Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security gates

A comprehensive accident investigation system, as well as training, was implemented, and line management were made responsible for their own accident investigations assisted by safety staff where and when necessary. A vehicle seat belt policy and windshield stickers were introduced, and the gate security guards instructed not to allow any vehicle onto the site if the occupants were not wearing their seat belts. They also reminded vehicle occupants to bnckle np. [Pg.193]

In his Courtesans Dialogues (a work of fiction), Loukianos portrays courtesans households as dual seats of home and of business—replete with servants expediting sales and services, with mothers proffering advice and demands, and sometimes even with children about to be bom (80.2). The hetaira (or her mother) is clearly in control, securely ensconced behind doors and gates, security features common to Athenian household... [Pg.170]

Any gate or security barrier to be set in at least 65 feet (20 meters) from public highway to avoid blockage or interference to pedestrians... [Pg.19]

Perimeter fencing may enhance the security of any premises. Not only does the fence present an obstacle for intruders to overcome but also it establishes the principle of defensible space and constitutes a psychological barrier to access. A perimeter fence, when supplemented by gates, traffic barriers and gatehouses (manned by security personnel or some other system of access control), allows the site operator to have control and supervision over all vehicles and pedestrians entering and leaving the site. [Pg.167]

The process is not widely used in factories but has found a niche in coating large external structures, e.g. large security gates. It can also be used for the... [Pg.748]

Airport terminals are typically large, open spaces with relatively uniform physical configurations that include, for example, ticketing/check-in areas, baggage claim areas, security checkpoints, concessions, restrooms, and departure gates. These large spaces require heating, ventilation, and... [Pg.24]

In this equation, C andT refer to control and target qubits, respectively. The resulting state (output of the qugate) is said to be an entangled state of the two qubits, that is, a state that cannot be written as a product of states for each qubit [30]. The occurrence of such entangled states is another characteristic trait of QC, at the basis of secure quantum communication or cryptography. It also implies that, as opposed to what happens with a classical bit, an arbitrary quantum bit cannot be copied (the COPY classical operation is, in fact, based on the application of a succession of classical CNOT gates) [4]. [Pg.189]

Physical security Security systems and architectural features that are intended to improve protection. Examples include fencing, doors, gates, walls, turnstiles, locks, motion detectors, vehicle barriers, and hardened glass. [Pg.105]

In some parts of the world religious functions may occur several times a day and every day of the week. These functions are generally required to be performed at the immediate location of an individual. These activities must be respected and accommodated for the employees and any personnel who may be in attendance at the facility. Typically where hydrocarbon facilities are located in areas were such practices are performed, a specialized installation (i.e., mosque) is normally provided. The primary concern in their application is that the installation does not interfere with the operation of the facility, is not provided within the confines of a hazardous location (i.e., process location), and that it is shielded or removed from the effects of an explosion or fire. Typical applications provide these specialized facilities just outside the security fencing and access gate a facility. [Pg.246]

Security breach. Physical security breaches, such as unsecured doors, open hatches, and unlocked/forced gates, are probably the most common threat warnings. In most cases, the security breach is likely related to lax operations or typical criminal activity such as trespassing, vandalism, and theft. However, it may be prudent to assess any security breach with respect to the possibility of attack. [Pg.99]

Examples of procedural access controls include inventorying keys, changing access codes regularly, and requiring security passes to pass gates and access sensitive areas. In addition, facilities should establish the means to readily identify all employees, including contractors and temporary workers with unescorted access to facilities. [Pg.218]

Instead of vice presidents and janitors, wild turkeys and deer wander through Merck s 1,000 acres of trees, lawns, ponds, and rolling hills. The access road takes its time winding up the hill from Route 523 to the security gate. Inside the main building—the site also includes a smaller outpost, called the cup — Whitehouse has the serenity of a monastery and the luxury of a presidential suite. It is built around a five-story central atrium, with hand-woven tapestries mounted on the walls from countries where Merck has had some presence. The dark wood of the banisters and furniture is smooth and thick. No expense was apparently spared Fleming says that the trees that had to be removed to build... [Pg.227]

Barrier Penetration Manual. This document,prepared for a government agency responsible for protecting nuclear facilities, describes the techniques to forcibly penetrate 32 barriers commonly found at industrial and commercial facilities using hand-carried,portable tooIs.Some of these barriers include 8 inch reinforced concrete walls,steel lined doors, plywood floors, 1 inch lexan windows,cinder block walls,and security gates. Each entry consists of a description of the barrier, an illustration of it, the portable tools which will penetrate the barrier in the shortest time, estimated time for penetration, and references. 8 Postpaid. George Liu, 2000 Center Street, Room 100, Berkeley, CA 94704. [Pg.122]

Neville was in a situation that many companies may find themselves in today. It had completed a site vulnerability assessment that found weaknesses in perimeter security, with unlocked gates in need of repair along the rail line that runs through the plant site. [Pg.70]

Other obvious steps are ensuring that gates are locked and well lit, and that outsiders are not permitted on site, or into sensitive areas. I often test security awareness by trying to gain access to control rooms, Sem says. In some cases, until staff have been adequately sensitized and trained, I have been allowed to walk in without question. ... [Pg.73]

For such purpose one might consider an ARC, that is, archive of anonymous record contributions. Such an archive would essentially mirror contributed records, except for being anonymized (see the next chapter). However, fairly sophisticated software would need to be used to serve as gatekeeper between the identified and anonymized archives. Moreover such sophistication will need to extend to police the gates between the ARC and the researchers so that no researcher opens a means of threading back to identify the patient. That is, unless a patient required that he or she be warned of freshly identified medical risks, a process that itself can involve complex security so that outsiders cannot intervene in or reproduce the tracking back mechanism. [Pg.221]

Kerberos An authentication technique (for information technology security) developed at the Massachusetts Institute of Technology. It is named after the three-headed dog of Greek mythology that guarded the gates of Hades. [Pg.520]


See other pages where Security gates is mentioned: [Pg.270]    [Pg.363]    [Pg.450]    [Pg.270]    [Pg.363]    [Pg.450]    [Pg.474]    [Pg.470]    [Pg.235]    [Pg.156]    [Pg.161]    [Pg.165]    [Pg.183]    [Pg.194]    [Pg.195]    [Pg.198]    [Pg.22]    [Pg.165]    [Pg.35]    [Pg.350]    [Pg.245]    [Pg.287]    [Pg.65]    [Pg.381]    [Pg.164]    [Pg.225]    [Pg.112]    [Pg.4]    [Pg.264]    [Pg.265]    [Pg.70]    [Pg.72]    [Pg.72]    [Pg.110]    [Pg.42]   
See also in sourсe #XX -- [ Pg.191 ]




SEARCH



© 2024 chempedia.info