1. GAIL Ra L akshak 2 2012 Jan nuary 2 2012Winter is at its
peak We are witnessin fog eve day. Visibility hW t k. ng ery V has
becom poor. These meweeather coonditions are most conduci t ive for
cr riminals and they are strik a king too in oursu urrounding At
the same tim we are also plan gs. me, e nning wint vacatio ter ons.
Thus there is a need sto be extra a alert durin the sea ng ason.
GAI (Ind Lim IL dia) mited Cor rporate Secu e urity Depart D
tment
5. Th vehicle you drive may seem you like an oasis, safe from
the hass he m m sles ofev veryday life But you a still vulnerable
to crime. e. are oHe are a fe things t keep in mind to he keep yo
crime free on the r ere ew to elp ou road. Dont drink and drive. An
dont riide with drivers who are unde the d nd o er influence. Keep
your vehic in good working c cle d condition and the fuel tank
full. Alway lock a p ys parked car and look under an inside the
entire c to r, k nd t car see if someone has gotten into your car
before you get back in. f n r e b Avoid parking in isolated areas.
If youre un d ncomfortab about w ble where your c is park car ked,
ask a security g guard or store staff to watch y s t you or escor
you to yo car. rt our Drive to the nea arest fuel station, op
business, or busy, well-ligh s pen hted area to get help if you t p
think y are be you eing followe ed. Use y your cellular phone, if
you h have one, to call the police iif you are being fol llowed.
Other rwise, stay off cellular phones w while you are driving. a .
Dont pick up hittchhikers. Dont hitch hhike. aking Your Anger on
the RoadTaRo oad rage uncontr rolled ange or frust ration because
of tra er affic condi tions or ot ther driver is rsbe ecoming a
serious pr roblem throoughout th country. A majority of drivers get
angry when someone he y s ycu them of or tailgate them. Here are so
uts ff es H ome tips on avoiding road rage n e: Keep calm whe youre
driving. In en nstead of retaliating, count to 10 and take a few
deep , t w breath hs. Back off when someone cuts you off. If som
meone tail lgates you change lanes. Do u, ont get pulled into a gam
of chicken on the road. You life and the lives of others are at
stake. d me e ur t f . Keep a reasona able distance betwee you and
the car in front of yo and ma sure th you en d ou, ake hat arent
cutting so t omeone of when you change lanes. Driv in the p ff u ve
passing lan only when you ne are pa assing ano other car, and be
sure to use yo signals a e our s. Use yyour horn ssparingly as a
warrning, not an outburst a t. Dont make obs scene gestures to oth
drivers no matte how mad they mak you even if her s; er d ke they m
make obsc cene gestures at you . Dont fight over parking sppots.
Stay o or mov out of the way of o out ve other angry drivers. yDo
Make it Easy fo a Thief to Steal Yo Vehicles ont or t ourTh Basic P
he Prevention Policy n Never leave your car running or the keys in
the ignition when yo r e t n oure away from it, ev for ven "just a
minute." Alway roll up th window and lock the car, even when it is
front o your hom ys he ws k e of me. Never leave valuables in plain
view even if your car is locked. P them in the trunk or at r w, y s
Put least out of sigh ht. Park i busy, we in ell-lighted
areas.
6. Carry the registration and insurance card with you. Dont
leave personal IDs or credit cards in your vehicle. Leave only the
ignition key with the attendant when you pay to park in a lot or
garage. Do the same when you take the car for repairs. Report your
stolen car to the police immediately.What about
Carjacking?Carjacking stealing a car by force has captured
headlines in the last few years. Carjacking isthe violent form of
motor vehicle theft. It is a serious threat to our personal safety
because the thiefuses force and fear to rob our car from us.
Sometimes the car owner or other occupants arekidnapped during a
carjacking, and if lucky will be dropped off nearby unharmed. The
worst casescenario occurs when you are transported to a secondary
crime scene, which is usually moredangerous than the original
confrontation. Those not so lucky victims have suffered other
crimeslike rape, aggravated assault, and even homicide.The crime of
carjacking can be traumatic to our everyday lives because it
creates fear in thecommon act of driving a car. Victims of
carjacking have reported being unable to drive a car againwhile
others required months of therapy. Others have become so
hypersensitive, that embarrassingand dangerous situations have
arisen in response to their fear when someone unwittinglyapproached
their car on foot.The reason carjacking got started is because of
the sophistication and prevalence of new anti-theftdevices and
alarm systems. New car alarms, steering wheel locking systems,
Chip-integratedignition switches and stolen vehicle locators made
it tougher on the auto thief. Unfortunately for us,poorly motivated
and unskilled car thieves have adapted by becoming more violent to
get the carsthey need and dont think twice about using force
against us.Popular carjacking locations are parking lots, shopping
centres, fuel stations, car washes,convenience stores, ATMs,
hotels, valet parking, fast-food drive-thru, and outside of retail
stores. Arisky, but popular location for the carjacker is a roadway
intersection with a stoplight. A carjacker willjump out of another
vehicle, pull open your unlocked drivers door, and force you to get
out. Therehave been incidents where well-meaning citizens got into
a high-speed chase following carjackersand ended up being victims
themselves.The "Bump" and CarjackAnother copycat scheme used by
carjackers is to bump your car from behind to get you to pull
overand stop. The carjacker, and his accomplice, will follow the
intended victim to a suitable locationwith good escape routes and
few witnesses. The carjacker will crash into the back of your
vehicle atlow speed and "bump" you with enough force to make you
believe a traffic accident had justoccurred. Typically, the drivers
of both vehicles pull over, stop, and get out discussing the
damage.At this point the carjacker robs you of your vehicle, its
contents, and drives away. The carjackerscar gets driven away by
the accomplice. Hopefully you wont be injured during the
exchange.What Should You Do?Carjacking of parked vehicles depends
on the car owner being inattentive to their
surroundings.Carjackers, like street robbers, prefer the element of
surprise. Most victims say they never saw thecarjacker until they
appeared at their car door. To reduce your risk of being carjacked,
somepreventative actions are listed below:
7. Appro oach your car with th key in h he hand. Look around,
in k nside, and undernea the car before ath getting in. Keep your
car d doors locke and win dows rolle up at all times whille you are
driving. ed ed Be es specially a alert at inte ersections, fuel
stations, ATMs, shoppin malls, and conve , ng a enience and
ggrocery stores all are window of opportunity for carjackers . a ws
c Park i well-ligh in hted areas with good visibility, close to wa
c alkways, st tores and people. p Dont park in isoolated or vi
isually obs structed are near walls or hea foliage eas w avy e. Use
v valet parkin or an attended ga rage, if you a wom driving alone.
ng ure man g As yo walk to y ou your car be alert to suspicious
persons sitting in car e rs. Ask fo a security escort if you are a
or f alone at a shopping centre. s If som meone tries to approa s
ach, chang direction or run to a busy sto ge n ore. Follow your
inst w tincts if the tell you t walk/run away to a busy plac ey to
n ce. If safe open the door, ent quickly, and lock the doors. e, e
ter t Dont be a targe by turnin your bac while loa et ng ck ading
pack kages into the car. Make it your habit to alway start yo car
and drive awa immedia ys our ay ately. Teach and prac h ctice with
your childre to enter and exit th car quic en he ckly. Bewa of the
G are Good Sama aritan who offers to repair your car or a fllat
tire. Its okay to ge help, o r r et just be alert. Bewa of the "
are "bump and rob" whe someone lightly hits your c from be d ere h
car ehind. Whe you en get ou assessin the dam ut ng mages, the
carjackers accomplice gets in your car and drives away. a The
author is B. Tech (Electronic T h cs) from MNNIT (Motillal Nehru
National Inst N titute of Technology), Allahabad & MBA (Ma T
arketing) from UPRTOU , Allahabad. He joined GAIL in m . 1997
through campus inte 1 h erview. He H was poste at GAIL P ed Pata,
during pre- commis ssioning and commission ning stage fro 1997 om
to 2002. H is presen at GAIL, Vadodara since 2002 onwards and is
respons He ntly s o d sible for exec cution of Phase 1, 2A & 2
B projec DVPL-I, DUPL, SGP & DVPL-I I OFC projec and GAIL P
cts, PL cts LTEL (O & M) includin Dahej, Bh ng haruch, Vadodara
& Und dera office; s support to Vaghodia & G V Gandhar
plant. pWe need se ecurity & p protection at each a and every
moment of our life. We need security - even o dbeefore our b birth
inside mothers womb. We take a caution for security a home, of e c
at ffice, socie and etyduuring trave Today, threat ha new de el. as
efinition in the form of terroris attacks, fire, acc st cidents,inf
formation l loss, data corruption, cyber-cri me, mob attacks, hu a
uman bomb car bom bs, mbs, mobile shotgu missiles bio attacks,
poiso un, s, onous gas, communication intrusions etc Today fo
survival of any c. orpeerson, orga anization o industry, we need to
mitigat all these threats & risks and in this p or te e
processreqquire to invvent new mmeans & ways to ma ke security
as part of productiv and pro w y f vity ofitability.Seecurity:
Meaning & Essence for organi zation fSeecurity is k kind of
structures an process nd ses that provide or improve s security as
a conditio and onch heck to ens sure safety continuity and
reliiability of people, pro y, p operty, equ uipment, information
good n,will, establis shment, inddustry, com mmunity, e environme
and na ent ation. From the orga m anization ppoint ofvie lapse i
security not only attribute los in reven & profit, but also
lost produ ew, in a ss nue o uction, rep putationor brand ima age
& may even invit regulato penaltie y te ory es.
8. Today, security has very holistic approach and it includes
personal security, equipment security,health security, data
security, computer security, environment security and community
security. Allthese aspects are very much applicable in the context
of GAIL as an organization. Modern daycompetitive business &
globalization compels organizations to give more importance on
security oftheir personnel, equipment, assets, information and data
as part of productivity and profitability.Almost all the
industries; like oil and gas, exploration, railway, auto, mining,
pharmaceutical andchemical, banking, manufacturing , aviation,
tourism, power and metal industries etc. requiresecurity at first
place for achieving their goals and targets.Security as part of
productivity and profitabilitySecurity is no doubt very integral
part of productivity and profitability. Various kind of
securityoptions can be enforced which directly or indirectly
contribute the productivity and profitability of theorganization in
following ways:Access Control Security systemThe Access Control
security systems is basically designed to protect homes, offices,
shops,buildings, malls, plants etc. commencing forced action or
entry and minimizes the chances ofburglary or mugging in. This kind
of security is more relevant in huge organizations and
governmentadministration like GAIL which possess highly
sophisticated process mechanisms & inherent risk offire and
hazard. A) Main gate entry Main gate security is very important and
it is first place from where a mischievous activity should be
destroyed. Lapse in security may result in attack, theft, robbery,
kidnapping/ abduction and loss of people & wealth to any
organization. Therefore, Photo ID card system is very important
tool which can restrict the unwanted people to enter in our plants
& offices. Card based entry has all the benefits associated
with digital identities, which go beyond security; e.g. tracking of
manpower, building up a visitors database, assisting manpower
traffic control, facilitating frequent head counts. Punching card
system can monitor the entry and exit time of employees & work
force and thus provides the means for checking their working hours
and inculcating discipline & punctuality. B) Energy saving and
Automation Now let us see how the present day access control system
can reduce the cost and contribute to profitability. E.g. when an
employee (card holder) penetrates the building after long hours, in
that situation one can automatically activate area lightening/ air
conditioning and when he goes out area lightening/ air conditioning
may be switched off. In this way, organization can save the energy
consumption. In case of fire, an individual can examine CCTV Video
estimate situations to make them under control by unlocking doors
and direct fans for safety and security in order for the swelling
up of the smoke and sprinkling action. In this way, we can reduce /
eliminate the damage without any delay and further course of action
can be directed.Information & data securityInformation
technologys primary purpose is to make the enterprise employees as
productive,efficient and effective at doing their jobs as possible.
Laptops, portable memory and even smart
9. devices are part of that efficiency/productivity
environment, allowing for work to get done on fromthe remote place
even in the train, plane, at a client site or at an employees
home.Today, Management information system, enterprise resource
planning, online & real time dataaccess etc. are the key for
any business. Information security means protecting information
andinformation systems from unauthorized access, use, disclosure,
disruption, modification, perusal,inspection, recording or
destruction. In lack of information and computer security, data may
bemade corrupt and whole Management Information system, Customer
relation management,financial transaction, inventory management,
operation and maintenance may be disrupted.Here, computer security
also refers safeguarding data, network, theft of laptop, data
storage device,software corruption and natural disaster like fire
and earth quake. Authorized access to informationand decision
making is delegated at various hierarchies in the organization.
Protection ofinformation from un-authorized users is the demand of
the business to protect company interest.E.g. if any information is
leaked to competitors about companys business plan, product
launch,research and development, product specification,
ingredients, process etc. , it may be suicidal fororganizations
business growth, profitability and sustainability.Surveillance
& Video monitoringThrough surveillance, we can monitor and
observe the behavior, activities or other changinginformation
usually of people. We can protect our installation and plants with
terrorist attacks, theftand crime. Ssurveillance can be done from a
distance by means of electronic equipment (such asCCTV cameras), or
interception of electronically transmitted information (such as
Internet traffic orphone calls). It may also refer to simple,
relatively no- or low-technology methods such as humanintelligence
agents and postal interception.We see that in all retail outlets,
malls, industries etc. CCTV serve the purpose of securing the
items& articles for sale, monitoring the production, processes,
services, inventories in ware house etc.and thus optimize
productivity & profitability with better control mechanism. Bar
code is alsoextension of the security in retail industry &
inventory management.With the benefit of IT & networking,
surveillance can be done centrally at far distance at
corporateoffice through CCTV cameras by the security head of the
organization. It gives him true pictureabout the state of security
at field level at various geographical locations.Mitigating the
threats, attacks, natural calamity and counter action:Security of
installations, government and private establishments, industries
& people are veryimportant in todays world of social unrest,
economic imbalance, regionalism, communalism, crossborder
activities, terrorism & natural disaster like flood, earth
quake, tsunami, thunder storms etc.Our country is very much
affected by all above reasons & these reasons are still very
much alive.Parliament and 26/11 Mumbai attacks, bomb attacks in
Delhi, Ahmedabad & other places, earthquake in Gujarat,
Tsunami, flood in Bihar, H.P. etc. are burning examples.An
organization cannot ignore these threats & risks as it may
result in huge disaster, economical &human life loss. For
dealing with all these threats and risks, security personnel should
be fullyequipped with arms & security support systems like
barricade, watch towers, metal gate, metaldetector, bomb disposal
squad, sniffer dogs, fire proof clothing, speed breaker,
communicationgadgets e.g. w-talkie , warning alarms, tyre buster
etc. & disaster management plan should exist inthe
organization. Counter measures with Six Ds approach (deny, deter,
delay, detect, degrade anddestroy) is the key. Physical check of
vehicle & people is very important to counter the risk/threat
atvery first stage.
10. Plant security is very important for sensitive industry
like GAIL. Security has role in prevention of fire& accidents
by controlling items responsible for triggering fire like matchbox,
cigarettes & lightersetc. and motion of vehicles as well.
Security plays important role in dealing with local
villagers,community and project affected people in bringing harmony
& peace at plant locations.Thus, Physical security is must for
any organisation for its smooth operation &
un-interruptedproduction & at the same time prevention in loss
and theft of inventories and finished goods.Security arrangement
also contributes in building image and reputation of an
organization aboutalertness & preparedness for mitigating the
threats. It brings psychological fear to conspirators &feeling
of security among employees & workforce.Selection of security
system & benefitsSelection of any security system is very
important to have desired cost benefit analysis andimproved
productivity & profitability. It is important to analyze
threats and risk around environmentand accordingly mitigation
strategies, counter measures should be developed and integrated.
Bothmanual and system based security system are equally important
and complementary to each other.Wide range of system based security
solution such as burglar alarms, hard wired mechanisms,electronic
locking system, motion detectors and cameras surveillance systems
are available.System based security system can reduce the cost as
well eliminate the human intervention for anyslippage.In the
context of GAIL, security system has more importance due to its
pipeline network across thecountry. Pipeline sabotage is one of the
weapons of choice for terrorist attacks. Few days back inSyria, gas
pipeline has been blasted by terrorist. Helicopter and foot
patrolling of pipeline networkare other dimensions of security to
assure the health of pipeline & thus ascertain
operationalefficiency.ConclusionEnterprises around the globe are
increasingly concerned about the risk in cyber threats and
therising number of security risks in public domain. In todays
economy, budgets are being reducedand various departments are being
asked to cut resources especially manpower. So, risks are up
&budgets are down. The risk realities are exploited by anyone
who sees the downturn/ relaxation insecurity enforcement and thus
takes opportunity for exploitation.Discontented employees are also
walking away with valued information assets, while businessesscale
back on defense in an effort to become more productive. And its
happening at a time when anenterprise can ill afford downtime,
decreased productivity, stolen data, lost sales, and a
damagedenterprise reputation. Now single point external attacks
have moved toward multi-source externalattacks and even the model
of the "trusted employee" is now challenge.Thus, we see that
security has various dimensions like security by personnel for
surveillance,checks, mitigation of the threats & counter action
and system based security & aids e.g. accesscontrol, video
monitoring, communication gadgets, automation etc. in safeguarding
the people,information asset, equipment & property.These ways
and means as control mechanism play very significant and important
role for anorganization for achieving higher productivity and
profitability by reducing the risks & improvingoperational and
personal efficiency.
11. (Submitted By: Madan Mohan, Ma B anager (NG P/L-O&M)
Agra) G ),Baangalore, Sept 30, 2011: The latest v ictim of a credit
ca fraud is none other than noted e ard o dustrialist a billionaire
Kuma Mangala Birla. It has been reported that Birlas credit card
wasind and ar am t n ssto olen and la cloned It was lat used to
make ma hefty transactions in Bangalore. ater d. ter o any s Sour
rce: An Indian news w websiteCr cloning, or "skimming as it is
sometimes called, is a new tec redit card c r g" s s chnique
whereby someone wob btains your credit card details, copies the
onto a bogus ca and be r em ard egins using the credit card. gWhile
credit card theft itself is not new, the manner in which the
informatio is stolen is. n e on nTh first step is to recr an
individual will ing to part he p ruit ticipate in the schem Bartend
t me. ders, wait s staff orsh assista hop ants are offten prime
targets beecause of the sheer volume o credit ca r of ards they
hhandle.Reecruits are given a pocketsize device with a scanni slot,
h ingso omething th resembles a pag and c an be wor on a hat ger
rnbe They a instructed to swi elt. are ipe custommers credit
cardsthr rough the device. Be ecause the process takes only a few e
yse econds it ccan be don easily and incons ne a spicuously
withoutthe customer or anothe employe noticing e er ee g.Swwiping
the credit card throug the de e gh evice copies theinf formation
held on th magnet strip in memor That he tic nto ry.inf formation
can subseequently be copied to a cou b unterfeitca ard, complete
with ssecurity ho olograms. Alternative ely, theinf formation can
be ussed to oveerwrite a s stolen cred card ditwhhich has be ecome
too hot to han o ndle.Skkimming is difficult fo the typic
cardhollder to detect, but s or calgiv ven a large enough sample,
it is fairly e easy for th card heiss suer to d detect. The issuer
collects a list of all thecaardholders who ha ave complained a
about fraaudulenttra ansactions, and then uses data mining to
discover relationsh n a o r hips among them an the mer g nd
rchantsthe use. Fo example if many of the card ey or e, o dholders
us a partic se cular merch hant, that merchant can bedir rectly
invesstigated. S Sophisticate algorith ed hms can als search for
pattern of fraud. Merchant must so ns . tsennsure the pphysical
seecurity of th termina and pe heir als, enalties for merchant can
be severe if th are r ts s heycoompromised, ranging from large
fines by the issuer to comple exclusiion from th system, which e r
ete he ,ca be a dea blow to businesse such as restauran where
credit card transactio are the norm an ath o es s nts c ons eSo how
do y protect yourself? o you tOn solution lies in sm ne n mart chip
credit card s. Smart chips are microchips embedde in some credit c
c m s ed ecaards that eencrypt th informa he ation conta ained in
the magne etic strip. The microochip cannot bechhanged or deleted.
If a skimme tries to scan your card thro f er r ough the d evice,
they will obta only y ainenncrypted in nformation and thus be
unable to clone your credit card. If s e y t someone steals your
smart s rca and dis ard sables the chip, the new swipe terminals
will alert staff to as for an ID or decline the e s sktra
ansaction.An nyway the importance of using caution ca e annot be
ovveremphassized. One must be very carefu while e v ulgiv ving the
cr redit card to the sale esperson t swipe. Regularly check you
credit ca bills ca to ur ard arefullyan report a suspec nd any
action imm ediately. Never acce any ope envelop containing the cted
transa N ept en pecre card a should immediate report t matter to
concern bank. edit and ely the ned
12. As per the in s nstructions of the GA Corpora Securit
Departm s AIL ate ty ment, Secuurity Awareness Week 2011wa celebrat
at GAIL, Regiona Pipeline Network Headquarte as ted al H ers-Gujara
Vadodar The Ina at, ra. augural eremony o Security Awareness Week
(1 3-17th December 20Ce of 011) was hheld on December 13 2011
3,with the admministering of Security Pledge by GM (O O&M),
Shri A.N. Pan i ndey and DGM (GAIL Tel), DSh A.S. Jai in Hindi
& English respective hri in ely.Sh K.M. M hri Meena Dy. Manager
(Security) apprised all employ yees abou the vario compe ut ous
etitionsbe eing conduucted at various locat tions (Dahe Bharuc
Undera, Ahmedab ej, ch, bad, Kadi and Mehsa a ana) ofRPPNHQ-Guj
jarat, Vad dodara during the Security Awareness Week. Shri A.N.
Pandey, while A s . ddressing t gathering apprais the effo of Secad
the sed orts curity Depa artment an also on various aspect of nd
vse ecurity. He stressed u upon the discipline a nd dedicat tion
toward GAIL & Nation. He called up the ds e ponem mployees t
particip to pate in the competit e tions with full zeal and
sugggested innovative ideas tostr rengthen th security system of
GAIL. he ySe ecurity Aw wareness WWeek 2011 was con cluded on 17th
Dec 2011 w 1 c., with prize distribution to the d various
competitions at GAIL (India) Limwinners of v s mited, RPNNHQ-Gujar
rat, Vadoddara by Sh A.N. h.Pa andey GM (O&M). A the closing
ceremo GM (O At ony O&M) stressed upon present security sc n s
cenarioan challeng being f nd ges faced by In ndia with re egards
to security. sSince the se ecurity of G GAILs insttallations,
Pipeline and Offices cannot be left to se s e ecurity per
rsonnelalo and on one Dy Manager (Security) is posted at RPNHQ to
lookin after ver large are it is one nly y. r ) Q ng ry ea,the
erefore the moral re e esponsibilit of ever ty ryone to contribute
his/her be towards security of our c est sOfffices, Pipe elines and
Installations under R RPNHQ-G Gujarat, Vadodara for ensuring safe
and secure ren nvironment t.As per the Corporate Security Departme
yearly planner 2011, Shri Naveen Kant Rajor s e ent K ria,
Sr.Offficer (Secu urity), GAIL Jhabua and Sh. A L, Ashish Dixit Sr.
Office (Securit GAIL Agra visited North t, er ty), A dGuujarat and
South Guj jarat Area Locations on 17.11.22011 to 19.11.2011 a
27.11.2011 to ca out and arrySe ecurity Inspection, A Audit and
Security S S Sensitizatio Program for GAIL employe on m L ees and
contractse ecurity perssonnel.Th Security Sensitiza he y ation
program began with adm n ministering of Secur g rity pledge by Shri
K KrishanKu umar, Man nager (Mec on 17.11.2011, S P.K. Ve ch.) Sh.
erma, Man nager (Mecch.) on 19. .11.2011 a Sh. and
13. As shish Dixit on 27.11. .2011. Durring the se ensitization
programs on 17.11 n 1.2011 Sh Krishan Kumar h.an 19.11.2011 Sh. L
nd Lokesh Sahni, WIC U Undera ad ddressed to participa t ants. Sh.
Sahni advised to Spaarticipants that they r remain vigiilant and e
extra carefu during th day to day work home, pe ul heir o k,
ersonallife and duri e ing their d duties. Both the Officcers, who
were dep puted for th purpos briefed to the he se,paarticipants in
detail regarding duties an respons nd sibilities and also co
covered vaarious topics likeSe ecurity of P Personal Property and
also pow of right to private defence a per the law. wer t as lTr
raining on bbasic fire f fighting sys stem was g given to se
ecurity guards by Shr Manish Saxena, Ma ri S anager(F&S) at Kal
Termina and Sh. Ajay Bhar Dy. Ma lol al rat, anager (F& at Und
&S) dera Termi inal. A tota of 22 alGA Emplo AIL oyees, 58
Security Guards a and 18 other contr o ractual wo orkers were
attende the edse ensitization program o above dates. n on dSe
ecurity Awa areness W Week was observed a GAIL La o at akwa from
13th Dec 2 2011 to 17th Dec 2011. The taim of this p m programme
was to make emplo e oyees aware about th securit related
responsibility and heir ty rals measures taken for the security of
the men material & machiinery. Sec so s f n, curity Eme
ergencyReesponse D was c Drill conducted on 28th DDecember
Coordinate by Majjor Rajeev Singh Pa ed v awaiya, th hSe enior
Office (Securit er ty). The Pledge taki ng ceremo was held at Lakw
on 13 Dec 2011. The P ony waple edge was a administer by OIC GAIL
Lak red C, kwa.
14. Es ssay comp petition for employees and cont s tract perso
onnel was organised and Open quiz for c n contractse ecurity pers
sonnel and CISF was held on 1 d s 15.12.20111.On the spot prizes
wer given to the particiipants. On the spot quiz for Fam memb n re
q mily bers (childr and rensp pouses), w organiz on 16. was zed
.12.2011. The respo onse was very good and abou 27 participants d
utpa articipated in the prog gram. emony was held on 17th Dec 2011
at 15: 30 hrs. at Conferenc Hall.Th closing and concluding cere he
s 1 cePr rizes were announced under all above ca ategories by OIC
Lakw y wa.Deeputy Com mmandant CISF was also pres sent on this
occasion and high s n hlighted pre esent scen nario of ecurity and
threats. Dse eremony OIC Lakwa emphasiz During concluding ce O zed
on the need of SSecurityin the plant a well as in the colony.
as
15. Fr rom: Sumila NegiSe ent: 14 December 20 11:53 011To
Corporate Security Departme o: y entCc Sutapa S c: SanyalSu
ubject:Re espected M Madam ease accept my sincPle cere thanks for
distrib s buting Victo orinox Swis knife to the emplo ss oyees, as
aso ouvenir on the occasion of Secuurity Awareeness Wee 2011. It is
a multip ek t purpose and a very h handyins strument c capable of
putting the owner at ease and confidence especiallly women. e e,Th
hanks and regards,Su umila NegiSr PA to GM (BD) r. M Th edition of
GAIL Rakshak has been edited by Shri Ash his h y hish Dixit, Senior
Offficer (Secu urity) prese ently lookin after se ng ecurity serv
vices at GA Agra region. AIL, He started his profes e ssional car
reer in RA and in CRPF (Central R AW n Reserve Po olice Force He
joine CRPF in the year 2002 as A e). ed n Assistant Commanda and C
ant wa posted at Srinaga r (J&K), Dimapur (Nagaland) a Naxal
infested areas of as a and Ch hhattisgarh While p h. posting und
these areas, he was actively invol der e lved to co ounter
terroorism, insu rgency and Naxalism under the Area of
responsibility. d m e r Duuring servic in RAW (Researc & Analy
ce W ch ysis Wing) under Ca ) abinet Secretariat an CRPF, he had
undergon various trainings and cou nd ne s s urses rela ated to Int
telligence collection, Internal Se c ecurity and counter te d
terrorism.Whole conte ents, conce and pr ept resentation is the re
n esult of his hard wor with con s rk ntributions wherecre edited.
He can be rea ached at e-mail: ash ish.dixit@g e gail.co.in S
Suggestio & feed ons dback may be sent to us on e-mail: coc y t
e [email protected]