Security
Security
Security

We incorporate security and human rights management into our ESG strategy and plans and operational activities and abide by the Voluntary Principles on Security and Human Rights (VPs)..

Our Goals
  • ●  No infringements on our employees rights or assets by external parties; <br> ●  Safeguard Company property, information, processes, and reputation; <br> ●  Comprehensive protection of human rights regarding our employees and affected communities;
    ● No infringements on our employees rights or assets by external parties;
    ● Safeguard Company property, information, processes, and reputation;
    ● Comprehensive protection of human rights regarding our employees and affected communities;
    ●  No infringements on our employees rights or assets by external parties; <br> ●  Safeguard Company property, information, processes, and reputation; <br> ●  Comprehensive protection of human rights regarding our employees and affected communities;
  • ● In our partnerships, ascertain no human rights are adversely impacted by operations, products, or services; <br> ● Where we have directly or indirectly negatively impacted human rights, investigate each case according to applicable procedures and take remedial actions;
    ● In our partnerships, ascertain no human rights are adversely impacted by operations, products, or services;
    ● Where we have directly or indirectly negatively impacted human rights, investigate each case according to applicable procedures and take remedial actions;
    ● In our partnerships, ascertain no human rights are adversely impacted by operations, products, or services; <br> ● Where we have directly or indirectly negatively impacted human rights, investigate each case according to applicable procedures and take remedial actions;
  • ●  Create and maintain a safe and stable work environment for our employees and contractors; <br> ●  Adjust security measures according to actual and evolving risks, in order to balance security against operational necessities; <br> ●  Positively impact general security levels in all surrounding communities.
    ● Create and maintain a safe and stable work environment for our employees and contractors;
    ● Adjust security measures according to actual and evolving risks, in order to balance security against operational necessities;
    ● Positively impact general security levels in all surrounding communities.
    ●  Create and maintain a safe and stable work environment for our employees and contractors; <br> ●  Adjust security measures according to actual and evolving risks, in order to balance security against operational necessities; <br> ●  Positively impact general security levels in all surrounding communities.
Security Risk Management

We use media monitoring and risk intelligence platforms to collect, process, analyze, and generate risk intelligence. We issue timely security risk alerts as necessary to employees based at our overseas projects, as well as those on international business trips, and carry out travel risk management. At the same time, such information also provides objective and credible benchmarks for the design of security systems, and viable intelligence for management decisions. 


We assess our baseline security risk management and the risk levels of our projects following ISO 31000 standards, as well as security risk assessment models recognized by the international security industry, including elements set by international security experts, and formulated corresponding mitigation measures. Further details on our security risk management are articulated in our Security and Human Rights Policy, Guidelines on the Principles of the Use of Security Force Overseas, Guidelines on Security Facilities and Security Forces for Overseas Projects, and other security management policies, baseline security standards, and crisis management plans.

  • Collect risk information via various channels
  • Conduct preliminary data analysis
  • Conduct deep data analysis
  • Act based on the analysis
Risk Assessment Process and Action Plan

Our project security risk assessment (SRA) is a comprehensive assessment of assets, threats, risks, and security weaknesses on a given project site. Based on the implementation of baseline security standards, the SRA will identify the unique risks facing a given project as well as the weaknesses in its existing PPS. The SRA will determine the priority of the risks to be addressed, offer risk mitigation advice, and put in place extra security measures.   


The SRA process is in line with ISO 31000 standards and follows security risk assessment models recognized by the international security industry with elements specified by international security experts. Assessment is conducted by professionally qualified personnel or security providers.   


All overseas subsidiaries whose security is managed by Zijin follow the following project security risk assessment process:

  • Identify and sequence assets, and describe the external environment in which assets exist;
  • Identify potential threats and their capabilities;
  • Assess the likelihood of occurrence;
  • Determine impact of threats on assets;
  • Determine intermediate risk value (IRV);
  • Compare intermediate risk value with security weakness assessment results of the project site, to determine the priority of risk treatment;
  • Determine corresponding strategic recommendations on risk mitigation;
  • Implement recommended security measures.
Security Audit

We regularly conduct internal audits and on-site inspections to assess compliance and implementation of security policies and implicated regulations of our subsidiaries. In the audit process, on-site security inspection may be conducted where conditions allow based on the actual risk levels and priorities. 


The process and frequency of on-site inspections shall be based on the level of the threats and risks faced by the sites. Projects located in moderate- or high-risk countries/regions are inspected monthly. We carry out regular inspections on security personnel, processes, and equipment, and record non-compliance with regulations/standards. The following is recorded in inspection reports: 

  • Compliance and implementation of the procedures and standards specified in the security policies;
  • Whether security equipment is regularly maintained and can function according to the design requirements;
  • Availability and effectiveness of security personnel;
  • Whether security-related records and documents are filled in correctly and updated regularly;
  • Corrective action plan.