U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Security Management in Transition

NCJ Number
85527
Journal
Security Management Volume: 26 Issue: 10 Dated: (October 1982) Pages: 27-29,31
Author(s)
K T Derr
Date Published
1982
Length
4 pages
Annotation
This article on private security discusses the nature, development, and implementation of employee policies bearing upon security, drawing upon the experiences of the Standard Oil Company of California.
Abstract
In addition to adopting physical security measures, management should also establish a code of conduct for company employees, based upon surveys of the vulnerable points in company operations. This code should be published and made available to all employees. In the Standard Oil Company of California, extensive policy manuals are maintained, along with the highlighting of important aspects of policy through special employee bulletins or other publications; e.g., a pocket-sized pamphlet was issued to indicate company policy on such issues as conflict of interest, antitrust laws, multinational operations, government relations, and environmental protection. Policy statements should also deal with conformity to laws relating to employee health and safety. Managers in the field should be informed of and be required to conform to health and safety laws. This could include the use of special teams to perform selective audits of facilities to determine how policies are being implemented. While the specifics of each company's security policy will vary, any policy should indicate the company's posture on compliance with the law, treatment of company property, and on-the-job behavior. Penalties for violation of the code should also be explained. An important part of enforcement is to give the security manager quick access to top management so that quick decisions can be made under extraordinary circumstances. Security policies should be continually reviewed in the context of changing conditions.

Downloads

No download available

Availability