TITLE

Best Practices to Manage Access for Temporary and Contract Workers

AUTHOR(S)
Dubin, Cindy H.
PUB. DATE
May 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p42
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the best practices employed by companies to manage access for temporary and contract workers. It highlights the pre-emptive measures undertaken by Ace Hardware Corp. in performing same level screening for full- and part-time employees. It also suggests the importance of deploying an identity and access management (IAM) solution to help companies monitor and enforce security policies that will verify that the worker's activity aligns with their job functions.
ACCESSION #
50938562

 

Related Articles

  • The Forgotten and Oft-Neglected Door Closer. Johnson, Joel // Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p46 

    The author discusses the significance of using door closer. He explains the myriad of uses and functions of the door closer in electronic card access applications and in providing physical security, user convenience and compliance. Moreover, the author emphasizes the benefits of the door closer...

  • The 2" X 3 1/4" Billboard. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p36 

    The article presents the author's view regarding the relevance of security metrics to businesses in the U.S. The author briefly narrates his experience with the effectiveness of security metrics and cites that there are several companies have already been using the said technology. The author...

  • The World is Flat and Spinning, and I'm Getting Dizzy. McCourt, Mark // SDM: Security Distributing & Marketing;Sep2011, Vol. 41 Issue 9, p15 

    The author reflects on the condition of the security systems industry in the U.S. He cites the journal's Industry Forecast Survey, which reveals that the sector will experience continued growth that will be driven by the increasing vigilance of business organizations to ensure the safety and...

  • Managing International Incidents with Decentralized Security Departments. Clark, Shawn C. // Security: Solutions for Enterprise Security Leaders;Feb2013, Vol. 50 Issue 2, p48 

    The article focuses on the management of international incidents in the security departments of international corporations. It says that possessing a centralized staff is significant in communication, training, and collaboration. It adds that international security assets utilize their local,...

  • Charting a Final Course to Master Planning. Collins, Kurt W. // Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p32 

    The article provides information on how businesses and industries in the U.S. can chart a final course master security planning. First is to understand the essence of security and its physical, technical and operational components. Next is to determine security techniques and technologies which...

  • Robot Obsessions: Love and Hate in the Gee Whiz Lane. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2010, Vol. 47 Issue 4, p82 

    The article offers the author's insights on robots and security technologies. The author says that the term robots came from the Czechoslovakian word robota which means servitude. He mentions that security technologies and approaches such as the security videos in unmanned aerial vehicles (UAVs)...

  • Robot Obsessions: Love and Hate in the Gee Whiz Lane. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2010, Vol. 47 Issue 4, p82 

    The article offers the author's insights on robots and security technologies. The author says that the term robots came from the Czechoslovakian word robota which means servitude. He mentions that security technologies and approaches such as the security videos in unmanned aerial vehicles (UAVs)...

  • How Technology Solutions Can Increase ROI for Security Programs. Feeney, David // Security: Solutions for Enterprise Security Leaders;Oct2011, Vol. 48 Issue 10, p18 

    The article focuses on the role of technology solutions in increasing the return on investment (ROI) for security programs. The author talks about the need to identify a problem or opportunity to increase potential ROI. He then offers the goals related to the problems which include increasing...

  • Losing Customer Trust. Allen, Martin // Credit Control;2006, Vol. 27 Issue 2, p57 

    The article focuses on the effect of security breaches on companies in the banking and finance sector. Security breaches can have a devastating effect on companies, like Boeing Co. who lost a laptop containing personal financial data on 161,000 current and former employees. The author examines...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics