Security
Security
Security

Respecting freedoms and human rights is the fundamental idea of our security practices We integrate security and human rights management into our ESG strategic planning and operational activities and abide by the Voluntary Principles on Security and Human Rights (VPs).

Our Goals
  • ●  No violations against our employees and assets by external parties; <br> ●  Safeguard the Company’s personnel, property, information, processes, and reputation; <br> ●  Do not commit or contribute to serious human rights abuses;
    ● No violations against our employees and assets by external parties;
    ● Safeguard the Company’s personnel, property, information, processes, and reputation;
    ● Do not commit or contribute to serious human rights abuses;
    ●  No violations against our employees and assets by external parties; <br> ●  Safeguard the Company’s personnel, property, information, processes, and reputation; <br> ●  Do not commit or contribute to serious human rights abuses;
  • ● Through our partnerships, indirectly avoid or mitigate adverse human rights impacts that are related to our operations, products, or services;<br> ● Where we have directly or indirectly caused an adverse human rights impact, we will investigate the case according to the relevant procedures and take appropriate remedial actions;
    ● Through our partnerships, indirectly avoid or mitigate adverse human rights impacts that are related to our operations, products, or services;
    ● Where we have directly or indirectly caused an adverse human rights impact, we will investigate the case according to the relevant procedures and take appropriate remedial actions;
    ● Through our partnerships, indirectly avoid or mitigate adverse human rights impacts that are related to our operations, products, or services;<br> ● Where we have directly or indirectly caused an adverse human rights impact, we will investigate the case according to the relevant procedures and take appropriate remedial actions;
  • ●  Create and maintain a safe and stable work environment for our employees and contractors; <br> ●  Adjust security measures according to actual and everchanging risks, in order to balance security needs and production and operation needs;<br> ●  Make a positive impact on the safety of the surrounding communities.
    ● Create and maintain a safe and stable work environment for our employees and contractors;
    ● Adjust security measures according to actual and everchanging risks, in order to balance security needs and production and operation needs;
    ● Make a positive impact on the safety of the surrounding communities.
    ●  Create and maintain a safe and stable work environment for our employees and contractors; <br> ●  Adjust security measures according to actual and everchanging risks, in order to balance security needs and production and operation needs;<br> ●  Make a positive impact on the safety of the surrounding communities.
Security Risk Management

Guided by the ISO 31000 risk assessment process, we have assessed the implementation of baseline security risk standards and risk levels for our projects against security risk assessment models recognised by the international security industry, as well as elements set by international security experts, and formulated corresponding mitigation and alleviation measures. We have formulated the Security and Human Rights Policy, the Guidelines on the Principles of the Use of Security Force Overseas, the Guidelines on Security Facilities and Security Forces for Overseas Projects, and other security management policies, baseline security standards, and crisis management plans.


We use the public opinion monitoring platform and the risk intelligence platform to collect, process, analyse, and generate risk intelligence, in order to issue timely security risk alerts to employees stationed at overseas projects, as well as employees in international business trips, and carry out travel risk management. At the same time, they also provide objective and credible design benchmarks for the design of security systems, as well as viable intelligence for management decisions.

  • Collect risk information via various channels
  • Conduct preliminary data analysis
  • Conduct deep data analysis
  • Act based on the analysis
Risk Assessment Process and Action Plan

The project security risk assessment (SRA) is a comprehensive assessment of assets, threats, risks, and security weaknesses of the project site.Based on the implementation of the baseline security standards, the SRA will identify the special risks faced by a specific project and the weaknesses in the existing PPS. SRA will sort out the priorities of the risks to be addressed, give risk mitigation advice, and put in place extra security measures, so as to reduce the risks faced by the project as low as reasonably practicable.

 

The overall process of the SRA shall be guided by ISO 31,000 and carried out with the security risk assessment model recognized by the international security industry and the elements specified by international security experts. The evaluation is conducted by personnel or security providers with professional qualifications.

 

All overseas subsidiaries whose security work is led by Zijin shall comply with the following project security risk assessment process:

  • Identify and sequence assets, and describe the external environment in which assets exist;
  • Identify potential threats and their capabilities;
  • Assess the likelihood of occurrence;
  • Determine the impact of threats on assets;
  • Determine the intermediate risk value (IRV);
  • Compare the intermediate risk value with the security weakness assessment results of the project site, so as to determine the priority of risk treatment;
  • Determine corresponding strategic recommendations on risk mitigation;
  • Implement recommended security measures.
Security Audit

We regularly conduct internal audits and on-site inspections to assess the compliance and implementation of security policies and related regulations by our subsidiaries.During the audit process, on-site security inspection may be conducted when the conditions permit based on the actual risk level and priorities.


The process and frequency of on-site inspection shall be based on the level of the threats and risks faced by the sites. Projects in moderate- and high-risk countries/regions shall be inspected every month. We will carry out regular inspections of security personnel, processes, and equipment, and record non-compliance with regulations/standards. The following aspects shall be recorded in the inspection report: 

  • Compliance and implementation of the procedures and standards specified in the security policy documents;
  • Whether security equipment is regularly maintained and can operate according to the design requirements;
  • Availability and effectiveness of security personnel;
  • Whether security-related records and documents are filled in correctly and updated regularly;
  • Corrective action plan.