2.1 The nature and extent of possible threat to life and property.
SECTION 3
EMERGENCY CONDITIONS
3. Precautionary phase
Precautionary measure, as listed in section 4, may be activated when the following conditions apply:-
3.2 Threats
3.3 Sabotage
An act of sabotage or arson is committed against Sedibeng District Municipality.
3.6 Rioting
There is unrest in the immediate area of the plant, which is either affecting or is about to
affect the safety of personnel and assets.
3.7 Sabotage
3.8 Disaster
The plant is threatened by serious fire or natural disaster.
SECTION 4
4. PRECAUTIONARY PHASE
4.2 Updating the emergency plan if this was last done more than one month previously.
4.9 Briefing emergency volunteers and teams and placing them on stand-by.
4.15 Psychologically preparing employees to remain on the job and to resist outside
pressures
by :-
4.16 Giving employees daily briefings immediately before or during disturbances, which
are aimed at dispelling rumors and speculation.
4.17 Closing the main, gates when they are not in actual use.
SECTION 5
5. ACTIVE PHASE
5.1 Dependent on the actual nature of the emergency consideration should be given to
activating the following procedures:-
SECTION 6
6.1 AIM
Plans of action are necessary to deal with the following manifestations of industrial unrest:-
6.3.1 Immediate liaison must be set up between the under mentioned so as to ensure
both a co-ordinated plan of action and the necessary protection of personnel and
assets should violence ensue:-
* Executive Directors
* Works management
* Personnel department
* Security department
6.3.2 In the event of passive industrial action, i.e. go-slow or work stoppage, the following
precautions should be taken:-
6.3.3 Identifying spokesmen/ringleaders and commencing negotiations away from
crowds, providing there is a return to work.
6.3.4 Avoiding provocation and confrontation at all costs.
6.3.5 Keeping the police off the property.
6.3.6 Not employing casual workmen to replace striking employees.
6.3.7 Having security staff maintain a low profile whilst monitoring employee activities and
placing additional staff on standby.
6.3.8 Should the industrial action take a militant form or violence become imminent, the
following steps should be considered:-
6.3.9 Requesting police assistance.
6.3.10 Permitting exit from the plant and access to the car park by both non-involved
employees and troublemakers.
6.3.11 Evacuation of office staff.
6.3.12 Evacuation of entire plant.
6.3.13 Securing and guarding of:-
* Main store
* Inflammable stores
* Erection store
* Fuel pumps
* L.P. Gas
* Garage
* Transport
* Restricted workshops
* Vital machinery
* Office block
* Key cupboards
6.3.14 Bringing entire security force on to site equipped for overnight stay.
6.3.15 Utilising the services of loyal employees in the control of unruly mobs.
6.3.16 Arming security personnel in the event of danger to life or property.
6.3.17 Advising neighboring companies by using the cellular.
CONTROL CENTRE
* 1 x Assistant
7.4 Equipment requirements:-
* 1 Cellular telephone
* Incident logbook
* List of key personnel addresses, telephone numbers and cellular phone numbers
* Site plan containing the location of the following:-
* Water mains
* Electrical mains, transformers and distribution boards
* Fire fighting equipment
* First aid equipment
* Safety equipment
* Manifolds and LPG storage areas
* Compressors
* Fuel and inflammables
* Emergency exits
* Employee distribution
* Assembly places and evacuation routes.
* Area map showing police and municipal boundaries and employee rendezvous points.
* List of volunteers for emergency duties
* List of important external telephone numbers
* Torches
* Loud hailers
* Handcuffs
SECTION 8
EVACUATION PROCEDURES
Marshals:
Exit:
Marshals:
Exit:
Marshals:
Exit:
Marshals:
8.2.1 Route 1
Via the main gate.
8.2.2 Route 2
Via the route shown on annexure ‘D’ to the assembly area indicated within the yard.
8.2.3 The appropriate route and assembly area will be selected by either the Executive Director or the
Security Chief.
8.3.1 Ensuring that all persons, including visitors, in their area are accounted for and evacuated.
8.3.2 Checking that windows are closed in the event of a fire, and that all electrical equipment is
switched off.
8.3.3 Carrying out a brief search of each office or other room in the presence of the occupants, where
possible, and reporting any suspicious containers or packages to security staff.
8.3.4 Grouping staff/visitors from their areas of responsibility together at the selected assembly area
whilst waiting further instructions.
8.3.5 Ensuring that no personal vehicles are taken out of the plant by evacuated personnel.
8.4.1 Implementation
8.4.1.1 In the event of a total evacuation of Sedibeng District Municipality being ordered this will
be signaled by the hooter being activated as a siren, i.e. the hooter will be switched on
and off giving it a rising and falling note.
8.4.1.2 Should a partial evacuation of the Works be ordered instructions will be passed to
production departments either by telephone or word of mouth by Management as
indicated in Annexure “A”.
8.4.1.3 Where a partial evacuation affects non-productive departments, the relevant instructions
will be passed by either telephone or word of mouth by Management as indicated in
Annexure “B”.
In the event of total evacuation of the plant being ordered, personnel will make their way to the
assembly area in the Institution car park. In order to avoid congestion at the main gate, which
could delay the arrival of emergency services as well as cause possible injuries to personnel, the
plant will be evacuated along the three routes as indicated below.
Should a partial evacuation of the premises become necessary or should it be considered that the
car park is not suitable as an assembly area for any reason, then evacuated personnel should
make their way by the most direct route to the assembly area within the works as indicated on
Annexure “I”.
8.4.4 Implementation
8.4.4.1 On hearing the evacuation siren, supervisors are responsible for effecting the evacuation
of their workforce and any visitors in as quiet and orderly a fashion as possible, and
along the allocated routes.
8.4.4.2 Machinery and electrical equipment must be shut down and a search should be carried
out, in the event of bomb scare, for any suspicious packages or containers, which must
be reported directly to security staff.
8.4.4.3 Employees must not be permitted to visit the canteen/changing rooms during the course
of the evacuation.
8.4.4.4 Supervisors should keep their personnel in a group and should account for their
workforce as far as is possible.
8.4.4.5 Employees should walk not run along the designated evacuation routes and should wait
at the assembly area for further instructions.
8.4.4.6 Motorcycles, bicycles or vehicles may not be used when evacuating the site.
8.4.4.7 Once the return to work instruction is received, all employees should return by the most
direct route to their work places.
8.4.4.8 Hourly paid personnel must give their employee numbers to security staff at the gate when returning to work.
8.5.1 In the event of a total evacuation of Sedibeng District Municipality being necessary, the Duty
Security Officer will arrange for the evacuation siren to be sounded from one of the following
points:
* Security Office
* Reception
8.5.2 On hearing the evacuation signal, or on being informed that evacuation of the plant is to be
effected, security personnel on duty will act as follows:
8.5.2.1. The senior security officer will make immediate contact with his Security Manager.
8.5.2.2 The Security Manager will advise office area marshals of the evacuation.
8.5.2.3 Security personnel on duty at the gates will turn away all visitors and vehicles, other
than members of the emergency services and their transport.
8.5.2.4 Patrolling staff will be advised of which areas are to be evacuated if the evacuation is
not total, and will assist in ensuring that the relevant workshops, buildings or offices
have been vacated.
8.5.2.5 Patrolling staff will be advised of which areas are to be evacuated if the evacuation is
not total, and will assist in ensuring that the relevant workshops, buildings or offices
have been vacated.
8.5.2.6 Staff on duty at the gates will close them once evacuation is completed, but will remain
at their posts unless instructed otherwise.
8.5.2.7 Any suspicious articles or containers that are located or reported will not be touched
and must be reported to the security manager without delay.
8.5.2.8 The senior security officer is to ensure that the employee numbers of all hourly paid
personnel are recorded at the main gate following an instruction being given to return
to work.
SECTION 9
First Aid
9.1. The location of First Aid boxes throughout the premises is shown on the emergency site plan.
9.2 A Institution vehicle is reserved for the transportation of injured personnel during the day and at night.
SECTION 10
RENDEZVOUS POINT
10.1 Should access to the plant by employees be prevented by roadblocks, rioting or any other cause, personnel may
be pre-warned to assemble at the following point:
SECTION 11
FIRE BRIGADE
Meyerton - 101777
Vereeniging - 101777
Vanderbijlpark -101777
Heidelberg -101777
Sebokeng -101777
HOSPITALS
Meyerton -
Vereeniging - (016) 950- 5000
Vanderbijlpark - (016) 341-6000
Heidelberg - (016) 930- 1100
Sebokeng - (016) 930-3000
POLICE
Meyerton - (016) 362-0126
Vereeniging - (016) 450-2080
Vanderbijlpark - (016) 910-9000
Heidelberg - (016) 341-2570
Sebokeng - (016) 988 1820/4
BOMB SQUAD
SECTION 12
TELEPHONE :
The Fire Brigade will be supplied with a site plan of the Institution containing all
necessary information.
The alarm signal for a serious fire will be the continuous sounding of the institution hooter.
In the event of a serious fire, the Departmental Fire Officer responsible for the area concerned will
activate the fire alarm.
Departmental Fire Officers will report to the scene of any serious fire on being alerted by the alarm and
will form a team to extinguish the fire.
12.2.4 Control
The Senior Departmental fire Officer present will take charge at the scene of the fire and direct all fire
control operations, including any necessary evacuation of the area, until the arrival of the Fire Brigade.
12.2.5 Manpower
A list of Departmental Fire Officers appears at Annexure “A” to this section. Additional trained
employees are listed under Section 19.
The responsibilities of Departmental Fire Officers are attached as Annexure “C” to this section.
12.4.1 The co-ordination of personnel and resources in extinguishing fires in their areas of responsibility.
12.4.2 To report to the scene of and assist at any serious fire outbreaks on the sounding of the fire alarm.
(Continuous sounding of the institution hooter).
12.4.3 The carrying out of weekly inspections of fire appliances in their areas of responsibility.
12.4.4 Ensuring that fire appliances are always accessible and not blocked by waste or production materials.
12.4.5 The policing of non-smoking areas and the reporting of offenders.
12.4.6 Ensuring that safety precautions for the prevention of fires are understood and acted upon.
SECTION 13
13.1 The South African Police have a strength of approximately (??) men at police
station. In addition to this, they can call on an additional unit of approximately (??) men who are used
on consolidated patrol and stand-by duties in the surrounding areas. However, this manpower would be
rapidly dissipated in a large-scale disturbance.
13.2 Should local forces be unable to contain an outbreak of rioting additional police and army manpower
could be called in from other parts of the Province and from Pretoria. Neither the S.A.P.S. nor the
S.A.N.D.F. can give any guarantee of protection for individual companies other than national key points.
CIVIL DEFENCE
14.1 Civil Defence is a co-coordinating body, which is able to marshal all available resources within a
community to cope with and overcome a disaster or state of emergency, i.e.
* Saving lives
* Protecting property
* Maintaining essential services
14.2 There are Civil Defence Field Officers at every Fire Station.
14.3 Civil Defence maintain a fully equipped control room in the city centre and are in immediate contact with
all emergency services.
TELEPHONE NO. -
SECTION 15
SECTION 16
The institution hooter will be activated as a siren, i.e. it will be switched on and off giving it a rising and
falling note.
16.1.2 Fire
The institution hooter will be activated on a continuous note for several minutes.
SECTION 17
17.1 RADIATION
17.1.1 Should an isotope container become damaged, refuse to open or close or if the nuclide is considered to be
insufficiently shielded for any reason, it is the duty of the technician in charge to:
17.1.2 Measure the dose rate.
17.1.3 Evacuate all personnel from the affected area and rope it off.
17.1.4 Advise the Futuris Guarding Systems Site Manager/Safety Officer.
17.1.5 Advise the Responsible Person. (See paragraph 1.3)
17.1.6 In the event of an isotope becoming dislodged from its container the technician in charge will:
17.1.7 Advise the Responsible Person and the Futuris Guarding Systems Site Manager/Safety Officer.
17.1.8 Locate the source with audible and visual monitors.
17.1.9 Evacuate and rope off the area.
17.1.10 Await the arrival of the Responsible Person who will assess the situation and make all arrangements for
recovering the source.
To be determined.
17.2.1 In the event of neither of the Institution responsible persons being available or contactable, the following
persons should be requested to assist:
To be determined.
17.3 Theft
The holder of an authority shall notify the Director-General from the Department of Health and in the case
of theft notify the South African Police by telephone, telegram, facsimile or other similar rapid means of the
event in question, and such notification shall be followed up within seven days by a written report.
17.5 EXPLOSION
17.5.1 Action to be taken in the event of an explosion due to sabotage, fire or other cause should include the
following:
17.5.2 Sounding the fire alarm.
17.5.3 Calling the Fire Brigade and Police.
17.5.4 Removing injured persons from the scene.
17.5.5 Putting out any fires.
SECTION 18
POST-EMERGENCY ENQUIRY
18.1 Depending on the extent of the emergency, it may well be advisable to convene an enquiry to investigate
the impact of the emergency on the Institution and the effectiveness of the emergency plan.
18.1.1 the following comparisons should be made with normal periods:
18.1.2 Daily attendance of employees.
18.1.3 Production.
18.1.4 Continuity of employees/staff.
18.1.5 Damage to the plant should be assessed.
18.1.6 The effectiveness of security systems should be assessed and corrective action taken.
18.1.7 Comparison should be made with the operating capabilities of neighboring businesses during the period
concerned.
18.1.8 Recognition should be given for exemplary performance.
11.3.1 FIRE
Discussed in Emergency Plan.
11.3.2 FLOODING
Discussed in Emergency Plan.
11.3.3 INJURY
Discussed in Emergency Plan.
11.3.4 EVACUATION
Discussed in Emergency Plan.
a. Obtain as much information as possible concerning the caller and the alleged bomb.
b. Immediately notify Tanker Services.
c. Complete the Bomb Threat form.
Obtain as much information as you can concerning the caller and the alleged bomb.
"This is Patrolman ..............(your name) speaking from Sedibeng District Municipality. I have
received a telephone message that there is a bomb on site". (Give any further details that you
may have obtained). Immediately contact the Site Manager, The Head of the Protection Services.
Carry out any instructions that you receive from the Head of Protection Services, Sedibeng District
Municipality.
11.3.6 INTRUSION
Should any unauthorised person be found in the restricted area, the following instructions
will be carried out.
a. The security official will on finding the person, detain him and notify Security Manager.
b. The security official will obtain as much information as possible of the intruders.
c. Any incidents of intruders are to be fully logged in the Occurrence Book and a complete
security report submitted to Head Office as soon as possible.
d. Should the security official be unable to detain the intruder, advice
must be sought from the Security Manager.
To be determined.
Contents
1. Introduction 67
6. Communication 73
1. ITRODUCTIO
This Emergency Response Plan will allow the Sedibeng District Municipality and other
role players within the area to put in place mechanisms which will reduce the risk of an
emergency occurring and which will allow role players to react in a coordinated fashion
in dealing with emergency that may occur in the area.
The Emergency Response Advisory Committee will advise the Municipal Manager on
matters pertaining to emergency responses and it is through this committee that the
emergency Management Plan (See attached draft plan) will be effected according to
circumstances.
• SAPS
• Traffic
• EMS
• Environmental Health
• OHS
• Finance / Supply Chain Management
• HR, and
• Any other department deemed necessary.
In compiling this Plan the following types of emergency/risks have been considered:
The measures that will be put in place will vary according to the situation but generally
the action will include the following:
core of evaluation, decision making and channelling of instructions and should be readily
accessible to the personnel who will manage it.
Suggested personnel to man the JOC (it must be borne in mind that this scenario should
be adapted to suit the situation)
• Deputy Chairperson team leaders and emergency personnel are adequately trained
to perform their duties and that all facets of the plan are practiced regularly;
• Required equipment is procured and kept serviceable and secure;
• Emergency facilities are serviceable and well maintained;
• Communication is effective and those instructions can be given to relevant
personnel in any part of the complex with a minimum of delay;
• The safety of all personnel, occupants (including handicapped) and visitors are
planned for in compliance with the Occupational Health and Safety Act.
• All exits, evacuation routes, location of fire fighting and first aid equipment must
be prominently indicated and clearly reflected on floor plans;
• Monthly status reports are received from all Deputy Chairperson team leaders and
feedback given to top management;
• Deputy Chairperson situations are effective managed;
• Teams are identified according to standard Colour codes;
• Regular exercises must be kept;
• He assumes overall command during emergencies;
• Secretaries/receptionists and switchboard operators are trained to activate
emergency services without delay when authorized to do so and that bomb threats
checklist are kept at all telecommunication points;
• A Control Room and alternative centre is available and equipped. A procedure to
mobilise the Coordinating and Planning Committee is in place;
• Vital movable valuables, records and documents are prioritized for salvage
purposes in the event of fire; etc;
• Plans are maintain, reviewed and updated regularly;
• Team leaders are appointed and their duties are delegated in writing.
• Be responsible for all matters pertaining to fire, evacuation or other emergencies
in the building until the arrival of the Emergency Services;
• Be responsible for maintaining an updated list of all floor Wardens, with
telephone numbers and locations within the building; the list shall be prominently
displayed on each floor;
• Be responsible of ensuring that he/she and the Deputy Chairperson are not
simultaneously absent from the building and that the Deputy obtains all the skills
required to perform as replacement;
• In order to effective perform the role, a sound knowledge of the building, the
position of all fire fighting equipment and special risk areas are required;
• Ensure that all personnel know the evacuation procedure and assembly areas,
• Carry out inspections and report on any defects of fire fighting equipment and fire
doors, cluttered exit routes and poor house keeping, including the careless
use/storage of flammable materials and the careless use of heating appliances and
other electrical equipment.
• Determine the safest evacuation routes. Such routes must be well lit at all times.
• The evacuation routes/alternatives are clearly marked on the floor plans. The
primary and secondary escape routes - preferably in colour.
• Appointment of sufficient evacuation wardens and delegating their duties and
responsibilities in writing;
• Training of evacuation wardens, personnel and occupants to adequate evacuation
standards;
• A record should be kept of frail and handicapped personnel and occupants.
Special arrangements should be made in consultation with the first aid leader for
assisted evacuation;
• Evacuation plans should also cater for total evacuation of multi-story buildings.
To prevent congestion along evacuation routes different floors could be
evacuated simultaneously;
• Ensure that doors and windows are closed in the event of a fire and opened in the
event of a bomb incidents;
• Ensure that panic is kept to a minimum when evacuating and that order is
maintained throughout;
• Identification of a number of suitable evacuation assembly points, depending on
the nature of the threat.
• These assembly points should be selected in consultation with security and fire
leaders and must be reflected on floor plans;
• That the complex is searched following evacuation to ensure that personnel,
occupants and visitors have left and that the areas are cleared;
• That orderly shutdown procedures are adhered to;
• That regular status reports are received from the evacuation wardens during and
after evacuation and forwarded to the Chairperson;
• That evacuation wardens are adequately equipped to perform their duties and to
ensure that they are identifiable by means of the recommended colour codes;
• That evacuation instructions are issued confidentially or in code to alleviate panic;
• Assist the Chairperson with planning and the management of actual emergencies
• Notify the JOC that the floor is “clear” and proceed out of the building;
• Ensure that basic security are up to date and carried out by the Security Service
Provider;
• After any evacuation of the building ensure that SDM management is advised that
all staff are accounted for;
• To ensure that all Security Personnel are qualified and trained in CPR and First
Aid
• Serve as the Alternate Evacuation Coordinator; and
• Coordinate the shutdown of operation and systems within the building(s) when
necessary
5. PROCEDURAL DELEGATED FUCTIOS
It must be borne in mind that this Emergency Management Plan is an active document
+circumstances. The Municipal Manager will delegate responsibility to the Chairperson
and the committee to make decisions in respect of the following:
Total evacuation
Releasing employees
Emergency procurement depending on the need/circumstances
Closing of services
Declaring of disaster
Delegating powers on cross cutting issues
These delegated powers will be applicable to all operational offices of the Sedibeng
District Municipality and includes but not limited to the following areas:
• Sedibeng District Municipality Head office
• Vaal Technorama
• Ventura
• MSDC
• Licensing offices
• Youth Centres
• Fresh Produce Market
6. COMMUICATIO