Guidance

Dangerous goods security awareness training

Published 14 October 2024

This guidance is to support the security training of all staff involved with the carriage of dangerous goods, as set out in chapters 1.10 of RID and ADR, taking into account the provisions of chapters 1.3 and 8.2.

For many companies, security measures will already be in place for commercial reasons and whilst this training focuses on the threat from terrorism, it shares the same basic principles of good security. Where relevant, it should be provided with a view to improving security in the round.

Nothing in this document should be seen as replacing or overriding either the current regulations relevant to the security of dangerous goods or any agreement(s) on security measures and operational practice that may have been reached with DfT in specific circumstances. Contact DfT if you have any questions.

Course content and design

As this guidance is applicable to a wide range of operations, it is for the trainer to take this guidance and design a course programme appropriate to the needs of the target audience. This may include the production of more detailed training materials or the use of training aids, such as the security training films available from DfT - contact landsecurity@dft.gov.uk for more details.

Much of the detailed course content will be drawn from local information and procedures relevant to the location(s) where the trainee will be working.

The detailed requirements for training should be established as part of the risk assessment process and will need to take into account the type(s) of dangerous goods being handled. Where high consequence dangerous goods (HCDG) are handled, more detailed training may be appropriate. Any training delivered should cover only those topics that are relevant to the trainee.

For drivers carrying dangerous goods by road, the driver security advice sheet may also be relevant.

Employers should consider whether specific training is needed, or whether other existing training is sufficient to meet the requirements of RID and ADR - for example, commercially-driven security training or air cargo security training delivered in accordance with DfT requirements.

Target audience

Anyone engaged in the carriage of dangerous goods must consider the security requirements commensurate with their responsibilities. Security awareness training is mandatory and must be appropriate to:

  • the person’s responsibilities
  • the loads to be carried

This guidance is based around the following broad personnel groupings who will commonly be employed in the carriage of dangerous goods and require training:

  • administration personnel, for example, consignor and consignee personnel responsible for paperwork or carrier personnel responsible for route planning
  • operational personnel, for example, loader, packer, filler, unloader, rail shunter
  • security personnel, for example, security guards, those responsible for access control
  • drivers (rail), including any train crew
  • drivers (road), including any vehicle crew

Site / security managers should be able to demonstrate a comprehensive understanding of all the topics relevant to the operation(s) for which they are responsible.

Senior staff, such as company directors and others whose appointments involve executive, operational or administrative responsibility for security, should also be able to show an awareness of security appropriate to their responsibilities and the potential impacts on their business.

Trainers

Before they begin to deliver training, a trainer should at a minimum have a good understanding of the core principles of the security regime relating to the carriage of dangerous goods. Trainers wishing to be kept up to date with information on the threat to transport security should contact the DfT.

Course frequency, duration and numbers

Initial training should be given to all personnel before they start to carry out any duties in relation to the carriage of dangerous goods. Under RID and ADR, personnel must be trained before assuming responsibilities and shall only perform functions for which required training has been provided under the direct supervision of a trained person.

Course duration will vary according to the content covered, the number of staff being trained, the approach taken to the delivery of training, the nature of the assessed risk and the type of dangerous goods being carried. Where HCDG will be carried, longer and more detailed training will likely be appropriate.

The need to update staff on security issues should be reviewed every 2 years in light of the biennial revision of RID and ADR to ensure that the training that has been given remains current and correct.

Refresher training should be provided at intervals of no more than 5 years but the use of a greater frequency should be considered as part of the risk assessment process. Cyber security training may need to be refreshed more frequently, due to the constantly evolving nature of the threat.

The maximum number of trainees per course is left to the discretion of the trainer. However, every course should ensure that each trainee is given an appropriate amount of attention and time to understand the content and have their learning assessed.

Assessing learning

Each trainee should be able to demonstrate a satisfactory level of knowledge and understanding at the end of training. Learning could be assessed either as the training progresses or at the end of training. Any assessment of learning should be delivered in a manner suitable for the topic covered and the method of training used.

Training records

Training records must be kept by the employer and made available to the employee or the Department for Transport upon request. These records should be kept for both initial and refresher training and should be retained for a minimum of 6 years from the date of training.

If an employee leaves their employment, the employer must keep their training records for a further 2 years from the date the employment ended, in case of any subsequent issues arising.

Records should at the minimum include:

  • a unique identifier for the trainee - for example, a name or staff number
  • details of the training delivered
  • the date(s) on which the training was carried out

It is recommended that the training record should also:

  • include the duration of the training given
  • include the date on which duties relating to dangerous goods were first undertaken
  • be countersigned by the trainer and trainee, to confirm attendance and understanding

Quality assurance

DfT may monitor the delivery of training where, in the case of inspection activity, problems have been identified. This will be carried out with the agreement of the employer / trainer.

This section sets out the common aims, objectives and competencies that should be considered in the design of security training. The training guidance matrix is provided as an indication of the key objectives that will normally be relevant for the training of the different groups of personnel commonly found in industry. It is not exhaustive and may not always be applicable.

Course aims

To provide all staff involved in the carriage of dangerous goods with a working understanding of the relevant security risk(s).

To ensure that all staff involved in the carriage of dangerous goods understand their role and responsibilities in providing and maintaining effective security.

Course objectives

For trainees to understand:

  • the threat facing the carriage of dangerous goods and how it is assessed
  • the vulnerabilities surrounding the carriage of dangerous goods
  • their role in implementing and maintaining effective security

Personnel competencies

Once trained, personnel should be able to demonstrate the following competencies.

Performance

The trainee should be able to (as relevant to their role):

  • identify sources of threat to the security of dangerous goods
  • identify vulnerabilities and carry out the appropriate security-related activities to counter these
  • respond to potential risks in a timely manner
  • take appropriate action when a security breach is identified

Knowledge

The trainee should know and understand (as relevant to their role):

  • who poses a threat to the security of dangerous goods and why
  • how the threat relates to vulnerability and risk
  • the key areas of vulnerability relevant to their role
  • the standard practices and procedures that should be adopted to reduce vulnerabilities and any additional specific security duties that the trainee is required to undertake
  • the appropriate steps to take when a potential security risk is identified
  • the action to be taken when a security breach is identified
  • the role of government agencies in monitoring compliance

It is recommended that some form of assessment of the relevant competencies is made at the end of the training, for example by a short question and answer session, discussion or test.

Training guidance matrix

Module 1 - The nature of security risks

Objectives for the trainee Admin personnel Operational personnel Security personnel Drivers and crew (rail) Drivers and crew (road) Managers b
1. To understand the meaning of the word ‘threat’ in a security context and how it relates to risk. Yes Yes Yes Yes Yes Yes b
2. To understand the types of people or organisations who may pose a threat to the carriage of dangerous goods, and why. Yes Yes Yes Yes Yes Yes b
3. To understand the types of threat to the security of dangerous goods. Yes Yes Yes Yes Yes Yes b

Module 2 - Recognising security risks

Objectives for the trainee Admin personnel Operational personnel Security personnel Drivers and crew (rail) Drivers and crew (road) Managers b
1. To understand and be able to recognise potential vulnerabilities, both common and uncommon. Yes Yes Yes Yes Yes Yes b
2. To understand the key areas of vulnerability for sites. Yes Yes Yes No No Yes b
3. To understand the key areas of vulnerability whilst in transit. No No No Yes Yes Yes b

Module 3 - Methods to address and reduce security risks

Objectives for the trainee Admin personnel Operational personnel Security personnel Drivers and crew (rail) Drivers and crew (road) Managers b
1. To understand how the assessed risk affects the security measures applied. Yes Yes Yes Yes Yes Yes b
2. To understand the need to protect information. Yes Yes Yes Yes Yes Yes b
3. To understand what should be done to reduce the vulnerability of a site. Yes Yes Yes a a Yes b
4. To understand the security measures which should be applied when transporting dangerous goods by rail. No No No Yes No Yes b
5. To understand the security measures which should be applied when transporting dangerous goods by road. No No No No Yes X b
6. To understand the role of government agencies in monitoring compliance and ensuring appropriate security measures are being applied. Yes Yes Yes Yes Yes Yes b
7. Additionally, where a security plan exists: to understand the relevant details of the security plan. Yes Yes Yes Yes Yes Yes b

Module 4 - Actions to take in the event of a security breach

Objectives for the trainee Admin personnel Operational personnel Security personnel Drivers and crew (rail) Drivers and crew (road) Managers b
1. To understand what procedures should be followed in the case of a security breach. Yes Yes Yes Yes Yes Yes b

Table key

a - Some elements of this objective may also be relevant to the training of drivers and crew.

b - Managers should receive appropriate training which covers all the topics relevant to the operation(s) for which they are responsible.

Module 1 - The nature of security risks

Trainer notes

This module is intended primarily to provide suitable context and background information to trainees. DfT uses a risk management methodology based on the principle that ‘risk’ is a product of ‘threat x vulnerability’. This module focuses on ‘threat’ with ‘vulnerability’ covered in modules 2 and 3.

Read advice and guidance on implementing protective security measures on the NPSA website.

Note that the appropriate level of detail to be covered in this module will vary depending on the type of dangerous goods being handled. Where HCDG are being handled, more detailed training may be appropriate.

Refresher training

Refresher training for this module should include:

  • revisiting the relevant points for each objective
  • any changes to the threat and any incidents which have occurred since the last episode of training

Aim

To explain the nature of the threat to dangerous goods.

Objectives

For the trainee to understand:

  • the meaning of the word ‘threat’ in a security context and how it relates to risk
  • the types of people or organisations who may pose a threat to the carriage of dangerous goods, and why
  • the types of threat to the security of dangerous goods

By the end of training, the trainee should be able to (as relevant to their role):

  • identify the types of people or organisation who may pose a threat to the security of dangerous goods and why
  • explain the types of threat to the security of dangerous goods

Briefing notes

Objective 1

Risk is assessed using the principle that Risk = Threat x Vulnerability

Threat is an assessment of the likelihood or probability of an attack against a particular target. It can be defined as ‘the probability of an attack being attempted (by mode of transport, type of attack, region etc or generally) against a target within a certain time frame’. A result of motivation, intent and means/capabilities.

Threat is owned by the attacker.

Vulnerability is a measure of the features of something potentially under threat which can be exploited by an attacker for example, at an airport or on an aircraft. It can be defined as ‘those characteristics of a target which could be exploited in an attack’.

Vulnerability is owned by government and the dangerous goods transport sector.

Risk is a measure of the probability that an attack will be attempted which will succeed in exploiting the target’s vulnerabilities.

Many factors are taken into account when assessing the threat, including:

  • current intelligence, for example, terrorist motivation and intent
  • the characteristics and objectives of potential attackers, for example, the known means / capabilities of terrorist groups
  • the consequences / impact of an attack - whether successful or not – consequences can be defined as ‘the human, economic, political and / or reputational impact of an attack’

At the national level, the security services assess the threats from international terrorism and domestic extremism. These threat assessments are passed to the Department for Transport, which is responsible for deciding on the appropriate response to the assessed threat - the minimum measures that the industry must apply. When considering the appropriate response, DfT uses risk management methodology and where possible consults industry representatives.

At the local level the risk assessment process is used to review threat, vulnerability and consequence, resulting in appropriate security measures that aim to minimise risk and prevent unlawful interference with the carriage of dangerous goods.

Objective 2

Common sources of threat may include terrorists (international or domestic), criminals, people with a mental health condition and protesters - for example, environmental / animal rights.

The ‘insider’ threat (a person employed at the site) should also be considered and this could include disaffected staff, recently dismissed staff seeking ‘revenge’ or staff manipulated through coercion or skilled influencing techniques to seek to cause harm. People can unwittingly become an insider, believing that they are merely ‘doing a favour’ for a friend or relative or satisfying intelligent curiosity. Other factors such as politics or disaffection, can also motivate a person to become an insider after several years in post.

Dangerous goods are under threat as some have the potential to be used as a weapon to create a ‘spectacular’, for example, by using dangerous goods as part of an attack against a high profile / commercially valuable / prestigious target. A ‘spectacular’ may be sought in order to force a government reaction and generate substantial media coverage. The motives of individuals and groups seeking to cause a spectacular can include gaining publicity for their cause, gaining the release of prisoners, changing government / international policy, frightening the public and disrupting normal life, obtaining money by threat / blackmail, undermining and discrediting authorities who oppose their cause.

Objective 3

Common types of threat may include:

  • hijacking of carried loads
  • sabotage of vehicles carrying dangerous goods
  • theft of a loaded vehicle from a site
  • a cyber-attack affecting company networks or operating systems
  • the purchase of material without proper checks of the buyer being completed

Some loads that are ready or being prepared for transport may be at greater risk than others where they are relatively easy to transport once stolen.

Module 2 -Recognising security risks

Trainer notes

Training under this module should focus on 2 points:

  • that everyone has a part to play in ensuring effective security is maintained
  • the vulnerabilities that are relevant to where the trainee will be working

It may prove most effective to combine this module with Module 3, setting out the vulnerabilities together with the appropriate response.

Note that the appropriate level of detail to be covered in this module will vary depending on the type of dangerous goods being handled. Where HCDG are being handled, more detailed training may be appropriate.

Refresher training

Refresher training for this module should include:

  • revisiting the relevant points for each objective
  • any changes to the known vulnerabilities and any new vulnerabilities identified since the last episode of training

Aim

To explain the vulnerabilities to the security of dangerous goods.

Objectives

For the trainee to understand and be able to recognise potential vulnerabilities, both common and uncommon.

For the trainee to understand the key areas of vulnerability for sites.

For the trainee to understand the key areas of vulnerability whilst in transit.

By the end of training, the trainee should be able to identify the areas of vulnerability relevant to their role and duties.

Briefing notes

Objective 1

Details of vulnerabilities should be drawn from the relevant risk assessment(s).

Examples of common vulnerabilities that all personnel should be aware of may include:

  • no access control measures being applied to sensitive areas, for example, pumping stations, administration facilities
  • loaded vehicles left unlocked with the keys in the ignition / cab
  • vehicle keys left insecure / accessible to people not authorised for access to a vehicle
  • areas used to store dangerous goods temporarily not being adequately secured / monitored
  • delivery / scheduling details (paper or electronic) not being adequately secured
  • a lack of proper checks of people seeking access to HCDG
  • insufficient cyber security measures or a lack of training

Examples of uncommon vulnerabilities may include hostile reconnaissance and the insider threat.

Reconnaissance is considered to be an integral part of operational activity for terrorists and evidence suggests that hostile reconnaissance activity will be undertaken prior to any attack. Hostile reconnaissance may include:

  • unusual questions about the type of security in place at a site
  • vehicles parked in suspicious circumstances around a site perimeter
  • persons filming or taking photographs of a site for no apparent reason
  • individuals loitering outside a site perimeter for an extended period of time for no apparent reason and acting in a suspicious manner - for example, taking notes, watching people enter or exit etc
  • individuals bringing, or attempting to bring, unusual packages onto a site
  • suspicious behaviour by an individual attempting to enter a site = for example, subject is nervous, perspiring, wearing inappropriate clothing
  • unusual occurrences - for example, members of the public found in areas normally restricted to staff only, particularly in parts of the site allowing access to HCDG

The risk posed by the insider threat, including contractors and anyone else with access to physical or information assets, exploiting their legitimate access for unauthorised purposes is managed through personnel security measures. Personnel security is not just about pre-employment checks and ongoing measures should be considered as appropriate, for example, being alert for changes in behaviour of staff, enabling staff to express any concerns about colleagues in confidence, regular reviews of access and clearances.

An employee or contractor can become a security concern at any time and concerns may be raised by anyone who has come into contact with the individual. All personnel are encouraged to remain vigilant for potential signs that an individual may now present a risk. Some potential warning signs are:

  • drug or alcohol misuse
  • support for extremist views - particularly when violence is advocated
  • a sudden change in religious, political or social affiliation that has an adverse impact on performance or attitude to security
  • major, unexplained changes in lifestyle
  • a sudden loss of interest in work, or very negative reaction to career changes or disappointments
  • signs of stress such as excessively emotional behaviour
  • sudden changes in working patterns - working alone, unusual hours or reluctance to take leave
  • being clearly unhappy, having few friends and appearing to be alienated from colleagues

To be fully effective, personnel and physical security measures mutually reinforce each other. A failure to properly apply one measure can weaken others. For example, a site with a physical barrier also needs reliable security staff to help control access and security staff also need a reliable physical barrier to help control access.

Objective 2

Details of vulnerabilities should be drawn from the relevant risk assessment(s).

Potential site vulnerabilities may include:

  • access points - both pedestrian and vehicle
  • vehicles being allowed on-site
  • site perimeter and buildings
  • people

The vulnerability of information should also be considered, such as: details of the storage and transport of dangerous goods; site procedures for access control and security.

Objective 3

Details of vulnerabilities should be drawn from the relevant risk assessment(s).

Potential vulnerabilities whilst in transit may include:

  • carrying unauthorised passengers
  • parking the vehicle in an insecure location
  • not activating the immobiliser / anti-theft device when leaving the vehicle
  • traffic stops being applied by criminals to gain access to the vehicle / load

Module 3 - Methods to address and reduce security risks

Trainer notes

The focus of this module should be on the activities and tasks that the trainee can undertake to reduce vulnerability and improve security. Special attention should be paid to instilling a security culture in all trainees. This module should form the bulk of any assessment of learning.

Objective 3 is intended for personnel working at sites but some elements of this may also be useful to drivers and crew.

Note that the appropriate level of detail to be covered in this module will vary depending on the type of dangerous goods being handled. Where HCDG are being handled, more detailed training may be appropriate.

Refresher training

Refresher training for this module should include:

  • revisiting the relevant points for each objective
  • any changes to the security measures and any new security measures implemented since the last episode of training

Aim

To explain the trainee’s role in reducing vulnerability.

Objectives

1) For the trainee to understand:

  • how the assessed risk affects the security measures applied
  • the need to protect information
  • what should be done to reduce the vulnerability of a site
  • the security measures which should be applied when transporting dangerous goods by rail
  • the security measures which should be applied when transporting dangerous goods by road
  • the role of government agencies in monitoring compliance and ensuring appropriate security measures are being applied

Additionally, where a security plan exists, for the trainee to understand the relevant details of the security plan.

By the end of training, the trainee should be able to (as relevant to their role):

  • explain when and how to apply the security measures relevant to their role
  • where one exists, explain any responsibilities under the security plan

Briefing notes

Objective 1

The security measures and procedures implemented locally exist as a result of the risk assessment process. Security measures will commonly exist in 2 forms:

  • mitigating measures (also known as countermeasures) which form part of the standard routine
  • contingency plans prepared to respond to specific incidents, should they occur

Objective 2

Everyone who works in the carriage of dangerous goods plays a vital part in the protection from those who wish to do us harm. The integrity, discretion, and trustworthiness on the part of those working in the sector are an important part of the effectiveness of security.

Hostile reconnaissance may include people involved with the carriage of dangerous goods being approached with questions about the security measures that are applied. Such situations should be treated with caution and generally, when outside the workplace, personnel should not discuss with anyone the details of security procedures, types of dangerous goods being handled or stored, or possible routes used for transit.

Objective 3

The overall security measures applied locally should be explained. This should cover both the general measures that all personnel should apply and the role(s) of any personnel with specific security duties (for example, access control).

Common security-related activities that all personnel on a site should undertake as part of their normal duties could include: displaying access passes visibly at all times; checking the access passes of others and challenging people not displaying a suitable pass; identifying security breaches and reporting these to the appropriate person (for example, a supervisor or the site / security manager).

Specific duties that the trainee is required to undertake should be explained in the context of how these will reduce the vulnerability of the site. These could include:

  • carrying out suitable checks on staff before they are employed
  • controlling access to critical areas
  • keeping keys for vehicles and delivery paperwork secured until the driver is ready to take the vehicle
  • checking the credentials of people collecting dangerous goods
  • storing information securely and only providing it to those people who are both authorised to have it and have a valid reason for access to it

Any specific reporting procedures (for example, if hostile reconnaissance is suspected) should be explained.

Objective 4

Drivers and any train crew must always carry a suitable form of photographic ID document (this is a statutory requirement) so that their identity can be verified at collection and delivery sites.

Any relevant local / company procedures relating to the carriage of dangerous goods by rail should be explained. This may include: any procedures to undertake before taking control of a train; things to consider whilst in transit; and any procedures to follow when arriving at the point of delivery.

Objective 5

Drivers and any vehicle crew must always carry a suitable form of photographic ID document (this is a statutory requirement) so that their identity can be verified at collection and delivery sites.

Things to consider when planning routes.

Wherever possible, delivery routes should be pre-planned with a copy of the route held at base and the details of the route restricted to those who need to know. Where a route includes stops, secure parking should be used where possible.

Things to consider before taking control of a vehicle

A security inspection of the vehicle should be carried out (this may be done as part of the safety inspection) looking for signs of tampering or other irregularities, such as:

  • damage to locking and other mechanisms to secure the load
  • damage to the fabric of the vehicle which may impair the effectiveness of seals, for example, cuts or tears in curtains

If appropriate, apply / check security seals to the load compartment.

The delivery paperwork should also be checked for signs of tampering, amendments, or other irregularities such as sudden or last minute changes to delivery instructions.

Drivers should understand how to operate any security equipment installed on the vehicle(s) that they will be using (for example, immobilisers, locking systems, vehicle trackers.

The appropriate procedures for reporting any concerns over tampering, irregularities or security equipment that is not working correctly should be explained.

Things to consider when in transit

It is illegal to carry unauthorised persons when transporting dangerous goods.

If a pre-planned route has to be changed whilst in transit, it may be appropriate for the driver to contact base and agree a revised route before proceeding.

Other than pre-planned stops, reasonable efforts should be made to not stop whilst in transit. However, if stopping is unavoidable the vehicle should be parked so that it can be kept under observation by the driver at all times and the parking location used should be sufficiently secure and fit for purpose. Insecure or ‘casual’ parking spots and standard patterns (for example, always stopping at the same place to pick up supplies) should be avoided.

When leaving the vehicle, the cab should be secured and any immobiliser / anti-theft devices that may be fitted should be enabled. When returning to the vehicle after a stop, a cursory security inspection should be carried out to ensure that the vehicle has not been tampered with or otherwise compromised whilst parked.

Caution should be used when asking for directions or advice about suitable off-road parking facilities.

Where the journey includes an overnight stop, pre-planned, secure overnight parking facilities that are suitable for the dangerous goods being carried should be used and all doors should be locked whilst sleeping in the cab.

Keys should be kept secure at all times and never be left in a hiding place for a relief driver.

Trailers or containers should only be left in pre-agreed parking areas with approved security devices fitted / enabled.

The appropriate procedures to be followed in case of an emergency should be explained.

Where HCDG are carried, the driver may need to be issued with a dangerous load card.

This is to be used only when the vehicle is stopped by the police or DVSA (Driver and Vehicle Standards Agency) and the driver has concerns about the validity of the officer(s). In these circumstances, the driver should not leave the vehicle but display the dangerous load card clearly to the officer(s) and not open the vehicle until the identity of the officer(s) has been verified.

Things to consider when arriving at the point of delivery

Ensure that the delivery point matches the delivery paperwork and be wary of deception.

Where possible, the cab should be secured and any immobiliser / anti-theft device activated whilst unloading the vehicle.

Objective 6

DfT is the regulator for transport security in the UK (excluding rail and carriage of dangerous goods in Northern Ireland). This role includes responsibility for setting government policy and the minimum standards for security as well as ensuring that these policies and standards are implemented through compliance monitoring. Compliance monitoring for the security of dangerous goods transported by road and rail, along with any related sites, is primarily achieved through inspections by DfT Transport Security Inspectors.

Additionally, where a security plan exists:

Objective 7

The details of the security plan that are relevant to the trainee should be explained including any responsibilities the trainee has as part of the normal routine. When discussing the security plan, the following points should also be covered.

Any plan is only as good as the people responsible for implementing it and security plans should be tested regularly to ensure that everyone affected understands their role. Testing the plan also checks whether the plan itself is sufficiently fit for purpose and may result in the plan being updated.

The security plan contains sensitive information and access to it should be limited to only those persons who are authorised to have access in relation to their duties. The contents of the plan should not be discussed with anyone outside of the organisation / site to which the plan relates. Any discussion of the plan with people employed by the organisation / at the site to which the plan relates should be limited to that which is necessary to understand the requirements of the plan.

Module 4 - Actions to take in the event of a security breach

Trainer notes

This module focuses on what needs to be done when a security breach has occurred but it should also be used to reinforce the message that the prevention of a breach is preferable to reacting to one.

Note that the appropriate level of detail to be covered in this module will vary depending on the type of dangerous goods being handled. Where HCDG are being handled, more detailed training may be appropriate.

Refresher training

Refresher training for this module should include:

  • revisiting the relevant points for each objective
  • a summary of any security breaches that have occurred since the last episode of training with an emphasis on the lessons learnt

Aim

To explain the appropriate response to security breaches.

Objective

For the trainee to understand what procedures should be followed in the case of a security breach.

By the end of training, the trainee should be able to (as relevant to their role):

  • explain what constitutes a ‘security breach’ and the steps to be taken when one is detected

Briefing notes

Objective 1

A security breach can be defined as ‘an activity or occurrence which indicates that the security of dangerous goods has been compromised’. Security breaches may include:

  • a vehicle being tampered with
  • a fence being cut or otherwise broken through
  • an unauthorised person in a storage site
  • theft of a vehicle - either from a site or whilst the vehicle is in transit
  • a cyber-security attack on company systems
  • theft of the paperwork relating to a delivery

The standard procedures to follow when a security breach (either suspected or actual) is identified should be explained. This may include duties under evacuation procedures or who to notify about the breach.

Any specific responsibilities that the trainee may have in the contingency plan(s) that relate to security breaches should be explained.

If relevant, any specific procedures to be followed as set out in the security plan should also be covered here.

Contact and support

Contact DfT if you have any questions.

Dangerous goods team

Email dangerousgoods@dft.gov.uk

Telephone 020 7944 2881