21
Security Management Advanced Diploma Course – Assignment One – Page 1 SECURITY MANAGEMENT ADVANCED DIPLOMA COURSE ASSIGNMENT ONE THE RATIONALE AND PROCESSES OF SECURITY INTRODUCTION Educational aims This module aims to provide: a general understanding of the scope and definitions of security and security management understanding of the responsibilities of a Security Supervisor role understanding and knowledge of the constituent parts of an organisation’s Security System the necessary understanding to identify and address risks knowledge of how to determine any individual protection needs Learning outcomes On completion of the Security Management course you will understand and be able to explain: the scope and definitions of security and security management the responsibilities implicit in the role of Security Supervisor the organisation and constituent parts of a functional Security System what constitutes a Risk and how to effectively address it how to identify and meet individual Protection Needs your own learning and its role and impact on colleagues and your workplace

SECURITY MANAGEMENT ADVANCED DIPLOMA COURSE

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Security Management Advanced Diploma Course – Assignment One – Page 1

SECURITY MANAGEMENT

ADVANCED DIPLOMA COURSE

ASSIGNMENT ONE

THE RATIONALE AND PROCESSES OF SECURITY INTRODUCTIO N

Educational aims

This module aims to provide:

• a general understanding of the scope and definitions of security and security management

• understanding of the responsibilities of a Security Supervisor role

• understanding and knowledge of the constituent parts of an organisation’s Security System

• the necessary understanding to identify and address risks

• knowledge of how to determine any individual protection needs

Learning outcomes

On completion of the Security Management course you will understand and be able to explain:

• the scope and definitions of security and security management

• the responsibilities implicit in the role of Security Supervisor

• the organisation and constituent parts of a functional Security System

• what constitutes a Risk and how to effectively address it

• how to identify and meet individual Protection Needs

• your own learning and its role and impact on colleagues and your workplace

Security Management Advanced Diploma Course – Assignment One – Page 2

Cognitive skills

You will be able to:

• use ideas and techniques drawn from the study of security management within actual

organisations to analyse a range of security-related problems and issues

• identify and assess a range of approaches to supervision issues to inform management

decisions

• reflect on and evaluate your learning

Key skills

You will be able to:

• communicate your understanding effectively, using appropriate styles and language

• plan and manage your learning towards the achievement of aims and objectives, including the

recognition of knowledge limitations

• engage in reflective, adaptive and collaborative learning

Teaching, learning and assessment methods

You will learn independently, using printed teaching texts supported by self-assessment questions

and exercises, which will be included in the teaching texts.

Introduction to security, its definition and scope

The security industry is there to represent businesses by means of

preventing and detecting crime and other unauthorised activities,

preventing or reducing loss, waste or damage, monitoring safety risks, and

dealing with identified risks.

There are several licensed sectors in manned guarding, including vehicle

immobilisation, private investigation, events security, electronic security,

fire systems, and other career opportunities in operational roles

(supervisory or management roles), and support roles in sales, human

resources management, training or consultancy.

Security Management Advanced Diploma Course – Assignment One – Page 3

The Private Security Industry Act of 2001 exists to raise standards, increase public confidence and

safety, remove criminal elements from security roles and establish the SIA and licensing.

The role and main functions of the Security Industry Authority are to regulate the industry through

licensing, to raise professional standards through a Approved Contractor Scheme. Other standard-

setting bodies exist to establish standards for non-licensed roles and to inspect the SIA Approved

Contractor Scheme.

All security industry operatives are required to have the following personal attributes:

• reliability and integrity

• keen observation skills

• polite communication skills

• a responsible attitude to dealing with problems

• an ability to manage and respond to sensitive situations

• good team working skills

Security Managers need to understand relevant legislation, including Civil and criminal law.

The purpose of the law is manifold: to right wrongs, to punish the perpetrator, and to deter any

potential perpetrators. Cases are brought by individuals (under civil law), or the state (under criminal

law). The prescribed remedy may be compensation of the victim for any loss or damage, a fine, or a

term of imprisonment. The standard of proof is different in civil and criminal cases.

A civil case in England will be decided on the balance of probabilities while, in English law, all

criminal charges must be proven beyond reasonable doubt.

Security management also covers protecting

individuals’ data. The eight basic principles

outlined in the Data Protection Act are:

1. Personal data shall be processed fairly and

lawfully, and not processed unless it can be

demonstrated that it is necessary according

to specified criteria or has been explicitly

permitted by the individual.

2. Personal data shall be obtained only for

lawful and specified purposes, and cannot

be processed further if incompatible with

those purposes.

Security Management Advanced Diploma Course – Assignment One – Page 4

3. Personal data shall be relevant and not excessive to its purpose.

4. Personal data must be accurate and up-to-date.

5. Personal data shall not be kept for longer than is necessary for its agreed purpose.

6. The legal rights of the individual must be respected in handling their data.

7. Technical and organisational measures shall be taken to protect personal data from theft, loss

or accidental destruction.

8. Personal data shall not be transferred to outside the European Economic Area unless an

adequate level of protection for the rights and freedoms of data subjects can be assured.

Security management can also involve protecting individuals’ rights and preventing workplace

discrimination. The main categories of workplace discrimination are on grounds of race, ethnicity or

nationality, gender, religion or belief, disability, sexual orientation or age

Discrimination can take the form of airing prejudiced (e.g. racist) views. Victimisation is when the

management or colleagues unfairly treat the individual. Harassment is acting aggressive or other

inappropriate behaviour.

Discrimination is prohibited under EU law, whether direct or indirect. Direct Discrimination happens

when a person is treated less well compared to someone else, because of one of the listed factors, for

example, refusing to hire suitably qualified people because they are of a certain race or ethnic origin,

or specifying age in a job advert with no practical justification.

Indirect discrimination is when an apparently neutral practice would disadvantage people on the

listed grounds. For example, requiring a driving licence in case it is occasionally needed for a role

might prevent some people with disabilities from applying for a job they are capable of doing.

All individuals are entitled to be free of all three, and one of the purposes of security management is

to ensure these rights are protected. The employer also has a prescribed duty to make reasonable

adjustments for a disabled employee, and failure to do this can also constitute discrimination.

Security Management Advanced Diploma Course – Assignment One – Page 5

The employment-related legislation applies to the following areas:

• recruitment

• access to training

• pay and benefits

• promotion opportunities

• terms and conditions

• redundancy

• dismissal

Effective communication and customer care in Security Management

The basic principles of customer care are to:

• establish a rapport

• acknowledge the customer

• communicate information

Common responses to an emergency situation can be reluctance to accept

that an emergency is happening, calmness, more altruistic and co-

operative behaviour, or fear and distress.

Effective communication helps to ensure organisational efficiency, allow

effective team working, provide appropriate service to customers, whether

internal, external, direct or indirect, provide an acceptable service to

customers with specific needs such as physical or learning difficulties or

sensory impairment, and provide acceptable levels of service to non-

native English speakers.

Ideally the Message is conveyed, and Feedback sent and received, but there are many potential

barriers to communication, all represented here by the concept of ‘noise’.

Security Management Advanced Diploma Course – Assignment One – Page 6

Physical barriers can include:

• equipment

• physical separation/distance

• background noise

• poor or excessively bright lighting

• attitudes such as:

o complacency

o incorrect assumptions

• and emotional factors like:

o nervousness

o anger

o excessive stress

Problems with the sender’s linguistic factors might be an unclear message, an accent, excessive use

of the organisation or industry’s jargon, or thoughtless use of slang.

Problems with the receiver’s linguistic factors can include their level of literacy, or the standard of

their English as second language.

Organisational issues can include unclear reporting lines, poor delineation of roles, and poor

communication of individual responsibilities.

The model also applies to the many other methods of verbal and non-verbal communication.

Verbal communication includes:

• speaking

• listening

• reading

• writing

Security Management Advanced Diploma Course – Assignment One – Page 7

Non-verbal communication includes:

• gesture

• stance

• extent and type of eye contact

• facial expressions

• paralanguage – i.e. non-verbal elements of speech such as pitch, tone or volume which can

carry an implied message

Security Management requires effective communication, which can be achieved if you choose

language and a medium appropriate to the nature of the message and its recipient, deliver the

message clearly, and check understanding before continuing.

The six golden rules for dealing with problems are:

1. acknowledge the customer

2. establish the customer’s needs

3. put yourself in the customer’s position

4. accept responsibility

5. involve the customer in the solution

6. see it through

The Role and Responsibilities of a Security Supervisor

Door supervision is required by premises with admission fees, and also to monitor and maintain the

safety of staff, students, etc. and protect property at any place of business, office or educational

establishment.

The objectives of the door supervisor are to control access to the premises, enforce the law and any

company policy or entry conditions, ensure the safety and security of clients and other staff, both in

routine situations and emergencies, and prevent crime, disorder and any other unacceptable

behaviour.

Security Management Advanced Diploma Course – Assignment One – Page 8

The key qualities of a door supervisor are:

• oral communication skills

• interpersonal and team working skills

• quick thinking and decisiveness

• politeness and courtesy

• assertiveness

• ability to remain calm under pressure

• honesty and fairness

• observational skills

The SIA’s standards of behaviour for security management require smart personal appearance, a

professional attitude, training and relevant skills, acceptable general conduct, and maintenance of

professional values and standards.

SIA Standards are set down to:

• raise standards of conduct, training and supervision

• increase public confidence

• maintain good customer relationships

• maintain good relations with police

• maintain the reputation of the venue

• maintain the reputation of the security industry

According to the Private Security Industry Act of 2001, the professionals that must hold an SIA

licence include door supervisors or vehicle immobilisers, their supervisors, managers and employers,

sole traders and directors of contractors performing designated licensable activities, and their

employees, the managers or supervisors of front-line staff on behalf of a contractor, in-house security

managers or supervisors, and anyone involved in or performing licensable vehicle immobilisations

and charging a release fee.

The licence must be prominently displayed by non-front-line staff, or worn by front-line staff, and

the licence must not be altered. The SIA must be notified of any individual officer’s lost licence,

criminal convictions, change of address, or change to his or her right to work in the U.K.

A licence must be made available for inspection when requested by a police officer, any member or

employee of the SIA, or any other person authorised by the SIA, or returned to the SIA when asked

to do so.

Security Management Advanced Diploma Course – Assignment One – Page 9

In addition to statutory requirements, the SIA’s voluntary Approved Contractor scheme was

developed in consultation with the industry to raise professional standards. The SIA will grant

sector-specific approval to contractors meeting specific qualifying criteria. Accredited contractors

may display the ACS Accreditation Mark.

Search procedures

Searches are either general searches, carried out on everyone with a view to identifying any hazards

or illegal material, random searches that have the same intention, but are not comprehensive, or

specific searches targeted towards a predetermined goal, for example a search on a suspected drug

dealer or someone reported to be carrying an offensive weapon.

Best practice includes allowing self-search where possible, ensuring same-sex searching, involving a

witness, appropriate facilities, e.g. a private cubicle, and accurately maintaining search logs.

An admissions policy exists to help door staff manage customer expectations, deter unacceptable

behaviour, and justify any refusals or ejections.

Common areas defined in a standard admissions policy are:

• Acceptable behaviour

• Acceptable physical state

• An agreed entrance fee

• Any search conditions

• The required age for admission, and acceptable proofs of age, e.g. PASS, photo-card driving

licence or passport

Premises might need to be searched to ensure evacuation routes are clear, check safety equipment,

check for or investigate suspicious objects, and ensure relevant areas are secure. Searching people

and their property must be done with professionalism, their permission, empathy and politeness.

The Criminal Law Act 1967 requires any force used by security personnel to be reasonable,

necessary and proportionate, and criminal law defines the following types of assault:

a. common assault

b. actual bodily harm

c. grievous bodily harm

d. sexual assault

e. rape

Security Management Advanced Diploma Course – Assignment One – Page 10

There are several types of criminal offence against property, including trespass, criminal damage and

theft.

Your options when dealing with someone who has broken the law are to:

a. Ask the customer to leave

b. Forcibly eject the person

c. Make a citizen’s arrest

d. Confiscate any offending items

e. Notify the police

Hazards faced by the searching officer can include violence, sharp objects, accusations of assault, or

accusations of planting of evidence. So essential precautions include maintaining appropriate

behaviour when searching, allowing self-searches, and ensuring the presence of appropriate

witnesses.

It’s vital to follow procedures maintaining control of the process, and to ask someone else to assist

when necessary.

An offensive weapon is defined as an object made or adapted to cause injury, or an object intended

to cause injury.

When articles are seized during a search, immediately hand them over to your supervisor. Follow

agreed internal procedures for storage or disposal and log the seizure and chain of custody.

The Police and Criminal Evidence Act 1984, while forbidding false imprisonment, allows anyone

including a security officer to arrest individuals in respect of indictable offences. An indictable

offence, as opposed to a summary offence, is a serious offence that would be heard at a crown court

before a jury. These include murder, rape, and serious assaults. Common indictable offences relating

to property include robbery (i.e. theft with violence). Drugs-related offences that are indictable are

those which constitute assault on another person, such as spiking their drink. It is also possible to

arrest someone who would otherwise commit a breach of the peace.

Before making a citizen’s arrest, consider the legal requirements you need to meet before you are

entitled to make a citizen’s arrest, whether there’s a police officer who could make the arrest,

whether any other viable options are available, the policy of the premises, the policy of the local

police, any knock-on effects this may have on you or your team, such as being taken away from main

duties, and the risk of violence.

Security Management Advanced Diploma Course – Assignment One – Page 11

To make a citizen’s arrest you must:

1. Clearly tell the apparent criminal you are putting him or her under citizen’s arrest. They must

fully comprehend you and understand that you are addressing them.

2. Explain why you are making a citizen’s arrest, including your reasons for believing it is

appropriate and necessary.

3. Apprehend the suspect with as little force as possible. Do not attempt to handcuff or tie them

to anything.

After making a citizen’s arrest you are required to ensure the welfare of the arrested person, call the

police immediately, detain and supervise the individual until the police arrive, and make an incident

report according to agreed procedures.

You will be asked to give a statement to police. Make sure to include everything that you witnessed

and did. Be clear about any force you had to use to arrest the suspect.

Licensed Premises

The objectives of current licensing legislation relate to dealing with crime and disorder, maintaining

public safety, minimising public nuisance, and the protection of children.

Types of licence include the premises licence, a club premises certificate, a licensee’s personal

licence, and a temporary events notice.

With regard to licensed premises, police have the power to:

• enter to investigate licensable activities or licensing offences

• enter to search in relation to drugs offences

• enter to investigate a breach of the peace

• close premises because of offences of disorder

• close premises to preserve public safety

• close premises because of excessive noise nuisance

Other authorised persons also have the right to enter to investigate licensable activities or licensing

offences.

Security Management Advanced Diploma Course – Assignment One – Page 12

A door supervisor acts act as a representative of the licensee in the licensee’s duty to prevent

breaches of licensing law and other illegal activities, and in this capacity has the right to refuse entry,

to withdraw consent to be on premises, and to eject persons in certain circumstances.

Customers may be ejected for breaching the conditions of entry, breaking the law, or for

unacceptable behaviour.

Activities unlawful under licensing, gaming and sexual offences legislation include offences relating

to drunkenness, other disorderly conduct, permitting a young person to use a Category C gaming

machine, or soliciting or controlling prostitutes.

Drug legislation

Drug offence categories are:

• possession

• supply

• use of premises to supply

Indicators of drug misuse may include physical symptoms, behavioural signs, and physical evidence

of taking the drug.

Common illegal drugs include:

• Heroin

• Cocaine

• ‘Ecstasy’ or MDMA

• Cannabis

Suspicious behaviour suggesting the possibility of drug dealing includes vigilance by suspected

dealers, specific movements, suspicious patterns of interaction with others, and use of locations

where drug dealing often occurs, such as toilets or dark nooks with poor sight lines.

The procedure for dealing with customers in possession of drugs, if no arrest is made is ejection,

followed by seizure of the drugs, and storage or disposal of said drugs.

To safely dispose of contaminated or drug-related litter and waste, avoid skin contact with any

material contaminated with bodily fluids, use the designated sharps boxes to dispose of syringes,

wear gloves and use protective clothing as set out in procedures, use designated disposal bags, and

carefully and thoroughly wash your hands afterwards.

Security Management Advanced Diploma Course – Assignment One – Page 13

If an arrest is made, follow the legally required arrest and detention procedures, secure the evidence,

and record the incident in the relevant log according to house procedures.

Types of records kept include:

• duty register

• pocket book

• incident report

The reasons for keeping these documents include permanence, for them to be used as evidence, to

alert others, for monitoring purposes, for self-protection of the officer, or to protect the organisation.

Because they are so important, these records need to be kept orderly and in a secure location.

Incidents to normally be recorded are ejections, use of force, visits by authorities, customer

complaints, accidents, and emergencies.

Factors determining if and when the police should be called are the seriousness of the situation,

advice from the management, the venue’s policy, and the local police’s policy.

What to include in an incident report:

• The date, time and nature of the incident

• Details of the incident

• Details of those involved

• Details of any witnesses and what they saw or heard

• Details of what actions you took

To preserve any evidence and prevent crime scene contamination, be sure to use cordons, allow only

authorised persons to enter the area, protect any evidence from the ravages of the weather, and

protect evidence from any third party interference.

Types of evidence include:

• direct

• circumstantial

• expert

• hearsay

• documentary

Security Management Advanced Diploma Course – Assignment One – Page 14

In the event of an observed or suspected theft security staff should maintain careful and discreet

observation of any suspect and communicate the situation to a nominated person if available. After a

suspect has passed through the checkout area, follow organisation’s policy with regard to

challenging, searching or apprehension of the suspect. Take steps to manage any possible

confrontation and maintain your own personal safety, and preserve continuity of any evidence,

including stolen items.

To safeguard their own personal security, all staff should remain vigilant, know how to recognise

suspicious behaviour, take any identified steps to discourage theft, comply with all company

guidelines, and avoid divulging any personal details.

The following types of security incident should be referred to senior staff:

• suspected staff theft

• incidents involving significant threat to the personal safety of self or colleagues

• incidents posing a significant threat to the personal safety of customers

• discovery of defective security equipment

• identification of a suspect package

The constituent parts of a security system

Typical security systems include door supervision, general security inspections and maintenance,

guarding valuables and protecting people, CCTV operations, vehicle immobilisation protocols, and

procedures for transfer of cash or valuables.

Actions and precautions to secure stock include:

• CCTV

• Signs

• Secure storage

• Dummy packets

• Electronic article surveillance

• Staff awareness

• Safe storage of keys facility

• Restricted areas

• Store watch associations

• Restricting customer numbers

Security Management Advanced Diploma Course – Assignment One – Page 15

Typical approaches to premises security are off-site storage,

use of a designated store room, CCTV surveillance, night

shutters, alarm systems, security signs, promoting staff

awareness, security lighting, removing potential climbing aids

from the outside of the building, and a door locking system

restricting and monitoring ingress and egress by customers or

visitors.

Standard approaches to securing cash are to keep it off-site, set cash withdrawal limits, display

security signs, use CCTV to monitor transactions and storage, vary cash transfer times to avoid

becoming predictable, use agreed validation methods, and mark notes with security pens.

Approaches to the security of individuals include:

• CCTV monitoring

• Displaying security signs

• Staff awareness and training

• Issuing personal attack alarms

• Supplying protective equipment

Information is protected by the use of locked cabinets, keeping offices locked, keeping storerooms

locked, a computer password protection protocol, regular hard drive back-ups, and secure filing of

hard copies.

Essential precautions against staff theft include staff purchase policies, routine spot checks, a system

to ensure a neutral person serves staff family and friends, requiring staff to leave through the front

door, random or targeted bag searches, locker searches, and clear, communicated policies on

handling personal belongings in the workplace.

Risk and Risk Treatment

Security risks to an organisation include internal and external crime, asset threats, e-crime and threats

to physical security, and can be tackled with security risk surveys and checklists, countermeasure

analysis, and cost benefit analysis.

The purpose of any threat and risk assessment is to identify all threats and assess the levels of risk, to

facilitate risk reduction, and to aid planning and preparation.

Unusual or suspicious activity might be indicated by surveillance, asking for detail about the

premises, testing security responses, and people, objects or behaviour that are out of place.

Security Management Advanced Diploma Course – Assignment One – Page 16

Current standard counter-terrorism measures are to be alert to any hostile reconnaissance or

suspected dry runs, to maintain vigilance and a visible presence to deter and disrupt terrorist activity,

routine screening and searches of premises, and reporting and recording of incidents.

Health and safety measures are necessary to comply with legislation, including:

• Health and Safety at Work Act of 1974

• The Control of Hazardous Substances Act of 1992

• The 1992 Manual Handling Regulations

• The Workplace (Health, Safety and Welfare) Regulations of 1992

• The 1995 Regulations Controlling Noise at Work

• The Reporting of Injuries, Diseases and Dangerous Occurrences Regulations 1995

• The Health and Safety Management at Work Act of 1999

This will spare the business negative consequences such as prosecution, the forcible closure of the

business, lost productivity, business disruption, staff shortages, and damage to employees’ health.

An employer’s main duties under the legislation are to assess and reduce risk, provide first aid

facilities, inform staff about hazards, provide training as required, ensure injuries and accidents are

recorded, provide protective equipment, provide any relevant protective clothing, and to provide and

maintain warning signs.

The main duties of employees and self-employed individuals are to:

• be responsible about their own health and safety

• co-operate with employer,

• take reasonable care

• avoid putting themselves or the public at risk

• report any injuries or accidents to their employer

Risk to personal safety and security can be minimised by developing awareness of risks and hazards,

supplying or undertaking training on specific hazards, using personal alarms, using mobile phones to

maintain contact or raise an alarm, following safe routines, being systematic, and establishing and

following safe procedures for lone working.

Common first aid situations that can arise are accidents, such as slips, trips or cuts, results of

violence, a drugs overdose, or an epileptic seizure.

Typical hazards that might result in slipping or tripping-up include unsuitable footwear, damaged or

wet flooring, cleaning-related hazards, industrial leakage or contamination, obstacles and poor

lighting.

Security Management Advanced Diploma Course – Assignment One – Page 17

Safe manual handling requires careful assessment of the load before lifting, correct positioning of the

head, feet and back, correct positioning of the load, smooth movements, and avoiding twisting the

back.

Fire risk assessments are carried out to eliminate hazards and reduce risk. Maximum occupancy

figures are set to maintain safety within the venue, and to allow safe evacuations.

The three components of what is known as the ‘fire triangle’ are:

1. oxygen

2. fuel

3. heat

The prevention of fire requires control of fuel, control of ignition sources such as bins and paper

waste, safe disposal of hazards, safe storage of flammables, electrical or electronic equipment to be

regularly inspected and maintained, and avoiding overloading electrical points.

Fire fighting arrangements may include the provision of:

• water extinguisher

• powder extinguisher

• foam extinguisher

• carbon dioxide extinguisher

• extinguisher for wet or dry chemical fire

• fire blankets

• sprinkler systems

Responses on discovering a fire can be remembered using the

mnemonic FIRE:

• Find

• Inform

• Restrict

• Evacuate or Extinguish

It’s vital to be aware of and understand evacuation procedures to save time in an emergency, keep

one’s self and others safe, and assist emergency services.

An ‘emergency’ is defined as any situation that is unexpected, threatens safety or causes serious

disruption, and requires immediate action.

Security Management Advanced Diploma Course – Assignment One – Page 18

Non-fire-related emergencies can include power, system or equipment failure, flood, actual or threat

of serious injury, serious illness, and bomb threat.

The appropriate response to an emergency is to follow correct procedures depending on the nature of

the emergency, ensure your own safety, ensure the safety of others, and report the situation to the

appropriate emergency service.

It’s appropriate to your security management role to act quickly, be authoritative, remain calm, and

encourage others to remain calm.

In responding to first aid situations, seek help, ensure your own safety, assess the situation, and

assess the condition of the casualty.

If the casualty is unresponsive:

• open the airway

• apply assisted breathing techniques if relevant

• compressions if relevant

• put them in the recovery position

Respond to major haemorrhage and bleeding by positioning the patient to minimise the effect of the

injuries.

Determining Protection Needs

A threat and risk assessment, intended to maintain the safety of an individual (or ‘principal’),

comprises a threat profile of the principal, the health of the principal, the principal’s diary and

engagements, any existing security arrangements, the nature of any potential threats, the extent of

any potential threats, types of potential threat, probability levels of any threats, and other interests at

risk.

The seven ‘P’s of principal threat profiling are:

1. People

2. Places

3. Personality

4. Prejudices

5. Personal history

6. Political/religious views

7. Private lifestyle

Security Management Advanced Diploma Course – Assignment One – Page 19

When planning protection, both direct and indirect threats must be identified and assessed. Protection

imperatives must be balanced against lifestyle requirements and the individual’s ability to act in their

profession. There must be a systematic approach to threat and risk assessment, and risk assessments

regularly reviewed and updated as necessary.

The main threats to a principal could be unintentional injury, intentional injury or attack, unwanted

attention, threats to their public or professional image, and the gathering of information from the

principal, whether personal or commercially sensitive.

When arriving at or leaving a location, the protocol will vary for hotels, restaurants, airports and

leisure and entertainment venues.

It’s vital to maintain dynamic assessment of the risk from any persons, places or objects.

Options available in threatening situations are to take action, avoid the situation, or seek help.

A protection protocol must be made up of both generic and specific orders that cover response and

contingency plans.

The recognised categories of threat intensity are:

• Category 1: high level of threat

• Category 2: medium level of threat

• Category 3: low threat intensity

Individual protection operatives in the UK gather intelligence from police liaison, local authority

information, security companies and embassies, their own reconnaissance, the news media and the

internet and other types of research.

Security Management Advanced Diploma Course – Assignment One – Page 20

Further research and study sources

www.hse.gov.uk/index.htm Health and Safety Executive – source of information about health and

safety legislation

http://sia.homeoffice.gov.uk The Security Industry Authority

http://skillsforsecurity.org.uk The security sector’s standards-setting body

www.gov.uk/equality-act-2010-guidance Explanation of the current Equalities legislation

www.gov.uk/data-protection online guide to the Data Protection Act

www.slideshare.net/melisanahimana/transmission-model-of-communication

a useful online presentation explaining the transmission model of communication

TUTOR TALK: Now move on and answer the questions then return your completed test

paper to the College for marking. Good luck and well done.

© Copyright Reserved

“The person who gets the farthest is generally the one who is willing to do and dare. The sure-thing

boat never gets far from shore.”

Dale Carnegie

Security Management Advanced Diploma Course – Assignment One – Page 21

STUDENT NOTES: Please use the space below for recording what you consider to be

any pertinent information or notes. You may find it helpful to refer back to it later on!