Advice for transporters regarding safety at work

Some of the safety advice for truckers in the development of their work, goes through the following issues:

Techniques to maintain the alert level. The cab of the truck should be kept at a cool temperature. The background music with a fast rhythm will also keep our attention on our feet, and open the windows regularly so that the air and other noises will be actions that will serve to clear the mind.

Driving times. Another issue to consider in the face of the safety of truck drivers and drivers in the development of their work is related to driving times and rest. Thus, as marked by the Ministry of Development, after driving for a maximum of 4 hours and a half, the driver must make a break of at least 45 minutes. On the other hand, you cannot exceed 9 hours of daily driving.

Emergency kit. It is advisable to take a kit with non-perishable food, water to maintain good hydration, tools, a flashlight and warm clothes for what may happen.

Prevention. In the work of a transporter the attention on the road must always be the first thing, and staying alert about possible accidents will also be paramount. It must be borne in mind that if it is necessary to reduce the speed when finding an accident, the vehicle does not take the same time to react if it is a tourist than a truck. In addition, it may also be advisable to use the engine brake, especially on long slopes, since the wear of the brake pads will be avoided.

Security. Another security problem that a transporter can encounter is presented at the time of his night breaks. The best thing will be to park in a guarded area and put all five senses and caution when talking about the merchandise that is transported.

Differences between maximum security prisons and other prisons

Maximum security prisons house the most violent and dangerous inmates in the penitentiary system. The maximum security prisons were developed after a wave of prison violence in the seventies and eighties as a way to isolate and manage inmates classified as “the worst of the worst”. Although all of the prisons in a prison, serve as punishment for prisoners and are designed to maintain control and security, maximum security prisons are known to be much more restrictive than prisons with less security.

Types of prisons

Generally, there are four types of prisons. The minimum security prisons house approximately one fifth of the country’s inmates, who are generally locked up for non-violent crimes such as forgery or tax evasion. Medium security prisons maintain almost half of the country’s inmates and those who have committed crimes such as theft. The maximum security prisons house the most dangerous criminals who are serving longer sentences, generally for crimes of murder, kidnapping and sexual violence. Maximum security prisons house those who have a reputation for violence or escape in less secure prisons and require the maximum security available.

Life conditions

All inmates have little or no privacy and are constantly monitored by the guards. In maximum security prisons, prisoners remain in their cells for 23 hours a day and are allowed to go out only for showers and exercise, which are usually done in a small enclosed area. The prisoners eat their meals in their cells, while the less secure prisoners can dine with other inmates in the prison cafeteria. The lower security prisons allow inmates to attend school and therapy groups and work programs, and to spend time in the prison yard. In maximum security prisons, inmates are chained at any time they are outside their cells.

Contact with others

Unlike other prisons, maximum security prisons minimize any contact between inmates and isolate them for security and control purposes. These prisons also limit the amount of direct contact that prisoners have with the guards, making use of the automated cell doors, using windows in the cells and speakers to communicate with them. The maximum security prison cells do not have windows, thus limiting the view of the outside world or any contact with it. Inmates are never allowed any kind of visits or contacts with family and friends.

Number of facilities and inmates

Although many prisons have secure housing units, or “prisons inside the prison,” there are only 31 maximum security facilities in the entire country that only house maximum security inmates. The only federal maximum security prison is the ADX, located in Colorado. A 2009 US Department of Justice report concluded that there are more than 1.6 million inmates housed in state and federal prisons in this country. Of that number, the number of prisoners in maximum security facilities during an average given year is approximately 25,000.

How can I find my child’s social security number if I lose my card

A Social Security number is an identification number assigned to US citizens, permanent residents and temporary workers. The number is used to track individual income for tax purposes and has also become a form of identity confirmation when applying for a driver’s license or when registering at school. The Social Security Administration can replace lost or stolen Social Security cards within a matter of weeks after the application is processed.


  1. Social Security cards can be replaced a maximum of three times in a calendar year and no more than 10 times during your life.
  2. Print and complete Form SS-5, the application for a Social Security card (see Resources). Do not forget to fill in the form using your child’s information.
  3. Gather the documents that prove your child’s identity and citizenship status. Acceptable proofs of identity include an adoption decree, medical record, school record, religious record (such as baptism) or school identification card. Acceptable proof of citizenship includes a United States birth and passport certificate, Certificate of Naturalization or Certificate of Citizenship.
  4. Gather the documents that prove your own identity, such as a driver’s license from the United States, a state identification card or a US passport. All forms of identification must be up to date. If you cannot provide any of these, school ID cards, employee ID cards, US Military ID cards and Medicare health insurance cards are also acceptable.
  5. Visit your local Social Security Administration office to submit the completed application and proof of identity and citizenship (see Resources for the SSA office locator). You can also send the application and other documents to your local Social Security office; Once the application is processed, proof of identity and citizenship will be returned to you.

How to search for people using the social security number

It is easy to lose touch with people, be they friends, family or loved ones, because of a variety of circumstances. People move, get married or change their contact information. Although finding someone you have lost contact with may take some time, it can usually be done. A Social Security number is a good fact when you are looking for a family member or spouse, and this can make a difference.


Visit the website of the Department of Vital Statistics of the State through the Department of State Health Services or through the Center for Disease Control and the locator of the Office of Prevention of Vital Records. You can find birth, death and marriage certificates, if you have the right. Eligibility varies from state to state, but most states allow information to be given to a spouse, child, grandchild, older brother or legal representative. Some states may allow you to request information in person or in writing. Birth certificates that are more than 100 years old are available to the public.

Contact the Office of Social Security Administration (SSA) Redirecting Letters in writing to let them know you are trying to get in touch with a particular person. Provide all the information you have about the person you are looking for, including your full name, and the known military addresses or your educational record. All letters to be forwarded to missing persons must be enclosed in a blank envelope, unsealed, unsealed so that the SSA can read the material that is being forwarded without opening the document. In some cases, there is a fee of US $ 25 for the letter service from SSA.


Safety tips in this vacation

Holy Week arrives and, with it, the departures to tourist places and views to relatives, it is time to relax, get away from the routine and enjoy the well-deserved summer vacation. However, it is important to take safety into account.

Do not forget that natural spaces are unknown environments for most holiday maker, so it is advisable to take extreme precautions both at sea and in the mountains.

Tips to take into account when leaving

During the trip to the holiday destination it is advisable to take a series of precautions that guarantee safety. In case you travel in your private vehicle, during the journey it is not advisable to stop and get out of the car in situations that seem strange or at the request of a stranger.

If your vehicle has a mechanical failure call your nearest relative, do not ask for help from strangers, do not walk through unknown places.

When you arrive at your destination remember not to leave valuables inside the vehicle, and, in general, avoid leaving things in sight, however insignificant they may seem. If traveling by public transport it is necessary to pay attention to your luggage, identify your belongings, do not lose sight of it during intermediate stops and avoid being transported by people who are not accredited for it.

In airports or terminals

You must not register your luggage belonging to unknown persons. Do not carry large sums of money, documents or things of value that are not necessary.

Once at your destination, make sure that the security conditions are adequate to avoid access to strangers, adopt the security measures you usually take at home.

In case your stay is in a hotel use the safe deposit box service to preserve valuables and make sure doors and windows are closed.

On the beach, it is important to bathe only in areas that are within authorized zones. Follow the recommendations of the lifeguards.

Always watch children in natural areas such as the sea, wooded areas, swimming pools, shopping centers or processions. To avoid scares, it is best to make them memorize your name, address and phone number.

Security tips in the private cloud of your company

Having a private cloud for the company instead of accessing the public cloud is a great advantage in terms of security for all companies that opt ​​for that option. However, if you want to make the most of the advantages of security, privacy and protection there are a series of guidelines and tips that we should take into account:

Set passwords

It is obvious but not least important. Having effective passwords, long, difficult to guess and with a combination of uppercase and lowercase letters, numbers and signs is the first line of defense for all sensitive information that a company has in its private cloud.

Renew passwords

A good password is a good starting point to defend the privacy of a private cloud. But as important or more than the counter, is changing it every so often to increase the security of access.

Encrypt the data

If passwords are the first defense barrier, encryption would be the second. Encrypting a file consists of messing up the information so that only the person to whom it is intended can read it. Thus, a third party who had access to this file could not understand anything or get any useful information.

Have a security system at height

When it comes to protecting the public cloud, it is necessary to have a security system up to scratch, such as antivirus and firewalls. As happens with passwords, it is not enough to have a good antivirus, but it is also necessary to update it periodically so that it is up to date in order to deactivate the latest threats.

Train employees in safety

The human factor is always one of the most vulnerable. Workers must be trained in basic security issues to avoid leaks of documents, reports and data to other companies or that fall into the hands of an undesirable. It is advisable to hold training seminars for the staff working in the company.

Always have a backup

It is essential when you manage a private cloud, to have a backup of all the data you have. So, if at any time there was a failure or a computer attack, there would be a plan B to be able to have the entire operating system in just a few hours and not lose any sensitive information.

Test security

The security of a company’s private cloud cannot be taken for granted. It is convenient to perform a series of periodic tests to check if it is possible to hack the system or access the information. In these cases, “ethical hackers” can be an option to help us know how our system would react in case of a real attack.

Separate personal mail from private

One of the main entry doors of criminals is still email. Make sure your company’s employees do not use corporate mail for personal purposes and you will see how the virus entry is reduced and the security of the private cloud increases.

Teenagers and the security of text messages

Text messaging is the method of communication with friends preferred by most adolescents, surpassing email, instant messaging, and telephone and even in person contact, according to a 2009 survey conducted by the Pew Research Center. One in three teenagers sends more than 100 text messages per day, equivalent to more than 3,000 texts per month. Although text messages may seem like an innocuous form of communication, there is the possibility of danger if it is not handled responsibly.

Texting and driving

According to the Insurance Institute for Highway Safety, texting while driving is illegal in 39 states, but do not count on the law to prevent your teen from texting while driving. If you take your eyes off the road, even for a few seconds, it can lead to a collision, serious injury or even death. Consequences may include imprisonment, loss of driver’s license and possible suspension from school. More than 1.3 million accidents each year are caused by drivers who talk on cell phones or send text messages, according to the National Safety Council. Car accidents are also the leading cause of teen deaths, reports Minnesota Public Radio.

Sexting or sex by text message

“Sexting” refers to text messages that include explicit sexual pictures or messages, such as sexual acts and nude photos. Adolescents should be aware of the possible emotional and legal consequences of sexting. Even a private text with sexual content can be forwarded to a contact list of hundreds of people, leading to embarrassment and humiliation. Once the photograph or message is made public, there is no way to undo the damage. Sending sexually explicit photographs of a minor is also a crime, which can lead to a permanent police search, school suspension or criminal prosecution. Tell your child that he should never send text messages with sexually explicit content. If you receive this type of text, you should not respond.

Sleep interruptions

Most teens need about 8 1/2 to 9 or more hours of sleep each night to function at optimal levels the next day, according to Your child may be missing out on the necessary sleep time by staying up late to send and receive text messages. If the texts are emotional or cause stress (such as romantic ones) I could exchange intense texts until morning. Lack of sleep can affect your academic performance and limit your ability to excel in extracurricular activities, such as team sports. Set limits on your child’s text messages, such as banning text messages after 9:00 p.m. To help avoid temptation, remove your child’s cell phone from their room at night.

Text messages when walking

Texting while walking prevents teenagers (and adults) from seeing where they are going and being completely aware of their surroundings. The American College of Emergency Physicians reports an increase in injuries to pedestrians, while texting, including falls, colliding with skaters and cyclists, and even crossing directly in traffic, sometimes with deadly results. Texting while walking becomes even more dangerous at night when the vision is already compromised. Establish a clear rule for your teenager: You should never send text messages while participating in physical activities that require your full attention, such as walking, boating, biking, skating, or playing contact sports.

Stay safe

Before letting your child get a cell phone, let them know that having one is a privilege, not a right. It establishes clear rules and limits regarding text messages, particularly never placing oneself or others in danger. You should periodically check your text messages, and let them know in advance that you are going to do that. If you discover that you are not following the rules or your text messages become so excessive that they interfere with your school work, take away your cell phone and only allow you to send text messages when it can be monitored.

Ten tips to ensure security in social networks

We live in a time when we use social networks on a daily basis. Be it Twitter, Facebook, Instagram or any other. Like it or not, directly or indirectly we are connected to the rest of the world. However, we do not always take into account the security measures necessary to maintain our privacy.

Disclosure of personal information

People tend to flood with information while completing profiles on social networks. We must bear in mind that we are not facing a job interview or that only our friends are going to read it. We do not need to report everything and everyone. Experts believe that revealing too much personal information creates a security crack. Attackers use personal information such as date of birth, name of family members, phone numbers, physical address, etc.

All this to execute multiple iterations to decipher the passwords. Therefore, the less information we put, the better.

Maintain private, private information

We often post notes or messages on a friend’s wall. This is also visible to other Facebook users or the social network that is. There is no formula to decide what is safe to publish in public and what is not, but you have to use common sense. Some things must be kept between friends or family. Publish certain information on public walls puts at risk not only ourselves but the privacy of our friend.

The images (and their legends) speak more than a thousand words

It is said that a photo is worth a thousand words. In the case of social networks even more. Also, if we upload images with an informative legend, it puts us even more at risk. We are giving information about our habits, our movements, to possible attackers in the networks. It is an important aspect to maintain security in social networks.

Selectable privacy

We must ensure that our content on social networks is visible only to friends and family. We can create lists of types of friends and customize the visibility of each publication. Not everything should be visible to that person who worked with us for a few weeks a few years ago, for example. There may be things that we do not want to share with all the contacts.

Beware of GPS and location

GPS is a common feature in all smartphones today. In addition to helping us as we pass through an unknown city, GPS is also used for geotagging . It means that we can attach location information to any multimedia content that we send or receive. Twitter, Facebook and Instagram use this feature extensively to help users mark the location where a photo was taken, and help make the profile more “social”.

Cyber ​​attackers can easily interpret information such as our economic status, lifestyle, frequent locations and daily routine through media with geographic labels.

A strong key, the first defense

One of the most elementary ways to strengthen our social media account is to create a password. This, as is logical, has to be difficult to decipher. Security experts often recommend the use of a combination of uppercase and lowercase letters, numbers and symbols. Professional hackers use ‘a dictionary attack’ as the first step in decoding a password.

A dictionary attack involves matching the password with millions of common passwords (such as “123456”) stored in a library.

Do not save passwords

This is a very common practice. I recognize that on my phone I have some applications like this. We just open it and that’s it, without having to put the key every time we use it. However this is not a good method. If someone physically accesses our phone or computer, it could easily enter our accounts.

Let’s think that we have lost the mobile. We can have some access code, but everything can be broken. The most advisable thing is not to save passwords.

Beware of the links

In social networks we must be careful with the links that reach us. Even if they come from a friend. You have to pay attention to the link. In what it contains. Many times it can be a trap, as we already saw from the famous Facebook video. Our contact does it unconsciously, of course. But it is really a malware. We should not sting in what seems like an easy thing.

Security system

Something that cannot be missing is to have security tools and programs. But this does not extend only to security on social networks, but to any action we take on the Internet. We always have to have some antivirus installed. This way we will be able to face possible threats that put at risk the good functioning of our equipment.

Common sense

Perhaps the most important of these 10 tips to maintain security in social networks. The vast majority of malware needs user interaction to run. We must always be alert and use common sense.

The best security locks for sliding patio doors

Sliding patio doors offer the benefits of large windows with the functionality of a front door. Unfortunately, they are also the main target for thieves. Most sliding patio doors feature a single locking mechanism that is weak and easily opened with a tool, cut with a hacksaw or unlocked by pushing the panel. The doors can also be lifted from their lanes from the outside. But there are additional security measures that owners can follow to secure their patio doors.

Security bars

The safety bars will reinforce the lock of the sliding doors so that the doors can not be opened horizontally. These bars are a popular choice because they are effective and cheap, all you need is a wood or steel cylinder of the correct length. The safety bars, sometimes also called “charlie bars”, are placed in the lower channel of the door, between the end of the sliding glass doors and the sliding door. There is also another option for people concerned that thieves can find a way to detach the safety bar by methods such as drilling a small hole in the frame and pushing the bar out of the channel.

Auxiliary locks

There are several types of interior locks designed to reinforce the locks of the sliding doors. Most use a safety pin or bolt and are installed on the inside edge of the door rail. Many operate by pulling a pin or turning a lever. It is important, however, when considering auxiliary locks, to keep in mind that you should be able to leave the house quickly in case of an emergency, such as a fire. On the contrary, if your house has a swimming pool, consider a lock that is safe for children so that if they are alone they will not be able to open the door from the inside and access the pool. The locks that lock the door to its frame will prevent the door from opening horizontally or being lifted from its guides.

The tasks of a security supervisor

A safety supervisor is responsible for maintaining and protecting public and employee health and safety in various industries. Safety supervisors could work in the food industry by making sure they are handled and served correctly, or in a laboratory monitoring the safe handling of chemicals. They could also work together with employees or be uniquely responsible for safety monitoring efforts.

Identification of risk

The safety supervisor is responsible for identifying potential risks within the work environment and public space. Safety supervisors often monitor current work conditions and may investigate employee work locations to indicate potential hazards in the manner of work, the equipment used or the products and services manufactured. Employees must be provided with a safe environment in which to work, one that is free from direct contact with hazardous materials or dangerous equipment, and public safety risks must be identified to protect consumers and members of the public who use or they go through the sites and the work locations.

Implementation of security

When a possible risk factor has been identified in a work environment, function or work process, the safety supervisor is in charge of implementing the necessary changes to rectify them. Working independently or in collaboration with government agencies designed to protect the health and safety of employees, such as OSHA, the supervisor is expected to design and implement reasonable accommodations to improve employee safety. Adjustments could include safety training and the purchase of safe equipment, such as gloves to handle hazardous materials, helmets in construction zones, and security doors or fences for areas that present the risk of someone falling.


In some companies, the safety supervisor works only to identify and implement safe working conditions and procedures. This could be a traditional employee who conducts a generic job function while maintaining the responsibility of observing personal safety and that of his colleagues within that work role. Other supervisors work only within the safety role, and they could move around the company to observe the different work functions, and study and understand how it operates and what safety precautions should be implemented. Other supervisors could work as part of a team within a security organization. The security supervisor would be responsible for observing the training and work of other administrators within the security team.

« Older Entries