Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementSecurity Talk ColumnSecurity Leadership and Management

Unhappy New Year?

HR Professionals Worry Most About Active Shooters; Marijuana Policies in 2019

By Diane Ritchey
SEC0119-talk-Feat-slide1_900px
SEC0119-talk-slide2_900px
SEC0119-talk-Feat-slide1_900px
SEC0119-talk-slide2_900px
January 1, 2019

Happy New Year! We have turned the calendar to 2019, but the New Year doesn’t take away security risks, and according to one survey, workplace violence, marijuana use and cybersecurity will be at the top of the list.

An XpertHR survey found that 45 percent of respondents viewed preparing for and responding to an active shooter or workplace violence incident as very or extremely challenging. A noted concern was creating a “culture of safety in the workplace.” This can include preventing actual acts of violence such as a shooting, as well as threats of violence, such as stalking which may arise in connection with domestic violence.

The best way to address the issues, says the survey, is to put policies in place for visitor safety, workplace violence prevention, domestic violence and banning weapons from the workplace, to the extent permissible by state law. Safety and security audits should also be done to identify and correct gaps in workplace safety and security, background screen applicants, look out for any red flags indicating potentially violent behaviors and create a zero tolerance workplace violence prevention program.

Another perplexing and challenging issue this year? Dealing with increasing marijuana use. Medical marijuana is legal in approximately 30 states and recreational marijuana use is now legal in more than 10 states including the District of Columbia. Notwithstanding this, marijuana remains classified as a Schedule I controlled substance and illegal under federal law.

XpertHR’s survey and Beth Zoller, JD, Legal Editor, XpertHR, also found that employee privacy and protecting confidential data in the workplace are critical issues for 2019. You will be challenged by preventing cyber breaches and data security, managing mobile devices/wearable technology and the internet of things, managing the use of technology and social media while at work and protecting employee information from data breaches.

 

Security magazine: The survey confirmed frustrations with addressing marijuana use and attempting to maintain a safe and drug free workplace. What should employers do in this area, in light of rapidly changing laws?

Beth Zoller: Despite the fact that more and more states are legalizing marijuana for medical and recreational purposes, it is still critical to maintain a drug-free workplace.  An employer can do this by:

  • Making sure it has the proper policies in place including, but not limited to, drug testing policies, disciplinary policies and safe driving policies.
  • Providing training on the potential dangers of drugs to the workforce and why they are such a cause for concern.  Employers, supervisors and employees must recognize the costs to the workforce including increased inattention, increased absenteeism and tardiness, lost productivity, increased potential for accidents and injuries leading to increased insurance costs and premiums, increased workers’ compensation claims and reduced profits.
  • Conducting legally compliant drug testing.

 

Security magazine: How can continuous background screening help with all of these issues – workplace violence, marijuana use and cybersecurity?

Beth Zoller: While continuous background checks and monitoring may have potential benefits when it comes to managing employees, an employer should proceed carefully.  It is crucial to balance employees’ reasonable expectations of privacy against the need to gain critical information about employees who may engage in dubious conduct, including, but not limited to, theft and harassment, fraud, and drug and alcohol abuse.

Continuous background checks can be a good idea to keep employees in line, especially if such employees interact with sensitive populations, handle large sums of money or work with dangerous chemicals and machinery. However, there are many drawbacks. Even if an employer obtains information through a continuous background check, the information may not always be reliable or correct and the employer may not always uncover conduct that has occurred or is occurring. Further, previous actions are not always indicative of future behavior. Additionally, continuous background screenings may negatively impact employee morale if employees feel they are not trusted and may be terminated at any time based on the results of screening.

Additionally, if an employer chooses to conduct continuous monitoring, it is essential to notify employees of your intentions to conduct background screenings during the course of employment. It may be best practice to obtain employee consent and authorization to conduct monitoring. An employer should also make sure to comply with any applicable federal, state and local laws with respect to equal employment opportunity, criminal history, credit history (i.e., the Fair Credit Reporting Act (FCRA)) and other laws regarding employee privacy.

What steps, programs and initiatives are you taking to mitigate these issues this year? I’d like to know. Please contact me at ritcheyd@bnpmedia.com

KEYWORDS: active shooter background check employee screening marijuana security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Port Authority’s New CSO Aims to Build Interagency Cooperation

    See More
  • Introducing Peter O'Neil, the New CEO of ASIS; security leadership

    Introducing Peter O'Neil, the New CEO of ASIS

    See More
  • The New CISO: How the Role Has Changed

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing