Week 3 - Comprehensive Security Program (Group) (2)
.pptx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
505
Subject
Information Systems
Date
Feb 20, 2024
Type
pptx
Pages
15
Uploaded by DoctorThunder7350
Comprehensive Security Program
Government Buildings
Brent Hall, Joseph Edwards, Natesha Newton, Paula Wenger, Quaylin Harris, and Traci Phelps
University of Phoenix
AJS/505
Melinda Allen
1/30/24
Objectives
COVID-19
Pandemic
Violence Prevention
Security Alarms
Fire Safety
Information Security
Access Control
Information on Emergency Preparedness and Procedures
CCTV Use
Security Officer Weapons and Use of Force Considerations
Local Police Response and Interaction with Security
This Comprehensive Security Program aims to describe the Security Plan to new employees. In this orientation, you will learn that we are committed to the safety and security of our employees, customers, and the public. We urge all employees to help us implement this Security plan and to continuously improve our efforts for the safety of our employees.
Emergency Preparedness and Procedures
Determine the circumstances of when an evacuation is necessary
Establish a clear chain of command
Establish specific evacuation procedures
Select a location to gather after evacuation
Establish a system for accounting for personnel
Establish procedures for assisting personnel with disabilities
Designate personnel to continue or shut down critical operations
Coordinate plans with your local emergency management office
COVID-19 Pandemic
IF YOU HAVE BEEN EXPOSED OR HAVE TESTED POSITIVE…
Inform your supervisor that you have been exposed
Self-monitor temperature and symptoms
If symptoms are present, do not report to work
Be symptom and fever-free for at least 24 hours before returning to work
RECOMMENDATIONS FOR PREVENTION…
Wear a mask
Wash hands thoroughly and often
Practice social distancing of at least six feet between yourself and others
Disinfect work areas on a regular basis
Conduct business over the phone or via video meeting whenever possible
Access Control
Utilize cloud-based security software for access control and observation
Employees and contractors must register for regular access and are issued credentials
Employee is only granted access to their own department
Visitors must check in, show ID, and be photographed at security station
Monitor users, schedules, and entry/exit across entire organization
Review real-time activity via live video of any access events
Remotely lock or unlock doors
Information Security
Create strong passwords
Change passwords at least every 60 days
Do not share passwords with anyone else
Avoid downloads from sources you are not familiar with
Scrutinize email attachments before opening
Leave anti-virus software running
Do not open unsolicited emails
Leave internet security settings set to “High”
Use firewalls
Install operating system updates immediately after notification
Always log off of your computer when it is not in use
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help