1 / 37

Personnel Security

Personnel Security. Mike Mason, CPP, CFE, CPS Security Manager Lyondell/Equistar Chemical Companies. Three Components of Security. Personnel Security Physical Security Information Security. Personnel Security. Physical Security. Information Security. Personnel Security.

bond
Download Presentation

Personnel Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Personnel Security Mike Mason, CPP, CFE, CPS Security Manager Lyondell/Equistar Chemical Companies

  2. Three Components of Security • Personnel Security • Physical Security • Information Security Personnel Security Physical Security Information Security

  3. Personnel Security • Involves those measures taken to safeguard a company’s employees and those coming to a place of business either for business reasons or as a guests. • Can further include access control systems that control access in and out of specific premises.

  4. Personnel Security • Various identification card systems, passes, and permits used by com-panies are considered personnel control. • Probably the most recent concerns classified under personnel security are executive protection and back- ground investigations.

  5. Interaction of Security Components Alarms & Hardware Reinforcement Utilization Response Protective (Security) Components Security Personnel Employee Support Safeguards Controls Enforcement Compliance Security Policy & Procedures

  6. Success Important Points for Success • A Security program must become an integral part of both the operations and management systems of an organization. • Unlike most other components of an organization, security directly affects every other component and thus must be extraordinarily concern with the comprehensive quality of the programs it offers. Success

  7. The Human Factor • FBI statistics indicate that 72% of all thefts, fraud, sabotage, and accidents are caused by a company’s own employees. • Another 15 to 20% comes from contractors and consultants. • Only about 5%to 8% is external people. FOR MORE INFO REFER TO CURRENT FBI STATISICS

  8. Personnel • Customers • Visitors • Employees • Executives • Contractors & Consultants • Unauthorized persons

  9. Customers and Visitors • “Due diligence” is the rule of thumb when it comes to protecting people who come to your premises. • History of security incidents where people have been the target. • Efforts to provide adequate security can prevent or reduce liability. • Workplace violence prevention plan.

  10. Employees • Human factors, probably the greatest single source of risk, including both human error and failure. • An organization’s employees are now considered a corporate resource and asset, requiring constant care and management.

  11. Employee Liability Issues • A co. can be held liable for ignoring their prescribed duties when injury or loss could result. • A co. can suffer liability for damages resulting from its negligence in not providing enough security. • A co. is subject to liability for negligent hiring and failure to train personnel.

  12. Employee Liability Issues (cont.) • A co. is liable for negligent actions of their employees. • A co. can be held vicariously liable for criminal acts of employees. • Discharged employees are entitled to view reports of investigation that caused termination. • Interrogation is not a coercive action.

  13. Employee Liability Issues (cont.) • An employee can be terminated for refusing to cooperate in polygraph test • Results of a polygraph exam are admissible if both parties agree. • Employees have an obligation to assist in investigation and report loss. • Employees obligated to comply with policies as condition of employment.

  14. Importance Personnel Practices • A company’s existence could depend on the integrity of its employees. • Without security processes in place, an organization’s reputation could be destroyed. • The new employee’s ethical outlook is unknown to the company.

  15. Importance Personnel Practices • New employees may have access to extremely sensitive and confidential information. • Unauthorized release of sensitive information could destroy the corporation’s reputation or damage it financially.

  16. Importance Personnel Practices • An employee, who has just accepted a position with a major competitor, may have access to trade secrets that are the foundation of the corporation’s success.

  17. Hiring Practices • Corporations must take special care during the interview to determine each candidate’s level of personal and professional integrity. • The sensitive nature and value of the assets that employees will be handing require an in-depth screening process.

  18. Hiring Practices (Cont.) • At a minimum, the screening process should include a series of comprehen- sive interviews that emphasize integrity as well as technical qualifications. • References from former employers should be examined and verified. • This includes former teachers, friends, co-workers, & supervisors.

  19. Hiring Practices (Cont.) • Former employers are usually in the best position to rate the applicant accurately, providing a candid assess- ment of strengths and weaknesses, personal ethics, past earnings, etc. • Unfortunately many employers have become increasing cautious about releasing necessitating release forms.

  20. Hiring Practices (Cont.) • Use of a reference authorization and hold-harmless agreement oftentimes provides the necessary information. • Be sure reference authorizations have: signature of applicant, releases former & prospective employers, and clearly specifies the type of information that may be divulged.

  21. Hiring Practices (Cont.) What to Look For? A Straw person Perhaps? Education Training Experience Stable Work History Professional Certifications Clear Criminal Record Fiscal Responsibility Background Continuity Physical Fitness

  22. Sample Security Officer Checklist • Responsibility, honesty, conscientious- ness: being morally, legally, & mentally accountable; being fair, objective & straightforward; being scrupulous & professional in the performance of his/ her job; concern for being to work on time, being of such moral character as to avoid involvement in theft, graft, bribery, or other dishonest activities.

  23. Sample Security Officer Checklist Concern for protecting confidential information; personal concern about avoiding absenteeism; concern for the safety of others; concern for reporting whole truth, and only the truth, about any incident involving employees; respect for the rights of others; and concern for appearance, demeanor and personal hygiene.

  24. Sample Security Officer Checklist • Reading & Writing Communicative Skills: Ability to write a clear and concise incident report; communicate in a clear and concise manner; reading ability at a 12th grade level. • Leadership Skills - exercising respon- sible authority over people & property: ability & willingness to discharge duty without getting too close to employee;

  25. Sample Security Officer Checklist (i.e. without getting emotionally or per- sonally involved to the point of becom- ing ineffective; ability to take action decisively when necessary in emergen- cies, and making correct decisions; ability to recognize the development of a potentially dangerous or emergent situation; possession of alert mind…..

  26. Screening Techniques • Application or resume verification. • Honesty or integrity testing. • Physical and physical agility tests. • Personality testing. • Background checks. • Polygraph examination (when authorized)

  27. Security Awareness Programs • Initial orientation training for everyone when initially employed. • Annual security awareness training. • Training Documentation Requirements: Curriculum Attendance roll Evaluation of comprehension Instructor(s) qualifications

  28. Personnel Disciplinary Action • Only for clearly defined and properly documented incidents. • Must follow the company’s disciplinary policy - dependent on severity: Verbal warning Written warning Decision-making leave Termination

  29. Personnel Disciplinary Action • When an employee leaves, even if on excellent terms, certain precautions regarding employment terms in effect: Return all documents, records, and other information regardless of media. During exit interview, terms of original employment agreement reviewed (i.e. non-compete, wrongful disclosure, etc.

  30. Executive Protection The threat to executives comes from terrorists who perpetrate hostage- kidnapping incidents these reasons: • Worldwide recognition & publicity. • Emphasize organization’s vulnerability. • Value powerful psychological impact. • Obtain benefit for cause (i.e. funds, release of fellow terrorists, etc.).

  31. Company’s Duty To Protect • Manage situations through preparation. • Employees provided with the best risk information about various overseas environments where they are assigned. • Employees should be advised on how to protect his/herself through planning and preparation. • Develops a plan to quickly respond to an incident and effectively operate to recover a kidnapped person.

  32. Executive Protection Management Program • Implement a county specific, pro-active plan that identifies detailed activities to be accomplished. • Threat situation procedures in place. • Employees training to prevent or to survive being kidnapped. • Viable, ongoing risk assessment activities.

  33. Specific Activities in Plan • Crisis management team formation. • Arrangements for logistical support. • Command & control decisions (i.e. who will participate/manage the effort. • Make decisions regarding ransoms. • Conduct risk assessment to determine need for kidnap insurance. • Send response team to be with family.

  34. Specific Activities in Plan • Address publicity issues. • Establish government relations (U.S. State Dept. & country of occurrence). • Determine who will negotiate. • Formulate victim recovery process. • Make arrangements for victim post event handling.

  35. Vulnerability Assessment WHEN SELECTING A TARGET, TERRORISTS EVALUATE FOR SUCCESS: • Accessibility – take steps to harden target. • Prestige – respect & influence target enjoys. • Visibility – widely publicized target at risk. • Financial – company ability to pay motivates • Family – reputation for closeness attracts. • Medical Condition – healthy target is at risk.

  36. Due Diligence is Key EVERY COMPANY SHOULD TAKE PRECAUTIONS TO PROTECT PERSONNEL & PROPERTY FROM THREATS: • Assassination • Ambush • Kidnapping • Extortion • Harassment • Bombings

  37. Company Policy Should Address: • Establishment of a Crisis Management Plan. • Formulation of a Crisis Management Team. • Conduct of a threat analysis with updates. • Procurement of Negotiating Team Support. • Establishment of an Executive Protection Committee. • Establishment of an Onsite Command Post Team. • Development of an Evacuation Plan.

More Related