CaseStudy Fianacial Human Resource Management
CaseStudy Fianacial Human Resource Management
CaseStudy Fianacial Human Resource Management
Case Study on
Student ID 77121596998
Table of Content
S.No. TOPIC Page
No.
1. Title 1
2. Preface 2
3. Acknowledgement 3
4. Introduction 4-8
5. Clint List 9-15
6. Company certificates 16-21
7. Executive Summary 22-24
8. Background 25-29
9. Overview of Secondary data and Survey 30-40
methodologies
10. Trends and employee characteristics in 41-65
Private Security
11. Brief Description of Project and Service 66-78
12. Key Assumptions 79
PREFACE
2
ACKNOWLEDGEMENT
3
PROPOSAL FOR SECURITY SERVICES
Introduction: : Rakshak Securitas Pvt. Ltd. have the pleasure in introducing ourselves
as a Security & Facility Management Company with an excellence of 15 years. We are granted
licence under the Delhi Private Security Agencies (Regulation) Rules, 2009 to engage in the
business of Security Services by Government of NCT of Delhi. We are also granted licence to
operate in the state of Delhi, Haryana, Punjab, Chandigarh (Union Territory), Uttar Pradesh
and Rajasthan. Rakshak has its registered office, Head office and Operational office in Delhi.
Rakshak has its branches in the state of Punjab, Haryana, Uttar Pradesh, Delhi, Madhya
Pradesh and Rajasthan. We have more than One hundred prestigious Universities, Colleges,
Institutions, Schools, Government establishments and Housing Societies in our running client
list other than Corporate and Industries where we are able to give our professional services.
Regd Office : T-5, Plot No.12, Sector-10, Dwarka, New Delhi-110075. (owned)
Corp Office :S-208, T-301 & T-302, Tripuati Plaza, Sector-11, Dwarka, New Delhi (owned)
Training Center: Vardhman Plaza, Sector-3, Dwarka, New Delhi- 110059 (owned)
4
Statutory Compliances: Our company is having all the required statutory registrations
from various Govt departments including Labour Licence, Company Registration, EPF,
ESIC, ST, VAT and having PASARA licence from above stated states and UT’s.
RAKSHAKS Strength
Rakshak Securitas Pvt. Ltd. is a leading Professional company having ISO 9001:2008 Quality
M`anagement, SA 8000: 2008 Social Accountability, OHSAS 18001:2007 Occupational Health
and Safety Management Systems. Rakshak has its own central training academy at Dwarka
Delhi. To get the best talent Rakshak has its own recruitment centre. Only those undergo
training who clear the bar of Police Verification. The trained, alert and smartly uniformed
5
Guards of Rakshak performs the tasks of checking unauthorized entry, stopping trespassers,
controlling entry and exit gate, securing assets and material from loss, theft and pilferage,
maintaining fire fighting equipments and guiding visitors after checking their vehicles with
Under Carriage Mirror.
1. To strengthen operations Rakshak’s Patrolling team visit every site on regular and
random basis, team checks the Security staff deployed at the site and take feedback
from the client.
2. Rakshak is proud to state that strength of its Security services is its trained security
guards, executives and managers who are the veterans from the Army, Air Force, Navy
and Paramilitary forces having more than 25 years of experience as its assets. Rakshak
uses latest, sophisticated and scientific equipments. This ensures maximum security of
your Prestigious Premises.
4. You may consider the Rakshak over the other security agencies for the followings:
(a). Rakshak is having less overhead cost as compared to top MNCs in the field, which
enable Rakshak to deliver better quality of service at a reasonable price.
(b) The undersigned will directly remain in touch with you to know the valuable
feed back to update the training programme.
(c) Rakshak has clarity of thought in relating the quality of operations to three factors i.e
training, supervision & timely payment of wages.
(d) Rakshak emphasize upon the training as an important factor which is evident from
PSARA Act. The following unique features of training at Rakshak make the difference:-
(e) Onsite training at the assignments and refresher training for short duration at the
training centre keep the Guards/ Supervisors updated and helps increasing their morale /
motivation level.
(f) Rakshak design the onsite training programme based upon the requirements of the
6
assignments /clients.
(g) Rakshak make training more effective by multi dimensional approach to it by making
it more interesting and interactive by role playing, asking questions and quoting relevant
examples.
(h) Rakshak emphasize upon the latest factor i.e facilitation. This is achieved by the art of
public dealing.
This leads to the enhancement of confidence level of the Guards/ Supervisors which results in
better performance, brand building and client satisfaction or delight.
Sir, May I request your good self to kindly consider our company for your esteemed
organization.
Vinay Singh
MD
For Rakshak Securitas (P) Ltd.
Mobile - 09818662052
7
QUOTATION
Note:
1. The above charge is for 8 hours of duty and includes uniform and service charges.
2. Service Tax will be charged on the total billing amount as per Govt. Rule.
Vinay Singh
MD
For Rakshak Securitas (P) Ltd.
Mobile - 09818662052
8
SOME OF THE PRESTIGIOUS CLIENTS
UNIVERSITIES/EDUCATIONAL INSTITUTES
Delhi University (DU), Delhi
Delhi Technical University, Delhi
South Asian University, Delhi
Jawahar Lal Nehru University (JNU), Delhi
Indira Gandhi National Open University, Delhi
Indira Gandhi Technical University For Women, Delhi
Netaji Subhash Institute of technology, New Delhi
Shri Guru Gobind College of Commerce, University of Delhi
National Brain Research Center, Manesar (NBRC)
National Institute of Malaria Research, New Delhi (NIMR)
National Institute of Technology, Kurukshetra, Haryana (NIT)
Motilal Nehru College, University of Delhi
International Institute of Health Management Research, New Delhi (IIHMR)
Indian Council of Social Science Research, New Delhi
IASE University, New Delhi
Indian Council of Historical Research
Nation Institute of Public Finance and Policy (NIPFP)
SCHOOLS
Ryan International School – 10 School
St. Francis de Sales, New Delhi
Mount Carmel school, New Delhi
BGS International School, New Delhi
SAM International School, New Delhi
Vandana International School
Vandana Kindergarten, Dwarka New Delhi
Indraprastha School, New Delhi
9
R.D. Rajpal Public School, New Delhi
Infant Jesus School, New Delhi
Kamal Model Sr. Secondary School, New Delhi
Universal Public School, Dwarka New Delhi
Little Marble School, Dwarka New Delhi
Rishikul School, New Delhi
Directorate of Education - 147 Schools
GOVERNMENT ESTABLISHMENTS
Steel Authority of India Limited, Scope Minar, New Delhi
Steel Authority of India Limited, Scope Complex, New Delhi
State Trading Corporation of India Limited, New Delhi
Intellectual Property Office, New Delhi
District Court, Dwarka, New Delhi
Intelligence Bureau (IB), New Delhi
NIA, New Delhi
Central Prisons, (TIhar Jail)
10
AIIMS, Ansari Nagar, New Delhi
AIIMS, Faridabad
Akbar Bhawan, Ministry of Overseas Indian Affairs, New Delhi
Tele Communication Consultants India Ltd (TCIL)
National Institute of Plants Genome Research (NIPGR)
Indian Institute of Petroleum Management, Gurgaon (IIPM)
Haryana Roadways Engineering Centre, Gurgaon
Chandigarh Housing Board
FICCI, New Delhi
International centre for Automotive Technology,(ICAT) Gurgaon
STATE BHAWAN
Haryana Bhawan
Daman & Diu Bhawan
Nirman Bhawan, Chandigarh
Chattisgarh Sadan, New Delhi
Defence Establishments
Sena Bhawan, New Delhi
Integrated Defense Service HQ (IDS, HQ)
Air Force Station, Hindon
Air Force Station Subrotto Park, New Delhi
Air Force Record Office (AFRO)
Air Force Central Accounts Office (AFCAO)
Central Servicing Development Organization (CSDO)
DAV (AV) Subrotto Park
BANK
National Housing Bank, New Delhi
11
STADIUM
Budh International Circuit – F1 - Noida
SHOWROOMS
Treo Nissan, New Delhi
Treo Cheverlet, New Delhi
Fashion Brand, New Delhi
WAREHOUSE
Punjab Grains Procurement Corporation Ltd. ( Pungrain)
CORPORATIONS/INDUSTRIES
Larsen & Toubro, Sector - 112, Gurgaon
Larsen & Toubro, Sector - 67, Gurgaon
Larsen & Toubro, Wave City, Noida
Larsen & Toubro, Panipat
Larsen & Toubro, Mall of India, Sector – 18, Noida
Larsen & Toubro, Labour Camp, Sector - 44, Noida
Johnson Lift Ltd, Noida
Johnson Lift Ltd, GGN
LANCO Infratech (Central Water Work Pipelines, Delhi)
Dhampur Sugar Mills Ltd., Badaun, U.P
Dhampur Sugar Mills Ltd., Muzzafarnagar, U.P
Arcop Associates Pvt. Ltd, Gurgaon
Arcop Associates Pvt. Ltd., Pomposh Enclave, New Delhi
Airef Engineers Pvt. Limited, DMRC Sites (Jasola Vihar, Sukhdev Vihar,Kalindi Kunj
Okhla , Noida & Faridabad, )
Sublime Management Solution Pvt. Ltd
Hyatt Consultancy Pvt. Ltd.
Heriton, Gurgaon
12
South Delhi Vaults, Gurgaon
Thyssenkrupp Marine Systems Pvt. Limited, Gurgaon
Necus Automation Pvt. Ltd, Gurgaon
Transcorporation International Ltd.
Romana Herbalcare Pvt. Ltd.
Mars International India Ltd, Gurgaon
Ferrostaal India Gmbh, Gurgaon
Automotive India
Rosewood Showroom, Gurgaon
Transcend MT Service Pvt. Ltd.
Bhramputra Board, Dwarka
Style Mart Impex
International Techno Tax
Sonic metloplus
SRG Molding
OM Sai Power Technology
Act Five Cleaning Machine
BUILDERS
Lieghton India Contractors Pvt. Ltd., ( Australian MNC )
Punj LLyod – Metro Project
Pratham Infratech Pvt. Ltd.
Saraogi Builders Ltd.
ERA Group
HL Construction & Co.
Tarachand Sumit Construction and Company
Malik Buildcon
K Tech Engineers
Surya Construction Pvt. Ltd., Mohali Chandigarh
13
HOSPITALS
J.K. Lone Hospital, Jaipur
Shri Dada Dev Mother and Child Hospital, New Delhi
Rajiv Gandhi Super Speciality Hospital, Tahirpur, New Delhi
Lok Nayak Jai Prakash Hospital, New Delhi
Ch. Chander Prakash Ayurvedic Charak Hospital, new Delhi
DLF Hospital, Gurgaon
Leprosy Mission Community Hospital, New Delhi
Suyash Hospital, Indore
HOTELS
CASA Grand Hotel, Gurgoan
SAI International Hotel, Delhi
Golden Palm Hotel, Delhi
14
12.Navnirmal Apartment, Sec-2
13.New Arohi Apartment, Sec-12
14.Park Royal Apartment, Sec-9
15.Thiruvuzha Apartment, Sec-10
16.Vrindavan Apartment, Sec-6
17.Vikram Nager Apartment, Sec-12
18.Young Star, Sec-6
19.Sadh Bawana Apartment, Sec-11
20.Ankriksh Apartment, Sec-4
21.New Rajput Apartment, Sec-12
22.Satyam Apartment, Sec-18
23.Samrat Ashoka Enclave, Sec-18
24.Consulting Engineering Apartment, Sec-18
25.Rudra Apartment, Sec-6
26.Eligible Apartment, Sec-10
27.Suruchi Apartment, Sec-10
28.True Friends, Sec-6
29.Yash Apartment, Sec-11
30.Park Royal Residency, Sec-22
31.Crecent Apartment, Sec-18
32.Sukh Sager CFHS, Sec-10
33.Rohit CGHS, Sec-10
34.Raj Bihar CGHS, Sec-18
35.Sree Radha CGHS, Sec-9
36.Sri Bala ji CGHS, Sec-6
37.Saral CGHS, Sec-10
38.DDA Apartment, Sec-17, Pocket-E
39.DDA Apartment, Sec-2, Pocket-2
40.DDA Flats, Sec-22/1
41.DDA Flats, Sec-11/3
15
16
17
18
19
20
21
THANK YOU!
22
1. EXECUTIVE SUMMARY
The private security industry plays a vital role in ensuring security and safety both in the United States
and
internationally. It is
responsible for safeguarding not only the nation's institutions and critical infrastructure systems but
also intellectual
property and
sensitive corporate information. Private security is extensively utilized by U.S. companies to fulfill
various functions,
such as
protecting employees and property, conducting investigations, performing pre-employment screening,
ensuring
information
technology security, and much more.
Over the past four decades, numerous reports and studies have examined private security agencies and
personnel,
contributing
to the redefinition of their roles and documenting the industry's growth and trends. However, these
studies have
become
outdated, and there is a pressing need for more detailed and up-to-date information, particularly
considering the
expanding
range of responsibilities undertaken by private security. Additionally, some previous data collection
efforts employed
survey
methodologies that yielded non-generalizable data or were prone to nonresponse bias, making it
uncertain how well
these
sources represent the entire private security industry.
Currently, there is no comprehensive and methodologically sound data source providing detailed
information about
private
security beyond basic demographics. Recognizing this gap, the Bureau of Justice Statistics (BJS), an
independent
statistical
agency within the U.S. Department of Justice, initiated a design project to evaluate the feasibility of
conducting a
National
Private Security Survey (NPSS). This report serves as part of the design work and offers a literature
review on
private security,
covering major trends, demographics, collaborations with law enforcement, budgeting and licensing,
legal authority
and powers
within private security, and security operations.
23
1) Employee Demographics: Existing surveys have generally collected high-quality demographic data on
employees.
However, discrepancies in survey methodologies and definitions of private security have resulted in
some variations in
the estimates.
2) Budgeting and Licensing: Substantial information on budgeting and licensing is available for contract
security firms
compared to companies with a proprietary security force.
3) Private Security Powers: Insufficient comprehensive data has been collected on private security
powers, highlighting
the significant need for information in this area.
4) Security Operations: One of the two secondary data sources provided information on security
operations topics. While
one survey design was methodologically sound, the response rate introduced potential bias in the
estimates.
Based on these findings, the following recommendations are proposed for the design and
implementation of a national
survey of the private security industry:
1) Develop a Clear Definition of Private Security: When conducting the NPSS or similar national data
collection efforts, it
is essential to establish a concise definition of private security. This definition should be crafted with an
understanding
that it may yield data different from what is currently available.
2) Cover a Broad Range of Topics: A targeted national study of the private security industry should
encompass various
topics to minimize measurement errors caused by combining data from multiple sources with differing
definitions of
private security. The future study should fill recognized information gaps (e.g., private security powers
and security
operations) while ensuring reliable and updated statistics, such as employee demographics, which are
already adequately
covered by other surveys.
3) Utilize Rigorous Data Collection Methodology: Future studies should address previous challenges
related to
methodology and response rates. This entails developing a national sampling frame that provides
representative
coverage of the companies for accurate inference. Additionally, procedures must include non-response
follow-up to
ensure a reasonable response rate.
4) Conduct Periodic Surveys: Conducting studies that consistently examine private security over time
would yield
significant advantages. This can be achieved by either studying a cohort of companies longitudinally or
conducting new
surveys at regular intervals.
24
Regardless of the chosen approach, conducting a series of studies over time will provide valuable
insights into the evolving nature of the private security industry, including changes in its size,
characteristics, and roles within the United States. These industry trends have significant economic
and policy implications.
In conclusion, this report offers recommendations to enhance future data collection endeavors like
the NPSS, aiming to expand our understanding of the private security industry and generate higher
quality and consistent data over time. The importance of private security to our criminal justice
system, national safety, and security necessitates the collection of more reliable and timely
information. This should involve tracking the functions and roles of private security, as well as their
interactions with policing, corrections, homeland security, and other relevant domains. By building
upon and refining past data collection efforts, we can ensure the accuracy, generalizability, and
usefulness of the collected information for the private security field, federal agencies, policymakers,
and other stakeholders interested in private security data.
25
2. BACKGROUND
Private security plays a critical role in ensuring the security and safety of individuals, property, and
valuable information. Private security officers are entrusted with safeguarding various institutions and
critical infrastructure systems, such as industry, utilities, transportation, and healthcare and educational
facilities. Companies heavily rely on private security services, including store security, private
investigations, pre-employment screening, and information technology (IT) security. These services cater
to a wide range of markets, from commercial to residential. Some companies employ their own security
personnel, while others engage security firms or a combination of proprietary and contract staff.
In the 1970s, the RAND Corporation conducted a comprehensive series of reports comprising five
volumes, exploring the regulation, licensing, and responsibilities of private security agencies and
personnel (Kakalik & Wildhorn, 1971a, 1971b, 1971c, 1971d, Volumes I–V). Subsequently, Hallcrest
Systems published two extensive studies on the private security industry: "Private Security and Police in
America: The Hallcrest Report I" (Cunningham, Taylor, & Hallcrest Systems, Inc., 1985) and "Private
Security Trends 1970–2000: The Hallcrest Report II" (Cunningham, Strauchs, Van Meter, & Hallcrest
Systems, Inc., 1990). These studies played a significant role in defining the roles of private police in crime
prevention, documenting industry growth and trends. Additionally, numerous government, commercial,
and research organizations have conducted studies on the private security industry.
While these previous reports and profiles have been influential, there is still much to explore, particularly
regarding the expanding roles of private security in contemporary society. The Bureau of Justice Statistics
(BJS) is currently considering the feasibility and value of establishing a statistical series called the National
Private Security Survey (NPSS). This data collection effort aims to enhance our understanding of the role
played by private security in the United States. As part of the NPSS design work, a comprehensive review
of the existing literature and analysis of relevant secondary data have been conducted. This report not
only summarizes the available literature but also examines the availability and quality of secondary data
on private security while identifying information gaps within these sources.
The report begins with an overview of the definitions of private security, industry structure, services
offered, and market segments. It then explores the secondary data sources and survey methodologies
employed by them. Subsequent sections utilize available secondary data sources to describe trends and
employee characteristics within the private security sector. The report also examines the relationship
between private security and other relevant areas, such as policing, corrections, homeland security, and
more between personal safety and law enforcement, and legislation and coaching of private
security sectors.
26
2.1 Defining Private Security
There is a lack of consensus among experts regarding the definition of private security, leading
to various definitions being used in prior research. These definitional differences often revolve
around the focus of job tasks, the influence of profit and the client, and the inclusion of
additional products and services, such as equipment manufacturing, distribution, and
technology installation (Cunningham et al., 1990).
In one of the initial studies conducted by RAND, private security was defined as "all types of
private organizations and individuals providing security-related services, including
investigation, guard, patrol, lie detection, alarm, and armored transportation" (Kakalik &
Wildhorn, 1971b, p. 3). The study emphasized that a common function across most of these
services is "crime prevention and detection" (p. 18). Hallcrest I argued for a broader definition
of private security that encompasses physical, information, and employment-related security,
challenging the label of "private police" used by Kakalik and Wildhorn (1971b).
Bottom and Kostanoski (1983) expanded the scope of private security, stating that it provides
protection not only against crime but also against four additional threats: waste, accident,
error, and unethical practice. RAND's definition, with its focus on crime prevention, faced
criticism from the Private Security Task Force (PSTF), established by the Law Enforcement
Alliance of America (LEAA), for excluding quasi-public police and failing to address the client
relationship and profit nature of the industry. Consequently, the PSTF adopted a definition
that includes "self-employed individuals and privately funded business entities and
organizations providing security-related services to specific clientele for a fee, for the
individual or entity that retains or employs them, or for themselves, in order to protect their
persons, private property, or interests from various hazards" (Cunningham et al., 1990). The
PSTF's definition also limited its scope to profit-oriented organizations and excluded
quasi-public police unless they were funded by private sources.
Green (1981) argued against distinctions based on profit orientation or source of funds,
highlighting that nonprofit institutions such as hospitals, airports, and schools often hire
private security. He defined private security as "those individuals, organizations, and services
other than public law enforcement agencies, which are primarily engaged in the prevention of
crime, loss, or harm to specific individuals, organizations, or facilities" (as described in
Cunningham et al., 1990).
While these historical definitions are frequently referenced, both Hallcrest reports criticized
them for focusing solely on personnel and businesses, disregarding other aspects of private
security.
27
According to Cunningham and colleagues (1990), the "fastest growing segment of private security"
is the manufacturing, distribution, and installation of security equipment and technological
systems.
In today's perspective, the role of private security is viewed more broadly. For instance, the
American Society for Industrial Security (ASIS) International, the largest association of private
security professionals in the United States, defines private security as the "nongovernmental,
private-sector practice of protecting people, property, and information, conducting investigations,
and otherwise safeguarding an organization's assets" (ASIS International, 2009a). ASIS further
emphasizes that private security plays a role in securing businesses and critical infrastructure
against various threats, including natural disasters, accidents, and planned actions like terrorist
attacks and vandalism (ASIS International, 2009b).
During an ASIS symposium, experts were tasked with developing a comprehensive definition of the
security field and identified 18 core elements (ASIS Foundation, 2009). These elements include:
1. Physical security
2. Personnel security
3. Information systems security
4. Investigations
5. Loss prevention
6. Risk management
7. Legal aspects
8. Emergency and contingency planning
9. Fire protection
10. Crisis management
11. Disaster management
12. Counterterrorism
13. Competitive intelligence
14. Executive protection
15. Violence in the workplace
16. Crime prevention
17. Crime prevention through environmental design (CPTED)
18. Security architecture and engineering.
Under the broad definition frequently used today, the time period ―private security can
represent
a broad vary of organizations, which includes corporate security, safety defend companies,
armored automobile businesses, investigative services, and many others. Personnel employed
by these
28
companies can be armed or unarmed, can be employed as both in-house or contract employees,
and can have distinctive powers, depending on the place they work and what duties
they fulfill. Some U.S. communities have deputized their protection personnel beneath nation law
to create a pressure with the full electricity to arrest, search, and seize.
The personal protection industry is often described by using distinctions based totally on the
proprietary or
contractual nature of security departments, kind of protection furnished (physical, information, or
employment-related), offerings provided (e.g., guarding, armored transport), and
markets (e.g., vital infrastructure, commercial venues). Some of these traits are
discussed in extra detail in the following
Both types of private security have their advantages. Contractual security may be more
cost-effective, while proprietary security may offer higher quality and more loyal staff.
Organizations with an in-house security department have greater control over the activities of
their security staff. Depending on the security requirements and tasks involved, organizations
may utilize a combination of proprietary and contractual security staff.
Industry executives anticipate a future where they serve as "brokers" rather than managers,
contracting out security personnel for specific tasks while relying on proprietary security
personnel for other responsibilities (Cunningham et al., 1990).
The ASIS Scope and Emerging Trends survey (ASIS Foundation, 2005) collected data on the
distribution of proprietary and contract officers across various industry sectors. Among the
4,000 companies surveyed in 2005 (with a response rate of 21.6%), 56.5% of security functions
were handled by in-house security staff, while 34.5% were managed by contractors, outside
firms, or other sources (Figure 1). It is important to note that the breakdown from the ASIS
survey does not represent the total percentage of contract versus proprietary private security
personnel.
Proprietary and contractual security companies have a role in three main categories of security:
physical, information, and employment-related. Physical protection encompasses measures
designed to safeguard people and prevent unauthorized access to equipment, facilities, materials,
and documents, protecting them against security incidents (ASIS International, 2009a).
29
Physical security measures may include the use of barriers, locks, lights, sensors, and guards,
who play a crucial role in perimeter and area protection, as they are highly visible and serve as
a key component of physical security (Cunningham et al., 1990).
In Hallcrest II, Cunningham and colleagues (1990) defined information security as the safeguarding
of confidential information, whether in physical or electronic form. This includes protecting
sensitive data such as mailing lists, research and development documents, and financial
information. With the advancement of computer technology, the scope of information security has
expanded significantly. It now encompasses the preservation of data confidentiality, reliability,
and availability within automated information systems. Information systems security personnel
develop procedures and safeguards to prevent unauthorized access, including protection against
hackers, viruses, and other threats to information systems (Dempsey, 2008).
30
3. OVERVIEW OF SECONDARY DATA SOURCES AND SURVEY
METHODOLOGIES
The secondary data analysis serves two main purposes. First, it allows survey designers to
determine what information can be used for comparisons to the data they plan to collect
and provides an understanding of how other studies measure or define key items. Moreover,
by assessing the available information, the analysis can identify gaps in the literature.
Second, a secondary data analysis allows for an assessment of the quality of the data in the
public domain. Quality measures include how current the data are; the methodology used to
collect data (including the mode of data collection, who the respondents are [e.g., company
representatives or persons in an occupation], and the survey response rate); and the
definitions used when designing the studies, such as the target and sampling populations.
This information can be used to develop a survey design that utilizes approaches from
previous successful studies that obtained high-quality data.
Tables 1, 2, and 3 also illustrate how these secondary data sources defined private security
with respect to guarding. One of three approaches was used by each of these sources to
sample and collect data: an industry approach, an occupation approach, or a combination of
the two.
31
Table 1. Government Studies with Data on Private Security Industry and
Segments of Private Security Industry Covered by Each
Census Business Surveys—County Business Survey/Economic Survey/Census Service
Annual Survey
Body guard services Patrol services, security Protection services (except
armored car, security
Guard dog services Personal protection services (except
security systems services) systems, personal or
Guard services property)
Parking security services
Property protection services
(except
Protective guard services
armored car, security systems)
Security guard services
Excludes security patrol services
Bureau of Labor Statistics (BLS) Business Surveys—BLS Occupational Outlook Handbook,
Occupational Employment Statistics (OES) survey, Census of Fatal Occupational Injuries
(CFOI), Survey of Occupational Injuries and Illnesses (SOII)
Definitions vary by survey
BLS Occupational Outlook Handbook OES and SOII
Guard services Security guards
Investigative services Excludes private detectives and investigators
Excludes armored car services
CFOI
Security guards
Gaming surveillance officers
BLS Household Surveys—Current Population Survey (CPS)
Security guards
Gaming surveillance officers
Excludes private detectives and investigators
O*NET OnLine (DOL)
Security guards
Excludes private detectives and investigators
Congressional Research Service
Security guards
Excludes private detectives and investigators
32
Table 3. Research Organization Studies with Data on Private Security Industry
and Segments of Private Security Industry Covered by Each
Hallcrest Reports
Survey used to obtain data on hours of training received
Security guards and managers
Survey to obtain firearms training and use of force data
Security guards
ASIS Scope and Emerging Trends
All private security related occupations
RAND
Security guards
The industry approach to defining private security involves categorizing companies into specific
segments or industries that best represent their function. For example, telecommunications
companies like AT&T would fall under the telecommunications industry, while private security firms
like Securitas would be classified under the private security guarding services industry. Data sources
such as the Census Business Surveys (County Business Survey, Economic Census, and Census Service
Annual Survey), Dun and Bradstreet (D&B), and Security Magazine employ this approach for
sampling and data collection. This method is particularly useful for analyzing contract security firms,
as they can be identified within specific industry segments. It also facilitates the collection of
company-level statistics rather than individual-level data.
However, it's important to note that data sources utilizing the industry approach may include
slightly different subsets of industries under the umbrella of private security. Most studies using this
approach rely on the 2007 North American Industrial Classification System (NAICS) or, in some
cases, the older Standard Industrial Classification (SIC) system. Table 4 presents the NAICS industry
codes used to define private contract security and private security guarding firms, while Table 5
provides the corresponding SIC codes. Private contract security is further divided into six detailed
NAICS codes, with code 561612 specifically identifying companies primarily engaged in providing
guard services. Under the SIC system, private contract security is divided into two codes, with SIC
code 7381 denoting firms primarily involved in guarding. D&B has created more detailed SIC codes,
splitting SIC code 7381 into three industry codes, one of which specifically represents guarding
services.
33
Table 4. NAICS Codes Related to Private Contract Security
Security
Officer
NAICS Title Description Industry
561611 Investigation Services This U.S. industry comprises establishments
primarily engaged in providing investigation
and detective services.
561612 Security Guards and This U.S. industry comprises establishments
Patrol Services primarily engaged in providing guard and
x
patrol services, such as bodyguard, guard
dog, and parking security services.
561613 Armored Car Services This U.S. industry comprises establishments
primarily engaged in picking up and
delivering money, receipts, or other valuable
items. These establishments maintain
personnel and equipment to protect such
properties while in transit.
561621 Security Systems This U.S. industry comprises establishments
Services (except primarily engaged in (1) selling security
Locksmiths) alarm systems, such as burglar and fire
alarms, along with installation, repair, or
monitoring services or (2) remote
monitoring of electronic security alarm
systems.
561622 Locksmiths This U.S. industry comprises establishments
primarily engaged in (1) selling mechanical
or electronic locking devices, safes, and
security vaults, along with installation,
repair, rebuilding, or adjusting services or
(2) installing, repairing, rebuilding, and
adjusting mechanical or electronic locking
devices, safes, and security vaults.
The duties attributed to security guards within the SOC system involve guarding,
patrolling, or monitoring premises to prevent theft, violence, or violations of
rules. This occupation-based approach provides a comprehensive understanding
of the roles and responsibilities within the private security sector, enabling the
collection of relevant data for analysis and research purposes.
34
Table 5. SIC Codes Related to Private Contract Security
Security
Officer
SIC Title Descriptiona Industry
7381 Detective, Guard, and This category comprises establishments
Armored Car Services primarily engaged in providing detective,
guard, and armored car services.
7381-00 Detective and Armored n/a
Car Services
7381-01 Guard Services n/a x
7381-02 Detective Services n/a
7382 Security Systems This category comprises establishments
Services primarily engaged in monitoring and
maintaining security systems devices, such
as burglar and fire alarms. Establishments
of this business may sell or lease and install
the security systems, which they monitor
and maintain.
a
SIC codes are defined by the federal government at the 4-digit level. Commercial companies that
maintain establishment databases (such as D&B or InfoUSA) have developed a more detailed set of
SIC-codes at the 6- or 8-digit level. The 6-digit codes shown in Table 5 were created by D&B.
The Congressional Research Service (Parfomak, 2004a) conducted a study on private security
using secondary data but employed an occupation approach to collect its data. This approach
proves valuable for analyzing the broader field of private security and security-related
occupations across all industries. It encompasses private security officers employed by both
contract security firms and proprietary (non-security) firms. Moreover, the occupation approach
enables the gathering of detailed employee-level characteristics, including demographic
information, as it focuses on individuals rather than the entire company or industry.
Alternatively, a combination approach combines elements of both the industry and occupation
approaches. It typically involves selecting a sample of companies from predetermined industries
and then selecting individuals within those companies to interview. For instance, in the context of
private security, individuals who serve as private security officers would be chosen. Sources such
as the Occupational Employment Statistics (OES) survey, O*NET OnLine, the Hallcrest reports, the
ASIS Scope and Emerging Trends report, the Census of Fatal Occupational Industries (CFOI), and
the Survey of Occupational Injuries and Illness (SOII) have utilized this combination approach to
define private security.
Data obtained through the combination approach allows for the assessment of both contract
security firms and proprietary firms. These sources directly contact employees, enabling them to
determine whether the employees are working for a contract firm or directly employed by the
company from which they were selected. The combination approach's design facilitates the
acquisition of comprehensive and nuanced insights into the private security landscape.
35
The sources discussed in this document offer valuable information at both the industry and
occupational levels, allowing for comprehensive analysis. Data obtained from these sources
enables measurements and insights at both levels of analysis.
However, it is crucial for analysts to be mindful of how the population of interest is defined,
regardless of the sampling and data collection approach employed. Even slight variations in the
scope of the studies can result in differences in the published statistics. For instance, when using
the industry approach, the definition of contract security firms may vary between the Census
surveys and D&B. In particular, the Census surveys may exclude armored car services, while D&B
includes them in their data. Similarly, the occupational approach may involve grouping different
sets of occupations for publication. For example, the Current Population Survey (CPS) incorporates
private security guards and gaming surveillance officers, whereas other sources such as the BLS
Occupational Outlook Handbook and the Congressional Research Service only include security
guards as defined by the Standard Occupation Classification (SOC) system. Therefore,
understanding the nuances in the definitions and scopes of the studies is essential for accurate
interpretation of the published statistics.
Understanding the data collection methodology used by each secondary data source is crucial in
order to assess the representativeness of the data for the entire private security field. It also provides
insights into the data quality, including factors such as response rates and potential measurement
errors or biases. This section provides a summary of the data collection methodologies employed by
each secondary data source, as it directly influenced the type and frequency of information included
in this analysis.
Table 6 presents the percentage of outcomes analyzed based on the number of times a particular
source was used. For instance, the Census Surveys contributed data on 13.3% (or 4) of the 30
outcome variables related to Employees, 18.8% (or 3) of the 16 outcome variables related to Budgets
and Licensing, and no data on Security Powers or Operations. Generally, the secondary sources
provided data on one (50%) or two (31.2%) specific areas of interest, but not across all domains.
The government studies, which encompass various surveys, offer statistics on private security and
are often conducted periodically, allowing for trend analysis. These studies employed diverse
methodologies, but all adhered to protocols set by the Office of Management and Budget (OMB).
These protocols require a minimum 80% response rate and adherence to rigorous statistical
guidelines. As a result, the data from these studies are of high quality with minimal bias.
36
Table 6. Percentage of Outcome Variables Contributed by Secondary Data
Source
The Census Business surveys, which encompass the Economic Census, the 2007 Service Annual
Survey, and the 2007 County Business Patterns, are establishment surveys that employ the
industry approach to collect data. The Economic Census and the 2007 Service Annual Survey
utilized the same methodology, while the 2007 County Business Patterns relied on administrative
data extracted from the Census business registry. In the Economic Census and 2007 County
Business Patterns surveys, businesses were categorized into two groups: those receiving a report
form and those that did not.
37
The report form was sent to two categories of businesses: large employers, which included all
multi-establishment firms and employer firms with payroll exceeding a specified cutoff, and a sample of
small employers, which consisted of single-establishment firms with payroll below a specified cutoff. In
cases where specialized data required more than administrative records, the report form was also sent
to small employers within certain industries.
The BLS establishment studies encompass several surveys, namely the OES survey, Occupational
Outlook Handbook, CFOI, and SOII. The OES survey, which is the largest BLS establishment survey,
serves as the data source for the Occupational Outlook Handbook. The CFOI and SOII are separate
business surveys conducted by the BLS.
The OES program conducts a semiannual mail survey to estimate employment and wages for specific
occupations. It collects data on wage and salary workers in nonfarm establishments, excluding
self-employed individuals. Occupational estimates are produced for approximately 800 occupations,
categorized by geographic area and industry, with over 450 industry classifications at the national level.
The OES program surveys approximately 200,000 establishments per panel every 6 months, completing
data collection for 1.2 million establishments over a period of 3 years. The response rate for the 2008
OES survey was 74.25%.
Safety data is obtained from the BLS injuries, illnesses, and fatalities website, which shares findings
from the Census of Fatal Occupational Injuries (CFOI) and the Survey of Occupational Injuries and
Illnesses (SOII). The CFOI provides a comprehensive count of fatal work injuries in the United States,
utilizing diverse state, federal, and independent data sources to ensure accuracy and completeness. The
SOII is an annual national survey that reports nonfatal injuries and illnesses by occupation. Participating
states gather the data, and both state and national estimates are generated. In states that do not
participate, the BLS administers the survey. Establishments are legally obligated to maintain records of
specific workplace injuries, which are then used for injury and illness classification in selected
establishments.
38
types of workplace injuries, and these data are used to classify injuries and illnesses for
selected establishments.
BLS Household Surveys. The Current Population Survey (CPS) is conducted by BLS, but
unlike their other studies it is a sample of households rather than businesses (BLS, 2010b).
The CPS collects information on the labor force status of the civilian noninstitutional
population 15 years of age and older, although labor force estimates are reported only for
those 16 and older. Persons under 16 years of age are excluded from the official estimates
because child labor laws, compulsory school attendance, and general social custom in the
United States severely limit the types and amount of work that these children can do.
Persons on active duty in the U.S. Armed Forces are excluded from coverage. The
institutional population, which also is excluded from coverage, consists of residents of penal
and mental institutions and homes for the aged and infirm. The CPS is collected each month
from a probability sample of approximately 60,000 households. Respondents are assured
that all information obtained is completely confidential and is used only for the purpose of
statistical analysis. Although the survey is conducted on a strictly voluntary basis, about 4%
of eligible households refuse to cooperate each month. Another 3% to 4% are not
interviewed because of difficulties in making contact.
Other Government Surveys. In addition to the Census Bureau and BLS, several other
government sources provide data on private security. These include O*NET OnLine, funded
by the Department of Labor, and the Congressional Research Service. O*NET OnLine is a
two-stage survey of businesses and workers within selected businesses. Data are collected
on over 900 occupations (O*NET OnLine, 2008). Information on the knowledge required,
work context, skills required, work activities, and tasks for each occupation are collected
through standardized questionnaires (i.e., the same questionnaire is used for all
occupations). The O*NET survey also collects demographic characteristics for each of its
respondents. The response rate among workers is 65%. While this response rate is lower
than the 80% threshold used by the OMB as an indicator of potential bias due to
nonresponse, O*NET OnLine has conducted nonresponse bias analyses and found that
potential bias due to nonresponse is small. The Congressional Research Service published
two reports that included data on private security (Parfomak, 2004a; Parfomak, 2004b).
These data were based on a review of administrative records and data published in other
government reports.
39
business is classified under and the revenue earned during the past year. D&B can provide
information only at the industry level and, therefore, was used only for statistics on contract
security firms, which can be defined by a set of industries (see Tables 4 and 5).
Security Magazine‘s survey (McCourt, 2009) provides data on the level of private security
used based on several different criteria (e.g., employment and expenditures) by industry
segment. Data were collected directly from organizations and were estimated using public
records for organizations that did not respond. Responding organizations self-selected their
classification across 16 industry sectors:
Business Services;
Industrial and Manufacturing;
Retail, Restaurants, and Food Service;
Agriculture/Farming/Food;
Healthcare/Medical Centers/Hospitals.
Any organization within these 16 sectors could participate in the study, and Security
Magazine‘s outreach program reaches 10,000 organizations to encourage participation. Of
the top 500 companies, 365 submitted data (a 73% response rate). Over 700 organizations
in total provided data. However, the survey design involves a convenience sample, rather
than a random sample of businesses; thus, the outreach is not random, which can have a
biasing effect on estimates if the types of organizations that do not participate are different
from those that do participate. Also, with this approach, the precision of the estimates
cannot be evaluated (i.e., standard errors cannot be produced).
40
powers, and firearm authority were based on a case study in Baltimore, MD, and Multnomah
County, OR. Among companies that agreed to participate, a sample of security officers was
selected which included both proprietary and contract security officers. However, because
the companies that agreed to participate were not random, the sample was skewed such
that a disproportionate number of the proprietary officers had special forces training that
the contract security officers did not. Moreover, the survey used in the case study achieved
only a 27% response rate. As indicated in the report, these data are not representative of
the private security population. Thus, the statistics based on this survey can be used to
make inference only on this specific sample population and cannot be generalized.
Furthermore, the Hallcrest studies are slightly dated and it is uncertain how much the
security industry landscape has changed since their publication.
The ASIS Scope and Emerging Trends Report (ASIS Foundation, 2005) is based on a sample
of 4,000 businesses across nine industry sectors. Ward‘s Business Directory was used as the
frame from which businesses were selected. The companies varied in size, but the allocation
of sample across the nine industry segments and company size was not provided in the
report. The survey mode was paper (via mail) or web, with an abbreviated nonresponse
follow-up interview of key questions conducted by telephone. The study reports a response
rate of 21.6%; while the low response rate increases the potential for biased estimates, the
bias may be minimal if the response distribution mirrors the population. Because of a lack of
external information regarding the sampled establishments, survey weights were not
created. Instead, to minimize the potential for biased estimates, the authors analyzed the
data separately within each industry sector. Thus, the authors avoided having a sector with
a high response propensity from dominating the overall estimate. Furthermore, because of
lack of frame information about each of the sampled businesses, the authors indicated that
a nonresponse bias analysis was not conducted. Therefore, we cannot conclude whether the
participating businesses are different from those that did not respond to the survey.
RAND published a report that included data on private security (Kakalik & Wildhorn, 1971a,
1971b, 1971c, 1971d). These data were based on a review of books, articles, reports, laws,
court rulings, financial and insurance industry data, census and labor statistics, public law-
enforcement officials, private security industry executives, ―company privileged information‖
files, private security employees, and officials and files of agencies that regulate the private
security industry.
41
4. TRENDS AND EMPLOYEE CHARACTERISTICS
IN PRIVATE SECURITY
The private security industry has expanded its role in safeguarding critical
infrastructure and providing other security-related services. Two estimates of the
size of private policing in the United States originate from studies funded by the
National Institute of Justice (NIJ). The initial comprehensive report, Hallcrest I
(Cunningham et al., 1985), was among the first to document the changes in
private security personnel and expenditures in comparison to public policing.
Hallcrest II (Cunningham et al., 1990) determined that private security had
become the nation's primary security resource in terms of personnel employed
and total expenditures. The report attributed the growth of private security in
relation to public law enforcement to various factors, including an increase in
workplace crime, a growing fear of crime, reduced public expenditure on
protection, and an enhanced recognition of the effectiveness of private security
measures.
Estimating the number of contract security firms can be achieved through various sources,
allowing for trend observation and comparison of estimates. Figure 2 illustrates the progression
of contract firms over time, commencing in 1967. The data, derived from six sources, reveal an
overall growth in the number of contract security firms, rising from 4,000 in 1967 to just under
10,000 in 2009. However, there are data gaps between 1969 and 1980, as well as between 1990
and 2002. Additionally, when multiple sources present data for a specific year, there is not always
agreement among them.
Starting in 2002, D&B (Dun & Bradstreet) and the Economic Census provide multiple data points
that align closely, with the exception of a spike in the number of contract firms reported by D&B
from 2006 to 2008. However, the D&B count in 2009 matches the estimate from the Economic
Census. Several factors may account for this spike in D&B data. For instance, it coincides with the
onset of the U.S. economic downturn, suggesting that some contract security companies may
have opened during prosperous times but subsequently closed as the economy weakened. The
spike could also be influenced by D&B's methods of obtaining the count. D&B relies on
companies self-assigning their primary industry, so it is possible that more companies identified
themselves primarily as guard service providers during those years but changed their designation
by 2009. Another plausible reason for the increased count in D&B data is the creation of more
private security firms during the peak of the Iraq war, which aligns with this particular time
period. These firms may have dissolved as the U.S. began withdrawing its soldiers.
42
Figure 2. Number of Contract Security Firms in the United States by Data Source,
1967–2009
Sources: Census County Business Patterns (2007); Dun & Bradstreet (2002–2009); U.S. Census
Bureau, Economic Census (2002, 2007); Hallcrest Report I (Cunningham et al., 1985); Hallcrest
Report II (Cunningham et al., 1990); RAND (Bird et. al., 1971).
43
Figure 3. Distribution of Establishments and Employees by Size of Firm (Number
of Employees)
Figure 4 illustrates the historical trend of the total number of private security
officers in the United States across all industries, as well as the number of officers
employed specifically by contract firms. Over time, ten different sources have
monitored either the total number of private security officers nationwide or the
count of officers working for contract firms.2 Between 1980 and 2010, both total
employment and employment within contract firms experienced an approximately
80% increase in the number of employees. However, the majority of this growth
occurred during the 1980s and 1990s, with limited to no significant growth
observed in the past decade. Furthermore, since 1997, approximately 60% of the
overall increase in employment within the private security sector took place prior
to that year.
44
Figure 4. Total Number of Private Security Officers and Contract Security Officers
in the United States by Data Source, 1980–2009
Sources: Bureau of Labor Statistics Occupational Outlook Handbook (BLS, 2009c); Census County
Business Patterns (2007); Congressional Research Service (2004); Current Population Survey (BLS,
2010b); Dun & Bradstreet (2009); U.S. Census Bureau, Economic Census (2002, 2007); The
Hallcrest Report I (Cunningham et al., 1985); The Hallcrest Report II (Cunningham et al., 1990);
BLS (2010c); O*NET OnLine (2006); RAND (Bird et. al., 1971).
Approximately 60% of private security officers are employed by contract security firms, indicating
that the remaining 40% are proprietary security officers. Although there has been consistency in
the employment trends within the private security sector, the estimates for each type of
employment (i.e., total employment in the United States and contract employment) have shown
variations of approximately 200,000 employees in a given year. These discrepancies can be
attributed to three primary factors.
Firstly, sampling error, which is inherent in survey data, can contribute to the variation in
estimates. Sampling error arises from the fact that not all individuals within the target population
are directly contacted during the survey. If confidence intervals were available for these estimates,
it is possible that the differences would not be considered statistically significant. However, the
necessary standard errors to calculate confidence intervals are not always provided.
Secondly, variations in data collection methods by each secondary source can also account for the
discrepancies. For instance, the Occupational Employment Statistics (OES) survey samples business
establishments, while the Current Population Survey (CPS) samples households. The choice of
sampling frame and unit can have a significant impact on the derived estimates from a survey.
45
Lastly, definitional differences among the secondary data sources contribute to the variations in
estimates. As mentioned in Section 1.2, each source utilizes slightly different definitions of the private
security industry and the contract security industry. These definitional disparities can significantly
influence nationwide estimates, further adding to the observed differences.Taken together, sampling
error, differences in data collection methods, and definitional variations all contribute to the
fluctuations in estimates regarding private security employment and contract security employment.
Data from three secondary sources provide information on the percentage of private security officers
who work part-time. Figure 5 illustrates that each source presents data at a different time point.
Comparing these estimates suggests a potential decrease in the overall percentage of security officers
working part-time (Kakalik & Wildhorn, 1971a, 1971b, 1971c, 1971d; Parfomak, 2004a; BLS, 2009b).
However, it is important to note that these estimates encompass a wide range within which the true
estimate may fall.
According to RAND's data, in 1969, the percentage of private security officers working part-time
ranged between 20% and 50% (Kakalik & Wildhorn, 1971a, 1971b, 1971c, 1971d). Similarly, the
Congressional Research Service provided an estimate ranging from 20% to 30% in 2004 (Parfomak,
2004a). The BLS Occupational Outlook Handbook (2009b) did not specify a confidence interval for its
estimate. Thus, if the lower bound of the confidence interval for each time point represents the
accurate estimate, then the trend remains relatively unchanged. However, if the upper bound is a
more accurate representation, the decrease in the proportion of part-time workers is even more
substantial than indicated.
Based on the CPS data (BLS, 2010b), 16.2% of workers were classified as part-time in 2004, and this
figure decreased to 16.1% in 2008. Therefore, while historically the percentage of security officers
working part-time was higher than the national average, in recent years it has declined to align with
the national average.
When comparing estimates over time, it is crucial to consider how each source defines part-time
work. For instance, one source may include individuals who exclusively work as private security
officers but do not meet the threshold of hours per week to be considered full-time, while another
source may encompass individuals who "moonlight" as private security officers, including off-duty
police officers. Our analysis of source methodologies reveals that the Congressional Research Service
explicitly states that its definition of part-time workers includes off-duty police officers. The other two
sources imply this inclusion but do not explicitly state it. For instance, the BLS Occupational Outlook
Handbook indicates that part-time workers are "supplementing their primary occupation," without
specifying whether off-duty police officers are included in that primary occupation. Furthermore,
RAND simply mentions that part-time workers "usually work on weekends" and that younger
part-timers are sometimes students, teachers, and military personnel.
46
Figure 5. Percentage of Private Security Officers Who Work Part Time, 1969–
2008
Sources: Bureau of Labor Statistics Occupational Outlook Handbook (BLS, 2009b), Congressional
Research Service (2004), RAND (Bird et. al., 1971).
Note: Error bars are due to standard errors.
Private security organizations offer a range of services encompassing guard services, alarm
monitoring, investigation, armored transport, correctional facilities management, systems
integration and management, security consulting, pre-employment screening, information security,
and various others. In 2005, approximately 34.5% of private security functions were outsourced to
contract firms (Figure 1).
Figure 6 provides the percentage of companies that indicated outsourcing for specific security
functions. Among these functions, alarm installation, maintenance, and repair had the highest
outsourcing rate at 69.4%, followed closely by alarm monitoring services at 68.9%. Substance abuse
testing ranked third with a rate of 61.6%, and background investigations were outsourced by 43.8%
of the companies. Guarding services, on the other hand, were outsourced to a contract firm by
30.3% of the surveyed companies (The ASIS Foundation, 2005).
47
Figure 6. Percentage of Companies Outsourcing Security Services by type of
Service, 2005
In 2005, the ASIS survey also collected data on security-related technologies that
companies had purchased or planned to purchase in the near future (The ASIS Foundation, 2005). As shown in
Figure 7, computer and network security system technology had been purchased or was in the purchase plan
for the greatest percentage of companies (39.7%),
followed by monitoring and alarm technology such as burglar alarms (26.3%), closed circuit
television (23.8%), fire protection systems (23.8%), and video cameras (23.6%).
48
Figure 7. Percentage of Companies That Have Purchased or Plan to Purchase
Security-Related Technology, 2005
As for alarm installations in 2006, there was a relatively equal distribution among different
customer segments. Residential customers accounted for 33% of installations, commercial
customers comprised 37%, and large industrial customers represented 30% (based on the 2006
installation business report from Security Sales & Integration, 26[13], as cited by the Electronic
Security Association, n.d.).
4.3.3 Investigation
In 2008, around 45,500 private detectives and investigators were employed in the United States by
private detective agencies, state and local government, department stores, financial institutions,
insurance agencies, and employment security services (Editors of McGraw-Hill and the U.S.
Department of Labor, Bureau of Labor Statistics, 2008). Private investigators are hired to collect
information through observation and interviews to solve noncriminal cases, including missing
persons, medical malpractice, domestic or marital issues, product liability, and more (Cunningham et
al., 1985; Dempsey, 2008). Additionally, private corporations or organizations may hire private
investigators for criminal cases such as credit card fraud, internal theft, insurance fraud, and in some
cases corporateintelligence and industrial espionage (Dempsey, 2008; Gill & Hart, 1999).
According to the Gale Group (2010), approximately 150 armored transport companies exist
in the United States. Armored transport firms traditionally provide armored vehicles and
armed personnel (often interstate) to protect and deliver currency, coins, securities, bonds,
gold, silver, and other precious metals, credit cards, jewelry and other items of high intrinsic
value (Cunningham et al., 1985). These activities may include counting, sorting, and
packaging the currency from automatic teller machines or emptying parking meters (p. 66).
The security provided by these firms comes with great risks because of the dangers involved
in transporting these materials. According to Dempsey (2008) 70 armed robberies occur
each year in the armored transport industry resulting in an average of 5 deaths of armored
transport personnel.
50
4.3.5 Correctional Facilities Management
Although controversial, privately run prisons and jails have been expanding since the 1980s.
Private corrections companies typically take on one of two types of agreements: (1) they
are contracted to manage a government prison, or (2) they provide inmate housing (in-
state and out-of-state) in private-run correctional facilities (Gilroy, Summers, Randazzo, &
Harris, 2010). In an effort to save money and relieve overcrowded prison systems,
governments are increasingly outsourcing their corrections services to private companies. In
addition to operating correctional facilities, private corrections facilities also operate under
performance-based contracts (i.e., rehabilitation programs, healthcare, educational and
vocational training, state-of-the-art facilities, and more efficient operations). In 2007, an
average of 8% of all prisoners (7% state and 16% federal) were incarcerated in private
facilities (State University of New York at Albany, 2008, table 6.32.2007). The Corrections
Corporation of America (CCA), which houses approximately 75,000 inmates in more than 60
facilities, reports that it is the largest private corrections system in the nation (Taub, 2010)
and the fourth-largest prison system behind the federal government and two states
(Corrections Corporation of America, 2008). CCA guards are assigned to provide security for
housing units, monitor inmates, conduct perimeter checks, and report and document
incidents. In addition to managing prison, jail, and detention facilities, the company also
specializes in the design and construction of facilities and inmate transportation. The GEO
Group, another industry leader in private corrections, manages more than 53,000 beds in
15 states, accounting for 25% of the industry‘s bed market share. GEO provides correctional
and detention services for federal, state, and local government agencies at the minimum,
medium, and maximum security levels (The GEO Group, 2010).
While private corrections systems are popular, some have argued that the actual cost
savings have yet to be determined (Steinbauer, 2009). Corrections officer unions and high-
profile media incidents have caused some to reassess the benefits of private correctional
facilities. The incentive to cut costs and remain competitive has highlighted the potential to
compromise professionalism, staffing levels, and quality of service (Zito, 2003).
Accountability and oversight have also raised concerns as most contracts require
government monitoring, internal audits and compliance reviews, which can become costly
compared to regulation in public correctional facilities (Zito, 2003; Gilroy et. al, 2010).
51
4.3.7 Security Consulting
Security consultants work in diverse fields, including engineering, security management,
disaster management, and computer protection (Cunningham et al., 1990). The services
consulting companies provide may additionally consist of designing safety systems and
growing specifications for technological and physical security measures, conducting security
training, administering polygraph and psychological stress evaluations, and imparting
professional advice on loss prevention and threat administration (Hess, 2009).
52
This document is a research report submitted to the U.S. Department of Justice. This report has not
been published by the Department. Opinions or points of view expressed are those of the author(s)
and do not necessarily reflect the official position or policies of the U.S. Department of Justice.
Review of the Private Security Industry: Definitions, Challenges, and Paths Moving Forward
53
Figure 9. Number of Employees per Security Officer by Industry Sector, 2009
These ratios are a measure of concentration and not the whole range of safety officers in a
sector. This skill that a sector with a low awareness may rent extra protection officers in phrases
of absolute numbers, but the truth that the enterprise has so many different employees
consequences in a low concentration level
Critical infrastructure includes industry and manufacturing, utilities, and transportation. In the United
States, the vast majority of critical infrastructure is owned and operated by the private sector (Law
Enforcement-Private Security Consortium, 2009) and requires private security for protection (Hess,
2009). According to the Congressional Research Service (Parfomak, 2004a), approximately 50,000
security guards protect critical infrastructure in the United States. The National Infrastructure
Protection Plan (NIPP), established in 2009, built a partnership of government agencies and private
sector entities to enhance protection of critical infrastructure and key resources. Private security is
necessary to protect large sectors of our critical infrastructure, including industry and manufacturing,
utilities, and transportation (Hess, 2009). In manufacturing facilities and warehouses, internal theft is
a significant threat. Businesses may also need to secure against crimes such as sabotage and
espionage. Certain facilities, such as chemical plants and utilities facilities, are also potential sites of
terrorist activities. As for transportation, a variety of security services are used to protect cargo, mass
transit, airports, and airline transportation. Private security guards are commonly hired by air carriers
to conduct passenger and baggage checks; however, federal law enforcement officers usually provide
overall airport security (Hess, 2009). Mass transit
54
also makes use of private security. For example, the Amtrak Police Department is a private- sector
police force with more than 300 sworn officers (International Association of Chiefs of Police, 2004).
Some local transit systems also hire private guards. After shootings on city buses in Durham, North
Carolina, private police were hired to work in conjunction with city police officers in terminals and
on buses (Goldstein, 2007).
4.4.2 Commercial
Commercial security encompasses a range of markets, including offices and office buildings,
financial institutions, retail, and other businesses (e.g., lodging and hospitality, food service,
entertainment). The primary threat to office buildings is burglary and theft (Hess, 2009).
Common measures taken to protect against this type of loss include access controls (e.g.,
identification card or fob readers, coded access, biometric access), closed circuit television
(CCTV) surveillance, and security guards.
Financial institutions also suffer from losses involving theft (e.g., cash and stocks) and
regularly use guards and alarm monitoring systems. Larger financial institutions may also
hire investigators devoted to investigating identity theft and fraud, especially since the
federal government has reduced the number of federal investigators devoted to these
crimes (Goldstein, 2007). Following the FBI‘s reorganization after the 9/11 attacks, 2,400
agents were transferred to counterterrorism units, and replacements were not hired for
identity crime and fraud investigations (Shukovsky, Johnson, & Lathrop, 2007).
Retailers face a number of security issues, including shoplifting, vandalism, and employee
theft (Hess, 2009). To deter shoplifting, approximately 37% of retailers use uniformed
security guards (Dempsey, 2008). Other methods include physical controls, such as alarms
and surveillance equipment. Other commercial markets, such as hotels and restaurants,
increasingly use CCTV monitoring systems to monitor common areas against theft and
vandalism (Hess, 2009).
4.4.3 Institutional
Visitor control, internal and external theft, and fire are the major security concerns of hospitals and
other healthcare facilities (Hess, 2009), which may use security guards to patrol the hallways and
control access. Risks at educational institutions include the safety of students and staff, violence,
vandalism, and theft. To address these concerns, access control, lighting, and security guards may be
used in some facilities. For example, the Mackinac Center (1998) reported that districts in New York
City hired guards after experiencing problems with school violence. Because of their open
environments, colleges and universities use both proprietary and contractual security personnel to
secure their facilities (Hess, 2009).
55
4.4.4 Residential
Private security may also be necessary in public and private housing. Indeed, the
installation of residential security systems more than doubled over a 5-year period in the
1990s (Brown, 1997; Dempsey, 2008). Other measures taken by homeowners may include
special locks and lighting, safes, and large dogs (Hess, 2009). Some gated communities
may also hire security guards to patrol the premises and monitor entrances. Similarly, some
public housing authorities use access control and CCTV surveillance services.
4.4.5 Government
Federal and local governments also seek the services of private security companies. In the
1950s, the city of Kalamazoo, Michigan, hired private police officers as deputy sheriffs; it is
thought to have been the first local government agency to do so (Joh, 2005). By the 1990s,
an estimated 45% of all local governments outsourced some of their services to private
police, compared with a reported 27% in the 1980s (Sklansky, 2006). These practices are
not uncommon as more private security guards are hired to guard government buildings,
public housing communities, and public parks (Sklansky, 2006).
The federal government manages its own law enforcement agency, known as the Federal
Protective Service (FPS), through the Department of Homeland Security. According to its
Web site, the FPS employs 15,000 contract security personnel to guard more than 9,000
federal government buildings and occupants, critical infrastructure, and other assets
(Federal Protective Service, 2010). Wackenhut Corporation has contracts to provide security
guards for the Liberty Bell in Philadelphia and to screen visitors at the Statue of Liberty in
New York City (Goldstein, 2007). Privatization of military functions has also seen an
upswing. According to Dickinson (2005), an estimated 20,000 individuals have been hired
as contract private military guards in Iraq. Private military guards may ―provide logistical
support to armed forces and also perform protection, training, consulting, and planning
services…. [and] some… actually engage in combat under contract‖ (Goodsell, 2007).
4.5 Demographics
The main sources for demographic information on private security officers are the CPS and
O*NET OnLine. These sources directly interviewed guards and, therefore, were able to
obtain detailed demographic information about guards specifically. The CPS provides data on the
distribution of private security officers by race. In 2008, about
53% of private security officers were white, 31% were black, and the remaining 16% were
Hispanic or Asian (Figure 10) (BLS, 2010b). The race distribution for the general workforce
is 70% white, 11% black, 14% Hispanic, and 5% Asian
56
According to O*NET data, in 2008, 46% of security officers had a high school education or less, 12%
had a bachelor‘s degree, and 42% had completed at least some college(Figure 11) (O*NET OnLine,
2008). According to the American Community Survey (2008)35% of the overall workforce obtained
an associate‘s degree or higher, 20% had some college, and 45% had a high school diploma or less.
Both the CPS and O*Net Online involve survey data, and therefore, their estimates have an
unreported amount of sampling error around them.
The CPS also collected data for the years 2003 to 2008 on the gender of all private security
officers and of employees of contract firms (BLS, 2010b). The gender distribution for all
private security officers is based on an occupation-level estimate, and estimates of the
percentage of female employees in contract firms are based on an industry-level estimate.
This means that contract firm estimates include all of the other occupations employed in the
investigation and security services industry, such as administrative assistants and sales
representatives. However, the vast majority of the employees in the industry are security
guards. As shown in Figure 12, the percentage of private security officers who are female
increased slightly over time from 21% in 2003 to 23% in 2008. Among those employed by
contract security firms, the percentage that is female is slightly higher, ranging from 22% to
57
26% between 2003 and 2008, respectively. However, the percentage of women in the
general workforce remained around 47% from 2003
Figure 12. Percentage of Total Private Security Officers and Contract Security
Officers Who Are Female, 2003–2008
One demographic characteristic that is not available from any secondary data source is the
distribution of private security officers by age. This information is of interest because it can
provide some insight into the type of individuals who work as private security officers. For
example, age can be used as a proxy for years of experience. If the mode age is in the early
20s, then one may infer that a large portion of private security officers only have a few
years of experience. In addition, compared with an older skewing population, a younger
skewing population may have different implications on the expected growth of the
occupation or the type of individuals becoming private security officers. For instance if the
mode age of the occupation is in the 50s or 60s, then one may infer that a large portion of
the occupation will be retiring in the next few years, creating a potential shortfall in the
number of private security officers that will be needed in the next 5 or 10 years. Salary data, in
the form of a median hourly wage, are available over time from several
sources. Figure 13 presents the median hourly wage over time as collected by the OES
survey (BLS, 2010c) and the CPS (BLS, 2010b). According to both sources, the hourly wage
58
increased by about 3% to 5% per year (the Congressional Research Service provided a
single point estimate in 2003 that was close to the OES estimate). However, although the
percentage change is similar between these sources, the wages themselves are different,
Sources: Congressional Research Service (Parfomak, 2004a), Current Population Survey (BLS,
2010b), Occupational Employment Statistics Survey (BLS, 2010c), U.S. Department of Labor (n.d.,
data for 1996–2009).
with the CPS wage being consistently higher. This difference is likely tied directly to how
each of these sources publishes estimates. The OES survey publishes data for private
security guards, but the CPS publishes data for private security guards and gaming
surveillance officers. The inclusion of gaming surveillance officers in the CPS estimates
pushes the median wage up when compared to the OES estimates. There is a steady
increase in hourly wages from 1997 through 2008, despite a constant federal minimum
wage from 1997 through 2006. After 2006, wages appear to increase at the same rate as
the minimum wage (U.S. Department of Labor, n.d.).
59
As of May 2008, median salary for private security professionals is $23,460, with pay scales
ranging from $16,680 to more than $39,360 a year (BLS, 2009b). The median salary for
private security is significantly lower than for public police. According to the BLS (2009c), the
median salary for public patrol officers is $51,410 per year as of May 2008, and the pay
scale for law enforcement ranges from about $30,000 to $114,000 per year (BLS, 2009c).
Private security companies submit bids to win contracts, and the industry is very
competitive; thus low contract bids lead to low wages for the guards (Margasak, 2007).
In addition to the overall median hourly wage, the CPS breaks down the median hourly
wage by gender for private security guards and gaming surveillance officers. Figure 14
presents the wages by gender from 2003 to 2008 (BLS, 2010b). The data indicate that the
wage gap has varied between 13% and 25% during this 6-year period. The large
fluctuations in this gap from year to year are partly due to sampling error, and therefore,
wages probably do not really increase or decrease as dramatically in a single-year period as
could be inferred from the data.
This analysis found no available data on security personnel benefits. None of the sources
covered fringe benefits, such as paid time off (vacation and sick leave), health insurance,
and other types of insurance such as disability and life. These types of data are difficult to
accurately measure in a general population survey because of the amount of specificity
necessary to provide useful information. For example, since most large companies offer
60
such insurance, reporting the percentage of private security officers that receive health
insurance is of less utility than information on the level of benefits offered. However,
respondents may not be able to provide this level of detail, increasing the potential for
measurement error. Therefore, data on benefits are best collected at the company level by
a human resources representative, provided the company is willing to share this
information.
4.6 Revenue
Annual revenue for the private security industry is difficult to measure accurately because it is
largely contingent on how the industry is defined. A broader definition of the industry will result in
a higher estimate of the total revenue simply because the revenue of more companies will be
included. Figure 15 presents the total revenue (in billions) for contract security firms over time. In
general, revenue has increased anywhere from 400% to 600% since 1980.4 This fluctuation is
driven largely by how the contract security industry is defined, because that determines the set of
businesses from which the revenue estimates are drawn. For instance, in 2003 three sources
provided total revenue data among contract security firms with estimates that vary by up to $20
billion. At the high end, D&B estimated total revenue for the contract security industry at $30.5
billion dollars (D&B, 2003–2009). As indicated in Table 2 this estimate includes a wide range of
private security industries including, but not limited to, security guarding firms, armored car firms,
and detective service firms. The Congressional Research Service produced the lowest revenue
estimate at $11.0 billion (Parfomak, 2004a). This estimate was based on a search of administrative
records and focused solely on private security guarding firms. As indicated in Tables 1 and 2, the
Congressional Research Service has the most restrictive definition of private security contract
firms, focusing solely on guarding, while the Census Service Annual Survey has a slightly broader
definition, and D&B has the broadest definition. As expected, the revenue estimates correspond
to these definitions, with the Congressional Research Service estimate being the smallest,
followed by the Census Service Annual Survey estimate and D&B with the highest estimate.
Furthermore, even within a single source, revenue data can have large fluctuations. For instance,
the D&B revenue estimates fluctuate greatly between 2003 and 2009. These fluctuations in
revenue correspond directly with the fluctuations in the number of contract security firms
identified by D&B in Figure 2.
61
Figure 15. Annual Revenue Earned Among Contract Security Firms by Data Source
(in Billions), 1980–2009
Sources: Census Service Annual Survey (2000–2007); Congressional Research Service (2003); Dun &
Bradstreet (2002–2009); U.S. Census Bureau, Economic Census (2002, 2007); The Hallcrest Report
II (Cunningham et al., 1990).
Figure 16 attempts to control for both the across- and within-source variations in the number of
contract firms by measuring a mean annual revenue per contract security firm (in thousands). The
number of sources in this figure is less than the number in Figure 15 because the number of
contract firms included in the revenue total is not available for all sources. This information was
available only from three sources.5 The D&B data still fluctuate greatly from year to year, but in a
different pattern compared to total annual revenue. Since controlling for the number of firms
does not impact the upward trend, something else, like how revenue data are collected, must be
influencing the D&B revenue data.
62
Figure 16. Average Annual Revenue per Contract Security Firm by Data Source (in
Thousands), 1980–2009
Sources: Dun & Bradstreet (2002–2009); U.S. Census Bureau, Economic Census (2002, 2007);
Hallcrest Report II ( Cunningham et al., 1990).
Figure 17 looks at the revenue for the largest contract security firms. The 10 largest
companies (in terms of revenue) comprise 67% of the total revenue earned by contract
security firms (Parfomak, 2004a). The largest, Securitas USA, comprises 23.6% of the total
revenue earned by this industry. While this figure is only a snapshot in time and the exact
revenue figures may change from year to year, it is likely that the proportion of total
revenue earned by the largest companies remains relatively constant over time.
The growth in private security has been driven by the increasing level of outsourcing of
security functions for a number of areas (Greene, 2006). These areas include private
security hired to protect commercial offices, entertainment districts, and warehouses, as
well as the privatization of public safety functions in corrections and policing and the
growing emphasis on infrastructure protection. The increased use of closed-circuit television
has further fueled an increased demand for privately security staff to monitor video and
surveillance equipment.
63
Figure 17. Annual Revenue (in millions) by Largest Contract Security Firms, 2003
4.7 Expenditures
Like revenue, expenditures are directly related to the size of an industry. Therefore, when comparing
expenditures across industry segments, it is important to standardize the expenditure amounts.
However, as shown in Figures 18 and 19, the manner in which the expenditures are standardized can
alter the interpretation of the data. Security Magazine‘s annual survey of the top 500 security firms
estimates the amount of spending on security- related services by revenue and by the number of
employees (McCourt, 2009). When security expenditures are standardized by total company revenue,
colleges and universities spend the most on security. However, when expenditures are standardized
by number of total employees, the energy industry outspends the next nearest industry by
approximately 350%. Furthermore, by this measure colleges and universities spend the ninth largest
amount on security.
64
Figure 18. Spending on Security as a Percentage of Revenue by Industry Sector,
2009
Figure 19. Spending on Private Security per Employee by Industry Sector, 2009
65
The ASIS Scope and Emerging Trends survey (ASIS Foundation, 2005) examined the amount
companies have budgeted for security-related services over time. The survey collected data on
the security budgets of responding companies for each of the years 2000 to 2004, allowing for
comparisons among a set of companies over time. Figure 20 shows these security budgets
increased 22% between the 2000–2001 and 2003–2004 budget years. There was a slight decrease
of 4% between the 2001–2002 and 2002–2003 budget years.
$1,200,000
$1,000,000
$1,031,309
$966,414 $924,219
$800,000
$844,982
$600,000
$400,000
$200,000
$0
2000-2001 2001-2002 2002-2003 2003-2004
Budget Year
66
BRIEF DESCRIPTION OF PROJECT AND SERVICE
This project report provides valuable insights into the establishment of a security agency and
outlines the fundamental steps involved in running a profitable business. The document aims to
furnish relevant information to assist entrepreneurs in making informed decisions by covering
technical, legal, and business aspects. Security agencies offer a range of services, including security
guard services, executive escort services, security/burglar alarms, vehicle tracking, armored car
services, cash-in-transit services, and more. The proposed security agency focuses on providing
general and executive security guard services to the corporate/business sector through the
deployment of armed personnel.
The agency's security management staff, comprising an operations manager and shift supervisors,
will oversee the provision of security services, while the entrepreneur will handle recruitment,
training, business promotion, and management activities. The agency will leverage advanced
communication technology and technology-based security solutions to cater to businesses and
corporate clients. The office location is planned to be in a rented premise near a major business
and/or financial hub in a prominent city.
The agency's primary service offering will encompass general and executive security guard
services, employing up to 100 armed guards. The project is expected to generate direct
employment opportunities for 66 individuals. The financial analysis indicates that the agency will
be profitable from its first year of operations.
In terms of operational capacity, assuming a 12-hour shift/duty cycle, the security company is
projected to hire and deploy 100 security guards. However, the initial estimation suggests
operating with 58 security guards, requiring an investment of Rs. 22.00 lacs. Sales are forecasted
to increase by 10% due to an increment in service charges. The agency's license from the state
Home Department will also include 58 weapons licenses.
67
POTENTIAL TARGET MARKETS/CITIES
The market for security services is experiencing steady growth, with an average annual increase
of 5-6%. This growth primarily stems from corporate clients seeking specialized and high-quality
security services. Urban areas, especially large metropolitan cities, are home to multinational
corporations, local conglomerates, manufacturing companies, business and trade hubs, financial
institutions, and telecom sector companies. These locations represent potential target markets
for the proposed security agency, allowing for a wide range of opportunities. Thus, the agency
can be established in any major city across the country.
Project Economics
The following table suggests interior fee of return and payback period for
theproposed personal safety agency.
Project Economics Description Details
Internal Rate of Return (IRR) 52%
Payback Period (yrs) 2.16 Years
Net Present Value (NPV) 3905633/-
Returns on the task and its profitability are incredibly structured on the first-rate
/experience and coaching of human useful resource and safety guards, linkages
with thecorporate zone and marketing efficiency.
Project Financing
68
Following table gives details of the fairness required and variables associated to
bank loan:
Project Financing
Description Details
Project Cost
Space Requirement
Following arms and equipment will be required for the field operations of the
security agency:
69
List of Weapons and Communication, Office & Other Equipment
Cost Total
Description Quantity Rs/unit (Rs.)
Metal Detector 6 4,250 25,500
Repeater Guns 15 7,500 112,500
Pistol (0.30 Caliber) 14 7,500 105,000
Radio Communication System
(base) 1 40,000 40,000
Hand/Portable Communications
5 15,000 75,000
Units
Computers 2 26,000 52,000
Printers 1 35,000 35,000
Fax machine 1 25,000 25,000
Consumer electronic items (water
cooler, AC, electric kettle etc.) 100,000
Total 570,000
The office furnishings & equipment prices are estimated to depreciate at the rate of
10% per annum the use of diminishing stability method for the projected period.
70
Table 9: Human Resource Requirement
Human Resource Requirement The following desk provides the manpower requirement for the
proposed Security Agency:
Shift and Deployment Supervisors: All supervisors would be operational in- cost of security locations.
They would report to Manager Operations and assign obligations and monitor performance of the
guards. They will also coordinate with clients’ protection officers.
Guard / Special Guard: Guard would be a “Sipahi” degree character and would report to the
Supervisor. The protect would operate responsibilities assigned to him such as guarding entrance and
exit of the
premises, checking cars motion and carrying out physical and baggage search etc. ‘Special Guards’
would be a commando degree ex-serviceman, who normally would function Executives Escort duty
and would be accountable for their security. Retired SSGC commandos are recommended to be
recruited for this position. The proposed undertaking would want a complete of sixty six personnel to
furnish the safety services. Salaries of all personnel are estimated to make bigger by using 10%
annually
71
Revenue Generation
Revenue projections for the proposed safety company consist of income streams
from the following services:
Table 10: Revenue
Service
First Year Sales
Service Guards Charges
(Rs./guard) evenue (Rs.)
General Security R
Service 52 15,000 9,360,000
Executive Security
Services 06 21,450 1,544,400
Total Sales Revenue 10,904,400
Sales are anticipated to develop via 10% each year. The prices used to calculate
the
gross income earned are based on the billing fee at which the Agency will
charge the customer. The provider fees are estimated at 1.5 x protect salary
and 1.65 x shield revenue for typical and government protection services
respectively.
Guard salaries are additionally estimated to amplify at the rate of 10% per annum.
It is
assumed that any expiring protection contract will either be extended or be
replaced by way of a new one.
Other Costs
• Arms and Equipment Maintenance: All arms and gear require
regular protection which prices around 1% to 5% of the arms/equipment
costs relying upon the usage. The renovation cost for hands and
equipment is assumed at 2% of complete cost, protected in the working cost
estimates.
• Rent and Deposits: The proposed premises will be obtained on a rental
basis with 3 months security credit and 3 months advance rent after which,
rent will be payable on a monthly basis. The monthly rent is estimated at
approximately Rs. 45/ sq. ft. amounting to Rs. 36,000 per month for the
proposed safety agency workplace (800 sq. ft.). Rent is assumed to increase
by 10% per annum.
Electricity 18,000
Water 400
Telephone 6,000
72
Total 24,400
• Office Expenses: Monthly office costs for the safety enterprise are
estimated to be Rs. 21,000 (700 per day). These prices are estimated to
increase at the rate of 10% per annum for the projected period..
• Taxation: The commercial enterprise is assumed to be run as a Single
Member Company; therefore, tax fees relevant on the earnings of a
non-salariedindividual taxpayer are used for income tax calculation of the
business.
• Cost of Capital: The value of capital is explained in the following table:
Particulars Rate
73
Cost of finance 08.0 %
The weighted common cost of capital is based totally on the debt/equity ratio of 90:10.
ANNEXURE
Income Statement
Projected Income
Statement (Rs.) Year 1 Year 2 Year 3 Year 4 Year 5 Year 6 Year 7
Financial Charges
(08% Per Annum) 157,817 149,900 131,718 112,026 90,701 67,605 42,592
Earnings Before
Taxes 315,011 393,961 488,630 590,973 701,880 894,913 1,025,915
Tax - - 8,863 19,097 30,188 56,737 76,387
Net Profit 315,011 393,961 479,767 571,876 671,692 838,176 949,528
74
Statement of Cash Flow
Net Cash Flow From Operations - 242,886 518,048 594,162 677,094 768,151 853,601 956,758
NET CASH FLOW 788,400 242,886 298,983 356,915 420,155 489,886 552,241 630,385
Cash at the Beginning of the Period - 788,400 1,031,286 1,330,270 1,687,185 2,107,340 2,597,226 3,149,467
Cash at the End of the Period 788,400 1,031,286 1,330,270 1,687,185 2,107,340 2,597,226 3,149,467 3,779,852
75
Projected Balance Sheet
Total Equity & Liabilities 2,191,900 2,506,911 2,681,807 2,924,327 3,239,264 3,632,692 4,169,508 4,792,663
Assets
Current Assets
Cash & Bank Balance 788,400 1,031,286 1,330,270 1,687,185 2,107,340 2,597,22 3,149,46 3,779,852
Account Receivable - 227,175 249,893 274,882 302,370 6 332,607 7 365,868 402,454
Prepaid Rent 216,000 216,000 216,000 216,000 216,000 216,000 216,000 216,000
Pre Operating Costs 363,000 290,400 217,800 145,200 72,600 - - -
Total Current Assets 1,367,400 1,764,861 2,013,962 2,323,266 2,698,310 3,145,833 3,731,335 4,398,307
Fixed Assets
Arms and Communication &
Other
Equipment 568,500 511,650 460,485 414,437 372,993 335,694 302,124 271,912
Furniture & Fixtures 156,000 140,400 126,360 113,724 102,352 92,116 82,905 74,614
Premises Renovation 100,000 90,000 81,000 72,900 65,610 59,049 53,144 47,830
Total Fixed Assets 824,500 742,050 667,845 601,061 540,954 486,859 438,173 394,356
Total Assets 2,191,900 2,506,911 2,681,807 2,924,327 3,239,264 3,632,692 4,169,508 4,792,663
Owner's Equity 219,190 534,201 928,162 1,407,929 1,979,805 2,651,49 3,489,67 4,439,201
7 3
Long Term Liability 1,972,710 1,972,710 1,753,645 1,516,398 1,259,459 981,195 679,835 353,462
Total Equity & Liabilities 2,191,900 2,506,911 2,681,807 2,924,327 3,239,264 3,632,692 4,169,508 4,792,663
76
• Required Spare Parts & Consumables: Suppliers credit agreements and
availability as per schedule of maintenance be ensured before start of
operations.
• Energy Requirement: The energy requirements should be properly assessed
and alternate source of energy for critical operations must be arranged in
advance.
• Machinery Suppliers: Training and After Sales Services should be sought
from suppliers.
• Quality Assurance Equipment & Standards: Product quality standards must
be defined and a system of check should be instituted. This improves
credibility.
Marketing
• Service & Packaging: Expert help may also be engaged for design &
development of Services.
• Ads & P.O.S. Promotion: Business advertising and dissemination through
banners and launch events is recommended. Product Brochures ought to be
developed from satisfactory provider providers.
• Sales & Distribution Network: Expert recommendation and distribution
agreements are required.
• Price - Bulk Discounts, Cost plus Introductory Discounts: Price should
never be allowed to compromise quality. Price for the duration of introductory
section may be decrease and used as a promotional tool. Service fee estimates
should be carefully documented earlier than price setting.
77
Human Resources
• List of Human Resource
Description No. of
Employees
Owner Manager / Director 1
Manager Operations 1
Shift Supervisor 2
Deployment Supervisor 2
Accountant 1
Special Guards 6
General Guards 52
Office boy 1
Total Staff 66
78
KEY ASSUMPTIONS
Particulars Assumption
Sales Increase 10 % per year
Increase in Staff Salaries 10 % per year
Increase in Utilities (Electricity / Water / 10 % per year
Gas)
Increase in Rent 10 % per year
Increase in Incidental Expenses 10 % per year
Increase in Office Expenses 10 % per year
Debt / Equity Ratio 90 : 10
Depreciation
Renovation 10 % per annum (Diminishing
Balance)
Arms and Equipment 10 % per annum (Diminishing
Balance)
Office Furniture
&Fixtures 10 % per annum (Diminishing
Balance)
Bad debts 0.5 % of Sales/Services
Loan Period 8 Years
Loan Grace Period 1 Year
Loan Installments Monthly
Financial Charges (Loan Rate) 12 % per annum
Service Tax Rate 14%
79