Preview

Proprietary vs. Contract Security

Better Essays
Open Document
Open Document
1248 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Proprietary vs. Contract Security
Proprietary Versus Contract Security

Proper security measures play a huge role in the successful operation of an organization. As the security manager for a company that manufactures high-tech components for an international automobile manufacturer I have been tasked with finding new personnel to ensure security measures are met. There are two different types of security I can choose from; proprietary and contract security. I have done extensive research on the two, to help me make the correct decision for this company. There are some advantages and disadvantages to each type; so I had to find the one that best matches the needs of this company. Proprietary and contract security have the same objectives. They protect the company that they are providing security for. This includes protecting company assets, confident material, ensuring the safety of personnel and consumers, and building.
Proprietary security is controlled internally by the company. The company is responsible for hiring new personnel, firing personnel, and appointing management to lead their personnel. They have to be familiar with all the laws and guidelines that must be followed. The security personnel are trained to the specific needs of the company, which helps them become more familiar with the building layout, and recognize the people and employees coming in and out of the building. The company is in charge of the background checks and proper measures; ensuring the applicant has the proper skills and training to carry out their job. Contract security is a contract signed by the company requesting security from a professional outside security agency. Because of high employee turnover rates security personnel do not become friendly and familiar with employees or the building. This can negatively impact the company because the security personnel’s loyalty, commitment and performance may adversely be affected. The company does not deal with the background checks, skills, training, etc. This is



References: Consador, K. (1999-2013). eHow. Retrieved from http://www.ehow.com/facts_5828997_job-description-security-investigator.html Writing, A. (1999-2013). eHow. Retrieved from http://www.ehow.com/list_6023354_responsibilities-private-security-manager.html Cohen, J. (). National Criminal Justice Reference Service. Retrieved from http://www.ncjrs.gov.App/publications/Abstract.aspx?id=61691 Clifford, M. (2004). Identifying and Exploring Security Essentials . Retrieved from The University of Phoenix eBook Collection database.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    SE578 - Practices for Administration of Physical & Operations SecurityKeller Graduate School of ManagementPREPARED BY: PREPARED ON: APRIL 9, 2011…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    References: Greene, S. (2006). Security policies and procedures principles and practices. Upper Saddle River, NJ: Pearson Prentice-Hall.…

    • 1366 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    The security rule has meaningful standards that are grouped into five categories; administrative safeguard, physical safeguard, technical standards, organizational standards, and policies, procedures, and documentation requirements. Administrative safeguards have several standards that help implement the security rule. The security operation purpose require organizations to evaluate their risks to security and implement policies and procedures that prohibit, detect, and acceptable security violations and to define appropriate approval for security violations. Another, workforce security has three implementation qualifications that are mandatory by the organizations. The organization has to contain policies and procedures to ensure that each members of the particular…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As director of security for this company I will ensure a threat and vulnerability assessment to protect the company and remain profitable in business. In preparing to expand my security company in the Middle East and Africa there are several things that I must consider. Some of them are threats, threats of other security companies trying to buy me out, internet hacking, surveillance system, personnel, and how to secure the perimeter when a natural disaster strikes.…

    • 1473 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    “ A security policy should fulfill many purposes. It should: protect people and information; set the rules for expected behavior by users, system administrators, management, and security personnel; authorize security personnel to monitor, probe, and investigate; define and authorize the consequences of violation; define the company consensus baseline stance on security; help minimize risk; and help track compliance with regulations and legislation.” Hurwicz, Michael (2002, February 01).…

    • 3909 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    These people are hired by the business HR personnel and go through the same hiring process as any normal employee. Though these individuals may not have anything to do with the core functions of the business, they will go through the same type of process. This can lead to issues that are outside the scope or this paper. The in-house security, of course, has advantages and disadvantages.…

    • 1701 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Pinkerton

    • 1081 Words
    • 5 Pages

    The security guard services industry consisted of two segments: proprietary guards and contract guards. The historical growth was driven by companies realizing, that contracting guards allowed them gain operating flexibility instead of managing their own security personnel. In 1987 security guard services was a $10 billion industry growing at 6% a year. Due to the industry being very mature, fragmented, and price competitive there was an ongoing consolidation trend.…

    • 1081 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    To combat against the threat the security Director/manager must have a good security and risk plan. Michael Blyth (2008) describe that a…

    • 1509 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    The security manager of any business is one of the most important positions within the organization. They are usually a member of the executive management team with the primary duty of overseeing the security operations for their organization. The actual responsibilities will differ based on the type of business or organization they are in, and whether or not it is a private or government operation. Whatever the organization type, one of the key functions of the security manager is assessing the risks and vulnerabilities of the organization and creating plans to mitigate them. They are charged with creating a culture of safety and security and ensuring that the company's exposure to liabilities is as little as possible. The plans that they create will generate policies and procedures that the security manager will formulate, implement, and monitor. Although, their duties differ from organization to organization, the security manager's responsibilities are essential to the daily operational success of the company.…

    • 1286 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Intern Report Sample

    • 7073 Words
    • 29 Pages

    They performing as a reliance advisor to their corporate clients, serving them plan, apply and evaluate security management approaches focused on people, progression and information system resources. These tactics help decrease the rate and density in ensure the confidentiality, reliability and accessibility of mission-critical technologies.…

    • 7073 Words
    • 29 Pages
    Powerful Essays
  • Satisfactory Essays

    As we all know, security is broad. Firms with the latest technology handle numerous tasks at the same time. This ranges from surveillance, coordination between employees and monitoring clients’ premises, among others. Additionally, latest technology ensures work is efficiently handled when compared to human…

    • 725 Words
    • 3 Pages
    Satisfactory Essays

Related Topics