12 Jul 2022

59

Security Plan for Wal-Mart Store

Format: APA

Academic level: College

Paper type: Research Paper

Words: 1328

Pages: 5

Downloads: 0

This security plan is made up of the Standard Operating Procedures regarding procedural, physical and cyber security for a Wal-Mart department store. It constitutes an elaborate description of the store’s security program and refers to other important plans and procedures. All security personnel and operators, as well as selected store staff, are required to be familiar with the details and procedures linked to this plan ( Fischer et al., 2012 ). A copy of this Security Plan can be found in every of the following places and with the following individuals: store managers, control rooms, emergency action plan manager, chief risk officer, and systems operations center. 

Security Systems 

The store shall use several security systems designed to enable it to accomplish its security strategy. Such systems are complementary to the measures, procedures, and policies that make up the store’s vigorous security program ( Fischer et al., 2012 ). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Fencing and Gates 

The fence acts as the first layer of security to all store facilities and projects. The store utilizes 8-foot fencing, using tension wires and bars, putting fence barbs at the top, and placing the lower part of the fencing below grade. Various methods are used to secure the gates and other access points. First, they can be manually opened and closed with a heavy duty store-approved padlock. Second, some of the access points can be opened electronically with the required card credentials. Finally, some of the access points can be opened electronically using remote gate fob. It is important to note that even with such measures, all gates and access points are watched throughout by store security guards or CCTV. 

Exterior Lighting 

Exterior lighting has been deliberately installed all over the store to focus on perimeters, entry points into store buildings, gate and security guard access points, as well as other areas of interest. This lighting can either be activated by photocell or motion. The exterior lighting is intended to be a deterrent and complementary to the store’s CCTV system. 

CCTV System 

The store has deployed more than 30 CCTV cameras with Pan/Tilt/Zoom capabilities throughout the premises. The cameras are tactically positioned throughout the store’s buildings and facilities. The camera signals are continuously and seamlessly relayed back centrally to the store’s security office through the store’s special Fiber Optic infrastructure and then recorded. The purpose of having a central place for these signals is that the security personnel would be able to watch and control all cameras with minimal risk of sabotage. Additionally, the chief risk officer is required to share monitoring and control of the cameras with three law enforcement agencies in the region ( Busch, 2012 ). It is important to note that the store’s CCTV system is monitored around the clock. 

Electronic Access Control 

The store uses an elaborate Electronic Access Control System, which has been fixed all over the store’s buildings and facilities. The card access points secure barrier arms, access gates, and doors to buildings. The store’s security personnel can effectively monitor and control access to these areas through this technology. Store employees and contractors are given identification or access badges according to the level of clearance they have in the store. They are required to wear the badges at all times inside the premises. The store also utilizes a CIP-specific Electronic Access Control structure that safeguards access to the Critical Cyber Asset areas of the store. The Electronic Access Control Systems are also watched around the clock. 

Intrusion Alarms 

The store has installed intrusion alarms throughout the buildings and facilities for two main reasons. First, the alarms offer a 24-hour surveillance of remote points where employees are not often present. Second, they provide monitoring for every CIP-designated location in the store. The alarm devices comprise glass break, motion detection, and door/window contacts. The intrusion alarms are also under 24-hour monitoring. 

Security Guards 

The store utilizes contracted private security firms to offer security services for the entire premises. There are guards at every store building and facilities of special interest. Also, “patrol” security guards are required to carry out security checks of all major store properties. 

Law Enforcement Support 

The store has strived to create and maintain strong relationships with the local law enforcement agencies. Such agencies contribute to the store’s security efforts via concerted responses to incidences regarding security, hands-on meetings, observation rounds, and training and exercises ( Busch, 2012 ). 

Danger Recognition and Reporting 

According to the National Infrastructure Protection Plan, the store’s facilities are deemed vital infrastructure. Therefore, attacks on vital infrastructure cause a disruption of important store operations and systems. As a result, store personnel needs guidance on identifying and reporting probable dangerous incidents. 

Security personnel is tasked with investigating reports of suspicious events and relaying relevant information to the System Operating Personnel in the store. If necessary, they are required to share such information with local law enforcement agencies and investigative consultants ( Busch and Givens, 2012 ). The security personnel is also responsible for retaining the records of sabotage-related incidents and updating security procedures accordingly. On the other hand, System Operating Personnel is required to provide information regarding suspicious activities that may constitute sabotage to relevant authorities within the interconnection. They are also required to submit the Disturbance Report Form OE-417 in cases of electric incidents and emergencies. 

Reporting and Response Procedures 

The key to securing the store’s buildings and important facilities is to be vigilant of events in and around such areas. A prompt detection and recognition of sabotage incidents, whether probable or real, are vital to the safety of the store's buildings and facilities. Sabotage, in this case, refers to a deliberate effort to interfere with store business and operations by subversion, obstruction, or destruction. In other words, sabotage is used to disrupt the work or social environment of a given setting. For the store, sabotage may be perpetrated by disgruntled staff, hostile members of the public, or terrorists. For instance, civil disturbances may constitute attempted sabotage where a particular group’s intentions may be contrary to the store’s cause. 

There are several suspicious events that indicate a probable or real attempted sabotage, including and limited to the following: (i) a sequences of insignificant actions of vandalism within the store’s premises; (ii) external verbal or printed threats to facilities, operations, or security by an individual or group which is not directly linked to the store; (iii) internal verbal or printed threats to facilities, operations, or security by an individual or group that is not directly linked to the store; (iv) unauthorized individuals requesting information for the purpose of intelligence gathering on the store’s operations, telecommunications, and facilities; or (iv) a significant volume of unapproved attempts to an important facility or building. 

Reporting Potential or Actual Sabotage Activities 

Store employees who identify an incident, activity, or conduct involving store buildings, facilities or other property that they deem to be inappropriate and likely to lead to sabotage are required to report them to the nearest security personnel. The details that would help the security department resolve such issues include the date and time, location, physical description of the suspicious person, and the description of the suspicious activity. For a more effective and timely response, store employees are encouraged to report suspicious occurrences as soon as they can to the security department. Reporting can be done by initiating a phone call to the security department, or, if the suspicious incident does not necessarily require a high level of urgency, by submitting a suspicious activity or incident report form found on the security department’s web page. 

Emergency Response 

The store’s emergency response is in line with an “all-hazards” approach. Such incidences include criminal activity, serious accidents, civil disturbances, windstorms, floods, fires and bomb threats. Building Evacuation 

The store building may need to be evacuated for and not limited to such incidents as hostage situations, gas or water leaks, power outages, bomb threats, and fire. Notification is made through the intercom system, alarm system, or directly or electronically from specific emergency personnel. In the event of an emergency, people are not supposed to run or panic, re-enter the building unless permitted, use elevators, or gather at entrances. In the case of disabled individuals, assistance shall be provided only by floor wardens or other designated emergency personnel. 

Employee Responsibilities 

All store employees are required to identify the locations of fire extinguishers, first aid kits, and emergency exits. They are expected to know how to use fire extinguishers whenever it is safe to do so. They are also required to regularly review evacuation plan maps and attached floor plans. 

Conclusions and Recommendations 

This paper provides an overview of the Security Plan of a Wal-Mart department store. The security systems included in this report are fences and gates, exterior lighting, CCTV, Electronic Access Control, intrusion alarms, security guards, and law enforcement support. The report also includes an outline of danger recognition and reporting and emergency response procedures. 

This paper recommends that the store should consider applying principles of the Incident Command System (ICS) when handling major incidents ( Schumacher et al., 2013 ). The application of this system involves three lines of action including the assembly of an Incident Management Team (IMT), the coordination of inside and outside stakeholders including fire services and law enforcement agencies, and the establishment of a Unified Command, if necessary. 

References 

Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., & Sommerlad, P. (2013).    Security Patterns: Integrating security and systems engineering . John Wiley & Sons. 

Fischer, R., Halibozek, E. P., & Walters, D. (2012).    Introduction to security . Butterworth-Heinemann. 

Busch, N. E., & Givens, A. D. (2012). Public-private partnerships in homeland security: Opportunities and challenges.    Homeland Security Affairs ,    8 (1). 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Security Plan for Wal-Mart Store.
https://studybounty.com/security-plan-for-wal-mart-store-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Cruel and Unusual Punishments

Since the beginning of society, human behaviour has remained to be explained by the social forces that take control. Be it negative or positive, the significance of social forces extend to explain the behaviour of...

Words: 1329

Pages: 5

Views: 104

Serial Killers Phenomena: The Predisposing Factors

CHAPTER 1: INTRODUCTION _Background information _ Ronald and Stephen Holmes in their article _Contemporary Perspective on Serial Murder_ define a serial killer as anyone who murders more than 3 people in a span...

Words: 3648

Pages: 14

Views: 442

Patent Protection Problem

A patent offers inventors the right for a limited period to prevent other people from using or sharing an invention without their authorization. When a patent right is granted to inventors, they are given a limited...

Words: 1707

Pages: 6

Views: 275

General Aspects of Nonprofit Organizations

Nonprofit organizations are prone to the long and tedious legal process of start-up as compared to their for-profit organizations. However, there are similar rules that govern the startup and the existence of both...

Words: 294

Pages: 1

Views: 73

Contract Performance, Breach, and Remedies: Contract Discharge

1\. State whether you conclude the Amended Warehouse Lease is enforceable by Guettinger, or alternatively, whether the Amended Warehouse Lease is null and void, and Smith, therefore, does not have to pay the full...

Words: 291

Pages: 1

Views: 135

US Customs Border Control

Introduction The United States Border Patrol is the federal security law enforcement agency with the task to protect America from illegal immigrants, terrorism and the weapons of mass destruction from entering...

Words: 1371

Pages: 7

Views: 118

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration