Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 49, No. 6, June

About the Speakers
Mark A. Miller, CHS V, CEMP, President & CEO, Executive Protection Systems (EPS) Mark Miller, founder of EPS, has over 25 years of Weapons of Mass Destruction (WMD) and Disaster Preparedness experience. Having served 20 years in the U.S. Army...
A Dash of Danger: Find out How One of the Largest Healthcare Systems in the Country Diagnoses Chemical and Biological Hazards
Responding to a call for a suspicious powder found at a magazine headquarters in New York City, members of the hazmat team from the North Shore-Long Island Jewish Health System's Center for Emergency Medical Services (CEMS)--dressed in protective gear...
ASIS International
ASIS INTERNATIONAL regularly provides the status of guideline projects so that members and others can access completed guidelines, review draft guidelines and provide comments, or learn the status of guidelines. Listed below are the guideline projects...
ASIS President Corrects Press Conceptions on Private Security
ASIS International President Daniel J. Consalvo, CPP, responded to an article by Chief Washington Correspondent Brock N. Meeks that was published online by the MSNBC news network. The March 9 article, titled "Are 'Rent-a-Cops' Threatening Security?"...
Attendee Housing Request
FAX TO THE HOUSING BUREAU, 1-888-241-8404 NO LATER THAN AUGUST 8, 2005. Four Easy Ways To Reserve Your Room Internet: www.asisonline.org/seminar/housing Phone: 1-888-887-8072 United States/Canada; 1-972-349-7452 International Fax: 1-888-241-8404...
Auditing for Anomalies: New Software Tools Are Available to Help Companies Scan Transactions for Anomalies That May Signal Internal Fraud
Working as a lender in a financial institution's private banking operations, which caters to affluent clients, is a plum assignment, bestowing cachet on the person holding that job. But it also exposes that person to opportunities for committing insider...
Building Security: A One-Day Security Solutions Seminar Presented by Smiths Detection
Dear Security Professional, Smiths Detection is dedicated to more than bringing you the best detection equipment. Through our Security Solutions Seminars held throughout the country, our goal is to offer you the opportunity to listen to specialists...
Centralizing Card Control: Find out How One Company Instituted an Enterprisewide Card Solution for Its Headquarters Office and 40 Field Offices
Networked access control card systems provide many benefits, but setting up the system can be a challenge. The experience of one distribution and transportation company that moved from a decentralized to a centralized access control approach for its...
Courting Trouble: To Reduce Liability, Companies Must Know How to Manage Electronic Records and How to Respond to Electronic Discovery Requests
When Amy Wiginton filed a sexual harassment lawsuit against her employer, C.B. Richard Ellis, Inc., her attorney sent a detailed letter to the company's counsel requesting that the firm stop all destruction of potential evidence, both paper and electronic....
Dos and Don'ts for Digital Evidence: Managers Need to Understand the Basics of Digital Investigations So That They Can Respond to Cybercrime without Committing a Crime Themselves
One Friday afternoon, the information technology director of a major telecommunications provider (we'll call him Jim) rushed up to the office of the company's president (whom we'll call Tom). Jim was carrying a corporate notebook computer that had...
From Security's Leading Association ... the Industry's Most Influential Event
You're on the front lines of security. You understand how critical it is to keep up with the latest industry developments and innovations. And you know how important it is to attend the premier security event of the year--ASIS 2005. In a world of...
Go Forth without Fraud: Companies Planning to Compete for Homeland Security Funds through Government Grants and Contracts Must First Make Sure They Have a Strong Fraud Prevention Program in Place
With the growth of the homeland security industry, many companies are now wondering how they can get a share of the contract and grant funds that the government is parceling out. There may be great opportunities for some businesses, but management...
Home on the Page @ WWW.Securitymanagement.Com
Here is a sampling of new material on SM Online. Also look for @ symbols throughout the magazine for references to exclusive Web material. Visit www.securitymanagement.com. Aviation security. Five Fs, 4 Ds, 3 Cs, and 2 Bs. If you brought home a...
Identity Theft
Identity theft. A Michigan appeals court has ruled that a union had a special duty to protect the personal information of a member. In the case, a third party committed identity theft against union members after stealing union rolls. In late 1999,...
Light Their Fires: Find out How to Improve Employee Motivation and Increase Overall Company Productivity
Why does one contract security company grow and prosper while another flounders? Why does one manager exceed his goals while another falls short? The answer is simple: employee motivation. [ILLUSTRATION OMITTED] Knowing how to motivate employees...
Making a Federal Case of IT Security
The federal government needs to play a greater role in protecting the IT infrastructure of the United States, according to two recent reports. The first report, from the President's Information Technology Advisory Committee (PITAC), a group of independent...
Medical Testing
Medical testing. A federal appeals court has ruled that an employer violated the Americans with Disabilities Act (ADA) by basing a hiring decision on a medical test before the applicants had completed the rest of the hiring process. The court also...
Motivating through Appraisals: One Company Designed an Appraisal System to Help Employees Focus on Goals and Improve the Bottom Line
Performance appraisals are a critical tool for documenting how employees are doing and for providing legal evidence of employee accomplishments or problems. However, managers must know how to conduct a review if it is to yield useful information. ...
Safety Act Process Painful but Rx Planned
The government has been slow to implement the Safety Act of 2002, intended to grant liability protection to companies providing counterterrorism services and technologies, but that may be changing. Department of Homeland Security Secretary Michael...
Secure Flight in Holding Pattern
A government report, as well as its competing interpretations, has raised questions about when the latest passenger prescreening system for commercial flights will take wing. Secure Flight, the latest iteration of the scuttled Computer-Assisted Passenger...
Should Police Respond to Alarms? Police Response to Private Burglar Alarms Isn't the Best Use of Public Law Enforcement Resources, Which Are Already Stretched Thin
In response to the high rate of false burglar alarms at homes and businesses, law enforcement agencies around the country are adopting a policy commonly referred to as verified response. It means that criminal activity must be identified by either...
The Key to Winning Contracts: Here's What Companies Need to Know to Compete Successfully for Homeland Security Projects
Experts estimate that about $20 billion in homeland security and intelligence funds will be spent through contracts and grants at the federal, state, and local levels in fiscal year 2006. Companies that want to compete for these dollars will do best...
There's No Free Lunch: Before Accepting Government Funding to Help Develop or Build a Security Product, Companies Must Understand How It Could Alter Their Intellectual Rights to the Product
To bolster homeland security, the government is directing an unprecedented amount of funding to the development and procurement of new security products that can help protect the nation's infrastructure, landmarks, and other critical assets. Government...
The Security Consultant
Q: I'm responsible for protecting a high-risk facility. How can I stop nighttime intruders at the perimeter, before they get a chance to do damage? A: For high-risk facilities, deterrence and prevention are not enough. You need to detect and respond...
The Time for Urgency Is now[SM]
War, terrorism, workplace violence, sabotage, theft ... the list of security-related worries preoccupying today's executive seems to grow each year. Who can predict what looms on the horizon? It's easy to pretend that corporations cannot shield themselves...
Vaulting into Digital Video
It's clear just by the name of the company that Dunbar Cash Vault and Dunbar Armored has to be concerned about security. The company provides computerized cash handling and money room services, as well as funds pickup and delivery services, for banks...
When Good Software Goes Bad
When a car manufacturer rushes a new model to market and then finds a problem, the resulting recall is likely to cost more than preventing the problem in the first place. [ILLUSTRATION OMITTED] Software vendors aren't required to recall their...
Worth a Look
It sounds like a Zen koan. What gets bigger as it becomes smaller? The answer to this riddle, though, is hardly metaphysical: it is portable storage devices, which began with 5.25-inch floppies that held a paltry 1.2 megabytes of data and have evolved...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.