Rakshak jan.12 docx

16
W we su to गे नवर2 Winter is at eather co urrounding be extra a 2012 t its peak onditions gs. At the alert durin k. We are are most same tim ng the sea Cor witnessin t conduci me, we are ason. GAI rporate ng fog eve ive for cr e also plan IL (Ind e Secu ery day. V riminals a nning wint dia) Lim urity D GAIL Visibility h and they ter vacatio mited Depart L Ra Jan has becom are strik ons. Thus tment aksh nuary 2 me poor. king too s there is a ak 2012 These in our a need

description

 

Transcript of Rakshak jan.12 docx

  • 1. GAIL Ra L akshak 2 2012 Jan nuary 2 2012Winter is at its peak We are witnessin fog eve day. Visibility hW t k. ng ery V has becom poor. These meweeather coonditions are most conduci t ive for cr riminals and they are strik a king too in oursu urrounding At the same tim we are also plan gs. me, e nning wint vacatio ter ons. Thus there is a need sto be extra a alert durin the sea ng ason. GAI (Ind Lim IL dia) mited Cor rporate Secu e urity Depart D tment
  • 2. (ma an-made) (1) , (2) , (3) , , , , , , , - , -
  • 3. , / , , , , , : , , , i n Case of Emergenc f cy in Cas of Emer se rgency
  • 4. SM ( MS - - , , , , .. . , - , , - . . , , , , , , , , , , , ,
  • 5. Th vehicle you drive may seem you like an oasis, safe from the hass he m m sles ofev veryday life But you a still vulnerable to crime. e. are oHe are a fe things t keep in mind to he keep yo crime free on the r ere ew to elp ou road. Dont drink and drive. An dont riide with drivers who are unde the d nd o er influence. Keep your vehic in good working c cle d condition and the fuel tank full. Alway lock a p ys parked car and look under an inside the entire c to r, k nd t car see if someone has gotten into your car before you get back in. f n r e b Avoid parking in isolated areas. If youre un d ncomfortab about w ble where your c is park car ked, ask a security g guard or store staff to watch y s t you or escor you to yo car. rt our Drive to the nea arest fuel station, op business, or busy, well-ligh s pen hted area to get help if you t p think y are be you eing followe ed. Use y your cellular phone, if you h have one, to call the police iif you are being fol llowed. Other rwise, stay off cellular phones w while you are driving. a . Dont pick up hittchhikers. Dont hitch hhike. aking Your Anger on the RoadTaRo oad rage uncontr rolled ange or frust ration because of tra er affic condi tions or ot ther driver is rsbe ecoming a serious pr roblem throoughout th country. A majority of drivers get angry when someone he y s ycu them of or tailgate them. Here are so uts ff es H ome tips on avoiding road rage n e: Keep calm whe youre driving. In en nstead of retaliating, count to 10 and take a few deep , t w breath hs. Back off when someone cuts you off. If som meone tail lgates you change lanes. Do u, ont get pulled into a gam of chicken on the road. You life and the lives of others are at stake. d me e ur t f . Keep a reasona able distance betwee you and the car in front of yo and ma sure th you en d ou, ake hat arent cutting so t omeone of when you change lanes. Driv in the p ff u ve passing lan only when you ne are pa assing ano other car, and be sure to use yo signals a e our s. Use yyour horn ssparingly as a warrning, not an outburst a t. Dont make obs scene gestures to oth drivers no matte how mad they mak you even if her s; er d ke they m make obsc cene gestures at you . Dont fight over parking sppots. Stay o or mov out of the way of o out ve other angry drivers. yDo Make it Easy fo a Thief to Steal Yo Vehicles ont or t ourTh Basic P he Prevention Policy n Never leave your car running or the keys in the ignition when yo r e t n oure away from it, ev for ven "just a minute." Alway roll up th window and lock the car, even when it is front o your hom ys he ws k e of me. Never leave valuables in plain view even if your car is locked. P them in the trunk or at r w, y s Put least out of sigh ht. Park i busy, we in ell-lighted areas.
  • 6. Carry the registration and insurance card with you. Dont leave personal IDs or credit cards in your vehicle. Leave only the ignition key with the attendant when you pay to park in a lot or garage. Do the same when you take the car for repairs. Report your stolen car to the police immediately.What about Carjacking?Carjacking stealing a car by force has captured headlines in the last few years. Carjacking isthe violent form of motor vehicle theft. It is a serious threat to our personal safety because the thiefuses force and fear to rob our car from us. Sometimes the car owner or other occupants arekidnapped during a carjacking, and if lucky will be dropped off nearby unharmed. The worst casescenario occurs when you are transported to a secondary crime scene, which is usually moredangerous than the original confrontation. Those not so lucky victims have suffered other crimeslike rape, aggravated assault, and even homicide.The crime of carjacking can be traumatic to our everyday lives because it creates fear in thecommon act of driving a car. Victims of carjacking have reported being unable to drive a car againwhile others required months of therapy. Others have become so hypersensitive, that embarrassingand dangerous situations have arisen in response to their fear when someone unwittinglyapproached their car on foot.The reason carjacking got started is because of the sophistication and prevalence of new anti-theftdevices and alarm systems. New car alarms, steering wheel locking systems, Chip-integratedignition switches and stolen vehicle locators made it tougher on the auto thief. Unfortunately for us,poorly motivated and unskilled car thieves have adapted by becoming more violent to get the carsthey need and dont think twice about using force against us.Popular carjacking locations are parking lots, shopping centres, fuel stations, car washes,convenience stores, ATMs, hotels, valet parking, fast-food drive-thru, and outside of retail stores. Arisky, but popular location for the carjacker is a roadway intersection with a stoplight. A carjacker willjump out of another vehicle, pull open your unlocked drivers door, and force you to get out. Therehave been incidents where well-meaning citizens got into a high-speed chase following carjackersand ended up being victims themselves.The "Bump" and CarjackAnother copycat scheme used by carjackers is to bump your car from behind to get you to pull overand stop. The carjacker, and his accomplice, will follow the intended victim to a suitable locationwith good escape routes and few witnesses. The carjacker will crash into the back of your vehicle atlow speed and "bump" you with enough force to make you believe a traffic accident had justoccurred. Typically, the drivers of both vehicles pull over, stop, and get out discussing the damage.At this point the carjacker robs you of your vehicle, its contents, and drives away. The carjackerscar gets driven away by the accomplice. Hopefully you wont be injured during the exchange.What Should You Do?Carjacking of parked vehicles depends on the car owner being inattentive to their surroundings.Carjackers, like street robbers, prefer the element of surprise. Most victims say they never saw thecarjacker until they appeared at their car door. To reduce your risk of being carjacked, somepreventative actions are listed below:
  • 7. Appro oach your car with th key in h he hand. Look around, in k nside, and undernea the car before ath getting in. Keep your car d doors locke and win dows rolle up at all times whille you are driving. ed ed Be es specially a alert at inte ersections, fuel stations, ATMs, shoppin malls, and conve , ng a enience and ggrocery stores all are window of opportunity for carjackers . a ws c Park i well-ligh in hted areas with good visibility, close to wa c alkways, st tores and people. p Dont park in isoolated or vi isually obs structed are near walls or hea foliage eas w avy e. Use v valet parkin or an attended ga rage, if you a wom driving alone. ng ure man g As yo walk to y ou your car be alert to suspicious persons sitting in car e rs. Ask fo a security escort if you are a or f alone at a shopping centre. s If som meone tries to approa s ach, chang direction or run to a busy sto ge n ore. Follow your inst w tincts if the tell you t walk/run away to a busy plac ey to n ce. If safe open the door, ent quickly, and lock the doors. e, e ter t Dont be a targe by turnin your bac while loa et ng ck ading pack kages into the car. Make it your habit to alway start yo car and drive awa immedia ys our ay ately. Teach and prac h ctice with your childre to enter and exit th car quic en he ckly. Bewa of the G are Good Sama aritan who offers to repair your car or a fllat tire. Its okay to ge help, o r r et just be alert. Bewa of the " are "bump and rob" whe someone lightly hits your c from be d ere h car ehind. Whe you en get ou assessin the dam ut ng mages, the carjackers accomplice gets in your car and drives away. a The author is B. Tech (Electronic T h cs) from MNNIT (Motillal Nehru National Inst N titute of Technology), Allahabad & MBA (Ma T arketing) from UPRTOU , Allahabad. He joined GAIL in m . 1997 through campus inte 1 h erview. He H was poste at GAIL P ed Pata, during pre- commis ssioning and commission ning stage fro 1997 om to 2002. H is presen at GAIL, Vadodara since 2002 onwards and is respons He ntly s o d sible for exec cution of Phase 1, 2A & 2 B projec DVPL-I, DUPL, SGP & DVPL-I I OFC projec and GAIL P cts, PL cts LTEL (O & M) includin Dahej, Bh ng haruch, Vadodara & Und dera office; s support to Vaghodia & G V Gandhar plant. pWe need se ecurity & p protection at each a and every moment of our life. We need security - even o dbeefore our b birth inside mothers womb. We take a caution for security a home, of e c at ffice, socie and etyduuring trave Today, threat ha new de el. as efinition in the form of terroris attacks, fire, acc st cidents,inf formation l loss, data corruption, cyber-cri me, mob attacks, hu a uman bomb car bom bs, mbs, mobile shotgu missiles bio attacks, poiso un, s, onous gas, communication intrusions etc Today fo survival of any c. orpeerson, orga anization o industry, we need to mitigat all these threats & risks and in this p or te e processreqquire to invvent new mmeans & ways to ma ke security as part of productiv and pro w y f vity ofitability.Seecurity: Meaning & Essence for organi zation fSeecurity is k kind of structures an process nd ses that provide or improve s security as a conditio and onch heck to ens sure safety continuity and reliiability of people, pro y, p operty, equ uipment, information good n,will, establis shment, inddustry, com mmunity, e environme and na ent ation. From the orga m anization ppoint ofvie lapse i security not only attribute los in reven & profit, but also lost produ ew, in a ss nue o uction, rep putationor brand ima age & may even invit regulato penaltie y te ory es.
  • 8. Today, security has very holistic approach and it includes personal security, equipment security,health security, data security, computer security, environment security and community security. Allthese aspects are very much applicable in the context of GAIL as an organization. Modern daycompetitive business & globalization compels organizations to give more importance on security oftheir personnel, equipment, assets, information and data as part of productivity and profitability.Almost all the industries; like oil and gas, exploration, railway, auto, mining, pharmaceutical andchemical, banking, manufacturing , aviation, tourism, power and metal industries etc. requiresecurity at first place for achieving their goals and targets.Security as part of productivity and profitabilitySecurity is no doubt very integral part of productivity and profitability. Various kind of securityoptions can be enforced which directly or indirectly contribute the productivity and profitability of theorganization in following ways:Access Control Security systemThe Access Control security systems is basically designed to protect homes, offices, shops,buildings, malls, plants etc. commencing forced action or entry and minimizes the chances ofburglary or mugging in. This kind of security is more relevant in huge organizations and governmentadministration like GAIL which possess highly sophisticated process mechanisms & inherent risk offire and hazard. A) Main gate entry Main gate security is very important and it is first place from where a mischievous activity should be destroyed. Lapse in security may result in attack, theft, robbery, kidnapping/ abduction and loss of people & wealth to any organization. Therefore, Photo ID card system is very important tool which can restrict the unwanted people to enter in our plants & offices. Card based entry has all the benefits associated with digital identities, which go beyond security; e.g. tracking of manpower, building up a visitors database, assisting manpower traffic control, facilitating frequent head counts. Punching card system can monitor the entry and exit time of employees & work force and thus provides the means for checking their working hours and inculcating discipline & punctuality. B) Energy saving and Automation Now let us see how the present day access control system can reduce the cost and contribute to profitability. E.g. when an employee (card holder) penetrates the building after long hours, in that situation one can automatically activate area lightening/ air conditioning and when he goes out area lightening/ air conditioning may be switched off. In this way, organization can save the energy consumption. In case of fire, an individual can examine CCTV Video estimate situations to make them under control by unlocking doors and direct fans for safety and security in order for the swelling up of the smoke and sprinkling action. In this way, we can reduce / eliminate the damage without any delay and further course of action can be directed.Information & data securityInformation technologys primary purpose is to make the enterprise employees as productive,efficient and effective at doing their jobs as possible. Laptops, portable memory and even smart
  • 9. devices are part of that efficiency/productivity environment, allowing for work to get done on fromthe remote place even in the train, plane, at a client site or at an employees home.Today, Management information system, enterprise resource planning, online & real time dataaccess etc. are the key for any business. Information security means protecting information andinformation systems from unauthorized access, use, disclosure, disruption, modification, perusal,inspection, recording or destruction. In lack of information and computer security, data may bemade corrupt and whole Management Information system, Customer relation management,financial transaction, inventory management, operation and maintenance may be disrupted.Here, computer security also refers safeguarding data, network, theft of laptop, data storage device,software corruption and natural disaster like fire and earth quake. Authorized access to informationand decision making is delegated at various hierarchies in the organization. Protection ofinformation from un-authorized users is the demand of the business to protect company interest.E.g. if any information is leaked to competitors about companys business plan, product launch,research and development, product specification, ingredients, process etc. , it may be suicidal fororganizations business growth, profitability and sustainability.Surveillance & Video monitoringThrough surveillance, we can monitor and observe the behavior, activities or other changinginformation usually of people. We can protect our installation and plants with terrorist attacks, theftand crime. Ssurveillance can be done from a distance by means of electronic equipment (such asCCTV cameras), or interception of electronically transmitted information (such as Internet traffic orphone calls). It may also refer to simple, relatively no- or low-technology methods such as humanintelligence agents and postal interception.We see that in all retail outlets, malls, industries etc. CCTV serve the purpose of securing the items& articles for sale, monitoring the production, processes, services, inventories in ware house etc.and thus optimize productivity & profitability with better control mechanism. Bar code is alsoextension of the security in retail industry & inventory management.With the benefit of IT & networking, surveillance can be done centrally at far distance at corporateoffice through CCTV cameras by the security head of the organization. It gives him true pictureabout the state of security at field level at various geographical locations.Mitigating the threats, attacks, natural calamity and counter action:Security of installations, government and private establishments, industries & people are veryimportant in todays world of social unrest, economic imbalance, regionalism, communalism, crossborder activities, terrorism & natural disaster like flood, earth quake, tsunami, thunder storms etc.Our country is very much affected by all above reasons & these reasons are still very much alive.Parliament and 26/11 Mumbai attacks, bomb attacks in Delhi, Ahmedabad & other places, earthquake in Gujarat, Tsunami, flood in Bihar, H.P. etc. are burning examples.An organization cannot ignore these threats & risks as it may result in huge disaster, economical &human life loss. For dealing with all these threats and risks, security personnel should be fullyequipped with arms & security support systems like barricade, watch towers, metal gate, metaldetector, bomb disposal squad, sniffer dogs, fire proof clothing, speed breaker, communicationgadgets e.g. w-talkie , warning alarms, tyre buster etc. & disaster management plan should exist inthe organization. Counter measures with Six Ds approach (deny, deter, delay, detect, degrade anddestroy) is the key. Physical check of vehicle & people is very important to counter the risk/threat atvery first stage.
  • 10. Plant security is very important for sensitive industry like GAIL. Security has role in prevention of fire& accidents by controlling items responsible for triggering fire like matchbox, cigarettes & lightersetc. and motion of vehicles as well. Security plays important role in dealing with local villagers,community and project affected people in bringing harmony & peace at plant locations.Thus, Physical security is must for any organisation for its smooth operation & un-interruptedproduction & at the same time prevention in loss and theft of inventories and finished goods.Security arrangement also contributes in building image and reputation of an organization aboutalertness & preparedness for mitigating the threats. It brings psychological fear to conspirators &feeling of security among employees & workforce.Selection of security system & benefitsSelection of any security system is very important to have desired cost benefit analysis andimproved productivity & profitability. It is important to analyze threats and risk around environmentand accordingly mitigation strategies, counter measures should be developed and integrated. Bothmanual and system based security system are equally important and complementary to each other.Wide range of system based security solution such as burglar alarms, hard wired mechanisms,electronic locking system, motion detectors and cameras surveillance systems are available.System based security system can reduce the cost as well eliminate the human intervention for anyslippage.In the context of GAIL, security system has more importance due to its pipeline network across thecountry. Pipeline sabotage is one of the weapons of choice for terrorist attacks. Few days back inSyria, gas pipeline has been blasted by terrorist. Helicopter and foot patrolling of pipeline networkare other dimensions of security to assure the health of pipeline & thus ascertain operationalefficiency.ConclusionEnterprises around the globe are increasingly concerned about the risk in cyber threats and therising number of security risks in public domain. In todays economy, budgets are being reducedand various departments are being asked to cut resources especially manpower. So, risks are up &budgets are down. The risk realities are exploited by anyone who sees the downturn/ relaxation insecurity enforcement and thus takes opportunity for exploitation.Discontented employees are also walking away with valued information assets, while businessesscale back on defense in an effort to become more productive. And its happening at a time when anenterprise can ill afford downtime, decreased productivity, stolen data, lost sales, and a damagedenterprise reputation. Now single point external attacks have moved toward multi-source externalattacks and even the model of the "trusted employee" is now challenge.Thus, we see that security has various dimensions like security by personnel for surveillance,checks, mitigation of the threats & counter action and system based security & aids e.g. accesscontrol, video monitoring, communication gadgets, automation etc. in safeguarding the people,information asset, equipment & property.These ways and means as control mechanism play very significant and important role for anorganization for achieving higher productivity and profitability by reducing the risks & improvingoperational and personal efficiency.
  • 11. (Submitted By: Madan Mohan, Ma B anager (NG P/L-O&M) Agra) G ),Baangalore, Sept 30, 2011: The latest v ictim of a credit ca fraud is none other than noted e ard o dustrialist a billionaire Kuma Mangala Birla. It has been reported that Birlas credit card wasind and ar am t n ssto olen and la cloned It was lat used to make ma hefty transactions in Bangalore. ater d. ter o any s Sour rce: An Indian news w websiteCr cloning, or "skimming as it is sometimes called, is a new tec redit card c r g" s s chnique whereby someone wob btains your credit card details, copies the onto a bogus ca and be r em ard egins using the credit card. gWhile credit card theft itself is not new, the manner in which the informatio is stolen is. n e on nTh first step is to recr an individual will ing to part he p ruit ticipate in the schem Bartend t me. ders, wait s staff orsh assista hop ants are offten prime targets beecause of the sheer volume o credit ca r of ards they hhandle.Reecruits are given a pocketsize device with a scanni slot, h ingso omething th resembles a pag and c an be wor on a hat ger rnbe They a instructed to swi elt. are ipe custommers credit cardsthr rough the device. Be ecause the process takes only a few e yse econds it ccan be don easily and incons ne a spicuously withoutthe customer or anothe employe noticing e er ee g.Swwiping the credit card throug the de e gh evice copies theinf formation held on th magnet strip in memor That he tic nto ry.inf formation can subseequently be copied to a cou b unterfeitca ard, complete with ssecurity ho olograms. Alternative ely, theinf formation can be ussed to oveerwrite a s stolen cred card ditwhhich has be ecome too hot to han o ndle.Skkimming is difficult fo the typic cardhollder to detect, but s or calgiv ven a large enough sample, it is fairly e easy for th card heiss suer to d detect. The issuer collects a list of all thecaardholders who ha ave complained a about fraaudulenttra ansactions, and then uses data mining to discover relationsh n a o r hips among them an the mer g nd rchantsthe use. Fo example if many of the card ey or e, o dholders us a partic se cular merch hant, that merchant can bedir rectly invesstigated. S Sophisticate algorith ed hms can als search for pattern of fraud. Merchant must so ns . tsennsure the pphysical seecurity of th termina and pe heir als, enalties for merchant can be severe if th are r ts s heycoompromised, ranging from large fines by the issuer to comple exclusiion from th system, which e r ete he ,ca be a dea blow to businesse such as restauran where credit card transactio are the norm an ath o es s nts c ons eSo how do y protect yourself? o you tOn solution lies in sm ne n mart chip credit card s. Smart chips are microchips embedde in some credit c c m s ed ecaards that eencrypt th informa he ation conta ained in the magne etic strip. The microochip cannot bechhanged or deleted. If a skimme tries to scan your card thro f er r ough the d evice, they will obta only y ainenncrypted in nformation and thus be unable to clone your credit card. If s e y t someone steals your smart s rca and dis ard sables the chip, the new swipe terminals will alert staff to as for an ID or decline the e s sktra ansaction.An nyway the importance of using caution ca e annot be ovveremphassized. One must be very carefu while e v ulgiv ving the cr redit card to the sale esperson t swipe. Regularly check you credit ca bills ca to ur ard arefullyan report a suspec nd any action imm ediately. Never acce any ope envelop containing the cted transa N ept en pecre card a should immediate report t matter to concern bank. edit and ely the ned
  • 12. As per the in s nstructions of the GA Corpora Securit Departm s AIL ate ty ment, Secuurity Awareness Week 2011wa celebrat at GAIL, Regiona Pipeline Network Headquarte as ted al H ers-Gujara Vadodar The Ina at, ra. augural eremony o Security Awareness Week (1 3-17th December 20Ce of 011) was hheld on December 13 2011 3,with the admministering of Security Pledge by GM (O O&M), Shri A.N. Pan i ndey and DGM (GAIL Tel), DSh A.S. Jai in Hindi & English respective hri in ely.Sh K.M. M hri Meena Dy. Manager (Security) apprised all employ yees abou the vario compe ut ous etitionsbe eing conduucted at various locat tions (Dahe Bharuc Undera, Ahmedab ej, ch, bad, Kadi and Mehsa a ana) ofRPPNHQ-Guj jarat, Vad dodara during the Security Awareness Week. Shri A.N. Pandey, while A s . ddressing t gathering apprais the effo of Secad the sed orts curity Depa artment an also on various aspect of nd vse ecurity. He stressed u upon the discipline a nd dedicat tion toward GAIL & Nation. He called up the ds e ponem mployees t particip to pate in the competit e tions with full zeal and sugggested innovative ideas tostr rengthen th security system of GAIL. he ySe ecurity Aw wareness WWeek 2011 was con cluded on 17th Dec 2011 w 1 c., with prize distribution to the d various competitions at GAIL (India) Limwinners of v s mited, RPNNHQ-Gujar rat, Vadoddara by Sh A.N. h.Pa andey GM (O&M). A the closing ceremo GM (O At ony O&M) stressed upon present security sc n s cenarioan challeng being f nd ges faced by In ndia with re egards to security. sSince the se ecurity of G GAILs insttallations, Pipeline and Offices cannot be left to se s e ecurity per rsonnelalo and on one Dy Manager (Security) is posted at RPNHQ to lookin after ver large are it is one nly y. r ) Q ng ry ea,the erefore the moral re e esponsibilit of ever ty ryone to contribute his/her be towards security of our c est sOfffices, Pipe elines and Installations under R RPNHQ-G Gujarat, Vadodara for ensuring safe and secure ren nvironment t.As per the Corporate Security Departme yearly planner 2011, Shri Naveen Kant Rajor s e ent K ria, Sr.Offficer (Secu urity), GAIL Jhabua and Sh. A L, Ashish Dixit Sr. Office (Securit GAIL Agra visited North t, er ty), A dGuujarat and South Guj jarat Area Locations on 17.11.22011 to 19.11.2011 a 27.11.2011 to ca out and arrySe ecurity Inspection, A Audit and Security S S Sensitizatio Program for GAIL employe on m L ees and contractse ecurity perssonnel.Th Security Sensitiza he y ation program began with adm n ministering of Secur g rity pledge by Shri K KrishanKu umar, Man nager (Mec on 17.11.2011, S P.K. Ve ch.) Sh. erma, Man nager (Mecch.) on 19. .11.2011 a Sh. and
  • 13. As shish Dixit on 27.11. .2011. Durring the se ensitization programs on 17.11 n 1.2011 Sh Krishan Kumar h.an 19.11.2011 Sh. L nd Lokesh Sahni, WIC U Undera ad ddressed to participa t ants. Sh. Sahni advised to Spaarticipants that they r remain vigiilant and e extra carefu during th day to day work home, pe ul heir o k, ersonallife and duri e ing their d duties. Both the Officcers, who were dep puted for th purpos briefed to the he se,paarticipants in detail regarding duties an respons nd sibilities and also co covered vaarious topics likeSe ecurity of P Personal Property and also pow of right to private defence a per the law. wer t as lTr raining on bbasic fire f fighting sys stem was g given to se ecurity guards by Shr Manish Saxena, Ma ri S anager(F&S) at Kal Termina and Sh. Ajay Bhar Dy. Ma lol al rat, anager (F& at Und &S) dera Termi inal. A tota of 22 alGA Emplo AIL oyees, 58 Security Guards a and 18 other contr o ractual wo orkers were attende the edse ensitization program o above dates. n on dSe ecurity Awa areness W Week was observed a GAIL La o at akwa from 13th Dec 2 2011 to 17th Dec 2011. The taim of this p m programme was to make emplo e oyees aware about th securit related responsibility and heir ty rals measures taken for the security of the men material & machiinery. Sec so s f n, curity Eme ergencyReesponse D was c Drill conducted on 28th DDecember Coordinate by Majjor Rajeev Singh Pa ed v awaiya, th hSe enior Office (Securit er ty). The Pledge taki ng ceremo was held at Lakw on 13 Dec 2011. The P ony waple edge was a administer by OIC GAIL Lak red C, kwa.
  • 14. Es ssay comp petition for employees and cont s tract perso onnel was organised and Open quiz for c n contractse ecurity pers sonnel and CISF was held on 1 d s 15.12.20111.On the spot prizes wer given to the particiipants. On the spot quiz for Fam memb n re q mily bers (childr and rensp pouses), w organiz on 16. was zed .12.2011. The respo onse was very good and abou 27 participants d utpa articipated in the prog gram. emony was held on 17th Dec 2011 at 15: 30 hrs. at Conferenc Hall.Th closing and concluding cere he s 1 cePr rizes were announced under all above ca ategories by OIC Lakw y wa.Deeputy Com mmandant CISF was also pres sent on this occasion and high s n hlighted pre esent scen nario of ecurity and threats. Dse eremony OIC Lakwa emphasiz During concluding ce O zed on the need of SSecurityin the plant a well as in the colony. as
  • 15. Fr rom: Sumila NegiSe ent: 14 December 20 11:53 011To Corporate Security Departme o: y entCc Sutapa S c: SanyalSu ubject:Re espected M Madam ease accept my sincPle cere thanks for distrib s buting Victo orinox Swis knife to the emplo ss oyees, as aso ouvenir on the occasion of Secuurity Awareeness Wee 2011. It is a multip ek t purpose and a very h handyins strument c capable of putting the owner at ease and confidence especiallly women. e e,Th hanks and regards,Su umila NegiSr PA to GM (BD) r. M Th edition of GAIL Rakshak has been edited by Shri Ash his h y hish Dixit, Senior Offficer (Secu urity) prese ently lookin after se ng ecurity serv vices at GA Agra region. AIL, He started his profes e ssional car reer in RA and in CRPF (Central R AW n Reserve Po olice Force He joine CRPF in the year 2002 as A e). ed n Assistant Commanda and C ant wa posted at Srinaga r (J&K), Dimapur (Nagaland) a Naxal infested areas of as a and Ch hhattisgarh While p h. posting und these areas, he was actively invol der e lved to co ounter terroorism, insu rgency and Naxalism under the Area of responsibility. d m e r Duuring servic in RAW (Researc & Analy ce W ch ysis Wing) under Ca ) abinet Secretariat an CRPF, he had undergon various trainings and cou nd ne s s urses rela ated to Int telligence collection, Internal Se c ecurity and counter te d terrorism.Whole conte ents, conce and pr ept resentation is the re n esult of his hard wor with con s rk ntributions wherecre edited. He can be rea ached at e-mail: ash ish.dixit@g e gail.co.in S Suggestio & feed ons dback may be sent to us on e-mail: coc y t e [email protected]