Describe the potential impact
|
List the Controls
|
What are we trying to achieve?
|
List function responsible for the Control
|
Date the Control should start and be competed
|
Human and financial resources needed to implement the Control
|
How do we know that the controls are being implemented?
|
Outputs produced
|
Changes that have occurred as a result of Control -
Include sources of verification
|
Value and success in managing the impact – Include sources of verification
|
Example: Disrespectful behaviour towards local community members by private security providers arising from cultural differences
|
Cultural training for private security staff
|
0 grievances and incidents related to disrespectful behaviour towards local community members by private security staff due to cultural differences
Positive feedback from community members about private security providers
|
Social Performance
|
Start date, end date
|
Spend on consultant to deliver training.
Time spent in training
|
Training attendance logs show attendance of all private security staff
Training materials developed and specifically address the issue
|
X number of security staff aware of cultural sensitivities
|
Private security staff sensitive to cultural differences and expected behaviours.
Verification:
- Check through discussion with security staff/ direct observation
|
No incidents or grievances related to disrespectful behaviour of private security providers
Communities expressing satisfaction with security arrangements.
Verification:
- Number of incidents/grievances relating to disrespectful behaviour of private security providers before and after control implementation
- Perception survey (before and after)
|
Awareness raising of contractual language about expected behaviours
|
Social Performance
|
Start date, end date
|
Time spend in awareness raising sessions.
Communications delivered about expected behaviours e.g. email, newsletter, poster, tool box talks
|
Awareness raising sessions attendance logs show attendance of all private security staff
Awareness raising materials specifically address contractual requirements related to expected behaviours
Content and distribution of communication materials (e.g. % acknowledgement that email is read, number of toolbox talks held)
|
X number of security staff aware of contractual requirements around expected behaviour
|
Example:
Excessive force used by public security providers against protesters during protest against the site
|
Formally agree guidelines on intervention and use of force with public security forces
|
0 incidents or grievances related to excessive use of force used by public security providers against protesters during protests against the site
|
Security
|
Start date, end date
|
Staff time on discussions and drafting guidelines
|
Guidelines are signed off
|
Formal or informal agreement
|
Awareness amongst public security providers of rules of engagement.
Understanding of public security of international standards and Anglo American’s commitments by public security forces
Verification:
- Check through engagement and discussion with public security personnel
|
Appropriate interventions occur when public security are involved.
0 incidents or grievances related to excessive use of force used by public security providers against protesters during protests against the site
Verification:
- Number of incidents and grievances on this matter before and after implementation of control
- Direct observations in the event of protests involving public security
|
Support training of public security forces on VPs
|
Security
|
Start date, end date
|
Spend on consultant to deliver training
Spend on logistics and venue
Staff time to organise training
|
Training attendance logs show attendance of all public security staff involved with providing site-related security
Training materials specifically address the issue
|
X number of public security aware of VPs requirements
|