Skip to main content
To KTH's start page

Security planning

The purpose of this function page is to describe KTH's security planning and implementation.

Scope

This overarching function description applies throughout KTH.

Responsibility

KTH's security function is responsible for and provides the security planning service through its security planner function.

Security planning can be sub-ordered by all of KTH's schools and divisions.

Security planning

KTH's schools/divisions can sub-order security planning for setting internal or external requirements and the expansion of or changes to physical security. Changes to physical security must comply with KTH's project conditions, legal requirements, insurance requirements and any requirements from external parties.

The purpose of security planning is to collaborate with the requester through analysis and needs assessment in order to establish and implement security measures to achieve a level of security in accordance with security needs and/or requirements in balance with KTH's openness and accessibility.

Security areas

  • Mechanical intrusion protection
  • Lock system
  • Access control system
  • Intrusion alarms
  • Camera surveillance
  • Security and assault alarms
  • Service alarms

Implementation – Security planning

Planning

The security planner, together with the school/division, reviews the description of the assignment and its desired effect and objectives.

  • Review of the description of the assignment
  • Identification and analysis of needs
  • Development of security measures according to the needs analysis
  • Obtaining quotations

Implementation

The security planner implements the security measure following approval by the school/division.

  • Ordering the contract awarded, the supplier or the product
  • Implementation plan and scheduling
  • Contact person in relation to security contractor and/or supplier

Completion and follow-up

Feedback on completed security measure to school/division.

  • Approval of implementation and/or completed contract
  • Review and feedback on description of assignment and security measure
  • Follow-up and any standardisation