Laserfiche WebLink
NRC Equity Funs <br /> structure, etc.). The Vulnerability and Security Assessment is a logical <br /> process that evaluates every aspect of the planned site, including, but not <br /> limited to, interior, exterior, ingress, egress, transportation routes, airspace <br /> and the surrounding neighborhoods; critical infrastructure is an integral part <br /> of the day-to-day. <br /> Company Vulnerability and Security Assessment begins in the planning stage <br /> with a meticulous review of all available documentation, including site plans, <br /> blueprints, diagrams, infrastructure and schematics. Security documents <br /> bring to light every aspect of security and safety including crime, diversion, <br /> terrorism, fire and medical emergencies. Continuous review and evaluation <br /> of all documents of Security throughout the project development stages will <br /> include focus on systems such as fire safety, intrusion detection, etc.; <br /> notwithstanding, building a relationship with critical infrastructure suppliers <br /> including, but not limited to, voice and data communication, power, and <br /> water. <br /> Identify vulnerabilities to the facilities and the surrounding area to include <br /> but not be limited to aspect of the facilities' effect on the neighborhood, <br /> from the construction phase to completion. This includes public access, <br /> deliveries and utility services. Every phase of this project creates a different <br /> risk potential which must be rated for inclusion as an actionable item. A <br /> security assessment will is a springboard to developing both a state-of-the- <br /> art security program and a detailed security protocol for all situations. <br /> 9.8.2 Phase Two <br /> The construction stage includes but is not limited to, Vendor Selection, <br /> Exact Planning, Implementation and Documentation. As programming and <br /> schematic design begins, the Company, will create the physical security <br /> program conceptualized during Phase One. All security design phases will be <br /> coordinated and incorporated in the design schedule. The role of security <br /> technology is important in today's environment, but equally critical are the <br /> operating procedures and policies surrounding those systems. These <br /> procedures embrace all day-to-day, emergency and crisis management <br /> scenarios. <br /> The Company will produce and continually refine detailed Security Protocol <br /> that covers the security of all structures as well as transportation and other <br /> aspects of the operation. Long-term site security begins well before the first <br /> shovel hits the ground. A continuous review of project plans and their <br /> progress ensures that all required security measures are incorporated into the <br /> physical structure. All selected systems will undergo rigorous testing as they <br /> are installed and integration testing will occur as other systems come on-line. <br /> This ensures that all systems work together and achieve the designed goals. <br /> Page 34 1 54 <br />