Commission Implementing Regulation (EU) 2015/1998
of 5 November 2015
laying down detailed measures for the implementation of the ... basic standards on aviation security
(Text with EEA relevance)
THE EUROPEAN COMMISSION,
Having regard to the Treaty on the Functioning of the European Union,
Having regard to Regulation (EC) No 300/2008 of the European Parliament and of the Council of 11 March 2008 on common rules in the field of civil aviation security and repealing Regulation (EC) No 2320/2002(1), and in particular Article 4(3) thereof,
Whereas:
(1)In accordance with Article 4(3) of Regulation (EC) No 300/2008, the Commission should adopt detailed measures for the implementation of common basic standards referred to in Article 4(1) and of general measures supplementing common basic standards referred to in Article 4(2) of that Regulation.
(2)If they contain sensitive security information, those measures should be treated in accordance with Commission Decision (EU, Euratom) 2015/444(2), as provided for by point (a) of Article 18 of Regulation (EC) No 300/2008. Those measures should therefore be adopted separately, by means of a Commission Implementing Decision addressed to the Member States, and should not be published.
(3)Commission Regulation (EU) No 185/2010(3), which lays down the measures referred to in Article 4(3) of Regulation (EC) No 300/2008, was amended 20 times since its entry into force. In order to ensure clarity and legal certainty, it should therefore be repealed and replaced by a new act, consolidating the initial act and all amendments thereto. That new act should also be clarified and updated where appropriate, in light of the practical experiences gained and the relevant technological developments.
(4)These measures should be reviewed regularly to ensure they are commensurate with the evolution of the threat.
(5)The measures provided for in this Regulation are in accordance with the opinion of the Committee on Civil Aviation Security set up by Article 19(1) of Regulation (EC) No 300/2008,
HAS ADOPTED THIS REGULATION:
Article 1
The detailed measures for the implementation of the ... basic standards for safeguarding civil aviation against acts of unlawful interference that jeopardise the security of civil aviation, referred to in Article 4(1) of Regulation (EC) No 300/2008, and the general measures supplementing those ... basic standards, referred to in Article 4(2) of that Regulation, are set out in the Annex.
Article 2
Regulation (EU) No 185/2010 is repealed. References to the repealed Regulation shall be construed as a reference to this Regulation.
Article 3
This Regulation shall enter into force on the day following that of its publication in the Official Journal of the European Union.
It shall apply from 1 February 2016.
...
ANNEX
1.AIRPORT SECURITY
1.0GENERAL PROVISIONS
1.0.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.0.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.0.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.0.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.0.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1AIRPORT PLANNING REQUIREMENTS
1.1.1Boundaries
1.1.1.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.1.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.2Security restricted areas
1.1.2.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.2.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.2.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.3Critical parts of security restricted areas
1.1.3.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.3.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.3.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.3.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2ACCESS CONTROL
1.2.1Access to airside
1.2.1.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.1.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.1.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.1.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2Access to security restricted areas
1.2.2.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2.6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2.7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3Requirements for United Kingdom crew identification cards and airport identification cards
1.2.3.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.4Supplementary requirements for United Kingdom crew identification cards
1.2.4.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.5Supplementary requirements for airport identification cards
1.2.5.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.5.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.6Requirements for vehicle passes
1.2.6.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.6.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
...
1.2.6.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.6.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.6.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.6.6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.6.7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.6.8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.6.9. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.7Escorted access
1.2.7.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.7.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.7.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.7.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.7.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4EXAMINATION OF VEHICLES
1.4.1Vehicles entering critical parts
1.4.1.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.2Vehicles entering security restricted areas other than critical parts
1.4.2.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.2.2There shall be defined methodologies to ensure the randomness of selection of both vehicles and the areas to be examined.
1.4.2.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.3Methods of examination
1.4.3.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.3.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.3.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.4Exemptions and special examination procedures
1.4.4.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.4.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5SURVEILLANCE, PATROLS AND OTHER PHYSICAL CONTROLS
1.5.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6PROHIBITED ARTICLES
1.6.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 1-A
PERSONS OTHER THAN PASSENGERS
LIST OF PROHIBITED ARTICLES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.DEMARCATED AREAS OF AIRPORTS
No provisions in this Regulation.
3.AIRCRAFT SECURITY
3.0GENERAL PROVISIONS
3.0.1Unless otherwise stated, an air carrier shall ensure the implementation of the measures set out in this Chapter as regards its aircraft.
3.0.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.0.3An aircraft need not be subjected to an aircraft security check. It shall be subjected to an aircraft security search in accordance with point 3.1.
3.0.4An air carrier shall, upon request, be notified by the airport operator whether or not its aircraft is in a critical part. When this is not clear, it shall be assumed that the aircraft is in a part other than a critical part.
3.0.5When an area is no longer considered to be a critical part because of a change of security status then the airport shall inform those carriers that are affected.
3.0.6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.0.7For the purpose of this Chapter, ‘aircraft service panels and hatches’ means aircraft external access points and compartments that have external handles or external clip-down panels and are routinely used for providing aircraft ground handling services.
3.0.8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.1AIRCRAFT SECURITY SEARCH
3.1.1When to perform an aircraft security search
3.1.1.1An aircraft shall at all times be subjected to an aircraft security search whenever there is reason to believe that unauthorised persons may have had access to it.
3.1.1.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.1.1.3An aircraft arriving into a critical part from any airport other than a domestic airport or any other airport designated by the appropriate authority shall be subjected to an aircraft security search any time after passenger disembarkation from the area to be searched and/or the unloading of the hold.
3.1.1.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.1.1.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.1.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.1.3Information on the aircraft security search
The following information on the aircraft security search of a departing flight shall be recorded and kept at a point not on the aircraft for the duration of the flight or for 24 hours, whichever is longer:
flight number; and
origin of the previous flight.
Where an aircraft security search was performed, the information shall also include:
date and time that the aircraft security search was completed; and
the name and signature of the person responsible for the performance of the aircraft security search.
Recording of the information as above, may be held in electronic format.
3.2PROTECTION OF AIRCRAFT
3.2.1Protection of aircraft — General
3.2.1.1Regardless of where an aircraft is parked at an airport, each of its external doors shall be protected against unauthorised access by:
ensuring that persons seeking to gain unauthorised access are challenged promptly; or
having the external door closed. Where the aircraft is in a critical part, external doors that are not accessible by a person from the ground shall be considered closed if access aids have been removed and placed sufficiently far from the aircraft as to reasonably prevent access by a person; or
having electronic means which will immediately detect unauthorised access; or;
having an electronic airport identification card access system at all doors leading directly to the passenger boarding bridge, adjacent to an open aircraft door, which only allows access for persons that are trained in accordance with point 11.2.3.7. Such persons must ensure that unauthorised access is prevented, during their use of the door.
3.2.1.2Point 3.2.1.1 shall not apply to an aircraft parked in a hangar that is locked or otherwise protected from unauthorised access.
3.2.2Additional protection of aircraft with closed external doors in a part other than a critical part
3.2.2.1Where external doors are closed and the aircraft is in a part other than a critical part, each external door shall also:
have access aids removed; or
be sealed; or
be locked; or
be monitored.
Point (a) shall not apply for a door that is accessible from the ground by a person.
3.2.2.2Where access aids are removed for doors that are not accessible by a person from the ground, they shall be placed sufficiently far from the aircraft as to reasonably prevent access.
3.2.2.3Where external doors are locked, only persons with an operational need shall be able to unlock these doors.
3.2.2.4Where external doors are monitored, the monitoring shall ensure that unauthorised access to the aircraft is immediately detected.
3.2.2.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 3-A
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 3-B
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.PASSENGERS AND CABIN BAGGAGE
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.HOLD BAGGAGE
5.0GENERAL PROVISIONS
5.0.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.0.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.0.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.0.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.0.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.0.6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.1SCREENING OF HOLD BAGGAGE
5.1.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.1.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.1.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.1.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.1.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.1.6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.1.7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.2PROTECTION OF HOLD BAGGAGE
5.2.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.2.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.2.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3BAGGAGE RECONCILIATION
5.3.1Identification of hold baggage
5.3.1.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3.1.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3.1.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3.1.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3.2Factors beyond the passenger's control
5.3.2.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3.2.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3.3Appropriate security controls for unaccompanied hold baggage
5.3.3.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3.3.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3.3.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.4PROHIBITED ARTICLES
5.4.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.4.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.4.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 5-A
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 5-B
HOLD BAGGAGE
LIST OF PROHIBITED ARTICLES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.0. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 6-A
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 6-B
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 6-C
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 6-C2
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ANNEXList of persons and entities visited and interviewed
Providing the name of the entity, the name and the position of the contact person and the date of the visit or interview.
Name of entity | Name of contact person | Position of contact person | Date of visit or interview |
---|---|---|---|
ATTACHMENT 6-C3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ANNEXList of persons and entities visited and interviewed
Providing the name of the entity, the name and the position of the contact person and the date of the visit or interview.
Name of entity | Name of contact person | Position of contact person | Date of visit or interview |
---|---|---|---|
ATTACHMENT 6-C4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ANNEXList of persons and entities visited and interviewed
Providing the name of the entity, the name and the position of the contact person and the date of the visit or interview.
Name of entity | Name of contact person | Position of contact person | Date of visit or interview |
---|---|---|---|
ATTACHMENT 6–D
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 6-E
HAULIER DECLARATION
In accordance with Regulation (EC) No 300/2008 of the European Parliament and of the Council(4) and its implementing acts,
When collecting, carrying, storing and delivering air cargo/mail to which security controls have been applied [on behalf of name of regulated agent/air carrier applying security controls for cargo or mail/known consignor ...], I confirm that the following security procedures will be adhered to:
All staff who transport this air cargo/mail will have received general security awareness training in accordance with point 11.2.7 of the Annex to Implementing Regulation (EU) 2015/1998;
The integrity of all staff being recruited with access to this air cargo/mail will be verified. This verification shall include at least a check of the identity (if possible by photographic identity card, driving licence or passport) and a check of the curriculum vitae and/or provided references;
Load compartments in vehicles will be sealed or locked. Curtain sided vehicles will be secured with TIR cords. The load areas of flatbed trucks will be kept under observation when air cargo is being transported;
Immediately prior to loading, the load compartment will be searched and the integrity of this search maintained until loading is completed;
Each driver will carry an identity card, passport, driving licence or other document, containing a photograph of the person, which has been issued or recognised by the national authorities;
Drivers will not make unscheduled stops between collection and delivery. Where this is unavoidable, the driver will check the security of the load and the integrity of locks and/or seals on his return. If the driver discovers any evidence of interference, he will notify his supervisor and the air cargo/mail will not be delivered without notification at delivery;
Transport will not be subcontracted to a third party, unless the third party:
(a)has a haulier agreement with the regulated agent or known consignor responsible for the transport [same name as above]; or
(b)is approved or certified by the appropriate authority; or
(c)has a haulier agreement with the undersigned haulier requiring that the third party will not subcontract further and implements the security procedures contained in this declaration. The undersigned haulier retains full responsibility for the entire transport on behalf of the regulated agent or known consignor ; and
No other services (e.g. storage) will be sub-contracted to any other party other than a regulated agent or an entity that has been certified or approved and listed for the provision of these services by the appropriate authority.
I accept full responsibility for this declaration.
Name:
Position in company:
Name and address of the company:
Date:
Signature:
ATTACHMENT 6-F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 6-G
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 6-H1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 6-H2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 6-H3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 6-I
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 6-J
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7.AIR CARRIER MAIL AND AIR CARRIER MATERIALS
7.0. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7.1AIR CARRIER MAIL AND AIR CARRIER MATERIALS TO BE LOADED ONTO AN AIRCRAFT
7.1.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7.1.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7.1.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7.2AIR CARRIER MATERIALS USED FOR PASSENGER AND BAGGAGE PROCESSING
7.2.1Air carrier materials which are used for the purposes of passenger and baggage processing and which could be used to compromise aviation security shall be protected or kept under surveillance in order to prevent unauthorised access.
Self-check-in and applicable Internet options allowed for use by passengers shall be considered as authorised access to such materials.
7.2.2Discarded materials which could be used to facilitate unauthorised access or move baggage into the security restricted area or onto aircraft shall be destroyed or invalidated.
7.2.3Departure control systems and check-in systems shall be managed in such a manner as to prevent unauthorised access.
Self-check-in allowed for use by passengers shall be considered as authorised access to such systems.
8.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.0. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 8-A
ATTACHMENT 8-B
9.AIRPORT SUPPLIES
9.0GENERAL PROVISIONS
9.0.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.0.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.0.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.0.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1SECURITY CONTROLS
9.1.1Security controls — general provisions
9.1.1.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.1.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.1.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.2Screening
9.1.2.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.2.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.2.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.3Designation of known suppliers
9.1.3.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.3.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.3.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.3.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.3.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.3.6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.3.7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.4Security controls to be applied by a known supplier or airport operator
9.1.4.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1.4.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.3ADDITIONAL SECURITY PROVISIONS FOR SUPPLIES OF LAGS AND STEBS
9.3.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.3.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.3.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 9-A
DECLARATION OF COMMITMENTS
KNOWN SUPPLIER OF AIRPORT SUPPLIES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10.IN-FLIGHT SECURITY MEASURES
No provisions in this Regulation.
11.STAFF RECRUITMENT AND TRAINING
11.0GENERAL PROVISIONS
11.0.1The authority, airport operator, air carrier or entity deploying persons implementing, or responsible for implementing, measures for which it is responsible in accordance with the national civil aviation security programme as referred to in Article 10 of Regulation (EC) No 300/2008 shall ensure that these persons meet the standards set out in this Chapter.
11.0.2For the purpose of this Chapter, ‘certification’ means a formal evaluation and confirmation by or on behalf of the appropriate authority indicating that the person has successfully completed the relevant training and that the person possesses the necessary competencies to perform assigned functions to an acceptable level.
11.0.3For the purposes of this Chapter, a ‘state of residence’ shall be any country in which the person has been resident continuously for 6 months or more and a ‘gap’ in the record of education or employment shall mean any gap of more than 28 days.
11.0.4For the purposes of this Chapter, ‘competency’ means being able to demonstrate suitable knowledge and skills.
11.0.5Competencies acquired by persons prior to recruitment may be taken into consideration when assessing any training needs under this Chapter.
11.0.6Where relevant competencies required by this Regulation that are not specific to aviation security have been acquired through training not delivered by an instructor in line with point 11.5 of this Regulation and/or through courses not specified or approved by the appropriate authority, it may be taken into consideration when assessing any training needs under this Chapter.
11.0.7Where a person has received training and acquired competencies listed in point 11.2, the training need not be repeated for another function other than for the purposes of recurrent training.
11.1RECRUITMENT
11.1.1Persons being recruited to implement, or to be responsible for the implementation of, screening, access control or other security controls in a security restricted area shall have successfully completed a background check.
11.1.2Persons being recruited to implement, or to be responsible for the implementation of, screening, access control or other security controls elsewhere than a security restricted area shall have successfully completed a background check.
Persons having completed a pre-employment check shall undergo a background check by 30 June 2021 at the latest.
11.1.3In accordance with the applicable rules of ... national law, a background check shall at least:
establish the person's identity on the basis of documentary evidence; and
cover criminal records in all states of residence during at least the preceding 5 years; and
cover employment, education and any gaps during at least the preceding 5 years.
11.1.4In accordance with the applicable rules of ... national law, a pre-employment check shall:
establish the person's identity on the basis of documentary evidence; and
cover employment, education and any gaps during at least the preceding 5 years; and
require the person to sign a declaration detailing any criminal history in all states of residence during at least the preceding 5 years.
11.1.5... Background checks shall be repeated at regular intervals not exceeding five years.
11.1.6The recruitment process for all persons being recruited under points 11.1.1 and 11.1.2 shall include at least a written application and an interview stage designed to provide an initial assessment of abilities and aptitudes.
11.1.7Persons being recruited to implement security controls shall have the mental and physical abilities and aptitudes required to carry out their designated tasks effectively and shall be made aware of the nature of these requirements at the outset of the recruitment process.
These abilities and aptitudes shall be assessed during the recruitment process and before completion of any probationary period.
11.1.8Recruitment records, including results of any assessment tests, shall be kept for all persons recruited under points 11.1.1 and 11.1.2 for at least the duration of their contract.
11.2TRAINING
11.2.1General training obligations
11.2.1.1Persons shall have successfully completed relevant training before being authorised to implement security controls unsupervised.
11.2.1.2Training of persons performing tasks as listed in points 11.2.3.1 to 11.2.3.5 and point 11.2.4 shall include theoretical, practical and on- the-job training elements.
11.2.1.3The content of courses shall be specified or approved by the appropriate authority before:
an instructor delivers any training required under Regulation (EC) No 300/2008 and its implementing acts; or
a computer based training course is used in order to meet the requirements of Regulation (EC) No 300/2008 and its implementing acts.
Computer based training may be used with or without the support of an instructor or coach.
11.2.1.4Training records shall be kept for all persons trained for at least the duration of their contract.
11.2.2Basic training
Basic training of persons performing tasks as listed in points 11.2.3.1, 11.2.3.4 and 11.2.3.5 as well as in points 11.2.4, 11.2.5 and 11.5 shall result in all of the following competencies:
knowledge of previous acts of unlawful interference with civil aviation, terrorist acts and current threats;
knowledge of the legal framework for aviation security;
knowledge of the objectives and organisation of aviation security, including the obligations and responsibilities of persons implementing security controls;
knowledge of access control procedures;
knowledge of identification card systems in use;
knowledge of procedures for challenging persons and of circumstances in which persons should be challenged or reported;
knowledge of reporting procedures;
ability to identify prohibited articles;
ability to respond appropriately to security related incidents;
knowledge of how human behaviour and responses can affect security performance;
ability to communicate clearly and confidently.
11.2.3Job specific training for persons implementing security controls
11.2.3.1Job specific training of persons implementing screening of persons, cabin baggage, items carried and hold baggage shall result in all of the following competencies:
understanding of the configuration of the screening checkpoint and the screening process;
knowledge of how prohibited articles may be concealed;
ability to respond appropriately to the detection of prohibited articles;
knowledge of the capabilities and limitations of security equipment or screening methods used;
knowledge of emergency response procedures.
In addition, where the designated tasks of the person concerned so require, training shall also result in the following competences:
interpersonal skills, in particular how to deal with cultural differences and with potentially disruptive passengers;
knowledge of hand searching techniques;
ability to carry out hand searches to a standard sufficient to reasonably ensure the detection of concealed prohibited articles;
knowledge of exemptions from screening and special security procedures;
ability to operate the security equipment used;
ability to correctly interpret images produced by security equipment; and
knowledge of protection requirements for hold baggage.
11.2.3.2Training of persons implementing screening of cargo and mail shall result in all of the following competencies:
knowledge of previous acts of unlawful interference with civil aviation, terrorist acts and current threats;
awareness of the relevant legal requirements;
knowledge of the objectives and organisation of aviation security, including the obligations and responsibilities of persons implementing security controls in the supply chain;
ability to identify prohibited articles;
ability to respond appropriately to the detection of prohibited articles;
knowledge of the capabilities and limitations of security equipment or screening methods used;
knowledge of how prohibited articles may be concealed;
knowledge of emergency response procedures;
knowledge of protection requirements for cargo and mail;
In addition, where the designated tasks of the person concerned so require, training shall also result in the following competences:
knowledge of screening requirements for cargo and mail, including exemptions and special security procedures;
knowledge of screening methods appropriate for different types of cargo and mail;
knowledge of hand searching techniques;
ability to carry out hand searches to a standard sufficient to reasonably ensure the detection of concealed prohibited articles;
ability to operate the security equipment used;
ability to correctly interpret images produced by security equipment;
knowledge of transportation requirements.
11.2.3.3Training of persons implementing screening of air carrier mail and materials, in-flight supplies and airport supplies shall result in all of the following competencies:
knowledge of previous acts of unlawful interference with civil aviation, terrorist acts and current threats;
awareness of the relevant legal requirements;
knowledge of the objectives and organisation of aviation security, including the obligations and responsibilities of persons implementing security controls in the supply chain;
ability to identify prohibited articles;
ability to respond appropriately to the detection of prohibited articles;
knowledge of how prohibited articles may be concealed;
knowledge of emergency response procedures;
knowledge of the capabilities and limitations of security equipment or screening methods used;
In addition, where the designated tasks of the person concerned so require, training shall also result in the following competences:
knowledge of hand searching techniques;
ability to carry out hand searches to a standard sufficient to reasonably ensure the detection of concealed prohibited articles;
ability to operate the security equipment used;
ability to correctly interpret images produced by security equipment;
knowledge of transportation requirements.
11.2.3.4Specific training of persons performing vehicle examinations shall result in all of the following competencies:
knowledge of the legal requirements for vehicle examinations, including exemptions and special security procedures;
ability to respond appropriately to the detection of prohibited articles;
knowledge of how prohibited articles may be concealed;
knowledge of emergency response procedures;
knowledge of vehicle examination techniques;
ability to carry out vehicle examinations to a standard sufficient to reasonably ensure the detection of concealed prohibited articles.
11.2.3.5Specific training of persons implementing access control at an airport as well as surveillance and patrols shall result in all of the following competencies:
knowledge of the legal requirements for access control, including exemptions and special security procedures;
knowledge of access control systems used at the airport;
knowledge of authorisations, including identification cards and vehicle passes, providing access to airside areas and ability to identify those authorisations;
knowledge of procedures for patrolling and for challenging persons and of circumstances in which persons should be challenged or reported:
ability to respond appropriately to the detection of prohibited articles;
knowledge of emergency response procedures;
interpersonal skills, in particular how to deal with cultural differences and with potentially disruptive passengers.
11.2.3.6Training of persons implementing aircraft security searches shall result in all of the following competencies:
knowledge of the legal requirements for aircraft security searches;
knowledge of the configuration of the type(s) of aircraft on which the person is to implement aircraft security searches;
ability to identify prohibited articles;
ability to respond appropriately to the detection of prohibited articles;
knowledge of how prohibited articles may be concealed;
ability to implement aircraft security searches to a standard sufficient to reasonably ensure the detection of concealed prohibited articles.
In addition, where the person holds an airport identification card, training shall also result in all of the following competences:
knowledge of previous acts of unlawful interference with civil aviation, terrorist acts and current threats;
knowledge of the legal framework for aviation security;
knowledge of the objectives and organisation of aviation security, including the obligations and responsibilities of persons implementing security controls;
understanding of the configuration of the screening checkpoint and the screening process;
awareness of access control and relevant screening procedures;
knowledge of airport identification card used at the airport.
11.2.3.7Training of persons implementing aircraft protection shall result in all of the following competencies:
knowledge of how to protect and prevent unauthorised access to aircraft;
knowledge of procedures for sealing aircraft, if applicable for the person to be trained;
knowledge of identification card systems used at the airport;
knowledge of procedures for challenging persons and of circumstances in which persons should be challenged or reported; and
knowledge of emergency response procedures.
In addition, where the person holds an airport identification card, training shall also result in all of the following competences:
knowledge of previous acts of unlawful interference with civil aviation, terrorist acts and current threats;
knowledge of the legal framework for aviation security;
knowledge of the objectives and organisation of aviation security, including the obligations and responsibilities of persons implementing security controls;
understanding of the configuration of the screening checkpoint and the screening process;
awareness of access control and relevant screening procedures.
11.2.3.8Training of persons implementing baggage reconciliation shall result in all of the following competencies:
knowledge of previous acts of unlawful interference with civil aviation, terrorist acts and current threats;
awareness of the relevant legal requirements;
knowledge of the objectives and organisation of aviation security, including the obligations and responsibilities of persons implementing security controls;
ability to respond appropriately to the detection of prohibited articles;
knowledge of emergency response procedures;
knowledge of passenger and baggage reconciliation requirements and techniques;
knowledge of protection requirements for air carrier materials used for passenger and baggage processing.
In addition, where the person holds an airport identification card, training shall also result in all of the following competences:
understanding of the configuration of the screening checkpoint and the screening process;
awareness of access control and relevant screening procedures;
knowledge of airport identification cards used at the airport;
knowledge of reporting procedures;
ability to respond appropriately to security related incidents.
11.2.3.9Training of persons implementing security controls for cargo and mail other than screening shall result in all of the following competencies:
knowledge of previous acts of unlawful interference with civil aviation, terrorist acts and current threats;
awareness of the relevant legal requirements;
knowledge of the objectives and organisation of aviation security, including the obligations and responsibilities of persons implementing security controls in the supply chain;
knowledge of procedures for challenging persons and of circumstances in which persons should be challenged or reported;
knowledge of reporting procedures;
ability to identify prohibited articles;
ability to respond appropriately to the detection of prohibited articles;
knowledge of how prohibited articles may be concealed;
knowledge of protection requirements for cargo and mail;
knowledge of transportation requirements, if applicable.
In addition, where the person holds an airport identification card, training shall also result in all of the following competences:
understanding of the configuration of the screening checkpoint and the screening process;
awareness of access control and relevant screening procedures;
knowledge of identification cards in use;
ability to respond appropriately to security related incidents.
11.2.3.10Training of persons implementing security controls for air carrier mail and materials, in-flight supplies and airport supplies other than screening shall result in all of the following competencies:
knowledge of previous acts of unlawful interference with civil aviation, terrorist acts and current threats;
awareness of the relevant legal requirements;
knowledge of the objectives and organisation of aviation security, including the obligations and responsibilities of persons implementing security controls;
knowledge of procedures for challenging persons and of circumstances in which persons should be challenged or reported;
knowledge of reporting procedures;
ability to identify prohibited articles;
ability to respond appropriately to the detection of prohibited articles;
knowledge of how prohibited articles may be concealed;
knowledge of protection requirements for air carrier mail and materials, in-flight supplies and airport supplies, as applicable;
knowledge of transportation requirements, if applicable.
In addition, where the person holds an airport identification card, training shall also result in all of the following competences:
understanding of the configuration of the screening checkpoint and the screening process;
awareness of access control and relevant screening procedures;
knowledge of identification cards in use;
ability to respond appropriately to security related incidents.
11.2.4Specific training for persons directly supervising persons implementing security controls (supervisors)
Specific training of supervisors shall, in addition to the competencies of the persons to be supervised, result in all of the following competencies:
knowledge of the relevant legal requirements and how they should be met;
knowledge of supervisory tasks;
knowledge of internal quality control;
ability to respond appropriately to the detection of prohibited articles;
knowledge of emergency response procedures;
ability to provide mentoring and on-the-job training and to motivate other.
In addition, where the designated tasks of the person concerned so require, that training shall also result in all of the following competences:
knowledge of conflict management;
knowledge of the capabilities and limitations of security equipment or screening methods used.
11.2.5Specific training for persons with general responsibility at national or local level for ensuring that a security programme and its implementation meet all legal provisions (security managers)
Specific training of security managers shall result in all of the following competencies:
knowledge of the relevant legal requirements and how they should be met;
knowledge of internal, national ... and international quality control;
ability to motivate others;
knowledge of the capabilities and limitations of security equipment or screening methods used.
11.2.6Training of persons other than passengers requiring unescorted access to security restricted areas
11.2.6.1Persons other than passengers requiring unescorted access to security restricted areas and not falling under points 11.2.3 to 11.2.5 and 11.5 shall receive security awareness training before being issued with an authorisation granting unescorted access to security restricted areas.
For objective reasons, the appropriate authority may exempt persons from this training requirement if their access is limited to areas in the terminal accessible to passengers.
11.2.6.2Security awareness training shall result in all of the following competencies:
knowledge of previous acts of unlawful interference with civil aviation, terrorist acts and current threats;
awareness of the relevant legal requirements;
knowledge of the objectives and organisation of aviation security, including the obligations and responsibilities of persons implementing security controls;
understanding of the configuration of the screening checkpoint and the screening process;
awareness of access control and relevant screening procedures;
knowledge of airport identification cards used at the airport;
knowledge of reporting procedures;
ability to respond appropriately to security related incidents.
11.2.6.3Each person undergoing security awareness training shall be required to demonstrate understanding of all subjects referred to in point 11.2.6.2 before being issued with an authorisation granting unescorted access to security restricted areas.
11.2.7Training of persons requiring general security awareness
General security awareness training shall result in all of the following competencies:
knowledge of previous acts of unlawful interference with civil aviation, terrorist acts and current threats;
awareness of the relevant legal requirements;
knowledge of the objectives and organisation of aviation security in their working environment, including the obligations and responsibilities of persons implementing security controls;
knowledge of reporting procedures;
ability to respond appropriately to security related incidents.
Each person undergoing general security awareness training shall be required to demonstrate understanding of all subjects referred to in this point before taking up duty.
This training shall not apply to instructors falling under point 11.5.
11.3CERTIFICATION OR APPROVAL
11.3.1Persons performing tasks as listed in points 11.2.3.1 to 11.2.3.5 shall be subject to:
an initial certification or approval process; and
for persons operating x-ray or EDS equipment, recertification at least every 3 years; and
for all other persons, recertification or reapproval at least every 5 years.
Persons performing tasks as listed in point 11.2.3.3 may be exempted from these requirements if they are only authorised to implement visual checks and/or hand searches.
11.3.2Persons operating x-ray or EDS equipment shall, as part of the initial certification or approval process, pass a standardised image interpretation test.
11.3.3The recertification or re-approval process for persons operating x-ray or EDS equipment shall include both the standardised image interpretation test and an evaluation of operational performance.
11.3.4Failure to undertake or successfully complete recertification or reapproval within a reasonable timescale, not normally exceeding 3 months, shall result in the related security entitlements being withdrawn.
11.3.5Certification or approval records shall be kept for all persons certified or approved, respectively, for at least the duration of their contract.
11.4RECURRENT TRAINING
11.4.1Persons operating x-ray or EDS equipment shall be subject to recurrent training consisting of image recognition training and testing. This shall take the form of:
classroom and/or computer based training; or
on-the-job TIP training, on condition that a TIP library of at least 6 000 images, as specified below, is employed on the x-ray or EDS equipment used and the person works with this equipment during at least one third of his working hours.
...
For classroom and/or computer based training, persons shall be subject to image recognition training and testing for at least 6 hours in every 6 month period, using either:
an image library containing at least 1 000 images of at least 250 different threat articles, including images of component parts of threat articles, with each article captured in a variety of different orientations, and arranged to provide an unpredictable selection of images from the library during the training and testing; or
the most frequently missed TIP images from the TIP library in use combined with images of recently captured threat articles relevant for the type of screening operation and covering all types of relevant threat articles if only used once for the training of a given screener over a three-year period.
For on-the-job TIP training, the TIP library shall consist of at least 6 000 images of at least 1 500 different threat articles, including images of component parts of threat articles, with each article captured in a variety of different orientations.
11.4.2Evaluation of the performance of individual screeners shall be carried out at the end of every 6 month period. The results of this evaluation:
shall be provided to the person and recorded;
shall be used to identify weaknesses and inform future training and testing adapted to address those weaknesses; and
may be taken into consideration as part of the recertification or re-approval process.
11.4.3Persons performing tasks as listed under point 11.2 other than those referred to in point 11.4.1 and 11.4.2 shall undergo recurrent training at a frequency sufficient to ensure that competencies are maintained and acquired in line with security developments.
Recurrent training shall be conducted:
for competencies acquired during initial basic, specific and security awareness training, at least once every 5 years or, in cases where the competencies have not been exercised for more than 6 months, before return to security duties; and
for new or extended competencies, as required to ensure that persons implementing, or responsible for implementing, security controls are promptly made aware of new threats and legal requirements by the time they have to be applied.
The requirements under (a) shall not apply to competencies acquired during specific training which are no longer required for the person's designated tasks.
11.4.4Records of recurrent training shall be kept for all persons trained for at least the duration of their contract.
11.5QUALIFICATION OF INSTRUCTORS
11.5.1Instructors shall at least fulfil all of the following requirements:
the successful completion of a background check in accordance with point 11.1.3 ;
competency in instructional techniques;
knowledge of the work environment in the relevant aviation security field;
competency in the security elements to be taught.
Certification shall at least apply to those instructors authorised to give training defined in points 11.2.3.1 to 11.2.3.5 and in points 11.2.4 (unless it concerns the training of supervisors exclusively supervising persons referred to in points 11.2.3.6 to 11.2.3.10) and 11.2.5.
Instructors shall be subject to recertification at least every 5 years.
11.5.2Instructors shall receive regular training or information on developments in the relevant fields.
11.5.3The appropriate authority shall maintain or have access to lists of instructors operating in the United Kingdom .
11.5.4If the appropriate authority is no longer satisfied that training delivered by an instructor is resulting in persons having the relevant competencies, or where the instructor fails the background check, it shall either withdraw approval of the course or ensure that the instructor is suspended or removed from the list of instructors, as appropriate. Where such action is taken, the appropriate authority shall also specify how the instructor may apply to have the suspension lifted, be reinstated on the list of instructors or have the course approval reinstated.
11.5.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11.6... AVIATION SECURITY VALIDATION
11.6.1... Aviation security validation is a standardised, documented, impartial and objective process for obtaining and evaluating evidence to determine the level of compliance of the validated entity with requirements set out in Regulation (EC) No 300/2008 and its implementing acts.
11.6.2... Aviation security validation
... Aviation security validation:
may be a requirement for obtaining or maintaining a legal status under Regulation (EC) No 300/2008 and its implementing acts;
may be performed by an appropriate authority or a validator approved as ... aviation security validator or a validator recognised as equivalent to it, in accordance with this Chapter;
shall assess security measures applied under the responsibility of the validated entity or parts thereof for which the entity seeks validation. At least, it shall consist of:
an evaluation of security relevant documentation, including the validated entity's security programme or equivalent; and
a verification of the implementation of aviation security measures, which shall include an on-site verification of the validated entity's relevant operations, unless otherwise stated;
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11.6.3Approval requirements for ... aviation security validators
11.6.3.1The appropriate authority shall approve ... aviation security validators based on conformity assessment capacity, which shall comprise:
independence from the validated industry, unless otherwise stated; and
appropriate personnel competence in the security area to be validated as well as methods to maintain such competence at the level referred to in 11.6.3.5; and
the functionality and appropriateness of validation processes.
11.6.3.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11.6.3.3An ... aviation security validator may be any individual or a legal entity.
11.6.3.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11.6.3.5Every individual performing ... aviation security validation shall have appropriate competence and background, and shall meet all of the following requirements:
have been subject to a background check in accordance with 11.1.3 that shall be recurrent at least every five years;
perform ... aviation security validation impartially and objectively, shall understand the meaning of independence and apply methods to avoid situations of conflict of interest in respect of the validated entity;
have sufficient theoretical knowledge and practical experience in the field of quality control as well as respective skills and personal attributes to collect, record and assess findings based on a checklist, in particular regarding:
compliance monitoring principles, procedures and techniques;
factors affecting human performance and supervision;
the role and powers of the validator, including on conflict of interest;
provide proof of appropriate competence based on training and/or a minimum work experience in respect of the following areas:
general aviation security principles of ... ICAO aviation security standards;
specific standards related to the activity validated and how they are applied to operations;
security technologies and techniques relevant for the validation process;
undergo recurrent training at a frequency sufficient to ensure that existing competencies are maintained and new competencies are acquired to take account of developments in the field of aviation security.
11.6.3.6The appropriate authority shall either itself provide training for EU aviation security validator or approve and maintain a list of appropriate security training courses.
11.6.3.7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11.6.3.8The approval of an ... aviation security validator shall expire after a maximum period of five years.
11.6.4Recognition and discontinuation of ... aviation security validators
11.6.4.1An ... aviation security validator shall not be considered as approved until its details are recorded by the appropriate authority . Every ... aviation security validator shall be provided with proof of its status by or on behalf of the appropriate authority. ...
11.6.4.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11.6.4.3When the appropriate authority is no longer satisfied that an ... aviation security validator meets the requirements referred to in points 11.6.3.1 or 11.6.3.5, it shall withdraw the approval and remove the validator from the its record.
11.6.4.4Industry associations and entities under their responsibility operating quality assurance programmes may be approved as ... aviation security validators provided equivalent measures of those programmes ensure impartial and objective validation. ...
11.6.4.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11.6.5... Aviation security validation report (‘the validation report’)
11.6.5.1A validation report, where required, shall record the ... aviation security validation and contain at least:
a completed checklist signed by the ... aviation security validator including, where requested, comments by the validated entity in the necessary detail; and
a declaration of commitments signed by the validated entity; and
an independence declaration in respect of the entity validated signed by the individual performing the ... aviation security validation.
11.6.5.2The ... aviation security validator shall establish the level of compliance with the objectives contained in the checklist and record these findings in the appropriate part of the checklist.
11.6.5.3A declaration of commitment shall state the validated entity's commitment to continue operation under the successfully validated operation standards.
11.6.5.4The validated entity may declare its agreement or disagreement to the validation report's established compliance level. Such a declaration shall become an integral part of the validation report.
11.6.5.5Page numbering, date of the ... aviation security validation and initialling by the validator and the validated entity on each page shall prove the validation report's integrity. Manual initialling on each page may be replaced by an electronic signature of the entire document.
11.6.5.6By default the report shall be in English and delivered to the appropriate authority, where applicable, along with the validated entity within a maximum of one month after the on-site verification.
11.7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11.7.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 11-A INDEPENDENCE DECLARATION — ... AVIATION SECURITY VALIDATOR
I confirm that I have established the level of compliance of the validated entity in an impartial and objective way.
I confirm that I am not, and have not in the preceding two years, been employed by the validated entity.
I confirm that I have no economic or other direct or indirect interest in the outcome of the validation activity, the validated entity or its affiliates.
I confirm that I have, and have had in the preceding 12 months no business relations such as training and consultancy beyond the validation process with the validated entity in areas related to aviation security.
I confirm that the ... aviation security validation report is based on a thorough fact finding evaluation of relevant security documentation, consisting of:
the validated entities' security programme or equivalent, and
an on- site verification of the implementation thereof.
I confirm that the ... aviation security validation report is based on an assessment of all security relevant areas on which the validator is required to give an opinion based on the relevant ... checklist.
I confirm that I have applied a methodology that allows for separate ... aviation security validation reports in respect of each entity validated and ensures objectivity and impartiality of the fact finding and evaluation, where several entities are being validated in a joint action.
I confirm that I accepted no financial or other benefits, other than a reasonable fee for the validation and a compensation of travel and accommodation costs.
I accept full responsibility for the ... aviation security validation report.
Name of the validated entity:
Name of the ... aviation security validator:
Date:
Signature:
12.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.0.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.10. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.12. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.13. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12.14. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-A
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-B
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-C
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-D
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-E
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-F
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-G
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-H
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-I
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-J
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-K
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-L
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-M
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-N
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ATTACHMENT 12-O
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Commission Decision (EU, Euratom) 2015/444 of 13 March 2015 on the security rules for protecting EU classified information (OJ L 72, 17.3.2015, p. 53).
Commission Regulation (EU) No 185/2010 of 4 March 2010 laying down detailed measures for the implementation of the common basic standards on aviation security (OJ L 55, 5.3.2010, p. 1).
Regulation (EC) No 300/2008 of the European Parliament and of the Council of 11 March 2008 on common rules in the field of civil aviation security and repealing Regulation (EC) No 2320/2002 (OJ L 97, 9.4.2008, p. 72).
Commission Decision (EU, Euratom) 2015/444 of 13 March 2015 on the security rules for protecting EU classified information (OJ L 72, 17.3.2015, p. 53).
Commission Regulation (EU) No 185/2010 of 4 March 2010 laying down detailed measures for the implementation of the common basic standards on aviation security (OJ L 55, 5.3.2010, p. 1).
Regulation (EC) No 300/2008 of the European Parliament and of the Council of 11 March 2008 on common rules in the field of civil aviation security and repealing Regulation (EC) No 2320/2002 (OJ L 97, 9.4.2008, p. 72).