Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 46, No. 6, June

A Consoling Strategy. (Working Wise)
Sandia National Laboratories, which is operated by Lockheed Martin Company for the U.S. Department of Energy (DOE), conducts research on a range of critical projects relating to national security, energy, and environmental technologies. Sandia must...
Airing on the Side of Safety. (Airport Security)
TO COMPANY EXECUTIVES, a corporate jet may be a status symbol, a perk, or a necessity. It is also a source of risk. The threats posed by such aircraft have expanded and been brought into much clearer focus since September 11. They must be understood...
A New Forum for Security: Solid Security Has Been Part of the Forum Office Building in Atlanta since the Project Was on the Drawing Board. (Physical Security)
SOMETIMES REFERRED TO as the Beverly Hills of the East, the Buckhead neighborhood in Atlanta is affluent, elegant, and crammed with high-end residential neighborhoods, office buildings, entertainment, and shopping. It also features Gone With the...
ASIS and OHS. (ASIS News)
ASIS International has been asked to provide private security expertise to the White House Office of Homeland Security (OHS) through participation in a series of critical infrastructure workshops with federal government agencies. Additionally, ASIS...
Business News. (Industry Focus)
Teenagers believe they can take action to make the United States a safer place, according to Are We Safe?, the 2001 National Crime Prevention Survey, which polled 513 teens regarding their feelings about safety. Conducted near the end of October...
Central Station for Virus Reporting: Businesses Have Many Options for Reporting Attempted Intrusions by Hackers, but They Are Reluctant to Report Viruses, regarding Them More as a Nuisance Than as a Threat. (Tech Talk)
Businesses that are beset by hackers have a number of options for reporting attempted intrusions. They range from law enforcement professionals at the FBI's National Infrastructure Protection Center to industry-specific computer emergency response...
Congressional Legislation. (Legal Reporter)
Cybercrime. A bill (H.R. 3482) that would increase penalties for cybercrime--with punishment levels culminating in a possible life sentence for a crime where the perpetrator attempts to cause death or bodily injury--has been approved by the House...
Data in Action. (Working Wise)
First Data Corporation is a multifaceted organization with services that range from creating online loyalty programs for the world's leading credit card issuers to facilitating electronic money transfers for bank clients. The company wanted a better...
Derring Don't. (Editor's Note)
I dare you. The phrase is emblematic of childhood. The need to prove oneself by accepting a dare, or better yet a double-dare, is one of the enduring rites of passage for adolescents. This derring-do is mistaken by children for bravery. But as Herman...
Dominate Your Data. (Special Focus on Risk Management)
TODAY'S SECURITY PROFESSIONAL must be able to collect, analyze, and share information effectively. Given the range and depth of statistics with which security deals, this process can be overwhelming unless automated. Fortunately, software tools...
Dues Increase. (ASIS News)
The ASIS Board of Directors continually updates the Society's strategic plan based on recommendations by the ASIS Planning Committee, various Society councils and commissions, and membership surveys. One of the board's major roles in implementing...
Finding Alternatives to Surprise Training. (News and Trends)
Last February a North Carolina sheriffs deputy killed one Green Beret and wounded another during a training exercise. The incident has rekindled questions in the private sector about what form antirobbery training should take. In the North Carolina...
Flying in the Face of Danger. (Airport Security)
TWO MONTHS AFTER THE SEPTEMBER 11 TERRORIST ATTACKS, THE AVIATION and Transportation Security Act (ATSA) was signed into law to, among other goals, improve the screening of passengers and baggage by federalizing the airport Security screener work...
Home on the Page. (News and Trends)
Does it seem like everyone's a security expert after 9-11? Stick with the information from the sources you trust. SM Online continues to cull the best documents, court cases, surveys, and training aids from the confusing torrent of security information....
How Should Discipline Be Delivered? (Viewpoint)
Supervisors have an important role to play when employees have behavioral problems. They should not just defer to HR. As any serious leader knows, whenever you take a team member's problems and put them on someone else's shoulders, you have just...
Judicial Decisions. (Legal Reporter)
Vicarious liability. In a recent case, a New York court ruled that while a hospital cannot be held liable for a doctor's sexual assault on a patient, the hospital may be responsible if personnel ignored suspicious events preceding that misconduct....
Liability Floats Downstream. (Tech Talk)
Jane, a network security administrator, located a vulnerability in another company's Web server. After exploiting this hole, Jane used the compromised system as a launching pad to exploit another vulnerability, this time on a hospital system in...
Master Your Disaster. (Special Focus on Risk Management)
ON SEPTEMBER 12, 2001, the dominant emotions were shock, horror, and sadness at the senseless loss of life from the previous day's terrorist attacks on the World Trade Center and the Pentagon. In addition to sharing in that emotional distress, hundreds...
Museums Find Insider Rogues' Gallery. (News and Trends)
Despite ever-increasing evidence, some museum administrators fail to acknowledge the extent of internal theft. Recently, for example, a museum security director asked colleagues to provide data or anecdotal evidence on the incidence of internal...
New Money Laundering Rules Cover Wide Swath. (News and Trends)
Forget about organized gangs, dishonest employees, and smash-and-grab thieves. Today's jewelers must now concern themselves with a more multifaceted threat: terrorism. That's because last year's USA Patriot Act adopts a broad definition of "financial...
NRC Struggling to Address Reactor Shortcomings. (News and Trends)
Could it be that the next Mohamed Atta is already a trusted employee at one of the 103 civilian U.S. nuclear reactors? That's a definite possibility, according to a report by Representative Edward J. Markey (D-MA) that summarizes correspondence...
Philadelphia Welcomes
American Society for Industrial Security Philadelphia, a dynamic place where big-city excitement meets hometown charm, awaits your arrival. Famous as the birthplace of life, liberty and the pursuit of happiness, the cradle of liberty offers much...
Regulatory Issues. (Legal Reporter)
Privacy. The Department of Health and Human Services (HHS) has proposed revised regulations relating to the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The new proposal would weaken privacy provisions proposed earlier and...
The Intimidation Factor. (Special Focus on Risk Management)
AT FINANCIAL INSTITUTIONS, one of the most common, unpredictable, and disruptive crimes is employee intimidation, often as a part of stalking. Apart from the primary concern for the employee's and coworkers' safety is the secondary--but important--issue...
The Perilous Seas of Privacy Law: Companies That Do Business across National Boundaries Must Understand How Privacy Laws Affect the Way They Collect and Use Information. (Privacy)
DOZENS OF LAWS, regulations, and self-regulatory programs govern privacy around the world. Further complicating a company's efforts to protect confidential client information are the nuances of privacy Even when a practice that involves the sharing...
Tradition Sparks Innovation Seminar Preview and Advance Registration. (ASIS International 2002)
Seminar Dates: September 10 - 13, 2002 (Tuesday - Friday) Exhibit Dates: September 10 - 12, 2002 (Tuesday - Thursday) Pennsylvania Convention Center To meet the demands of our changed world, look to the event that's been keeping security...
Working without a Net. (Computer Security)
The proliferation of wireless devices presents businesses with new opportunities--and new risks. Some tools and techniques can help keep corporate networks safe. IN EVERY AIRPORT WAITING LOUNGE, overpriced coffee shop, and trendy restaurant,...