THE COMPLETE GUIDE TO CPP
The FOIA, known as;
"the public's right to know," has made it possible for the public to gain access to government records.
The "ten deadly demotivators" formulated by Dr. Mortimer Feinberg in his book Effective Psychology for Managers are as follows:
. Never belittle a subordinate. • Never criticize a subordinate in front of others. • Never fail to give your subordinate your full attention. • Never give your subordinate the impression that you are mainly concerned with your own interests. • Never play favorites. • Never fail to help your subordinates grow, when they are deserving. • Never be insensitive to small things. • Never "show up" employees. • Never lower your personal standards. • Never vacillate in making a decision.
Argis listed seven changes that should occur in the employee's person- ality if he or she is to develop into a mature person and be an asset to the organization:
1. From passive to active 2. From restrictive behavior patterns to diversified behavior 3. From dependence to independence 4. From erratic shallow interests to deeper and stronger interests 5. From short-term perspective to long-term perspective 6. From subordinate position to an equal or superior position 7. From lack of self-awareness to awareness and control over self
Herzberg defines two different categories of needs, independent of each other. The two categories are as follows:
1. Hygiene factors: • Salary • Fringe benefits • Security • Rules and regulations • Supervision 2. Motivators: • Challenging assignments • Increased responsibilities • Recognition for work • Individual growth
Training basically falls into three general areas. They are as follows:
1. Job- and site-specific training. This covers company rules and regulations, specific job functions as they relate to that site, train- ing on camera and alarm systems, post orders, patrol functions, etc. 2. Legal or educational training. This covers such topics as use of force, criminal law, criminal procedure, search and seizure, report writing, interview techniques, radio procedures, etc. 3. Weaponry training. This all-inclusive term would cover the use of items such as handcuffs, batons, chemical agents, and firearms.
The following are some examples of what can be found at a library:
1. Periodical and newspaper indexes. 2. Who's Who in America and Who's Who in the World. 3. The American Medical Directory. 4. The Martindale-Hubbell International Law Directories. 5. Criss-cross or reverse directories. 6. Baird's Manual of American Colleges and Fraternities. 7. Lloyd's Register of Shipping. etc.
The choice to arm your security personnel is a decision that requires a great deal of thought and consultation with corporate management and the company legal team. This process should include answering the following questions:
1. Why do you want to arm the security personnel? Deadly force is not used to protect property, only lives. 2. What is your corporate philosophy relative to the arming of the security force? 3. What are the liability issues that arise from arming company personnel? 4. Will your insurance cover or allow the arming of personnel? 5. What are the current local and state firearms laws? 6. Does the company have both a firearms policy and a use-of-force policy in place? 7. Is arming personnel a financially viable option?
Code of ethics of an Investigator;
Confidentiality and Privacy, Truth, Keeping Informed, Business conduct and Conflicts of Interest.
Theory X was developed by
Douglas McGregor.
Credit reporting bureaus provide financial histories on an individual, but these reports are restricted by the;
Fair Credit Reporting Act (FCRA) and require a written release from the person, or the investigator must have a legitimate purpose to obtain such information.
The modern security manager or director wears many hats.
He or she must be educated in the planning, layout, and use of alarm systems, CCTV, and access control systems; background investigations, criminal, and civil investigations; the use of undercover operatives; guard force management; criminal and civil law; privacy laws; union rights; the use and implementation of drug-screening programs; interaction with management and the criminal justice system; interroga- tion techniques; and much, much more
An investigation is characterized by five attributes if it is to be dependable;
It must be objective, thorough,relevant, accurate, and current.
Some examples of obtaining local records and documents are as follows:
Public Library Churches Telephone Directories Local Newspapers and Magazines City and County Business License and Permit Offices County Clerk's Office Local Law Enforcement Local Fire Department Courthouse or Clerk of Courts City Recorder or Register of Deeds County Property or Tax Assessor Tax Collector Street Department Building and Surveyor Department Health Department Coroner's Office City Attorney County Auditor Voter Registration Human Resource Department State Agencies Federal Agencies
Informants can be described in the following categories:
Regular sources • Witnesses • Eyewitnesses •Victims • Suspects • Accomplices • Cultivated sources • Ordinary citizens • Street people • Paid or confidential informants • Those who reveal information not readily available to the general public and have connections to criminal activities. • Organized crime • Gang members • Prostitutes • Drug dealers • Specialists and professionals
When formulating a budget, there will be three distinct areas to be considered.
The first is your fixed operational costs. (payroll, taxes, and payments on vehicle leases). The second is costs that are necessary but are not fixed. (i.e., fuel costs and the use of outside security and investigative costs). The third area is a capital budget for major capital budget purchases. (vehicles, expensive equipment, and uniforms).
1. There are six basic principles of organization:
a. A logical division of work b. Clear lines of authority as set forth in the organizational chart c. Limited span of control d. Unity of command e. Proper delegation of responsibility and authority f. Coordination of efforts through training and communication
1. The two key points to remember about an organizational chart are as follows:
a. The horizontal plane indicates the division of areas of responsibility. b. The vertical plane defines the levels of authority.
The FOIA and the Privacy Act of 1974 protect personal rights by implementing safeguards;
against invasion of privacy by limiting access to records and documents maintained by public and private agencies. Records kept by the agencies are only collected and maintained for legitimate and lawful purposes.
Local Fire Department is responsible for records on;
all fires reported within the city plus records on fire safety inspections and burning permits.
Interstate Commerce Commission; This commission regulates;
all interstate shipments of goods, licensing of truck lines, and railroads.
One more basic principle of effective management is that you;
always praise in public and reprimand in private.
Span of control: the number of personnel over which:
any indi- vidual can exercise direct supervision effectively.
For an organizational structure to be most effective, it should:
be flexible.
Informants: Information gathered from people is still the;
best primary resource for gathering data, which can lead to further investigative leads or questions.
Street Department; This department maintains maps of the;
city and streets, which can assist the investigator in locating someone by looking at the city blueprints.
Herzberg's theory is also known as the "work moti- vation theory" in that genuine motivation:
comes from work itself and not from so-called hygiene factors.
City Attorney; The city attorney usually maintains files of
complaints made against businesses suspected of fraud.
Investigators refrain from accepting an assignment or employment if the assignment would;
create a personal or professional conflict of interest with previous or current investigations.
Courthouse or Clerk of Courts The court maintains;
criminal, civil, and domestic files that are accessible to the public or restricted to those who need to know,such as investigators doing background investigations. Records detail felony and misdemeanor charges pertaining to criminal activities, and civil records etc.
One of the biggest mistakes managers make is to fail to properly;
delegate both responsibility and authority.
The single most common management weakness is the failure to properly:
delegate responsibility and the authority to carry it out.
Delegation of authority: this is a must. The degree to which a secu rity manager or director is able to:
delegate responsibility is a mea sure of his or her leadership ability.
From an organizational standpoint, security cuts across
depart- mental lines and relates to the activity of the company.
Objective: being objective requires that the investigator be willing to accept any;
fact, regardless of its significance to preconceived ideas. This is achieved by recognizing the investigator's own personal prejudices and compensating for or neutralizing their effects on the work.
An investigation is a planned and organized determination of;
facts con- cerning specific events, occurrences, or conditions for a particular purpose.
Many organizations will contract out the guard force to companies that specialize in supplying such services. The motivating factors behind this decision are mainly;
financial. Contracting for guards is less expensive when you take into account salaries, benefits, taxes, insurance, recruitment and training costs, overtime, holidays, uniforming costs, and the costs of preparing and auditing payrolls.
Accurate: A sound investigative technique dictates;
frequent tests for accuracy.
The security manager or director exercises:
full line authority over his or her own department.
Staff functions:
functions that are advisory or service oriented to the line executive.
Most investigators primarily utilize public resources obtained from;
government agencies, such as federal, state, and local offices, and from business organizations.
Custodial Theory; This theory's aim is to make the employee;
happy and contented through the wealth of the company, which provides economic benefits to the employee.
When the security manager or director exercises authority dele- gated by the senior executive to whom he or she reports,:
he or she is exercising functional authority
Parts of a credit report not regulated by the FCRA are called the;
header and are used for social security traces or national identifiers.
1. A security director from an effective organizational standpoint should report to the:
highest-ranking corporate officer possible.
Chris Argis developed the.
immaturity-maturity theory.
The Bureau of Immigration and Naturalization (INS) maintains records on
immigrants who have applied for citizenship or who have attained citizenship, including names, countries of origin, ages, dates of arrival, and much more.
Inadequate training is one of the reasons most commonly cited in security liability lawsuits. The other reasons are;
improper screening, hiring of personnel, and inadequate supervision.
Herzberg believed that hygiene factors do not produce growth:
in the individual or increase work output but that they do prevent losses in performance.
Herzberg felt that motivators had positive effects on employees, resulting in:
increased job satisfaction and increased total output capacity.
Relevant: Being relevant means that the;
information developed pertains to the subject of the investigation.
The tools of an investigator, also know as the three "I's" are;
information, interrogation, and instrumenta- tion.
Current: "Currentness" or timeliness requires that the investigation be carried to the;
latest possible point at which information relevant to the purpose of the investigation might be found.
Supportive Theory; The prime element of this theory is;
leadership; managers think in terms of "we" rather than "they." Little supervision is required, as employees will take on added responsibility with the knowledge that support is available from the supervisory level of management.
Thorough: A thorough investigation not only checks all:
leads but also checks key leads more than once to ensure consistency in results.
Secretary of State; The secretary provides corporate records that
list officer and director infor- mation, year of establishment, type of corporation, registering agent, and stock value.
County Property or Tax Assessor This agency has records that contain;
maps of real properties, including information on dimensions, addresses, owners, location, taxable value, and improvements.
Relevance is an important issue when it comes to the management of the investigation because facts that are not:
material to the case may cost valuable resources to collect, thus limiting other areas or sources that could be checked.
Other benefits for contracting security to the company include;
more flexibility in the usage of manpower. The company does not have to absorb the cost of recruit- ing, interviewing, and investigating applicant backgrounds, or training and uniforming replacement officers or temporary officers for emergency situations.
The Federal Bureau of Investigation (FBI) maintains fingerprint records, information on America's;
most wanted, and criminal records and docu- ments on file. It investigates all crimes against the federal government as well as assisting local and state law enforcement.
An investigator has high ethical values that guide behavior. An investigator must;
observe and adhere to the principles of honesty, goodwill, accuracy, discretion, and integrity.
Information is the knowledge that the investigator;
obtains from other persons
The autocratic theory dates back to the Industrial Revolution of the 1750s. The manager's position under this theory is one
of formal and official authority. Under this theory, management has complete control over the employee.
The security professional must have a working knowledge;
of the laws pertinent to conducting internal investigations, suspects' rights, modern methodology used in these investigations, and the use of outside resources and interaction with the proper law enforcement organizations.
Local law enforcement maintains records
on incident reports, accident reports, and criminal reports.
National Coast Guard; The Coast Guard requires that all vessels;
over 25 ft. long be registered with them, and they investigate all offshore smuggling matters.
Investigators who cannot sort out and identify;
personal prejudices—about people, places, outlooks, and so on—are likely to miss the mark.
instrumentation is;
physical science methods used to detect crime.
Before a company's disciplinary policy can be effectively implemented, there must be a written;
policy that is distributed to all personnel so every- one is aware of exactly what the organization's policies are.
The purpose of confidentiality is to safeguard;
privileged communication and information that is obtained in the course of business.
An investigation requires a;
purpose, a subject, and an investigator.
An investigator is an individual who is;
resourceful, has good observa- tion skills, and has a desire to learn the truth and follow through to the end relentlessly.
Security officers in a Theory Y organization achieve
satisfaction for their ego and self-actualization needs.
One of the duties of the security manager or director is to formulate;
security budgets with which to run his or her operations.
Security management should only directly supervise
security personnel.
interrogation is the;
skillful questioning of witnesses as well as suspects
As a general rule, the security manager or director serves in a :
staff capacity when his or her role is as an advisor to a superior executive.
Chain of command:
the path along which authority flows.
Besides safeguarding the company's profit, property, and proprietary information, the security department is charged with;
the protection of the company's greatest asset: the personnel.
The National Crime Information Center (NCIC) collects and retrieves data about;
those wanted for criminal activities and contains criminal history files on criminals.
County Clerk's Office: This department has and maintains records of;
those who applied for citizenship, marriage licenses, and decrees for divorce.
Line executives:
those who are delegated chain-of-command authority to accomplish specific objectives in the organization.
A well-prepared budget presented to the company in a clearly thought-out, logical manner is the best way;
to ensure proper financing.
In contracting security once you have selected one or more companies you may wish to employ, your next step is;
to interview the highest executive available. Visit their offices; see firsthand if they have the equipment, personnel, and facilities they claim to have
City Recorder or Register of Deeds maintains documents relating;
to real-estate transactions, deeds, mortgages, leases, wills, bankruptcies, military discharges, and financial statements;
Along with training, there must be a written policy in place outlining when force can be;
utilized; what weaponry, if any, can be carried; and the rules governing their use.
Unity of command:
where an employee should be under the direct control of only one superior.
State Comptroller's Office; This office investigates
white-collar and fraud crimes reported to the state.
Once you have delegated the responsibility to someone to accomplish a certain goal;
you must also delegate the authority he or she will require to accomplish that goal.
Possible disciplinary actions would include the following:
• A verbal warning with or without counseling • A written warning • A suspension (the length may vary based on the infraction and the employee's disciplinary history) • Demotion • Termination
The following program should be set up and personnel trained beforehand so that the media relations program can be immediately and effectively implemented if the need arises;
• An emergency committee should be put together and properly trained. • The committee should consist of a media consultant along with representation from the legal department, public relations, security,human resources, finance, risk management, and the insurance carrier. • All personnel, especially security, should be briefed and instructed to make no comments but to refer all inquiries to the designated person who will act as the official spokesperson for the company.
Dr. Abraham Maslow developed a five-step process that describes human behavior in terms of the needs that are experienced. These needs are as follows:
• Basic needs, such as food and shelter • The need for safety, such as security, protection. • The need to belong, such as memberships. • The need for ego status, such as achieving some special recognition • The need to self-actualize.
The subject of investigation encompasses a broad variety of material. The following are some examples:
• Criminal and civil investigations • Incident-type and background-type investigations • Local area investigations • National or international investigations • Telephone, street, and personal interview investigations • Physical and technical surveillance • Undercover operations
Some of the motivators for becoming an informant include the following:
• Moral and ethical reasons • Financial gain • Revenge • Exposing activities they disapprove of • Fear of getting in trouble • Wish to avoid punishment
The key qualities of a successful security manager are as follows:
• Patience • Wisdom • Virtue • Empathy • Kindness • Trust • Knowledge • Self-control
Theory X is defined them as follows:
• The average employee is naturally lazy and will work as little as possible. • The average employee lacks ambition, dislikes responsibility and authority, and prefers taking orders to being independent. • The employee is basically self-centered, has no feeling for organi- zational needs, and must be closely controlled. • By nature, the average employee resists change. • The average employee does not have the ability to solve problems creatively.
In order for a disciplinary policy to be effective and not detrimental to the organization, there are several things that it must be:
• The policy must make sense and should be reasonable. It cannot violate either state or federal labor law. • Discipline must be fairly meted out without favoritism or prejudice. • Discipline must be proportional to the offense committed. • Discipline must be progressive. • Employees must have recourse if they believe they have been dis- ciplined unfairly or too harshly. • All disciplinary actions taken must be completely documented and reviewed.
Theory Y is defined as follows:
• Work can be an enjoyable part of one's life if the conditions are favorable. • People are not naturally lazy, passive, or resistant to the needs of the organization. • Management does not place the potential for development within the employee. It is management's responsibility to recognize the potential that is present within each individual and allow the indi- vidual the freedom to develop his or her abilities. • People possess creativity and can solve organizational problems if encouraged by management. • The essential task of management is to develop organizational conditions and operational procedures so the individual can attain his or her goals by directing efforts toward organizational goals and objectives.
There are times when the security manager must deal with the print and electronic media. Some of these times could be the following:
• Your specific company or industry becomes the focus of an inves- tigative story. • The company is involved in a labor dispute. • Terrorist activities. • A natural disaster affects your firm. • A criminal act highlights your firm.