Security Procedures

Effective Date: June 4, 2025
To protect the privacy, safety, and well-being of our clients, staff, and business operations, Marcia’s Looks Salon maintains strict security protocols across physical, digital, and procedural domains.


πŸ” Data & Information Security

  • Personal Information Protection
    All client and staff data must be stored in encrypted databases. Access is restricted to authorized personnel only.

  • Confidentiality Agreements
    All employees are required to sign confidentiality agreements to protect sensitive client, financial, and business information.

  • Two-Factor Authentication (2FA)
    2FA is mandatory for accessing booking systems, client profiles, payment platforms, and internal tools.

  • Password Policy
    Strong, unique passwords must be used across all systems. Passwords must be updated every 90 days.

  • Secure Communication
    Sensitive client information must only be shared via encrypted text or secure messaging platforms.

  • Data Backups
    All critical client and business data is automatically backed up daily to secure cloud-based servers.

  • Cybersecurity Training
    All staff are required to complete annual cybersecurity training, covering topics like phishing, device safety, and data protection.


πŸ’³ Payment & Transaction Security

  • Payment System Compliance
    All payment platforms must be PCI-DSS compliant. No payment data should ever be stored locally.

  • Cash Handling
    Cash must be stored in a locked safe. Deposits must be completed at the end of each shift, with designated staff responsible for reconciliation.

  • Client ID Verification
    Clients may be asked to present valid ID for high-value services or when redeeming pre-paid appointments.


πŸ§‘β€πŸ’» Workplace & Equipment Security

  • Workstation Locking
    All computers and digital workstations must be locked when unattended.

  • Electronic Devices
    Personal electronic devices should be stored in lockers during shifts. Devices should not be used on the salon floor.

  • Restricted Areas
    Clients are not permitted in staff-only areas such as the breakroom, office, and stockroom unless escorted by staff.

  • Inventory Control
    A tracking system is in place for all product usage. Any discrepancies must be reported immediately.


🧯 Physical Safety & Emergency Protocols

  • Surveillance System
    CCTV cameras monitor all entrances, exits, and key areas within the salon for ongoing security.

  • Alarm System
    A centrally monitored alarm system is activated outside of business hours.

  • Fire Safety
    Fire extinguishers and alarms are inspected monthly. Fire evacuation routes must remain visible and unobstructed. Fire drills are conducted quarterly.

  • Emergency Exits
    All exits must remain unlocked and clearly marked. Staff must ensure no objects obstruct access at any time.

  • First Aid Readiness
    First aid kits must be fully stocked and readily available. At least one staff member per shift must be trained in basic first aid.


🧾 Visitor & Vendor Procedures

  • Visitor Sign-In
    All non-staff (e.g., vendors, maintenance) must sign in at the front desk and be escorted by a staff member at all times.

  • Vendor Identification
    Vendors must present ID before entering. No vendor is allowed in restricted areas without staff supervision.

  • Locker Policy
    Staff are provided personal lockers for storing belongings. Lockers must remain secured during working hours.


πŸ” Access & Key Control

  • Key Access
    Only authorized staff are allowed access to keys for secure areas such as the salon office and product storage.

  • Nightly Closing Procedures
    Closing staff must complete a checklist that includes:

    • Locking all doors

    • Arming the alarm system

    • Storing cash securely

    • Shutting down all workstations


πŸ›‘ Incident Response & Reporting

  • Incident Logging
    Any security breaches, theft, harassment, or suspicious behavior must be reported to management immediately and logged in the incident report system.

  • Response Protocol
    Management will investigate each incident promptly, ensuring corrective actions are taken and additional safeguards are implemented if necessary.

×