| |
| |
About the Author | |
| |
| |
Preface | |
| |
| |
Table of Contents | |
| |
| |
| |
Introduction | |
| |
| |
| |
Introduction | |
| |
| |
| |
Overview of the Law, Why the State Wants Potential Guards Here | |
| |
| |
| |
Eight hour Pre assignment Training Course, What Will Be Learned | |
| |
| |
| |
Miscellaneous Information | |
| |
| |
| |
Conclusion | |
| |
| |
| |
The Role of a Security Guard | |
| |
| |
| |
Introduction | |
| |
| |
| |
Functions of a Security Guard | |
| |
| |
| |
Primary Directives | |
| |
| |
| |
Duties of a Security Guard | |
| |
| |
| |
Emergency Situations | |
| |
| |
| |
Responsibilities of the Security Officer | |
| |
| |
| |
Types of Posts | |
| |
| |
| |
History and Current State of Affairs | |
| |
| |
| |
Supervision | |
| |
| |
| |
Conclusion | |
| |
| |
| |
Legal Powers and Limitations | |
| |
| |
| |
Introduction | |
| |
| |
| |
Origins for Arrest Authority and Liability | |
| |
| |
| |
Factors That Support Arrests | |
| |
| |
| |
Definitions of Felony, Misdemeanor and Violations and Offense | |
| |
| |
| |
Arrests by a Security Officer or a Private Person | |
| |
| |
| |
Use of Force in Effecting an Arrest or Preventing an Escape | |
| |
| |
| |
Article 10, Definitions | |
| |
| |
| |
Culpability | |
| |
| |
| |
Common Penal Law Violations | |
| |
| |
| |
Conclusion | |
| |
| |
| |
Emergency Situations | |
| |
| |
| |
Introduction | |
| |
| |
| |
Potential Emergencies | |
| |
| |
| |
Emergency Preparedness Plan | |
| |
| |
| |
Miscellaneous Information | |
| |
| |
| |
Conclusion | |
| |
| |
| |
Communication and Public Relations | |
| |
| |
| |
Introduction | |
| |
| |
| |
Components of the Communication Process | |
| |
| |
| |
Uses of Communication | |
| |
| |
| |
Three Methods of Communication | |
| |
| |
| |
Obstacles to Effective Communication | |
| |
| |
| |
Components Necessary to Be an Effective Communicator | |
| |
| |
| |
Communication Mediums | |
| |
| |
| |
Communicating with a Diverse Population | |
| |
| |
| |
Information Dissemination to the Public and the Media | |
| |
| |
| |
Conclusion | |
| |
| |
| |
Access Control | |
| |
| |
| |
Introduction | |
| |
| |
| |
Basic Elements and Identification | |
| |
| |
| |
Threat Potential and Needs Assessment | |
| |
| |
| |
Three Threats to Industry and Government | |
| |
| |
| |
Types of Access Control | |
| |
| |
| |
Barriers and Controlled Access Points | |
| |
| |
| |
Acceptable Forms of Identification | |
| |
| |
| |
Threats Other than Sabotage, Espionage and Terrorism | |
| |
| |
| |
Conclusion | |
| |
| |
| |
Ethics and Conduct | |
| |
| |
| |
Introduction | |
| |
| |
| |
Defining a Code of Ethics | |
| |
| |
| |
Why a Code of Ethics for Security Guards | |
| |
| |
| |
the Code of Ethics | |
| |
| |
| |
Benefits of a Code of Ethics | |
| |
| |
| |
Unethical Practices | |
| |
| |
| |
Protection of Life and Property | |
| |
| |
| |
Discharge Duties Without Prejudice | |
| |
| |
| |
Training and Education | |
| |
| |
| |
Professional Conduct: Fitness for Duty | |
| |
| |
| |
Conclusion | |
| |
| |
| |
Report Writing | |
| |
| |
| |
Introduction | |
| |
| |
| |
the Basics of Report Writing | |
| |
| |
| |
the Narrative Report | |
| |
| |
| |
Report Forms and Logs for the Work Site | |
| |
| |
| |
Field Notes | |
| |
| |
| |
Proofreading | |
| |
| |
| |
Grammatical Considerations in Proofreading | |
| |
| |
| |
Miscellaneous Information | |
| |
| |
| |
Conclusion | |
| |
| |
| |
Incident Command Systems | |
| |
| |
| |
Introduction | |
| |
| |
| |
Incident Command System (ICS) | |
| |
| |
| |
ICS Unified Command | |
| |
| |
| |
Conclusion | |
| |
| |
| |
Terrorism | |
| |
| |
| |
Introduction | |
| |
| |
| |
Potential Targets | |
| |
| |
| |
Immediate Actions | |
| |
| |
| |
General Precautions | |
| |
| |
| |
(ERG) Emergency Response Guide | |
| |
| |
| |
Chemical Agents | |
| |
| |
| |
Biological Agents | |
| |
| |
| |
Radiological Materials and Nuclear Weapons | |
| |
| |
| |
Explosive Devices | |
| |
| |
| |
Conclusion | |
| |
| |
Index | |