Sei sulla pagina 1di 30

Overview of the ISPS

Code

CMET. LUCKNOW

Background
Seafarers and ships have faced threats to their
security ever since trade began. History is
replete with piracy on the high seas.
In modern times terrorism was not seen as a
threat.
Terrorist attacks that did occur were against
passenger or Cruise ships.
In 1985 A Passenger ship Achille Lauro was
attacked off Egypt and City of Poros in Greece
in 1989.

IMO
Following the incident of Achille Laura, the IMO
adopted a set of Safety Guidelines:
Published in MSC Circular 443 in 1986.
No legislation was produced and it was left to
individual countries to form their own legislation
On 11th Sept.,2001 The Twin Towers in the USA
were attacked by terrorists.
The situation changed radically. It was
concluded that terrorists could use ships as
weapons, or carry weapons or terrorists into
target countries and so cause immeasurable
harm to world economy.

Action by IMO
Member Governments of IMO developed a
security regime for international shipping in just
one year.
Prevent and suppress acts of terrorism and
strengthen maritime security by a conference
in London in December, 2002. IMO agreed to
9 amendments.
An instrument for legislation was required.
So, by amendments to SOLAS 1974, the ISPS
code was enshrined in Chapter XI.
It Became Mandatory & came into effect from 1 st
July,2004

Affected Parties
Port Facilities serving ships on international
voyages
All passenger ships including high speed
passenger craft on international voyages
All other ships, including high speed cargo craft
over 500 GT on international voyages
Mobile offshore drilling units over 500 GT, when
in transition on an international voyage

Why an ISPS Code

Application of the code would act as a help in


detection & deterrence to the threats to
international maritime trade in:Terrorism
Piracy and armed robbery
Stowaways and illegal immigration
Drug smuggling
Theft and criminal activities

Principals & Objectives of the ISPS Code


The objective is to ensure an internationally agreed
response to the threats faced by the international
maritime transportation chain, consisting of ships
and port facilities handling such ships.
The ISPS code is expressed in general terms and gives
a wide scope to all nations and shipping companies
to develop their own management systems.
The scope of the code is limited to detection and
deterrence and does not include actual response to
threats.
The code is basically a risk management activity.

The Security Culture


It is to be borne in mind that the ISPS Code is black and
white. There is no element of non-conformity since
any breach in security - results in non-compliance.
Success in implementation of the code requires a
security service mindset, which is:
Intolerant
Unwavering
Unforgiving in its approach, while always
contemplating consequences of security breach.
In other words the ideal security system should be
effective and efficient.

Enforcement in India
Like other IMO instruments , member states are
permitted to delegate some of their responsibilities
to:
Recognised Security Organisations such
organisations are to satisfy their competency to match
the standards set by IMO to the Flag State.
Most of the Governments have delegated this
responsibility to Classification societies and some
security firms.
The Indian register of Shipping is entrusted with this
task in India.
A 24x7 communications center dedicated for receiving
Ship Security Alerts and handling related
communications

The ISPS Code


The Code is divided into two parts:
1. Part A Mandatory Section. This contains detailed
security- related requirements
a. Governments
b. Port Authorities, and
c. Shipping Companies
2. Part B Non- mandatory Section. This contains a
series of Guidelines about how to meet these
requirements.
3. Some measures not covered by the Code
resolutions meant to add weight to the amendments.

Mandatory Measures
1. Ships to develop Security Plans and have
ship security officer.
2. Shipping companies to appoint company
security officer
3. Development of comprehensive security
plans for international port facilities.
( Port Facility refers to areas where a vessel
covered by SOLAS 74 receives services).

Security Levels
For designated port facilities; the code mandates
a system of three security levels
Declaration of a security level automatically
triggers the implementation of appropriate
security measures for the ship and for the port.
Ship security plans must include procedures for
each of these security levels to enable
immediate response by officers and crew.

Security Assessments
To establish a security level in each port facility
requires the contracting signatory government
to conduct security assessments to identify
critical assets as well as areas, equipment, and
buildings where an attack could cause
significant loss of life, or damage to the port
facility economy or the environment.
The assessment must then identify the likely
threats to these critical assets, helping to
prioritize security measures.

Assessment of Port Weaknesses


Port must identify port weaknesses with respect
to:
Physical security
Structural integrity
Protection systems
Procedural policies
Communication systems
Transportation infrastructure
Utilities, and
Other likely targets

ISPS Code Part B


This part may be said to be the voluntary part of the
code. It has been written for guidance to:
Governments
Local administrations, and
Shipping and Port Authorities
It is to help them in the implementation of the
requirements of Part-A of ISPS Code.
E.g., Part A calls for 3 security levels. A ship visiting the
facility is told as to what security level exists in the port
and she will have to match its procedures to that level.
Part-B Offers suggestions as to what might constitute
appropriate procedures for those three security levels.

Implementation
1. The onus of implementing these new regulations
falls squarely on the IMO member governments.
Flag states must approve ship security plans for their
registered vessels.
2. They must also verify compliance of part-A and
amendments to Solas 74 (also Mandatory).
3. Governments of the flag states are to issue their
registered vessels with International Ship Security
Certificates.
4. They are to designate the port facilities, appoint a
Port facility Security Officer, carry out Port Facility
assessment and develop port facility security plan.

Legal implication of Action/non-action by SSO

The duties of the ship security officer are laid


down in para 12 of part-A of the code. The
guideline for the same are in para 8,9 and 13 of
part-B.
The SSO is the main executive authority of the
SSP onboard the ship.
The security activities are the responsibility of the
SSO. He affixes his signature and may also
sign the declaration on behalf of the Master

Non-compliance of Ch.XI-2 of Solas 74 & ISPS


Code

Regulation 9 ch.XI-2 of Solas 74 lays down the


control and compliance requirements. It is
divided into 3 parts:
1. Control of ship before entering port
2. Control of ship in port
3. Other additional measures.
Further it permits:
1. The authorised officers to verify ships
certificates.
2. If clear grounds to suspect non-compliance
then additional inspections/detection may be
ordered.

Clear grounds may be: Invalid certificate


Serious deficiency in security equipment or
documentation
Receipt of a complaint that the ship does not comply
with Ch.XI-2, part-A of ISPS
Ships personnel not familiar with shipboard security
measures or cannot carry out security drills
Key security members are unable to to establish
proper communication among themselves
Ship has embarked persons or loaded stores from a
port or a ship in violation of the code or has not
completed declaration of security measures with the
port facility or is not complying with the measures
required by the declaration of security measure.

Sensitive Security Information


To attack a ship or port a saboteur needs
information. Denial of this information is
information security.
Information security, therefore, means all forms
of communication- written, verbal, graphic, or
electronic, such as radio or computer data etc.
This information includes security plan, load
plan, personnel information, passenger
manifest, cargo manifest, cruising routes, asset
values, ownership data etc.

Safeguarding your
information

Measures not covered by the


Code
1. Fitting of Automatic Identification System (AIS)
on freight and passenger ships on international
voyages.
2. Ships IMO identification number be made
visible for identification purposes.
3. Flag states to issue synopsis records for their
registered vessels, including updated records
of ownership, classification society notes. and
safety assessment.
4. Ship security alert system they transmit to
local maritime security authority 2 locations
on board.

Ship Security Actions


Recognizing that vigilance must increase as the
threat of a security incident increases the ISPS
Code establishes three security levels.
Security Level 1
It means the security level for which minimum
appropriate protective security measures shall
be maintained at all times i.e., day to day
working of a ship.
Security Level 2
It is used when there isa heightened threat of an

- Continued
Attack occurring in a specific area against a
specific class of targets. Thus necessitating
maintenance of additional protective security
measures for a period of time.
Security Level 3
It means the level for which further specific
protective security measures shall be
maintained for a limited period of time when a
security incident is probable or imminent,
although it may not be possible to identify the
specific target.

- continued The Ship Security Plan must specify the security


protective measures to be taken on each ship
at each security level for the following activities.
Ordinary Security activities
Controlling access to the ship
Controlling the embarkation of persons and
their belongings
Monitoring restricted areas to prevent
unauthorized access
Monitoring deck access and areas around the
ship
Supervising cargo and stores handling.

Restricted Areas of the Ship

The Navigational Bridge


The Engine room
Steering gear
Crew Accommodation areas
Cargo tanks or holds
Cargo pumproom
Storage lockers for ship stores
Spaces containing dangerous goods or hazardous substances
Electrical equipment rooms
Ventilation and air conditioning equipment rooms
Potable water systems
Emergency response equipment rooms
Similar key areas essential to the security and safe operation of
the ship.

Cargo Handling
Protective measures relating to cargo handling are
intended to prevent tampering of legitimate cargo and
prevent contraband cargo from being loaded onto the
ship. The ship security officer will have to coordinate
closely with the port facility Security officer to establish
procedures for cargo inventory control at the point of
loading on board at level 1 , level 2, and level 3.
At level 1 Detailed checking of all cargo, including
checking of seals, visual inspection for tampering etc.
At level 2 in addition use of scanning / detection
equipment, mechanical devices or dogs and
coordination with shipper or other responsible party.
At level 3 Suspend all cargo work and verify inventory of
all dangerous goods and hazardous substances on
board.

Monitoring the Security of the Ship


Monitoring aids include; Lighting, Security guards, deck
watches and / or patrols.
Automatic Intrusion detectors connected to audible
and visual alarms at a location continuously
monitored.
Level 1- Lighting to be sufficient to enable detection of
activities beyond the ship on both the shore and the
waterside.
Level 2 In addition to work with port facility personnel
to implement waterside boat patrol and or shore-side
patrols on foot or vehicles.
Level 3 In addition switching on all available
surveillance equipment ,including recording
capabilities, underwater inspections and running main
engines at slow revolutions

Declaration of Security
The declaration of security is an agreement between a
ship security officer and either a port facility security
officer or another ship security officer with which the
ship will interact.
The DOS specifies the security measures that each
party will undertake while the ship and the port
facility or during ship to ship activities.
The responsibilities of each party for the shared
security measures is by completing a Declaration Of
Security form. To do this the two officers must meet
face- to- face to discuss the issues outlines in the
DOS form. The DOS form must be signed by the
Master or SSO & PFSO or his agent.

The Contracting Government can authorize an


Agency to work on its behalf
RSO Recognized Security Organization (for
India it is Indian Register of Shipping)
SSA Ship Security assessment is carried out
by the RSO
CSO Company Security Officer arranges to
obtain the SSC and ensures its implementation
SSO Ship Security Officer if responsible for all
security measures onboard the ship
Normal Security Drill to be carried out once
every 3 months and not exceed 12 months.

THANK YOU

Potrebbero piacerti anche