Security Task at Texas A&M University By: Savannah Drazkowski Zac Stables.

Slides:



Advertisements
Similar presentations
Administration Intermediate 1 & 2 Command Words Identify 2 pieces of information included in the contract of Employment, apart from employees personal.
Advertisements

Procurement Card Procurement Card Overview Bookkeepers & Central Office Secretaries FY2014.
Secure Your Store Understand the measures used in securing a retail store.
THE OFFICE OF FINANCIAL SERVICES Budget Authority Training.
Product Receiving, Storing, and Issuing
Purchasing Card Program Convenience Check Training Updated February 2012 Purchasing Card Program Convenience Check Training Updated February 2012 Your.
Hotel Billing Instructions
FCI INVESTIGATIONS WHERE VIDEO AND INFORMATION ARE KING!
Practice Insight Instructional Webinar Series Reporting
Violence on Campus Prevention & Response. Active threat defined An active threat can be defined as: A person whose immediate activity can cause death.
LOUISIANA GFOA 31 ST ANNUAL FALL CONFERENCE.  Currency  Coin  Checks  Debit Cards  Credit Cards.
Corporate Presentation. COMPANY HERITAGE 01 COMPANY HERITAGE Milestones Company First Established in Jerusalem Offices Established.
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
Financial Management. Counting & Claiming Meals are counted at the point in the food service operation where it can be accurately determined that reimbursable.
OH 9-1 Managing Shifts to Ensure a Quality Operation Human Resources Management and Supervision 9 OH 9-1.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Statement of Cash Flows COPYRIGHT ©2007 Thomson South-Western, a part of the Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks.
Factors to be taken into account when designing ICT Security Policies
A presentation for church members © 2014 Vanco Services, LLC. All rights reserved. Unauthorized use prohibited. These copyrighted materials may not be.
A presentation for church members © 2012 Vanco Services, LLC. All rights reserved. Unauthorized use prohibited. These copyrighted materials may not be.
What can cause an item to not be in your inventory? Inventory Services The University of Texas at Austin.
The Art of Collections By Mary Ann Martinez-Gofigan Director of Client Services Pamela Zapien Salud Family Health Centers, Inc. Fort Lupton, CO Adapted.
Purchasing Card Record Keeping & Retention REVISED
Administrative Practices Outcome 1
Introduction to Business Organisations
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
 Arranging Cash › Smaller Denominations Should Start On The Right And Proceed Up  Recording Sales › Cash Registers And Point Of Sale (POS) Terminals.
Financial Life Cycle of Assets (It’s a big deal.) Bob Mahaney, CPPS The University of Texas MD Anderson Cancer Center.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
Procurement Card Procurement Card Overview Grant Training FY2015.
Induction New Employees AOI Institute Unit Name: Manage Recruitment Selection and Induction Processes Unit Code: BSBHRM506A: Task Three Student’s ID: C61937.
Cash Handling Cash Handling Policies and Procedures May 27, 2015.
NDSU - VPFA Training NDSU Policy: Section 708: Campus Maintenance and Service Requests Request For Estimate Fill.
©Holm Publications Security Awareness Presentation.
1.03 UNDERSTAND HOW INTER-ORGANIZATIONAL SYSTEMS OPERATIONS IMPACT PRODUCTS AND SERVICES OFFERED AT HOSPITALITY AND TOURISM DESTINATIONS What are the categories.
Upper Dublin School Store. Where is the School Store? Sales Window is to the right of the cafeteria Door – Located inside the cafeteria – To the left.
CHAPTER 4, SECTION 2 Access and Key Control. Access Control Equipment  Hall mirrors  Closed-circuit televisions  Parking lot gates  Exit doors and.
Which source of finance? The following statements could be describing which sources of finance?
Guest Cycle A division of the flow of business through a hotel that identifies the physical contacts and financial exchanges between guests and hotel employees.
TAMUCC EPA SECURITY Security Training for Users of Canopy for Creation and Approval of Payroll Documents.
Infant Security 10 th floor & Security Staff Security Measures Locked Units Electronic Security System Photo ID Badges Infant Security Task Force Patient.
C N H | K E Y C L U B CNH | Updated by CNH District Treasurer California-Nevada-Hawaii District May 2013 Presented by: District Budget Johansen Pico, Treasurer.
Risk Management Advanced Marketing Competencies: Develop strategies for reducing shrinkage from internal and external sources Explain importance of copyright,
Lesson 9: Security. Objectives  Calculate shrinkage based on merchandise book value and physical inventory counts  Give examples of internal and external.
Human Resource Management
Learning Objectives Understand the Business – LO1 Distinguish among service, merchandising, and manufacturing operations. – LO2 Explain common principles.
1 CHAPTER 9 MANAGING AND REPORTING WORKING CAPITAL.
Rivers Capital Partners ltd is authorised and regulated by the Financial Services Authority no: Investment Readiness Jonathan Gold 6 March 2013.
Associated Student Body Do You Know…? 1 8/8/2013 Business Services.
Employee Exit and Transfer Policy. Applicable to: To all employees of the university including Benefitted and Non-Benefitted employees. It also applies.
Acquisition of Asset Found Inventory Services The University of Texas at Austin.
Hospitality Operations Objective 3.04 Security. Objective Security  State the major responsibility of the Security Department The protection of.
CAMPUS SAFETY & ACTIVE SHOOTER RESPONSE TRAINING DEPARTMENT OF PUBLIC SAFETY & SECURITY.
Procurement Card Procurement Card Overview FY2015.
Vaccination POD. Take a moment to do the following: Tell people where the restrooms are located Point out location of break area Go over the lunch and.
Finance Department Quarterly Report for Period Ending Oct 1, 2013 to Dec 31, 2013.
Property Custodian Meeting December, Review of USM Internal Auditor Findings  Capital and sensitive equipment inventory was not properly tracked.
Protection of Minors Program Coordinators Information Session November 2015 Carolyn Brownawell Melisa Giraldo Dietrich Warner.
Draft for Discussion & Policy Purposes Only Money Room Security Assessment June 29, 2016.
Departmental Cash Handling
Hospitality and Tourism
Closed POD Just-in-Time Training
Lockdown The safety and security of the Staff, Students and Visitors of Northern College is everyone’s responsibility.
#1 #2 #3 Solve: 21 ÷ Solve: Solve: 3 (7 + 4) 12 ÷ 3 – 2 + 1
PCI Device Inspections
SECURITY TRAINING AND THREAT AWARENESS
Closed POD Just-in-Time Training
Part 1 Security Action Plan Template.
Declining Balance Card Request
Presentation transcript:

Security Task at Texas A&M University By: Savannah Drazkowski Zac Stables

Scene 1 - Building Display Interview Question: –Briefly discuss the importance of Security Tasks involved with buildings (ie. Access, keys, cards, rooms used, lights, etc.)

Scene 2 - Building Action: Star A sitting behind desk begins answering interview question. Action: Fade out to Star B showing examples of access, keys, cards, etc. while Star A voiceover continues.

Scene 3 - Property Inventory Fade in to interview question: –Briefly describe the importance of Security Tasks dealing with inventory (i.e. Computer equipment, capitalized equipment, “anything with a tag,” etc.)

Scene 4 - Property Inventory Action: Star A begins answering the question behind conference room desk. Action: Fade out to Star B taking inventory of the stock room while Star A voiceover continues.

Scene 5 - Money Fade in to interview question: –Briefly describe the importance of Security Tasks dealing with money (i.e. cash handling, depositing vouchers, cards locked up, expenses, etc.)

Scene 6 - Money Action: Star A begins answering the question behind conference room desk. Action: Fade out to Star B counting money and locking it into the safe.

Scene 7 - People Fade in to interview question: –Briefly describe the importance of Security Tasks dealing with people (i.e. exiting, staff IDs, Aggie Cards, access codes and levels, etc.)

Scene 8 - People Action: Star A begins answering the question behind conference room desk. Action: Fade out to Star B authorizing access levels and cards.

Scene 9 - Data Fade in to interview question: –Briefly describe the importance of Security Tasks dealing with data (i.e. confidentiality statements, etc.)

Scene 10 - Property Inventory Action: Star A begins answering the question behind conference room desk. Action: Fade out to Star B reading a confidentiality statement to a new employee.

Scene 11 - Closing Fade in to text: –If you have any further questions regarding the Security Tasks of a business person at Texas A&M University, please contact the Human Resources Department at (979)