Security Standard Practice Procedures

104 31

    Personnel Security

    • The most effective option for personnel security is to use a supervised key card access checkpoint. Such checkpoints require both visitors and standard personnel to submit their bags to searches on entering and exiting as well as passing though a metal detector. This is the type of security set in place for critical facilities such as airports, government offices and courthouses. This type of security setup is also popular in locations where confidential information or valuable materials are frequently handled.

      A middle-of-the-road approach for less critical locations is to set up a security reception desk where a guard keeps a record of visitors, particularly after-hours. A guard at a reception desk can also pull suspicious persons aside for further questioning as needed. For reception desk setups, it is ideal to have two guards on duty at all times, so that one is free to respond to events without leaving the desk unmanned.

    Optimal Equipment Use

    • Getting the most out of equipment by training security personal in proper use techniques and conducting frequent drills ensures that equipment investments are made worthwhile. An example of a change made for optimizing equipment use would be to rotating control room staff with patrol staff to ensure that the camera surveillance crew gets an occasional walk to invigorate themselves. Even well disciplined guards can lose focus after watching cameras for too long.

      Another key piece of equipment where training comes in handy is the portable radio unit. Ensure that all guards understand proper event codes to keep unauthorized listeners from exploring weaknesses created by key events, particularly events involving cash movement.

    Risk Evaluation & Documentation

    • Keeping well-ordered reports and submitting them to a risk assessment analyst regularly will help to improve the overall security plan by addressing any flaws or negative trends as they develop over time. For a risk assessment analyst to make the most of security reports it is crucial for security staff to document not only the incident, but the resolution as well. Keeping a record of resolutions will help weed out errors in judgment, and while it is not always correct to simply penalize individuals for making judgment calls, it is in an organization's best interests to learn from mistakes, thus limiting potential liability.

Subscribe to our newsletter
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
You can unsubscribe at any time

Leave A Reply

Your email address will not be published.

"Business & Finance" MOST POPULAR