SlideShare a Scribd company logo
PLN9 Security Services
Security in the Workplace
Complete Security Solution In Association With Tyco
© COPYRIGHT PLN9 SECURITY SERVICES PVT. LTD. ALL RIGHTS RESERVED
Informational Material
General information for use in addressing security in the workplace issues
(office security, physical security in a front-line office, and a checklist for
telephone bomb threats).
Office Security
Government offices can be targets for theft, unlawful entry, kidnapping,
bombings, forcible occupation and sabotage. Effective barriers, both
physical and psychological can reduce the likelihood of these threats. The
following guidelines will help you analyze your office security profile and
suggest measures to reduce your target potential.
Conduct a Crime Prevention Assessment
A complete, professional assessment of your security needs is the first
step toward an effective security program. Nearest Federal Protective
Service (FPS) office can arrange a risk assessment be performed on your
government-owned or leased office or building.
Since most crimes are directed toward individuals or offices that have little
or no security planning in place. Take stock of your present measures and
possible weak points.
A comprehensive crime prevention
assessment should ask:
• What is your target potential?
• What is the prevailing attitude toward security?
• Who is responsible for the overall security program?
• How are security policies enforced?
• When was the current emergency preparedness plan developed (including
fire, power failure and disaster)?
• What resources are available locally and how rapid are the response times
for fire, police and ambulance?
• What kind of physical security systems and controls are presently used?
• Do the available security resources, policies and procedures meet the
potential threat?
Suggestions to increase security:
• Install key-card access systems at main entrances and on other
appropriate doors.
• Issue access control badges, with recent photographs, to all employees
and authorized contractors.
• Upgrade perimeter control systems with intercoms and closed circuit
monitoring devices.
• Keep master and extra keys locked in a security office.
• Locate executive offices near the inner core of the building to afford
maximum protection and avoid surveillance from the outside.
• Arrange office space so unescorted visitors can be easily noticed.
• Have staff follow strict access control procedures, don' t allow exceptions.
• Keep important papers locked in secure cabinets.
• Open packages and large envelopes in executive offices only if the source
or sender is positively identified.
Thank you

More Related Content

ODP
Jupiter physical security ppt 2016 1
DOCX
Resume16
PPTX
Health information secuirty session 5 best practise in information security
PPTX
Health information security session 4 risk management
PDF
Abdulrahman c.v
PPT
Lesson 1- Risk Managment
PPT
Information Assurance And Security - Chapter 1 - Lesson 3
Jupiter physical security ppt 2016 1
Resume16
Health information secuirty session 5 best practise in information security
Health information security session 4 risk management
Abdulrahman c.v
Lesson 1- Risk Managment
Information Assurance And Security - Chapter 1 - Lesson 3

What's hot (12)

PPT
Physical security
DOCX
Resume stenig fusil
PDF
TycoIS Business Security Tips
PPTX
Chapter 1
PPT
22 need-for-security
DOCX
Denis Kuchio_Capability Statement
DOC
2007 Senior Security Officer ITV Job Spec May 07
PDF
Specialist security enigneer
PPT
Lesson 2 Cryptography tools
PDF
Specialist Security Engineer
PDF
The infrastructure and the security essentials of information technology in a...
Physical security
Resume stenig fusil
TycoIS Business Security Tips
Chapter 1
22 need-for-security
Denis Kuchio_Capability Statement
2007 Senior Security Officer ITV Job Spec May 07
Specialist security enigneer
Lesson 2 Cryptography tools
Specialist Security Engineer
The infrastructure and the security essentials of information technology in a...
Ad

Viewers also liked (9)

PPTX
Windward ferries caribbean cruise ferry
PPTX
5 Safety tips for party boat
PPTX
Emergency Response Plan
PPTX
Emergency response planning and implementation
PPT
Occupational Health & Safety Presentation
PDF
Workplace safety and health
PPTX
Workplace hazards
PPT
Occupational Health & Safety
PPTX
Occupational Health and Safety Powerpoint Presentation
Windward ferries caribbean cruise ferry
5 Safety tips for party boat
Emergency Response Plan
Emergency response planning and implementation
Occupational Health & Safety Presentation
Workplace safety and health
Workplace hazards
Occupational Health & Safety
Occupational Health and Safety Powerpoint Presentation
Ad

Similar to Security in the workplace (20)

PPTX
Importance of workplace Security.pptx
PDF
Security Proposal for High Profile/Government Individual
PPTX
How to Enhance Your Home Security Man Services?
PPTX
Selling security to the C-level
PDF
Connection can help keep your business secure!
PDF
Incident response methodology
PDF
cyber forensics-incident response methodology.pdf
PDF
cyber forensics incident response methodology.pdf
PDF
IRM scm-incident response methodology.pdf
PDF
Security-Brochure
PDF
Security-Brochure
PPTX
Physical Security Assessment
PPTX
Human Factors_MODULE_2.pptx
PPTX
Security Operations Center Analyst Presentation
PPTX
IT Security and Management - Semi Finals by Mark John Lado
PDF
___2360_SP_VMAN---Screen
PPTX
Cybersecurity Risk Governance
PPTX
MCGlobalTech Consulting Service Presentation
PPTX
Assuring Digital Strategic Initiatives by
PPTX
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Importance of workplace Security.pptx
Security Proposal for High Profile/Government Individual
How to Enhance Your Home Security Man Services?
Selling security to the C-level
Connection can help keep your business secure!
Incident response methodology
cyber forensics-incident response methodology.pdf
cyber forensics incident response methodology.pdf
IRM scm-incident response methodology.pdf
Security-Brochure
Security-Brochure
Physical Security Assessment
Human Factors_MODULE_2.pptx
Security Operations Center Analyst Presentation
IT Security and Management - Semi Finals by Mark John Lado
___2360_SP_VMAN---Screen
Cybersecurity Risk Governance
MCGlobalTech Consulting Service Presentation
Assuring Digital Strategic Initiatives by
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...

More from PLN9 Security Services Pvt. Ltd. (20)

PPTX
Types of Security Services
PPTX
Smms corporate presentation ppt
PPTX
Corporate Presentation (solar plants)
PPTX
PPT
PPTX
Physical Security and Digital Security
PPTX
PPTX
Security Awareness Training
PPTX
PPTX
Types of Soft Skills
PPTX
Physical Security and Digital Security
PPT
How to Teach Soft Skills
PPTX
Managing Conflicts @ Workplace
PPTX
PPTX
Powerful Presentation Skills
PPTX
Personality Development
PPTX
'Leadership & Executive Coaching'
Types of Security Services
Smms corporate presentation ppt
Corporate Presentation (solar plants)
Physical Security and Digital Security
Security Awareness Training
Types of Soft Skills
Physical Security and Digital Security
How to Teach Soft Skills
Managing Conflicts @ Workplace
Powerful Presentation Skills
Personality Development
'Leadership & Executive Coaching'

Recently uploaded (20)

PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPTX
Lecture (1)-Introduction.pptx business communication
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
A Brief Introduction About Julia Allison
PPT
Chapter four Project-Preparation material
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
Business model innovation report 2022.pdf
PDF
IFRS Notes in your pocket for study all the time
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Laughter Yoga Basic Learning Workshop Manual
PPTX
Business Ethics - An introduction and its overview.pptx
PDF
How to Get Funding for Your Trucking Business
PPTX
5 Stages of group development guide.pptx
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Deliverable file - Regulatory guideline analysis.pdf
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Lecture (1)-Introduction.pptx business communication
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
A Brief Introduction About Julia Allison
Chapter four Project-Preparation material
COST SHEET- Tender and Quotation unit 2.pdf
Business model innovation report 2022.pdf
IFRS Notes in your pocket for study all the time
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Laughter Yoga Basic Learning Workshop Manual
Business Ethics - An introduction and its overview.pptx
How to Get Funding for Your Trucking Business
5 Stages of group development guide.pptx
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx

Security in the workplace

  • 1. PLN9 Security Services Security in the Workplace Complete Security Solution In Association With Tyco © COPYRIGHT PLN9 SECURITY SERVICES PVT. LTD. ALL RIGHTS RESERVED
  • 2. Informational Material General information for use in addressing security in the workplace issues (office security, physical security in a front-line office, and a checklist for telephone bomb threats).
  • 3. Office Security Government offices can be targets for theft, unlawful entry, kidnapping, bombings, forcible occupation and sabotage. Effective barriers, both physical and psychological can reduce the likelihood of these threats. The following guidelines will help you analyze your office security profile and suggest measures to reduce your target potential.
  • 4. Conduct a Crime Prevention Assessment A complete, professional assessment of your security needs is the first step toward an effective security program. Nearest Federal Protective Service (FPS) office can arrange a risk assessment be performed on your government-owned or leased office or building. Since most crimes are directed toward individuals or offices that have little or no security planning in place. Take stock of your present measures and possible weak points.
  • 5. A comprehensive crime prevention assessment should ask: • What is your target potential? • What is the prevailing attitude toward security? • Who is responsible for the overall security program? • How are security policies enforced? • When was the current emergency preparedness plan developed (including fire, power failure and disaster)? • What resources are available locally and how rapid are the response times for fire, police and ambulance? • What kind of physical security systems and controls are presently used? • Do the available security resources, policies and procedures meet the potential threat?
  • 6. Suggestions to increase security: • Install key-card access systems at main entrances and on other appropriate doors. • Issue access control badges, with recent photographs, to all employees and authorized contractors. • Upgrade perimeter control systems with intercoms and closed circuit monitoring devices. • Keep master and extra keys locked in a security office. • Locate executive offices near the inner core of the building to afford maximum protection and avoid surveillance from the outside. • Arrange office space so unescorted visitors can be easily noticed. • Have staff follow strict access control procedures, don' t allow exceptions. • Keep important papers locked in secure cabinets. • Open packages and large envelopes in executive offices only if the source or sender is positively identified.