BS 7858:2019

Screening of individuals working in a secure environment. Code of practice


说明:

  • 此图仅显示与当前标准最近的5级引用;
  • 鼠标放置在图上可以看到标题编号;
  • 此图可以通过鼠标滚轮放大或者缩小;
  • 表示标准的节点,可以拖动;
  • 绿色表示标准:BS 7858:2019 , 绿色、红色表示本平台存在此标准,您可以下载或者购买,灰色表示平台不存在此标准;
  • 箭头终点方向的标准引用了起点方向的标准。

 

 

非常抱歉,我们暂时无法提供预览,您可以试试: 免费下载 BS 7858:2019 前三页,或者稍后再访问。

点击下载后,生成下载文件时间比较长,请耐心等待......

 



标准号
BS 7858:2019
发布
2022年
发布单位
英国标准学会
当前最新
BS 7858:2019
 
 
适用范围
What is this standard about? It details how to screen individuals who want to work in “secure” environments, defined as anywhere that an insider could steal or threaten the integrity of data, information, or other physical or intellectual assets; or threaten people’s safety. Who is this standard for? The security sector. The security workforce is regulated by the Security Industry Authority (SIA), which draws its powers from the Private Security Industry Act 2001. Organisations wanting to join the SIA Approved Contractor Scheme must demonstrate their compliance to relevant British Standards, including BS 7858. As well, agencies which offer employee screening packages under the Approved Contractor Scheme. Any organization outside of the security sector which wants to screen people employed in sensitives areas such as critical infrastructure sites and those with access to sensitive information, materials or technology. This might include: Facilities management companies Human resource department Retail sector Sports/entertainment sector Local government Why should you use this standard? While the vast majority of employees and contractors are honest and act with integrity, organizations are nevertheless sometimes vulnerable to insiders with access, who operate in positions of trust. Indeed the government’s Centre for the Protection of National Infrastructure (CPNI) warns that almost all physical and electronic attacks can be assisted or conducted by an insider. Some attacks can only be committed by insiders, such as the unauthorized release of proprietary information, or the sabotage of assets that only employees can access. In addition, there are some tactics that insiders are likely to use in the course of preparing or conducting attacks including deliberate attempts to acquire information...

BS 7858:2019相似标准


谁引用了BS 7858:2019 更多引用





Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号