StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Receiving A Telephone Call From The Security Guard. Company's Security Issues - Essay Example

Comments (0) Cite this document
Summary
Under the capacity of human resource, I have to ensure that secrecy of the matter remains within the boundary of the company. I'll therefore ask the security guard to immediately ensure that no employee is able to get out of the company's boundary…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Receiving A Telephone Call From The Security Guard. Companys Security Issues
Read TextPreview

Extract of sample "Receiving A Telephone Call From The Security Guard. Company's Security Issues"

Download file to see previous pages I'll further ask the security guard to produce a list of those who entered the locker room and list of those who operated their lockers in last twenty four hours.

The Security guard will be asked to call upon the in-charge of department handling cameras and equipments, the in charge will be requested to figure out if he had any clue regarding loss of the cameras. If yes, the main in-charge will be requested to report the exact timings of the loss. The security department will be asked to ascertain the list of those who visited the equipment department, and inquire about their purpose of visit, the frequency of visits has to be noted down.

Upon reaching the location, I'll inspect the data gathered by the security guard. Every present employee, including the security officials, will be handed over a page, to give a brief description of their entire working day; the respective pages will then be handed over to the in-charge of the department for confirmation and verification.

In the meantime, I'll develop a personal interaction with Randeep, listen to his part of the story, the team leader of his department will be requested to give me a highlight about employee's past record and activities.
Randeep will be asked to provide the exact timings of when did he operated his locker last time, and why should he be considered innocent of the charges.
Of course I will not consider Randeep to be the culprit, because if he had to steal it, he would not have been fool enough to place those cameras into his locker, that are regularly inspected. Randeep is either too stupid to make such robbery, or he is innocent.
I'll inform the company's management about the incident, and will inform him about the steps taken. I'll seek his guidance, if he wanted crime forces to intervene, and conduct the inquiry, or wait for the outcome of the steps initiated by my authority as Human Resource Manager. The company's management guidance will be requested with reference to ordering immediate termination letter to the employees found guilty of charges. The company's management will be informed as per their convenience, before the next working day commence.

What do you think has happened
After listening to the employee's version, and receiving briefing by the team leader. I'll ask my deputy to interact with Phil. Phil will be asked verbally to ascertain all that he has written on the paper, he will asked to proof that he has no connection with the charges, such that neither he plotted the event, nor he supported Randeep for his action. I'll ask my deputy to not only target Phil, but target some other individuals, including staff in the security, because it was mainly a lapse from their side as well.
I would have personally considered Randeep to be the culprit, but the reason for not doing is that because the crime committed or impose upon Randeep has emerged out during the period when the company is likely to announce the nomination of Randeep for the position of Team Leader. An employee who is so dedicated and sincere towards his task, who understands that he will be promoted soon, is not likely to commit such crime, perhaps Randeep would have received better opportunities to steal after his promotion.
I will certainly have different versions related to the incident,
1. Either Randeep has stolen the camera, to gather money, because he has been always complaining shortage of finances after he separated.
2. Either Phil has committed this folly, because he wanted to damage the image of Randeep, as the company planned to announce the suitable ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Receiving A Telephone Call From The Security Guard. Company's Security Essay”, n.d.)
Receiving A Telephone Call From The Security Guard. Company's Security Essay. Retrieved from https://studentshare.org/miscellaneous/1503835-what-action-would-you-take-upon-receiving-this-telephone-call-from-the-security-guard
(Receiving A Telephone Call From The Security Guard. Company'S Security Essay)
Receiving A Telephone Call From The Security Guard. Company'S Security Essay. https://studentshare.org/miscellaneous/1503835-what-action-would-you-take-upon-receiving-this-telephone-call-from-the-security-guard.
“Receiving A Telephone Call From The Security Guard. Company'S Security Essay”, n.d. https://studentshare.org/miscellaneous/1503835-what-action-would-you-take-upon-receiving-this-telephone-call-from-the-security-guard.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Receiving A Telephone Call From The Security Guard. Company's Security Issues

Social Security Program Issues

Governments, particularly in the developed countries, are spending huge amount of resources on the social security programs offered to their citizens (Gruber and Wise). These social security programs provide health facilities, income support in case of unemployment, education facilities to the offspring and in some cases, special gifts and bonuses during national festivals etc. The facilities are generally offered to the unemployed, physically disabled due to accidents etc. and senior citizens who have retired from their jobs. History: Human beings have always faced economic uncertainties triggered by war, calamity, famine, physical disability and old age. Different traditions have been developed by human beings since ancient tim...
10 Pages(2500 words)Research Paper

Network security fundamentals, security threats, and issues

...?NETWORK SECURITY FUNDAMENTALS, SECURITY THREATS, AND ISSUES Network Security Fundamentals, Security Threats, and Issues Affiliation Date 3.1. Network Firewalls Security consists of tools, technologies, measures and laws used to ensure the safety of resources. At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area Networks (LANs) and Wide Area Networks (WANs) to the Internet. In view of the fact that the Internet is a huge network of networks, as well as for the reason that of its basic design is intrinsically insecure and unsafe. In addition, data and information (in the form of communication) are often distributed all...
4 Pages(1000 words)Case Study

Security Issues Within Virtualization

... is breaking the mold on how networks should get built. Vaughan-Nichols, S. J. (2008). Virtualization sparks security concerns. Computer, 13-15. Retrieved January 17, 2009. Retrieved from http://ads.computer.org/portal/cms_docs_computer/computer/homepage/Aug08/r8technews.pdf As virtualization becomes common for businesses, the quirks and problems have become a big concern. Security levels and issues are the first thing on most virtualization users’ minds. This article informs about some of the security concerns businesses have with virtualization. Vouk, M. A. (2008). Cloud Computing – Issues, Research and Implementations. Journal of Computing and Information Technology, 16(4), 235-246. Retrieved from http://cit.zesoi.fer.hr...
2 Pages(500 words)Coursework

Database security issues

The paper analyzes security issues concerning both web based and traditional databases.
Database inference is a security issue that multi level databases are prone to. Inference can be defined as the process in which a user can infer restricted information from results of queries. Typically, inference occurs when a user at a lower security level is able to put together trivial information accessible at that level to deduce a fact that requires a higher security clearance to access. To be able to access the higher security level information, a user may exploit correlated data. If for instance a user can access the values of H and K, then for a case whereby Z=H*K, the user can correctly infer the value Z even without security cl...
5 Pages(1250 words)Research Paper

Security findemental (contract security guard service selection exercise)

... and the information they provide, are checked with a polygraph. This shows that there will be any distortion in the background of the employees. The employees are trained well as they undergo classroom training from their managers along with a 4-8 hours training in the site in order to develop familiarity with real organizational situations. This will ensure that the employees trained by the company are efficient security guards, which would be an added advantage for our company. As we do not have to provide them extra training and this will eliminate the cost of training. Works Cited Security Issues. Guardsmark. 2002. Web. 09 April 2012. issues/issues.asp?nav=3&content_id=41 >                  ...
2 Pages(500 words)Essay

Security findemental (contract security guard service selection exercise)

... Library and museum studies   09 April 10-April Security Staff Contract Report From The Manager Security Department ABC Company USA To The Manager The Human Resource Department ABC Company USA Sir, Subject: Recommendation for security guard service contract. The memorandum hereby provides the results for recruiting the security supervisors with an immediate effect for the rotating shifts in the organization. As per the shifts, eight employees are to be hired for each shift, that is, a total of 24 employees will be required depending on various duties in the company like patrolling personnel, entry officers, inspection of trucks and the security operations...
2 Pages(500 words)Essay

Security findemental (contract security guard service selection exercise)

arm to another person, making threatening remarks, damaging the property of other employees or employer with intent, possessing a weapon while conducting company business or within business premises. Others include hostile or aggressive behavior that creates reasonable fear of injury to other people or subject them to emotional distress, and committing acts related to, or motivated by, domestic violence or sexual harassment (Kim 169).
The most vulnerable employees to the risk factors are those working in the public setting, including those working late at night or in the early morning hours, in small groups, in uncontrolled access environments open to other employees and the public, and other areas of previous concern that inc...
4 Pages(1000 words)Essay

Issues in Homeland Security

Issues in Homeland Security al Affiliation Issues in Homeland Security The Department of Homeland Security is a special department under the administration of the US federal government. The primary objective of the Department of Homeland Security (DHS) is to ensure the security of the US from the terror attacks, emergencies, man-made hazards, and natural calamities and respond to it (Webster, 2008, p. 6). Since the establishment in 2002, the DHS has regularly assisted tribal, local, and state governments in combat against terrorism, natural disasters, and other security threats (Webster, 2008, p. 6). However, there are various significant issues in the homeland security which need to be tackled. Based on the official report of DHS...
1 Pages(250 words)Essay

Company Security

...Company Comrade Network Security Proposal Today’s advanced technological environment has resulted in easy accessibility and availability of information, which has subsequently threatened the security of information systems for a wide range of organizations. In client/server systems, where information is shared across numerous sites and servers, centralized security services may be impractical since they may not scale well, which leads to high vulnerability of the network to security issues is at stake (Rob & Coronel, 2007). Security is vital for the management, users, as well as the technical personnel that make use of the network. The needs of users of the data provided via a network and subsequently develop a security policy and plan...
8 Pages(2000 words)Essay

Business Plan Project for a Security Guard Company SecureIT

... will provide the collection of information point with field employees and those in the premise. The head of this team need to have experience in the provision of security services, preferably a person that has served under the police or army or intelligence units for effective running of the operations of SecureIt. The operations teams will deal with deployment of guards, their management and survey services on the places they are deployed. The operations department also will cover the human resource functions of the organization dealing with hiring, evaluation and firing of guards and other personnel. Section Six: Operational Issues: For effective operations with proper management of the operational costs, the company will rent already...
9 Pages(2250 words)Case Study

The Company Targets Customers

... and introducing new ideas. Only company to offer make your own PC offer. Strong business Process outsourcing Weaknesses: Relatively young in age and dominated by young executives lacks Maturity. Loses a lot of business due to non-retail activities. Believes Carrying out marketing only through the Internet and telephone. Less reputation. Needs a lot branding beyond American shores. Recently New Mexico Supreme Court allowed a class action suit against...
8 Pages(2000 words)Case Study

Company Strategy to the Public Sector

The definition of corporate strategies emphasizes the need for the organization to satisfy the needs of all the stakeholders if the organization is to achieve its overall objective of maximizing shareholder value. Stakeholders include employees, customers and the communities in which the organization operates. Employees, customers, and communities, therefore, have a significant impact on the success of the organization and thus on the corporate strategy of the organization. In formulating corporate strategy, organizations need to identify and priorities strategic issues, which involve scanning, selecting, interpreting and validating information. (Schneider, 1989).
The aim of this paper is to explain the strategy of an organiz...
7 Pages(1750 words)Assignment

Company Law Issues

Various sections of the CA are coming into force over a staged process and the relevant provision relating to authority is sections 39 and 40, which came into force on 1 October 2007.

Section 39(1) of the CA provides that “the validity of any act done by a company shall not be called into question on the ground of lack of capacity by reason of anything in the company’s constitution”

Additionally, section 40(1) provides that: “In favor of a person dealing with a company in good faith, the power of the board of directors to bind the company, or authorize others to do so, shall be deemed to be free of any limitation under the company’s constitution”.

Section 40 (2)...
9 Pages(2250 words)Case Study

The Relationship Between Security, Risk and Health in a Large Organisation

... but their co-existence is not quite calm. All these concepts have a series of demands that need to be addressed by firms’ managers – either in the short or the long term in order for the organizational activity to progress without delays. Works Cited Bradford, M. (2007) Personal credit information - Privacy and information security issues — the Experian view. Business Information Review, Vol. 24, No. 4, 253-256 Brewer, B., Huque, A. (2004) Performance Measures and Security Risk Management: a Hong Kong Example. International Review of Administrative Sciences, Vol. 70, No. 1, 77-87 Cooper, M. (2008) The inequality of security: Winners and losers in the risk society. Human Relations, Vol. 61, No. 9, 1229-1258 Flin, R., Yule, S. (2004...
9 Pages(2250 words)Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages(1500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Role of the Police and Private Security

... than thirty thousand staff employed by the agency and they obtain a federal grant of more than six billion per year. The Agency began its operations in 1908 when the policy makers of the nation felt that a new agency was needed to provide security to a quickly expanding nation and economy. New cities and towns were coming into existence and new territories were beginning to be occupied. As is expected this also brought about an increase in criminal activity resulting in the need for a national agency. Their motto is Fidelity, Bravery, and Integrity which is also an expanded acronym for the word FBI. The present director and chief of the agency is Robert S. Mueller III, who took charge in 2001. The official website of the agency is also...
8 Pages(2000 words)Case Study

Business Sustainability and Society: Coca-Cola Company

For centuries, ethics has been a crucial and significant component of human societies that contributed enormously to the creation of norms and values through religious influences, as well as through the contribution of intellectuals and philosophers in society. Unfortunately, nowadays, it is an observation that individuals, organizations, and even nations have commenced overlooking the phenomenon of ethics in their practices, specifically in the business sector that has become the major stakeholder confronting criticisms related to ethical practices. Critics (Crane, pp. 23-29, 2007) argue that business ethics has now become a component limited to theoretical policies and frameworks of business organizations, and such principles an...
10 Pages(2500 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Receiving A Telephone Call From The Security Guard. Company's Security Issues for FREE!

Contact Us