Can this be done tonight

Create a 11-13 power point slides (with speaker notes) in which you establish a critical incident and emergency management response plan for your organization, to include preparedness, prevention, response, and recovery to catastrophic events or significant security incidents. Include external relations and communications necessary to execute your plan. Provide the rationale and a preliminary budget for your recommendations.

Risk Assessment Content Checklist


1.     Nature of Business/agency 

2.     Facility Name                                 

3.     Address                             

4.     Survey Date                                   

5.     Hours of operation             

6.     Facility Contact Person       

7.     Phone Number                   

8.     Fax number

9.     Email                                             

10.  Environment                                  

11.  Survey conducted by                      

12.  Surveyor’s address             

13.  Surveyor’s phone               

14.  Surveyor’s email                 

COUNTRY (where the facility is located USA)

1.     Political conditions                         

2.     Crime rates                                    

3.     Personnel safety                            

4.     Availability of labor                         

5.     Economic conditions                                  

6.     Medical treatment availability          

7.     Public fire fighting availability          

8.     Public utilities                                 

9.     Public transportation                                   

10.  Earthquake susceptibility                

11.  Fire susceptibility                           

12.  Tornado susceptibility        

13.  Severe weather susceptibility                     

COMMUNITY (neighborhood)

1.     Crime rates                                    

2.     Aesthetic qualities                          

3.     Public police protection                  

4.     Fire protection                               

5.     Emergency medical services                       

6.     History of civil unrest                      

7.     Graffiti/vandalism                           


Facility Perimeter

1.     Fencing                                         

2.     Landscaping                                              

3.     Parking                                          

4.     Employee parking are illumination   

5.     Visitor parking illumination               

6.     Employee parking area monitoring  

7.     Visitor parking area monitoring        

8.     Lighting                                                     

9.     Vehicular traffic pattern                   

10.  Trash removal                                

11.  Protection from adjacent occupancies

12.  Proper signage                              


1.     Description of building

2.     Common walls with adjacent occupancies               

3.     Exterior door construction                           

4.     Exterior door locks                         

5.     Door lock operation                                    

6.     Exterior window construction                      

7.     Window height above ground                      

8.     Window security                                         

9.     Roof access restriction                               

10.  Building exterior lighting                              

11.  Shipping/receiving area monitoring              

12.  Emergency exit                                          

13.  Emergency exits unobstructed                    

14.  Interior door construction                            

15.  Interior wall construction                             

16.  Antitheft systems/mechanisms                    

Access Control

1.     Intrusion detection                                                  

2.     Building entrances minimized                                  

3.     Employee entrance monitoring                                

4.     Visitor/guest entrance monitoring                            

5.     Interior door locks                                                  

6.     Key control system                                                                         

7.     Key sign-out/assignment system                             

8.     Keys accounted for                                                

9.     Key safeguards                                                      

10.  Employee distinguishableness                                

11.  Visitor/Guest supervision                                        

12.  Restricted access to sensitive/vulnerable areas        

13.  Computer/data storage restrictions                          

14.  Key storage area restrictions                                               

15.  Mechanical/utility room restrictions                          

16.  Telecommunications room restrictions                     

17.  Mailroom restrictions                                                          

18.  Executive office suite restrictions                            

19.  Vendor access                                                       

20.  Vault/safe security                                                  

21.  Controlled substance security                                 

22.  Hazardous Material security                                    

23.  Cash/liquid asset protection                                    

24.  Proper signage to direct visitors                              

Alarm and Surveillance Systems

Describe the system and components

Fire Protection

1.     Fire alarm system                          

2.     Sprinkler system                            

3.     Fire extinguishers                           

4.     Fire suppression                            

5.     Fire alarm system testing                

6.     Gas line protection                         

7.     Electric power cord protection         

8.     Fire doors functional                                  

9.     Flammable material storage            

10.  Fire notification plan                       

11.  Fire evacuation plan                       

12.  Fire exits unobstructed                   

13.  Fire exits secured from outside       

14.  In house fire brigade                                   

15.  Fire safety policy/procedures                      

16.  Address prominently displayed       


1.     Employee background investigations                      

2.     Previous employer verification                                

3.     Personnel records security                                      

4.     Exit interviews that employee termination                 

5.     Organization property retrieval at termination

6.     Employee/visitor safeguards against

7.     Accidents                                                                                                              

8.     Theft                                                                                  

9.     Assault                                                      

10.  Workplace violence                                    


1.     Critical information identification                                          

2.     Critical information security                                                 

3.     Information hardcopy destruction                                        

4.     Employee nondisclosure agreement in place                        

5.     Intellectual property identification                                        

6.     Intellectual property security                                                

7.     Client and customer list protection                                       

8.     Access to computers restricted                                           

9.     Access to computer transmissions restricted                        

10.  Laptop and personal computer security                               

11.  E-mail access restrictions                                                   

12.  Internet connection security                                                

13.  Electronic document destruction procedures                        

14.  Software licensing                                                              

15.  Prohibition against installation of outside software                

16.  Terminated employees immediately denied access              

17.  Disaster recovery plan                                                        

18.  Duplicate data files maintained at remote location                

19.  Password security                                                              

20.  Information security indoctrination and training                     

21.  Cellular phone communication protection                            


Background Investigations

1.     Employees (new)                                                                

2.     Employees (existing)                                                                      

3.     Vendors/contractors                                                           

4.     Partnerships with other organizations                                  

5.     Security clearances                                                            

Incident Investigations

1.     Investigation of any loss                                                     

2.     Accidents                                                                          

3.     Safety hazards                                                                   

4.     Crime                                                                                             

5.     Natural disasters                                                                


1.     Competition counterintelligence                                           

2.     Criminal intelligence                                                           

3.     Foreign travel intelligence                                                   

Reporting Procedures

1.     Background investigations documentation                           

2.     Background investigation confidentiality                              

3.     Security activity log maintenance                                         

4.     Recording of incidents                                                        

5.     Incident reported to proper manager and/or authority

6.     Adherence to reporting procedures                                      


1.     Audit procedures                                                                

2.     Employee locker/workstation inspections                             

3.     Accounting function separation                                           

4.     Package control system                                                     

5.     Opening time ambush controls                                            

6.     Closing time ambush controls                                             

7.     Receiving area security                                                      

8.     Shipping area security                                                        

9.     Delivery driver controls                                                       

10.  Shipping/ receiving area separation                                     

11.  Equipment inventory                                                                       

12.  Contractor/vendor audits                                                     

13.  Customer/guest/visitor service                                            


1.     Mission statement                                                  

2.     Vision statement                                                                 

3.     Organizational goals                                                                      

4.     Organizational values                                                         

5.     Quality improvement initiatives                                            

6.     Employee code of conduct                                                 

7.     Employee misconduct policies                                            

8.     Disciplinary procedures                                                      

9.     Termination procedures                                                      

10.  Search/inspection policies                                                  

11.  Removal of organization property                                        

12.  Bomb threat procedures                                                     

13.  Evacuation procedures                                                       

14.  Severe weather procedures                                                

15.  Natural disaster procedures                                                

16.  Contraband detection                                                                     

17.  Chemical abuse policy                                                       

18.  Drug testing policy                                                 


1.     Indoctrination for new employees                                        

2.     Training for existing employees                                           

3.     Executive protection                                                                       

4.     Foreign travel training                                                         


1.     Contact with local police maintained                                                            

2.     Contact the sheriff maintained                                                         

3.     Contact with state police and/or highway patrol maintained               

4.     Contact with fire department maintained                              

5.     Contact with appropriate federal agencies maintained                       

6.     Articulation and/or collaboration with other security organizations

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with Lets Write For You
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat