

FFI-RAPPORT 16/00707
37
For the purposes of the scenario development, FFI has created a strategy for the implementation
of Piql AS’ security regime. The assumptions that we have made for the requirements are not
directly based on any particular set of rules and regulations, as these would oftentimes greatly
differ between countries. We have instead tried to find an average describing the security
regime that can be applied across sectors and across geographical zones. Naturally, if a Piql
partner is subject to national legislation on protective security services, the regulations
stipulated there must also be implemented. This means that the suggested strategy should serve
as nothing more than guidelines and inspiration for how the production sites and piqlVaults
should be protected against external threats.
The requirements stipulated by Piql AS in the document are numerous, and we include a
relevant sample here:
The piqlVault shall have an alarm system activated when operators are not on duty.
The piqlVault shall control access to facility. It shall be segregated, secured and
monitored to prevent unauthorized access.
The piqlVault shall implement and maintain policies and procedures for visitor access.
These should include details of visitor registration, search policy and escorted access to
secure locations.
The piqlVault shall employ guards, who shall be on duty whenever operators are not in
the premises.
CCTV should be installed and deployed at the warehouse access points and at the points
of contact with the piqlFilm (receiving ports - automatic).
Monitoring shall be carried out by a guard when operators are not on duty.
Uninterrupted power supply (UPS) must extend to all security systems and sized
appropriately for local conditions and business activities.
Security requirement
Implementation during storage
Access control
Protective barriers in the form of doors/sluices inside the facility which
opens with authorised ID verification solutions.
Alarm systems
Alarm systems installed in connection with authorisation devices.
Activated outside office hours. Summons security personnel.
Camera surveillance
CCTV coverage of outside entrance area, all access points and all
critical points inside the facility. Recorded 24/7, and monitored outside
office hours.
Security personnel
One (1) guard onsite outside office hours. Sound vetting procedures for
all personnel (either security clearance or criminal record and credit
check depending on sector).
Table 5.6
The security regime of the storage facilities used in the scenario development