One thing that has always amazed me is how so many companies choose not to put a sound physical security solution in place. Don’t get me wrong – I understand that there is a cost. Many companies simply cannot afford to devote money to a security program when they need the money elsewhere. With that said, having security systems in …
Preventing Workplace Violence When Terminating An Employee
Firing or laying someone off is one of the most stressful situations for a company. Typically, no one in management or human resources wants to be the bearer of bad news to an employee. But of course the stress goes both ways, because it’s also usually a very stressful time for the employee. At the moment someone hears, “We have …
Sarasota County Administration Building System Assessment
Protus3 completed a Security Assessment of the Sarasota County Administration Building. The objective was to obtain a “snapshot” view of the state of security at the Administrative Building, identify gaps in the current security program, and develop a Master Plan that Sarasota County can implement in a cost effective and efficient manner. Sarasota County awarded the project to Protus3 in …
Little Oddities Often Aggregate Into Larger Anomalies
Details continue to emerge from the October 1 shooting at the Route 91 Harvest County Music Festival in Las Vegas. There are ample opportunities for emergency responders and security and hospitality professionals to examine and redefine security protocols. The greatest gains in response to the unthinkable come out of this kind scrutiny and “lessons learned” exercises. It’s a sad truth. …
Termination Guidelines
Terminations are often a stressful situation, both for the terminated employee and for the individual responsible for conducting the termination. Listed below are some guidelines that could help diffuse volatile situations and make the process run more smoothly. Always plan the termination. Think it through. Always have two supervisors/managers present during the termination. The meeting should be cordial and professional …
The Clery Act – Costs of Noncompliance
The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, 20 U.S.C. § 1092(f)(2011), is a federal statute requiring colleges and universities participating in federal financial aid programs to maintain and disclose campus crime statistics and security information. The U.S. Department of Education conducts reviews to evaluate an institution’s compliance with Clery Act requirements. A review may …
RMA Completes Security Assessment of RTP
Risk Management Associates, Inc. has completed a security assessment of Research Triangle Park. The Research Triangle Foundation has developed and is in the process of implementing a new master development plan for the Research Triangle Park (RTP) community. As a critical component of that plan, the foundation decided to conduct a security assessment to provide stakeholders with the current security …
RMA Presents BYOD Policies at RTP CFO Forum
Chris Peterson and www.rmasecurity.com presented BYOD (Bring Your Own Device): Issues and Implications for Companies at the September RTP CFO Forum. The program discussed security issues and considerations for companies when employees connect personal devices to the company network. What issues need to be considered to accommodate lawsuits, audits, and records requests? How can companies prepare for lost or stolen …
Zoetis GSOC Needs Assessment Project Awarded
Risk Management Associates, Inc. has been requested by Zoetis to develop a Needs Assessment for a Global Security Operations Center. The assessment will define the mission, goals and objectives of the GSOC. Additionally, this assessment will include defining the support requirements of the GSOC that include personnel, technology and operations. Once the Needs Assessment is complete, Zoetis will be able …
Security in the Office – A Checklist
How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …