The 9mm Proposal

February 2009
Security: Solutions for Enterprise Security Leaders;Feb2009, Vol. 46 Issue 2, p14
Trade Publication
The article reports that the Cleveland City Council's Public Safety Committee is considering to allow private security officers to carry 9mm semiautomatic pistols. It is believed that though incidents involving a security officer firing his weapon is rare, in case of workplace violence such upgraded weapons are needed. It also presents two pie charts revealing the use of access control systems in schools and other areas including serving rooms, computer labs and gymnasiums.


Related Articles

  • Facility Security: Access Systems--Part 2. Rosenberg, Paul // EC&M Electrical Construction & Maintenance;Jun2000, Vol. 99 Issue 6, p74 

    Expounds on design considerations involved in customized access systems in facilities. Procedures for identification and control of visitors; Assignment of at least two authorized persons in the detection of incorrect or unauthorized procedures; Automated security systems; Role of security...

  • Vigilance key to stopping job violence. McCarthy, Charles // Business Journal Serving Fresno & the Central San Joaquin Valley;12/4/2009, Issue 324110, p1 

    No abstract available.

  • Down With the Old Guard. Dreher, Beth // Curve;Oct2008, Vol. 18 Issue 8, p59 

    The article features Dana Picore, founder and chief executive officer (CEO) of Picore Worldwide. The CEO emphasizes that she aimed to address issues such as riots and school or workplace violence in a more creative approach. She drew inspiration for her cerebral approach to security from the...

  • Hand in Hand. Emigh, Jacqueline // Government Security;Feb2004, p40 

    Discusses the relationship between physical security and information security. Dependence of the successful implementation of both on their cooperation and understanding of each other; Recognition of the maturing technology of information security; Dependence of information security on software...

  • A roadmap towards improving managed security services from a privacy perspective. Ulltveit-Moe, Nils // Ethics & Information Technology;Sep2014, Vol. 16 Issue 3, p227 

    This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then...

  • Double-edged security. Pereira, Pedro // eWeek;9/19/2005, Vol. 22 Issue 37, pC7 

    The article argues that to succeed in computer security services, VARs and integrators must create a methodology they follow consistently. And when tackling the security needs of customers, they must demonstrate how they will provide value. Channel companies, in the role of trusted advisers to...

  • The Role of Security and Life Safety Systems.  // Buildings;Apr2012, Vol. 106 Issue 4, p44 

    The article discusses the importance of security and life safety systems. It states that security systems such as access control, entrance alarms, physical barriers, surveillance and security guards complements policies and procedures in meeting the risks and threats of a facility. Dave Benson...

  • HID Global.  // Security: Solutions for Enterprise Security Leaders;Nov2009, Vol. 46 Issue 11, p98 

    The article offers information on HID Global Corp., the trusted source for security solutions for customers in Irvine, California. It mentions that the company is the supplier for OEM Inc., the system integrators and application developers, which includes physical and logical access control,...

  • San Jose daily sues to get council's records.  // Editor & Publisher;2/24/96, Vol. 129 Issue 8, p20 

    Reports on `San Jose Mercury News' newspaper's lawsuit against the city council of Sunnyvale, California to gain access to records and information of closed meetings that led to the banishment from city hall of councilwoman Frances Rowe. State law governing privacy in personnel matters;...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics