Proprietary Versus Contract Security
Proper security measures play a huge role in the successful operation of an organization. As the security manager for a company that manufactures high-tech components for an international automobile manufacturer I have been tasked with finding new personnel to ensure security measures are met. There are two different types of security I can choose from; proprietary and contract security. I have done extensive research on the two, to help me make the correct decision for this company. There are some advantages and disadvantages to each type; so I had to find the one that best matches the needs of this company. Proprietary and contract security have the same objectives. They protect the company that they are providing security for. This includes protecting company assets, confident material, ensuring the safety of personnel and consumers, and building. Proprietary security is controlled internally by the company. The company is responsible for hiring new personnel, firing personnel, and appointing management to lead their personnel. They have to be familiar with all the laws and guidelines that must be followed. The security personnel are trained to the specific needs of the company, which helps them become more familiar with the building layout, and recognize the people and employees coming in and out of the building. The company is in charge of the background checks and proper measures; ensuring the applicant has the proper skills and training to carry out their job. Contract security is a contract signed by the company requesting security from a professional outside security agency. Because of high employee turnover rates security personnel do not become friendly and familiar with employees or the building. This can negatively impact the company because the security personnel’s loyalty, commitment and performance may adversely be affected. The company does not deal with the background checks, skills, training, etc. This...
References: Consador, K. (1999-2013). eHow. Retrieved from
Writing, A. (1999-2013). eHow. Retrieved from
Cohen, J. (). National Criminal Justice Reference Service. Retrieved from
Clifford, M. (2004). Identifying and Exploring Security Essentials . Retrieved from
The University of Phoenix eBook Collection database.
Please join StudyMode to read the full document