[Sample ] Security Policy
Policy No / Date / Phone:
Version / Owner / Email:
Review Date / Writer / Contact

Purpose

A statement that explains what the document sets out to achieve. For example, Museum A has identified that there is an organisational need to improve security, including awareness of staff and volunteers and this policy seeks to outline the requirements of management in achieving this improvement.

Scope

A statement that outlines what is to be included in the policy. For Example, All employees, staff, volunteers, students and interns must comply with this policy which is intended to put people at the heart of securing our buildings and collections. This policy is intended to be implemented on all museum premises, including galleries, stores, offices and out-buildings. In the case of New Forest Centre it needs to include the tourist information centre and staff.

Statements

This section is intended to include individual statements on the aspects of security that are relevant to the organisation. For example:

Security Management:

The trustees/local authority/owners recognise that good security management is important in ensuring the safety of visitors and staff at Museum A. Security management is also vital in providing a resilient business plan and business continuity. Such management provides a secure environment in which to house and display collections.

At Museum A we take security seriously and we have identified [Management Team Member - PERSON A ] who will be the person responsible for security within the organisation. They have the full support of the management team.

Security will be a standing item on management team meetings.

This security policy will be reviewed on at least an annual basis.

Environmental Visual Audits:

Museum A will conduct EVA’s on a regular basis utilising the template designed by

The results of the audit will be fed back to management for action based on the urgency of the findings, either through a ‘hot debrief’ or inclusion on monthly management meetings.

Incident Book:

Museum A will commence an incident book which will be used to contemporaneously record incidents that may impact on the security of the museum, such as suspicious persons or vehicles, incidents of crime, false intruder alarm activations or intelligence briefings received from other museums or agencies.

The incident book must be available for review by management on a daily basis and must be presented during monthly management meetings.

Minimum Staffing levels:

Museum A will adopt the following minimum staffing levels.

  1. Normal Operating Hours
  2. Shop/Café/retail
  3. Opening and closing procedures
  4. Invigilation
  5. Special Events

Lone Worker Policy:

Museum A will adopt the following policy in relation to Lone Working.

It is accepted that there will be times, outside normal operating hours, that staff and volunteers will be required to work on their own both within the museum and externally in exceptional circumstances. The museum management recognises that we have a duty of care to everyone who works within the museum.

The following measures will be adopted to ensure the safety of our people.

  1. Buddy System
  2. Personal attack alarm
  3. Smart phone app

Key management:

Museum A management recognises that good key management is fundamental to the security of the museum and all efforts must be made to minimise the number and nature of keys that leave the premises. By doing so, we can ensure that losses are kept to a minimum, un-necessary or illegitimate duplication can be avoided and the costs connected with replacing important locks can be minimised.

All internal keys must be secured in a key safe which is situated in locked cabinet in an alarmed room. Only 2 sets of keys to operate the main entrance door will leave the premises.

These keys are to be held by x and Y. One back up set of keys for emergency use will be held at Z

Retail Security:

  1. Cash Management
  2. Stock Control
  3. Personnel

Intruder Alarm System:

  1. SLA with supply company
  2. Servicing
  3. Tests
  4. Call Outs
  5. False Activations – Robustly Investigate

CCTV System:

Ditto

Recruitment of personnel: (Separate Guidelines Document?)

  1. Job Description (include policy statement on security)
  2. Application process
  3. Advert
  4. Vetting
  5. Referees
  6. Induction
  7. Handbook
  8. Training
  9. On-going development & supervision
  10. Disciplinary Process
  11. Exit Strategy
  12. Knowledge Assets
  13. Physical Assets
  14. Keys/Codes/Passwords

Related Documents

  • Emergency Plan
  • Forward Plan
  • Accreditation Application/Renewal
  • Recruitment Policy/Guidelines
  • H&S
  • Equal Opportunities Policy

Approval

Revisions