Regardless of size of the region of interest, be it a country or company, the HR and Security must work together by assessing their own incident reporting from the ground to fully comprehend their own narrative.

Considerations for Protocols

  • The HR manager may be notified of a person that is on sick leave. The reason of the sickness needs to be qualified and validated. Hopefully, the person discloses the truth of their sickness.
  • If the person has contracted covid19, then, the security manager must now use access control and cctv to trace the interactions the person had with others.
  • One may need to install analytical software with facial recognition software to assist in the search.
  • There may be thermal detectors installed in the cctv software but that will only be effective once a person’s condition goes into full-blown status. The objective of the tracing of others is to detect the social interaction chain of people!
  • The cctv and access control records of the last 14 days since the sick person reported must be viewed
  • The tracking must be from entry from just outside perimeter security. Perhaps, the person arrived at work with different people from different departments and separated once they walked through perimeter security
  • The people that interacted with the person of interest, now have to be put on the top of the health monitoring list for at least 14 days.
  • The Security Manager cannot simply rely on the cctv or access control technology because not all areas are under surveillance. They would need to go on the ground to critical situational interview possible people of concern that interacted with the sick person. However, people may not be forthcoming with information for various reasons mentioned herein.

Getting the most out of incident management software or incident reporting

Security success to limit the collateral damage will depend on the level of situational awareness of the people on the ground and their reaction speed. The security officers on the ground are first line of defense. Furthermore, they are also the ones that gather information from the people on the ground.

For more – do view the entire protocol document and guidance articles on ISIO Intelligence Guidance Centre (in the above ISIO link or on HIM Human Investigation Management