Upload
others
View
4
Download
0
Embed Size (px)
Citation preview
Security Management Advanced Diploma Course – Assignment One – Page 1
SECURITY MANAGEMENT
ADVANCED DIPLOMA COURSE
ASSIGNMENT ONE
THE RATIONALE AND PROCESSES OF SECURITY INTRODUCTIO N
Educational aims
This module aims to provide:
• a general understanding of the scope and definitions of security and security management
• understanding of the responsibilities of a Security Supervisor role
• understanding and knowledge of the constituent parts of an organisation’s Security System
• the necessary understanding to identify and address risks
• knowledge of how to determine any individual protection needs
Learning outcomes
On completion of the Security Management course you will understand and be able to explain:
• the scope and definitions of security and security management
• the responsibilities implicit in the role of Security Supervisor
• the organisation and constituent parts of a functional Security System
• what constitutes a Risk and how to effectively address it
• how to identify and meet individual Protection Needs
• your own learning and its role and impact on colleagues and your workplace
Security Management Advanced Diploma Course – Assignment One – Page 2
Cognitive skills
You will be able to:
• use ideas and techniques drawn from the study of security management within actual
organisations to analyse a range of security-related problems and issues
• identify and assess a range of approaches to supervision issues to inform management
decisions
• reflect on and evaluate your learning
Key skills
You will be able to:
• communicate your understanding effectively, using appropriate styles and language
• plan and manage your learning towards the achievement of aims and objectives, including the
recognition of knowledge limitations
• engage in reflective, adaptive and collaborative learning
Teaching, learning and assessment methods
You will learn independently, using printed teaching texts supported by self-assessment questions
and exercises, which will be included in the teaching texts.
Introduction to security, its definition and scope
The security industry is there to represent businesses by means of
preventing and detecting crime and other unauthorised activities,
preventing or reducing loss, waste or damage, monitoring safety risks, and
dealing with identified risks.
There are several licensed sectors in manned guarding, including vehicle
immobilisation, private investigation, events security, electronic security,
fire systems, and other career opportunities in operational roles
(supervisory or management roles), and support roles in sales, human
resources management, training or consultancy.
Security Management Advanced Diploma Course – Assignment One – Page 3
The Private Security Industry Act of 2001 exists to raise standards, increase public confidence and
safety, remove criminal elements from security roles and establish the SIA and licensing.
The role and main functions of the Security Industry Authority are to regulate the industry through
licensing, to raise professional standards through a Approved Contractor Scheme. Other standard-
setting bodies exist to establish standards for non-licensed roles and to inspect the SIA Approved
Contractor Scheme.
All security industry operatives are required to have the following personal attributes:
• reliability and integrity
• keen observation skills
• polite communication skills
• a responsible attitude to dealing with problems
• an ability to manage and respond to sensitive situations
• good team working skills
Security Managers need to understand relevant legislation, including Civil and criminal law.
The purpose of the law is manifold: to right wrongs, to punish the perpetrator, and to deter any
potential perpetrators. Cases are brought by individuals (under civil law), or the state (under criminal
law). The prescribed remedy may be compensation of the victim for any loss or damage, a fine, or a
term of imprisonment. The standard of proof is different in civil and criminal cases.
A civil case in England will be decided on the balance of probabilities while, in English law, all
criminal charges must be proven beyond reasonable doubt.
Security management also covers protecting
individuals’ data. The eight basic principles
outlined in the Data Protection Act are:
1. Personal data shall be processed fairly and
lawfully, and not processed unless it can be
demonstrated that it is necessary according
to specified criteria or has been explicitly
permitted by the individual.
2. Personal data shall be obtained only for
lawful and specified purposes, and cannot
be processed further if incompatible with
those purposes.
Security Management Advanced Diploma Course – Assignment One – Page 4
3. Personal data shall be relevant and not excessive to its purpose.
4. Personal data must be accurate and up-to-date.
5. Personal data shall not be kept for longer than is necessary for its agreed purpose.
6. The legal rights of the individual must be respected in handling their data.
7. Technical and organisational measures shall be taken to protect personal data from theft, loss
or accidental destruction.
8. Personal data shall not be transferred to outside the European Economic Area unless an
adequate level of protection for the rights and freedoms of data subjects can be assured.
Security management can also involve protecting individuals’ rights and preventing workplace
discrimination. The main categories of workplace discrimination are on grounds of race, ethnicity or
nationality, gender, religion or belief, disability, sexual orientation or age
Discrimination can take the form of airing prejudiced (e.g. racist) views. Victimisation is when the
management or colleagues unfairly treat the individual. Harassment is acting aggressive or other
inappropriate behaviour.
Discrimination is prohibited under EU law, whether direct or indirect. Direct Discrimination happens
when a person is treated less well compared to someone else, because of one of the listed factors, for
example, refusing to hire suitably qualified people because they are of a certain race or ethnic origin,
or specifying age in a job advert with no practical justification.
Indirect discrimination is when an apparently neutral practice would disadvantage people on the
listed grounds. For example, requiring a driving licence in case it is occasionally needed for a role
might prevent some people with disabilities from applying for a job they are capable of doing.
All individuals are entitled to be free of all three, and one of the purposes of security management is
to ensure these rights are protected. The employer also has a prescribed duty to make reasonable
adjustments for a disabled employee, and failure to do this can also constitute discrimination.
Security Management Advanced Diploma Course – Assignment One – Page 5
The employment-related legislation applies to the following areas:
• recruitment
• access to training
• pay and benefits
• promotion opportunities
• terms and conditions
• redundancy
• dismissal
Effective communication and customer care in Security Management
The basic principles of customer care are to:
• establish a rapport
• acknowledge the customer
• communicate information
Common responses to an emergency situation can be reluctance to accept
that an emergency is happening, calmness, more altruistic and co-
operative behaviour, or fear and distress.
Effective communication helps to ensure organisational efficiency, allow
effective team working, provide appropriate service to customers, whether
internal, external, direct or indirect, provide an acceptable service to
customers with specific needs such as physical or learning difficulties or
sensory impairment, and provide acceptable levels of service to non-
native English speakers.
Ideally the Message is conveyed, and Feedback sent and received, but there are many potential
barriers to communication, all represented here by the concept of ‘noise’.
Security Management Advanced Diploma Course – Assignment One – Page 6
Physical barriers can include:
• equipment
• physical separation/distance
• background noise
• poor or excessively bright lighting
• attitudes such as:
o complacency
o incorrect assumptions
• and emotional factors like:
o nervousness
o anger
o excessive stress
Problems with the sender’s linguistic factors might be an unclear message, an accent, excessive use
of the organisation or industry’s jargon, or thoughtless use of slang.
Problems with the receiver’s linguistic factors can include their level of literacy, or the standard of
their English as second language.
Organisational issues can include unclear reporting lines, poor delineation of roles, and poor
communication of individual responsibilities.
The model also applies to the many other methods of verbal and non-verbal communication.
Verbal communication includes:
• speaking
• listening
• reading
• writing
Security Management Advanced Diploma Course – Assignment One – Page 7
Non-verbal communication includes:
• gesture
• stance
• extent and type of eye contact
• facial expressions
• paralanguage – i.e. non-verbal elements of speech such as pitch, tone or volume which can
carry an implied message
Security Management requires effective communication, which can be achieved if you choose
language and a medium appropriate to the nature of the message and its recipient, deliver the
message clearly, and check understanding before continuing.
The six golden rules for dealing with problems are:
1. acknowledge the customer
2. establish the customer’s needs
3. put yourself in the customer’s position
4. accept responsibility
5. involve the customer in the solution
6. see it through
The Role and Responsibilities of a Security Supervisor
Door supervision is required by premises with admission fees, and also to monitor and maintain the
safety of staff, students, etc. and protect property at any place of business, office or educational
establishment.
The objectives of the door supervisor are to control access to the premises, enforce the law and any
company policy or entry conditions, ensure the safety and security of clients and other staff, both in
routine situations and emergencies, and prevent crime, disorder and any other unacceptable
behaviour.
Security Management Advanced Diploma Course – Assignment One – Page 8
The key qualities of a door supervisor are:
• oral communication skills
• interpersonal and team working skills
• quick thinking and decisiveness
• politeness and courtesy
• assertiveness
• ability to remain calm under pressure
• honesty and fairness
• observational skills
The SIA’s standards of behaviour for security management require smart personal appearance, a
professional attitude, training and relevant skills, acceptable general conduct, and maintenance of
professional values and standards.
SIA Standards are set down to:
• raise standards of conduct, training and supervision
• increase public confidence
• maintain good customer relationships
• maintain good relations with police
• maintain the reputation of the venue
• maintain the reputation of the security industry
According to the Private Security Industry Act of 2001, the professionals that must hold an SIA
licence include door supervisors or vehicle immobilisers, their supervisors, managers and employers,
sole traders and directors of contractors performing designated licensable activities, and their
employees, the managers or supervisors of front-line staff on behalf of a contractor, in-house security
managers or supervisors, and anyone involved in or performing licensable vehicle immobilisations
and charging a release fee.
The licence must be prominently displayed by non-front-line staff, or worn by front-line staff, and
the licence must not be altered. The SIA must be notified of any individual officer’s lost licence,
criminal convictions, change of address, or change to his or her right to work in the U.K.
A licence must be made available for inspection when requested by a police officer, any member or
employee of the SIA, or any other person authorised by the SIA, or returned to the SIA when asked
to do so.
Security Management Advanced Diploma Course – Assignment One – Page 9
In addition to statutory requirements, the SIA’s voluntary Approved Contractor scheme was
developed in consultation with the industry to raise professional standards. The SIA will grant
sector-specific approval to contractors meeting specific qualifying criteria. Accredited contractors
may display the ACS Accreditation Mark.
Search procedures
Searches are either general searches, carried out on everyone with a view to identifying any hazards
or illegal material, random searches that have the same intention, but are not comprehensive, or
specific searches targeted towards a predetermined goal, for example a search on a suspected drug
dealer or someone reported to be carrying an offensive weapon.
Best practice includes allowing self-search where possible, ensuring same-sex searching, involving a
witness, appropriate facilities, e.g. a private cubicle, and accurately maintaining search logs.
An admissions policy exists to help door staff manage customer expectations, deter unacceptable
behaviour, and justify any refusals or ejections.
Common areas defined in a standard admissions policy are:
• Acceptable behaviour
• Acceptable physical state
• An agreed entrance fee
• Any search conditions
• The required age for admission, and acceptable proofs of age, e.g. PASS, photo-card driving
licence or passport
Premises might need to be searched to ensure evacuation routes are clear, check safety equipment,
check for or investigate suspicious objects, and ensure relevant areas are secure. Searching people
and their property must be done with professionalism, their permission, empathy and politeness.
The Criminal Law Act 1967 requires any force used by security personnel to be reasonable,
necessary and proportionate, and criminal law defines the following types of assault:
a. common assault
b. actual bodily harm
c. grievous bodily harm
d. sexual assault
e. rape
Security Management Advanced Diploma Course – Assignment One – Page 10
There are several types of criminal offence against property, including trespass, criminal damage and
theft.
Your options when dealing with someone who has broken the law are to:
a. Ask the customer to leave
b. Forcibly eject the person
c. Make a citizen’s arrest
d. Confiscate any offending items
e. Notify the police
Hazards faced by the searching officer can include violence, sharp objects, accusations of assault, or
accusations of planting of evidence. So essential precautions include maintaining appropriate
behaviour when searching, allowing self-searches, and ensuring the presence of appropriate
witnesses.
It’s vital to follow procedures maintaining control of the process, and to ask someone else to assist
when necessary.
An offensive weapon is defined as an object made or adapted to cause injury, or an object intended
to cause injury.
When articles are seized during a search, immediately hand them over to your supervisor. Follow
agreed internal procedures for storage or disposal and log the seizure and chain of custody.
The Police and Criminal Evidence Act 1984, while forbidding false imprisonment, allows anyone
including a security officer to arrest individuals in respect of indictable offences. An indictable
offence, as opposed to a summary offence, is a serious offence that would be heard at a crown court
before a jury. These include murder, rape, and serious assaults. Common indictable offences relating
to property include robbery (i.e. theft with violence). Drugs-related offences that are indictable are
those which constitute assault on another person, such as spiking their drink. It is also possible to
arrest someone who would otherwise commit a breach of the peace.
Before making a citizen’s arrest, consider the legal requirements you need to meet before you are
entitled to make a citizen’s arrest, whether there’s a police officer who could make the arrest,
whether any other viable options are available, the policy of the premises, the policy of the local
police, any knock-on effects this may have on you or your team, such as being taken away from main
duties, and the risk of violence.
Security Management Advanced Diploma Course – Assignment One – Page 11
To make a citizen’s arrest you must:
1. Clearly tell the apparent criminal you are putting him or her under citizen’s arrest. They must
fully comprehend you and understand that you are addressing them.
2. Explain why you are making a citizen’s arrest, including your reasons for believing it is
appropriate and necessary.
3. Apprehend the suspect with as little force as possible. Do not attempt to handcuff or tie them
to anything.
After making a citizen’s arrest you are required to ensure the welfare of the arrested person, call the
police immediately, detain and supervise the individual until the police arrive, and make an incident
report according to agreed procedures.
You will be asked to give a statement to police. Make sure to include everything that you witnessed
and did. Be clear about any force you had to use to arrest the suspect.
Licensed Premises
The objectives of current licensing legislation relate to dealing with crime and disorder, maintaining
public safety, minimising public nuisance, and the protection of children.
Types of licence include the premises licence, a club premises certificate, a licensee’s personal
licence, and a temporary events notice.
With regard to licensed premises, police have the power to:
• enter to investigate licensable activities or licensing offences
• enter to search in relation to drugs offences
• enter to investigate a breach of the peace
• close premises because of offences of disorder
• close premises to preserve public safety
• close premises because of excessive noise nuisance
Other authorised persons also have the right to enter to investigate licensable activities or licensing
offences.
Security Management Advanced Diploma Course – Assignment One – Page 12
A door supervisor acts act as a representative of the licensee in the licensee’s duty to prevent
breaches of licensing law and other illegal activities, and in this capacity has the right to refuse entry,
to withdraw consent to be on premises, and to eject persons in certain circumstances.
Customers may be ejected for breaching the conditions of entry, breaking the law, or for
unacceptable behaviour.
Activities unlawful under licensing, gaming and sexual offences legislation include offences relating
to drunkenness, other disorderly conduct, permitting a young person to use a Category C gaming
machine, or soliciting or controlling prostitutes.
Drug legislation
Drug offence categories are:
• possession
• supply
• use of premises to supply
Indicators of drug misuse may include physical symptoms, behavioural signs, and physical evidence
of taking the drug.
Common illegal drugs include:
• Heroin
• Cocaine
• ‘Ecstasy’ or MDMA
• Cannabis
Suspicious behaviour suggesting the possibility of drug dealing includes vigilance by suspected
dealers, specific movements, suspicious patterns of interaction with others, and use of locations
where drug dealing often occurs, such as toilets or dark nooks with poor sight lines.
The procedure for dealing with customers in possession of drugs, if no arrest is made is ejection,
followed by seizure of the drugs, and storage or disposal of said drugs.
To safely dispose of contaminated or drug-related litter and waste, avoid skin contact with any
material contaminated with bodily fluids, use the designated sharps boxes to dispose of syringes,
wear gloves and use protective clothing as set out in procedures, use designated disposal bags, and
carefully and thoroughly wash your hands afterwards.
Security Management Advanced Diploma Course – Assignment One – Page 13
If an arrest is made, follow the legally required arrest and detention procedures, secure the evidence,
and record the incident in the relevant log according to house procedures.
Types of records kept include:
• duty register
• pocket book
• incident report
The reasons for keeping these documents include permanence, for them to be used as evidence, to
alert others, for monitoring purposes, for self-protection of the officer, or to protect the organisation.
Because they are so important, these records need to be kept orderly and in a secure location.
Incidents to normally be recorded are ejections, use of force, visits by authorities, customer
complaints, accidents, and emergencies.
Factors determining if and when the police should be called are the seriousness of the situation,
advice from the management, the venue’s policy, and the local police’s policy.
What to include in an incident report:
• The date, time and nature of the incident
• Details of the incident
• Details of those involved
• Details of any witnesses and what they saw or heard
• Details of what actions you took
To preserve any evidence and prevent crime scene contamination, be sure to use cordons, allow only
authorised persons to enter the area, protect any evidence from the ravages of the weather, and
protect evidence from any third party interference.
Types of evidence include:
• direct
• circumstantial
• expert
• hearsay
• documentary
Security Management Advanced Diploma Course – Assignment One – Page 14
In the event of an observed or suspected theft security staff should maintain careful and discreet
observation of any suspect and communicate the situation to a nominated person if available. After a
suspect has passed through the checkout area, follow organisation’s policy with regard to
challenging, searching or apprehension of the suspect. Take steps to manage any possible
confrontation and maintain your own personal safety, and preserve continuity of any evidence,
including stolen items.
To safeguard their own personal security, all staff should remain vigilant, know how to recognise
suspicious behaviour, take any identified steps to discourage theft, comply with all company
guidelines, and avoid divulging any personal details.
The following types of security incident should be referred to senior staff:
• suspected staff theft
• incidents involving significant threat to the personal safety of self or colleagues
• incidents posing a significant threat to the personal safety of customers
• discovery of defective security equipment
• identification of a suspect package
The constituent parts of a security system
Typical security systems include door supervision, general security inspections and maintenance,
guarding valuables and protecting people, CCTV operations, vehicle immobilisation protocols, and
procedures for transfer of cash or valuables.
Actions and precautions to secure stock include:
• CCTV
• Signs
• Secure storage
• Dummy packets
• Electronic article surveillance
• Staff awareness
• Safe storage of keys facility
• Restricted areas
• Store watch associations
• Restricting customer numbers
Security Management Advanced Diploma Course – Assignment One – Page 15
Typical approaches to premises security are off-site storage,
use of a designated store room, CCTV surveillance, night
shutters, alarm systems, security signs, promoting staff
awareness, security lighting, removing potential climbing aids
from the outside of the building, and a door locking system
restricting and monitoring ingress and egress by customers or
visitors.
Standard approaches to securing cash are to keep it off-site, set cash withdrawal limits, display
security signs, use CCTV to monitor transactions and storage, vary cash transfer times to avoid
becoming predictable, use agreed validation methods, and mark notes with security pens.
Approaches to the security of individuals include:
• CCTV monitoring
• Displaying security signs
• Staff awareness and training
• Issuing personal attack alarms
• Supplying protective equipment
Information is protected by the use of locked cabinets, keeping offices locked, keeping storerooms
locked, a computer password protection protocol, regular hard drive back-ups, and secure filing of
hard copies.
Essential precautions against staff theft include staff purchase policies, routine spot checks, a system
to ensure a neutral person serves staff family and friends, requiring staff to leave through the front
door, random or targeted bag searches, locker searches, and clear, communicated policies on
handling personal belongings in the workplace.
Risk and Risk Treatment
Security risks to an organisation include internal and external crime, asset threats, e-crime and threats
to physical security, and can be tackled with security risk surveys and checklists, countermeasure
analysis, and cost benefit analysis.
The purpose of any threat and risk assessment is to identify all threats and assess the levels of risk, to
facilitate risk reduction, and to aid planning and preparation.
Unusual or suspicious activity might be indicated by surveillance, asking for detail about the
premises, testing security responses, and people, objects or behaviour that are out of place.
Security Management Advanced Diploma Course – Assignment One – Page 16
Current standard counter-terrorism measures are to be alert to any hostile reconnaissance or
suspected dry runs, to maintain vigilance and a visible presence to deter and disrupt terrorist activity,
routine screening and searches of premises, and reporting and recording of incidents.
Health and safety measures are necessary to comply with legislation, including:
• Health and Safety at Work Act of 1974
• The Control of Hazardous Substances Act of 1992
• The 1992 Manual Handling Regulations
• The Workplace (Health, Safety and Welfare) Regulations of 1992
• The 1995 Regulations Controlling Noise at Work
• The Reporting of Injuries, Diseases and Dangerous Occurrences Regulations 1995
• The Health and Safety Management at Work Act of 1999
This will spare the business negative consequences such as prosecution, the forcible closure of the
business, lost productivity, business disruption, staff shortages, and damage to employees’ health.
An employer’s main duties under the legislation are to assess and reduce risk, provide first aid
facilities, inform staff about hazards, provide training as required, ensure injuries and accidents are
recorded, provide protective equipment, provide any relevant protective clothing, and to provide and
maintain warning signs.
The main duties of employees and self-employed individuals are to:
• be responsible about their own health and safety
• co-operate with employer,
• take reasonable care
• avoid putting themselves or the public at risk
• report any injuries or accidents to their employer
Risk to personal safety and security can be minimised by developing awareness of risks and hazards,
supplying or undertaking training on specific hazards, using personal alarms, using mobile phones to
maintain contact or raise an alarm, following safe routines, being systematic, and establishing and
following safe procedures for lone working.
Common first aid situations that can arise are accidents, such as slips, trips or cuts, results of
violence, a drugs overdose, or an epileptic seizure.
Typical hazards that might result in slipping or tripping-up include unsuitable footwear, damaged or
wet flooring, cleaning-related hazards, industrial leakage or contamination, obstacles and poor
lighting.
Security Management Advanced Diploma Course – Assignment One – Page 17
Safe manual handling requires careful assessment of the load before lifting, correct positioning of the
head, feet and back, correct positioning of the load, smooth movements, and avoiding twisting the
back.
Fire risk assessments are carried out to eliminate hazards and reduce risk. Maximum occupancy
figures are set to maintain safety within the venue, and to allow safe evacuations.
The three components of what is known as the ‘fire triangle’ are:
1. oxygen
2. fuel
3. heat
The prevention of fire requires control of fuel, control of ignition sources such as bins and paper
waste, safe disposal of hazards, safe storage of flammables, electrical or electronic equipment to be
regularly inspected and maintained, and avoiding overloading electrical points.
Fire fighting arrangements may include the provision of:
• water extinguisher
• powder extinguisher
• foam extinguisher
• carbon dioxide extinguisher
• extinguisher for wet or dry chemical fire
• fire blankets
• sprinkler systems
Responses on discovering a fire can be remembered using the
mnemonic FIRE:
• Find
• Inform
• Restrict
• Evacuate or Extinguish
It’s vital to be aware of and understand evacuation procedures to save time in an emergency, keep
one’s self and others safe, and assist emergency services.
An ‘emergency’ is defined as any situation that is unexpected, threatens safety or causes serious
disruption, and requires immediate action.
Security Management Advanced Diploma Course – Assignment One – Page 18
Non-fire-related emergencies can include power, system or equipment failure, flood, actual or threat
of serious injury, serious illness, and bomb threat.
The appropriate response to an emergency is to follow correct procedures depending on the nature of
the emergency, ensure your own safety, ensure the safety of others, and report the situation to the
appropriate emergency service.
It’s appropriate to your security management role to act quickly, be authoritative, remain calm, and
encourage others to remain calm.
In responding to first aid situations, seek help, ensure your own safety, assess the situation, and
assess the condition of the casualty.
If the casualty is unresponsive:
• open the airway
• apply assisted breathing techniques if relevant
• compressions if relevant
• put them in the recovery position
Respond to major haemorrhage and bleeding by positioning the patient to minimise the effect of the
injuries.
Determining Protection Needs
A threat and risk assessment, intended to maintain the safety of an individual (or ‘principal’),
comprises a threat profile of the principal, the health of the principal, the principal’s diary and
engagements, any existing security arrangements, the nature of any potential threats, the extent of
any potential threats, types of potential threat, probability levels of any threats, and other interests at
risk.
The seven ‘P’s of principal threat profiling are:
1. People
2. Places
3. Personality
4. Prejudices
5. Personal history
6. Political/religious views
7. Private lifestyle
Security Management Advanced Diploma Course – Assignment One – Page 19
When planning protection, both direct and indirect threats must be identified and assessed. Protection
imperatives must be balanced against lifestyle requirements and the individual’s ability to act in their
profession. There must be a systematic approach to threat and risk assessment, and risk assessments
regularly reviewed and updated as necessary.
The main threats to a principal could be unintentional injury, intentional injury or attack, unwanted
attention, threats to their public or professional image, and the gathering of information from the
principal, whether personal or commercially sensitive.
When arriving at or leaving a location, the protocol will vary for hotels, restaurants, airports and
leisure and entertainment venues.
It’s vital to maintain dynamic assessment of the risk from any persons, places or objects.
Options available in threatening situations are to take action, avoid the situation, or seek help.
A protection protocol must be made up of both generic and specific orders that cover response and
contingency plans.
The recognised categories of threat intensity are:
• Category 1: high level of threat
• Category 2: medium level of threat
• Category 3: low threat intensity
Individual protection operatives in the UK gather intelligence from police liaison, local authority
information, security companies and embassies, their own reconnaissance, the news media and the
internet and other types of research.
Security Management Advanced Diploma Course – Assignment One – Page 20
Further research and study sources
www.hse.gov.uk/index.htm Health and Safety Executive – source of information about health and
safety legislation
http://sia.homeoffice.gov.uk The Security Industry Authority
http://skillsforsecurity.org.uk The security sector’s standards-setting body
www.gov.uk/equality-act-2010-guidance Explanation of the current Equalities legislation
www.gov.uk/data-protection online guide to the Data Protection Act
www.slideshare.net/melisanahimana/transmission-model-of-communication
a useful online presentation explaining the transmission model of communication
TUTOR TALK: Now move on and answer the questions then return your completed test
paper to the College for marking. Good luck and well done.
© Copyright Reserved
“The person who gets the farthest is generally the one who is willing to do and dare. The sure-thing
boat never gets far from shore.”
Dale Carnegie