StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Comprehensive Security Plan - Assignment Example

Cite this document
Summary
This paper “Comprehensive Security Plan” is designed to look into the security plan of the New York public library. The library has almost 53 million items. Thus, it is the second-largest public library in the entire US. It is an independently managed NGO that has both private and public financing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Comprehensive Security Plan
Read Text Preview

Extract of sample "Comprehensive Security Plan"

Comprehensive security plan Comprehensive security plan Introduction This paper is designed to look into the security plan of New York public library. The library has almost 53 million items. Thus, it is the second largest public library in the entire United States. It is independently managed NGO which has both private and public financing. The library has affiliations with other academic and also professional libraries in New York. The various branches of the library are open to the members of the public. It was established in 1895 The body of the paper covers the various aspects of detailed security plan with the different areas appropriately covered. The New York public library has a very small security force operating within the premises of the library. Thus, the paper highlights the different available security plans for the whole premises of the library. Considering that the library is located in large premises, it is important that the various parts of the library are able to participate in maintaining the security of the premises. This paper comprehensively discusses the various aspects of the plan and sums up all the major areas into one report for it to be used in all the parts of the library. As the reader progress to study the report, it could be beneficial in understanding about the library and the importance of the security plan for the library. This paper covers the following list of different plans in the paper: Physical plant intrusion (e.g., burglary) Property damage, interior, and exterior (e.g., vandalism, theft etc.) Personal security (e.g., assault, personal property loss/damage, etc.) Information/ records security Emergency planning and response OSHA standards and violations Hiring practices Training practices Legal issues unique to the site Recommended policies and procedures Physical plant intrusion Physical security is important for the library since it prevents unauthorized access to the facility, its equipment, and resources and protects property from harm or damage (Bender, 2009). It involves the use of various interdependent systems including CCTV surveillance, locks, control protocols, and many other security techniques. The library has a methodology of assessing the effectiveness of the various controls that are available in the facility to control against events that might threaten the availability and integrity of data in the facility. It is also capable of protecting against loss of the items in the library. The main aim of maintaining physical security is to detect any potential intruders, detect any intrusion, and monitor the intruders. It is also aimed at triggering the required responses to the incidences of intrusion into the facility. The security designers and the architects of the facility ought to balance various security controls considering the costs of using the specified security control method. The facility already has a physical barrier which includes walls and vehicle barriers, which serve as a means of, prevent or delaying the attacks. It should incorporate the use of internationally recognized companies to provide the required level of security measures of the valuable items in the library. Due to the huge area that the library covers, it is important for the facility to incorporate the use of CCTV cameras to monitor any activities in the library. Alarm systems ought to be placed at various strategic locations of the facility to detect any form of intrusion. The facility can also incorporate the use of access control procedures that enables any individual accessing the facility to identify themselves and to be screened to prevent any form of unwanted and unauthorized entry (Pressman, 2007). Property damage Any exterior or exterior damage to the property of the facility could result into huge amounts of losses. It is important for the facility to ensure that it has security plans set to protect against property damage. One of the most used strategies is by insurance premiums. The more than 53 million items in the facility can be insured to ensure that in the event of damage, the facility is well protected from damage. The staff in the facility should apply this policy and always be on the lookout for any suspicious activity or individual in the facility. In the event of any suspicion, the staff could report it to the near security personnel. However, the most important thing is to ensure that the installed security control systems are in use at all times including gates, doors, and locks. The 24/7 security personnel in the institution should not let any suspicious individual beyond the entrance of the facility without proper screening. Personal security The facility has measures in place to protect the personal security of members of the public who might access the facility. Methodologies are also in place to protect the valuable assets of these individuals including their vehicles in the parking lot of the facility. However, the facility has to ensure that they improve on the set measures to ensure that all individuals in the facility are protected. The most dangerous acts that can affect the public in the facility are terror attacks. The facility has to instigate measures to evacuate members easily from the facility in the event of a terror attack. Moreover, there should be an increased number of security guards and CCTV cameras in the facility to ensure that every individual in the facility is highly monitored. Information/ records security The facility has access to various confidential information of the members of the public that should not leak out to outsiders. Most of these pieces of information are stored in the computer systems’ folders. The facility also has confidential information about its operation that could also be detrimental if it happened to leak out. That is why the facility should have measures in place to protect against any form of cyber crime that might be directed towards their systems. They should ensure that their systems are protected with strong ant viruses that can detect any worms, viruses, or Trojans in the system. The systems should also have installed complicated passwords or other identification means to ensure that only the authorized individuals are able to access them. Emergency planning and response In the event of any vulnerability or threat to the facility, its assets or to the members of the public using the facility, the facility has to come up with an emergency response. This will go a long way in preventing massive losses of property or lives. The facility has to ensure that it has a budget in place that ensures that in case of an emergency there is enough cash to solve the arising situation. Moreover, the facility should ensure that its staff members are well trained on how to deal with emergencies. There facility should ensure that all its emergency exits are easily accessible at all times to ensure that the individuals in the facility are able to quickly exit the premises (Bidgoli, 2006). The security personnel in charge should be on the look out to act fast in the event of such emergency situations. OHSA violations and standards There are various OSHA violations that are evident in the facility. One of them is the scaffolding violations, which are situations where an employee might slip or is struck by a falling object. The electrical/wiring measure where the staff members and the public in the facility are indirectly affected by electricity. Due to the penalty that results from the violation of the OSHA standards, it is important for the organization to put measures in place to prevent it. The facility should provide its workers with a workplace that does not have hazards and must carefully follow the safety and health standards of OSHA. The facility must find and correct any emerging safety and health problems. OSHA also requires that all employers must eliminate or reduce emerging hazards by making visible changes in the working conditions of the facility rather than relying on protective equipment including masks and gloves. Safety of the facility will ensure the safety of the staff members and also the safety of the members of the public using the facility. The facility should have the best ventilation, good wiring of the electrical systems, and all other measures of protecting the facility. Hiring practices The employees of the facility should be on the frontline in providing quality services to the public using the facility. That is why the hiring process should put into consideration the qualifications of the potential employees hired. Measures should be in place to screen the candidates of the position before they are hired into the organization (Robert; Edward & David, 2013). The reason is that some of them could be applying for the position with other interior motives probably of stealing from the organization. Others may lack the required expertise or may not have the same goals that the organizations have. Training practices The training of hired candidates should be thorough and effective. It is important for the facility to ensure that it trains its employees in the safety and the health aspects of their jobs. The training of employees into the facility is an important part of their safety and health programs of protecting them from illnesses and injuries. New employees are more susceptible to accidents and injuries in the facility than more experienced workers of the facility. That is why it is important for the facility to ensure that it provides adequate training of the employees to prevent cases of accidents or unsatisfactory customer service. If need be, the facility should create ample time for the training of its employees. Legal issues unique to the site There are various legal issues that can face the facility. However, the most common one is the copyright legal issues. Various patent and copyright laws protect the books in the library. That is why the facility has to be careful on the books they purchase. The distributors of their books should be authorized to conduct the distribution else, the facility could face legal issues that could be detrimental to its already established brand name. Moreover, any equipment used in the facility should be from an authorized distributor to ensure that the equipment is legally acquired. In the event that the equipment including the computer systems are illegally acquired without the knowledge of the facility and they go ahead and purchase them, they can get into legal issues. Recommended policies and procedures It is important for the facility to make use of various policies and procedures to ensure that their facility is well protected. They should ensure that strategies are in place to protect against physical intrusion. This should occur using CCTV cameras and use of security guards and personnel can protect against any form of physical intrusion. Moreover, the facility should have insurance policies in place to ensure that they minimize the effects of property damage that may result in the event of their daily operation in the facility. The facility should also ensure that the personal security of its employees and members of the public is in place. They should ensure that they heighten the level of personal security in the facility to prevent against assault, loss, or damage of personal valuables of the members of the public. Their information security should be well protected to ensure that it avoid the loss of confidential information or records of the facility or the members accessing it. It should have emergency planning and means of responding to it in place to avoid cases of loss of lives or damage to the assets of the facility. The priority of the facility is to ensure the safety of its employees and the members accessing the facility. At the same time, it should provide quality services to the members of the public in a safe and secure environment. References Bender, J. (2009). How to prepare a security plan. Alexandria: American Society for training and development. Bidgoli, H. (2006). Handbook of Information Security Volume 3. Hoboken: John Wiley and Sons. Pressman, A. (2007). Architectural graphic standards. Hoboken, N.J: John Wiley and Sons. Robert, J. F; Edward, P. H.; & David, C. W. (2013). Introduction to Security 9th Edition. Butterworth: Heinemann Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Comprehensive Security Plan Assignment Example | Topics and Well Written Essays - 1750 words - 2, n.d.)
Comprehensive Security Plan Assignment Example | Topics and Well Written Essays - 1750 words - 2. https://studentshare.org/business/1853389-case-study
(Comprehensive Security Plan Assignment Example | Topics and Well Written Essays - 1750 Words - 2)
Comprehensive Security Plan Assignment Example | Topics and Well Written Essays - 1750 Words - 2. https://studentshare.org/business/1853389-case-study.
“Comprehensive Security Plan Assignment Example | Topics and Well Written Essays - 1750 Words - 2”. https://studentshare.org/business/1853389-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Comprehensive Security Plan

Security Plan for Walter Widget Manufacturing Plant

security plan for Walter Widget Manufacturing Plant No: Roll No: Date: University: security plan for Walter Widget Manufacturing Plant Introduction In this modern age and times, security of many organizations is a focal point for the top brass.... To address this issue Walter Widget and the members of business communities are in favor of having an effective security plan to eliminate the chances of stealing factory assets.... They are aware that leakage of information relating to security plan may cause irreparable damages to the assets of the organization (Allen, 2009)....
11 Pages (2750 words) Research Paper

Public Policing Versus Private Security

Public Policing Vs Private security Public Policing Vs Private security Introduction Although private security and public police basically carry out different errands, often the policing performed by them are mutually supportive.... Some of the other important services rendered by them include, ‘investigating corporate fraud, endowing with risk management consultations, and executing security measures to defend property from theft and fire' (‘Private investigator, 2011)....
7 Pages (1750 words) Essay

The Public Polices Main Role

Running head:  Public Policing versus Private security Comparison Paper Public Policing Versus Private security By Denise Mailey AJS/502 Survey of Justice and security Instructor Amy Gordon Introduction The crime rate continues to rise as a result of advanced technologies, which influence white-collar crimes, for instance, fraud and computer crimes among others, (Swol, 1999 p34).... hellip; The public police lack appropriate resources to deal with such crimes, since they have to stick to their budget, and as a result, private security has emerged and is increasing....
5 Pages (1250 words) Essay

Maryland Department of Public Safety and Correctional Services

Maryland Department of Public Safety and Correctional Services (DPSCS) is one of the largest state agencies in the state of Maryland.... It provides employment opportunities to around 12,000 employees with a budget of US$ 1.... billion.... … Case Study Introduction Maryland Department of Public Safety and Correctional Services (DPSCS) is one of the largest state agencies in the state of Maryland....
11 Pages (2750 words) Assignment

Network Security

Therefore, it is paramount to implement a Comprehensive Security Plan urgently.... Using up-to-date equipment and technology and enforcing a Comprehensive Security Plan, attacks such as those mentioned above can be prevented and denied.... The Internet has become a staple of the business world today It is because of this that a company should remain continually up to date with the latest security measures.... ulnerabilities due to designs flaws,poor security management can contribute to the loss of company assets… With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity....
3 Pages (750 words) Case Study

Evolution of Seaport Shipping Container Security Since 9/11

On this basis, any disruption of the maritime network will have a great disruption of the world economy....
10 Pages (2500 words) Research Paper

Performance and Security of Windows Server

The paper 'Performance and security of Windows Server' presents Windows Server 2003 which is the next generation of server operating systems.... hellip; By default, the server components of Windows Server 2003 are disabled for security purposes.... The IIS web server has improved performance and security.... One of the key features of Windows Server 2003 security is the Common Language Runtime software engine.... Another security feature of Windows Server 2003 is the ability to restrict the software running on any machine using software restriction policies....
8 Pages (2000 words) Case Study

Public Policing Versus Private Security

This essay "Public Policing Versus Private security" compares private security and public police that basically carry out different errands but the essential policing performed by them are mutually supportive, making law enforcement easier and effective.... nbsp;… Regardless of the common goals and duties of both private security and public policing, the latter has a much wider mandate than the former.... The public policing functions on behalf of the government and hence receives more benefits when compared to the private security individuals....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us