Security Principles and Practices

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

History of Security: First codification of law occurred around

1800 BC with Hammurabi's code

Crime Prevention Officer (CPO)

A public servant with police powers

Activities requiring a human being (security officer)

Ability to discriminate among factors Ability to converse and make decisions Ability to use physical force Ability to use judgement in varying circumstances

What is a security post?

Any location or combination of activities for which a trained human being is necessary

Definition of Loss Prevention

Any method used to increase the likelihood of preventing and controlling loss

Report: Report forms that force positive statements

Are more useful than those that require a narrative of an event.

Security Officer: General Security Instruction should be provided

As soon as the officer reports for duty.

Asset Protection Program: The manager or executive in charge of the protection program should:

Asset Protection Program: * Apply modern management methods * Be familiar with protection problems and techniques * Implement the systems approach *Be a talented manager with broad-based skills

Asset Protection Program: A good loss report accomplishes the following tasks:

Asset Protection Program: * Provides a quick notifications of an actual or suspected dishonesty loss * Generates trend data * Provides actual and reliable loss estimates * Helps establish accountability for losses * Provides information for the assessment of account re-evaluation or budget * Acts as an executive management control device to compel management to assume responsibility for losses and reporting * Provides a basis for insurance claims or coverage adjustment.

Asset Protection Program: Combining asset protection functions within the company, like risk management, fire protection, and security accomplishes:

Asset Protection Program: * Use of the "systems" approach * More efficient use of personnel * Enhanced opportunities to hire highly qualified asset protection personnel.

Asset Protection Program: The protection program manager must:

Asset Protection Program: * Ensure protection operations are conducted in the least expensive way * Maintain the lowest cost consistent with required operational results * Ensure the amount of money spent generates the highest returns

Asset Protection Program: Benefits of a reporting loss system:

Asset Protection Program: * Identifies targeted items * Indicates periods of loss * Indicates effectiveness of countermeasures * Plots loss trends * Facilitates recovery

Asset Protection Program: Predictive Modeling: A loss reporting system should track the following:

Asset Protection Program: * Most vulnerable assets * Day/Hour of theft * Locations of losses * Countermeasures that were effective or ineffective * Value and frequency of the loss ratios

Asset Protection Program: Methods in which protection programs can generate revenue

Asset Protection Program: * Proof of loss in insurance claims * Recovery of property * Establishment of claims against others * Other recovery efforts, such as recovering revenue from bad checks.

Asset Protection Program: For an asset protection program to work, top management should:

Asset Protection Program: * Show interest * Support the program * Ensure all personnel are cooperating with the program

Asset Protection Program: The modern protection professional must be (II):

Asset Protection Program: (II) Must be able to relate security directly to the basic strategic and business objectives of the organization.

Asset Protection Program: Security officers are only:

Asset Protection Program: 1 element in a complete protection program.

Asset Protection Program: The modern protection professional must be:

Asset Protection Program: Able and comfortable to use current technology.

Asset Protection Program: Cost-effectiveness is the primary factor to executive management:

Asset Protection Program: In determining the size of the protection program.

Asset Protection Program: The protection of assets is an important:

Asset Protection Program: Management function

Asset Protection Program: An assets protection program must be:

Asset Protection Program: assessed economically, as well as, functionally.

Asset Protection Program: Reporting level of the protection program should be:

Asset Protection Program: high enough to prevent premature or improper termination of security activities that may be viewed as a threat by some middle manger.

Asset Protection Program: The primary objective is implementing a protection program within an organization:

Asset Protection Program: should be to motivate every employee to become part of the protection team.

Security Officers: Security Officer's functions

Control of Entrances and movement of pedestrian and vehicle traffic Patrol of building and Perimeters (Foot and Vehicle Patrols) Escort Materials and Personnel Inspections of security and fire exposures Special assignements

Crime Analysis: Four steps of crime analysis procedures are :

Crime Analysis: Data collection Analysis Dissemination-Accurate, timely and useful information to line personnel. Feedback

Crime Analysis: Data Collection - Crime Statistics

Crime Analysis: Must be gathered as a first step in the design of a prevention program. Provided ongoing perspective of program accomplishments during specified period Are key indicators to judge the overall success of the program.

Crime Analysis: Crime Data is used to:

Crime Analysis: Determine specific crimes have decreased Determine if the value of stolen items has decreased Increase in thwarted crimes Increase in return of stolen property

Crime Analysis: The definition of Crime Analysis

Crime Analysis: A systematic approach to studying crime problems.

Crime Analysis: The usefulness of crime analysis products is a basic measure of success on if:

Crime Analysis: The accuracy is important to its credibility.

Crime Prevention: Private sector reservations about public adjudication for economic crimes include:

Crime Prevention: Administrative delays in prosecutions Prosecutorial policy objectives Differing "Output goals" of business and Criminal Justice Policies on governmental release of information and rules of discovery Unsympathetic attitude of the courts to business losses

Crime Prevention: Economic Crimes are defined

Crime Prevention: As the illicit behavior having as its object the unjust enrichment of the perpetrator at the expense of the economic system as a whole.

Crime Prevention: What are the four "D's" of crime prevention?

Crime Prevention: Deter criminal attack Detect attacks that occur Delay attack to allow time for response by authorities Deny access to selected targets

Crime Prevention: What are indirect costs of economic crimes?

Crime Prevention: Effects on business Effects on government Effects on the public

Crime Prevention: What is the largest indirect cost of economic crime for the past 20 years?

Crime Prevention: Liability

Crime Prevention: Obstacles to the development of an ongoing reporting system:

Crime Prevention: No accepted definition of economic crime No data base to build on Businesses lack collection and reporting methods The reluctance to release loss information

Crime Prevention: How are economic crimes usually resolved?

Crime Prevention: Privately

Crime Prevention: The two major components of economic crime

Crime Prevention: are white collar and ordinary crime

Crime Prevention: Crime losses far exceeds the losses to business

Crime Prevention: caused by fire and industrial accidents

Why are fixed security post environments are often inadequate?

Design or structure obstructs observation or hearing Poor air circulation causes temperature problems Elevated temperatures that can cause a loss of vigilance and drowsiness Inactivity and isolation of a post that can cause drowsiness

Post Orders should be developed with the following criteria:

Each order deals with only one subject Each order is brief Each order is easy to understand Each order is indexed for quick reference

Factors that determine the number of security officers required to work

Facility physical complexity Number of employees Character of the work of the organization Number of entrances, and hours they are open Number of patrols required to protect the facility Number of escorts and special assignments to be performed

Additional Services beyond protection

Fire Protection Safety Risk and Insurance Management Internal Audit

Education services provided by security

General Security/ Supervisory Training/Employee Self Protection/Security awareness

Security Officers: Essential attributes for security officers

Good Character (Honest, discipline, alert, loyal) Proper Attitude and ability to handle people Neat Appearance Circumspect deportment Knowledge of the job Adequate training and ongoing education

Decision factors for arming officers

Greater danger to life safety without weapons Officer may be reasonably expected to use fatal force

History of Security: Modern Policing

Has its roots in England where Sir Robert Peel, in 1829, marked the beginning of a police role in crime prevention.

Internal Theft: Internal losses occur by several methods:

Internal Theft: Pilferage- Stealing in small quantities over a long period Embezzlement - Taking money/property entrusted in your care. Shrinkage - Loss of inventory through any means.

Internal Theft: Physical countermeasures to employee theft

Internal Theft: Access Control ID Systems Lock and key Alarms CCTV Safes and Vaults

Internal Theft: Management countermeasures to employee theft.

Internal Theft: Access Control designed to eliminate opportunity Effective pre-employment screening Internal Controls/Separations of responsibilities Accounting and auditing Management support Policy and procedures Thorough Investigations Confrontations with employees suspects Prosecution

Internal Theft: Danger Signs for employee Theft

Internal Theft: Counter productive behavior Conspicuous consumer who is visibly extravagant Those showing a pattern of financial irresponsibility Financially squeezed employees

Internal Theft: What is the cornerstone of attempts to eliminate internal problems?

Internal Theft: Effective Pre-Employment Screening

Internal Theft: Shrinkage attributed to employee theft

Internal Theft: Is very difficult to obtain accurate statistics.

Internal Theft: The Theft Triangle consist of what three elements?

Internal Theft: Motivation (Need) Opportunity Rationalization or desire

Internal Theft: Why do employees steal?

Internal Theft: Personal Problems Environmental Influences Rationalization

Internal Theft: Internal Theft

Internal Theft: The greatest ongoing threat to business

Internal Theft: What is the most important deterrent to internal theft?

Internal Theft: fear of discovery

Internal Theft: The most frequently involved person regarding internal theft

Internal Theft: is a dissatisfied employee

Internal Theft: The most frequently investigated crime by private security

Internal Theft: is internal theft

Security Training: Competency of training instructors can be judge by two things:

Knowledge of the subject Ability to communicate knowledge

Security Training: Instructor Training includes

Learning Theory Instructional Strategies and Methods Learning Aids Lesson Plan Writing Development of practice exercises

Security Officer: General Training Topics

Legal aspects of the job Operational duties Firearms Administrative responsibilities Electronic Countermeasures Use of Force

Liaison: Law enforcement executives oppose police moonlighting:

Liaison: * Contract agencies feel it is unfair competition * Conflict of interest situations. * Liability issues * 87% of departments permit moonlighting * 150,000 law enforcement officers regularly engaged in off duty private security jobs. * Preparedness for duty problems with officers working long hours off duty

Liaison: What are the four main factors for the increase growth of private security and the limited growth of public law enforcement?

Liaison: * Increasing workplace crime * Increasing fear of crime * Decrease in government spending * Increasing awareness and use of private security products and services as cost-effective protective measures.

Liaison: Contract security managers, police, and propriety security managers rated private security firms "Poor" in:

Liaison: * Quality of personnel * Pre-employment background checks *Training *Supervision *Familiarity with legal powers.

Liaison: Private security relies upon both _______________ and ______________ for intelligence gathering and crisis management planning.

Liaison: Commercial security service Government Agencies

Liaison: How do you improve public and private sector relations?

Liaison: * Closer cooperation * Management Meetings * Understand respective roles * Information Exchanges * Improving communication

Liaison: Both public and private police suggested improving private security quality with:

Liaison: * Improved training * Mandated training * Improved personnel selections methods * High wages * Establishing and improving licensing regulations

Liaison: The increasing growth of private security and the limited growth of public law enforcement are due to four main factors:

Liaison: * Increasing workplace crime * Increasing fear of crime * Decrease in government spending * Increasing awareness and use of private security products and services as cost-effective protective measure.

Liaison: Private security occasionally assists law enforcement investigations by providing:

Liaison: * Investigators * Undercover Operative * Photographic, CCTV, or surveillance equipment * Money for rewards, buy, overtime * Information (Most frequently exchanged item)

Liaison: Law enforcement gave private security ya fair-to-poor rating in most areas, with the highest rating in...

Liaison: * Reporting criminal incidents * Responding to alarms * Reasonable use of force * Proper use of weapons

Liaison: Law enforcement administrators are interested in transferring responsibility to the private sector for:

Liaison: * Response to burglar alarm * Completing incidents reports when victim declines prosecution or flies for insurance.

Liaison: The major research questions addressed by Hallcrest studies were:

Liaison: * Roles, functions, and contributions of private security and public law enforcement to crime prevention and control. * The mutual expectations/perceptions of private security and law enforcement. * Communication/cooperation between private security and law enforcement * Competition and conflict between private security and law enforcment. * Characteristics and standards of the labor and technological resources of both. * Identification of emerging issues

Liaison: What are the common methods to hire off-duty police officers?

Liaison: *Direct hire * Department contracts with firms * Through unions or associations

Liaison: As a general rule, local law enforcement has very little effect on many crime except for:

Liaison: Burglaries Robberies Arson

Liaison: What percentage of law enforcement at field study sites were satisfied with the way security personnel handled incidents in which they were involved?

Liaison: 20%

Liaison: What is the percentage of detectives were satisfied with their private security interaction.

Liaison: 50%

Liaison: Definition of Liaison:

Liaison: A linking or connecting of the parts of a whole in order to bring about proper coordination of activities.

Liaison: Law enforcement officers regarded themselves as professional, but they view private security

Liaison: As non-professinals

Liaison: Hallcrest II

Liaison: In 1990, selected to update Hallcrest I profile growth and changes, identify emerging issues and present recommendations.

Liaison: Hallcrest 1

Liaison: Selected in 1980 to conduct three year study of roles, responsibilities and resources of private security and assess the relationship between law enforcement and private security.

Liaison: Both law enforcement and private security managers felt that private security was relatively effective in reducing the dollar loss of crime,:

Liaison: and relatively ineffective in apprehending criminals.

Liaison: Propriety managers rated their own operations as "good":

Liaison: but gave contract security personnel lower ratings in most performance categories.

Liaison: A significant minority of law enforcement had:

Liaison: infrequent contact with private security.

Liaison: Public entities appear to receive better training than:

Liaison: private entities.

Liaison: Private security and public law enforcement as their primary mission:

Liaison: the prevention of crime and protection of persons and property.

Liaison: Private security frequently avoids or bypasses police with regard:

Liaison: to white collar or economic crime.

Liaison: Private security managers felt that police cooperated with their investigations and were satisfied:

Liaison: with the speed of police response and the degree to which police supported the decisions they had made.

Loss Prevention: Key questions a Loss Prevention Manager must ask:

Loss Prevention: Do we have upper management support? Do we have an adequate budget? Are the appropriate levels of authority in place?

Loss Prevention: Role of a Loss Prevention Manager - reflects needs/objectives of upper management needs to:

Loss Prevention: Establish priorities Develop written policies Form integrated management teams

Loss Prevention: First order of Loss Prevention

Loss Prevention: Loss Prevention: Develop policies and procedures (cornerstone of any loss prevention program). Protect against internal and external theft Develop access control procedures Establish lock and key control procedures Design, supervise, and review installation of anti-intrusion and detection Establish a workplace violence program. Provide control over movement

Loss Prevention: Five tools that form the foundation of a loss prevention program:

Loss Prevention: Risk Analysis Planning Evaluation Research Standards

Loss Prevention: What acceptable are some ways to remedy untimely accidents?

Loss Prevention: Constant inspections Job safety analysis (JSA's) Early discovery of unsafe conditions (JSA's) Identifications and control hazards Investigation of all accidents and near misses ASAP

Loss Prevention: HAZMAT Program

Loss Prevention: Identify hazards that are present Know how to respond to an incident Set up necessary safeguards Employee training

Loss Prevention: Risk Analysis

Loss Prevention: Loss Prevention Survey- Physical examination of the location. Identifying Vulnerabilities - Isolating the vulnerabilities Determining probability/frequency/ costs for internal and external risks

Loss Prevention: Evaluation - Must be ongoing and continuous

Loss Prevention: Pre-test and Post-test design Experimental/Control Group Design

Loss Prevention: Research - Four basic steps

Loss Prevention: Statement of the problem Hypothesis Testing Conclusion

Loss Prevention: Planning -design for reaching objectives- must fulfill organizational goals - responding to:

Loss Prevention: What is the cost? Is it practical? Is it cost effective? Will management support strategy?

Loss Prevention: Unsafe conditions cause ____%

Loss Prevention: 15%

Loss Prevention: Unsafe Act causes _____% of all accidents.

Loss Prevention: 85%

Loss Prevention:Definition of Incident

Loss Prevention: Any unwanted or undesired event which degrades the efficiency of the business operation.

Loss Prevention: Definition of Accident

Loss Prevention: Is an undesired event resulting in physical harm to a person or damage property.

Loss Prevention: Standards

Loss Prevention: Promotes uniformity; e.g. UL, NFPA, OSHA, API, ASTM. Pupura is a proponent of standards to enable private security and the courts to foster uniformity.

Two problems in police and security relationships which have the greatest intensity of feelings are:

Moonlighting by police officers in private security Police response to activated alarms which are largely false

Frequent cited measures for improving private security are:

More or better training Mandated training Improved Selection process Higher Wages Establishment or improvement of licensing and regulations.

Post Orders

Most important written instruction for the security force

Report:Security Logs are admissible in legal proceedings as "entries made in the regular course of business," and are not consider "hearsay."

Must be regularly maintained Must be maintained as part of regular duties Must record an event of which the author had personal knowledge or was reported to the author by an individual with personal knowledge and a duty to report the event.

Security Officers are the largest cost elements in most protection programs. To control cost you should do the following:

Officers are deployed only were required and most effective Deployment is efficiently scheduled and effectively controlled Qualifications for duties and posts are a major consideration Deployment is guided by rational and objective business criterion Scheduling and assignment are accomplished in a cost effective manner

Security Officers: Qualifications are based

On the job descriptions for the security positions to be filled

Security Training: Training must be

Ongoing and Continuous

Supervisors and managers when evaluating the post should check for the following:

Personal Appearance and condition of the officer Physical condition of the post Availability and condition of the equipment and documentation Officer response to training questions Officer response to actual situation on the post

Loss Prevention Officer (LPO)

Private sector individual deriving authority from an employer

In general, security officers should not be armed because:

Private security is not considered equivalent to law enforcement Typical facilities do not experience violent crimes Increased risk of death/injury, liability, and negative publicity

Armed officers generate the responsibility for:

Proper training of the officers to be armed Selection of appropriate type/size of firearms and ammunition Proper maintenance of firearms by a qualified gunsmith Maintenance records of these actions Adequate liability insurance

The Security Role in the Organization

Protective Services/Prevention (Special Services Executive Protection/home security surveys/investigative services/emergency services)

Report: How do you avoid low morale issue, with report writing?

Read reports and logs in a timely manner Acknowledge items of significance Take corrective action where appropriate

Security Officer Training: Basic Required Knowledge

Regulations of the security officer force Requirements of the particular assignment Rules of the enterprise Fire and Safety regulations Layout of facilities and offices Facility security procedures Fire Fighting procedures Location of vulnerable points and important items like emergency exits, key personnel, alarm panels, facility controls, etc.

Risk Mgmnt: What should be factored when assessing vulnerability and the response to risks?

Risk Mgmnt: 2 (PML) Factors must be considered: Possible Maximum Loss- Maximum loss if a target is destroyed or removed. Probable Maximum Loss - Loss a target is likely to sustain.

Risk Mgmnt: Pure Risk is:

Risk Mgmnt: A risk in which there is no potential of benefits to be derived (i.e. tornado)

Risk Mgmnt: Dynamic Risk is:

Risk Mgmnt: A risk that can produce gain or profit

Risk Mgmnt: Method for handling a risk

Risk Mgmnt: Accept Eliminate Reduce Transfer

Risk Mgmnt: What is one of the first tools to be applied to determine vulnerability?

Risk Mgmnt: Crime and incident analysis

Risk Mgmnt: The possibility and probability of a risk resulting in a loss:

Risk Mgmnt: Depends on the risk itself and the preventative measures taken

Risk Mgmnt: The two types of Fidelity Bonds are:

Risk Mgmnt: Employee is bonded by name or position Blanket bonds cover a category of employees

Risk Mgmnt: Fiduciary Bonds

Risk Mgmnt: Ensures persons appointed by the supervised property will be trustworthy.

Risk Mgmnt: Litigation Bonds

Risk Mgmnt: Ensures specific conduct by defendants and plantiffs

Risk Mgmnt: Two basic types of protection against crime

Risk Mgmnt: Fidelity (dishonesty) and surety bonds Burglary, robbery and theft insurance

Risk Mgmnt: Loss Event Profile (Assts vs. Threat)

Risk Mgmnt: Forecasting individual loss events that may occur is the first step in dealing with risk assessment. It requires clear ideas about the kind of risk, as well as about the condition, circumstances, objects, activities and the relationship that produces them.

Risk Mgmnt: Insurance Rates are dependent upon two variables

Risk Mgmnt: Frequency of claim and Cost of each claim

Risk Mgmnt: Loss Prevention practitioners are more interested:

Risk Mgmnt: In Crime, shrinkage, fire and accidents

Risk Mgmnt: Risk analysis

Risk Mgmnt: Is a management method used to minimize risks through applications of security measures commensurate with the threat.

Risk Mgmnt: The concept of Risk Management is derived

Risk Mgmnt: Is derived from business

Risk Mgmnt: The major resource required for a risk analysis is

Risk Mgmnt: Manpower.

Risk Mgmnt: Loss Event Probability

Risk Mgmnt: Probability can be formulated as the number of ways in which a particular event can result from a large number of experiments which could produce that event. P=f/n P= the probability that a given event will occur f= the number of actual occurrences of that event n= the total number of experiments seeking that event.

Risk Mgmnt: Surety Bonds

Risk Mgmnt: Provide compensation for failure to perform specified acts within a certain period of time, such as a contract bond that guarantees that construction will be completed by a given day.

Risk Mgmnt: The two type of risk are

Risk Mgmnt: Pure Risk and Dynamic Risk

Risk Mgmnt: What are the 5 principle crime risk management methods?

Risk Mgmnt: Risk Avoidance Risk Reduction Risk Spreading Risk Transfer Risk Acceptance

Risk Mgmnt: Fidelity Bonds require:

Risk Mgmnt: That an employee be investigated by the bonding company to limit the risk of dishonesty; if the employee violates the trust, the insurance company indemnifies the employer for the amount of the policy.

Risk Mgmnt: Security Survey

Risk Mgmnt: The cost of protection is measured in: Protection in depth Delay time

Risk Mgmnt: Definition of Insurance

Risk Mgmnt: The transfer of risk from one party to another in which the insurer is obligated to indemnify the insured for an economic loss caused by an unexpected event during a period of time covered by such insurance

Risk Mgmnt: Loss event Criticality

Risk Mgmnt: This is a trade term that is defiend as the impact of a loss as measured in dollars.

Risk Mgmnt: Risk Managers are more interested:

Risk Mgmnt: are generally have more of an interest in fire and safety issues.

Risk Mgmnt: The kind of event that are loss-only oriented and which involve "pure risk" include

Risk Mgmnt: crime, natural disasters, industrial catastrophe, civil disturbances, war or insurrection, terrorism, accidents, conflicts of interest, etc...

Risk Mgmnt: License and permit Bonds

Risk Mgmnt: guarantee the payment of taxes and fees

Risk Mgmnt: What are examples of risk?

Risk is exposure to possible loss, crime, fire, product obsolescence, shrinkage, and work stoppage.

Report: Central Security report document is the

Security Log

Report: Reasons why security officer reports are not provided to management

Security Personnel are not action-oriented, not word oriented Reports don't appear to be acknowledge or acted on Report process doesn't encourage careful fact processing.

History of Security: In 1980 the International Associations of Chiefs of Police adopted a resolution

That all police agencies should consider crime prevention as a standard police function and form specialized crime prevention Units

Definition of Security

The Use of Traditional methods (guards, fences, and alarms) to increase the likelihood of a crime controlled, tranquil environment (proactive and reactive).

Security Officer: Training is based on

The duties to be performed and the capabilities of the officer in training

Both private security and public law have, as their primary mission:

The prevention of crime and protection of persons and property.

Sennewald Statement

Value is better measured by what does not happen than by what does.

Security Training: The employee must know (POP)

What they are to do - Policy Why they are to do it - Objectives How they are to do it - Procedures

Security Training: A trained security officer generally makes

a poor trainer of other security personnel

Security Training: The ideal trainer should have

full responsibility for training

Well-trained and well-supervised security personnel

may be the best possible protection available to a company

Security Training: Training must meet

organizational goals

Security Training: Since documentation is a strong defense to a charge on negligent training

records must be kept of each aspect of every employee's training


Set pelajaran terkait

Maternity/OB: Women's health Adaptive Quiz

View Set

Chapter 4 - Supply and Demand: Applications and Extensions

View Set

AP Biology Evolution Study Guide

View Set

Government Chapter 13.5 - The Election and Presidential Selection

View Set