Verified Document

Asset Protection When An Emergency Situation Arises, Essay

Related Topics:

Asset Protection When an emergency situation arises, quick action is imperative in order to protect assets and minimize losses. A security supervisor bears the burden of ensuring that a disaster management plan is effectively carried out, but he or she cannot act alone. The supervisor must coordinate with state and federal agencies that become involved in larger disasters. Special events may also necessitate coordination and collaboration with other groups that are involved in the organization and administration of the event (Innace, 2008). Security directors can effectively manage emergencies by developing a plan ahead of time in conjunction with others that may be involved in the case of such an emergency. They should also implement the incident command system and media relations.

In preparation for an emergency, the security supervisor should identify priorities including minimizing the number of victims and extent of harm that comes to them and protection of the business assets (O'Dell, 2008). The security supervisor should also identify legal and medical obligations as this will impact what he or she must do during an emergency situation. For example, a medical problem may arise in the context of questioning a suspect and the security director may need to perform certain actions in order to discharge his or her obligations to the employer and under the law. (Hill, 2008)

Coordination with agencies that will be responding to an emergency is imperative for a company's security director. Within the organization, the security director should assign roles to his or her staff...

Outside of the agency, the security director should work with other involved parties to make a plan that delineates the responsibilities of each group and the chain of command. By making such a plan, potential conflicts about who should make the determinations under time pressure and who should be reported to will be prevented by hammering out the details ahead of time.
The Incident Command System (ICS) is a useful tool for emergency management and response. It has a predetermined chain of command and the common terminology that it uses can prevent confusion in communications between the involved responders. While it was originally designed to be a disaster control system for fires, it has been adapted for different uses by many of the government responders that may be involved in an emergency situations at a company. (Vendrell and Watson, 2008)

ICS can help determine the organizational structure for management of an emergency or a disaster. It can also help a security director plan how to implement the structure, build the capacity for that structure, and adapt it for different situations. ICS is designed to be flexible, yet standard, to make a joint emergency response more efficient and effective. (FEMA) The organizational structure is a team approach (Vendrell and Watson, 2008) and will require a cooperative effort between the security director, other employees, and outside parties. The joint effort can plan ahead of time how best to minimize harm to people, harm to property, and loss of…

Sources used in this document:
References

FEMA. Incident Command System (ICS). http://www.fema.gov/emergency/nims/Incident

CommandSystem.shtm

Hill, D.W. (2008). Security and Medical Response. In S.J. Davies & C.A. Hertig (Eds), Security Supervision and Management (3rd ed.) (303-307). Oxford: Butterworth-Heinemann.

Innace, C. (2008). Supervising During Special Events. In S.J. Davies & C.A. Hertig (Eds), Security Supervision and Management (3rd ed.) (293-302). Oxford: Butterworth-Heinemann.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Multicultural Workforce Establishing an Overseas
Words: 4148 Length: 12 Document Type: Term Paper

Outsourced employees should be limited to filling non-critical areas of need. They should be used to alleviate the load on regular employees, rather than to replace them. They will fill in non-essential positions, leaving full-time employees to fill the more sensitive security roles. Strategic planning will be an ongoing process, rather than a single event that is a part of the initial phases of the process. Security issues are constantly

Role of Land Settlement Cooperative
Words: 18921 Length: 70 Document Type: Term Paper

It is argued that while land tenure data can be instrumental in addressing land-related conflicts, much of the practical value is lost because of inconsistency of information and because information is not readily accessible, or cannot be combined to allow for greater depth of analysis. In practice, this means that policy-makers cannot make immediate use of the information that is available because additional time and expense are required either

History of the Euro Can Be Traced
Words: 1678 Length: 5 Document Type: Term Paper

History of the euro can be traced back as far as World War II when European leaders agreed that economic ties could promote growth in Europe (Martel). As a result of the Bretton Woods (New Hampshire, USA) agreement of 1944, the International Monetary Fund (IMF) opened for business in 1947 and a fixed rate of exchange was set between the U.S. dollar and other world currencies, based on the gold

Inventory Management the Raw Materials,
Words: 12443 Length: 40 Document Type: Case Study

52). The researcher handles or controls the items differently. It is a form of Pareto analysis where items such as customers, documents, activities, inventory items, sales territories grouped into three categories namely a, B, and C. In order of their estimated importance. Consequently, 'A' items are very important, 'B' items are important, and 'C' items are marginally important. The organization gives 'A' rating to their best customers since they

Supply Chain Planning Under Uncertainty:
Words: 12190 Length: 44 Document Type: Research Proposal

Results from the study by Petersen, Ragatz and Monczka show that effective collaborative planning depends on information quality, and the trust level firms share. The authors purport: "Collaborative planning activities between supply chain partners are expected to lead to better performing supply chains" (Petersen, Ragatz & Monczka, Introduction section ¶ 1). In addition, numerous other researchers have also explored the perception relating to supplier alliances, that enhanced collaborative planning

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now