EMSA Interim Guidance On Maritime Security 2022 09
EMSA Interim Guidance On Maritime Security 2022 09
EMSA Interim Guidance On Maritime Security 2022 09
Version. 2022
DISCLAIMER
This document has been developed by the European Commission with the assistance of the European
Maritime Safety Agency with a view to providing to EU Member States’ Maritime
Administrations/Designated Authorities guidance in the application of maritime security measures.
The document does not have a regulatory purpose. None of its content is binding in nature or should be
interpreted as superseding any legal/regulatory framework governing the implementation of maritime
security in the Member States, be it national, European or international, more particularly the maritime
security requirements of Regulation (EC) No. 725/2004 and of Directive 2005/65/EC.
This document is not a manual covering all aspects of security in the Regulation and the Directive. The
selected content in this document is intended to specifically address areas for improvement identified
notably during European Commission inspections in Member States; the content is intrinsically non-
exhaustive, based on observation during activity carried out until the time of writing. It therefore does
not preclude the correctness of possible other practices not considered or adequately reflected herein.
This is a living document that will be revisited within the MARSEC Committee at least on a yearly basis
at the initiative of the Commission and notably based on the observations during Commission inspections
in Member States
The guidance in this document should always be considered subject to and in conjunction with reference
to the Member States’ specific regulatory and operational contexts and any other relevant circumstances
The content of this document is not restricted but it is intended for the use of all personnel responsible for
security in the EU maritime sector. Therefore, the dissemination of the content is not limited but
encouraged. In this regard, national administrations are advised to share this document with those in the
private sector that might benefit from it (i.e., Port Facility Security Officers, Company Security Officers,
etc).
Page 2 of 73
Table of Contents
1. Introduction ................................................................................................................... 7
1.1. Goals and purpose......................................................................................................... 7
1.2. Scope............................................................................................................................... 7
1.3. List of Symbols .............................................................................................................. 8
2. Applicable Union Law .................................................................................................. 8
2.1. Member State obligations in relation to the Regulation 725/2004 and Directive
2005/65/EC ................................................................................................................................ 9
2.1.1. Assignment of responsibilities within the Member State .......................................... 9
2.1.2. National Programme .................................................................................................. 11
2.1.3. Member States Risk Assessment ............................................................................... 12
2.2. Setting Security level and providing guidance for protection from security
incidents .................................................................................................................................. 12
3. Bilateral or multilateral arrangements ..................................................................... 13
3.1. Alternative Security Agreements vs Equivalent Security Arrangements ............. 13
3.2. Declaration of Security ............................................................................................... 15
4. Enforcement and sanctions ........................................................................................ 16
5. Flag State ..................................................................................................................... 17
5.1. Manning level .............................................................................................................. 17
5.2. Ship Security Assessment ........................................................................................... 18
5.2.1. Content and approval ................................................................................................. 18
5.2.2. Reviews and amendments to a SSA........................................................................... 19
5.3. Piracy ........................................................................................................................... 19
5.4. Ship Security Plan ....................................................................................................... 20
5.4.1. Content and approval ................................................................................................. 20
5.4.2. Reviews and amendments to a SSP ........................................................................... 21
5.4.3. Testing the effectiveness of the SSP ........................................................................... 21
5.5. Ship Security Officer .................................................................................................. 22
5.6. Restricted Areas .......................................................................................................... 22
5.7. Security equipment on board ships ........................................................................... 23
5.7.1. Ship Security Alert System ........................................................................................ 25
5.8. Qualifications and Training ....................................................................................... 25
5.9. Drills and exercises ..................................................................................................... 26
Page 3 of 73
5.10. Records......................................................................................................................... 27
5.11. Verification .................................................................................................................. 28
5.12. Certification ................................................................................................................. 29
5.13. Verification of ships by the Flag State ...................................................................... 30
5.13.1. Requirements for internal audits ....................................................................... 31
5.14. Delegation of tasks to RSOs on ship security ........................................................... 32
5.14.1. Authorisation of RSOs ........................................................................................ 32
5.14.2. Monitoring and controls of RSOs by Member States ...................................... 33
5.14.3. SSP approval ........................................................................................................ 34
5.15. Company Security Officer ......................................................................................... 34
5.15.1. Qualifications and training ................................................................................. 34
5.15.2. Specific duties ....................................................................................................... 34
5.15.3. Requirements for internal audits ....................................................................... 34
6. Control of Ships by the Port State ............................................................................. 35
6.1. Duly Authorised Officers ........................................................................................... 37
6.2. Pre-arrival information .............................................................................................. 38
6.2.1. Exemption from the provision of pre-arrival information ..................................... 39
6.3. Security Inspections .................................................................................................... 39
6.3.1. Carrying out an inspection ......................................................................................... 39
6.3.2. Control and compliance measures ............................................................................ 41
6.3.3. Reporting and recording ............................................................................................ 41
7. Port Facility Security .................................................................................................. 42
7.1. Port Facility Security Assessment ............................................................................. 42
7.1.1. Content and approval ................................................................................................. 42
7.1.2. Reviews and amendments to a PFSA ........................................................................ 44
7.2. Port Facility Security Plan ......................................................................................... 44
7.2.1. Content and approval ................................................................................................. 45
7.2.2. Reviews and amendments to a PFSP ........................................................................ 46
7.3. Port Facility Security Officer ..................................................................................... 46
7.4. Restricted Areas .......................................................................................................... 47
7.5. Security equipment ..................................................................................................... 47
7.6. Qualifications and trainings ....................................................................................... 47
7.7. Drills and exercises ..................................................................................................... 48
Page 4 of 73
7.8. Records......................................................................................................................... 50
7.9. Port facilities occasionally serving ships engaged on international voyages ......... 50
7.10. Inspections and controls of Port Facilities ................................................................ 51
7.10.1. Requirements for internal audits ....................................................................... 53
7.11. Delegation of tasks to RSOs on ort facilities security .............................................. 53
7.11.1. Authorisation of RSOs ........................................................................................ 53
7.11.2. Monitoring and controls of RSOs by Member States ...................................... 53
8. Port Security ................................................................................................................ 54
8.1. Port Security Assessment (PSA) ................................................................................ 55
8.1.1. Content and Approval ................................................................................................ 56
8.1.2. Defining port boundaries ........................................................................................... 57
8.1.3. Conditions for a potential application of the provisions of Article 2.4 of the
Directive and consequences thereof. .................................................................................... 59
8.1.4. Reviews and amendments to a PSA .......................................................................... 60
8.2. Port Security Plan (PSP) ............................................................................................ 61
8.2.1. Content and Approval ................................................................................................ 61
8.2.2. Reviews and amendments to a PSP ........................................................................... 62
8.3. Port Security Officer................................................................................................... 63
8.4. Qualifications and trainings ....................................................................................... 64
8.5. Training exercises ....................................................................................................... 64
8.6. Records......................................................................................................................... 66
8.7. Inspections and controls of ports ............................................................................... 66
8.8. Delegation of tasks to RSOs on port security ........................................................... 67
8.8.1. Authorisation of RSOs................................................................................................ 68
8.8.2. Monitoring and controls of RSOs by Member States ............................................. 68
9. Enforcement of penalties ............................................................................................ 69
10. Communication of information ................................................................................. 69
11. Monitoring Reports .................................................................................................... 71
Appendix A. References ..................................................................................................... 72
Page 5 of 73
List of Acronyms
AIS Automatic Identification System
ASA Alternative Security Agreement
CoP Certificate of Proficiency issued in accordance with the STCW Convention
and Code
CSR Continuous Synopsis Record
DAO Duly Authorised Officer
DoS Declaration of Security
ESA Equivalent Security Arrangement
EU European Union
FSI Flag State Inspector
ILO International Labour Organisation
IMO International Maritime Organisation
ISM International Safe Management Code
ISPS International Ship and Port Facility Security Code
ISSC International Ship Security Certificate
IISSC Interim International Ship Security Certificate
LRIT Long Range Identification and Tracking of Ships
MLC Maritime Labour Convention
MarSec Maritime Security Committee
PDoS Permanent Declaration of Security
PFSA Port Facility Security Assessment
PFSO Port Facility Security Officer
PFSP Port Facility Security Plan
PSA Port Security Assessment
PSC Port State Control
PSO Port Security Officer
PSCO Port State Control Officer
PSP Port Security Plan
RSO Recognised Security Organisation
SOLAS International Convention for the Safety of Life at Sea, 1974, as amended
SSA Ship Security Assessment
SSAS Ship Security Alert System
SSO Ship Security Officer
SSP Ship Security Plan
Page 6 of 73
1. Introduction
1.1. Goals and purpose
This document provides guidance to assist Member States in achieving a harmonised and
effective implementation of Union law in the field of maritime security, particularly Regulation
(EC) No 725/2004 of 31 March 2004 on enhancing ship and port facility security (hereinafter
referred to as the Regulation) and Directive 2005/65/EC of 26 October 2005 on enhancing port
security (hereinafter referred to as the Directive).
In particular, this guidance focuses on administrative and control tasks that need to be executed
by Member States’ Competent Authorities for maritime security in relation to the following
areas:
• Member State obligations;
• Role as flag State;
• Role of Recognised Security Organisations (RSOs);
• Role as port State (i.e. Duly Authorised Officers, DAO);
• Port Facilities;
• Communication of information.
It should be noted that this document is not intended as a manual for ship and port / port facility
security. It does not address every single aspect of this activity; such aspects are already
covered by a vast array of literature published by various industry stakeholders. Instead, the
added value of the document is to provide guidance on selected aspects of this activity where
the feed-back from maritime security inspections led by the European Commission in Member
States with the assistance of EMSA allows to highlight key regulatory requirements, providing
more clarity where possible, together with recommendations and best management practices
as a complement to the said requirements. In this, the guidance recalls considerations and
interpretations agreed within the MARSEC Committee and takes into account IMO
instruments as relevant. Member States are recommended to refer to these documents as
necessary. Moreover, since the work of all parties involved in maritime security in Member
States and the work of the European Commission inspectors are a continuous progress, the
outcomes showed in this document should be in continuous development. Therefore, this is a
living document that will be updated and developed as needed and at least on a yearly basis.
1.2. Scope
The scope of this guidance is related to the implementation of the EU legislative framework
and applies to:
Page 7 of 73
− Different categories of ships operating domestic services, their companies and
the port facilities serving them, in their application of the Regulation as
determined by the Member State in question pursuant to mandatory security
risk assessment required by the said Regulation.
Definitions used in this guidance are those referred to in Regulation 1, Annex I of Regulation
(EC) 725/2004 of 31 March 2004, Article 2 of Directive 2005/65/EC of 26 October 2005 and
Article 2 of Commission Regulation (EC) 324/2008 of 6 April 2008. Unless otherwise
specified herein, any reference in this document to “articles” shall be in respect of articles of
the Regulation and the Directive.
In addition, identified best practices are highlighted in text boxes along the
document.
• Establishing the respective roles and responsibilities of the various parties involved;
• Evaluating risk and enabling governments to make changes to security levels based on
the vulnerability of ships and port facilities;
• Ensuring that adequate and proportionate maritime security measures are in place. In
this context, the Regulation (Annex I Part A section 1.3) includes functional
requirements aimed at inter alia:
− Establishing a framework involving co-operation between the various parties;
− Ensuring the collection and exchange of security-related information;
− Providing a methodology for security assessments.
The Code’s regulatory approach to security implementation is two-pronged; on top of the risk-
based approach reflected in Ship Security Assessments (SSAs) and Port Facility Security
Assessments (PFSAs), the Code also applies a prescriptive approach, with a set of minimum
requirements to demonstrate compliance.
Page 8 of 73
Although the Code is self-contained, it cannot be taken in isolation from other maritime
legislation that serves maritime security purposes. When dealing with security, it is necessary
to consider the relevance of and relationship with other SOLAS regulatory aspects such as
LRIT (SOLAS V/19-1) and AIS (SOLAS V/19) (in terms of links to security equipment),
minimum safe manning (SOLAS V/14) (as may be relevant in the context of the
implementation of the SSP (Ship Security Plan)), ISM (SOLAS Chapter IX), IMO number
(SOLAS XI-1/3 and 3-1), the CSR (Continuous Synopsis Record, SOLAS XI-1/5), seafarer
training (STCW Convention and STCW Code), the SUA Convention (suppression of unlawful
acts at sea) and other non-IMO Conventions such as ILO 180 and/or MLC 2006.
The Directive aims to extend security measures more widely to areas of port activity. It covers
the port as a whole, including the water surface, critical objects which are not port facilities but
in the port and calls to re-examine port facility security plans taking into account the
neighbourhood of any port facilities.
It has the same systemic approach as the Regulation: based on a port security assessment, a
port security plan has to be developed; the Directive addresses also training, exercises and
drills.
2.1. Member State obligations in relation to the Regulation 725/2004 and Directive
2005/65/EC
The Regulation and the Directive attribute to Member States two key categories of tasks –
Administrative and Control – that, when properly addressed, should lead to their satisfactory
implementation. For the proper fulfilment of these obligations Member States shall designate
roles to their various relevant organs, develop a national programme and properly assess risk.
Member States shall also ensure that port security measures introduced by the Directive are
closely coordinated with measures taken pursuant to the Regulation.
Page 9 of 73
In setting up these functions and roles, it is important to ensure:
• Sufficient human and technical resources are devoted, with an adequate level of
expertise to be able to interpret, administer and enforce legislation in a consistent
manner;
• Clarity is established on how competent authorities conduct maritime security-related
functions in line with the Regulation and the Directive;
• Cooperation is effective between relevant national bodies to assess the risks in ships
and port facilities;
• That a mechanism is in place whereby intelligence data is available to Maritime
Administrations and/or Designated Authorities to enable them to determine the
appropriate Security Levels and that a system of Security Levels for ports or parts of
ports is introduced for the purpose of the Directive.
In this regard it is recommended that the Member State establishes clear processes for the:
Page 10 of 73
− When carrying out monitoring activities, the role of the Administration reflected by
extension in the roles of its officers. In the case where more than one authority is
involved, suitable cooperation is necessary the modalities of which must be clearly
established.
• The conduct of port security assessments that effectively take into account as a
minimum the detailed requirements laid down in Annex I of the Directive1.
• The drafting and adoption of port security plans that effectively take into account as a
minimum the detailed requirements specified in Annex II of the Directive2.
It is recommended that Member States take into account the following when developing,
reviewing and updating their national programmes, as indicated in Recital 14 and Article 9(1)
of the Regulation:
1
Article 6, Dir.2005/65/EC
2
Article 7, Dir.2005/65/EC
3
Regulation Art. 9.3
Page 11 of 73
2.1.3. Member States Risk Assessment
The EU regulatory framework previously presented outlines a standardised and consistent
framework for:
• Evaluating risk;
• Enabling governments to offset changes in threat with changes in vulnerability for ships
and port facilities;
• Taking security countermeasures for ships and port facilities.
• At a first level, Member States need to consider the threat to national maritime-related
assets both locally and globally and any risk of attack thereto. Information to this effect
will help Member States to decide on the basic security measures that should be applied
at Security Levels 1, 2 and 3, and the circumstances in which the different Security
Levels should be activated for both ships and port facilities;
• At a second level, the specific competent authorities for ship security and port facility
security are encouraged to develop guidance/policies for the maritime sector –
including companies responsible for ships flying the Member States’ flag and RSOs
designated to carry out tasks on its behalf – to be taken into account when:
− Carrying out SSAs and PFSAs; and
− Defining the specific security measures to be mandated in the SSPs and PFSPs.
It is recommended that:
• The risk assessment mechanism requires the interaction between the competent
authority and industry, being the exchange of information particularly important in this
collaboration. In this respect, reliable intelligence and quick dissemination of
information should be as wide as possible to the shipping cluster;
• The policy guidance is reviewed on a regular basis, or at least every 5 years, to ensure
that the assessments and plans are up-to-date, and these reviews are linked to the
conducting of meaningful risk assessment for ships operating in domestic services as
defined in Article 3(3). In this latter respect, instruments such as IMOs “Guidelines on
security aspects of the operation of vessels which do not fall within the scope of SOLAS
XI-2 and the ISPS code” (MSC.1/Circ.1283) may be useful as a reference.
2.2. Setting Security level and providing guidance for protection from security
incidents
• Set the security level (1, 2 or 3)5 applying to ships or port facilities, taking account of
general and specific threat information;
• Provide updated security level information that matches current security threats.
4
Reg. 725/2004/ Annex I Reg.3 and 7. And Annex III Part B/4.8
Page 12 of 73
In relation to the security levels of port facilities, it is important to recall that:
• Prior to entering and during a call at a port facility, ships must comply with the
requirements for the security level set by the port Member State, if the security level is
higher than that of the ship. In this case the port Member State must ensure that security
level information is conveyed to ships operating in – or having communicated their
intention to enter – its territorial sea.
It is recommended6 that:
• Information on the change of security levels is sent to the ship via the CSO7;
• MS should encourage Companies to use a cascade system whereby information that
fails to directly reach the CSO is disseminated to all ships of the company;
• When multiple Member States are involved – e.g. in case of fixed routes between
Member States, or in case of ships flagged in the EU operating in different parts of the
world – there is good coordination between the Member States in setting the applicable
security level, notably including exchange of information about changes in security
levels they have set;
• Member States apply, at each security level, similar standards of security. This requires
a degree of agreement and co-ordination between said States.
6
MARSEC Doc. 0206 and MARSEC Doc. 0302
8
Reg. 725/2004/ Article 5, Annex I Regulation 11 and Annex III 4.26
9
Reg. 725/2004/ Article 5.4, Annex I Regulation 12 and Annex III 4.27
10
Reg. 725/2004 art.5.2
Page 13 of 73
• The MARSEC Committee has established a set of principles11 that should apply to fixed
routes; these principles include the proposal for ships and port facilities on such fixed
routes to be covered by an ASA;
• ASAs need to be reviewed at least every five years12;
• For ships, issues such as key shipboard operations13 should be addressed in the ASAs;
• ESAs14 may allow under duly justified circumstances Port Facilities to carry out ISPS
activity without having to bear the full administrative, financial and organisational
burden of a fully ISPS certified facility;
• Prior to allowing a ESA, a PFSA must be conducted and approved. The decision
between implementing an ESA and a PFSP must in all cases be based on the
conclusions of an approved PFSA. This conclusion should clearly state that an ESA can
be implemented instead of a PFSP15.
• MSs can either establish generic criteria defining the circumstances under which ESA
may be adopted, or whether they use a case-by-case approach16.
• An ESA must at least describe the security measures set out in the ISPS Code Part A,
Section 14.2, and any additional security measures a MS deems appropriate or has
rendered mandatory, and they must be at least as effective as the same measures when
described in a PFSP17;
• ASAs and ESAs are also subject to Commission inspections.
It is recommended that:
• Laid up vessels are not subject to ESA.
• MSs clearly define the criteria to authoise the adoption of an ESA, particularly the
concept of occasional ISPS activity. In this regard, please see section 2.1.1.
11
MARSEC 1705 on Updated Guidelines on Alternative Security Agreements
12
Reg. 725/2004 art.5.3
13
Reg. 725/2004 Annex III Part B 4.26
14
MARSEC Doc 7608
15
Reg. 725/2004 Annex II part A 15.7
16
MARSEC Doc 7608
17
Reg. 725/2004 art.5.4
Page 14 of 73
3.2. Declaration of Security
Declarations of Security (DoS) are requested by a party (ship or port facility) in order to specify
what measures are to be taken during the ship/port interface or ship-to-ship activities to ensure
adequate security of ships and port facilities notably when normal conditions of operation do
not apply (e.g. when a ship and port facility are not at the same Security Level). The
circumstances under which a DoS may be required should be determined by the Member State
based on a risk assessment18.
• Member States should inform companies of ships flying their flag as to the
circumstances when a DoS needs to be requested by a Master/SSO of the said ships;
• Bunkering with non-ISPS certified ships outside an ISPS port facility is a ship-to-ship
activity that warrants a DoS. When bunkering in a port facility, SSOs should liaise with
Port Facility Security Officers (PFSOs) to establish whether the bunkering ships
involved are certified before commencing operations;
• A PDoS could be agreed between a ship or ships of a company and a port facility where
the ship calls regularly, to set out the respective security responsibilities. This can be
especially useful in the case of Ro-Ro ships with short turnarounds in port;
• A DoS needs to:
− Be signed by the ship and acknowledged by the port facility (when in a port
facility)19;
− Include port facility LOCODE (when in a port facility) and record the port facility
number;
− Clearly indicate responsibilities, e.g. for carrying out security measures;
• Administrations must specify the minimum period for which DoS are to be kept on
board by ships flying their flag.
It is recommended that:
• Requiring or responding to requests for a DoS is set out and clarified in the SSP in line
with the regulation20;
• PFSOs or any other party responsible for shoreside security be reminded of the need to
acknowledge requests from ships for a DoS;
18
Reg. 725/2004 Annex II Part A 5.1
19
Reg. 725/2004 Annex II Part A 5.4
20
Reg. 725/2004 Annex II Part A 5 and Annex III Part B 5
Page 15 of 73
• A DoS is retained on board for as long as it relates to one of the last 10 calls at port
facilities but, in any case, with a minimum recommended time of 3 years;
• Considering the current practice of SSOs requesting a DoS at every single port of call,
even in cases not required by the SSP, Member States remind their shipping community
that a DoS should not be the norm;
• When a PDoS is in place all shipboard personnel with security responsibilities should
be made aware of the security measures taken by the port facility on behalf of the ship
and vice versa. The same shall apply to port facility personnel with specific security
responsibilities.
It is recommended that:
• The authorities responsible for the enforcement of Article 14 of the Regulation clearly
assign this activity to the officers in charge of exercising it;
• Irrespective of the ultimate sanctions available to a national authority, Member States
take a stepped approach when seeking to ensure that a port facility or ship corrects an
identified deficiency. In case there is a need for a more robust approach, that might
warrant officers to take action in their capacity, said officers should act in an effective,
proportionate and dissuasive way for which they need to be properly empowered and
trained.
21
Reg. 725/2004 art 14
Page 16 of 73
5. Flag State
Member States who register ships under their flags effectively exercise their jurisdiction and
control in administrative, technical and social matters over said ships as indicated in Article 94
of UNCLOS, in particular with regard to SOLAS and the ISPS Code.
• Member States should establish an adequate and effective system for exercising control
over ships entitled to fly their flag, and to ensure that they comply with relevant
international rules and regulations in respect of, inter alia, maritime security.
It is recommended that:
• When a Member State approaches its flag State functions in respect of maritime
security, it also takes into account other relevant legal instruments, namely the III Code
(IMO Res. A.1070(28)) on the mandatory implementation of IMO instruments and
Directive 2009/21/EC of 23 April 2009 on compliance with Flag State requirements.
• quality systems based on the ISO 9000 series are introduced to improve the
implementation of the Regulation.
The following sections provide guidance regarding Administrative tasks that fall within a Flag
State’s responsibility, followed by guidance regarding control tasks.
Difficulties can be encountered in situations where ships have a lower gross tonnage and
therefore fewer crew members on board. In these cases, the additional work has an impact on
daily tasks on board due to the need to implement security measures.
• The additional workload resulting from the implementation of the Regulation needs to
be taken into account when establishing the minimum safe manning of a ship;
22
Reg. 725/2004 article 3.5 and Annex III Part B 4.28
Page 17 of 73
• Ships need to demonstrate that they are able to implement the hours of rest on board
(MLC 2006, ILO 180). Failure to do so constitutes non-compliance also with the
Regulation.
It is recommended that:
• In determining the manning level for a ship, a Member State takes into account IMO
Assembly Resolution A.1047(27), revising A.890(21) on “Principles of Safe
Manning”. SOLAS Chapter V Regulation 14 recommends that a “Minimum Safe
Manning Document” is issued;
• Particular attention is paid to ships with fewer crew members, where security could take
up a significant amount of their workload.
• SSAs consider all the potential threats and known security incidents, so that these can
be addressed effectively in the subsequent SSPs. Some of the information necessary for
this purpose will need to come from the flag State;
• The risk assessment is ship specific.
It is recommended that:
• Risk assessments are developed and reviewed taking into account the associated threats
applicable specifically to that ship rather than simply cover threats of collective or
generic applicability (e.g. to whole fleets or to a whole State);
• Member States issue guidance on identified potential threats that ships may face (e.g.
piracy, cyberattacks), both at sea or in ports in different parts of the world where they
might be operating. This guidance should be updated on a regular basis. Where a
company has ships flying different flags, this guidance should be sought from each flag
State as the threats may be different;
• When cyber risk management is considered within the ISM (IMO Resolution
MSC.428(98)) specific reference should be mentioned both in the SSA and in the SSP,
to fulfil the Regulation23. On the other hand, if cyber risk management is considered
within the SSA and SSP, or in an independent Cybersecurity Plan, specific reference
23
Regulation 725/2004, Art. 3.5 and Annex III, Part B section 8.3
Page 18 of 73
could be mentioned in the Safety Management System of the ISM to comply with the
mentioned resolution;
• If the language or languages used is not English, French or Spanish, a translation into
one of these languages shall be included;
• Attention to potential confidentiality issues when cyber risk management is considered
within the ISM (IMO resolution MSC.428(98)).
It is a good practice
It is recommended that:
• SSAs (and subsequent SSPs) be updated regularly to take account of ever emerging
threats, current examples being cybersecurity and remotely piloted aircraft systems.
However, this should not mean that a review should necessarily lead to change in the
SSA, but that different potential scenarios were considered and that resultant
conclusions were documented;
• SSAs are reviewed when there are changes in circumstances such as the ship’s
operating area or equipment, or if problems are identified during operations, training,
drills, or following a security incident;
• Records of the review process be maintained.
5.3. Piracy
• When a Member State approaches its flag State functions in respect of maritime
security, it should build and operate networks with the maritime industry as well as
with international partners to exchange necessary information and practises to
defend piracy at sea (e.g. The German Federal Police has been operating a piracy
prevention centre (PPC) since 2010 and acts as an interface between the maritime
industry, national and international authorities.).
Page 19 of 73
5.4. Ship Security Plan
• Verifies that the SSP addresses all the applicable mandatory legal provisions on, inter
alia, cargo handling, prevention of weapons or dangerous substances, procedures for
auditing security activities, procedures for reporting security incidents (including
cybersecurity incidents), maintenance requirements and frequency for the
testing/calibration of equipment;
• Verifies that the SSP is consistent with the SSA in so far as ensuring that all the issues
identified by the SSA are addressed through specific security measures in the SSP;
• Or the RSO acting on its behalf, has at its disposal the necessary expertise to enable it
to approve the SSP;
• If the language or languages used is not English, French or Spanish, a translation into
one of these languages shall be included.
It is recommended that:
• Measures are taken to guarantee the authenticity and integrity of the SSP on board.
Among these measures might be the inclusion content tablet, index, and document
control (e.g., include total number of pages in the page number, adequate record of
changes). It should consider physical (e.g., safebox, locks,…) and digital (e.g.,
inclusion in the cybersecurity risk assessment, ) aspects as required;
• Any amendments to an approved SSP, based on the verification carried out for that
plan, shall be distinctly identifiable and do not replace the original plan;
• Approval of an SSP is indicated in such a way as to confirm that every page has been
approved;
• A letter of approval of the SSP is issued and made available on board, which clearly
identifies the SSP to which it refers;
• The SSP clearly indicates which parts cannot be made available to DAOs without prior
consent from the Flag Administration, should said DAOs need access to the SSP in the
event that clear grounds are established;
• Member States provide Masters and SSOs with clear instructions on making available
the parts of the SSP that can be disclosed to DAOs in the event that clear grounds are
established to this effect;
• Member States encourage companies to avoid unnecessary administrative burden by
ensuring that SSPs are not excessively detailed and that they are tailored to apply to the
specific ship and/or Company.
Page 20 of 73
• When cyber risk management is considered within the ISM (IMO resolution
MSC.428(98)) specific reference should be mentioned both in the SSA and in the SSP,
to fulfil the Regulation24.
• To include in the SSP an index, which can be used to show the validity date of each
section, indicating where applicable when it was amended;
• That the plan allows proper traceability of amendments. With regards to this issue:
− when amendments are made these need to be documented; and
− if amendments have been made to the SSP, the index should identify these
amendments, so that the SSO can easily trace the most recent;
• To ensure that there is a clear distinction between a new SSP – for which a
verification must be conducted and a new International Ship Security Certificate
(ISSC) issued – and an existing SSP duly amended as necessary.
• The Administration is to determine the extent to which it wants to carry out this
mandatory activity;
• This task cannot be delegated;
24
Regulation 725/2004, Art. 3.5 and Annex III, Part B section 8.3
25
Reg. 725/2004 Annex II Part A 9.5 and MARSEC Doc. 2204 Rev.2
26
Reg. 725/2004 Annex II Part A 4.4
Page 21 of 73
• Member States may decide to carry out this activity in conjunction with other tasks.
It is recommended that:
• Member States consider different ways of carrying out this testing activity.
It is important that:
• The SSO is duly trained in such functions and has the necessary authority on board to
exercise her/his responsibilities under the general authority of the Master
• The SSO is fully conversant with the SSP and in particular, with his/her security duties
(included cybersecurity duties, albeit considered within the ISM (IMO resolution
MSC.428(98)) (i.e. obligation to report and maintain records of all security incidents).
This needs to be confirmed during verifications.
It is recommended that:
• Procedures are put in place to ensure that where regular crew changes occur, the new
SSO on board is briefed by the outgoing SSO about any security issues as may have
arisen;
• When cyber risk management is considered within the ISM (IMO resolution
MSC.428(98)), the SSO should be fully aware of the cybersecurity measures indicated
therein;
• The SSO’s ability to carry out his/her security duties is not compromised by excessive
workload related to other functions on board. In cases such as cruise operations for
example, crew members with passenger interface responsibilities may not be able to act
effectively in their role as SSO during a security incident.
27
Reg. 725/2004 Annex II Part A 12
28
Reg. 725/2004 Annex II Part A 9.4.2
Page 22 of 73
It is important to recall that:
• Whereas the legal obligation is for RAs to be so designated and for respective measures
to be set up to prevent unauthorised access accordingly, particular attention should be
given to ensure that, irrespective of how such areas are indicated in the SSP (whether
through a drawing or a list, or both), the information given is consistent with the actual
physical areas to which it relates;
• The measures approved in the SSP need to consider the daily operation of the ship in
different ports of call with regards to the management of RAs;
• In the management of RAs, attention is to be paid to the compatibility of limiting access
to or exit from such areas with the evacuation and escape routes that would be used for
safety reasons (e.g. from the engine room).
It is recommended that:
• When RAs are identified in the General Arrangement Plan of the ship and included as
annex to the SSP, the SSP describes the permanent or temporary measures for these
areas;
• A clear distinction is made between the terms ‘locked’ and ‘closed’ given that these
terms are often erroneously used interchangeably.
29
Reg. 725/2004 Annex II Part A 9.4.15 & 9.4.16
Page 23 of 73
• Plastic seals (e.g. to quickly unlock access to survival crafts, fire stations, co2 rooms,
etc. in case of an emergency;
• Substance and article detection (e.g. X-ray imaging);
• Network protection (firewalls, data storage protection).
It is important that:
• The security equipment described in the SSP corresponds to what is actually being used
on board for security purposes;
• Crew members assigned with responsibilities for using such equipment are trained on
and conversant in such use;
• Relevant procedures be included in the SSP.
It is recommended that:
It is a good practice
• Consider the benefits of implementation of the most recent standards (e.g. IEC
61162-460, ISO 16425, IEC 62443) on board ships to improve cybersecurity.
30
Reg. 725/2004 Annex II Part A 19.1.4 and Annex II Part B 9.6
Page 24 of 73
5.7.1. Ship Security Alert System
The Ship Security Alert System (SSAS)31 is an essential element for ensuring the security of a
ship. It should be tested regularly, based on requirements to be laid down in the SSP32, to ensure
it is fully functional at all times.
• During certificate verification, the SSAS must be tested and found in working order,
with due care being taken to confirm that the installation is in accordance with the SSP;
• The frequency of tests of the SSAS must be specified in the SSP. Tests must be readily
identifiable as such.
It is recommended that:
• Member States develop procedures to notify other States in the vicinity of a ship which
notifies a ship security alert;
• Member States’ competent authority, designated by the Administration33 as initial
recipient of the security alerts from their flagged ships, should easily have access to
General Arrangement Plans in order to facilitate the intervention of appropriate forces
in case of need following a security incident.
• Since the adoption of the ISPS Code, mandatory requirements for the certification of
seafarers in respect of their proficiency in security matters or in security awareness,
have been introduced in the STCW Convention;
• Administrations must ensure that the documents to certify that seafarers have met the
required standard of competence for maritime security in line with STCW (i.e.
Certificates of Proficiency (CoP) and Security Awareness) are issued by authorised
organisations.
• Maintain a list of the organisations they have authorised and periodically assess their
ability to exercise their tasks;
31
Reg. 725/2004 Annex I Reg 6.
32
Reg. 725/2004 Annex II Part A 9.4.18
33
Reg. 725/2004 Annex I Reg 6.2.1
Page 25 of 73
• Specify a maximum period of validity for CoPs;
• Require periodical refresher training for staff allocated security related tasks.
• Drills and exercises are carried out in order to maintain a high level of preparedness by
in particular for those assigned security responsibilities;
• Member States should verify that the scope and conduct of drills and exercises correctly
reflect the distinction between these two measures and their intended respective
objectives;
• Drills should test one or more of the procedures in the SSP, covering one or more
scenarios35.
34
Reg. 725/2004 Annex II Part A 13.4
35
Reg. 725/2004 Annex III Part B 13.6
Page 26 of 73
It is recommended that:
• The more frequently ships interface with port facilities, the more important it is that
said interfaces are tested through exercises;
• When exercises are carried out, companies should provide feedback to their ships on
any lessons learnt therefrom; the management of each such ship can then have an
internal discussion about these lessons and possibly identify any ship-specific issues
that need to be evaluated further and recorded;
• Member States encourage companies to ensure that:
− All participants are fully aware of their duties and responsibilities before
participating in a drill or exercise;
− An oral review and debriefing on the outcome takes place following a drill or
exercise. This should include consideration as necessary of changes to procedures
in the SSP, identification of gaps in the channels of communication and the need
for authorities to intervene.
5.10. Records
Records are essential to provide evidence of compliance with the requirements of the
Regulation36.
• The period for which records must be retained on board must be specified by the
Administration;
• Records must be kept on board and made available upon request by the port State
(PSCOs and/or DAOs)37;
• Records should be kept in the working language(s) of the ship; if the working
language(s) is(are) not English, French or Spanish, a translation into one of these
languages shall be included38;
36
Reg. 725/2004 Annex II Part A 10
37
MARSEC Doc. 7510 rev FINAL
38
MARSEC Doc.2702
Page 27 of 73
• Records of exercises kept on board cover feedback and discussion of exercises in which
the ship may not have participated.
It is recommended that:
• The period for which records must be retained on board is specified in the SSP;
• Records are kept together for ease of retrieval and referral;
• Records are retained for either three years (the maximum time interval between
verifications) or five years (to complete a cycle between renewal verifications);
• As part of the security records, a security logbook is maintained in which all security
activities are recorded.
5.11. Verification
Once a SSP has been approved, it is necessary for the Administration to verify that the related
security system is being implemented and that the associated security equipment is fully
functional39.
• The term “fully complies” in ISPS A/19.1.1.1 and A/19.1.1.2 means that a certificate
cannot be issued unless all the requirements of the approved SSP are fully implemented
and any associated security equipment and systems are present and in use as required;
• The Administration or a RSO should therefore verify that all security equipment and
systems on board are maintained and functioning as intended during any verification.
If this is not the case, the deficiencies must be immediately rectified, and this
rectification must be sanctioned by the Administration40;
• If deficiencies are identified during an intermediate or additional verification, the ship
must, in the impossibility of immediate rectification, implement equivalent, temporary
measures that are at least as effective as those mandated in the SSP and have been
agreed by the Administration.
It is recommended that:
39
Reg. 725/2004 Annex II Part A 19
40
Reg. 725/2004 Annex II Part A 19.1.1
Page 28 of 73
• A sample of the reported deficiencies is checked to verify that the Company is
investigating, analysing, and resolving those deficiencies efficiently and in a timely
manner;
• Particularly for certain ship types – such as Ro-Ro ferry – where some security activities
are shared with the port facility, the FSI/RSO checks that:
− SSOs are fully aware of the extent of the shared responsibilities for controlling
access to the ship in conjunction with the port facility; and
− The SSO has available on board the contact details of the PFSO and has successfully
made contact;
• When amendments are made to an approved SSP, their implementation is checked and
verified. This verification should cover every amendment to the approved SSP that has
been approved by the Administration since the previous verification audit, or since the
SSP was originally approved. Additional verifications on the implementation of
amendments may be carried out upon the instruction of the Member State;
• The FSI/RSO is in a position to categorise specific findings according to their
seriousness;
• Findings are reported in a clear, concise manner and supported by objective evidence;
• Any deficiency is explained to the SSO once the verification has been completed.
• For officers carrying out verifications to be trained in audit techniques and ISO
standards in order to be able to assess effectively the implementation of measures,
procedures and duties as indicated in the SSP and the verification of suitable records,
considering the need to take into account the differences between a Quality System
and the Security System;
• The Administration defines the circumstances when an additional verification is
required;
• Procedures are in place to ensure that the certificate is issued with no undue delay.
5.12. Certification
The issuing of an ISSC41 to a ship follows an onboard verification, during which it is confirmed
that a security system and associated security equipment fully comply with the Regulation and
the SSP.
41
Reg. 725/2004 Annex II Part A 19.1.1.1 and 19.2.1
Page 29 of 73
• An ISSC cannot be issued based on a verification carried out prior to the approval of
the applicable SSP;
• In the case of interim ISSC (IISSC), it shall be verified that the SSP submitted for
approval is being implemented on board;
• A RSO cannot use activity carried out on a ship on behalf of a previous flag State for
the purpose of certification of the ship under a new flag State;
• An ISSC cannot be issued prior to the related initial or renewal verification;
• An IISSC shall not be issued to a ship from which an ISSC has been withdrawn;
• Issuing consecutive IISSCs is considered an exceptional measure and should not be
used to avoid full compliance with the requirements of the Code;
• For the purpose of certification, neither the Regulation nor the Code establish different
gradings of failures of security equipment or systems. Therefore, certification cannot
be conditional or qualified.
It is recommended that:
• Member States ensure that when they issue electronic security certificates, said
certificates are supported by an established procedural framework that takes into
account IMO FAL.5/Circ. 39 as revised;
• Administrations ensure that officers responsible for the verification/certification
process are adequately guided on how to assess and report any failures they identify in
such process;
• Member States establish clear conditions under which a ship that has been declared by
the Company as out of service or in lay-up, will have its ISSC suspended or withdrawn
(MARSEC Doc. 3205 Annex 4 Rev.3).
Since there is no standard and common system in place for the control of maritime security
activities of own flagged ships, each Member State must develop its own control system to
ensure conformity of its ships with maritime security requirements.
42
United Nations Convention on the Law of the Sea (UNCLOS) article 94
Page 30 of 73
• Control can result in the imposition of sanctions. Hence, Member States shall develop
a system to ensure that ships flying their flag are subject to control and sanctions in case
of non-compliance (infringements).
It is a good practice that in relation to national flagged ships, Member States use the
following resources for the implementation of control systems
• A system of regular flag State inspections for ships calling at national ports;
• A network of FSIs to be based on selected ports abroad for this purpose;
• A system of global reach for FSI inspections, with FSIs travelling to other countries
as results necessary;
• A system of ad hoc FSI travel to inspect ships in cases of serious findings by PSCOs
or information from RSO verification reports; and/or
• The organisation of short or longer period inspection campaigns.
It is the responsibility of the company security officer to arrange for internal audits of security
activities, and ensure that deficiencies and non-conformities that have been identified are
properly addressed. Records must be kept of internal audits that have taken place.
It is reminded that personnel conducting internal audits of the security activities specified in
the plan or evaluating its implementation must be independent of the activities being audited
unless this is impracticable due to the size and the nature of the Company or of the ship43. The
decision on the extent of impracticability of said provision should be taken by the
Administration that has approved the ship security plan44.
It is recommended that:
43
Reg. 725/2004 Annex II Part A 9.4.1 (the Commission and EMSA are aware that this generally only applies
to the Company)
44
MARSEC Doc. 7705
Page 31 of 73
• Criteria should be established by the Administration approving the SSP to determine
when it is impracticable for a Company (or a ship), due to its size or nature, to maintain
the independence of the internal audit activities.
When Member States decide to give such authorisations, they select which organisations will
be entrusted to act on their behalf for the purposes of maritime security and provide the said
organisations with instructions on any flag State specific issues – such as security threats – that
must be considered when carrying out SSAs, preparing SSPs and conducting onboard
verifications as applicable.
• In terms of criteria for their appointment, RSOs need only to comply with ISPS B/4.5,
which is mandatory under the Regulation;
• Directive 2009/15/EC of 23 April 200946 on common rules and standards for ship
inspection and survey organisations does not apply to ROs when acting as RSOs;
• When changes occur in the framework of RSO delegation, these have to be duly
communicated to the European Commission and the IMO.
It is recommended that:
• The Member State provides the RSO with full legislation related to the delegated
activities and keeps the appointed RSO updated with any changes in such legislation;
• For the Member State to grant authorisation, to the RSO should:
− confirm that all its security personnel have had appropriate security vetting;
− make available completed verification and certification files;
− provide full access to its database;
− commit to notify changes to procedures and standards directly related to the
delegated tasks (Member States should establish whether any such changes should
be subject to prior agreement).
• When authorising a RO as a RSO, Member States:
− establish a clear distinction between the roles of RO and RSO in the “Agreement”;
45
Reg. 725/2004 Annex I reg 1.16
46
and Regulation (EC) No 391/2009 of the European Parliament and of the Council of 23 April 2009
Page 32 of 73
− clearly define the tasks delegated to the organisation as RSO in the Agreement;
− notify the delegated tasks to the IMO and the Commission.
• When referring in the Agreement to the tasks delegated as RSO, a reference to the
Regulation is included;
• Member States issue guidance to RSOs on the conduct of the verification-certification
of ships. In this regard it is important to ensure that the procedural requirements adopted
by the RSOs are in line with the regulatory requirements of the ISPS Code and the
national requirements.
• Member States agree with RSOs about the failures that should be notified to said
Member States when so identified in the course of verifications;
• Member States agree with RSOs which RSO offices will be designated as points of
contact for security matters related to the delegated tasks.
• Monitoring needs to be carried out irrespective of whether the RSO has carried out any
delegated tasks or not. In cases of lack of activity, said monitoring should, as a
minimum ensure that the RSO continues to meet the criteria for its appointment.
It is recommended that:
• Member States develop an oversight regime of regular monitoring of their RSOs which
could include:
− Regular RSO auditing that would not be limited to the RSO’s office(s) in the
Member State, but also address other components of the RSO producing activities
on behalf of the auditing Member State;
− Tracing the maritime security activity of the RSOs through their databases;
− Verification report reviews on a sampling basis;
− Attendance by FSIs of sample verifications carried out by RSO auditors;
− Inspections by FSIs of ships recently verified by RSOs on a sampling basis;
− Following up RSO-related failures identified during RSO verifications or Port State
Control or DAO activity.
Page 33 of 73
5.14.3. SSP approval
Where Administrations delegate the task of SSP approval to RSOs,
• The RSO that has either prepared the SSA or the SSP of a particular ship cannot approve
that SSP or amendments thereto47.
• Provide the RSO with clear written instructions on which amendments require prior
approval and which do not;
• Randomly review the approval of SSPs carried out by RSOs (for accuracy and
consistency (a minimum annual level of inspections could be envisaged).
47
Reg. 725/2004 Annex II Part A 9.2.1
Page 34 of 73
6. Control of Ships by the Port State
It is the responsibility of the Member States to ensure that foreign flagged ships calling ports
within their territory comply with SOLAS XI-2 and the ISPS Code. The control is twofold:
In both cases the control is carried out by Duly Authorised Officers (DAOs), legally authorised
to exercise control and compliance measures on security grounds.
• DAOs have the right to go on board the ship to verify that required certificates are in
proper order;
• PSCOs approach to maritime security control on foreign flag ships in port might differ
from the DAOs in the initial scope, under the applicable Port State Control MoUs and
relevant EU legislation (i.e. Directive 2009/16/EC of the European Parliament and of
the Council of 23 April 2009 on Port State Control48). Nevertheless, both PSCOs and
DAO must check maritime security aspects49.
The main difference between DAO and PSCO functions is that DAOs have direct legal
authorisation to exercise express control and compliance measures according to SOLAS XI-
2/9. When, within their PSC functions, PSCOs establish clear grounds for maritime security,
they must – unless authorised as DAOs themselves – call the competent authority (DAOs) to
take over.
it is recommended that:
48
Art. 15, and Annex VI which refer to Instruction 37/2004/10 “Guidelines for Port State Control Officers on
Security Aspects” which themselves refer to MSC/Circ. 1111 “Interim Guidance on Control and Compliance
Measures to enhance Maritime Security”.
49
MARSEC Doc. 2802
Page 35 of 73
• when DAOs need to check the validity of a ship’s certification, the following should be
verified:
− In the ISSC/IISSC certificate itself:
o The issuing authority;
o The RSO acting on its behalf (as applicable);
o The dates on which the verification(s) was carried out;
o The dates of issue;
o The expiry date;
o Its endorsements.
− If the RSO has issued the ISSC/IISCC certificate, that said RSO is recorded in the
IMO GISIS databased as having been authorised by the ship’s flag;
− That an approved SSP is on board;
− That the date of approval of the SSP is consistent with the ISSC/IISSC certificate;
− That the data provided in the ISSC/IISSC is consistent with the DOC and SMC;
− The dates of registration in the flag, the ISM Company, IMO Company number and
the Contracting Governments (or RSOs) which issued the certificates, as provided
in the CSR.
• When a control activity is conducted, the Master/SSO is provided with a report on the
activity carried out50,
• In the event of imposition of a control measure after clear grounds are established the
Master and the Administration concerned are immediately notified.
• In the case of notification under Article 16 of the Regulation 324/2008, a Member State,
which is the Port State, should exercise the control and compliance measures in
accordance with the Regulation51. Article 16 serves as an alert for the concerned
Member States who should verify if the security situation on board is satisfactory and,
if not, they should act in accordance with the provisions of the Regulation52.
−
In light of the above, a notification under Article 16 of the Regulation 324/2008 does not
automatically mean that the ship is banned from a port / port facility. Relevant control and
compliance measures in accordance with Regulation shall be applied. Denial of entry into port
or ship's expulsion from port is dealt with by Annex I 9.3.3 and Article 3.5, indent 11 of the
Regulation. Account should be taken of the provisions of paragraphs 4.29 – 4.44 of Annex III.
(MARSEC Doc. 2905)
50
THETIS-EU MARSEC Module may be used.
51
Reg. 725/2004 Annex I reg 9
52
Reg. 725/2004 Annex I reg 9.2.5
Page 36 of 73
6.1. Duly Authorised Officers
Duly authorised officer (DAO) means an official of the Contracting Government duly
authorised by that Government to carry out control and compliance measures in accordance
with the provisions of the Regulation53.
The security system for controls on ships is based on the activities of DAOs, who must be
appointed by Member States to exercise control and compliance measures (MARSEC DOC
5610).
Whilst the professional backgrounds of DAOs may vary, they need to have appropriate
knowledge of the provisions of SOLAS XI-2 and of the ISPS Code, of shipboard operations
and to be appropriately qualified and trained to the level required by the functions that they are
authorised to carry out.
PSCOs may also be DAOs54, but if this is the case, they should have received additional training
and expertise in security matters to become DAOs.
• DAOs must be appointed to exercise the control and compliance measures on ships as
set out in the Regulation as previously referred, and be issued with identification
documents confirming their authority;
• Member States must establish procedures whereby the authenticity of a DAO
identification document may be verified55.
It is recommended that:
• Member States take into account the recommendations set out in MSC.1/Circ. 1111,
Annex 2, Chapter 2 with regards to qualifications and training of DAOs. Principally,
DAOs should:
− Be knowledgeable with shipboard operations;
− Receive appropriate training for the functions that they are authorized to carry
out;
− Be able to communicate in English with the Master, the SSO and the officers of
the ship;
− Receive appropriate training to ensure proficiency in safety procedures when
boarding ships or on board the ship;
− Periodically undergo training in order to update their knowledge.
• The identity cards issued to DAOs include tamper-proof features such as holograms,
and contact details of the issuing authority;
53
Reg. 725/2004 Annex I reg 9
54
Directive 2009/16/EC Annex V B.2
55
Regulation 725/2004, Art. 3.5 and Annex III, Part B section 4.18
Page 37 of 73
• When DAOs are determining their own control activity, the data in the THETIS-EU
MARSEC Module be consulted for information about previous control activities
(MARSEC Doc. 7110);
• Clear instructions are provided to the DAOs on how to proceed in relation to the
notification to the Administration and the RSO in case of the imposition of a control
measure;
• The Member State monitors the activity of its DAOs as way of ensuring consistency in
the approach and the quality of their activity;
• As a way of exercising DAO activity Member States may - apart from the conduct of
inspection activity triggered by the establishment of clear grounds - consider the
establishment of a more structured inspection activity based on a risk-based approach.
• Member States should check that the pre-arrival information is complete and is
analysed before the ship enters port57.
It is recommended that:
56
Reg. 725/2004 Art. 6.1
57
Directive 2010/65 Annex A.5
Page 38 of 73
− Examination of any additional information related to security incidents reported by
the ship;
− Confirmation that appropriate ship security procedures were maintained during any
ship-to-ship activity in the period covered by its previous ten calls at port facilities.
• If the review of pre-arrival information raises concerns, the DAO takes into
consideration the list of clear grounds in ISPS B/4.33 when deciding to exercise control;
• Member States should not exclusively rely on automated systems to evaluate pre-arrival
information other than to confirm that all the information requested has been provided.
• When a ship is exempted from providing pre-arrival information for a certain scheduled
service or route, this does not mean that this ship is exempted for other scheduled
services or routes59;
• The exemptions need to be checked on a regular basis
It is important to:
It is recommended that
• After confirming the existence of a valid certificate on board, the DAO takes into
account the following:
− The crew list, to be able to identify personnel certified in accordance with the
STCW Convention and Code (STCW VI/5 and VI/6);
58
Reg. 725/2004 Art. 7
59
MARSEC 4107-Rev
60
Reg. 725/2004 Annex I reg 9.1.
Page 39 of 73
− Records of:
o The last ten calls at port facilities, including any ship-to-ship activity;
o Access to the ship;
o Any DoS;
o Any changes in security level;
o Drills and exercises carried out;
o Records of security incidents (including cybersecurity ones);
o Maintenance of security equipment (SSAS, cameras, detectors, etc);
o Crew familiarisation with security duties.
• If the only means to clarify the clear ground(s) is through the content of the SSP and
this access is refused by the Master, the DAO should use all means to liaise with the
Administration to get the access to the SSP or the attendance on board by the RSO as
appropriate.
• Check that the security level at which the ship is operating is at least that set by the
Contracting Government for the port facility as required by SOLAS XI-2/4.3;
• Confirm and cross check, when needed, whether the ship has taken additional
measures both in the current and last ports of call;
• Make an initial assessment of the security measures being taken by the ship upon
boarding;
• Examine specific security aspects when boarding the ship and moving around:
− Access to the ship;
− Access to restricted areas, keeping in mind that the management of restricted
areas is confidential and, as long as there are comprehensible reasons, it
cannot automatically be assumed that they have to be locked at all times;
− Monitoring of the security of the ship;
− Delivery of ship stores;
− Handling of cargo and/or unaccompanied baggage, if applicable.
• In case the Administration is not reachable after clear grounds are established and
these were not clarified, rectified or otherwise addressed to satisfaction, the DAOs
should suspend the inspection and use their judgement as to the need or otherwise
to impose further control measures.
• Confidentiality issues should be considered related to the inclusion of the cyber risk
management in the ISM (IMO resolution MSC.428(98)).
• Member States establish a procedure to record DAOs’ security inspections activities
in THETIS-EU MARSEC Module.
Page 40 of 73
6.3.2. Control and compliance measures
• DAOs are obliged, in the event of a control measure other than a lesser administrative
or corrective measure is imposed, to notify:
− The Administration;
− The RSO which has issued the certificate of the ship, if applicable;
− The IMO.
It is recommended that:
• Upon completion of an inspection of a ship, the Master is given a report on the results
of the inspection, details of any action taken by the DAO, and a list of any non-
compliances to be rectified;
• Member States use the form attached in MSC/Circ.1111, for an inspection on clear
grounds;
• The results of the inspection be recorded in the THETIS-EU MARSEC Module;
• In case of delay to the ship, restriction of operations or detention to the ship or
expulsion, the report is send by the most expeditious means possible.
Page 41 of 73
7. Port Facility Security
Note: port security under Directive 2005/65/EC is covered under points 8 to 11 below.
The process starts with the identification and evaluation of assets to protect, including the
geographical definition of the scope of the assessment. Threat scenarios would be security
incidents that need to be thoroughly studied and charted with regards to their likelihood to
happen and subsequent consequences if they occur. The resultant security risk chart for each
of the incidents indicates that they are of such gravity as to need effective countermeasures
either human or physical.
Page 42 of 73
It is important to recall that:
• PFSAs, after considering all applicable threats and identifying all applicable
countermeasures, still need to identify any residual weaknesses which must feature in
the plan;
• PFSAs are to include within their scope radio and telecommunication systems,
including computer systems and networks;
• PFSAs need to be reviewed at least every 5 years and whenever there are changes in
the port facility;
• Member State Designated Authorities can delegate the development of PFSAs.
However, the approval cannot be delegated;
• The PFSO should not be involved in the administrative steps required for the approval
or review of PFSAs, and should only be involved in the development of the PFSA to
provide information where required;
• A PFSA must set out conclusions. These should be communicated to the PFSO, and
RSO where applicable, to help prepare any required modifications of the PFSP;
• It is to be ensured that both countermeasures and any actions intended to mitigate
vulnerabilities identified in the PFSA report are addressed in the related PFSP.
It is recommended that:
• The PFSA includes a precise map providing a graphic description of the geographical
scope of the assessment.
• The PFSA is kept as simple and clear as possible, in order to minimise the
administrative burden associated to its conduction and approval;
• The PFSA is conducted taking into account input from the Administration and relevant
stakeholders involved;
• The PFSA includes an on-site visit;
• PFSAs take into consideration the cybersecurity dimension, taking into account the
reliance on technology of interfaces between port facility and outside networks and
between port and ship;
• Authorities commit to issuing PFSA approvals within a reasonable timeframe. A time
frame of not more than 3 months for the authorities to answer a request for approval of
a PFSA (whatever the answer) shall be considered as reasonable.
Page 43 of 73
It is a good practice that
• A PFSP should be developed and maintained on the basis of a PFSA. If the review of
the PFSA impacts on the provisions of the PFSP there must be a subsequent review of
the plan;
• A PFSP should include measures intended to address the interface between the port
facility and ships allowed to call at it and that are out of the scope of the Regulation;
• The coverage of monitoring of waterside areas, Single Point Moorings (SPMs), and
berthing areas is mandatory;
• Security services subcontracted to or provided by third parties must be under the control
of the PFSO according to the provisions of the PFSP. If direct control is not possible, a
written agreement considering the different aspects of the relation with the service
provider should give the PFSO the adequate level of control;
• If some requirements of the PFSP are addressed with external documents (in particular
standing operating procedures of a security provider for their employees serving at the
port facility) there must be a clear reference to these documents in the plan and these
external documents considered part of the plan.
Page 44 of 73
It is recommended that:
• If a private company is assigned to perform specific security duties in the port facility,
the related agreement for services details the procedures to be performed in such a way
as to ensure clarity between such procedures and the parts of the PFSP they are intended
to fulfil.
• The PFSA provides a static picture of the security of the port facility at a given time.
The PFSP must be based on the PFSA in such a way that the measures determined in
the PFSP address the issues found in that picture. Considering this, there should be a
timely link between the PFSA and the subsequent PFSP. Consequently, it is
recommended that the National Administration establishes a maximum time span for
the validity of the PFSA. It would be advisable that the time span between the adoption
of a PFSA and the drafting or revision of the PFSP does not exceed 4 months.
It is important:
• To verify that the PFSP addresses all the mandatory requirements, including those made
mandatory by the Art. 3.5 of the Regulation61;
• To verify that the PFSP is consistent with the PFSA, ensuring that all the issues
identified by the PFSA are addressed through specific security measures in the PFSP;
• That Member States determine which changes in an approved PFSP shall not be
implemented unless the relevant changes are approved by the Authorities. In this
regard, the PFSO can implement all necessary changes and updates to the PFSP. The
competent authority at their periodical review of the PFSP will review the updating and
changes. Minor changes to the PFSP shall be reviewed and included at annual updating
of the plan. It should not be required to reissue the PFSP for approval when minor
changes are implemented. Upon major changes (e.g. modifications of the perimeters of
the PF, changes in the access control and relevant countermeasures/gates layout,
modification of the restricted areas, inclusion of an area dedicated to the storage of
dangerous goods, etc.) the PFSP shall immediately be sent in for new approval by the
competent authority62.
• For the services of a Member State to have the necessary expertise to approve a PFSP;
• That the PFSP contains appropriate provisions to ensure that security is not
compromised by activity with any ships that are not subject to the ISPS Code63 , in
particular inland waterway vessels (i.e. barges)64.
61
Reg. 725/2004 Annex III Part B sections 16.3 and 16.8
62
MARSEC Doc.7408 Final and Regulation 725/2004 Annex II Part A 16.6
63
Reg. 725/2004 Article 3.8
64
See MARSEC Doc. 8709 for examples of practices relating to non-ISPS ships in ISPS port facilities
Page 45 of 73
It is recommended that:
It is important:
• That Member States determine which changes in an approved PFSP shall not be
implemented unless the relevant changes are approved by the Administration;
It is recommended that:
• The plan allows proper traceability of amendments. If amendments have been made to
the PFSP, a record of changes should identify these amendments, so that, at any point
in time, the PFSO can be in a position to know what is new and the history of the plan
is traceable;
It is important to recall:
• Port Facility Security Officers (PFSO) obligation to report and to maintain records of
occurrences which threaten the security of the port facility including cybersecurity
incidents65.
65
Reg. 725/2004 Annex II Part A 17.8
Page 46 of 73
7.4. Restricted Areas
Page 47 of 73
7.7. Drills and exercises
Security drills are intended to be held periodically to test individual elements of a PFSP and
should establish that port facility personnel are alert and proficient and that the PFSP is being
implemented properly. Further information on this topic might be found in the Exercitium66.
Drills are usually small, operational practices designed to test a specific part of the security
plan. Drills allow crew or staff to introduce, test or practice a procedure, task or routine related
to their security role (e.g., baggage search, use of security equipment, implementing a particular
measure at a higher security level). To ensure the effective implementation of the provisions of
the security plan, drills should be conducted at least every three months […]67.
Exercises are organised on a larger scaleand are intended to test the wider context of a security
system described in the plan, including communication, coordination, availability, resources,
and reactions. Various types of exercises, […], should be carried out at least once each
calendar year with no more than 18 months between the exercises68.
Exercises are usually not limited to the port facility but include the participation of other
stakeholders such as relevant authorities within the Administration responsible for maritime
security, ships and management companies, other port facilities and port authorities.Exercises
do not always need to be operational. Equally successful can be a “table-top exercise” where
the main security issues of cooperation are reviewed and updated. There should be a balance
between the different types of exercises.
Workshops and seminars differ conceptually from drills and exercises. Workshops gather
stakeholders to develop security plans and procedures through consensus69. Seminars gather
participants to inform about existing procedures.
Nevertheless, even if seminars and workshops are not intended to test the plan as drills and
exercises do, with the adequate content they might count as a type of annual exercise in the
context of the Regulation70 (ref Annex III Part B 13.7.2). It should always be taken in
consideration that the multiannual plan maintains an adequate balance between the different
types of exercise.
66
Exercitium. European Handbook of Maritime Security Exercises and Drills.
67
Regulation 725/2004 Annex III Part B 13.6 for Ships and 18.5 for Port Facilities (mandatory as per art. 4.5)
68
Regulation 725/2004 Annex III Part B 13.7 for Ships and 18.6 for Port Facilities (mandatory as per art. 4.5)
69
In addition, “workshop” is not a term used or recognised in Regulation 725/2004
70
Regulation 725/2004 Annex III Part B 13.7.2 for Ships and 18.6 for Port Facilities (mandatory as per art. 4.5)
71
Regulation 725/2004 Annex III Part B 18.5 and 18.6
Page 48 of 73
• Drills can be computer-based as long as the threat scenarios which are presented are
related and specific to the PFSP, in order to test individual elements of the plan.
However, not all threat scenarios can be computer-simulated, and a balance needs to be
found with live, operational drills, in order to verify the readiness and reactivity of
security personnel.
It is recommended that:
• Drills and exercises keep in focus the threats identified in the PFSA and for which
measures approved by the Administration are described.
• Drills and exercises are included in a multiannual plan with the right balance of table-
top and operational events. This multiannual plan should be regularly reviewed to
accommodate lessons learned and training needs identified.
• Long-term planning is
necessary to integrate exercises
within other security
preparedness activities creating
a multiannual schedule and
improving cycle as shown in the
figure. In addition, local
exercise planning could be
incorporated into national and
international preparedness
activities. Security exercises
may be integrated within major
exercises containing other
Figure 2. Multianual security improving cycle
elements such as safety or
antipollution elements. Indeed,
complex incident scenarios (e.g., a bomb on board a ship berthed at a port facility
explodes, causing a fire, casualties, and bunker pollution) are realistic and provide the
opportunity to test not only security plans but also the interaction with other plans and
response structures. In this context, it might also occur that one or several drills for
specific participants are conducted within the context of a major exercise (e.g., crew on
board conducts a bomb search drill within an exercise scenario of a terrorist attack in a
port). In these cases, it is important that each event is evaluated and reported adequately.
Page 49 of 73
• Exercise documentation at least indicates the time of the exercise, the subject of the
exercise, the participants or target group and the main findings and conclusions.
7.8. Records
Records are essential to provide evidence of port facility compliance with the requirements of
the Regulation.
It is recommended that:
• Port facilities ensure that their plans include provisions for the retention of records of
security incidents and threats, reviews, audits, training, drills and exercises as evidence
of compliance with those requirements;
• Although it is not mandatory for PFSPs to include minimum time for which security
records have to be retained at the port facility, Administrations do establish such
minima and give clear instructions to this effect to personnel with responsibilities for
record keeping (i.e. PFSO).
• It is for a Member State to decide the extent of application of the Regulation to those
port facilities within its territory which, although used primarily by ships not engaged
on international voyages, are required, occasionally, to serve ships arriving or departing
on an international voyage;
• When it is decided that a port facility occasionally serves ships engaged on international
voyages clear rules are established in writing by the authorities at the appropriate level
of decision.
72
Reg. 725/2004 Annex I Reg.10.3
Page 50 of 73
• It is required that a responsible person ashore is appointed to make arrangements with
the ship on the security measures to be implemented. This person will be responsible
for shore-side security (in lieu of the PFSO) and needs to have a clear authority to agree
a DoS with a SOLAS ship intending to engage in a ship/port interface.
• In carrying out the PFSAs of the port facilities located in their territory, in order to
determine which PFs are to be included in the aforementioned case, the following
criteria must be taken into consideration by the competent authorities of the Member
States:
− Frequency of the international traffic: a maximum number of ship’s calls per year
should be determined to berth and undertake commercial operations at the
“occasional” port facility;
− Ship’s type: the competent authority might decide to authorize a limited type of
vessels, due to the absence of permanent infrastructures (passenger ships, high
speed crafts, oil and chemical tankers, gas carriers, MODU, etc.)
• The minimum requirements for a person ashore to be appointed with security
responsibilities, including qualifications and experience required for the exercise of
related duties, such as:
− Comprehensive knowledge about ship-port operations;
− Knowledge of maritime security terms and definitions including comprehensive
knowledge of the EU and the IMO regulation(s);
− Knowledge of the maritime security levels and the consequential security measures
and procedures aboard ship and in the port facility environment;
− Knowledge of the requirements and procedures for reporting deficiencies, and the
requirements and procedures for security-related contingency plans;
− Knowledge of the Declaration of Security (DoS);
− Language skills particularly in English;
• 24-Hr contact details of the person responsible to report any security-related incident
and to assist the ships in case of need.
73
MARSEC Doc. 7908, Annex II (MARSEC Doc. 7910)
Page 51 of 73
It is important to recall that:
• Member States should develop a system for controlling the maritime security activities
in its port facilities74. The national system developed must be adequately implemented;
• Control can result in the imposition of sanctions. Hence Member States should develop
a system to ensure that port facilities are subject to control and sanctions in case of non-
compliance.
• This means that Member States are responsible and accountable at all time towards the
EU, and as a consequence to the Commission, of a thorough enforcement of maritime
security measures by port facilities situated within their territories.
It is recommended that:
• A port facility inspection programme is developed to verify the implementation and test
the effectiveness of the port facility security plan considering the specific monitoring
needs for each port facility. Such programme could include regular and ad hoc
supervision, and consider other control activities (e.g., on-site visit, participation in
exercises).
• Monitoring activities to be recorded so evidence can be presented during inspections.
• Each port facility is inspected once every year to verify the implementation and test
the effectiveness of the port facility security plan.
• Alternatively, the system for controlling the maritime security activities in port
facilities includes a need-based inspection programme developed to ensure that the
port facilities supporting greater risk are inspected more often. The programme
could establish the frequency of inspections in each port facility based on different
criteria:
o Specific characteristics (e.g, size and complexity, number of passengers,
type of goods, symbolic value, location).
o Performance criteria including adequacy of the PFSP and results of previous
inspections (e.g., compliance with the regulation, correction of deviations,
security awareness of the staff).
o Five year live-cycle of the PFSA and PFSP (e.g., include an initial inspection
following the approval of a new PFSP).
74
Reg. 725/2004 article 9.1.
Page 52 of 73
7.10.1. Requirements for internal audits
Page 53 of 73
8. Port Security
Directive 2005/65/EC of 26 October 2005 on enhancing port security extends security to ports
as a whole, requiring additional administrative tasks to cover any ‘Port’ in the meaning of any
specified area of land and water, with boundaries defined by the Member State, in which the
port is situated, containing works and equipment designed to facilitate commercial maritime
transport operations75.
The objective of the Directive is to improve security coordination in areas of ports which are
not covered by the Regulation (EC) 725/2004 and also to ensure that the enhancement of port
security can support the security measures taken under the Regulation. Whilst the responsibility
for the implementation of security measures at port facility level essentially falls to the port
facility operator (in general a private entity), the appropriate security measures at port level are
the responsibility of the port authority and of those authorities which are responsible for
keeping public order, safety and security measures within the port area (in both, public and
operational areas).
The Directive shall apply to every port located in the territory of a Member State in which one
or more port facilities covered by an approved port facility security plan pursuant to Regulation
(EC) No 725/2004 is or are located.
A systemic approach should be applied since the port is considered as one complex entity
whose security or vulnerability depends on all its components. The study on the Technical
Aspects of Port Area Security (TAPS II)76 could be a useful instrument, in order to redefine
the port boundaries in terms of security, including the necessity to take due account of their
water side, sea approaches and/or anchorages when required. Moreover, this study focuses on
recommendations and methodologies for the efficient application of the Directive and the
technical means for its implementation.
Member States shall communicate to the Commission the text of national law that they adopt
to transpose the Directive.
• Member States shall designate a port security authority for each port covered by the
Directive;
• The terms "ports" and "port facilities" shall be treated as not interchangeable, in order
to avoid confusion as regards the respective requirements of Regulation (EC) No
725/2004 and of Directive 2005/65/EC.
75
Article 3.1, Dir.2005/65/EC)
76
Study based on the work undertaken by the Joint Research Centre (JRC) in direct support of the European
Commission services
Page 54 of 73
• A Port Security Authority may be designated to cover more than one port. However,
this should be clearly mentioned in the PSA and PSP, and this information should be
provided with all details.
• In order to facilitate the Port Security Authority –who might also be the “competent
authority for maritime security” provided for under Regulation (EC) No 725/2004
as designated by the Member State - or RSOs in drafting the PSAs and PSPs,
Member States should develop specific templates, as well as clear procedures and
arrangements necessary for the completion and review of such documents. Properly
structured templates should also facilitate the approval process.
77
MARSEC 5110-Rev1-Annex “Guidelines for the definition of port boundaries under Directive 2005/65/EC
on enhancing port security”
Page 55 of 73
8.1.1. Content and Approval
The Port Security Assessment shall include both a landside and waterside assessment of the
port and will comprise a risk assessment of all areas to establish potential threats to the port.
According to the specific circumstances, some ports (i.e. small ports or with a very restricted
water access) could have just one water zone but this should be the result of an assessment and
should be adequately documented. Busiest and bigger ports are generally provided with a
regulated water area (i.e. anchorages, river, canals, traffic separation scheme and other sea
areas allocated for lightening and ship-to-ship operations).
The base document to set the framework in Port Security needs to cover, as a minimum, the
detailed requirements laid down in Annex I of the Directive, in particular the identification of
important assets and infrastructures, possible threats - which may include all different types of
security incidents - likelihoods of their occurrences, countermeasures and weaknesses.
Not every shipyard78 – in particular those exclusively dedicated to new constructions - have to
comply with the provisions of Regulation (EC) 725/2004, but may be located adjacent to port
facilities and its activities may have an impact on the security of ships using such port and port
facilities and more globally on port security. Therefore, the port security assessment shall
consider such situation and, as a consequence, specific measures and procedures for the
shipyard facility area should be included in the PSP, as appropriate.
• PSAs, after considering all applicable threats and identifying all applicable
countermeasures, might still need to identify any residual weaknesses which must
feature later on in the plan;
• Both countermeasures and any actions intended to mitigate vulnerabilities identified in
the PSA are instrumental for the preparation of the related Port Security Plan.
• PSAs shall include the organisational aspects relevant to overall port security, including
the division of tasks between all the authorities and forces involved in the port security,
and also the existing rules and procedures
• Attention shall be paid to the relationship with other response/contingency plans, even
if not prepared or adopted by the competent or designated authorities for maritime
security;
• Assets and infrastructures located outside port facilities, but presenting an interest in
terms of port security, shall be properly assessed;
• PSAs shall take into account the assessments for port facilities within their boundaries
as carried out pursuant to Regulation (EC) No 725/200479.
78
See MARSEC 6609 for further details in different uses of the shipyards and the implications in their
compliance with the provisions of the Regulation.
79
Directive 2005/65/EC Article 6.1 and Annex I
Page 56 of 73
• The approvals of the PSAs are properly documented (letter of approval or a signed copy
of the Port Security Assessment)
It is recommended that:
• PSAs are conducted taking into account inputs from the Maritime Administration and
relevant public and private stakeholders involved in the port operations and security-
related activities;
• For the identification of the port personnel subject to background checks, the national
legislation of the Member State should be made suitable to allow such checks to take
place;
• PSAs increasingly consider the cybersecurity dimension, taking into account the
reliance on technology of interfaces between the port and port facilities and external
networks (i.e. logistics, intermodal services and systems, etc.);
• PSAs should take into account the PFSAs for the port facilities within the boundaries
of the port. There should be particular attention to how the vulnerabilities of individual
port facilities can affect the vulnerability of the whole port. For example, the presence
of dangerous goods has to be carefully considered throughout the port and not only in
individual PFSAs80.
The definition of the port boundaries depends on the typology of the port as well as on the type
of the terminals, infrastructure, installations, marinas, etc. Member States should take into
account the TAPS II Study and the MARSEC Document 5110-Rev1-Annex “Guidelines for
the definition of port boundaries”.
A good approach for the proper drafting of the port security assessment, including the definition
and final delineation of the port security boundaries, should be to start listing and filling data
in the 3 different categories of port areas that usually, but not necessarily, are within the
administrative port limits (as listed below) and are also mentioned in the conclusions of the
“Taps II study”, as follows:
• All port “operational areas” that basically are all port facilities within the port.
• All port “non-operational areas” that are basically zones/areas that are placed outside
the port facilities but have some operational access restriction (i.e.; essential port
services as water and electrical station supplies, emergency services, port enforcement
authorities buildings, VTS towers, pilots station, fishing docks areas, etc. In addition,
80
See the Study on the Technical Aspects of Port Area Security (TAPS II)
Page 57 of 73
open areas such as i.e. urban areas inside or in the close vicinity of the port such as port
shops or malls and marine related business, including yacht marinas and yacht clubs if
any should be included in this category
• Port infrastructures – Waterside approaches – Adjacent port areas are:
− Port Infrastructure as breakwaters, access channels and locks, port public
infrastructure as railways and roads, bridges, tunnels inside or in the close vicinity
of the port.
− From the waterside, defined anchorages, maritime lights and beacons, approaches
and waterways from seaward.
− Finally, the port adjacent areas that might have an impact on the port operations
activities. (i.e. shipyards, oil & gas terminals, factories or industrial
installations/warehouses located next to the seashore and in the vicinity of a port,
that due to their specific activities and locations might have an impact on the
security of that port.
In line with the requirements of Article 2.3 of Directive 2005/65/EC and in order to make an
educated decision on the definition and delineation of the port security boundaries of a port for
the purpose of this Directive, the competent national authorities in close cooperation with the
port security authority are required to properly assess and take due account at least of the
following key port security assessment elements and information:
• The inclusion of certain areas within the port security boundaries does not imply in a
systematic manner their protection or the application of access restrictions.
• The assessment shall take into account the variety of situations depending on the
implementation of each of the 3 security levels.
• Non-operational areas of the port, that basically have some access restrictions should
be included within the port boundaries (i.e. essential port services as water and electrical
station supplies, emergency services, VTS towers, pilot stations, fishing docks, etc., as
well open areas such as urban areas that are located inside or in the close vicinity of the
port).
It is recommended that:
• The identification of the port boundaries include a visualisation of the areas relevant to
port security categorised by port facilities covered by a PFSP and clustered objects, thus
Page 58 of 73
allowing also a view to the security competences of the different authorities (Police,
Border Guard, Customs, etc.) in those areas that are outside the administrative port
boundaries but within the port boundaries in terms of security.
• A written account should be drafted detailing how the port boundary has been
established, as well as maps, plans, nautical charts, drawings outlining the port
boundaries, including those of the port facilities within the port, that are integral part of
the Port security Assessment . The adjacent water approaches to the port must be
considered as well as the anchorages areas if already defined.
• Artificial separations between port security boundaries on the basis of economic
interests are not acceptable.
8.1.3. Conditions for a potential application of the provisions of Article 2.4 of the
Directive and consequences thereof.
According to article 2.2 of Directive 2005/65/EC, “the measures laid down in this Directive
shall apply to every port located in the territory of a Member State in which one or more port
facilities covered by an approved port facility security plan pursuant to Regulation (EC) No
725/2004 is or are situated.”
Article 2.4 of this Directive clearly states that “ Where the boundaries of a port facility within
the meaning of Regulation (EC) No 725/2004 have been defined by a Member State as
effectively covering the port, the relevant provisions of Regulation (EC) No 725/2004 shall take
precedence over those of this Directive “.
We are considering here the case where the port consists of ONLY one port facility serving
commercial maritime traffic, and this port facility is covered by a PFSP by virtue of Regulation
(EC) 725/2004.
In such case the port boundaries have been established as coinciding with the limits of this
single port facility as a conclusion of the Port Security Assessment carried out in accordance
with its Article 6 and Annex I of Directive 2005/65/EC. The reasoning for any such decision
must be clearly demonstrated and documented, on a case by case basis.
Should the port include other elements than a single port facility engaged in commercial traffic
and therefore covered by an approved port facility security plan , like facility/ies- moorages-
zones of anchorages for fishing or merchant vessels, for recreational boats like a marina, for
Page 59 of 73
public services (pilotage, firefighting, Customs, and other law enforcement vessels) etc.., then
the provisions of article 2.4 of Directive 2005/65/EC can no more apply.
As a result of such a definition of port boundaries in terms of security, the already existing and
approved PFSP effectively covers also the port: a separate PSP would not provide any
additional element of protection with regard to the port and the relevant provisions of the
Regulation with regard to the PFSP indeed takes precedence over the corresponding provisions
of the Directive concerning the PSP.
• A PSA shall be outlined in cases where the provisions of Article 2.4 are met, the PSA
shall clearly conclude that the boundaries of the port facility effectively cover the port
and that the relevant provisions of Regulation (EC) 725/2004 take precedence over
those of Directive 2005/65.
• In any case, even if the implementation of the provisions of article 2.4 of Directive
2005/65/EC is envisaged, a Port Security assessment remains mandatory, as well as its
periodical revision at least every 5 years;
• PSAs shall be reviewed following the approval of any new Port Facility Security
Assessments within the port81.
It is recommended that:
81
, Dir.2005/65/EC Art.6.1
Page 60 of 73
• The revision of the PSA should start well in advance (i.e.4 to 6 months) before the
expiration date of the current PSA. This would avoid that the PSA expires at the 5
years anniversary date without concluding the revision of new PSA and its formal
approval.
• Member States request that the concerned Port Authority/ Designated Authority/
RSO conduct an annual update of the PSA. This annual update can allow the swift
inclusion in the PSA of the latest port physical and structural modifications (if any),
and to update the list of port facilities or the PFSO contacts if required. A similar
approach can then be put in place for PSPs.
For some areas, access control or security requirements should enter into force only at security
level 2 or 3. Many areas can be totally open according to the port access requirements or port
layout as being urban areas or public infrastructures and therefore they may not need to be
closed or controlled at security level 1or even 2.
Port Security Plans shall be approved by the Member State concerned before their
implementation.
82
, Dir. 2005/65/EC Art.5.3
Page 61 of 73
It is important to recall that:
It is recommended that:
• PSPs shall be approved by the Member State concerned within a reasonable timeframe
after the approval of the Port Security Assessments (maximum 3 months).
• PSPs describe and detail the working instructions and/or security operational
procedures (SOPs) necessary for the correct implementation of the security activities in
the ports. In the case where such elements are not integrated in the PSP as approved, it
has to be ensured that related references are made in the Port Security Plan;
• If a private company is assigned to perform specific security duties in the port (i.e. port
security guards), a related service agreement shall detail the tasks to be performed in
relation with the parts of the PSP that they are supposed to fulfil.
• In order to reduce the administrative workload, when 2 or more ports lie in the same
geographical area, and their separation is not physical but it can be considered purely
artificial, a unique Port Authority can be made responsible for those ports when public
infrastructures and services are common. In such case, a single and combined PSA and
PSP should be drafted and approved as an overarching document encompassing all the
requirements of Annexes I and II of the Directive
It is recommended that:
• PSPs should include a Record of changes in which each amendment to the plan should
be registered. PSPs should be modified whenever required at any time during the five
years of validity. In any case modifications and the required reapproval should be
conducted when significant changes occur in a port, such as there are new port facility
operators, major port works that have an impact on the security of the port or when for
example new policies and procedures regarding access control, monitoring of port areas
or changes of port road traffic flows are taking place.
• The PSA provides a static picture of the security of the port at a given time. The PSP
must be based on the PSA in such a way that the measures determined in the PSP
address the issues found in that picture. Considering this, there should be a timely link
between the PSA and the subsequent PSP. Consequently, it would be advisable that the
time span between the adoption of a PSA and the drafting or revision of the PSP does
not exceed 6 months
The review of a PSP should start well in advance (i.e.4 to 6 months) before the expiration of
the current PSP. This would avoid that the PSP expires at the 5 years anniversary date without
concluding the revision of new PSP and its formal approval
• A close cooperation between the PSO and the PFSOs shall be ensured. Periodical
coordination meetings should be organised to discuss the security related issues in the
port and their implementation in accordance with the provisions of the Port Security
Plan.
• All port security incidents should also be reported to the port security officer and duly
recorded.
• The PSO should be nominated (letter of nomination or other written evidence) by the
competent authority for maritime security of the Member State.
Page 63 of 73
It is recommended that:
• A PSOs might be approved for more than one port, however the approval process by
the Member State should also take into account the practicality of this appointment (e.g.
geographical location, workload, typology, …).
• Unless the provisions of article 2.4 of Directive 2005/65/EC apply, the appointment of
a PSO also as PFSO of port facilities comprised in same port might be in compliance
with the legislation however, it is not recommended due to potential lack of efficiency
due to the work overload if appointed for more than one PF.
• Any PSO is provided with the necessary authority /powers in order to fulfil the tasks
provided for to this function by Directive 2005/65/EC.
Member States should define the procedures aimed at training, education and familiarization
for PSOs depending on their own internal organisations and rules.
Appropriate training of personnel working in the port should maximize personal awareness of
suspicious behaviour, incidents, etc.
Various types of training exercises which may involve participation of port facility security
officers, in conjunction with the relevant authorities of Member States, company security
officers, or ship security officers, if available, to check that the PSP remains current and
Page 64 of 73
achievable by identifying changes that may impact on any critical response, resource or
consequence factor.
• Training requirements described in the PSP shall ensure that the port security personnel
are proficient in all assigned security duties, focused on particular roles and tasks in the
port or at external facilities serving the port. Large-scale exercises are crucial for
training and testing the coordination between the various components of the PSP;
• Exercises shall be carried out at least once each calendar year with no more than 18
months elapsing between the training exercises;
• The Port Security Authority considers the necessity to diversify the types of exercise in
order to properly test communication, coordination, resource availability and response
in accordance with the elements contained in the PSP, avoiding the recourse to
repetitive and / or not sufficiently realistic scenarios
It is recommended that:
• Exercises are evaluated in order to verify the effectiveness and functionality of the
PSPs. After the completion of each exercise, a debriefing should be organised with all
participants in order to evaluate the overall and individual performance, streamline
communication and organisation, weaknesses and possible improvement. The minutes
of such meetings should be retained and recorded;
• When carried out in combination with other exercises held by other authorities, it has
to be ensured that the structure of the document, when prepared by said authorities,
provides also the engagement of the security related issues contained in the PSP,
without giving effect to scenarios in which the element of maritime security is poorly
developed;
• Written evidence of the participation of the port security personnel involved in the
exercises should be retained and recorded in order to attest their activity in the training;
Page 65 of 73
• Although each port is different, and each situation demands its own particular approach,
Member States, through their competent authorities, should encourage, for obtaining
guidance and inspiration, to consult the “Exercitium - European handbook of maritime
security exercises and drills”
• Cybersecurity drills and exercises are considered as part of the security exercise and
training programme.
8.6. Records
Records of the security activities outlined in the PSP are considered essential to provide
evidence of compliance with the requirements of the Directive.
The inspection activity related to the application of the measures and procedures established in
the Port Security Plans is the cornerstone on which port security founds. Member States shall
establish how to ensure and test its effectiveness.
• Member States shall set a minimum number of inspections in each port to be undertaken
for the supervision of the implementation of Port Security Plans within their five-year
validity period. The services of the European Commission recommend inspections at
least once every year.
• Whenever practical, the above-mentioned port security Inspections should be combined
at the same time with security inspections in the port facilities in order to assess that
security measures taken pursuant Regulation (EC) 725/2004 benefit from enhanced port
security measure detailed in the PSP.
83
Art.7.6 and 13, Dir.2005/65/EC
Page 66 of 73
It is recommended that:
• An information report on the results of the inspection should be sent by the competent
authorities/designated authorities to the National Administration responsible to monitor
the maritime security within an established time frame from the date of the activity.
Such report should contain the following information:
− Description of the activities carried out;
− List of observations, accompanied by the regulatory reference;
− Actions taken for any non-compliance identified, impositions and time frames for
the rectification and conclusion of pending processes.
• Such reporting will allow the National Administration of the Member State responsible
for the maritime security to adequately monitor the state of play of the ports under their
jurisdiction, providing instructions and take appropriate actions.
• Member States are encouraged to make the best use of the checklist developed by the
EC services (adopted with MARSEC doc 7909), fully or partially, depending on their
needs, and eventually to adapt them by integrating any specific requirements contained
in their applicable national maritime security legislation and rules.
Such checklist should facilitate inspections by the authorities of the compliance with
the applicable legislation by the ports and, at the same time, it could be used as a guide
for self-verifications by the operators
A RSO which has made a port security assessment or review of such an assessment for a port
is not allowed to establish or review the port security plan for the same port.
However, a RSO which has made a port security assessment or port security plan is allowed to
draft port facility security assessments and subsequently the port facility security plans of port
facilities within the same port. In fact, there is no contradiction between the two legal
instruments (Port Directive 65/2005 and Regulation (EC) 725/2004) in terms of using RSOs
for different security related tasks/ drafting of documents of Ports or Port Facilities.
As follows some case scenarios to help to understand in which cases the same RSO can be used
for providing and undertaking certain port /port facility security related activities:
1. If one RSO (n°1) drafts the PSA for the Port Directive of a given port under Art.2.4
future arrangements and another RSO (n°2) drafts the PFSA for the single port
facility in that port, could RSO (n°1) draft the PFSP of that single port facility? Yes,
it possible.
Page 67 of 73
2. One RSO made the port assessment under article 2.4, the same RSO might conduct
the PFSA of the port facility under Regulation (EC) 725/2004 and also the same
RSO can draft subsequently the PFSP of the same port facility.
3. One port has several port facilities. The port facility security plans are drafted by
different RSOs. Any of those RSOs might draft the required PSA under the Port
Directive.
4. The same case scenario as above. One RSO might draft the PSP of a given port,
despite the fact that the RSO has drafted the PFSA and subsequently the PFSP of a
port facility of that port.
• Security consultants cannot draw up port security assessments and port security plans
if not appointed by the Member State as RSOs fulfilling the conditions set out in Annex
IV.
It is recommended that:
• The appointments by the Member States are in the form of an agreement between the
parties, including the details of the tasks to be delegated to the RSO, i.e. the scope of
carrying out Port Security Assessments and/or Plans, reporting procedures, etc.
• The general conditions and terms of an agreement should be clearly provided for in the
written document, if required, in view of allowing the parties to understand and perform
their obligations and responsibilities. Access to the internal instructions, circulars and
guidelines for port security of the National Maritime Administration should be made
available to the RSO concerned. Imprecise clauses of the agreement may result into a
poor performance of the agreement by the parties.
Page 68 of 73
9. Enforcement of penalties
As for Regulation 725/2004, the implementation of maritime security in ports needs a national
legislative and jurisdictional support.
• Ensure that effective, proportionate and dissuasive penalties are introduced for
infringements of the national provisions adopted pursuant to the Directive. Their
national legislation shall include an enforcement regime accompanied by meaningful
penalties (Article 17).
It is recommended that:
• The national competent authorities responsible for the enforcement of Article 17 of the
Directive clearly assign this activity to the officers in charge of exercising it;
• Irrespective of the ultimate sanctions available to a national authority of the introduced
penalties, Member States take a stepped approach when seeking to ensure that an
identified security deficiency in the port is corrected. In case there is a need for a more
robust approach, that might warrant officers in charge of conformity check to take
action in their capacity, such officers should act in an effective, proportionate and
dissuasive way for which they need to be properly empowered and trained.
84
Reg. 725/2004 Annex I reg. 13
Page 69 of 73
For easy reference, Table 1 below indicates the communication requirements for Member
States.
Table 1. Communication of Information to the EC
• Member States are obliged to communicate all information required by SOLAS XI-2
to the IMO (GISIS database) and to keep it updated continuously as necessary86.
It is recommended that:
85
Communication of the lists of exempted companies and ships under the provisions of Article 7 (4) of
Regulation (EC) No 725/2004: Table under Doc. 4107 Rev. should be used as agreed at MARSEC-42
86
Reg. 725/2004 Annex I reg. 13 and MSC.1/Circ.1603
Page 70 of 73
11. Monitoring Reports
Member States are required to provide to the Commission annual reports of their activity in
respect of maritime security, including, inter alia, data on the inspections they carried out, the
number of officers available. Member States should put in place a system to collect this data87.
It is recommended that:
• Member States, when putting in place a system for collecting data related to the
Monitoring Reports, ensure that said system be as elaborated as possible to give
Member States a view as comprehensive as possible of their maritime security activity.
This could possibly include the development of performance indicators that could help
to better assess said activity.
87
Reg. 725/2004 9.4, minutes of the 17 th MARSEC meeting point 8.1 and MARSEC doc 1707
Page 71 of 73
Appendix A. References
Page 72 of 73
14 A.917(22), as amended by IMO Res. A.956(23): Guidelines for the on- Non-mandatory
board operational use of shipborne Automatic Identification Systems
(AIS).
15 A.959 (23) Format and guidelines for the maintenance of the continuous
synopsis record (CSR) as amended by MSC.198(80)
16 A.1047 (27) Principles of minimum safe manning Non-mandatory
17 A.1070(28) IMO Instruments Implementation Code (III CODE)
18 A.1117(30) on IMO ship number scheme; Non-mandatory
19 MSC.136 (76) Performance Standards of Ship Security Alert System Non-mandatory
20 MSC.147 (77) Adoption of the revised performance standards for a ship Non-mandatory
security alert system
21 MSC.159(78) on Interim guidance on control and compliance measures to Non-mandatory
enhance maritime security.
22 MSC.349 (92) The Code for Recognized Organizations (RO Code)
23 MSC/Circ. 1072 Guidance on provision of ship security alert systems Non-mandatory
24 MSC/Circ. 1074 Measures to enhance maritime security: Interim guidelines for Non-mandatory
the authorization of Recognized Security Organizations acting on behalf of the
Administration and/or Designated Authority of a Contracting Government
25 MSC/Circ. 1109/Rev.1 False security alerts and distress/security double alerts Non-mandatory
26 MSC/Circ.1111 of 7 June 2004: Guidance relating to the implementation of Non-mandatory
SOLAS Chapter XI-2 AND the ISPS Code
27 MSC/Circ.1113: Guidance to port State control officers on the non-security Non-mandatory
related elements of the 2002 SOLAS amendments
28 MSC/Circ.1130: Guidance to masters, companies and duly authorised officers Non-mandatory
on the requirements relating to the submission of security-related information
prior to the entry of a ship into port
29 MSC/Circ.1155 Guidance on the message priority and testing of ship security Non-mandatory
alert systems
30 MSC/Circ.1190 Guidance on the provision of information for identifying ships Non-mandatory
when transmitting ship security alerts
31 MSC.1/Circ.1192 Guidance on voluntary self-assessment by SOLAS Non-mandatory
Contracting Governments and port facilities
32 MSC.1/Circ.1193 Guidance on voluntary self-assessment by Administrations Non-mandatory
and for ship security
33 MSC-FAL.1/Circ. 3 Guidelines on Maritime Cyber Risk Management Non-mandatory
34 FAL 5./Circ. 39/Rev.2 Non-mandatory
Page 73 of 73