Security Organization Essay

883 words - 4 pages

The Security Organization
Phase II Discussion Board
By: Kristal Smith
Professor: Blair Ettinger
August 24, 2010

Good Afternoon ladies and Gentlemen my name is Kristal Smith I am the president of Ajax Security Management Company. Claims of negligent hiring are a serious legal issue that could possibly arise at our company. I would like to discuss what negligent hiring is and what actions can be taken to prevent our recruitment and selection process from a negligent hiring claim as well as some examples of a negligent hiring claim.

Negligent hiring is a claim made be an injured person against an employer. This claim would be based upon the employer having the knowledge that the ...view middle of the document...

Every single person is not going to tell you the whole truth about their background especially if they are trying to hide something. If you were to just believe everything that is on their application without completing any investigations, the employer would be held responsible. Negligent hiring claims can reflect badly on our company and reputation which would deter future employees from wanting to work for our company.

Five conditions must be present for an employer to be held liable for negligent hiring 1) The employee, acting under the auspices of employment must have caused some type of injury 2) The employee must be shown to be unfit 3) The employer should have known about the unfitness 4) The injury must be shown to be a foreseeable consequence of hiring the unfit employee 5) The hiring of the unfit employee must be shown to be the proximate cause of the injury. (Ryan and Lasek 1991) A bus company hired an employee to drive the city bus. The company did not do a complete background check to see what his driving record looked like. After almost a full year of employment the bus driver wrecks and ends up killing 5 people and injuring 3. The bus driver had many infractions on his driving record for careless driving, speeding, and one count of DUI. The bus company would be responsible for negligent hiring because they could have seen what kind of record this man had before putting him behind the wheel of a bus.

Performing a drug test before and during the duration of the employee’s employment and the knowledge of their background of what drugs the person may have tried...

Other Papers Like Security Organization

Introduction to Information Security Student Essay

1249 words - 5 pages is “the quality or state of being secure to be free from danger.” 嗗 In other words, protection against adversaries from those who would do harm, intentionally or otherwise—is the objective. 嗗 What is Security A successful organization should have the following multiple layers of security in place to protect its operations: Physical Security Personnel Security Operations Security Network Security Information Security Communications Security

Cyber Security: Physical and Digital Security Measures

3505 words - 15 pages of a lack of knowledge or an inability to appropriately apply that knowledge, companies like Target, Home Depot, and even Sony, among others, find themselves faced with security nightmares that could have just as easily been avoided (Yang & Jayakumar, 2014; Home Depot, 2014; Steinberg, 2014). In order to be able to approach cyber security properly, an organization must both have the knowledge necessary to implement a system designed to

Chapter 1-Introduction to Information Security: Principles of Information Security

979 words - 4 pages damage. Exposure: is a single instance when a system is open to damage. Vulnerabilities can in turn be the cause of exposure. 3. How is infrastructure protection (assuring the security of utility services) related to information security? The organization needs to have clear parameters and set regulation when it comes to the protection of itself. Clear goals and objectives when it comes to protection will lead to a better protection on

Principles of Security 5th Edition Chapter 1 Review Questions

844 words - 4 pages bottom-up approach? The bottom-up approach lacks support from upper management. The top-down approach offers more upper management support with more funding plus clear planning. 12. Why is a methodology important in the implementation of information security? How does a methodology improve the process? A methodology is important because it avoids missing any steps to ensure security. 13. Which members of an organization are involved

Logical and Physical Security

1645 words - 7 pages system requirements and a global footprint. It also analyzes the fundamental components of an IT security system and explains how their integration supports and enhances the overall security profile of the organization. PROS AND CONS OF COMBINING INFORMATION TECHNOLOGY AND PHYSICAL SECURITY FUNCTIONS. Combining logical and physical security systems has several benefits. One of the benefits of the convergence is improved efficiency. Management of

Chapter 1 Review Questions

870 words - 4 pages improve the process? A. A formal methodology doesn’t miss steps and maintains a rigorous process. 13. Which members of an organization are involved in the security system development life cycle? Who leads the process? A. Security professionals are involved. B. Data owners, Senior Management and security project team are the leaders in the project. 14. How can the practice of information security be described as both an art and a

Public Policing Vs Private Security

1153 words - 5 pages systems (Lemke, 2011). Another aspect to physical security is security personal. The physical aspect of the security plan may be the main focus on protecting and deterring crime. The next aspect is personnel. The personnel aspect of a security plan is protecting people within a company or organization and this comes from the presence of the security guard. Another aspect of personnel security is identification badges. Identification badges would

Linux Security

448 words - 2 pages and improving security. • security policy; • organization of information security; • asset management; • human resources security; • physical and environmental security; • communications and operations management; • access control; • information systems acquisition, development and maintenance; • information security incident management; • business continuity management; • Compliance. ISO/IEC 27001 is an internationally

Security Management Case Study #1

819 words - 4 pages security personnel hiring and deploying * Establishing emergency and disaster recovery plans * Identifying the resources needed and available for the security program to operate efficiently * Developing and presenting instructional seminars for management and operations personnel in all of the above listed areas. The list above is designed to establish the foundation of the security department within the organization. It is through these

Hospital and Healthcare Security

1854 words - 8 pages Hospital and Healthcare Security Course SEC_330 March 17, 2013 Contents Summary 3 Security Risks and vulnerability 3 Security Department organization and staffing 5 Security Force administration 5 Patient care involvement 6 Physical security safeguards 7 Electronic security system integration 8 Emergency preparedness 8 Conclusion 9 References 11 Summary Maintaining adequate levels of security in hospitals and

Global Security Policy - Week 5 - Cmgt-400

969 words - 4 pages intellectual property (Loveland & Lobel, n.d.). Security leaders of an organization must bring up security issues and discuss how security affects business decisions and goals. Sometimes linking security to client requirements and regulatory compliance can help push executives to keep security as a part of the overall strategic plan, and add security investments as a part of the budget. Securing data on a local level should have similar

Related Essays

Security Goals And Objectives Essay

805 words - 4 pages Goals and Objectives of a Security Organization SEC 310 17 November 2013 Goals and Objectives of a Security Organization This paper will focus on major topics of a successful security organization. The first topic to be addressed is how each organization, both within industry or within the governmental realm must ascertain their goals and recognize the consequences of failing to achieve their objectives. This paper on will focus on

Cap Study Guide Essay

5295 words - 22 pages the senior agency information security officer 5. Who is the highest-level senior official or executive within an organization with the overall responsibility to provide information security protections commensurate with the risk and magnitude or harm? a. The head of agency (or chief executive officer) 6. The six steps of the Risk Management Framework and what occurs on each step. a. Step 1: Categorize

Cmgt400 Week 4 Individual Essay

1359 words - 6 pages The Role of Information Security Policy A successful Information Security Program is determined by how the security policy for an organization is developed, how it is implemented, and maintained. An effective sound security policy creates a solid foundation for an information system. The policy makers must emphasize that within the organization, the role played by information security is of paramount importance. The system administrator is

Goals And Objectives Essay

1174 words - 5 pages Goals and Objectives for a Security Organization Security organizations play a major role in the daily functions in both business and government operations. These functions are multi-faceted and must achieve specific goals and objectives. Security organizations that effectively implement goals and objectives into their structure maintain superiority over others. This superiority not only demands for excellence in carrying out their goals and