Wednesday, September 11, 2019
Jus 104 Week 4 Short Paper Coursework Example | Topics and Well Written Essays - 500 words
Jus 104 Week 4 Short Paper - Coursework Example With few guards who are often overwhelmed during peak hours, it becomes hard for them to accurately conduct the security checks and certify the visitors (Sennewald 88-92). Subsequently, by being less, few of the guards are assigned to monitor the alarm systems; thus, making it hard to make predictions in case of security breaches. The inadequacy of inspection and conducting of after-hours security checking of the facility is a great deficiency to the facility because it is during such periods that security systems of the facility are infiltrated and posing a security threat to the facility. Subsequently, by not adequately following the required security procedures especially during lunch hours. This is because, such moments can be used to attacking the facility and its systems easily given that no adequate checks are conducted. Except for the deficiencies, the facility has maintained good practices for its alarm system such as daily maintenance of the register of all visitors, use of identification badges by all employees, and issuing of visitor identification passes. These practices are good and essential in the sense that the visitorsââ¬â¢ register will keep a record of all the details of the visitors to the facility including their intended purpose of visit and the host person. Subsequently, the register documents the time when a visitor arrived and the time of departure; thus, making it easy for accountability purposes (Fischer, Edward & David 112-125). This practice is coupled by the issuing of passes or tags to visitors to be carried around whenever one is within the facility. Subsequently, the facility requires all employees to wear identification passes that distinguish them from other persons (Serrano, Eduardo & Jean-Yves 77-79). The passes also grant them access to specific areas that are not easily accessible by other persons for security purposes. It is recommended that for the facility to curb its security breaches
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.