Verified Document

Asset Protection When An Emergency Situation Arises, Essay

Asset Protection When an emergency situation arises, quick action is imperative in order to protect assets and minimize losses. A security supervisor bears the burden of ensuring that a disaster management plan is effectively carried out, but he or she cannot act alone. The supervisor must coordinate with state and federal agencies that become involved in larger disasters. Special events may also necessitate coordination and collaboration with other groups that are involved in the organization and administration of the event (Innace, 2008). Security directors can effectively manage emergencies by developing a plan ahead of time in conjunction with others that may be involved in the case of such an emergency. They should also implement the incident command system and media relations.

In preparation for an emergency, the security supervisor should identify priorities including minimizing the number of victims and extent of harm that comes to them and protection of the business assets (O'Dell, 2008). The security supervisor should also identify legal and medical obligations as this will impact what he or she must do during an emergency situation. For example, a medical problem may arise in the context of questioning a suspect and the security director may need to perform certain actions in order to discharge his or her obligations to the employer and under the law. (Hill, 2008)

Coordination with agencies that will be responding to an emergency is imperative for a company's security director. Within the organization, the security director should assign roles to his or her staff...

Outside of the agency, the security director should work with other involved parties to make a plan that delineates the responsibilities of each group and the chain of command. By making such a plan, potential conflicts about who should make the determinations under time pressure and who should be reported to will be prevented by hammering out the details ahead of time.
The Incident Command System (ICS) is a useful tool for emergency management and response. It has a predetermined chain of command and the common terminology that it uses can prevent confusion in communications between the involved responders. While it was originally designed to be a disaster control system for fires, it has been adapted for different uses by many of the government responders that may be involved in an emergency situations at a company. (Vendrell and Watson, 2008)

ICS can help determine the organizational structure for management of an emergency or a disaster. It can also help a security director plan how to implement the structure, build the capacity for that structure, and adapt it for different situations. ICS is designed to be flexible, yet standard, to make a joint emergency response more efficient and effective. (FEMA) The organizational structure is a team approach (Vendrell and Watson, 2008) and will require a cooperative effort between the security director, other employees, and outside parties. The joint effort can plan ahead of time how best to minimize harm to people, harm to property, and loss of…

Sources used in this document:
References

FEMA. Incident Command System (ICS). http://www.fema.gov/emergency/nims/Incident

CommandSystem.shtm

Hill, D.W. (2008). Security and Medical Response. In S.J. Davies & C.A. Hertig (Eds), Security Supervision and Management (3rd ed.) (303-307). Oxford: Butterworth-Heinemann.

Innace, C. (2008). Supervising During Special Events. In S.J. Davies & C.A. Hertig (Eds), Security Supervision and Management (3rd ed.) (293-302). Oxford: Butterworth-Heinemann.
Cite this Document:
Copy Bibliography Citation

Related Documents

Strategies to Promote Emergency Care Using the ACA
Words: 3074 Length: 10 Document Type: Term Paper

Affordable Care Act and EMS The affordable care act is a medical insurance program that came into existence during the Obama regime. This came as a subsequent addition to the Medicaid and Medicare programs as fronted in the year 1965. The motive behind the creation of this scheme was to improve the affordability and accessibility of medical care to all the American citizens. Just like America, every society around the

Emergency Preparedness and Management in Florida
Words: 4974 Length: 15 Document Type: Essay

Disaster Preparedness and Emergency Response for Natural Disasters or Terrorists Attacks in Florida Emergency management has been described regarding the phases by using words such as prepare. Mitigate, respond and recover. For this paper, we are going to examine the underlying concepts, variation, limitations, and implications of emergency management phases. Moreover, we are going to look at the various preparedness and response strategies applied by the State of Florida when dealing

Protection of Information Systems and Data
Words: 2006 Length: 6 Document Type: Other

Security Cryptography In order to maintain information secrecy one would use cryptography. This is intentionally making information unintelligible. This method is mainly employed during the transmission of information. Cryptography ensures that only the intended person would be able to decipher the information (Whitman & Mattord, 2011, p. 339). The process of deciphering encrypted text is referred to as cryptanalysis. Cryptology is the mathematics branch covering cryptography and cryptanalysis. Cryptology has been

Preparing for Disasters
Words: 1500 Length: 5 Document Type: Essay

Emergency Response Drill DISASTER READINESS The increasing need for emergency preparedness has been triggered by the rush of many kinds of emergencies (Adini et al., 2012). These include mass casualty events, mass poisoning events, and biological occurrences, such as pandemics and bio-terror events. Emergency preparedness in hospitals and other healthcare facilities stands out as a major setting. A recent evaluation conducted among 29 surveyed general hospitals in Israel found a significant relationship

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Homeland Defense Agency Identification: In
Words: 4253 Length: 11 Document Type: Term Paper

(Combating Terrorism: FEMA Continues to Make Progress in Coordinating Preparedness and Response: Participation in Interagency and Intra-agency Groups and Committees) CIMS: The Office of Emergency Management --OEM who has been collaborating with NYPD & FDNY and other City agencies to develop the CIMS, the adoption of which was declared by Mayor Bloomberg in March, 2004. CIMS makes a uniform incident management structure for every City agency that is broadly based

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now