This is very important because when your file will be infected you may not clean all infected code, so in this situation you can restore your files
Disable File Edit
WordPress has built in code editor under Appearance menu which allows you to edit your theme and plugin files from your WordPress admin area. You should disable it. You can add code in wp-config.php files
Add below code to WordPress functions.php. This code contains the WordPress action & filter hook and the corresponding callback function. The callback contains code for restricting number of invalid login attempts.
function check_attempted_login( $user, $username, $password ) {
if ( get_transient( 'attempted_login' ) ) {
$datas = get_transient( 'attempted_login' );
if ( $datas['tried'] >= 3 ) {
$until = get_option( '_transient_timeout_' . 'attempted_login' );
$time = time_to_go( $until );
return new WP_Error( 'too_many_tried', sprintf( __( '<strong>ERROR</strong>: You have reached authentication limit, you will be able to try again in %1$s.' ) , $time ) );
}
}
return $user;
}
add_filter( 'authenticate', 'check_attempted_login', 30, 3 );
function login_failed( $username ) {
if ( get_transient( 'attempted_login' ) ) {
$datas = get_transient( 'attempted_login' );
$datas['tried']++;
if ( $datas['tried'] <= 3 )
set_transient( 'attempted_login', $datas , 300 );
} else {
$datas = array(
'tried' => 1
);
set_transient( 'attempted_login', $datas , 300 );
}
}
add_action( 'wp_login_failed', 'login_failed', 10, 1 );
function time_to_go($timestamp)
{
// converting the mysql timestamp to php time
$periods = array(
"second",
"minute",
"hour",
"day",
"week",
"month",
"year"
);
$lengths = array(
"60",
"60",
"24",
"7",
"4.35",
"12"
);
$current_timestamp = time();
$difference = abs($current_timestamp - $timestamp);
for ($i = 0; $difference >= $lengths[$i] && $i < count($lengths) - 1; $i ++) {
$difference /= $lengths[$i];
}
$difference = round($difference);
if (isset($difference)) {
if ($difference != 1)
$periods[$i] .= "s";
$output = "$difference $periods[$i]";
return $output;
}
}
Change Default Admin username if any. If not you are not able to delete user, make him subscriber.
Change WordPress Database wp_ Prefix
We can change it tow ways. One is Plugin Installation and custom SQL mode.
We can change it both custom more or with SQL command. The steps given below –
Step 1 – Change all table prefix in wp-config.php. Edit below prefix from File Manager
$table_prefix = ‘wp_’;
Change as
$table_prefix = ‘wprmg_’;
Now Save the file
Step 2 – Change all table prefix in database
Click on database name > Select all table start with wp_ ; > Click With selected to open drop down > With selected > Type in wp_ in the From-field, and type wprmg_ in To-field, wprmg_ > Click Continue for change
Step 3 – Replace all references into the old prefix
WordPress still contain to the old table prefix. To all changing the prefix, you need to replace these with new prefix.
Now go to SQL command in phpmyadmin and copy and paste the following commands
update NEWPREFIX_usermeta set meta_key = 'NEWPREFIX_capabilities' where meta_key = 'OLDPREFIX_capabilities';
update NEWPREFIX_usermeta set meta_key = 'NEWPREFIX_user_level' where meta_key = 'OLDPREFIX_user_level';
update NEWPREFIX_usermeta set meta_key = 'NEWPREFIX_autosave_draft_ids' where meta_key = 'OLDPREFIX_autosave_draft_ids';
update NEWPREFIX_options set option_name = 'NEWPREFIX_user_roles' where option_name = 'OLDPREFIX_user_roles';
Replace OLDPREFIX and NEWPREFIX, with your own old and new prefix. Like in the example below, where we replace wp_ with david_:
update david_usermeta set meta_key = 'david_capabilities' where meta_key = 'wp_capabilities'; update david_usermeta set meta_key = 'david_user_level' where meta_key = 'wp_user_level'; update david_usermeta set meta_key = 'david_autosave_draft_ids' where meta_key = 'wp_autosave_draft_ids'; update david_options set option_name = 'david_user_roles' where option_name = 'wp_user_roles';
Click on Go to run the commands and complete the change.
Change Default Login URL Without Plugin
Process 1: WordPress default URL: /wp-login.php or /wp-admin
At first go to public_html
Then take backup wp-login.php file
Then rename wp-login.phpinto any namen like mashiur.php
Then open file mashiur.php in any editor like notepad++
Then Replace all wp-login.php into mashiur.php (Generally 12 file will replace)
Finally it is done. Now go to your new URL and login
Process 2: Add the following code to your .htaccess file to change the name of your login URL: 01 RewriteRule ^mynewlogin$ http://www.yoursite.com/wp-login.php [NC,L]
Process 3: Plugin Installation
Prevent PHP direct execution on sensitive directories
Directories such as “wp-content” and “wp-includes” are generally not intended to be accessed by any user, consider hardening them via Sucuri Security -> Settings -> Hardening.
Disable SSH Access
By default it may open. 99% hacker try to login with SSH console. So must disable it
Configure Brute Force Protection
You can protect from WordPress Plugin, cPanel, WHM, VPS, even form dedicated server control panel
Jetpack Security :
User Free feature of Jetpack plugin to protect brute force attack
cPhulk Brute Force Protection Configure
Disable XML-RPC in WordPress
domain.com/xmlrpc.php XML-RPC file is required to jetpack to work. Without the xmlrpc, Jetpack will not work.
1 Click Staging
Safely test changes to your website before you roll them out to visitors without breaking your site. Staging gives you confidence to test changes before you publish without worry. It creates a copy of your site in a “sandbox” environment where you can experiment & preview changes without it affecting . When you’re ready, push your changes to your live site with a simple click!
You’ll see a link and login information abccom.stage.site
When you go here, you’ll be asked for user name / password. Its provided on the same staging tab
The staging site should be a replication of your live site.You can then login to the staging wp-admin and make the changes there
Remember, your changes in the staging will not affect the live site.If you like the changes you made on the staging site and want to push to the live site, you can request that on the staging tab
(M) Sucuri Security – Auditing, Malware Scanner and Security Hardening
(N) Titan Anti-spam & Security
(O) WP Activity Log
(P) Anti-Malware Security and Brute-Force Firewall
(Q) Hide My WP Ghost – Security Plugin
Free Features
Block spam comments
Brute force attacks to hack password
Brute force attacks to identify account name
Two-factor authentication (2FA)
CAPTCHA stops bots from logging in
Google reCAPTCHA for against spammers.
Limit Login attempt
Custom Login URL
WordPress.com powered login & 2FA for extra protection
Back up your site automatically and restore
Set a maximum password age and force users to choose a new password
Security Protection for WordPress login form
Security Protection for WordPress backend
Uptime / downtime monitoring
Checks core files, themes and plugins for malware
Activity log and Alert to admin for file editing
Repair files that have changed by overwriting them with a pristine, original version.
Checks your content safety by scanning file contents, posts and comments for dangerous URLs and suspicious content
Block logins for administrators using known compromised passwords.
Firewall identifies & blocks malicious traffic
Blocks requests that include malicious code & content.
Temporary Privilege Access permissoin
Login masking – change the location of WordPress’s default login area Login lockout – failed login attempts lockout 404 Detection – automated block of bot IPs Geolocation IP lockout – block users based on location and country (IP blocking) WordPress Security Firewall – block or whitelist IPs Disable trackbacks and pingbacks – spam prevention Change default database prefix – they won’t find this Disable file editor – if they get in, they won’t get far Prevent PHP execution – because it’s daaaangerous Permit or restrict access by White IP Access list and Black IP Access List with a single IP, IP range or subnet. Cerber anti-spam engine for protecting contact and registration forms. Protects wp-login.php, wp-signup.php and wp-register.php from attacks. Hides wp-admin (dashboard) if a visitor isn’t logged in. Immediately blocks an intruder IP when attempting to log in with non-existent or prohibited username. Restrict user registration or login with a username matching REGEX patterns. Block access to XML-RPC (block access to XML-RPC including Pingbacks and Trackbacks).
Security Development -The security assessment carried out on 24 April 2008, clearly depicts some distinct security guard which must be mended as soon as possible. As some problem may take some time to be fixed as such a sixth monthly module is hereby being created to bridge the deficiencies and make the security…
By the end of May 2008, letter will be sent to the home address of all workers for Police Verification. Sufficient lighting is arranged in the loading and un-loading areas to prevent un-authorized activities.
Within the month of May letters will be to the home address of all staffs for Police Verification.
A proper system of retrieval of access control items from lefty workers. Private parking area will be separated from loading and un-loading areas by means of physical barrier if necessary.
Intruder detection system will have to be developed in many way where by any instruction can be detection.
By the end of Jun 2008, those of who could not be verified with background checks will be completed.
Security personnel will be posted in all restricted areas and prevent un-authorized entry into packing areas, stores, finished goods area and loading /un-loading areas. Employee orientation on all security matters will be completed.
Perimeter security to be made more effective by enhancing number of security patrols.
ISO Bolt Seal 17762 will be introduced for all shipment purpose. Adequate security will be posted covering the entire factory premises to prevent un-lawful entry and damaged of the factory property.
By the end of July2008, all remaining workers pr staff whose background check couldn’t be completed will be complete.
Car Parking Area to be extended and made bigger.
Number of CCTV to be increased and all entry/exit points to be covered.
Background check of contractors will be verified for correctness.
Background Check of all remaining workers and staff will be completed.
Background Check of the forwarders will be conducted.
Port Security will be evaluated. Security personnel will be posted at all entry / exit points to verify identity and un-lawful entry into the premise.
CCTV will be increased to include all production floors.
Background check of all remaining staff and workers will be completed.
Flammable, toxic, dangerous chemicals will be stored in a separate and secure place of the building and all precaution will be taken for appropriate storage stop pilferage /misuse. Number of CCTV will be enhanced to include all stores.
New workers orientation to be reviewed to include new aspects of security.
Background check of all employees which could not be done will be completed.
Security Development- A detailed assessment will be done to review the position of security standard then. Packing and finished goods area will be segregated from the rest of the working floor by means of physical barrier and will be restricted from easy access.
More Duties
Upon closer of the factory, representative of security section, electric unit, HR personnel and working floor will be check jointly and ensure all lights, fans, electrical mains/circuits/switches switched off, water taps and doors locked and sealed.
Separeted Employees Log
ID Card Issue Log
ID Card Replacement /Re-Issue Log
ID Card Return Log
Factory Opening & Closing Log
Short Leave /Gate Pass Log
Shortage/Overage Reporting Log
Employees Movement Log
Container /Covered Van Inspection Log
Export Register
Seal/Lock Usage Log
CCTV Monitoring Log
Visitor,s Vehicle Checking Log
Incoming Mail / Parcel Checking Log
Employee,s Late Entry Log
Visitor,s Log
Vehicles In/ Out Register
Key Received And Return
Security Patrol Duty Register
Factory Security Assessment
Factory will installed security arch or commission hand held battery operated metal detector at the entrance of building to monitor entry of un authorized materials by worker / staff and visitors.
The intrusion detection or alarm system has back-up power and is tested regularly.
A record is maintained of employee access to keys, cards or codes.
Facility utilizes card or code activated locking devices to protect controlled areas?
Keys / cards are returned or codes are changed when an employee leaves the company?
Procedures exist to immediately terminate existing physical areas when an employee terminates employment or transfers to another position?
Management is provided with a current list of all employee access privileges on a monthly basis?
All facility buildings are constructed of materials that prevent unlawful entry and are kept in good repair?
There is a policy that requires that all security procedures are documented?
The facility has a security department / personnel?
There is a designated security chief at the facility?
An appointed official is responsible for facility, employees and transport security?
An appointed facility official is responsible for security audits for evaluations?
A facility security plan is developed and is reviewed / updated semi – annually?
A site security assessment is conducted quarterly to identify vulnerabilities and necessary corrective actions?
Personnel security procedures are written and evaluated quarterly?
Personnel security procedures are evaluated in response to security failures?
Personnel security requirements apply to contracting temporary and part time employees?
Employment applications are required for all applicants?
The security will have only access to perimeter lighting switch box as well as external door alarm system. All applicants are interviewed?
When allowed by law, background checks are conducted on all applicants?
Applicant background check includes employment history, reference check and criminal records check?
The applicant’s examined identification includes a national ID and Birth Certificates?
When allowed by law, background checks are updated on all employees?
A permanent personnel file is maintained for each employee with the employee’s name, date of birth, and a national ID number?
Checks will be made on alternate days for damaged /broken identification of perimeters walls, building, doors and windows by security personnel and report to the management. The facility retains a copy of the employee’s official identification?
A facility issued a photo-badge is required for employee access?
Issue of employee identification is centralized and controlled by a specific dept. and restricted to limited authorized employees?
Procedures are used to retrieve an employee ID and / or deactivate access as needed?
Lost IDs are recorded as missing before replacement and security staff informed?
A specific color coded ID is required to access restricted areas
Security guards monitor access to facility restricted areas?
New employee orientation includes confirming that anytime onsite the facility requires wearing an ID badge?
New employee orientation includes undefined persons, breach of computer security and internal conspiracies?
New employees are asked to report compromised to security infrastructure such as broken locks, windows and facility structure?
The facility has a documented security awareness program in place for all employees to include training participation?
Employees are encouraged to report irregularities, suspicious activity and security violations through an incentive program?
Security procedures are publicized throughout the facility on posters and bulletin boards?
Duty roster of all security personnel will be prepared for 24 hours a day covering all entry /exit points and entire compound and approved by the management. The facility of Security Developmenthas an intrusion detection ( or alarm system?
Security Patrol Services- This training is to be conducted by the security officer and if he is not able to attend the training the second in command will carry on the programme The guards shall, particularly, but not limited to, be attentive to the following during their patrols or observations: …
They will observe any illegal activities, anomalies, any suspected activities or materials and performance of security personnel. Border/Fence lines, especially portions susceptible to intrusion from outside.
If there is any observance or discrepancies they will note down into the patrol register which is previously kept at the security post. Inside or behind buildings, structures, etc.
If patrol duty finds any seAuto us or major violation he immediately will inform to the management through administration. Where doors and windows are unlocked or broken.
If the requirements is major in demand the may call the law enforcement department through phone. Materials or places that may cause fires.
This anti-terrorism programme must be included the following points: Leaks of water, gases, oils or fuels.
Security and Construction lights.
Any acts violating the rules.
Suspicious individuals.
The timing, frequency and routes of patrols shall vary and shall not develop into a regular pattern.
Fence lines shall be adequately patrolled daily to ensure that there are no breaches in any way, but where so, immediate action shall be taken to re-secure.
At any openings in the fence for construction purposes shall be manned at all times.
Areas surrounded by fencing shall be secured by guards at guard huts, and other areas shall be secured by patrolling periodically.
EMERGENCY
Fire
Border/Fence lines, especially portions susceptible to intrusion from outside.
Each and every security personnel must require participating training everyday early in the morning and evening for two hours. First one hour for physical exercise, another hour for security procedure and anti-terrorism awareness programme. Inside or behind buildings, structures, etc.
Where doors and windows are unlocked or broken.
Materials or places that may cause fires.
Leaks of water, gases, oils or fuels.
Security and Construction lights.
Any acts violating the rules.
Suspicious individuals.
The timing, frequency and routes of patrols shall vary and shall not develop into a regular pattern.
Fence lines shall be adequately patrolled daily to ensure that there are no breaches in any way, but where so, immediate action shall be taken to re-secure.
At any openings in the fence for construction purposes shall be manned at all times.
Areas surrounded by fencing shall be secured by guards at guard huts, and other areas shall be secured by patrolling periodically.
EMERGENCY
Fire
The following records shall be kept for duration of three months.
Security Patrol Log
Applications for I. 0 cards
Applications for Vehicle/Equipment permit
Questionnaires
Doors, windows, or fence open or broken?
All gates are kept locked?
Any property damage noted?
Fire hazards observed?
Violations of rules?
Any suspicious individuals?
Any trespassers?
All materials taken out with a material pass?
Any Security Lights off?
Others? If any, specify?
Physical Security Patrol
The factory is located in an industrial area and its perimeter is enclosed with proper fencing or boundary wall. Security guards will make routine patrol along the fencing to ensure there is no insurgency, breakage or illegal entry through the fence line.
Cargo will be received or delivered from the designated cargo handling area and incoming cargo will be stored on the designated store area by the storekeeper and segregated as per the storage policy of the company. Similarly outbound finished goods will be delivered from the designated finished goods section following the procedures.
Outside fencing and inside storage area, its doors, windows and locks will be regularly inspected by the department in charge and security personnel on a regular basis for maintaining integrity and damage.
The factory premise and factory building has one entry / exit controlled by a gate and manned by security guards all the time. This is done to ensure safety and maintain access control.
Private passenger vehicles are prohibited from parking inside the factory premises. Only company vehicles will be allowed to park inside the premises. During loading and unloading no vehicles except the cover van will be allowed in the premises. Loading and unloading area is marked separately and no vehicles will be allowed to park there. Vehicle in and out register maintained by the security guard posted at the gate.
The factory building is built of RCC structure. Collapsible and shutter gates are used for all entry and exits of the A building maintenance register is maintained by the management. This will ensure the integrity of the structure by periodic inspection and repair when needed. Inspections will be done on a monthly basis and dates and description of problems and details of maintenance work performed will be recorded in the register.
Security officer and guards will place seals and locks on every floor after the factory is closed for the working day and will also open the locks and seals at the time of opening the working day. The floor in charge and Assistant Factory Manager will also need to accompany the security officer at the time of placing and opening the seal or lock. Any discrepancy or tampering on the seals or locks must be immediately reported to Manager Administration. A register will be maintained to this affect that will contain the information and observation during opening and closing of the locks or seals. A set of keys will be kept with the security in charge and another set will be kept with the management. If any maintenance work is carried out or if workers need to work on the floor after the normal factory working hours it must be reported to the Security Officer, Manager Administration and the concerned department in charge and time section during the usual working hours.
All entrances and exits, cargo handling areas, storages areas, fence lines and parking areas inside and outside the factory is well illuminated. Security In Charge, Floor and department in charges will work with the maintenance personnel to ensure this facility.
The factory has internal and external communication system. PABX system allows the office to contact with the floors aside from the P.A system. Floor In charge and Department In Charges can contact each other and the office with the walky-talkies provided to them. In case of emergency the fire alarms can be activated and calls can be placed to the concerned authorities. Security can contact the concerned authorities by dialing external numbers. A list of the numbers in cases of emergency is posted on the security and reception desk.
Security Guards and Officer will alternately make routine patrols during factory open and closed hours in and around the building to ensure there are no infiltrations or unauthorized entry or break ins. If there is any sign of any unlawful entry then please report immediately to security officer or manager administration and the concerned authority.
Conclusion
Security Patrol -Factory CCTV camera at the following locations. Main gate to monitor the entry and exit of workers and visitors Container loading area to monitor the loading and unloading of import and export trucks. Carton storage area to monitor and see that no unauthorized persons enter the area.The recordings are kept for a period of 30 days.
Security Guard Management – This security management plan shall define measures to be in place during the construction and commissioning phases of the project. The plan shall specify the minimum-security requirements applicable to the protection of employees, property and the workplace in all 8MI operations, and elsewhere in connection with the execution of the project. The plan shall apply to all premises controlled by the 8MI during the construction and commissioning phases, and all persons accessing such premises during these phases. Reporting directly to the Project Manager, he shall; …
Security Training and Threat Awareness:
All employees are highly encouraged to report any security related anomalies or any discrepancies or any illegal activities to your Supervisor or the Floor In Charge in person.
If your concern is not addressed then you are encouraged to report to the Security officer or Administration Manager or General Manager either through the complain or suggestion box or in person. The suggestion box is located in the ground floor in an easily accessible location. Manage, review and develop the security operation to ensure that it fulfils project requirements.(e.g. install electronic entry system as soon as possible)
If you prefer your identity not to be disclosed, your identity will not be revealed during the investigation process and awards will be given if specific charges can be proved.Prepare security procedures and associated documentation necessary to fulfill the purpose of this security plan.
Periodic audits will be performed from time to time to test the security procedures in practice and check its performance and asses the potential gap and areas of improvemen Ensure that the security resources are adequate to cover all project needs and site security operations reflect the requirements of the project.
Liaise with construction Partner/Subcontractor security management.
Ensure that appropriate Contractor and the Company staff are made aware of all security issues.
We pledge all our employees to maintain respect and adhere to the employer and employee confidentiality and not to disclose any information regarding the company to any outsider. We expect our employees to respect company’s privacy and sensitive information and not to disclose any information to the outsiders.Make a report without delay to the Project Manager when any security irregularities or breaches or incident have taken place.
Be held accountable for all undesired losses sustained on the project.
Ensure that this security plan and organization is established, and its derivative programme, procedures and work practices are implemented to provide adequate and continuous security coverage to maintain the peace of the project.
Communicate with local and governmental law enforcement bodies and security organizations in accordance with both legislative and the Company requirements.
The management of Auto Garments & Textiles Ltd with the cooperation from its valued employees wants to ensure the safety and security of all employees that work here, all things that are procured and produced at the factory and all the information related to it. Evaluate the performance of the security organization and personnel.
Periodic training sessions will be conducted by Manager Administration, Security Officer, Production Manager, Floor Managers and Supervisors to teach and train employees about the above mentioned basic security requirements of the company. Ensure that all agreed recommendations arising from investigations into theft, sabotage; unauthorized entries etc. are closed out.
Conclusion
Security Guard Management – The plan shall not apply to the Company facilities outside the worksite, where instead, arrangements and controls as determined by the Company, shall be applicable.
The plan details the criteria according to which the
duties of all concerned and/or personnel are to be carried out security
controls and services.
This plan is based on the assumption that all of the
security fencing and temporary gates are installed. Until such fencing and
gates are installed, early site security arrangements will be separately
established.
We will work together to ensure safety of man, material and information at Auto Garments & Textiles Ltd. It shall be reviewed on an ongoing basis to reflect changes in work scope, knowledge or other relevant circumstances, so as to ensure the achievement of its objectives.
It is our pleasure to welcome you at Bengal Security System (BESS). The BESS intends to ensure your security in all sphere of life- your office, households, industry, educational institutions, religious establishments, market places or even in leisure places to make you feel comfortable and thereby increasing productivity and efficiency.
Security has always been an imperative part of our life. Technological revolution of modern age has pioneered the concept of electronic security systems with a widespread popularity. Protecting life and hard earned valuables is a leading concern. The BESS propagates total security in everyday reality. Think your home, office, factory or a public place where a simple gesture can open up infinity of practical possibilities for your safety. Once this is understood, you can begin to understand just how much a part we play in all this. How much research, technology, experience and support there is behind the products which, at any moment of the day, are able to satisfy large or small needs for security of life and assets.
The Bengal Electra & security System has adopted a simple approach – deliver intelligent and reliable solutions that provide peace of mind to our customers and are easy to install and maintain by System Integration partners. We provide electronic security systems that offer maximum efficiency and optimal simplicity.
Strength of the BESS
We have a strong management team who are very much committed to serve the best quality product with competitive price. We believe commitment is the key to success.
We are committed to provide a service what customer wants to implement. For that reason we have a strong marketing team that is very much familiar about current technology and ideas. The people in the team are very professional with the knowledge about the situation of our customer’s expectation. So, they are capable of sharing the best idea and will design competitive best solution what you looking for.
On the other hand we also have a very strong technical team who are working together with successful track record in same field. They are capable to accomplish all jobs within the shortest possible time and committed to serve after sales service in short time.
Attributes of the Product and Services:
Security Items
CCTV & IP Camera system:
1) CCTV camera (HD&AHD) solution with DVR based 2) IP Camera Solution with NVR based 3) IP Wireless Home Security Camera Mobile Based 4) PTZ Camera Solution 5) ZOOM Type Camera (Very focal)
Access Control & Time Attendance system:
1) Biometric Access Control & Time Attendance system 2) Proximity Access Control & Time Attendance system 3) Face Id Access Control & Time Attendance system
Metal Detector system:
Hand Held Metal Detector supply
Arch-way
Fire Alarm System:
1)Addressable Fire Alarm System 2) Conventional Fire Alarm System 3) Wireless Stand alone Fire Alarm system 4) Fire Extinguisher supply & installation 5) Fire Extinguisher Re-filling
Networking Items:
Complete Office Networking
LAN Cabling
Switching Router ,Rack ,Accessories
Trouble shooting
Configuration
Testing …..
Electronics Items : 1) Multimedia Projector
Others Products:
Video Door Call System
Auto Bugler alarms system
Proximity Card & Holders Supply
Projects Experienced by the member(s) of BESS Team
Though the Bengal Electra Security Services is comparatively new as an establishment, but its team member(s) has been experienced substantially in working with numerous partners, for instance, Sigma Group, Ananda Group, Lalon School & Collage, TRZ Group, Khulna Shipyard, Tk Group, Grace Builders Ltd, Otobi,Imran Studio, Zavi & Zayeand Group,RanksTel, Poly Cables, Azmiry United Finance, Far East composite ltd, UGI Group, Surge Communication,
Elecreo Group, Shardar Tower, Kallol Group, Sun flower School, Samadsons Group,Hasan Knitting, Power Breeze, Langka Bangla, Hall-Mark Group, BASE TEXTILES LIMITED, National Feed, GFN ACCESSORIES, RFL, J. B. TRADING, Prity Garments, Masud & Company Joy Media, SPARKLE APPARELS, Land Mark Group, ZIPLACE FASHION, PACIFIC JEANS, VIKA KOLB, Sikdar Garments, ALPHA HOMEO CARE 2, BANGLADESH
CLINIC, Bay, ATTIC BUILDERS (PVT.) LTD, Rainbo Departmental Stor, ALPHA BUILDERS LTD, Confidence, BABOR TRAVELS, Niloy Engineering Ltd., DIGNITA, Bonolota Housing at Bengal Security MOMOSHA TRADING CORPORATION, and Amena Tower
Fire Extinguishing Equipment Location Marked Floor Clear Maintenance of Equipment Storage of Flammable & Explosive Material Alarm System Fire Fighting Drills & Instructions Security System Emergency Planning Fire Prevention & Protection Coordinator
Emergency Action Plan available
To ensure safe, effective response to emergency situations.
Emergency plan devised to cover all eventualities and copies to be available to all employees on a “ need-to-know” basis.
(Enter full text Emergency Plan)
Separate first-aid-trained.
First aid teams to be appointed and listed on notice boards, First aid to be included in regular drills.
Coordinator trained to take control.
Coordinator ( and alternate ) to be appointed and trained.
( Enter details of training and copy of appointment(s)
Control Centre / Emergency equipment.
A suitable area to be designated as control centre during emergency evacuation