Verified Document

Security Plan Target Environment Amron International Inc. Essay

¶ … Security Plan Target Environment Amron International Inc.

Amron International Inc. is a division of Amtec and manufactures ammunition for the U.S. military. Amron is located in Antigo, Wisconsin. Amron also manufacturer's mechanical subsystems including fuses for rockets and other military ammunitions as well as producing TNT, a highly explosive substance used in bombs.

Floor Plan Target Environment

The target environment in this security plan is the manufacturing operation located in Antigo, Wisconsin, a manufacturing plant with personnel offices adjacent to the facility. The work of Philpott and Einstein (nd) reports the fact that more than 50% of U.S. businesses do not have a crisis management plan and for those who do have a plan, it is generally not kept up-to-date. Philpott and Einstein states that even fewer businesses and organizations "have integrated physical security plans to protect the facility and the people who work in it.

The challenge is reported to be twofold:

(1) the first is reaching an agreement that a security plan is needed which "involves altering mindsets, building consensus and getting senior management to buy in;

(2) the second challenge "is in developing and implementing an effective and tailor-made integrated physical security (IPS) plan." (Philpott and Einstein, nd)

This plan is comprised by three elements which support the plan:

(1) physical security measures;

(2) operations procedures; and (3) policies. (Philpott and Einstein, nd)

Operational procedures are reported to be the "lifeblood of any organization -- they cover how the facilities works on day-to-day businesses, such as shift changes, deliveries, maintenance schedules and so on. It is necessary to understand how the facilities works and operates in order to develop an effective integrated physical security plan that allows it to get on with its job with the least disruption as possible." (Philpott and Einstein, nd)

There are five steps in the physical security plan involving four specific elements including those of:

(1) people;

(2) operations;

(3) information; and (4) inter-dependence. (Philpott and Einstein, nd)

Stated as crucial elements to the security plan are those as follows:

(1) Deterrence: this makes provision of countermeasures including policies, procedures and technical devices in addition to controls for defense against attacks protected assets;

(2) Detection -- monitoring for possible breakdowns in mechanisms that are sued for protection and that could result in a breach of security;

(3) Delay -- necessary measure in event of a breach so that intruders are slowed allowing security to catch them before they realize success;

4) response -- an element requiring human involvement including procedures and actions for assessment of the situation and providing response to a breach;

(5) recovery -- the plan for continuation of business and normal operations and (6) re-evaluation -- constant reassessment is necessary; (Philpott and Einstein, nd)

List of Threats

Threats present at Amron, International Inc. include the following:

(1) Fire;

(2) Intruder security breach;

(3) Employee security breach;

(4) Weather threats;

(5) Improper manufacturing methods; and (6) Information security breach.

Risk Assessment Threat

In the event that employees fail to follow procedures and policies concerning manufacturing processes and should employees fail to follow smoking policies and designated smoking area rules, fire and explosions could become a real threat.

Current Vulnerability Gaps

Vulnerability gaps at Amron International Inc. appear to have been closed due to tight security measures.

Countermeasures Components Security Object

Training and safety manuals in addition to intensive security training address the threats to security that are potentially present at Amron International Inc.

Physical Security

The physical security of Amron International Inc. has been sufficiency addressed. All exits and entrances are monitored by security including exits and entrances to buildings and parking facilities. Security cameras fully cover the facilities doorways, windows and docking areas. Drivers who carry loads to and from the facility are thoroughly checked at both the gates and the docking areas.

Information Security

Information security has been addressed by Amron International Inc. through use of information security software programs that are considered best practice by the U.S. military operations.

Personnel Security

Personnel security is inclusive of but not limited to the following:

(1) all personnel submits to drug screening and background checks;

(2) personnel required to wear employee identification badges at all times;

(3) security checks personnel employee identification badges at all entrances and exits to the plant, gates and parking facilities.

The interviewee stated that hiring procedures for personnel consist of one submitting an application through the main branch. Human Resources will then contact potential candidates for an interview. Once the selection process has been completed, drug and alcohol screening is set up. Background screenings are submitted...

Once all areas are covered and approved, the official hiring process begins. The manager will then schedule an interview and based on how one presents his or herself, she will then make the decision to hire the individual.
The hiring procedures for personnel consist of one submitting an application through the main branch. Human Resources will then contact potential candidates for an interview. Once the selection process has been completed, drug and alcohol screening is set up. Background screenings are submitted via fingerprinting, and new employee orientations are scheduled. Once all areas are covered and approved, the official hiring process begins. The manager will then schedule an interview and based on how one presents his or herself, she will then make the decision to hire the individual.

Liability Issues

Liability issues include the manufacturing process of highly explosive devices as well as other risks posed by the manufacturing environment.

Departmental Dependencies

There is a high level of dependency between departments at Amron International Inc. And this requires that all departments work as a functioning whole.

Emergency Plan Disaster Response

The emergency plan for disaster response is set out in the employee manual and handbook and the roles of each department and level of employee is clearly stated in these handbooks. Random drills are part of each employee training and as such is based on a code system. The example stated is a code seven drill meaning 'serious injury'. There are also lockdown procedures for the emergency department, and other various emergency situations. Administering stat calls to ensure all personnel have been properly trained is essential to the day-to-day functions of security.

Bomb Threat

Security procedures for a bomb threat incident include clearing all employees out of the manufacturing facilities and security the facilities until a bomb assessment team is able to check the facilities out and deem it safe for employees to re-enter the facilities.

Summary Justifying Choices

This work in writing has examined the security plans for Amron International Inc. located in Antigo, Wisconsin. The security plans set out for the manufacturing facilities are sufficient and address properly all areas of potential concern and possible breach of security. The manager of security and personnel ensures that the objectives of these plans are met in coordination with the other security personnel that work in achieving these objectives for Amron International Inc.

Bibliography

Amron International Inc. (2012) Retrieved from: http://www.amronintl.com/about-amron

Philpott, Don and Einstin, Shuki (nd) The Integrated Physical Security Handbook. Retrieved from: http://www.lakecountyohio.gov/LinkClick.aspx?fileticket=KK6FTE9VRms%3D&tabid=1315&mid=3123

Part I: Interview Questionnaire

1. Can you briefly describe your current position, its duties, and responsibilities?

The role of Norma Dehlke as Director of Security and Human Resources has various functions. She is responsible for the security and safety of all employees, budgeting hours worked as regular shifts, over-time hours, and any concerns or complaints from the staff. Mrs. Dehlke creates the schedules, filling any open post, and delegating assignments for the supervisors to complete as needed. She conducts random drills for each shift as part of training. Such drills are code seven (serious injury), lockdown procedures for the emergency department, and other various emergency situations. Administering stat calls to ensure all personnel have been properly trained is essential to the day-to-day functions of security.

2. What is your hiring procedure like for personnel?

The hiring procedures for personnel consist of one submitting an application through the main branch. Human Resources will then contact potential candidates for an interview. Once the selection process has been completed, drug and alcohol screening is set up. Background screenings are submitted via fingerprinting, and new employee orientations are scheduled. Once all areas are covered and approved, the official hiring process begins. The manager will then schedule an interview and based on how one presents his or herself, she will then make the decision to hire the individual.

3. Is there any type of pre-employment screening?

The pre-employment screening is the extensive background check. An applicant must pass the drug screening to be able to obtain employment. All personnel have to go through a so many hours of probation before being able to join the union and permanent job placement. Drug screening is a zero tolerance policy (no second chances). Demonstrating one's ability to lift, push, and pull at least 20 pounds is essential to the duties expected of the applicant.

4. What qualifications do you require of applicants?

The qualifications consist of one possessing a high school diploma or a certificate equivalent to one, such as GED. Manufacturing experience is preferred, however not necessary as training is provided. Supervisory positions require previous experience prior to employment with the company. Other positions may require computer skills. Such positions are within the clerical side of safety and security. Monitoring the cameras, alarms, and radio traffic from security officers calls…

Cite this Document:
Copy Bibliography Citation

Related Documents

Security Management Strategies for Increasing Security Employee
Words: 2501 Length: 8 Document Type: Essay

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Security Management Security Measures Risk Management
Words: 1552 Length: 5 Document Type: Essay

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

Security Management the Role of a Security
Words: 4672 Length: 15 Document Type: Essay

Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are

Security Management at Aviation and Healthcare Sectors
Words: 2154 Length: 8 Document Type: Essay

Security Management at Aviation and Healthcare Sectors Security Management Essay This paper discusses the concept of aviation security management and security management at healthcare settings. In addition to that, this paper also lists down and describes the important factors that can have an influential impact on the functions of aviation and a healthcare security manager. Security Management at Aviation and Healthcare Sectors Aviation Security The general aviation security confronts a number of security challenges. The

Security Management Civil Action
Words: 700 Length: 2 Document Type: Essay

Security management 1. In a civil action, how can a claim of negligent hiring have a greater chance of succeeding? Jurisdictions have been increasingly putting laws in place pertaining to what makes organizations a potential target for a lawsuit on negligent hiring. Though in most instances, claims of negligent hiring may be effectively fended off, it proves increasingly tricky in the following cases: · If the individual harming or injuring another is an

Security Management Defining an Effective
Words: 3174 Length: 12 Document Type: Research Paper

The reality is however that legacy systems pose the greatest potential risk to any enterprise, as these platforms are anachronistic in terms of security support, lack many common safeguards, and don't have the necessary Application Programmer Interfaces (APIs) to scale globally as a secured platform (Gupta, Roth, 2007). Legacy systems were designed in an era where single authentication for an entire enterprise system was sufficient enough, and the concept

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now