Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
22 views14 pages

Section 1

Uploaded by

kellymtuku25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views14 pages

Section 1

Uploaded by

kellymtuku25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

SECTION 1: INTRODUCTION TO THE SECURITY INDUSTRY

Objectives

1. The concept and policy of security

2. Historical background of security.

3. The difference between private and public security.

4. Roles of private security officers.

5. Components of security.

6. Principles of security.

WHAT IS SECURITY?

• The protection and preservation of life and assets from loss occasioned

by criminal activity, fire, damage, or any other forms of waste.

SECURITY POLICY

A security policy is a documented set of rules, guidelines, procedures, and best practices

established to ensure the protection and security of an organization's assets, resources,

information, and personnel.

For A Loss To Take Place There Must Be:

• Opportunity to Take

• Opportunity to Remove -from premise


• The Goods

• A Perpetrator

Background of the Private Security Industry:

Historical Evolution:

The private security industry has a long history, dating back to ancient civilizations,

where private individuals or groups provided protection services. The industry has

evolved significantly in modern times, with a wide range of services offered, including

physical security, cybersecurity, surveillance, risk assessment, and more.

Diversity of Services:

Private security companies offer diverse services to meet the growing and changing

needs of clients. These services can include manned guarding, electronic surveillance,

cybersecurity, executive protection, event security, and investigations.

Global Expansion:

The private security industry has seen global expansion, with companies operating

internationally to address the increasing demand for security services in various sectors,

such as business, government, critical infrastructure, and private residences.

Technological Advancements:
Technology plays a crucial role in the private security sector. Advances in surveillance

systems, access control, biometrics, and artificial intelligence have enhanced the

industry's capabilities, providing more efficient and sophisticated solutions.

Regulatory Framework:

Different countries have varied regulatory frameworks governing the private security

industry. Regulations often address licensing, training requirements, service delivery

standards, and force use. These regulations ensure the industry's professionalism,

accountability, and adherence to legal standards.

Changes in the Industry Due to the New Private Security Regulation Act

Assuming a hypothetical Private Security Regulation Act has been introduced, the

changes it might bring could include:

Standardization of Practices:

The act may introduce standardized practices across the private security sector. This

could include uniform training requirements, certification processes, and guidelines for

service delivery to enhance professionalism.

Enhanced Oversight and Accountability:

The act could establish or strengthen regulatory bodies responsible for overseeing the

private security industry. This may involve regular audits, inspections, and compliance

checks to ensure adherence to legal and ethical standards.


Increased Training Requirements:

The legislation might stipulate increased training requirements for security personnel to

ensure they are adequately prepared to handle diverse situations. This could include

training on de-escalation techniques, ethical conduct, and legal boundaries.

Improved Client Confidence:

A well-regulated industry can instill confidence in clients, knowing that private security

providers operate within a legal framework. This could lead to increased demand for

personal security services.

Adaptation to Technological Changes:

The act may address the use of emerging technologies within the industry, ensuring that

companies adopt and implement technologies responsibly and ethically.

Stricter Enforcement of Compliance:

The introduction of the act may lead to stricter enforcement of compliance, with

penalties for companies and individuals found in violation of the regulations. This could

deter malpractices and encourage a higher standard of conduct.

Private Security:

1. Ownership and Control:

 Ownership: Private security services are provided by private companies

or individuals. These entities operate for profit and are owned by private

individuals or shareholders.
 Control: Private security firms operate under the control and

management of their owners or designated leadership.

2. Clients and Customers:

 Clients: Private security companies are hired by private individuals,

businesses, organizations, or government agencies to provide security

services. Clients typically pay for these services on a contractual basis.

3. Scope of Services:

 Varied Services: Private security offers a broad range of services, including

manned guarding, electronic surveillance, cybersecurity, executive

protection, investigations, and more. The services are tailored to meet

the specific needs of the clients.

4. Profit Motive:

 Profit-Driven: Private security firms operate with the primary goal of

making a profit. Their success depends on providing effective security

solutions that meet the demands of their clients.

5. Regulation and Oversight:

 Regulatory Framework: Private security companies are subject to

regulations and licensing requirements imposed by local, regional, or

national authorities. However, the extent of regulation varies across

jurisdictions.

Public Security:

1. Authority and Jurisdiction:


 Authority: Public security is provided by government agencies or entities

with public authority. This includes police forces, military, and other

government agencies responsible for maintaining public order and safety.

 Jurisdiction: Public security operates within a defined jurisdiction, often

at the municipal, state, or national level, depending on the type of

agency.

2. Funding and Resources:

 Government Funding: Public security agencies are funded by taxpayers

and operate with public funds. They have access to public resources and

are accountable to the government and the public.

3. Responsibilities:

 Public Order: Public security agencies are primarily responsible for

maintaining public order, enforcing laws, preventing and investigating

crimes, and ensuring the safety of citizens.

4. Legal Authority:

 Law Enforcement Powers: Public security agencies possess law

enforcement powers, including the authority to make arrests, conduct

investigations, and use force when necessary. These powers are granted

by law and are subject to legal oversight.

5. Mission and Goals:

 Public Welfare: The mission of public security is often focused on the

welfare and safety of the public. Public security agencies aim to protect

citizens and uphold the rule of law.


QUALITIES OF A GOOD SECURITY OFFICER

• Physically & Mentally Fit

• High State of Alertness

• Self Disciplined

• Professional Attitude

• Honest, Trustworthy & Reliable

• Exercises Sound Common Sense

• Good Public Relations Skills

• Understands and can Execute All His Trained Security Skills

• Confident of His Ability

• Understands and Obeys the Chain of Command.

• Loyal to his Company and Clients

ROLES OF A PRIVATE SECURITY OFFICER

A private security officer has a duty to protect his employers property and assets. This

duty involves much more than simply preventing and the detection of thefts. A Security

Guard has the responsibility of safeguarding the employer from any type of loss. Any

incidence that causes waste, damage and a financial or material loss is the concern of

the Security Guard.

The main objectives of a Security Officer are:

 Protection of life

 Protection of property and premises


 Prevention of loss and waste

 Prevention and deterring of crime

Other roles are:

Firefighting & Prevention Marshal

Qualified First Aider

Cctv Monitoring Officer

Emergency Mobile Response Crew Member

Access Control Duty Officer

Personnel & VIP Escort Security Officer

Objectives Defined

 Protect Life- Protecting life can take many forms. For example, the Security

Officer could be protecting people against some of the

following:Dangerousdous situations - even something as simple as a ‘slip, trip or

fall’

 Assault, where the threat or attempt of an assault is sufficient

to require an effective response

 Emergency situations, such as fire or flood

 Protect Property and Premises

 Protect property from theft or damage

 Protect premises from fire, flood, criminal damage, defacement

 Prevent Loss and Waste Loss can be caused in three distinct ways:

1. Loss by theft the loss of property through criminal activities.


2. Loss when confidentiality is breached Security Officers, carrying

out their duties, will come across confidential information.

Such information should never be discussed with anyone -

including friends and family. Should loss occur due to such

information being given to others, serious criminal charges

could be brought.

3. Loss when the client's property is abused For example

unauthorised use of the client's computer system to write letters

or play games or unauthorised use of the client's telephone.

To prevent losses, the following methods can be used:

 access control methods such as ID Cards and passes, signing

in/out etc

 random searches of staff and visitors by the client's policy

 management of buildings, to include:

 turning off redundant electrical supplies such as lights, electric

heaters etc

 preventing fire by reporting overloaded electrical sockets, etc

 monitoring of services - water, gas, etc

 compliance with agreed assignment instructions

 Prevention and Deterring of Crime Examples of crimes the Security Officer may

come across are:

 assault theft

 criminal trespass damage robbery


 burglary breach of the

 fraud peace

 deception

Qualities of Security Officers

Security Officers should be:

 Courteous Trustworthy

 Alert Hospitable

 Tactful Inquisitive

 Co-operative Effective

 Honest Fair

 Approachable

Types of Assignments

 industrial

 commercial

 retail

 maritime

 aviation

Security Officers are usually engaged in a wide range of locations. One of the reasons

for this is so that the temptation to steal or commit crimes, which is substantial for those

who are so-minded, is removed.


All assignments are different, and it is essential for Security Officers to have a clear

understanding of the layout of the premises and knowledge of the local vicinity in

which they are employed if they are to perform their duties effectively.

Confidentiality

A Security Officer has access to privileged information:

Examples:

 what is on site

 what security procedures exist, alarm codes, etc

Approaches to the Security Officer for information:

If approached, what should the Security Officer do?

How might Security Officers be approached?

NOTE:

Conspiracy charges could be brought if approaches are not reported

Security Officers should only disclose confidential assignment information to their

control room personnel. They should not give confidential information to others - such

as customers, family members or friends

Components of Security:

1. Physical Security:
 Definition: Involves measures to protect physical assets, locations, and

resources. This includes access control, surveillance systems, barriers,

locks, and other physical measures to prevent unauthorized access.

2. Information Security:

 Definition: Focuses on protecting information and data from

unauthorized access, disclosure, alteration, or destruction. It includes

measures such as encryption, access controls, and cybersecurity protocols.

3. Personnel Security:

 Definition: Pertains to the vetting, training, and management of

individuals with access to sensitive areas or information. This component

ensures that personnel are trustworthy and well-trained in security

practices.

4. Operational Security:

 Definition: Involves implementing procedures and practices to safeguard

an organization's daily operations. This includes contingency planning,

risk management, and incident response protocols.

5. Network Security:

 Definition: Focuses on securing computer networks from unauthorized

access, attacks, or disruptions. It includes firewalls, intrusion detection

systems, and secure communication protocols.

Principles of Security:

1. Confidentiality:
 Explanation: Ensures that sensitive information is only accessible to

authorized individuals or systems. This involves measures like encryption,

access controls, and secure communication channels.

2. Integrity:

 Explanation: Ensures that data and systems remain unaltered and

trustworthy. Integrity safeguards prevent unauthorized modification,

corruption, or tampering of information.

3. Availability:

 Explanation: Ensures that systems and resources are available and

accessible when needed. This principle involves measures to prevent

disruptions, downtime, or denial-of-service attacks.

4. Authentication:

 Explanation: Verifies the identity of users, systems, or entities accessing a

resource. Authentication mechanisms include passwords, biometrics, and

multi-factor authentication to ensure that only authorized entities gain

access.

5. Authorization:

 Explanation: Grants or denies access based on the authenticated identity.

Authorization ensures that users or systems have the appropriate

permissions to access specific resources or perform certain actions.

6. Accountability:

 Explanation: Imposes responsibility for actions taken within a system. This

principle ensures that activities can be traced back to specific individuals,

helping with audits, investigations, and deterrence of malicious activities.


7. Non-Repudiation:

 Explanation: Prevents individuals from denying their actions or

transactions. Non-repudiation mechanisms, such as digital signatures,

ensure that parties involved cannot dennvolvement in a particular

interaction.

Conclusion

Successful Security Officers are capable of doing a difficult and demanding job. They

have integrity, manage change, and deal with problems effectively. They are aware of

their own behaviour and how it can determine the outcome of events. They are

achievers, able to work independently to achieve their objectives.

You might also like