University of Maryland Eastern Shore

Assessment at University of Maryland Eastern Shore

Protus3 News, Security Assessment, Security Survey, Security Threat Assessment

Risk Management Associates, Inc. completed its assessment of the University of Maryland Eastern Shore security program. The assessment began with the review of security-related policies and procedures and other related documents. Members of the RMA team visited the UMES campus to conduct independent observations and interviews with approximately 100 individual stakeholders. Local law enforcement was contacted, and both police calls …

three part fence

Perimeter Security

William F. Booth, CPP Security Assessment, Security Program Development

Every security program must be an integrated whole and each element must grow out of the specific needs dictated by the circumstances affecting the facility to be protected. Nevertheless, the first and basic defense is still the outer perimeter of the facility. Planning this defense is neither difficult nor complicated, but it is the product of common sense. Whereas the …

officer

Full-Time versus Part-time Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHS Security Program Development

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Full-time and part-time are two choices that must be made regarding the staffing of …

law enforcement

Sworn versus Non-Sworn Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHS Security Program Development

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Probably the most profound choice in the paradigm is between sworn and non-sworn officers. …

Jeanne Clery

The Clery Act – Costs of Noncompliance

Christine L. Peterson, CPP, ISP Civil Rights, Clery Act, Compliance, Corporate Compliance, Ethics, Security Survey

The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, 20 U.S.C. § 1092(f)(2011), is a federal statute requiring colleges and universities participating in federal financial aid programs to maintain and disclose campus crime statistics and security information. The U.S. Department of Education conducts reviews to evaluate an institution’s compliance with Clery Act requirements. A review may …

Research Triangle Park

RMA Completes Security Assessment of RTP

Protus3 News, Security Assessment, Security Program Development, Security Survey, Security Threat Assessment

Risk Management Associates, Inc. has completed a security assessment of Research Triangle Park. The Research Triangle Foundation has developed and is in the process of implementing a new master development plan for the Research Triangle Park (RTP) community. As a critical component of that plan, the foundation decided to conduct a security assessment to provide stakeholders with the current security …

WRAL: Security Measures Not Foolproof, Consultant Says

Protus3 Background Investigation, Crisis Management Planning, News, Security Program Development, Workplace Violence

 Plan. Protect. Prosper. Protus3 specializes in security system design, security consulting, corporate investigations and other investigative services. Partner with Protus3 and we will examine each situation to identify threats and develop solutions for your best outcome. 919-834-8584 or 800-775-8584

security officer standing next to bike

Proprietary versus Contract Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHS Contract Security Officer/Guard, Security Program Development

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Basically, there are only two organizational relationships for the security officer. A proprietary officer …

guard with no uniform talking into a device

Uniformed versus Non-Uniformed Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHS Security Program Development, Training

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Whether or not to put security personnel in a distinctive uniform is one of …

Security Consulting

Security in the Office – A Checklist

Christine L. Peterson, CPP, ISP Embezzlement, Fraud, Security Planning, Security Policy and Procedure Development, Security Program Development, Theft, Theft, Embezzlement, and Fraud, Training

How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …