The Context

Recognising Security Threats

Recognising Security Threats

This lesson will treat the basic knowledge of techniques used to circumvent security measures, to enable recognition of weapons, dangerous substances, dangerous goods, devices and the awareness of the damage they can cause.

0%

Methods for Maintaining Security

Methods for Maintaining Security

This lesson will treat the basic knowledge of training, drill and exercise requirements under relevant conventions and codes.

0%
Log In to Seably
You need to log in to save your progress and earn a certificate.
Log in to Seably to save your progress.
Log In
2

Step 2 of 105 minutes read

The Context

The Context.mp3

00:00 00:00

Defining the Context

As reported in the "Exercitium", the EUROPEAN HANDBOOK OF MARITIME SECURITY EXERCISES AND DRILLS published by Antwerp Port Authority, the Ports are complex places, covering a wide area with many kilometres of quays and involving hundreds of companies and thousands of people.

There are just as many points and times when security may be compromised, either through human error or through malicious intent. We should always be thoroughly prepared for such occasions. We can do this only by having detailed Security Plans and by exercising these plans in realistic settings.  While theoretical knowledge is important, we have to practice the relevant skills so that we know they will work in an emergency. 

Application

The ISPS Code applies to: 

  1. The following types of ships engaged on international voyages: passenger ships (including high-speed passenger craft), cargo ships( including high-speed craft), of 500 gross tonnes and upwards and mobile offshore drilling units;
  2. Port facilities serving such ships engaged on international voyages.

Responsibilities of Governments

Contracting Governments shall set security levels and provide guidance for protection from security incidents. Higher security levels indicate a greater likelihood of the occurrence of a security incident. 

Factors to be considered in setting the appropriate security level include: 

  1. The degree that the threat information is credible;
  2. The degree that the threat information is corroborated;
  3. The degree that the threat information is specific or imminent;
  4. The potential consequences of such a security incident.

When an Administration establishes security level 3, appropriate instructions and information relating to the security of ships and port facilities that may be affected are given. 

Contracting Governments may delegate to a recognised security organisation, some of their security tasks under chapter XI-2 and part A of the Code contain exceptions to the security level applicable for their country, i.e: 

  • Approving a port facility security assessment and subsequent amendments for the approved assessment;
  • In determining which port facilities they will be required to designate a Port Facility Security Officer;
  • The approval of a Port Facility Security Plan and subsequent amendments;
  • In exercising control and compliance measures pursuant to Solas Rule XI-2/9 as well as establishing the requirements for a Declaration of Security (DoS).

Contracting Governments, to the extent they deem appropriate, shall verify the effectiveness of the ship or port facility security plans or changes to such plans they have approved or in the case of ships, plans that have been approved for their account.