Kevin Ian Schmidt

Safety Standards for Forklift Programs

As part of establishing proper safety standards for a forklift program, besides site specific safety precautions, you must be aware of OSHA requirements and know how to apply them.

 

If you are going to implement your own in-house operator training program, you should make yourself familiar with the OSHA standards for Powered Industrial trucks and any relevant operator’s manuals for the specific equipment at your workplace. OSHA mandates that your forklift operators meet or exceed the requirements of the OSHA standard 1910.178.

Proper safety standards for powered industrial truck training

  • Identify the types of powered industrial trucks in your workplace and those employees who will be required to operate the vehicles.
  • Identify your training methods.
  • Develop the content for your training program.
  • Provide for employee evaluation.
  • Include refresher training.

It is important to recognize that training, although essential, will not be enough to eliminate accidents. To be most effective, operator training should be part of a larger comprehensive powered industrial truck safety program that includes the following elements:

  • Hazard identification and possible solutions.
  • Training (of both truck operators and those personnel working near lift trucks) and evaluation of operator competence.
  • Supervision (site survey, ongoing hazard assessment).
  • Operating procedures (company policies, recordkeeping, safety practices).
  • Maintenance and repair procedures.
  • Facility design.
  • Lift truck selection criteria (equipment survey of truck types, attachments and modifications).

Truck-related Topics to Include in Driver Training [29 CFR 1910.178(l)(3)(i)]

  • Operating instructions, warnings, and precautions for the types of truck the operator will be authorized to operate.
  • Differences between the truck and the automobile.
  • Truck controls and instrumentation: where they are located, what they do, and how they work.
  • Engine or motor operation.
  • Steering and maneuvering.
  • Visibility (including restrictions due to loading).
  • Fork and attachment adaptation, operation, and use limitations.
  • Vehicle capacity.
  • Vehicle stability.
  • Any vehicle inspection and maintenance that the operator will be required to perform.
  • Refueling and/or charging and recharging of batteries.
  • Operating limitations.

 

As part of the safety standards of a comprehensive forklift safety program, you should have a daily forklift safety checklist, so equipment concerns are properly identified and corrected, and to ensure OSHA compliance(1910.178(q)(7)). OSHA does not mandate that the daily forklift inspections be recorded. Therefore, it is the employer’s discretion to establish the time period of powered industrial truck evaluation record retention.

So, despite the fact that OSHA does not mandate it, employing forklift assessment checklists, either written or electronic, are recommended for two reasons:

  • Makes certain that each of the fundamental features of the vehicle are inspected regularly, as well as
  • Provides you with proof to an OSHA inspector that the vehicles have been inspected like mandated.
Check Out: OSHA General Duty Clause

Recommended Forklift Safety Checklist Items:

  1. Does the forklift specification meet the operating requirement?
  2. Is clear forklift load placard provided?forklift safety standards
  3. Is seat belt provided and operable?
  4. Is the maximum speed controlled?
  5. Do horn, reversing beeper, proximity indicator and flashing light function properly?
  6. Is falling object protective structure (FOPS) provided on the forklift?
  7. Is the appropriate maintenance performed regularly?
  8. Are forklift maintenance and repair records maintained?
  9. Is there enough fuel inside forklift?
  10. Is forklift battery charged?
  11. Are the forklift tires in good condition?
  12. Do the forklift brakes work?
  13. Does the steering work well?
  14. Does the gear control work?
  15. Are the left and right mirrors available and clear?
  16. Do all indicators and gauges function properly?
  17. Are there any liquid leaks from the forklift?
  18. Are fuel, oil, hydraulic fluid and coolant levels enough?
  19. Is portable fire extinguisher fitted on the forklift?
  20. Is wearing hard hat a must for forklift operators?
  21. Any other personal protective equipment such as eye goggles, ear plugs and safety shoes required to be worn?
Looking to learn more about powered equipment safety? Check out the Powered Equipment Inspection Books I have published on Amazon, or any of my other posts on powered equipment safety

Powered Equipment Safety Standards that are often overlooked:

  • Approved trucks need to have a visible plate or some kind of identifying mark stating that it has been approved by the testing laboratory, this is usually included on a purchased truck. Routinely inspect to ensure that this plate remains attached.
  • Any modifications that affect the capacity and operation of the machine cannot be made without written consent of the manufacturer.
  • If the machine has had a front end attachment added to it, the user must see that the machine plate be updated to identify the use of the attachment, and the proper weight handling of the equipment when using the attachment.

 

 

When establishing an OSHA compliant forklift program, or reviewing your current program, below are some site specific questions you should use as guidelines:

Site Specific Powered Equipment Safety Standards

  1. Are there speed limits for powered equipment on site? Are they posted? Is the equipment speed limited?
  2. Are there appropriate traffic management plans at the plant site to prevent collision of forklifts with people and other mobile equipment by separating them in time or space? Do you have STOP signs posted? Do you have walkways for pedestrians clearly mapped out?
  3. Are all safety procedures related to forklift inspection, operation, clean up and maintenance established, maintained and communicated to related workers?
  4. Does monitoring and supervision system for ensuring all safety standards work?
  5. Do work schedules remove completely the necessity for extreme forklift speed?
  6. Are uncertified drivers allowed to operate forklift? Do you have a visible license requirement to ensure this?
  7. Is safe distance from the edge of ramps, docks, drains, gutters, floor openings and any other opening and obstacles established to prevent forklift accident?
  8. Are every ramp or dock edges safeguarded and visibly marked?
  9. Is the procedure for the safe battery charging or fuel filling established?

 

Now that we have established how to set-up a quality training, OSHA compliant training program, and understand how to identify site specific safety concerns, it is important to also have a solid record retention program.

Despite the fact that OSHA does not mandate the daily safety checklists be maintained, it is a best practice to retain them for a period of time, to establish to an OSHA inspector that the mandated inspections are performed.

 

You can follow this suggested Daily Safety Checklist record retention procedure, if you do not have an electronic form:

  • Have each daily checklist maintained on the equipment for the current day.
  • Have each form turned in to the supervisor at the end of the shift.

Maintain the records for 14days.

 

Forklift maintenance records should be maintained in a separate file. If the records are not maintained electronically, you can follow my suggested procedure:

  • Make a hanging file folder for each piece of equipment, organized by serial number.
  • Work with your repair vender, to invoice each repair or purchased parts by equipment serial number.

Maintain these records for 2years.

 

Establish a driver training log, so that you can provide an OSHA inspector with the list upon request, as well as track retraining dates. I suggest maintaining these records electronically, but if that is cost prohibitive, or if you want a physical copy as backup, here is my recommended procedure:

  • Combine each certified driver’s test, and equipment specific evaluation forms.
  • File each alphabetically in a binder, which is maintained by training year.
  • Once a month, audit the records against a list of terminated employees, remove those records and file in a terminated employee binder for the year.

Maintain these records for 3years.

890402767-forklift-safety-trained-300x300.png

 

Quality safety standards, a solid driver training program and a comprehensive record retention process are what is needed to ensure your program is safe and effective.

Physical Security Program; know the process

When a business hasn’t experienced a significant security incident for a while, C-suite executives typically become complacent and begin to question if all of the security procedures, systems and jobs currently set up are needed. However, complacency isn’t the right reason to reduce the security budget, particularly in a recession when crime usually increases. It is the responsibility of a security manager to make sure the organization always remembers the importance of physical security programs.

physical security programTo avoid an upswing in security incidents, security management should conduct a physical security audit of their facilities. Evaluating current physical security procedures will reveal areas where security might need to be increased to protect the company’s assets, including facilities and employees.

To design a cost-effective security program, you need to carefully consider developing a well-balanced program. While designing a well-balanced security program, you will need to take note of the 3 fundamental components of physical security strategy.

Types of Physical Security

  • Organizational (security staff and procedures as well as organizational security): Covering the involvement in the security programs by management, security staff, tenants and employees.
  • Mechanical (electronic systems): Covering the use of security hardware including access control, Closed Circuit Television (CCTV), door locks, monitoring systems, emergency call boxes and intrusion alarms.
  • Natural (architectural elements): Covering basic security philosophies involving property definition, natural surveillance and access control. Also known as Crime Prevention Through Environmental Design (CPTED), you are utilizing psychological techniques to reduce risk.

Unfortunately, countless security professionals concentrate too closely on just one of the three security concepts. A number of facilities depend too much on security guards who will be able to only protect a entrances or handle a limited number of people entering the building. Utilizing a massive security team is a sizable, long-term cost. Many other facilities concentrate on mechanical security, leaving their security team and tenants untrained and uninvolved in the security process. While other facilities go without the utilization of mechanical and organizational security, dependent upon the goodwill of others or simply the psychological effect of signage.

Establishing a security program that utilizes a balance of all the above physical security strategies, will keep the program flexible and ready to handle potential risks that may develop.

A physical security audit is the first step to proper design of a comprehensive physical security program. The following steps will walk you through the initial steps of conducting a physical security audit:

Check Out: Risk Assessment Guidelines

Examine Your Risks

Before you develop your security program, you must first determine the level of risk to your facility. The higher the risk, the greater need for physical security and planning. There are three forms of risk:

  • Terrorism (International and Domestic)
  • Criminal (Crimes against people and property)
  • Environmental (Risk from nature or manmade incidents)

First, ask yourself these questions:

  • Do you have neighbors who might attract unsafe individuals to your neighborhood for either terrorist or criminal activity?
  • Does your facility contain individuals or activity that might bring risk to your doorstep?
  • How well known is your facility on a local, national or international basis?
  • Is your facility near railroad tracks, major freeways or a toxic manufacturing/storage facility?
  • Are you near a university or college?
  • Is your facility near a public park or government facility?
  • Do any of the tenants in your building have negative media or internet exposure?
  • Are there certain organizations that are not thrilled with the existence of one of the tenants in your building?
  • What is the crime rate in your neighborhood?

The responses to these particular questions are going to determine the measure of risk for your facility. That is, an office building full of proctologists almost certainly carries a lower chance of terrorist attack compared to an office building containing a Federal Government Agency. A property positioned adjacent to an abortion clinic almost certainly carries a greater risk of becoming affected by safeguards or various other harmful events. A lot more Us office buildings have been evacuated as a result of toxic fumes from derailed trains and overturned trucks as compared to terrorist activities.

Check Out: Physical Security Risk Assessment: 9 tips to secure your workplace

Creating a Balanced Physical Security Program

Utilizing the aspects of organizational, natural and mechanical security you can develop layers of physical security around your facility.

Organizational Security

organizatinl physical securityTo begin with, who may be allowed in the building? The following recommendations come under the organizational method of physical security. In the event that your company is the solitary tenant of the building, what sort of background checks do you happen to be performing on new staff members or contractors? Are you able to know if the new personnel coming through the door is a legal resident of the United States of America? Does this new staff member have a record of violence, drug use or theft? In the event that they are handling cash, have you performed a credit check? Are you permitting undocumented associates of the cleaning staff to enjoy open access to every office in the facility at night? The expense of a background investigation for every new employee are dwarfed beside the losses you could possibly experience should you allow a violent person into your work site. In the event of contract companies providing staff to the facility, does the contract require the companies to perform background investigations of their staff, and can you at any time audit this process?
Do your tenants and staff members obtain some type of security and safety orientation? Will they be familiar with who to contact in an emergency? Do they understand who needs to have access to their work space? Do they know the emergency evacuation routes, and do they understand exactly where they need to meet once they evacuate the building so a headcount may be conducted? Is the lone emergency meeting location you have chosen in close proximity to any kind of potential neighborhood problems like a railroad track?

Do you have contact with community law enforcement representatives to know what is happening in your neighborhood? Do you have meetings with your neighboring businesses to discuss the issues they are facing? Could your company be impacted by a strike next door? Is one of your neighbors being threatened? Have any of your neighbors experienced an upswing in criminal activity? Do you have a clear communication method to pass this information to your tenants, employees, or neighbors?

More robust physical security controls, for instance physical security training as well as more effective background investigations, may have averted many of these attacks. Physical security controls consist of taking preventive measures to stop unauthorized physical access to restricted areas in addition to preventing physical theft. Insider threats to physical security may come from current or perhaps previous staff, contractors, or even respected business associates, which includes custodial personnel or security guards. Employees granted open access must be comprehensively vetted. As an example, custodial employees as well as security guards must submit to the exact same background investigation just like all the other insiders. Staff with this kind of access should likewise undergo regular security awareness training due to the fact their jobs cause them to become popular prey for social engineering attacks.

 

Natural Security

Now consider your facility perimeter utilizing natural security aspects. Look at your facility as a stranger might from the outside. Are your property boundaries clearly defined? Would a stranger know if he or she were walking or driving from public to private property? Is this clearly defined by signage or architectural design? Does the signage define the rules of your property? Are the rules enforced? Is your property given the appearance of being well maintained? Is graffiti quickly removed or covered? Are bushes trimmed low so they cannot be used for hiding? Is the lawn maintained? If you answered no to one or more of these questions, you will give the unsafe stranger the impression that you don’t care about your facility’s appearance and probably also do not care about security.

At night, is the area around your property dark and foreboding or well illuminated? Do your employees or tenants feel apprehension when they walk from your building to the parking lot or parking deck at night? Could they see danger at a distance or are there shadowy hiding areas where unsafe individuals could be lurking?

If you have a large parking lot or a parking deck, do you provide your employees, visitors or tenants emergency call boxes? Such call stations reduce the fear of isolation and distance. Are these boxes well illuminated and marked? Are they easily seen from all areas of the parking facility? Are the call boxes regularly checked to make sure they are working? Is there someone always ready to answer an emergency call from the call box? If the call comes in, will the person answering know where the call is coming from if the person making the call cannot speak?

 

Mechanical Security

The use of security hardware can greatly enhance your security program if there is a high risk to your property. How many entrances are there to your building? Are these entrances monitored? When we say monitored we could mean a lobby receptionist, a CCTV camera or an employee that can observe the entrance from his or her desk. Could an office creeper or stalker enter your facility without ever being seen or recorded by anyone or any system? Don’t forget about the back doors and the loading dock. These back doors can be a problem when they are left propped open by smokers. Limit the number of access points to your building and use some form of natural or mechanical surveillance so that those approaching and entering the facility have the feeling they are being monitored. You want to make the unsafe individual feel uncomfortable.

When using mechanical security systems, such as CCTV, look for systems that will give you the best bang for your buck. Which would be more helpful, a CCTV system that records individuals walking down a hallway at three in the morning or a system that records and alerts your monitoring station that someone is walking down that hallway and advising them what action may need to be taken? Make sure you are using all the features available in your security systems or that you purchase a system that meets your needs.

Access control systems provide a positive confirmation that the persons entering your facility or a particular strategic area are authorized. In very high-risk buildings or areas, the use access cards, combined with Personal Identification Numbers (PIN) key pad or a biometric reader will confirm a stolen access card is not being used to gain access.

Depending on the level of risk at your facility, you may want to introduce an inspection layer in your lobby. You may want to install signage that indicates you plan to randomly inspect packages carried in by visitors. You may have visitors walk through a magnetometer. Again, this will be defined by the potential threats to your facility.

One other access point is your air intake vents. This is not about a disgruntled ex-employee entering the facility through the vent, but instead introducing some toxic substances to your building to disrupt your operations. Are your air vents on the roof or at ground level? Many of these vents are in buildings built in the 1960’s, in the loading dock area where a badly positioned vehicle could introduce exhaust into the HVAC system. Are your ground-level air intakes monitored?

How quickly can you turn off your HVAC system in the event a foreign substance might be introduced to your system? Remember that question asked earlier about being near a railroad track, freeway or toxic manufacturing plant? If a toxic cloud were floating in the immediate area of your facility, how quickly could you turn off your HVAC system so the cloud is not sucked into the building? Before you say your HVAC system is automatically turned off when you sound the fire alarm, remember that audible fire alarm is also telling your employees and tenants to head outside into the toxic cloud when it might be safer to keep them inside your airtight building until the cloud disperses.

 

Levels of Response

Now that you created a balanced security program for your facility you have one additional concern. What will your security levels of response be? What we have described so far are the layers of security planned for your building on the average workday. What if your facility comes under some form of alert? The alert may come from some form of specific or general threat directed towards your building, company, tenant, area, city or country.

You need to develop a plan for additional layers of security in the event of such threats. It is important to pre-plan this higher level of security and have your staff pre-trained on the increased response. Don’t try to handle it on the fly. Will you add security staff? Will you shut down some access points? Will you increase access control? Will you start or increase package inspections? By having an increased security plan already in place with your staff trained in their new duties, when a threat comes around, you are ready.

 

As you can see, planning the security of your facility comes from using layers of organizational, mechanical and natural security. By using all these aspects of physical security, you can develop a physical security program that is both effective and COST effective.

Physical Security Risk Assessment: 9 tips to secure your workplace

As a physical security professional, you must know how what it takes to secure your workplace, for the safety of your coworkers, as well as for the security of the facility, this is accomplished with a proper physical security risk assessment. These days, companies need to address and prepare for security threats which are more substantial and diverse than any other time. With every technological advancement that enables innovative, effective business strategies, brings a security risk which is just as innovative and equally effective.
Every physical security risk assessment of a company security system must start with the specific security requirements along with the effects they are going to have on your business overall. You may want a facility secure enough for UL 2050 certification or perhaps you will simply have to ensure the staff safety before and after business working hours.

 

9 Tips for a Proper Physical Security Risk Assessment

.Effective Communication: Above all is communicating information to and between employees. A lot of companies utilize e-mail alerts to notify staff concerning would-be hackers. Likewise, make sure that staff remain informed on procedures and prospective site visitors. By letting staff understand what and who to be expecting, they will be better prepared to identify suspicious activities or people. So that you can prevent complacency, make sure to utilize a single way to obtain information that becomes a part of an employee’s habit. This can be a daily server broadcast or informational email. No matter what the source, it needs to be short, practical, and incorporate positive news along with precautionary information.

Key Control: Designate the commitment of locking or unlocking the workplace to as few people as is possible. Eliminating the “first in, last out” approach helps to ensure that all access points are properly secured on a regular basis. Develop a procedure for all those in charge of opening or closing your office which includes taking a look at washrooms, closets, and wherever an individual could possibly hide. Hard keys need to be numbered as well as assigned to specific people. staff assigned keys will need to be regularly be requested to produce their keys to validate against a master registry.

Site-Wide Policies: Something as fundamental as a “clean-desk” policy, training all employees to clear and secure their office desks of valuable equipment or information before departing for the day, significantly decreases potential theft. Mandating staff to possess and display ID badges or access cards all the time enhances the awareness of any unauthorized individuals. Don’t include things like job titles on any directory available to the public as a lot of criminals tend to use a name and title to validate their presence in restricted locations. Finally, be sure to maintain a “chain of possession.” All deliveries need to be given to a person rather then placed in a hallway or even on an unattended desk.

Check out this post on Risk Assessment Guidelines to better understand the process, if you need to.

Small Investments: All computers, laptops in particular, need to be properly secured with cable or plate locks to prevent “walk-off.” Docking stations are rather inexpensive ways to protect electronic devices while not being used. Take into consideration high risk targets such as state-of-the-art equipment, postage meters, check writers, and business checkbooks. Strengthen entry doors by installing peepholes as well as keypads. Implement 2 secured entry doors surrounding a small lobby or foyer. This sort of “airlock” method minimizes piggybacking; a technique intruders utilize to obtain entry by catching a locked door when an employee leaves.

Lights, Camera, Layout: Take note of “dark spots” either inside or outside the office. Put up ample lighting in parking lots and outdoor break areas for staff safety, prevent blind spots in stairwells, and organize hallways and offices to eliminate all areas in which an individual may conceal himself or stolen items. Lacking CCTV, highlighted below, it may be worthwhile to install recording security cameras at key areas like loading bays and access points like after-hours entrances.

Reception: Among the most complete solutions is to utilize one or more full-time receptionists. From a security process perspective, this person enables close examination of credentials and id and funnels security information by means of a single point. When it is impractical to have every site visitor greeted and checked-in by someone, look at a dedicated phone line in the lobby or at the front door that goes directly to a designated person. This process, along with a sign-in station, often is an economical strategy for a lot of offices.

Access Control System: Certainly one of the issues with hard keys is reacting whenever one is lost or stolen. With an access control system, businesses can easily issue access cards to staff while maintaining complete control over what each individual card can open. Additionally, access control systems reduce risk by permitting just enough access to accomplish a job. As a result, employees, contractors, or visitors will be restricted by area or time of day. A couple of things are important with access control systems. First, enable “total access” to as few people as is possible. This will directly clarify who is approved to be where and thereby enable staff to identify and report infractions. Second, maintain a record of the usage of every card. By reviewing card activity, it is possible to ascertain who requires having access to where and at which times, streamlining routines and defining access.

Closed Circuit Television (CCTV): For more advanced security system needs, CCTV is among the most effective method of protection. Using restricted broadcast, every camera is able to be monitored by means of a single user interface. Subject to the specifics of the system, footage may be monitored by a staff member or digitally recorded. Position cameras strategically to achieve the maximum coverage for a single unit. Additionally, cameras or corresponding signs which are visible to visitors and staff will be effective deterrents and create a secure environment. It is essential to keep in mind, however, that as effective as CCTV is, it must be utilized efficiently as well as in tandem with other preventive measures. As an example, installing a unit in an entry with an “airlock” door system enables extended recording of a person (s) entering or exiting the property.

Proper Training: Most of all, make sure that every one of your staff members is properly trained to utilize security equipment and follow procedures. Investment and planning in the ideal security system is going to have minimal effect if people are unclear on preventative measure and intervention. This can be as fundamental as ensuring staff keep doorways and windows secure or safeguard their personal belongings, but usually involves specific training on identifying and responding to suspicious items, persons, or events.

 

Hopefully you found these tips beneficial in conducting a physical security risk assessment of your facility and understanding the physical security needs of your location. Being able to clearly understand these tips and explain them to others for training or securing CAP-ex, is what will make you a successful physical security professional.

Safety Committee: Why I Work Safely Slogan ideas

As part of a quality safety committee in the workplace, you need a good “Why I work Safely Slogan” for your team to drive safety awareness, and highlight the importance of safety of employees in the workplace.

Importance of a “Why I Work Safely Slogan”for your Safety Committee

Having a company safety slogan for your safety committee to champion provides a guide for the team to share with co-workers, it provides a memorable message for employees to keep safety in mind, it allows for good safety banners/memos/emails/giveaways, and most importantly it shows a company’s dedication to safety in the workplace.

A strong safety slogan should be the cornerstone of your workplace safety campaign, not the only part of it. Share the message to your employees through the workplace safety committee, through all company emails, memos and banners. Build your campaign around your “Why I Work Safely Slogan”.

“Why I work Safely” Slogan and campaign ideas:

  • Safety is Personal: This message tells your employees that their safety is personal to them, it effects not just the company, but their lives, it shows that the company cares about them as people and not just cogs in the company machine.
    • The campaign around this should start with a dedicated top down message, where C-level executives are invited to share stories as to why they work safely, this could be kicked off through company email, or video sharing, then invite people to submit their personal stories for why they work safely.
    • You could distribute magnets for company lockers in various shapes, like families, cars, boats, fitness themes, here is a chance to have your marketing department get creative.
    • You can share pictures of low term employees with their stories of why safety is personal to them in employee break-rooms and on the company intranet.
    • You make t-shirts with the slogan to distribute to your safety committee to wear around work, even change the message a little and have it save “Ask me why safety is personal to me”, again, this is the time to get creative.
    • Banners and posters could be put up around the workplace to further drive this message, include the slogan, include safety tips.
      • If I were invited to participate in such a campaign, I would share this story: “Safety is personal to me because I have been injured at work before. I know how a workplace injury impacts my day to day life. I broke 3 ribs at work, from lifting improperly and losing my footing, after which I was laid up at home for a month. I could not enjoy simple things like exercising, or even going for a walk, because even simple tasks like grocery shopping caused me substantial pain. I take safety very personal, because no amount of personal protective equipment can protect me from not paying attention to little tasks like ensuring my footing before picking something up, it is completely up to me to ensure basic safety procedures are followed every day, every time.”
Check out the book offerings I have concerning Safety Committees
  • Safety 365: A safety campaign built around this slogan should be about raising workplace safety awareness to reduce workplace accidents to 0 in 365 days. A great logo is important for a campaign like this.
    • The campaign could kick off with putting up a large electronic billboard that counts the days without an accident, make sure to include the drive for going 1yr without a safety incident.
    • If you have multiple work locations, share the days without an incident of all locations, drive a feeling of competition among the workplaces.
    • You can release pins of the logo to increase employee awareness, and encourage their participation.
    • Partner this with a safety bingo campaign, that gives out gift cards to the winners, build up higher prizes as the game continues without a safety incident. Start with a $25 gift card, then a $50 gift card, and on and on. If your average accident costs your company $1,000 and you on average have 12 workplace accidents on average a year, if you spend $2,500 on the campaign, you have saved 91% over the year.
    • Include a raffle as part of this, at milestones, like every 30 days without an incident. Make the prizes highly desirable, so people are talking about them, which raises safety awareness. If you average $500 a month in prizes, this will cost you $3,000 annually, even when coupled with the bingo giveaways, you will have only spend $5,500, for a total annual savings of 55%.
    • Celebrate ALL raffle winners, ALL bingo winners, and most importantly ALL milestones reached on the goal to 365 days without an incident. This will drive safety awareness in the workplace as employees get excited over the milestone celebrations.
If your company has a high occurrence of workplace accidents, check out my post to reduce workplace accidents
  • I am Safety: This slogan is to highlight that your employees are the most important part of workplace safety, and that should be the focus of this campaign.
    • A successful part of this campaign should empower your safety committee to be proactive in identifying employees who are seen working safely. Give them awards to hand out, these could be vending machine coupons, these could be raffle tickets for a monthly prize, get creative on what to give away to reward employees that work safely.
    • T-shirts can be a big part of this campaign, print them up first for your safety committee, then begin passing them out to the rest of the workforce. Instead of t-shirts, you can do polo shirts for your safety committee, and t-shirts for the rest of the workforce, it will make your committee look more professional, and empower them.
    • The banners and posters for this campaign can be done using your safety committee; take pictures of them, and share them around the company with the safety slogan.

“Why I Work Safely” slogans

The following are “Why I work safely” slogans without campaigns, which you can use to empower your safety committee in partnership with your marketing department to design the safety campaign around it.

  • Why Safety Matters to Me
  • Accidents Hurt, Safety Doesn’t
  • Choose Safety for your Family
  • Don’t Learn Safety by Accident
  • Knock out… Accidents
  • Safety Starts with ME
  • When You Gamble with Safety, You Bet Your Life.
  • Safety First, Always.
  • Work Smart, Work Safe.
  • Safe Work, Strong Future.
  • Protect Yourself, Protect Your Team.
  • Safety Begins with Me.
  • Stay Safe, Stay Strong.
  • Safety: It’s Not Optional.
  • Work Safely, Live Fully.
  • Safety is Everyone’s Responsibility.
  • Think Safe, Act Safe.
  • Safety is the Key to Success.
  • Safety: Your Best Investment.
  • Working Together for Safety.
  • Safety Today, Success Tomorrow.
  • Safety Starts with You.
  • Safety: Our Priority, Your Priority.
  • Protect Your Tomorrow, Work Safe Today.
  • Safety: A Habit, Not a Choice.
  • Safeguarding Our Future, One Safe Step at a Time.
  • Safety Matters, Every Day.
  • Safe Work is Good Work.
  • Be Proactive, Be Safe.
  • Commit to Safety, Achieve Excellence.
  • Safety: The Foundation of Productivity.
  • Because Your Safety Matters Most.
Check Out: Importance of Safety Policy & Committee

These are just some suggestions of a “Why I Work Safely” slogan that you can use to empower your safety committee, and drive workplace safety awareness. Feel free to use any slogan and campaign listed here, or feel free to share your suggestions below.
If you don’t have a strong safety committee, or worse, don’t have a safety committee, here are sample guidelines to help your company out.

Safety IS Security

Safety planA safety and security professional’s main concern will always be protection of life as well as safety, and then the protection of property. With that said, in 2009 privately owned companies sustained over 3,270,000 million non-fatal injuries and illnesses, costing businesses and staff alike 1,238,000 days away from work. The direct cost of workplace accidents was tallied at over $52 billion. As well as the direct costs, a workplace injury will additionally incur indirect costs.

Indirect cost consist of:

  • lost output;
  • overtime;
  • value of employee time used with accident analysis and record-keeping;
  • training as well as replacement;
  • administrative overhead;
  • any merchandise damage;
  • possibly increased insurance costs.

As a consequence, the $52 billion of direct costs from work accidents identified by the 2009 Safety Index2 created $80 billion to $200 billion of indirect expenses, for a total financial impact of between $120 billion to $240 billion. That’s greater than the 2008 GDP of Missouri!
Exactly where would this integrate into the model of a security program…everywhere! Being security professionals, we don many hats, oftentimes simultaneously and as is frequently the situation, we are so conscientious in protecting our organizations from vandalism, cyber threats, theft, fraud, workplace violence, trespassers, and other identified menaces, that we fail to remember that the safety of our colleagues and guests is equally as, if not far more, imperative than safeguarding them from criminal threats.
Critical in our responsibility to protect, we have to report and document hazardous conditions which are identified. In October of 2010, the San Diego District Attorney’s Office accused around 19 Target stores in San Diego County of violating hazmat waste laws designed to safeguard employees and customers.
Performing frequent workplace inspections aids in averting accidents and injuries. By using critical evaluation of the workplace, inspections identify and document potential issues for corrective actions. Cooperative occupational safety and health committees will help plan, conduct, report and monitor inspections. Consistent workplace inspections are an important part of the total occupational health and safety program.
As an essential part of a security and safety program, workplaces should be inspected consistently.

Inspections are essential because they allow you to:

  • take note of concerns of employees and managers;
  • gain additional knowledge about jobs and tasks;
  • detect existing and potential dangers;
  • identify root cause of hazards;
  • keep track of controls(personal protective equipment, engineering controls, policies, procedures);
  • advise corrective measures.
Also check out this post to better identify workplace hazards.

Pre-planning is fundamental for a highly effective inspection and every inspection should analyze who, what, where, when and how. Give special attention to elements likely to develop unsafe or unhealthy conditions due to stress, wear, impact, vibration, heat, corrosion, chemical reaction or misuse. Examine the entire work area every time. Incorporate places where no work is performed regularly, for example parking lots, breakrooms, office storage areas and locker rooms.
Examine all of the workplace elements – the environment, the equipment and the processes. The environment consists of such risks as noise, vibration, lighting, temperature, and ventilation. Equipment consists of materials, tools and apparatus for producing a product or a service. The processes include how the worker interacts with the other elements in a series of tasks or operations.

There exists an innumerable amount of workplace risks, some forms of workplace hazards include;

  • safety hazards: e.g., inadequate machine guards, unsafe workplace conditions, unsafe work practices;
  • Biological hazards caused by organisms such as viruses, bacteria, fungi, and parasites;
  • chemical hazards caused by solid, liquid, gas, dust, fume, or mist;
  • Ergonomic hazards caused by anatomical, physiological, and psychological demands on the worker, such as repetitive and forceful movements, vibration, temperature extremes, and awkward postures arising from improper work methods and improperly designed workstations, tools, and equipment.
  • Physical hazards caused by noise, vibration, energy, weather, heat, cold, electricity, radiation, and pressure.

 

Fire safety is equally if not more important. Though fire inspections are normally conducted by your local fire official, this does not absolve the security professional or the organization from the responsibility of identifying fire hazards, maintaining a plan, or conducting drills.
Sure, as security professionals we are more than likely not certified firefighters, nor should we take it upon our own to fight every fire. However, in the probable occurrence of a fire in your business, who do you suppose everyone will rely on in the course of an evacuation. That’s right…us.
As reported by the National Fire Prevention Association, a building fire occurred every 66 seconds in 2009 resulting in $10 .8 billion in real estate damage. Along with preventative fire activities, security professionals must have a well-rehearsed fire safety action plan. This is achieved by strong organizational guidance to ensure that all participants know very well what to carry out at the time of critical occasions.

Setting up a Safety Action Plan

To defend against the threat of damage, injury and lost business, all of these core guidelines will assist to develop an excellent fire prevention policy:
1) Produce a property layout diagram. Ensure the building layout is posted to every floor with exits well marked. Every person needs to examine the layout and know the specific location of the closest exits.
2) Distinguish the exits. In addition to knowing the nearest exit from the daily work area, everybody should know at the very least two methods out regardless of where they may be in the building.
3) Train personnel. OSHA standards call for employers to review components of the fire prevention plan with staff that are essential for self-protection. Training programs need to contain the protocol for fire extinguisher use in the eventuality of a fire.
4) Have an emergency action plan (EAP) available and rehearse it. Conduct unannounced fire alarm drills with employees so everybody is aware of the exit strategy in case of a fire. Determine a safe gathering place outside the building where a headcount should be completed.
5) Perform routine inspections. Make sure that fire extinguishers and emergency back-up lights are inspected and tested by a qualified fire prevention professional. All of the fire extinguishing equipment needs to be maintained in accordance with the manufacturer’s guidelines. Carry out daily facility inspections to eliminate any existing fire risks.
6) Routinely inspect evacuation exits. As part of the fire prevention plan, regularly verify that all doors leading out of the building open up quite easily as well as have not become blocked. All exit sign lighting should be inspected to ensure that signs are plainly visible in the event of a fire.
7) Inspect sprinklers and smoke alarm systems. Ensure that smoke alarm systems are inspected and tested by a qualified professional to provide adequate warning in the eventuality of a fire.
8) Ensure that equipment and surroundings are clean and up to date. Establish strict cleaning operations in ventilation systems to reduce grease accumulation.
9) Be aware of fire risks in common kitchen areas. Restrict storage of combustible materials around cooking areas which could help cause the spread of flames. Ensure sufficient clearance exists between cooking equipment to eliminate heat build-up.
A straightforward self-inspection worksheet should be created and your local fire department official is likely to be glad to assist. This self-inspection worksheet should explain where you should check for common fire risks inside and outside the building, as well as the way to pay attention to exit doors and signs, pathways, lighting and any combustible materials that may be in close proximity to debris or combustible storage items.
You should produce a worksheet that has a checklist for electrical breakers and outlets, fire extinguishers, fire alarm systems and smoke detectors.

I have included a template for an Emergency Action Plan to help you in setting up a base for your safety program:

Guidelines for hiring an Independent Security Consultant

security consultant planningI am often asked, “Why should my company hire you as an independent security consultant?” The most significant reason is if you know little to nothing about security, then you need to hire an experienced professional security consultant that has the experience and subject matter expertise required for the tasks at hand. Security consciousness is a necessity for modern business managers. With this in mind, the selection of the security consultant(s) should also take into account their knowledge of the issues and conditions that are particularly relevant to the security threats that may affect your organization. A solid track record proving knowledge in these areas of specialized interest provides a benchmark that can be helpful when evaluating the subject matter experience of the prospective consultant(s).

 WHY HIRE AN INDEPENDENT SECURITY CONSULTANT

The first thing we need to do is define security.

Webster’s dictionary defines security as:

  • the state of being protected or safe from harm
  • things done to make people or places safe

 

Concerning security as a profession there is not truly a “universally accepted definition.”

Security is a hybrid profession blending various skills, backgrounds, and preparation. Security professionals have varying perspectives, often because of the unique degree of specialization required in their current assignment. Security provides those methods, either active or passive, which serve to protect and preserve an environment that allows for the conduct of activities within a business or society without disruption. There is a lot more than just looking at your doors, windows and locks or alarm systems to figuring out what security measures are needed to protect your synagogue, school, institution, or agency.

The primary goal of an independent security consultant is to prevent loss of life by reviewing your liabilities on security issues and reducing or eliminating them. Planning is required since it is an approach that recommends identifying and stopping a problem before it occurs, reducing hazards in given situations, and of forecasting rather than reacting to circumstances.

Competent security consultants know what to look for when identifying security issues and know how to properly mitigate the conditions through cost effective reductions/eliminations. After careful evaluation, it may make sense to use a security consultant to get the best security/cost value proposition you can; think of the expense as an investment for the future.

Before you hire a security consultant, make sure you know how to vet them, tips here.

An Independent Security Consultant can help you with the following issues:

  • Negligent Hiring/Retention
  • Premises Liability
  • Negligent Security
  • Hiring Contract Security Services
  • Physical Site Security Surveys
  • Anti-Terrorism
  • Fraud and Internal Thefts
  • Disaster recovery
  • Risk Analysis
  • Crime Prevention

Along with so much more.

 

Inventory Shrink can be a Hidden Cost

What is inventory shrink? Inventory shrink is a reduction in physical inventory caused primarily by shoplifting, employee theft, administrative/operational errors, and vendor fraud.

Using the inventory shrinkage formula, you can find out your inventory shrinkage rate.  

Here are the steps you would need to take:

  1. Find out the book value of your inventory. This is the value of your inventory according to your balance sheet. Typically, this would be calculated at the end of each month, or perhaps each quarter, and is the difference between your previous inventory totals and the quantity of your goods sold. For example, if you previously had $30,000 in inventory, but you bought $2,000 and sold $10,000 of inventory, then your balance sheet should indicate that your inventory is worth $22,000.
  2. Then, calculate the actual value of your inventory. Do a physical check of your inventory in stock and log the quantities on the shelf and calculate the value by multiplying the inventory quantities by the purchase costs.

Using these two values, you can calculate your inventory shrinkage rate with the formula below.

(Book value of inventory – Actual value of inventory)/Book value of inventory x 100 = inventory shrink %

The Need For Effective Inventory Shrinkage Prevention

The key to preventing inventory shrinkage is to acknowledge it is happening and take quick action to put an end to it. Understanding the causes of inventory shrinkage is the first step towards reducing it.

Check Out: Comprehensive Loss Prevention – Don’t Just Be Reactive

Inventory Shrinkage Control Recommendations

Cameras: Invest in security cameras and place them around your stock locations. In addition, put up warning signs of theft around your stock. By monitoring your inventory carefully, you can spot any suspicious behavior and take action when necessary. Cameras and warning signs serve as a deterrence for thieves who do not want to risk the chance of getting caught.

Reduce Temptation: To prevent theft in retail stores, higher-value items should be stored in secure areas that require a store employee’s authorization to access them. For example, some wine and spirit stores stock their pricier alcohol at the cashier area. For a customer to purchase or look at them, they must ask a store employee to assist them. This makes it harder for shoplifters to target your more lucrative items to steal.

Eliminate Fraudulent Sales Transactions: Sales fraud can take on many forms: from giving excess discounts and pocketing the difference to falsifying vendor bills. Here are some common examples of how this happens:

  • An employee deliberately inflates the quantity of the goods sold with an intention to steal the excess inventory.
  • Creating fake customer accounts where products are sold to an undisclosed location for the employee to sell on their own while the bills are set to due for collection but are never collected.
  • The setting up of fake vendor accounts to pay for bills or products that will never reach your warehouse while the employee pockets the money.
  • Creating a vendor kickback scheme where your company overpays a vendor for inventory goods, only to have the insider in your company get a cut of the overpayment as an incentive for continuing the scam.

There are several ways to combat this issue.

  • First, split up responsibilities for important tasks in your business workflow. That way, any key process must pass through a few individuals. For example, assign one individual the responsibility to approve the sale and another to fulfill the order from inventory.  This will lower the chance of any fraud from occurring with the process becoming more transparent for the entire organization.
  • Secondly, you can set internal controls in place where only a select group of people can create or view certain transactions. With restricted access, you can be assured that employees are not given the freedom and access to manipulate and cheat your system.
  • Thirdly, ensure that you conduct spontaneous and regular audits to inspect your internal business operations. Look into any suspiciously close relationship between your team and your vendors or customers. Follow up on any dead accounts or uncompleted transactions to verify if the order and customer are legitimate.

Track Inventory: Having an inventory tracking system allows you to be aware of all your inventory at all times. From your raw materials to the final sales process, it is vital for you to know where your inventory is at all times. By keeping track where each stock is, you can examine if your goods are genuinely missing or due to some other reasons. You can track your stock on an individual or a lot tracking level, depending on your business requirements.

Stop Shipper & Vender Fraud: Fulfillment can often be a difficult place to detect scams, due to the hectic activity of a warehouse shipping and receiving items. To avoid fraud, check your shipping slips and shipments carefully for products that claimed to be “defective.” For these goods, ensure that you have an inspection process in place to verify those claims before disposing of them. Assign your inspections to someone not on the shipping team to prevent a conflict of interest. Also, it is good to keep a record of these inspection reports to analyze any strange pattern or trends that are worth digging further.

Vendor fraud only accounts for a small percentage of actual losses, however if it continues to remain undetected the losses can be substantial.

There are four common types of vendor fraud.

  1. The first instance of vendor fraud deals with the vendor not delivering the correct amount of inventory on the shipping invoice. This method can be conducted in numerous ways. Small amounts of inventory can easily be removed from the packaging or boxes and remain unnoticed. Another method is fewer boxes are delivered than specified on the invoice. For example, the business orders ten boxes of widgets and only receives eight boxes, this can be vendor fraud. Another example is when the items delivered are smaller than the items ordered. For instance, if ten boxes of ten-ounce widgets are ordered and ten boxes of nine-ounce widgets are received, this can be vendor fraud.
      • To protect oneself from this type of vendor fraud, several measures can be taken. The first is to count all inventory once it is delivered and verify the amounts with the packing invoice. Do this by opening all boxes and verifying the original packaging seal is still intact and counting every piece of inventory. If time is a factor, randomly check the deliveries and do not check the boxes in the same manner. If random checks are more suitable, examine some boxes through the tops and the other through the bottoms. Also read the labels of the merchandise to confirm the actual size and note any discrepancies. These methods will deter this form of vendor fraud.
  2.  A second style of vendor fraud deals with the delivery person removing merchandise from the recipient once the delivery is completed. In this scenario, the delivery person waits for the inventory to be counted and then removes the merchandise from the store. To prevent this type of vendor fraud, the delivery person must be carefully watched while inside the store or stockroom. Also watch what the delivery person takes in and out of the store. The best suggestion is to have deliveries made to an area where the delivery person does not enter the store.
  3. A third type of vendor fraud deals with the delivery person directly stealing from the stockroom or the store. Swapping is a common technique in which the delivery person exchanges out of date products with new products. In actuality, the delivery person swaps good merchandise and replaces it with bad or outdated merchandise. To prevent this method, have employees separate the products that need to be exchanged before the delivery person arrives.
  4. A fourth way vendors steal is directly taking cash from the store. This can occur if payment for the delivery is done on site rather than billed later. A delivery person may alter an invoice by adding inventory or changing the final price resulting in an over payment. The delivery person pockets the over-payment. This method of fraud can be prevented by keeping the original invoice and by paying with a check.

Vendor Inventory Shrinkage Prevention Techniques

  • Separate sheets for store credits and invoices.
  • Do not accept a delivery without a packing slip.
  • Do not accept a packing slip without a delivery.
  • Verify invoice information is correct.
  • Never initial an invoice, a complete signature is best.
  • Create a log of all deliveries and have the delivery person sign it.
  • Do not accept verbal deals or agreements.
  • Do not allow the delivery person to distract you.
  • Do not pay cash for the delivery.
  • Never leave a store stamp in the open.
  • Do not allow multiple deliveries.
  • Schedule deliveries at a convenient time for you, never during busy hours.
  • Always complete your delivery check on the spot. Do not leave and return.
  • Carry out your empty boxes or garbage. Do not allow the vendor to do this.
  • Vendors should not mill around the store.
  • Only allow full time employees to accept deliveries.
  • Credits are to be dealt with first before the new delivery is brought into the store.
  • Never allow vendors to deliver after the shipper goes home.
  • Do not allow the vendor to carry merchandise to the sales area until entire delivery has been checked.
  • Do not accept samples unless they are listed on the shipping invoice.

When practiced, these techniques are very useful in hindering vendor fraud. Vendor fraud can be costly if the problem continues to go unnoticed.

Invest in an Inventory Management System: Wherever human beings are doing the counting, organizing and recording, errors are sure to happen. Choose software that:

  • Organizes product and vendor information
  • Integrates with your POS system so that inventory data is automatically updated after every transaction
  • Generates accurate purchase orders

Improve Pre-employment screening: The reality of retail is that employee turnover is high and company loyalty usually low. In addition, employees have less supervision and easy access to your valuables. Do your due diligence in hiring people with no history of dishonesty, including nationwide criminal background checks and verification that resumes are complete and truthful.

7 Security Policies You Need

security policiesWritten security policies are essential to a secure organization. Everyone in a company needs to understand the importance of the role they play in maintaining security. One way to accomplish this – to create a “security culture” – is to publish reasonable security policies. These security policies are documents that everyone in the organization should read and sign when they come on board. In the case of existing employees, the policies should be distributed, explained and – after adequate time for questions and discussions – signed.

This article will introduce you to seven security policies that every organization should consider adopting. The specific policies that you implement, as well as the amount of detail they contain, will change as a company grows. Certainly, an organization with two employees has different security concerns than an organization of thousands. This list addresses both physical and information security issues, and is meant to provide a starting point for assessing your particular security needs, when establishing your security policy.

7 Security Polices Every Company Needs

Internet Usage

Below are some guidelines that a business should be thinking of using when they are looking to set up any kinds of policies in relation to the use of the internet during business hours.

General Internet  Usage:

  • Internet usage is intended for job-related activities. Occasional brief personal use is allowed within reasonable limits
  • The Company reserves the right to monitor internet traffic and retrieve any data that is composed, transmitted, or received and, as such, is subject to disclosure to law enforcement or other third parties
  • Team members cannot pirate software, or download/copy software without authorization
  • Team members should always ensure that the business information contained in internet email messages and transmissions is accurate, appropriate, ethical, and lawful

However if you are a company that is allowing all their employees to have access to the internet then rules and regulations must be in place that will restrict the amount of time that they use it for their own personal use. So therefore when writing up any kind of company internet usage policy document it should clearly shown within it when employees are entitled to use the internet for personal searches and when for company work. To ensure that your employees are sticking to the guidelines provided then a good quality tracking software program should be installed. This will then help you to track when and what your employees are using the internet for. However again employees must be made aware that their use of the internet is being tracked.

 Check Out: Physical Security Program – know the process

Email

What kind of subjects should you cover in the email section of your security policies? Here is a list of ten points to include:

  • Email risks: The policy should list email risks to make users aware of the potential harmful effects of their actions. Advise users that sending an email is like sending a postcard: if you don’t want it posted on a bulletin board, then don’t send it.
  • Best practices: This should include email etiquette and writing rules in order to uphold the good reputation of the company and to deliver quality customer service. For instance, include 6 etiquette rules:
    • Do not write emails in capitals,
    • Enable spell checking,
    • Read the email before you send it,
    • Include a signature that conforms to company format,
    • Use proper grammar and punctuation,
    • Include instructions on compressing attachments to save bandwidth.
  • Personal usage: The policy should state whether personal emails are accepted and if so, to what extent. You can for instance set limits on the times of day that personal emails can be sent (only during breaks), or you could require personal emails to be saved in a separate folder. In addition, state that employees are prohibited from sending or receiving certain email attachments, such as exe, mp3 or vbs files. You could also include a maximum file size for attachments sent via email.
  • Wastage of resources: Warn users that they are making use of the company’s email system and that they should not engage in non-business activities that unnecessarily tie up network traffic. The policy must also cover the use of newsletters & newsgroups. For instance you can state that employees may only subscribe to a newsletter or newsgroup if this directly relates to their job.
  • Prohibited content: The policy should expressly state that the email system is not to be used for the creation or distribution of any offensive, or disruptive messages, including messages containing offensive comments about race, gender, age, sexual orientation, pornography, religious or political beliefs, national origin or disability. State that employees who receive any emails with this content should report the matter to their supervisor immediately. Moreover, employees should not use email to discuss competitors, potential acquisitions or mergers or to give their opinion about another firm. Unlawful messages, such as copyright infringing emails should also be prohibited.
  • Document retention policy: Include information on whether or not email will be archived and for how long. If your organization is required to archive email messages, state that all emails will be archived and include the number of years that the records will be kept. If you are not required to archive your emails, notify your users about whether they can or should delete emails after a number of months or years.
  • Treatment of confidential data: Include rules and guidelines on how employees should deal with your company’s confidential information and trade secrets. They should also be aware that they should not forward any confidential messages or attachments from other companies without permission. Make employees encrypt any confidential information that is sent via email and change passwords regularly.
  • Email disclaimer: If you are adding a disclaimer to employees’ emails, you should inform them of this and state the disclaimer text that is added.
  • Email monitoring: If you are going to monitor your employees’ emails, you must state this in your email policy. Warn that employees should have no expectation of privacy in anything they create, store, send or receive on the company’s computer system and that the company may, but is not obliged to monitor messages without prior notice. If you do not mention that the company is not obliged to monitor messages, an employee could potentially sue the company for failing to block a particular message.
  • Measures & violation reporting: Warn that if an employee is found to be in breach of the email policy rules, this could result in disciplinary action, up to and including termination. If an employee witnesses email policy abuse they are required to report the incident immediately. Include contact details of who to contact if a violation of the policy rules is detected. This could be a supervisor but it might also be a good idea to appoint a specific contact person to report email policy breaches to.

 

Social Networking

While you might not have a large staff now, it is a good idea to put an online networking policy into your security policies as soon as possible. Make sure that everyone is aware of the social networking policy when they are first hired. Here are some things to consider when you are coming up with the social media policy for your company.

Social Media Presence:

  • Remember to act respectfully at all times when interacting on social media platforms
  • Confidential company information should be kept off social media
  • Team members should follow company guidelines for how to talk about products (or services) to keep with brand image
  • Should team members see negative content regarding the company on social media, they are to follow the set engagement procedures in order to react properly
  • Be sure to create a secure password and avoid default privacy and security settings for personal social media pages
  • What your employees are allowed to say about the company.
    • I am not suggesting that you totally censor your employees. However, you do have a certain public image to uphold. You have to decide early on what you are going to allow your employees to say about the company on social networking sites. This is definitely something that needs to be outlined in the handbook you create about your company’s social media policy.
  • Is there a particular point person to send media requests to?
    • Your employees may run into members of the media while they are networking. The journalist may want to ask them some questions about your company. You have to decide if you want your employees to be able to answer those types of questions themselves or if you want one employee to be the designated spokesperson for the company. Whatever you decide, make sure to communicate this to all staff so there is no confusion.
  • What employees are allowed to post on online networking sites.
    • Once again this is a matter of protecting your company image. Your employees are a representative of you. You need to figure out what kind of information you want your employees to post on social media. Are they allowed to reveal your company name on their personal profiles? Can they post pictures of themselves at work? Is it okay for them to post pictures of themselves drinking alcohol? These might seem trivial, but it is important to let your employees know beforehand what they can post rather than trying to discipline them when they cause bad publicity for the company.

Having a social media policy is important for you and your employees. It helps your employees to know exactly what they can and can’t do with their social media profiles. It could also protect you from future lawsuits since the policy will be spelled out in black and white. Now stop reading this article and create a social media policy for your company.

 Check Out: Layered Security

Access Control

You need to have an access control procedure, not just for visitors, venders, and guests, but also for employees, as not every employee needs access to every area. Ask these questions when developing an access control procedure for your security policies:

  • Do they have a need to be there? If an employee’s job does not require them to be in an area, clearly state that area is off limits, or set a physical control like key or electronic access to ensure it is enforced.
  • Will they need to be there escorted? A good rule of thumb is to clearly state areas like an HR office are restricted access, and only select personnel are authorized access unless escorted by select personnel, other offices and areas may need the same type of policy.
Check Out: How Do Your Alarms Communicate

Mobile Device Security

When you issue company business mobiles you are faced with many pros and cons, one of which is convenience and productivity while the other drawback is how to restrain mobile phone use as you keep your company liabilities at a minimum.

Here are some ways you can create security policies with respect to the use of company issued handsets:

Dispel privacy breach concerns with your company issued mobile phones. Make it a point to inform your employees that they do not have to fear their privacy being breached with the issuance of company mobiles. By doing this, you eliminate the probability of other problems or lawsuits from arising in the workplace.

Be sure that you own the phone numbers issued. It is very vital that you keep ownership of the phone numbers. You have to be clear with this in your policy. It is because you want to limit the likelihood of a leaving employee from further soliciting or doing business with your customers once they are gone.

Check monthly charges from time to time. The moment your employees know that their bills are being checked on a regular basis, they are less likely to incur unexplained surcharges or other unnecessary charges like for instance the purchase of unauthorized 3rd party content such as apps, ring tones, or even mobile games.

Report lost or damaged devices as soon as possible. The instant a company mobile device has been lost, damaged, or stolen, tell employees to report them immediately so all related services will be turned off the soonest time possible. There are some mobile apps that enable users to remotely track a mobile phone’s SIM card and delete all private data once lost or stolen. Expressly indicate who will shoulder the costs in case of loss or damaged business mobile phones. If it’s the employee who will have to bear the financial burden, then by all means let them know and have them sign up an acknowledgement agreement to that effect.

Inform them about GPS tracking. There are several mobile phones out there that come with software that does not only allow GPS navigation but also tracks the bearer. You have to expressly let them know that their business mobiles will come with a GPS tracking feature. Businesses in the field of logistics highly benefit from this practice.

 

Visitor Management and Safety

An unauthorized or unescorted visitor can be a physical threat and can also steal sensitive information. If possible, steer all visitors into a controlled entry point, be it a gate or receptionist’s desk. When writing your policy, decide whether visitors should be escorted at all times, or only in certain areas. Requiring visitors to wear a badge and sign in and out should also be considered. If your visitor management policy is communicated clearly, employees can more easily serve as your eyes and ears as they will feel more comfortable approaching or reporting a suspicious individual.

It would be wise then to craft a safety policy for visitors along the same lines as employers do for workplaces.

1 – Visitors must be notified of any hazards they might encounter.
2 – They must be made aware of all protocols and procedures in the event of an emergency.
3 – All visitors must sign-in and sign-out of your facility.
4 – Similar to all workplaces, must be provided with the appropriate personal protective equipment (PPE) and on its use and reason for it.
5 – Care must be taken to ensure proper fit and use of the PPE.
6 – Visitors must be oriented properly and advised on the basics of behavior during the visit.

Non-Disclosure Agreement

What is a Nondisclosure Agreement?

Fortunately, the United States legal system has several safeguards to protect intellectual property rights. One of these is the nondisclosure agreement (NDA), also known as a “confidentiality agreement.” This is a signed agreement between two or more parties which states they will keep confidential specific information shared during their business relationship, or in the course of a transaction. In the business world, an idea, formula, or process can be a company’s most important asset. The NDA ensures that a company or individual retains exclusive rights to their intellectual property. When you hire a company to manufacture your plush toy, an NDA gives you the assurance that your ideas (and profits) remain yours and legal recourse if it does not.

Types of NDA

There are two kinds of NDA. With a one-way NDA, only one of the parties is disclosing information. If you are hiring a company to produce your plush toy, but that company will not be sharing proprietary information (such as a secret method of stitching) with you, you may only need a one-way NDA. A mutual NDA is necessary when everyone involved in the process is sharing private information. If you sell a new manufacturing process to a soft drink company which shares a secret formula with you, you’ll both want a mutual nondisclosure agreement.

Contents of an NDA

A good NDA contains:

o Definitions of the shared information. For example, yours might include “the design for Skippy the Cat,” without describing the confidential information itself.

o Exclusions. Not all information needs to be confidential. This protects the recipient, in the event that it possesses or discovers information independently of its relationship with you.

o Recipient’s Responsibilities. Shared secret information must remain secret. Neither party can share it or use devious ways to steal it.

o Time Limit. Although you might want your idea to remain secret forever, this is not always going to be the case.

o Miscellaneous Clauses. These are various legal details, such as how a breach will be handled, who will pay attorney fees in the event of a lawsuit, etc.

BONUS: Workstation Security

Physical:

  • Ensure monitors are positioned away from public view
  • Use screen privacy filters for added security (especially in open floorplan offices)
  • Always lock computer (and protect with a password) when stepping away from your desk
  • Log off workstation at the end of each business day
  • Keep food and drink away from your workstation at all times
  • When taking your laptop or other company owned devices out of the office, be sure to keep them in your trunk
    and out of plain sight

Operational:

  • Only approved personnel may install software on workstations
  • All sensitive information must be stored on network servers and not the workstation itself
  • Follow all authentication and password management requirements

 

Conclusion

One key to creating effective policies is to make sure that they are clear, and as easy to comply with as possible. Policies that are overly complicated only encourage people to bypass the system. Don’t make employees feel like inmates. Communicate the need, and you can create a culture of security.

There is always a trade-off between security and convenience. You would like to board a plane without going through the TSA checkpoint, right? But how comfortable would you be knowing that no one else on the plane had gone through security either? The policies described in this article will help to ensure that you and your employees are protected.

For help in developing security policies to protect your organization and its employees, Contact me, I am available for assist you in your security policy development, or any other security needs you may have..

Factors to Consider in an Investigative Interview

The interview element of a workplace investigative interview isn’t easy and it can be even more difficult when there are conflicting responses to investigative interview questions. The number of people interviewed can also affect the investigator’s ability to determine credibility. Too few (ie, just the complainant and the subject) and it becomes one person’s word against the other. Too many (ie, multiple witnesses) and some may have conflicting stories due to bias. The EEOC recommends weighing the credibility of each person interviewed in order to find out what actually took place during the incident.

Factors to Consider:

The EEOC has put together a list of 5 factors to consider when trying to determine the credibility of statements and responses made during the interview process. However, it is also important to note that these are “things to consider” and not the “be all, end all” for determining credibility.

1. Inherent Plausibility:

Watch for the presence and order of key facts presented by everyone interviewed.

Is the testimony believable at face value? Does it make sense? Watch for the presence and order of key facts presented by everyone interviewed. You may also want to consult any materials in the workplace that could back up the facts of the story- security videos, whereabouts of the employees in the workplace, timing of events, etc.

2. Demeanor:

Did the person seem to be telling the truth or lying?

Check Out: Effective Communication Skills – LISTENING

3. Motive to Falsify:

Did the person have a reason to lie? Does the person feel threatened for any reason? Bias and opinion can sometimes get in the way of telling the truth. Consider any connections that people have to the incident or to the complainant and the subject. Could these connections cause them to lie because they know their friend will get hurt? Do they fear retaliation from others for being involved in the interview? Address these issues and enforce your zero-tolerance policy when it comes to retaliation in the workplace.

Learn about the PEACE Method of investigative interviewing for a better way to conduct interviews.

4. Corroboration:

Watch for commonalities or discrepancies in witness stories and the claims made by the complainant and the subject in order to get a better picture of what took place during the incident.

Is there a witness (such as an eye-witnesses, people who saw the person soon after the alleged incidents, or people who discussed the incidents with him or her at around the time that they occurred) or physical evidence (such as written documentation) that validate the party’s testimony? The information gathered from these individuals needs to be weighed and considered for accuracy- if the witnesses have any bias towards either individual involved in the incident, chances are their story will reflect it. Watch for commonalities or discrepancies in witness stories and the claims made by the complainant and the subject in order to get a better picture of what took place during the incident.

5. Past Record:

Did the alleged subject have a history of similar behavior in the past? Many times, past behavior is predictive of future behavior, but is not always the case. It is beneficial to be aware of repeat offenders in the workplace and what conclusions and actions were taken in their previous cases.

 

Budgeting for Training

budgetingWith the thought of taking from your operating budget to spend on staff training initiatives, it’s understandable if you consider employee development an expense. Yet because the benefits of training are so numerous, it’s much more beneficial to consider training as an investment in human resources.

The right staff training program can increase productivity, decrease the need for supervision, reduce absenteeism, improve customer service, lower the number of complaints, and boost sales. Well-informed employees make fewer mistakes and are more effective in dealing with your customers. And because employees will feel valued and appreciated, training can also increase the commitment and personal confidence that your staff feel in their jobs. This helps to create an appealing work environment and will help minimize staff turnover. If you choose your training wisely, it’s clear your dollars will be well-spent.

What Does It Cost When Budgeting for Training?

The cost of your training program will depend on the type of training you require. Many different types of training exist, each varying widely in cost.  Before you choose one, know what results you are after. Then, select the training activities that best fit those results and your budget.

Training Type Relative Cost
On-the-job coaching and mentoring $
Self-directed study $
Video presentations $
Job shadowing $
Satellite distance learning (e-learning) $$
Seminars $$
One-to-one tutoring $$
College courses $$$
Group workshops (external) $$$
Consultant training (in-house) $$-$$$

Legend: $ – Least Expensive, $$ – More Expensive, $$$ – Most Expensive

Creating a Training Budget

Budgeting for training does not mean using surplus money when it’s available. Instead, you should build a separate line item for training into your yearly budget. A training budget should include the following costs:

  • Initial communication about the training program
  • Training delivery (e.g. classes, video tutorials, e-learning, course fees)
  • Training materials (workbooks, videos)
  • Staff time (including replacement time)
  • Instructor fee
  • Travel, lodging or meal expenses required to participate
  • Ongoing training (upkeep)
  • Contingencies
Check Out: 10 Reasons Why Safety Training is Often Ineffective

Managing the Budget

Once approved, your training budget will need careful management to ensure that costs stay on track. Unforeseen events can lead to changing costs. A specially trained staff member might unexpectedly leave the company before their knowledge is passed on to others. Training costs will increase if you need to rely on external resources.

How Much to Spend on Training?

Many large organizations commit to investing anywhere from two to five percent of salary budgets back into training. While that may not be realistic for you, it’s important to find a number you feel your budget can absorb. Base the figure you’ll use on your needs analysis.

You may be tempted to use the least expensive trainers or training materials available. Often, using “b” level resources produces “b” results. Increase the likelihood of success by always striving for A’s. Use the best caliber training you can afford.

Check Out: How to Put Together a Workplace Safety Training Workshop

Ways to Save

Depending on the size of your staff, you may find training costs add up quickly. Here are some ways you can save on costs:

  • Group training: earn volume discounts by training numerous employees at once (sometimes as few as three participants will qualify)
  • Re-use materials: training materials such as videos have a long shelf life and may be used repeatedly
  • Teach one, teach all: spend on off-site training for one employee, but have him or her present their knowledge to remaining staff
  • E-learning: electronic options are cheaper than traditional, instructor-led training

Another tip is to negotiate free or reduced-cost training from your vendors, who will be happy to help you if it means their product will be successful.

Remember, the right training program will save you money in the long run.

Check Out: Back and Lifting Safety Training

Securing Commitment

Don’t forget that employee commitment is necessary for training to succeed.  One way to ensure employees take the effort seriously is to have those getting specialized training to share the cost. Employees who have made a personal investment in learning will be more focused on completing the task.

If you are footing the bill, get employees to commit to working for you for a specified period of time following the training’s completion. Let them know you will require reimbursement if they aren’t able to fulfill the agreement.

It is also important to have full support for training efforts from senior people in your organization. If they understand the long-term value of employee development, they should be able to help by earmarking funds for training.