U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Security Manual, Fourth Edition

NCJ Number
96461
Author(s)
E Oliver; J Wilson
Date Published
1983
Length
240 pages
Annotation
This manual discusses the responsibilities and professional standards of the security officer.
Abstract
General security duties are defined, including keeping a log book, registering motor vehicles and borrowed tools, and taking telephone messages. Further, the main objectives of patrolling duties are cited: to detect and prevent fire and other damage to company property, to prevent accidents, to prevent offenses against the company interest, and to ensure the observance of company rules. The main types of security equipment used for protection or alarm purposes are described (including gates, perimeter walls, locks, and alarm systems). Searching procedure is explained, with attention to employer's right to search, searching persons and vehicles, and search after arrest. Criminal offenses which the security officer is most likely to detect are considered: theft, fraud, forgery, malicious damage, and assault against the person. The police procedure following arrest is examined, and the Theft Act of 1968 is discussed. Suggestions for questioning suspects are provided, and guidance in taking statements of witnesses is offered. A description of evidence focuses on direct, circumstantial, and hearsay evidence. Fire precautions are noted, and the various types of fire and of fire-extinguishing equipment are explored. Additionally, indications of arson are identified, such as simultaneous outbreak in separate places and the presence of inflammable materials foreign to the area. The use of guard dogs is addressed, and tips on first aid are provided. Additional chapters explain Scottish law on evidence, accident prevention, cash security, traffic control, and contract security.

Downloads

No download available

Availability