You are on page 1of 13

SAITO COLLEGE

SECURITY OPERATIONS MANAGEMENT


CONTRACTUAL SECURITY SERVICES AND LOCAL BANKING

NAME:MOHAMAD NAIM NAJMUDIN BIN MUSTAFFA CLASS:DSM15/7251 SUBJECT:SECURITY OPERATIONS MANAGEMENT TOPIC:CONTRACTUAL SECURITY SERVICES AND LOCAL BANKING LECTURER:MAJOR HAMDAN SUBMISSION DATE 21 MARCH 2012

1.0SCOPE OF STUDY

1.0 SCOPE OF STUDY 2.0 PURPOSE OF STUDY 3.0 INTRODUCTION 4.0 ANALYSIS 4.1 DEFINITIONS 4.2 BANKING 4.3 CONTRACTUAL SECURITY SERVICES 5.0 SERVICES THAT ARE PROVIDED 5.1 BANKING SERVICES 5.2 CONTRACTUAL SECURITY SERVICES 6.0 PERSONAL ISSUES 7.0 RELATIONSHIP BETWEEN BANK AND CONTRACTUAL SECURITY SERVICES 8.0 PROBLEMS, ISSUES AND CHALLENGES 8.1 BANK 8.2 CONTRACTUAL SECURITY SERVICES 9.0 ADVANTAGES AND DISADVANTAGES 9.1 BANK 9.2 CONTRACTUAL SECURITY SERVICES 10.0 SUGGESTION 11.0 RECOMMENDATION AND COMMENT 12.0 CONCLUSION

2.0PURPOSE OF STUDY To know what is the issues, challengis and problem that are faced by bank and
security services. To know better what is the main problem Exactly know how to take a responsible when security is need Want to know what is the contractual security services provide Gain more knowledge about local banking and security services Know how to handle a problem Want to knowing what is the real problem that are faced by bank and security services Minimize damage to company property Protect the brand Maintain continuity of the revenue stream To determining what exactly will happen Determining the events affect on the organizational Deciding what steps to take to continue the business of the organizational Monitoring and reporting progress during the events Determining how to communicate information to employees, executives, vendors(seller, marketer), and if need be , to the general publics. Ability to access the situations from inside and outsides the organisations as all stakeholders might perceive it. Techniques to direct actions to contain the likely or perceived damage spread. A more effective way to rapidly trigger that part of business continuity management. Better organizational resillence for all stakeholder with regulatory and ethical requirements Much better management of serious incidents or any incident that could become serious Improvbed staff awareness of their roles and expectations within the organizational Increased ability, confidence and morale within the organization. Enhanced risk management insofar that obvious risks will be identified.

Protected and often enhanced reputation a much reduced risk of post event mitigation. To know what is the issues, challengis and problem that are faced by bank and
security services.

3.0INTRODUCTION
As a person that will in charge a security and safety system in the organizational, the person must know about security operations management. Security operations management is very important thing because it contain a new field of study, know a potential skill, and know how to planning to deal with them, for example ,how to recover if your planning was not succeed. .Hopefully, organizations have a time and resources to complete security operations management plan before they experience a crisis, security operations management in the face

af a current, real crisis include identifying the real nature af a current crisis, intervening to minimize damage and recovering from the crisis. security operations management often includes strong focus on public relations to recover any damage to public image and assure stakeholders that recovery is security operations management consists of methods used to respond to both the reality and perception of crises such as security operastions plan. security operations management also define what scenarios constitute a operation is and should consequently trigger the necessary response. Operations is also a face of a risk management, although it is a probably untrue to say that security operations management represents a failure of risk management sice it will never be possible to totally mitigate the chances of catastrophes occurring. the private security industry is a component contain a security and safety in the Malaysia. Today, the private security is rensopble not only for maintaining the security and safety but have another job thaqt need a good planning and good decision.the other job is private security that a wide range of functions , including protecting employee, screening , provide a information, technology security and the other functions. Bank need a security services to various organizations with aim of providing quality solutions to our clients concerning safety against theft, dacoity, fire, kidnapping and other untoward incidences. The security services are incorporated to cater to provider bank security service the specialized needs of the banking industry and high value transactions by providing bank security service for cash-in-transit, cash pick up, secure vaulting and security couriers

4.0ANALYSIS 4.1DEFINITIONS
First we need to know what it means by banking and contractual security services :-

4.2BANKING
In general terms, the business activity of accepting and safeguarding money owned by other individuals and entities, and then lending out this money in order to earn a profit.

4.3CONTRACTUAL SECURITY SERVICES


A contract security company is operated by a professional security company and contracts its services to different companies

5.0SERVICES THAT ARE PROVIDED 5.1BANKING SERVICES


Some services offered by banks are: 1. Accepting deposits

2. Granting loans 3. Providing safe deposit lockers & vaults 4. Sell Insurance Products 5. Sell Investment products like Mutual funds etc.

5.2CONTRACTUAL SECURITY SERVICES


Guard Services A person hired by a private organization to guard a physical plant and maintain order. Alarm Monitoring - a device that signals the occurrence of some undesirable event Investigation the act or process of investigating; a careful search or examination in order to discover facts, etc Armored Transport an armor-plated truck with strong doors and locks used to transport money or valuables; "the paintings were delivered to the museum in an air-conditioned armored car" Cash transfer Cash transfers are necessary for project funding, local purchases, and wages. Atm automated teller machine, a machine at a bank branch or other location which enables a customer to perform basic banking activities (checking one's balance, withdrawing or transferring funds) even when the bank is closed. C.I.T is cash being transferred from one business to another or between two parts of the same business. If it is not recorded as an asset in either an adjusting entry may be necessary. Information Technology Security is concerned with improvements in a variety of human and organizational problem-solving endeavors through the design, development, and use of technologically based systems and processes that enhance the efficiency and effectiveness of information in a variety of strategic, tactical, and operational situations.

6.0PERSONAL ISSUES
LEADERSHIP Leadership, cohesion, and preparation can provide greater security than locks or reinforced fencing. Everyone should monitor their safety and security situation and should not hesitate to take the lead when a discrepancy is noted. CARE staff in supervisory positions should encourage conscientious implementation of all Country Office safety and security policies and procedures. Any person may be put in a leadership role during times of crisis or instability and should consider the following:

Develop adequate safety and security procedures and communicate them to all staff. Conduct regular safety and security updates. If necessary, designate a staff person to be responsible for evaluating the safety and security situation and ensuring staff training and enforcement of security standards. Remember the importance of confidentiality in information sharing. BACKGROUND CHECKS If reasonable to do so, background checks should be performed on all potential staff members (consistent with CARE policy and core values). This can mitigate or prevent potential safety and security incidents, such as hiring a driver with prior drunken driving convictions. The decision to conduct background checks rests with the CD and depends on the specific situation at each Country Office. At a minimum, a photo should be taken and the information provided on the Record of Emergency Data (RED) should be verified. Often these measures will discourage those who may pose a security risk from seeking employment with CARE. TRAINING RECORDS It is important to record all safety and security training completed. An updated training record should be included in each staff members personnel file. This allows identification of training priorities and can help determine suitability for advanced training. The training record provides a transportable, permanent documentation of training received and should be given to the member when they leave CARE, with a copy retained in the personnel file.

7.0RELATIONSHIP BETWEEN BANK AND CONTRACTUAL SECURITY SERVICES


The private contractual security services industry encompasses investigating, monitoring, armored transport, consulting, data security, and private correctional facility services. Corporations, institutions and private individuals are increasingly looking to these services to fill the void left by public and proprietary security. Growth is likely to be higher in nontraditional regions and nontraditional services that are outside the major metropolitan areas and in "new" areas such as counter-industrial espionage. The $18 billion industry will see dynamic change as large players diversify and new large players enter. Contractual guard services, private "police" services, and private correctional facility management are key growth sectors. The "private contractual security services" industry encompasses guard and private investigative services, central-station alarm monitoring, armored car transport and ATM servicing, security consulting and data security, and private correctional facility management

services. Niche markets also exist for a wide range of specialized security services, including: bomb sweeping and metal detection; drug testing; preemployment screening; renting of offsite secure vaults; radon and hazardous gas testing; and guard dog services. Corporations, institutions and private individuals are increasingly looking to the protective services to fill the void left by public and private "proprietary" security.

SECURITY MANAGEMENT: AN ONGOING CHALLENGE FOR BANKS


Banks face a difficult challenge in the area of security management. With a growing population of internal and external users accessing an increasing number of applications, the need has grown exponentially for banks to develop a new generation of security tools that can help them better comply with regulations, control access to confidential data and limit identity theft. At the same time, banks are challenged to institute security measures that satisfy users who are demanding both stronger security and ease of use and control -- often competing priorities. In addition, security management is ever changing. The desire for greater functionality must constantly be supplemented with stronger security measures to offset the risks of each new capability. Moreover, these security measures must be highly nimble; they must be quickly deployed and evolve over time to anticipate and adapt to new threats and emerging risks, as well as satisfy a new generation of customers who want more-personal and customized experiences that match their lifestyles. Lastly, the single largest security management challenge is the one most difficult to control. According to the 2007 Global Security Surveyby Deloitte Touche Tohmatsu, "The greatest root cause of external breaches continues to be the human factor." In other words, banks need to continuously educate and engage customers about their online security. However, customer education is difficult at best because the group most likely to be duped is also the group most likely to not actively seek education or to ignore education initiatives altogether. What does all of this mean? It means that truly effective security management will require the layering of a number of solutions that focus on people, process, technology and risk. Most important, the management of each layer will need to be based on its context among the diverse capabilities and limitations of the others. When all the layers are combined, it creates a powerful tool that can offer banks a much more successful way to manage their security challenges than any single stand-alone solution.

8.0PROBLEMS, ISSUES AND CHALLENGES


1. Guard Services Not have a good trainer

2.

3.

4.

5.

6.

7.

Always late to work Always try to take a rest Alarm Monitoring The system not function Use a old system Never try to update into a new system Investigation The investigator not have a experience Always do a bad decision making Always take a medical leave Armored Transport Use a old car Never services The armored is currently old Cash transfer The worker do not have a good attitude Always missing a money Never go to training Atm Use old machine The system always offline Not give a good services Information Technology Security Never update a system Use a old system Always offline

1. Loss Of Managerial Control Whether you sign a contract to have another company perform the function of an entire department or single task, you are turning the management and control of that function over to another company. True, you will have a contract, but the managerial control will belong to another company. Your outsourcing company will not be driven by the same standards and mission that drives your company. They will be driven to make a profit from the services that they are providing to you and other businesses like yours 2. Hidden Costs You will sign a contract with the outsourcing company that will cover the details of the service that they will be providing. Any thing not covered in the contract will be the basis for you to pay additional charges. Additionally, you will experience legal fees to retain a lawyer to review the contacts you will sign. Remember, this is the outsourcing company's business. They have done this before and they are the ones that write the contract. Therefore, you will be at a disadvantage when negotiations start.

3. Threat to Security and Confidentiality The life-blood of any business is the information that keeps it running. If you have payroll, medical records or any other confidential information that will be transmitted to the outsourcing company, there is a risk that the confidentiality may be compromised. If the outsourced function involves sharing proprietary company data or knowledge (e.g. product drawings, formulas, etc.), this must be taken into account. Evaluate the outsourcing company carefully to make sure your data is protected and the contract has a penalty clause if an incident occurs. 4. Quality Problems The outsourcing company will be motivated by profit. Since the contract will fix the price, the only way for them to increase profit will be to decrease expenses. As long as they meet the conditions of the contract, you will pay. In addition, you will lose the ability to rapidly respond to changes in the business environment. The contract will be very specific and you will pay extra for changes. 5. Tied to the Financial Well-Being of Another Company Since you will be turning over part of the operations of your business to another company, you will now be tied to the financial well-being of that company. It wouldn't be the first time that an outsourcing company could go bankrupt and leave you holding-the-bag. 6. Bad Publicity and Ill-Will The word "outsourcing" brings to mind different things to different people. If you live in a community that has an outsourcing company and they employ your friends and neighbors, outsourcing is good. If your friends and neighbors lost their jobs because they were shipped across the state, across the country or across the world, outsourcing will bring bad publicity. If you outsource part of your operations, morale may suffer in the remaining work force.

ISSUES AT BANK MALAYSIA


Bank Negara Malaysia (BNM) Bank Negara Malaysia (the Central Bank of Malaysia) was established on 26 January 1959, under the Central Bank of Malaya Ordinance 1958. The objectives of BNM are as follows: To issue currency and keep reserves to safeguard the value of the currency; To act as a banker and financial adviser to the Government; To promote monetary stability and a sound financial structure; and To influence the credit situation to the advantage of Malaysia. Commercial Banks The commercial banks are the largest and most significant providers of funds in the banking system. There are currently 24 commercial banks (excluding Islamic banks) of which 13 are locally incorporated foreign banks. The main functions of commercial banks are to provide: Retail banking services such as the acceptance of deposit, granting of loans and advances, and financial guarantees;

Trade financing facilities such as letters of credit, discounting of trade bills, shipping guarantees, trust receipts and Bankers Acceptances; Treasury services; Cross border payment services; and Custody services such as safe deposits and share custody Finance Companies Finance companies form the second largest group of deposit-taking institutions in Malaysia. Finance companies were initially governed by BNM through the Finance Companies Act 1969. This was replaced in 1989 with the Banking and Financial Institutions Act 1989. There are currently 12 finance companies. Finance company business is defined as: The business of receiving deposits on deposit account, saving account or other similar account; The lending of money; Leasing business or the business of hire purchase; and Any other such business as BNM with the approval of the Minister may prescribe.

9.0ADVANTAGES AND DISADVANTAGES ADVANTAGES


Loss Prevention

Security guards minimize theft. Often the mere presence of a security guard will deter patrons and professionals from stealing. Additionally, if a theft does occur, security guards are properly trained to apprehend suspects, create loss prevention reports, and correctly store evidence so that it may be used in court. Furthermore, the nature of their job often requires testifying so security guards are often reliable and strong witnesses. Safety

The presence of a security guard may help your business draw customers, especially if it is in an undesirable area. Patrons will feel more secure and therefore, more likely to shop if they know that the proprietor is concerned about their safety. Additionally, security guards can also inspect your premises and make recommendations that will minimize your risks of theft and accidents. Accident Protection

Security staff is often called when an accident occurs in the store. In some businesses, security staff roams the floors to ensure there are no thefts or accidents, but in others they use cameras. If an accident occurs, security staff can get to the site promptly, interview the victim and check the area for any obstructions or safety hazards. They are trained in creating accident reports which the victim and security officer can sign. Guards may also take a statement of what occurred from the injured person, and they can record whether the person

had any complaints or visible injuries. A security guard can minimize your exposure in lawsuits and verify that you are not at fault, thereby saving money. Other Benefits

Security guards can also assist with other safety concerns by checking alarms to ensure they are working properly. They can also help control traffic, assist with crowd control or lines, and help with parking. Patrolling security guards may also prevent interior and exterior property damage.
DISADVANTAGES

Unemployment - While information technology may have streamlined the business process it has also crated job redundancies, downsizing and outsourcing. This means that a lot of lower and middle level jobs have been done away with causing more people to become unemployed. Privacy - Though information technology may have made communication quicker, easier and more convenient, it has also bought along privacy issues. From cell phone signal interceptions to email hacking, people are now worried about their once private information becoming public knowledge. Lack of job security - Industry experts believe that the internet has made job security a big issue as since technology keeps on changing with each day. This means that one has to be in a constant learning mode, if he or she wishes for their job to be secure. Dominant culture - While information technology may have made the world a global village, it has also contributed to one culture dominating another weaker one. For example it is now argued that US influences how most young teenagers all over the world now act, dress and behave. Languages too have become overshadowed, with English becoming the primary mode of communication for business and everything else. Loss of management control. You will no longer be controlling the day-to-day security guard management. Management problems can arise if you hire a security guard company that does not have a lot of experience. You can prevent this by researching for the best company. If you hire an inexperienced company, you may have difficulties communicating objectives to them. Some companies my have hidden costs involved with their services. Try to find a company that tells you upfront what youre going to pay.

Inexperienced companies will lack the professionalism needed. You can combat against this by seeing and talking with some of their active-duty security guards. If they dont seem professional, go with another company.

10.0 SUGGESTION
When deciding whether or not to hire a security guard company, be sure to do your homework. Take your time to do your own personal analysis of the advantages and disadvantages for your business. Be sure to consult with staff and personnel at your business. Finding the right options to protect your business is an important decision. Be patient and consistent throughout your search and youll find the best choice for your business.

13.0 RECOMMENDATION AND COMMENT


Hard to say without further explenation of the context. But I suspect that the difference you're looking for is this: Do a security training :Usually part of an employee indoctrination program, training enhances overall safety and security, prevents or minimizes potential incidents, and allows the staff to react confidently to crisis or emergency situations. Subjects that should be mandatory for all employees in all Country Offices include: Basic personal security First-aid/CPR and emergency medical response Fire and electrical safety Evacuation procedures Landmine/UXO awareness (in appropriate areas) Other subjects that should be considered for all staff and family as appropriate include: Defensive-driver training and basic vehicle maintenance Stress management Anti-terrorism Communication procedures Incident reporting

14.0 CONCLUSION
Private security organizations play a number of important roles in the United States, ranging from guard and investigative services to alarm monitoring, armored transport, and security

consulting. The growth in private security has been driven in part by the increasing level of outsourcing of security functions in areas including commercial security, the privatization of corrections and certain policing functions, and infrastructure protection. In addition, relationships between public and private security agencies have improved in recent years, as both police departments and private security have paid greater attention to collaboration, information sharing, and partnership. Oversight by regulatory boards and the push for state and federal regulation suggests that government involvement is necessary. As the industry improves training, education, and personnel practices, the public can become more confident in the individuals hired to protect them. Although debates continue on how to regulate the private security industry, it is clear that more detailed and timely information is needed to better understand how the industry looks today and how it is changing. Governing policy and legislation will also become more important with the increase in responsibilities of individuals in the private security industry. By improving upon past data collection efforts, This document is a research report submitted to the MALAYSIA future studies can increase knowledge across the private security industry and provide more accurate and practical information for all stakeholders.

You might also like