欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ASTM E2842-2014 Standard Guide for Credentialing for Access to an Incident or Event Site《进入事故或者事件地点资质鉴定的标准指南》.pdf

    • 资源ID:531982       资源大小:957.58KB        全文页数:17页
    • 资源格式: PDF        下载积分:5000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要5000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ASTM E2842-2014 Standard Guide for Credentialing for Access to an Incident or Event Site《进入事故或者事件地点资质鉴定的标准指南》.pdf

    1、Designation: E2842 14Standard Guide forCredentialing for Access to an Incident or Event Site1This standard is issued under the fixed designation E2842; the number immediately following the designation indicates the year oforiginal adoption or, in the case of revision, the year of last revision. A nu

    2、mber in parentheses indicates the year of last reapproval. Asuperscript epsilon () indicates an editorial change since the last revision or reapproval.INTRODUCTIONThe purpose of the Standard Guide for Credentialing for Access to an Incident or Event Site(hereafter the guide) is to assist in the cred

    3、entialing of personnel and the associated activities, whichallows for access to an incident2or event site by State, Tribal, local, private sector, andnongovernmental organizations (NGOs). The credentials allowing scene access should be a verifica-tion of identity and (by the authority having jurisdi

    4、ction AHJ) that the appropriate training,experience, and qualifications are in place. This guide does not provide any specifications regardingqualifications or training required for said credentials. However, it is recognized that credentialing isa part of resource management and that a credentialed

    5、 individual is a specified resource.1. Scope1.1 The focus of this guide is on the development ofguidelines for credentialing for access. The guide addresses thefundamental terms, criteria, references, definitions, and processmodel for implementation of credentialing or a credentialingprogram.1.2 Thi

    6、s guide explains and identifies actions and processesthat can provide the foundation for consistent use and interop-erability of credentialing for all entities.1.3 This guide describes the activities involved in creating acredentialing framework, which may include a physical badge;however, it does n

    7、ot define the knowledge, skills, or abilitiesrequired to gain access to a site or event. This guide does notaddress a requirement for a physical badge as a prerequisite fora credential. A badge may be an accepted credential acrossjurisdictional lines and other credentials may be issues by theAHJ at

    8、the scene.1.4 This guide reinforces the importance of controllingaccess to a site by individuals with the proper identification,qualification, and authorization, which supports effective man-agement of deployed resources.1.5 This guide relies on the existing rules, regulations, laws,and policies of

    9、the AHJ. Regulations identifying personal andprivate information as public record may differ from a respond-ers home jurisdiction.1.6 This guide utilizes the principles of the Data Manage-ment Association Guide to the Data Management Body ofKnowledge (DAMA-DMBOK) in order to effectively controldata

    10、and information assets and does not prescribe the use oftechnology-based solutions.1.7 This standard does not purport to address all of thesafety concerns, if any, associated with its use. It is theresponsibility of the user of this standard to establish appro-priate safety and health practices and

    11、determine the applica-bility of regulatory limitations prior to use.2. Referenced Documents2.1 DAMA International:3The DAMA Guide to the Data Management Body ofKnowledge 20092.2 Federal Emergency Management Agency:Guideline for the Credentialing of Personnel July 2011National Response Framework4Janu

    12、ary 2008NIMS Guide 00025National Credentialing Definition andCriteria, March 27, 2007.NIMS Guideline for the Credentialing of Personnel July2011.2.3 Department of Homeland Security:NIMS6December, 2008Homeland Security Presidential Directive (HSPD)1This guide is under the jurisdiction of ASTM Committ

    13、ee E54 on HomelandSecurity Applications and is the direct responsibility of Subcommittee E54.02 onEmergency Preparedness, Training, and Procedures.Current edition approved March 1, 2014. Published March 2014. DOI: 10.1520/E2842-14.2As defined in National Incident Management System (NIMS) 2008.3Avail

    14、able from DAMA international, http:/www.dama.org/i4a/pages/Index.cfm?pageid=3364.4Available from http:/www.fema.gov/pdf/emergency/nrf/nrf-core.pdf.5Available from http:/www.fema.gov/pdf/emergency/nims/ng_0002.pdf.6Available from http:/www.fema.gov/pdf/emergency/nims/NIMS_core.pdf.Copyright ASTM Inte

    15、rnational, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United States1127Policy for a Common Identification Standard forFederal Employees and Contractors, August 27, 2004.2.4 NIST Standard:8FIPS 201 Personal Identification Verification (PIV) of Fed-eral Employees and Contrac

    16、tors and Associated SpecialPublications (SPs), March 20112.5 NFPA Standard:9NFPA 1600 Standard on Disaster/Emergency Managementand Business Continuity Programs, NFPA 2007.NOTE 1Further information on these subjects can be found inAppendix X1.3. Terminology3.1 The following definitions are intended f

    17、or use in thisguide.3.2 Definitions:3.2.1 affliationthe association of a non-credentialed indi-vidual or group of individuals under the supervision of anAHJ-compliant credentialed responder for the purpose ofgaining access to accomplish a specific incident or eventmission.3.2.2 applicantan individua

    18、l applying for a credential.3.2.3 attributea qualification, certification, authorization,or privilege of the credential holder.3.2.4 Authority Having Jurisdiction (AHJ)theorganization, office, or individual responsible for enforcing therequirements of a code or standard or approving equipment,materi

    19、als, an installation, or a procedure. (NFPA 1600)3.2.5 credentiala credential is an attestation of theidentity, qualification, and authorization of an individual toallow access to an incident or event site.3.2.6 credentialingthe administrative process for validat-ing the qualifications of personnel

    20、and assessing theirbackground, for authorization and permitting/granting accessto an incident (site or event). (NIMS Guide 0002)3.2.7 eventa planned occurrence or large-scale gatheringthat requires planning, coordination, and support from theemergency management community, such as a National Spe-cia

    21、l Security Event (NSSE) or the Superbowl.3.2.8 entitya governmental agency or jurisdiction, privateor public company, partnership, nonprofit organization, orother organization that has disaster/emergency managementand continuity of operations responsibilities. (NFPA 1600)3.2.9 incidentan occurrence,

    22、 natural or man-made, thatrequires a response to protect life or property. (NIMS 2008)3.2.10 issuerthe organization that is issuing a credential toan applicant. Typically, this is an organization for which theapplicant is working. (FIPS 201)3.2.11 National Incident Management System (NIMS)aset of pr

    23、inciples that provides a systematic, proactive approachguiding government agencies at all levels, the private sector,and NGOs to work seamlessly to prepare for, prevent, respondto, recover from, and mitigate the effects of incidents, regard-less of cause, size, location, or complexity, in order to r

    24、educethe loss of life or property and harm to the environment.(NIMS 2008)3.2.12 Non-Governmental Organization (NGO)an entitywith an association that is based on the interests of itsmembers, individuals, or institutions. It is not created bygovernment, but it may work cooperatively with government.Su

    25、ch organizations serve a public purpose, not a privatebenefit. Examples of NGOs include faith-based charity orga-nizations or organizations such as the American Red Cross.(NIMS 2008, NFR)3.2.13 scenethe geographical area(s) of an incident withboundaries and access points. There may be multiple level

    26、s ofa scene that may require multiple access points based uponsecurity, risk, or other factors as defined by the AHJ wheredifferent levels of credentialing may be assigned.3.2.14 sponsorindividual or entity endorsing the applicantto receive the credentials.4. Significance and Use4.1 There is current

    27、ly no way to ensure consistency amongall entities across the nation for access to an incident or eventscene. This guide is intended to enable consistency in creden-tials with respect to verification of identity, qualifications, anddeployment authorization (NIMS 0002).4.2 This guide is intended to be

    28、 used by any entity thatmanages and controls access to an incident scene to facilitateinteroperability and ensure consistency.5. A Framework for the Credentialing of Personnel5.1 The framework is built upon credentialing principlesand elements with an approach that should be established as theinitia

    29、l steps of credentialing activities. The following principlesare recommended for consideration:5.1.1 Standards BasedConsistent with applicable nationalstandards or industry-accepted best practices.5.1.2 InteroperabilityAbility of systems, personnel, (stan-dards) and equipment to provide and receive

    30、functionality,data, information, or services, or combinations thereof, to andfrom other systems, personnel, and equipment among bothpublic and private agencies, departments, and other organiza-tions in a manner enabling them to operate effectively together.(NIMS 2008)5.1.3 TrustConfidence in the ide

    31、ntity and qualifications ofthe individual, and confidence in the manner in which thecredentials are validated at the scene.5.1.4 Physical and Cyber SecurityUse of best practices toprotect the physical credential and associated data. Refer to theData Security Management section of Appendix X3 for mor

    32、einformation.7Available from U.S. Government Printing Office Superintendent of Documents,732 N. Capitol St., NW, Mail Stop: SDE, Washington, DC 20401, http:/www.access.gpo.gov.8Available from National Institute of Standards and Technology (NIST), 100Bureau Dr., Stop 1070, Gaithersburg, MD 20899-1070

    33、, http:/www.nist.gov.9Available from National Fire Protection Association (NFPA), 1 BatterymarchPark, Quincy, MA 02169-7471, http:/www.nfpa.org/assets/files/dpf/nfpa1600.pdfE2842 1425.1.5 PrivacyTo protect an individuals private informa-tion in accordance with applicable laws; for example, name,soci

    34、al security number, biometric records, medical records, ortribal enrollment.5.1.6 TransparencyPolicies are implemented in an openand understandable manner.5.1.7 Sustainability and PortabilityCapacity to maintaincredentialing activities and to remain effective when the AHJor the overall authority, or

    35、 both, changes.5.2 Credentialing Program ElementsThe following cre-dentialing program elements are recommended building blocksfor a credentialing framework: planning, funding,implementation, agreements, information management, train-ing and exercises, and audit process. For more information,refer to

    36、 Appendix X4 Sample Credentialing Plan Template.5.2.1 PlanningPlanning should consider the jurisdictionsstrategy for credentialing as well as development of plans toaddress goals, objectives, and business rules. Planning shouldalso establish roles and responsibilities and address the imple-mentation

    37、 process and supporting procedures.5.2.2 Business RulesThe AHJ should detail how creden-tials will be granted, including to whom and through whatauthorization process. Rules must include a provision and planto ensure private information is protected through the adher-ence to privacy laws and policie

    38、s, information management,and protection processes. Business rules should include aprocess for verification of a persons identification, verificationof attributes, and deployment authorization. Business rulesshould also be in place for access permissions (from leastsecure to most secure) at incident

    39、 scenes requiring varyingsecurity perimeters. Additionally, rules should include a pro-cess for appeal and reciprocity across jurisdictional boundaries.5.2.3 Credential ElementsCredentials can be anythingused to identify that a persons identity, qualifications, andauthorization have been validated,

    40、for example badges, armbands, vest, clothing, index cards, or any combination ofmechanisms. The following is a list of elements that may beconsidered to develop to verify identification, qualification, andauthorization information:(1) Photograph(2) Name (Last, First, Middle Initial)(3) Organization

    41、Represented(4) Employee Affiliation(5) Organizational Affiliation(6) Expiration Date(7) Area for Circuit Chip/Contact Chip/Smart Chip(8) Date Issued(9) Header (such as State, local, Tribal, private sector, orNGO)(10) Footer (such as Federal Emergency Response Official(FERO) Designation)(11) Agency S

    42、eal Watermark(12) Agency Card Serial Number(13) Issuer Identification(14) Qualification Information(15) Authorization Information (to deploy)(16) Signature(17) Agency-specific Text Area(18) Rank(19) PDF Bar Code(20) Color Coding for Employee Affiliation(21) Photo Border for Employee Affiliation(22)

    43、Agency-specific Data(23) Magnetic Strip(24) Return to “If Lost” Language(25) Physical Characteristics of Cardholder(26) Additional Language for Emergency Responder Offi-cials(27) Standard Section 499, Title 18 Language(28) Linear 3 of 9 Bar Code(29) Agency-specific TextDepending upon the credentiali

    44、ng solution based on theentitys credentialing plan, there may be specific requirementsfor data or placement. Refer to Appendix X2 for examplecredentials.5.2.4 DistributionThis should include ways of maintain-ing control of credentials while distributing to the appropriateparties or responders. This

    45、process shall also account for lost,stolen, or revoked credentials, or combinations thereof.5.2.5 Timelines/SchedulesThese elements should detailany phased approach for implementation or maintenance of thecredentialing program.5.2.6 Needs AssessmentThe needs assessment identifiesand validates the ta

    46、rget audience and requirements for thecredentialing plan and process, including identification of thosewith a potential need for access, numbers and types ofindividuals in a given skill area, and the status of extantcredentials in that area.5.2.7 Plans and ProceduresThe credentialing plan shouldincl

    47、ude:5.2.7.1 PurposeDescribe the reasoning for the develop-ment of a credentialing plan.5.2.7.2 ScopeApplicability of the plan, the items forinclusion, and the intended audience.5.2.7.3 DefinitionsSpecific definitions for key words usedin the plan.5.2.7.4 AuthoritiesApplicable legislation, regulation

    48、s,directives, or policies, or combinations thereof, to create andimplement the credentialing plan. For more detailed informa-tion about data protection, see Appendix X3.5.2.7.5 GovernancePlanning, supervision, and control ofthe credentialing process.5.2.7.6 Credentialing PrinciplesState the over-arc

    49、hingguidance for the approach of the AHJ (see above).5.2.7.7 ApproachA high-level description of how theentity structures its plan to credential different types andnumbers of individuals, for example, emergency responders,other government agencies, elected officials, tribal leaders,media, and volunteers. This approach should be scalable torapidly expand or contract to meet incident or event require-ments.5.2.7.8 Implementation ProcessThe activities included inthe credentialing implementation process.5.2.7.9 DocumentationRecords ke


    注意事项

    本文(ASTM E2842-2014 Standard Guide for Credentialing for Access to an Incident or Event Site《进入事故或者事件地点资质鉴定的标准指南》.pdf)为本站会员(赵齐羽)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开