Preview

A Case Study: Organizational Culture of Ultimate Shield Security

Powerful Essays
Open Document
Open Document
1907 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Case Study: Organizational Culture of Ultimate Shield Security
De La Salle University
Graduate School of Business

A CASE STUDY: ORGANIZATIONAL CULTURE OF ULTIMATE SHIELD SECURITY

In Partial Fulfillment of the Course Requirements in
Organizational Behavior and Processes
(HRM511M)

Submitted to:

Mr. Michael Joseph

Submitted by:
Arnigo, Ralph
Choemm, Rotha
Flor, Chino
Partido, Karina

Section:
GRA

October 29, 2012

Ultimate Shield Security Services, Incorporated
Background
Ultimate Shield Security Agency, Incorporated is a security agency established by Domingo Partido, having served in the military as a Military attaché during his teen years, he was then inspired to establish a security agency years later in the late 1980’s as he had a background in such things. In 1989, USASi – Ultimate Security and Allied Services, Inc. was born and it began its operations in the same year. Aside from the Metro Manila Head Office, Ultimate Shield was able to branch out into two other regions – one in La Union, covering the northern Luzon area and one branch in Surigao Del Norte, covering the lower region of the country.
Having more than 300 security guards posted in Metro Manila as well as in other regions of the country, Ultimate Shield Security offers its services to different institutions, organizations, companies and establishments in and around the Greater Manila Area, as well as in provincial areas, who are in need of quality security services, based on values and morals that USSAi strongly adheres to. With this, USSAi has been working with different companies, such as AMOSUP, Seamen’s Hospital, Max’s Fried Chicken branches, Via Mare Tomas Morato, GMA Network, Peninsula de Punta Fuego and Araneta Coliseum to name a few.

Objectives and Values
USSAi’s main objective is to provide and maintain an excellent and professional security service, founded on its basic corporate policies and guidelines.
It is in USSAi’s intentions and actions to keep the client’s best

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is4796 Unit 1 Assignment

    • 370 Words
    • 2 Pages

    My company; RLR Securities Inc., has been in the security service since 2002 we started out with only four (4) people, now we have grown to twenty-two (22) people, RLR Securities Inc. was formed as a small corporation who’s focus was mainly on database performance tuning and security services for database applications. By 2006 we started providing complete security services, including assessments, penetration testing, policy creation, and regulatory compliance assistance.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Wgu Executive Summary

    • 2332 Words
    • 10 Pages

    The current arrangement of providing IT services to ULDA businesses was through an External service provider (ESP). As shown in diagram 1.1 External service provider is the first tier supplier which supplies IT services to ULDA IT and ULDA IT will then collaborate all IT activities and provides further services to first tier customers (ULDA Staff).…

    • 2332 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Defense Case Study

    • 965 Words
    • 4 Pages

    The City of Albany decided to upgrade a fleet of repair trucks in order to respond to pothole fixing. ACME manufactured a cab and chassis of a truck that was then sold to Keefer Motors. Keefer Motors sold the truck unchanged to the City of Albany. No discussion by ACME or Keefer Motors had taken place with the City as to what the city would do with the truck. Susan’s Truck Equipment was contracted by the city to add a dump bed and hoist and the truck was modified and redelivered to the City of Albany; the truck was accepted and put into immediate use. Sarah and Emma are city employees and Sarah was injured when Emma backed up the pothole truck over her. Sarah was seriously injured and is suing ACME, Keefer Motors and Susan’s Truck Equipment, arguing that the truck was defective and unreasonably dangerous because the defendants did not advise the City of Albany to install a back-up alarm and they failed to install a back-up alarm.…

    • 965 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Focus specifically on guard services and high-level consulting audits, while outsourcing or referring to vendors for security equipment and system needs (ADT)…

    • 2342 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Private Securtiy Laws

    • 897 Words
    • 3 Pages

    Within the state of South Carolina any/all private security company, entity, or person must apply and be approved for a license through the South Carolina Law Enforcement Division, also known as SLED. SLED is essentially South Carolinas branch of the FBI, and there are four regions throughout the state. According to the Administrative Regulations Effective June 23, 2006, there are very strict stipulations to being qualified to obtain a private security license within the state, and it is solely at the discretion of SLED whether or not the application is approved. Chapter 73-400 of the regulations states, Once an application is approved, the name for the licensed entity must also be approved by SLED. Any materials, equipment, supplies and advertising used by the company must not imply and type of affiliation with law enforcement or any other governing agency.…

    • 897 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Contract security is much like what it sounds. The company hires an outside company to provide security services. “Contract security companies recruit, screen, hire, train and supervise security personnel. From the time we wake until the time we go to bed and sometimes in the middle of the night, everything we do is all geared to enhancing the tasks we perform. If security is not your company 's core competency, this job will be better performed and supported by people who focus on it relentlessly.” (Zalud, 2007) The advantage to hiring contact security is all applications of security are controlled by an outside agency. If we are unsatisfied with the style or type of service we receive we can terminate the contract. This is also a disadvantage, because we lack the control of the guards, discipline is handled through the security company. There is also the cost of having contract security. It is in the company’s best interest to negotiate a contract that provides reliable security but not at the cost of handcuffing the company in other aspects of security.…

    • 811 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The Rookie Chief Iso

    • 3874 Words
    • 16 Pages

    Work with other executives to prioritize security initiatives and spending based on appropriate risk management and/or financial methodology.…

    • 3874 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    One of the main problems that the country was facing during Reconstruction was Wartime. President Lincoln issued a Proclamation of Amnesty and Reconstruction, which offered Southerners to take an oath of loyalty to the Union and freedom’s legitimacy in December 1863. This idea was known as the Ten Percent Plan. It provided the voting population so they could set up a loyal government. By 1864, Louisiana and Arkansas states recognized a Unionist government. In 1864, congress declined to seat the Unionists voted to the House and Senate from Louisiana and Arkansas (Divine, page 368). A group known as the Radical Republicans wanted black rights protected and therefore would not engage in readmission of southern states. In July 1864, Congress passed…

    • 148 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NCFE LEVEL 2 UNIT 2

    • 737 Words
    • 3 Pages

    This is in protecting the rights and promoting the interests and independence of service users. Respecting dignity, privacy, culture and religion of service users. Maintaining the trust and confidence of the service users by keeping confidential information except the one that will pose danger to them.…

    • 737 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This Paper identifies the eight action items in R. Roosevelt Thomas Jr.’s Diversity Paradigm model. This paper will also identify any of these options which could be characterized as good management practices even when diversity is not an issue. The Diversity Paradigm’s Action Options include the application of minimize mixture diversity (MMD) and address diversity (AD).…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Direct Defender could expand into the commercial arena. Businesses are looking for dependable security solutions with and online portal to handle request and help secure their business.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    05th June 2006 – 15th December 2006. Group 4 Securicor, I was a security officer.…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    September 2011, the Leopard Security and Investigation Agency (LSIA), provider of security guards of Ateneo de Manila University in Loyola, was removed and was changed to a new provider – Megaforce.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Also included in the solution, is the modernization and rehabilitation of chosen offices in BOC such as the Port of Manila Formal Entry and Cash Divisions, the Information and Communications Technology Center (ICT Center) and the Management Information Systems and Technology Group (MISTG) offices in the Metro Manila ports. Unisys will also provide technical, implementation and operations support services in the initial efforts towards a sustainable Customer Relationship Management System and ISO Certification Plan, change management, comprehensive training programs, and system maintenance.…

    • 607 Words
    • 3 Pages
    Good Essays