﻿{"id":14,"date":"2016-09-08T14:23:36","date_gmt":"2016-09-08T12:23:36","guid":{"rendered":"http:\/\/firstsecurity.it\/?page_id=14"},"modified":"2017-01-20T17:19:42","modified_gmt":"2017-01-20T16:19:42","slug":"vigilanza-a-siti-con-speciali-esigenze-di-sicurezza","status":"publish","type":"page","link":"http:\/\/firstsecurity.it\/en\/vigilanza-a-siti-con-speciali-esigenze-di-sicurezza\/","title":{"rendered":"Sites with special security requirements"},"content":{"rendered":"<p><\/p>\n<p><div class=\"cisc-row\"><div  class=\" cisc-col-md-7 cisc-col-sm-7 cisc-col-xs-12\"><\/p>\n<p style=\"text-align: justify;\">The surveillance of sites with special security needs and, as such, entrusted exclusively to security guards &#8211; if not directly entrusted to the Police &#8211; is aimed at:<\/p>\n\t\t\t<!-- CI Shortcodes List Styles -->\n\t\t\t<style type=\"text\/css\">#cisc-list-2 li:before { content: \"\\f00c\"; }\n#cisc-list-2 li:before { color: orange; }\n<\/style><div id=\"cisc-list-2\" class=\"cisc-list\"><\/p>\n<ul>\n<li style=\"text-align: justify;\">sites where there are people performing tasks particularly sensitive for the public interest and for which should be guaranteed safety and operation (eg hospitals and \/ or companies for health);<\/li>\n<li style=\"text-align: justify;\">sites that contain sensitive data banks, or those with restricted access only to authorized people (eg public facilities equipped with data centers and \/ or a strong public turnout, the Regions and Provinces headquarters, National Social Security Institute, etc.);<\/li>\n<li style=\"text-align: justify;\">sites where access is subject to control with X-ray machines or metal detectors or personally identifiable (eg courts and judicial offices in general);<\/li>\n<li style=\"text-align: justify;\">sites where there is significant stock of values \u200b\u200bor of removable value goods (such as museums, art galleries, exhibitions if they contain high artistic and economic value works).<\/li>\n<\/ul>\n<p><\/div>\n<p><\/div><div  class=\" cisc-col-md-5 cisc-col-sm-5 cisc-col-xs-12\"><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-250 size-full\" src=\"http:\/\/firstsecurity.it\/wp-content\/uploads\/2016\/09\/BASE2.jpg\" width=\"700\" height=\"432\" srcset=\"http:\/\/firstsecurity.it\/wp-content\/uploads\/2016\/09\/BASE2.jpg 700w, http:\/\/firstsecurity.it\/wp-content\/uploads\/2016\/09\/BASE2-300x185.jpg 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p><\/div><\/div><\/p>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":[],"_links":{"self":[{"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/pages\/14"}],"collection":[{"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":11,"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":436,"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/pages\/14\/revisions\/436"}],"wp:attachment":[{"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/media?parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}