Security Surveying


Security Surveying

Learn More

Overview:

A Security Survey is a meticulous physical examination of an organisation, its facilities and its operations with respect to its personnel and company assets. Hazard 360 Ltd examines the risks these assets are exposed to, and reviews the measures that are presently in place to protect them and to mitigate liability.


Hazard 360 Ltd has specifically designed various templates for security surveying, security audit, compliance, and operational requirement documents. These templates / documents are the intellectual property of Hazard 360 Ltd., and are protected by international Copyright Law and are registered in one hundred and sixty eight countries by Copyright House Ltd, 19 Gardenia Close, Rendlesham, Woodbridge IP12 2GX United Kingdom. 

All rights are reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the Hazard 360 Ltd.


  • Risk Advisory Service
  • Security Survey - Risk Assessment
  • Physical Security Compliance Audit Standards Policy and Procedures
  • Operational Requirement Review - CCTV Camera Systems
  • Operational Requirement Review - Access Control Systems
  • Operational Requirement Review - Intruder Detection Systems
  • Retained Services Options

Risk Advisory visit

This service is suitable for businesses that are unsure of their security requirements, or who possibly wish to examine their current security provision, possibly identify any areas of security weakness, or risk. The service includes the preparation of a short summary report with only those key recommendations.


Security Surveying

Physical Security Survey (In-depth)

Currently we utilise our proprietary Physical Security Risk Mitigation Analysis Calculator platform, which scrutinises the strengths and weaknesses of an organisation’s security measures. The “Risk Analysis” is an analytical process designed to provide an understanding of all vulnerabilities, and how potential threats may exploit those weaknesses, encompassing the evaluation methodology. The “Risk Analysis” also quantifies vulnerabilities, overall risk and possible losses and presents an objective representation of the premises security position. The process includes a review of risk control framework, interviewing of personnel, recording observations and providing photographic evidence, where applicable. Finally making recommendations in a detailed investigation to mitigate all exposed threats, risk(s) and vulnerabilities presented in a thoroughly comprehensive report.

Areas of Review

  • Security risk profiling
  • Local crime data analysis
  • Physical security measures and procedures
  • Personal security measures
  • Technical security installation and operation
  • Documentary security policy and strategy
  • Impact risk assessment of local threats
  • Business continuity and contingency plans
  • Target hardening
  • Emergency procedures

Physical Security Survey (Designated Areas)

The same methodology is used as before, the only difference being is the survey concentrates on specific areas of operation as approved between the client and Hazard 360 Limited.

Physical Security Compliance Audit Standards Policy and Procedures

The Security Audit compares the selected organisation’s physical security protective measures against a certain set of British, European and international industry standards and Government Acts to ensure the security programme meets those standards. In addition, this is to provide assurance to the organisation and to guarantee that the audit fully encompasses the following evaluation methodology.

· It evaluates the implementation of relevant standards and Government Acts.

· The Security Audit evaluates all pertinent Policies and Procedures

· Appraises the security awareness of management, its employees and all visitors

· Reviews internal management controls

The process includes non-compliance observations, photographic evidence and making recommendations to ensure compliance to the relevant standards and Government Acts.

Operational Requirement Document – C.C.T.V. Camera Systems

The purpose of an Operational Requirement Document is to ensure that the selection of equipment to be applied is relevant to the areas to be observed. The operational requirement clearly defines the objectives of the CCTV Camera System, its scope, the designation of each individual camera and all associated sub-systems equipment. Using an Operational Requirement Document prevents overselling of equipment, and ensures that the apparatus to be installed meets the required specifications and purposes.

Operational Requirement Document - Access Control Systems

The requirements within an Operational Requirement document are to identify the essential equipment being used is pertinent to the areas to be controlled. The operational requirement clearly distinguishes the essential capabilities and associated requirements of the Access Control System, its scope which includes database management and levels of access control to specified areas of the premises. It includes designation of each individual access control point’s hardware, and associated sub-systems equipment. Using an Operational Requirement document prevents any exaggerated, unnecessary purchasing of equipment, ensuring that the equipment being installed meets the required specification and is fit for purpose.

Operational Requirement Audit Document - Intruder Detection Systems

The rationale of an Operational Requirement document is to make sure that the choice of equipment to be operated is applicable to the areas to be scrutinised i.e. suitable for the environment in which they are to monitor. Sometimes it has been found that a client may in fact have been over subscribed with camera equipment and some equipment can be removed, and occasionally some clients do not have enough. The Operational Requirement Document clearly defines the system’s objectives, its scope and includes the type of detection sensors to be deployed. They include the reasons behind their deployment and also encompass the siting of control panels and monitoring facilities. Using an Operational Requirement document prevents embellishing the merits of the equipment and ensures that, when installed, meets the obligatory conditions and objectives.