SlideShare uma empresa Scribd logo
1 de 22
Securitas Security & Safety Risk Assessment

1
Who are Securitas?

Group 4| HR Project # 4 Performance Management | October 2010

2
•

Security Experts, focusing exclusively upon all aspects of Security

•

A leader in the delivery of manned guarding and integrated Service Solutions

•

We are the UK’s second largest security provider

•
•

3

We have a 12.09 % share of the UK security market [ Source; infologue May 2013]

We employ over 16,000 highly trained employees in the UK

3
Who are our Cultural Partners?

Group 4| HR Project # 4 Performance Management | October 2010

4
Collection Trust / Securitas partnership

Our Shared Mission
• Raise Security Awareness throughout the Sector and offer our Expertise and Support

Our Partnership Goal
• Increase the protection of collections within Cultural Heritage Organisations

5

5
Something to think about...

Group 4| HR Project # 4 Performance Management | October 2010

6


It is more economical to provide an
effective protection program for your
institution and your collections than to
attempt to recover collections lost from
theft fire or natural disasters



A very effective means to improve
Cultural Property protection is to make
it the concern of everybody on the
premises.

7
The first step to protecting your
collections is to understand the
main threats…

Group 4| HR Project # 4 Performance Management | October 2010

8
•

Value as Pieces of Art

•

Value in Object Material

Theft

Damage

Fire

Flood

9
There are steps you can take to
help mitigate these risks;

Group 4| HR Project # 4 Performance Management | October 2010

10
Security
Awareness

Know your
Collections

Know your collections / Security awareness
•
•
•
•

Understand the Financial / Historical value of your
collection
ReLocate High risk items to give Maximum Security
Coverage
Don’t become complacent
Contact your neighbourhood policing team (NPT) to make
them aware of your venue and the collections you hold

Know your
Collections
and your
Building

Security is
• Have a mission statement encompassing care and EVERYONE’S
safeguarding of the collection
Business
• Enforce Security Awareness at Staff Meetings
•
•
•

Motivating staff and giving them the tools needed to be
Security Aware.
Security Awareness training
Signs for visitors and staff encouraging vigilance and
enforcing security and rules
11
Regular Risk
Assessments

Risk assessments / Report incidents
•

•
•

EVA (Environment Visual Assessment) is an observational
walk around the museum inside and outside, to identify
areas of concern from threats.
Security Audit – Security Checklist available on Collections
Link. Securitas Security & Safety Risk Assessment (SCAN)
Risk should be managed by an on-going and continuous
cycle of assessment, planning, implementation and
review

Report Incidents
& Share Info

Regular Risk
Assessments

Report
Incidents and
Share
• Report threats and Incidents of theft, damage and vandalism
to the appropriate Authorities and organisations immediately
Knowledge
•
•

Share best practice and ideas with your colleagues
Join Groups such as NMSG, Linked In Collections
Management Group, Museum Security Network. (There are
many other Organisations that are useful sources of help and
advice such as Arts Council England)
12
As part of the Securitas Commitment
to the Culture Sector and through
our partnership with Collections Trust
we are offering you a free Security &
Safety risk assessment (SCAN)…

Group 4| HR Project # 4 Performance Management | October 2010

13
Security & Safety Risk Assessment (SCAN)

Securitas SCAN

• Highlights Weak Recommendations
Areas
• Confirms Areas of
Good Security
Identify Savings

14

Improved
Security

14
What principles does the Security &
Safety Risk Assessment focus on?

Group 4| HR Project # 4 Performance Management | October 2010

15
4 Ds of security

Alarms / Visible Cameras

Access Control

Deter
Guards

Signs

Lockdown
Procedure

Vigilant Staff

Deny
Access

ID checks

Security
Officer

Detect

CCTV
Perimeter
Barriers

Access Control
Intercepted by guard

Delay

Alarm Going Off

Lights coming on
16
What happens in a Securitas
Security & Safety Risk Assessment?

Group 4| HR Project # 4 Performance Management | October 2010

17
A Securitas Security Expert will visit the site at your convenience

The Security and Safety risk assessment is free and will take approx. 1-2 hours

Key areas of your current security provision will be looked at

Security Systems such as CCTV will be assessed for placement and clarity

Security and safety Weaknesses and Strengths will be highlighted and any cost saving initiatives
identified

Any security and safety issues / concerns will be discussed

After the visit, our recommendations will be sent to you within 7 days with no obligation

18

18
Why should you call and book
your Securitas Security &
Safety risk assessment?

Group 4| HR Project # 4 Performance Management | October 2010

19
No
Obligation
recommendations

Opportunity to
discuss any
security
concerns

Visit Carried
out by a
Securitas
security
expert

Security
& Safety
SCAN

Can help with
identifying
cost saving
initiatives

Totally FREE
security &
safety risk
assessment

Highlights
current
Security
Strengths

identifies
weak areas
of Security
Specialist
Cultural
Security
Expertise

20

20
For more information or to book your free Security
& Safety SCAN contact Donna Phillips now on;
07931 356106 / donna.phillips@securitas.uk.com

Securitas want to be the Security Partner of
Choice within the Cultural Tourism Sector ;

21

21
Integrity | Vigilance | Helpfulness

securitas.com
Group 4| HR Project # 4 Performance Management | October 2010

22

Mais conteúdo relacionado

Mais procurados

Adaptive Defense_Case Studies_INDRA_EN
Adaptive Defense_Case Studies_INDRA_ENAdaptive Defense_Case Studies_INDRA_EN
Adaptive Defense_Case Studies_INDRA_ENPhilip Walthew
 
Securitas Final Presentation
Securitas Final PresentationSecuritas Final Presentation
Securitas Final Presentationjmcarleton
 
Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdSabrina Chan
 
Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...
Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...
Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...Dieter Moll
 
PAUL ROBERTS CV PRIVATE INVESTIGATOR & SURVEILLANCE OPERATOR
PAUL ROBERTS CV PRIVATE INVESTIGATOR & SURVEILLANCE OPERATORPAUL ROBERTS CV PRIVATE INVESTIGATOR & SURVEILLANCE OPERATOR
PAUL ROBERTS CV PRIVATE INVESTIGATOR & SURVEILLANCE OPERATORPaul Roberts
 
Keeping Denial of Service and Financial Fraud out of Your Contact Center
Keeping Denial of Service and Financial Fraud out of Your Contact CenterKeeping Denial of Service and Financial Fraud out of Your Contact Center
Keeping Denial of Service and Financial Fraud out of Your Contact CenterCase IQ
 
Phase One Security Limited Brochure
Phase One Security Limited BrochurePhase One Security Limited Brochure
Phase One Security Limited Brochurekelvinmoralesy
 
Orion Management_Slick Sheet_5 Oct 2015
Orion Management_Slick Sheet_5 Oct 2015Orion Management_Slick Sheet_5 Oct 2015
Orion Management_Slick Sheet_5 Oct 2015Melissa Bulluck
 
Corporate Presentation - Wary Group
Corporate Presentation - Wary GroupCorporate Presentation - Wary Group
Corporate Presentation - Wary GroupAtul Tyagi
 
Commuter Protection Service Profile
Commuter Protection Service ProfileCommuter Protection Service Profile
Commuter Protection Service ProfileMolefi Majoang
 
Servexo client presentation
Servexo client presentation Servexo client presentation
Servexo client presentation NickChaires
 
Lynceus Overview
Lynceus OverviewLynceus Overview
Lynceus Overviewjpking8
 
SceneSafe Profile
SceneSafe ProfileSceneSafe Profile
SceneSafe ProfileAdam North
 
IFPI Marketing Brochure2016_Mockup5
IFPI Marketing Brochure2016_Mockup5IFPI Marketing Brochure2016_Mockup5
IFPI Marketing Brochure2016_Mockup5Jeff Wesson
 

Mais procurados (20)

Adaptive Defense_Case Studies_INDRA_EN
Adaptive Defense_Case Studies_INDRA_ENAdaptive Defense_Case Studies_INDRA_EN
Adaptive Defense_Case Studies_INDRA_EN
 
EYE_Brochure_email_version_aw
EYE_Brochure_email_version_awEYE_Brochure_email_version_aw
EYE_Brochure_email_version_aw
 
Securitas Final Presentation
Securitas Final PresentationSecuritas Final Presentation
Securitas Final Presentation
 
Presentation.SAINT
Presentation.SAINTPresentation.SAINT
Presentation.SAINT
 
Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data Ltd
 
Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...
Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...
Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...
 
PAUL ROBERTS CV PRIVATE INVESTIGATOR & SURVEILLANCE OPERATOR
PAUL ROBERTS CV PRIVATE INVESTIGATOR & SURVEILLANCE OPERATORPAUL ROBERTS CV PRIVATE INVESTIGATOR & SURVEILLANCE OPERATOR
PAUL ROBERTS CV PRIVATE INVESTIGATOR & SURVEILLANCE OPERATOR
 
Keeping Denial of Service and Financial Fraud out of Your Contact Center
Keeping Denial of Service and Financial Fraud out of Your Contact CenterKeeping Denial of Service and Financial Fraud out of Your Contact Center
Keeping Denial of Service and Financial Fraud out of Your Contact Center
 
Agent white profile
Agent white profileAgent white profile
Agent white profile
 
Phase One Security Limited Brochure
Phase One Security Limited BrochurePhase One Security Limited Brochure
Phase One Security Limited Brochure
 
Orion Management_Slick Sheet_5 Oct 2015
Orion Management_Slick Sheet_5 Oct 2015Orion Management_Slick Sheet_5 Oct 2015
Orion Management_Slick Sheet_5 Oct 2015
 
Corporate Presentation - Wary Group
Corporate Presentation - Wary GroupCorporate Presentation - Wary Group
Corporate Presentation - Wary Group
 
Commuter Protection Service Profile
Commuter Protection Service ProfileCommuter Protection Service Profile
Commuter Protection Service Profile
 
Servexo client presentation
Servexo client presentation Servexo client presentation
Servexo client presentation
 
Lynceus Overview
Lynceus OverviewLynceus Overview
Lynceus Overview
 
CGS - Security Training
CGS - Security TrainingCGS - Security Training
CGS - Security Training
 
SceneSafe Profile
SceneSafe ProfileSceneSafe Profile
SceneSafe Profile
 
Morne CV Only
Morne CV OnlyMorne CV Only
Morne CV Only
 
IFPI Marketing Brochure2016_Mockup5
IFPI Marketing Brochure2016_Mockup5IFPI Marketing Brochure2016_Mockup5
IFPI Marketing Brochure2016_Mockup5
 
OLUFEMI O. YUSUF CV
OLUFEMI O. YUSUF CVOLUFEMI O. YUSUF CV
OLUFEMI O. YUSUF CV
 

Destaque

Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Quantified Curiosity
Quantified CuriosityQuantified Curiosity
Quantified CuriosityAmy Robinson
 
LOW POWER DIGITAL DESIGN
LOW POWER DIGITAL DESIGNLOW POWER DIGITAL DESIGN
LOW POWER DIGITAL DESIGNIan Owen Raña
 
Development and implementation of metrics for information security risk asses...
Development and implementation of metrics for information security risk asses...Development and implementation of metrics for information security risk asses...
Development and implementation of metrics for information security risk asses...pero periuc
 
History of Computer Art XI, Pervasive Games
History of Computer Art XI, Pervasive GamesHistory of Computer Art XI, Pervasive Games
History of Computer Art XI, Pervasive GamesThomas Dreher
 
Ifma hospitality event-22-11-16_securitas
Ifma hospitality event-22-11-16_securitasIfma hospitality event-22-11-16_securitas
Ifma hospitality event-22-11-16_securitasMuriel Walter
 
History of Computer Art II, Cybernetic Sculptures
History of Computer Art II, Cybernetic SculpturesHistory of Computer Art II, Cybernetic Sculptures
History of Computer Art II, Cybernetic SculpturesThomas Dreher
 
Biomorphic Engineering
Biomorphic EngineeringBiomorphic Engineering
Biomorphic EngineeringIan Owen Raña
 
Cybernetics and the Pioneers of Computer Art
Cybernetics and the Pioneers of Computer ArtCybernetics and the Pioneers of Computer Art
Cybernetics and the Pioneers of Computer ArtThomas Dreher
 
History of Computer Art V, Computer Animation
History of Computer Art V, Computer AnimationHistory of Computer Art V, Computer Animation
History of Computer Art V, Computer AnimationThomas Dreher
 
Deep Networks with Neuromorphic VLSI devices
Deep Networks with Neuromorphic VLSI devicesDeep Networks with Neuromorphic VLSI devices
Deep Networks with Neuromorphic VLSI devicesGiacomo Indiveri
 
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...Jeffrey Funk
 
Surviving the strategy consulting case interview
Surviving the strategy consulting case interviewSurviving the strategy consulting case interview
Surviving the strategy consulting case interviewTop of Minds
 
Go-to-Market Strategy - Entrepreneurship 101 (2013/2014)
Go-to-Market Strategy - Entrepreneurship 101 (2013/2014)Go-to-Market Strategy - Entrepreneurship 101 (2013/2014)
Go-to-Market Strategy - Entrepreneurship 101 (2013/2014)MaRS Discovery District
 
What is a Go-to-Market Strategy & How to Create One
What is a Go-to-Market Strategy & How to Create OneWhat is a Go-to-Market Strategy & How to Create One
What is a Go-to-Market Strategy & How to Create OneCompellingPM
 
Neurosynaptic chips
Neurosynaptic chipsNeurosynaptic chips
Neurosynaptic chipsJeffrey Funk
 

Destaque (20)

Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Security Risk Assessment
Security Risk AssessmentSecurity Risk Assessment
Security Risk Assessment
 
Quantified Curiosity
Quantified CuriosityQuantified Curiosity
Quantified Curiosity
 
LOW POWER DIGITAL DESIGN
LOW POWER DIGITAL DESIGNLOW POWER DIGITAL DESIGN
LOW POWER DIGITAL DESIGN
 
Development and implementation of metrics for information security risk asses...
Development and implementation of metrics for information security risk asses...Development and implementation of metrics for information security risk asses...
Development and implementation of metrics for information security risk asses...
 
History of Computer Art XI, Pervasive Games
History of Computer Art XI, Pervasive GamesHistory of Computer Art XI, Pervasive Games
History of Computer Art XI, Pervasive Games
 
Ifma hospitality event-22-11-16_securitas
Ifma hospitality event-22-11-16_securitasIfma hospitality event-22-11-16_securitas
Ifma hospitality event-22-11-16_securitas
 
History of Computer Art II, Cybernetic Sculptures
History of Computer Art II, Cybernetic SculpturesHistory of Computer Art II, Cybernetic Sculptures
History of Computer Art II, Cybernetic Sculptures
 
Biomorphic Engineering
Biomorphic EngineeringBiomorphic Engineering
Biomorphic Engineering
 
Presentation 3
Presentation 3Presentation 3
Presentation 3
 
Cybernetics and the Pioneers of Computer Art
Cybernetics and the Pioneers of Computer ArtCybernetics and the Pioneers of Computer Art
Cybernetics and the Pioneers of Computer Art
 
History of Computer Art V, Computer Animation
History of Computer Art V, Computer AnimationHistory of Computer Art V, Computer Animation
History of Computer Art V, Computer Animation
 
Deep Networks with Neuromorphic VLSI devices
Deep Networks with Neuromorphic VLSI devicesDeep Networks with Neuromorphic VLSI devices
Deep Networks with Neuromorphic VLSI devices
 
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
 
McKinsey Uberisé ?
McKinsey Uberisé ?McKinsey Uberisé ?
McKinsey Uberisé ?
 
Healthy Mind
Healthy MindHealthy Mind
Healthy Mind
 
Surviving the strategy consulting case interview
Surviving the strategy consulting case interviewSurviving the strategy consulting case interview
Surviving the strategy consulting case interview
 
Go-to-Market Strategy - Entrepreneurship 101 (2013/2014)
Go-to-Market Strategy - Entrepreneurship 101 (2013/2014)Go-to-Market Strategy - Entrepreneurship 101 (2013/2014)
Go-to-Market Strategy - Entrepreneurship 101 (2013/2014)
 
What is a Go-to-Market Strategy & How to Create One
What is a Go-to-Market Strategy & How to Create OneWhat is a Go-to-Market Strategy & How to Create One
What is a Go-to-Market Strategy & How to Create One
 
Neurosynaptic chips
Neurosynaptic chipsNeurosynaptic chips
Neurosynaptic chips
 

Semelhante a Introducing the Securitas Security & Safety Risk Assessment

Sqr creds pres 301116
Sqr creds pres 301116Sqr creds pres 301116
Sqr creds pres 301116Krissy Regan
 
THE NAKOTA PRODUCTS_AND_SERVICES_2014
THE NAKOTA PRODUCTS_AND_SERVICES_2014THE NAKOTA PRODUCTS_AND_SERVICES_2014
THE NAKOTA PRODUCTS_AND_SERVICES_2014Eugenia Bulanova
 
Course English for safety leadership and management
Course English for safety leadership and managementCourse English for safety leadership and management
Course English for safety leadership and managementCarlo Bisio (1000 +)
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
SY0-701 Dumps | SY0-701 Preparation Kit
SY0-701 Dumps | SY0-701 Preparation KitSY0-701 Dumps | SY0-701 Preparation Kit
SY0-701 Dumps | SY0-701 Preparation Kitbronxfugly43
 
TSpencer ASIS London CommSec170412 vWeb
TSpencer ASIS London CommSec170412 vWebTSpencer ASIS London CommSec170412 vWeb
TSpencer ASIS London CommSec170412 vWebTanya Spencer
 
OPTIMIT - We are the Risk Management Company
OPTIMIT - We are the Risk Management CompanyOPTIMIT - We are the Risk Management Company
OPTIMIT - We are the Risk Management CompanyLaurens Smeyers
 
Ants and Elephants in the CISO's Office by Paul Rain
Ants and Elephants in the CISO's Office by Paul RainAnts and Elephants in the CISO's Office by Paul Rain
Ants and Elephants in the CISO's Office by Paul RainPriyanka Aash
 
Blue Line Operations
Blue Line OperationsBlue Line Operations
Blue Line Operationsinfo910855
 
2nd Q - course program portfolio
 2nd Q - course program portfolio 2nd Q - course program portfolio
2nd Q - course program portfolioDieter Moll
 
RCS 2nd Q - course program portfolio
RCS 2nd Q - course program portfolioRCS 2nd Q - course program portfolio
RCS 2nd Q - course program portfolioDieter Moll
 
2nd q - course program portfolio
2nd q - course program portfolio2nd q - course program portfolio
2nd q - course program portfolioDieter Moll
 
RCS (Dieter MOLL lead trainer) - 2nd Q v1.2 - course program portfolio
RCS (Dieter MOLL lead trainer) - 2nd Q v1.2 - course program portfolio RCS (Dieter MOLL lead trainer) - 2nd Q v1.2 - course program portfolio
RCS (Dieter MOLL lead trainer) - 2nd Q v1.2 - course program portfolio Dieter Moll
 
TFIS Service Presenter 2011 Edition
TFIS Service Presenter 2011 EditionTFIS Service Presenter 2011 Edition
TFIS Service Presenter 2011 EditionJason Cooper
 
TFIS Service Presenter 2011 Edition
TFIS Service Presenter 2011 EditionTFIS Service Presenter 2011 Edition
TFIS Service Presenter 2011 EditionNeil Cornwell
 
2023 NCIT: Essentials for a CERT
2023 NCIT: Essentials for a CERT2023 NCIT: Essentials for a CERT
2023 NCIT: Essentials for a CERTAPNIC
 

Semelhante a Introducing the Securitas Security & Safety Risk Assessment (20)

Sqr creds pres 301116
Sqr creds pres 301116Sqr creds pres 301116
Sqr creds pres 301116
 
Nuclear Industry Resilience
Nuclear Industry ResilienceNuclear Industry Resilience
Nuclear Industry Resilience
 
THE NAKOTA PRODUCTS_AND_SERVICES_2014
THE NAKOTA PRODUCTS_AND_SERVICES_2014THE NAKOTA PRODUCTS_AND_SERVICES_2014
THE NAKOTA PRODUCTS_AND_SERVICES_2014
 
Course English for safety leadership and management
Course English for safety leadership and managementCourse English for safety leadership and management
Course English for safety leadership and management
 
RCN - Company Profile
RCN - Company ProfileRCN - Company Profile
RCN - Company Profile
 
Sis Security PPT
Sis Security PPTSis Security PPT
Sis Security PPT
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
SY0-701 Dumps | SY0-701 Preparation Kit
SY0-701 Dumps | SY0-701 Preparation KitSY0-701 Dumps | SY0-701 Preparation Kit
SY0-701 Dumps | SY0-701 Preparation Kit
 
TSpencer ASIS London CommSec170412 vWeb
TSpencer ASIS London CommSec170412 vWebTSpencer ASIS London CommSec170412 vWeb
TSpencer ASIS London CommSec170412 vWeb
 
OPTIMIT - We are the Risk Management Company
OPTIMIT - We are the Risk Management CompanyOPTIMIT - We are the Risk Management Company
OPTIMIT - We are the Risk Management Company
 
Ants and Elephants in the CISO's Office by Paul Rain
Ants and Elephants in the CISO's Office by Paul RainAnts and Elephants in the CISO's Office by Paul Rain
Ants and Elephants in the CISO's Office by Paul Rain
 
Blue Line Operations
Blue Line OperationsBlue Line Operations
Blue Line Operations
 
2nd Q - course program portfolio
 2nd Q - course program portfolio 2nd Q - course program portfolio
2nd Q - course program portfolio
 
RCS 2nd Q - course program portfolio
RCS 2nd Q - course program portfolioRCS 2nd Q - course program portfolio
RCS 2nd Q - course program portfolio
 
2nd q - course program portfolio
2nd q - course program portfolio2nd q - course program portfolio
2nd q - course program portfolio
 
Corporate Presentation
Corporate PresentationCorporate Presentation
Corporate Presentation
 
RCS (Dieter MOLL lead trainer) - 2nd Q v1.2 - course program portfolio
RCS (Dieter MOLL lead trainer) - 2nd Q v1.2 - course program portfolio RCS (Dieter MOLL lead trainer) - 2nd Q v1.2 - course program portfolio
RCS (Dieter MOLL lead trainer) - 2nd Q v1.2 - course program portfolio
 
TFIS Service Presenter 2011 Edition
TFIS Service Presenter 2011 EditionTFIS Service Presenter 2011 Edition
TFIS Service Presenter 2011 Edition
 
TFIS Service Presenter 2011 Edition
TFIS Service Presenter 2011 EditionTFIS Service Presenter 2011 Edition
TFIS Service Presenter 2011 Edition
 
2023 NCIT: Essentials for a CERT
2023 NCIT: Essentials for a CERT2023 NCIT: Essentials for a CERT
2023 NCIT: Essentials for a CERT
 

Mais de Collections Trust

Developing Collections Management Skills
Developing Collections Management SkillsDeveloping Collections Management Skills
Developing Collections Management SkillsCollections Trust
 
Cultural Property - an introduction
Cultural Property - an introductionCultural Property - an introduction
Cultural Property - an introductionCollections Trust
 
Photography & Collections Management in Museums
Photography & Collections Management in MuseumsPhotography & Collections Management in Museums
Photography & Collections Management in MuseumsCollections Trust
 
Introducing the Campaign for Good Curatorship
Introducing the Campaign for Good CuratorshipIntroducing the Campaign for Good Curatorship
Introducing the Campaign for Good CuratorshipCollections Trust
 
Opening up museum collections online
Opening up museum collections onlineOpening up museum collections online
Opening up museum collections onlineCollections Trust
 
Nothing About Us Without Us: Community engagement & technology in museums
Nothing About Us Without Us: Community engagement & technology in museums Nothing About Us Without Us: Community engagement & technology in museums
Nothing About Us Without Us: Community engagement & technology in museums Collections Trust
 
Collections Trust Seminar - Exeter
Collections Trust Seminar - ExeterCollections Trust Seminar - Exeter
Collections Trust Seminar - ExeterCollections Trust
 
Collections Trust Seminar - Brighton
Collections Trust Seminar - BrightonCollections Trust Seminar - Brighton
Collections Trust Seminar - BrightonCollections Trust
 
Collections Trust Seminar - Colchester, March 2015
Collections Trust Seminar - Colchester, March 2015Collections Trust Seminar - Colchester, March 2015
Collections Trust Seminar - Colchester, March 2015Collections Trust
 
Collections Trust 'Going Digital' workshop
Collections Trust 'Going Digital' workshopCollections Trust 'Going Digital' workshop
Collections Trust 'Going Digital' workshopCollections Trust
 
Copyright Seminar - February 2015
Copyright Seminar - February 2015Copyright Seminar - February 2015
Copyright Seminar - February 2015Collections Trust
 
Understanding Heritage in 3D
Understanding Heritage in 3DUnderstanding Heritage in 3D
Understanding Heritage in 3DCollections Trust
 
Going Digital - Introductory Workshop
Going Digital - Introductory WorkshopGoing Digital - Introductory Workshop
Going Digital - Introductory WorkshopCollections Trust
 
Collections Trust Going Digital Training Materials
Collections Trust Going Digital Training MaterialsCollections Trust Going Digital Training Materials
Collections Trust Going Digital Training MaterialsCollections Trust
 
Collections Trust Seminar - York, January 2014
Collections Trust Seminar - York, January 2014Collections Trust Seminar - York, January 2014
Collections Trust Seminar - York, January 2014Collections Trust
 
Introducing 'Investors in Collections' - a new development tool for museums
Introducing 'Investors in Collections' - a new development tool for museumsIntroducing 'Investors in Collections' - a new development tool for museums
Introducing 'Investors in Collections' - a new development tool for museumsCollections Trust
 
Writing effective grant proposals for Collections projects
Writing effective grant proposals for Collections projectsWriting effective grant proposals for Collections projects
Writing effective grant proposals for Collections projectsCollections Trust
 
Striking the Balance - public access and commercial reuse of digital content
Striking the Balance - public access and commercial reuse of digital contentStriking the Balance - public access and commercial reuse of digital content
Striking the Balance - public access and commercial reuse of digital contentCollections Trust
 
Collections Trust Seminar - Manchester, November 2014
Collections Trust Seminar - Manchester, November 2014Collections Trust Seminar - Manchester, November 2014
Collections Trust Seminar - Manchester, November 2014Collections Trust
 

Mais de Collections Trust (20)

Developing Collections Management Skills
Developing Collections Management SkillsDeveloping Collections Management Skills
Developing Collections Management Skills
 
Cultural Property - an introduction
Cultural Property - an introductionCultural Property - an introduction
Cultural Property - an introduction
 
Photography & Collections Management in Museums
Photography & Collections Management in MuseumsPhotography & Collections Management in Museums
Photography & Collections Management in Museums
 
Introducing the Campaign for Good Curatorship
Introducing the Campaign for Good CuratorshipIntroducing the Campaign for Good Curatorship
Introducing the Campaign for Good Curatorship
 
The Digitisation Machine
The Digitisation MachineThe Digitisation Machine
The Digitisation Machine
 
Opening up museum collections online
Opening up museum collections onlineOpening up museum collections online
Opening up museum collections online
 
Nothing About Us Without Us: Community engagement & technology in museums
Nothing About Us Without Us: Community engagement & technology in museums Nothing About Us Without Us: Community engagement & technology in museums
Nothing About Us Without Us: Community engagement & technology in museums
 
Collections Trust Seminar - Exeter
Collections Trust Seminar - ExeterCollections Trust Seminar - Exeter
Collections Trust Seminar - Exeter
 
Collections Trust Seminar - Brighton
Collections Trust Seminar - BrightonCollections Trust Seminar - Brighton
Collections Trust Seminar - Brighton
 
Collections Trust Seminar - Colchester, March 2015
Collections Trust Seminar - Colchester, March 2015Collections Trust Seminar - Colchester, March 2015
Collections Trust Seminar - Colchester, March 2015
 
Collections Trust 'Going Digital' workshop
Collections Trust 'Going Digital' workshopCollections Trust 'Going Digital' workshop
Collections Trust 'Going Digital' workshop
 
Copyright Seminar - February 2015
Copyright Seminar - February 2015Copyright Seminar - February 2015
Copyright Seminar - February 2015
 
Understanding Heritage in 3D
Understanding Heritage in 3DUnderstanding Heritage in 3D
Understanding Heritage in 3D
 
Going Digital - Introductory Workshop
Going Digital - Introductory WorkshopGoing Digital - Introductory Workshop
Going Digital - Introductory Workshop
 
Collections Trust Going Digital Training Materials
Collections Trust Going Digital Training MaterialsCollections Trust Going Digital Training Materials
Collections Trust Going Digital Training Materials
 
Collections Trust Seminar - York, January 2014
Collections Trust Seminar - York, January 2014Collections Trust Seminar - York, January 2014
Collections Trust Seminar - York, January 2014
 
Introducing 'Investors in Collections' - a new development tool for museums
Introducing 'Investors in Collections' - a new development tool for museumsIntroducing 'Investors in Collections' - a new development tool for museums
Introducing 'Investors in Collections' - a new development tool for museums
 
Writing effective grant proposals for Collections projects
Writing effective grant proposals for Collections projectsWriting effective grant proposals for Collections projects
Writing effective grant proposals for Collections projects
 
Striking the Balance - public access and commercial reuse of digital content
Striking the Balance - public access and commercial reuse of digital contentStriking the Balance - public access and commercial reuse of digital content
Striking the Balance - public access and commercial reuse of digital content
 
Collections Trust Seminar - Manchester, November 2014
Collections Trust Seminar - Manchester, November 2014Collections Trust Seminar - Manchester, November 2014
Collections Trust Seminar - Manchester, November 2014
 

Último

Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 

Último (20)

Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 

Introducing the Securitas Security & Safety Risk Assessment

  • 1. Securitas Security & Safety Risk Assessment 1
  • 2. Who are Securitas? Group 4| HR Project # 4 Performance Management | October 2010 2
  • 3. • Security Experts, focusing exclusively upon all aspects of Security • A leader in the delivery of manned guarding and integrated Service Solutions • We are the UK’s second largest security provider • • 3 We have a 12.09 % share of the UK security market [ Source; infologue May 2013] We employ over 16,000 highly trained employees in the UK 3
  • 4. Who are our Cultural Partners? Group 4| HR Project # 4 Performance Management | October 2010 4
  • 5. Collection Trust / Securitas partnership Our Shared Mission • Raise Security Awareness throughout the Sector and offer our Expertise and Support Our Partnership Goal • Increase the protection of collections within Cultural Heritage Organisations 5 5
  • 6. Something to think about... Group 4| HR Project # 4 Performance Management | October 2010 6
  • 7.  It is more economical to provide an effective protection program for your institution and your collections than to attempt to recover collections lost from theft fire or natural disasters  A very effective means to improve Cultural Property protection is to make it the concern of everybody on the premises. 7
  • 8. The first step to protecting your collections is to understand the main threats… Group 4| HR Project # 4 Performance Management | October 2010 8
  • 9. • Value as Pieces of Art • Value in Object Material Theft Damage Fire Flood 9
  • 10. There are steps you can take to help mitigate these risks; Group 4| HR Project # 4 Performance Management | October 2010 10
  • 11. Security Awareness Know your Collections Know your collections / Security awareness • • • • Understand the Financial / Historical value of your collection ReLocate High risk items to give Maximum Security Coverage Don’t become complacent Contact your neighbourhood policing team (NPT) to make them aware of your venue and the collections you hold Know your Collections and your Building Security is • Have a mission statement encompassing care and EVERYONE’S safeguarding of the collection Business • Enforce Security Awareness at Staff Meetings • • • Motivating staff and giving them the tools needed to be Security Aware. Security Awareness training Signs for visitors and staff encouraging vigilance and enforcing security and rules 11
  • 12. Regular Risk Assessments Risk assessments / Report incidents • • • EVA (Environment Visual Assessment) is an observational walk around the museum inside and outside, to identify areas of concern from threats. Security Audit – Security Checklist available on Collections Link. Securitas Security & Safety Risk Assessment (SCAN) Risk should be managed by an on-going and continuous cycle of assessment, planning, implementation and review Report Incidents & Share Info Regular Risk Assessments Report Incidents and Share • Report threats and Incidents of theft, damage and vandalism to the appropriate Authorities and organisations immediately Knowledge • • Share best practice and ideas with your colleagues Join Groups such as NMSG, Linked In Collections Management Group, Museum Security Network. (There are many other Organisations that are useful sources of help and advice such as Arts Council England) 12
  • 13. As part of the Securitas Commitment to the Culture Sector and through our partnership with Collections Trust we are offering you a free Security & Safety risk assessment (SCAN)… Group 4| HR Project # 4 Performance Management | October 2010 13
  • 14. Security & Safety Risk Assessment (SCAN) Securitas SCAN • Highlights Weak Recommendations Areas • Confirms Areas of Good Security Identify Savings 14 Improved Security 14
  • 15. What principles does the Security & Safety Risk Assessment focus on? Group 4| HR Project # 4 Performance Management | October 2010 15
  • 16. 4 Ds of security Alarms / Visible Cameras Access Control Deter Guards Signs Lockdown Procedure Vigilant Staff Deny Access ID checks Security Officer Detect CCTV Perimeter Barriers Access Control Intercepted by guard Delay Alarm Going Off Lights coming on 16
  • 17. What happens in a Securitas Security & Safety Risk Assessment? Group 4| HR Project # 4 Performance Management | October 2010 17
  • 18. A Securitas Security Expert will visit the site at your convenience The Security and Safety risk assessment is free and will take approx. 1-2 hours Key areas of your current security provision will be looked at Security Systems such as CCTV will be assessed for placement and clarity Security and safety Weaknesses and Strengths will be highlighted and any cost saving initiatives identified Any security and safety issues / concerns will be discussed After the visit, our recommendations will be sent to you within 7 days with no obligation 18 18
  • 19. Why should you call and book your Securitas Security & Safety risk assessment? Group 4| HR Project # 4 Performance Management | October 2010 19
  • 20. No Obligation recommendations Opportunity to discuss any security concerns Visit Carried out by a Securitas security expert Security & Safety SCAN Can help with identifying cost saving initiatives Totally FREE security & safety risk assessment Highlights current Security Strengths identifies weak areas of Security Specialist Cultural Security Expertise 20 20
  • 21. For more information or to book your free Security & Safety SCAN contact Donna Phillips now on; 07931 356106 / donna.phillips@securitas.uk.com Securitas want to be the Security Partner of Choice within the Cultural Tourism Sector ; 21 21
  • 22. Integrity | Vigilance | Helpfulness securitas.com Group 4| HR Project # 4 Performance Management | October 2010 22