Cover image for Jane's workplace security handbook
Title:
Jane's workplace security handbook
Author:
Viollis, Paul.
Edition:
First edition.
Publication Information:
Alexandria, Va. : Jane's Information Group, [2002]

©2002
Physical Description:
370 pages : illustrations ; 16 cm.
Language:
English
Contents:
Planning -- Facility security -- Personnel security -- Travel security -- Information security -- Emergency response procedures -- Crisis communications -- Critical incident stress management -- Organizational recovery -- Sample policies.
Added Author:
Added Corporate Author:
ISBN:
9780710625793
Format :
Book

Available:*

Library
Call Number
Material Type
Home Location
Status
Item Holds
Searching...
HV6431 .J34 2002 Adult Non-Fiction Non-Fiction Area
Searching...

On Order

Summary

Summary

Jane's Workplace Security Handbook is essential reading foremployers, considering all employers have a responsibilityto their employees, customers and shareholders to providea secure environment, including effectively responding tosecurity threats. Key topics covered include violence in theworkplace, terrorist attacks, domestic and international travelsecurity, information security and organisational recovery.


Table of Contents

Chapter 1 Planning
1.1 Introductionp. 3
1.2 Threat definition and vulnerability assessmentp. 9
1.3 The terrorist threatp. 12
1.4 Preparedness plansp. 20
Chapter 2 Facility Security
2.1 Introductionp. 27
2.2 Threat assessment and crisis managementp. 28
2.3 Command post and crisis teamsp. 37
2.4 Employee crisis trainingp. 45
2.5 Searching, evacuation, shelter-in-place and lockdownp. 49
2.6 Vulnerability assessmentsp. 59
2.7 Access control and perimeter securityp. 65
2.8 Mail handlingp. 77
2.9 Facility security checklistsp. 81
Chapter 3 Personnel Security
3.1 Introductionp. 93
3.2 It's the lawp. 96
3.3 Employer liabilityp. 98
3.4 Policy development and trainingp. 100
3.5 Employee and vendor background screeningp. 103
3.6 Recognizing potential offendersp. 105
3.7 Domestic violence in the workplacep. 110
3.8 At-risk terminationsp. 114
Chapter 4 Travel Security
4.1 Introductionp. 125
4.2 Pre-travel planningp. 126
4.3 Precautions when travelingp. 136
4.4 Healthy travelp. 145
4.5 Kidnapp. 149
Chapter 5 Information Security
5.1 Introductionp. 157
5.2 Information security threatsp. 159
5.3 Information security policiesp. 164
5.4 Incident response proceduresp. 179
5.5 Protecting informationp. 181
5.6 Virusesp. 185
5.7 Physical securityp. 196
5.8 Communication securityp. 202
5.9 Telemetry systemsp. 204
5.10 Post-Incident reporting proceduresp. 207
5.11 Data recoveryp. 210
Chapter 6 Emergency Response Procedures
6.1 Introductionp. 217
6.2 Bomb threatsp. 218
6.3 Bombs/explosive devicesp. 221
6.4 Chemical and biological weaponsp. 236
6.5 Nuclear and radiological weaponsp. 246
6.6 Armed attackers and hostage situationp. 257
6.7 Kidnap and ransomp. 262
6.8 Medical emergenciesp. 264
6.9 Hazardous materials and mechanical emergenciesp. 267
6.10 Firep. 273
6.11 Natural disastersp. 275
6.12 Structural collapsep. 281
Chapter 7 Crisis Communications
7.1 Importance of crisis communicationsp. 285
7.2 Communications planningp. 286
7.3 Communications trainingp. 291
7.4 Communications response guidelinesp. 292
7.5 Crisis communications proceduresp. 294
7.6 Communications with key constituentsp. 300
7.7 Situation and communications strategy assessmentp. 312
Chapter 8 Critical Incident Stress Management
8.1 Introductionp. 317
8.2 Post-traumatic stressp. 321
8.3 Post-traumatic Stress Disorder (PTSD)p. 324
8.4 Critical Incident Stress Management (CISM)p. 325
8.5 CISM: pre-crisis phasep. 326
8.6 CISM: acute crisis phasep. 327
8.7 CISM: post-crisis phasep. 336
8.8 Critical incident stress teamsp. 342
8.9 Memorials and anniversary eventsp. 343
Chapter 9 Organizational Recovery
9.1 Fact-findingp. 347
9.2 Business recovery checklistp. 349
Chapter 10 Sample Policies
10.1 Employee vulnerability assessmentp. 355
10.2 Sample workplace security policiesp. 356
10.3 Sample employee announcementsp. 361
10.4 Stress management handouts and tipsp. 363
10.5 Sample information security policiesp. 366