SlideShare a Scribd company logo
1 of 10
Download to read offline
Positioning • PWC Survey – CRIME – 62 % Internal, 38 % External (Threats)
• 2 out of 3 Businesses in SA report daily incidents relating to Security or Losses
• Private Security outnumbers government policing personnel by more than 3 to 1
• Cost of Security up by 45%
• Executives Stated that Staff Motivation affected
by crime up by 37 %
• Crime impacted Production by no less than 15 %
(Varies / Industry)
• Crime / Security / Safety resulted in 20 % of
Resignations
• The Security Industry: 1990 = R1.2 Billion...2010 = R40 Billion
• Crime Stats: 73600 Incidents (2014) – each day 202 Businesses in South Africa are
being robbed. – Up 461 % since 2005
• Social Unrest and Violence is up 96 % with a minimum of 5 incidents per day
• 84 % of respondents indicated that they, their staff or their families have been directly
affected by 1, or more, of the 5 top rated most serious crimes in SA
• CommercialCrime up by 70 % in last decade – 79109 incidents (Under Reported due
to associated reputational risk)
We thrive on paranoia
and Incident Reaction
Ever stopped to ask
yourself why?
Eliminating the lack of completeness – Security/Risk
Management should be looked at in its
ENTIRETY and related to the achievement of
Strategic Business Objectives. Not on a project
to project or need to need basis.
About Security Service Consultants
Established in 1962 – SSC
is South Africa’s oldest privately
owned & managed Security &
Corporate Investigations
Consultancy. SSC’s highly
experienced internal staff and
wide network of established
legal & financial professional
associates, industry contacts
and contributors, offers
professionally delivered,
bespoke Business Intelligence
& Security Solutions to clients in
all sectors of the emerging
markets in the SADC Region.
Depending on circumstances,
Sub Saharan assignments are
accepted
Our Mission:
SECURITY SERVICE CONSULTANTS Mission is to achieve not only our financial
obligations to our employees, owners and shareholders, but also to provide
mutual, financially viable solutions, to a growing client base, that values return
on investment, lower risks, cutting edge security solutions and technological
advancements. What is non- negotiable to us as a firm, is for all individuals
within our organisation, to live up to our core values. We will focus on the
human factor, as companies don’t perform, people do.
Our Vision:
SECURITY SERVICE CONSULTANTS, due to our absolute dedication, will provide
professional, and mutually profitable services to our clients. Our intention is to
grow and, as a team, choose to do so with Passion and Loyalty, which will allow
us to impact our country, and the people around us. We will provide
outstanding service delivery, honestly, and with responsibility. SSC will strive to
continue to lead the way within our industry. By gaining this market recognition
we will remain "THE FIRST CHOICE" by those in need of our services.
Our Values:
Honesty – Dedication – Loyalty – Professionalism – Responsibility - Passion
What we do: “A Snap Shot”
Our corporate investigations and
intelligence division covers the following:
• Corporate & Product Strategy
• Corporate Structure / Ownership /
Antecedents
• Corporate & Management Compliance /
Forensic Audits
• Political Risk
• Corporate & Product Reputation &
Viability Issues
• Corporate Research - Forensic, Market,
Competitive
• Personnel & Team Screening / Profiles
• Missing Persons
• Litigation Support
Our security services division
encompasses the following:
• Undercover Agents
• CCTV System Management
• Physical Security Audits & Solutions
• Independent Security Management
• Industrial Espionage Investigations
• Theft Syndicate Investigations
• Labour Unrest & Intimidation
• White Collar Crime
Our Competencies Explained:
Risk is defined as exposure to any hazardous circumstances – a source of, or
exposure to danger or loss. Our in-depth risk management audit will
look at all aspects of your existing Security, providing you with a
detailed survey report. The survey will include comprehensive
observations in all the Risk Management disciplines, and will include
applicable recommendations on actions to be taken to remove or
bring the situations identified under control.
Specific aspects that the survey covers include: Intelligence, Security
Manpower, Innovative technology, Procedures and Systems,
Security Vulnerability
Get real time, proactive feedback from
within your workforce. If you want to reduce the risks and
losses and improve your bottom line profit, the
deployment of these specialists is a necessity. Our
undercover investigators will report on the following
criteria: • Criminal activity • Labour concerns • Breaches
of security • Health and safety • Substance abuse •
Company matters
Our Competencies Explained:
Our operators and supervisors are all highly trained in the art of
observation and body language by the world renowned Dr Craig
Donald. All operators are given site- specific training on your CCTV
equipment. We are completely independent from any installations
or maintenance allowing us to ensure that those hired to do this job
are contractually compliant. All of our operators are first aid
accredited. You will receive regular reports, which are securely
stored for your convenience on our online data management
system, Meerkat. Our CCTV Control Room Operators will report on
the following criteria: • Criminal activity • Labour concerns •
Breaches of security • Health and safety • Substance abuse •
Company matters
Both the 2010 Report to the Nations on Occupational Fraud and
Abuse and the 2009 PWC Global Fraud Survey showed that
up to more than 40% of all frauds and abuse are uncovered
via hotline disclosure services. Security Service Consultants
through its subsidiary “Be Heard®”, is much more than just a
hotline. Our telephonic service is accessible 24X7, and has
one hotline dedicated to each individual company, assuring
you of complete confidentiality at all times. This proactive
approach could provide you with early warning of
inappropriate behaviour, reduce reputational risk and
positively impact on the culture of your organisation. By
offering a number of innovative and unique features and
complimentary services, you are assured of the best possible
return on your monthly subscription.
Our Competencies Explained:
We specialise in a complete range of investigation services, and have a
solid track record of helping businesses uncover theft syndicates,
intercept stolen goods, and detect and prevent industrial espionage.
We focus primarily on the corporate sector and our successful
track record is evident in the high rate of cases solved. Security Service
Consultants prides itself in the following investigation services:
• Criminal Investigations • Background screening investigations •
Reputational Due Diligence • Forensic investigations • Tracing of
Missing Persons • Counter Industrial Espionage • Lie Detection Testing
• Technical Surveillance • Vehicle Surveillance • White Collar Crimes •
Labour Unrest and Intimidation
We provide clients with an integrity testing service, using the
same methods that we use to screen our own agents and
operators. Voice stress analysis has several advantages
over the original polygraph method, and is currently used
as a truth verification method in over 40 countries: • No
discomfort from attachments to the body (which can
falsely increase the stress level of the subject) • Reactions
are instantaneous, so a normal questioning speed can be
used • The subject is not limited to yes or no answers
This is a highly effective tool when dealing with the following
issues:
• Detection of deception theft, fraud etc • Analysis of
recorded interviews (statements etc.) • Pre–
employment and periodic screening • Specific incident
testing • Infidelity • Security clearances •
Employee/Company vetting
Our Competencies Explained:
Our role as independent security managers would not be subject to
any outside authority or internal politics and would only report to
senior management. We would be party to internal decision making
and would handle the security budget ensuring that you are getting
what you are paying for. These services include third party
monitoring, reporting without fear or favour on the guarding
company’s activities – positive or negative.
Our role would include: • Contractor performance reviews
and assessments • Billing accuracy • Contractor
responsiveness • Monitoring of training requirements and
procedures • Attrition rates amongst staff and the causes
thereof • Contractor service complaint monitoring • On-
site inspections • Record and receipt Inspection • Security
audits and surveys
Our Uniqueness: Our online data management program, Meerkat,
make us truly unique. This system not only stores all reports and
incidents in a secure environment, but enables you to recall past
entries including snap shots and video clips easily. Powerful
search facilities allows you to mine historic data and get the exact
incident you were looking for no matter when it was reported.
Monthly statistical reports provide you with graphical
representations and trend analogy’s on what has been reported
on.
Process Moving Forward
Questions & Answers and Next Steps

More Related Content

What's hot

ISO 37001: Procurement factors
ISO 37001: Procurement factorsISO 37001: Procurement factors
ISO 37001: Procurement factorsDr Mark Lovatt
 
G4S Security Services - Company Profile G4S
G4S Security Services - Company Profile G4SG4S Security Services - Company Profile G4S
G4S Security Services - Company Profile G4SIrfan Yunizar
 
Handling whistleblower complaints a global perspective for north american c...
Handling whistleblower complaints   a global perspective for north american c...Handling whistleblower complaints   a global perspective for north american c...
Handling whistleblower complaints a global perspective for north american c...Case IQ
 
Corporate Compliance & Disclosure 2015
Corporate Compliance & Disclosure 2015Corporate Compliance & Disclosure 2015
Corporate Compliance & Disclosure 2015Ruoh Yi Tham
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsAbhishek Bali
 
SPS-LLC - Proposal.
SPS-LLC - Proposal.SPS-LLC - Proposal.
SPS-LLC - Proposal.Yusuf Abu
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Strategic Treasurer
 
TG Securitas Company Profile
TG Securitas Company ProfileTG Securitas Company Profile
TG Securitas Company ProfileTG Securitas
 
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 IntroductionACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 IntroductionBillyCheuk
 

What's hot (14)

ISO 37001: Procurement factors
ISO 37001: Procurement factorsISO 37001: Procurement factors
ISO 37001: Procurement factors
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
G4S Security Services - Company Profile G4S
G4S Security Services - Company Profile G4SG4S Security Services - Company Profile G4S
G4S Security Services - Company Profile G4S
 
Handling whistleblower complaints a global perspective for north american c...
Handling whistleblower complaints   a global perspective for north american c...Handling whistleblower complaints   a global perspective for north american c...
Handling whistleblower complaints a global perspective for north american c...
 
Corporate Compliance & Disclosure 2015
Corporate Compliance & Disclosure 2015Corporate Compliance & Disclosure 2015
Corporate Compliance & Disclosure 2015
 
Cfe prep course
Cfe prep courseCfe prep course
Cfe prep course
 
Common Pitfalls While Establishing a Whistle-blowing Hotline
Common Pitfalls While Establishing a Whistle-blowing HotlineCommon Pitfalls While Establishing a Whistle-blowing Hotline
Common Pitfalls While Establishing a Whistle-blowing Hotline
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR Advisors
 
SPS-LLC - Proposal.
SPS-LLC - Proposal.SPS-LLC - Proposal.
SPS-LLC - Proposal.
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
TG Securitas Company Profile
TG Securitas Company ProfileTG Securitas Company Profile
TG Securitas Company Profile
 
Legal Risk - New Thinking
Legal Risk - New ThinkingLegal Risk - New Thinking
Legal Risk - New Thinking
 
LIBOR Transition
LIBOR TransitionLIBOR Transition
LIBOR Transition
 
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 IntroductionACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
 

Viewers also liked (7)

References x8 - Feb 2015
References x8 - Feb 2015References x8 - Feb 2015
References x8 - Feb 2015
 
9 мая
9 мая9 мая
9 мая
 
Sales & Marketing Aligning for Impact, Kevin Starner, Karen Snyder
Sales & Marketing Aligning for Impact, Kevin Starner, Karen SnyderSales & Marketing Aligning for Impact, Kevin Starner, Karen Snyder
Sales & Marketing Aligning for Impact, Kevin Starner, Karen Snyder
 
Website eval project
Website eval projectWebsite eval project
Website eval project
 
Crate and Barrel Ad 2015
Crate and Barrel Ad 2015Crate and Barrel Ad 2015
Crate and Barrel Ad 2015
 
FORMS OF UNREST
FORMS OF UNRESTFORMS OF UNREST
FORMS OF UNREST
 
O poder da mente subconsciente
O poder da mente subconscienteO poder da mente subconsciente
O poder da mente subconsciente
 

Similar to SSC Corporate Presentation

Hipora company profile
Hipora company profileHipora company profile
Hipora company profileVivien Wamalwa
 
Vetting Solutions Brochure
Vetting Solutions BrochureVetting Solutions Brochure
Vetting Solutions BrochureRyan Jones-Ralph
 
Vetting Solutions Brochure (1)
Vetting Solutions Brochure (1)Vetting Solutions Brochure (1)
Vetting Solutions Brochure (1)Matt Mealey
 
Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Xerxes Oosthuizen
 
Power Point Presentation Florida
Power Point Presentation FloridaPower Point Presentation Florida
Power Point Presentation FloridaFernando J. Tapia
 
FUTURE JANUARY2012ppt
FUTURE JANUARY2012pptFUTURE JANUARY2012ppt
FUTURE JANUARY2012pptstone Johnson
 
Can you fool an auditor?
Can you fool an auditor?Can you fool an auditor?
Can you fool an auditor?Jenny Reid
 
H&A Company Profile
H&A Company ProfileH&A Company Profile
H&A Company Profileugagan
 
Proactive Risk Management Parm brochure dépliant v7
Proactive Risk Management Parm brochure dépliant v7Proactive Risk Management Parm brochure dépliant v7
Proactive Risk Management Parm brochure dépliant v7Benoit Grenier
 
NCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesNCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesOllie Whitehouse
 
Acol Brochure En Us
Acol Brochure En UsAcol Brochure En Us
Acol Brochure En Uscarelanda
 
Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Ricardo Bn. Baretzky
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guideNA Putra
 
iPower Security Assessment
iPower Security AssessmentiPower Security Assessment
iPower Security Assessmentgoipower
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015patmisasi
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBAlan Greggo
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Servicessarah kabirat
 

Similar to SSC Corporate Presentation (20)

Hipora company profile
Hipora company profileHipora company profile
Hipora company profile
 
Vetting Solutions Brochure
Vetting Solutions BrochureVetting Solutions Brochure
Vetting Solutions Brochure
 
Vetting Solutions Brochure (1)
Vetting Solutions Brochure (1)Vetting Solutions Brochure (1)
Vetting Solutions Brochure (1)
 
Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)
 
Power Point Presentation Florida
Power Point Presentation FloridaPower Point Presentation Florida
Power Point Presentation Florida
 
Nrs security profile
Nrs security profileNrs security profile
Nrs security profile
 
Intro of usf
Intro of usfIntro of usf
Intro of usf
 
FUTURE JANUARY2012ppt
FUTURE JANUARY2012pptFUTURE JANUARY2012ppt
FUTURE JANUARY2012ppt
 
Can you fool an auditor?
Can you fool an auditor?Can you fool an auditor?
Can you fool an auditor?
 
H&A Company Profile
H&A Company ProfileH&A Company Profile
H&A Company Profile
 
Proactive Risk Management Parm brochure dépliant v7
Proactive Risk Management Parm brochure dépliant v7Proactive Risk Management Parm brochure dépliant v7
Proactive Risk Management Parm brochure dépliant v7
 
NCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesNCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory Services
 
Acol Brochure En Us
Acol Brochure En UsAcol Brochure En Us
Acol Brochure En Us
 
Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Baretzky & Associates Presentation.
Baretzky & Associates Presentation.
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
 
iPower Security Assessment
iPower Security AssessmentiPower Security Assessment
iPower Security Assessment
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MB
 
WP-Governance-Digital
WP-Governance-DigitalWP-Governance-Digital
WP-Governance-Digital
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 

SSC Corporate Presentation

  • 1.
  • 2. Positioning • PWC Survey – CRIME – 62 % Internal, 38 % External (Threats) • 2 out of 3 Businesses in SA report daily incidents relating to Security or Losses • Private Security outnumbers government policing personnel by more than 3 to 1 • Cost of Security up by 45% • Executives Stated that Staff Motivation affected by crime up by 37 % • Crime impacted Production by no less than 15 % (Varies / Industry) • Crime / Security / Safety resulted in 20 % of Resignations • The Security Industry: 1990 = R1.2 Billion...2010 = R40 Billion • Crime Stats: 73600 Incidents (2014) – each day 202 Businesses in South Africa are being robbed. – Up 461 % since 2005 • Social Unrest and Violence is up 96 % with a minimum of 5 incidents per day • 84 % of respondents indicated that they, their staff or their families have been directly affected by 1, or more, of the 5 top rated most serious crimes in SA • CommercialCrime up by 70 % in last decade – 79109 incidents (Under Reported due to associated reputational risk) We thrive on paranoia and Incident Reaction Ever stopped to ask yourself why? Eliminating the lack of completeness – Security/Risk Management should be looked at in its ENTIRETY and related to the achievement of Strategic Business Objectives. Not on a project to project or need to need basis.
  • 3. About Security Service Consultants Established in 1962 – SSC is South Africa’s oldest privately owned & managed Security & Corporate Investigations Consultancy. SSC’s highly experienced internal staff and wide network of established legal & financial professional associates, industry contacts and contributors, offers professionally delivered, bespoke Business Intelligence & Security Solutions to clients in all sectors of the emerging markets in the SADC Region. Depending on circumstances, Sub Saharan assignments are accepted Our Mission: SECURITY SERVICE CONSULTANTS Mission is to achieve not only our financial obligations to our employees, owners and shareholders, but also to provide mutual, financially viable solutions, to a growing client base, that values return on investment, lower risks, cutting edge security solutions and technological advancements. What is non- negotiable to us as a firm, is for all individuals within our organisation, to live up to our core values. We will focus on the human factor, as companies don’t perform, people do. Our Vision: SECURITY SERVICE CONSULTANTS, due to our absolute dedication, will provide professional, and mutually profitable services to our clients. Our intention is to grow and, as a team, choose to do so with Passion and Loyalty, which will allow us to impact our country, and the people around us. We will provide outstanding service delivery, honestly, and with responsibility. SSC will strive to continue to lead the way within our industry. By gaining this market recognition we will remain "THE FIRST CHOICE" by those in need of our services. Our Values: Honesty – Dedication – Loyalty – Professionalism – Responsibility - Passion
  • 4. What we do: “A Snap Shot” Our corporate investigations and intelligence division covers the following: • Corporate & Product Strategy • Corporate Structure / Ownership / Antecedents • Corporate & Management Compliance / Forensic Audits • Political Risk • Corporate & Product Reputation & Viability Issues • Corporate Research - Forensic, Market, Competitive • Personnel & Team Screening / Profiles • Missing Persons • Litigation Support Our security services division encompasses the following: • Undercover Agents • CCTV System Management • Physical Security Audits & Solutions • Independent Security Management • Industrial Espionage Investigations • Theft Syndicate Investigations • Labour Unrest & Intimidation • White Collar Crime
  • 5. Our Competencies Explained: Risk is defined as exposure to any hazardous circumstances – a source of, or exposure to danger or loss. Our in-depth risk management audit will look at all aspects of your existing Security, providing you with a detailed survey report. The survey will include comprehensive observations in all the Risk Management disciplines, and will include applicable recommendations on actions to be taken to remove or bring the situations identified under control. Specific aspects that the survey covers include: Intelligence, Security Manpower, Innovative technology, Procedures and Systems, Security Vulnerability Get real time, proactive feedback from within your workforce. If you want to reduce the risks and losses and improve your bottom line profit, the deployment of these specialists is a necessity. Our undercover investigators will report on the following criteria: • Criminal activity • Labour concerns • Breaches of security • Health and safety • Substance abuse • Company matters
  • 6. Our Competencies Explained: Our operators and supervisors are all highly trained in the art of observation and body language by the world renowned Dr Craig Donald. All operators are given site- specific training on your CCTV equipment. We are completely independent from any installations or maintenance allowing us to ensure that those hired to do this job are contractually compliant. All of our operators are first aid accredited. You will receive regular reports, which are securely stored for your convenience on our online data management system, Meerkat. Our CCTV Control Room Operators will report on the following criteria: • Criminal activity • Labour concerns • Breaches of security • Health and safety • Substance abuse • Company matters Both the 2010 Report to the Nations on Occupational Fraud and Abuse and the 2009 PWC Global Fraud Survey showed that up to more than 40% of all frauds and abuse are uncovered via hotline disclosure services. Security Service Consultants through its subsidiary “Be Heard®”, is much more than just a hotline. Our telephonic service is accessible 24X7, and has one hotline dedicated to each individual company, assuring you of complete confidentiality at all times. This proactive approach could provide you with early warning of inappropriate behaviour, reduce reputational risk and positively impact on the culture of your organisation. By offering a number of innovative and unique features and complimentary services, you are assured of the best possible return on your monthly subscription.
  • 7. Our Competencies Explained: We specialise in a complete range of investigation services, and have a solid track record of helping businesses uncover theft syndicates, intercept stolen goods, and detect and prevent industrial espionage. We focus primarily on the corporate sector and our successful track record is evident in the high rate of cases solved. Security Service Consultants prides itself in the following investigation services: • Criminal Investigations • Background screening investigations • Reputational Due Diligence • Forensic investigations • Tracing of Missing Persons • Counter Industrial Espionage • Lie Detection Testing • Technical Surveillance • Vehicle Surveillance • White Collar Crimes • Labour Unrest and Intimidation We provide clients with an integrity testing service, using the same methods that we use to screen our own agents and operators. Voice stress analysis has several advantages over the original polygraph method, and is currently used as a truth verification method in over 40 countries: • No discomfort from attachments to the body (which can falsely increase the stress level of the subject) • Reactions are instantaneous, so a normal questioning speed can be used • The subject is not limited to yes or no answers This is a highly effective tool when dealing with the following issues: • Detection of deception theft, fraud etc • Analysis of recorded interviews (statements etc.) • Pre– employment and periodic screening • Specific incident testing • Infidelity • Security clearances • Employee/Company vetting
  • 8. Our Competencies Explained: Our role as independent security managers would not be subject to any outside authority or internal politics and would only report to senior management. We would be party to internal decision making and would handle the security budget ensuring that you are getting what you are paying for. These services include third party monitoring, reporting without fear or favour on the guarding company’s activities – positive or negative. Our role would include: • Contractor performance reviews and assessments • Billing accuracy • Contractor responsiveness • Monitoring of training requirements and procedures • Attrition rates amongst staff and the causes thereof • Contractor service complaint monitoring • On- site inspections • Record and receipt Inspection • Security audits and surveys Our Uniqueness: Our online data management program, Meerkat, make us truly unique. This system not only stores all reports and incidents in a secure environment, but enables you to recall past entries including snap shots and video clips easily. Powerful search facilities allows you to mine historic data and get the exact incident you were looking for no matter when it was reported. Monthly statistical reports provide you with graphical representations and trend analogy’s on what has been reported on.
  • 10. Questions & Answers and Next Steps