top of page

Security Plans

According the Integral Proactive Security Policy, security plans are developed.

OrcaSecure develops these plans using six tactical security processes:

1. The Acces Control Process

Within the Access Control process, the following plans are described and implemented:

  • Zoning

  • Access control plans 

  • Authorization profiles

  • Management plans

  • Standard Operating Procedures

2. The Supervision process

Within the Supervision process the following plans are described and implemented:

  • Camera Plans 

  • Camera Regulations

  • Detection Plans

  • Standard Operating Procedures

3. The Alarm Verification process

Within the Alarm Verification process, the Standard Operating Procedure specifies how alarms are to be verified.

4. The Incident Management process

Within the Incident Management process, the following plans are described and implemented:

  • Business Emergency Plans

  • Crisis Management Plans

  • Alarm protocols as part of the Standard Operating Procedures


5. The Services process

Within the Services process, agreements and under which conditions service takes place are documented in the following documents:

  • The Products and Services catalog (PDC)

  • The Service Level Agreement (SLA)


6. The Pre and in-employment screening process

Within the Pre and In-Employment Screening process, the following plans describe and implement the method of screening and for which employees within the organization:

  • Pre-employment screening plan

  • In-employment screening plan

  • Post-employment screening plan

OrcaSecure helps organizations to develop security plans.

Please contact us for additional information or questions.

bottom of page