Vetting (private security providers)

A. Vetting requirements: managing risks around private security providers in the absence of public documentation and available background information

Good Practices

(see Adequate and appropriate private security arrangements: properly identifying risks and impacts within Private security within risk and impact assessment – Working with Private Security Providers)

  • Consult with host and home government authorities, other companies, civil society organisations and local communities.
  • Conduct research using local media, web resources and reports developed by international organisations, multi-stakeholder initiatives, civil society organisations and experts.
  • Examine applicable private security laws and other national legal requirements, in particular with regard to the issuance of business and equipment licenses and training certificates. This will provide the company with some notions of the kind of documentation that private security providers will be able to submit with their applications to bid for a contract.
  • Identify trends in cases of human rights abuses in which local private security providers have been involved.
  • Elaborate a list of all private security providers that are known to have been involved in human rights abuses and/or violations of international humanitarian law and use it as part of the criteria for automatic exclusion in the evaluation process for the selection of a private security provider (see Selecting private security providers: assessing quality and cost considerations within Bids and contracts – Working with Private Security Providers).
  • Identify if private security providers have military backgrounds, especially in contexts where the public security sector is alleged to have committed human rights abuses and/or violations of international humanitarian law.

Practical Tools

Key Resources

(see Selecting private security providers: assessing quality and cost considerations within Bids and contracts (Working with Private Security Providers).

  • Key information required for vetting private security providers should include:
    • Possession of all necessary business licenses, registrations, permits, authorisations or approvals required under applicable international and national law of the home and host States.
    • Possession of all necessary licenses, registrations, permits, authorisations or approvals required under the laws of States of nationality of private security provider personnel.
    • Sufficient evidence the security provider has implemented processes to employ qualified and experienced personnel.
    • Sufficient evidence of adequate equipment, facilities, resources and infrastructure for the timely and competent performance of the mandate.
    • Sufficient evidence of its good reputation and irreproachable business conduct.
    • Company membership and good standing in the International Code of Conduct Association (ICoCA), national industry regulatory bodies, other trade associations and/or stakeholder initiatives.
    • Company profile, including a brief history of the potential contractors, with personnel and property records, a list of previous clients and information on affiliated companies, as applicable.
    • Name changes or ownership changes.
    • Internal policies implementing international and national standards and company codes of conduct.
    • Proof of training on human rights and humanitarian law, the use of force, weapons and firearms and first aid.

(see Selecting private security providers: assessing quality and cost considerations within Bids and contracts – Working with Private Security Providers).

  • The exclusion criteria related to vetting should consider:
    • National criminal records or other evidence indicating violations of international humanitarian law or human rights abuses linked to a potential contractor or its personnel. Records should indicate if personnel have faced credible allegations of any national criminal offence, breaches of international criminal, abuses of international human rights law or violations of international humanitarian law in any jurisdiction.
    • Evidence of grave professional misconduct by the company or its personnel.
    • Failure to provide the requested documentation and information or submission of false and/or misleading information.
    • Inability to fulfil a key requirement of the request for proposals.
    • Evidence of bribery, corruption or other conflict of interest.
    • Proven involvement in political activities.
  • The award criteria related to personnel standards should take into account procedures and management systems that the company has in place to screen, train and monitor personnel, as well as criteria directly applying to its personnel. Most importantly, they include:
    • Recruitment and selection methodology (including criminal screening, human rights and international humanitarian law abuse screening, drug screening, discharge from public or private security services and psychological screening).
    • Average officer experience (including employee backgrounds, experience in industry and contract-specific experience).
    • Training on human rights, international humanitarian law (in situations of armed conflict), use of force and firearms, crowd management, conflict-diffusion techniques, and other skills (e.g. restraining or apprehending individuals).
    • Policies relating to international humanitarian law and human rights law, especially on the use of force and firearms, as well as policies against bribery, corruption and other crimes. Evaluate systems for implementing these policies, training personnel and reporting compliance.
    • Internal monitoring, supervisory and accountability mechanisms.
    • Systems to control the management, use and handling of weapons, firearms and ammunition (e.g. registers, licenses, hand-over, transportation).
View Content

(see Compliance with international standards and good practices: developing implementation guidance within Bids and contracts – Working with Private Security Providers).

  • Request an attestation by personnel that nothing in their present or past conduct would contradict the company’s policies and code of conduct for private security.
This Website uses Matomo Analytics cookies to analyze traffic and help us to improve your user experience. These cookies are stored in Germany and the Personal Data collected through cookies is only accessible to us and to our web hosting platform service provider, based in Switzerland.
https://www.securityhumanrightshub.org/inner.php/zh/ajax