Contemporary Rights and Values
“Making something lawful for me doesn’t necessarily mean it will benefit me or be helpful or constructive to my fellow man” It doesn’t make it right or automatic in moving humanity along. paraphrased 1 Cor 6:12 ESV
Is it conscionable? – if it is an indulgence and can control you, best leave it alone because our conscience tells us to not always approve the crowds decision. My grandmother used to tell us, “don’t follow the crowd because they will lead you away from a basic understanding of right and wrong.” We all have "gut feelings" but most of the time we ignore them and never, well almost, do we seek to know where these feelings or core values come from.
“Right is right even if no one is doing it; wrong is wrong even if everyone is doing it.” Augustine of Hippo
The question then becomes, are values truly outdated? You have to ask yourself, isn’t it the common values that allows us co-exist with each other on a very basic level and then enables us to seek and understand each other’s action and reaction to those values? Get this in the wrong order, and the values become lost and thus; the assimilation into one is lost.
Do you feel safe at your place of business or your employer’s site?
No? Well that doesn’t surprise us at this juncture of our history.
Smooth talk your management team into allowing us to perform a physical vulnerability assessment so you feel safe. If that is you, let us suggest improvements that can keep you, your employees and/or co-workers safe, secure and feeling content that all of you will go home at the end of the day the same way you arrived.
A core component of an assessment is the process of identifying, quantifying, and ranking the vulnerabilities in an existing security system or identifying the need for one. Examples of systems for which vulnerability assessments are performed include, but are not limited to buildings, sites, personnel access points in and out of the building or site, closed circuit security camera system (CCTV) placement and how to include it into a site security plan, energy supply systems, water supply systems, transportation systems, parking areas and communication systems. These assessments typically include information technology systems also but Survival Decision is not providing this service at the time.
These assessments may be conducted on behalf of a range of different organizations, from small businesses up to large regional infrastructures. Vulnerability from the perspective of disaster management means assessing the threats from potential threats to the operation, hazards to the employees and to infrastructure that provides life support and security. It may be conducted in the political, social, economic or environmental fields.
We offer a range of plans, to suit everyone from startups to large corporate.
Contact us to schedule a meeting.
Click Here to go to the page.