My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
SU0013012
Environmental Health - Public
>
EHD Program Facility Records by Street Name
>
L
>
LOCKE
>
12470
>
2600 - Land Use Program
>
PA-2000007
>
SU0013012
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
11/23/2020 2:06:10 PM
Creation date
2/4/2020 8:34:34 AM
Metadata
Fields
Template:
EHD - Public
ProgramCode
2600 - Land Use Program
RECORD_ID
SU0013012
PE
2637
FACILITY_NAME
PA-2000007
STREET_NUMBER
12470
Direction
E
STREET_NAME
LOCKE
STREET_TYPE
RD
City
LOCKEFORD
Zip
95237-
APN
05132012
ENTERED_DATE
2/3/2020 12:00:00 AM
SITE_LOCATION
12470 E LOCKE RD
RECEIVED_DATE
1/31/2020 12:00:00 AM
P_LOCATION
99
P_DISTRICT
004
QC Status
Approved
Scanner
SJGOV\sballwahn
Tags
EHD - Public
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
92
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
NRC Equity Funs <br /> structure, etc.). The Vulnerability and Security Assessment is a logical <br /> process that evaluates every aspect of the planned site, including, but not <br /> limited to, interior, exterior, ingress, egress, transportation routes, airspace <br /> and the surrounding neighborhoods; critical infrastructure is an integral part <br /> of the day-to-day. <br /> Company Vulnerability and Security Assessment begins in the planning stage <br /> with a meticulous review of all available documentation, including site plans, <br /> blueprints, diagrams, infrastructure and schematics. Security documents <br /> bring to light every aspect of security and safety including crime, diversion, <br /> terrorism, fire and medical emergencies. Continuous review and evaluation <br /> of all documents of Security throughout the project development stages will <br /> include focus on systems such as fire safety, intrusion detection, etc.; <br /> notwithstanding, building a relationship with critical infrastructure suppliers <br /> including, but not limited to, voice and data communication, power, and <br /> water. <br /> Identify vulnerabilities to the facilities and the surrounding area to include <br /> but not be limited to aspect of the facilities' effect on the neighborhood, <br /> from the construction phase to completion. This includes public access, <br /> deliveries and utility services. Every phase of this project creates a different <br /> risk potential which must be rated for inclusion as an actionable item. A <br /> security assessment will is a springboard to developing both a state-of-the- <br /> art security program and a detailed security protocol for all situations. <br /> 9.8.2 Phase Two <br /> The construction stage includes but is not limited to, Vendor Selection, <br /> Exact Planning, Implementation and Documentation. As programming and <br /> schematic design begins, the Company, will create the physical security <br /> program conceptualized during Phase One. All security design phases will be <br /> coordinated and incorporated in the design schedule. The role of security <br /> technology is important in today's environment, but equally critical are the <br /> operating procedures and policies surrounding those systems. These <br /> procedures embrace all day-to-day, emergency and crisis management <br /> scenarios. <br /> The Company will produce and continually refine detailed Security Protocol <br /> that covers the security of all structures as well as transportation and other <br /> aspects of the operation. Long-term site security begins well before the first <br /> shovel hits the ground. A continuous review of project plans and their <br /> progress ensures that all required security measures are incorporated into the <br /> physical structure. All selected systems will undergo rigorous testing as they <br /> are installed and integration testing will occur as other systems come on-line. <br /> This ensures that all systems work together and achieve the designed goals. <br /> Page 34 1 54 <br />
The URL can be used to link to this page
Your browser does not support the video tag.