The Basic Security In the Field e-learning course contains vital security information for personnel, family members and others covered by the UN Security . Basic Security Training in the Field II. Full title: Basic Security Training in the Field II Type: online. Short description: e-learning course by UNDSS on security. Below security trainings (BSITF, ASITF) are mandatory for all UN travels and deployments. Basic and Advanced Security in the Field for external, non-UN staff.

Author: Brahn Gar
Country: Finland
Language: English (Spanish)
Genre: Automotive
Published (Last): 27 July 2008
Pages: 426
PDF File Size: 9.96 Mb
ePub File Size: 1.99 Mb
ISBN: 298-1-83047-279-2
Downloads: 44965
Price: Free* [*Free Regsitration Required]
Uploader: Goltikus

Meeting Participants can be added under the section titled “Travellers”: Each level has a specific name as follows:. The SLS, which came into effect in Januaryis a new addition to the United Nations Security Risk Management SRM framework, and it is used for assigning a security grade or level to vsitf area where the United Bsktf operates to identify the overall level of threat or danger in that area.

To correctly install the Adobe Shockwave player onto your computer, contact your respective IT services.

Basic Security in the Field II: Staff Safety, Health and Welfare

Take appropriate precautionary and preparative actions Apply practical techniques to manage risks ghe deal with difficult circumstances Make quick assessments in dangerous situations React appropriately in the event of actual danger, threat, or injury Comprehend your psychological reaction to security incidents and know where to obtain help Audience This course is suitable to all staff of any level of seniority, in particular new staff who are joining the UN system for the first time.

Once you have submitted your travel details, a new window will appear that displays the status of your request.


The term SAFE UN is used because basid is easy to remember and it is characteristic of the philosophy behind the campaign. The new interim policies promulgated on 17 December includes a policy on security clearances: The Security Risk Management SRM is the fundamental managerial process for dealing with i problems that affect United Nations personnel, assets and operations.

However, when the DO needs to control the number and movement of personnel, security clearances will be done manually.

Failure to provide contact information may make it impossible to extend in extremis support to UN personnel and eligible family members in the event of an emergency. Structure The course is divided into seven modules.

Basic Security in the Field II (English)

It also includes transit information. If you want to suggest a new city, please click on this icon. You will find useful information related to individual security awareness, secuirty as: ISECT is therefore no longer used.

How can I save time in submitting a security clearance request which is similar to clearances previously submitted? SRM is an analytical procedure that has three main steps:. A notification containing your securigy in details will be sent to your e-mail address.

Summary of Basic Security in the Field (BSITF II) – new version

First, the determination of a Security Level is more objective, fact-based and globally comparable. This course is composed of seven self-paced animated modules, including various examples ui activities. It is not possible to change your registered username a UN email address. When done click on the “Save Travel Segment” 8. If you have a different system and are experiencing problems, please find a computer with the above-recommended configuration. Alternatively, if the traveller is already in the TRIP database, you can click on the button labelled “Search for Traveller”.


How many Security Levels are there and what do they mean? UN personnel will require security clearance for all official travel, regardless of Security Level. Why are some Security Levels not shown in the Travel Advisory?

The Security Phase System, adopted inhas been criticized for being inconsistent from country to country, often because security phase decisions were blurred by political pressures or driven by administrative or financial considerations. We received a lot of positive feedback on our presentation of that theme. We apologize for this inconvenience. The “Transit” box is marked when multiple destinations are involved.

Summary of Basic Security in the Field (BSITF II) – Old version

In the event you do not have a UN email address, a UN staff member from your department may submit the Security Clearance on your behalf. It would be recommended that you use another computer that secyrity those configurations Windows XP and Explorer.

You will find useful information related to individual security awareness, such as:. The course is divided into seven modules. If you are submitting a request for another traveller always search for travellers first “Search for traveller” If you cannot find the person select “Create New Staff” Like wise, click on “Create New Dependant” if you are submitting a request for a Dependant.

With the exception of the first module, there is an assessment at the end of each module.

Security and Safety Service Vienna. Methodology This course is composed of seven self-paced animated modules, including various examples and activities.