International Ship and Port Facility Security Code (ISPS Code)
The ISPS Code is a set of measures to enhance the security of ships and port facilities. It was developed in response of the perceived threats to ships and port facilities after the 9/11 attacks (World Trade Centre US).
The ISPS Code is part of the Safety of Life at Sea Convention (SOLAS) and compliance is mandatory for the 148 Contracting Parties to SOLAS.The ISPS Code was adopted by one of the resolutions that was adopted on 12 December 2002 by the Conference of Contracting Governments to the SOLAS, 1974 (London, 9 to 13 December 2002).
Another resolution includes the necessary amendments to chapters V and XI of SOLAS that mandates compliance with the Code on 1 July 2004. The existing chapter XI of SOLAS was amended and re-identified as chapter XI-1. A new chapter XI-2 was implemented based on special measures to enhance maritime security.
Part A of the ISPS Code contains the mandatory requirements regarding the amended provisions of chapter XI-2 of SOLAS , 1974; Part B provides guidance regarding these amended provisions.
Security Levels in ISPS Code
In setting the security level Contracting Governments (CG) should take account of general and specific threat information. CG should set the security level applying to ships and port facilities at one of three levels:
Level 1
|
Level 2 |
Level 3 |
NORMAL
The level at which the ship or port facility normally operates.
Security level 1 means the level for which minimum appropriate security measures shall be maintained at all times
|
HEIGHTENED
The level applying for as long as there is a heightened risk of a security incident.
Security level 2 means the level for which appropriate additional protective security measures shall be maintained for a period of time as result of heightened risk of a security incident.
|
IMMINENT
The level applying for a period of time when there is the probable or imminent risk of a security incident. Security level 3 means the level for which further specific protective security measures shall be maintained for a limited period of time when a security incident is probable or imminent, although it may not be possible to identify the specific target.
|