Argumento de The Isps Code - 3
The application of the mandatory rules contained in Chapter XI-2 of the SOLAS Convention, known as the ISPS Code (adopted on the 12th of December 2002, in force since the 1st of July 2004), as well as of the Regulation of the European Parliament and of the Council (adopted on 31st of March 2004, in force since the 20th of May of the same year), towards the protection of the marine environment, constitutes a difficult challenge for those responsible for security. The main concern is the protection of the ship-port interface, and all procedures should be focused on creating a tight barrier to all past, present and future threats. This study offers a level of specialised knowledge on those subjects included in the security area, both regarding detection procedure methodologies for risks related to criminal human participation (identification of clues, signs, actions, behavioural patterns, responses to certain control stimuli, etc.) and from the ship standpoint as an independent, autonomous unit to control her integral safety. Contents are addressed taking into account the three main blocks that play a role in security: the ship, her types, structural design and transits; the port as a filter for the threats intending to reach the ship; and the individuals involved in both, besides the criminal elements causing the crisis.0Introduction 1 On board organisation 1.1 Regulatory sources 1.2 Considerations on the ISM Code and quality standards 1.3 Addressing emergencies 1.4 Partial conclusions 2 The port.
Internal Emergency Plans 2.1 Introduction and legal framework 2.2 Objectives and goals of the Internal Emergency Plans (IEPs) 2.3 Essential components with an operating character in a fictitious PFSP 2.4 Partial conclusions 3.
Security team 3.1 Current crews in national ships 3.2 Influence of personnel and action plans 3.3 Influence of time and difficulty in acting 3.4 Crew level on security training 3.5 Partial conclusions 4 Organisation of emergencies on board 4.1 Organising an emergency 4.2 Synthesis of emergency actions (bridge officers) 4.3 Organising emergencies at the port 4.4 Terrorism and piracy 4.5 Stowaways 5 Principles and considerations towards a response 5.1 Response 5.2 Strategies (motives) 5.3 Tactics (methods) 5.4 Piracy 5.5 Terrorism 5.6 Drugs 5.7 Other forms of criminal violence at sea 5.8 Hijacking yachts, and other violent acts against smaller vessels 5.9 Labour conflicts 5.10 Immigration related violence 5.11 Ecoterrorism 5.12 Conclusion 6 Ship security application case 6.1 Work scheme 6.2 Passenger ship security 6.3 Security 6.4 Means of division 6.5 Accreditation card 6.6 Structure of a control system 6.7 Security aboard the Sedna 6.8 Yet another application of the Ship Security Plan to the same ship 7 Analysis of the interrelationships between plans 7.1 Analysis procedure 7.2 Impact of security on the safety concept 7.3 Addressing antisocial acts 7.4 Deriving from social activities 7.5 Terrorist actions 7.6 Emergency determinants in security aspects 8 Conclusions Bibliography