Security Plan The Maryland Public Case Study

PAGES
9
WORDS
2681
Cite

The records contain confidential information that could be used in identity theft. The records should be securely stored either in soft copy or hard copy. Only authorized personnel should have access to these records. Audit trails should be installed to keep track of the personnel who access the records. The authorized personnel should be analyzed and background checks conducted. Strict measures and policy should be established to protect the information and security records. The center should have data storage systems that are less prone to intruders. The systems should also have intrusion detection systems that prevent and detect any intruders or hackers. Since the systems will be networked the facility should also install firewalls, which will prevent unauthorized network access. Having a username and password combination before a person accesses the system will also promote and improve security of data. Physical storage rooms should be guarded and locked all the time. The rooms should be fire resistant, which secures the information stored against a fire hazard. The room should also have CCTV surveillance and alarms protection. The CCTV cameras should be monitored throughout. This will keep track of the personnel accessing the room and what records they have accessed. Personnel and patient information should also be stored securely. The information could be used in identity theft or other illegal activities. Storing the information in databases would reduce the storage space and prevent illegal access to the data. The servers used for storing the information should have antivirus software, which will protect the information stored against any viruses or malware. Firewalls will monitor the information leaving and going into the servers. Monitoring the server's traffic will prevent any malicious activity. The storage systems should be monitored regularly to prevent and ensure there is no information leakage.

Emergency planning and response

It is vital for the facility to have an adequate emergency response plan. The emergency plan will encompass all the emergencies that the facility is faced with like fire, bomb threats, and criminal activities. The facility should establish an emergency department, which will be charged with handling all emergencies. The department will develop necessary emergency responses and procedures for the different emergencies that might affect the facility Alexander, 2002.

The employees should also be trained on correct emergency preparedness. This will allow the employees to be prepared to handle any emergency. Regular drills should be conducted in preparation and training of employees. The facility needs to link its emergency department with the necessary enforcement agency. This way in case of any emergency the agencies will be notified immediately, and it can assist the facility to deal with the emergency.

The facility needs to have emergency exits that trigger alarms when opened, this will allow employees and visitors easy exit from the building in case of any emergency. The exits need to be clearly marked and easily accessible by all personnel. Training employees on what to do during an emergency will prepare them for any eventuality. Fire extinguishers and automatic smoke detectors need to be installed within the facility. This will assist in fighting off any fire outbreak and prevent its spread. Smoke detectors are helpful in preventing the spread of fire or damage of property because of fire.

Hiring practices

The facility needs to have skilled employees in all its divisions. The hiring process determines the suitability of a candidate for a specific position within the organization. The center needs to have qualified personnel conducting the interviews. This ensures that the hiring process is ethical. Before an employee...

...

This is because of the sensitive nature of the center and equipment within the center. Since the facility is not bound by any standard governmental hiring practices, the center needs to ensure that each employee hired within the facility maintains good conduct and they have good moral values.
Training practices

The center's management needs to provide training to all the personnel working within the facility. The training should encompass various aspects of the center and should also cover security. The facility handles equipment that is highly sensitive and the employees should be taught on how to protect the equipment. Training should also cover aspects of using the equipment. Personnel should undergo security training especially because of the mental hospital. Mentally challenged individuals are highly unpredictable, and their behavior cannot be predicted. The personnel working in the hospital should be trained on different ways of dealing with the patients. The facility needs to ensure that all personnel employed in the facility are well trained. Having the requisite training will equip the employees with the skills needed for tackling their workload.

Managers of the facility need to provide regular refresher courses to the employees. These courses will allow the employees to combat any new challenges they may be faced with at work. The changes in the technology and security policies also demands for employees undergo refresher courses in their various skills. Working personnel need short courses, which can be conducted via presentations, workshops, or seminars. This will take a couple of days or a maximum of two weeks. Having short courses will allow the employees to concentrate on their work while they attend the training.

Recommendations

The center needs to identify all eminent risks. Once the risks have been identified they should be solved and the solutions communicated to all personnel. Checks need to be conducted around the facility to ensure that there are no intruders. Installing alarm systems would protect the facility from theft and intruders. There should also be a security desk where all visitors need to check in before they access the facility. The facility should also have adequate lighting especially at night. This will illuminate the facility and prevent any intruders. The lighting will also assist the patrol guards to easily spot any intruder. CCTV surveillance is vital for the facility. The center handles sensitive information and equipment, which should be secured properly.

Sources Used in Documents:

References

Alexander, D.E. (2002). Principles of Emergency Planning and Management. Oxford: Oxford University Press.

Bender, J. (2003). How to Prepare a security Plan. Alexandria, VA: American Society for Training and Development.

Haddow, G., Bullock, J., & Coppola, D.P. (2010). Introduction to Emergency Management. Maryland Heights, MO: Elsevier Science.

Kramer, J.J., Laboratory, L.E.S., Standards, U.S.N.B. o., Division, C. f C.P.T.C.S., Intelligence, U.S.D.N.A., & Directorate, S. (1978). The role of behavioral science in physical security: proceedings of the second annual symposium, March 23-24, 1977. Washington, DC: Dept. Of Commerce, National Bureau of Standards: for sale by the Supt. Of Docs., U.S. Govt. Print. Off.


Cite this Document:

"Security Plan The Maryland Public" (2013, July 23) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/security-plan-the-maryland-public-93322

"Security Plan The Maryland Public" 23 July 2013. Web.26 April. 2024. <
https://www.paperdue.com/essay/security-plan-the-maryland-public-93322>

"Security Plan The Maryland Public", 23 July 2013, Accessed.26 April. 2024,
https://www.paperdue.com/essay/security-plan-the-maryland-public-93322

Related Documents

DPSCS Maryland Department of Public Safety and Correctional Services (DPSCS) This report will provide a comprehensive safety and security plan for the Maryland Public Safety Education and Training Center (PSETC). This security plan will be broken into different sections that contain information about different security factors that are security risks for the organization and its physical assets. The organization must use its budget in the most effective manner possible to ensure the

Security Plan for the Maryland Public Safety Education and Training Center This paper will focus on a security plan designated for the Maryland Public Safety Education and Training Center. Here emphasis will be given on many things including facility assets that require protection, various threats which are directed towards the assets and the probability of loss. It is important to note that there are many complexes and facilities associated with the

Drafting a Security Plan a
PAGES 8 WORDS 2220

Interlocked doors which should be monitored at the courthouse's controlled center should be used to monitor and secure all points of entry and exit through this perimeter. 4. In order to meet the current design standards for short-term detention areas, all ceiling systems, floors, walls, and so on should be designed to reflect this standard. Interface Zone Security The meeting place for the attorneys, judges, court staff, jurors, the public and those

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Public School Safety; SandyHook Case Analysis Following the 'Sandy Hook School Incident', several different procedures and practices have been adopted by public schools in order to promote student and staff safety. Principals of public schools were questioned, in the School Survey on Crime and Safety, concerning the adoption of procedures and measures for protection and safety in their schools. Some practices such as like locked or guarded gates and doors are

Network Security
PAGES 8 WORDS 3486

Network Security History and Evolution of Network Security: The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perform only those specific tasks that are allowed within the parameters dictated by the security network of the computer, and banned from performing those that are not allowed. The tasks include