- Published: January 1, 2022
- Updated: January 1, 2022
- Level: Masters
- Language: English
- Downloads: 36
Security Survey Alarms Yes, the facility uses alarm devices to create awareness in case of emergencies andsecurity breaches. It has a total of 5 alarm devices installed.
2. The type of alarm connected is the outside guard service.
3. Yes, there is an authorization list that assigns personnel to open the alarms.
4. Yes, the facility uses local alarms in its exit doors.
5. The burglar alarm system records are monitored to ensure that there is a verification of the signals that are sent to monitoring facility before the alarm is made.
Observed Deficiencies
While conducting the survey of the facility’s alarm systems, it was observed that the main deficiencies were in the employing of less guards, inadequate inspection and conducting of after-hours security checking of the facility, and laxity during lunch hours by not adequately following the required security procedures (Fischer, Edward & David 112-125).
By employing less guards to monitor the security system of the facility, and the conducting of inspections of the visitors that come into the facility, the deficiency lies in, not being able to effectively carry out the security checks. With few guards who are often overwhelmed during peak hours, it becomes hard for them to accurately conduct the security checks and certify the visitors (Sennewald 88-92). Subsequently, by being less, few of the guards are assigned to monitor the alarm systems; thus, making it hard to make predictions in case of security breaches.
The inadequacy of inspection and conducting of after-hours security checking of the facility is a great deficiency to the facility because it is during such periods that security systems of the facility are infiltrated and posing a security threat to the facility.
Subsequently, by not adequately following the required security procedures especially during lunch hours. This is because, such moments can be used to attacking the facility and its systems easily given that no adequate checks are conducted.
Good practices observed
Except for the deficiencies, the facility has maintained good practices for its alarm system such as daily maintenance of the register of all visitors, use of identification badges by all employees, and issuing of visitor identification passes. These practices are good and essential in the sense that the visitors’ register will keep a record of all the details of the visitors to the facility including their intended purpose of visit and the host person. Subsequently, the register documents the time when a visitor arrived and the time of departure; thus, making it easy for accountability purposes (Fischer, Edward & David 112-125). This practice is coupled by the issuing of passes or tags to visitors to be carried around whenever one is within the facility.
Subsequently, the facility requires all employees to wear identification passes that distinguish them from other persons (Serrano, Eduardo & Jean-Yves 77-79). The passes also grant them access to specific areas that are not easily accessible by other persons for security purposes.
Recommendations
It is recommended that for the facility to curb its security breaches and ensure proper maintenance and usage of its alarm systems, it should employ more security personnel or guards to monitor the various security locations with the facility (Foreman 62).
Second, guards should be on duty on a rotational basis so that at no point laxity is allowed in the facility, especially during lunch hours. Subsequently, all the necessary security procedures needs to be adhered to in operating and monitoring the alarm system in the facility (Norman 123).
Works Cited
Fischer, Robert, Edward Halibozek, and David Walters. Introduction to Security. Burlington: Elsevier Science, 2012. Internet resource.
Foreman, Park. Vulnerability Management. Boca Raton: CRC Press, 2010. Internet resource.
Norman, Thomas L. Integrated Security Systems Design: Concepts, Specifications, and Implementation. Amsterdam: Elsevier Butterworth-Heinemann, 2007. Internet resource.
Sennewald, Charles A. Effective Security Management. Burlington, MA: Butterworth-Heinemann, 2011. Internet resource.
Serrano, Amparo, Eduardo Crespo, and Jean-Yves Boulin. ” Emerging Experiences of Work in a Changing Economy.” Transfer. 7. 2 (2001): 183-320. Print.