This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » How to Use Technology to Improve Duty of Care Obligations
Security Enterprise ServicesOverseas and Secure Column

How to Use Technology to Improve Duty of Care Obligations

traveler-enews
August 14, 2018
Brett Andrew
KEYWORDS duty of care / emergency response / mass notification / smartphone security
Reprints
No Comments

Duty of Care is gaining momentum. The idea is simple: employers have a duty to keep their people safe. Whether your employees are on-site or travelling, in a cubicle or on a construction site, in the States or abroad, that duty remains – to protect your employees from unnecessary risk of harm. But an increasingly mobile and global workforce has brought new challenges to fulfilling these obligations. Thankfully, recent technology trends can help you overcome these challenges through improved emergency monitoring, better employee location tracking and streamlined communications.

 

Monitor for Emergencies

The first step in protecting employees is identifying the emergent threat quickly and accurately. Today, threats come in all shapes and sizes. Some threats – like a fire, flooding or active shooter – are hyperlocal. They only affect employees in one city, building, or even floor. To protect your people and locations from these local threats, you need to monitor hyperlocal information resources that alert you to danger down to the street level. Examples of hyperlocal sources include a city’s local police department or news outlets. You can also gather threat detail from your employees, people on the frontlines who share threatening events as soon as they appear.

As soon as you understand three elements of an emergency – event type, severity level and proximity to your people and assets – you can jump into action by communicating with your people, navigating them away from danger.

 

Better Understand Employee Location

Clearly seeing a threat’s proximity to your employees is important. And with today’s mobile workforce, your employees’ location is far from set in stone. Employees travel regularly, and many work out of satellite offices. In an emergency, you need to know the exact location of your employees, so you can communicate to them, account for them, and give them the help they need.

Organizations can better understand the approximate, if not exact location of their employees through three available resources:

  • Mobile apps: Employees can share exact location through mobile applications on their smartphones.
  • RFID tags: When your employees enter the building with their key cards, use that data to group people into office locations.
  • Travel itineraries: Use your employees’ travel data to create dynamic groups around travel cities.

Modern monitoring and communication software uses this location data to display your employees and active threats on the same interactive map, boosting your ability to distribute timely information to your people.

 

Communicate More Confidently

With threat data and employee locations on the same screen, you can now quickly communicate with your affected employees to mitigate loss. But in an emergency, you cannot assume employees will be at their desks or have their phones on them. So you need software which can overcome the unknowns and deliver your message when it matters most.

Robust emergency monitoring and communication systems recognize these uncertainties, allowing you to reach your employees through multiple channels. Email, text or phone in isolation will likely miss some employees, so use all channels simultaneously. Often, though, just sending a message is not enough. Simply blasting a mass notification is akin to shouting into the dark and hoping someone hears you. To fulfill your duty of care, that’s not enough. You need to give your employees a way to respond, so that you know they are safe. Using communication software that allows for two-way communication gives you that peace of mind – and lets your employees alert you if they are in danger.

Emergency communication doesn’t need to stop there. In a crisis, employees benefit from status updates, helpful resources guides, and ongoing instruction on what to do next. For this reason, you can host event pages: webpages that provide a single place to find everything related to a specific event. By posting updates on the page, you can inform your employees without having to send new alerts each time, and employees know where to go to get caught up on the latest developments.

 

Piecing It Together to Fulfill Your Duty of Care

Interestingly, as we grow our global footprint and dependencies, we must continue to improve our ability to survey for and respond to local threats. Protecting employees from local threats requires near real-time communication. It’s no longer enough to use one system to monitor for events and another to communicate with your people. It’s too inefficient. Luckily, these systems have converged to improve response times and improve outcomes during events, helping your organization live up to and exceed duty of care responsibilities.  

Subscribe to Security Magazine

Brett Andrew is Chief Revenue Officer at AlertMedia, the fastest-growing emergency communication software company. AlertMedia offers easy-to-use mobile and web applications that help organizations fulfill duty of care obligations by reaching any audience, over any communication channel, anywhere in the world. Brett can be reached at brett.andrew@alertmedia.com or 800 826-0777.

Related Articles

Protecting Your Mobile Workforce: How to Create a Duty of Care Committee

What Are Airlines' Duties of Care to Stranded Hurricane Passengers?

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

cybersecurity breach

The Top 12 Data Breaches of 2019

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing