Contact company icon Add as a preferred source Download PDF version

Buyers who are serious about protecting the public and rooting out rogue elements in their security provision, at a time when events are restarting in earnest after over a year of lockdowns, should ask their security companies to evidence their approval to the code of practice for the ‘Provision of Labour in the Security and Events Sectors’.

Mindful to maximize the benefit industry-wide and in the interest of all security providers and event organizers - and the public attending those events -– certification bodies operating in this sector and appointed by the SIA have come together to offer a labor provision scope of approval to their approved companies, protecting the public from rogue security workers, and security workers from the risk of exploitation.

Rogue labor deployment

NSI, ACM-CCAS and SSAIB share the view that the widest adoption of this code of practice for labor provision will best serve the public to good effect in deterring rogue labor deployment. Anyone involved in the delivery of security services, particularly in the events sector, will know the industry is immensely flexible in managing licensed security officer resources to accommodate its clients.

The fundamental distinction between the two is often misunderstood or not even recognized by buyers

It does this through two key proven methods a) Subcontracting and b) Labor provision. The fundamental distinction between the two is often misunderstood or not even recognized by buyers. The second – labor provision - falls outside the scope of ACS (Approved Contractor Scheme), even for ACS approved companies - and therein lies the loophole and the risk. A risk particularly in the events sector where their security may unwittingly be being compromised by the deployment of untrained, underpaid, unlicensed, non-security screened, or worse – terrorism-motivated individuals.

Less scrupulous operators

The risk is compounded by less scrupulous operators undercutting the professional industry in labor provision at rates that strongly suggest immoral and, in some cases, illegal employment practices. Social media posts evidencing this are not hard to find.

The over 800 security companies who maintain ACS approval granted by the Security Industry Authority are mindful that ACS signals to buyers a degree of professionalism and competence they rely on. Yet as with all approval schemes the devil is in the detail, and in the case of ACS whilst robust in its assessment process, its reach is limited to contractors themselves, and not their labor providers. Therein lies the ‘loophole’. Identifying this as a growing concern over the last few years, and one which many in the sector recognize, NSI developed a code of practice which has enabled approved companies to specify approval to the code as a requirement within their labor supply chain.

Three assessing bodies

NSI has also proposed the code be adopted by BSI in a new industry standard

NSI has also proposed the code be adopted by BSI in a new industry standard. In addition to NSI, the code of practice is now being adopted and offered by ACM-CCAS and SSAIB which will result in a wider reach of labor providers being required to hold approval.

Now, any company operating as a labor provider can apply for approval to this scope and will be audited annually against the requirements which include such checks as: PAYE being operated for all staff, national minimum or living wages is being paid, holiday pay, and pension being provided, identity and right to work checks, screening to BS 7858 and ongoing SIA licensing checks.

The three assessing bodies will be requiring all approved companies to use only labor providers approved to the code of practice or actively audit them to the requirements of the code – and evidence it – as part of their own ongoing approval.

Understand how AI can transform business security strategies with our insights and analysis on AI in security.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...