Home : Physical Security : Security Consulting : Policy & Procedure Development

Security Program Policy & Procedure Development

For an organization’s security program to be effective, it must clearly define the duties and expectations for everyone in the organization. Kroll assists clients of all sizes in developing and documenting policies and procedures that will align operations and security efforts for optimal results.

Given the complexity of most organizations today, developing effective security programs can be an overwhelming endeavor. These programs must include not only the security department, but also management, other related units, and employees. As a world leader in matters of physical, cyber and operational security, Kroll is able to help clients create policies and procedures that work in concert to close gaps that might otherwise create exposure for the organization.

Policy development best practices—customized applications
Clients worldwide rely on Kroll to provide them with security policies and solutions that will be tailored to their requirements and to the exact risks they face—all within the framework of laws and regulations of each country they operate in. Depending on the client’s needs, Kroll can assist with not only comprehensive security programs, but also those more limited in scope such as access control, pre-employment background checks, and workplace violence prevention.

Case Study: Port Everglades

Kroll was retained by Port Everglades to conduct a security threat assessment. The objective of the assessment was to identify potential threats and vulnerabilities to the Port’s physical and procedural security that could result in a significant loss of life, operational capacity, or have other major impacts.

In addition to the physical survey, Kroll reviewed existing security documentation for the Port to include post orders, incident reports, procedures manuals and crisis plans. It was important that all elements of the security program worked in concert with each other to achieve an effective and efficient approach to physical security.

The findings and recommendations were documented in a security threat assessment report, which encompassed the evaluation of the existing security practices and measures at the Port based on current security climate and the threat profile developed in the study. The report was intended to meet the requirements of F.S. 311.12 (2) (a) for the seaport director to conduct quarterly assessments of security risks and possible risks related to terrorist activities.

The recommendations were in addition to the basic requirements and guidelines from the Department of Homeland Security, U.S. Coast Guard, Transportation Security Administration, Department of Transportation, Federal Emergency Management Administration, Customs & Border Protection, Customs-Trade Partnership Against Terrorism, Business Anti-Smuggling Coalition, Florida Statutes (Specifically Chapter 311), Broward County Sheriff’s Office, and Local Authorities Having Jurisdiction.

More than 5,300 ships call at Port Everglades in a year forming the basis of a diverse maritime operation that includes a thriving cruise industry and a reputation as the "world's best cruise port," a growing containerized cargo business that establishes Port Everglades among the nation's top seaports, a major petroleum storage and distribution hub, South Florida's primary bulk cargo depot and a favorite U.S. Navy liberty port.

Contact Kroll Security

  • Austin
    +1 512 321 4421
  • New York
    +1 212 593 1000
  • San Francisco
    +1 415 743 4830
  • Hong Kong
    +852 2884 7788
  • London
    +44 (0) 207 029 5062
  • Global Headquarters
    +1 (800) 675-3772

Policy & Procedure Development | Kroll Kroll assists clients in developing and documenting comprehensive security program policies and procedures. These security programs cover access control, visitor screening, pre-employment background checks, and workplace violence prevention. Security Program Policy, Security Procedure Development, Secutirty Documentation Procedure, Security Access Control, Visitor Security Screening, Pre-Employment Background Checks, Workplace Violence Prevention