Single Window Case Study

840 Words4 Pages
TECHNOLOGY EVOLVING THE MARITIME SAFETY REGIME IN TERMS OF DEVELOPMENT/IMPLEMENTATION AND ENFORCEMENT To answer the emerging trends, developments and challenges of the present, IMO prepared the latest HLPA with strategic directions strongly determining the effective use of information and communication technology in management and administration as part of the plan and moreover maintaining a risk management framework. The Plan deals with recent maritime industry phenomenon’s, such as, climate change concerns and shipping digitalization, with the purpose of make the maritime activity more adaptable to changes and in constant development. According to the document the Organization will strive to facilitate the use of the best technology to drive…show more content…
The compliance support computerized systems were not developed with a view of rationalization of compliance processes. In order to solve this problem was created the concept of Single Window (SW), a single point interaction point between business and authorities. The document highlights the use of information and communication steering continuous improvement and information and the need of standardization of versions of certificates and documents including logbooks with the application of Single Window…show more content…
The matter of cyber risk management generated the guidelines of MSC 96/WP.9, stressing the importance of digitization, integration, automation and network based systems, brought the need for the maritime cyber risk management. With the extraordinary proliferation of software based systems across the maritime sector, is very important to keep these systems protected against external manipulation such as cyber-piracy and terrorist attacks. Such protection might be constrained by high implementation costs. The MSC 96 highlights the elements to support cyber risk management, which are: Identify the systems vulnerable to a cyber-attack; Protect systems to ensure continuity of operation in the event of an attack; Detect a cyber-incident in time to counteract it; Respond to a cyber-event restoring systems necessary to operate and recover it and take measures to restore cyber-systems necessary for

More about Single Window Case Study

Open Document