13.07.2015 Views

ACS Assessor Guide - Security Industry Authority

ACS Assessor Guide - Security Industry Authority

ACS Assessor Guide - Security Industry Authority

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>ACS</strong> <strong>Assessor</strong> <strong>Guide</strong>Section 5 – GlossaryPurchasing procedureA procedure an organisation has in place to procure/purchase goods and services such as, stationery, equipment, etc.Response RoomA secure area where: assistance, information, advice can be obtained in routine or emergency situations; employees can be monitored; recording can be undertaken.ReviewA systematic consideration of how well an organisations processes and systems are performing in relation to the desired results. Where reviews identify that process and systems are notdelivering results actions to correct should be evidentService DeliveryThe process of delivering to the customer the requirements as outlined in a contract or terms and conditions of supply.SiteA particular location where security services are delivered e.g. a nightclub, retail outlet, factory, gatehouse, bank, hospital etc.StakeholderPerson or organisation with a vested interest in the outcome of any activity e.g. procedure, process, business etc.Sub ContractorA self employed individual or a company that is contracted to provide service delivery on behalf of the applicant organisation. Agency staff are not considered to be sub contractors.SupervisorA person with responsibility for other employees.ValuesSometimes called a code of ethics. A set of values statement explains the principles by which the organisations people will behave and on which all business relationships, with employees,customers and other stakeholders are based. For example: ‘trust’ ‘support’ ‘truth’VerificationThe action taken by an <strong>Assessor</strong> to prove that the self assessment conducted by an applicant organisation is true by the gathering of evidence. The evidence can be ‘hard’ such as documents orcan be ‘soft’ such as that gathered through discussion and interviews.The contents of this publication are copyright ©2013 <strong>Security</strong> <strong>Industry</strong> <strong>Authority</strong>, all rights reserved. No part of the contents may be reproduced or transmitted in any form, by any means without prior written permission of the copyright owner.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!