Security Policy

Background

Over roughly the last twenty years, security issues of all kinds (from daily crime to terrorism) have grown in importance to the point that railway companies have had to take account of this new factor and to integrate it as a key element to develop the rail business.

To face these threats, rail companies have had to organise themselves and implement real security strategies in partnership with national authorities.

Description

The security policy needs to be supported by 3 complementary priorities:

  • Technologies: various technologic answers can be implemented to prevent, protect and mitigate the consequences of security threats.
  • Human Factors: beyond technologies, rail security policy needs to be supported by the human factors policy covering both staff training and the involvement of passengers in their own security.
  • Procedures and regulation: It’s very important to ensure a coherent whole, in particular to guarantee privacy protection and to be in line with human rights.

UIC permanent working groups

A true security strategy can be built around these 3 principles. The challenge is to combine the technology-based response to what can be done in terms of human resources, organization and procedures. UIC created in 2006 the security platform whose role is to build on and take into account the work done to date and above all ensure that a security-based approach is at the heart of company policy in each of various departments, whether passenger, freight or infrastructure.

Within the security platform 3 permanent working groups are addressing this priority:

  • Human Factors
  • New Technologies
  • Strategy, procedure and regulation

European Texts on Security Policy

Last updated European regulations and texts that can have an impact on rail security are published in this section. It’s important to underline that there is no mandatory European/International rail security legislation. At this stage, exchange of best practice and bilateral agreement are the solutions agreed to ensure the security chain in the context of cross borders.

UIC Publications

 All free publications

Keywords