DVD ISPS & MTSA Maritime Security Training Series
![]() BUY NOW |
Maritime Security Emergency Film Group is offering an important new series about a critical and timely subject - vessel and port security. The International Maritime Organization's (IMO) International Ship and Port Facility Security Code (ISPS) and the U.S. Maritime Port Security Act of 2002 (MTSA) require training for port and vessel security personnel. These 11 programs are a series of classroom presentations by Kim Peterson, a noted maritime security authority. As such, the programs are quite different from the usual Emergency Film Group production, although the information is equally authoritative and accurate. The series was produced by Moxie Media and Sea Secure. helps vessel operators, ports and facilities managers address the evolving needs of the maritime industry in the implementation of maritime security management systems. These programs provides a way to train maritime employees in the mandatory instruction required by the International Maritime Organization and the U.S. Coast Guard. The course is designed for Port Facility Security Officers, Company Security Officers, Ship Security Officers, crew with security duties, Port State Control Officers, maritime executives, and other appropriate crew members, port personnel, and maritime security organization members. The curriculum adopts and illustrates the approach taken by the ISPS Code. About maritime training requirements The ISPS Code as well as the MTSA require Federal agencies, ports, and vessel owners to take numerous steps to upgrade security and to address anti-terrorism and anti-piracy procedures. Also required is specialized maritime security training for port facility and vessel personnel. Non-compliance with ISPS and MTSA requirements can result in ships being refused issue of the required International Ship Security Certificate, thereby jeopardizing future visits by ships. And without proper training of their personnel, both ships and ports face increased liability in the event of a security incident. See program descriptions below. |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|