This document provides a training manual for security officers at a hotel. It contains 9 modules to train officers on various hotel systems and standard operating procedures. The modules cover topics like the security office layout, electronic lock systems, incident reporting procedures, and emergency response protocols. The document also includes 18 standard operating procedures for key control, medical emergencies, and other security-related tasks. The training manual was written in June 2015 and provides resources for officers to learn their roles and responsibilities.
These are basic skill set, duty responsibility and his ability to do the assigned work. The requirement of client is also mentioned to make process proper.
The document discusses the key roles and responsibilities of security guards and supervisors. It outlines that security guards are responsible for protecting premises and occupants from theft, crime, fires and emergencies through surveillance and responding to risks. They must maintain good conduct and be physically fit. Security supervisors oversee security guards and ensure safety procedures are followed. Both roles require skills like effective communication, emergency response, and crowd control.
This document outlines the training curriculum for security guards in Ontario, Canada. It provides the minimum requirements and suggested duration for 12 sections of instruction, including introductions to the security industry and relevant legislation, basic security procedures, report writing, health and safety, emergency response, the legal system, use of force theory, and first aid certification. For each section, the document specifies the learning objectives, outlines the content to be covered, and recommends instructional methodologies and evaluation methods. The detailed curriculum aims to properly equip security guards with the knowledge and skills required to perform their duties effectively and in accordance with applicable laws and regulations.
A security plan at GSK aims to reduce risks of terrorism through various measures:
1) All access doors must be properly secured and all visitors and vendors screened for weapons.
2) Luggage and carry-on items must be screened for weapons before entering restricted areas like pilot plants and labs.
3) Security patrols and training help monitor sensitive areas and respond to threats, preventing harm, loss, or damage from terrorism.
The document outlines the key roles and responsibilities of a security supervisor, including guarding operations, security documentation, site instructions, equipment maintenance, emergency response, personnel management, and required skills. Specifically, it details the supervisor's duties in areas like shift duties, patrols, training, documentation, emergency drills, staff welfare, security plans, and performance reporting. The supervisor is responsible for total security of the assigned site and overseeing the guard team.
This document provides an overview of a safety and security training course. It begins with information on fire alarms, exits, facilities and conduct during the course. The outlines cover private security industry, communication, health and safety, fire safety, and emergency procedures. The document then goes on to define security and the private security industry. It describes the three main types of security provision - manned security, physical security systems, and technical systems. The roles of various security operatives are outlined. The document emphasizes the importance of professionalism in the security industry and communication and customer care skills. It covers health and safety procedures, risks, hazards, and personal protective equipment. First aid duties and fire safety are also summarized.
In today’s business and residential setups, there is a growing demand for security guards to protect property and the people who occupy them. It’s therefore important that everyone understands what makes a good security guard.
Security officers have no legal right to search people or property without permission. It is important to obtain consent before searching, as searching without consent could result in criminal or civil proceedings against the officer. Searches should be conducted respectfully and according to the site's search policies and procedures.
These are basic skill set, duty responsibility and his ability to do the assigned work. The requirement of client is also mentioned to make process proper.
The document discusses the key roles and responsibilities of security guards and supervisors. It outlines that security guards are responsible for protecting premises and occupants from theft, crime, fires and emergencies through surveillance and responding to risks. They must maintain good conduct and be physically fit. Security supervisors oversee security guards and ensure safety procedures are followed. Both roles require skills like effective communication, emergency response, and crowd control.
This document outlines the training curriculum for security guards in Ontario, Canada. It provides the minimum requirements and suggested duration for 12 sections of instruction, including introductions to the security industry and relevant legislation, basic security procedures, report writing, health and safety, emergency response, the legal system, use of force theory, and first aid certification. For each section, the document specifies the learning objectives, outlines the content to be covered, and recommends instructional methodologies and evaluation methods. The detailed curriculum aims to properly equip security guards with the knowledge and skills required to perform their duties effectively and in accordance with applicable laws and regulations.
A security plan at GSK aims to reduce risks of terrorism through various measures:
1) All access doors must be properly secured and all visitors and vendors screened for weapons.
2) Luggage and carry-on items must be screened for weapons before entering restricted areas like pilot plants and labs.
3) Security patrols and training help monitor sensitive areas and respond to threats, preventing harm, loss, or damage from terrorism.
The document outlines the key roles and responsibilities of a security supervisor, including guarding operations, security documentation, site instructions, equipment maintenance, emergency response, personnel management, and required skills. Specifically, it details the supervisor's duties in areas like shift duties, patrols, training, documentation, emergency drills, staff welfare, security plans, and performance reporting. The supervisor is responsible for total security of the assigned site and overseeing the guard team.
This document provides an overview of a safety and security training course. It begins with information on fire alarms, exits, facilities and conduct during the course. The outlines cover private security industry, communication, health and safety, fire safety, and emergency procedures. The document then goes on to define security and the private security industry. It describes the three main types of security provision - manned security, physical security systems, and technical systems. The roles of various security operatives are outlined. The document emphasizes the importance of professionalism in the security industry and communication and customer care skills. It covers health and safety procedures, risks, hazards, and personal protective equipment. First aid duties and fire safety are also summarized.
In today’s business and residential setups, there is a growing demand for security guards to protect property and the people who occupy them. It’s therefore important that everyone understands what makes a good security guard.
Security officers have no legal right to search people or property without permission. It is important to obtain consent before searching, as searching without consent could result in criminal or civil proceedings against the officer. Searches should be conducted respectfully and according to the site's search policies and procedures.
The security supervisor plays the most important role in ensuring total security of the unit. They are responsible for guarding operations like checking guards and assigning duties. They must understand all security documents, site instructions, and assess operational effectiveness through briefings, checks and drills. The supervisor must also ensure the safe handling of any firearms, provide leadership and supervision to the security team, and prepare detailed shift reports. Key skills required are communication, team management and motivation, as well as imparting instructions and collecting intelligence.
This document provides guidance on basic security procedures for security guards. It discusses the duties of security guards which include protecting people, property and information through monitoring premises, detecting and responding to criminal activity, controlling access and assisting in emergencies. The document outlines how to effectively patrol premises on foot or by vehicle through being visible, taking time, looking for anything unusual, using observation skills and avoiding routines. It emphasizes the importance of safety by observing, deterring and reporting rather than physical intervention.
This document provides information on security training at a hotel. It discusses what security is, including protecting people, property, and information. It outlines the hotel's security plan, which involves access control, screening, restricted areas, patrols, drills, and emergency response plans. It describes security incidents like hijacking, food tampering, explosions, fires, and weapons. The purpose of security is to reduce risk and provide protection. The document also indexes various security topics like basic responsibilities, patrols, surveillance, equipment, and fire prevention.
The document discusses the role and responsibilities of a security officer. It describes their duties such as patrolling sites, controlling access, and responding to incidents. A security officer's specific duties are outlined in Assignment Instructions that provide site-specific procedures, patrol routes, and emergency protocols. Security officers must wear a uniform, have the proper equipment, and follow confidentiality requirements regarding sensitive site information.
soft skill presentation for securities to understand about the communication skills and also some interpersonal skills to develop in one another among security operatives as well the reception securities
The role of a static security guard is to safeguard, patrol as well as monitor any violence or theft inside the premises where his duty has been assigned. To know more about the role of these guards, view this slideshare presentation.
Hotels must exercise reasonable care for guest and employee safety, though they are not required to ensure absolute safety. If a hotel fails to exercise reasonable care and a guest is injured, the hotel may be held liable. Various threats exist to a hotel's assets, including internal threats like employee theft of cash, time, property, or services, and external threats such as robbery, guest theft, or fraudulent room sales. Hotels implement measures like bonding employees, security cameras, emergency plans, and staff training to improve safety and mitigate threats to assets.
The document provides an overview of guarding roles and responsibilities according to a holistic security model. It discusses various aspects of guarding including management procedures, training, physical security measures, risk management, and standard operating procedures. The goal is to implement proactive and reactive guarding through comprehensive training, procedures, and coordination across different security elements.
We have to Plan our Security in proper manner to ensure safety and security of our Assets. The Security rings of Deter, Detect, Assess, Delay , Respond and Deny will ensure proper Security Planning for your organisation.
Security guards are expected to respond effectively to emergency situations such as fires, bombs, or medical emergencies. They should be familiar with their employer's emergency response procedures and know their role. Security guards may be responsible for detecting emergencies, notifying authorities, evacuating premises, and securing scenes. It is important for security guards to receive training on potential emergencies and how to minimize damage through preparedness and an organized response.
This document provides tips for personal safety and security. It discusses what security and personal safety mean and emphasizes prevention over reaction or luck. It gives advice for walking on streets, in parking lots, driving, and what to do if attacked. The key tips are to remain calm, avoid confrontation, and prioritize survival in dangerous situations. Prevention through awareness of one's environment is stressed as the most important factor for ensuring personal security.
This document provides information on patrolling for security services. It discusses the objectives of patrolling, the different types of patrols (external, internal, route, general), how to organize and conduct patrols, preparation for patrols, what to observe and record during patrols, use of the senses, and expectations for patrol performance. Practical guidance is given for organizing patrols, conducting checks and duties, and preparing patrol reports. External patrols cover the facility perimeter and surroundings, while internal patrols ensure security inside buildings and machinery. General patrolling is done at the start and end of shifts and periodically to monitor security staff duties. Effective preparation, communication, observation, and documentation are emphasized for successful patrolling.
The main responsibilities of a Security Guard are to patrol hotel premises and monitor security cameras to protect guests, employees, and property from threats; report any suspicious or criminal activities to security management; and assist with inspecting guest rooms and dealing with unruly visitors or theft on hotel grounds.
Workplace safety and security in the hotel industry involves identifying and minimizing risks to employee health and safety. About 18,000 injury claims are filed annually in the hotel sector. Employers must provide a safe workplace while employees must follow safety procedures. Hazards include slips, trips, falls, manual handling, hot surfaces in kitchens, chemicals, and moving vehicles. The proper use of safety equipment, protective clothing, emergency procedures, and incident reporting helps control risks.
El documento describe los principios básicos de la protección integral. Estos incluyen contemplar todos los factores que rodean a la persona u objeto que se protege, así como la planificación cuidadosa. La protección integral implica medidas dinámicas, estáticas e informativas para brindar cobertura total y prevenir amenazas. Se basa en organizar y aplicar de manera práctica un sistema de seguridad que contemple todos los aspectos relevantes.
We have the quality and professional training that will make you a leader in the Security Industry, we offer support during and after you complete your training. Visit -https://www.security-training-center.com/course_guard_card.shtml
This document outlines security procedures for an office. It details 7 steps for security guards: 1) reporting for duty, 2) parking assistance, 3) monitoring employee entry/exit with ID checks, 4) visitor admittance with logging, 5) random checks for devices, 6) replacing guards during breaks, and 7) monitoring employee exits and locking up. The procedures focus on access control, visitor management, and general security duties like greeting employees and ensuring the phone is charged.
The security supervisor plays the most important role in ensuring total security of the unit. They are responsible for guarding operations like checking guards and assigning duties. They must understand all security documents, site instructions, and assess operational effectiveness through briefings, checks and drills. The supervisor must also ensure the safe handling of any firearms, provide leadership and supervision to the security team, and prepare detailed shift reports. Key skills required are communication, team management and motivation, as well as imparting instructions and collecting intelligence.
This document provides guidance on basic security procedures for security guards. It discusses the duties of security guards which include protecting people, property and information through monitoring premises, detecting and responding to criminal activity, controlling access and assisting in emergencies. The document outlines how to effectively patrol premises on foot or by vehicle through being visible, taking time, looking for anything unusual, using observation skills and avoiding routines. It emphasizes the importance of safety by observing, deterring and reporting rather than physical intervention.
This document provides information on security training at a hotel. It discusses what security is, including protecting people, property, and information. It outlines the hotel's security plan, which involves access control, screening, restricted areas, patrols, drills, and emergency response plans. It describes security incidents like hijacking, food tampering, explosions, fires, and weapons. The purpose of security is to reduce risk and provide protection. The document also indexes various security topics like basic responsibilities, patrols, surveillance, equipment, and fire prevention.
The document discusses the role and responsibilities of a security officer. It describes their duties such as patrolling sites, controlling access, and responding to incidents. A security officer's specific duties are outlined in Assignment Instructions that provide site-specific procedures, patrol routes, and emergency protocols. Security officers must wear a uniform, have the proper equipment, and follow confidentiality requirements regarding sensitive site information.
soft skill presentation for securities to understand about the communication skills and also some interpersonal skills to develop in one another among security operatives as well the reception securities
The role of a static security guard is to safeguard, patrol as well as monitor any violence or theft inside the premises where his duty has been assigned. To know more about the role of these guards, view this slideshare presentation.
Hotels must exercise reasonable care for guest and employee safety, though they are not required to ensure absolute safety. If a hotel fails to exercise reasonable care and a guest is injured, the hotel may be held liable. Various threats exist to a hotel's assets, including internal threats like employee theft of cash, time, property, or services, and external threats such as robbery, guest theft, or fraudulent room sales. Hotels implement measures like bonding employees, security cameras, emergency plans, and staff training to improve safety and mitigate threats to assets.
The document provides an overview of guarding roles and responsibilities according to a holistic security model. It discusses various aspects of guarding including management procedures, training, physical security measures, risk management, and standard operating procedures. The goal is to implement proactive and reactive guarding through comprehensive training, procedures, and coordination across different security elements.
We have to Plan our Security in proper manner to ensure safety and security of our Assets. The Security rings of Deter, Detect, Assess, Delay , Respond and Deny will ensure proper Security Planning for your organisation.
Security guards are expected to respond effectively to emergency situations such as fires, bombs, or medical emergencies. They should be familiar with their employer's emergency response procedures and know their role. Security guards may be responsible for detecting emergencies, notifying authorities, evacuating premises, and securing scenes. It is important for security guards to receive training on potential emergencies and how to minimize damage through preparedness and an organized response.
This document provides tips for personal safety and security. It discusses what security and personal safety mean and emphasizes prevention over reaction or luck. It gives advice for walking on streets, in parking lots, driving, and what to do if attacked. The key tips are to remain calm, avoid confrontation, and prioritize survival in dangerous situations. Prevention through awareness of one's environment is stressed as the most important factor for ensuring personal security.
This document provides information on patrolling for security services. It discusses the objectives of patrolling, the different types of patrols (external, internal, route, general), how to organize and conduct patrols, preparation for patrols, what to observe and record during patrols, use of the senses, and expectations for patrol performance. Practical guidance is given for organizing patrols, conducting checks and duties, and preparing patrol reports. External patrols cover the facility perimeter and surroundings, while internal patrols ensure security inside buildings and machinery. General patrolling is done at the start and end of shifts and periodically to monitor security staff duties. Effective preparation, communication, observation, and documentation are emphasized for successful patrolling.
The main responsibilities of a Security Guard are to patrol hotel premises and monitor security cameras to protect guests, employees, and property from threats; report any suspicious or criminal activities to security management; and assist with inspecting guest rooms and dealing with unruly visitors or theft on hotel grounds.
Workplace safety and security in the hotel industry involves identifying and minimizing risks to employee health and safety. About 18,000 injury claims are filed annually in the hotel sector. Employers must provide a safe workplace while employees must follow safety procedures. Hazards include slips, trips, falls, manual handling, hot surfaces in kitchens, chemicals, and moving vehicles. The proper use of safety equipment, protective clothing, emergency procedures, and incident reporting helps control risks.
El documento describe los principios básicos de la protección integral. Estos incluyen contemplar todos los factores que rodean a la persona u objeto que se protege, así como la planificación cuidadosa. La protección integral implica medidas dinámicas, estáticas e informativas para brindar cobertura total y prevenir amenazas. Se basa en organizar y aplicar de manera práctica un sistema de seguridad que contemple todos los aspectos relevantes.
We have the quality and professional training that will make you a leader in the Security Industry, we offer support during and after you complete your training. Visit -https://www.security-training-center.com/course_guard_card.shtml
This document outlines security procedures for an office. It details 7 steps for security guards: 1) reporting for duty, 2) parking assistance, 3) monitoring employee entry/exit with ID checks, 4) visitor admittance with logging, 5) random checks for devices, 6) replacing guards during breaks, and 7) monitoring employee exits and locking up. The procedures focus on access control, visitor management, and general security duties like greeting employees and ensuring the phone is charged.
This document describes a PowerPoint training program for security officers created by Ralph Brislin based on his Effective Security Officer Training Manual. The 577 slide program covers 21 topics related to security officer duties and responsibilities. It can be used in a classroom, individually, or without the manual. The document provides examples of slides covering patrol procedures, report writing, and professionalism. It concludes with information about the author Ralph Brislin and how to obtain copies of the training program and his books.
There are many different types of Florida Security License available to obtain to work under the Florida Statutes 493. The State of Florida requires these licenses to work in the private security industry.
In central Government there are lot of departments and different type of vacancies in different department, To Have Information about all departmental central government vacancies visit this website you can have information user friendly.
If an incident occurs, proper documentation is crucial to follow-up. This incident report form was developed by Allison B. Peters in 2012 for use for campus events. An online version was also developed for on the go access.
Emerging Need of a Chief Information Security Officer (CISO)Maurice Dawson
This submission examines the emerging need of the Chief Information Security Officer (CISO) to include the associated roles and responsibilities. One of the key artificacts associated with the CISO shall be detailed such as the security plan.
Chief Information Security Officer - A Critical Leadership RoleBrian Donovan
Ninety-four percent of CxOs in a recent IBM Survey believe it is probable their companies will experience a significant cyber security incident in the next two years. It is not a matter of ‘if’ it will happen, but when.
Businesses are therefore focused on developing effective strategies and governance frameworks to mitigate the risk and reduce the damage of the inevitable cyber security breaches they face.
However, to be effective those strategies and governance frameworks need to be supported and executed through great leadership by Chief Information Security Officers and their senior teams.
Our just released white paper highlights three key leadership challenges faced by Chief Information Security Officers.
G4S Security Officer Training and Benefits Proposal Jodii Weiner
This document provides a security proposal from G4S Secure Solutions (USA) Inc. It outlines G4S's security officer program including extensive pre-employment screening of candidates, pre-assignment training of over 40 hours, ongoing in-service and safety training, and use of technology like mobile check-in systems and security monitoring software. The proposal emphasizes G4S's focus on highly qualified officers through competitive screening and award-winning training programs to provide clients with a high quality security presence.
Security Training: Necessary Evil, Waste of Time, or Genius Move?Denim Group
Most application risk managers agree that training software developers to understand security concepts can be an important part of any software security program. Couple that with the Payment Card Industry, who mandate that developers should have training in secure coding techniques as laid out in their Data Security Standard. Yet others call developer training "compliance-ware," a necessary evil and a tax on software development in the enterprise.
This presentation shares the results of a yearlong survey of nearly 1,000 software developers that captures their knowledge of application security before and after formal training. The survey queries developers from various backgrounds and industries, to better understand their exposure to secure development concepts and to capture a baseline for post-training improvements. The session also includes the results of a "retest" of a subset of respondents, to identify how much security knowledge they retained after a specific length of time. The results were surprising, and include information every application risk manager should know, particularly those who rely on training as part of an application security strategy.
This document describes a criminal records management system called Knight Alfa Criminal Records. The system was developed to address the problems with manually maintaining criminal records and files. It allows authorized users to securely access and update criminal records and information from any internet-connected location. The system has modules for administrators, police officers, judges and other roles to interface with criminal, jail and other databases. It was created using ASP.NET, C# and Microsoft SQL Server to provide a secure, online solution for managing criminal records and investigations.
The document outlines key control procedures for housekeeping staff. It states that a key control register is used to record the distribution of keys and that all keys are stored in a locked cupboard. It describes the responsibilities of housekeeping associates in issuing, using, returning, and keeping track of keys. It also notes that loss prevention must be immediately notified if a key is lost or stolen so they can re-key floors.
Security Ninjas: An Open Source Application Security Training ProgramOpenDNS
NOTES
--
Slide 8
Some of the categories we will discuss are very broad like this one.
Untrusted command – get / post / rest style params
Clicks
Surprise inputs
Slide 13
Very broad too
Little or no auth
Auth with some bypass possibilities
Some problem with how session is generated, managed, expired
Insufficient sessionID protection
Slide 18
When a user is tricked into clicking on a malicious link, submitting a specially crafted form, or even just browsing to a malicious site, the injected code travels to the vulnerable web site, which reflects the attack back to the user’s browser.
Slide 27
Security hardening throughout Application Stack
Unnecessary features enabled or installed?
ports, services, pages, accounts, privileges
Security settings in your development frameworks (e.g., Struts, Spring, ASP.NET) and libraries not set to secure values?
Default accounts/ passwords still enabled and unchanged?
Error handling reveal stack traces or other overly informative error messages to users?
Software out of date?
OS, Web Server, DBMS, applications, code libraries
Slide 41
sign up for updates or do regular audits to see versions
there might be technical dependencies
easily exploited by attackers using metaspoilt, info gathering using headers & responses, etc.
Slide 47
We can look at the architecture, give you tips around what you could use, what would be good. This would avoid making any major changes when the product is ready which would save everyone’s time in the long run.
Have sprints with dedicated security features and use those as a selling point for our security conscious customers
Slide 48
Carefully look at the license to make sure you can use it in your type of product. Ask Fallon if you are not sure
Research how much support it gets, how popular it is
Look to find out any vulnerabilities in it before you start using it
Maintain it; Sign up for CVE updates
Ask us if you need to get something reviewed
Slide 50
Not only better and more features
Security vulnerabilities get patched in new versions
New versions get most attention by the companies and old ones stop getting support after some time fully
Most Security Support by the community
Turn on auto updates for Chrome; always look at updates on AppStore
Slide 51
Use different passwords for different sites
Password managers let you set complexity, generate random passwords, etc.
Slide 52
Only grant access to whats needed to get the job done
employee leaves; mistakes; vulnerabilities in other s/w which leverages this;
Don’t install redundant software, plugins, etc.
This opens up so much risk
People forget to uninstall them; s/w doesn't get much attention from community; open ports are left; boom exploited by attackers;
Slide 55
To prevent unintended execution actions
e.g., fail open auth errors
Leak minimal info about infrastructure as this info is leveraged by attackers to carry out further attacks
This document outlines procedures and policies for administering standardized tests securely and ethically. It discusses the importance of maintaining test security, monitoring students actively during testing, and properly storing and accounting for all testing materials. It also describes procedures for reporting any irregularities or violations of test security that may occur and potential consequences for committing such violations.
The security officer role in virtual environments - (ISC)2 LATAM CONGRESS 2016Mateo Martinez
The security officer role in virtual environments was a talk given by Mateo Martínez, CEO of KOD LATAM SECURITY during the (ISC)2 SECURITY CONGRESS LATIN AMERICA 2016
This document provides information about what a report is and how to write an effective report. It defines a report as a formal document written to convey information to others. The objectives of reports are to record information, assist in decision making, and meet legal or other requirements. An effective report is precise, factual, relevant, reader-centric, objective, simple, brief, well-organized, comprehensible, and uses proper grammar. Reports can be oral or written, informal or formal. They include informational reports, analytical reports, routine reports, and special reports. A formal report follows a standard structure including an opening section, body, and closing section.
This standard operating procedure describes the key control policies and procedures for Fine Hospitality Group hotels. Master keys are issued to executive housekeeping staff and maintenance personnel by the manager on duty. Section master keys are issued daily to each room attendant and must be returned and stored in a locked cabinet at the end of each day. An audit is conducted each evening to ensure all keys are returned. Any lost or missing keys must be reported immediately and affected locks rekeyed. Emergency keys for each room are kept in a secure location accessible only to the general manager and chief engineer and are discarded after use.
Skyscraper Security Mgt.- Administration Mgt. Section 1 Part VRichard Garrity
This document provides guidance on proper documentation procedures for high-rise security management. It discusses the importance of accurately documenting daily activities, incidents, and accidents. Various report forms are recommended, such as daily reports, serious incident reports, and workplace accident reports. Guidelines are given for completing these reports thoroughly yet objectively. Managers are advised to review reports for quality and provide training to staff on documentation standards. Monthly compilation of incident reports for property managers is also recommended.
From MITRE ATT&CKcon Power Hour November 2020
By Matt Snyder, Senior Threat Analytics Engineer, VMware
The market for Security products is flooded with vendors offering all sorts of solutions, and organizations are spending a record amount of money defending their environments. Nevertheless, an increasing number of breaches are reported each year, resulting in organizations spending millions of dollars to remediate them. The Security industry responds with more products, all offering to stop the next breach, and the cycle continues. In this presentation from the MITRE ATT&CKcon Power Hour session on November 12, 2020, Matt discusses what VMware is doing internally to address this fundamental flaw in the Security industry and how they are leveraging the MITRE ATT&CK framework to reshape how we think about security.
The document discusses penetration testing methodologies used by EC-Council. It describes several certification programs offered through EC-Council Press that provide training for security analysts, network security administrators, disaster recovery professionals and other IT security roles. The document also outlines EC-Council's mission to address the need for well-educated information security practitioners and describes the organization's global network of subject matter experts who help set cybersecurity standards.
Security At The Speed of Innovation - Marudhamaran GunasekaranPiyush Rahate
What is security?
Why security is so important for web applications?
What are the benefits of having focus on security aspects of web applications?
What is information security?
How to keep security at pace with innovation?
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET Journal
The document describes a proposed device called "Touch Me Not" that aims to improve women's safety. It would be a small button that can be easily attached to clothing. The button is connected to a system with two modules: 1) A module to record a short video to capture an assailant if unwanted contact occurs. 2) A module to send the user's location to emergency contacts and alert the nearest police station if danger is sensed, to enable quick assistance. The device uses microcontrollers, GSM and GPS modules for hardware and Python for software. It aims to provide a portable safety solution that is more convenient than existing mobile apps or bulkier devices.
The on-call survival guide - how to be confident on-call Raygun
Is being a developer on-call making you burned out? Are there a lack of systems in place to support you when there's a major outage? This slide deck will go though how to create an on-call system that works.
This document provides a playbook for information security (infosec) professionals to build a business case and get budget approval from executive leadership (C-suite) for security initiatives. It outlines a 7-step process: 1) conduct a business impact analysis, 2) perform a security audit, 3) run security scans, 4) develop a remediation plan, 5) present findings and recommendations to the C-suite, 6) continue reporting and be prepared for future opportunities, and 7) implement approved security products and services. The goal is to understand business risks, identify technical vulnerabilities, prioritize remediations, and educate leadership on security needs using business terms and metrics. Ongoing communication, transparency and demonstrating progress are
This document provides an overview of NetWatcher's managed detection and response security services. It describes NetWatcher's cloud-based security stack that provides enterprise-level security capabilities typically reserved for large organizations to SMBs through an affordable software-as-a-service model. The summary highlights NetWatcher's security tools and features like sensors, endpoint agents, threat intelligence, compliance reporting, vulnerability scanning, and a customer portal for viewing alerts and scores.
RAT Trap: Home Surveillance System Using IoT & AIIRJET Journal
This document proposes a home surveillance system called RAT Trap that uses IoT and AI technologies. The system includes a Raspberry Pi, camera module, linear actuator, and custom locking mechanism. It uses facial recognition to identify intruders and lock the door. When an intruder is detected, the locking mechanism engages, a 10-second video is uploaded to the cloud, and alerts are sent to the owner and security guard. The owner can monitor the system and recordings remotely using a mobile app. The system aims to provide affordable home security and automation using technologies like facial recognition, cloud storage, and mobile control.
With traditional home security devices, the system can be programmed to trigger a predetermined response based on certain events. For example, if the system is armed, the countdown begins when the door is opened. If you fail to enter the code on the keypad in time, it alerts the police or an offsite security professional to a potential intruder.
The document discusses five common mistakes organizations make when responding to security incidents: 1) Not having an incident response plan, 2) Failing to increase monitoring and surveillance after an incident, 3) Being unprepared for potential legal battles, 4) Simply restoring systems to their original state without identifying and addressing the root cause, and 5) Not learning from past incidents to improve the response process. It emphasizes the importance of proper planning, thorough investigation, documentation, and applying lessons learned to prevent future incidents.
This document provides instructions for operating an F18 fingerprint time attendance device. It describes abbreviated operating procedures which include enrolling users via fingerprints, passwords, or cards, verifying user identities, configuring communication settings, modifying user information, verifying the correct date and time, and downloading attendance records. The document also covers topics like fingerprint recognition technology, verification modes, connecting to a PC, the device main menu, user and card management, access control options, communication settings, system options, date and time settings, pen drive management, auto tests, querying records, and system information.
Traditional security systems have problems with false alarms that can reduce response urgency from police. AI-powered home security uses internet-connected devices like cameras, locks and sensors to learn a home's normal patterns of activity. It can then more effectively detect anomalies and intruders. Smart locks allow access by smartphone instead of physical keys. AI is improving security cameras by enabling facial recognition and object detection to better distinguish intruders from homeowners. Overall, AI reduces the need for human security professionals by allowing systems to self-monitor and respond to emergencies.
The document discusses cyber incident response services and the need for organizations to engage such services. It notes that many organizations only contact incident response providers too late, after an incident has already occurred. Real incident response involves actively coordinating all communication and activities to contain an incident before damage is done. The provider, CRI, offers a retainer that gives organizations 24/7 access to their experts and services to bolster an organization's response to any future incidents.
Managed security service providers (MSSPs) provide around-the-clock security monitoring and management that companies cannot achieve in-house. MSSPs collect logs and events from a client's devices, encrypt the data, and transport it to a cyber defense center for automated and human analysis. Any threats detected are immediately reported to the client. This outsourcing model saves companies time and resources while providing certified security expertise to protect systems and detect breaches.
Real-time fallacy: how real-time your security really is?Anton Chuvakin
While the claims that "modern business works in real-time and so the security should too" are often heard from various vendors, it appears that few organizations are able to achieve that at the moment. This paper will look at the real-time requirements of the whole organization's security posture.
David King from CruaTech presented their Minder RTP product, a cloud-based resource tracking platform that allows companies to track mobile employees globally and facilitate two-way communication for personal safety. Key features include location tracking via an Android app, two-way communication, and a rules engine to manage critical responses. The platform is aimed at companies whose employees work in the field away from an office and provides safety benefits for industries like medical, finance, and IT. It utilizes sensors on smartphones to activate safety features like panic buttons.
Smart manufacturing is a process, not a project. Start with one machine, one cell, one line. Review what data you can collect, analyze and present, and the outcomes of possessing the resulting knowledge. If the impact is negligible, move on to something else. The data and its source are not going to disappear. Note it and come back when it is important. Read more : https://literature.rockwellautomation.com/idc/groups/literature/documents/br/smart-br001_-en-p.pdf .
Softcon Systems offers the best industrial automation solutions and is a Gold System Integrator of Rockwell Automation. Visit us : https://softcon.net.in/
White Paper: The Cyber Resilience Blueprint: A New Perspective on SecuritySymantec
Who should read this paper
For business leaders. In this sophisticated threat environment,traditional security tactics are failing. Symantec™ encourages organisations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists,but through evaluations based on the current threat environment and the acceptable risk level for the organisation. This whitepaper presents best practice-based approaches recommended for minimising cyber risk. These are arranged across five pillars and provide specific actions for each pillar to be performed by identifiable IT jobs.
4. 4
Module 1—Know Your Hotel
Goal
Upon completion of this module, you will be able to:
Assist guest with accurate directions and information about the outlets and guest services.
Resources
Directorof Security—JesGines435–714–3794
SecuritySupervisor—ScottWarner385–208–0882
What’sin it for me?
When a guest is in need of something or has a question, they will usually ask one of the
associates for assistance. For example:
If a guest is hungry, they will ask YOU what restaurants are in the hotel and how to get to
them.
If a guestsneedstopurchase somethingfromthe giftshop,theywill askYOUwhere itis and
its hours of operation.
If a guest is here for a meeting, they will ask YOU where the meeting room is located.
The guests will rely on your knowledge of the hotel. In order to provide the best service
possible,itisnecessarythatyouknow the featuresof yourpropertyandthe hoursof operations
of the outlets.
Shops & Local Businesses
Name Location Type of Merchandise Hours
Jan’s
Prudential
CandyShop
SnowPark
6. 6
Services
Type of Service Location Cost Hours
Parking
Transportation/Shuttle
GuestLaundry
ATM
BusinessCenter
PublicRestrooms
SalesOffice
Elevators
Executive Offices
Engineering
HR
7. 7
Module 2—Security Office
Goal
Upon completionof thismodule,youwillbe able to:
Be familiarwiththe SecurityOffice
Understandyourroll as Officer
Complete the dailyoperationsthatyourjobentails
Resources
Directorof Security—JesGines435–714–3794
SecuritySupervisor—ScottWarner385–208–0882
What’sin it for me?
Have you ever started a new job and felt lost? The people you will be working with all know
exactlywhere everything is and how to find the information they need. This module will help
you feel familiar with the Security Office layout and how to find what you will need.
Security Department Overview
Tool Location Function
Schedule
Radios
RadioLog
KeyCabinets
KeyControl Log
Residence LockerLog
Be Safe Bingo
9. 9
Module 3—Ving Key System
Goal
Upon completionof thismodule,youwillbe able to:
Log intothe VingKeySystem
Understandthe security featuresof the Vingsystem
Use the Vinghandheldunit
Diagnose lockissues
Lookupregistrationnumbersandotherkeyactivity
Poweropena door.
Resources
Directorof Security—JesGines435–714–3794
SecuritySupervisor—ScottWarner385–208–0882
What’sin it for me?
Understandingthe Vingsystemwill assistyouinproperlydiagnosingissues with locks and keys,
thereby presenting a higher level of service to the guest when they have trouble.
Ving Key System
Action Notes on the steps
Log In
Staff Card
OperatorCard
ReadEventsFrom Card
VerifySmartCard
ObtainRead-outInfo
Ving Hand Held Computer
11. 11
Module 4—SafeMark
Goal
Upon completionof thismodule,youwillbe able to:
Log intothe SafeMark handheldunit
Diagnose andrepairguestroomsafe issues
Resources
Directorof Security—JesGines435–714–3794
SecuritySupervisor—ScottWarner385–208–0882
What’sin it for me?
Usingthe knowledgeyougainfromthismodule,youwillbe able toassistguestsinopeningtheir
in-roomsafe.
SafeMark Hand Held Unit
Locate the Unit
Learn the Codes
Unlock a Safe
Change Batteries in Safe
12. 12
Module 5—Incident Reporting
Goal
Upon completionof thismodule,youwillbe able to:
Gather informationduringandafteran incident
Prepare an incidentreport
Understandthe communicationprocessafter anincident.
Resources
Directorof Security—JesGines435–714–3794
SecuritySupervisor—ScottWarner385–208–0882
What’sin it for me?
Afteran incident,itisimperative torecordanddocumentwhathappenedtoprotect the hotel’s
guests, associates, ownership, and yourself from any liability that may be caused by a future
falsification.Also,propercommunicationenablesthe managementof the hotel to follow up on
the incident and take appropriate steps to prevent its reoccurrence.
The foundation of incident reporting is finding the answers to these questions:
Who? What? When? Where? How? Why?
In an incident report, it’s important to keep in mind that we include FACTS only. Also, the
incidentreportiswrittenfromthe first person, meaning your perspective, and should begin at
the point you became aware of the situation.
Incident Reports
AutoIncidents
AutoIncidents(NoInjury)
Damage Incident Reports
General Incident
Medical Incident
Missing Items
14. 14
Module 6—StarGuest Response
Goal
Upon completionof thismodule,youwillbe able to:
Successfullylogall callsintoStarGuestResponse.
Track calls made byexternal andinternal guests.
Explainthe difference betweenadefect,request,incident,andworkorder.
Resources
Directorof Security—JesGines435–714–3794
SecuritySupervisor—ScottWarner385–208–0882
What’sin it for me?
StarGuest Response+ (SGR+) is a powerful tool that helps us to perform successful problem
resolutionandhelpsustoresolve guestproblemsmore effectively. In addition, SGR+ allows us
to track guestrequestsanddefectsallowingustointerpretanypatterns seen to better prepare
for future guests. Please note SGR+ is a live system. Any items input into SGR+ will appear on
any reports generated.
**All guest requests/defects/events should be logged into SGR+**
StarGuest Response
Create Work Order
Create Request
Conclude Request
15. 15
Module 7—Camera System
Goal
Upon completionof thismodule,youwillbe able to:
Accessany of the 25 camerasviathe Avigilonsystem.
Control whichcamerasappearon the big screenmonitor.
Access,search,and displayrecordedimages.
Resources
Directorof Security—JesGines435–714–3794
SecuritySupervisor—ScottWarner385–208–0882
What’sin it for me?
As dispatcher,youactas the eyesandearsof the hotel. Withthistraining,youwill learnhowto
monitorcurrentactivity withinthe publicareasof the hotel, track a situation using the pan-tilt-
zoom cameras, and go back and access stored images.
Avigilon Camera System
Change CameraLayout
ReviewCameraFootage
Save Screenshot
Save Bookmark
Locate Bookmark
16. 16
Module 8—Lost and Found
Goal
Upon completionof thismodule,youwillbe able to:
Accessthe lostand foundlog
Log, label,andstore a lostitem
Addan entryto the log whena guestreportsa lostitem
Properlyprepare anddocumentanitembeing returnedtoitsowner
Make shippingarrangementsforlostitemstobe returned
Resources
Directorof Security—JesGines435–714–3794
SecuritySupervisor—ScottWarner385–208–0882
What’sin it for me?
Have you ever lost an item? Depending on its importance, you may recall frantically searching
for it,rackingyour brainto try and determinewhere youleftit.Didanyone assistyouinlocating
your item?Howdifferentlywouldyouhave feltif someoneshowedyoutheygenuinelycaredfor
your situation and did everything they could to recover your item?
Lost and Found
Findthe Log
Format onLog ITEM NAME: (color) Description, Name Brand
Lost and FoundInquiry
Log
17. 17
Module 9—CODE System
Goal
Upon completionof this module,youwillbe able to:
Understandandutilize the CODEsystemtocommunicate andrespondtoan emergency
Understandthe difference betweenanemergencyandacrisis.
Utilize the color-code systemtoaccuratelycommunicate and appropriatelyrespondtoan
emergency.
Resources
Directorof Security—JesGines435–714–3794
SecuritySupervisor—ScottWarner385–208–0882
What’sin it for me?
The CODE system allows us to communicate an emergency situation over the radio without
disclosingthe nature of the emergency to individuals that might overhear. The CODE system is
divided into six colors, each designed to cover a specific category of emergency.
A CODE is any emergency situation. During this time, the ERT team, or MOD, Security Officer,
and House Engineer respond to the emergency and do not take other calls.
Starwood’s emergency and crisis plan divides these types of situations into two categories,
Emergency and Crisis. Each category has a different overall response approach and
communication plan. It is important to understand the difference so we can appropriately
escalate an emergency to “crisis” and activate the crisis action plan.
Code System
Code Yellow Smoke Alarm
Code Red Fire Alarm
Code Blue Medical Emergency
Code Blue Stat Severe Medical Emergency
Code Black BombTreat
Code Green Robbery
Code Orange Other
E.D.N.A. Emergency DevelopingNeedAssistance
19. 19
Electronic Lock System—SOP
PURPOSE:
To ensure integrityof the electroniclocksystem, the followingkeycontrol proceduresshouldbe
implemented.
PROCEDURE:
“E” KEYS:
Only two“E” keysshouldexist.
Each “E” key shouldbe individuallycodedandlabeled.
One “E” keyshouldbe lockedinthe GM’s or controller’ssafe.
The other “E” keyshouldbe sealedinanenvelope. The MOD andone other manager
shouldsignanddate the envelope acrossthe seal.
The envelope shouldbe securedinabreakable glass-frontbox locatedinsecurity.
“E” keysshouldbe usedforemergencypurposesonly.
Use of the “E” keyshouldbe recordedina log.
FLOOR MASTERS:
Housekeepingshoulduse keys.
Each keyshouldaccessno more than twofloorsonly.
Each floormay have more than one key.
Each keyshouldbe individuallycoded.
Keysshouldbe loggedoutandineach day ona keylog.
Keysshouldbe programmedtoworkduringassignedshiftsonly.
KEYING LEVELS/ACCESS:
Accessfor makingmasterlevel keysshouldbe limitedtothe SecurityDirectoror
General Manager’sdesignee.
Accessshouldbe eliminatedimmediatelyuponterminationof employment.
All issuingof keysshouldbe documentedinakeylog. The keylogshouldrecordthe date, time,key
numberandpersonreceivingthe keyandthe time,personreturningthe key, andwitness. The keylogs
shouldbe retainedforaperiodof two years.
If you have any questionsinregards to these proceduresplease contact:
Clarence Izzard
SeniorManager,Regional LossPrevention
StarwoodHotels& resortsWorldwide Inc.
210 Peachtree StreetNorthwest
Atlanta,GA 30303–1745
404–588–5362 Office
404–588–3163 Fax
404–449–2384 Cell
Email: clarence.izzard@starwoodhotels.com
21. 21
St. Regis Room Access—SOP
Objective:
Maintainthe integrity,safety,andrespectof ourguestsduringthe securityoperationsatthe St.Regis
DeerValley.
In orderto ensure ourguest’ssecurityandourcompliance withLRA andAAA requirements,aprocedure
has beendevelopedastohow associatesshouldknockorringon guestroomdoors. These standards
applyto anysituation,where securityisattemptingtoaccessa guestroom.
Guestroom access procedures:
Occupiedguestroom:
Use the Lightspeedsystemtodetermineif guestsare insideof the room.
Knock and/or ringthe doorbell three timesto advise the guestsof yourpresence.
Have the frontdeskcall the room.
Announce yourdepartmentandname:“St.Regis Security”.
Unoccupiedguestrooms:
Use the Lightspeedsystemtodetermineif guestsare insideof the room.
Knock and/or ringthe doorbell three timestoadvise the guestsof yourpresence.
Announce yourdepartmentandname:“St.Regis Security”.
Upon no answerfromthe guests,knock and/orringthe doorbell twomore times.
Announce thatyou“are goingto enterthe room”.
Whenenteringthe room:
—Openthe doorslowly
—Announce againthatyouare enteringthe room
—Extendthe privacylatch,sothat the door doesnotlatch shut
Once in the room make sure no guestsare present.
Upon leaving,make sure the doorlatchesandstayslocked.
22. 22
Key Control—SOP
Objective:
Maintaina safe and secure environmentforourinternal andexternal guests.
Hourly Staff:
KeyIssue:
Upon beginningemploymentwiththe St.RegisDeerValley,eachassociate will be
givena keysignoutcode for the keywatchersystem.
o Thiscode will be assignedtoasetof keysinthe keywatchersystem.
o Thiscode isto be usedonlybythe associate towhomit wasissued.
Keysare to be pickedupat the beginningof eachshift.
o If an associate isonproperty,duringoff time,theycannotcarrykeys.
KeyReturn:
All checkedoutkeys mustbe returnedtothe keywatcherat the endof everyshift
Failure toreturnkeyswill resultin disciplinaryactionbasedoneachindividual
instance.
At nopointcan keysleave the property.
o Keysthat leave the propertywill be dealtwithasseenfitbymanagement.
Keyscannotbe handedtoanotherassociate foruse duringshift.
Upon termination of employment, verificationof keyreturnmustoccur.
KeyUse:
Keysmustbe usedfor hotel business.
Use of keysduringan off shiftisstrictlyprohibited.
Management:
Managementshall be issuedkeysfortheiruse. These keysare tobe keptsafe and secure at all times.
Failure tokeepkeyssecure willresultindisciplinaryaction. Uponterminationof employment fromthe
St. RegisDeerValley,all issuedkeysshall be returnedtosecurity. Failuretoreturnkeyswill resultin
legal action.
Security:
Securityisto conducta nightlykeyauditandfollow upinrelationtokeysthatare not returned. Keys
that are notreturnedwill be dealtwithonanindividualbasisbymanagement.
23. 23
Medical Emergencies—SOP
Objective:
Maintainthe integrityof ourguestsand the securityoperationatthe St.RegisDeerValley.
Wheneveranemergencycall isdispatchedtosecuritythere are specificstepstobe followedinorderto
maintainconsistencyandlimithotel liabilityduringemergencysituations.
First Aid:
The firstaid categoryisfor callswhere a guestrequestsa bandage or othermedical assistance,i.e.cut
that needsdisinfecting.
The hotel does notprovide anyOTC medications,unlesstheyare soldtothe guest.
o Medicationsthatare givendonottransferhotel liability.
Thistype of call shouldbe routedthroughPBXas a securityguestassistance call.
Medical Emergencies:
Generallywhenaguestmakesthistype of call theywill be panickingandspeakingfast. Itisimportant
that some informationbe gatheredandrelayedtosecuritysothatthe appropriate medical assistance
can be provided. All callsof thisnature mustbe routedthroughPBX.
Remaincalm
Some questionstoask(more can be askedif needed):
1. The locationof the emergency(are theyinasafe location)
2. The nature of the emergency(type of injury)
3. The name of the individual androomnumberif theyare a registeredguest
Call thisinformationoverthe radiotoSecurityonchannel 1.
1. Security can make the determination,uponreportingtoincident,if anambulance is
needed.
If an ambulance iscomingtothe propertythe followingindividualsmustbe alertedbyPBX,in
the followingorder:
4. Directorof Security—JesGines435–714–3794
5. Hotel Manager—Raj Radke 435–731–6384
6. General Manager—EdwardShapard435–602–0900
24. 24
PARCEL PASS—SOP
Associatesmayremove itemssuchasthose listedbelow fromthe resortwitharesort-issuedparcel
pass. Parcel passesmustbe filledoutandsignedbythe departmentheadorEC memberasindicated.
Perishableitems—limitedtoflowers,plants,orfruit. If afruitbasketwassentthrough
HousekeepingorIn-RoomDining,the basketitselfmustbe returnedtoHousekeepingorIn-Room
Dining.
Writtenmaterial—notincludingbooks,papers,orresortfurnishedbooksormagazines.
Hangers—notincludinghangersfurnishedbythe resortforguestorpatronuse.
Itemsleftfromconventionorcateringfunctions. If aconventionorcateringguestorindividual
givesyouagift,youshouldtrytoobtainawrittennoteorsignedbusinesscardfromthatperson
statingthatthe itemsisagift.If nonoteorcardisgivenyoumusthaveExecutiveCommittee
approval.
Conventionandcateringplannerswhowishtogiveawayleftovermerchandise to associatesmust
provideanote tothateffecttothe appropriate departmenthead. Theauthorizingnote andlist
mustbe signedbythedepartmentheadanddeliveredto securitypriortothe removalof anyitems
fromthe resort. Individual parcelpasseswillneedtobe writtenforeach associatereceivingitems.
All foodandbeveragesmustbe inasealedconditionforremoval fromthe resort.
No alcohol may be receivedas a giftand/or removedfrom the resort premiseswithoutwritten
permissionfromthe General Manager or EC Member.
No unsafe productsandnomedical productsmaybe removedfromthe resort.
Itisan associate’sresponsibilitytodeclareallitemsthatare removedfromthe resort,andonlyitemsthat
have beendeclaredmaybe removed. The declarationshouldbe done onthesamedaythatanitemis
removed.
All associatepurses,totebags,backpacks,parcels,andlike carriersorcontainersare subject,onarandom
basis,toinspectionbyanymemberof securityormanagementbeforean associateleavesthe resort.
Associatesshouldtherefore have noexpectationof privacywithrespecttosuchcarriersorcontainers.
Violationof thePackage PassPolicymayresultindisciplinaryaction,uptoandincludingtermination. An
associatewhorefusestoallowthe searchof anycarrierorcontainerbeingremovedfromthe resortis
subjecttotermination,evenforafirstoffense.
25. 25
I am inreceiptof the parcel passpolicy.Ihave read itand understandit.
Violationof thePackage PassPolicymayresultindisciplinaryaction,uptoandincludingtermination. An
associatewhorefusestoallowthe searchof anycarrierorcontainerbeingremovedfromthe resortis
subjecttotermination,evenforafirstoffense
Room#: _____ Items:_______________________________________________________________
________________________________ _________________________________________________
Associate PrintedName Signature Date
________________________________ _________________________________________________
DepartmentHead/ECMemberPrintedName Signature Date
________________________________ _________________________________________________
SecurityOfficerPrintedName Signature Date
26. 26
Parking Privileges—SOP
Objective:
Organize andmaintaina consistentparkingpolicyforall St.RegisDeerValley staff members.
Wheneveraparkingcall isdispatchedtosecuritythe followinginformationshouldbe giveninorderto
maintainconsistency.
Directors:
Will receive anaccesscard to drive throughthe DeerCrestGated Communityandparkat the
upperresortgarage.
Must collecta parkingdecal fromsecurity thatneedstobe displayedinthe car,visiblefrom
outside.
Duringheavybusinessvolumesorspecial events mayrequesttomove bysecurityorvalet.
Managers
May parkat the lowerresortmanagers’lotlocatedabove the lowerresortporte cochere.
Must collecta parkingdecal fromsecurity thatneedstobe displayedinthe car,visiblefrom
outside.
Staff membersdriving
If they choose to drive,they mustuse the Mayflowerparkinglocatedoff of Interstate 40,exit8.
Shuttle timesare asfollows:
Startingat 4:30 AM leavesupperresortdockforMayflowerparkinglotevery20 minutes
Startingat 4:40 AM leavesMayflowerparkinglotfor upperresortdockevery20 minutes
Shuttle drivesfrom4:30am–12:00am excludingfuel timesandmeal breaks
o 12 PM–1 PM for fuel andmeal break
o 6:30 PM–7 PM formeal break.
For ridesbefore orafterlistedtimesplease requestsecurity.
SecurityDepartment —ext.5790 or Radio channel #1
JesGines —Directorof Security – ext.5791
RajeshRadke —Hotel Managerext.5733
Edward Shapard—General Managerext.5730
27. 27
Radio Control—SOP
Objective:
To provide andmaintainaqualitycommunicationdevice.
Check Out:
Upon reportingtoproperty,associatesneedingradiosshouldreporttosecuritytobe issueda
radio.
Each radio will be issuedto the individualsigningthe radioout,accordingtoeach radio’s
individualnumber. A hotel issuedIDordriver’slicensemustbe providedandheldinsecurity
until the radioisreturned.
o Radiosare to onlybe usedbythe individual whocheckedthemout
Use of a radio by anotherindividual couldresultinthe staff memberissued
the radio beingresponsible fordamagestothe radio.
The radio that ischeckedoutmust be the same radio whencheckedbackin.
Return:
Radiosmustbe returnedto securityatthe endof everyshift.
o Leavinga radiounattended,outside the securityoffice,doesnotconstitutea
radioreturn. Radiosmust be returnedtoan actual memberof securityorinthe
radioreturnbox.
Use:
Radiosare to be usedforhotel businessonly. Use of radiosfor otherreasonscouldresultin
disciplinaryaction,basedoneachindividual incident.
Channels:
Each individual isresponsibleforsettingtheirradiotothe appropriate channel whenreceiving.
o Channel 1—Security/ Engineering
o Channel 2—FrontOffice/GuestServices/Butler
o Channel 3—Housekeeping
o Channel 4—Valet
o Channel 5—FoodandBeverage
o Channel 6—Private Channel
Damage:
Excessive damage will be managedonanindividual basis toinclude disciplinaryactionandpayingthe
cost for the radio.Each eventwill be addressedonanindividualincidentbasis.
RADIO ETIQUETTE:
The two-wayradiosuppliedbythe hotel isaprofessional communicationtool.Employeesshouldalways
be aware guestsandotheremployeesare aroundandwill be able tohear whatissaid overthe radio.
Whenyouwishto call someone onthe radio,state theirname or departmentthenstate yourname.
Example:If PBXistryingto contact securitythe PBXoperatorwouldsay,“SecurityfromPBX”.
Properradioetiquette includes:
Holdingthe radioor microphone severalinchesawayfromyourmouth,thenholdthe keypad
downfor a couple of secondsbefore speaking
Speakingclearlyandconcisely
28. 28
Keepingcommunicationbrief;conversationsordiscussionsshouldbe overthe telephone
Neversayingthe name of a guest and theirroomnumberoverthe radio as a safetyprecaution
and to protectour guest’s identity
Alwaysbeingprofessional
If you have any questionsaboutanyof thisplease feel free toask forclarification.
I understandthe above andwill be heldaccountable fordamages.
Signature Date
PrintedName
29. 29
Vehicle Safety—SOP
GOAL:
Reduce the risk of injury or property damage as a result of operating motor vehicles.
PROCEDURE:
Allowonlylicensed,competentassociates(qualifiedbyage andexperience relativetothe
vehiclesoperated) tooperate Starwoodvehicles(includinggolf carts);orwith theirpermission,
a guest’sor a memberof the public’svehicle.
Maintainproof of registrationandinsurance asrequired,forall Starwoodvehicles.
Followthe manufacturers’recommendedoperational instructionsandpreventative
maintenance schedule.
Documentall service performed,andretainmaintenance recordsforthe service life of avehicle,
and longerif itisinvolvedinanaccident.
Maintaina fire extinguisher,afirstaidkit,a fluorescentvest/jacket,andflaresorwarning
reflectors/trianglesaboardall public-road,multi-passengerStarwoodvehicles(vans,courtesy
cars, etc.).
Maintainspare setsof keysforeach Starwoodvehicle.
Designate areasauthorizedforparkingbasedonvehicle type,securityconsiderationsand
insurance requirements.
Conducta periodiccheckof authorizedassociates’drivers’licenses —atleasttwice eachyear.
Where valetparkingiscontracted,ensure the companyprovidingthe service followsthese
procedures.
Associates’ Responsibilities:
Possessacleanand validdriver’slicense whenoperatingavehicle.
Conducta pre-operationsafetycheckof vehicle (tires,horn,headlights,emergencyflashersand
on-boardsafetyequipment).
Immediatelyreporttoyoursupervisoranyunsafe conditionorequipment(dashboardwarning
lights,headlights,wiperblades,windshieldwasherfluid,brakes,etc.) onaStarwoodvehicle.
Neveroperate avehicle foranypurpose otherthanitsintendeduse.
Do not overloadvehicles.
Obeyall trafficlawsandregulations.
30. 30
Obeypostedroadsignson private property.
Alwayswearseatbelts,andaskpassengerstodo the same.
Operate onlysafe vehicles.
Operate vehiclesinasafe and responsible manner andneverdrive while impaired,affectedor
influencedbyalcohol,drugs,illness,fatigue orinjury.
Be aware of vehicle heightwhere headroomisrestricted.
Be sure the vehicle hasenoughfuel orelectriccharge tocomplete the assignedtask.
Immediatelyreportall accidents,incidentsorinjuriestoyoursupervisor.
Keeppossessionof the keywhen leavingthe vehicle.
Engage the parkingbrake whenleavingthe vehicle.
Do not pickup hitchhikersornon-guestrelatedpersons.
Whenon publicroadways,use cell phonesonlyfornecessarybusinesscommunications,and
onlyinhands-free orBluetoothmode. Neverreador sendtext messageswhile operatinga
vehicle.
Valet Parking Attendants:
In additiontoall the associates’responsibilities above, parking attendants must also do the following:
Refuse tooperate andtake custodyof unsafe vehicles.
Lock parkedvehicles.
Neverleave keysorkeyboardunattendedorunsecured.
Inspectvehiclesuponreceivingthemfrom andreturningthemto guests;note all damageson
the valetticket.If possible,mentionthesefindingstoguestsatarrival.
Park onlyinauthorizedareas.
Do not tamperwith or adjustvehicle accessorysettings.Adjustthe seatonlyforsafetyreasons.
Remove windshieldticketstubwhenreturningthe vehicle toaguest.
Notifysecurityorthe MOD whena guestwhodoesnot appearto be able to drive safelyasksfor
the keysto his/hercar.
32. 32
Security Overnight Check List
Shift meeting with officer being relieved to cover daily activity.
First evening patrol and lock down
Lock pool at 12:00AM —Top gate only
Check all fire pits and make sure they are off or will be shut off in
case of guest use
Banquet kitchen —Peter’s office, liquor room, silver room, exit doors,
chocolate room, cabinets, and cages
Banquet event spaces —ball room 1 & 2, DC, Wasatch, board room,
Library, Deer Crest, Jordanelle, etc.
Game room (check equipment), Deer Crest Club, ski barn, business
center
Spa —outside patio, 1st and 2nd floor entrances, exits, and spa rooms
Athletic Club —ensure entrance and exits are locked
Boutique —ensure that it’s locked
Real estate office —ensure it’s locked
Lock executive offices
3rd floor kitchen —ensure that all coolers are locked or being tended
to by chefs, ensure that liquor is locked, patrol the restaurant regularly
to ensure that nothing is lost
Wine vault —ensure that it is locked
Terrace kitchen —ensure that it is locked (check the window)
Patrol and check the bar and speak with MOD (regularly every hour
or two)
Full hotel floor patrol (check halls for damage)
Check Mountain Terrace and pavilion
Lower resort check —Secure all entrance and exit doors that can be
locked, check parking lot for suspicious activity, check fire feature,
check restrooms
Open required HCS doors for overnight cleaning, secure them
afterwards (do not prop them open)
33. 33
Perform all necessary security duties while on shift —Daily activity
report; respond to email requests; key requests; radio calls; log lost
and found; maintain, organize, and follow up with all necessary
incident reports; noise complaints; or any security action necessary
Key and radio audits
Second patrol and loss prevention checks
Ensure all doors are still secure
Check all floors
Check all function areas
Check all alcohol storage rooms
Keep your patrol patterns and times random
34. 34
Incident Report Writing – SOP
In the event there is an incident, these are the steps that must be taken in order to
complete report. Not always in this order.
1. Collect written statements from all witnesses to the incident.
2. Collect every bit of information that you can. In this caseplease reach out to
the guest for his/her info.
a. It is important that every line be filled out on the report.
3. Take pictures
a. It is vitally important to attach them to the report.
4. In the event of injury or accident involving an associate a drug test needs to
be taken.
a. Drug test to be taken within 24 hours
b. Fill out PostAccident (Reasonable suspicion) form and inform the
associate they will take drug test.
c. The form you give to the associate is called a Chain Of Custodyform.
In the middle right drawer of the officers computer desk.
d. If 2 security on duty the associate is to be taken by one of the officers.
If only one, engineering will need to take security calls until you
return.
i. If this is the case please COMMUNICATE THIS WITH MOD.
5. Save the report in this format.
a. Security Folder
i. Incident reports
1. Master Incident report log
a. Incident Reports 2015
i. Select the folder (Automobile Accident,
etc.)
1. Select the Month (06 JUNE, etc.)
b. Last name, First name 1.15.15
6. Email the report to
a. 01588 Security
b. The Department Head of the individual who is involved. Or the
department that is effected by the incident.
c. If it is an associate, also Jackie must be included.
35. 35
7. Make sure that pictures, written statements, and Drug Testing forms are
scanned and included in the email.
36. 36
INCIDENT REPORT
AUTOMOBILE ACCIDENT
(NO INJURY)
HOTEL CODE:1588
Incident No.
01-15-2015
Claim Handling Instructions: Information Only Establish Claim
DriverName: Mr./Ms.:
JimbobSmith(Associate
Cell Phone Number:
555-555-555
Work Phone
( )
ext.
Address: (Street,City,State,Zip)
1440 Park Ave ParkCityUtah 84060
RegisteredGuest Room No. Patron Other Valet
Driver
Birthdate/Approx. 8-10-79
AutoOwnerif differentthenDriver
JohnDoe
Home Phone
555-555-5555
Work Phone
( )
ext.
Address: (Street,City,State,Zip)
13007 S 15th Ct JenksOK 74037
AutoInsurance Information
Rentedwith BudgetCarRental
Locationof Incident
ParkingGarage
Occurredon day 1-15-15 approx.2300 Reportedon:1-15-15
Vehicleinformation:
BLK Ford Expedition
Other Vehicle involved:
N/A
Description ofVehicleDamage:
Scratch about 6 inchesinheightand18 inchesin
Description ofVehicleDamage:
N/A
37. 37
length.Tothe driver’sside reardoor.
Reportedto:
Scott Warner– SecuritySupervisor
PeilunLee - MOD
2nd
VehicleAutoInsurance Information:
N/A
Detailsof Incident/DescriptionofDamage: FACTSONLY (who,what,when,where,and how
according to claimant
Valet,JimbobSmith,calledSecurityOnDutyScottWarner at approx.1100PM to make a
report.Jimbob statedthatwhilehe wasvaletingavehicle (Ticketnumber12606), he was backingit
intoa stall and made contact withthe cementpostscratchingthe driver’sside reardoor.Photoswere
takenand a writtenstatementwasprovidedbyJimbob.Also,Jimbob wasprovidedwithpaperwork
to complete adrug testat the Park CityClinicwithin24hours.Pei (MOD) attemptedtoreach out to
the guest,theydidnotanswerand a message wasnot left.
CLAIMANT:
end of report
or continued
Witness(es): Name,address,home&work
phonenumbers
Police/Fire DepartmentInformation
DepartmentName:
NotificationDate/Time:
Officer’sName:
Badge Number:
Case Number:
ReportPreparedBy:
Scott Warner
Date andTime:
01-15-15 2340
ReviewedBy: Date andTime:
38. 38
INCIDENT REPORT CONTINUATION SHEET
Details of Incident, continued:
Any Additional Documentation Necessary? Yes No
(Examples: pictures, diagrams, damaged equipment, folio, registration card, bar bill, room
access information, etc.)
39. 39
Location of Additional Documentation or Evidence:
Report Prepared by:
Scott Warner
Date of Incident:
01-15-2015
40. 40
This form is found under:
Security folder
o Incident reports folder
Drug Testing Folder
REASONABLE SUSPICIONTESTING FORMS
o Page 3