OUR SECURITY POLICY

A comprehensive framework built on risk assessment, operational discipline, and client-focused security delivery.

Our Commitment

Security Policy
& Risk Framework

Oculus Security Services Ltd has fully studied and understood the information of security risks, assignments, and all challenges faced in risk assessment — enabling us to execute and deliver excellent services to our clients. This plan ensures that appropriate mitigation strategies are implemented correctly as per our recommendations.

We will work with you hand in hand to assess policies, processes, and technologies to identify weaknesses, categorize risks, and recommend improvements. This service helps to secure your environment and improve compliance by providing a comprehensive assessment of each important aspect of your compound's security program.

Internal Controls

Systematic review of internal access, personnel conduct, and compliance processes.

External Controls

Assessment of perimeter security, external threats, and environmental risk factors.

Physical Security

Evaluation of physical barriers, surveillance systems, and site hardening measures.

Policies & Procedures

Review and alignment of security policies, SOPs, and operational documentation.

Vulnerabilities & Threats

Identification and categorization of active and potential security threats.

Tour of Duty

Structured guard tours, shift management, and accountability protocols.

HOW WE OPERATE

Security Operational Procedures

Our coordinated incident response model ensures every security event is detected, escalated, and resolved through a structured three-stage operational chain.

1
Incident Detection & Reporting

All security incidents are immediately detected or identified by guards on duty, who prioritize safety and secure the scene while promptly reporting to the control room.

  • Guards identify and assess the incident
  • Secure the scene and ensure safety
  • Report to Control Room with full details
2
Control Room & Backup Dispatch

Upon receipt of the report, the control room logs the incident, assesses its seriousness, and initiates an appropriate response — dispatching backup or rapid response teams as needed.

  • Log & assess incident severity
  • Dispatch backup team to site
  • Guide & monitor response in real-time
3
Investigation & Police Reporting

For major incidents or criminal cases, police are promptly engaged, suspects and evidence are formally handed over, and a detailed investigation report is prepared and shared with the client.

  • Engage law enforcement immediately
  • Handover evidence and scene documentation
  • Document, review & implement corrective actions
Coordinated Incident Response

All three stages operate as a single unified chain — from first detection on the ground through control room escalation to final investigation and client reporting. No incident goes unresolved.

Detect Dispatch Resolve