Appendix 9 – Example - Opening and Closing Procedure

Opening and Closing Procedures – ###

Summary

The protection of ### Limited assets and information is of critical importance to our continued existence and ongoing reputation. Therefore, it is important that we are proactive in taking steps to protect our information and assets.

The following procedure will be adopted by all staff involved with opening or being the last to leave the office at night. Failure to follow these actions will be viewed as a security breach; if recklessness is shown then it will be considered a serious security breach and disciplinary action may be taken.

Opening 

  1. Disengage the mortise lock.

  2. If the lock is not engaged find out who was the last to leave. Report to the Office Manager.

  3. If the lock was engaged and was found insecure inform the MD immediately.

  4. Within 20 seconds present the alarm fob to the control panel to turn off the alarm.

  5. Open the filing cabinets ready for daily use.

 

Operational Hours

  1. It is acceptable to put the door ‘on the latch’ during office hours. However, it should never be left in that state if the office is unattended, irrespective of the time frame.

 

Closing 

  1. All classified and sensitive materials should be cleared from desks and locked away.

  2. The secure store door should be checked and the alarm set.

  3. All windows are to be closed.

  4. Shared cabinets must be locked.

  5. The alarm fob is to be presented to the control panel and a 20-second sounder should be heard. (If no sounder is heard then the alarm has not been set (check 2. above) and the process must be retried. If it still does not set call the Office Manager.)

  6. When the sounder is heard leave the office and turn the key in the mortise lock (this fully arms the intruder alarm system).

 

If anybody has any questions about this process, they should be raised with Office Manager in the first instance.

Previous
Previous

Appendix 8 – Fire Alarm System Categories & Meanings

Next
Next

Appendix 10 – Example – Access Control Procedure