Structured Security Services for a Renewable Company
A structured approach to gather and organize the necessary information:
1. Contracts Overview for Security Services
- Identify Contracts: Gather data on the number of existing contracts a organisation holds for security services at various site locations.
- Service Providers: List each security service provider's specific location and scope within the organisation.
- Contract Details: For each contract, document the following:
- On-roll and Off-roll Manpower: The breakdown of manpower directly hired by the organisation vs. those provided by external vendors.
- Contract Period: Specify the start and end dates of each contract, as well as any terms for renewal.
- Contract Value: Outline the financial terms associated with each contract.
- Duration of Relationship: Track how long each provider has been associated with the organisation.
2. Annual Budget Allocation for Security
- Site-Specific Budget: For each site, record the annual security budget, including:
- Personnel Costs: Salaries, benefits, overtime, and allowances for on-roll security staff.
- Contractual Costs: Payments to contracted security service providers.
- Operational Costs: Costs for equipment, transportation, training, and any technology used in security operations.
3. Manpower Mapping by Site Location
- For each site location within the organisation, map the security manpower based on:
- Headcount: Number of security personnel per site.
- On-roll vs. Off-roll: Proportion of employed personnel versus those supplied by contractors.
- Contract Duration: Duration for each contract.
- Manpower Supply Details: Number of personnel supplied, contract value, and contract duration.
4. Scope of the Security Services (SS)
- Define the scope of services for Security Services across the organisation, covering:
- Roles and Responsibilities: Key tasks, responsibilities, and duties expected of SS at each location.
- Coverage Area: Specific areas or regions within the organisation that each security team or contractor is responsible.
- Compliance Requirements: Any standards or regulatory requirements SS must adhere to across sites.
- Risk Assessment and Management: Security procedures for handling risk scenarios like theft, unauthorized access, or emergencies.
5. Preparation of an Organizational Structure (Organogram)
- Create a clear organogram illustrating the hierarchy within the Security service including:
- Leadership Roles: Highlight key personnel responsible for the security, such as the Chief Security Officer, Regional Managers, and Site Supervisors.
- Operational Structure: Show reporting lines for on-site security personnel, coordination with contractors, and administrative support roles.
- Functional Divisions: Separate teams or functions, like Monitoring and Surveillance, Incident Response, and Compliance Management.
Steps for Implementing the Security Budget and Planning
- Data Collection: Conduct a comprehensive data-gathering exercise across all sites to ensure accurate mapping and budgeting.
- Gap Analysis: Identify any discrepancies in manpower allocation or budget usage to improve efficiency and address any security vulnerabilities.
- Regular Review and Update: Implement regular assessments of security operations, contracts, and manpower to stay aligned with organizational goals and emerging security challenges.
Comments
Post a Comment