Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Security findemental (contract security guard service selection exercise) - Essay Example

Comments (0) Cite this document
The computer software products are very valuable and, thus, they need to well protected, especially during the night. If more efficient guards are there then they can serve the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Security findemental (contract security guard service selection exercise)
Read TextPreview

Extract of sample "Security findemental (contract security guard service selection exercise)"

09 April Security Fundamental (Contract Security Guard Service Selection Exercise) Comparison of the three Companies:
U.S. Security Associates
Employees need higher diplomas.
Specialized training is provided to employees.
Class room training is provided.
Guard patrol services, risk analysis, security consulting advice, air, pharmaceutical, energy and utility services
Airport security, private mobile, international security services.
Full range of security services from protecting a factory to the consultants in the project.
46000 employees
18800 employees
Selection procedure
Difficult to get selected.
Benefits to employees
Health care benefits.
Assists in Career development.
Health and life insurances, holiday programs and employee recognition programs.
The Security Manager
ABC Company
The Manager
ABC Company
Date: 09/04/2012
Sub: Recommendation for Security Guard Service Contract
Sir, I am writing this letter to inform you that there is need for more security guards in the office. The computer software products are very valuable and, thus, they need to well protected, especially during the night. If more efficient guards are there then they can serve the company in a better way by avoiding and controlling major risks. The initial contract period can be set for one year and if it is seen that they deliver quality performance, then the company can extend their service.
The analysis of profiles of three security guard companies has been made and depending on the cost and the performance of those companies, the one that will meet the company’s budget is selected. The three companies are US Security Associates, Securitas and the Guardsmark. The cost, performance, and the training given to employees in each company is different. Among the three, the Guardsmark profile seems to fit the organization’s requirements the most. Guardsmark is the fifth largest security guard company in the country. It possesses certain qualities which are different from the other two. The cost incurred is lower, as the salary provided to the security officers ranges from 20,000-32,000 dollars. Since our company is in the developmental stage, salary can be provided in this range only. “Guardsmark has been monitoring the latest security threats for decades. Our corporate leadership includes former law enforcement officers, FBI executives, military specialists, and Secret Service agents. By bringing together keen security expertise with talent and experience, Guardsmark has created a vibrant laboratory for industry leadership and innovation. The result? Cutting-edge security intelligence across the most important topics” (Security Issues par. 4). Regarding the qualification and skills of the employees also it is satisfactory. The recruitment and selection processes are seen to be difficult comparatively. The employees are interviewed and the information they provide, are checked with a polygraph. This shows that there will be any distortion in the background of the employees. The employees are trained well as they undergo classroom training from their managers along with a 4-8 hours training in the site in order to develop familiarity with real organizational situations. This will ensure that the employees trained by the company are efficient security guards, which would be an added advantage for our company. As we do not have to provide them extra training and this will eliminate the cost of training.
Works Cited
Security Issues. Guardsmark. 2002. Web. 09 April 2012.  
Read More
Cite this document
  • APA
  • MLA
(“Security findemental (contract security guard service selection Essay”, n.d.)
Retrieved from
(Security Findemental (contract Security Guard Service Selection Essay)
“Security Findemental (contract Security Guard Service Selection Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security findemental (contract security guard service selection exercise)

Homeland Security Exercise Program

...?Donna Purcell Order 541145 27 May Homeland Security: The s, In Relation to Exercise, Design, and Evaluation. “Security risk, financial worries, and Mother Nature will always be on the horizon. Periodically, things will go wrong. While we must do our best to prevent these events, we must also be realistic and think about, plan for, and prepare to minimize the consequences of those eventualities so that we can bounce back quickly.” There are many things that Homeland Security does to protect us. They provide protection of our territory, sovereignty, population, and infrastructure and control the management of the consequences of any incident or domestic emergency. 1. Homeland Security provides border and transportation security, 2...
5 Pages(1250 words)Research Paper

Security Bank Customer Service

... Lecturer: Security Bank Service Introduction The business aims to offer services across the organizations. Therefore, the business will focus on delivering effective customer service provision to varied organizations. The products or services include delivering high quality services to organizations and creating new systems in order to deliver strong security to customers efficiently. . Objectives of the Business The business will create the new system that will improve strong security banking customer services. It will offer organizations a high quality banking customer services to organizations. It also focuses on implementing efficient business performance through leveraging technology solutions in order to deliver a high standard...
4 Pages(1000 words)Essay


... Security The paper delves into the concept of online security which is indeed a very fundamental concern in the present world. In this regard, Google is heavily investing in a series of authentication through the use of two-step verification. There is a greater need to realize a stronger user security and device identification and limit much of the insecurity. The paper identifies some of the common security threats that face people online. However, it is realized that while people are reactive about aspects of online security, they only invest slightly to reduce this risk. This is majorly done through passwords without strong authentication. Some of the major security concerns related to passwords include phising, reuse and the use...
4 Pages(1000 words)Essay

Proprietary and Contract Security

... security has its own niche and it cannot cater to wider base because of its small staff. Nonetheless, in the present era of globalization the dividing line is blurring as outsourcing of work on contract basis is increasing. Sources: Contract Security Services, NASCO Concludes First Contract Security Summit, 30 May 2006, Proprietary Security Services Act 2006, Shamus McGillicuddy, Open source security OK, experts assure SMBs,,289142,sid183_gci1267992,00.html...
4 Pages(1000 words)Essay

Security Service

...Topic: The security service was established in response to a largely imaginary threat. Security Service The security service is a composition of several coordinated roles that are mandated to ensure that security is prevalent within the nation. The United Kingdom security services include patrols, monitoring, and defence against external aggression. These are the services that are subject to this study. The security service of the United Kingdom is divided into two main apparatus. The first is the province of security Service denoted as M15. (Nicholas1990). This is charged with ensuring that there is security within the country, collectively known as internal security. The next, MI6 is charged with the responsibility of ensuring...
10 Pages(2500 words)Essay

Security findemental (contract security guard service selection exercise)

... centre. The length of appointment can be for a year contract, and the contract can be extended depending on the performance of the employees. Researches have been conducted on certain security regulating agencies for the understanding of their professional approach, dedication to services and the reputation of the company. The research was conducted on three reputed companies in the US and after intense scrutiny, the company selected for making contract with our company is the ‘US Security Associates’. The security guard contract company is selected based on certain criteria, which included revenue, medical benefits, company’s reputation, its strength and the years of experience it had in the particular field. The US Security Associates...
2 Pages(500 words)Essay

Security findemental (Work place violence policy exerise)

... Security Policy A policy refers to a document that contains guidelines or regulations that control the conduct of people who meet regularly at a certain place to work towards a common goal. Policies are the work of the top management in a company or an institution. Policies help maintain a harmonious and efficient condition for the effective pursuit of a goal or an objective. The formulation and setting of policies is usually done with the aim of controlling performance and behavior of individuals over a long period. The setting or formulation of policies is done after intensive research on the ideal working conditions and the nature of the environment of a particular place (Karen, 34). Thus, policies are usually applicable in normal...
4 Pages(1000 words)Essay

Security findemental (contract security guard service selection exercise)

... sound decision-making options. The worksite analysis should enable the supervisors, managers, employees, and law enforcement to gather information concerning the potential risks or the possibility of the community’s experience in a particular criminal rash. Managers and supervisors should seek to identify employee environment that poses risks and threats, and address them specifically as risk factors. The working environment is uniquely different, thus managers and supervisors should seek competent expert services in this field. It is illogical to expect that all employees has skills in identifying potentially dangerous individuals, but employees must exercise good judgmental practices and inform departmental heads, security personnel...
4 Pages(1000 words)Essay

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Law of Contract

For instance, in Partridge v Crittenden, it was held that an advertisement is tantamount to an invitation to treat (Partridge v Crittenden, 1968). However, there are exceptions, where an advertisement is considered to be an offer. An example is provided by the Carbolic Smoke Ball case. In this case, the defendant’s contention that its newspaper advertisement was not an offer was rejected by the court; as the plaintiff had complied with the terms of the offer (Carlill v Carbolic Smoke Ball Co, 1892).

Thus, the advertisement placed by Adams in the local newspaper is an invitation to treat and not an offer, as per the case law discussed above. It is to be determined, whether Adam had formed legally binding contracts...
6 Pages(1500 words)Case Study

The Effects of Exercise on Glucose Metabolism

In both groups, such levels continued to increase then later declined after about 30 to 60 minutes. The exercise group exhibited a sharper decrease after 30 to 60 minutes from intake while the non-exercise group exhibited a slower decrease in blood glucose levels after 30 to 60 minutes. This study concludes that exercise increases glucose metabolism causing it to be utilized faster by the body.

Exercise causes the body to utilize more energy. This energy would necessarily come from the body’s energy storage and largely from glucose and its derivatives. With higher energy demands during exercise, more energy is also utilized; consequently, more glucose is utilized. Various studies have been conducted on this intera...
11 Pages(2750 words)Lab Report

Analysis of Davis Service Group

It offers a detailed set of recommendations with an implementation plan along with the 7’Ps. Complete with a discussion about the budgetary requirement and the control mechanism, milestones and the corrective actions to be taken have also been dealt with in this plan.

The Davis Service Group, an 80-year-old British multinational company operating in the UK, EU, and the USA with rendering hire services as its primary business. A conglomerate with over 1500 million GBP net worth and a constituent of and is a constituent of the FTSE 250 Index.

The company founded in 1920 by Godfrey Davis renting out automobilesiii, over the years, has grown to be a leader in textile maintenance services. In...
12 Pages(3000 words)Case Study

Enterprise Information Security and Privacy

The PCI DSS was created primarily created by Master card and Visa but later on, we're joined by three other premium credit card companies to form an independent council to counter online credit card fraud. The American Express, discover financial services and JCB were the three other companies that decided to take an active part in the stand taken by Visa and MasterCard. To understand the effectiveness of PCI DSS it becomes crucial to understand its core functionality and the reasons it was devised. The objective of PCI DSS is to build a secure network, protect cardholder data, maintain a vulnerability management program and implement strong access control measures (Wright .2008.Page11). In today’s time when security has bec...
6 Pages(1500 words)Assignment

Difficulty in Operations and Service Management

The unique nature of every service makes the evaluation of quality extremely difficult. Let’s take the case of a doctor. The doctor might be thinking that when he is knowledgeable, is able to provide correct treatment to his patients, has the latest equipment and techniques and the required number of support staff, he is delivering good service. The patients, on the other hand, might be including the friendliness of the doctor and the support staff as well in the list of parameters to call the service as good. If they do not get this, the service quality provided is poor.
The parameters included calling the doctor's service as quality service may also differ from person to person. Some of the patients might be finding e...
8 Pages(2000 words)Assignment

How Do Customers Assess Service Quality of Retailing Websites

Given the emergent nature of online commerce, it is a tough task for retailers to develop a website that meets all expectations from consumers. This view is supported by a survey conducted by the UK’s largest e-consultancy Cap Gemini. The survey identified several key disadvantages for online shoppers. Some of these include “’ Availability’, ‘Can’t be in to receive delivery’, ‘Premium charged for delivery’, ‘Can’t see or feel the merchandise’, etc.” (Quader & Quader, 2008) These are not trivial complaints by any means and despite the e-retailing industry setting foot into its third decade in existence, there are no satisfactory solutions found for th...
6 Pages(1500 words)Literature review

Greatest Long Term Threat to the UKs National Security

The UK is one of the major countries which are targeted by terrorists. Apart from terrorism, the UK is currently facing many other threats. According to a written ministerial statement by the Prime Minister of UK on the National Security Strategy Progress Report submitted to Parliament on 22 March, the nature of the threats UK face currently are from piracy and cybercrime to terrorism and nuclear proliferation (Statement on National Security Strategy, 2010, p.1). This paper briefly analyses the various types of security threats the UK is facing at present.

The UK is facing both internal and external threats from terrorist groups. If Al-Qaida is the major external threat for UK’s securities, various Irish republica...
6 Pages(1500 words)Coursework

A Challenge Facing Nurses in Service Provision for Older Adults in Australia

This is because; nurses in a general hospital or acute care settings do not possess the adequate experience to reciprocate to the needs of these patients, leading to frustration and outburst from the patients and burnout and embarrassment for the nurses. Despite immense literature about dementia in the aged people and strategies to manage it in health care settings, it is indeed shocking that nurses are most health care settings do not possess adequate training and knowledge. It is very important to be trained to identify and manage dementia in the elderly because, the population of the elderly people is rising all over the world due to increased health, including Australia (Alzheimer's Australia, 2008) and more and more patients...
6 Pages(1500 words)Coursework

Computer System Security of the Plantain Building Company

The Information system comprises hardware and software which adds functionality to the system according to the business requirements. Human beings are required to only trigger the systems in order to contribute to business functions. (Paul, 2010)

Is it vital for Small medium enterprises to perform knowledge management tasks? Knowledge is been renowned as an economical contrivance for the organization's endurance. Small-medium enterprises often face knowledge management failures resulting in business loss. (Chan, Ivy, and Chao Chee-Kwong, 2008). The impact of the effective use of Information systems is essential for business professionals, managers are other knowledge workers. The information systems facilitate the busin...
7 Pages(1750 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Security findemental (contract security guard service selection exercise) for FREE!

Contact Us