<p><i>Workplace Security Playbook: The New Manager's Guide to Security Risk</i> is a set of comprehensive risk management guidelines for companies that have other business functions coordinating security. When an employee without a security background is charged with the protection of people, facili
Workplace Security Playbook
β Scribed by Bob Hayes
- Publisher
- Elsevier
- Year
- 2013
- Tongue
- English
- Leaves
- 88
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
Workplace Security Playbook......Page 2
Copyright......Page 3
Executive Summary......Page 4
Introduction......Page 5
1.1 Performance Guidelines vs. Standards......Page 6
1.2 Three-Step Decision-Making Process......Page 7
1.3.1 Performance Guideline #1: Identify Areas and Levels of Security......Page 8
1.3.2 Performance Guideline #2: Design Security into Your Facility and Operations......Page 9
1.3.4 Performance Guideline #4: Control Access to Proprietary Information......Page 10
1.3.7 Performance Guideline #7: Respond to Incidents and Emergencies with Prompt and Appropriate Actions......Page 11
1.3.8 Performance Guideline #8: Promptly Report All Incidents, Crimes, and Policy Violations......Page 12
2.1.2 Theft Protection......Page 13
2.1.5 Ongoing Awareness......Page 14
2.2.1 Responsibilities......Page 15
2.3.2 Selecting Members......Page 16
3.1 Security Surveys......Page 18
3.2 Validation Testing......Page 19
3.3 Types of Validations......Page 20
4.2 Reporting to Law Enforcement......Page 21
4.3 Document All Information......Page 22
4.5.1 General Information......Page 23
4.7 Voluntary Statements......Page 24
4.7.2 Contents of Statement......Page 25
4.9 Warrants and Subpoenas......Page 26
4.10 Polygraphs......Page 27
5 Inspection Guidelines......Page 28
5.1.4 On-Site and Off-Site Inspections......Page 29
5.1.8 Inspections of Company Property......Page 30
5.1.12 What Is Reasonable Suspicion?......Page 31
5.1.15 Limits of Search......Page 32
5.2.1 Interview Procedures......Page 33
5.2.2 Conducting the Inspection......Page 34
5.2.4 Determining Reasonable Suspicion......Page 35
5.3.1 Reasons for Inspection......Page 37
5.3.3 Inspection Type #1: Handheld Items......Page 38
5.3.5 Inspection Type #3: Vehicles......Page 39
5.3.7 Discovery of a Suspected Violation......Page 40
5.3.8.2 Alcohol and Illegal Drugs......Page 41
5.3.8.3 Test Results......Page 42
5.3.9 Violation Category #2: Theft......Page 43
5.3.10 Violation Category #3: Firearms......Page 44
5.4.3 Guidelines for Visitor Refusals......Page 45
6.2 Security Concerns......Page 47
6.3.3 Step 3: Ensure Recovery of Operations......Page 48
6.5 Evacuation......Page 49
6.6 Bomb Threats......Page 50
6.6.3 Assess Credibility......Page 51
6.7 Civil Disturbances and Demonstrations......Page 52
6.7.2 Task Force Responsibilities......Page 55
6.7.5 Local Management Response and Control......Page 56
6.8.1 Communications......Page 57
6.8.3 Winter Storms......Page 58
6.8.5 Earthquakes......Page 59
6.9 Strikes and Labor Disturbances......Page 60
6.9.3 Controlling Facility Access......Page 61
6.9.5 Communications Center......Page 62
6.10 Medical Emergencies......Page 63
6.10.2 Other Resources......Page 64
7.1.1 Access Controls......Page 65
7.1.4 Service Vendors......Page 66
7.2.2 Facility Access......Page 67
7.2.5 Construction Preparation......Page 68
7.2.8 Drug and Alcohol Notice......Page 69
7.3.4 Notification......Page 70
7.3.9 Property Disposition......Page 71
7.3.10 Inspection Schedules......Page 72
7.4 Special Events......Page 73
8.1 Training and Education......Page 74
8.3.1 Newsletters......Page 75
8.4 Books......Page 76
9.2 Security Committee......Page 77
9.5.1 Identification......Page 78
9.5.4 Automated Access Control......Page 79
9.6 Security Officers......Page 80
9.7.1 Surveys and Validations......Page 81
9.9.2 Inspections......Page 82
9.10.3 Company Emergency Contacts......Page 83
9.11.1 Local Resources......Page 85
About Contributing Editor......Page 86
About Elsevierβs Security Executive Council Risk Management Portfolio......Page 87
π SIMILAR VOLUMES
From a desktop, e-mail provides a quick, reliable and cost-effective link to the world at large, changing a traditional "workplace" into a "workspace" that crosses even international boundaries.In developing areas of the world such as Africa, Asia and Latin America, e-mail lists are currently outgro
<strong><strong>Power games play out under the mistletoe in the latest Locketts of Tuxedo Park novel by Yahrah St. John!</strong></strong><br><strong><strong>A meeting of business minds</strong></strong><br><strong><strong>under the mistletoe?</strong></strong><br> All marketing executive Giana Lock
<p>The primary<i> </i>goal of the<i> Information Protection Playbook</i> is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications,
Corporate and institutional offices -- High-tech and biotech offices -- Banking, insurance, consultant, and law offices -- Media companies
FROM THE FOREWORD:There are many excellent books that deal with the issue of bullying at school, but not so many that address the traumatic issue of workplace bullying. This is one offering that, I trust, will help sufferers, and their families, to understand what this is about and what is does to a