Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

21 Tips for Contract Security Officer Success

By Tory Brownyard
Contract Security Officers
January 7, 2015

There are good ways to handle your contract security officers and bad ways. We break it down here. For CSOs and other purchasers of security services, you first need to define needs and roles.

DO

• Ask the security firm for its recommendations on how to best secure your assets, as opposed to having a pre-set idea of what
you need in the way of security.

• Determine if security personnel are going to be “observe and report” or if they are to engage in the event of an incident. Observe and report security requires less training, is less expensive and most likely will result in less liability.

• Be aware that security personnel who are to engage should be better trained and well paid. They also could pose higher risk (as they can use excessive force) or fail to prevent what they are hired to protect, etc.

DON’T

• Assume you need an armed security officer. A knee-jerk reaction to many serious incidents over the past few years has been to hire armed security, when in reality the hiring of an armed security officer may increase the chance of something bad happening.Determine if armed personnel is appropriate for the exposure you have: Government contracts, banks, protecting high-value property, etc. are more appropriate than fast food restaurants, schools and large public gatherings etc.

• Have the security personnel perform tasks outside of what has been contracted (shoveling snow, driving people, etc.). In the event of an accident during these operations, liability may fall upon your firm if the security firm does not have adequate insurance.

Ensuring Quality

DO

• Hire security personnel from the upper level of the candidate pool, such as former/retired law enforcement personnel. They have undergone extensive training and screening, and they provide a very favorable impression to employees and visitors.

• Make sure security personnel have situational training specific to the risks of your industry.

• Have periodic meetings with the security personnel’s supervisors to point out any issues or concerns to make sure that the security personnel are meeting your requirements.

DON’T

• Pay below industry average.In many instances the security officer at the front desk is the first impression a client gets of your firm and you want to make sure they look professional and provide a professional appearance. Prior to 9/11, security professionals were treated more as a commodity, and firms would want to pay as little as possible to get that security officer firm. Since then, however, it became more important to have a well-trained security professional with a professional appearance.

• Try to save money by replacing security personnel with remote video monitoring without carefully analyzing what you are looking to protect and which solution will be most effective. Video monitoring alone is not always as effective a means of deterring crime as security officers. A hybrid approach of combining security personnel and video can serve as a more effective deterrent.

How to Ensure Effective Contracts

DO

• Have clear post orders in contracts that make clear who, what and where you are protecting. A carefully worded contract does not hold you responsible for claims related to third parties or for incidents in locations that are not clearly stated in your post orders.

• Make it clear you are only providing security services for your clients and their employees and are not responsible for their customers/delivery persons or anyone else who comes onto the client’s premises. Numerous court decisions have held private security firms liable for injuries to persons the security firms did not contemplate protecting. These claims occur at the client’s premises with injuries to contractors, deliverymen, customers, guests and even the general public.

• Review any ambiguous contract language with your local insurance broker and attorney to make sure you are not exposing yourself to liability for which you are not properly insured. Also, make sure your insurance has all necessary coverage and endorsements required by the contract (Additional Insureds, Waiver of Subrogation, etc.).

DON’T

• Sign contract language that is too one-sided in favor of the client, thus leaving your security officer firm unprotected. For example don’t “indemnify” the client for accidents caused solely by the negligence of the client. This shifts all of the client’s financial responsibility to your security officer firm. An ideal contract should clearly state the contracted firm will only be responsible if the negligence of one of its employees contributes to a claim.

• Having officers perform duties other than security services, such as chauffeuring or handyman services, unless your contract specifically states they are to perform such duties.

• Pick up liability that you are not insured for when adding a client as an “additional insured” on your insurance policy. Make sure you are only assuming liability for the operations you are providing for this client.

Hiring and Training

DO

• Have extensive hiring procedures for your security officers, including background checks, references, personal interviews and a requirement for prior security industry experience.

• Have at least 24 hours of training consisting of pre-assignment and on-the-job training, as well as continuing “in service” training.

• Provide education and training to help security professionals understand and prevent lawsuits. “Litigation awareness” should focus on several components, including acting with professionalism and communicating respectfully and effectively. This type of education should cover how litigation works, teaching security officers what happens in a courtroom and how their words and actions can be used to affect a case.

DON’T

• Think one type of training fits all. There needs to be situational training specific to the risks involved in any given industry. Look at the position and ensure you hire officers who are properly trained and equipped for the needs of the position.

• Assume any security officer can be armed. Use former law enforcement professionals as armed security officers. They have been specially trained to react appropriately with a weapon.

KEYWORDS: enterprise security services first responders security security contracts security officer security officer training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tory brownyard headshot

Tory Brownyard is president of Brownyard Group (www.brownyard.com), a program administrator that pioneered liability insurance for security officer firms more than 70 years ago. Image courtesy of Brownyard

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Wildfire

    Securing property in wildfire-prone areas: 5 ways to reduce risks

    See More
  • healthcare security

    Debunking 3 Contract Security Officer Myths

    See More
  • hotel-enews

    10 Hotel Safety Tips from a Former Intelligence Officer

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing