{"id":1280,"date":"2016-07-11T15:03:35","date_gmt":"2016-07-11T12:03:35","guid":{"rendered":"http:\/\/www.myd.gen.tr\/?page_id=1280"},"modified":"2016-07-11T15:03:35","modified_gmt":"2016-07-11T12:03:35","slug":"risk-assessment","status":"publish","type":"page","link":"https:\/\/www.myd.gen.tr\/en\/risk-assessment\/","title":{"rendered":"Risk Assessment"},"content":{"rendered":"<p>Private Security; primarily should be based on preventing the realization of any threat. For this, first the threats which can couse risk must identified and all measures must be taken to eleminate them.<\/p>\n<p>A detailed risk assessment should include several elements such as procedures, employes, demographic structures of company\u2019s business as well as physical conditions. <\/p>\n<p>Besides that, for international companies, compliance with standarts such as TAPA, C-TPAT, ISO 28.001 will affect the content of surveying the risk assessment. <\/p>\n<p>With an effective risk assessment, threats that companies shall pay attention can be identified.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Private Security; primarily should be based on preventing the realization of any threat. For this, first the threats which can couse risk must identified and all<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"rs_blank_template":"","rs_page_bg_color":"","slide_template_v7":"","footnotes":""},"class_list":["post-1280","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Risk Assessment<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.myd.gen.tr\/en\/risk-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk Assessment\" \/>\n<meta property=\"og:description\" content=\"Private Security; primarily should be based on preventing the realization of any threat. For this, first the threats which can couse risk must identified and all [\u2026]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.myd.gen.tr\/en\/risk-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"MYD \u00d6zel G\u00fcvenlik Dan\u0131\u015fmanl\u0131\u011f\u0131\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.myd.gen.tr\\\/en\\\/risk-assessment\\\/\",\"url\":\"https:\\\/\\\/www.myd.gen.tr\\\/en\\\/risk-assessment\\\/\",\"name\":\"Risk Assessment\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.myd.gen.tr\\\/#website\"},\"datePublished\":\"2016-07-11T12:03:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.myd.gen.tr\\\/en\\\/risk-assessment\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.myd.gen.tr\\\/en\\\/risk-assessment\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.myd.gen.tr\\\/en\\\/risk-assessment\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ana sayfa\",\"item\":\"https:\\\/\\\/www.myd.gen.tr\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risk Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.myd.gen.tr\\\/#website\",\"url\":\"https:\\\/\\\/www.myd.gen.tr\\\/\",\"name\":\"MYD \u00d6zel G\u00fcvenlik Dan\u0131\u015fmanl\u0131\u011f\u0131\",\"description\":\"G\u00fcvenli\u011finiz ile ilgili, ihtiya\u00e7 duydu\u011funuz her konuda yan\u0131n\u0131zday\u0131z.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.myd.gen.tr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Risk Assessment","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.myd.gen.tr\/en\/risk-assessment\/","og_locale":"en_US","og_type":"article","og_title":"Risk Assessment","og_description":"Private Security; primarily should be based on preventing the realization of any threat. For this, first the threats which can couse risk must identified and all [\u2026]","og_url":"https:\/\/www.myd.gen.tr\/en\/risk-assessment\/","og_site_name":"MYD \u00d6zel G\u00fcvenlik Dan\u0131\u015fmanl\u0131\u011f\u0131","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.myd.gen.tr\/en\/risk-assessment\/","url":"https:\/\/www.myd.gen.tr\/en\/risk-assessment\/","name":"Risk Assessment","isPartOf":{"@id":"https:\/\/www.myd.gen.tr\/#website"},"datePublished":"2016-07-11T12:03:35+00:00","breadcrumb":{"@id":"https:\/\/www.myd.gen.tr\/en\/risk-assessment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.myd.gen.tr\/en\/risk-assessment\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.myd.gen.tr\/en\/risk-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ana sayfa","item":"https:\/\/www.myd.gen.tr\/en\/"},{"@type":"ListItem","position":2,"name":"Risk Assessment"}]},{"@type":"WebSite","@id":"https:\/\/www.myd.gen.tr\/#website","url":"https:\/\/www.myd.gen.tr\/","name":"MYD \u00d6zel G\u00fcvenlik Dan\u0131\u015fmanl\u0131\u011f\u0131","description":"G\u00fcvenli\u011finiz ile ilgili, ihtiya\u00e7 duydu\u011funuz her konuda yan\u0131n\u0131zday\u0131z.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.myd.gen.tr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.myd.gen.tr\/en\/wp-json\/wp\/v2\/pages\/1280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.myd.gen.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.myd.gen.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.myd.gen.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.myd.gen.tr\/en\/wp-json\/wp\/v2\/comments?post=1280"}],"version-history":[{"count":1,"href":"https:\/\/www.myd.gen.tr\/en\/wp-json\/wp\/v2\/pages\/1280\/revisions"}],"predecessor-version":[{"id":1281,"href":"https:\/\/www.myd.gen.tr\/en\/wp-json\/wp\/v2\/pages\/1280\/revisions\/1281"}],"wp:attachment":[{"href":"https:\/\/www.myd.gen.tr\/en\/wp-json\/wp\/v2\/media?parent=1280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}