Atlas LLC

Code 3
Security and Protection Services

Code 3 Security  Services employs the following types of officers:

  • Unarmed Security Officers
  • Armed Security Officers
  • Special Police Officers
  • Concierge services

Uniform Selection

Our security guards are provided high quality uniforms appropriate to the security site to which they have been assigned. Our attractive uniforms assist in setting the tone for the function of the security guard and establish their presence in a professional manner. To project an image of discipline, security guard uniforms are required to be properly tailored, and cleaned. Our uniforms are not only attractive and practical, but also designed for comfort in all climates.

The purpose of uniform selection is to ensure a professional appearance for all of our clients and their customer’s. Our clients may influence the appearance and image of our security guards by selecting the uniform style worn on their site. Code 3 Security has a variety of uniforms for clients to choose from when establishing the service format. These high quality uniforms are issued to our security guards at no cost. Photographic images and descriptions of our standard uniform selections are provided below.

Paramilitary Uniforms

The Paramilitary Uniform demonstrates a traditional law enforcement image. Components of this uniform include black trousers, a black long sleeve tactical dress shirt with box pleat front pockets, and a metal breast badge.

Paramilitary Uniform Paramilitary Uniform Paramilitary Uniform

Non-Paramilitary Uniforms

The Non-Paramilitary Uniform was designed to portray a less intimidating image. Components of this uniform include a navy blue or black suit blazer, gray slacks, and a white or light blue shirt with badge tabs.

Non-Paramilitary Uniform Non-Paramilitary Uniform

Class-A Uniforms

The Class-A Uniform portrays a more formal law enforcement image. Components of this uniform include black trousers, a navy blue or black round pershing cap with black plastic hat strap; and a white, long sleeve, 7-button placket front dress shirt with badge tabs.

Class-A Uniforms

S.W.A.T. Force Uniforms

The S.W.A.T. Force Uniform is designed to portray a more intimidating image. Components of this uniform include: black digital combat pants, a black long sleeve tactical dress shirt with box pleat front pockets and an enclosed badge tab, and black battle duty tactical boots.

SWAT Force

Technology

Since Code 3 Security’s inception, the company has positioned itself as an industry leader through the use of cutting edge technology. Effective use of technological methods has played a paramount role in the company’s unprecedented growth management.

Encrypted Email System

With more than 650 employees serving six U.S. states and the District of Columbia, our staff needs to maintain consistent communication channels with our clients and field offices. While electronic forms of communication are convenient and efficient, there are some dangers associated with the use of these systems. As a result, Code 3 Security has explored all information protection options and implemented state-of-the-art safety measures.

Through this comprehensive internal assessment, our clients are able to have absolute confidence in the fact that all electronic transmissions processed with-in the organization are safeguarded with the most effective encryption technology available. Our end-to-end email security delivers all the encryption functionality necessary for protecting an organization’s email communications through the use of 256-bit key encryption.

Business Management Applications Platform

Code 3 Security uses the most recent version of the security industry’s leading business management software. Earlier forms of this software platform date back to 1984. Our Business Management Applications Platform is a completely modular format that integrates every aspect of managing security service operations. Several key modules that the software facilitates are as follows: Scheduling, Dispatch, Qualification Management, Automated Employee Check-In, Billing, and Management Reports.

Security Guard Scheduling
The Security Guard Scheduling module is the foundation for quickly creating, or editing shift assignments. This module allows for a single one-time shift, multi-day shift, or on-going recurring shift assignment. In addition to the program’s scheduling flexibility, the software is designed to alert management of scheduling conflicts due to other assignments, requested time off, or Do Not Send requests.

Management teams are able to predict future scheduling conflicts and plan accordingly with the use of the Visual Scheduler. The Visual Scheduler is a graphically integrated calendar which displays each shift assignment and its requirements. All shift assignments and their respective requirements are indicated by color coded cells on the display. Any unassigned shifts or scheduling conflicts are outlined on the display for all levels of management to view prior to the schedule date.

Security Guard Dispatch
The Security Guard Dispatch system allows for position coding which can be defined for each client.  Position coding ensures that client requests for security guards with specific skills, training, or experience are assigned as required by the given attributes.  This flexibility provides the client the ability to fully customize what criteria they wish to employee on their respective site.

The Security Guard Dispatch system enables our management team the ability to find an employee with specific training and skills to be assigned in the event of a scheduling conflict.  Position requirements and availability are considered before presenting a list of qualified and available persons to be assigned.  In addition, this component of the applications platform assists our company recruiters in identifying the need for additional employees with specific skill sets and qualifications.

Security Guard Qualifications Management
The Security Guard Qualifications Management module includes the ability to store licensing, training, and certification information with-in each employee master file. Each employee file is programmed to track licensing expiration and renewal dates, training progress, and acquired certifications.  Using this data retention and tracking feature, our Quality Assurance department can generate reports of employees whose credentials are approaching expiration, or not with-in company compliance.  Other common uses of the Security Guard Qualifications Management module are: Vacation & Sick Leave Tracking, Medical Benefit Election, and individual Proficiency Inspections.

Automated Employee Check-In
The Automated Employee Check-In module is a Telephone-Based Interactive Voice Response (IVR) Service. This service provides for accurate and authentic automated employee check-in procedures Security guards are required to clock-in via phone from a client-determined phone line upon their arrival.  In the event that employee check-in times are missed, supervisors are immediately notified.

Client Billing
Our Client Billing module generates detailed, easy to read client invoices. Client invoices are automatically calculated and printed from previously worked shift schedules. In an effort to accommodate our client’s needs, these invoices are available in a number of styles. Invoice styles include: detailed or summary, date range, site location, territory, department, and group code.

Management Reports
The Management Reports module is an invaluable tool used for maintaining client accounts. Client specific information is accumulated from the previously mentioned modules, and used to determine operational adjustments necessary for each customer account.

In addition, this module will produce Employee and Customer Work History reports. Customer Work History reports are detailed listings of all security guards who have worked at a particular client site, and at what pay rate. Employee Work History reports are detailed listings of all assignments worked by a security guard. This report specifies the client, hours worked, and the at what pay rate.

Security Guard Patrol Monitoring System

Upon request, Code 3 Security can provide clients with a Security Guard Patrol Monitoring System. Our Security Guard Patrol Monitoring System prevents security guards from performing unauthorized activities and ensures that they are performing their inspection patrol tours, resulting in a more secure and well-guarded site. This advanced monitoring system is an invaluable tool for maintaining operational efficiency. The confidence in knowing that our security guards are being tracked while patrolling as directed, is just another way Code 3 Security attempts to provide total quality to our clients. The Security Guard Patrol Monitoring System is commonly used at, commercial facilities, residential complexes and mixed-used property locations; to ensure that security guards perform their inspection patrol tours of designated checkpoints in the proper sequence and at designated times. This monitoring system consists of three main components which include: Data Collection Touch Wands, Computer Transfer Stations, and Media Tag Touch Checkpoints.

Data Collection Touch Wand
Every Data Collection Wand contains a microprocessor which is connected to the “read head” and “write head” of the wand. When security guards touch the “read head” of the wand to the Media Tag Touch Checkpoint; the date, time and unique serial number of the Media Tag is recorded in the memory of the wand. The data collected in this process can be used to generate various reports. These reports can display guard activities, missed checkpoints and location specific incidents.

Computer Transfer Station
The Computer Transfer Station downloads data collected by the Touch Wand to the computer which runs the monitoring system software. When field supervisors load the Touch Wand into the Computer Transfer System, the collected data is automatically downloaded. The advanced, Windows-based software package, manages this information in a database format which allows for report generation. With-in the database clients are designated one or more security zones. Multiple Media Tag Touch Checkpoints can be assigned to each designated security zone.

Media Tag Touch Checkpoints
While conducting patrols, security guards touch the Data Collection Wand to checkpoint tags placed in various security zones. This process records the date and time of the guard’s patrol. When necessary, security guards can also scan the incident tag to record incidents associated with the checkpoint. Officers are also able to scan a guard tag to identify the name of the individual performing the patrol.

Client Customized Solutions

Code 3 Security possesses the knowledge and resources to provide customized solutions to our clients through the use of cutting edge technology. Although all of our clients have unique needs, many of them require automated schedule tracking and electronic report generation capabilities. Code 3 Security can provide these functions to our clients as stand-alone applications, or through an integrated solutions platform depending on the situation being measured. Upon request, we provide highly trained operators to maintain client-provided systems such as video surveillance cameras and facility detection alarms. Code 3 Security’s commitment to smart growth has allowed for the highest level of functionality, which is supported by the most advanced technology available.

Florida Operations
Markus Caldwell, VP
Phone: 727-543-5696
Email 1: mcaldwell@code3securityservices.com
Email 2: markuscaldwell@aol.com
5470 E Busch Blvd., Unit 171,
Tampa, Florida 33617