Safe Working Practices - Security Security measures in leisure facilities Identify potential security hazards for the location Dependent upon operation,

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Secure Your Store Understand the measures used in securing a retail store.
Seasonal Crime Prevention Helpful Advice and Tips.
Understanding security and loss prevention in a retail business
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
Presentation Retail Security Key Holding Mobile Patrols Access Control Systems Manned Security Receptionist CCTV Monitoring.
1 Introduction to Security Chapter 15 Institutional Security.
Presented by Bill Haining
Business Risks How much of a risk are you willing to take? Going out on a limb.
Section 34.2 Handling Business Risks
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Physical Security John Schwertfeger Security Manager Duane Arnold Energy Center.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Understanding the management of risks to health and safety on the premises of a retail business Unit 352.
Chapter 7: Assuring Safety and Security in Healthcare Institutions
Health and Safety Unit 254.
What you will learn in this session 1.The characteristics of fire, smoke and toxic fumes 2.Fire hazards involved in the working environment 3.Significant.
Chapter 17 Commercial Security. Commercial Enterprises  The following rely on private security:  Financial institutions.  Office buildings.  Public.
AMARI AIR BASE AT/FP EVAL 9 JUNE (No photos taken due to tight security)
Administrative Practices Outcome 1
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Understanding Security Layers
Chapter 10.  Two groups of crimes against property.  Crimes in which property is destroyed Arson, vandalism  Crimes in which property is taken against.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
SECURITY PRACTICES.
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
Security and backups GCSE ICT.
RISK MANAGEMENT. RISK IS INEVITABLE  From your research of local businesses, what Risk was unavoidable and why?  Speculative Vs. Pure Risk  Speculative=
PANTHER SECURITY AND PRIVATE INVESTIGATION Security is degree of protection against danger, damage, loss and crime.
Chapter 18 Institutional Security. Special Security Institutions  Hospitals and other health care facilities.  Educational institutions.  Libraries.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
Keep It Safe. Homework (Passport page 42) How’s It Going?
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Chapter 6 Enhancing Security Through Procedural Controls.
ICT Homework- ICT Security Consultant PowerPoint.
VBS – Lesson 1: SIM Solution $35 $45 $55 $60 $65 $80.
LEGAL AND ORGANISATIONAL REQUIREMENTS FOR DATA RECORDING.
Add name of trust / organisation in box 1 and name of trainer in box 2. Delete THIS box.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
Hayes/Ninemeier: Foundations of Lodging Management. (C) 2006 Pearson Education, Upper Saddle River, NJ All Rights Reserved. Safety and Security.
Hospitality Operations Objective 3.04 Security. Objective Security  State the major responsibility of the Security Department The protection of.
UNDP Offices in the Field Physical Security Standards  MOSS provides uniform security standards for UN offices in capitals and the field – read it. 
CONTROLLING INFORMATION SYSTEMS
13 Implementing a Security Plan Implementing a Security Plan
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Chapter 19 Other Applications of Security at Work.
What you will learn in this session 1.The characteristics of fire, smoke and toxic fumes 2.Fire hazards involved in the working environment 3.Significant.
Access Control Jeff Wicklund Computer Security Fall 2013.
Health & Safety Allen Hey / Tracy Owen. Health & Safety at Work Act 1974 Employer’s Duties Section 2 - Employers must ensure for their employees:  Safe.
The Safety of Exhibits. The Safety of Objects The Safety of People.
LMZ Retail: Asset Protection through Robbery Prevention Nate Toon Unit 7 Project CJ 180 Prof. Bashore.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Warehousing and Storage Principles Session 12 – Security Day 6 / PM.
VIOLENCE AT WORK Samuel Nii Tettey (Ergonomist) 1.
Crimes Against Property Chapter 10. Arson and Vandalism Malicious burning of property Crime whether you own building or not May lead to other more, serious.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Module 8 Risk Management. Manager, Customer Services Module 8Slide - 2 Objective The learner will be able to: –Develop an understanding of Security Responsibility.
Arson Risk Reduction Bradford Fire Prevention
What you will learn in this session
Administrative Practices Outcome 1
Security of Data  
Physical Security.
The Private Security Industry
Presentation transcript:

Safe Working Practices - Security Security measures in leisure facilities Identify potential security hazards for the location Dependent upon operation, location or sector Size and scale of activity Violence Theft Fraud Terrorism and sabotage Damage (accidental, deliberate, criminal)

Safe Working Practices - Security Violence Crowd violence Individual violence Violence against personalities and players Alcohol related violence Verbal abuse MEASURES safety and security for spectators and participants Duty of care under HASAWA Video surveillance dossier evidence on habitual offenders quick intervention in disputes and arguments stewards and security guards

Safe Working Practices - Security Theft - hazards Theft of sensitive or confidential information client database, customer, membership records Data Protection Act governs confidentiality Theft of cash or equivalent Theft of belongings – staff and customers Security of valuables – staff and customers Defence against pickpockets Security of cash in movement to the bank Theft of stock including shop lifting Theft of equipment Electronic theft (computer hacking)

Safe Working Practices - Security Theft – anti theft security Locked doors Locker systems Signs – pickpockets Tagging for goods ‘Security vehicle’ for cash in transit Special lighting systems Intruder alarms Bars, shutters, grilles and screens CCTV systems Special security access / locking systems for doors Turnstiles and barriers Swipe card systems Computer security systems – passwords and encryption

Safe Working Practices - Security Fraud Fraud is criminal deception Stolen credit / debit cards Forged cheques Fake tickets Fake goods Counterfeit money Impersonation of someone else

Safe Working Practices - Security Ticket fraud Internal ticket fraud theft of tickets for resale free entry allowed by staff discrepancies in ticket sales at entry points External ticket fraud counterfeiting alteration of tickets, signatures or identities fraudulent re-use of tickets (re-entry) illegal sale or transfer of season tickets / memberships

Safe Working Practices - Security Sabotage Deliberate damage to prevent an event occurring Damage to property, equipment and facilities hooligans protesters angry crowds terrorists political extremists Examples in recent times animal rights activists pitch invasion by crowds political demonstrations bomb or death threat protesters against housing / road / motorway developments

Safe Working Practices - Security Accidental or deliberate damage Accidental damage to equipment Misuse of equipment Some accidental damage is unavoidable Staff supervision can reduce accidental damage Deliberate damage Vandalism Arson Graffiti Broken doors, windows and equipment Breaking and entering to cause damage Deliberate disruption at special events / functions

Safe Working Practices - Security Evaluating security hazards Undertake same approach as a risk assessment how likely – the probability the type of damage or likely loss the level of likely loss – the severity seek specialist advice and guidance put necessary security measures in place ensure staff know how to operate the measures

Safe Working Practices - Security Predicting security risks Queue build up and a resulting restless crowd Peak shopping times which favour shop lifters Big matches / events which attract ticket touts Soccer matches which will be ‘flashpoints’ Periods of time when valuables are unattended Vulnerability of premises to night ‘break ins’ Areas away from main security scrutiny

Safe Working Practices - Security Activities requiring security coverage High profile sport events Special events – pop concerts Key factors which are vulnerable must be scrutinised The building itself The security of an outdoor location Important equipment Computers Car parking facilities Storage of supplies (catering, souvenirs) Valuable promotional material or equipment Power supplies

Safe Working Practices - Security Customers and staff security Staff are vulnerable Collecting money Controlling access and exit points Dealing with complaints Looking after VIPs Staff roles be scrutinised carefully for risks such as Violence Theft Fraud Sabotage Dealing with sabotage or vandalism

Safe Working Practices - Security Emergency actions Emergency action must be planned and rehearsed Emergency evacuation – fire, explosives Reaction to violence or threat of violence Theft and fraudulent activity Unauthorised entry and vandalism Alarm systems are an important aspect of security Personal alarms – pagers, attack buttons, radios Fire alarms and smoke detectors Intruder alarms – infra red beams, pressure pads, lights, circuit breakers Surveillance equipment – CCTV and pinhole cameras Detection equipment – metal detectors, electronic monitoring gates