StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security and Loss Prevention - Assignment Example

Comments (0) Cite this document
Summary
The options the company has for handling this situation are as follows: (1) status quo or do nothing; (2) verify the information: the director of the internal auditing department, Donald Reynolds, must verify the validity and authenticity of the information, received as an anonymous tip;…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Security and Loss Prevention
Read TextPreview

Extract of sample "Security and Loss Prevention"

Download file to see previous pages The general investigation steps to verify the validity of the embezzlement allegations are as follows: (1) document the event and prepare a report to contain the information revealed by the employee; (2) interview the person who reported the incident through whatever means possible; (3) talk to the senior managers to whom the plant controller is reporting to for the purpose of finding out any unusual transactions perceived to have been contracted by the plant controller and verifying if the tip has any basis (but making sure to emphasize full confidentiality and privacy of the issues); (4) identify other possible employees who could have known the incident or those within the plant controller’s chain of command; (5) contact the CEO and CFO to inform them of the investigations on the plant controller; (6) remove the plant controller from the division discreetly; (7) evaluate and determine the extent of the loss; (8) decide on the need to enforce either a temporary operating procedures and policies or a full closure within the division being investigated (Carnie, 2012; Turner, 2009).
In preparation for the interviews, note the order of the witnesses who would be interviewed and how you would plan, conduct, and document your interviews.
In preparation for the interviews, all people who are within the chain of command of the plant controller should be included. Likewise, those who could have knowledge of overriding existing controls should also be investigated. As emphasized by Carnie (2012), “identify those employees (at every level of the company) who had both access and opportunity to commit the theft, as well as those who may have known of the theft but failed to disclose it. All employees with access and opportunity should be included in the investigation, regardless of their job record, length of employment, or stature within the company. Identifying such employees allows the employer to focus the investigation on as small a group of employees as possible with as little disclosure as possible” (par. 6). The order of the witnesses would be as follows: (1) the whistle blower; (2) the senior manager or the supervisor of the plant controller; (3) the CEO and CFO; (4) staff who are directly being supervised by the plant controller; (5) staff who has knowledge of overriding external controls; (6) others who are identified to be potentially involved. The plan of action for the interview would be: (1) identification of people to be interviewed; (2) schedule specific interviews either in the office of senior management or the people to be inte ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security and Loss Prevention Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Security and Loss Prevention Assignment Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/business/1450953-security-and-loss-prevention
(Security and Loss Prevention Assignment Example | Topics and Well Written Essays - 750 Words)
Security and Loss Prevention Assignment Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/business/1450953-security-and-loss-prevention.
“Security and Loss Prevention Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/business/1450953-security-and-loss-prevention.
  • Cited: 1 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security and Loss Prevention

Security System In Reference To Immigration

 When James Hollifield delivered this paper at the 1989 Annual Meeting of the American Political Science Association barely three months before the descend of the Berlin Wall he seemed to foretell the crisis situation which the member states of the European Union (at that time the European Community) and the United States would visage when coming to terms with the unprecedented international migration flows they experienced in the early 1990s. With the collapse of communism in Europe and the subsequent rise of irredentist and nationalist tendencies on a global scale, both Western Europe and the United States were faced with the challenge of sustained wide-scale migration flows into their territory throughout the early half of...
11 Pages(2750 words)Report

Community Assessment for Treatment and Prevention of Hepatitis C in Adult Population

With the increased awareness and advancement in research, involving human immunodeficiency virus (HIV) epidemic, clinical expertise exists for the prevention and management of chronic viral diseases like HCV among injection drug users, since the mode of infection and behavior of vulnerable population for both HIV and HCV contagion are identical. Since the transmission of HCV is similar to HIV and IDU is the primary risk factor for HCV infection, and coinfection of these two blood-borne diseases cause morbidity and mortality, harm reduction approach and the strategies that address the social and economic harms that impact an individual, community, or society are paramount in preventing the epidemic.

Hepatitis C is the ma...
11 Pages(2750 words)Term Paper

Social Security: Is It in Danger and What Should Be Done

A country that realized the importance of giving the elderly the respect and financial stability they deserve for their lifetime efforts is the United States of America. There was a need for a system that would guarantee a monthly income for retired people. The Great Recession of 1929 left a sour taste in the minds of most American citizens and created greater instability for the nation.  On August 14, 1935, the Social Security Act was passed which created the social security system under the mandate of President Franklin D. Roosevelt (Social security). In 1962 the program was expanded to include medical insurance benefits. Social security has helped bring social justice to American retirees for over 70 years. 
6 Pages(1500 words)Term Paper

Depression in Children: Prevention and Treatment

Various theories have been put forward for the development of depression. It is important to understand the causes of depression in children so that proper intervention can be provided in proper time and in an appropriate manner.
According to the Cognitive Theory of Depression, negative thinking alters the perceptions, interpretations, and memory of the personal world and leads to the development of depressive symptoms. The Parent-Child Model for Socialization theory proposes that intrusive support from the parents to those children who are constantly involved in the negative self-evaluative process causes depression The Tripartite Model of Depression and Anxiety theorizes that depression is characterized by the low positive...
6 Pages(1500 words)Literature review

The Relationship Between Security, Risk and Health in a Large Organisation

...The relationship between Security & Risk and Health & Safety in a large organisation "Assess the relationship between Security & Risk and Health & Safety in the context of a large organisation. Are they complimentary or the demands of one conflict with or inhibit the realisation of the other? Identify and discuss the implications of your assessment for the roles of the security manager". 1. Introduction The development of commercial activities worldwide has been extremely rapid; firms operating in various industrial sectors need to confront a series of challenges in order to ensure the limitation of risk related with their strategic initiatives. Within this context, the issues of security, risk, health and safety are very likely to appear...
9 Pages(2250 words)Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages(1500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Role of the Police and Private Security

Hence understanding the criminal justice system is extremely important so that it may be implemented effectively and impartially. Hence, this report will also cover the following areas namely, the three levels of law enforcement in the United States, the interaction between those agencies, the role of the police and private security personnel in homeland security, the role of this group in intelligence gathering and federal funding.

The three levels of law enforcement in the United States cover national, state and local security. This task of homeland security is the responsibility of the Federal Bureau of Investigation (FBI), the state police forces, and the local police force. Each of them has specific areas to cover...
8 Pages(2000 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Security and Loss Prevention for FREE!

Contact Us