110 likes | 113 Views
Chapter 14 Loss Prevention Through Risk Management. Pure and Dynamic Risk. Pure risk: The potential for injury, damage or loss with no possible benefits. Dynamic risk: Risk with the potential for both benefits and losses. Risk Management.
E N D
Pure and Dynamic Risk • Pure risk: The potential for injury, damage or loss with no possible benefits. • Dynamic risk: Risk with the potential for both benefits and losses.
Risk Management • Risk management is anticipating, recognizing and analyzing risks. • Risk management involves taking steps to reduce or prevent such risks and evaluating the results.
A Systematic Approach to Risk Management • Preventing loss through risk management includes: • Risk analysis. • Policy formulation. • Specification of a protection plan. • Follow-up.
Morality and Legality of Risk Management • Organizations that do not have a comprehensive risk management program in place leave themselves open to disgruntled employees and customers as well as to potential civil liability.
Risk Analysis • Three factors to consider in risk analysis are: • (1) vulnerability. • (2) probability. • (3) criticality.
A Security Survey • The security survey (audit) is a critical, objective, on-site analysis of the total security system. • The information needed for a security survey is obtained by observing and by talking to personnel.
Alternatives for Handling Risk • Alternatives for handling risk include: • Risk elimination. • Risk reduction. • Risk spreading. • Risk transfer. • Risk acceptance.
Schedule for Evaluating the Security System • Each component of the security system should be periodically evaluated and changes made as needed.
Summary Questions • What is the difference between pure and dynamic risk? • What is risk management? • What is included in a systematic approach to preventing loss through risk management? • What is the moral and legal responsibility of risk management?
Summary Questions • What 3 factors are considered in risk analysis? • What is a security survey? • How is the information for a security survey obtained? • What alternatives exist for handling risks? • When should components of the security system be evaluated?