This security plan is made up of the Standard Operating Procedures regarding procedural, physical and cyber security for a Wal-Mart department store. It constitutes an elaborate description of the store’s security program and refers to other important plans and procedures. All security personnel and operators, as well as selected store staff, are required to be familiar with the details and procedures linked to this plan ( Fischer et al., 2012 ). A copy of this Security Plan can be found in every of the following places and with the following individuals: store managers, control rooms, emergency action plan manager, chief risk officer, and systems operations center.
Security Systems
The store shall use several security systems designed to enable it to accomplish its security strategy. Such systems are complementary to the measures, procedures, and policies that make up the store’s vigorous security program ( Fischer et al., 2012 ).
Delegate your assignment to our experts and they will do the rest.
Fencing and Gates
The fence acts as the first layer of security to all store facilities and projects. The store utilizes 8-foot fencing, using tension wires and bars, putting fence barbs at the top, and placing the lower part of the fencing below grade. Various methods are used to secure the gates and other access points. First, they can be manually opened and closed with a heavy duty store-approved padlock. Second, some of the access points can be opened electronically with the required card credentials. Finally, some of the access points can be opened electronically using remote gate fob. It is important to note that even with such measures, all gates and access points are watched throughout by store security guards or CCTV.
Exterior Lighting
Exterior lighting has been deliberately installed all over the store to focus on perimeters, entry points into store buildings, gate and security guard access points, as well as other areas of interest. This lighting can either be activated by photocell or motion. The exterior lighting is intended to be a deterrent and complementary to the store’s CCTV system.
CCTV System
The store has deployed more than 30 CCTV cameras with Pan/Tilt/Zoom capabilities throughout the premises. The cameras are tactically positioned throughout the store’s buildings and facilities. The camera signals are continuously and seamlessly relayed back centrally to the store’s security office through the store’s special Fiber Optic infrastructure and then recorded. The purpose of having a central place for these signals is that the security personnel would be able to watch and control all cameras with minimal risk of sabotage. Additionally, the chief risk officer is required to share monitoring and control of the cameras with three law enforcement agencies in the region ( Busch, 2012 ). It is important to note that the store’s CCTV system is monitored around the clock.
Electronic Access Control
The store uses an elaborate Electronic Access Control System, which has been fixed all over the store’s buildings and facilities. The card access points secure barrier arms, access gates, and doors to buildings. The store’s security personnel can effectively monitor and control access to these areas through this technology. Store employees and contractors are given identification or access badges according to the level of clearance they have in the store. They are required to wear the badges at all times inside the premises. The store also utilizes a CIP-specific Electronic Access Control structure that safeguards access to the Critical Cyber Asset areas of the store. The Electronic Access Control Systems are also watched around the clock.
Intrusion Alarms
The store has installed intrusion alarms throughout the buildings and facilities for two main reasons. First, the alarms offer a 24-hour surveillance of remote points where employees are not often present. Second, they provide monitoring for every CIP-designated location in the store. The alarm devices comprise glass break, motion detection, and door/window contacts. The intrusion alarms are also under 24-hour monitoring.
Security Guards
The store utilizes contracted private security firms to offer security services for the entire premises. There are guards at every store building and facilities of special interest. Also, “patrol” security guards are required to carry out security checks of all major store properties.
Law Enforcement Support
The store has strived to create and maintain strong relationships with the local law enforcement agencies. Such agencies contribute to the store’s security efforts via concerted responses to incidences regarding security, hands-on meetings, observation rounds, and training and exercises ( Busch, 2012 ).
Danger Recognition and Reporting
According to the National Infrastructure Protection Plan, the store’s facilities are deemed vital infrastructure. Therefore, attacks on vital infrastructure cause a disruption of important store operations and systems. As a result, store personnel needs guidance on identifying and reporting probable dangerous incidents.
Security personnel is tasked with investigating reports of suspicious events and relaying relevant information to the System Operating Personnel in the store. If necessary, they are required to share such information with local law enforcement agencies and investigative consultants ( Busch and Givens, 2012 ). The security personnel is also responsible for retaining the records of sabotage-related incidents and updating security procedures accordingly. On the other hand, System Operating Personnel is required to provide information regarding suspicious activities that may constitute sabotage to relevant authorities within the interconnection. They are also required to submit the Disturbance Report Form OE-417 in cases of electric incidents and emergencies.
Reporting and Response Procedures
The key to securing the store’s buildings and important facilities is to be vigilant of events in and around such areas. A prompt detection and recognition of sabotage incidents, whether probable or real, are vital to the safety of the store's buildings and facilities. Sabotage, in this case, refers to a deliberate effort to interfere with store business and operations by subversion, obstruction, or destruction. In other words, sabotage is used to disrupt the work or social environment of a given setting. For the store, sabotage may be perpetrated by disgruntled staff, hostile members of the public, or terrorists. For instance, civil disturbances may constitute attempted sabotage where a particular group’s intentions may be contrary to the store’s cause.
There are several suspicious events that indicate a probable or real attempted sabotage, including and limited to the following: (i) a sequences of insignificant actions of vandalism within the store’s premises; (ii) external verbal or printed threats to facilities, operations, or security by an individual or group which is not directly linked to the store; (iii) internal verbal or printed threats to facilities, operations, or security by an individual or group that is not directly linked to the store; (iv) unauthorized individuals requesting information for the purpose of intelligence gathering on the store’s operations, telecommunications, and facilities; or (iv) a significant volume of unapproved attempts to an important facility or building.
Reporting Potential or Actual Sabotage Activities
Store employees who identify an incident, activity, or conduct involving store buildings, facilities or other property that they deem to be inappropriate and likely to lead to sabotage are required to report them to the nearest security personnel. The details that would help the security department resolve such issues include the date and time, location, physical description of the suspicious person, and the description of the suspicious activity. For a more effective and timely response, store employees are encouraged to report suspicious occurrences as soon as they can to the security department. Reporting can be done by initiating a phone call to the security department, or, if the suspicious incident does not necessarily require a high level of urgency, by submitting a suspicious activity or incident report form found on the security department’s web page.
Emergency Response
The store’s emergency response is in line with an “all-hazards” approach. Such incidences include criminal activity, serious accidents, civil disturbances, windstorms, floods, fires and bomb threats. Building Evacuation
The store building may need to be evacuated for and not limited to such incidents as hostage situations, gas or water leaks, power outages, bomb threats, and fire. Notification is made through the intercom system, alarm system, or directly or electronically from specific emergency personnel. In the event of an emergency, people are not supposed to run or panic, re-enter the building unless permitted, use elevators, or gather at entrances. In the case of disabled individuals, assistance shall be provided only by floor wardens or other designated emergency personnel.
Employee Responsibilities
All store employees are required to identify the locations of fire extinguishers, first aid kits, and emergency exits. They are expected to know how to use fire extinguishers whenever it is safe to do so. They are also required to regularly review evacuation plan maps and attached floor plans.
Conclusions and Recommendations
This paper provides an overview of the Security Plan of a Wal-Mart department store. The security systems included in this report are fences and gates, exterior lighting, CCTV, Electronic Access Control, intrusion alarms, security guards, and law enforcement support. The report also includes an outline of danger recognition and reporting and emergency response procedures.
This paper recommends that the store should consider applying principles of the Incident Command System (ICS) when handling major incidents ( Schumacher et al., 2013 ). The application of this system involves three lines of action including the assembly of an Incident Management Team (IMT), the coordination of inside and outside stakeholders including fire services and law enforcement agencies, and the establishment of a Unified Command, if necessary.
References
Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., & Sommerlad, P. (2013). Security Patterns: Integrating security and systems engineering . John Wiley & Sons.
Fischer, R., Halibozek, E. P., & Walters, D. (2012). Introduction to security . Butterworth-Heinemann.
Busch, N. E., & Givens, A. D. (2012). Public-private partnerships in homeland security: Opportunities and challenges. Homeland Security Affairs , 8 (1).