Best Practices to Manage Access for Temporary and Contract Workers

Dubin, Cindy H.
May 2010
Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p42
Trade Publication
The article focuses on the best practices employed by companies to manage access for temporary and contract workers. It highlights the pre-emptive measures undertaken by Ace Hardware Corp. in performing same level screening for full- and part-time employees. It also suggests the importance of deploying an identity and access management (IAM) solution to help companies monitor and enforce security policies that will verify that the worker's activity aligns with their job functions.


Related Articles

  • The Forgotten and Oft-Neglected Door Closer. Johnson, Joel // Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p46 

    The author discusses the significance of using door closer. He explains the myriad of uses and functions of the door closer in electronic card access applications and in providing physical security, user convenience and compliance. Moreover, the author emphasizes the benefits of the door closer...

  • The 2" X 3 1/4" Billboard. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p36 

    The article presents the author's view regarding the relevance of security metrics to businesses in the U.S. The author briefly narrates his experience with the effectiveness of security metrics and cites that there are several companies have already been using the said technology. The author...

  • The World is Flat and Spinning, and I'm Getting Dizzy. McCourt, Mark // SDM: Security Distributing & Marketing;Sep2011, Vol. 41 Issue 9, p15 

    The author reflects on the condition of the security systems industry in the U.S. He cites the journal's Industry Forecast Survey, which reveals that the sector will experience continued growth that will be driven by the increasing vigilance of business organizations to ensure the safety and...

  • Managing International Incidents with Decentralized Security Departments. Clark, Shawn C. // Security: Solutions for Enterprise Security Leaders;Feb2013, Vol. 50 Issue 2, p48 

    The article focuses on the management of international incidents in the security departments of international corporations. It says that possessing a centralized staff is significant in communication, training, and collaboration. It adds that international security assets utilize their local,...

  • Charting a Final Course to Master Planning. Collins, Kurt W. // Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p32 

    The article provides information on how businesses and industries in the U.S. can chart a final course master security planning. First is to understand the essence of security and its physical, technical and operational components. Next is to determine security techniques and technologies which...

  • Robot Obsessions: Love and Hate in the Gee Whiz Lane. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2010, Vol. 47 Issue 4, p82 

    The article offers the author's insights on robots and security technologies. The author says that the term robots came from the Czechoslovakian word robota which means servitude. He mentions that security technologies and approaches such as the security videos in unmanned aerial vehicles (UAVs)...

  • Security requirement analysis of business processes. Herrmann, Peter; Herrmann, Gaby // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p305 

    Economic globalization leads to complex decentralized company structures calling for the extensive use of distributed IT-systems. The business processes of a company have to reflect these changes of infrastructure. In particular, due to new electronic applications and the inclusion of a higher...

  • A distributable security management architecture for enterprise systems spanning multiple security domains. Priggouris, Ioannis; Hadjiefthymiades, Stathes // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p355 

    Administering security in modern enterprise systems may prove an extremely complex task. Their large scale and dynamic nature are the main factors that contribute to this fact. A robust and flexible model is needed in order to guarantee both the easy management of security information and the...

  • Why Access Control and Identification is Healthy for Your Organization. Scaglione, Ben // Security: Solutions for Enterprise Security Leaders;Oct2011, Vol. 48 Issue 10, p60 

    The article discusses the significance of access control and identification for the organizations in the U.S. The author mentions that controlling access into and within a building or campus not only detects possible terrorist attacks, but reduces the opportunity for the commission of a crime or...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics