You are on page 1of 11

J&T DELIVERY SERVICES

SECURITY PLAN

MEMBERS:
MARK ANJELO CALMA
RENZO CALONGCAGONG
JOHN PAULO REYES
CCTV / Dash cam
COST: CCTV: ₱9,950./piece DASH CAM: ₱
4,270/piece

DESCRIPTION:
The (Utility) has deployed over 100 CCTV/DASH CAM cameras throughout the
county. These cameras have Pan/Tilt/Zoom (PTZ) capabilities, and are
strategically placed throughout the projects. Via our unique Fiber Optic
infrastructure, these camera signals are sent back centrally to the
(Utility)'s headquarters office where they are recorded 24/7. From this
central point, Security has the ability to monitor and control all
cameras. In addition, Security shares control and monitoring of these
cameras with the Hydro projects, System Operations (Dispatch),
Engineering staff, as well as three local law enforcement agencies and
Regional Dispatch Center. This CCTV system is monitored 24/7.
CCTV/DASH CAM cameras, controls and monitoring have been upgraded and
expanded to increase critical infrastructure protection and to:
• Provide enhanced security and safety at (Utility) facilities and
protection of driver;
• Provide operational viewing of (Utility) projects;
• Provide safety alerts or response to a major event.
• Provide emergency responders with video coverage (where available) of
critical incidents.
Customer Privacy & Data
COST: ₱0

DESCRIPTION:
Customers simply called up your Jnt to order. Their order
was then delivered by a driver employed by the jnt. Maybe
they provided a credit card over the phone. Maybe they
paid in cash at the door. But times have changed. Now
customers order on their cellphones and through delivery
apps like J&t and. Sensitive data, including credit card
numbers, is transmitted and frequently stored, often
across multiple networks and systems.
Hardly a day passes when we don’t read about another data
breach or other hacking incident. And in the delivery
industry, too often we see what we like to call “nephew-
built” especially for smaller delivery agencies. Computer
and internet security can be challenging even for
experienced businesses. If your website gets hacked and
exposes customer data, customers could lose trust in your
brand for a time.
Delivery Driver Issues
COST: ₱300/ Gas fee

DESCRIPTION:
This section could be an entire article by itself. But we will try to
break it down for you. The last mile of your delivery service is in the
hands of the person who drives the package to your customer. And a lot
can happen between our j&t express delivery and the customer’s location.
Automobiles Come with Risks
Transportation incidents are the cause for the vast majority of on the
job fatalities. Since, by definition, delivery drivers spend much of
their time behind the wheel, the risk is especially salient for this job
category.
But it’s not just the driver who may be at risk here. If you have a
delivery driver using their own vehicle and they injure another driver
or damage property, your business may be liable. And the settlement for
that liability can be substantial.
At the very least, it is imperative that you speak with a professional
about your insurance needs. Your insurance requirements will vary based
on the state in which you are doing business as well as the specifics of
that business itself. In this case, an ounce of prevention is worth way
more than the pound of cure.
Biometric authentication for clients to
confirm the order and identity.

COST: ₱5000/piece

DESCRIPTION:
Unique to the user:
A fingerprint consists of unique features such as ridges, valleys and minutiae points
that are unique to an individual. It is almost impossible to replicate a fingerprint and
it never changes with time unless there is an unusual occurrence.
 Loss-proof: Customers often mistype or forget their PINs or feel skeptical to use it,
especially when they are making payments. Fingerprint identification eliminates such
instances as the user is only required to use their fingerprint as their identity.

 High security: Security concerns are one of the most important reasons why biometric
authentication has become the need of the hour. With biometric authentication, you
are able to eliminate payment fraud activities such as card skimming, chip switching
and shoulder surfing, etc.

 Low maintenance: Biometric-enabled payment cards are more cost-effective compared to


the maintenance cost of PINs and passwords. With the increasing demand for biometric
credit and debit payment cards, fingerprint sensor technology providers are already
working on a convenient and cost-effective enrollment solution for their clients.

 Easy enrollment: Initially the idea of using a biometric payment card might seem a
bit far-fetched but the process of enrollment can’t get any simpler. The user is not
required to visit a bank or upload their biometric data to any central database and
they can enroll by simply placing their finger on the card’s sensor.
Manage Data backup Assets.
COST: ₱ 400/GB per month for mid level
data backup
₱800/GB per month for high level data
backup

DESCRIPTION:
cross-functional security teams to take inventory of all organizational data assets,
hardware and software. Examine and log all technological devices, internal and external
applications, and databases. Additionally, go through information assets that include
network shared folders and FTP sites. Once you and your team have gone over the assets,
you must assign custodians who are responsible for the protection of their assigned
assets.
 Data management is important because the data your organization creates is a very
valuable resource. The last thing you want to do is spend time and resources collecting
data and business intelligence, only to lose or misplace that information. In that case,
you would then have to spend time and resources again to get that same business
intelligence you already had.93% of companies that lost their data center for 10 days or
more due to a disaster filed for bankruptcy within one year of the disaster. 50% of
businesses that found themselves without data management for this same time period filed
for bankruptcy immediately. Having a strong data management plan is very important for the
success of your company. Below are a few other benefits of a strong data management plan.
Network traffic control
COST: ₱20,000/ person in the IT TEAM

 DESCRIPTION: Cost Effectiveness


 Hardware based firewalls may be capable of simultaneously managing traffic
for different resources and users, but achieving the same level of control
as a cloud firewall requires much more work from the IT team, greater
hardware expenditures, and more.
 Improved Security
 Network Traffic Control is more than a standalone, basic product. It also
allows for traffic encryption enforcement, 2FA, Single Sign-On, DNS
filtering, authentication and other security tools that together reduce the
organization’s exposed attack surface.
 Easy Remote Work
 NTC can be used in conjunction with cloud gateways, automatically deployed
in any location which enable simplified, secure connections to resources
for local employees and traffic control for all the resources they use
daily.
. COMPETENCE, SELECTION, AND
TRAINING
COST: ₱ 20,000/based on performance

DESCRIPTION:
Management is responsible for selecting personnel and subcontractors based,
in part, on their experience with and training on security issues. Every
employee chosen must demonstrate the highest level of competency.
Managers are responsible for ensuring that each employee’s proficiency level
is documented.
SECURITY - LINE ORGANIZATION RESPONSIBILITY
• It is the Company’s philosophy that every employee is responsible for
security and has the authority to ensure security as appropriate.
• All job descriptions will include specific security performance
responsibilities. How well these responsibilities have been fulfilled will be
a basis for evaluating individual performance.
• Supervisors and managers are given the responsibility and authority to
actively manage and ensure the Security System’s implementation and
effectiveness.
Security and policies of J&t express
COST: ₱0

 DESCRIPTION: As detailed in the J&T EXPRESS, if your app collects personal


data from end users, your app must add here to the below requirements.
Personal data includes personally identifiable information, financial and
payment information, authentication information, contacts, phonebook, SMS
and call related data, microphone and camera sensor data, location data,
and sensitive device or usage data.
 Only collect and use the data required to support and improve the features
and services your app provides the features described on the app's detail
page).
 Display a legally adequate privacy policy within the app and on the app
detail page. The privacy policy, together with any in-app disclosures, must
comprehensively disclose what personal data your app collects, how it is
used, and the types of parties with whom it is shared.
 Obtain applicable consent of users to collect, use, or share such data, and
only use or share the data in a way that end users have consented to.
 Ensure that your collection and use of that data complies with your privacy
policy and all applicable laws, including, if applicable, COPPA (see Child-
targeted App (COPPA) Policy) and privacy and data protection laws.
Security Encryption
COST: ₱25.000/Encrpytion
specialist

 DESCRIPTION: With accessibility and portability being an important part


of our daily work, securing confidential data and transfers has shifted
from a “nice to have” to a must have. Data stored on computers, on cloud
storage or on USB devices can get into the wrong hands and therefore
needs to be protected. An easy to use, cross-platform encryption solution
is the best way to ensure confidential data will not fall into the wrong
hands due to unauthorized access, lost or stolen devices.
 J&t USB Enforced Encryption combined with Endpoint Protector allows IT
Administrators to extend their Device Control policy and make sure all
confidential data transferred to USB storage devices is automatically
encrypted. As a cross-platform solution, j&t usb can be used on both
macOS and Windows computers. Via a secured password, users can safely
transfer confidential data and access it on any computers or only on
authorized ones. Moreover, some additional useful features are available
for IT Administrators like remotely sending messages to the users,
requesting a password change or wiping the confidential data in case the
device is lost or stolen.
 In addition to j&T usb Enforced Encryption for USB devices, Endpoint
Protector allows IT Administrators to take advantage of FileVault and
enforce encryption on enrolled macOS computers
Cost and Schedule Risk Analysis
COST: ₱0

 DESCRIPTION: Project managers are generally concerned with both time and money, but
all too often these things are treated separately. Integrating the two is generally
mandated for government contracts and is especially important when modeling
uncertainty. This is because the time takes and the cost incurred do not vary
independently. Hence the need for integrated
 Cost and Schedule Risk Analysis.
 Full Monte integrates cost and schedule using the resource-loaded schedule you
already have j&t Project.
 Cost and Schedule Risk Analysis
 uses the very same project network, but substitutes a probability distribution for
the single-point estimate of duration for each task.
 The resource assignment levels are assumed to be constant, so that the variable part
of the resource cost varies with the duration while any fixed or per use cost
remains constant. Costs can also vary due to escalation. Being late may cause the
resource cost to be higher due to escalation.
 It is also possible that choices made during the project may affect the cost. For
example, subcontracting an item may be faster but also more expensive, and the
decision on whether to subcontract or not may depend upon the time available. This
can be modeled in Full Monte using a feature known as branching.
 J&T simulates the execution of the project thousands of times, each time taking
different samples from the duration distributions and applying the logic necessary
to determine the path taken through the network and the resulting cost. Unlike some
other systems Full Monte accumulates the cost as well as dates for every task in the
schedule, presenting results in the form of histograms and s-curves.

You might also like