News
TRANSPORT & LOGISTICS | Staff Reporter, Singapore
view(s)

Busted: SMRT fined $200,000 for security breach

Investigations by LTA found that SMRT had failed to exercise the due diligence and vigilance expected of a public transport operator.

The Land Transport Authority announced that it has fined SMRT $200,000 under the Rapid Transit Systems Act for lapses relating to the security breach at Bishan MRT depot on 17 August 2011. LTA said this security lapse is similar in nature to an earlier incident at Changi depot in May 2010 for which SMRT was fined $50,000.

The statement from LTA said:

LTA's investigations found that SMRT had failed to exercise the due diligence and vigilance expected of a public transport operator, by failing to regularly inspect, continuously maintain and repair its operating facilities. SMRT also failed to adequately carry out their responsibility to oversee the day-to-day security operations at its depots, and implement fully the security measures recommended by the Public Transport Security Committee (PTSC) after the Changi depot incident last year.

Due to its negligence, SMRT had failed to effectively guard against unauthorised intrusions. It also failed to detect, in a timely manner, the security breach at its Bishan MRT depot and the graffiti on one of its MRT trains on 17 August 2011. As a result, SMRT had breached its obligations under the Rapid Transit System (RTS) Licence & Operating Agreement (LOA).

LTA said it will be closely tracking and auditing SMRT's performance, so that they adhere to the public transport security standards that have been set.

Meanwhile the fine collected will be donated to the Public Transport Fund to help needy families with transport fares.

Do you know more about this story? Contact us anonymously through this link.

Click here to learn about advertising, content sponsorship, events & rountables, custom media solutions, whitepaper writing, sales leads or eDM opportunities with us.

To get a media kit and information on advertising or sponsoring click here.