SECTION 1: INTRODUCTION TO THE SECURITY INDUSTRY
Objectives
1. The concept and policy of security
2. Historical background of security.
3. The difference between private and public security.
4. Roles of private security officers.
5. Components of security.
6. Principles of security.
WHAT IS SECURITY?
• The protection and preservation of life and assets from loss occasioned
by criminal activity, fire, damage, or any other forms of waste.
SECURITY POLICY
A security policy is a documented set of rules, guidelines, procedures, and best practices
established to ensure the protection and security of an organization's assets, resources,
information, and personnel.
For A Loss To Take Place There Must Be:
• Opportunity to Take
• Opportunity to Remove -from premise
• The Goods
• A Perpetrator
Background of the Private Security Industry:
Historical Evolution:
The private security industry has a long history, dating back to ancient civilizations,
where private individuals or groups provided protection services. The industry has
evolved significantly in modern times, with a wide range of services offered, including
physical security, cybersecurity, surveillance, risk assessment, and more.
Diversity of Services:
Private security companies offer diverse services to meet the growing and changing
needs of clients. These services can include manned guarding, electronic surveillance,
cybersecurity, executive protection, event security, and investigations.
Global Expansion:
The private security industry has seen global expansion, with companies operating
internationally to address the increasing demand for security services in various sectors,
such as business, government, critical infrastructure, and private residences.
Technological Advancements:
Technology plays a crucial role in the private security sector. Advances in surveillance
systems, access control, biometrics, and artificial intelligence have enhanced the
industry's capabilities, providing more efficient and sophisticated solutions.
Regulatory Framework:
Different countries have varied regulatory frameworks governing the private security
industry. Regulations often address licensing, training requirements, service delivery
standards, and force use. These regulations ensure the industry's professionalism,
accountability, and adherence to legal standards.
Changes in the Industry Due to the New Private Security Regulation Act
Assuming a hypothetical Private Security Regulation Act has been introduced, the
changes it might bring could include:
Standardization of Practices:
The act may introduce standardized practices across the private security sector. This
could include uniform training requirements, certification processes, and guidelines for
service delivery to enhance professionalism.
Enhanced Oversight and Accountability:
The act could establish or strengthen regulatory bodies responsible for overseeing the
private security industry. This may involve regular audits, inspections, and compliance
checks to ensure adherence to legal and ethical standards.
Increased Training Requirements:
The legislation might stipulate increased training requirements for security personnel to
ensure they are adequately prepared to handle diverse situations. This could include
training on de-escalation techniques, ethical conduct, and legal boundaries.
Improved Client Confidence:
A well-regulated industry can instill confidence in clients, knowing that private security
providers operate within a legal framework. This could lead to increased demand for
personal security services.
Adaptation to Technological Changes:
The act may address the use of emerging technologies within the industry, ensuring that
companies adopt and implement technologies responsibly and ethically.
Stricter Enforcement of Compliance:
The introduction of the act may lead to stricter enforcement of compliance, with
penalties for companies and individuals found in violation of the regulations. This could
deter malpractices and encourage a higher standard of conduct.
Private Security:
1. Ownership and Control:
Ownership: Private security services are provided by private companies
or individuals. These entities operate for profit and are owned by private
individuals or shareholders.
Control: Private security firms operate under the control and
management of their owners or designated leadership.
2. Clients and Customers:
Clients: Private security companies are hired by private individuals,
businesses, organizations, or government agencies to provide security
services. Clients typically pay for these services on a contractual basis.
3. Scope of Services:
Varied Services: Private security offers a broad range of services, including
manned guarding, electronic surveillance, cybersecurity, executive
protection, investigations, and more. The services are tailored to meet
the specific needs of the clients.
4. Profit Motive:
Profit-Driven: Private security firms operate with the primary goal of
making a profit. Their success depends on providing effective security
solutions that meet the demands of their clients.
5. Regulation and Oversight:
Regulatory Framework: Private security companies are subject to
regulations and licensing requirements imposed by local, regional, or
national authorities. However, the extent of regulation varies across
jurisdictions.
Public Security:
1. Authority and Jurisdiction:
Authority: Public security is provided by government agencies or entities
with public authority. This includes police forces, military, and other
government agencies responsible for maintaining public order and safety.
Jurisdiction: Public security operates within a defined jurisdiction, often
at the municipal, state, or national level, depending on the type of
agency.
2. Funding and Resources:
Government Funding: Public security agencies are funded by taxpayers
and operate with public funds. They have access to public resources and
are accountable to the government and the public.
3. Responsibilities:
Public Order: Public security agencies are primarily responsible for
maintaining public order, enforcing laws, preventing and investigating
crimes, and ensuring the safety of citizens.
4. Legal Authority:
Law Enforcement Powers: Public security agencies possess law
enforcement powers, including the authority to make arrests, conduct
investigations, and use force when necessary. These powers are granted
by law and are subject to legal oversight.
5. Mission and Goals:
Public Welfare: The mission of public security is often focused on the
welfare and safety of the public. Public security agencies aim to protect
citizens and uphold the rule of law.
QUALITIES OF A GOOD SECURITY OFFICER
• Physically & Mentally Fit
• High State of Alertness
• Self Disciplined
• Professional Attitude
• Honest, Trustworthy & Reliable
• Exercises Sound Common Sense
• Good Public Relations Skills
• Understands and can Execute All His Trained Security Skills
• Confident of His Ability
• Understands and Obeys the Chain of Command.
• Loyal to his Company and Clients
ROLES OF A PRIVATE SECURITY OFFICER
A private security officer has a duty to protect his employers property and assets. This
duty involves much more than simply preventing and the detection of thefts. A Security
Guard has the responsibility of safeguarding the employer from any type of loss. Any
incidence that causes waste, damage and a financial or material loss is the concern of
the Security Guard.
The main objectives of a Security Officer are:
Protection of life
Protection of property and premises
Prevention of loss and waste
Prevention and deterring of crime
Other roles are:
Firefighting & Prevention Marshal
Qualified First Aider
Cctv Monitoring Officer
Emergency Mobile Response Crew Member
Access Control Duty Officer
Personnel & VIP Escort Security Officer
Objectives Defined
Protect Life- Protecting life can take many forms. For example, the Security
Officer could be protecting people against some of the
following:Dangerousdous situations - even something as simple as a ‘slip, trip or
fall’
Assault, where the threat or attempt of an assault is sufficient
to require an effective response
Emergency situations, such as fire or flood
Protect Property and Premises
Protect property from theft or damage
Protect premises from fire, flood, criminal damage, defacement
Prevent Loss and Waste Loss can be caused in three distinct ways:
1. Loss by theft the loss of property through criminal activities.
2. Loss when confidentiality is breached Security Officers, carrying
out their duties, will come across confidential information.
Such information should never be discussed with anyone -
including friends and family. Should loss occur due to such
information being given to others, serious criminal charges
could be brought.
3. Loss when the client's property is abused For example
unauthorised use of the client's computer system to write letters
or play games or unauthorised use of the client's telephone.
To prevent losses, the following methods can be used:
access control methods such as ID Cards and passes, signing
in/out etc
random searches of staff and visitors by the client's policy
management of buildings, to include:
turning off redundant electrical supplies such as lights, electric
heaters etc
preventing fire by reporting overloaded electrical sockets, etc
monitoring of services - water, gas, etc
compliance with agreed assignment instructions
Prevention and Deterring of Crime Examples of crimes the Security Officer may
come across are:
assault theft
criminal trespass damage robbery
burglary breach of the
fraud peace
deception
Qualities of Security Officers
Security Officers should be:
Courteous Trustworthy
Alert Hospitable
Tactful Inquisitive
Co-operative Effective
Honest Fair
Approachable
Types of Assignments
industrial
commercial
retail
maritime
aviation
Security Officers are usually engaged in a wide range of locations. One of the reasons
for this is so that the temptation to steal or commit crimes, which is substantial for those
who are so-minded, is removed.
All assignments are different, and it is essential for Security Officers to have a clear
understanding of the layout of the premises and knowledge of the local vicinity in
which they are employed if they are to perform their duties effectively.
Confidentiality
A Security Officer has access to privileged information:
Examples:
what is on site
what security procedures exist, alarm codes, etc
Approaches to the Security Officer for information:
If approached, what should the Security Officer do?
How might Security Officers be approached?
NOTE:
Conspiracy charges could be brought if approaches are not reported
Security Officers should only disclose confidential assignment information to their
control room personnel. They should not give confidential information to others - such
as customers, family members or friends
Components of Security:
1. Physical Security:
Definition: Involves measures to protect physical assets, locations, and
resources. This includes access control, surveillance systems, barriers,
locks, and other physical measures to prevent unauthorized access.
2. Information Security:
Definition: Focuses on protecting information and data from
unauthorized access, disclosure, alteration, or destruction. It includes
measures such as encryption, access controls, and cybersecurity protocols.
3. Personnel Security:
Definition: Pertains to the vetting, training, and management of
individuals with access to sensitive areas or information. This component
ensures that personnel are trustworthy and well-trained in security
practices.
4. Operational Security:
Definition: Involves implementing procedures and practices to safeguard
an organization's daily operations. This includes contingency planning,
risk management, and incident response protocols.
5. Network Security:
Definition: Focuses on securing computer networks from unauthorized
access, attacks, or disruptions. It includes firewalls, intrusion detection
systems, and secure communication protocols.
Principles of Security:
1. Confidentiality:
Explanation: Ensures that sensitive information is only accessible to
authorized individuals or systems. This involves measures like encryption,
access controls, and secure communication channels.
2. Integrity:
Explanation: Ensures that data and systems remain unaltered and
trustworthy. Integrity safeguards prevent unauthorized modification,
corruption, or tampering of information.
3. Availability:
Explanation: Ensures that systems and resources are available and
accessible when needed. This principle involves measures to prevent
disruptions, downtime, or denial-of-service attacks.
4. Authentication:
Explanation: Verifies the identity of users, systems, or entities accessing a
resource. Authentication mechanisms include passwords, biometrics, and
multi-factor authentication to ensure that only authorized entities gain
access.
5. Authorization:
Explanation: Grants or denies access based on the authenticated identity.
Authorization ensures that users or systems have the appropriate
permissions to access specific resources or perform certain actions.
6. Accountability:
Explanation: Imposes responsibility for actions taken within a system. This
principle ensures that activities can be traced back to specific individuals,
helping with audits, investigations, and deterrence of malicious activities.
7. Non-Repudiation:
Explanation: Prevents individuals from denying their actions or
transactions. Non-repudiation mechanisms, such as digital signatures,
ensure that parties involved cannot dennvolvement in a particular
interaction.
Conclusion
Successful Security Officers are capable of doing a difficult and demanding job. They
have integrity, manage change, and deal with problems effectively. They are aware of
their own behaviour and how it can determine the outcome of events. They are
achievers, able to work independently to achieve their objectives.