User Manual
Fire Safety and Security Concept
25
Building Technologies 049_Archives_and_Libraries_A6
V10271399_a_en.doc
Fire Safety & Security Products 03.2009
Assessment
Risks that are classified as particularly serious must be subjected to a business
impact analysis, to be able to categorize their damage potential. In the business
impact analysis, scenarios are made up for the defined risks, and their effects on
the organization's business processes are checked. To do so, critical business
process and the associated resources must be identified. Acceptable risks are
monitored and verified. Risks that are not acceptable shall be communicated to the
top management and executive managers, so that appropriate measures can be
defined.
Implementation
The defined measures are implemented in the organization, in accordance with the
risk management system. These measures must be checked periodically.
3.1.3 Risk Management Method
Brainstorming, Delphi method, damage case analysis and scenario analysis are
tried and tested methods for the identification of risks. All these methods are char-
acterized by their highly practical component and easy to handle. Applying these
methods does not require any special, theoretical previous knowledge.
3.1.4 Risk Identification
Risk identification has the important, often neglected task of recognizing any pos-
sible dangers, events, developments, trends and scenarios that might impair safety
in archives and libraries. The listed risks have been worked out on the basis of lit-
erary research and discussions with risk management experts.
Accidents (Safety) Examples
Fire Technical or human failure (e.g. non-observance of fire protection
provisions)
Chemical accident Accident in a chemical plant → chemical substances are re-
leased (resulting in toxic vapors, clouds of toxic gases)
Explosion Boilers, gas pipes, chemical agents, solvents, etc.
Panic Escape movements, also by injured persons (e.g. panic caused
by fire or bomb threat)
Damage caused by negligence Employees do not observe the official instructions and directives
Technical defects Power failure, burst pipe, mains failure, damage or failure of
technical facilities, failure of air conditioning
Accidents related to construc-
tion work
During renovation, extension and adaptation work (damage to
buildings, objects and/or persons)
Tab. 1 Archives and libraries risks / accidents (safety)
Criminal Acts (Security) Examples
Bomb threat Bomb threat building/area
Arson attack Deliberate fire-raising
Demonstrations Riots, turmoil, heckling, etc. (e.g. politically motivated groups)
Theft Internal: employees
External: visitors, craftsmen, service technicians, ...
Intrusion Intrusion in the building
Blackmail Management etc. is blackmailed
IT data manipulation Unauthorized persons copy confidential customer data; viruses
destroy data, computers are taken out of operation, etc.
Tamper Internal and/or external employees sabotage safety and security
equipment (e.g. camera positioning) or other equipment; exploita-
tion of confidential information
Bomb attack Bomb attack (e.g. area)
Vandalism Graffiti on walls, etc.
Suspicious objects Operational interruption; evacuation due to suspicion of explo-
sives or toxic matters (e.g. anthrax) in ominous containers
Tab. 2 Archives and libraries risks and adjacent areas