Background: In private industry/business, some employers must institute an administrative, non-coercive, search programs to address real or perceived property losses at the hands of their employees. In establishing such a program, there are various issues that must be considered beyond the impact it might have on employee morale. Company executives must thoroughly vet the legality of an administrative search under consideration and consider the potential for civil lawsuits filed against the company and its security operatives for such reasons as invasion of privacy, assault, false imprisonment, intentional infliction of emotional distress, and defamation. Legal claims may result from the manner in which the search is conducted. For instance, search protocols that are found by a court to be unreasonable, discriminatory, discourteous, unfair, highly intrusive, socially unacceptable conduct, or instituted for frivolous reasons will likely lead to successful claims by employees, a significant threat to company assets that must be avoided.
Scenario: The ACME Company manufactures various electronic devices for a variety of well-known brands. This includes cell phones, cameras, camcorders, stereos, computers, tablets, video games, and more. At any given time, many of these products are fully assembled and stored at the plant awaiting shipment to the vendors. Also stored at the plant are the expensive components used to manufacture the devices. As the new ACME security director, you have been alerted to the fact that significant inventory shortages have been occurring for the assembled devices and the stock components used to manufacture the electronic devices resulting in substantial company losses. You also have obtained information that these losses are the result of extensive employee theft.
To reduce or eliminate pilferage of company assets, you plan to discuss with the company’s executive staff a plan to institute a package control system that includes a reasonable administrative search or spot inspection of bags, packages, and large parcels carried by employees leaving the facility. Before you do so, however, you decide to conduct the appropriate research to write a policy and associated procedures for this workplace search that will withstand any judicial test for reasonableness and fairness and present your proposal to the staff for consideration. You know the provisions of the policy and procedures must ensure the company and its security operative’s balance their right to conduct limited searches to prevent and reduce company losses with employees’ expectation of privacy.
Writing Assignment: Students are to write a proposal for initiating an administrative, non-coercive package control search program for the ACME Company that will prevent or at least reduce the internal theft of company assets. The proposal must outline the specific provisions of the program policy, the operational protocols and procedures for conducting and documenting the searches and results, and the reasons why you believe the proposed policy and procedures are reasonable, fair, and non-discriminatory.
Formatting Requirements
The length of the proposal will be between 1,000 and 1,500 words and students will use and properly cite and reference in APA format at least 3 sources other than the course instructional material. Course instructional material may be used and cited, but may not be included in the 3 sources required.
· Double space
· 12 pt. font
· 1” margins
· Use APA citations for all sources
· Include reference page using APA format guidelines (not included in word count)
Additionally:
· Create a cover page for your assignment (not included in word count)
· Include your name
· Course title and number
· Project title
· Date of submission
For a custom paper on the above topic, place your order now!
What We Offer:
- On-time delivery guarantee
- PhD-level writers
- Automatic plagiarism check
- 100% money-back guarantee
- 100% Privacy and Confidentiality
- High Quality custom-written paper
You May Also Like This:
- Information Security Policy
- Implementing Network and Personnel Security Measures
- The Enterprise Information Security Policy
- Networking and Security in the Business World
- border security in Texas
- Designing infrastructure and security protocols.
- Security and Risk Management
- SQL Security and High Availability
- Current Legal Issues of Human Resource Management
- ABC Corporation income statement at year-end of 2014
- How can organizations develop confidence in the security of their networked systems when they have the capability to open their systems to almost any network?
- computer security
- NR532 Week 5: Legal/Regulatory Issue Assignment As the nurse executive of a healthcare organization, it was reported to you that one of your nurses may be chemically impaired (legal/regulatory issue) and has allegedly been taking drugs from the unit.
- Comparing Homeland Security Research Products
- contemporary global security agenda in relation to major events and key theoretical concepts;
- supporting homeland security efforts
- Challenges in the Global Business Environment
- Homeland Security
- The McGraw-Hill Handbook of Homeland Security
- Health Care Data
- Analysis and the current status of security logins to DAMTSC
- Computer Systems Security Foundations
- Discuss the history of private health insurance and manage care and how it involved into a healthcare industry?
- Technical Research
- Security and Privacy Implications of the HITECH Act
- legal ethics and proffesional practice
- use of the constitution, local, state, and federal law, common law, statutes, public policies, private policies, mandates, etc. all of which WILL be at your disposal.
- Valuation of a Private Target Rastell
- Challenges in the Administration of Juvenile Detention
- Examine the history and events that led to the creation of the Department of Homeland Security