16.What procedures or controls do you use to ensure security onboard before departure?
Inspect the entire ship for any dangers or stowaways and confirm the inspection result to ensure security onboard before departure.
17.If a person who has no authority to be on board attempts to enter the ship, where should he be stopped?
He should be stopped at the gangway if a person who has no authority to be onboard attempts to enter the ship.
18.What anti-stowaway precautions should you take before the vessel sails from a port?
Patrol the ship and check all the possible places before the vessel sails from a port.
19.What will you do first if your vessel is under attack by pirates?
Sound the alarm to muster all crew members to fight against the pirates according to ISPS.
20.How do you oversee and ascertain the implementation SSP?
By periodic inspections and audits and strict reporting procedures.
21.How do you contact CSO in charge of the ship?
We can contact CSO in charge of the ship by using telephone, email, telex and so on.
22.How does the communication/co-ordination with PFSO take place on implementation of the SSP?
We can communicate with PFSO by using VHF or other means. 23.How do you report deficiencies, non-compliance and security incidents?
We can report in writing according to the reporting procedure of SSP.
24.A visitor in a car asks access to a ship. He has an
unidentified parcel which is not pre-announced. How will you react?
36
Refuse to accept the parcel on board and report to the captain or SSO to verify the parcel.
25.How do you carry out a thorough out risk assessment prior transiting to a high-risk piracy area?
We will carry out risk assessment according to the ship type, speed, freeboard and so on.
26.What is relationship between maritime security and safety? To ensure maritime security can improve the safety of the ship. 27.What are major security concerns and potential threats? Are they real or imaginary?
Such as the explosion, piracy, collision and so on, they are real in some high risk areas.
28.What are the different security levels referred to in the ISPS Code?
There are three different security levels including LEVEL 1 LEVEL 2 and LEVEL 3, different precautions and measures should be taken at different levels.
29.What measures have been adopted in the security communication field?
The GMDSS, VHF, SSAS have been adopted in the security communication field.
30.How do you find out if a port is compliant with ISPS Code? When there is a port facility security plan for the different security levels, the port is compliant with ISPS code. 31.How do you conduct regular security inspection?
Carry out security patrols in and around the ship regularly. 32.What are your tasks when the security level is upgraded? All crew should be more vigilant and act strictly according to particular procedures of the appropriate security level.
33.What role would AIS and ship security alert system play?
37
AIS can identify the risk, while SSAS can send security alert once activated.
34.How do you promote awareness and vigilance on security onboard?
By carrying out regular training and drills.
35.What are the typical problems identified in security drills? Some crew members are not familiar with the security equipment and procedures of the security drills.
38