2 options
Blueprint for business safety and security : a guide to protecting your business / by William F. Blake, MS, CPP, CFE.
- Format:
- Book
- Author/Creator:
- Blake, William F., author.
- Language:
- English
- Subjects (All):
- Business enterprises--Security measures.
- Business enterprises.
- Physical Description:
- 1 online resource (203 pages)
- Edition:
- 1st ed.
- Place of Publication:
- Springfield, Illinois : Charles C Thomas, Publisher, Ltd., [2019]
- Summary:
- The average small- to medium-sized business owner is frequently unaware of safety and security issues that affect their business. When a person suffers a loss or injury while on the business property, there is an expectation by the staff member or customer that they are safe and secure from harm. As a result, a claim of negligent security can be made, and very expensive civil litigation can ensue. Blueprint for Business Safety and Security outlines some of these issues and discusses some reasonable and appropriate measures to take in order to reduce the potential for negligent security claims. The primary objective is to assist the business owner maintain a reputation as a safe location to work and conduct business. It will also be of interest to private investigators, attorneys, security professionals, law enforcement personnel, and students of security.
- Contents:
- Intro
- BLUEPRINT FOR BUSINESS SAFETY AND SECURITY
- ABOUT THE AUTHOR
- PREFACE
- CONTENTS
- Chapter 1 INTRODUCTION
- What Are the Potential Costs of Negligence Security Claims?
- What Factors Influence the Safety and Security of My Business?
- What Are the Legal Elements of a Premises Security Claim?
- Chapter 2 HOW DO I IDENTIFY THE RISKS TO MY BUSINESS?
- Chapter 3 THE IMPACT OF OSHA REGULATIONS ON A BUSINESS
- Introduction
- Who Does OSHA Cover?
- Right to a Safe and Healthful Workplace
- Worker, Environmental and Nuclear Safety Laws
- Transportation Industry Laws
- Fraud Prevention Laws
- OSHA Assistance, Services and Programs
- Establishing a Safety and Health Program
- NIOSH Health Hazard Evaluation Program
- OSHA Regional Offices
- Chapter 4 DESIGNING A COMPREHENSIVE SAFETY AND SECURITY PROGRAM
- What Should Be Protected?
- How Do I Know What I Should Have Within My Security Program?
- How Do I Ensure Our Program Is Adequately Comprehensive?
- How Do I Identify and Evaluate Security Devices?
- How Can I Control the Cost of Security Equipment?
- How Do I Identify a Responsive and Qualified Products and Services Vendor?
- How Do I Insure the Continuing Proper Operation?
- Chapter 5 STRATEGIES FOR REDUCING RISK
- Were the Security Measures Reasonable and Appropriate?
- Chapter 6 SECURITY DEVICES AND SYSTEMS
- Summary
- Chapter 7 POLICY AND PROCEDURE DEVELOPMENT
- Protection of Proprietary and Sensitive Information, Equipment and Access
- Electronic and Fire Protection Systems
- Emergency, Contingency and Evacuation Plans
- Possession of Weapons on the Property
- Chapter 8 SECURITY AND SAFETY RELATED POLICIES AND PROCEDURES
- Chapter 9 CONTROLLING INTERNAL THEFT
- Forms of Employee Theft
- Signs of Employee Theft.
- Stopping Employee Theft
- Chapter 10 INTERVIEWS, INTERPRETERS AND STATEMENTS
- PLANNING THE INTERVIEW
- Interviewer Methodology
- Interviewing Minors and the Elderly
- Developing Interview Questions
- What Is the Best Location for Conducting an Interview?
- What is the Most Productive Interview Protocol?
- USING AN INTERPRETER
- Choosing an Interpreter
- Finding an Interpreter
- OBTAINING WRITTEN STATEMENTS
- What Is an Appropriate Statement Format?
- SUMMARY
- Chapter 11 LABOR RELATIONS AND WEINGARTEN RIGHTS
- Mandatory Bargaining Requirements
- Unfair Labor Practices
- Weingarten Rights
- QUESTIONS AND ANSWERS REGARDING WEINGARTEN RIGHTS
- Steward's Request
- Coercion
- Can Employee Refuse to Go to a Meeting?
- Medical Examination
- Lie Detector Test
- Sobriety Test
- Locker Search
- Counseling Session
- Private Attorney
- Recording the Interview
- Questions About Others
- Obstruction
- What Are the Rights of a Non-Union Employee in a Unionized Business?
- Chapter 12 REPRESENTATIVE NEGLIGENT SECURITY COURT CASES
- Control of Vacant Spaces
- Disclaimers and Warnings
- Employee Screening-Inaccurate Personnel Recommendation
- Employee Screening-Negligent Hiring and Retention
- Extraterritorial Security-Assumption of Duty
- Incident Documentation-Destruction of Records
- Incident Reporting-Reporting Standards
- Key Control-Failure to Control Keys
- Key Control-Failure to Rekey
- Negligent Security-Inadequate Security
- Security Maintenance Programs
- Security Negligence-Assault
- Security Officer Negligence-Dereliction of Duty
- Security Officer Negligence-Failure to Call Police
- Security Officer Negligence-Failure to Exclude Terminated Employee
- Security Officer Negligence-Not at Assigned Location
- Security Officer Negligence-Intentional Infliction of Emotional Distress.
- Security Procedures Manual-Failure to Follow Procedures
- Security Measures Misrepresented-24-Hour Security
- Security Measures Misrepresented- Non-existent Security Measures
- Security Trade Practices Do Not Establish Legal Standard of Care
- Violation of Company Policy-Possession of a Gun
- Warning Policy-Failure to Disclose Building Defects
- Warning Policy-Failure to Disclose Existing Dangers
- Chapter 13 SURVIVING AN ACTIVE SHOOTER OR HOSTILE EVENT
- Identifying Characteristics of a Typical Active Shooter
- Warning Signs
- Who Is at Risk?
- Preventive Strategies for Your Facility
- Exterior Areas
- Access Control
- Reception and Waiting Areas
- Administrative Areas
- Listen to Your Intuition, Follow Your Gut Reaction, Act Fast!
- When Escaping Is Not an Option24
- Developing Your Plan
- APPENDICES
- Appendix A GENERIC RISK ASSESSMENT CHECKLIST
- General Information
- Demographic Influences
- Security Operations
- Perimeter Control
- Parking Control
- Building Security and Access Control
- Fire Safety
- Physical Asset Protection
- Information Security
- Personal Safety and Security Awareness
- Appendix B DISCOVERABLE DOCUMENTS.
- Notes:
- Includes bibliographical references and index.
- Description based on print version record.
- Description based on publisher supplied metadata and other sources.
- ISBN:
- 0-398-09270-2
- OCLC:
- 1084618787
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.