IMPORTANT TO HAVE TWO GUARDS PER SHIFT AT KINDER MORGAN

Rationale for Two Guards per Shift at Kinder Morgan Rationale for Two Guards per Shift at Kinder Morgan Kinder Morgan (KM) is reportedly the largest midstream and the third largest energy company (based on combined enterprise value) in North America (Kinder Morgan: Corporate Profile, 2012, par. 1). From among the noted core competencies of KM, the following are relevantly noteworthy: The largest natural gas pipeline and storage operator in the U.S.The largest independent transporter of refined petroleum products in the U.S.The largest independent terminal operator in the U.S.The largest transporter and marketer of CO2 in the U.S.The only oilsands pipeline serving the West Coast of Canada (Kinder Morgan: Corporate Profile, 2012, par. 2). As such, it is eminent that security is being considered as a paramount concern. Due to the immense scale of KM’s scope of operations, assets, and the nature of the pipeline operations, it has acknowledged that safety and security of all its resources are immensely important. According to its Pipeline Safety Information (2012), Kinder Morgan monitors and inspects its pipeline system 24-hours a day from its state-of-the-art System Control Center (Kinder Morgan: Pipeline, 2012, p. 3). Likewise, the organization enjoined the public to assist in ensuring safety and security of the noted assets through reliance on neighbors, contractors and government and safety officials to help local field personnel protect the pipeline and identify possible damage or suspicious activity (Kinder Morgan: Request, 2012, par. 1).It is therefore justifiable that more than one security guard per shift, particularly two security guards per shift, would man identified organization’s physical assets and perimeter due to the following reasons: (1) assets and resources to be guarded are highly volalite and flammable. very costly and any disruption due to theft, pilferage or damage would be detrimental to the organization and to the community it serves. (2) security personnel should be strategically located in diverse sites to ensure that critical risk areas are covered at all times. (3) as noted in the company’s Code of Business Conduct and Ethics, specifically under the provision of Protection of Assets, it was noted that company property or equipment may not be removed from the premises without advance authorization from the employees supervisor. Personal use of Company tools or equipment is prohibited except in case of prior supervisory approval (Kinder Morgan: Code, 2012, p. 17). therefore checking and verifying approval protocols necessitate the assistance of an additional security personnel, if and when, immediately required. (4) if one guard needs to be excused at one point in time due to any valid reason (for personal hygiene or to eat, drink or take a quick and much needed snack), there is another one who could fully assume the position which was temporarily left.An organization such as KM, which reportedly discloses that safety, environmental protection, and the health condition of all stakeholders are its primary concern, roving security personnel need to work on at least a per tandem per shift approach for much needed assistance in covering the vast expanse of the organization’s perimeter and in guarding the company’s resources. This would also ensure that a check and balance between these security personnel is being implemented, in conjunction to back-up assistance in times of emergency situations, for effective control in the security management process.ReferencesKinder Morgan. (2012, May 25). Code of Business Conduct and Ethics. Retrieved August 23, 2012, from kindermorgan.com: http://www.kindermorgan.com/investor/KM_CODE_OF_BUSINESS_CONDUCT_AND_ETHICS.pdfKinder Morgan. (2012). Corporate Profile. Retrieved August 23, 2012, from kindermorgan.com: http://www.kindermorgan.com/about_us/about_us_corp_profile.cfmKinder Morgan. (2012). Pipeline Safety Information. Retrieved August 23, 2012, from kindermorgan.com: http://www.kindermorgan.com/public_awareness/Common_Files/PO_PA_NG-BROCHURE-2012_WEB.pdfKinder Morgan. (2012). Request or Report Information. Retrieved August 23, 2012, from kindermorgan.com: http://www.kindermorgan.com/public_awareness/additionalinformation/