Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementFire & Life SafetyPhysical Security

Rideshare Safety 101

By Matthew Bradley
rideshare safety
September 10, 2019

Travel is constantly evolving and there always seem to be new, easier and efficient ways to conduct business while on-the-go. However, as the industry evolves, it’s important for travelers and businesses to stay up-to-date on new services and best practices to efficiently communicate with employees and ensure overall safety. One of the newest means of transportation are rideshare apps and while these services have brought ease, convenience, and peace of mind to millions of people both in the United States and abroad, they certainly have posed their own set of security concerns for both travelers and travel program managers.

As some recent incidents have demonstrated, travelers looking to take advantage of rideshare services must be vigilant of their surroundings before entering a car, regardless of the safety features that the app may provide. There are a number of steps travelers can take to ensure their own safety before entering the car.  

After requesting a car for pick up, travelers should refer to the rideshare app for the model, color and license plate of the vehicle coming to pick them up. Riders can use this information to confirm their vehicle before getting in and should always do so in the following sequence: 

  1. Look for the make of the car: Travelers should identify the make by the emblem on the front or rear of the vehicle.
  2. Confirm the model and color of the vehicle: The model of a vehicle can be found on the trunk. Additionally, the app should provide the color of the car and ridesharers should also use this information to visually confirm the car they are approaching. 
  3. Confirm the license plate number: It’s important to use the license plate number as an additional confirmation before approaching the vehicle. License plate numbers are unique, so if the number in the app differs from the car’s license plate, do not approach the vehicle. Only if the number matches, should the traveler feel comfortable moving on to the next step.
  4. Have the driver confirm the passenger without revealing personal information: Before entering the vehicle, travelers should always ask the driver to tell them who he/she is there to pick up. Rideshare platforms provide all drivers with the rider’s name so there is no reason for a rider to enter a vehicle without confirming the driver has the correct name. During this step, ridesharers must remember not to share their name first. If the rider does not hear their name or doesn’t understand the driver, they can ask for the driver to show them the app. Users should not get into the car until confirming the driver is there to pick you up.

Even after confirming it is the correct vehicle, passengers should remain aware throughout the trip. Rideshare apps offer different ways to alert others to the status of the trip and ensure passenger safety, including: 

  • An option to share your destination with a trusted contact: Rideshare apps offer the ability to share the route and destination of a trip, including anticipated arrival time, with any contacts. Riders may want to share their trip with a friend or relative if they’re traveling for leisure or they can share trips with colleagues if they are traveling for business.
  • An emergency feature within the app: Most rideshare apps have a safety button that connects riders directly to the rideshare company’s safety and security team. Riders can use this button if they feel insecure at any point during their experience. Situations such as erratic driving, an abusive driver or deviating from the recommended route are all reasons to contact the safety team. After the service is contacted, safety teams are able to track the vehicle, communicate with the driver and contact local authorities, if necessary.

The tips included here are vital to any passenger using ride-share apps. They make all the difference in staying safe when using these services. It is important to remember that while most drivers mean passengers no harm, it is the responsibility of the individual and the travel risk manager to provide travelers with this information so that they may implement it into their routine when using these services, and stay safe while using them.

KEYWORDS: risk management travel security vehicle security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Matthew bradley

Matt Bradley, Vice President of Global Security Solutions at OnSolve. A veteran security operations expert for more than two decades, Bradley brings deep first-hand knowledge of security operations management and understanding of the critical challenges facing organizations the future. Most recently, Bradley served as Regional Security Director for the Americas at International SOS and Control Risks, where he led the security services business and advised key executives on risk management solutions. Prior to International SOS and Control Risks, Bradley worked in Honduras as the Security Director for Tigo Honduras where he handled all matters relating to physical security; health, safety and environment; crisis management; and fraud investigation, and as first as a General Manager for I Solution Security, where he advised on security matters for the Honduran President, Minister of Security, and Minister of National Emergency Commission. Previously, Bradley led a distinguished 14-year career with the Central Intelligence Agency (CIA).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Airport at Sunset

    Don't Forget Accommodations: Ensuring Traveler Safety 24/7

    See More
  • airport-enews

    Security Around the Clock: Hotel Safety for the Mobile Workforce

    See More
  • Holiday Travel

    5 Holiday Travel Safety Tips

    See More

Related Products

See More Products
  • highriseproductphoto

    High-Rise Security and Fire Life Safety, 3rd edition

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing