You are on page 1of 50

Security Guard Information © 2010

10
2
3

Table of Contents
Security:

Requirements

Insurance

History

Contracts

Training

Benefits

Clothing/Uniforms

Patrols

HOW DO YOU BEOME A SECURITY OFFICIER AND THE


REQUIREMENTS
OFFICE SECURITY PHYSICAL SECURITY PROTECTING
THE OFFICE AND EMPLOYEES INCREASED USE OF
ELECTRONICS
ALARM SYSTEMS
SECURITY GUARDS DUTIES
THE ROLE OF EMPLOYEES
CORPORATE SABOTAGE AND
PROTECTINGINTELLECTUAL PROPERTY
HELPFUL READING RESOURCES
WHAT TO EXPECT WHEN ENTERING SECURITY JOBS
THREE CRUCIAL WAYS TO SAFEGUARD YOUR BUSINESS
FIVE REASONS WHY YOU NEED TO HIRE A SECURITY
COMPANY IN ILLINOIS
CCTV SECURITY CAMERAS
SECURITY OFFICER’S DETAILED DUTIES
TRENDS FOR SECURITY JOBS
4

WORKING CONDITIONS
SECURITY OFFICER RESUME EXAMPLE
HISTORY OF SECURITY GUARDS
WHEN TO HIRE SECURITY GUARDS
SECURITY GUARD SERVICE
5

Security Guard Fact Sheet

REQUIREMENTS FOR REGISTRATION

A security guard must have in his/her possession a valid security guard registration or a
screen-print of the Bureau's approval from the Bureau's web site at www.dca.ca.gov/bsis,
along with a valid photo identification, before working as a security guard.

Security guards are employed by licensed private patrol operators to protect persons or property
and prevent theft. To be eligible to apply for a security guard registration, you must:

 Be at least 18 years old

 Undergo a criminal history background check through the Illinois Department of Justice
(DOJ) and the Federal Bureau of Investigation (FBI); and

 Complete a 40-hour course of required training. The training and exam may be
administered by any private patrol operator or by a certified training facility.

40 Hour Security Guard Training Requirement

Date of Completion Training Hours Needed

Prior to Being Assigned on Post 8 Hours

Training Required within the First 30 Days 16 Hours

Training Required within the First Six Months 16 Hours

TOTAL HOURS 40 HOURS

EXPEDITE PROCESSING ONLINE

In order to speed up the security guard application and fingerprinting process, the following steps
should be followed:

STEP 1

The security guard must have received the eight (8) hour "Power to Arrest” training and passed
the examination.

STEP 2

The security guard applicant, private patrol operator or the training facility must submit the
security guard application online at
6

http://www.dca.ca.gov/bsis/online_services/online_licensing.shtml. The online application is


sent electronically to the Bureau.

Breakdown of fees paid online:

Security Guard Application Fee

$50.00

Online Convenience Fee

$1.00

TOTAL

$51.00

STEP 3

The security guard applicant must submit fingerprints electronically using Live Scan. You must
only use the security guard Live Scan forms downloaded from the Bureau's Web site or obtained
from the Bureau. The Live Scan form from the Bureau contains the correct coding to ensure that
the Bureau receives the FBI and DOJ responses.

Breakdown of fees paid at Live Scan site:

Department of Justice Fingerprint Fee

$32.00

Federal Bureau of Investigation Fingerprint Fee

$19.00

TOTAL

$51.00

Live Scan site locations are available at


http://www.bsis.ca.gov/forms_pubs/livescan/scansites.shtml
Live Scan forms can be downloaded at http://www.bsis.ca.gov/forms_pubs/livescan/forms.shtml

Note: Live Scan sites may charge a Live Scan submission processing fee. The Bureau does not
set the fee amount.

STEP 4
7

Once the Bureau has received the online application and criminal history clearances, the cleared
security guard will appear on the Bureau's Web site. The security guard, private patrol operator
or training facility can verify the Bureau's approval by checking the Bureau's "Verify a License"
at http://www.bsis.ca.gov/online_services/verify_license.shtml. Once the security guard
registration has been cleared and appears on the Bureau's Web site, a screen-print from the Web
site may be made and used as an interim security guard registration. The security guard can then
be placed on assignment. The actual security guard registration will be mailed to the applicant
and should be received in 10 to 15 business days.

STEP 5

Security guards placed on assignment must keep the following documents with them:

1. A valid security guard registration or a screen print of the Bureau's approval obtained
from the Bureau's Web site. PERC card
2. A valid photo identification

NORMAL PROCESSING

The Bureau will continue to accept the following: for CA only IL is different

 Submit your completed security guard application, a $50 registration fee and a Security
Guard Live Scan form signed by the Live Scan operator. A $32 DOJ fingerprint processing
fee and a $19 FBI fingerprint processing fee must be paid at the Live Scan site. Send your
application package to the Bureau of Security and Investigative Services, P.O. Box 989002,
West Sacramento, CA 95798-9002.

Applications for registration as a security guard are available from private patrol operators or
training facilities certified by BSIS.

FIREARM PERMIT

You may not carry a gun on duty without having been issued a firearm permit by the Bureau.
Also, a firearm permit issued by the Bureau does not authorize you to carry a concealed weapon.
You may not carry a concealed weapon on duty without a Concealed Weapons Permit (CCW)
issued by local authorities, nor carry a caliber handgun not listed on your firearm permit.

To apply for a firearm permit, you must:

 Be a U.S. citizen or have permanent legal alien status.

 Pass a course in the carrying and use of firearms. The 14-hour (8 hours classroom, 6
hours range) training course covers moral and legal aspects, firearms nomenclature, weapon
handling and shooting fundamentals, emergency procedures and range training. The course
must be given by a Bureau-certified firearms training instructor at a Bureau-certified training
facility. Written and range exams are administered at the end of the course. Costs of training
8

are determined by the training facility. For a list of certified training facilities, call (916) 322-
4000.

 Submit a firearm permit application, pay the $80 application fee, and submit a Security
Guard Registration w/Firearm Permit Live Scan form signed by the Live Scan site operator.
A $38 Firearm Eligibility application, $32 DOJ fingerprint processing fee and $19 FBI
fingerprint processing fee must be paid at the Live Scan site. Send your application package
to the Bureau of Security and Investigative Services, P.O. Box 989002, West Sacramento,
CA 95798-9002.

You may apply for both a guard registration and a firearm permit at the same time for a total fee
of $219.

Note: A firearms qualification card expires two years from the date it was issued. An applicant
must prequalify four times during the life of the permit: twice during the first year after the date
of issuance, and twice during the second year. Requalification’s must be at least four months
apart.

TEAR GAS PERMIT

The law requires those who wish to carry tear gas on duty to complete a two-hour training course
approved by the Bureau. For a list of certified training facilities call (800) 952-5210 or visit the
Bureau's license look-up at www.bsis.ca.gov/online_services/verify_license.shtml and search by
county.

BATON PERMIT

To carry a baton on duty, you must be a registered security guard and complete an eight-hour
training course from a certified instructor. For a list of certified training facilities, call (800) 952-
5210 or visit the Bureau's license look-up at
www.bsis.ca.gov/online_services/verify_license.shtml and search by county.

If you have questions about registration as a security guard, call (800) 952-5210. If you have
questions about your current guard card, call (916) 322-4000.

"Protection of the public shall be the highest priority for the Bureau of Security and
Investigative Services in exercising licensing, regulatory and disciplinary functions.
Whenever the protection of the public is consistent with other interests sought to be
promoted, the protection of the public shall be paramount."

 
9

OFFICE SECURITY

Office security can be broken down into two main areas:

1) Protecting your office and employees from vandalism, theft, and personal attacks; and

2) Protecting your office from corporate sabotage, both from inside the company and out. The
first area deals more with the actual office itself—its layout, the use of security guards, alarm
systems, and so on. The second area is primarily concerned with protecting a firm's intellectual
property through the introduction and utilization of such measures as shredders, computer
security, and employee surveillance.

PHYSICAL SECURITY: PROTECTING THE OFFICE AND EMPLOYEES

Office security is an issue for every business, no matter the size. "There is not a business that's
too small to consider the security issues that may affect them," contended one commercial
security consultant in an interview with Business First of Buffalo . There are many steps that can
be taken to improve security, many of which require relatively inexpensive outlays. To find out
what is best for his or her company, a small business owner should hire a security consultant to
visit the business premises and conduct a thorough security analysis. This review can identify
weak spots and provide a clear plan for upgrading security.

The best place to start when examining office security is the physical layout of the office itself,
or the layout of the larger building of which the office is a part. Office design should stress wide,
open areas with clear sight lines. Hallways and offices should be open and have no nooks or
crannies where an intruder could hide in the shadows. All areas should be well lit, especially
after hours when employees might be working alone or in small groups. Mirrors in stairwells and
inside and outside of elevators allow employees to see around corners or past obstructions.

Doors and windows are the most obvious access points to an office and should be secure. Avoid
double doors because they are easily hinged open. Ideally, entranceway doors—particularly
those used for deliveries, etc.—should be steel, or steel-sheathed. This helps with security and
also aids in fire prevention. Door hinges should face inward whenever possible; use non-
removable pins and screws if it is not possible. Simply upgrading hinges and door locks is one of
10

the cheapest and most effective security steps a business can take. Deadbolt locks are best,
whether they are electronically controlled or manual in nature. Combination locks on washrooms
and other common areas are also an excellent option. Employees don't have to carry keys and the
combination can be changed frequently. All windows should use key locks, and windows near
the ground level or fire escapes should have steel bars or lockable gates that meet local fire
codes.

INCREASED USE OF ELECTRONICS

Improvements in electronics, computers, and other high-tech security features have given
business owners new tools to fight crime in recent years. Perhaps the most common electronic
tools are closed circuit surveillance systems and access control systems.

Closed circuit surveillance systems use television cameras to monitor specific areas of a
company's work space. Signals from the cameras are fed back to a central monitoring post,
where a security guard or company employee watches for signs of abnormal activity. These
systems are effective both during business hours and after hours. But while video technologies
can be an effective deterrent and investigative tool, a closed circuit system only works as well as
the people monitoring it. The guard or employee must give the video monitors his or her
complete attention.

Access control systems start with establishing "point of control" access over an office. That
means that all tenants and guests are routed through a control area before admittance is
authorized. The control point can be as low tech as a sign-in sheet or as high tech as an elaborate
system to scan the fingerprints or retinas of visitors (most security experts understandably cite
the former as an inadequate measure, in and of itself). Most common is the use of access cards,
or "swipe" cards. These cards are electronic "keys"—the user passes a part of the card through an
electronic reader stationed outside a door, and, if the person is authorized to enter, the door is
unlocked. Newer versions of the swipe cards include video imaging. A central computer stores a
photo of the employee and as much pertinent information as the company desires, including
work hours, emergency contact numbers, license plate numbers and make of car, and other
information. Electronic cards are preferable to metal keys because an electronic key can be
11

deactivated at a moment's notice if an employee is fired or deemed a security risk. If metal keys
are used, every lock in the building has to be replaced if a security breach is suspected.

Other electronic systems that are being used by security-conscious firms include tiny hidden
cameras, panic buttons that summon security when pressed, and electronic door chimes that
make it easy to tell when someone has entered a work space. The tiny cameras are perhaps the
most popular innovation. They are small enough to be hidden in a clock face or a heating vent,
yet provide a powerful tool for monitoring employees in areas where employee theft is
suspected. Use of the cameras only works if their existence is kept a secret from the employees
that are under suspicion.

Finally, identification tag systems are an increasingly popular tool in many businesses.
Laminated photo identification cards are inexpensive to produce and update, and they can
instantly identify employees and the department from which they hail. These photo ID cards can
be particularly useful for larger, diversified enterprises in which employees may not know or
interact with every other member of the workforce.

ALARM SYSTEMS

Alarm systems are another popular office security tool. There are two primary types of alarm
systems: those that sound a loud siren or other noise when a break-in is detected, and those that
send a silent alarm directly to a security company or to the police, who then respond to the alarm.
The type of alarm chosen depends in large part where the business is located. Loud alarms work
well in small towns or in low-crime areas, but businesses located in urban or high-crime areas
have found that nearby residents have often become so used to alarms going off that they ignore
them. In that case, a silent system linked directly to the police may be preferable.

Systems can range in complexity and price. However, any alarm system must cover all the doors
and windows into a business to be effective. Most common are motion sensors that detect
movement where it is not supposed to be occurring, or window glass bugs that are activated
when glass is broken. Examples of advanced systems include combined audio and video alert
systems that are triggered by noise. When the sounds of a break-in are detected, the security
company is alerted and can listen in to what is occurring at the site. The security company can
12

then activate video monitors to see what is happening at the site, or the cameras can be set up to
begin recording automatically when the first sound is detected.

As with the closed circuit television systems, the key to a good alarm system is that it must be
monitored at all times. If an alarm goes off and no one is there to notice, or if it is ignored, then
office security has not been enhanced at all. In fact, the alarm may have provided a false sense of
security that kept a company from pursuing other security measures.

SECURITY GUARDS

Using security guards is an increasingly popular form of office security. Guards can be used in
two ways:

1. to monitor the front desk of a company or building (the access control point);
2. to patrol the grounds of a larger company or office complex.

The old image of the security guard—an elderly gentleman who slept as much as he monitored
the grounds—is a thing of the past. Today's guards, especially those who monitor building
access, should have good communication skills and be able to handle many roles. Guards often
act as concierges and goodwill ambassadors, greeting the public as they come into a company
and answering questions and providing directions. Ideally, they should present a positive public
image for the company and/or building that employ them. With this in mind, traditional uniforms
have given way to a casual but professional wardrobe of blazers and trousers at many security
firms. Guards are almost never armed—the practice has come to be regarded as just too
dangerous—and they are primarily expected to do four things at all times: deter, detect, observe,
and report. Today's guards can also be expected to help out by arranging for building
maintenance or even assisting in life-threatening situations.

The other type of security guard—the type that patrols the grounds of a larger company or an
office park—receive conflicting marks from security experts. Some feel that simply driving or
walking by each part of a office complex every hour or half-hour does little to prevent crime
because such measures still leave large windows of time for criminal activity to occur. Others
argue the very presence of the guards is enough to deter all but the most professional or
13

determined criminals. The question of whether to use such guards is one that each company will
have to answer for itself.

Small business owners should know that using security guards is not cheap. Round-the-clock
coverage by a team of guards can cost upwards of $100,000 annually. Additionally, theft by the
guards themselves has been a definite problem for some businesses. Many security firms pay
minimum wage, so turnover is high, and background checks are not always thorough. To ensure
that you are really hiring the best firm possible, screen prospective choices carefully. Look for
firms that perform thorough background checks, pay better than minimum wage, and have low
turnover. Fellow members of the local business community can be a valuable resource in this
regard.

Basic Duties for Security Officers Include but are not limited to:

1. Observing and detailed reporting of safety hazards


2. Making Routine and Special Reports Daily to Clients in a POS log
3. Promote Safety and help prevent Accidents
4. Provide Effective access control to ensure compliance with badge control, or pass control
system, made by the client.
5. There are two types of guards: armed and unarmed
6. Monitor CCTV Surveillance

THE ROLE OF EMPLOYEES

It is common knowledge that a security system is only as secure as its weakest link. In many
cases, that weak link is the company's employees. Untrained in security measures and prone to
the attitude that "it can't happen to me," many employees are their own worst enemies when it
comes to security. When a company installs a new security system, it should take the time to
bring in a security consultant to speak to employees about what they can do to increase their own
safety and improve the company's security. Among the measures the consultant will advise are:
14

 Do not leave valuables unattended.


 Lock doors after hours.
 Do not go into poorly lighted areas after dark.
 Bolt down or secure equipment if possible.
 Engrave identification numbers on office equipment and keep a list of serial numbers to
give to the police and insurance companies in case of theft.
 Provide each employee with a drawer that locks.
 Verify identification and purpose of visit before letting non-employees into office space.
 Deposit checks and cash daily.
 Never leave visitors unsupervised.
 Try to leave with at least one other employee if working late.
 Do not advertise vacation plans.
 Keep emergency numbers posted at every phone.
 Make sure confidential files are secured when the office is closed.

CORPORATE SABOTAGE AND PROTECTING INTELLECTUAL PROPERTY

As computers have become an everyday part of almost every business, companies have found it
harder and harder to protect their proprietary information and their money. The Los Angeles
Times reported that the FBI estimates that commercial espionage, or the theft of information,
costs U.S. companies and government agencies nearly $100 billion annually. Much of that theft
is occurring electronically.

Unfortunately for most companies, the greatest risk of theft or sabotage (conventional or
computer), often comes from the firm's employees themselves. In fact, many experts believe that
a significant percentage of small business failures are directly related to internal theft of money,
property, information, and time. "Few occurrences are as potentially destructive to a business as
the theft, embezzlement, or misappropriation of company funds or other assets by its
employees," said one Coopers and Lybrand executive in a San Antonio Business Journal article.

Business security experts warn that employee theft can take many forms. Examples include:

 Forgery of company checks for personal gain


15

 Using a "ghost payroll," which occurs when one or more employees create "phantom"
employees, submit time cards for those employees, and then cash their paychecks
themselves.
 Outright theft of cash from a register drawer
 "Sweet-hearting," at the cash register, which can mean granting a friend or other person a
discount at the register when they pay, undercharging them, or ringing up fewer items
than the person has actually bought.

Internal computer theft has become one of the most common forms of employee theft now that
computers have become more common in nearly every industry sector. Indeed, employees often
are more computer literate than their supervisors, which may strengthen the temptation to
abscond with proprietary information or otherwise engage in illicit activities. Indeed, computer
theft can take many forms, including false data entry, which is almost impossible to track; slicing
off small amounts of data or money that add up over time; super-zapping, which occurs when a
computer network security bypass code falls into the wrong hands; and scanning, or using a
high-speed computer to locate data that would be impossible to find by hand, then using that data
for illegal purposes.

Sabotage, which can also cost millions, almost always involves disgruntled current or former
employees and can take almost any form, from defacing company property to deleting or altering
important company data. As mentioned above, using access control cards for employees that can
be easily deactivated makes it easier to keep ex-employees out of the workplace and track the
activities of current employees.

Because employee theft is so prevalent and so costly to businesses, a business owner needs to
take every precaution and use every means possible to stop employee theft.

Some of the steps that can be taken include:

 Making sure that security starts at the top.


 Executives must set a good and honest example. Establish a clear policy on theft and
security and distribute it to all employees.
16

 Install a security program that meets your company's needs.


 Follow up on references provided by prospective new hires.
 Keep checkbooks locked up.
 Control cash flow and have good documentation on where money is spent.
 Do not leave bookkeeping to just one person without checks and balances.
 Audit internal financial documents frequently using independent auditors.
 Only allow a few people to have authority to sign checks.
 Check all invoices to make sure they match what was delivered.

FURTHER READING:

Bliss, Edwin C., with Isamu S. Aoki. Are Your Employees Robbing You Blind? Pfeiffer and Co.
1993.

Chanen, Jill Shachner. "Securing the Premises: Simple Changes in Office Policy, Setup Can
Safeguard a Small Practice." ABA Journal. April 1997.

Jaffe, Susan Biddle. "Office Building Security Grows More Sophisticated." Philadelphia
Business Journal. April 6, 1992.

Lombardi, John H. "Office and Office Building Security." Security Management. Nov. 1994.

Manis, Robert A. "Discouraging the Inside Job." Inc. April 1994.

Parent, Tawn. "Is Your Office Safe?" Indianapolis Business Journal. January 6, 1992.

Poling, Travis E. "A Thief Among Us: Employee Sabotage and Theft Leave Businesses Holding
Hefty Tab." San Antonio Business Journal. January 2, 1993.

Rodriguez, Karen. "Virtual Office Raises Risks in Security." Communications Week. May 13,
1996.

Rosenthal, Tracy. "Keep Your Building and Your Employees Secure." Business First of Buffalo.
July 25, 1994.
17

San Luis, Ed, et al. Office and Office Building Security. Butter-worth-Heineman, 1994.

"Tighten Office Security for Yourself and Your Employees." Profit-Building Strategies for
Business Owners. November 1992.

Expect When Entering the Field Of Security Jobs

New security jobs have been opening up in the United States in response to the tragic attack of
9/11 and subsequent reported terror threats. There are a few questions to ask oneself and a
potential employer prior to seeking employment in this growing field. The Federal Bureau of
Labor Statistics anticipates up to 175,000 new jobs to be created in this field by 2016. Guard
security jobs may require carrying a weapon, entailing more responsibility and job specific
training than unarmed positions.

The financial compensation for armed guards is higher than that for unarmed guards, a
reasonable recognition of the heightened danger in such positions. Security jobs are categorized
as contract or proprietary. A contract position entails working for a firm as part of a staff of
security personnel. The employees of such firms are assigned to a variety of locations with duties
unique to each contracted placement. Security vacancies with placement firms provide choice
and an opportunity to work different schedules in diverse environments, with uniforms
specialized for each contract position.

Proprietary security jobs are those created and filled by either a business or a building
management company. These guard security jobs are permanent placements on location, with
consistent duties, regular posts, and known shifts. Be prepared to submit to a drug test and
background check when applying for security vacancies, and inquire whether industry-specific
certification or license is a prerequisite for consideration. Some employers will provide the
training at their cost, while other employers want those applying either to have certification or to
obtain it at their own expense.

The types of certification for guard security work are broad. Perhaps firearms training and a
concealed weapons permit will be necessary, in addition to shooting range time. State-mandated
programs must be completed in many of the fifty states, with yearly or bi-annual refresher
18

courses. An example is the curriculum mandated by the state of Arizona, with courses on ethics,
first response, crime scene preservation, arrest laws, criminal law, communications, grooming,
and uniforms.

Presenting evidence of basic CPR training and defibrillator training can make a candidate more
attractive to the hiring agency. Security jobs are often the first step for a young adult wanting to
pursue a career in law enforcement, gaining practical on-the-job experience to add to a resume.
Retirees from the military and police agencies also fill security vacancies, offering experience
and seasoned responses to any emergency or threatening situation. Those who have felony
convictions or have been found guilty of committing a violent crime are almost universally
denied employment.

The Bureau of Labor Statistics summarizes the job duties of security jobs as patrolling and
inspecting property to defend against natural disaster and illegal activities. Protecting the site of
their employer, they are law enforcement for the premises, staving off crime. Using various
forms of telecommunication devices, they may work in conjunction with fire, police, and
paramedic personnel. Extensive report writing is necessary as well as strong powers of
observation.

Case reports may be requested in addition to interviewing victims of crime or witnesses of crime,
and they may testify in court proceedings. Are you intrigued by the challenge inherent in new
security jobs? Join this field with a growing presence in a security conscious world.

3 Crucial Ways To Safeguard Your Business

The nature of security has always been very important to us. We safeguard our lives, our homes
and even our things. There’s no reason why we can’t do the same for our business. These days,
more and more entrepreneurs can benefit from business security tips. After all, a business is
practically an entrepreneur’s life!

Business Security Tip # 1: Invest in locks, vaults and other security equipment.

You never know when a thief or an unethical competitor might strike! If you want to protect
your business, you can’t scrimp on your security detail.

Have more than decent locks on your doors, your windows and everywhere else that may be
used as a way in or a way out. Depending on the probability that you might get broken into, it
might be wise to invest in high quality windows and doors as well.

If you have something valuable inside your office, invest in a vault. These days, many businesses
19

also opt for security cameras and security guards as well.

Business Security Tip # 2: Train your staff accordingly.

One important and often overlooked business concern is training your employees accordingly.
Make sure they know and understand how your security procedure works.

It is also important that you don’t just hire anybody. This kind of process is normal for
companies who have been around for a while. Check for a police clearance and have someone
conduct a background check. You want to know who the people you’re working with are.

Business Security Tip # 3: Use the Shredder.

If you don’t think people are going to spend hours rummaging your trash, think again! In fact,
this kind of tactic is often practiced by companies who only want to get the better of their rivals.

If you find yourself in competition with another company, you’d better be twice as careful about
what you throw away. Every piece of paper that contains sensitive information must be shredded
immediately. Don’t let anything that might jeopardize your business get away in one piece.

If you think this business security tip is bogus, ask yourself why paper shredders have not
disappeared into oblivion? After all these years, why do some companies still have them around
the office?

It is important for every entrepreneur to know these business security tips and how they can be of
help. You might not think you need them now but are you really going to sit there and wait for
your business to be infiltrated? Now is the time to act.

Five Reasons Why You Need To Hire A Security Company In Illinois

Many companies wait until crime happens before they hire a security company in Illinois. But, a
proactive, offensive approach is best when it comes to adding security guards in Illinois, whether
at the workplace or at a residential community.
Does a Security Company HELP To Help Prevent Crime?
Security guards are a visual and physical deterrent to crime. It doesn't mean that crimes won't
happen; it just means that criminals will probably be more likely to pass up a place that has a
security presence.

I'm often amazed at the excuses people give for not establishing an effective security
20

program:

There is no crime.
I can't afford security.
I don't want the extra liability.
Hiring security means I have a problem.
I don't need security; we have the police.

Now, let's address each of these issues.

*There is no crime. I'd be willing to bet there is crime in nearly every community. Heinous
crimes like rape and robberies might not happen in every neighborhood, but I can virtually
guarantee you that things like workplace violence and vandalism cut across all communities.
Whether it's kids with nothing else better to do or adults who should know better, crime is a fact
of life no matter where you live. And you often don't hear about some crimes until there is a
problem.

*I can't afford security. Let's look at this another way: You can't afford not to have security.
Adding security has practical and economic benefits. Adding security in residential and
apartment communities, for example, lowers insurance premiums. And more importantly, a
security presence adds peace of mind. It's a proven fact: People want to live, work and play in
areas where they feel safe. That's what makes crime an economic issue that will prevent growth
if left unchecked.

*I don't want the extra liability. There isn't any extra liability if you hire a bonded, licensed and
insured security company. Check your specific state laws, but in Georgia, security companies
must be licensed by the state. If the company you hire is licensed, bonded and insured, they will
have their own insurance, which makes them liable for any issues that may arise.

*Hiring security means I have a problem. A security problem won't get better if you don't have
security. Hiring a security company means that you are willing to be proactive to solve potential
problems now before they get bigger.

*I don't need security; we have police. Police can't be everywhere at all times. Security isn't a
substitute for police, but security is often the first at the scene of a crime, before police.

A security company in Atlanta can help you develop an effective security program at your home
or business.
21

CCTV Security Cameras - Your 24/7 Watchdog

Security Camera Systems, Video Surveillance Systems or Closed Circuit Television (CCTV)
Systems are all common names used for electronic systems comprised of security cameras, video
recorders and other equipment used in viewing and recording events in facilities and more. These
systems are primarily used for protection of assets and personal safety which include the
following:

 Perimeter Surveillance

 Access Control

 Vehicle Number Plate Recognition

In addition to the most common uses of CCTV Systems, as mentioned above, law enforcement
agencies and large organizations may require this technology to gather evidence and/or add
legitimacy to decision-making processes. To a lesser extent, even small and medium size
businesses may require the use of CCTV Systems. If you look around, you'll find installations in
court rooms, identification rooms, community centers, detention centers, factory floors, banking
institutions, amusement parks, and even in corporate board rooms.

Depending on the purpose of your CCTV installation, you may find that your surveillance and
protection can be enhanced by integrating with other security process and systems such as
officers at access points and perimeter patrols. Use at business parks, hotels, hospitals, golf
estates and theme parks immediately come to mind.

Real Time viewing of CCTV footage is necessarily associated with a Control Room or a Security
Center. Multiple cameras will be linked to a control room where a security operator will monitor
incidents and assess appropriate responses required. There has been lots of progress specific to
camera activation upon detection of movement. This allows the security operator to monitor
multiple cameras at once with immediate alerts for areas requiring attention. Alternatively, you
may have the need to look at footage after the fact, after it has been recorded. Monitoring staff on
a factory floor could be an example of a typical application.

Although the first CCTV security cameras and systems were limited and costly, today's solutions
are applied to use in medical imagery, robotics, traffic control, marketing, production line
monitoring and much, much more. These systems fall into three different types: analog, digital,
22

and network.

Before deciding on the implementation of CCTV in your home or designated workplace, it is


important to identify the purpose of the project as this will determine what equipment will be
required. There's no sense to buying too much or too little equipment to fit the job. You should
think about answering the following questions:

 How important is real time viewing? That is seeing the current images.

 Will the CCTV System be backed up by a control room?

 Will the CCTV System be linked to other networks and/or security monitoring systems
such as alarms?

 Is the CCTV System being applied as a deterrent?

 Do you anticipate the need to integrate with other security systems such as security
guards, a digital door lock system, or an industrial monitoring system?

 Is the CCTV System required for the gathering of evidence?

 Will CCTV footage be required for criminal procedures if need be?

 Is the project of clandestine nature?

The success to any type of implementation, especially when it involves technology is a solid
definition of people, process, and product. The importance of establishing synergy between your
security policies, system functionalities, and employees (or family members) cannot be over
elaborated. Disregard for this step can lead to misconceptions and disillusionment. Without
proper planning and coordination, between people, process, and product, you could face
catastrophic results, especially relative to the results you seek and the financial implications they
could cause.

A classic example of the importance of synergy between policies and systems is an automatic
fire alarm system. This system is designed to detect the unwanted presence of fire by monitoring
environmental changes associated with combustion. Whether at home, in an office, or a factory
floor, well documented procedures signal a series of actions you take upon hearing (or seeing)
fire alarms. In addition to evacuation, the alarm may summon emergency services, and to
prepare the structure and associated systems to control the spread of fire and smoke.

It's important to note that a fire alarm notification appliance may use audible, visible, tactile,
textual, or even olfactory stimuli to alert occupants of potential danger. Audible or visible signals
23

are the most common notifications and use of speakers to deliver live or pre-recorded messages
is common.

Although the product selection is vast and there are hundreds of suppliers, rest assured there is an
ideal system with even its minimum configuration to meet your financial and security needs.
Design your surveillance system and rest assured that you have a 24 hour, 7 day a week
watchdog looking after your family and business.

http://www.schneider-electric.com/documents/buildings/office_building_security.pdf

Security Officer's Duties & Responsibilities

1. PURPOSE: The purpose of this section is to define the role of the Security Director and
to describe his/her authority, duties and responsibilities.

2. POLICY: The institution's President or Board of Directors will designate a Security


Director, who will have the authority to develop and to administer a written Security
Program for each office, department, function and facility. This Security Program will be
developed within the guidelines of accepted industry standards of care.

3. The term "Security Director" is intended to indicate one (1) person who is ultimately
responsible for the institution's security function. The term "Security Director" also
implies the actual named person or a designate.

4. The term "Unit Security Officer" is intended to indicate one (1) person who is ultimately
responsible for a(n) office's, function's or department's security function, and also implies
the actual named person or a designate. The Unit Security Officer reports directly to the
Security Director regarding security issues.

5. The Security Director position will be an executive position and will be subject to a
written position description clearly describing the position's duties and level of authority.
The positions of the Security Director, Personnel Director, Compliance Officer, Auditor
and Chief Financial Officer will not be assigned to the same person.
24

6. The Security Director will report directly to the Board of Directors regarding all security
matters. The Security Director may also report to the institution's President/Chief
Executive Office regarding general security matters, except when to do so might
reasonably jeopardize the results of an investigation or in those matters whose sensitivity
dictates they be brought directly to the Board.

 The Security Director is responsible for the development and administration of the following
segments of the institution's overall Security Program:

 Establishing procedures of opening and closing for business and for the safekeeping of all
currency, negotiable securities, and similar valuables at all times. Such procedures
include, but are not limited to:
o Retaining a record of any robbery, burglary or larceny committed or attempted
against the institution;
o Maintaining a camera that records activity in the banking office;
o Using identification devices, such as prerecorded serial-numbered bills or
chemical and electronic devices;
o Physical security: access control and the storage of sensitive material;
o Technical security: alarms, electronic countermeasures and intrusion detection
systems; and
o Electronic data transmission and storage security: use of computers, fax machines
and telephones; protection of LAN, WAN, passwords and storage of disks;
 Establishing procedures that will assist in identifying persons committing crimes against
the institution and that will preserve evidence that may aid in their identification or
prosecution; such procedures may include, but are not limited to:
o Personnel security: background investigation program and security clearances;
o Procedural security: handling sensitive material, transfer of sensitive material,
addressing violations;
o Investigating all suspected criminal violations, suspicious incidents and policy
violations as it's appropriate;
o Maintaining intrusion devices, alarms and cameras that record activity in
appropriate locations and that warn of threats;
o Retaining a record of any crime committed or attempted against the institution;
o Develop a crisis management plan to address potentially violent events;
o Design appropriate recording devices for electronic systems maintenance and
repair;
o Design appropriate forms and devices for access control to safes, file cabinets and
restricted areas;
o Develop appropriate guard orders;
o Establish a Unit Security Officer Program;
o Develop, implement and administer an Executive Protection Program to insure
the safety of specific institution officials;
25

o Institute a program to survey residences of appropriate executives and evaluate


and recommend improvements to upgrade the security of the residences, if
necessary; and
o Design, implement and administer a security violation program containing
appropriate violation forms, reporting forms, damage control reports and after
action reports;
o Establishing, coordinating and implementing a Security Program for all offices,
facilities, departments and functions, consistent with all Regulation H and other
regulatory requirements, and other sound business and security practices;
o
o Providing for selecting, testing, operating and maintaining appropriate security
devices, insuring that all devices equal or exceed minimum standards regarding
security devices;
o
o Supervising the installation, maintenance, and operation of security devices where
approved by the Board of Directors;
o
o Establishing, supervising and maintaining records of operation, testing and
control of all security devices in each office;
o
o Providing for initial and periodic training of employees in their responsibilities
under the Security Program and regarding appropriate employee conduct during
and after emergencies;
o
o Establishing, scheduling and supervising a continuing instructional and training
program for the operation of security devices and protective measures;
o
o Conducting continual surveys of all offices to determine the need for additional
security services and make corresponding recommendations to the Board of
Directors;
o
o Establishing, supervising and maintaining records reflecting conformance to
security procedures by institution personnel and non-employee associates and
contractors in each office;
o
o Assuming overall supervision, control, and direction of the institution's Guard
Force and other related services where required;
o
o Maintaining records indicating the names and titles of law enforcement officers
and other persons consulted in connection with the installation, maintenance and
operation of security devices or programs, and appropriate law enforcement
officers to contact in the event of any emergency or committed or attempted
crime;
o
26

o Reviewing, investigating when necessary, and reporting to the appropriate law


enforcement agency all losses where possible criminal action is indicated, not
including civil actions which may be subject to other remedies;
o
o Handling the institution's interests in each attempted or completed crime and to
complete an internal report for each offense.
o This report is to be maintained in files at a central location within the Security
Department for review by auditors and regulators as required;
o
o Establishing and maintaining satisfactory liaison with law enforcement officers at
all levels in areas where offices are located, and maintain files for each office,
department and facility regarding available resources and emergency services
agencies available to that office, department or facility;
o
o Conducting special background checks and security investigations of institution
personnel and applicants, as may be requested by the Board of Directors or other
appropriate personnel;
o
o Preparing and submitting a Security Program evaluation and compliance report to
the Board of Directors at least annually. The presentation of and action taken
upon this report will be reflected in the Board's minutes. The Security Director
will retain this information on file for at least five (5) years, for review by auditors
and regulators as required;
o
o Coordinating all appearances of institution personnel in court proceedings arising
from their employment by the institution, where their testimonies as witnesses are
required by subpoena and to provide for accompaniment during court
proceedings;
o
o In conjunction with appropriate personnel, researching, developing, implementing
and testing the institution's Disaster Recovery and Business Resumption Plan as it
relates to the security function, and maintaining listings that may be used for both
routine and emergency operations. This listing may be retained on a database and
updated at least annually, and will include, but is not limited to:
o
 Emergency services agencies and community resources;
 Equipment;
 Facilities;
 Vendors;
 Personnel; and
o Maintaining a current master copy of the Security Program secured at his/her
primary workplace, and a duplicate master copy at his/her place of residence or
other appropriate location.
27

TRENDS

More and more businesses are buying high-tech electronic surveillance and
security equipment. As more of these systems are installed, Security Guards
are often assigned to stations where they sit in front of a control panel
and watch several closed-circuit television screens and monitor key areas
in the work place. They also monitor perimeter security, heating, cooling
and lighting systems, communications, and other systems.

Another development is the growing number of patrol men and women "for hire"
in residential areas. The cost of a patrol service is shared by the
participating homeowners. Armed guards in patrol cars promise 24-hour
service and fast response.

THE JOB

SECURITY GUARDS, also called Security Officers, protect industrial or


commercial property against fire, theft, vandalism, and illegal entry. They
protect and control entry to industrial, commercial, and, sometimes,
residential property. The duties depend on the employer's needs. Duties
may include operating and monitoring alarm and closed-circuit television
systems, receiving visitors and giving information. They may also take
action in emergency situations such as illness, safety hazards, or other
unusual situations.

The main responsibilities of the guard are to observe and report. These
duties may involve observing from a distance while on a walking patrol,
while driving a patrol car, or by closed-circuit television. When they make
their rounds, Guards may check windows, doors, and keep aware of
unauthorized individuals in an area. Other tasks may include making sure
that electrical and plumbing systems, alarms, and sprinkler systems are on
or working properly. It's common for Guards to keep in radio contact with
28

other Guards patrolling on foot or in cars. Guards may have to search the
area thoroughly when anything unusual is noticed. A patrol area could be a
large refinery or a small office building lobby. Anything unusual or any
potential problem is noted and reported to the proper authority: police,
fire department, building office, etc. Written reports are usually filed
after action has been taken to correct the situation. Some Guards now use
computers to store security information, including suspicious happenings and
names of visitors.

Guards also control crowds at large gatherings, watch for shoplifters, and
guard the pick-up and delivery of valuables. Some guards carry weapons such
as guns or nightsticks, but they aren't encouraged to use them. For some
employers, guards drive and protect armored trucks carrying money or other
valuables. Most of the work, though, is in long-term jobs at specific
locations. Regular reports are made of routine activities, including a
written summary at the end of each shift.

WORKING CONDITIONS

Although the work can be different depending on the assignment, most guard
work is routine, tiring, and a bit dangerous. Some guards work alone and at
night in far off locations, while others work with other officers during the
day.

Security Guards may be stationed at factory gates, building lobbies,


shopping centers, television stations, apartment/condominium complexes,
construction sites, hospitals, museums, or parking lots.
29

Security Officer Resume

Sample Security Officer Resume

SAMANTHA CLONE,
84, South 66 Street,
Burlington, Washington, 03298,
(0987)-481 9513

Objective:

Looking for challenging position as security officer with experience of 10 years.

Professional Skills:

* More than 4 years experience as security officer and 5 years experience as soldier in U.S.
army.
* Wide experience in patrolling, investigation, report making customer service and access
system.
* Trained in power hand cuffing, hand gun retention as well as trained in judo.
* Certified in OCAT (pepper spray) and Aid/CPR.
* Excellent communication and interpersonal skills.

Professional Experience:

Strong Security Solution, Bradford, Pennsylvania


Security Officer, 2007-present

* Responsible for patrolling and keeping the records of all security incidents.
* Responsible for providing security services for residents and visitor, ensure the security of the
building, residents and visitors.
* Respond to all emergency situations as directed by policies.
30

* Identification and vehicle checking on daily basis.


* Always alert and keep an eye on every suspected vehicle or personnel.

New site, Bradford, Pennsylvania


Security Guard, 2004-2007

* Provided security services for employees and visitors.


* Patrolling the parking, grounds and the interior of facility and securing entrance after hours.
* Inform and warned violators of rule infractions such as carrying forbidden things, smoking,
loitering.
* Provided customers and visitors with escort services.
* Report irregularities like security doors left unlocked, leaking water pipes, etc.

Education

* Graduation in Arts stream from Oxford University in 20XY .


* High School in 1999 from XYZ school.
* Special training on security and action from AST Police Academy, Illinois in 2001.

Reference: Available upon request.

http://www.officezone.com/security_guide.htm

Security guard HISTORY

A security guard is a private person who is employed to protect property and people. Usually
security guards are uniformed and act to protect property by observing (either directly, through
patrols, or by watching alarm systems or video cameras) for signs of crime, fire or disorder; then
reporting any incidents to their client, employer and emergency services as appropriate. Security
guards also perform access control at building entrances and vehicle gates by ensuring that
employees and visitors display proper passes or identification before entering the facility.
Security guards are often called upon to respond to minor emergencies (lost persons, lockouts,
dead vehicle batteries, etc.) and to assist in serious emergencies by guiding emergency
responders to the scene of the incident and documenting what happened on an incident report.

The security guard motto is to "observe and report." Contrary to popular belief, security guards
are not normally expected to make arrests or otherwise act as police officers. However, security
guards do enforce company rules and can act (as would any other person) if necessary to protect
lives or property. Security guards are often trained to operate emergency equipment, perform
first aid, take accurate notes and write effective reports, and perform other tasks as required by
the property they are protecting.
31

Security guards are either "in-house" (i.e. employed by the same company they protect) or
"contract," working for a private Security Company which protects many locations. Some large
private security companies in the USA include Pinkerton, Burns, Wackenhut, Allied, and
Guardsmark.

One major economic justification for security guards is that insurance companies (particularly
fire insurance carriers) will give substantial rate discounts to sites which have a 24-hour
presence. This is because having a security guard on site increases the odds that any fire will be
reported to the local fire department before a total loss occurs. Also, the presence of security
guards (particularly in combination with effective security procedures) tends to diminish
"shrinkage," theft, employee misconduct and safety rule violations, or even sabotage.

Most U.S. states and countries require a license to work as a security guard. This license may
include a criminal background check and/or training requirements. Most security guards do not
carry weapons and have only the same powers of arrest as a private citizen, a "private person"
arrest or "citizen's arrest." If weapons are carried, additional permits and training are usually
required. Normally armed security guards are used (in the USA) to protect sensitive sites such as
government and military installations, banks or other financial institutions, and nuclear power
plants. Armed private security is much more rare in Europe and other developed countries. In
developing countries (with host country permission) armed security composed mostly of ex-
military personnel is often used to protect corporate assets, particularly in war-torn regions.

Some jurisdictions do commission or deputize security guards and give them limited additional
powers, particularly when employed in protecting public property such as mass transit stations.
Some security guards, particularly in hazardous jobs such as bodyguard work and bouncers
outside nightclubs, are off-duty police officers. Except in these special cases, a security guard
who misrepresents themselves as police is committing a felony crime.

Industry terms for security guards include: guards, agents, watchmen, officers, safety patrol.
Other job titles in the security industry include dispatcher, receptionist, driver, supervisor, alarm
responder, armed security officer, and manager.

It was a security guard, Frank Willis, who detected the Watergate burglars, ultimately leading to
the resignation of Richard M. Nixon as President of the United States.

Derogatory terms for security guards include rent-a-cops and imitation bacon. Some people do
not like security guards because their duties include enforcing rules and serving as a symbol of
authority. Others believe that security guards are "wanna-be" or would-be police officers, or have
had bad experiences with security guards in the past.

See also: private investigator bodyguard bounty hunter protective services police

References: http://www.dca.ca.gov/bsis/ California. Department of Consumer Affairs, Bureau of


Security and Investigative Services Website.
32

This article is from Wikipedia. All text is available under the terms of the GNU Free
Documentation License.

People have property and other investments that they wish to protect. A security guard can help
to protect these things, as well as enforcing rules and laws and deterring other criminal activity.
For one-time events it is possible to contract with a security guard service or with off-duty law
enforcement officers. However, for ongoing needs there are benefits of hiring a security guard
including potentially lower overall costs and greater control of scheduling, training in company
policies and procedures, and the ability to enforce desired appearance. You have the option of
hiring both armed and unarmed guards.

Security guards can perform many useful functions besides deterring theft and misbehavior.
They can work at entry gates to prevent unauthorized access to facilities or to provide directions
around the facility. If you have a need to receive packages, the security guard can act as an agent
and provide an authorized signature. When there will be a large contingent of people on site
guards can help with crowd control. In the event that there is some type of emergency they can
direct people to areas of safety in an orderly fashion.

It is not necessary for a security guard to remain stationary. Duties may include making regular
rounds of the property to inspect for fire hazards or other potential issues such as leaking pipes.
These rounds can occur both during business hours and during off hours. Security guards can
assist people who have run the batteries down in their cars. They can drive a golf cart or other
vehicle with a battery charging system and can be notified with either a phone call or emergency
button system.

Where there is a concern for protection against theft or vandalism, you may wish to incorporate
the use of a security guard with a closed circuit television system. The guard can be situated in a
control room that has a bank of screens. Just the presence of this type of system can create a
significant reduction in the incidence of crime and loss of materials or property. As the security
guard monitors the activities in each area he or she can communicate with people in that area
through a speaker system. This type of service function is a situation in which it may be wise to
hire an armed guard. Make sure that the candidate is properly trained, licensed and bonded to
carry a firearm.

Ads Security Guards is a leading private security company in the Bay Area. You can count on
ADS Security for 24/7 armed and unarmed security guards. We can provide a professional
trained:
33

When to Hire Security Guards


Security is a big concern for commercial property managers. While security systems and
cameras are a deterrent, sometimes security guards can be your best bet in keeping your
property and your tenants’ assets safe.

One of your main concerns should be to keep your property, and your tenants, safe. Plus, your
tenants want peace of mind, and you need to provide that however you can.

Most properties will have some sort of security feature in place, whether it’s key fobs, cameras
or guards. But many property owners and managers opt for one or both of the first two, snubbing
security guards in favor of saving money by just installing cameras, hoping they serve as a
deterrent. However, there are advantages to hiring security guards.

“Nothing beats a live body,” says Gregory Carbone, IREM office sector advisor. “They are able
to see things cameras don’t, and their decision-making is highly valuable.”

In order to determine your need for guards, consider your location and the requirements of the
building and tenants, Carbone says. What type of tenants do you have: corporate, retail, office,
industrial, other? What type of services or merchandise do they offer: publishing, manufacturing,
jewelry?

Carbone has had retailers as tenants in the past, and he says they often employ both guards and a
security system due to the amount of expensive merchandise that needs to be protected.

Your location is what matters next, not necessarily the type of structure, Carbone adds. For
instance, most structures in an urban downtown area generally have some sort of security system
or a guard on patrol, if not both, regardless if it’s an office or industrial building. Meanwhile, the
further you get from that urban area, the less likely you are to need as stringent a security system.

Cost to You
You need to assess your existing security operations: Do you have a security system of sensors
and alarms or means of access control? Already employ guards? Both? None of the above?

Your tenants want more security, according to a survey of certified property managers from the
Institute of Real Estate Management (IREM). Three of the top five security measures most often
requested by tenants may require a human presence to increase security (“Implementing or
improving security officer service/escorting;” “More police patrolling/police contact;” and
“Improved mailroom/parking security”). However, of the top five measures in place only No. 3
relates to human surveillance (“Security officers”). Something isn’t adding up.
34

Therefore, upon completing your cost-benefit analysis, if you’re still worried about the long-term
cost of guards versus security systems, your leases can drive who pays for the security guards—
you can write the costs into the lease, Carbone says. Even better for you, some larger, corporate
tenants will provide their own security guards and systems, meaning no cost to the property
manager or the other tenants in the building, he adds.

Other Responsibilities
Scheduling the guard’s presence and duties mostly falls to you. Do you want the guard to patrol
the area routinely, or does he or she need to perform security system and operations
verifications? Also make sure he or she knows the parameters for dealing with an emergency—
whom to call, protocol for onsite responses to the emergency, patrol routes, etc. These things are
your responsibility.

Carbone offers one caveat to those thinking the security cameras are protection enough. Without
someone watching what the camera sees, they aren’t as effective. “Cameras are meant to
augment security guards and systems,” he says.

You also should take the responsibility of making sure even the smallest security measures are
up to date and in working order—anything from lighting to door locks; this will make the
guard’s job easier and the entire system more effective. It seems easy, but it can be easy to put
them out of sight, out of mind.

“Generally speaking, no one’s knowingly going to commit a crime under a spotlight,” Carbone
says.

IREM Survey Top Five

The Institute of Real Estate Management (IREM) last year commissioned a survey of CPMs to
assess the challenges property owners and managers face when providing new security
measures. The following are some of the results of that survey.

Top 5 security problems

1. Car crime (theft, vandalism and break-ins)


2. Vandalism (including graffiti)
3. Controlling access to buildings
4. Theft and robbery
5. Burglary/break-ins/trespassing

Top 5 security-related liability concerns


35

1. Injury
2. Resident and employee safety
3. Unauthorized entry/controlling access
4. Lawsuits/premises liability/negligence in general
5. Vandalism/damage

Top 5 initiatives undertaken for security reasons

1. Documenting all security and/or criminal incidents


2. Identifying and reporting criminal activity in the area and neighborhood
3. Conducting background checks on employees and/or companies
4. Regularly reviewing and updating all policies and procedures
5. Regularly testing and inspecting security systems

The IREM survey was completed by 486 members. The median size of the properties reported is
234 units for residential and 227,948 sq. feet for commercial, according to IREM.

Security Guard Service

Security guards have been used for centuries to protect people and property and act as a deterrent
to crime. According to Robert B. Reich, author of The Work of Nations, private security guards
are as numerous as police officers, and that trend is continuing. The flexibility and diversity of a
security guard service make them an excellent choice for companies who need private security,
either for a temporary situation or a long term security plan. Similar to other employment
agencies, the security guard is an employee of the guard service. For a company using this
service, this can be advantageous by saving time in the hiring process, and money in accounting
services and employee benefits. Instead, you will pay one fee to the security guard service, and
they will take care of the rest. Another benefit of using a security firm is the availability of pre-
qualified employees. The guard service will complete background checks and employment and
training verification, allowing you to choose from applicants that meet your specific needs.
Finally, you can hire security guards for a number of situations, and can easily change your
security as your requirements change.

Choosing a Security Guard Service

There are several things to take into account before you choose a security guard service: what
type of security service you need, what level of protection will best provide that service, and who
is best qualified to fulfill that role.

Determining Requirements
36

Security guard services can accommodate many different security situations. To determine what
type of security service you require, you will first define what assets need protection, and then
create a list of roles you would like the security staff to perform. The list of reasons you might
need a security guard is endless. Many insurance companies offer discounts if you have on-site
security; your company may have high cost inventory to protect. Perhaps your needs are more
technical, for instance, protecting computer data or research. Also consider if the defense needs
to be active or passive. Do you need a patrol? Or just monitoring services? Decide exactly what
you need protected by a security guard, and then determine the level of protection that is
appropriate.

Defining Responsibilities

When you use a security guard firm, you have access to a wide pool of available services. Now
that you have decided what exactly you need safeguarded, you can create a description of the
role you need your security guard to execute. The duties of guards that are solely to provide a 24-
hour presence are very different from the duties of guards who are protecting a warehouse of
uncut diamonds. Some tasks to consider include: will they be stationary, or patrol an area? Will
they try and catch lawbreakers or act as a deterrent to crime? Can they monitor your assets
remotely or must they be on-site? Will they be helping your customers or monitoring your
employees? Prioritize your list, so you can make the best use of your available budget. Security
guards with higher levels of training will be able to accomplish higher level security tasks, but
will also require a larger budget.

Establishing Level Requirements

Now that you have determined what you need from a security guard, you need to decide what
level of protection will best meet those requirements. Security guard services can provide
everything from a plainclothes guard to a fully armed security force. If your ideal role is to deter
crime, a uniformed, and possibly armed, guard is a better choice. If you are catching shoplifters,
you need plainclothes security. You also need to consider if an on-site presence is required, or if
you can use remote monitoring.

Interviewing Candidates

Now that you understand the reasons for increased security, and what you expect that guard to
accomplish, you are ready to begin interviewing. The security guard service you have chosen
will be able to send you qualified candidates that match your criteria. Since the security guard
firm has pre-screened the guards, your job is to find the best match for your company. If you
have a very formal company, you will not want a guard that is too casual. If you are hiring a
security guard to patrol a parking lot with your customers, you will want someone helpful and
37

friendly. If you are protecting your warehouse of uncut diamonds, the security guard better look
like he can discourage criminals.

Evaluating Training Requirements

The level of training your guard has attained should match your security requirements. Look for
specialized training if the situation warrants. If you need to protect your computer data, for
instance, check that the security guard service has employees that have that specialized training
in that area. The same applies if you have the potential for bomb threats, or bio-terrorism, or
other unusual requirements. By following this process, a security guard service will be an
excellent solution to your private security needs.

OTHER INSIGHTS

 Know Your site’s escape routes

 Know Your site’s evacuation plan

 The essentials of your client’s fire plan

 Location of all fire alarm boxes

 The locations where flammable or hazardous materials are stored

 The location of all fire extinguishers

 Types of fires each extinguisher is suited for

 The work areas where flammable or hazardous materials are used

 Learn about:

 Crisis Intervention

 Safety Awareness

 Fire Prevention

 Hazardous Materials

 Emergency Response

 Disruptive Employees or Visitors


38

 Abusing alcohol

 Lost money gambling

 Illness or injury

 Just got fired, laid off, or disciplined

 Mental illness

 Argument with spouse

 Under stress

 Disruptive Employees or Visitors

 Emotional problems

 Loss of a loved one

 Substance abuse

 Suffered an accident

 Anger or Frustration

 Adolescent child out of control

 Financial problems

 Handling Disruptive Persons

 Always be alert

 Do not stand between the upset person and the exit, cutting him off

 Remain calm

 Stand four feet away

 Do not return anger

 Show respect

 Handling Disruptive Persons

 Address the person by name

 Do not raise your voice


39

 Act appropriately

 Do not argue

 Be impartial and objective

 Listen to the upset person carefully

 Stand to the side, not in front of, the upset individual

 Signs of Impending Violence

 Hyperventilating

 Gritting teeth

 Foaming at the mouth

 Opening and closing hands

 Eyes dilated

 Tensing

 To De-Escalate the Situation

 Let the person blow off steam with hostile language and gestures, but not violently

 Use calming verbal persuasion

 Use physical restraint as a last resort

 Have a crisis management team in place (3 to 5 persons including the Security Officer on
duty)

 When it blows over…

 Don’t forget to write an Incident Report

 Who, What, Where, When, Why, How

 Concise

 Complete

 Objective

 Accurate
40

 Characteristics of Accidents

 Unexpected

 Harmful contact is made

 An employee is sickened, injured or killed

 Work is stopped or delayed

 The employer has to pay through the nose

 Causes of Accidents

 Unsafe actions by workers

 Lack of safety policy, or not enforced

 Personal factors (attitude, alcohol or drugs, fatigue, physical problem, mental problem,
distracted by radio headset or conversation)

 Lack of safety training

 Unsafe conditions

 Lack of safety awareness and motivation

 Lack of an emergency plan

 When you observe a safety violation

 Fix the problem if possible (unblock the exit)

 Advise the worker

 Record the worker’s name

 Notify your security supervisor

 Notify the worker’s supervisor

 Incident Report

 Things to notice on patrol

 Employees engaged in unsafe bending and lifting?

 Too much sun?


41

 Too hot, cold or humid?

 Too noisy?

 Employees too confined?

 Great heights without safeguards?

 Is there a defined public area for customers to wait in?

 Things to notice on patrol

 Electrical fittings secure?

 Safe material handling and storage?

 Floors and walkways clear of tripping hazards?

 Obstructed fire extinguishers?

 Smoking in non-smoking areas?

 Fences around pits and hazardous areas?

 Clear access to work areas and exits?

 Things to notice on patrol

 Electrical and welding equipment safely used and stored?

 Floors slippery with water, oil or grit?

 Any broken glass?

 Aisles or exits obstructed?

 Are contractors notified of any hazards in their work area?

 Power tools properly used, cleaned, and stored?

 Trash stored in proper receptacles?

 Things to notice on patrol

 Forklift operators speeding?

 Autos or trucks speeding?

 Parking in fire lanes?


42

 People given inadequate training before they use equipment?

 First aid kits ill maintained or obstructed?

 Staircases dirty or obstructed?

 Inflammable materials not stored in proper metal receptacles?

 Things to notice on patrol

 Employees wearing personal protective equipment when needed?

 All equipment inspected regularly? (check tags)

 Platforms and railings safe?

 Are ladders, exits, stairways, electrical switch boxes, aisles and walkways, emergency
equipment, first aid kits, or firefighting equipment blocked?

 Do machines look dirty; have frayed wires or worn belts?

 Are all hazardous substances identified, labeled, correctly handled and properly stored?

 Things to notice on patrol

 Adequate ventilation?

 Eating or drinking in potentially toxic or infectious areas?

 Are the overhead valves secured?

 Are there shields and guards for belt driven equipment?

 Are emergency routes clearly marked?

 Is there dust, fumes, gas or vapors?

 Things to notice on patrol

 Ample lighting?

 Broken or damaged equipment adequately tagged?

 Do you notice any unsafe practices?

 Are all air vents, water pipes and electrical cords well maintained and away from water,
heat or sharp objects?

 Are hand and electrical trucks being used safely?


43

 Employees horse-playing in work areas?

 All safety devices accessible and well maintained?

 Preventing Fires

 Clean up, reduce clutter

 Observant, frequent security patrols

 Observant employees

 Lock up all seldom used areas when not in use (to reduce arson potential)

 Lock up combustible storage areas when not in use

 Detailed Fire Plan in place

 Lives are the first priority, property second

 The Plan must be PUT INTO EFFECT.

 Ingredients of a Fire

 Oxygen

 Fuel

 Heat

 Once started, a fire spreads quickly

 When on patrol, observe:

 Boilers, heaters and furnaces

 Maintenance of appliances

 Any cooking areas

 Maintenance of fire equipment

 Electrical equipment and breaker rooms

 Obstructed fire equipment

 Smoking areas

 Hazardous materials improperly stored or marked


44

 When on patrol, observe:

 Storage areas for flammable liquids

 Poor housekeeping

 Vehicle storage areas

 Any heat near any storage area

 Any area that is cluttered

 Faulty electrical wiring

 Work areas that utilize oils, paint thinners, or combustible liquids

 Any sloppy cutting or welding

 Commit to memory:

 Your site’s escape routes

 Your site’s evacuation plan

 The essentials of your client’s fire plan

 Location of all fire alarm boxes

 Fire rating of the materials in the work area

 The locations where flammable or hazardous materials are stored

 The location of all fire extinguishers

 Types of fires each extinguisher is suited for

 The work areas where flammable or hazardous materials are used

 Types of fires

 Type A: paper, wood, rubbish, cloth, etc.

 Type B: flammable gas or liquids

 Type C: Electrical

 Type D: Combustible metals

 Fire Detection
45

 Security Officers monitoring

 Employees monitoring

 Electronic detection

 Electronic detection

 Temperature above a certain level

 Rapid increase in temperature

 Smoke

 Airborne particles

 Many false alarms (you MUST investigate ALL fire alarms in spite of this)

 When you encounter a fire

 Activate the fire alarm

 If it’s a very small fire, and you have the correct type of extinguisher close at hand, put it
out yourself

 Otherwise:

 Activate the sprinkler system in the affected area

 Evacuate the building

 Later:

 Assist firefighters and the injured

 Restore fire-protective systems

 Incident Report

 Using the wrong kind of extinguisher:

 Will make the fire bigger

 Can kill you

 How to operate a fire extinguisher

 Pull the pin


46

 Aim the nozzle

 Squeeze the trigger

 Do not hold the extinguisher upside down

 Identification symbols on fire extinguishers

 Some extinguishers have pictographs instead of symbols

 A – waste basket and pile of logs

 B – Safety can titled forward

 C – Electrical outlet and plug

 Types of fire extinguishers

 Halogen (Class A, B and C fires; no permanent residue)

 Dry chemical (Class A, B and C fires)

 Foam (Class A and B fires)

 Water (Class A fires)

 Carbon Dioxide (Class B and C fires)

 Fixed extinguishing systems

 STAND PIPES supply fire hoses

 SPRINKLER HEADS

 Specialized systems for commercial kitchens

 Use of fire resistant building materials

 Preventing hazardous materials incidents

 Keep storage areas locked when not in use

 Involve site employees in HazMat security

 Limit access to storage areas to employees who actually work with the materials

 Restrict off hours access

 Do not leave hazardous materials unattended while the storage area is unlocked
47

 Know who is in the HazMat storage area

 Use a logbook or card access devices

 Preventing hazardous materials incidents

 Have all employees who work in the HazMat area wear ID tags

 Approach any people you don’t recognize

 Use a log to sign hazardous materials in and out of secure storage

 Take a periodic inventory

 Track the use and disposal of hazardous materials

 Know what materials are being ordered and brought in to the HazMat area

 Know what materials are being removed from the HazMat area. A property pass should
be required.

 Responding to an uncontrolled release of a hazardous substance

 Activate the HazMat contingency plan

 Stay out of the contaminated area

 Identify the substance released and the quantity

 Do not approach injured employees until they have been decontaminated

 Assist the HazMat team

 Determine the extent of damage

 Keep onlookers out of the contaminated area, including news media

 Natural Emergencies

 Earthquake / building collapse

 Tornado

 Hurricane

 Forest fire

 Flood
48

 Winter storm

 Volcano

 Electrical storm

 Man-Made Emergencies

 Fire / Arson

 Explosion

 Chemical spill

 Hazardous gas leak

 Riot or violent strike

 Sabotage / Terrorism

 Radiation accident

 Bomb threat

 Preparation for Emergencies

 Comprehensive Emergency Plan

 Chain of command

 Elements of an Emergency Plan

 Warning and communications within the site

 Contacting the authorities and emergency services

 Chain of command

 Emergency lighting

 Protection of inbound and outbound shipments

 Evacuation of personnel

 Selective or total shutdown of normal operations

 Elements of an Emergency Plan

 Perimeter security
49

 Documentation (possibly by camcorder)

 Alternate location for management

 Medical services

 Records and equipment protection

 Insurance coverage

 Security Duties in an Emergency

 Sound the alarm

 Evacuate personnel

 Communicate instructions via public address, radio or telephone

 Retrieve critical documents and equipment

 Distribute personal protective equipment

 Protect all property

 Assist fire, police, EMTs

 Security Duties in an Emergency

 Protect nearby residents

 Secure the perimeter with ropes, signs or barriers to prevent unauthorized access

 Call people on emergency notification phone list

 Notify emergency services

 Communicate emergency instructions to site personnel

 Assist the injured

 Direct shut down of operations

 Security Duties in an Emergency

 Account for all site personnel, including visitors and contractors

 Restore normal operations, when the emergency is over

 Natural Disasters
50

 When a tornado watch is announced, monitor the local weather service. When a tornado
warning is issued, sound the alarm and evacuate all personnel to safe areas.

 Winter storms: Dress warmly, assist anyone trapped outside, note snow accumulations on
roofs, report unsafe walkways

 Natural Disasters

 Hurricane warning: Help evacuate personnel and board up. Afterwards, inspect the
premises for trapped personnel and damage.

 After an earthquake: Account for all personnel, assist injured and trapped personnel,
assess building damage, inspect gas lines and HazMat storage areas.

 During a flood, you may have to place sandbags, divert water, move equipment or coat it
with grease, and shut off gas lines and electrical power.

You might also like