A Free-Reprint Article Written by: Harold German 

Article Title: 
Mitigate Risk for a Successful Workplace Security Plan

See TERMS OF REPRINT to the end of the article.

Article Description:
This article discusses the importance of properly assessing
security needs to ensure workplace safety.


Additional Article Information:
===============================

627 Words; formatted to 65 Characters per Line
Distribution Date and Time: 2009-10-22 10:36:00

Written By:     Harold German
Copyright:      2009
Contact Email:  mailto:[email protected]



For more free-reprint articles by Harold German, please visit:
http://www.thePhantomWriters.com/recent/author/harold-german.html


=============================================
Special Notice For Publishers and Webmasters:
=============================================

HTML Copy-and-Paste and TEXT Copy-and-Paste 
Versions Of Article Are Available at:
http://thePhantomWriters.com/free_content/db/g/workplace-security-plan.shtml#get_code

---------------------------------------------------------------------

Mitigate Risk for a Successful Workplace Security Plan
Copyright (c) 2009 Harold German
Arrow Security NY
http://www.arrowsecurity.net



Each year hundreds of thousands of organizations in the United
States experience the negative effects of workplace crimes
firsthand. These detrimental and costly experiences lead to
considerable losses in productivity, assets, workplace/employee
morale, and tragically, even life. They also usually require
resorting to the hiring of security consulting firms or security
companies. Crimes known to occur in work-type settings include:
theft, vandalism, assault, kidnapping, arson, rape and murder,
among many others. Mitigating your exposure and risk to these
security threats begins with identifying vulnerabilities in your
organization that would be conducive to these crimes. One of the
first steps that are taken by security guard companies in this
process involves conducting an effective security assessment, to
expose on-site weaknesses that can create the kind of conditions
necessary for the perpetration of these crimes.

Different types of organizations have different types of security
needs. For instance, the usual security concerns of an industrial
plant facility manager may be different from those of the owner
of a car dealership. Where the car dealer may be mostly concerned
with keeping his/her assets safe when the dealership is closed,
the industrial plant facility manager may be focused on securing
the on-site and logistical safety of all manufactured goods or
substances, as well as keeping employees and local residents
safe. In fact, while many organizations view security as a simple
service involving the protection of people and assets, there are
a myriad of security deployments that can be implemented to
address a wide variety of security challenges. In consideration
of these varying deployments, a security company has various
factors to consider, including:

Crime Risk: Is there a high crime rate in the area?

Types of Assets: Are there on-site assets to be protected? If so,
are they portable, or difficult to transport?

Traffic: Does the establishment receive pedestrian traffic?

Types of Substances: Are there on-site substances or raw
goods/materials to be protected? If so, are they consumable or
hazardous?

Time: Is the establishment open 24 hours a day, or only during
business hours?

Accessibility: Is your establishment located above, or on, ground
level?

Stress: Is the establishment a high-stress atmosphere?

All of these factors can have a significant effect on the type,
and manner in which, a security application is deployed. In
addition to the on-site scenarios indicated above, consideration
must also be given to behavioral and motivating factors that can
influence certain types of crimes, and identify specific types of
offenders. For instance, depending on your type of organization,
a theft may be more likely to be perpetrated by an employee than
a complete stranger. Below is a general guideline for behavioral
or motivating factors associated with the following crimes:

Theft: Dispassionate crime. Objective is personal gain.

Assault: Passionate crime. Objective may be revenge. Usually
committed by employees or their spouses/ex-spouses, relatives,
friends or associates.

Fraud/Product Tampering: Passionate crime. Objective may be
revenge or personal gain. Can be committed by employees,
customers or contractors.

Vandalism: Can be Passionate or Dispassionate crime. Objective
may be revenge or boredom/recklessness. Usually committed by
young adults/adolescents or disgruntled employees.

For each of these crimes, the deployment of visual deterrents,
such as security guards and surveillance cameras, has a varying
degree of effectiveness. For instance, a passionate offender,
such as the ex-spouse of an employee whose mind is unequivocally
set on an on-site assault, is less hindered by the presence of
security cameras than the burglar, whose goal is to perpetrate a
theft without getting caught. By understanding the security
factors pertaining to your specific organization, as well as the
types of risks your organization may face, you, or your security
agency, can develop an efficient and effective security plan,
which in the long run, can save you a considerable amount of
time, money and resources. 




---------------------------------------------------------------------
Harold German is a renowned author and contributor, with 
appearances on CNN and in noted international publications, 
such as The Economist. Mr. German covers news regarding security 
guards, safety technologies and information about how to start a 
security company (http://www.arrowsecurity.net/franchise.net). 
He is a senior writer for Partner Service Sites. 
Copyright (c) 2009 Harold German, http://www.arrowsecurity.net/


--- END ARTICLE ---

Get HTML or TEXT Copy-and-Paste Versions Of This Article at:
http://thePhantomWriters.com/free_content/db/g/workplace-security-plan.shtml#get_code



.....................................

TERMS OF REPRINT - Publication Rules 
(Last Updated:  May 11, 2006)

Our TERMS OF REPRINT are fully enforcable under the terms of:

  The Digital Millennium Copyright Act
  http://thomas.loc.gov/cgi-bin/query/z?c105:H.R.2281.ENR:

.....................................

*** Digital Reprint Rights ***

* If you publish this article in a website/forum/blog, 
  You Must Set All URL's or Mailto Addresses in the body 
  of the article AND in the Author's Resource Box as
  Hyperlinks (clickable links).

* Links must remain in the form that we published them.
  Clean links should point to the Author's links without
  redirects having been inserted into the copy.

* You are not allowed to Change or Delete any Words or 
  Links in the Article or Resource Box. Paragraph breaks 
  must be retained with articles. You can change where
  the paragraph breaks fall, but you cannot eliminate all
  paragraph breaks as some have chosen to do.

* Email Distribution of this article Must be done through
  Opt-in Email Only. No Unsolicited Commercial Email.


* You Are Allowed to format the layout of the article for 
  proper display of the article in your website or in your 
  ezine, so long as you can maintain the author's interests 
  within the article.

* You may not use sentences from this article as an input
  for any software that steals sentences from others in 
  order to build an article with software. The copyright on
  this article applies to the "WHOLE" article.


*** Author Notification ***

  We ask that you notify the author of publication of his
  or her work. Harold German can be reached at:
  [email protected]


*** Print Publication Reprint Rights ***

  If you desire to publish this article in a PRINT 
  publication, you must contact the author directly 
  for Print Permission at:  
  mailto:[email protected]



.....................................

If you need help converting this text article for proper 
hyperlinked placement in your webpage, please use this 
free tool:  http://thephantomwriters.com/link-builder.pl


*****************************************************************
*
* This email is being delivered directly to members of the group:
* 
*    [email protected]
* 
*****************************************************************


=====================================================================

ABOUT THIS ARTICLE SUBMISSION

http://thePhantomWriters.com is a paid article distribution 
service. thePhantomWriters.com and Article-Distribution.com 
are owned and operated by:

Bill Platt
3010 E Raintree
Stillwater, Oklahoma USA 74074


Learn more about our article distribution services by visiting:
http://thephantomwriters.com/x.pl/tpw/info/article-distribution/index.html

The content of this article is solely the property 
and opinion of its author, Harold German
http://www.arrowsecurity.net



---------------------------------------------------------------------
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
---------------------------------------------------------------------





Reply via email to