OUR METHODOLOGY OF SECURING OUR CLIENT’S  SPECIFIC INTERESTS



Before you make a decision on choosing a security company to protect your interests or to partner with, it is vitally important that you know the company's "methodology" to providing your individually specific services. You need to know if the security company is astute in providing security services. Can they actually provide legitimately effective services?, or are they just a money-seeking, opportunistic entity that is seeking to cash-in on and take advantage of our society's genuine need for protection? Are the officers that will be providing your security services consciously aware of:

(A) What they are doing; and

(B) Of the most effective security sciences/practices or are will they just be warm, human bodies there to fill a post at the absolute cheapest pay-rate in which the security company can hire?



Well, CSF is an astute security provider that is legitimately qualified to secure your specific interests and to serve your protection needs. In fact, we employ our very own proven and unique brand of "security science" when securing each and every one of our client's specific interests. The methodology to our security science is founded upon the following approach:

ASSESSMENT OF THE CLIENT'S SPECIFIC CIRCUMSTANCES AND DESIRED RESULTS

Our Client Assessment process is the most important and foundational step in effectively securing our client's interests. Once contacted by a client, a qualified (Qualified: Capable of conducting a vulnerability assessment) CSF manager will arrange an initial meeting with the client. In this meeting, the CSF manager will:

• Carefully listen to and communicate with the client to concretely establish an understanding of their concerns, experiences, pre-established tolerances, and ultimately their specific circumstances/vulnerabilities and their desired results. It is within this meeting, that a "diagnosis of the client's circumstances" is determined.

• Conduct a visual inspection of the physical location (Work site) to further evaluate the client's circumstances/vulnerabilities.

• Conclude the Client Assessment process by meeting with the CSF management team to discuss and analyze the information collected within his/her initial meeting with the client.

ESTABLISHING A PRESCRIBED SECURITY SOLUTION

Once the CSF manager completes the initial Client Assessment process and the "diagnosis of the client's circumstances" is determined, the CSF managerial team collaborates to formulate and recommend a prescribed security solution that is best suited to serve the client's protection needs.

There are two components to our prescribed security solutions. The first component is the recommendation of the type(s) of security service(s) that would be best suited to reach the client's desired results that were articulated in the initial Client Assessment process. Depending upon the client's specific set of circumstances, a prescribed security solution may suggest the use of one or more of the following types of services:

• Armed Officers

• Unarmed Officers

• Stationary Officers

• Access Control Stations/Officers

• Technological Services

• "Soft" Uniforms (Blazer, Slacks, Shirt and Tie)

• "Hard" Uniforms (Police Department Style)

• Plain Clothes Officers (Undercover)

• Foot Patrol

• Vehicle Patrol

• One or Multiple Officers

• Key Control

• Recommend Secured hours/times

Once the type(s) of service(s) are accepted by the client, the second component to the prescribed security solution is the development of a uniquely tailored set of policies and procedures that will govern the thinking and behavior of the officers working that particular site. They clearly express the "Do's," the "Don'ts, the "How's," the "When's," the "Why's," and the "What To Do's" when the unexpected arises. These policies and procedures are established upon the facts derived from the Client Assessment process and are geared toward protecting the client's specific interests, minimizing and/or alleviating their vulnerabilities and concerns, and enhancing the client's environments by our presence.

Once these two components are established and agreed upon, they represent a type of "prescription" or security product that shall serve as a remedy to the "diagnosis of the client's circumstances."


OBTAINING THE CLIENT'S DESIRED RESULTS

Once the assessment has been completed, the appropriate security solution has been selected and agreed upon, and the policies and procedures have been documented within post orders, it is now time to implement the prescription in the manner in which the post orders prescribe to obtain the client's desired results. It is time to perform the services.

The Officers that are assigned to perform the services at each client location are carefully selected in a manner that matches the individual officer's strengths, experiences, and training with the client's specific needs that are predetermined through the assessment process. Once an officer is assigned, each officer is carefully indoctrinated in the post orders of that particular work site and in the vision behind those post orders to enable the officer to fully understand the client's desired results and the methodology prescribed to reach those desired results. In short, the officer will fully understand their purpose for being there and their performance/actions will be strictly governed by that purpose.

Additionally, once the Officer's are assigned, indoctrinated, and are prepared to execute their duties, our methodology requires them to perform their duties with purpose and within a scientific mindset as well. They are trained to:


• Consistently and vigilantly Inspect/Observe and mentally process their observations through the "security consciousness or lenses" that the site's specific post orders mentally forms,

• Appropriately respond to circumstances and situations in the manner in which the post orders prescribe, and lastly

• Scientifically document and report their observations and actions on a daily basis.

MAINTAINING THE DESIRED RESULT THROUGH A CONSTANT SCIENTIFIC ASSESSMENT PROCESS

Once we obtain the client's desired results through the successful implementation of our prescribed security solution(s), it is imperative that we maintain them. This task is a managerial function and our methodology requires us to approach it scientifically as well and it requires us to concentrate on two continual assessment areas. These assessment areas are designed to allow us to focus on and evaluate, 1) the performance of the Officer's responsible for implementing the prescribed security solution(s), and 2) the effectiveness of the prescribed security solution(s). These assessment areas are:

1. ENSURING A CONSISTENT PERFORMANCE OF THE PRESCRIBED SECURITY SOLUTION(S)

To ensure that our assigned Officers are consistently performing their duties in the prescribed manner, CSF managers are continuously monitoring and evaluating the Officer's performance through the following policies:

• Professional Development Policy

• Quality Assurance Policy

• Total Quality Management Policy

2. ENSURING A CONSISTENT COMPLETION AND MONITORING OF OUR QUALITY REPORTING PROCEDURES

CSF utilizes an extensive reporting system that incorporates four types of reports that allows our managers to effectively evaluate the effectiveness of the prescribed security solution(s). These reports are:

• Officers Daily Shift Log – This documents the Officers actions and observations that occurred on his/her shift on a daily basis.

• Incident Report – This report is designed to document any type of incident that is either unusual or those that have been placed within a predetermined tracking category

• Quarterly Chart of Incident Reports – This quarterly report is a tool that gives a summary of all of the types of incidents that occurred during each quarter. It documents the types and amounts of occurrences.

• Performance Improvement Report – This report is designed to analyze the prescribed categories that have been documented within the quarterly Incident Reports and empowers Management to tweak existing policies and/or establish new policies and procedures/actions to minimize risks and vulnerabilities.



About Us | Solutions | Services | Forms | Employment | Login | Contacts