Technology Desc

AI Isn’t Your Attorney
Court Rules That AI-Generated Documents & Queries Are NOT Protected by Privilege

Jaimee K. Wellerstein, Esq., Bradley + Wellerstein, CALSAGA Legal Advisor

Across the country, AI is becoming an increasingly popular tool for all kinds of issues.  However, it’s ubiquity does not mean that it’s suitable for all purposes, and new court rulings are making it a much riskier proposition in any legal-adjacent matters.

In US v. Heppner, the United States District Court for the Southern District of New York ruled that documents generated through any public AI platform were not protected by attorney-client privilege or the work product doctrine.  The Court granted access to documents generated with AI by the defendant.

The Defense argued that the AI-generated documents were created before the case and were shared with his attorneys, and that they were generated based on input from his counsel, in an attempt to shield them from production.

The Court ultimately ruled in favor of discovery on several grounds:

  1. The AI Documents were not communications between a client and their counsel, but rather made between the client and a public AI tool. This was compared to “asking a friend for legal advice” in the ruling.
  2. The AI Documents were not confidential because the client shared his prompts with a 3rd party commercial platform which is publicly accessible and whose terms of service explicitly states that it collects data on both prompts and outputs and may disclose it to 3rd
  3. The AI Documents were not created for the purpose of obtaining legal advice from counsel. The AI Terms of Service expressly disclaim the ability of the AI tool to give legal advice.

What This Means for Security Companies

While this case did not arise in the security industry, the impact is directly applicable.  Businesses and employees are relying more and more on AI for the generation of documents and, in some cases, advice.  Anything generated by public AI tools such as ChatGPT, Claude, Gemini, and Grok should be treated as though it is discoverable, even if later discussed with counsel.  That includes requests for dealing with sensitive legal issues, documents generated by them, notes, prompts, and all other data related to use of AI.  Those prompts that ask “How do we document this termination to avoid being sued?” are now potentially subject to discovery.

Lessons Learned for Security Employers

Employers should strongly consider Privacy & Use policies for public AI tools with their employees to ensure that AI is not misused or fed potentially sensitive or confidential information.  This includes review of confidential legal documents.

Employers should expressly discourage the use of public AI tools for anything legal or legal-adjacent to avoid a potential waiver of privilege by providing confidential information to a public tool.

Review the existing privacy policies of any AI tools in use, whether public or private, to determine if the information will remain confidential or can be shared with 3rd parties.  Any tools which share with 3rd parties for any reason should be treated as a risk and not provided any confidential or sensitive information.

Conclusion

Ultimately, employers should remain vigilant about the use of AI in the workplace and emphasize the importance of avoiding a waiver of privilege by feeding sensitive or confidential information into a public tool.  While the development of training and policy language is critical, ongoing diligence about the proper use of AI tools remains the only effective safeguard.

Employers should rely on direct discussion with counsel for any sensitive issues, from contract revision to employee concerns, to ensure any discussion and documentation remains protected by privilege or client confidentiality and should avoid feeding any such queries into public AI tools.

Jaimee K. Wellerstein, Esq. is the co-managing Partner. Representing employers in all aspects of employment law, Ms. Wellerstein collaborates with her clients to develop proactive business and legal strategies to try to avoid workplace conflict and employment disputes. She provides legal advice and counsel to numerous businesses, including conducting individualized training programs for both management and employees.

 

Ms. Wellerstein performs internal audits of her clients’ employment practices to ensure compliance with the rapidly-changing world of employment laws, and guides investigations of employee allegations regarding harassment, discrimination, and employee misconduct. When litigation cannot be avoided, Jaimee K. Wellerstein aggressively defends her clients against employment law claims in the state and federal courts, as well as at administrative hearings, arbitrations, and mediations. Having defended numerous representative and individual lawsuits on behalf of her clients, Ms. Wellerstein is a skilled litigator and negotiator with a broad spectrum of experience upon which to draw.

 

A frequent speaker on numerous topics, including employment law and contract law, Ms. Wellerstein regularly conducts training seminars and programs for managers and employees in all areas of employment practices and policies.

 

 

Beyond Safety: Designing for Efficiency in Modern Security Operations

Johann Hauswald, PlixAI, CALSAGA Network Partner

For years, innovation in private security has focused on one priority: frontline safety. That focus isn’t going away, but it’s no longer enough.

The firms pulling ahead today aren’t just asking, “Are our officers safe?”  They’re asking, “Are we operating efficiently at scale?”  Not as a tradeoff, but as a force multiplier.

The Challenge: Capturing What Matters

Officers generate hours of activity every shift, yet much of what happens on-site remains difficult to document consistently. Recording is often manual, reporting is time-consuming, and critical moments can be missed entirely.

This isn’t unique to private security. Research on body-worn cameras in policing shows that while cameras improve transparency and evidence collection, their impact depends heavily on how consistently they are used and how easily footage can be accessed and reviewed.

In practice, many organizations still face:

  • Incomplete or inconsistent incident documentation
  • Time lost reviewing footage or writing reports
  • Limited visibility for clients into what actually happened

A Simple Shift: Automating the Moment of Capture

One of the most practical ways technology is improving both safety and efficiency is by removing the need for manual recording decisions altogether.

For example, body-worn cameras can automatically begin recording when an officer enters a designated site or geofenced area – and stop when they leave.

But the real value isn’t just automation – it’s integration.

  • Scheduling systems (where officers are assigned)
  • Dispatch tools (call-offs, site changes, coverage gaps)
  • Tour and patrol systems (checkpoints, routes, activity logs)

…recording becomes aligned with operations, not just location.

That changes the equation:

  • Coverage becomes consistent across assigned shifts – not just when a button is pressed
  • Every site interaction is tied back to a specific post, time, and officer
  • Supervisors get a complete, auditable record across systems – not fragmented data

Recording Isn’t the Goal – Connected Insight Is

As research has shown, body-worn cameras generate large volumes of unstructured video, creating a new challenge: how to efficiently extract value from it.

The next wave of innovation is about connecting these layers:

  • Footage tied to incident reports automatically
  • Activity linked to specific sites and shifts
  • Searchable history across video, logs, and reports

This shift – from recording to understanding – is where efficiency gains begin to compound.

Efficiency That Supports Safety

Efficiency in this context isn’t about doing more with fewer people at the expense of quality. It’s about enabling teams to:

  • Respond faster
  • Document more accurately
  • Provide clearer, defensible reporting

Studies suggest that body-worn cameras can contribute to incremental improvements in operational efficiency, but the real impact comes from how organizations integrate them into workflows.

And increasingly, that’s what differentiates firms – not just whether something was handled well, but whether it can be proven clearly and quickly.

Looking Ahead

As the industry evolves, the most impactful technologies will be those that quietly remove friction from day-to-day work.

Because in modern security operations, success isn’t just about whether incidents are handled safely – it’s about whether teams can operate consistently, efficiently, and with full visibility into what’s happening on the ground.

Johann Hauswald is the Founder and CEO of Plix AI, a startup developing AI-enabled body cameras and safety analytics software for private security and field-operations industries. Plix is backed by Sequoia Capital, Andreessen Horowitz (a16z), and the founders of Samsara and Verkada.

Johann earned his Ph.D. in Computer Engineering from the University of Michigan, where he specialized in AI at the edge and computer vision. Before founding Plix, he was a postdoc at Stanford working on large-scale video analytics and edge inference systems and previously co-founded a venture back AI company building conversational AI systems. His work sits at the intersection of AI, safety, and real-time video intelligence, advancing how organizations detect and respond to incidents in the physical world.

 

2026 Security Industry Labor Trends: What Leaders Need to Know

Jill Davie, TEAM Software by WorkWave, CALSAGA Network Partner

For security leaders, the labor landscape is always shifting. But understanding these shifts goes beyond merely keeping up; it is essential for staying profitable and operational in a high-stakes industry. As we look toward the remainder of 2026 and beyond, the data tells a compelling story.

A Cooling National Market — But Not for Security

The broader U.S. labor market has stabilized considerably. Quit rates are holding low, signaling reduced worker confidence and less market mobility. Despite this cooling, a labor shortage persists — as of late 2025, there were still 7.1 million open jobs against 7.8 million unemployed workers.

Looking further ahead, structural headwinds make this shortage unlikely to resolve on its own. An aging workforce, slowing immigration and a labor participation rate projected to drop from 62.4% in 2025 to 61.4% by 2035 suggest that competition for reliable personnel will remain fierce across all sectors.

The security industry, however, is operating in a league of its own. Our hire rate is 2.1 times the national average — 7.6% versus 3.6% nationally. While that reflects strong service demand, it also signals a constant need to replenish staff. Voluntary separations tell an equally challenging story, with the industry quit rate averaging 3.5% over the last 12 months compared to a national average of just 2%. We are bringing people in; keeping them is the harder battle.

The First 60 Days Are Everything

The data on early turnover is stark. By day 30, 18% of newly activated employees are already gone. By day 60, that number climbs to 26.4%. The good news is that employees who make it past the 45-day mark are significantly more likely to stay long-term — making the early employment experience one of the highest-leverage investments a security firm can make. A structured onboarding process that actively engages new hires from day one through at least day 90 is no longer optional. It is the single most effective tool for stopping the leak.

Wage Pressure Is Real — and Outpacing Inflation

To compete for talent, security firms have had to move pay rates consistently upward. Average hourly wages have climbed from $18.45 in December 2023 to $19.30 in December 2024 to $20.08 by the end of 2025 — a 4.0% increase in the last year alone. Notably, full-time and part-time wages have converged at that same $20.08 mark, reflecting a growing premium on scheduling flexibility.

These increases are outpacing inflation, which means margin compression is a real and growing concern. Regional variation adds another layer of complexity — average wages range from $26.16 in New Hampshire to $11.19 in Puerto Rico. Understanding your specific market benchmarks is essential to staying competitive without overspending.

Technology as a Retention Tool

One of the more encouraging findings in the 2026 data involves the impact of financial wellness technology on retention. A case study of 3,000 employees found that offering Earned Wage Access — which allows employees to draw pay as it is earned rather than waiting for payday — drove a 60% adoption rate and resulted in 16% higher retention among users. Benefits and technology that address the day-to-day financial realities of hourly workers are proving to be powerful differentiators in reducing turnover.

The Road Ahead

The security labor market in 2026 is resilient but under pressure. Demand is high, costs are rising and the easy hiring environment of previous years is behind us. Firms that integrate back-office management with field operations, reduce non-billable overtime, automate compliance and invest in the worker experience from day one will be best positioned to build a workforce that sticks.

The trends are clear: the future belongs to those who value their people and use data to prove it.

Jill Davie started her career at TEAM Software as a summer marketing intern in 1996. At the time, TEAM was a start-up with 12 employees

After earning a Bachelor of Science degree in Business Administration and Marketing from Iowa State University, Jill joined TEAM full time in 1998 as a Sales Associate. Over the next 20 years, she assumed various leadership roles in Sales, Marketing, Communications, Customer Success and Professional Services as the company grew significantly. Jill also served on TEAM’s Board of Directors from 2014 through 2021 when it was acquired by WorkWave. During her board tenure, TEAM transformed from founder-owned, to employee-owned to private equity owned. They also acquired five companies across the globe, expanding their domestic and international market leadership.

Currently, Jill serves as the SVP & GM, Cleaning & Security responsible for Customer Success Management, Professional Services and Customer Engagement. She is passionate about operational excellence, engaging directly with customers and attracting and retaining top talent with a people-centric culture.

 

 

The Physical Security Industry in 2026: Three Shifts Every Provider Needs to Know

Carissa Gappa, TEAM Software by WorkWave, CALSAGA Network Partners

The physical security industry in 2026 stands at a critical juncture. Compliance mandates, technological advancement and evolving client expectations are converging in ways that will separate the providers who thrive from those who fall behind. Success will no longer hinge on deploying more guards or installing additional cameras. It will hinge on smarter, integrated operations that deliver measurable value in real time.

Tech-Enabled Guarding Is Now the Baseline

The traditional “guard with a clipboard” model is giving way to “guard with a tech stack.” Large providers are bundling AI cameras, remote monitoring and mobile workflows to meet heightened client demands — and to outpace smaller competitors who lack the capital for such investments.

Clients increasingly expect digital proof of service rather than paper logs. They want GPS-verified guard tours, incident reports with photo evidence and real-time alerts when something goes wrong. When a client asks what happened at a specific site at 2 AM last Tuesday, they expect a complete answer in seconds — guard activity, access control events, camera footage and incident response unified into one cohesive record.

Platforms that connect back-office operations to field activity are making this possible, giving providers the operational efficiency their business demands while delivering the transparency clients now expect as standard.

California Is Setting the Compliance Bar — and Others Will Follow

Starting in 2026, California Privacy Protection Agency rules require risk assessments for automated decision-making tools and opt-outs for biometrics. By 2027, cybersecurity audits kick in for firms exceeding $100 million in revenue.

For security providers operating in California, privacy-by-design is no longer optional. Consent tracking, purpose tags and audit-ready reporting need to be built into your systems now — not retrofitted later. If you are using AI for scheduling optimization or facial recognition for guard verification, you need documented consent, clear purpose statements and the ability to produce audit trails on demand.

More importantly, this is not just a California problem. According to the International Association for Privacy Professionals, comprehensive privacy laws are under consideration in more than 20 states. What California implements today, other states adopt tomorrow. The firms building compliance infrastructure now will have a decisive advantage when that happens.

Clients Want Real-Time Proof, Not Monthly Reports

Benchmark data shows nearly 90% of security professionals want to accelerate incident response, but most still rely on traditional written reports and manual summaries. This creates a critical visibility gap: 28% of security leaders feel “behind the curve” against new threats, and 23% of professionals admit they lack the time to focus on the high-impact incidents clients care about most.

That model is losing contracts. Enterprise clients no longer wait for monthly reports; they want to log into a portal and see live data, documented evidence, and response times instantly. This shift transforms you from a service provider into a technology partner providing continuous visibility.

The firms winning contracts today offer live SLA dashboards and automated incident timelines. If producing a report requires three people and two days, you simply cannot scale.

What’s Driving These Changes

Four forces are pushing the industry toward integrated platforms: AI and automation, stricter regulation, labor shortages and private equity pressure. AI is already handling automatic scheduling, real-time resource allocation and predictive dispatch — reducing the burden on operations teams while improving service consistency. Labor challenges are not going away, with 42% of providers citing turnover as their number one problem. And PE-backed firms are raising the bar on operational KPIs and technology infrastructure, forcing everyone in the market to keep pace.

The gap between tech-enabled providers and everyone else will widen. Technology integration, regulatory compliance and client transparency are no longer competitive advantages. In 2026, they are the baseline requirements for survival.

Carissa Gappa, Senior Product Manager at TEAM Software by WorkWave. Carissa has spent the last two decades championing customer needs, analyzing cross-industry data trends, and bringing together people, process and technology to solve real industry problems.

Why Post Orders Matter More Than You Think

Courtney Sparkman, OfficerApps, CALSAGA Associate Member

Most security problems do not begin with bad intentions. They begin with unclear direction from managers and supervisors.

In the security industry, post orders are often treated as a formality. Something written once, handed to an officer, and rarely revisited unless something goes wrong. Yet, post orders quietly define how a security officer’s authority is exercised, how judgment is applied, and how a security company presents itself to the clients it is supposed to protect.

A story from hospital security shows exactly what happens when post orders exist without a process behind them.

When Following Post Orders Becomes the Problem

A security officer working armed security at a large hospital was assigned to the main entrance. This was a busy trauma center in a rou\gh part of town where real security issues were constant and ongoing. There were mental health patients fighting in the ER. Strange people wandering into restricted areas. Vulnerable patients getting lost. All situations that required a security officer with presence, discretion, and sound judgment.

Then a new instruction came down. The officer was told to post up at the main entrance to keep hospital staff out. Not because of a threat or an operational risk, but because someone in middle management decided employees should use a different door to keep the entrance clear for patients and guests.

Doctors, nurses, facilities staff, and janitorial teams were redirected. Anyone who refused would have their name recorded for reprimand. The instruction made little sense to the officer because it pulled attention away from real risks and replaced it with administrative enforcement that added no security value. But the post orders were clear enough. This was now his post.

When Post Orders Collide With Reality

One day, a man in a suit approached the entrance leading a group of well-dressed executives. All wore employee badges. The man at the front, from his stature, was clearly important.

Following his post orders, the officer stopped the group and redirected them to the West entrance. When the man insisted on using the main entrance, the officer calmly explained the policy and informed him that names would be taken and supervisors notified. So he did exactly that. Every name. Slowly. Carefully.

When the security supervisor reviewed the list, one name stood out immediately. It was the name of the Chief Executive Officer.

The well-dressed man that the security officer stopped was the CEO of the entire health system who was escorting potential investors around the hospital. The CEO had never been informed of the policy change.

As you can guess, the policy was quietly reversed, and staff were once again allowed to use the main entrance.

Common sense eventually won. But only after wasted time, unnecessary friction, and reputational risk.

What This Story Is Really About

This is not a story about a bad officer. He did exactly what he was told. It is not even a story about a bad policy; poor policies exist in every organization. What it is, is a story about post orders created without a process.

Post orders do more than tell officers what to do. They determine whether officers are empowered to apply judgment or forced to enforce instructions that were never tested against reality. When post orders are written without a full understanding of the environment, officers are left choosing between common sense and compliance.

In this case, compliance exposed the weakness in the system.

Why Post Orders Require Discipline, Not Just Documentation

Effective post orders do not begin with the purpose of accomplishing some goal.

Every instruction in the post order should tie back to a clear security or operational objective. If an order cannot be explained in terms of risk reduction, safety, or operational control, it does not belong in the post orders. Administrative convenience and internal politics should never be enforced by front line security…although it happens more than enough.

Post orders also require validation before deployment. Any instruction that affects access, movement, or behavior within a facility must be reviewed with the stakeholders that ultimately owns the space. In the hospital example, the CEO was unaware of a policy that directly affected how his organization operated. That gap alone guaranteed failure.

Officers must also be part of the process. Experienced officers know immediately when an instruction will create distraction, conflict, or confusion. When there is no mechanism for that feedback to move upward, flawed post orders survive longer than they should.

Finally, post orders must be treated as living documents. Even well-intentioned instructions can deteriorate over time. This usually happens when client expectations change, threat profiles evolve, or most commonly when leadership turns over. Rules that once made sense quietly become liabilities when not revisited.

By scheduling regular reviews of your post orders, security organizations can address any necessary questions before embarrassment or incidents happen. Without regular reviews officers may bend a rule to do their job when the rule is the problem.

The Real Value of Getting Post Orders Right

When a disciplined process exists, post orders support and officer’s judgment instead of replacing it. As a result officers are not forced into robotic enforcement which leads to supervisors spending less time managing fallout and ensuring client satisfaction.

Post orders are not just miscellaneous paperwork, they are operational intent made visible. When they are wrong, everyone feels it. Sometimes at the front door, in front of investors, with a CEO holding his badge in the air.

Either way, the lesson is the same, post orders matter.

Courtney W. Sparkman is the founder and CEO of OfficerApps, the umbrella technology platform behind OfficerReports, OfficerHR, and OfficerBilling, a suite of purpose built tools designed exclusively for security guard companies. With more than two decades of hands on experience in security operations, sales, and executive leadership, Courtney brings deep industry knowledge paired with a practical, operator first approach to technology and growth.

Prior to founding OfficerApps, Courtney held senior leadership roles across the security industry. He had most recently served as Director of Business Development for Diamond Detective Services, where he led national growth initiatives, pursued public and private sector opportunities, and consistently won competitive bids through strategic prospecting, client presentations, and proposal driven sales.

Earlier in his career, Courtney served as Vice President of Operations and Sales at Cequr Security, a security guard company he co-founded with his father. During his seven-year tenure, he was directly responsible for client acquisition and retention, developing training standards, and implementing quality assurance initiatives. The operational challenges and lessons from that experience directly inspired the creation of the OfficerApps platform.

In addition to leading OfficerApps, Courtney is the publisher of Security Guard Services Magazine. The only magazine dedicated to the security guard services industry where he covers industry leadership, technology, and the future of manned guarding. He is also a speaker and author, frequently sharing insights on how security companies can modernize operations, scale profitably, and remain competitive in a rapidly evolving marketplace.

Courtney previously held a private security contractor license in the state of Illinois, earned through a rigorous background check and licensing examination. He holds a Bachelor of Science in Agricultural Economics from the University of Illinois at Urbana Champaign and is currently a candidate for a Master of Science in Emergency Management from the University of Chicago.

Improve Shift Management Operations with a Unified Approach

Gurmit Dhaliwal, Celayix, CALSAGA Associate Member

Security operations are becoming more complex, but the systems used to manage them haven’t kept pace.

Hiring, shift scheduling, time tracking, payroll, and billing are often handled in disconnected tools. Even so-called “all-in-one” platforms struggle to meet the needs of sophisticated security organizations, where requirements evolve constantly, and operational precision is non-negotiable.

Legacy software and broken workflows lead to miscommunication, staffing gaps, compliance risk, and lost revenue. As complexity increases, these failures become harder and more expensive to manage.

When Communication Breaks Down, Operations Suffer

For security operations to run smoothly, accurate data and timely communication must flow across every system.

New guards must be onboarded correctly and made available for shifts without delay. Scheduling must account for qualifications, availability, and location requirements to ensure the right guard is deployed at the right time. Shifts must be communicated clearly and accepted quickly, with transparency that reinforces fairness and trust.

When communication fails, the impact is immediate: no-shows, frustrated employees, higher turnover, and missed revenue. Inaccurate or delayed time and attendance data creates downstream payroll and billing issues, leading to reconciliation headaches, payment disputes, and compliance risks.

Small data failures quickly become operational chaos.

Why All-in-One Software Falls Short

Every function within a security operation has unique requirements.

HR teams need flexible hiring workflows. Schedulers need real-time visibility and intelligent tools to deploy the best available guard across multiple job sites. Finance teams require precise, compliant data flow between time tracking, payroll, and billing.

All-in-one systems promise simplicity but sacrifice depth. They are built for the average use case, not the operational realities of complex, growing security organizations. As a result, businesses outgrow them quickly—or never fully realize their potential.

Sophisticated operations require flexibility, specialization, and control.

The Power—and Challenge—of Best-of-Breed Solutions

Best-of-breed platforms excel by focusing deeply on a single domain. They deliver advanced functionality, industry expertise, and continuous innovation that generic systems can’t match.

The challenge has always been integration. Connecting specialized systems traditionally required custom development, ongoing maintenance, and internal technical resources that many organizations don’t have.

As a result, many security firms settle for suboptimal systems—not because they want to, but because integration felt too complex.

The Evolution to a Unified, Integrated Approach

That trade-off no longer exists.

Modern APIs and native, pre-built integrations now enable specialized platforms to work together as a cohesive system. Instead of stitching tools together manually, forward-thinking vendors are partnering to deliver seamless, production-ready integrations out of the box.

This unified approach allows each system to operate at its full strength while data flows automatically across the organization, from hiring to scheduling to payroll and billing.

The result:

  • Fewer errors and less manual work
  • Faster, more reliable staffing decisions
  • Better employee communication and engagement
  • Improved billable utilization and lower administrative costs
  • Built-in compliance that adapts as requirements change

Better data flow enables smarter automation and clearer analytics, providing visibility into true shift costs and operational efficiency. Organizations gain the agility to adapt quickly, whether responding to client demands, workforce changes, or growth opportunities.

A Unified Workforce Without Compromise

Native, intelligent integrations create a unified workforce management ecosystem without sacrificing flexibility or control. Security organizations can mix and match best-of-breed tools while operating as a single, cohesive system.

The outcome is clear: fewer bottlenecks, less chaos, and a foundation built for scale.

As one Project Manager at Cerberus Security Group put it:

“The proof is in the pudding. Celayix and isolved have solved a lot of things overnight. The training was really amazing. It’s sophisticated software, but not complicated at all from a user standpoint.”

For security organizations ready to move beyond fragmented systems and outdated workflows, a unified approach delivers what all-in-one solutions never could: clarity, control, and confidence at scale.

For a real-world example, see the recent announcement on Celayix and isolved partnering to deliver unified workforce management for the security industry.

Gurmit Dhaliwal is the CEO of Celayix, which delivers shift management for workforce operations and helps ensure every shift is covered. His 25 years of experience in employee scheduling and time-and-attendance software help improve shift management for the security guard industry. He understands the complex requirements of the industry, such as compliance with California State Laws and integrating best-of-breed tools to simplify workflows and accelerate operations.

Guard Tour Best Practices for Crowded Venues (Stadiums, Malls, Events)

Jordan Wallach, Belfry, CALSAGA Network Partner

Managing security in a crowded venue, whether it’s a stadium on game day, a mall during holiday promotions, or a large public event, requires precision, structure, and constant situational awareness. As a supervisor or operations manager, you already know how quickly a routine patrol can turn into a high-pressure incident when tens of thousands of people are moving through your facility.

Crowded venues present unique challenges: blind spots created by dense foot traffic, delayed reporting caused by noise or congestion, missed patrols during peak hours, and slower incident response time when guards can’t move freely. These pressures make it difficult for any team to maintain consistent coverage without a well-designed system.

This is where security patrol best practices become essential. By combining structured patrol planning with modern tools like GPS guard tracking, NFC checkpoints, and intelligent reporting, you can dramatically improve coverage, accountability, and response times, especially during high-traffic seasons like November and December.

Why Guard Tour Structure Matters

A well-structured guard tour isn’t just about walking predictable routes; it’s about ensuring every zone receives the right level of attention at the right time.

What is a Guard Tour System?

A guard tour system is a framework that uses pre-defined routes, checkpoints, and tracking tools (such as QR/NFC tags or GPS) to ensure officers complete their assigned patrols. It enhances situational awareness, supports incident documentation, and helps supervisors verify that coverage requirements are being met.

For large venues, the right guard tour best practices reduce:

  • Security blind spots
  • Missed incidents
  • Delayed responses
  • Unauthorized access
  • Incomplete patrols

When your guards follow structured and trackable patrol cycles, your entire operation becomes more proactive rather than reactive.

Designing Patrol Routes for Maximum Coverage

Crowded venues require intelligent planning to keep patrols efficient and unpredictable. You, your team, and your contracted guards must collaborate to design patrol routes that security teams can follow consistently.

1. Use A/B/C Route Rotations

Rotating through three defined routes prevents predictable patrol patterns that bad actors can exploit.

  • Route A: Main concourses, entrances, service corridors
  • Route B: Upper levels, escalators, stairwells, back-of-house areas
  • Route C: Parking structures, exterior walkways, drop-off points

Each shift should rotate routes so guards don’t follow the same pattern daily.

2. Alternate Entry & Exit Points

This reduces the risk of blind spots and helps officers detect repeat suspicious behaviors.

3. Sample Patrol Route Diagram (Conceptual)

Use a full diagram in your operations manual so guards can visualize each route clearly.

4. Consider Timing & Foot Traffic

During the holidays or peak events, routes should be adjusted to reflect:

  • Expected crowd surges
  • Event schedules
  • Vendor/contractor movements
  • VIP pathways

This ensures your security patrol best practices remain aligned with real-world conditions.

Using GPS and QR/NFC Checkpoints to Improve Accountability

Modern patrol management relies heavily on technology. Tools like GPS guard tracking and NFC or QR checkpoints ensure guards complete tours on time and at the correct locations.

How Checkpoint Systems Work

  • You place QR/NFC tags at critical zones
  • Guards scan checkpoints using the mobile app.
  • GPS adds an extra layer of verification.
  • Supervisors get real-time activity logs.

Timing Matrix for Patrol Efficiency

Route Expected Duration Tolerance Flag Condition
A 22–26 minutes ± 4 mins > 30 mins or < 18 mins
B 28–33 minutes ± 5 mins > 38 mins or < 23 mins
C 18–22 minutes ± 3 mins > 25 mins or < 15 mins

This matrix helps supervisors assess patrol quality and detect:

  • Rushed or incomplete routes
  • Extended stops
  • Deviations that may require follow-up

How GPS Improves Response Times

Real-time alerts notify supervisors when:

  • A guard goes off-route
  • A checkpoint is missed
  • A panic alert is activated
  • Foot traffic blocks a standard route

Faster visibility = faster incident response time.

KPIs Every Security Supervisor Should Track

To improve guard performance and venue safety, track KPIs that reflect actual patrol effectiveness:

1. Patrol Completion Rate (%)

Measures how many scheduled patrols were completed vs. assigned.

2. Missed Checkpoint Ratio

Scheduling and callout procedures must adhere to regional labor laws governing rest periods, on-call pay, maximum work hours, and mandatory overtime policies. For U.S. companies, refer to the U.S. Department of Labor (DOL) guidelines and your state’s labor board for compliance requirements. This content is for informational purposes only and not legal advice.

3. Average Incident Response Time

Evaluates how quickly guards react to alarms or alerts (a critical metric during crowded events).

4. Guard Punctuality

Late shift starts cause delayed patrol cycles and increased risk.

These KPIs become even more valuable when integrated into security operations management software or security workforce management software that automatically logs and visualizes performance.

Technology Tools That Streamline Patrol Management

This is where advanced solutions like security guard software make a dramatic difference.

Guard Patrol Management Software helps you:

  • Track guard locations in real time with GPS guard tracking
  • Automate checkpoint scans using NFC or QR tags
  • Receive alerts for missed checkpoints or deviations
  • Analyze patrol activity with automated dashboards
  • Maintain shift visibility across crowded venues
  • Integrate patrol data with incident reporting and scheduling

When combined with the right scheduling tools, supervisors can create:

  • Holiday-ready patrol plans
  • Backup shift assignments
  • Callout playbooks for no-shows
  • Rapid-response staffing workflows

Quick Checklist: Guard Tour Optimization

Use this checklist before your next large event or holiday rush:

  • Alternate A/B/C routes each shift
  • Verify checkpoints daily via GPS/NFC
  • Track completion rates weekly
  • Update escalation SOPs before peak events
  • Use automated reporting tools for visibility
  • Provide guards with active communication channels
  • Maintain backup officer lists for callouts
  • Review incident trends before designing new routes

Legal Disclaimer:

Guard tour planning and scheduling must comply with local labor laws covering overtime, rest periods, and maximum allowable shift lengths. Refer to the U.S. Department of Labor and your regional labor board for formal guidelines. This article is informational only and does not constitute legal advice.

Optimize Your Patrol Strategy

Crowded venues demand structured patrols, real-time visibility, and technology that keeps guards accountable. With the right guard patrol management software and the right playbook, you can increase coverage, strengthen response times, and protect every corner of your venue.

Jordan Wallach is the Co-Founder and CEO of Belfry, a software platform built for security guard services companies to manage scheduling, payroll, compliance, and field operations with greater visibility and less operational friction.

Jordan founded Belfry after spending hundreds of hours speaking directly with security company owners, operations managers, and officers across the country. Those conversations shaped Belfry’s focus on reducing back-office burden and supporting the realities of running a distributed, people-intensive operation.

Prior to Belfry, Jordan worked in product and software roles at Microsoft and as an Engagement Manager at McKinsey & Company, advising technology companies on product strategy and growth. He holds a B.S. in Mathematical and Computational Science from Stanford University and is based in New York City.

Inside the Frontline: An Industry Snapshot

Johann Hauswald, PlixAI, CALSAGA Network Partner

The Gap Between Perceived Risk and Operational Reality

Most industry strategies for frontline safety are built on a worst-case foundation: training for rare assaults, staffing for static shifts, and documenting only major incidents. While well?intentioned, this approach leaves organizations prepared for the exception rather than the rule.

An analysis of more than 10,000 incidents across three major U.S. metropolitan areas, captured through AI?powered body?worn cameras, reveals a different operational reality. Risk is not occasional or isolated – it is continuous, routine, and largely invisible to leadership relying on traditional reporting methods.

This snapshot moves beyond anecdote to provide a data?driven view of frontline operations, uncovering a critical visibility gap between what leadership believes is happening and what frontline teams actually experience each day.

Key Findings

  • The 90% Blind Spot: Organizations that rely on manual incident reporting are effectively blind to over 90% of frontline risk signals. While traditional reports capture roughly 8% of activity, automated AI detection shows that operational friction is ongoing, not episodic.
  • The 80/20 Workload Reality: Frontline teams are not primarily responding to high?severity crime. 83% of daily activity involves routine compliance issues such as trespassing, access disputes, and refusal to comply, while only 17% of incidents escalate into high?severity events.
  • Escalation is Conversational: Violence is rarely spontaneous. Nearly 70% of escalations begin with verbal resistance or authority challenges, creating a measurable pre?escalation window that often goes unaddressed.

THE VISIBILITY GAP: THE 90% BLIND SPOT

Incident detection follows two primary paths: manual reporting and automated, always?on detection. The data shows that manual reporting captures only a small fraction of real?world interactions.

Key Insight

Organizations relying solely on manual reports operate with a 92% visibility gap. Frontline risk is continuous, but legacy reporting tools capture only isolated moments, leaving leadership unaware of the true volume of operational friction.

Operational Takeaway

You cannot manage risk you do not see. Closing the visibility gap requires moving from after?the?fact reporting to continuous workforce intelligence.

THE 80/20 REALITY: FREQUENCY VS SEVERITY

Incident Breakdown

The data reveals that routine compliance issues such as trespassing, loitering, and access disputes account for the majority of frontline activity, while high?severity incidents remain statistically rare.

Operational Takeaway

Operational efficiency is gained by optimizing for the 80% of interactions that occur daily, not just the extremes. Systems and training must support flexibility, communication, and de?escalation as core competencies.

THE ANATOMY OF ESCALATION: LANGUAGE AS AN EARLY WARNING SYSTEM

Behavioral Triggers Across 10,000 incidents

Analysis across thousands of incidents shows that physical aggression is rarely the starting point:

Linguistic Signals

Instead, non?violent verbal cues – resistance, challenges to authority, and refusal to comply – trigger more than 60% of automated alerts.

Key Insight

Escalation is primarily a conversational breakdown, not a spontaneous physical event. Since nearly 70% of escalations stem from non-compliance and verbal disputes, there is almost always a “pre-escalation window” – a clear period of verbal resistance that occurs well before any physical risk materializes.

Operational Takeaway

Treat language as the earliest indicator of risk. Since verbal resistance reliably precedes physical violence, safety strategies should focus on early intervention. Training staff to recognize and de?escalate specific verbal patterns can prevent many of the incidents that later become severe.

OPTIMIZING COVERAGE: ALLOCATING RESOURCES TO PEAK RISK

Daily & Weekly Patterns

Incident volume does not follow a simple day?versus?night pattern. Instead, activity forms a double?peak curve, clustering around late morning (~11:00 AM) and late evening (~11:00 PM). Volume steadily builds throughout the week, peaking on Fridays, when incidents start earlier and persist later than on other weekdays.

Key Insight

Operational risk aligns with social and business cycles, not just darkness. The late-morning spike suggests friction related to business operations and access, while the Friday surge reflects social movement. Crucially, Friday risk is longer, not just higher meaning standard 8-hour shift blocks often leave the “shoulders” of this high-risk window exposed.

Operational Takeaway

Staff for the curve, not the clock. Static shifts often overserve low?risk early?morning hours while underserving critical peak periods. Effective workforce management requires dynamic scheduling that specifically targets the 11:00 AM / 11:00 PM intensity clusters and extends coverage windows for the weekend ramp-up.

CONCLUSION: FROM ACTIVITY TO INSIGHT

The Reality

A full-distribution view of frontline activity reveals a reality that traditional “top incident” summaries miss. The data proves that risk is continuous, not episodic. Escalation is predictable and conversational, not spontaneous. And crucially, the operational load is driven by volume, not rarity.

The Strategic Shift

Organizations can no longer afford to operate based on the small percentage of incidents that get manually reported. Effective risk management requires visibility across the entire interaction lifecycle – from the first verbal refusal to the final report.

Final Takeaway

Moving from reactive reporting to proactive workforce intelligence enables three immediate advantages:

  1. Smarter Staffing: Align coverage with real 11:00 AM / 11:00 PM risk curves.
  2. Effective Training: Focus on the language and behaviors that precede 70% of escalations.
  3. Defensible ROI: Base staffing, technology, and budget decisions on real operational behavior, not worst-case hypotheticals.

For private security organizations, visibility is no longer a nice to have. It is the foundation of safer teams, stronger operations, and sustainable growth.

Johann Hauswald is the Founder and CEO of Plix AI, a startup developing AI-enabled body cameras and safety analytics software for private security and field-operations industries. Plix is backed by Sequoia Capital, Andreessen Horowitz (a16z), and the founders of Samsara and Verkada.

Johann earned his Ph.D. in Computer Engineering from the University of Michigan, where he specialized in AI at the edge and computer vision. Before founding Plix, he was a postdoc at Stanford working on large-scale video analytics and edge inference systems and previously co-founded a venture back AI company building conversational AI systems. His work sits at the intersection of AI, safety, and real-time video intelligence, advancing how organizations detect and respond to incidents in the physical world.

The True Cost of Inaccurate Timekeeping (and How to Fix It)

Stephanie Petersen, TEAM Software by WorkWave, CALSAGA Network Partner

If you manage a security guarding company, you know the reality of a distributed workforce: your business happens everywhere but your office. Your teams are out in the field, often working independently at multiple high-stakes job sites. While that flexibility is inherent in the industry, it creates a massive data blind spot if you aren’t careful.

When you can’t see your employees, how do you know — really know — that your timekeeping is accurate?

For many in the security industry, “close enough” has been the standard for too long. But in a world of razor-thin margins and strict compliance regulations, “close enough” is a leak your business can’t afford. Accurate timekeeping is the foundation of your profitability, your compliance strategy and your employee retention.

1. Protecting Your Profit Margins

Labor is almost certainly your largest expense. When timekeeping records are loose, you are likely overpaying for labor without realizing it. Even minor discrepancies — a few minutes here, a rounded-up hour there — compound quickly across hundreds of guards and job sites.

Beyond simple overpayment, accuracy is critical for job costing. You need to know precisely how many hours are spent on specific sites to understand if a contract is actually profitable. Accurate timekeeping ensures you are billing clients for every minute of service delivered, preventing the “missed minutes” that silently eat away at revenue.

2. The Shield of Compliance

Labor laws are unforgiving. You need auditable, precise documentation of hours worked, breaks taken and overtime accrued. If you are relying on manual timesheets, you are leaving yourself open to audits, fines, and legal disputes.

For security contractors, timekeeping serves as a digital audit trail. It provides proof of presence, verifying a guard was at a specific post at a specific time, which significantly reduces your liability if a security incident occurs.

3. Proof of Service Is Your Promise

Your customers want to know they are getting the protection they paid for. Was the lobby guard at their post at 8:00 AM?

Accurate timekeeping acts as proof of service. When you can provide verified data that correlates time punches with GPS or location markers, you give your customers confidence. This visibility protects your reputation and helps you retain contracts in a competitive market.

4. Building Trust with Your Team

Reliable timekeeping ensures fair compensation for every hour worked, which is critical for retention in an industry with high turnover. Furthermore, accurate data helps you avoid burnout. By analyzing true hours worked, you can adjust schedules to prevent employees from overextending themselves.

The Solution: WinTeam Mobile

Capturing data in the field is difficult. Connectivity issues and the risk of “buddy punching” have historically made accuracy a challenge. That is why we are rolling out significant updates to WinTeam Mobile to close the gaps between your field operations and your back office.

  • Offline Punch Capabilities: Capture punch data and GPS locations even without cellular connectivity. The app automatically synchronizes and validates the data once service returns.
  • Kiosk Mode: For sites with large teams, the new multi-user kiosk mode allows rapid clock-ins for multiple workers using a single device. This eliminates the need for expensive, specialized hardware.
  • Biometric Validation: Coming soon, WinTeam Mobile will include optional facial verification. This feature virtually eliminates time theft and buddy punching by confirming the right employee is at the right place at the right time.

Accurate timekeeping is the difference between guessing at your success and engineering it. With TEAM Software by WorkWave, you have the tools to turn time tracking into a competitive advantage.

Ready to see how WinTeam can tighten your operations? Visit TEAM Software online at teamsoftware.com to request a demo today.

Stephanie is a passionate product manager with over a decade of experience shipping complex software. She specializes in owning ERP products for security and janitorial operations, turning chaotic workflows into functional systems designed to perform in the field and deliver measurable impact.

Why Your AI Is Only as Good as Your Data Factory: The Hidden Requirement for Security Operations

David Libesman, TEAM Software by WorkWave, CALSAGA Network Partner

AI is the current buzzword in the security industry. From automated scheduling and predictive guard patrolling to agentic workflows that can flag incidents on their own, the promises are significant. Vendors suggest smarter dispatching, reduced overhead and better client experiences with minimal effort.

However, there is a reality the industry often ignores: AI without a Data Factory is just an expensive experiment.

If your data is fragmented or inconsistent across systems, no AI model will ever deliver the results you expect. In the security industry — where operations change minute-to-minute at different posts — that gap is dangerous. The faster your business moves, the more damage bad or delayed data can do.

The Reality: Why Security AI Fails

Many security companies rush to adopt AI but overlook the foundational layer required to fuel it: a Data Factory that continuously cleans, unifies, and prepares datasets for real-time decision-making.

Common issues security pros encounter include:

  • Data Silos: Guard notes are in one system, billing in another and scheduling in a third. AI cannot reconcile these conflicting sources.
  • Manual Latency: Relying on manual uploads or human-initiated exports leads to multi-day delays that break real-time automation.
  • Dirty Data: Inconsistent job types or incorrect site IDs from the field cause predictive models to degrade quickly.

Trying to run AI on poor data is like trying to navigate an autonomous vehicle down a road of potholes and missing road signs. The technology is advanced, but the environment makes it worthless.

What a Data Factory Actually Does

A true Data Factory is not just a database or a dashboard. It is a live operational layer that:

  1. Automates Ingestion: It pulls every data point across your operations, including payroll, scheduling, and field notes.
  2. Normalizes Records: It ensures that an “incident” or “checkpoint” means the same thing across different regions and supervisors.
  3. Eliminates Human Dependency: It removes the need for manual spreadsheet merging or data extracts.
  4. Streams in Real Time: It ensures data is current so AI agents can act immediately.

Why Security Needs Real-Time Data

Security is a data-volatile industry. Your guards are constantly updating statuses and capturing photos through mobile tools. AI agents built on stale data make the wrong calls: dispatching the wrong guard, missing SLA thresholds or re-routing personnel based on yesterday’s information.

The silent killer of automation is decision latency. If a guard marks a post as “in progress” but the update doesn’t hit the system for 12 hours, the opportunity for AI to optimize your operation has already passed. A Data Factory collapses that gap, ensuring that when reality changes in the field, your systems respond immediately.

Agentic Workflows Demand Clean Data

Modern agentic AI workflows — like automated scheduling or client outreach — rely on immediate signal changes. For example:

  • A guard is running late to a high-priority post.
  • A client cancels a temporary coverage request.
  • Weather or traffic impacts route efficiency for mobile patrols.

If your systems only sync overnight, your AI is operating blind. Without a Data Factory to process input 24/7, you have no real-time intelligence and, consequently, no meaningful automation.

From Missed Opportunity to Competitive Advantage

Once your data is standardized and refreshed automatically, AI becomes a profit center. Predictive patrolling becomes accurate, guard utilization increases, and client churn drops because you are providing proactive communication based on real-time truth.

The transformation isn’t the AI itself but the data readiness behind it. Before you invest in the next “smart” tool, ensure you have the foundation to support it.

Ready to see how a unified data foundation can transform your security business? Visit TEAM Software online to learn more about our business intelligence solution, WavelyticsTM.

David Libesman is a visionary SaaS executive with an entrepreneurial spirit and track record of developing, monetizing and growing data analytics & AI product strategy and business. David is well-versed in driving strong sales through enterprise channels, as well as building, developing and retaining high-performing teams. He aims to bring best of breed AI and analytic capabilities to boost growth and profits for TEAM Software customers through data-driven strategies.