PRIVATE-----Industrial security system
In any industry or organization, security system and intelligence deployment is found be most neglected system and poorly employed with meager perks and fully depending on one or the other unorganized security Forces or Agencies who have not even registered their names in accordance with “The Private Security Agencies (Regulation) Act, 2005”, but they form as a part of big establishments with sophisticated security systems and well established and trained personnel. They may be from ex-army, police, CPOs, and the like but, it may and should have been a concern of a well organized organization to check up their registration and dealings as per the guide lines laid in the above Act.
The present system of working in any industry by any professional or for that reason any personnel is to get more and more perks and they are in fact found to be least bothered or interested to find out the ways and means to apply their awareness and mind to bring growth to the organization by which they are employed.
What ever their level of the management cadre, they first think of their purse and take home salary and other ways and means to come closer to the boss and as to how to get higher and higher positions or promotions.
For this type, they tend to express their work capabilities and workmanship only to that extent and till such time they get higher perks and upgraded with higher position. Their aim is found to be to work with such and such organization/s for such period say around 4-5 years and get themselves recognized or organize their know how on their professional matters of interest and look for the right time to jump over to any other organization for extra perks and elevation which may include, a chance to serve in other countries and so on.
At this point of juncture itself the organizations security and inside story is becoming as the target and how much of the matters are discussed out side the office hours as gossip is not taken care of by the management or its managers. They feel that it is a matter of routine in nature. That is all. There the actual story of intelligence matters are leaked out or the security aspect, management weakness, exposure are coining out. May the information talked about is of any importance or not, the same is openly discussed, including that of the boss/heads of the departments, other weakness, their family history, and the people’s movements. The security personnel and their subordinate’s words who have been employed are not taken into confidence by the management, or the board of directors, as their presence and suggestions or the advice on security aspects, which include the intelligence gathered on the industry’s physical and or on personnel working patterns and so on… But they are asked not to open up their minds unless they ask to do so, and even if they ventilate their news about some personnel, it was just ignored and at times, the person was asked to be careful as he is being watched. There may be some differential equations between the working system and security deployment between the Central/State Governmental Organizations and the private/or the public sector organizations. But in most of the systems, the internal, physical security of men and materials and that of the organization’s safety and security is a matter of concern. In these days of competitive intelligence hangovers and economic or industrial bypassing and awaiting a chance for take-over, the security systems and services are found to be playing a vital role under ground even with out the knowledge of the management and they are not leak proof.
Insiders or to that matter, the family members, are the most targeted persons by the opponents, who are outwardly and in open terms seems to be the best coordinators, or the partners in all matters. Industrial or education tours, visits by important persons accompanied by un known persons at specific intervals is the most watch dog situation for an industry who have not adopted to utilize the sophisticated intelligence trained security personnel. Physical security of men, material, and that of the industry is very much important, but it is also very much essential to get good intelligence officers, whose integrity shall be tested by reputation and not by the medals, ranks, status, position, and other rewards. The overt and the covert acts of the insiders and also the outsiders-visiting the organizations on one or the pretext or for the expansion, business deals, research scholars, celebrities, and the like are the soft persons through whom the matters are leaked out. This type of intelligence system working is not for material gain, but aimed to find out the ways and means to get the loop holes to be used in future course or when time permits and bounce upon for its merger, closure, etc. Even at these junctures, the security services, and the personnel utilized are of no use to the organization, as they are useful for nothing and not meant or trained for such activities. This is at times used as competitive intelligence network through individuals or group of highly placed persons, against whom the lower or middle management security personnel have no approach to them. That is the weakness of the organization, which had no fore thought on such developments. Gathering information/intelligence is an Art- a systemized way of approach of the weak minded or the persons on some need-or who are can be pinned down for the three Ws-wealth, wine and women or of such natured Art cannot be equated with any matter of procedural practices, which can be just trained and adopted by specialized personnel alone, who are being utilized by the other organizations, even who/they might of in friendly nature, including partners?
No organization, to my knowledge and belief is found to have specially employed any such security system personnel who are being utilized for collection of intelligence, assimilation or dissemination on matters of security system of its organizational set up so far.
In intelligence gathering on what ever subject or matter, there can be no legal or illegal means which are designed to be adopted or not to be adopted. The matters depend on the organizational set up of standards, its status, economic, and on competitiveness over national or international systems. All the matters depend upon the situation and the person on whom they are going to be taped or tapped.
it is not to be misunderstood as trapped, before tapping, they find out all types of information, weakness, rigidity, and the religious background, disgruntled or dissatisfied personnel, susceptible to or not, but they sanitize the matters and adopt suitable forms to suit to the situation of adoptability, etc.
Espionage, sabotage, other types of criminal activities shall not be clubbed with the security and intelligence working as they are to be dealt separately and independently like counter intelligence, surveillance, counter espionage, cyber crimes, white collar crimes, etc shall have to be dealt separately even though they may overlap or inter related in terms and working aspect.
Economic imbalance, auditors reports, taxes, customs, tenders, in fights for power and authority, trade union activities, for and/or against the management, logistics--adjustments, or theft of materials, machinery failures, present trends of contract/outsourcing systems-- of personnel, drivers, cabs, are some of the fields where they might be interest and a tool for targeting its down fall, or surrender to others, etc.
In this aspect one has no say on the white collar criminals of the organization’s-insiders who adopt, or opt for wrongful gain, and having become easy to contributory or compromiser’s formulae with others and such person’s identity and exposure may become a problematic issue which may ultimately reflect on its working aspect itself.
This may lead to lot of panic in the heads of the departments, chair-person and the CMD/or MDs and weeding out such personnel is a gigantic task with out getting the matter leaked out.
It was brought that most of the companies now a days without employing their own security personnel, may lead to have rights and privileges at par with that of other employees, and to cut short all these matters leaning toward engaging the security services on contract or outsourcing basis.
Herein, it was also informed that the organizational heads are leaning toward white collar criminality through wicked minded contractors or the outsourcing agencies for their wrongful gain. They found to be adopting various dubious methods.
The contractor or outsourcing agencies show on record such and such number of security personnel but actually engage only one third or even less staff and the amounts they such receive shall be shared with the company’s head and others connected. They do not even maintain proper record about their provident fund account or the employee’s state insurance or health cards.
If any of the employee make hue and cry on his PF returns and repayments, the same shall be arranged on vicious names. It was also brought that the same guards are rotated in shifts at two or three different companies or organizations by showing different names.
It was told that if the company’s dealers are still greedy, they may even create some non exiting contractors or the outsourcing agencies, make out some other records to show that the security guards were deployed in their organization for some period and get their payments passed and en cashed. In such cases, they informed that there shall be contract agreements, quotations, no news paper quotes.
If the company’s interests run through in organizing their interests through some fictions outsourcing agencies, they select interested parties who make out all the formalities on some names, which might be existing, or non existing persons or companies, and formulate their signatures as of the outsourcing agency.The Company who intake the security personnel does seems to have anything do with its personnel except pay the amounts claimed by the Contractor or its Agents. It is opined that there lies the adjustments with no Attendance Register,No Muster Rolls, No Beat Duty Sign in or Sign off Registers,no Leave Account Register,No ESI or EPF Registers,thumb impressions on any of the Companies Records or Registers. Nothing of that sort.
The news item also gives hope to go through the above Act..
the news item published in the Hindu dated 13th Jan, 2011 , Hyderabad edition, about the Hyderabad city Police to regulate private security system.
In this connection, there exist already a Law --“The Private Security Agencies (Regulation) Act, 2005”, on the matter and it is opined that the State Government has to take appropriate action to implement the same in stricto sense. In this Act, there are several laid down Rules and regulations about the recruitment, training, registration of the Firms/Companies dealing with the Private Security Systems.
In the present context of safety and security and keeping in view of infiltrations and the sort, it is very much essential to have a proper and strict Regulatory Body to control and have command on the ‘five times the police force’ strength in the State of Andhra Pradesh alone..may be working in the Govt./public sector,/central/State/Banking/and the like organisations.
No comments:
Post a Comment