.
Add title here
Download
Mega Nav Image
The Social Way Toolkit
Find out more
Add title here
Download
Mega Nav Image
Main Content

Task 10 – Monitor and evaluate

Contents in this section:

CHECK

The CHECK stage focuses on monitoring and evaluation. 

Task 10 – Monitor and evaluate

Security-related risks and impacts and the effectiveness of controls should be monitored and evaluated. Table 4E.5 provides a security-related example. More information on Monitoring and Evaluation can be found in Section 1 on Governance.

TABLE 4E.5 Monitoring and evaluation of security-related impacts

Potential impact Controls Target Control owner Timeline Inputs Implementation check Outputs Outcomes Effectiveness

Describe the potential impact

List the Controls

What are we trying to achieve?

List function responsible for the Control

Date the Control should start and be competed

Human and financial resources needed to implement the Control

How do we know that the controls are being implemented?

Outputs produced

Changes that have occurred as a result of Control -

Include sources of verification

Value and success in managing the impact – Include sources of verification

Example: Disrespectful behaviour towards local community members by private security providers arising from cultural differences

Cultural training for private security staff

0 grievances and incidents related to disrespectful behaviour towards local community members by private security staff due to cultural differences

Positive feedback from community members about private security providers

Social Performance

Start date, end date

Spend on consultant to deliver training.

Time spent in training

Training attendance logs show attendance of all private security staff

Training materials developed and specifically address the issue

X number of security staff aware of cultural sensitivities

Private security staff sensitive to cultural differences and expected behaviours.

Verification:

  • Check through discussion with security staff/ direct observation

No incidents or grievances related to disrespectful behaviour of private security providers

Communities expressing satisfaction with security arrangements.

Verification:

  • Number of incidents/grievances relating to disrespectful behaviour of private security providers before and after control implementation
  • Perception survey (before and after)

Awareness raising of contractual language about expected behaviours

Social Performance

Start date, end date

Time spend in awareness raising sessions.

Communications delivered about expected behaviours e.g. email, newsletter, poster, tool box talks

Awareness raising sessions attendance logs show attendance of all private security staff

Awareness raising materials specifically address contractual requirements related to expected behaviours

Content and distribution of communication materials (e.g. % acknowledgement that email is read, number of toolbox talks held)

X number of security staff aware of contractual requirements around expected behaviour

Example:

Excessive force used by public security providers against protesters during protest against the site

Formally agree guidelines on intervention and use of force with public security forces

0 incidents or grievances related to excessive use of force used by public security providers against protesters during protests against the site

Security

Start date, end date

Staff time on discussions and drafting guidelines

Guidelines are signed off

Formal or informal agreement

Awareness amongst public security providers of rules of engagement.

Understanding of public security of international standards and Anglo American’s commitments by public security forces

Verification:

  • Check through engagement and discussion with public security personnel

Appropriate interventions occur when public security are involved.

0 incidents or grievances related to excessive use of force used by public security providers against protesters during protests against the site

Verification:

  • Number of incidents and grievances on this matter before and after implementation of control
  • Direct observations in the event of protests involving public security

Support training of public security forces on VPs

Security

Start date, end date

Spend on consultant to deliver training

Spend on logistics and venue

Staff time to organise training

Training attendance logs show attendance of all public security staff involved with providing site-related security

Training materials specifically address the issue

X number of public security aware of VPs requirements

4E.2 Guidance | Check
4.Impact and risk prevention and management  |  4E Security management and the voluntary principles on security and human rights (VPSHR)  |  4E.2 Guidance  |  Check