Chubb promotes the SOAP principle

1 October 2015 Security Services & Risk Management, News & Events

Chubb Fire & Security South Africa has released a list of useful tips to ensure that the SOAP approach to safety and security (Stop. Observe. Assess. Proceed) achieves maximum effectiveness. Chubb Fire and Security South Africa is a part of UTC Building & Industrial Systems.

The SOAP principle encourages residents to be aware of any unusual behaviour or possible threats near their property:

• Stop to take note of your surroundings.

• Observe any unusual behaviour or incidents.

• Assess the level of threat posed by your observation.

• Proceed with the necessary action (i.e. call security or drive to police station).

James Havenga, group operations director, Chubb Fire and Safety said that residents commonly make the mistake of becoming too comfortable and not taking necessary safety precautions into account when entering and exiting their properties.

“Being aware of your surroundings is critical, and extra security measures such as automatic gate installation and route alterations go a long way in preventing crime,” said Havenga. “If you suspect that you are being followed, drive to the nearest police station or busy public area, such as a petrol station or shopping mall.”

In the event of a security threat, Havenga says that industry experts often say the most appropriate action may be to co-operate with perpetrators and not challenge them. “While this may be seen as counter-intuitive, industry experts note that the perpetrator is also nervous and will not hesitate to prevent being arrested or hurt at any cost.”

It is also essential to consider a reputable security company as back-up to deal with a possible security breach in the home. When choosing a security company, residents should verify that they are registered with the South African Intruder Detection Services Association (SAIDSA).

“SAIDSA is the association for all security systems and CCTV service providers, and those incorporating signal monitoring and armed reaction services,” said Havenga. “Any member of the public can visit the SAIDSA website (www.saidsa.co.za) and make an e-mail enquiry regarding the registration status of a security provider. Companies that are SAIDSA registered comply with its minimum standards, covering all aspects of delivering monitoring and response services, and those not compliant can be reported.”

According to Havenga, another essential part of home security is testing alarm systems at least once a month. “When testing the security system yourself, remember to call your service provider before testing the alarm signal to ensure that the control centre does not send out a response officer for a false alarm.”

In the event of a fault with the alarm system, Havenga suggests addressing the issue as a matter of urgency. “Chubb provides a house-call service whereby qualified technicians are on call to service faulty systems in the most efficient and effective manner,” he concludes.

For more information contact Chubb +27 (0)11 878 6029, www.chubb.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The age of Lean 4.0: Orchestrating intelligence and efficiency
Security Services & Risk Management
The convergence of Lean principles and AI (what we now call Lean 4.0) is no longer a theoretical exercise; it is the defining operational paradigm for survival and growth in a complex, data-intensive economy.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.