three part fence

Perimeter Security

William F. Booth, CPPSecurity Assessment, Security Program Development

Every security program must be an integrated whole and each element must grow out of the specific needs dictated by the circumstances affecting the facility to be protected. Nevertheless, the first and basic defense is still the outer perimeter of the facility. Planning this defense is neither difficult nor complicated, but it is the product of common sense. Whereas the …

officer

Full-Time versus Part-time Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHSSecurity Program Development

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Full-time and part-time are two choices that must be made regarding the staffing of …

pink slip

Termination Guidelines

Julius Stanley Carroll, CPP, CFESecurity Program Development, Workplace Violence

Terminations are often a stressful situation, both for the terminated employee and for the individual responsible for conducting the termination. Listed below are some guidelines that could help diffuse volatile situations and make the process run more smoothly. Always plan the termination. Think it through. Always have two supervisors/managers present during the termination. The meeting should be cordial and professional …

law enforcement

Sworn versus Non-Sworn Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHSSecurity Program Development

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Probably the most profound choice in the paradigm is between sworn and non-sworn officers. …

Jeanne Clery

The Clery Act – Costs of Noncompliance

Christine L. Peterson, CPP, ISPCompliance, Security Assessment

The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, 20 U.S.C. § 1092(f)(2011), is a federal statute requiring colleges and universities participating in federal financial aid programs to maintain and disclose campus crime statistics and security information. The U.S. Department of Education conducts reviews to evaluate an institution’s compliance with Clery Act requirements. A review may …

WRAL: Security Measures Not Foolproof, Consultant Says

Amanda StricklandBackground Investigation, Crisis Management Planning, News, Security Program Development, Workplace Violence

 Plan. Protect. Prosper. Protus3 specializes in security system design, security consulting, corporate investigations and other investigative services. Partner with Protus3 and we will examine each situation to identify threats and develop solutions for your best outcome. 919-834-8584 or 800-775-8584

power shift button

Held Hostage by a Dishonest Employee

Russell W. Gilmore, CISSP, CISM, EnCECompliance, Computer Forensics, Security Program Development, Theft, Embezzlement, and Fraud

I recently was involved in a case in which a company employee was discovered using a company credit card for personal reasons. This happens occasionally, and one would think that immediately terminating the dishonest employee would resolve the issue. But what happens when the employee is the one and only IT person for the company? Many companies have only one person …

security officer standing next to bike

Proprietary versus Contract Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHSSecurity Program Development

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Basically, there are only two organizational relationships for the security officer. A proprietary officer …

pink slip

Terminating an Employee and Company Data

Russell W. Gilmore, CISSP, CISM, EnCECompliance, Computer Forensics, Theft, Embezzlement, and Fraud

Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …

guard with no uniform talking into a device

Uniformed versus Non-Uniformed Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHSSecurity Program Development, Training

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Whether or not to put security personnel in a distinctive uniform is one of …