13.07.2015 Views

ACS Assessor Guide - Security Industry Authority

ACS Assessor Guide - Security Industry Authority

ACS Assessor Guide - Security Industry Authority

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>ACS</strong> <strong>Assessor</strong> <strong>Guide</strong>Section 5 – GlossaryAnalysisThe examination of facts and data to provide a basis for effective decisions and actions.ApproachThe methods used by a provider of security services to manage and delivery their business. When considering approaches organisations should also consider the appropriateness of the methodand the effectiveness of their use.AssessmentThe systematic review of an organisations activities and results against the <strong>ACS</strong> Standard.Assignment InstructionsA set of written instructions drawn up by a service provider specifying contractual duties in relation to a particular site, venue or person.BenchmarkingComparing your performance with that of another company, not necessarily from the Private <strong>Security</strong> <strong>Industry</strong> to see how well you are doing as an organisation.Code of PracticeA code of practice details how the activities within the organisation should be conducted and to what standard. Internal procedures would not normally be considered a ‘code of practice’.ConsistencyThe quality, state or fact of being consistent in the application of the <strong>ACS</strong> Standard through the assessment process.ConsumerAny person in society at large who has contact with a provider of security services in the course of delivery of a service to the customer.Control RoomA secure area where: assistance, information, advice can be obtained in routine or emergency situations; employees can be monitored; recording can be undertaken.Corporate Social ResponsibilityTaking in to account the ethical, social and environmental impacts of the organisation’s activities and taking complementary action to address those impacts where appropriate, using theorganisation’s own resources and expertise.The contents of this publication are copyright ©2013 <strong>Security</strong> <strong>Industry</strong> <strong>Authority</strong>, all rights reserved. No part of the contents may be reproduced or transmitted in any form, by any means without prior written permission of the copyright owner.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!