OFFICE SERVICES 2 prepared and compiled by JDB, CME, CDG.pptx
JustineBanan
35 views
148 slides
Oct 04, 2024
Slide 1 of 148
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
About This Presentation
It is designed to equip Diploma in Safety and Security Technology (DSST) students with advanced administrative skills tailored to the unique needs of the safety and security industry. The course covers specialized office operations, focusing on the management of sensitive and confidential documents,...
It is designed to equip Diploma in Safety and Security Technology (DSST) students with advanced administrative skills tailored to the unique needs of the safety and security industry. The course covers specialized office operations, focusing on the management of sensitive and confidential documents, security-related communication, and coordination within law enforcement and security environments. Students will also learn to utilize industry-specific office technologies, manage records, and support operational efficiency in criminology and security agencies. Emphasis is placed on professional ethics, confidentiality, and the role of administrative professionals in maintaining safety and security standards.
(justine)
Size: 8.65 MB
Language: en
Added: Oct 04, 2024
Slides: 148 pages
Slide Content
OFFICE SERVICES 2 .
COURSE OUTLINE 1) Monitor activities within area of responsibility (AOR) Lesson 1: Monitoring the access of visitors, clients, employees, vehicles and telephone calls Lesson 2: Controling the access of visitors, clients, employees, materials and vehicles Lesson 3: Conducting roving inspection and patrolling Lesson 4: Reporting untoward incidents and observations Lesson 5: Checking emergency equipment
COURSE OUTLINE: 2) Enforce access control and identification system Lesson 1: Regulating access and identification system for pedestrians, visitors and clients lesson 2: Regulating access and identification system or vehicles, deliveries, bodily search, luggage, baggage,bags and parcels Lesson 3:Regulate access and identification system for any company properties Lesson 4: Implementing SOPs for bodily search and checking luggage, baggage, bags and parcels lesson 5: Implementing SOPs in checking in checking incoming/outgoing deliveries lesson 6: Implementing SOPs in checking pull out of company properties
COURSE OUTINE: 3) Secure territorial jurisdiction of the company Lesson 1: Conducting patrolling of company premises and checking of barriers Lesson 2: Conducting ocular inspection of facilities/installation Lesson 3: Preventing access of in truders L Lesson 4:Gather security related information
COURSE OUTLINE: 4) Enforcing emergency response procedures 4.1 Participating in emergency drills 4.2 Enforcing emergency preparedness in robbery, kidnap for ransom, drug trafficking and other related crime 4.3 Enforcing bomb threat preventive measures 4.4 Enforcing civil disturbance plan 4.5 Render assistance to injured victim 4.6 Implementing evacuation procedures during emergencies
COURSE DESCRIPTION: OFFICE SERVICES 2 It is designed to equip Diploma in Safety and Security Technology (DSST) students with advanced administrative skills tailored to the unique needs of the safety and security industry. The course covers specialized office operations, focusing on the management of sensitive and confidential documents, security-related communication, and coordination within law enforcement and security environments. Students will also learn to utilize industry-specific office technologies, manage records, and support operational efficiency in criminology and security agencies. Emphasis is placed on professional ethics, confidentiality, and the role of administrative professionals in maintaining safety and security standards.
Lesson 1: Monitor the Access of Visitors, Clients, Employees, Vehicles, and Telephone Calls Importance: First Line of Defense: Controlling access is the first and often most important step in protecting a facility, its occupants, and its assets. It acts as a barrier against potential threats, preventing unauthorized entry, theft, vandalism, and other security breaches. Maintaining Order: Effective access control helps maintain order and a safe environment for everyone on the premises. It helps prevent overcrowding, disruption, and conflicts. Protecting Assets: Access control safeguards company property, sensitive information, and valuable assets from theft, damage, or unauthorized use. Ensuring Safety: By controlling who enters and leaves a facility, access control helps ensure the safety of employees, visitors, and the public. It helps prevent potential threats from entering the premises.
METHODS 1) Visitor Logs: o Purpose: To create a detailed record of visitors, allowing for tracking, accountability, and potential investigation in case of incidents. This helps identify who was on the premises at a specific time, for what purpose, and who they interacted with. o Information: Typically includes: o Visitor Information: oFull Name oCompany/Organization (if applicable) oPurpose of Visit (e.g., meeting, delivery, tour) oTime of Arrival
oTime of Departure oContact Information (phone number, email) oIdentification Presented (e.g., Driver's License, Company ID, Passport) oID Number oSignature oHost Information: oName of Employee/Host oDepartment/Area of Visit oContact Information
PROCEDURE Greeting and Identification : Greet the visitor courteously and request identification. Use a professional and welcoming tone (e.g., "Good morning, welcome to [Company Name]. May I please see your identification?"). Verification: Verify the visitor's identification against authorized lists, company databases, or visitor management systems. This ensures that the visitor is who they claim to be and that they are authorized to be on the premises. Log Entry: Complete the visitor log accurately and legibly, ensuring all required information is included. Use a pen or marker that is easy to read and avoid any errors or omissions. Notification: Notify the host of the visitor's arrival, either by phone, email, or internal communication systems. This ensures that the host is aware of the visitor's arrival and can prepare for their visit. Escort (if necessary): Escort the visitor to their destination, especially if they are unfamiliar with the premises. This provides guidance and helps ensure the visitor finds their way safely. Departure: Record the visitor's departure time and ensure they sign out of the log. This completes the visitor log entry and provides a record of the visitor's departure.
Example: Imagine a visitor arrives at a corporate office. The security guard greets them, asks for identification, verifies their information, completes the visitor log, notifies the host, and escorts them to the meeting room.
Case Study: Visitor Log Procedure Characters: Security Post : STEVEN SEAGULL Visitor: ARIANA GRANDE Setting: Security checkpoint at the entrance of a corporate office building. Scene: (Security Post is stationed at the checkpoint, with a visitor log book and pen ready.) Security Post: (Smiling and maintaining a professional demeanor) "Good morning, welcome to AVIANA INTERNATIONAL OFFICE. May I please see your identification?" (Visitor presents their identification card.) Security Post: (Examines the ID carefully) "Thank you. Let me just verify your information. " (Security Post checks the visitor's ID against the authorized list, company database, or visitor management system. Let's assume the visitor is authorized.)
Case Study: Visitor Log Procedure Security Post: "Yes, your information is confirmed. Please sign your name here, and indicate the purpose of your visit ." (Security Post points to the appropriate sections in the visitor log book.) (Visitor signs the log book and writes their purpose of visit.) Security Post: "Thank you. I'll notify your host, Mr. Donald Trump, about your arrival. Would you like me to escort you to their office?" (Visitor indicates they need directions.) Security Post: "Of course. Please follow me. Trump’s office is located on the 35th Floor (Security Post escorts the visitor to the designated area.) Security Post: " Please let me know if you have any questions. Enjoy your visit." (Visitor thanks the security Post and proceeds to their destination.)
Case Study: Visitor Log Procedure (Later, when the visitor is leaving, the security guard approaches them.) Security Post: "Good afternoon. Would you please sign out of the visitor log?" (Visitor signs the departure section of the log.) Security Post: "Thank you. Have a safe trip." (Visitor departs.)
2) SECURITY CHECKPOINTS Purpose: To screen individuals and belongings for prohibited items (weapons, explosives, unauthorized materials), verify identification, and control access to restricted areas. This is especially important for facilities with high security needs, such as government buildings, data centers, or manufacturing plants. Components: oPhysical Barriers: Gates, turnstiles, bollards, or security checkpoints with designated lanes. These create a physical barrier and guide visitors through the screening process. o Metal Detectors: Used to detect metal objects that may be concealed, such as weapons or other prohibited items. o X-ray Scanners: Used to screen bags and luggage for prohibited items, providing a visual inspection of the contents. o Security Personnel: Trained security guards who conduct checks, verify identification, and enforce access control procedures. o Visitor Log: Used to record information about visitors who pass through the checkpoint.
procedure Example: At a high-security facility, visitors pass through a checkpoint where they present their ID, pass through a metal detector, and have their bags scanned. Security personnel verify their information and grant access to authorized individuals. o Approach: Visitors approach the checkpoint and present identification. o Verification: Security personnel verify identification against authorized lists, company databases, or visitor management systems. o Screening: Visitors pass through a metal detector and their belongings are screened using X-ray scanners or manual inspection. o Log Entry: Visitor information is recorded in the log, including name, company, purpose of visit, time of entry, and identification presented. o Access Control: Access is granted or denied based on authorization levels and security protocols.
Case Study: The Unidentified Visitor Scenario: It's a busy Monday morning at a high-security government building. Security guard, John, is manning the checkpoint, which includes a gate, a metal detector, and an X-ray scanner. A visitor, Ms. Smith, approaches the checkpoint. She presents a government-issued ID, but John notices something unusual: the ID doesn't have a photo. Characters: John: Security guard at the checkpoint Ms. Smith: The visitor Problem: John is unsure about the validity of Ms. Smith's ID. He's concerned about potential security risks, but he doesn't want to cause unnecessary delays or create a scene.
possible solution Additional Verification: John could request additional identification from Ms. Smith, such as a driver's license or passport, to confirm her identity. Contact Supervisor: John could contact his supervisor for guidance on how to proceed. Refusal of Entry: John could, as a last resort, refuse Ms. Smith entry until her identity is confirmed. Resolution: John decides to contact his supervisor. He explains the situation and the missing photo on the ID. The supervisor advises John to ask Ms. Smith for additional identification and to contact the relevant department to verify her identity. John politely asks Ms. Smith for a driver's license or passport. Ms. Smith provides her driver's license, which matches the information on the government-issued ID. John then contacts the department Ms. Smith is visiting and verifies her identity. Once confirmed, John apologizes for the delay and allows Ms. Smith to proceed through the checkpoint. He records the incident in the log, including the missing photo on the initial ID and the subsequent verification steps.
ANALYSIS Importance of Verification: The case highlights the importance of thorough identification verification at security checkpoints. Even with a government- issued ID, it's crucial to double-check for authenticity and confirm the identity of visitors. Communication: John's communication with his supervisor and Ms. Smith is key to resolving the situation. He remains professional and courteous while ensuring the safety of the facility. Documentation: The incident log provides a record of the event, allowing for future analysis and improvement of security procedures. Training: This case study emphasizes the need for security personnel to be trained on procedures for handling unusual situations and how to escalate concerns to supervisors.
key takeaways Thorough Verification: Always verify the identity of visitors, even if they present government-issued IDs. Communication: Maintain clear and professional communication with visitors and supervisors. Documentation: Keep detailed records of security incidents and actions taken. Training: Ensure security personnel are trained on proper procedures and how to handle unusual situations.
3) vehicle inspections Purpose: To check vehicle IDs, inspect for unauthorized materials, and log vehicle entry/exit, ensuring security and preventing the entry of unauthorized vehicles or materials. This is crucial for facilities that receive deliveries, have restricted parking areas, or have concerns about potential security threats. Procedure: oIdentification: Check the vehicle's identification documents (registration, driver's license, company vehicle permit). oVisual Inspection: Visually inspect the vehicle for any suspicious items, modifications, or damage. Look for any signs of tampering, unusual cargo, or potential hazards. oCargo Inspection (if applicable): Inspect the cargo area for any unauthorized materials or items that may pose a risk. Verify the cargo manifest and ensure that the contents match the documentation. oLog Entry: Record vehicle information in a log, including license plate, make, model, time of entry/exit, driver's name, and any other relevant details.
Case Study: Suspicious Vehicle at the Facility Scenario: At a high-security manufacturing plant, security guard Sarah is responsible for inspecting vehicles entering the premises. A truck driver arrives to deliver materials for production. Sarah notices the truck's cargo area seems unusually full, and the driver appears nervous. Characters: Sarah: Security guard responsible for vehicle inspections Truck Driver: Operator of the delivery truck Problem: Sarah suspects that the truck may be carrying unauthorized materials or potential security threats due to the driver's behavior and the unusually full cargo area. She must determine the appropriate course of action to ensure the safety and security of the facility.
Case Study: Suspicious Vehicle at the Facility Possible Solutions: Identification Verification: Sarah can check the driver's identification documents, such as their driver's license and company permit, to confirm their identity. Visual Inspection: Sarah should visually inspect the truck for any suspicious items, signs of tampering, or unusual cargo that may pose a risk. Cargo Inspection: If applicable, Sarah must thoroughly inspect the cargo area, comparing it to the cargo manifest to ensure that the contents match the documentation. Log Entry: Sarah should record all relevant details in the vehicle log, including the license plate, make, model, time of entry/exit, driver's name, and any other pertinent information .
Case Study: Suspicious Vehicle at the Facility Resolution: Upon noticing the suspicious behavior of the truck driver and the unusual fullness of the cargo area, Sarah decides to conduct a thorough inspection. She requests the driver's identification and inspects the truck visually. Sarah discovers discrepancies between the cargo manifest and the actual contents in the cargo area. Sarah contacts her supervisor and informs them of the situation. The supervisor advises Sarah to detain the truck and driver pending a more detailed inspection by the security team. Upon further examination, unauthorized materials are found hidden among the legitimate cargo. The security team takes appropriate action to neutralize the security threat, and the incident is documented in the facility's security logs for review and analysis.
Case Study: Suspicious Vehicle at the Facility Analysis: Vigilance: The case emphasizes the importance of security personnel remaining vigilant and proactive in detecting potential security threats. Procedural Adherence: Sarah follows the standard procedures for vehicle inspections, including identification verification, visual inspection, cargo examination, and log entry, which are crucial for maintaining security. Communication: Sarah's communication with her supervisor and the security team is essential in handling the situation effectively and ensuring a coordinated response. Documentation: By documenting the incident in the security logs, the facility can review the event, identify areas for improvement, and enhance security protocols.
Case Study: Suspicious Vehicle at the Facility Key Takeaways: Thorough Inspection: Security personnel must conduct detailed inspections of vehicles to prevent unauthorized materials from entering the facility. Communication: Promptly reporting suspicious behavior and security concerns to supervisors is vital for an effective response. Adherence to Procedures: Following standard procedures for vehicle inspections ensures consistency and security protocol compliance.
4) telephone call procedures Purpose: To receive and record telephone calls, ensuring efficient communication, security, and accountability. This helps track incoming calls, prevent unauthorized access to sensitive information, and provide a record of communication . Procedure: oPrompt Answer: Answer the phone promptly and professionally, using a clear and concise greeting (e.g., "Good morning, [Company Name], how may I help you?"). oIdentification: Identify yourself and the company/department. oCaller Information : Ask for the caller's name, purpose for calling, and the person they wish to speak to. oRouting: Route the call to the appropriate recipient or department. oTransferring Calls: Transfer calls smoothly and politely, providing the caller with the name of the person they are being transferred to (e.g., "I'll connect you to [Name] in [Department]"). oHold: Place callers on hold when necessary, informing them and providing hold music (e.g., "Please hold for a moment, I'll connect you to [Name]"). oCall Recording: Record call details, including the caller's name, purpose of call, time of call, and resolution. If the call is sensitive or requires documentation, you may need to record the conversation.
Case Study: The Urgent Call Scenario: It's a busy afternoon at the security desk of a large corporation. Security guard, Emily, is answering the phone. A caller, who identifies himself as "Mr. Jones," claims to be a high-level executive from a major client company. He requests to be connected to the CEO, stating it's an urgent matter. However, Emily notices something unusual: the caller's voice sounds hesitant and unfamiliar, and he doesn't know the CEO's name. Characters: Emily: Security guard at the security desk Mr. Jones: The caller
Case Study: The Urgent Call Problem: Emily suspects that the caller may be attempting to gain unauthorized access to sensitive information or potentially disrupt operations. She needs to determine the appropriate course of action to ensure the safety and security of the offices inside the company.
Case Study: The Urgent Call Possible Solutions: Verification: Emily can attempt to verify the caller's identity by asking for additional information, such as their company ID number or a specific project they are working on. Contacting the CEO's Office: Emily can contact the CEO's office directly to confirm the caller's identity and the legitimacy of the request. Escalation: If the caller's identity cannot be verified, Emily can escalate the situation to her supervisor or security manager. Refusal: As a last resort, Emily can refuse to connect the caller to the CEO, citing security protocols.
Case Study: The Urgent Call Resolution: Emily, following her training, decides to verify the caller's identity. She politely asks Mr. Jones for his company ID number or a specific project he is working on. The caller hesitates and provides vague answers. Suspecting a potential security breach, Emily informs her supervisor about the situation. The supervisor advises her to refuse the call and to report the incident to the security manager. Emily politely informs Mr. Jones that she cannot connect him to the CEO without proper verification and that she will need to report the call to her supervisor for further investigation. The caller becomes agitated and hangs up. Emily documents the incident in the call log, including the caller's name, time of the call, the purpose of the call, and the actions she took. She then reports the incident to the security manager, who initiates a security investigation.
Case Study: The Urgent Call Analysis: Security Awareness: The case highlights the importance of security personnel being vigilant and aware of potential security threats, even through seemingly routine tasks like answering the phone . Protocol Adherence: Emily followed established procedures by verifying the caller's identity and escalating the situation to her supervisor. Communication: Emily's clear communication with the caller and her supervisor was crucial in handling the situation effectively. Documentation: The call log provides a record of the incident, allowing for further investigation and analysis.
Case Study: The Urgent Call Key Takeaways: Verification: Always verify the identity of callers, especially those requesting sensitive information or access to high-level personnel. Communication: Maintain clear and professional communication with callers, supervisors, and other security personnel. Escalation: Don't hesitate to escalate suspicious calls or incidents to your supervisor or security manager. Documentation: Keep detailed records of all calls, especially those that raise security concerns.
Case Study: The Urgent Call Key Considerations: Company Policies: Always follow specific company policies regarding visitor access and procedures. These policies will outline the specific requirements for visitor screening, identification verification, and access control. Standard Operating Procedures (SOPs): Adhere to established SOPs for monitoring access. SOPs provide detailed instructions on how to perform specific tasks, ensuring consistency and efficiency. Professionalism: Maintain a courteous and professional demeanor when interacting with individuals. Treat all visitors with respect, even if they are unfamiliar with the facility. Security Awareness: Be alert to suspicious behavior or individuals who may be attempting to gain unauthorized access. Look for signs of nervousness, evasiveness, or attempts to bypass security measures. Reporting: Report any unusual activities or potential security breaches to your supervisor. This includes any attempts to bypass security, suspicious behavior, or any incidents that may compromise security. Technology: Utilize technology, such as visitor management systems, security cameras, and access control systems, to enhance security and efficiency. These systems can automate tasks, improve accuracy, and provide valuable data for security analysis.
LESSON 2: Control the Access of Visitors, Clients, Employees, Materials, and Vehicles Importance: Controlling access goes beyond monitoring. It involves taking proactive steps to prevent unauthorized entry or movement and ensuring that only authorized individuals and materials have access to restricted areas. This is crucial for protecting sensitive information, preventing theft, and maintaining the safety of employees and visitors. Methods: 1) Keycards/Access Cards: Purpose: To restrict access to specific areas or systems based on authorization levels. This allows for granular control over who can access what and when.
Procedure: oIssuance: Issue keycards to authorized individuals, ensuring each card is linked to a specific employee or visitor. oProgramming: Program keycards with specific access permissions, granting access to certain areas or systems while restricting access to others. oInstallation: Install keycard readers at entry points to restricted areas, allowing access only when a valid card is presented. oMonitoring: Monitor keycard usage and report any irregularities, such as unauthorized access attempts, lost cards, or unusual access patterns.
Case Study: Unauthorized Access Attempt Scenario: At a large tech company, Security Officer Alex is responsible for managing access control using keycards. One day, the security system flags an unauthorized access attempt by an employee, Sarah, who tried to enter a restricted area using a keycard that wasn't assigned to her. Characters: Alex: Security Officer responsible for access control Sarah: Employee attempting unauthorized access
Case Study: Unauthorized Access Attempt Problem: The security system has detected an unauthorized access attempt by Sarah, who tried to enter a restricted area using a keycard not assigned to her. Alex needs to address the security breach promptly and prevent similar incidents in the future.
Case Study: Unauthorized Access Attempt Possible Solutions: Investigation: Alex should investigate the unauthorized access attempt to determine how Sarah obtained the keycard and why she tried to access the restricted area. Revoke Access: Immediately deactivate the unauthorized keycard to prevent future unauthorized access. Employee Training: Provide additional training to employees on the proper use of keycards and access control protocols. Enhanced Monitoring: Increase monitoring of keycard usage and access patterns to identify any irregularities.
Case Study: Unauthorized Access Attempt Resolution: Upon receiving the alert of the unauthorized access attempt, Alex immediately investigates the incident. He reviews the security footage and confirms that Sarah indeed tried to access the restricted area using an unauthorized keycard. Alex contacts Sarah and brings her in for questioning. Sarah admits to borrowing the keycard from a colleague to access some documents quickly. Alex explains the severity of unauthorized access attempts and the importance of following access control protocols. Alex deactivates the unauthorized keycard and provides Sarah with additional training on the proper use of keycards and the consequences of breaching security protocols. To prevent similar incidents in the future, Alex implements enhanced monitoring of keycard usage and access patterns. Regular audits are scheduled to ensure compliance with access control policies and to identify any irregularities promptly.
Case Study: Unauthorized Access Attempt Analysis: Security Breach Response: Alex's prompt response to the unauthorized access attempt demonstrates the importance of swift action in addressing security breaches. Training and Education: Providing additional training to employees on access control protocols helps prevent future security incidents. Monitoring and Auditing: Enhanced monitoring of keycard usage and regular audits are essential for maintaining a secure access control system. Communication: Open communication with employees regarding security policies and protocols is crucial for ensuring compliance and preventing security breaches.
Case Study: Unauthorized Access Attempt Key Takeaways: Immediate Action: Promptly address security breaches to prevent further unauthorized access attempts. Training and Education: Ensure employees are well-trained on access control protocols and the proper use of keycards. Monitoring and Auditing: Regularly monitor keycard usage and conduct audits to identify and address security vulnerabilities. Communication: Maintain clear communication with employees about security policies and the importance of compliance. In this case study, Alex effectively addresses an unauthorized access attempt by taking immediate action, providing additional training, and implementing enhanced monitoring to strengthen the company's access control system and prevent future security breaches.
2) Biometric Scanners Purpose: To enhance security by using unique biological characteristics (fingerprints, facial features, iris patterns) for identification, making it more difficult for unauthorized individuals to gain access. Types: Fingerprint Scanners: Read and verify fingerprints. Facial Recognition Systems: Analyze facial features to identify individuals. Iris Scanners: Scan and verify the unique patterns in a person's iris.
Procedure: Enrollment: Enroll authorized individuals in the system by scanning their biometric data. Verification: Use the scanner to verify identity at access points, comparing the scanned data to the enrolled database. Access Control: Grant or deny access based on the verification results. Monitoring: Monitor access logs and report any suspicious activity, such as failed attempts to access restricted areas.
Applications and Future Trends Biometric scanners are becoming increasingly prevalent in various sectors, including: Government: Used for border control, passport control, and national security. Healthcare: Verifying patient identity and ensuring secure access to medical records. Banking and Finance: Authenticating customers and preventing fraud. Retail: Enabling secure payments and loyalty programs.
Access Control and Monitoring Biometric scanners play a crucial role in access control systems, granting or denying access based on verification results. They can be integrated into various applications, including: Building Security: Controlling access to buildings, offices, and other restricted areas. Computer Access: Authenticating users to access computers, networks, and sensitive data. Time and Attendance Tracking: Recording employee work hours and attendance. Financial Transactions: Verifying the identity of individuals during financial transactions. Education: Controlling access to school buildings and student records.
The future of biometric technology is promising, with ongoing research and development focused on: Improved Accuracy and Reliability: Continuously enhancing the accuracy and reliability of biometric systems. Multimodal Biometrics: Combining multiple biometric modalities, such as fingerprint and facial recognition, for enhanced security. Mobile Biometrics: Integrating biometric technology into mobile devices for convenient and secure authentication. Artificial Intelligence (AI): Leveraging AI to improve biometric recognition algorithms and enhance security.
3) Access Control Systems: Purpose: To manage and monitor access to specific areas, systems, or data, providing a comprehensive and automated solution for access control. Components: Software: Used to configure access permissions, manage user accounts, and generate reports. Hardware: Includes readers, controllers, and other devices that interact with keycards, biometrics, or other access control methods. Security Protocols: Establish rules and procedures for granting and revoking access.
Procedure: Configuration: Configure the system to grant access based on authorization levels, time restrictions, and other criteria. User Management: Manage user accounts, assign access permissions, and revoke access when necessary. Monitoring: Monitor access logs for suspicious activity, such as unauthorized access attempts, failed logins, and unusual access patterns. Reporting: Generate reports on access activity, providing insights into security trends and potential vulnerabilities.
4) Material and Vehicle Control: Purpose: To ensure that only authorized materials and vehicles are allowed into restricted areas, preventing the introduction of contraband, unauthorized equipment, or potential hazards. Procedure: Material Inspection: Implement procedures for checking materials entering and leaving restricted areas, verifying their authenticity and ensuring they are authorized. Control Tags: Use control tags or labels to track materials, indicating their origin, destination, and authorization status. Vehicle Inspection: Inspect vehicles entering and leaving restricted areas, checking for unauthorized materials, contraband, or potential hazards. Log Maintenance: Maintain a log of all materials and vehicles entering and leaving restricted areas, recording details such as date, time, type of material, vehicle information, and authorization.
Key Considerations: Authorization Levels: Implement different access levels based on the sensitivity of areas and the level of authorization required. For example, a senior manager may have access to more areas than a junior employee. Security Protocols: Maintain strict protocols for granting access, managing keys/cards, and responding to lost or stolen cards. Monitoring and Reporting: Regularly monitor access logs, security camera footage, and other data to identify suspicious activity or attempts to gain unauthorized access. Training: Provide training to all employees on proper access control procedures, including how to use keycards, biometric scanners, and other systems. Maintenance: Regularly inspect and maintain access control systems, physical barriers, and other security equipment to ensure their effectiveness.
Case Study: The Mislabeled Shipment Scenario: It's a busy afternoon at a high-security pharmaceutical manufacturing facility. Security guard, Mark, is responsible for material and vehicle control at the main entrance. A delivery truck arrives with a shipment of raw materials, but Mark notices something amiss. The shipment label indicates it's a standard batch of pharmaceutical-grade ingredients, but the truck seems unusually heavy, and the driver appears nervous. Characters: Mark: Security guard responsible for material and vehicle control Truck Driver: Operator of the delivery truck
Problem: Mark suspects that the shipment may contain unauthorized materials or potential hazards due to the driver's behavior and the inconsistency between the label and the truck's weight. He must determine the appropriate course of action to ensure the safety and security of the facility and its sensitive materials. Possible Solutions: Material Inspection: Mark can request to inspect the contents of the shipment to verify the authenticity of the materials and ensure they align with the label. Control Tags: Mark can check for proper control tags or labels on the materials to verify their origin and authorization status. Vehicle Inspection: Mark can conduct a thorough inspection of the truck, looking for any signs of tampering, hidden compartments, or unauthorized materials. Log Entry: Mark should record all relevant details in the vehicle and material log, including the license plate, make, model, time of entry/exit, driver's name, shipment details, and any observations. Escalation: If suspicions remain, Mark can contact his supervisor or security manager to escalate the situation for further investigation.
Resolution: Mark, following his training, decides to conduct a thorough inspection. He requests the driver's identification and shipping documents, verifying their authenticity. He then proceeds to visually inspect the truck for any signs of tampering or unusual cargo. Mark notices a discrepancy between the weight of the truck and the declared weight on the shipping documents. He also observes that some of the control tags on the materials seem to have been tampered with. He requests to inspect the cargo area. Upon inspection, Mark discovers several containers of unauthorized materials hidden among the legitimate shipment. He immediately contacts his supervisor and reports the situation. The supervisor advises Mark to detain the truck and driver pending a more detailed inspection by the security team. The security team, along with facility management, conducts a thorough investigation. The unauthorized materials are identified, confiscated, and the incident is reported to the authorities. The driver is questioned, and it is revealed that the unauthorized materials were intended for a competitor and were being smuggled into the facility.
Analysis: Vigilance: The case highlights the importance of security personnel remaining vigilant and proactive in detecting potential security threats, even during routine tasks like material and vehicle control. Procedural Adherence: Mark followed the standard procedures for material and vehicle control, including identification verification, visual inspection, and log entry, which are crucial for maintaining security. Communication: Mark's communication with his supervisor and the security team was essential in handling the situation effectively and ensuring a coordinated response. Documentation: By documenting the incident in the security logs, the facility can review the event, identify areas for improvement, and enhance security protocols.
Key Takeaways: Thorough Inspection: Security personnel must conduct detailed inspections of materials and vehicles to prevent unauthorized materials from entering the facility. Communication: Promptly reporting suspicious behavior and security concerns to supervisors is vital for an effective response. Adherence to Procedures: Following standard procedures for material and vehicle control ensures consistency and security protocol compliance.
LESSON 3: CONDUCT ROVING INSPECTION AND PATROLLING 1. Power and Duties of Security Guards Security guards play a vital role in maintaining safety and security. Understanding their powers and duties is fundamental to performing their roles effectively. This section explores the legal and operational framework that guides the work of security guards. Primary Responsibilities : Security guards are tasked with protecting property, ensuring the safety of individuals, and preventing illegal activities. Their duties include: Monitoring : Keeping a close watch on surveillance systems, conducting patrols, and ensuring that all security measures are active and effective. Access Control : Managing entry and exit points, checking IDs, and ensuring that only authorized individuals enter restricted areas. Incident Response : Responding to alarms, disturbances, and emergencies, and coordinating with law enforcement when necessary.
Legal Powers : Security guards have certain legal rights, though these vary depending on local laws and regulations: Detainment : In some jurisdictions, security guards can detain individuals suspected of committing crimes, but they must do so within the legal framework of a citizen's arrest. Use of Force : Security guards may use reasonable force to protect themselves, others, or property. Excessive force can lead to legal repercussions. Collaboration with Law Enforcement : Security guards often work closely with police, assisting in the initial stages of an incident until law enforcement takes over.
11 General Orders of a Security Guard : These are the core guidelines that all security guards must follow: To take charge of the post and protect personnel and property . ( Pangalagaan ang aking puwesto at lahat ng pag-aari ng kumpanya sa abot ng aking pananaw ) To walk the post in a vigilant manner, remaining alert at all times . ( Lumakad na palaging handa at laging alerto sa pagmamasid sa lahat ng bagay o pangyayari sa pamamagitan ng paningin at pakiramdam ) To report all violations of orders or security procedures . ( Iulat ang lahat ng katiwalian o gawaing labag sa ipinatutupad sa akin)
To repeat all calls from posts more distant from the security office . ( Ipaalam lahat ng tawag mula sa mga puwestong mas malayo sa guard house kaysa sa akin) To quit the post only when properly relieved . (Hindi ko iiwan ang aking puwesto na walang kapalitan ) To receive, obey, and pass on to the next guard all orders . ( Tanggapin , sundin at ipasa sa aking kapalitan ang lahat ng utos o tagubilin galing sa aking pinuno ) To talk to no one except in the line of duty . (Hindi ako makipag-usap kaninuman ng matagalan kung wala rin namang kinalaman sa aking katungkulan )
To give the alarm in case of fire or disorder . ( Magbigay ng babala o alarma sa oras ng sunog o kaguluhan ) To call the security officer or supervisor in any case not covered by instructions . ( Ipagbigay alam sa mataas na pinuno ang anumang bagay o pangyayari na hindi nasasakop ng pinag-utos ) To salute all officers and security officials . ( Magbigay galang at sumaludo sa lahat ng pinuno ng kumpanya , ahensiya , mataas na pinuno ng gobyerno at mga opisyal ng pambansang pulisya at hukbong sandatahan , at; To be especially watchful at night and during challenging conditions . ( Lubhang mag- ingat sa gabi lalo na sa oras na delikado at suriin ang mga lumalapit sa iyo at huwag hayaan na sumama o gumala na walang kaukulang pahintulot )
2. Uniform, Equipment, and Paraphernalia Proper uniform, equipment, and paraphernalia are essential for security guards, as they not only provide the necessary tools for the job but also symbolize authority and professionalism. Uniform : Appearance : The uniform should be well-maintained, clean, and pressed, reflecting the security guard’s professionalism. A recognizable uniform also serves as a deterrent to potential criminal activities. Identification : Badges and identification cards are part of the uniform and must be worn at all times. These clearly indicate the guard's authority and affiliation.
Equipment : Security guards are typically equipped with various tools necessary for their duties. Regular checks and maintenance are required to ensure these tools are operational. Communication Devices : Radios and mobile phones are vital for keeping in touch with the security team and reporting incidents immediately. Defensive Gear : Items like batons, pepper spray, and handcuffs are for self-defense and controlling situations. Guards must be trained in their proper use to avoid misuse or escalation of violence. First Aid Kits : Security guards should be trained in basic first aid, and they should carry a well-stocked first aid kit to address minor injuries or provide immediate assistance before professional medical help arrives. Flashlights : Particularly essential for night patrols or in areas with low visibility, flashlights help security guards perform their duties effectively.
Paraphernalia : Additional items that security guards carry include: Whistles : For signaling and alerting others in emergencies. Notebooks and Pens : For recording observations, incidents, and other relevant details during patrols. Personal Protective Equipment (PPE) : Depending on the nature of the site, guards may be required to wear PPE, such as hard hats, safety goggles, or gloves, particularly in industrial or construction environments.
3. Reporting Accurate and timely reporting is crucial in security operations. Security guards must master various forms of reporting to ensure effective communication and documentation of incidents. Incident Reporting : Every incident, regardless of its severity, must be reported and documented. Security guards should be trained to: Write Clear Reports : A well-written report is factual, objective, and thorough. It should include details like the time, date, location, parties involved, and a description of the incident. Submit Reports Promptly : Delays in reporting can lead to missed opportunities for investigation or resolution. Follow the Chain of Command : Reports should be submitted to the appropriate supervisors or authorities as dictated by company policy.
Daily Activity Logs : Maintaining detailed logs of daily activities provides a record of the security guard’s patrols and duties. This can be critical in reviewing incidents or addressing complaints. What to Include : The log should include times of patrols, areas covered, any anomalies noted, equipment checks, and any interactions with individuals during the shift. Verbal Reporting : In some cases, a verbal report might be necessary, especially in emergencies. Security guards should know how to communicate clearly and concisely with supervisors or law enforcement.
4. Emergency Response (Natural and Man-Made) Security guards must be trained to respond to both natural and man-made emergencies, often serving as first responders until professional emergency services arrive. Natural Emergencies : Fires : Guards should know how to operate fire extinguishers, activate fire alarms, and assist in evacuation procedures. Earthquakes : During earthquakes, guards should ensure that people move to safe zones and help maintain order during evacuations. Floods and Hurricanes : Guards should be familiar with flood and storm preparedness protocols, such as securing outdoor equipment, guiding evacuations, and preventing access to dangerous areas.
Man-Made Emergencies : Active Shooter Situations : Security guards should be trained in active shooter protocols, which may include evacuation, lockdown procedures, and providing information to law enforcement. Bomb Threats : Guards must know the procedures for bomb threat responses, including evacuation, communication with law enforcement, and searching for suspicious packages. Chemical Spills : Guards at industrial or chemical facilities should be familiar with hazardous material protocols, including containment, evacuation, and notifying the appropriate authorities. Crisis Management : Crisis management training covers how to handle panic, coordinate with emergency services, and ensure the safety of individuals during various emergencies.
5. Physical Security System A security guard's role often involves understanding and managing physical security systems designed to protect the premises from unauthorized access, theft, or damage. Surveillance Systems : Security guards should be proficient in using and monitoring CCTV systems. Camera Placement : Understanding the placement of cameras helps guards monitor the most vulnerable or high-traffic areas. Footage Review : Guards should know how to review recorded footage for evidence or suspicious activities. Access Control : Managing Entry and Exit Points : This includes checking IDs, operating access gates, and ensuring that only authorized personnel are allowed into secure areas. Key Card and Biometric Systems : Guards must be familiar with electronic access systems, how to troubleshoot them, and how to manage access logs.
Alarm Systems : Security guards should know how to operate alarm systems, including arming and disarming them, responding to triggers, and resetting systems after an incident. Barriers and Fencing : Physical barriers, such as fences and gates, should be regularly inspected for damage or tampering. Guards must ensure that these are functioning correctly and report any vulnerabilities.
6. Observation, Description, Identification, and Control (ODIC) Effective observation, description, identification, and control (ODIC) are critical skills for security guards, enabling them to detect and respond to potential threats. Observation : Situational Awareness : Security guards must always be aware of their surroundings, paying attention to details that may indicate a security threat, such as suspicious behavior or unusual objects. Patrol Techniques : During patrols, guards should vary their routes to avoid predictability and ensure that all areas are thoroughly checked. Description : Accurate Reporting : Guards need to accurately describe individuals, vehicles, and events. This includes noting distinguishing features, behavior, and clothing to help law enforcement identify suspects or solve cases.
Identification : Checking IDs : Guards should be diligent in verifying the identity of individuals entering restricted areas or engaging in suspicious activities. Visitor Logs : Keeping accurate records of visitors and contractors ensures that there is a trail in case of incidents. Control : Crowd Management : Guards may need to manage crowds during events or emergencies, ensuring that people move in an orderly and safe manner. De-escalation : Guards should be trained in conflict resolution and de-escalation techniques to manage confrontations without the use of force.
7. Safety and Security Inspection Regular safety and security inspections are critical in preventing incidents and ensuring compliance with safety regulations. Inspection Procedures : Routine Checks : Guards should perform regular inspections of doors, windows, gates, and other access points to ensure they are secure. Emergency Equipment : Checking that fire extinguishers, alarm systems, and first aid kits are in good working condition is part of the security guard's duties. Hazard Identification : Potential Hazards : Identifying hazards such as faulty lighting, broken fences, or unsecured equipment helps prevent security breaches. Gray Areas : These are areas that may be overlooked during standard security checks, such as blind spots in surveillance coverage or less-trafficked parts of the facility.
Safety Compliance : Regulatory Standards : Guards must ensure that the premises comply with safety standards, such as those set by local fire codes or occupational health and safety regulations. Corrective Actions : Reporting and correcting any safety issues, such as blocked exits or malfunctioning security equipment, is a key responsibility.
8. Company Rules and Regulations Security guards are expected to enforce and adhere to company rules and regulations. This ensures consistency and professionalism in security operations. Code of Conduct : Professional Behavior : Security guards must maintain a high standard of professionalism, which includes being courteous, honest, and disciplined. Ethical Standards : Guards should adhere to ethical standards, such as maintaining confidentiality, avoiding conflicts of interest, and reporting misconduct. Policy Adherence : Use of Force : Guards must follow the company’s policies on the use of force, ensuring that it is only used when absolutely necessary and in a proportionate manner. Confidentiality : Guards must respect the confidentiality of the information they handle, particularly sensitive data related to security operations or incidents.
Disciplinary Procedures : Accountability : Guards are held accountable for their actions. Violations of company policies or failure to perform duties may result in disciplinary actions, including suspension or termination. Corrective Training : In some cases, guards may be required to undergo additional training if they fail to meet the company’s standards.
Situational Analysis for Students: Conducting Roving Inspection and Patrolling (LO3) Below are several real-world scenarios related to the duties of conducting roving inspection and patrolling. Each situation will be followed by a resolution, helping students understand how to apply their knowledge and skills in practical security settings. Situation 1: Assignment of Post Duties and Responsibilities Scenario : You're a security guard assigned to a large industrial facility. You are relieving a colleague at the end of their shift. The handover is rushed because your colleague is in a hurry to leave. You receive minimal information about ongoing incidents or areas that require extra attention.
Resolution : The 11 General Orders of a Security Guard emphasize the importance of a proper handover. Even if your colleague is in a hurry, it is your responsibility to insist on a thorough turnover. Ask specific questions about any ongoing security issues, equipment status, and areas that may need special attention. Document the turnover in your daily log to ensure accountability. If your colleague is uncooperative, report the incident to your supervisor, as inadequate turnover can compromise security.
Situation 2: Inspection of Equipment Scenario : During your routine patrol, you check the surveillance cameras and notice that one of the cameras covering a critical area of the building is malfunctioning. It has been like this for several days, but no one has reported it.
Resolution : Immediately report the malfunctioning camera to your supervisor and document it in your daily log. According to Standard Operating Procedures (SOP) , all security equipment must be operational at all times. Request maintenance or replacement of the camera and, in the meantime, adjust your patrol route to cover the blind spot manually. Follow up with management until the issue is resolved to prevent any security breaches.
Situation 3: Monitoring Procedures Scenario : While monitoring the security cameras, you notice a group of individuals loitering near an entrance that is rarely used. They have been standing there for about 15 minutes, and their behavior seems suspicious, but they haven't done anything illegal yet.
Resolution : Company policies and guidelines dictate that any suspicious activity should be monitored closely. Continue observing the group discreetly and document their behavior. If they remain at the location for an extended period without a legitimate reason, or if their actions escalate, you should approach them in a non-confrontational manner, ask about their purpose, and request identification if necessary. If the situation still appears suspicious, escalate it to law enforcement or your supervisor for further action.
Situation 4: Identification of Hazards and Vulnerable Areas Scenario : During your patrol, you notice that one section of the perimeter fence has been damaged, creating a potential entry point for unauthorized individuals. This area is poorly lit and not well covered by security cameras.
Resolution : According to assignment instructions, you must report and record any hazards or vulnerable areas. Immediately report the damaged fence and the inadequate lighting to your supervisor. Document your findings in your log and ensure that temporary measures, such as additional patrols or warning signs, are put in place until the fence is repaired. Recommend an update to the security system, such as adding more lighting and cameras, to cover the vulnerable area.
Situation 5: Power and Duties of Security Guards Scenario : You are on patrol when you witness a person attempting to break into a vehicle in the parking lot. You are unsure whether to intervene or just observe and report the incident to the police.
Resolution : As a security guard, your primary responsibility is to protect life and property. If you feel it is safe, you should intervene by approaching the individual from a safe distance, identifying yourself as security, and asking them to stop. Use your communication device to call for backup or law enforcement. Do not attempt to detain the individual unless necessary and within the legal framework of a citizen's arrest. If the situation becomes dangerous, prioritize your safety and await law enforcement assistance.
Situation 6: Uniform, Equipment, and Paraphernalia Scenario : During a patrol, you realize that your radio battery is low, and you have no backup available. You are working alone and have another hour to go on your shift.
Resolution : Communication devices are critical for maintaining contact with your security team, especially when working alone. If your radio is failing, find a way to quickly recharge it or replace the battery if possible. If no immediate solution is available, notify your supervisor of the communication issue and adjust your patrol route to remain in closer proximity to the security office or another team member. Avoid patrolling isolated areas until your communication device is fully functional. Always ensure that you have backup equipment before starting your shift to prevent this situation in the future.
Situation 7: Reporting Scenario : During your shift, you observe a minor incident involving two employees arguing loudly near the entrance of the facility. No physical altercation occurs, and both employees leave the area without further incident. You’re unsure whether this is worth reporting since it seemed insignificant.
Resolution : Even minor incidents should be documented and reported, as they can escalate or be part of a pattern of behavior. Write a brief report describing the argument, including the time, location, and identities of those involved, if known. This information may be valuable later if similar incidents occur or if the individuals’ behavior becomes problematic. Consistent reporting helps build a record of incidents that can assist management in addressing ongoing issues.
Situation 8: Emergency Response (Natural and Man-Made) Scenario : While on duty, you hear a fire alarm in the building. The alarm indicates that there is a fire on one of the upper floors. Some people are panicking, while others are not sure whether to evacuate.
Resolution : As a security guard, you are responsible for initiating emergency protocols. Calmly guide occupants towards the nearest exit, ensuring that evacuation procedures are followed correctly. If safe to do so, assist individuals with special needs and ensure that no one is left behind in dangerous areas. Once the building is evacuated, verify that everyone is accounted for and report the situation to the fire department. Follow the company’s emergency response plan, which should include your role in crowd management, communication with emergency services, and post-incident procedures.
Situation 9: Physical Security System Scenario : You are monitoring the building’s surveillance system when the alarm system triggers due to a door being forced open in a restricted area. However, when you check the camera feed for that area, you notice that the camera is not functioning.
Resolution : First, respond to the alarm by investigating the situation in person, if safe to do so. Simultaneously, notify your supervisor and, if necessary, law enforcement about the security breach. Follow the SOP for responding to alarm triggers, which may include securing the area, conducting a sweep, and assessing any potential damage or theft. Ensure that the malfunctioning camera is reported for immediate repair, and suggest additional temporary security measures, such as increasing patrols or placing another security officer in the area until the system is fully operational.
Situation 10: Observation, Description, Identification, and Control (ODIC) Scenario : While conducting a routine patrol, you observe a suspicious individual loitering near an employee entrance. The person is not wearing an ID badge and appears to be checking the doors.
Resolution : Utilize your ODIC skills to observe and gather as much detail about the individual as possible, such as physical characteristics, behavior, and any identifying marks or clothing. Approach the individual cautiously, introduce yourself as security, and ask for identification and the reason for being in the area. If the person has no valid reason for being there, ask them to leave and report the incident. If the individual resists or behaves aggressively, escalate the situation by notifying law enforcement. Document the encounter thoroughly, including the description and any interactions.
Situation 11: Safety and Security Inspection Scenario : During a routine security inspection, you find that one of the fire extinguishers is missing from its designated location. This is a serious safety issue, but you are unsure whether it has simply been misplaced or used in an emergency without proper reporting.
Resolution : Immediately report the missing fire extinguisher to your supervisor and document the issue in your report. Conduct a search of nearby areas to see if the extinguisher has been moved. If it cannot be located, ensure that a replacement is ordered as soon as possible to maintain fire safety standards. Additionally, review the surveillance footage, if possible, to determine what happened to the extinguisher. Suggest a check of all safety equipment across the premises to ensure compliance with safety regulations.
Situation 12: Company Rules and Regulations Scenario : While on duty, you witness a fellow security guard violating company policy by using excessive force to remove a trespasser from the property. You are unsure whether to report the incident, as this colleague is your friend and you worry about the consequences for them.
Resolution : As a security guard, your first duty is to uphold the law and company policies. The use of excessive force is a serious violation, and it must be reported, regardless of your personal relationship with the colleague. Document the incident as accurately as possible and submit a report to your supervisor. Failing to report such behavior could lead to further incidents and legal consequences for the company and yourself. It’s important to maintain professionalism and integrity in your role, ensuring that the security team operates within ethical and legal guidelines.
LESSON 4: Report Untoward Incidents and Observations Learning Objective : LO4 focuses on the security guard's responsibilities in accurately reporting incidents, hazards, and observations in accordance with Standard Operating Procedures (SOP) and company policies. Proper communication and adherence to protocols are essential in maintaining safety and ensuring that issues are addressed promptly and effectively. 1. Power and Duties of Security Guards Security guards serve as the first line of defense in various environments, whether it be corporate offices, retail spaces, residential complexes, or industrial facilities. Their responsibilities can be broadly categorized as monitoring, reporting, and responding to incidents. These duties are defined by legal regulations, the security company’s SOPs, and the specific policies of the client they serve. Authority to Observe and Report Key Point : Security guards are not law enforcement officers; they do not have arrest powers, except under citizen's arrest in certain situations. Their primary authority lies in observing and reporting suspicious activities to the appropriate authorities or management. Responsibilities : Guards must vigilantly monitor assigned areas, identifying any suspicious activity, hazards, or breaches of protocol. Documentation is critical. A guard’s reports should be accurate, clear, and thorough, as they may serve as legal documents or assist in investigations.
Enforcing Rules and Regulations Key Point : Security guards must ensure that employees, visitors, and contractors comply with company rules and regulations. This includes enforcing access control, monitoring CCTV systems, conducting routine checks, and ensuring that safety protocols are followed. Responsibilities : Guards are often required to confront individuals who violate company policies, such as accessing restricted areas or engaging in unsafe practices. They must handle these situations calmly and professionally, ensuring that they enforce the rules without escalating conflicts unnecessarily. Responding to Emergencies Key Point : Security guards are often the first responders to emergencies, whether it’s a fire, medical emergency, or security breach. Quick thinking and adherence to emergency protocols are vital. Responsibilities : During an emergency, guards must assess the situation, alert the appropriate authorities, and assist in evacuation or containment as needed. They may also need to provide first aid or manage crowd control until help arrives.
2. Communication Effective communication in security operations is essential for accurate reporting, efficient coordination, and clear information exchange. Below are the expanded examples for each communication component: Military Time Purpose: The 24-hour clock system eliminates confusion between AM and PM, ensuring clarity in reporting and scheduling. Examples: 1:00 AM is recorded as 0100 hours. 3:30 PM is recorded as 1530 hours. 6:45 AM is recorded as 0645 hours. 11:59 PM is recorded as 2359 hours. 9:00 PM is recorded as 2100 hours.
Phonetics Sign Purpose: The phonetic alphabet is used to spell out critical information, preventing miscommunication due to similar-sounding letters. Examples: A = Alpha B = Bravo C = Charlie D = Delta E = Echo F = Foxtrot G = Golf H = Hotel
I = India J = Juliet K = Kilo L = Lima M = Mike N = November O = Oscar P = Papa Q = Quebec R = Romeo S = Sierra
T = Tango U = Uniform V = Victor W = Whiskey X = X-ray Y = Yankee Z = Zulu
Ten Codes (Radio Communications) Purpose: Ten codes are used to communicate common situations or instructions quickly and clearly over radio. 10-1: Unable to copy, change location 10-2: Signal good 10-3: Stop transmitting 10-4: Acknowledgment (message received) 10-5: Relay (to) 10-6: Busy (unable to respond) 10-7: Out of service 10-8: In service
10-9: Repeat (message) 10-10: Negative 10-11: Out of service (with a request for maintenance) 10-12: Visitors (or individuals) present 10-13: Weather/road conditions 10-14: Escort (or convoy) service 10-15: Prisoner in custody 10-16: Pick up (or deliver) documents 10-17: Urgent (or priority) business 10-18: Anything for us? 10-19: Return to base (or location) 10-20: Location
10-21: Call by telephone 10-22: Disregard (or cancel) previous information 10-23: Arrived at scene 10-24: Assignment completed 10-25: Report in person (or meet) 10-26: Detaining subject 10-27: Driving license information 10-28: Vehicle registration information 10-29: Check for wanted or stolen 10-30: Unnecessary use of radio 10-31: Crime in progress 10-32: Man with a gun
10-33: Emergency (or urgent) situation 10-34: Riot (or disturbance) 10-35: Major crime alert 10-36: Correct time 10-37: Suspicious person (or vehicle) 10-38: Stopping vehicle 10-39: Urgent (or emergency) response 10-40: Silent (or no) alarm 10-41: Beginning tour of duty 10-42: Ending tour of duty 10-43: Information (or message) 10-44: Request for assistance
10-45: Animal control 10-46: Assist with a disabled vehicle 10-47: Emergency Road repair 10-48: Traffic report 10-49: Traffic light out 10-50: Accident (vehicle accident) 10-51: Wrecker needed 10-52: Ambulance needed 10-53: Road blocked 10-54: Livestock on roadway 10-55: Intoxicated driver 10-56: Intoxicated person
10-57: Hit and run (accident) 10-58: Direct traffic 10-59: Convoy (or escort) service 10-60: Squad (unit) in vicinity 10-61: Personnel in vicinity 10-62: Reply (or acknowledge) 10-63: Prepare to copy (or write) 10-64: Message received 10-65: Suspicious vehicle 10-66: Suspicious person 10-67: Request for records check
10-68: Complete (or finish) report 10-69: Information received 10-70: Fire 10-71: Advise nature of fire 10-72: Report progress 10-73: Weather report 10-74: Negative response 10-75: Incomplete report 10-76: En route (or heading to) 10-77: Estimated time of arrival 10-78: Request for assistance (or backup) 10-79: Notify next of kin
10-80: Chase in progress 10-81: Breathalyzer report 10-82: Restroom break 10-83: Check location 10-84: If you are out of service, advise 10-85: Delayed response 10-86: In service 10-87: Pickup or deliver 10-88: Advise ETA (Estimated Time of Arrival) 10-89: Bomb threat 10-90: Bank alarm 10-91: Animal control
10-92: Subject in custody 10-93: Blocked Road 10-94: Traffic stop 10-95: Suspicious activity 10-96: Mental case 10-97: Check 10-98: Prisoner release 10-99: Wanted or stolen information
Hand Signals (Warnings) Purpose: Hand signals are used for silent communication in situations where verbal or radio communication is not practical. 1. Stop Description: Raise one hand with the palm facing outwards. Usage: Used to signal an immediate halt to actions or movement. 2. Freeze Description: Both hands up, palms facing out. Usage: Indicates that someone should stop moving or remain in place. 3. Watch Description: Pointing two fingers towards your eyes. Usage: Signals someone to observe or pay close attention to something.
4. Go Description: Extend one arm outwards and then sweep it forward. Usage: Used to indicate that it’s safe to proceed or move forward. 5. Move Description: Use one hand to make a sweeping motion in the direction you want someone to go. Usage: Directs someone to move in a specific direction. 6. Come Here Description: Wave your hand towards yourself. Usage: Indicates that someone should approach or come closer. 7. Direction Description: Point in a specific direction using one hand. Usage: Directs individuals or teams to move or focus in a particular direction.
8. Emergency Description: Wave both hands rapidly above your head. Usage: Signals that there is an urgent situation requiring immediate attention. 9. Quiet Description: Place a finger over your lips. Usage: Indicates that silence or reduced noise is required. 10. Check Description: Raise one hand, with fingers extended and then tap the palm with the other hand. Usage: Signals to check or verify something. 11. Follow Me Description: Extend an arm out in front and make a beckoning motion with your hand. Usage: Indicates that others should follow you.
12. No Entry Description: Cross both arms in front of your chest. Usage: Signals that entry is prohibited or that someone should not enter an area. 13. Assistance Needed Description: Raise both hands with palms facing up and open. Usage: Requests immediate help or backup. 14. Danger Description: Hold one hand up and make a circular motion. Usage: Alerts to the presence of potential danger or a hazardous condition. 15. Clear Description: Sweep both hands to the sides, palms down. Usage: Indicates that an area or situation is safe and clear.
16. Search Description: Make a sweeping motion with one hand, moving it side-to-side. Usage: Signals the need to search an area or inspect something thoroughly. 17. Confirm Description: Raise one hand with the index finger extended and then make a nodding motion. Usage: Requests confirmation or acknowledgment of a message or instruction. 18. Hold Position Description: Extend both arms out to the sides, palms facing forward. Usage: Indicates that individuals should maintain their current position.
19. Report Description: Use one hand to make a circular motion near your ear. Usage: Signals that a report or update is required. 20. Prepare Description: Hold both hands in front of you, palms up, and make a preparatory motion. Usage: Indicates that individuals should get ready or prepare for an action or response. These hand signals help ensure clear and effective communication in various scenarios, especially when verbal instructions may not be feasible or could compromise operational security.
Acronyms and Abbreviations Purpose: Acronyms and abbreviations are used to streamline communication by shortening commonly used terms and phrases. Examples: SOP: Standard Operating Procedure. PDR: Post Duties and Responsibilities. CCTV: Closed-Circuit Television. TSA: Transportation Security Administration. ID: Identification. HQ: Headquarters. NCIC: National Crime Information Center. AED: Automated External Defibrillator. FBI: Federal Bureau of Investigation. PD: Police Department. EMS: Emergency Medical Services.
Correspondence Purpose: Written correspondence provides a formal method of documenting and communicating information regarding security activities. Examples: Incident Reports: Detailed accounts of specific security-related events. For example: Incident Report: "On August 18, 2024, at approximately 1430 hours, a suspicious individual was observed loitering near the main entrance. The individual was described as wearing a blue hoodie and carrying a large backpack. The individual left the area when approached and could not provide identification." Daily Logs: Routine records of activities and observations during a guard’s shift. For example: Daily Log: "Shift from 0800 to 1600 hours. Patrolled the north perimeter at 0900, no unusual activity. Checked CCTV systems at 1100, all operational. Noticed a broken light in the east parking lot at 1500, reported to maintenance."
Memoranda: Formal documents communicating policy changes or updates. For example: Memorandum: "To all security personnel: Effective immediately, all access points must be checked every hour. New access control cards will be issued starting August 20, 2024. Please ensure that you collect your new card from the security office." By understanding and applying these communication components, security guards can enhance their effectiveness in reporting incidents, coordinating actions, and maintaining clear and accurate communication.
Understanding Client Needs Key Point : Each client may have different security needs depending on the nature of their business, the layout of their facility, and any specific security concerns they may have. Responsibilities : Security guards must be thoroughly briefed on the client’s expectations, including access control procedures, patrol schedules, emergency response plans, and confidentiality requirements. Guards should regularly communicate with clients to ensure that their security needs are being met. Customizing Security Procedures Key Point : Security procedures should be adapted to the specific needs of the client. This may involve adjusting patrol routines, implementing additional checks during after-hours, or providing extra attention to sensitive areas, such as data centers or executive offices. Responsibilities : Guards must remain flexible and willing to adjust their routine as needed to meet the client’s security requirements. They should also stay informed about any changes in client policies or new threats that may require adjustments to security procedures.
Client-Specific Reporting Key Point : Reporting requirements vary from one client to another. Some clients may require daily or weekly summaries of security activities, while others may focus on real-time incident reporting. Responsibilities : Guards must follow the reporting protocols established by the client, ensuring that they document incidents according to the client’s preferred format and frequency. Regular communication with the client is essential to maintain trust and ensure that their security needs are met.
Situational Examples and Reporting Requirements Security guards often face various real-world scenarios that require accurate reporting and appropriate responses. Below are examples of such situations, along with the necessary resolutions. Fire Hazards Scenario : During a routine patrol, you notice that an emergency exit is blocked by storage boxes in a warehouse, creating a significant fire hazard. Resolution : According to SOP, immediately report the fire hazard to your supervisor, take pictures to document the blocked exit, and ensure the boxes are removed. Follow up by completing an incident report detailing the location of the hazard, actions taken, and recommendations to prevent future occurrences.
Questionable Elements Scenario : While patrolling a facility, you observe an individual loitering near a restricted area. The person appears out of place and is not displaying any identification. Resolution : Monitor the individual discreetly, and use the radio to report the suspicious behavior using ten codes and phonetic signs. Approach the person to inquire about their business in the area. If they cannot provide valid identification or a reason for their presence, follow the appropriate protocol for escalating the situation to law enforcement or your supervisor.
Property Damages and Losses Scenario : You discover that a window in an office building has been broken, and several valuable items appear to be missing. There are no obvious signs of forced entry, suggesting that the theft may have been an inside job. Resolution : Secure the scene to prevent further tampering, and notify your supervisor and the appropriate authorities. Document the damage and losses in a detailed incident report, including any relevant details such as potential witnesses, time, and location. Follow company policies on preserving evidence, such as avoiding touching anything at the crime scene until investigators arrive.
Violations of Company Rules Scenario : You witness an employee entering a restricted area without proper authorization. When confronted, the employee claims they have permission but cannot provide the necessary credentials. Resolution : Politely ask the employee to leave the restricted area and report the incident to your supervisor. Document the violation in your daily log, including the employee's name, the time of the incident, and any relevant details. If this is a repeat offense, escalate the matter to HR or management in accordance with company policy. Channeling Communication Scenario : You witness a security breach that needs to be reported to multiple parties, including your supervisor, the client, and possibly law enforcement. The situation is evolving quickly, and clear, accurate communication is critical. Resolution : Follow the company’s chain of command, ensuring that you inform all necessary parties promptly. Use the appropriate communication tools—radio for immediate reporting and written reports for detailed documentation. Adhere to communication protocols, such as using military time, ten codes, and phonetic signs, to avoid confusion. Maintain a log of all communications made during the incident to ensure that no details are overlooked.