Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResiliencePhysical Security

Workplace compliance considerations for California Senate Bill 553

By Cormac Twomey
Business meeting

Image via Unsplash

July 19, 2024

The California Senate Bill 553 (CA SB 553), which went into effect on July 1, 2024, is a milestone in labor law legislation. The bill introduces new safety obligations for most businesses in California, aimed at addressing growing concerns around workplace violence. Specifically, CA SB 553 mandates the implementation of comprehensive workplace violence prevention plans (WVPPs). These plans must include procedures for identifying and addressing potential security risks, maintaining extensive and auditable records of each incident, developing emergency response plans and conducting annual employee training on these measures. 

With no grace period for compliance, employers were required to have a WVPP in place by July 1 to avoid serious legal and financial consequences from the California Occupational Health and Safety Administration (Cal/OSHA), and the fines for non-compliance range from $18,000 to $25,000 per violation. Implementing a plan for CA SB 553 and maintaining compliance can be a complex endeavor, with customization required for each workplace, but adherence to these standards is mandatory. Organizations must review the specific requirements, assess current WVPPs and incorporate any necessary adjustments to ensure full compliance.  

Breaking it down  

Although SB 553 applies to all CA employers with at least one employee, there are a few notable exceptions: 

  • Employers already abiding by Cal/OSHA’s Violence Prevention in Health Care standard (typically healthcare facilities) 
  • Department of Corrections and Rehabilitation employers and law enforcement agencies 
  • Employees who work remotely from a location outside the employer’s control 
  • Employers with ten or fewer employees working in a location that is not accessible to the public 
  • Employers whose employees are located outside of California 

For companies that must adhere to the bill’s requirement, several critical aspects must be considered when developing a WVPP: 

  • Customized prevention plans: Employers are required to develop and integrate customized WVPPs into their Injury and Illness Prevention Plans (IIPP). WVPPs should specify the job titles or names of those responsible for carrying the plan out.  
  • Employee engagement and involvement: Active employee participation is critical for developing, implementing, and reviewing WVPPs. Communication with employees must be clear and transparent regarding all aspects of the plan and the role employees play in its success. 
  • Training and awareness: Annual training is required for personnel on the definitions and requirements of CA SB 553, including what to report, how to report it, and to whom to report incidents. Training must also address workplace-specific hazards, corrective measures implemented, strategies to avoid physical harm, an overview of the violent incident log and how to obtain copies of the records. Employers are required to include “an opportunity for interactive questions and answers with a person knowledgeable about the employer’s plan” and maintain records that reflect the dates of the sessions, the content and the names and titles of both trainers and attendees.  
  • Comprehensive reporting: There are procedures outlined within CA SB 553 for reporting workplace violence incidents, with a focus on follow-up measures and strategies for intervention. Employers must develop confidential pathways for reporting that foster a sense of comfort for those reporting.  
  • Protocols for high-risk situations: Processes for violent incidents must be developed, including procedures for emergency response and communication with emergency response agencies. 

Cal/OSHA ensures compliance through routine inspections that may particularly target industries at higher risk of violence, employee-filed complaints, serious incident investigations and follow-up inspections to verify corrective actions have been taken in previously cited workplaces. Complying with CA SB 553 can be complex; however, following best practices and leveraging tools can facilitate an efficient transition.  

Supporting the transition 

Organizations should emphasize leadership commitment, prioritize industry and community collaboration and seek experienced legal counsel. An effective WVPP hinges on prioritizing these aspects. Leadership commitment is essential for implementation and must remain firm for continuous fine-tuning. Industry peers and community organizations can share insights and provide a broader network for learning, while professionals with expertise in California law can ensure full compliance. 

Employers can reduce the burden of meeting CA SB 553 by leveraging real-time occupancy data for accurate reporting of all employees or visitors onsite. This ensures accurate incident reports and better coordination by emergency response teams. 

In an emergency, mass notifications to both employees and visitors can provide essential information about a workplace violence incident, including the number of people involved and the location. Emergency notifications are a critical part of a response plan, as sharing urgent information can help keep everyone safe and organize evacuations if necessary. In these situations, interactive workplace maps clearly mark all emergency exits, fire extinguishers and first aid kits with instant updates on any changes in the environment.  

Employers must comply with CA SB 553; however, this is also an opportunity to demonstrate a commitment to creating safer work environments. Businesses can establish transparent, trusted programs that improve employee safety, enhance preparedness for potential workplace violence to reduce incident risk, ensure swift response if necessary and strengthen employee trust and engagement with a more secure and productive workplace. 

KEYWORDS: compliance regulations security culture workplace safety workplace violence workplace violence prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cormac headshot

Cormac Twomey is CTO at Envoy. Image courtesy of Twomey

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Fist in black and white

    Creating a safer workplace: California Senate Bill 553 becomes law

    See More
  • corner desk with monitor and plant

    California passes workplace violence prevention bill

    See More
  • data server

    CISO considerations for data privacy & compliance in 2023

    See More

Related Products

See More Products
  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing