Major Event
SEC420 Major Event Protection
Name
Class
Date
Professor
Major Event Protection
At a major concert being held at an outdoor venue security vulnerabilities must be first assessed before the artist can perform as well as to ensure the safety of concert goers and concert staff. A major concert is a large venue that requires adequate security be present to police the thousands of people in an attendance but other smaller security details must also be addressed. Before an effective security plan can be developed a security assessment must first be conducted. The security assessment will identify the security needs for the major outdoor concert event and identify security weaknesses and gaps that must be addressed.
In this case the major concert will involve a country superstar and will be held at the local outdoor amphitheatre. The amphitheatre is large and will hold up to 20,000 concert goers. The outdoor amphitheatre includes a large stage with underground offices, dressing rooms, and security stations that hold concert staff, artists and crew, and security personnel. There are eight different potential entry points into the venue wit tow of these points being off limits to concert goers. These areas are restricted and only accessible to artists, their entourage, and security personnel as well as concert staffers. One entrance is used for suppliers and retailers.
Preplanning Stage
At a major concert venue, that will be held outside there are many potential security risks that will present themselves requiring an effective assessment in order to develop a comprehensive security plan. The security assessment of the concert venue begins with assessment planning that involves determining who, what, and where the assessment will be conducted (Bickel, 2007). When an event, such as a major concert, will be occurring planning should begin months before the event. There are many small and large details that must first be addressed and assessed before the concert can occur.
The planning stage also involves determining the budget including available resources and cost of properly securing the venue as well as the logistics of ensuring every aspect of the security are addressed. If every detail of the security plan is not preplanned the security plan cannot be effective. For example if the security plan included security all gates entrances but failed to secure the area where the artist prepare the security plan is ineffective. The planning stage also involves conducting the risk and threat assessments. The risk assessment provides answers on potential security risks while the threat assessment identifies potential security threats.
The risk and threat assessments will assist security staff in identifying potential threats, such as the regular crimes committed that could occur at the concert venue that include theft, gang activity, and vandalism or potential threats due to disasters out of ...
1. Major Event
SEC420 Major Event Protection
Name
Class
Date
Professor
Major Event Protection
At a major concert being held at an outdoor venue security
vulnerabilities must be first assessed before the artist can
perform as well as to ensure the safety of concert goers and
concert staff. A major concert is a large venue that requires
adequate security be present to police the thousands of people
in an attendance but other smaller security details must also be
2. addressed. Before an effective security plan can be developed a
security assessment must first be conducted. The security
assessment will identify the security needs for the major
outdoor concert event and identify security weaknesses and gaps
that must be addressed.
In this case the major concert will involve a country
superstar and will be held at the local outdoor amphitheatre.
The amphitheatre is large and will hold up to 20,000 concert
goers. The outdoor amphitheatre includes a large stage with
underground offices, dressing rooms, and security stations that
hold concert staff, artists and crew, and security personnel.
There are eight different potential entry points into the venue
wit tow of these points being off limits to concert goers. These
areas are restricted and only accessible to artists, their
entourage, and security personnel as well as concert staffers.
One entrance is used for suppliers and retailers.
Preplanning Stage
At a major concert venue, that will be held outside there are
many potential security risks that will present themselves
requiring an effective assessment in order to develop a
comprehensive security plan. The security assessment of the
concert venue begins with assessment planning that involves
determining who, what, and where the assessment will be
conducted (Bickel, 2007). When an event, such as a major
concert, will be occurring planning should begin months before
the event. There are many small and large details that must first
be addressed and assessed before the concert can occur.
The planning stage also involves determining the budget
including available resources and cost of properly securing the
venue as well as the logistics of ensuring every aspect of the
security are addressed. If every detail of the security plan is not
preplanned the security plan cannot be effective. For example if
the security plan included security all gates entrances but failed
to secure the area where the artist prepare the security plan is
ineffective. The planning stage also involves conducting the
risk and threat assessments. The risk assessment provides
3. answers on potential security risks while the threat assessment
identifies potential security threats.
The risk and threat assessments will assist security staff in
identifying potential threats, such as the regular crimes
committed that could occur at the concert venue that include
theft, gang activity, and vandalism or potential threats due to
disasters out of the control of the security staff, such as fires or
severe and dangerous weather. Understanding the risks will
allow the security staff to budget properly by identifying
necessary resources and ensure the appropriate measures are in
place to prevent the potential threat. Threat and risk assessment
cover the categories of harm to people, harm to property, and
liability to concert venue.
Security Plan
The security plan will involve many different aspects that
will need to be addressed. First is securing the outer perimeter
of the amphitheatres. This means preventing people that have
not paid for the concert from entering the venue as well as
controlling traffic into the concert venue. With a venue that
holds well over 20,000 concert goers there will be a definite
need to ensure all parking and traffic issues have been
preplanned for and addressed. This includes employing the
services of local law enforcement to ensure that there are not
traffic issues and that concert goers can park without any
challenges or accidents. The Security chief will run security
operations from the security operations center which includes
the video surveillance center.
Security the outer perimeter means ensuring that no
unauthorized personnel enter the area. This will include placing
security gates at each entrance that contain security personnel
that are charged with providing assistance to law enforcement
directing traffic and preventing any unwanted guest from
entering the area (Shuster, 2003). Barricades will be used to
ensure traffic does not enter any unauthorized areas. Other
responding personnel that will be present at the concert venue
include medical personnel in the event there is a medical
4. emergency as well as the local fire department t respond to fires
or any other potential catastrophe.
The parking areas of the concert venue will also need to be
secured. The security plan will ensure that the parking areas are
well lit and that security members are present to deter any
potential theft or damage coming to the vehicles of con cert
goers. Concert goers are also required to pay for parking at the
concert venue if they want to leave their vehicle in a secured
parking lot. Security guards will be in place in order to charge
customers and to deter any potential conflicts. Separate parking
lots will be available for artist, security personnel, and concert
staff.
The next security concern that must be addressed involves
the entrance gates. Due to the large population of concert goers
there will need to be security in place to ensure concert goers
enter the building in a uniform and orderly manner. Concert
goers will also need to be checked for weapons, drugs, or
alcohol. Security will be placed at one of the five entrances that
will be used by concert goers to ensure there is no chaos or
conflict and to ensure that no one enter with contraband. Each
door will contain a security guard that will take the concert
goers ticket and scan it to authentic its genuineness before the
concert goers will stop at a station to have bags checked.
Once concert goers enter into the amphitheatre they can be
seated on the outdoor bleachers or sit on the grass down by the
stage area. Due to the large size of the venue and the large
population of concert goers’ security will be placed in strategic
points all throughout the venue. Some security officers will be
stationary while other security officers will patrol the concert
area to deter any criminal or offensive behavior. Security within
the concert venue also includes placing video cameras
strategically throughout the venue to be alerted of any
disturbances or crimes as well as having security guards to
monitor the surveillance network. Security personnel with keep
in touch using walkie-talkies
Under the concert stage is the security personnel offices,
5. concert staff offices, and a private area for the artists and their
entourage. An essential aspect of the security plan is securing
this area in order to ensure there are no intrusions. The country
music star playing at the concert is one of the most important
people at the concert. Their security is essential. The first steps
that will be taken to secure the artist are placing two
bodyguards with the artist at all times. The bodyguards will
meet the artist at the entrance after they reach the parking lot
and will be responsible for securing the artists the entire time
they are present in the building. The artist’s band will be
escorted by security staff to a secured area where they can
prepare for the concert.
The artist will be escorted to their dressing rooms by their
personal bodyguards while other security guards placed at the
entrances of the venue will ensure that no unauthorized
personnel enter the underground area. Door at the entrances will
only be opened through a keyless entry system. Authorized
personnel will have cards that will give them access to areas
that are secured. Once the country artist is ready to travel to the
stage they will be escorted by their bodyguards and other
security personnel to ensure they reach the stage safely and
without incident.
Once the concert begins security staff will be stationed
around the edge of the stage to prevent concert goers from
hurling their bodies onto the stage and causing harm to the
artist or their band. The security staff will also patrol the
concert venue as well as stationary security will police
entrances and exits until the concert is over. Once the concert
ends the artists and band members will be escorted to the
downstairs offices and escorted to the dressing rooms. The artist
bodyguards will remain with the artist until they leave the
venue in the transportation they arrived in. The rest of the artist
entourage will also be escorted from the building and securely
placed in leaving transportation.
Once the concert stops the concert goers will begin exiting
the concert venue. The security staff will be responsible for
6. policing exits to ensure concert goers leave the building in an
orderly fashion and if any conflicts security staff will be present
to address these issues. Security staff in parking lots will police
exiting concert goers while law enforcement will be responsible
for monitoring the high rate of traffic that will be occurring as
tens of thousands of concert goers exit the venue.
Security staff within the venue will be responsible for
ensuring all concert goers have left the venue and it has been
properly secured. Security staff will need to check all of the
bleacher, bathrooms, and any other possible places that
unauthorized concert goers may still be present. Security
personnel will also need to secure the perimeter of the concert
venue by ensuring all persons have left the area and all vehicles
have been removed from the concert venue parking lots.
When working with VIPs at a concert event it is essential to
ensure security is heightened. Fans can be dangerous and will
go to any length to come into contact with the country music
artist. By security the area in which the artist is contained and
placing person security guards with the country artist will
ensure their security. Once the artist is on stage they are once
again vulnerable and will need comprehensive security in place.
If the artist cannot be properly secured the concert venue would
have difficulty booking further artist and will lose money.
Security for the concert venue and the VIP artist ensure
everyone’s safety.
References
7. Bickel, K. (2007). Planning and Managing Security for Major
Special Events: Best Practices for
Law Enforcement Administrators. Retrieved March 10, 2013
from
http://www.policechiefmagazine.org/magazine/index.cfm?fuseac
tion=display_arch&article
Shuster, R. (2003). Security Strategies for Special Events.
Retrieved March 10, 2013 from
http://specialevents.com/mag/meetings_security_strategies_spec
ial
Assignment 2
This assignment should be completed after Chapter 7. It
contributes 5% towards your final grade. Remember to show all
your work as partial marks may be awarded.
Problem 1 (50 marks)
Balance Sheets
December 31, 20X6
Peony
Ltd.
Aster
Ltd.
Assets:
9. 875,000
Common shares
1,500,000
375,000
Retained earnings
3,200,000
925,000
Total shareholders’ equity
4,700,000
1,300,000
Total liabilities and shareholders’ equity
$5,637,500
$2,175,000
Income Statements
Year Ended December 31, 20X6
Peony
Ltd.
Aster
Ltd.
Sales revenue
$2,500,000
$1,875,000
Royalty revenue
187,500
-
Dividend income
93,750
____-____
Total revenue
2,781,250
1,875,000
Cost of sales
10. 1,500,000
1,125,000
Other expenses
700,000
513,750
Total expenses
2,200,000
1,638,750
Net income
$ 581,250
$ 236,250
Statements of Retained Earnings
December 31, 20X6
Peony
Ltd.
Aster
Ltd.
Retained earnings, beginning of year
$2,993,750
$ 801,250
Net income
581,250
236,250
Dividends declared
(375,000)
(112,500)
Retained earnings, end of year
$3,200,000
$ 925,000
· At January 1, 20X1, Peony Ltd. acquired 80% of the common
shares of Aster Ltd. by issuing 500,000 Peony common shares
valued at $2 per share. This resulted in Peony having 1,500,000
11. issued and outstanding shares.
· Peony has provided the following information about Aster at
the acquisition date:
Aster’s shareholders’ equity consisted of the following:
Common shares $375,000
Retained earnings 693,750
Fair value of Aster’s net identifiable assets equalled their
carrying value, with the exception of the following items:
Excess of fair value
over carrying value:
Inventories $ 12,500
Equipment 93,750
Investments 12,500
The accumulated amortization on the equipment was $718,750.
The equipment is amortized on a straight-line basis. At the
acquisition date, the equipment is estimated to have a remaining
life of 10 years with no residual value.
· In 20X3, Aster sold its investments to parties outside the
consolidated entity for $56,250 over carrying value.
· From the acquisition date to December 31, 20X5, Aster paid
royalties of $625,000 to Peony. During 20X6, Aster paid
$112,500 in royalties to Peony.
12. · At the beginning of 20X4, Peony purchased some equipment
from Aster for $113,750. Aster had originally acquired the
equipment for $125,000 and was amortizing it at a rate of
$12,500 per year. When Aster sold the equipment to Peony, it
had a carrying value of $87,500. At that time, Peony estimated
that the equipment had a remaining life of 7 years and started
amortizing the equipment in 20X4, using the straight-line
method with no residual value.
· At December 31, 20X5, Aster’s inventory included $25,000 of
goods purchased from Peony. Peony’s gross margin on the sale
was 40%. The goods were sold to third parties in 20X6.
· At December 31, 20X5, Peony’s inventory included $125,000
of goods purchased from Aster. Aster’s gross margin on the
sale was 40%. The goods were sold to third parties in 20X6.
· During 20X6, Peony sold goods to Aster for $125,000.
Peony’s gross margin on the sale was 40%. At December 31,
20X6, $50,000 of the goods are still in Aster’s inventory.
· During 20X6, Aster sold goods to Peony for $875,000.
Aster’s gross margin on the sale was 40%. At December 31,
20X6, $87,500 of the goods are still in Peony’s inventory.
· Peony uses the entity method to report business combinations.
Required:
Prepare the consolidated financial statements for Peony at
December 31, 20X6 using the direct method. Show all your
work. Ignore income taxes.
Problem 2 (35 marks)
13. On January 1, 20X4, Chee Co. purchased 80% of the
outstanding shares of Tyme Ltd. for $2,000,000 in cash. On the
acquisition date, Tyme’s shareholders’ equity consisted of the
following:
Common shares $1,600,000
Retained earnings 800,000
At the time of acquisition, the carrying values of Tyme’s
identifiable net assets equalled their fair market values with the
following exceptions:
· The fair value of a building with an estimated remaining life
of 10 years was $480,000 less than its carrying value.
· A long-term liability that matures in 8 years has a fair value
that is $400,000 less than its carrying value.
The condensed income statements for Chee and Tyme are
presented below:
Income Statements
Year ended December 31, 20X8
Chee Co.
Tyme Ltd.
Sales
$1,600,000
$ 720,000
Investment income
800,000
80,000
Gain on sale of land
___-___
54,400
Total revenue
14. 2,400,000
854,400
Cost of goods sold
1,040,000
400,000
Other expenses
768,000
256,000
Total expenses
1,808,000
656,000
Net income
$ 592,000
$ 198,400
Additional information:
· At the beginning of 20X5, Chee acquired a piece of equipment
from Tyme for $168,000. Tyme had purchased the equipment 5
years ago for $320,000. When Tyme purchased the equipment,
it had expected that it would have a useful life of 20 years, with
no residual value. Chee concurred with this estimate (i.e., at
the time of purchase, Chee expected that the equipment would
have a remaining useful life of 15 years). Both Tyme and Chee
use the straight-line method of amortization.
· Sale of goods from Chee to Tyme:
Gross Unsold Goods in Tyme’s
YearSalesMarginInventory at Year-End
20X7 $400,000 30% $80,000
20X8 320,000 30% 72,000
· Sale of goods from Tyme to Chee:
Gross Unsold Goods in Chee’s
15. YearSalesMarginInventory at Year-End
20X7 $240,000 40% $56,000
20X8 200,000 40% 48,000
· All goods in inventory at year-end were sold to third parties in
the subsequent year.
· On August 31, 20X8, Chee purchased a tract of land from
Tyme for $106,400 in cash. Tyme had acquired the land 12
years previously for $52,000.
· During 20X8, Chee declared and paid dividends of $200,000
and Tyme declared and paid dividends of $32,000.
· There was no impairment of goodwill at the end of 20X8.
· Chee accounts for its investments using the cost method and
uses the entity theory method to report its business
combinations.
Required:
a) Prepare a consolidated income statement for Chee Co. for the
year ended December 31, 20X8. Be sure to show your
supporting calculations. (25 marks)
b) Prove that your calculation of net income attributable to the
shareholders of Chee Co. in (a) is correct by calculating Chee’s
net income using the equity method. (10 marks)
Ignore income taxes.
Problem 3 (15 marks)
At the beginning of 20X3, Jong Ltd. acquired 80% of the
outstanding shares of Nye Co. for $1,400,000. At the
acquisition date, Nye’s shareholders’ equity consisted of the
following:
16. Common shares $350,000
Retained earnings 875,000
At the time of acquisition, all of Nye’s net identifiable assets
had carrying values that equalled their fair values with the
exception of its patents. The fair value of the patents exceeded
their carrying values by $525,000 and had a remaining life of 8
years.
The trial balances for Jong and Nye for December 31, 20X6 are
as follows:
Jong Ltd. Nye Co.
DR
CR
DR
CR
Cash
700,000
350,000
Accounts receivable
1,400,000
249,200
Inventory
2,100,000
1,575,000
Plant and equipment
9,800,000
19. Operating expenses
673,400
210,000
Interest expense
26,600
Income tax expense
420,000
_________
245,000
________
18,620,000
18,620,000
5,600,000
5,600,000
Additional information:
· 20X6 net income for Jong is $770,000 and for Nye, $365,050.
· At the beginning of 20X6, Jong purchased a piece of
equipment from Nye for $350,000. At the time of purchase, the
equipment had a net book value of $280,000 to Nye and an
estimated useful life of 5 years.
· At the end of 20X5, Jong’s inventory included $350,000 of
goods purchased from Nye. Nye’s had recorded a gross profit
of $140,000 on this sale.
20. · During 20X6, Nye sold goods to Jong for $700,000. Nye
earned a gross profit of $280,000 on this sale.
· At the end of 20X6, Jong had sold all the goods in its opening
inventory to third parties but still had $210,000 of the goods
purchased from Nye during 20X6 in its ending inventory. All of
those goods will be sold to third parties in 20X7.
· Amortization expense for the plant, equipment, and patent are
included in operating expenses.
· At the beginning of 20X4, Jong issued bonds for $359,800.
These bonds have an interest rate of 8%, mature in 7 years, and
have a face value of $350,000. Interest will be paid annually at
the end of the year. Nye purchased half of these bonds at the
beginning of 20X6 for $169,750. Any intercompany gains or
losses on these bonds are to be allocated between the two
companies.
· Both companies have an average income tax rate of 40%.
Required:
Assume that Jong used the equity method of accounting for its
investment in Nye instead of the cost method. Calculate the
balance of its “Investment in Nye” account.
ACCT451v11 Assignment 2 April 30/2014