Week 3 - Comprehensive Security Program (Group) (2)

.pptx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

505

Subject

Information Systems

Date

Feb 20, 2024

Type

pptx

Pages

15

Uploaded by DoctorThunder7350

Report
Comprehensive Security Program Government Buildings Brent Hall, Joseph Edwards, Natesha Newton, Paula Wenger, Quaylin Harris, and Traci Phelps University of Phoenix AJS/505 Melinda Allen 1/30/24
Objectives COVID-19 Pandemic Violence Prevention Security Alarms Fire Safety Information Security Access Control Information on Emergency Preparedness and Procedures CCTV Use Security Officer Weapons and Use of Force Considerations Local Police Response and Interaction with Security This Comprehensive Security Program aims to describe the Security Plan to new employees. In this orientation, you will learn that we are committed to the safety and security of our employees, customers, and the public. We urge all employees to help us implement this Security plan and to continuously improve our efforts for the safety of our employees.
Emergency Preparedness and Procedures Determine the circumstances of when an evacuation is necessary Establish a clear chain of command Establish specific evacuation procedures Select a location to gather after evacuation Establish a system for accounting for personnel Establish procedures for assisting personnel with disabilities Designate personnel to continue or shut down critical operations Coordinate plans with your local emergency management office
COVID-19 Pandemic IF YOU HAVE BEEN EXPOSED OR HAVE TESTED POSITIVE… Inform your supervisor that you have been exposed Self-monitor temperature and symptoms If symptoms are present, do not report to work Be symptom and fever-free for at least 24 hours before returning to work RECOMMENDATIONS FOR PREVENTION… Wear a mask Wash hands thoroughly and often Practice social distancing of at least six feet between yourself and others Disinfect work areas on a regular basis Conduct business over the phone or via video meeting whenever possible
Access Control Utilize cloud-based security software for access control and observation Employees and contractors must register for regular access and are issued credentials Employee is only granted access to their own department Visitors must check in, show ID, and be photographed at security station Monitor users, schedules, and entry/exit across entire organization Review real-time activity via live video of any access events Remotely lock or unlock doors
Information Security Create strong passwords Change passwords at least every 60 days Do not share passwords with anyone else Avoid downloads from sources you are not familiar with Scrutinize email attachments before opening Leave anti-virus software running Do not open unsolicited emails Leave internet security settings set to “High” Use firewalls Install operating system updates immediately after notification Always log off of your computer when it is not in use
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help