Introduction
Occupations safety and health (commonly abbreviated as OSH) is an important aspect of any professional environment. The purpose of this toolkit is ensure that safety, health and welfare requirements of the people, who are employed by the organization, are duly protected. In addition, among the purposes of OSH include the protection of outsiders, customers, the natural environment and other stakeholders, who may be potentially affected by any unforeseen emergencies of a business institution, or by the dangerous production process of its industrial units (Roughton & Mercurio, 2002).
The present case focuses on the analysis of occupational security procedures followed by Huawei Technologies Co. ltd, a leading Chinese manufacturer of telecommunication devices and equipment, for launching new production sites. This company has one of the most comprehensive and effective policies in terms of ensuring high standard safety requirements for the employees, visitors of the area and other stakeholders.
The purpose of this research is to evaluate control procedures of the new facility, to recommendations for personal security, to analyze considerations of inventory control and to analyze perimeter/facility security. Finally, this paper provides a brief threat and vulnerability analysis of the safety procedures.
Access Control Procedures Evaluation
There are several important requirements of access control procedures effectiveness evaluation.
Firstly, it is important to prescribe that the facility should be opened during business hours only, which are to be determined by the Director of this facility. Only the facility security guards or authorized managers should be allowed to be in the premises after the business day ends.
Secondly, access should be granted to the authorized personnel only. Each employee of the organization should have a special card-key, and other possibilities of getting entry should not be available. In the meantime, it is important to remember that the facility may be sometimes visited by the contractors, guests or students. There is a need to prepare special temporary cards for them. All visitors should be agreed on with the administration in advance.
Thirdly, the security department should conduct identity checks of all, who enter the facility both manually and automatically. Once the management terminates access to any specific employee or other visitor, the security department should be immediately notified, so that any attempts of unauthorized entry will be prevented. It is also important to make the employees aware that it is they who are responsible for storing access keys and documents. If anyone enters the facility using the key of an employee, who, either negligently or willfully handed it over to the trespasser, the employee may be held responsible for this (Leveson, 2012).
Personnel Security Recommendations
In the light of potential natural and man-made hazards and risks to the facility, the following personnel security aspects seem to be justified.
Firstly, the security professionals of the site should inspect all packages and documents, which arrive and which leave the area. In addition, it is important to check all types of storage media as well, because not only the site has physical dangers, but also it is important to prevent leaks of information and infusion of harmful malware into the system.
Secondly, the security department is obliged to check that everyone wears identification badges all the time. These badges will be a proof that only those, who have legitimate grounds to be present were granted authorization, and that the management approved it. The badges may be permanent (issued to the employees) or temporary (issued to the visitors and
Thirdly, the security department should ensure that such identification badge is protected from counterfeiting or coping (Roughton & Mercurio, 2002). Therefore, the company should create unique technology, trade-secreted technology, which will be used for this purpose. A specific electronic chip should be integrated into each badge, so that the security department will be always capable of checking authenticity of the identification documents.
In addition, security department of the organization should establish the areas, which should be off-limits to unauthorized visitors. For the most important areas, like engineering department, where confidential information may be stored, or e.g. where the production processes are concentrated, the entry should be prohibited to anyone, except for the privileged categories of employees. In order to avoid any possible confusions or misunderstandings, such areas should be clearly marked.
Finally, there is an important need of escorting visitors when they arrive to the side. Everyone, who is not an employee or a contractor, who has been authorized to visit, should be constantly accompanied by the staff. Some visitors might have been hired by the competitors to find out trade secrets of the company. Others may be heedless or unobservant, which may lead to their traumatization and subsequent lawsuits filed against the company for negligence of its staff or non-conformity with the safety guidelines.
Inventory control considerations
Inventory management is one of the most critical aspects of ensuring an effective protective environment. Among other issues, the managers have to focus on the three critical aspects – safety of the stock, reduction of the lead time and consignment of the inventory.
There are different methods of stock safety management. In the present case, the site should establish a special supervisory unit, which shall be responsible for stock control management. Reducing supply time is also essential, i.e. there is a need to create a reliable network of suppliers, i.e. curtailing the receipt time should become one of the key managerial priorities. Finally consignment inventory is an important way of reducing costs, as well as it is an important aspect of maintaining safety.
Perimeter and facility security
The system of perimeter security designs revolves around five critical Ds:
It should deter. Technically, this function is exercised by erecting fences, installing surveillance cameras and placing signs (e.g. ‘the area is under surveillance’ or ‘trespassing prohibited’), that the area is under supervision.
The second element is detection, i.e. security system should be capable of detecting all forms of unauthorized entry. It is important to ensure that the signal about unlawful intrusion should reach the security guards in a timely manner, so that they can take a timely responsive action.
The third element is denial, meaning that the system should be created in a way, which allows authorized personnel to enter, while preventing others from getting access to the premises.
Finally, the defend perimeter signifies that the security guards should react to the intruders, which managed to circumvent other perimeters. Video cameras should be used to evaluate the effectiveness of apprehension techniques used by the security guards (Roughton & Mercurio, 2002).
Threat and vulnerability analysis of the area
Threat and vulnerability assessment means that all potential risks and hazards should be classified into several groups. Thus, threats, which may potentially jeopardize the site, should be classified into devastating, severe, noticeable and minor. Appropriate responses should be developed by the security department of the organization to tackle each of these elements.
Conclusions
References
Leveson, N. (2012). Engineering a safer world systems thinking applied to safety. Cambridge, Mass: The MIT Press.
Roughton, J. & Mercurio, J. (2002). Developing an effective safety culture a leadership approach. Boston: Butterworth-Heinemann.