667
CPP CPP •Study Guide # 2 • 1 - 667

CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Embed Size (px)

Citation preview

Page 1: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

CPPCPP

•Study Guide # 2

•1 - 667

Page 2: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Sensitive InformationSensitive Information

Sample Questions

Page 3: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

1. Any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is:

• a. A monopoly

• b. An unfair trade practice

• c. A trade secret

• d. A patent

Page 4: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

1. Any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is:

• a. A monopoly

• b. An unfair trade practice

• c. A trade secret

• d. A patent

Page 5: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

2. Probably the main reason for loss of sensitive information is:

• a. Inadvertent disclosure

• b. Deliberately stolen by outsider

• c. Industrial espionage

• d. Deliberately stolen by insider

Page 6: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

2. Probably the main reason for loss of sensitive information is:

• a. Inadvertent disclosure

• b. Deliberately stolen by outsider

• c. Industrial espionage

• d. Deliberately stolen by insider

Page 7: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

3. The primary tool of pre-employment screening is the:

• a. Interview

• b. Application form

• c. The investigation

• d. The investigator

Page 8: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

3. The primary tool of pre-employment screening is the:

• a. Interview

• b. Application form

• c. The investigation

• d. The investigator

Page 9: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

4. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to:• a. Alert senior management to marketplace

changes in order to prevent surprise• b. Alert senior management as to the personal

habits of competitive senior management

• c. Alert government intelligence agencies to marketplace changes

• d. Alert senior management to changes in protocol in foreign countries

Page 10: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

4. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to:• a. Alert senior management to marketplace

changes in order to prevent surprise

• b. Alert senior management as to the personal habits of competitive senior management

• c. Alert government intelligence agencies to marketplace changes

• d. Alert senior management to changes in protocol in foreign countries

Page 11: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

5. The instrument used to monitor telephone call by providing a record of all numbers dialed from a particular phone is called:

• a. A wiretap

• b. A bug

• c. An electronic surveillance

• d. A pen register

Page 12: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

5. The instrument used to monitor telephone call by providing a record of all numbers dialed from a particular phone is called:

• a. A wiretap

• b. A bug

• c. An electronic surveillance

• d. A pen register

Page 13: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

6. A clandestine listening device, generally a small hidden microphone and radio transmitter is known as :

• a. A bug

• b. A wiretap

• c. A tempest

• d. A beeper

Page 14: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

6. A clandestine listening device, generally a small hidden microphone and radio transmitter is known as :

• a. A bug

• b. A wiretap

• c. A tempest

• d. A beeper

Page 15: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

7. A microphone with a large disk-like attachment used for listening to audio from great distances is known as:

• a. Contact microphone

• b. Spike microphone

• c. Parabolic microphone

• d. Moving coil microphone

Page 16: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

7. A microphone with a large disk-like attachment used for listening to audio from great distances is known as:

• a. Contact microphone

• b. Spike microphone

• c. Parabolic microphone

• d. Moving coil microphone

Page 17: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

8. Sound waves too high in frequency to be heard by the human ear, generally above 20 KHZ are known as:

• a. Microwaves

• b. Ultrasonic

• c. High frequency

• d. Short-wave

Page 18: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

8. Sound waves too high in frequency to be heard by the human ear, generally above 20 KHZ are known as:

• a. Microwaves

• b. Ultrasonic

• c. High frequency

• d. Short-wave

Page 19: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

9. Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is “don’t discuss sensitive information” and the other is:• a. To use a wire tap detector

• b. To use a radio jammer

• c. To use an audio jammer

• d. To use encryption equipment

Page 20: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

9. Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is “don’t discuss sensitive information” and the other is:• a. To use a wire tap detector

• b. To use a radio jammer

• c. To use an audio jammer

• d. To use encryption equipment

Page 21: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

10. The unauthorized acquisition of sensitive information is known as:

• a. Industrial espionage

• b. Embezzlement

• c. Larceny

• d. False pretenses

Page 22: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

10. The unauthorized acquisition of sensitive information is known as:

• a. Industrial espionage

• b. Embezzlement

• c. Larceny

• d. False pretenses

Page 23: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

11. Proprietary information is:

• a. Information which must be so classified under government order

• b. Private information of highly sensitive character

• c. Defense data which must be classified according to federal regulations

• d. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly

Page 24: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

11. Proprietary information is:

• a. Information which must be so classified under government order

• b. Private information of highly sensitive character

• c. Defense data which must be classified according to federal regulations

• d. Anything that an enterprise considers relevant to its status or operations

and does not want to disclose publicly

Page 25: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

12. A trade secret is:

• a. Any formula, pattern, device or compilation of information which is used in one’s business and which gives that business an opportunity to

gain an advantage over competitors who do not know or use it

• b. All information about a company which the company desires to protect

• c. Information of a company which is registered as such with the Patent Office

• d. Information so designated by the government

Page 26: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

12. A trade secret is:

• a. Any formula, pattern, device or compilation of information which is used in one’s business and which gives that business an opportunity to

gain an advantage over competitors who do not know or use it

• b. All information about a company which the company desires to protect

• c. Information of a company which is registered as such with the Patent Office

• d. Information so designated by the government

Page 27: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

13. The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the:

• a. Time Domain Reflectometer

• b. Remote Maintenance Access Terminal

• c. Current Carrier Signaling Port

• d. Internal and Remote Signal Port

Page 28: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

13. The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the:

• a. Time Domain Reflectometer

• b. Remote Maintenance Access Terminal

• c. Current Carrier Signaling Port

• d. Internal and Remote Signal Port

Page 29: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

14. Which of the following is generally not true in regard to proprietary information?• a. Secret information does not have to be

specifically identifiable• b. Secret information must be such that it

can be effectively protected• c. The more narrowly a business defines what

it regards as secret, the easier it is to protect that body of information

• d. It is difficult to protect as a trade secret that which can be found in publicly

accessible sources

Page 30: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

14. Which of the following is generally not true in regard to proprietary information?• a. Secret information does not have to be

specifically identifiable• b. Secret information must be such that it

can be effectively protected• c. The more narrowly a business defines what

it regards as secret, the easier it is to protect that body of information

• d. It is difficult to protect as a trade secret that which can be found in publicly

accessible sources

Page 31: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

15. With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when:

• a. There is absence of evidence that an owner has taken reasonable precautions to

protect confidential information• b. The trade secret was not registered• c. The trade secret did not involve national

defense information• d. The trade secret was not in current use

Page 32: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

15. With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when:

• a. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information

• b. The trade secret was not registered• c. The trade secret did not involve national

defense information• d. The trade secret was not in current use

Page 33: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

16. The class of person under a duty to safeguard a proprietary secret is known as:

• a. Agents

• b. Principals

• c. Fiduciaries

• d. Business Associates

Page 34: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

16. The class of person under a duty to safeguard a proprietary secret is known as:

• a. Agents

• b. Principals

• c. Fiduciaries

• d. Business Associates

Page 35: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

17. Which of the following is not a correct statement, or a general rule, involving the protection of proprietary information?

• a. By operation of common law employees are presumed to be fiduciaries to the extent they may not disclose secrets of their employers without authorization

• b. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship

• c. Other than employees, any other persons to be bound to secrecy must agree to be so bound

• d. Any agreements to be bound must always be in writing and are not implied from acts

Page 36: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

17. Which of the following is not a correct statement, or a general rule, involving the protection of proprietary information?

• a. By operation of common law employees are presumed to be fiduciaries to the extent they may not disclose secrets of their employers without authorization

• b. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship

• c. Other than employees, any other persons to be bound to secrecy must agree to be so bound

• d. Any agreements to be bound must always be in writing and are not implied from acts

Page 37: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

18. Probably the chief reason for the loss of information about sensitive operations is:

• a. Deliberately stolen by an outsider

• b. Loss by fire or other disaster

• c. Deliberately stolen by insider

• d. Lost through inadvertent disclosure

Page 38: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

18. Probably the chief reason for the loss of information about sensitive operations is:

• a. Deliberately stolen by an outsider

• b. Loss by fire or other disaster

• c. Deliberately stolen by insider

• d. Lost through inadvertent disclosure

Page 39: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

19. The term “eavesdropping” refers to:

• a. Wiretapping only

• b. “Bugging” only

• c. Both wiretapping and “bugging”

• d. Mail covers

Page 40: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

19. The term “eavesdropping” refers to:

• a. Wiretapping only

• b. “Bugging” only

• c. Both wiretapping and “bugging”

• d. Mail covers

Page 41: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

20. A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as:

• a. Carbon microphone

• b. Dynamic microphone

• c. Contact microphone

• d. Parabolic microphone

Page 42: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

20. A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as:

• a. Carbon microphone

• b. Dynamic microphone

• c. Contact microphone

• d. Parabolic microphone

Page 43: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

21. A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation is:

• a. Carbon microphone

• b. Dynamic microphone

• c. Contact microphone

• d. Parabolic microphone

Page 44: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

21. A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation is:

• a. Carbon microphone

• b. Dynamic microphone

• c. Contact microphone

• d. Parabolic microphone

Page 45: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

22. Which of the following is not true with regard to electronic eavesdropping:

• a. A listening device installed in a wire will cause a crackling sound, click or other noise than can be heard on the line

• b. An effective countermeasures survey to detect evidence of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment

• c. All wiring should be traced out and accounted for in a countermeasures survey

• d. In a countermeasures survey to detect electronic eavesdropping. A physical search should be utilized as well as an electronic search

Page 46: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

22. Which of the following is not true with regard to electronic eavesdropping:

• a. A listening device installed in a wire will cause a crackling sound, click or other noise than can be heard on the line

• b. An effective countermeasures survey to detect evidence of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment

• c. All wiring should be traced out and accounted for in a countermeasures survey

• d. In a countermeasures survey to detect electronic eavesdropping. A physical search should be utilized as well as an electronic search

Page 47: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

23. In designing a proprietary information protection program, the area of greatest vulnerability is:

• a. Personnel files

• b. Marketing data

• c. Employees

• d. Computers

Page 48: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

23. In designing a proprietary information protection program, the area of greatest vulnerability is:

• a. Personnel files

• b. Marketing data

• c. Employees

• d. Computers

Page 49: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

24. Two of the three most common methods of information losses are inadvertent disclosure and industrial espionage. Which of the following is the third:

• a. Newspaper articles

• b. Television

• c. Magazine articles

• d. Theft by an insider

Page 50: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

24. Two of the three most common methods of information losses are inadvertent disclosure and industrial espionage. Which of the following is the third:

• a. Newspaper articles

• b. Television

• c. Magazine articles

• d. Theft by an insider

Page 51: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

25. Which of the following statements is incorrect with regard to an information security program?

• a. A good information security program will provide absolute protection against an enemy spy

• b. The information security program is an attempt to make theft of sensitive information

difficult, not necessarily eliminate it

• c. A trust relationship must be established and maintained with employees

• d. The good will and compliance of employees is crucial for success

Page 52: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

25. Which of the following statements is incorrect with regard to an information security program?

• a. A good information security program will provide absolute protection against an enemy spy

• b. The information security program is an attempt to make theft of sensitive information

difficult, not necessarily eliminate it

• c. A trust relationship must be established and maintained with employees

• d. The good will and compliance of employees is crucial for success

Page 53: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

26. Vital records normally constitute the following percentage of the company’s total records:

• a. 2%

• b. 5%

• c. 10%

• d. 15%

Page 54: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

26. Vital records normally constitute the following percentage of the company’s total records:

• a. 2%

• b. 5%

• c. 10%

• d. 15%

Page 55: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

27. A specially constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as:

• a. Parabolic microphone

• b. Special audio microphone

• c. Contact microphone

• d. Surreptitious microphone

Page 56: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

27. A specially constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as:

• a. Parabolic microphone

• b. Special audio microphone

• c. Contact microphone

• d. Surreptitious microphone

Page 57: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

28. “Social engineering” is:• a. The conversation involved in the beginning of a

romantic relationship• b. A function of the personnel department in which

like persons are teamed together in workshops or seminars for maximum productivity

• c. The subtle elicitation of information without revealing the true purpose of the call

• d. The specific design of a business structure to facilitate the interaction of the inhabitants

Page 58: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

28. “Social engineering” is:• a. The conversation involved in the beginning of a

romantic relationship• b. A function of the personnel department in which

like persons are teamed together in workshops or seminars for maximum productivity

• c. The subtle elicitation of information without revealing the true purpose of the call

• d. The specific design of a business structure to facilitate the interaction of the inhabitants

Page 59: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

29. A former employee, who had access to your trade secret information, is now employed by a competitor and is apparently using the trade secret information to gain market share. There are several serious factors you should consider before you institute litigation in the matter. Which of the following is not a serious factor to be considered?• a. You may have to expose the very secrets you are

attempting to protect

• b. The cost of the litigation may exceed the value of the secret information

• c. You may lose your case

• d. Other employees may leave the company and attempt to use trade secret information in the business of a new employer

Page 60: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

29. A former employee, who had access to your trade secret information, is now employed by a competitor and is apparently using the trade secret information to gain market share. There are several serious factors you should consider before you institute litigation in the matter. Which of the following is not a serious factor to be considered?• a. You may have to expose the very secrets you are

attempting to protect

• b. The cost of the litigation may exceed the value of the secret information

• c. You may lose your case

• d. Other employees may leave the company and attempt to use trade secret information in the business of a new employer

Page 61: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

30. Electromagnetic radiation is detectable electromagnetic energy is generated by electronic information processing devices. Which of the following is used to protect very sensitive equipment?

• a. A current carrier device

• b. Pneumatic cavity shielding

• c. Tempest shielding

• d. Pen register shielding

Page 62: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

30. Electromagnetic radiation is detectable electromagnetic energy is generated by electronic information processing devices. Which of the following is used to protect very sensitive equipment?

• a. A current carrier device

• b. Pneumatic cavity shielding

• c. Tempest shielding

• d. Pen register shielding

Page 63: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Significant NotesSignificant Notes

Sensitive Information

Page 64: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The basis for any industrial espionage prevention program is

protection of information

Page 65: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

There are many kinds of information which a company would like to keep in a confidential status but not all such information could be classified as “trade secrets”

Page 66: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

One definition of “trade secret” is “information including formula, pattern, compilation, program, device, method, technique or process that;

a. Derives independent economic value, actual or potential, from not being generally known to and not being readily ascertainable by proper means, by other persons who can obtain economic value from its disclosure or use, and

b. Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

Page 67: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Proprietary information” is information of value owned by or entrusted to a company which relates to the operations of the company and which has not been disclosed publicly

Page 68: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

A “trade secret” is part of a company’s proprietary information but not all propriety information necessarily fits the definition of “trade secret” information

Page 69: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Generally “trade secrets” are given a higher degree of legal protection than other proprietary information

Page 70: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

There are three basic requirements of a “trade secret”

a. Must be of competitive advantageb. Must be secretc. Must be used in the business of

the owner

Page 71: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Information must meet the following requirements to fit the definition required of a “trade secret”

a. Must be specifically identifiableb. Cannot be found in publicly accessible sourcesc. Should be disclosed by owner only to those under a

duty to protect secrecyd. Persons afforded knowledge of secret information

must know it to be confidentiale. The owners must be able to show they have

instituted adequate protective measures to safeguard secrecy of date

Page 72: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Unless the owner of a trade secret can furnish proof of diligent care in the protection of a trade secret, such trade secret may be lost

Page 73: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Patent laws provide that an inventor who first develops a new machine, manufacturing process, composition or matter, plan or design that is sufficiently novel and useful can apply for and receive an exclusive right to that invention for a period of 17 years

Page 74: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Inadvertent disclosure” probably is the chief reason for loss of information about sensitive operations

Page 75: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

One method important in protection of sensitive information is installing an effective “awareness program” to assure all employees are aware of the existence of sensitive data in the company and their responsibilities in protecting such

Page 76: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Another important protective device is the use of “nondisclosure agreements”(employee patent and

secrecy agreements) from employees in which the employees acknowledge their fiduciary responsibility

Page 77: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

A “non-competitive agreement” is agreement on part of employee upon leaving employment of one company that the employee will not accept employment with a defined competitor for a stated period of time

Page 78: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

A telephone instrument may also be utilized as a listening device

Page 79: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

In an electronic countermeasure survey, note that light switches and electrical outlets are favorite places to install listening devices

Page 80: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Most loss of proprietary information occurs because of negligence

Page 81: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

One very important protective measure used to safeguard sensitive data is to disclose such only in a need-to-know basis

Page 82: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Theft of sensitive information through industrial espionage methods or other methods of outside theft accounts for a smaller loss than through negligence; however, the loss through outside theft is more dangerous because the data stolen is usually the most valuable

Page 83: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

One of the biggest problems in designing a proprietary information protection program is caused by the large amount of vital data processed and analyzed electronically

Page 84: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Employees are the greatest vulnerability in a proprietary information protection program. Accordingly, an employee awareness program is necessary whereby they are educated with regard to their responsibilities in protecting sensitive data.

Page 85: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Definitions

• Proprietary Information– Information over which the possessor

asserts ownership and which is related to the activities or status of the possessor in some special way

Page 86: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Definitions

• Patent

– A government grant conveying and securing the exclusive right to make, use, and sell an invention for a term of years (seventeen)

Page 87: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Trade Secret• A trade Secret is a process or device for

continuous use in the operation of the business

• For trade secret protection, must prove– Secrecy– Value– Use in the owner’s business

Page 88: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Trade Secret

• Trade Secret information is entitled by law to more protection than other kinds of proprietary information

Page 89: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Trade Secret• The following are not trade secrets:

– Salary information

– Rank surveys

– Customer usage evaluation

– Profitability margins

– Unit costs

– Personnel changes

Page 90: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Trade Secret / Patent

• A trade secret remains secret as long as it continues to meet trade secret tests but the exclusive right to patent protection expires after 17 years

Page 91: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Trade Secret / Patent

• Since anyone can purchase a patent, there are not industrial espionage targets in a patented invention

• Trade Secrets are targets

Page 92: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Proprietary Information

• Two approaches used to deal with P.I.:• “Property Concept”

– regards the information as having independent value if it amounts to a trade secret

• “Fiduciaries” – Imposition of duties upon certain classes of

people, other than the owner not to use or divulge info without owner’s consent.

Page 93: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Proprietary Information

• There are 3 broad threats to proprietary information:

– It can be lost through inadvertent disclosure– It can be deliberately stolen by an outsider– It can be deliberately stolen by an insider

Page 94: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Competitive Intelligence Gathering

• The most important function of competitive intelligence gathering is to alert senior management to marketplace changes in order to prevent surprise

Page 95: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Competitive Intelligence Gathering

• A rich source of information is in the information provided to government regulators

• Never reveal information to anyone that you would not reveal to a competitor

Page 96: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Industrial Espionage

• Industrial espionage is the theft of information by legal or illegal means. It is more dangerous than inadvertent disclosure by employees in that highly valuable information is stolen for release to others who plan to exploit it.

Page 97: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Protection Programs

• The vulnerability assessment is conducted from the perspective of the competitor and considers:– What critical information exists– The period of time when the information is

critical. This may be a short period or may be for the life of a product

– The identity of employees and indirect associates who have access to the information

Page 98: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Eavesdropping Tactics & Equipment

• “Wiretapping” - is the interception of communication over a wire w/o participants consent and requires physical entry into the communication circuit

• “Bugging” - interception of communication w/o participants consent by means of electronic devices and w/o penetration of a wire.

Page 99: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Eavesdropping Tactics & Equipment

• Eavesdropping is a psychological traumatic experience for the victim.

• It is the most devastating of espionage techniques.

Page 100: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Wired microphones

• Carbon microphone – commonly used in a standard telephone handset

• Crystal microphone– generates a small electrical current when the

crystal is vibrated by sound waves

• Contact microphone– installed on a common wall with the target area

Page 101: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Wired microphones

• Spike microphone– installed in a hole in the common wall

(not fully through)

• Dynamic microphone– movement of a small wire near a permanent

magnet converts sound into electrical energy. Good eavesdropping device which operates as a loudspeaker in reverse

Page 102: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Wired microphones

• Pneumatic cavity device– has a specially designed small cavity which picks

up surface vibrations. (Glass tumbler effect)

• Condenser microphone– high fidelity use. Fragile and sensitive

• Electret microphone– used primarily in P.A. and audio recording.

(Extremely small)

Page 103: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Wired microphones

• Omnidirectional microphone– used in conferences. Picks up sound from many

directions around the room

• Cardioid microphone– picks up sound from directly in front of mic

• Parabolic microphone – gathers audio energy and directs it to a

conventional microphone in the center of a dish-type reflector

Page 104: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Wireless microphones

• A radio frequency (RF) device. Consists of:

– A microphone

– A transmitter

– A power supply

– An antenna; and,

– A receiver

Page 105: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Light transformation

• 1. Infrared light wave transmissions use light waves invisible to the human eye. Sound waves are converted to electronic impulses and the pulses are used to modulate infrared light waves. Similar to a TV remote

Page 106: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Light transformation

• 2. Laser (Light Amplification by Stimulated Emission of Radiation) transmission of sound does not require any equipment in the surveillance area. A laser beam focused on a window pane or a reflective object in the room. The vibrating glass modulates a reflected laser beam. Rarely used due to interference.

Page 107: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Light transformation

• 3. Fiber optic laser transmission uses a communications grade glass fiber, filled with laser light, routed through the surveillance area. Sound waves cause the fiber to vibrate slightly, altering the laser light.

Page 108: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Electromagnetic radiation

• Detectable electromagnetic energy is generated by electronic information processing devices. Detection is possible for several hundred feet. The “faraday cage” or “tempest shielding” is used for very sensitive equipment.

Page 109: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Telephone eavesdropping

• Digital systems - originally thought to be secure:

• Digit stream can be recorded and converted to analog and speech.

• The control system is available from an on-site terminal or from off-site through the network. (Remote Maintenance Access Terminal) (RMAT)

Page 110: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The Eavesdropping Threat

• Risk for the electronic eavesdropper is low:– electronic eavesdropping is easily committed– chances are low that victim will find the device– chances low, if found, can be tied to eavesdropper– prosecution of eavesdropping cases is rare; and,– the reward far outweighs the risk

Page 111: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Miscellaneous• Plenum

– space above a dropped ceiling

• Variable Path Encryption (VPE)• is particularly useful to secure cellular signals.

A call is made to a toll-free number of the VPE provider. A unit attached to the cellular set and a unit at the VPE provider alter the communication between them. The signal is sent in the clear from the VPE provider to the intended destination of the call

Page 112: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Miscellaneous

• Time domain reflectometry– an electronic picture of the telephone

line at a given time which is compared to the same line at a future time

Page 113: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Miscellaneous

• Audio masking– generation of noise at the perimeter

of the secure area to cover or mask conversation. Music is not used; “white” or “pink” noise is not as easily filtered from the tape

Page 114: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Security ManagementSecurity Management

Sample Questions

Page 115: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

1. One supervisor can effectively control only a limited number of people and that limit should not be exceeded. This principle is called:

• a. Unity of command

• b. Supervisory limits

• c. Span of control

• d. Line of discipline

Page 116: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

1. One supervisor can effectively control only a limited number of people and that limit should not be exceeded. This principle is called:

• a. Unity of command

• b. Supervisory limits

• c. Span of control

• d. Line of discipline

Page 117: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

2. An important principle of organization is that an employee should be under the direct control of one and only one immediate supervisor. This principle is :

• a. Unity of command

• b. Supervisory limits

• c. Span of control

• d. Line of discipline

Page 118: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

2. An important principle of organization is that an employee should be under the direct control of one and only one immediate supervisor. This principle is :

• a. Unity of command

• b. Supervisory limits

• c. Span of control

• d. Line of discipline

Page 119: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

3. From an organizational standpoint, the head of security should report to:

• a. Superintendent of buildings

• b. Manager of buildings and grounds

• c. Head housekeeper

• d. A vice-president or higher

Page 120: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

3. From an organizational standpoint, the head of security should report to:

• a. Superintendent of buildings

• b. Manager of buildings and grounds

• c. Head housekeeper

• d. A vice-president or higher

Page 121: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

4. The most conspicuous role of the security department in any organization is that of:

• a. Educational services

• b. Management services

• c. Special services

• d. Protective services

Page 122: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

4. The most conspicuous role of the security department in any organization is that of:

• a. Educational services

• b. Management services

• c. Special services

• d. Protective services

Page 123: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

5. Training sessions consisting of a security awareness program for new employees should be conducted by:

• a. Special training officers

• b. Security personnel

• c. Consultants skilled in training

• d. Member of management

Page 124: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

5. Training sessions consisting of a security awareness program for new employees should be conducted by:

• a. Special training officers

• b. Security personnel

• c. Consultants skilled in training

• d. Member of management

Page 125: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

6. There are necessary and legitimate exceptions to the principle of unity of command. One condition which sometimes allows for shifting in supervision is:

• a. When order is given by the rank of captain or above

• b. When order is given by the head of a department• c. When the order is given by the head of internal

affairs• d. During emergencies

Page 126: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

6. There are necessary and legitimate exceptions to the principle of unity of command. One condition which sometimes allows for shifting in supervision is:

• a. When order is given by the rank of captain or above

• b. When order is given by the head of a department• c. When the order is given by the head of internal

affairs• d. During emergencies

Page 127: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

7. Perhaps the most common shortcoming in the security industry is:

• a. Lack of support by top management

• b. Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities (supervisor training)

• c. Lack of planning

• d. Lack of monetary resources

Page 128: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

7. Perhaps the most common shortcoming in the security industry is:

• a. Lack of support by top management

• b. Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities (supervisor training)

• c. Lack of planning

• d. Lack of monetary resources

Page 129: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

8. As a rule, which department of the company administers the recruiting activity?

• a. The security department

• b. Administrative department

• c. Personnel department

• d. Internal affairs

Page 130: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

8. As a rule, which department of the company administers the recruiting activity?

• a. The security department

• b. Administrative department

• c. Personnel department

• d. Internal affairs

Page 131: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

9. In non-entry level recruiting, the recommended technique is:

• a. “Blind ad”

• b. Open advertisement in newspaper

• c. Advertisement in trade journal

• d. By word of mouth on selective basis

Page 132: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

9. In non-entry level recruiting, the recommended technique is:

• a. “Blind ad”

• b. Open advertisement in newspaper

• c. Advertisement in trade journal

• d. By word of mouth on selective basis

Page 133: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

10. Every applicant’s first interview should be with:

• a. The security manager director

• b. The security supervisor

• c. A security line employee

• d. A personnel interviewer

Page 134: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

10. Every applicant’s first interview should be with:

• a. The security manager director

• b. The security supervisor

• c. A security line employee

• d. A personnel interviewer

Page 135: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

11. The heart of personnel selection is:

• a. Polygraph test

• b. Review of application

• c. Interview

• d. Background investigation

Page 136: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

11. The heart of personnel selection is:

• a. Polygraph test

• b. Review of application

• c. Interview

• d. Background investigation

Page 137: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

12. Which of the following is not recommended policy with regard to security manuals?

• a. It must be updated on a regular basis

• b. Employees should not be allowed to have possession of it

• c. The manual should be put in the hands of all regular security personnel

• d. It should include procedural instructions for specific incidents

Page 138: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

12. Which of the following is not recommended policy with regard to security manuals?

• a. It must be updated on a regular basis

• b. Employees should not be allowed to have possession of it

• c. The manual should be put in the hands of all regular security personnel

• d. It should include procedural instructions for specific incidents

Page 139: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

13. Discipline is primarily the responsibility of:

• a. The supervisor

• b. The employee

• c. The security manager or director

• d. The inspection division

Page 140: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

13. Discipline is primarily the responsibility of:

• a. The supervisor

• b. The employee

• c. The security manager or director

• d. The inspection division

Page 141: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

14. Among classical theories of human behavior in the work environment, one emphasizes negative aspects of employee behavior which is known as:

• a. The autocrat theory

• b. The custodial theory

• c. The supportive theory

• d. McGregor’s “Theory X”

Page 142: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

14. Among classical theories of human behavior in the work environment, one emphasizes negative aspects of employee behavior which is known as:

• a. The autocrat theory

• b. The custodial theory

• c. The supportive theory

• d. McGregor’s “Theory X”

Page 143: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

15. Among classical theories of human behavior in the work environment is one which suggests that employees do not inherently dislike work and will actually seek responsibility and better performance if encouraged to do so. It is known as:

• a. McGregor’s “Theory Y”

• b. McGregor’s “Theory X”

• c. The supportive theory

• d. The motivation theory

Page 144: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

15. Among classical theories of human behavior in the work environment is one which suggests that employees do not inherently dislike work and will actually seek responsibility and better performance if encouraged to do so. It is known as:

• a. McGregor’s “Theory Y”

• b. McGregor’s “Theory X”

• c. The supportive theory

• d. The motivation theory

Page 145: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

16. Dr. Frederick Herzberg developed a position that motivation comes from work itself, not from those factors such as salary and job security. This theory is known as:

• a. The supportive theory

• b. The work motivation theory

• c. The custodial theory

• d. McGregor’s “Theory X”

Page 146: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

16. Dr. Frederick Herzberg developed a position that motivation comes from work itself, not from those factors such as salary and job security. This theory is known as:

• a. The supportive theory

• b. The work motivation theory

• c. The custodial theory

• d. McGregor’s “Theory X”

Page 147: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

17. Which of the following is not an advantage of using in-house (career) personnel?

• a. Career personnel develop a loyalty to the department

• b. Career personnel tend to be more ambitious

• c. There is more stability among career personnel

• d. Career personnel constitute a fixed, limited cadre or pool of manpower resources

Page 148: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

17. Which of the following is not an advantage of using in-house (career) personnel?

• a. Career personnel develop a loyalty to the department

• b. Career personnel tend to be more ambitious

• c. There is more stability among career personnel

• d. Career personnel constitute a fixed, limited cadre or pool of manpower resources

Page 149: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

18. Which of the following is known to be one of the disadvantages of contract security services?

• a. Turnover

• b. Cost

• c. Manpower resource

• d. Skills

Page 150: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

18. Which of the following is known to be one of the disadvantages of contract security services?

• a. Turnover

• b. Cost

• c. Manpower resource

• d. Skills

Page 151: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

19. Ideally, the person who should conduct the inspection of a security department is:

• a. An outside consultant

• b. The second ranking person

• c. The security director or security manager

• d. The ranking sergeant

Page 152: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

19. Ideally, the person who should conduct the inspection of a security department is:

• a. An outside consultant

• b. The second ranking person

• c. The security director or security manager

• d. The ranking sergeant

Page 153: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

20. The process of determining the probability and cost of potential loss is known as:

• a. Probability analysis

• b. Risk assessment

• c. Potential loss analysis

• d. Physical survey

Page 154: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

20. The process of determining the probability and cost of potential loss is known as:

• a. Probability analysis

• b. Risk assessment

• c. Potential loss analysis

• d. Physical survey

Page 155: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

21. In conducting background investigations, it is good policy to:

• a. Not let prospective employee know investigation is being conducted

• b. Restrict investigation to “confidential” records checks

• c. Restrict investigation to employment checks

• d. Advise applicant of forthcoming investigation and secure his permission

Page 156: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

21. In conducting background investigations, it is good policy to:

• a. Not let prospective employee know investigation is being conducted

• b. Restrict investigation to “confidential” records checks

• c. Restrict investigation to employment checks

• d. Advise applicant of forthcoming investigation and secure his

permission

Page 157: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

22. The ultimate responsibility for the internal security in a department should rest with:

• a. The president

• b. Chairman of the board

• c. Security director

• d. The line supervisor

Page 158: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

22. The ultimate responsibility for the internal security in a department should rest with:

• a. The president

• b. Chairman of the board

• c. Security director

• d. The line supervisor

Page 159: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

23. The behavioral scientist whose key concept is that every executive relates to his subordinates on the basis of a set of assumptions termed theory X and theory Y was formulated by:

• a. Abraham Maslow

• b. Douglas McGregor

• c. Warren Bennis

• d. B.F. Skinner

Page 160: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

23. The behavioral scientist whose key concept is that every executive relates to his subordinates on the basis of a set of assumptions termed theory X and theory Y was formulated by:

• a. Abraham Maslow

• b. Douglas McGregor

• c. Warren Bennis

• d. B.F. Skinner

Page 161: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

24. The issuance of weapons to guards is usually not justified:

• a. In a situation where deterrence is needed in handling control of large amounts of cash

• b. In situations in which terrorism is a real threat

• c. In situations where there would be greater danger to life without weapons than with them

• d. In a situation where there is no danger to life safety

Page 162: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

24. The issuance of weapons to guards is usually not justified:

• a. In a situation where deterrence is needed in handling control of large amounts of cash

• b. In situations in which terrorism is a real threat

• c. In situations where there would be greater danger to life without weapons than with them

• d. In a situation where there is no danger to life safety

Page 163: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

25. In issuing policy statements regarding the handling of disturbed persons, the primary consideration is:

• a. Legal liability to the disturbed• b. Reducing the disturbed person to a form of

benevolent custody and eliminating the immediate danger

• c. Legal liability to employees and third persons if restraint not achieved

• d. Employee-community public relations

Page 164: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

25. In issuing policy statements regarding the handling of disturbed persons, the primary consideration is:

• a. Legal liability to the disturbed• b. Reducing the disturbed person to a form

of benevolent custody and eliminating the immediate danger

• c. Legal liability to employees and third persons if restraint not achieved

• d. Employee-community public relations

Page 165: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

26. Spotting the individual loss events that might take place is the primary step in dealing with security vulnerability. This process is called

• a. Loss event probability

• b. Threat assessment process

• c. Loss event profile

• d. Actual threat analysis

Page 166: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

26. Spotting the individual loss events that might take place is the primary step in dealing with security vulnerability. This process is called

• a. Loss event probability

• b. Threat assessment process

• c. Loss event profile

• d. Actual threat analysis

Page 167: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

27. The likelihood or probability of risks affecting the assets becoming actual loss events is known as:

• a. Loss event probability

• b. Loss event profile

• c. Threat analysis control

• d. Threat target control

Page 168: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

27. The likelihood or probability of risks affecting the assets becoming actual loss events is known as:

• a. Loss event probability

• b. Loss event profile

• c. Threat analysis control

• d. Threat target control

Page 169: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

28. The impact or effect on the enterprise if the loss occurs is known as:

• a. Loss event profile

• b. Loss event probability

• c. Loss event criticality

• d. Security survey analysis

Page 170: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

28. The impact or effect on the enterprise if the loss occurs is known as:

• a. Loss event profile

• b. Loss event probability

• c. Loss event criticality

• d. Security survey analysis

Page 171: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

29. Which of the following is considered to be one of the 3 basic functions of risk management?

• a. Lock control

• b. Barrier control

• c. Disaster management

• d. Loss control

Page 172: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

29. Which of the following is considered to be one of the 3 basic functions of risk management?

• a. Lock control

• b. Barrier control

• c. Disaster management

• d. Loss control

Page 173: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

30. Oscar Neuman published a classic in which he presented ideas and applied strategies from the New York public housing project to aid in reducing the risk of being victimized and reducing fear of crime when on the streets. What is the name of this book?

• a. Crime Prevention

• b. Crime Reduction

• c. Defensible Space

• d. Crime in Architectural Planning

Page 174: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

30. Oscar Neuman published a classic in which he presented ideas and applied strategies from the New York public housing project to aid in reducing the risk of being victimized and reducing fear of crime when on the streets. What is the name of this book?

• a. Crime Prevention

• b. Crime Reduction

• c. Defensible Space

• d. Crime in Architectural Planning

Page 175: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

31. From a security perspective, what is the first factor to be considered in facility construction?

• a. The identity of experienced consultants

• b. An effective security plan

• c. An architect with knowledge of physical security

• d. The building site itself

Page 176: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

31. From a security perspective, what is the first factor to be considered in facility construction?

• a. The identity of experienced consultants

• b. An effective security plan

• c. An architect with knowledge of physical security

• d. The building site itself

Page 177: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

32. A critical on-site examination and analysis of an industrial plant business, home or public or private institution to ascertain the present security status, to identify deficiencies or excesses to determine the protection needed to make recommendations to improve the overall security is the definition of :

• a. Security survey

• b. Risk analysis

• c. Full-field inspection

• d. Crime prevention assessment

Page 178: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

32. A critical on-site examination and analysis of an industrial plant business, home or public or private institution to ascertain the present security status, to identify deficiencies or excesses to determine the protection needed to make recommendations to improve the overall security is the definition of :

• a. Security survey

• b. Risk analysis

• c. Full-field inspection

• d. Crime prevention assessment

Page 179: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

33. There are two generally accepted definitions of risk. These are more commonly known to risk managers and security officers as:

• a. Potential risk and dynamic risk

• b. Profit risk and dynamic risk

• c. Potential risk and pure risk

• d. Pure risk and dynamic risk

Page 180: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

33. There are two generally accepted definitions of risk. These are more commonly known to risk managers and security officers as:

• a. Potential risk and dynamic risk

• b. Profit risk and dynamic risk

• c. Potential risk and pure risk

• d. Pure risk and dynamic risk

Page 181: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

34. The most effective deterrent to shoplifting is:

• a. Highly competent and educated security officers

• b. Widespread use of sensor devices

• c. Well positioned CCTV’s

• d. Well trained personnel

Page 182: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

34. The most effective deterrent to shoplifting is:

• a. Highly competent and educated security officers

• b. Widespread use of sensor devices

• c. Well positioned CCTV’s

• d. Well trained personnel

Page 183: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

35. A simplified answer to the question of why employees steal is:

• a. Sickness in family

• b. To feed a drug habit

• c. To live on a higher level

• d. The theft triangle

Page 184: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

35. A simplified answer to the question of why employees steal is:

• a. Sickness in family

• b. To feed a drug habit

• c. To live on a higher level

• d. The theft triangle

Page 185: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

36. Many experts agree that the most important deterrent to internal theft is:

• a. Threat of dismissal

• b. Fear of discovery

• c. Threat of prosecution

• d. Conscience pangs

Page 186: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

36. Many experts agree that the most important deterrent to internal theft is:

• a. Threat of dismissal

• b. Fear of discovery

• c. Threat of prosecution

• d. Conscience pangs

Page 187: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

37. Crime analysis is a key element in focusing the use of police and security resources to address crime problems. Data collection and analysis are two specific steps. The other two are:

• a. Inspection and discovery of facts

• b. Response and feedback

• c. Feedback and corrective action

• d. Dissemination and feedback

Page 188: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

37. Crime analysis is a key element in focusing the use of police and security resources to address crime problems. Data collection and analysis are two specific steps. The other two are:

• a. Inspection and discovery of facts

• b. Response and feedback

• c. Feedback and corrective action

• d. Dissemination and feedback

Page 189: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

38. It is generally accepted that insurance rates are dependent upon two primary variables. These are:

• a. Cost of claims and competitors rates

• b. Competition among insurance companies and frequency of claims

• c. Cost of claims and frequency of claims

• d. Cost of claims and government regulations

Page 190: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

38. It is generally accepted that insurance rates are dependent upon two primary variables. These are:

• a. Cost of claims and competitors rates

• b. Competition among insurance companies and frequency of claims

• c. Cost of claims and frequency of claims

• d. Cost of claims and government regulations

Page 191: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

39. The basic types of protection which security personnel realize as best can be described by the following:

• a. Fidelity Bonds

• b. Surety Bonds

• c. Burglary/Robbery/Theft Insurance

• d. All of the above

Page 192: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

39. The basic types of protection which security personnel realize as best can be described by the following:

• a. Fidelity Bonds

• b. Surety Bonds

• c. Burglary/Robbery/Theft Insurance

• d. All of the above

Page 193: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

40. Bonds which require that an employee be investigated by the bonding company to limit the risk of dishonesty, and if that trust is violated, the insurance company must indemnify the employer, are called:• a. Surety Bonds

• b. Fidelity Bonds

• c. Insurance Bonds

• d. Blanket Bonds

Page 194: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

40. Bonds which require that an employee be investigated by the bonding company to limit the risk of dishonesty, and if that trust is violated, the insurance company must indemnify the employer, are called:• a. Surety Bonds

• b. Fidelity Bonds

• c. Insurance Bonds

• d. Blanket Bonds

Page 195: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

41. Protection for a corporation, if there is a failure to perform specified acts within a certain period of time, is known as a:

• a. Contract Bond

• b. Blanket Bond

• c. Surety Bond

• d. Fiduciary Bond

Page 196: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

41. Protection for a corporation, if there is a failure to perform specified acts within a certain period of time, is known as a:

• a. Contract Bond

• b. Blanket Bond

• c. Surety Bond

• d. Fiduciary Bond

Page 197: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

42. The urban planning and design process which integrates crime prevention techniques with neighborhood design is known as:

• a. Urban Development Planning

• b. Conceptual Modeling in Architecture

• c. Environmental Design

• d. Environmental Security (E/S)

Page 198: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

42. The urban planning and design process which integrates crime prevention techniques with neighborhood design is known as:

• a. Urban Development Planning

• b. Conceptual Modeling in Architecture

• c. Environmental Design

• d. Environmental Security (E/S)

Page 199: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

43. The ability of design to counteract the perception that the area is isolated and criminally vulnerable is known as:

• a. Natural Surveillance Techniques

• b. Image and Milieu

• c. Soft Area Protection

• d. Territorial Cleansing

Page 200: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

43. The ability of design to counteract the perception that the area is isolated and criminally vulnerable is known as:

• a. Natural Surveillance Techniques

• b. Image and Milieu

• c. Soft Area Protection

• d. Territorial Cleansing

Page 201: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

44. The greatest ongoing threat to any business is:

• a. Shoplifting

• b. Shrinkage

• c. Internal Theft

• d. Pilferage

Page 202: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

44. The greatest ongoing threat to any business is:

• a. Shoplifting

• b. Shrinkage

• c. Internal Theft

• d. Pilferage

Page 203: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

45. Pilferage is defined as stealing in small quantities over a long period of time. The taking of property entrusted to someone’s care is called:

• a. Mistake of fact

• b. Misprison of a felony

• c. Uttering

• d. Embezzlement

Page 204: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

45. Pilferage is defined as stealing in small quantities over a long period of time. The taking of property entrusted to someone’s care is called:

• a. Mistake of fact

• b. Misprison of a felony

• c. Uttering

• d. Embezzlement

Page 205: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

46. The theft triangle consists of the following components:

• a. Desire, skill and training

• b. Motivation, skill and opportunity

• c. Opportunity, desire and skill

• d. Motivation, opportunity and rationalization (Desire)

Page 206: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

46. The theft triangle consists of the following components:

• a. Desire, skill and training

• b. Motivation, skill and opportunity

• c. Opportunity, desire and skill

• d. Motivation, opportunity and rationalization (Desire)

Page 207: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

47. A line item budget is the traditional and most frequently used method of budgeting. Two other commonly used budgeting techniques include:

• a. Management and program budgets

• b. Capital and program budgets

• c. Program and exception item budgets

• d. Fund allocation and capital budgets

Page 208: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

47. A line item budget is the traditional and most frequently used method of budgeting. Two other commonly used budgeting techniques include:

• a. Management and program budgets

• b. Capital and program budgets

• c. Program and exception item budgets

• d. Fund allocation and capital budgets

Page 209: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

48. A management tool wherein there is a systematic method of achieving agreed upon goals set in advance is known as :

• a. Matrix Management

• b. Proactive Management

• c. Scheduling Management

• d. Management by Objective

Page 210: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

48. A management tool wherein there is a systematic method of achieving agreed upon goals set in advance is known as :

• a. Matrix Management

• b. Proactive Management

• c. Scheduling Management

• d. Management by Objective

Page 211: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

49. The activity concerned with proposals for the future, an analysis of these proposals and method for achieving them is known as:

• a. Effective Management

• b. Evaluation Techniques

• c. Planning

• d. Budgeting

Page 212: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

49. The activity concerned with proposals for the future, an analysis of these proposals and method for achieving them is known as:

• a. Effective Management

• b. Evaluation Techniques

• c. Planning

• d. Budgeting

Page 213: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

50. A key element in focusing the use of police and security resources to address crime problems is commonly called:

• a. Data collection and analysis

• b. Systematic evaluation of data available

• c. Crime analysis

• d. Analysis and feedback

Page 214: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

50. A key element in focusing the use of police and security resources to address crime problems is commonly called:

• a. Data collection and analysis

• b. Systematic evaluation of data available

• c. Crime analysis

• d. Analysis and feedback

Page 215: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

51. According to estimates, about 1/3 of all business failures are caused by:

• a. Thefts by outsiders (non-employees)

• b. Thefts by employees

• c. Mismanagement

• d. Poor quality of product

Page 216: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

51. According to estimates, about 1/3 of all business failures are caused by:

• a. Thefts by outsiders (non-employees)

• b. Thefts by employees

• c. Mismanagement

• d. Poor quality of product

Page 217: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

52. The major item conspicuously absent from police-based crime prevention programs was:

• a. Comprehensive training program

• b. Manpower dedicated to crime prevention concepts

• c. The input of huge number of persons employed in private security

• d. Use of up-dated technology

Page 218: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

52. The major item conspicuously absent from police-based crime prevention programs was:

• a. Comprehensive training program

• b. Manpower dedicated to crime prevention concepts

• c. The input of huge number of persons employed in private security

• d. Use of up-dated technology

Page 219: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

53. What was the most frequent recommendation made by both law enforcement and security managers to improve private security and their working relationships with police?

• a. Higher entry-level pay

• b. Upgrading quality of security personnel

• c. A planned educational program involving both police and private security

• d. Requirement of being armed

Page 220: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

53. What was the most frequent recommendation made by both law enforcement and security managers to improve private security and their working relationships with police?

• a. Higher entry-level pay

• b. Upgrading quality of security personnel

• c. A planned educational program involving both police and private security

• d. Requirement of being armed

Page 221: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

54. The most frequently shared resource between law enforcement and private security is:

• a. CCTV and other surveillance equipment

• b. Personnel

• c. “Buy money” for stolen goods

• d. Reward money

Page 222: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

54. The most frequently shared resource between law enforcement and private security is:

• a. CCTV and other surveillance equipment

• b. Personnel

• c. “Buy money” for stolen goods

• d. Reward money

Page 223: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

55. The main objective of private security is:

• a. To apprehend those who steal property from their firms

• b. To protect assets and prevent losses

• c. To assist police in investigations of crimes

• d. To prevent unauthorized persons entry on firm’s property

Page 224: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

55. The main objective of private security is:

• a. To apprehend those who steal property from their firms

• b. To protect assets and prevent losses

• c. To assist police in investigations of crimes

• d. To prevent unauthorized persons entry on firm’s property

Page 225: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

56. What is the most frequently investigated crime by private security?

• a. Employee theft

• b. Shoplifting

• c. Bad checks

• d. Embezzlement

Page 226: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

56. What is the most frequently investigated crime by private security?

• a. Employee theft

• b. Shoplifting

• c. Bad checks

• d. Embezzlement

Page 227: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

57. The two major components of economic crime have been:

• a. Employee theft and corporate bribery

• b. Fraud and embezzlement

• c. White collar and ordinary crime

• d. Computer and ordinary crime

Page 228: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

57. The two major components of economic crime have been:

• a. Employee theft and corporate bribery

• b. Fraud and embezzlement

• c. White collar and ordinary crime

• d. Computer and ordinary crime

Page 229: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

58. The practice of preventing unauthorized persons from gaining information by analyzing electromagnetic emanations from electronic equipment is often termed:

• a. Tempest

• b. Veiling

• c. Bugging

• d. Hardening

Page 230: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

58. The practice of preventing unauthorized persons from gaining information by analyzing electromagnetic emanations from electronic equipment is often termed:

• a. Tempest

• b. Veiling

• c. Bugging

• d. Hardening

Page 231: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

59. Which of the following is not a correct statement with regard to narcotics?

• a. The term “narcotic” in it’s medical meaning refers to opium and opium derivatives or synthetic

substitutes• b. They are the most effective agents known for

the relief of intense pain• c. They have been used for a long period of time

as a remedy for diarrhea• d. They tend to intensify vision and increase

alertness

Page 232: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

59. Which of the following is not a correct statement with regard to narcotics?

• a. The term “narcotic” in it’s medical meaning refers to opium and opium derivatives or synthetic

substitutes• b. They are the most effective agents known for

the relief of intense pain• c. They have been used for a long period of time

as a remedy for diarrhea• d. They tend to intensify vision and increase

alertness

Page 233: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

60. Which of the following characteristics does not pertain to morphine?

• a. It is the principal constituent of opium

• b. Its legal use is restricted primarily to hospitals

• c. It tastes sweet and is marketed in the form of yellow crystals

• d. Tolerance and dependence develop rapidly

Page 234: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

60. Which of the following characteristics does not pertain to morphine?

• a. It is the principal constituent of opium

• b. Its legal use is restricted primarily to hospitals

• c. It tastes sweet and is marketed in the form of yellow crystals

• d. Tolerance and dependence develop rapidly

Page 235: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

61. Most of this substance is produced from morphine; but it is often combined with other products such as aspirin or Tylenol. It is often used for the relief of coughs; and it is by far the most widely used natural occurring narcotic in medical treatment. It is:

• a. Barbiturates

• b. Mescaline

• c. Chloral Hydrate

• d. Codeine

Page 236: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

61. Most of this substance is produced from morphine; but it is often combined with other products such as aspirin or Tylenol. It is often used for the relief of coughs; and it is by far the most widely used natural occurring narcotic in medical treatment. It is:

• a. Barbiturates

• b. Mescaline

• c. Chloral Hydrate

• d. Codeine

Page 237: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

62. German scientists synthesized methadone during World War II because of a shortage of morphine. Which of the following is not characteristic of methadone and it’s usage ?

• a. Although chemically unlike morphine and heroin, it produces many of the same effects

• b. It was distributed under such names as amidone, dolophine, and methadone

• c. It was widely used in the 1960’s in the treatment of narcotic addicts.

• d. It is only effective when administered by injection

Page 238: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

62. German scientists synthesized methadone during World War II because of a shortage of morphine. Which of the following is not characteristic of methadone and it’s usage ?

• a. Although chemically unlike morphine and heroin, it produces many of the same effects

• b. It was distributed under such names as amidone, dolophine, and methadone

• c. It was widely used in the 1960’s in the treatment of narcotic addicts.

• d. It is only effective when administered by injection

Page 239: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

63. Which of the following characteristics do not pertain to the use or effects of depressants generally?

• a. The usual methods of administration are oral or injected.

• b. Excessive use results in drunken behavior similar to that of alcohol

• c. There is no danger of tolerance developing• d. Taken as prescribed, they may be beneficial

for the relief of anxiety and tension

Page 240: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

63. Which of the following characteristics do not pertain to the use or effects of depressants generally?

• a. The usual methods of administration are oral or injected.

• b. Excessive use results in drunken behavior similar to that of alcohol

• c. There is no danger of tolerance developing

• d. Taken as prescribed, they may be beneficial for the relief of anxiety and tension

Page 241: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

64. Another widely abused depressant is methaqualone. All of the following are factually descriptive of methaqualone except one. Identify this exception.

• a. It is chemically unrelated to the barbiturates

• b. It was once mistakenly thought to be effective as an aphrodisiac.

• c. It is administered orally

• d. It is one of the depressants that does not lead to tolerance and dependence.

Page 242: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

64. Another widely abused depressant is methaqualone. All of the following are factually descriptive of methaqualone except one. Identify this exception.

• a. It is chemically unrelated to the barbiturates

• b. It was once mistakenly thought to be effective as an aphrodisiac.

• c. It is administered orally• d. It is one of the depressants that does

not lead to tolerance and dependence.

Page 243: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

65. All of the following are controlled substances grouped as stimulants except one. Identify the exception.

• a. Cocaine

• b. Amphetamines

• c. Phenmetrazine

• d. Mescaline

Page 244: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

65. All of the following are controlled substances grouped as stimulants except one. Identify the exception.

• a. Cocaine

• b. Amphetamines

• c. Phenmetrazine

• d. Mescaline

Page 245: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

66. All of the following are factual statements descriptive of illicit cocaine except one, which is:

• a. It is distributed on the street as a white to dark brown powder.

• b. It is often adulterated to about half its volume by a variety of other ingredients.

• c. This substance is only used through the process of injection

• d. It is popularly accepted as a recreational drug

Page 246: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

66. All of the following are factual statements descriptive of illicit cocaine except one, which is:

• a. It is distributed on the street as a white to dark brown powder.

• b. It is often adulterated to about half its volume by a variety of other ingredients.

• c. This substance is only used through the process of injection

• d. It is popularly accepted as a recreational drug

Page 247: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

67. Which of the following is another name for cocaine ?

• a. Adipex

• b. Bacarate

• c. Piegine

• d. Snow

Page 248: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

67. Which of the following is another name for cocaine ?

• a. Adipex

• b. Bacarate

• c. Piegine

• d. Snow

Page 249: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

68. Which of the following statements does not pertain to cocaine ?

• a. It has a medical use as a sedative

• b. There is a possibility that sustained use could result in physical dependence

• c. There is a high possibility that sustained use could result in psychological dependence

• d. Tolerance is a distinct possibility

Page 250: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

68. Which of the following statements does not pertain to cocaine ?

• a. It has a medical use as a sedative

• b. There is a possibility that sustained use could result in physical dependence

• c. There is a high possibility that sustained use could result in psychological dependence

• d. Tolerance is a distinct possibility

Page 251: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

69. The effects of illusions and hallucinations with poor perception of time and distance possibly indicates the use of which of the following substances ?

• a. Cannabis

• b. Hallucinogen

• c. Stimulants

• d. Depressants

Page 252: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

69. The effects of illusions and hallucinations with poor perception of time and distance possibly indicates the use of which of the following substances ?

• a. Cannabis

• b. Hallucinogen

• c. Stimulants

• d. Depressants

Page 253: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

70. All of the following are hallucinogens except:

• a. LSD

• b. Marihuana

• c. Mescaline

• d. Phencyclidine

Page 254: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

70. All of the following are hallucinogens except:

• a. LSD

• b. Marihuana (it is also a hallucinogen)

• c. Mescaline

• d. Phencyclidine

Page 255: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

71. The source of marihuana is the:

• a. Peyote cactus

• b. Mushrooms

• c. Coca plant

• d. Cannabis plant

Page 256: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

71. The source of marihuana is the:

• a. Peyote cactus

• b. Mushrooms

• c. Coca plant

• d. Cannabis plant

Page 257: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

72. Cannabis products are usually taken:

• a. Through sniffing

• b. Injection

• c. Smoking

• d. By rubbing into the skin

Page 258: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

72. Cannabis products are usually taken:

• a. Through sniffing

• b. Injection

• c. Smoking

• d. By rubbing into the skin

Page 259: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

73. The condition whereby a user develops an attachment to the use of a substance due to it’s ability to satisfy some emotional or personality need of the person is known as:

• a. Tolerance

• b. Physical dependence

• c. Addiction

• d. Psychological Dependence

Page 260: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

73. The condition whereby a user develops an attachment to the use of a substance due to it’s ability to satisfy some emotional or personality need of the person is known as:

• a. Tolerance

• b. Physical dependence

• c. Addiction

• d. Psychological Dependence

Page 261: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

74. The state of periodic or chronic intoxication produced by the repeated consumption of a substance is known as:

• a. Tolerance

• b. Addiction

• c. Habituation

• d. Drug dependence

Page 262: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

74. The state of periodic or chronic intoxication produced by the repeated consumption of a substance is known as:

• a. Tolerance

• b. Addiction

• c. Habituation

• d. Drug dependence

Page 263: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Significant NotesSignificant Notes

•Security Management

Page 264: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

In the organizational structure of proprietary firms, security may provide both line and staff functionsa. When advising senior executives, the

security manager performs “staff”duties

b. In security operations, the security manager carries out “line” duties

As a general rule, “line” duties are considered to be operational in nature and “staff” duties are of a support nature

Page 265: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

When security managers exercise authority delegated by a senior executive to whom they report,

such authority is known as “functional” authority

Page 266: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Security functions cut across departmental lines and consist of involvement into every activity of the company but should not involve significant interference

Page 267: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Probably the most common security management failure is the inability to delegate responsibility and the authority necessary to carry it out

Page 268: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Span of control” is a management term which refers to the number of personnel over

which one can effectively supervise

Page 269: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The largest single item of expense in the security

operation is the cost of the security personnel

Page 270: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The number of security personnel required to cover a single post

around the clock on three eight-hour shifts is 4-1/2 to 5 persons

Not 3

Page 271: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Chain of command” is a management term which refers

to the path along which authority flows

Page 272: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Well-trained, well-supervised security personnel may be the

best possible protection available to a company

Page 273: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The accounting department of a company is the most vulnerable

to major loss due to crime

Page 274: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Unity of command” is a management concept which

means that an employee should have only one immediate

superior to whom the employee should report

Page 275: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The security manager should have the necessary authority to carry out responsibilities. To accomplish this, the security manager should occupy a position where the manager reports directly to a vice-president or higher

Page 276: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The “Theory X” management theory holds that the average employee has little ambition, dislikes work and must be coerced, controlled and directed to achieve organizational objectives - Douglas McGregor

Page 277: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The “Theory Y” management theory holds that the average

employee does not dislike work, is self-directed, is creative and

imaginative, accepts responsibility and is committed

to achieving organizational needs and objectives -

Douglas McGregor

Page 278: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Theory X and Theory Y were

developed by Douglas McGregor

Page 279: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Those in management who believe the behavioral assumption of “Theory X” take an autocratic approach to get work done.Whereas “Theory Y” encourages managers to support and encourage employees in efforts to higher achievement

Page 280: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The three main theories of organizational behavior are:

a. Autocratic theory

b. Custodial theory

c. Supportive theory

Page 281: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The “autocratic theory” holds that management is all-powerful and employees are obligated to follow orders without question

Page 282: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The “custodial theory” holds that the aim of the company is to make the employee happy and contented through economic benefits and thus they will be positively adjusted to their work. This theory does not

motivate employees to produce to their full capacity

Page 283: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The “supportive theory” holds that through good leadership, management will provide a

climate where employees will take on added responsibilities

and thus make greater contributions to the growth of

the company.Leadership: “We rather than they”

Page 284: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Herzberg’s theory” is a management theory which holds

that motivation comes from work achievement satisfaction

and not from such things as salary and job security

Page 285: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Theory Z” is a recent management style used

effectively by the Japanese. This theory emphasizes

humanized working conditions along with attention by

management to enhance trust and close personal relationships

Page 286: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Management by objectives” also known as “MBO” was

introduced by Peter Drucker. In this approach, both subordinate

and superior agree on measurable goals to be achieved primarily by the subordinate over

a stated period of time

Page 287: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

A “budget” is a plan stated in financial terms. It sets forth in

dollars the necessary allocation of funds to achieve the plan

Page 288: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Risk analysis” is a management method used to minimize risks through application of security measures commensurate with

the threat

Page 289: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The major resource required for a risk analysis is

manpower

Page 290: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The most important management skill

is the ability to communicate effectively

Page 291: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Written communication is the best

means to communicate

Page 292: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The primary objective in implementing a protection

program within an organization should be to motivate every

employee to become part of the protection team

Page 293: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Both private security and public law have, as their primary mission, the prevention of crime and protection of persons and property

Page 294: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Economic crime” is defined as the illicit behavior having as its object

the unjust enrichment of the perpetrator at the expense of the

economic system as a whole

Page 295: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Private security relies upon both commercial security services and

government agencies for intelligence gathering and crisis

management planning

Page 296: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Private security frequently avoids or bypasses police with regard to white collar or economic crime

Page 297: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Business crime is most effectively attacked through sound

management controls. The emphasis on loss prevention rather than the “offender” involved in the incident is a

distinguishing characteristic of private security.

Page 298: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

About 95% to 99% of activated alarms

are “false”

Page 299: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The main deterrent value of a burglar alarm system is that the

alarm signal enunciated locally or transmitted to a central station

brings a police response

Page 300: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Employee theft was the

most frequently investigated crime

by private security

Page 301: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

As a general rule, local law enforcement has very little effect on many crimes against business.

Exceptions are burglaries, robberies and arson

Page 302: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Frequently cited measures for improving private security are:a. More or better trainingb. Mandated trainingc. Improved selection processd. Higher wagese. Establishment or improvement

of licensing and regulation

Page 303: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Two problems in police and security relationships which seem to have the greatest intensity of feelings are:a. Secondary employment or

moonlighting by police officers in private security

b. Police response to activated alarms which are largely false

Page 304: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The two major components of economic crime are white collar

and ordinary crime

Page 305: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

80% of computer security incidents result from insider

attacks by dishonest and disgruntled employees

Page 306: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Only 1% of computer security incidents annually are attributed

to “hackers”

Page 307: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The practice of preventing unauthorized persons from gaining intelligence information by analyzing electromagnetic emanations from electronic equipment such as computers, is often termed “tempest”

Page 308: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

In the year 2000, expenditures for private security industry will be $104 billion while public law enforcement expenditures will be only $44 billion by 2000

Page 309: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Employment in private security is projected to grow at 2.3% per

annum to 2000 while law enforcement growth will be one

percent annually

Page 310: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The term “narcotic” in its medical meaning refers to opium and opium derivatives or synthetic substitutes

Page 311: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Drug dependence” is a condition resulting from repeated use whereby the user must administer progressively larger doses to attain the desired effect, thereby reinforcing compulsive behavior

Page 312: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Physical dependence” refers to an alteration of the normal functions of the body that necessitates the continued presence of a drug in order to prevent the withdrawal or abstinence syndrome

Page 313: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The poppy (papaver somnifferum) is the main source of the non-synthetic narcotics

Page 314: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Examples of synthetic narcotics, which are produced entirely within the laboratory, are meperidine and methadone

Page 315: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Depressants have a potential for both physical and psychological dependence. Some examples :a. Chloral Hydrateb. Barbituratesc. Benzodiazepines

Page 316: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

When “depressant” drugs are used to obtain a “high” they are usually taken in conjunction with another drug, such as alcohol

Page 317: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Stimulants” are drugs which may produce a temporary sense of exhilaration, superabundant energy and hyperactivity including extended wakefulness.Examples are cocaine and amphetamines

Page 318: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The two most prevalent stimulants are nicotine and

caffeine, both accepted in our culture

Page 319: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The most potent stimulant of natural origin is cocaine which is extracted from the leaves of the

coca plant

Page 320: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Excessive doses of cocaine may cause seizures and death. There is no “safe” dose of cocaine

Page 321: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Marijuana” refers to cannabis plant parts and extracts that produce somatic or psychic changes in humans

Page 322: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The hemp plant grows wild throughout most of the tropic and temperate regions of the world

Page 323: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Hallucinogenic” drugs distort the perception of objective reality. Examples are:a. LSDb. Mescaline and peyotec. Phencyclidine (PCP)d. Amphetamine Variants (such as DOM and DOB)

Page 324: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Long after hallucinogens are eliminated from the body, users may experience “flashbacks”

Page 325: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

DOM, DOB, JDA, MDMA, DET and MDA are hallucinogens which are synthesized in the laboratory

Page 326: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Another source of hallucinogens (psilocybin and psilocyn) is

psilocybe mushrooms

Page 327: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Designer” drugs are analogues of controlled substances with slight variations in their chemical structure so as not to be specifically listed as a controlled substance

Page 328: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

A “drug” is a substance which, because of its chemical make-up, alters the mood, perception or consciousness of the user. All drugs are not illegal.

Page 329: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The most abused “drug” is alcohol and the most used “drug”

also alcohol

Page 330: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Tolerance” is a body condition wherein ever-increasing amounts of a drug are needed to gain the

desired effect

Page 331: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The street name for PCP

is “angel dust”

Page 332: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The person most likely to become an alcoholic is a white male over 40 who is living alone

Page 333: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The following behavioral characteristics are associated with substance abuse:a. Abrupt changes in attendance, quality of work grades

and work outputb. Attitude changesc. Withdrawal from responsibilityd. Breakdown in personal appearancee. Wearing sunglasses at inappropriate timesf. Wears long-sleeved garments to hide needle marksg. Association with known substance abusersh. Excessive borrowing of moneyI. Stealing small items from home, work or schoolj. Secretive habits

Page 334: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Internal Accounting - AuditInternal Accounting - Audit

• To insure correctness and accuracy of accounting records

• NotNot to detect theft and fraud

• More losses due to accounting errors than by theft

Page 335: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

External AuditExternal Audit

• Valuable because the persons conducting the audit do not know your business / company

Page 336: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Financial Aspects

• “CL” - Current Liability

• “L/T” - Long term Liability

Page 337: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

PayrollPayroll• Biggest problem is “GhostingGhosting”

– Paying people that don’t exist

• Can use “Pay-out” to detect GhostingGhosting– manually paying each employee

• Recommended twice a year

Page 338: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Internal CashInternal Cash

• Best way to handle is using two people at all times to handle cash situations

Page 339: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

PayablesPayables

• Money owed to vendors

Page 340: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

ReceivablesReceivables

• Money owed by customers

Page 341: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

General Management

• Line Executives are those who are delegated chain of command authority to accomplish specific objectives in the organization.

Page 342: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

General Management

• The security manager, in exercising authority delegated by the senior executive to whom the security manager reports, is exercising functional authority

Page 343: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

General Management

• Chain of Command is the path along which authority flows

Page 344: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

General Management

• Span of Control - the number of personnel which one individual can effectively control

• 1 supervisor to 3 employees - ideal

• 1 supervisor to 6 employees - good

• 1 supv to 12 employees - Acceptable

Page 345: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

General Management

• Unity of Command - means that an employee should be under the direct control of only one immediate supervisor

Page 346: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

General Management

• The most common management weakness is the failure to properly delegate responsibility and the authority to carry out the responsibility.

Page 347: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Organizational Chart• Horizontal plane - indicates the

divisions of areas of responsibility

• Vertical plane - defines the levels of authority

Page 348: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

General Management

• Organizational structure should be flexible to be most effective

Page 349: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Behavioral Theories• Dr. Abraham Maslow developed a five-step

process which describes man’s behavior in terms of the needs he experiences. These needs are:– Food and shelter (basic needs)– Safety - such as security, protection and

avoidance of harm and risk– To belong– Ego status - receiving some special recognition– Self-actualization, such as being given

assignments which are challenging

Page 350: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Behavioral Theories• Frederick Herzberg’s “Motivation-Hygene

Theory” - defined two independent categories of needs - hygene factors and motivators.

• Hygene Factors - salary, fringe benefits, security (Civil Service), rules and regulations and supervision.

• Motivators - Challenging assignment, increased responsibility, recognition for work and individual growth

Page 351: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Security’s Role

• Security provides protection services for the organization. The protective service of prevention is a primary service provided.

Page 352: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Key Resources• Human resources - identification of staffing

needs and selection, training, leading, and directing, and retaining of effective personnel

• Financial resources

• Administrative resources

• Operational resources- basic and technology based equipment to complete the mission

Page 353: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Budgeting and Planning

• A budget, a plan in financial terms, is an essential element of management planning and control. Three purposes for budgeting:

• Estimate the costs and expected revenues of planned activities

• Provide a warning mechanism when variances occur in actual numbers

• Exercise uniformity in fiscal control

Page 354: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Budgeting and Planning

• If the contribution of an operating function cannot be quantified or cannot be shown to result in greater net revenue, it is an axiom of sound management that the function be reduced or eliminated.

Page 355: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Budgeting and Planning

• Zero based budgeting requires that the benefits from an activity be weighed against the benefits to be lost if the planned activity is carried out at a lesser level or not done at all.

Page 356: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Budgeting and Planning• Budgeting approaches can be bottom up

and top down or top down and bottom up.

• Top down and bottom up is preferred by some because senior management initiates the process by establishing acceptable expenditure limits and guidelines prior to detailed planning by middle or operating management

Page 357: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Budgeting and Planning

• Line item budgets - each item is listed by separate line

• Program budgets - funds are allocated by specific activity

• Capital budgets - used for infrequently purchased high dollar items

Page 358: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Budgeting and Planning• Budget costs are classified under one of

three categories:– Salary expenses -– Sundry expenses - all ongoing non-salary

expenses – capital expenses - for physical improvements,

physical additions or major expenditures for hardware. Generally considered one time expenses

Page 359: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Budgeting and Planning• A budget is also an instrument which

records work programs in terms of appropriations needed to put them to work.

• It is also a management tool which is devised to ensure that work programs are carried out as planned

Page 360: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Budgeting and Planning• Carry budget out in three dimensions:

– The operation/project must unfold as planned

– The operation/project must take place when planned

– It will not exceed the planned costs.

Page 361: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Budgeting and Planning

• Budgets are normally prepared annually or biannually

Page 362: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Planning

• Planning is an activity concerned with proposals for the future, an evaluation of those proposals, and methods for achieving the proposals

Page 363: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Management

• Management is the activity which plans, organizes and controls activities in an organization

Page 364: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

M.B.O.

• Management by objective (MBO) is a systematic way of achieving agreed to goals set ahead of time.

Page 365: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Risk Assessment

• The possibility and probability of a risk resulting in loss depends on the risk itself and the preventative measures taken.

• Defining the problem– Loss event profile– Loss event probability– Loss event criticality

Page 366: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Risk Assessment

• Methods for handling a risk;

–Accept

–Eliminate

–Reduce

–Transfer (insurance)

Page 367: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Risk Management

• Crime and incident analysis is one of the first tools to be applied to the assessment of risks in order to determine vulnerability.

• When assessing vulnerability and the response to risks, PML factors must be considered.

Page 368: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Risk Management

• PML stands for:– Possible Maximum Loss - max loss sustained

if a given target is totally destroyed or removed– Probable Maximum Loss - amount of loss a

target is likely to sustain

• ALE stands for:– Annual Loss Expectancy

Page 369: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Risk Management

• Five principal crime risk management methods:– Risk Avoidance

– Risk Reduction

– Risk Spreading

– Risk Transfer

– Risk Acceptance

Page 370: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Risk Management

• Two basic types of protection against crime are:– Fidelity and Surety Bonds

– Burglary, robbery and theft insurance

Page 371: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Communications

• The art of effective communication is the most important skill for successful management.

• When a job is done poorly, it is usually because the manager failed to communicate clearly.

Page 372: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Discipline

• Means Learning

Page 373: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

A.S.I.S. Ethics• Perform professional duties

• observe the precepts of truthfulness, honesty and integrity

• be faithful and diligent in discharging professional responsibilities

• competent in discharging responsibilities

• Safeguard confidential information

• Not maliciously injure reputation of colleagues

Page 374: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

CPO / LPO

• Crime Prevention Officer (CPO)

– a public servant with police powers

• Loss Prevention Officer (LPO)

– private sector individual deriving authority from an employer

Page 375: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

CPTED

• Crime prevention through environmental design (CPTED) advocates that the proper design and effective use of the building environment leads to a reduction in crime and in the fear of crime.

Page 376: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Environmental Security

• Environmental Security (E/S) is an urban planning and design process which integrates crime prevention with neighborhood design and urban development.

• Has little or no effect on white collar crime, embezzlement, and fraud

Page 377: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Defensible Space by Oscar Newman

• Territoriality - attitude of maintaining perceived boundaries. Outsider quietly recognized, observed.

• Natural Surveillance - ability of inhabitants of particular territory to casually and continually observe public areas.

• Image and Milieu - involve the ability of design to counteract the perception that the area is isolated and vulnerable to crime.

• Safe area - locales that allow for high degree of observation by police

Page 378: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Security Survey

• The cost of protection is measured in:

–Protection in depth

–Delay time

Page 379: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Internal Theft

• The greatest ongoing threat to business.

Page 380: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Internal Losses

• Pilferage - stealing in small quantities over a long period of time

• Embezzlement - taking money/property entrusted to their care

• Shrinkage - loss of inventory through any means

Page 381: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Employee Theft

• Two major causes of employee theft are:– personal problems

– environment (inadequate socialization)

• Research indicates that dissatisfied employees are most frequently involved in internal theft.

Page 382: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Theft Triangle

• Consists of three elements:– Motivation, and– Opportunity, and– Rationalization

• Loss prevention techniques are designed to eliminate the opportunity

Page 383: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Security Tools

• Deter criminal attack

• Detect attacks that occur

• Delay attack to allow time for response by authorities

• Deny access to selected targets

Page 384: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Crime Analysis

• Data Collection

• Analysis

• Dissemination

• Feedback

Page 385: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Safety and Loss Prevention

• Unsafe acts cause 85% of all accidents

• Unsafe conditions cause the remaining 15%

Page 386: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Safety and Loss Prevention

• Incident - is anything from serious injury to a breakdown in quality control.

• Accident - is an undesired event resulting in physical harm to a person or damage to property.

Page 387: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Management

• Matrix management uses assets over a wide spectrum of activity by forming ad hoc teams to work on shorter term projects.

Page 388: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Liaison

• A linking up or connecting of parts of a whole in order to bring about proper coordination of activities.

Page 389: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Liaison• Private security occasionally assists in

law enforcement investigations.– Providing u/c operators, surv equip,

CCTV, money for rewards, O/T pay

• Information is the most frequently exchanged item.

Page 390: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Liaison

• 10 % to 30 % of all calls for police service were for alarms

• 95% to 99% are false

Page 391: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Liaison

• By the year 2000, the ratio of private security personnel to public police will be three to one respectively.

Page 392: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Economic Crime

• Financially motivated crime with a direct impact on the economy

Page 393: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Economic Crime

• Indirect costs of economic crime include:– Effects on business;

– Effects on government; and

– Effect on the public

Page 394: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Economic Crime

• Liability is the largest indirect cost of economic crimes for the past 20 years

Page 395: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• Narcotics - effects

–Generally, there is no loss of motor coordination or slurred speech.

Page 396: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• The poppy, cultivated in many countries around the world, is the main source of non-synthetic narcotics

Page 397: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• Morphine–One of the most effective drugs

known for the relief of pain.

• Codeine–It is by far the most widely used

“natural occurring narcotic”.

Page 398: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse• Thebaine

–the principal alkaloid in a species of poppy which has been grown experimentally in the U.S.

–converted into a variety of medical compounds including codeine.

Page 399: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse• Etorphine and Diprenorphine

–made from Thebaine

–Etorphine is more than a thousand times as potent as morphine in it’s analgesic, sedative and respiratory depressant effect

Page 400: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• Hydromorphone–Highly marketable with a

potency two to eight times as great as morphine.

Page 401: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• Meperidine (Pethidine)

• Probably the most widely used drug for the relief of moderate to severe pain

Page 402: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• Narcotic Antagonists–A class of compounds developed

to block and reverse the effects of narcotics

Page 403: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• Chloral Hydrate–The oldest of sleep inducing drugs

–liquid with a slightly acrid odor and a bitter, caustic taste

Page 404: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• Benzodiazepines–Depressants which relieve

anxiety, tension and muscle spasms as well as producing sedation and preventing convulsions.

Page 405: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• Stimulants

–Of all abused drugs, stimulants are the most powerfully reinforcing.

Page 406: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• Stimulants–The two most prevalent

stimulants are nicotine in tobacco and caffeine.

Page 407: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• Cocaine

• The most potent stimulant of natural origin.

• Designated as a narcotic in the US CSA

Page 408: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• Khat–Compulsive use may result in

manic behavior with grandiose delusions or in a paranoid type of illness, sometimes accompanied by hallucinations.

Page 409: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Substance Abuse

• Alcohol–The most used and abused

recreational drug. Physical dependence can occur if alcohol is taken regularly in large quantities.

Page 410: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Drug Screening• Enzyme Multiplied Immunoassay

Technique (EMIT) screens– easy to administer and relatively inexpensive

• Gas Chromatography/Mass Spectrometry– used for confirming tests

• Initial positives are confirmed before any personnel action is taken.

• Confirming tests should be done on the same specimen.

Page 411: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Drug Screening• To avoid liability in the screening process:

– Notify all to be tested of the screening process.– Get consent from persons tested.– Provide prior notice to incumbents that testing

is a condition of continued employment.– Define the circumstances under which testing is

done.

Page 412: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Drug Screening• To avoid liability in the screening process:

– Insure a positive identification and chain of custody for specimen collection, identification and handling.

– Limit dissemination of test results.– Maintain an Employee Assistance Program.– Regularly verify results from test facilities.

Page 413: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

U.S. Legal AspectsU.S. Legal Aspects

Sample Questions

Page 414: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

1. In substance, a crime is:

• a. A violent act

• b. A violation of one’s privacy

• c. An act or omission prohibited by law for which a penalty is provided

• d. A public wrong

Page 415: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

1. In substance, a crime is:

• a. A violent act

• b. A violation of one’s privacy

• c. An act or omission prohibited by law for which a penalty is provided

• d. A public wrong

Page 416: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

2. The Federal definition of a felony is any offense:

• a. Which calls for punishment

• b. Punishable by death

• c. For which the minimum penalty is $500

• d. Punishable by imprisonment for a term exceeding one year

Page 417: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

2. The Federal definition of a felony is any offense:

• a. Which calls for punishment

• b. Punishable by death

• c. For which the minimum penalty is $500

• d. Punishable by imprisonment for a term exceeding one year

Page 418: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

3. In federal courts, the usual prosecutor is:

• a. The district attorney

• b. The state’s attorney

• c. The commonwealth attorney

• d. The U.S. Attorney

Page 419: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

3. In federal courts, the usual prosecutor is:

• a. The district attorney

• b. The state’s attorney

• c. The commonwealth attorney

• d. The U.S. Attorney

Page 420: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

4. The main purpose of a grand jury is to:

• a. Determine whether or not an individual has committed a crime

• b. Determine guilt

• c. Determine whether there is sufficient evidence that a crime has been committed and that the accused probably committed it

• d. Determine the nature of the punishment

Page 421: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

4. The main purpose of a grand jury is to:

• a. Determine whether or not an individual has committed a crime

• b. Determine guilt

• c. Determine whether there is sufficient evidence that a crime has been committed and that the accused probably committed it

• d. Determine the nature of the punishment

Page 422: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

5. The purpose of bail is to:

• a. Confine the accused pending trial

• b. To take dangerous offenders off the streets

• c. Make certain each accused is offered his constitutional right to put up security in order to gain his release

• d. To assure the appearance of the accused in court

Page 423: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

5. The purpose of bail is to:

• a. Confine the accused pending trial

• b. To take dangerous offenders off the streets

• c. Make certain each accused is offered his constitutional right to put up security in order to gain his release

• d. To assure the appearance of the accused in court

Page 424: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

6. In a criminal trial, the burden of proof required to find guilt is:

• a. Preponderance of evidence

• b. Beyond a reasonable doubt

• c. Reasonableness of presentation

• d. Amount necessary to convince a majority of jurors

Page 425: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

6. In a criminal trial, the burden of proof required to find guilt is:

• a. Preponderance of evidence

• b. Beyond a reasonable doubt

• c. Reasonableness of presentation

• d. Amount necessary to convince a majority of jurors

Page 426: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

7. The release of a convicted person under certain conditions without having to be imprisoned is known as:

• a. Probation

• b. Parole

• c. Corpus Juris

• d. Detainer

Page 427: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

7. The release of a convicted person under certain conditions without having to be imprisoned is known as:

• a. Probation

• b. Parole

• c. Corpus Juris

• d. Detainer

Page 428: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

8. The release from confinement of a person who has served part of a sentence is called:

• a. Probation

• b. Parole

• c. Reprieve

• d. Commutation

Page 429: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

8. The release from confinement of a person who has served part of a sentence is called:

• a. Probation

• b. Parole

• c. Reprieve

• d. Commutation

Page 430: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

9. The process in which a court abides by a previous court decision is known as:

• a. Corpus Delicti

• b. Habeas corpus

• c. Ex-post facto

• d. Stare decisis

Page 431: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

9. The process in which a court abides by a previous court decision is known as:

• a. Corpus Delicti

• b. Habeas corpus

• c. Ex-post facto

• d. Stare decisis

Page 432: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

10. The crime of unlawful entry into or remaining within a building, with intent to commit some crime therein is:

• a. Robbery

• b. Trespass

• c. Burglary

• d. Embezzlement

Page 433: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

10. The crime of unlawful entry into or remaining within a building, with intent to commit some crime therein is:

• a. Robbery

• b. Trespass

• c. Burglary

• d. Embezzlement

Page 434: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

11. To make proof of intent easier in proving shoplifting, many stores have a policy which requires apprehension of a suspect to be made:

• a. After the accused leaves the premises

• b. As soon as the theft occurs

• c. As soon as the material is concealed

• d. Only on issuance of a warrant

Page 435: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

11. To make proof of intent easier in proving shoplifting, many stores have a policy which requires apprehension of a suspect to be made:

• a. After the accused leaves the premises

• b. As soon as the theft occurs

• c. As soon as the material is concealed

• d. Only on issuance of a warrant

Page 436: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

12. The private person generally may arrest without a warrant:

• a. For a felony

• b. For misdemeanors

• c. For a crime committed in his presence

• d. Where he had “reasonable cause” to believe the person arrested

committed the crime

Page 437: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

12. The private person generally may arrest without a warrant:

• a. For a felony

• b. For misdemeanors

• c. For a crime committed in his presence

• d. Where he had “reasonable cause” to believe the person arrested

committed the crime

Page 438: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

13. The Supreme Court decision which holds that no suspect, in a custodial environment, may be asked any questions until he has first been warned that he need not make any statement and advised of other rights is the:

• a. McNabb decision

• b. Mallory decision

• c. Ennis decision

• d. Miranda decision

Page 439: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

13. The Supreme Court decision which holds that no suspect, in a custodial environment, may be asked any questions until he has first been warned that he need not make any statement and advised of other rights is the:

• a. McNabb decision

• b. Mallory decision

• c. Ennis decision

• d. Miranda decision

Page 440: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

14. The Amendment to the U.S. Constitution which deals with searches and seizures is:

• a. 1st Amendment

• b. 4th Amendment

• c. 5th Amendment

• d. 6th Amendment

Page 441: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

14. The Amendment to the U.S. Constitution which deals with searches and seizures is:

• a. 1st Amendment

• b. 4th Amendment

• c. 5th Amendment

• d. 6th Amendment

Page 442: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

15. As a general rule, searches may be made of employee lockers and desks located on the premises of the company:

• a. If consent is given by the employee

• b. Under no circumstances

• c. If done by local police

• d. If done by the security manager

Page 443: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

15. As a general rule, searches may be made of employee lockers and desks located on the premises of the company:

• a. If consent is given by the employee

• b. Under no circumstances

• c. If done by local police

• d. If done by the security manager

Page 444: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

16. When a law enforcement agent induces the commission of a offense not otherwise contemplated, the accused may use an affirmative defense known as:

• a. Hearsay

• b. Illegally induce crime

• c. Ex-post facto

• d. Entrapment

Page 445: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

16. When a law enforcement agent induces the commission of a offense not otherwise contemplated, the accused may use an affirmative defense known as:

• a. Hearsay

• b. Illegally induce crime

• c. Ex-post facto

• d. Entrapment

Page 446: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

17. The imputation of another’s negligence to the employer is described as:

• a. Gross liability

• b. Vicarious liability

• c. Agency liability

• d. Net liability

Page 447: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

17. The imputation of another’s negligence to the employer is described as:

• a. Gross liability

• b. Vicarious liability

• c. Agency liability

• d. Net liability

Page 448: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

18. A willful or negligent wrong done by one person to another is a :

• a. Crime

• b. Misdemeanor

• c. Felony

• d. Tort

Page 449: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

18. A willful or negligent wrong done by one person to another is a :

• a. Crime

• b. Misdemeanor

• c. Felony

• d. Tort

Page 450: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

19. The unlawful taking of property by force or threat of force constitutes the crime of:

• a. Burglary

• b. Robbery

• c. Assault and battery

• d. Larceny

Page 451: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

19. The unlawful taking of property by force or threat of force constitutes the crime of:

• a. Burglary

• b. Robbery

• c. Assault and battery

• d. Larceny

Page 452: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

20. The act of inducing a person to commit a crime for the purpose of having him arrested is known as:

• a. Solicitation

• b. Entrapment

• c. Nolo contendre

• d. Misprison

Page 453: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

20. The act of inducing a person to commit a crime for the purpose of having him arrested is known as:

• a. Solicitation

• b. Entrapment

• c. Nolo contendre

• d. Misprison

Page 454: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

21. Deadly force may be used to defend yourself if you:

• a. Reasonably believe deadly force is necessary to protect yourself or

another from unlawful use of deadly force of a third party

• b. Your home is broken into

• c. You are protecting your property

• d. You are attacked by a drug dealer

Page 455: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

21. Deadly force may be used to defend yourself if you:

• a. Reasonably believe deadly force is necessary to protect yourself

or another from unlawful use of deadly force of a third party

• b. Your home is broken into

• c. You are protecting your property

• d. You are attacked by a drug dealer

Page 456: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

22. The prohibition against being tried twice for the same crime is found in the:

• a. First Amendment

• b. Third Amendment

• c. Fifth Amendment

• d. Fourteenth Amendment

Page 457: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

22. The prohibition against being tried twice for the same crime is found in the:

• a. First Amendment

• b. Third Amendment

• c. Fifth Amendment

• d. Fourteenth Amendment

Page 458: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

23. In a criminal prosecution the measure of evidence used to find the accused guilty is:

• a. Beyond a reasonable doubt

• b. Probable cause

• c. Suspicion

• d. Preponderance of evidences

Page 459: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

23. In a criminal prosecution the measure of evidence used to find the accused guilty is:

• a. Beyond a reasonable doubt

• b. Probable cause

• c. Suspicion

• d. Preponderance of evidences

Page 460: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

24. “Strict liability” in tort involves:

• a. Specific instructions given a security officer by a supervisor

• b. Comparative negligence by anyone in any occupation

• c. Intentional liability

• d. An ultra-hazardous or abnormally dangerous activity

Page 461: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

24. “Strict liability” in tort involves:

• a. Specific instructions given a security officer by a supervisor

• b. Comparative negligence by anyone in any occupation

• c. Intentional liability

• d. An ultra-hazardous or abnormally dangerous activity

Page 462: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

25. The theory of law which vicariously imposes liability on the principal for the acts of his or her agents is known as:

• a. Plain agency

• b. Master servant

• c. Strict liability

• d. Respondeat superior

Page 463: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

25. The theory of law which vicariously imposes liability on the principal for the acts of his or her agents is known as:

• a. Plain agency

• b. Master servant

• c. Strict liability

• d. Respondeat superior

Page 464: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

26. An employer is responsible for the acts of his or her employee committed within the:

• a. Employee’s scope of employment

• b. Area of the place of business

• c. Employer’s area of primary activity

• d. Employee’s area of primary activity

Page 465: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

26. An employer is responsible for the acts of his or her employee committed within the:

• a. Employee’s scope of employment

• b. Area of the place of business

• c. Employer’s area of primary activity

• d. Employee’s area of primary activity

Page 466: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

27. The relationship in which two parties agree that one will act as the representative of the other is known as:

• a. Contractual relationship

• b. Fiduciary relationship

• c. Partnership relationship

• d. Agency relationship

Page 467: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

27. The relationship in which two parties agree that one will act as the representative of the other is known as:

• a. Contractual relationship

• b. Fiduciary relationship

• c. Partnership relationship

• d. Agency relationship

Page 468: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

28. An agent can ordinarily act for the principal in such a way to make the principal legally responsible provided the agent:

• a. Is authorized by the principal to act that way

• b. Acts reasonably

• c. Notifies the principal within 24 hours

• d. Is eighteen years of age

Page 469: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

28. An agent can ordinarily act for the principal in such a way to make the principal legally responsible provided the agent:

• a. Is authorized by the principal to act that way

• b. Acts reasonably

• c. Notifies the principal within 24 hours

• d. Is eighteen years of age

Page 470: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

29. If “S”, while acting within the scope of employment, injures “T” and “T” dies, the employer of “S” can be:

• a. Held liable in a civil suit for damages

• b. Subjected to criminal liability

• c. Held liable for both civil and criminal action

• d. Criminally liable if the act is malicious

Page 471: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

29. If “S”, while acting within the scope of employment, injures “T” and “T” dies, the employer of “S” can be:

• a. Held liable in a civil suit for damages

• b. Subjected to criminal liability

• c. Held liable for both civil and criminal action

• d. Criminally liable if the act is malicious

Page 472: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

30. The Constitutional Amendment which provides that no person shall be denied life, liberty, or property without due process of law is:

• a. First Amendment

• b. Second Amendment

• c. Fifth Amendment

• d. Eighth Amendment

Page 473: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

30. The Constitutional Amendment which provides that no person shall be denied life, liberty, or property without due process of law is:

• a. First Amendment

• b. Second Amendment

• c. Fifth Amendment

• d. Eighth Amendment

Page 474: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

31. The right to have the assistance of counsel for one’s defense is provided by the:

• a. Second Amendment

• b. Fifth Amendment

• c. Sixth Amendment

• d. Eighth Amendment

Page 475: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

31. The right to have the assistance of counsel for one’s defense is provided by the:

• a. Second Amendment

• b. Fifth Amendment

• c. Sixth Amendment

• d. Eighth Amendment

Page 476: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

32. The primary duty of a grand jury is:

• a. Ascertain if the accused is guilty

• b. Determine probable cause

• c. Determine if a conspiracy exists

• d. Determine if an investigation should be opened

Page 477: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

32. The primary duty of a grand jury is:

• a. Ascertain if the accused is guilty

• b. Determine probable cause

• c. Determine if a conspiracy exists

• d. Determine if an investigation should be opened

Page 478: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

33. According to the U.S. code, a felony is any offense:

• a. Punishable by death

• b. Punishable by imprisonment of three years or more

• c. Punishable by imprisonment exceeding one year

• d. Punishable by imprisonment for a term exceeding one year

Page 479: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

33. According to the U.S. code, a felony is any offense:

• a. Punishable by death

• b. Punishable by imprisonment of three years or more

• c. Punishable by imprisonment exceeding one year

• d. Punishable by imprisonment for a term exceeding one year

Page 480: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

34. The affirmative act of concealing the commission of a felony, cognizable by a court of the U.S., by someone having knowledge of the felony is a violation called

• a. Misprison of a felony

• b. Accessory

• c. Subornation of perjury

• d. Obstruction of justice

Page 481: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

34. The affirmative act of concealing the commission of a felony, cognizable by a court of the U.S., by someone having knowledge of the felony is a violation called

• a. Misprison of a felony

• b. Accessory

• c. Subornation of perjury

• d. Obstruction of justice

Page 482: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

35. When a law enforcement agent induces the commission of an offense, the process is called:

• a. Accessory before the act

• b. Misprison of a felony

• c. Entrapment

• d. Stare decisis

Page 483: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

35. When a law enforcement agent induces the commission of an offense, the process is called:

• a. Accessory before the act

• b. Misprison of a felony

• c. Entrapment

• d. Stare decisis

Page 484: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

36. Wrongful appropriation of the personal property of another to the use of the taker is a tort called:

• a. Conversion

• b. Larceny

• c. Trespass

• d. Embezzlement

Page 485: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

36. Wrongful appropriation of the personal property of another to the use of the taker is a tort called:

• a. Conversion

• b. Larceny

• c. Trespass

• d. Embezzlement

Page 486: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

37. A writ issued by a court directing the recipient to appear and testify is a:

• a. Warrant

• b. Subpoena

• c. Writ of Mandamus

• d. Writ of prohibition

Page 487: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

37. A writ issued by a court directing the recipient to appear and testify is a:

• a. Warrant

• b. Subpoena

• c. Writ of Mandamus

• d. Writ of prohibition

Page 488: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

38. The general rule as to the amount of force a security officer is permitted to use in order to accomplish a lawful arrest is:

• a. The amount needed to assure that the security officer is not injured

• b. Up to and including deadly force

• c. The maximum amount

• d. Only such force as is reasonably necessary

Page 489: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

38. The general rule as to the amount of force a security officer is permitted to use in order to accomplish a lawful arrest is:

• a. The amount needed to assure that the security officer is not injured

• b. Up to and including deadly force

• c. The maximum amount

• d. Only such force as is reasonably necessary

Page 490: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

39. If a grand jury finds that probable cause exists that the accused committed the crime alleged, the grand jury then:

• a. Issues an information

• b. Issues an indictment

• c. Issues a mittimus

• d. Enters a finding of guilty

Page 491: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

39. If a grand jury finds that probable cause exists that the accused committed the crime alleged, the grand jury then:

• a. Issues an information

• b. Issues an indictment

• c. Issues a mittimus

• d. Enters a finding of guilty

Page 492: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

40. The usual charge placed against someone who has made an erroneous arrest is:

• a. Kidnapping

• b. False imprisonment

• c. Assault and battery

• d. Malicious prosecution

Page 493: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

40. The usual charge placed against someone who has made an erroneous arrest is:

• a. Kidnapping

• b. False imprisonment

• c. Assault and battery

• d. Malicious prosecution

Page 494: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

41. The federal agency in charge of disaster planning is:

• a. Federal Emergency Management Agency

• b. Office of Civil Defense

• c. Department of the Army

• d. Department of the Interior

Page 495: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

41. The federal agency in charge of disaster planning is:

• a. Federal Emergency Management Agency

• b. Office of Civil Defense

• c. Department of the Army

• d. Department of the Interior

Page 496: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

42. One of the following is not prohibited by the Federal Civil Rights Act during an investigation:

• a. Asking questions as to religious affiliation

• b. Asking questions as to prior convictions

• c. Directing inquiry into areas of race or color for discriminating purposes

• d. Directing inquiry into areas of religion or sex for discriminating purposes

Page 497: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

42. One of the following is not prohibited by the Federal Civil Rights Act during an investigation:

• a. Asking questions as to religious affiliation• b. Asking questions as to prior convictions• c. Directing inquiry into areas of race or

color for discriminating purposes• d. Directing inquiry into areas of religion or

sex for discriminating purposes

Page 498: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

43. Questions on an application blank or field investigative inquiries dealing with union membership or affiliation should be avoided as they may lead to charges which constitute violations of:

• a. National Labor Relations Act

• b. The Civil Rights Act of 1964

• c. The Civil Rights Act of 1976

• d. The Fair Credit Reporting Act

Page 499: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

43. Questions on an application blank or field investigative inquiries dealing with union membership or affiliation should be avoided as they may lead to charges which constitute violations of:

• a. National Labor Relations Act

• b. The Civil Rights Act of 1964

• c. The Civil Rights Act of 1976

• d. The Fair Credit Reporting Act

Page 500: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

44. A question on the application form inquiring about prior arrests is on its face illegal as a violation of:

• a. The National Labor Relations Act

• b. The Federal Tort Claim Act

• c. The Omnibus Crime Control Act

• d. The Civil Rights Act of 1964

Page 501: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

44. A question on the application form inquiring about prior arrests is on its face illegal as a violation of:

• a. The National Labor Relations Act

• b. The Federal Tort Claim Act

• c. The Omnibus Crime Control Act

• d. The Civil Rights Act of 1964

Page 502: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

45. Identify the act which basically prohibits discrimination, discharge, failure or refusal to hire, on any of the grounds of race, color, religion, sex or national origin:

• a. Fair Credit Reporting Act

• b. The Civil Rights Act of 1964

• c. First Amendment

• d. Omnibus Crime Control Act

Page 503: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

45. Identify the act which basically prohibits discrimination, discharge, failure or refusal to hire, on any of the grounds of race, color, religion, sex or national origin:

• a. Fair Credit Reporting Act

• b. The Civil Rights Act of 1964

• c. First Amendment

• d. Omnibus Crime Control Act

Page 504: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Significant NotesSignificant Notes

U.S. Legal Aspects

Page 505: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The Bill of Rights is the

first ten amendments to the

Constitution of the U.S.

Page 506: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

First amendment provides

for freedom of speech, religion, press, assembly and to petition

the government

Page 507: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Second amendment provides

the right to keep arms (weapons)

Page 508: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Forth amendment prohibits

unreasonable searches and seizures and also sets out the

requirement that a warrant be supported by probable cause

Page 509: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Fifth amendment prohibits

double jeopardy, compulsory self incrimination, and

deprivation of life, liberty or property without due process

Page 510: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Sixth amendment provides that the accused have a speedy public trial, know the charges against him, confront witnesses against him, have compulsory process to obtain his witnesses, and have assistance of a counsel for his defense

Page 511: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Seventh amendment provides

the right to trial by jury

Page 512: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Eighth amendment prohibits

excessive bail, excessive fines and

cruel and unusual punishment

Page 513: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Miranda warning” must be given before “custodial” interrogation. The suspect is advised:a. You have the right to remain silentb. Anything you say may be used

against youc. You have the right to contact an

attorneyd. If you cannot afford an attorney,

one will be provided free of charge

Page 514: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Generally, Miranda warnings need not be given by security

officers

Page 515: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The crime of “robbery” is the unlawful taking of property

from the immediate possession of another by force or the threat of

force

Page 516: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Larceny” is the unlawful taking of property from the possession

of another with the intent of depriving the owner of it

permanently

Page 517: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Vicarious liability” is the legal concept which holds the employer, as well as the employee, liable if the “wrong” was committed while the employee was acting within the scope of employment

Page 518: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Vicarious Liability

• An employer may avoid liability for the tortious acts of another if the hiring contract is such that the relationship of “independent contractor” on the part of the tort feasor has been established.

Page 519: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Vicarious Liability• But, the employer may be held liable for the

acts of an independent contractor when:– The work contracted for is wrongful per se– The work contracted for is a public nuisance– The work contracted for is inherently dangerous– The act of the independent contractor violates a

duty imposed on the employer by contract.– The wrongful act by the independent contractor

violates a statutory duty.

Page 520: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Respondeat superior” is the legal rule that an employer is responsible for the action or lack of action of an employee taken within the course of employment.

Respondeat Superior (Let the master respond)

Page 521: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Basic Aspects

• Respondeat Superior:–The right of control and not

necessarily the exercise of that right is the test of the relation of the master to the servant.

Page 522: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Note the difference between a “crime” and a “tort”.

A crime is a violation of the government’s penal laws;

whereas a tort is a legal wrong done to another person

(a civil wrong) No agreement between parties is

required.

Page 523: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

A crime can also be a tort

examples:batterytrespassassault

Page 524: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Most crimes are of two primary types;a. The federal definition of a

“felony” is: a crime punishable by imprisonment for a term exceeding one year

b. A “misdemeanor” is any crime which is not a felony

Page 525: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Corpus delicti” is a legal term for the “body of the crime” or the elements of the crime which must

be proved. It does not mean a dead body

Page 526: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Treason is the only crime specifically mentioned in the U.S.

Constitution

Page 527: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The criminal code of the United States is found in Title 18

Page 528: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

There are no Federal common law crimes

Page 529: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Essential elements of the crime of negligence:a. A duty owed by the defendant to the

injured partyb. A violation of that duty by failure to

follow a required standard of conductc. A causal connection between the

negligent conduct and the harmd. Actual loss or damage to the plaintiff

Page 530: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

A fidelity bond is insurance on a person covering that person’s

dishonesty

Page 531: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Strict liability” refers to the legal concept that one may be held responsible for some acts without the necessity to prove criminal intent (mens rea). Strict liability statutes are usually in the areas of public health, safety and welfare and they are generally classified as “mala prohibitum”

Page 532: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Compensatory damages” are

actual damages directly

related to the amount of the loss

Page 533: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Punitive damages” are designed to punish the defendant

and to deter him, and others, from a repetition of the wrongful

act

Page 534: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Generally, searches by security officers

are not subject to constitutional regulation under the 4th

Amendment

Page 535: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

In judging whether certain conduct is negligent, the law uses the standard of reasonableness. The “reasonable person” is one of ordinary prudence who exercises due care in a situation

such as that under litigation

Page 536: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Deadly force”, as a general rule, should be used by law enforcement officers as a last resort and then only when

the life of the officer or another person is in jeopardy

Page 537: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

An “express contract” is one which is clear, definite, direct,

and spelled out by explicit words

Page 538: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

An “implied contract” is one which is not spelled out clearly

by explicit words, but is interpreted by analyzing

surrounding circumstances or the actions of the persons

involved

Page 539: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Entrapment” is a defense in which the defendant alleges that he was induced by government officers or agents to commit a crime which he would not have

committed without the inducement

Page 540: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Statements made by subjects being interrogated must be

“voluntary”

Page 541: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The concept of the grand jury originated in England

Page 542: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

An “indemnity bond” is an insurance contract designed to

reimburse an individual or organization for possible losses

of a particular type

Page 543: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

A “citizen’s arrest” is an arrest by a private person, rather than

by a public law enforcement officer. This authority originated

at common law and is the authority of most arrests by

proprietary and contract security officers

Page 544: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

A law enforcement officer may arrest for a felony based solely on

“probable cause”.

Page 545: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

A private security officer may arrest for a felony based in

“probable cause”, but there is no margin for error; otherwise, a suit

for false arrest may be litigated

Page 546: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The “plain view” doctrine holds that if police, in the course of

lawful duty, recognize a plainly visible item as evidence of a

crime, the item may be seized and admitted in a criminal trial

Page 547: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Probable Cause is that combination of facts and circumstances which would warrant a person of reasonable caution and prudence to believe that a crime has been committed and that the person to be arrested is the one who committed the crime.

Page 548: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The Supreme Court of Terry v. Ohio authorized “stop and frisk” technique without probable cause where an experienced officer had good reason to suspect criminal activity which was dangerous to the officer or others

Page 549: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The undercover agent must know the law regarding “entrapment.” “Entrapment” is defined as the acts of officers of the government in inducing a person to commit a crime not contemplated by him/her in order to initiate a criminal investigation

Page 550: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Under no circumstances will an undercover agent be permitted to engage in “malum in se” crime such as murder, burglary, rape,

arson, robbery, etc.

Page 551: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The Fair Credit Reporting Act, among other things, requires

written notice to the applicant prior to an investigation by a

third party (Consumer Reporting Agency)

Page 552: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

As a general rule, it is permissible to ask about possible “convictions” but not “arrests”

on the employment questionnaire

Page 553: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Basic Aspects

• Civil law is the statutory and common law in which private rights and remedies are found. Of the 50 titles of the United States Code, 49 deal primarily with civil matters.

Page 554: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Basic Aspects

• Express Contract is an actual agreement of the parties, the terms of which are openly uttered or declared at the time the contract is made.

• Implied Contract is one not created or evidenced by the explicit agreement of the parties, but is inferred by law.

Page 555: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Basic Aspects

• Price is the dollar value stated in the contract.

• Reasonable value is the dollar value of goods and/or services determined by a court or arbitrator.

Page 556: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Basic Aspects

• In the transportation of goods, recovery of damages may be estopped by a “time bar” clause in the shipping documents (contracts).

Page 557: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Basic Aspects• The concept of tort liability operates to:

–Compensate a victim for his loss

–Act as a deterrent for future conduct of the same kind

–Serve as evidence of society’s disapproval of the wrong

Page 558: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Basic Aspects

• The basic elements of intentional tort liability are:– An act or omission

– Which brought about the intended result

Page 559: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Basic Aspects

• Examples of intentional torts:– Battery– Assault– False imprisonment– Trespass to land or to chattels (Conversion)– Fraud / Misrepresentation– Defamation– Invasion of privacy

Page 560: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Basic Aspects

• Generally, proprietary security officers are servants, whereas contract security personnel are employees of the supplying agency and therefor may not be considered servants of the employing organization.

Page 561: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Stare Decisis”

• The Law of PrecedenceThe Law of Precedence

Page 562: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

FelonyFelony

• Federal statutes provide for five classes of felonies ranging is punishment from imprisonment for a term exceeding one year to death or life imprisonment.

Page 563: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

MisdemeanorMisdemeanor

• Three classes of misdemeanors:• Class A - One year or less but more than 6

months

• Class B - Six months or less, but more than 30 days

• Class C - Thirty days or less, but more than 5 days

Page 564: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

InfractionInfraction

• Federal statutes provide for one class of infraction for which the penalty ranges from 5 days or less imprisonment to no authorized penalty.

Page 565: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Mala in seMala in se”

• Those crimes which are bad in themselves, ie...

–Murder

–Rape–All Common Law crimes were

mala in se.

Page 566: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Mala prohibitaMala prohibita”

• Those acts which are considered “offenses” by the passage of statutes. Generally no criminal intent is required; the mere accomplishment of the act is sufficient for criminal liability.

Page 567: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Corpus delicti

• The body of the crime. The combination of the elements which provide proof of the crime is the corpus delicti.

• Consists of:– Mens Rea (criminal intent)– Actus Rea (the forbidden act)– Coming together of the above two

Page 568: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Law of CausationLaw of Causation

• There must be a cause and effect relationship between the act of the accused and the resulting harm. The Law of Causation - a person is presumed to intend the natural and probable consequences of his act. But, the accused takes his victims as he finds him.

Page 569: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“MotiveMotive”

• Motive is not an essential part of a crime; it is not part of the corpus delicti.

Page 570: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

• Most crimes require the combination of an act and an intent, which must be simultaneous.

Page 571: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

• “Negligence” differs from “recklessness,” in that in recklessness, conduct is governed by the actual state of mind of the accused.

Page 572: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“AlibiAlibi”

• The alibi defense is one of physical impossibility. The testimony of an alibi witness must cover the entire time of the crime.

Page 573: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“Mistake of FactMistake of Fact”

• The “Mistake of Fact” defense is used when one commits a violation of the law in good faith with a reasonable belief that certain facts existed, which would make the act innocent if indeed they did exist.

Page 574: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Laws of ArrestLaws of Arrest• The basic elements which constitute an

arrest are:– A purpose or intention to effect the arrest– An actual or constructive seizure or detention

of the person to be arrested– A communication by the arresting officer to the

arrestee of his intention to place him under arrest.

– An understanding by the person to be arrested that he is being arrested.

Page 575: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Laws of ArrestLaws of Arrest

• The mere words “you are under arrest:” will not satisfy the seizure or detention element of arrest.

Page 576: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Laws of ArrestLaws of Arrest

• A warrant is an order for the arrest of a person.

• A summons directs the defendant to appear before a court at a stated time and place.

Page 577: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Laws of ArrestLaws of Arrest

• When a private citizen acts in aid of a known law enforcement officer, the citizen has the same rights and privileges as the officer and is protected from liability even if the officer was acting illegally.

Page 578: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Laws of ArrestLaws of Arrest

• Generally, private citizens may arrest any person who has committed an offense in their presence or for a felony not committed in their presence. BUT, the arrest can be justified only by further showing that the felony was actually committed by the person arrested.

Page 579: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Search and SeizureSearch and Seizure

• The “Exclusionary Rule” excludes evidence, otherwise admissible, obtained by methods which violate Constitutional guarantees of the Forth Amendment which protects an individual in his person and property.

Page 580: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The “Tainted Fruit of the Poisonous Tree” doctrine is that any and all evidence obtained as a result of an unreasonable search cannot be used against the accused. Any other evidence obtained as a result of the original unlawful invasion is dubbed the “tainted fruit of the poisonous tree” and may not be used against the person whose privacy was violated.

Page 581: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

4th Amendment4th Amendment

• The 4th Amendment does not specifically authorize a search without a warrant. We have legal searches without a warrant because of court decisions.

Page 582: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

SearchesSearches

• A private security officer has only the search authority of a private citizen.

• The Fourth Amendment does not apply to searches by private persons.

• Evidence discovered by private search is admissible in a criminal trial and is not subject to the Exclusionary Rule.

Page 583: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Confession / AdmissionConfession / Admission• A confession is a statement in which a

person acknowledges guilt of a crime.

• An admission is a statement in which a person admits a fact or facts which would tend to prove him guilty of a crime, but which does not constitute a full acknowledgement of guilt of a crime.

Page 584: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Confession / AdmissionConfession / Admission

• The fundamental test regarding the use of confessions and admissions is the “free and voluntary” test.

Page 585: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Bureau of Federal Bureau of Investigation (DOJ)Investigation (DOJ)

• Investigative Jurisdiction over Federal criminal violations and concurrent jurisdiction with the DEA on Narcotics and Dangerous Drugs. Includes the:

– National Depository of Fingerprints;

– National Crime Information Center (NCIC);

– National Center for the Analysis of Violent Crime;

Page 586: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Bureau of Federal Bureau of Investigation (DOJ)Investigation (DOJ)

– National Center for the Analysis of Violent Crime;

– Violent Criminal Apprehension Program;

– Forensic Science Training and Research Center;

– National Bomb Data Center

Page 587: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

U.S. Marshall’s Service U.S. Marshall’s Service (DOJ)(DOJ)

• Operational priorities include:– Physical security for Federal courts– Custodian of Federal evidence– Service of Federal Criminal and civil process– Witness-protection program– Federal Assets Forfeiture and Seizure– Transportation of Federal prisoners– Conduct fugitive investigations

Page 588: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Immigration and Immigration and Naturalization Service (DOJ)Naturalization Service (DOJ)

• Responsible for administering U.S. Immigration and Naturalization laws.

– Regulates non-resident aliens

– Determines admissibility of aliens into this country.

– Handles deportation proceedings

Page 589: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

U.S. Secret Service U.S. Secret Service (Treasury Department)(Treasury Department)

• Responsible for the protection of the President, Vice-President and their families as well as other designated persons.

• Investigative responsibilities include counterfeiting, credit card fraud and bank failures

Page 590: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Customs Service Customs Service (Treasury Department)(Treasury Department)

• Enforces customs-related laws and regulations

• Collect import duties.

Page 591: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Internal Revenue ServiceInternal Revenue Service(Treasury Department)(Treasury Department)

• Administers and enforces Federal tax laws.

• Special intelligence division investigates organized crime, gambling, and tax stamp violations.

Page 592: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

B.A.T. F.(Treasury Department)

• Bureau of Alcohol, Tobacco and Firearm

• Administration and enforcement of U.S. gun and explosive laws.

• Training and investigative assistance in arson and bomb investigations.

• Trace of weapons for law enforcement agencies

Page 593: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Defense Investigative ServiceDefense Investigative Service(Department of Defense)(Department of Defense)

• Administers the Defense Industrial Security Program.

Page 594: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

F.E.M.A.F.E.M.A.

• Federal Emergency Management Agency

• An independent agency• Primary responsibility of dealing

with disaster planning.

Page 595: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

F.E.M.A.F.E.M.A.

• The Director of FEMA reports to the President and works closely with the National Security Council, Cabinet, and White House staff

Page 596: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Coast GuardCoast Guard(Department of Transportation)(Department of Transportation)

• Security and safety of ports.

• Investigations of marine-related accidents, casualties and violations.

• Safety standards for commercial vessels.

Page 597: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Aviation AdministrationFederal Aviation Administration(Department of Transportation)(Department of Transportation)

• Issue and enforcement of rules and regulations for air commerce and air safety.

• Certification of airports and inspection of air-navigation facilities.

Page 598: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Highway AdministrationFederal Highway Administration (Department of Transportation)(Department of Transportation)

• Regulatory jurisdiction over safety and performance of commercial motor carriers engaged in interstate commerce. Authorized to investigate violations of:

Page 599: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Highway AdministrationFederal Highway Administration (Department of Transportation)(Department of Transportation)

–Highway Safety Act

–Interstate Commerce Act

–Explosive and Dangerous Articles Act

Page 600: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

U.S. Army Corp of EngineersU.S. Army Corp of Engineers

• Flood control planning should be coordinated with the U.S. Corp of Engineers.

Page 601: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

“NOAANOAA”

• Progressive situation reports of floods are available from the National Oceanic and Atmosphere Administration (NOAA).

Page 602: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

National Weather ServiceNational Weather Service• The NWS begins issuing hurricane

advisories as soon as there are indications a hurricane is forming and it is given a name. The purpose of an advisory is to:

– Tell where the storm is located

– Intensity of winds

– Speed and direction of movement

Page 603: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Bureau of Vital StatisticsBureau of Vital Statistics

• Records of births, marriages and deaths

Page 604: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The Age Discrimination in The Age Discrimination in Employment Act of 1967Employment Act of 1967

• Prohibits discrimination against applicants or employees over 40 years of age.

Page 605: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Equal Pay Act of 1963Equal Pay Act of 1963

• Requires that employees receive equal pay for equal work, requiring equal skill, effort and responsibility regardless of sex; however, the employer may pay different rates at different establishments.

Page 606: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The National Labor Relations The National Labor Relations ActAct

• Known as the “Wagner Act”

• The basic test of an unfair labor practice is whether it results in coercion or discrimination prohibited by the labor act.

Page 607: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The National Labor Relations The National Labor Relations ActAct

• Management representatives may not attend a union meeting.

• Undercover operations are neither conducted nor authorized where and when labor organizing efforts or labor problems are occurring.

Page 608: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The National Labor Relations The National Labor Relations ActAct

• Advise security personnel that their actions will be considered “employer actions”.

Page 609: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The National Labor Relations The National Labor Relations ActAct

• When an employee reasonably believes that an interview may lead to or result in disciplinary action and requests that a union representative be present, union representation must be allowed (The Weingarten Rule).

Page 610: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The National Labor Relations The National Labor Relations ActAct

• Management is not required to advise an employee of this right of representation or to “bargain” with the union representative.

Page 611: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The National Labor Relations The National Labor Relations ActAct

• The NLRA specifically provides that guards and non-guard employees cannot be members of the same bargaining unit.

Page 612: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The Labor Management The Labor Management Relations ActRelations Act

• Known as the Taft-Hartley Act

• Forbids unions from:–Coercing an employer to pay for work

not performed (Featherbedding)

Page 613: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Labor Management Reporting Labor Management Reporting and Disclosure Actand Disclosure Act

• Known as the Landrum-Griffin Act

• Established safeguards and restrictions on union officers and management conduct regarding their members, also prohibits either union or employer from “Hot Cargo” agreements.

Page 614: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Labor Management Reporting Labor Management Reporting and Disclosure Actand Disclosure Act

• A “Hot Cargo” agreement is defined as one where the employer agrees to cease doing business with any person or to cease dealing in any products of another employer.

Page 615: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

StrikesStrikes

• Economic Strike - The most frequent type

• takes place where there is a vote to stop work because a satisfactory employment agreement has not been negotiated.

• Economic strikes must be preceded by at least a 60-day notice that the union desires to modify the existing collective bargaining agreement.

Page 616: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

StrikesStrikes

• The Unfair Labor Practice Strike• When strikers strike to force discontinuance of an

alleged violation by an employer of the labor law.

• This type of strike permits no time for effective planning by security.

• All striking employees who request to return to their jobs must be allowed to do so by their employer.

Page 617: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

StrikesStrikes

• Three phases of security involvement during strikes:–Pre-strike planning stage

–Strike operation plan phase

–Post-strike intelligence phase

Page 618: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

StrikesStrikes• The main goals of the security

force during labor disturbances should be: – To lessen potential for violence– To adequately deal with violence when it occurs– To prevent death, injury, and damage to property– To maintain order– To preserve the integrity of the work site.

Page 619: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

StrikesStrikes

• The security strike operations plan is a comprehensive statement of all policies, procedures and activities to be done during the strike period.

Page 620: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

StrikesStrikes• The security strike operations plan

– The plan should be made available to each security supervisor and higher manager.

– It should not contain sensitive information– Effective planning of access control indicates uses

the fewest entries possible and those used should be located where easily policed.

– Management should develop a prior policy, which is understood and adhered to by all parties, regarding arrests during a strike. A sound policy would be not to agree to amnesty for serious offenses (felonies).

Page 621: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

StrikesStrikes

• The chief weapon of the strikers is the ability to discourage people from entering plant premises and to prevent movement of goods and materials to and from the plant.

Page 622: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

StrikesStrikes• “Lockout” - is the refusal of

management to allow members of the bargaining unit on the premises. A “lockout” may be used legally in the face of an imminent violent strike; however, notice of a “lockout” must be given to the bargaining unit or a charge of unfair labor practice could result.

Page 623: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• The Williams-Steiger Occupational Safety and Health Act (29 USC 651-678) was signed into law in December 1970 and became effective on April 28, 1971. The primary responsibility for administration of this act falls upon the Department of Labor.

Page 624: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• The statute states that every employee “affecting commerce” is subject to the provisions of OSHA. This means just about all employees in every industry are covered. One exception is the mining industry.

Page 625: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• The general purpose of OSHA is to provide safe and healthful working conditions for employees.

• All businesses are required under OSHA to have a person or persons trained in first aid available.

Page 626: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• OSHA Form #200 - a log and summary of occupational injuries and illness.

• OSHA Form #101 - a supplemental record of occupational injuries and illness.

Page 627: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• An “injury” results from a single incident. A one time chemical exposure is an injury.

• An “illness” is an abnormal condition or disorder caused by exposure to environmental factors in employment.

Page 628: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• Records on all work-related deaths, injuries, and illnesses must be current and must be available to Labor Department inspectors upon request. All records concerning injury/illness must be maintained for at least 5 years.

Page 629: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• If an on-the-job accident results in the death of an employee or the hospitalization of 3 or more employees, the nearest OSHA office must be contacted within 8 hours.

Page 630: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• In Marshall vs. Barlow, the Supreme Court held that officials of OSHA cannot inspect businesses without first obtaining warrants. This ruling does not apply to a few specialized industries such as firearms and liquor industries.

Page 631: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• It is not necessary for OSHA inspectors to show “probable cause” to obtain a warrant. The inspectors only must show that the inspection is part of a general administrative plan to enforce the safety laws.

Page 632: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• When they find conditions of “imminent danger”, compliance officers may REQUEST, not demand shutdown.

Page 633: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• Most citations allege violations of specific safety and health standards or of the posting and record keeping requirements.

Page 634: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• Citations based on the “general duty” clause are increasing in frequency and will further increase if OSHA tries to regulate conditions such as workplace violence. There is no “free first bite” !!

Page 635: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• Citations are not issued to employees. A citation is issued to the employer if employees fail to comply with safety and health standards.

Page 636: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• Types of citations include;

• Imminent Danger

• Serious Violation

• Non-serious Violation

• De Minimis Violation

• Willful Violation

• Repeated Violation

Page 637: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• Types of citations include;

• Imminent Danger– any condition or practice such that a danger

exists which could reasonably be expected to cause death or serious physical harm immediately, or before the imminence of such danger can be eliminated through the enforcement procedures provided by this act.

Page 638: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• Types of citations include;

• Serious Violation

– a substantial probability that death or serious physical harm could result and the employer knew, or with the exercise of reasonable diligence, should have known of the hazard. A fine not exceeding $7,000 must be assessed.

Page 639: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• Types of citations include;

• Non-serious Violation

– The condition is likely to cause injury, but not death or serious physical harm, or the employer did not know of the hazard. (A tripping hazard on a level surface). A fine of $7,000 or less may be imposed.

Page 640: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• Types of citations include;

• De Minimis Violation

–No immediate or direct relationship to safety or health.

Page 641: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• Types of citations include;

• Willful Violation– The employer intentionally or

knowingly violated the act, or was aware of a hazard and made no attempt to correct it. The minimum penalty is $5,000 - max. of $70,000

Page 642: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Occupational Safety and Occupational Safety and Health Act (OSHA)Health Act (OSHA)

• Types of citations include;

• Repeated Violation–a second or subsequent citation for

violation of the same standard or general duty clause. The minimum penalty is $5,000 - max. of $70,000.

Page 643: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The American With Disabilities The American With Disabilities Act of 1990 (ADA)Act of 1990 (ADA)

• Regulations to implement Title 1 (Employment) are issued by the Equal Opportunity Employment Commission (EEOC). The regulations cover all employers with 15 or more employees in industries affecting commerce.

Page 644: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The American With Disabilities The American With Disabilities Act of 1990 (ADA)Act of 1990 (ADA)

• Those not protected under the Act:– Transvestites (Section 508)

– Current illegal drug users (Section 510)

– Homosexuals, bisexuals, persons with sexual behavior or compulsive gambling disorders, kleptomaniacs, and pyromaniacs (Section 511)

Page 645: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The American With Disabilities The American With Disabilities Act of 1990 (ADA)Act of 1990 (ADA)

• Any medical examination or inquiry into the disability of an applicant or employee is prohibited unless the employer can show a job relationship and a consistent business necessity. Medical examinations after an offer of employment has been made must be given to all prospective employees.

Page 646: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The American With Disabilities The American With Disabilities Act of 1990 (ADA)Act of 1990 (ADA)

• Readily achievable means easily accomplished without much difficulty or expense.

• Accessibility means free of barriers that could prevent a person with impaired mobility from getting to a desired location in the facility, or to use lavatories, lounges, lunchrooms, public telephones, drinking fountains or other amenities.

Page 647: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The American With Disabilities The American With Disabilities Act of 1990 (ADA)Act of 1990 (ADA)

• The World Health Organization (WHO) definition of “impairment” is a permanent or transitory psychological, physiological, or anatomical loss or abnormality of structure or function (an amputated limb, paralysis after polio, diabetes, mental retardation, impaired hearing or sight).

Page 648: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The American With Disabilities The American With Disabilities Act of 1990 (ADA)Act of 1990 (ADA)

• The WHO definition of “disability” includes restrictions on, or the prevention of, carrying out an activity because of an impairment, in the manner or within the range considered normal for a human.

Page 649: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The American With Disabilities The American With Disabilities Act of 1990 (ADA)Act of 1990 (ADA)

• Under the ADA, a “disability” is a physical or mental impairment that substantially limits one or more of the major life activities of an individual.

Page 650: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The American With Disabilities The American With Disabilities Act of 1990 (ADA)Act of 1990 (ADA)

• The WHO defines “handicap” as a disability which interferes with what is expected at a particular time in one’s life (inability to care for oneself, communicating thoughts and concerns, developing a capacity for independent economic activity).

Page 651: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• The 1987 Individual Sentencing Guidelines tended to narrow the range of punishment for a certain crime and to standardize sentencing.

Page 652: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• The 1991 Organizational Sentencing Guidelines cover anti-trust, money laundering, fraud, ERISA, securities, and environmental law violations.

Page 653: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• A $20 million gain to a company from an anti-trust violation could result in a criminal fine ranging from $1 million to $80 million depending on the guidelines applied.

Page 654: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• The deterrence and detection objectives are reached by requiring every company:– To make restitution to any party injured

by the criminal conduct; and

– To pay a fine which is not tax deductible

Page 655: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• The fine consists of a “base fine” which is multiplied by a “culpability score” to determine a minimum and a maximum range within which the court impose a fine.

Page 656: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• The “base fine” is the greater of:

–The pre-tax gain to the company from the crime, or

–The loss to any party intentionally injured by the crime, or

–From $5,000 to $72,500, determined from a “level of seriousness” table.

Page 657: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• In determining the “culpability score”, every business starts with a rating of 5 and aggravating or mitigating factors move the score within the range of 0 to 10.

Page 658: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• Aggravating factors, include;– Participation, tolerance, or disregard of criminal

conduct by high level personnel or substantial authority personnel in a large organization. (Add 5 points).

– A history of similar conduct within the last 5 years. (Add 2 points)

– Obstruction of justice in the course of the investigation, prosecution or sentencing. (Add 3 points)

Page 659: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• Mitigating factors, include;– Self-reporting, cooperation with an

investigation, and accepting responsibility for the conduct of the organization. (Subtract 5 points)

– An effective compliance program(s) to prevent and detect criminal conduct. (Subtract 3 points)

Page 660: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

•An effective compliance program has seven mandatory components:

Page 661: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• 1. Establishment of compliance standards which are reasonably capable of preventing criminal conduct.

• 2. Specific responsibility for high level management to oversee the standards.

Page 662: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• 3. Communication of standards and offering training in compliance issues to employees.

• 4. Tests of the compliance system with auditing, monitoring, and other tests designed to detect criminal conduct.

Page 663: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines• 5. Due care to insure that discretionary

authority is not delegated to individuals with a propensity to engage in illegal conduct.

• 6. Enforcement using disciplinary procedures which include provisions for discipline of individuals who fail to detect or report an offense.

Page 664: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• 7. All reasonable steps, after an offense has been detected, to prevent a future similar occurrence.

Page 665: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• A determination, after the fact, that an effective compliance program did not exist will probably result in a probation status which may require that the company:

Page 666: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

Federal Sentencing GuidelinesFederal Sentencing Guidelines

• 1. Publicize its criminal acts at its own expense as directed by the court.

• 2. File periodic financial reports with the court

• 3. Submit to periodic examination by court appointed experts.

Page 667: CPP Study Guide # 2 1 - 667. Sensitive Information Sample Questions

The EndThe End