Successful security contracts

January 2013 Integrated Solutions

Wayne Hermanson and Garth Briggs of Physical Risk offer advice on what contract a buyer should create to ensure his security consultants and service providers deliver what he wants instead of what they want.

The first question we deal with is how customers should contract with a security management consultant to ensure they are suitably protected and will receive the services agreed to.

Hermanson says the manner in which customers contract the services of a security management consultant is key to the success of the professional relationship and should have a clear audit trail. The key outputs should form part of the contracting process as a minimum.

The initial client meeting is used to explore the customer’s service needs and devise a service proposal, should the customer not already have the scope of services defined.

The service proposal is the source document for the description of the security management consulting services to be rendered by the SMC. Service proposals vary in format style, however there are a number of proposal elements that should be included to demonstrate the SMC’s expertise to perform the proposed services. These include but are not limited to the following:

* Cover letter. To thank the prospective customer for the opportunity to bid and highlight particular aspects of the proposal that should be examined closely.

* What services will be rendered? Be it assessment, design, project management or security management services.

* How services will be rendered? Methodology and measureable deliverables.

* Who specifically will perform the services? The engagement team of consultants should be named with their qualifications and experience listed.

* Where/when will the services be rendered and what will the duration be?

* Company profile/background. The consulting company’s historic background, philosophy, ethics, vendor/product neutrality and approach to the services requested should be explained.

* Engagement considerations. Items that may be included under this section include SMC and customer’s responsibilities, service/project timeline, limitations, exclusions, changes in project scope, fees, expenses and confidentiality.

Measuring ROI

In many cases customers know better what it requires from an independent SMC or consulting firm. It is certainly prudent to explore the customer’s service needs thoroughly during the initial and further client meetings. Once the SMC’s code of ethics with respect to a fixed fee structure for a fixed term has been dealt with, both parties may focus on understanding and defining service requirements to the customer’s satisfaction.

Confidentiality agreement. The SMC is likely to be privy to sensitive proprietary information and would have detail of the customer’s security vulnerabilities, which makes it important to have a confidentiality agreement signed.

Service agreement. The SMC’s agreement should be a performance agreement directly linked to the services to be performed, deliverables with cost and time constraints clearly defined.

Project charter. The project charter also referred to as the 'Terms of Reference' document is drawn up once the customer has approved the service proposal and both parties have signed the confidentiality and service agreements. It constitutes the benchmark against which the SMC should be measured with respect to service delivery. The customer representative managing the SMC’s service delivery should approve the project charter and it serves as primary terms of reference at all progress meetings. Items to be included in the project charter include but are not limited to the following:

* Service/project description. This section should include a full description of the services required with relevant background and clear references in the case of tenders.

* Service/project objectives. This describes the essence of the SMC’s service deliveries expressed as customer outcome requirements.

* Constraints. It may include time and/or budget constraints or any other constraints imposed by the customer.

* Assumptions. The SMC shall define assumptions such as information that needs to be provided by the customer, assumed expenses, delays caused by the customer, payment of other service providers associated with the service/project, etc.

* Reporting structure. Who will the SMC report to for service deliverables and who shall approve payment of service invoices?

* Deliverables. A comprehensive list of each service deliverable in measureable terms.

* Service activity time chart. To indicate when the various deliverables shall be performed within the agreed timeline.

* Fees and expenses.

* Acknowledgement of SMC commitment to project charter.

* Customer approval.

Measuring performance is critical

Performance should be measured against a comprehensive project charter that clearly defines the service objectives and outcomes.

At Physical Risk, we align performance measurement not only with the service requirements but also with the customer’s security risk profile. Our service delivery only adds value to the customer if it reduces the risk profile in a cost-effective and sustainable manner. Corrective, preventative and procedural improvements can be measured through the integration of security performance measurement metrics that are directly linked to the customer’s prevailing security risk profile.

Physical security as an organisational function should add intrinsic value to the customer’s business/organisation value chain. Security’s value should be measured against the reduction of risks through loss event prevention, protection and recovery of customer assets. The SMC’s services should be measured in similar terms once mutually agreed.

For more information contact Physical Risk, +27 (0)12 851 2963, [email protected], www.physicalrisk.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Security Services & Risk Management
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...