Legal Challenges for Private Security

No directly quoted material may be used in this project paper. Resources should be summarized or paraphrased with appropriate in-text and Resource page citations. Project 2: Legal Challenges Confronting Private Security Operations: Administrative Searches Scenario: The ACME Company manufactures various electronic devices for a variety of well-known brands. This includes cell phones, cameras, camcorders, stereos, computers, tablets, video games, and more. At any given time, many of these products are fully assembled and stored at the plant awaiting shipment to the vendors. Also stored at the plant are the expensive components used to manufacture the devices. As the Corporate Security Director for the ACME Company, you have been alerted that significant inventory shortages have been occurring for the assembled devices and the stock components used to manufacture the electronic devices resulting in substantial company losses. You also have obtained information that these losses are the result of extensive employee theft. During previous discussions with private security leaders from other organizations, you sought more information about the effectiveness of an administrative search program as an option to address internal theft. You call a meeting with your security team and other company directorate heads, to include the organization’s legal counsel, to discuss possible security options to thwart the reported losses. The discussion at this meeting centers on the fact that in private industry/business, some employers institute an administrative, non-coercive, care taking search programs to address real or perceived property losses at the hands of their employees. But in establishing such a program, there are various issues that must be considered beyond the impact it might have on employee morale. Everyone agreed that company executives must thoroughly vet the legality of an administrative search under consideration and consider the potential for civil lawsuits filed against the company and its security operatives for such reasons as invasion of privacy, assault, false imprisonment, intentional infliction of emotional distress, and defamation. Everyone was also concerned about legal claims that may result from the manner in which the search is conducted. For instance, search protocols that are found by a court to be unreasonable, discriminatory, discourteous, unfair, highly intrusive, socially unacceptable conduct, or instituted for frivolous reasons will likely lead to successful claims by employees. All participants at the meeting agreed this would be a significant threat to company assets that must be avoided.

#Legal #Challenges #Private #Security

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

One Specific Psychometric Test, which is used in Personality Disorder(

Guidance for Assignment 2 in ARM (2018-2019): Research Methods Portfolio This document will provide you with assignment guidance for “Research Methods Portfolio”. Foreword For this assignment, you will need to prepare one article to be published on the Psychologist, a forum for communication and discussion among members of the British

Checkpoint Information Security Management Practices

Assignment read Checkpoint Information Security Management Practiceshttps://hbsp.harvard.edu/import/588485 (Links to an external site.)Links to an external site. Question 1. What weaknesses in ChoicePoint Information Security Management practices likely contributed to their data breach? Please explain how they contributed and what Choice Point could do to strengthen these areas. [points] #Checkpoint #Information

HIS 17B WRITING GUIDE

1. Avoid Global Openings Do not begin your papers with statements like: “Throughout history, people have struggled with the question of whether democracy can succeed.” Instead, lead the reader immediately into your specific argument. Ideally, address the prompt directly: “Southern whites sought to eliminate black voters’ rights almost immediately after

“Infinity Ghazal Beginning with Lice and Never Ending with Lies,”

Write a 1500-1800 word paper (around 5-6 pages) analyzing ONE of the following poems: • “Haunted Sonnet,” by Hoa Nguyen • “Infinity Ghazal Beginning with Lice and Never Ending with Lies,” Tarfia Faizullah • “Let Me Count the Waves,” Sandra Beasley (sestina) • “Saturday at the Border,” Hayden Carruth (villanelle)

BUSMGT 712 Principle of Business Analytics

You are an analyst working for the New Zealand Ministry of Foreign Affairs and Trade. Ms. Smith, your manager, has tasked you with learning more about the performance of New Zealand’s food exports and providing her with a report. To do so, she has provided you with a dataset. The

10 year bond yield (Argentina)

Overview of assignment You are required to produce a report on the determinants of 10 year bond-yield. Your report should be based on Argentina REQUIREMENTS Your report must fulfil the following specific tasks: 1. Provide a review of relevant literature, with particular emphasis on the relationship between your independent and

International Market Assessment for Lidl or John Lewis

International marketing essentially relates to marketing operations in a new country or market. The purpose of this assignment is to assess student ability to determine attractive international market using key analytical tools learned in this module. You are to assume the role as an international marketing consultant either for the

Wall of Silence Reflective Journal

Based upon Gibson and Singh Part 1 and 2: Breaking the Silence. Gibson and Singh provided alarming statistics based upon the IOM’s 1999 report of 100,000 deaths per year due to medical errors. According to Gibson and Singh, this translates to 275 deaths due to medical errors every day. Based

MGMT440 Case Study Assignments

During the course you will complete an analysis of three mini cases. To prepare for these assignments, you are strongly recommended to first read How to Conduct A Case Analysis on page 516 of the textbook. Practicing this approach in MGMT440 will prepare you for the more extensive case study

Process Recording Form, MSW Foundation Online Version

Guidelines: 1.        Interviewing requires active listening, taking cues from the client, using open-ended questions, and so forth. Therefore, the process recording should not originate from an intake form that may be overly scripted. 2.        You may not record the interview used for the process recording; therefore, pre-arrange time immediately after

Creation of a personal philosophy of teaching and learning is

The creation of a personal philosophy of teaching and learning is foundational to successful practice. It is, then, critical to synthesize the resources and tools in this course with additional evidence, philosophies, and one’s own practice to construct a grounded and evidence-based personal philosophy of teaching and learning. This philosophy

Enhancing quality of services through effective collaborative practice

The topic of the assignment is: Meeting the dementia challenge: rapid diagnosis and referral. The assignment need to be written critically meeting all the learning objectives. The assignment has to be 3500 words. Do refer to the need of increased diagnosis rates of dementia and providing post-diagnosis support. You need

Would long distance runners benefit more from barefoot running as

Complete a Research Project (at least 10 pages) The learner needs to achieve at least 75/100 to be competent The Learner must research a topic that is pertinent to the Sport and Fitness Industry. The research must incorporate the following headings:  Title and Abstract [10]  Introduction [10] 

A Christmas 2018 communications campaign

This is designed to show your understanding of how theoretical communication models are used in practice. Please note you MUST NOT choose the John Lewis campaign. Please select a Christmas 2018 communications campaign of your choice and analyze (ie don’t just describe it) it in terms of : ¬¬¬¬¬ •

MBA5005 Individual Project

To make the course engaging for each student, you will select a legal topic to research in Weeks 3 and 5 of the course. Click HERE for complete instructions and a list of topics. Although you are not required to select the exact topics listed, you should select something closely

Based on the information in Table 1 (including your answers to

Tablet Ltd operates in both England and Scotland, making fudge. Table 1 below gives some examples of the pay received by Tablet’s employees living and working both sides of the border. All of these employees are below state pension age. Table 1  Examples of pay at Tablet Ltd (2018/19 tax year)

Using the Household income equivalence calculator, calculate the

Pep and Jose, in their 40s and 50s, respectively, are setting up home together in the North of England, along with Jose’s son, Alexis, aged 13. Jose’s dad helps with childcare, allowing Jose to work part-time. With his salary and child benefit, Jose has an income of £13,000 a year

HI6008 Assignment 2 Requirements

All HI6008 Students enroll in the 2018 need to follow below Assignment structure: Word count: 1500 to 2000 words 1. Introduction 2. Project Objective 3. Project Scope 4. Literature Review (Students’ needs to summarise Assignment 1 literature review (2-3 pages) and justification from Assignment 1 literature problems, gaps opportunities, Hypothesis)