Preview

Reedy Case Study

Powerful Essays
Open Document
Open Document
2084 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Reedy Case Study
A security survey at Reedy Recovery Company was conducted on September 15, 2011 by Amy Reedy who was invited and retained by DeVry University for a security assessment. Information in the report was obtained from James Write, Executive Vice President and Chief Financial officer, and Rhonda Forbes, Facilities Manager, personal observations were done by James Write during the inspection of the DeVry facility.
The intentions of this report are a detailed audit of all security aspects and phases of the Reedy Recovery Company. Our company will review and evaluate areas and activities that are considered most vulnerable to theft and safety risks.
It is not the intentions of Reedy Recovery Company or the writer of this report to evaluate DeVry’s
…show more content…
It is also recommended that the security officer who patrols the grounds while the receptionist is at her desk not only do it between the hours of 8am and 5pm, but that shift are made to patrol the grounds at all times, as anyone could find out this schedule and attempt to breach the facility when they know an officer is not patrolling after …show more content…
A camera should be added to the hallway area monitoring employees there. Another CCTV should be monitoring the lobby outside the vault area and it should be able to be viewed by employees inside the vault area. Shipping and receiving should be more closely monitored especially when some of the items are being picked up by and external carrier. These people should also show ID for the company they are working for and along with signing the receiving slip also sign in to a log book with their name, time, date and what they are picking up and dropping off. Please be advised that these are the recommendations of Reedy Recovery Company and we take great pride in being given the opportunity to assist you in your security needs for your facility. You can rest assured that your company will be at little risk if you take these recommendations and put them to work for you. It has been a pleasure in assisting you in increasing the security of your company and if you have any other concerns or questions please feel free to contact our office and ask to speak to me

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    This security assessment is provided at the request of Southbound LLC. Willie D. Gibbons of Stalwart Security conducted the assessment of the Southbound warehouse complex…

    • 4807 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Week 5 Individual Security Solutions. NTC 411 Week 5 Summary.…

    • 151 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    -RESULTS DRIVEN. As Security Manager, he supervised three quarterly Cyber Security spot checks covering 14 secure spaces between 11 tenant commands island-wide, maintaining compliance of Defense Information Systems Agency's Physical Security posture…

    • 165 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    | Metal detectors at all entrances, have armed guards and unarmed guards, security cameras and CCTV installed.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6.03 Fact Sheet

    • 1065 Words
    • 5 Pages

    Do u know if the security guard has a check in log when you drive into the facility? Both person in charge and 23 persons. 30. Does the guard keep a log of his shift? I.E roaming the grounds to ensure its secure or does he stay only on the main entry?…

    • 1065 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    talk team uk

    • 297 Words
    • 2 Pages

    Staff must ‘clock in’ and ‘clock out’ every time they enter and exit the building. Failure to do so will result in a penalty fine…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The security analyst of the accounting firm suggested that it's a good practice to have a dedicated room for server’s equipment to avoid any damages. This could be quite costly for the small company, however it would make a good investment in order to secure the company's network. The servers would be positioned on a server rack in the designated room with network devices such as modems, switches, routers, firewalls, and the Intrusion Detection System. This room should have restricted access and only authorized personnel must have access to it, by using sophisticated keycard systems and even having additional security procedures such as biometrical readers etc. It was also proposed to get rid of Motorola SB3100 and Net Gear MR814 to increase…

    • 940 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Security Breach Plan Paper

    • 1576 Words
    • 7 Pages

    Patient privacy and security is one of the most important aspects of the St. Johns Hospital code of conduct, they take pride in the sound policies and procedures set to maintain customer confidentiality. Each employee is held to a high standard of maintaining the highest level of privacy and confidentiality when it comes to patient health information (PHI). This paper will outline the plan that St. John’s hospital has created in case of a security breach or security threat in the facility. The primary cause of a security breach is usually related to the people or business side of and organization (Rhoades, MBA, RHIA, CHPS, CPHIMS, FHIMA, 2009).…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Whitehall Police History

    • 1919 Words
    • 8 Pages

    There is room in the office to have people in. This area also has space to allow the Platoon Commander the ability to call in an officer from his platoon for conferences, reprimands, etc. In the middle of the complex on the first floor there is the Sergeants office. The Sergeant on duty has a view of almost the entire first floor, and he has the aid of a video monitor and windows. Adjacent to him is the Clerk's office which faces out onto the lobby. The Clerk is responsible for meeting the public and take in all TVB fines, etc. Her office is protected by bullet-proof plate glass. The lobby is large and can accommodate a far greater number of people than the old lobby did. The Radio room is also adjacent to the Sergeant's office. We have our teletype (which connects us to the LEADS system), along with the most modern radio consoles, video monitors, etc. This area also contains our main panel for our burglar alarm system. Our system allows us the ability of not only simply hearing an alarm when a burglary is in progress, but we also have the ability of hearing sounds that are going on within the building being burglarized. An 8-track tape system monitors all telephone and radio contact.…

    • 1919 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 1114 Words
    • 2 Pages

    1. "2013 Annual Report of Campus Security and Fire Safety Policies and Procedures." DREXEL UNIVERSITY – CLERY ACT STATISTICS. DREXEL UNIVERSITY, 2013. Web. 11 Feb. 2014.…

    • 1114 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    health and saftey

    • 5836 Words
    • 20 Pages

    A risk assessment should be carried out every morning and eveing, the room and equipment need to be checked on a daily basis and removed if broken or need repairing. The room must have suffient light and air circulation and all doors should be alarmed and secure to alert staff when opened. Any visitors have to report to the office and signed in and be told the fire drill procedures and…

    • 5836 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Risk Management Success

    • 1462 Words
    • 5 Pages

    The paper is intended to inform the reader of the steps that a risk management program should take in order to ensure that safety and security are upheld. The security and protection of information is more difficult than ever before due to the expanse of technology that is used in the world. Information can be hacked in to and utilized for fraudulent purposes. Personal information of random populations is sought by convicted felons and illegal organizations for the purpose of identity theft and financial gain. The recent inception of identity theft pays tribute to the realization that modern technology truly presents higher risk in terms of security breaches. Alongside the need for security of information is the protection of safety of both staff and patients alike. This aspect of risk management holds a great amount of weight in terms of evaluating the success of a program, as adverse events can cost an organization their accreditation and often times their funding and viability can be negatively affected. The overall goal for this piece is to discuss risk managements involvement in the handling of infectious waste and the protection of private health information by assessing the role of a risk manager, the objectives set forth for a risk management team, and by reviewing the training provided to employees.…

    • 1462 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Availability to ensure that all the utilities and systems are available and operational when they are needed. A major objective of an access security policy must be to ensure that utilities information is always available to support critical business processing. The purpose of this audit is to evaluate the access and security internal controls related to the XYZ and to assess whether there are internal control weaknesses that could allow errors and irregularities to go undetected.…

    • 1681 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Clerk Case Studt

    • 323 Words
    • 2 Pages

    Having them check each other’s work or hire another clerk to double check might be better than installing cameras because it could be an invasion of privacy for some people. Proper corrective and preventive discipline actions could be taken so that these thefts would not happen again. Job rotation could also be taken since…

    • 323 Words
    • 2 Pages
    Satisfactory Essays