A Free-Reprint Article Written by: Harold German Article Title: Mitigate Risk for a Successful Workplace Security Plan
See TERMS OF REPRINT to the end of the article. Article Description: This article discusses the importance of properly assessing security needs to ensure workplace safety. Additional Article Information: =============================== 627 Words; formatted to 65 Characters per Line Distribution Date and Time: 2009-10-22 10:36:00 Written By: Harold German Copyright: 2009 Contact Email: mailto:[email protected] For more free-reprint articles by Harold German, please visit: http://www.thePhantomWriters.com/recent/author/harold-german.html ============================================= Special Notice For Publishers and Webmasters: ============================================= HTML Copy-and-Paste and TEXT Copy-and-Paste Versions Of Article Are Available at: http://thePhantomWriters.com/free_content/db/g/workplace-security-plan.shtml#get_code --------------------------------------------------------------------- Mitigate Risk for a Successful Workplace Security Plan Copyright (c) 2009 Harold German Arrow Security NY http://www.arrowsecurity.net Each year hundreds of thousands of organizations in the United States experience the negative effects of workplace crimes firsthand. These detrimental and costly experiences lead to considerable losses in productivity, assets, workplace/employee morale, and tragically, even life. They also usually require resorting to the hiring of security consulting firms or security companies. Crimes known to occur in work-type settings include: theft, vandalism, assault, kidnapping, arson, rape and murder, among many others. Mitigating your exposure and risk to these security threats begins with identifying vulnerabilities in your organization that would be conducive to these crimes. One of the first steps that are taken by security guard companies in this process involves conducting an effective security assessment, to expose on-site weaknesses that can create the kind of conditions necessary for the perpetration of these crimes. Different types of organizations have different types of security needs. For instance, the usual security concerns of an industrial plant facility manager may be different from those of the owner of a car dealership. Where the car dealer may be mostly concerned with keeping his/her assets safe when the dealership is closed, the industrial plant facility manager may be focused on securing the on-site and logistical safety of all manufactured goods or substances, as well as keeping employees and local residents safe. In fact, while many organizations view security as a simple service involving the protection of people and assets, there are a myriad of security deployments that can be implemented to address a wide variety of security challenges. In consideration of these varying deployments, a security company has various factors to consider, including: Crime Risk: Is there a high crime rate in the area? Types of Assets: Are there on-site assets to be protected? If so, are they portable, or difficult to transport? Traffic: Does the establishment receive pedestrian traffic? Types of Substances: Are there on-site substances or raw goods/materials to be protected? If so, are they consumable or hazardous? Time: Is the establishment open 24 hours a day, or only during business hours? Accessibility: Is your establishment located above, or on, ground level? Stress: Is the establishment a high-stress atmosphere? All of these factors can have a significant effect on the type, and manner in which, a security application is deployed. In addition to the on-site scenarios indicated above, consideration must also be given to behavioral and motivating factors that can influence certain types of crimes, and identify specific types of offenders. For instance, depending on your type of organization, a theft may be more likely to be perpetrated by an employee than a complete stranger. Below is a general guideline for behavioral or motivating factors associated with the following crimes: Theft: Dispassionate crime. Objective is personal gain. Assault: Passionate crime. Objective may be revenge. Usually committed by employees or their spouses/ex-spouses, relatives, friends or associates. Fraud/Product Tampering: Passionate crime. Objective may be revenge or personal gain. Can be committed by employees, customers or contractors. Vandalism: Can be Passionate or Dispassionate crime. Objective may be revenge or boredom/recklessness. Usually committed by young adults/adolescents or disgruntled employees. For each of these crimes, the deployment of visual deterrents, such as security guards and surveillance cameras, has a varying degree of effectiveness. For instance, a passionate offender, such as the ex-spouse of an employee whose mind is unequivocally set on an on-site assault, is less hindered by the presence of security cameras than the burglar, whose goal is to perpetrate a theft without getting caught. By understanding the security factors pertaining to your specific organization, as well as the types of risks your organization may face, you, or your security agency, can develop an efficient and effective security plan, which in the long run, can save you a considerable amount of time, money and resources. --------------------------------------------------------------------- Harold German is a renowned author and contributor, with appearances on CNN and in noted international publications, such as The Economist. Mr. German covers news regarding security guards, safety technologies and information about how to start a security company (http://www.arrowsecurity.net/franchise.net). He is a senior writer for Partner Service Sites. Copyright (c) 2009 Harold German, http://www.arrowsecurity.net/ --- END ARTICLE --- Get HTML or TEXT Copy-and-Paste Versions Of This Article at: http://thePhantomWriters.com/free_content/db/g/workplace-security-plan.shtml#get_code ..................................... TERMS OF REPRINT - Publication Rules (Last Updated: May 11, 2006) Our TERMS OF REPRINT are fully enforcable under the terms of: The Digital Millennium Copyright Act http://thomas.loc.gov/cgi-bin/query/z?c105:H.R.2281.ENR: ..................................... *** Digital Reprint Rights *** * If you publish this article in a website/forum/blog, You Must Set All URL's or Mailto Addresses in the body of the article AND in the Author's Resource Box as Hyperlinks (clickable links). * Links must remain in the form that we published them. Clean links should point to the Author's links without redirects having been inserted into the copy. * You are not allowed to Change or Delete any Words or Links in the Article or Resource Box. Paragraph breaks must be retained with articles. You can change where the paragraph breaks fall, but you cannot eliminate all paragraph breaks as some have chosen to do. * Email Distribution of this article Must be done through Opt-in Email Only. No Unsolicited Commercial Email. * You Are Allowed to format the layout of the article for proper display of the article in your website or in your ezine, so long as you can maintain the author's interests within the article. * You may not use sentences from this article as an input for any software that steals sentences from others in order to build an article with software. The copyright on this article applies to the "WHOLE" article. *** Author Notification *** We ask that you notify the author of publication of his or her work. Harold German can be reached at: [email protected] *** Print Publication Reprint Rights *** If you desire to publish this article in a PRINT publication, you must contact the author directly for Print Permission at: mailto:[email protected] ..................................... If you need help converting this text article for proper hyperlinked placement in your webpage, please use this free tool: http://thephantomwriters.com/link-builder.pl ***************************************************************** * * This email is being delivered directly to members of the group: * * [email protected] * ***************************************************************** ===================================================================== ABOUT THIS ARTICLE SUBMISSION http://thePhantomWriters.com is a paid article distribution service. thePhantomWriters.com and Article-Distribution.com are owned and operated by: Bill Platt 3010 E Raintree Stillwater, Oklahoma USA 74074 Learn more about our article distribution services by visiting: http://thephantomwriters.com/x.pl/tpw/info/article-distribution/index.html The content of this article is solely the property and opinion of its author, Harold German http://www.arrowsecurity.net --------------------------------------------------------------------- XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX ---------------------------------------------------------------------
