Professional Documents
Culture Documents
Procurement Services
Discussion template are designed to be used in face to face meetings with suppliers as part of your supplier review approach.
Discussion templates may be sent to the suppliers in advance of meetings, but if suppliers are sending completed documents back then these must be encrypted to protect sensitive
information or attachments.
Instructions
Please ensure that the most relevant member of staff completes the questionnaire.
All questions should be completed.
Where you deem a question to be “Not Applicable” then “N/A” should be documented in the ‘Supplier Response’.
You should attach relevant supporting documentation, where requested to do so and where the data is not confidential in nature.
You should also provide documentation where you feel that this would add substance to your answers.
You should be able to demonstrate all given answers during an onsite visit.
Questionnaire Responses
Please detail the contact details and role of the person(s) responsible for providing the answers to the questions.
This will assist with any follow-up queries.
“RBS provides a safe and secure environment to protect our customers, employees, contractors, third parties and assets. Through a combination of physical security measures and operational
procedures, our aim is to minimise the opportunities available to criminals to commit attacks against RBS by adopting a proactive approach to managing physical security risks. The threats faced by
our customers, employees, contractors, third parties and assets vary across divisions and business units. It is essential that threats are understood and that individuals are fully trained and aware of
all the measures in place to protect them.”
Compliance with the Policy is a requirement for all employees, contractors and third party users with direct access to RBS assets
1.1 How do you control and monitor access to premises, including We follow the basic principle of access management in the following
visitor access? ways:
1. Access to building is being only given to the staffs having the valid RBS ID
Card / Access Card. All the employees are asked to display valid identification at
all times, failing which they would not be given access to the premises at all.
Security measures for each asset are equal to the threats and
vulnerabilities of that particular asset.
1.3 Please describe any occurrences of security breaches over the None
last 3 years?
1.4 How do you ensure your physical perimeters are effectively We follow the following pattern for physical parameters:
secured?
a). Security personnel
1.5 How do you ensure all physical assets are Physically secured? All goods and materials (including IT equipments) are accompanied with the
Yes valid Gate Pass signed by the authorised signatory, when being taken out of
premises. Contents of the Items are being checked by the Guard as per the
This includes removable media such as laptops / handhelds, Gate Pass. Any discrepancy being brought to the notice of the RBS officials
USB devices, external disks, backup tapes, CDs/DVDs, immediately. No items are being allowed to go out or allowed inside without
Blackberry devices, documents in paper etc. proper screening.
All the Vendor / Contractual Staffs are frisked thoroughly including the Security
Guards every time they leave the floor, at the time of coming on shift and at the
1.6 What governance procedures are in place for the disposal of N.A
physical assets?
1.7
If a third party is contracted to complete secure disposal or
archive of physical assets on your behalf, what assurances do N.A
you have to ensure that this is carried out in a secure way?
1.8 How do you ensure the personal security and protection of As the threat level dictates the facility we have developed a verification
staff? process to ensure that all persons requiring access to the facility have
valid business at the facility.
1.9 Do your processes cover scenarios for staff joining, moving For our security personnel we have our own system in place. For Bank
and/or leaving the company? staff & employees RBS admin informs our Security Supervisor and
simultaneously all security guards are informed.
1.10 What processes are in place for the reporting of suspicious Physical security involves the proper layout and design of
physical activity or breaches and what escalation model is in facilities and the use of measures to deploy and prevent unauthorized
place? access to prevent assets. It includes measures to detect attempted or
actual unauthorized access. Physical activity or breaches also provides
How are staff made aware of such processes and how measures to safeguard employees from violence. We follow the under
frequently? mentioned procedures:
a). Select and modify the facilities in order to facilitate the control of access.
b). Demarcate restricted access areas and have necessary entry points and
security system in place.
- END OF QUESTIONNAIRE -