Security & Loss Prevention: An Introduction

Slides:



Advertisements
Similar presentations
Competencies for Security and the Lodging Industry
Advertisements

OSHA Recommendations for Workplace Violence Prevention Programs in Late-Night Retail Establishments.
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
1 Introduction to Security Chapter 15 Institutional Security.
OSHA Recommendations for Workplace Violence Prevention Programs in Late-Night Retail Establishments OSHAX.org – The Unofficial Guide to the OSHA.
PowerPoint Presentation by Charlie Cook The University of West Alabama SECTION 5 Employee Relations CHAPTER 14 Risk Management and Worker Protection.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
FIGHT AGAINST CORRUPTION: THE LITHUANIAN WAY. CONTENTS Factors Decision Challenges Dilemmas Priorities.
Security Controls – What Works
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
June 9, 2003 Updated July 2004 Slide 1 Critical Infrastructure Assurance: The US Experience.
Social Responsibility of Business and Government
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
Chapter 7 – Major Planning Decisions Throughout the Life of a Small Business VCE Year 11 Business Management Unit 1 Learning Outcome 2 VCE Business Management.
Chapter 2 Modern Private Security
OSHA Long Term Care Worker Protection Train the Trainer Program Part 1: Introduction.
Workplace Violence Research has identified factors that may increase the risk of violence at worksites. Such factors include working with the public or.
Chapter 17 Commercial Security. Commercial Enterprises  The following rely on private security:  Financial institutions.  Office buildings.  Public.
Federal Agencies Legislative, Judicial, Executive, and Independent Governmental Departments.
Chapter Three The Contemporary Law Enforcement Industry
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. Police in America Chapter Three The Contemporary Law Enforcement Industry.
The Federal Bureaucracy Chapter 15. What is a bureaucracy?
Introduction to Fire Protection 3rd Edition
Copyright © 2012 by HRCP, L.C. Risk Management PHR 8% - SPHR 7%
SAFETY AND HEALTH CHAPTER 11 © 2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Introduction to the Public Safety System Created by Curt Harrell & Jesse Kuzy for.
ENFORCING THE RULES OF A NATION UNIT 1 – PART 2E.
Who Enforces the Law Role of Executive Departments: Federal, State, and Local.
WORKPLACE VIOLENCE SEMINAR SEATTLE FEDERAL EXECUTIVE BOARD ASSOCIATES PROGRAM Update 3/9/1999.
CJ © 2011 Cengage Learning Chapter 5 Law Enforcement Today.
Legal, Regulatory, and Political Issues
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Sharing Challenges, Trends and Opportunities
Security Challenges Facing Seaport Operations Day 1 - Module 3.
Human Resources: Objectives 1. Describe work environment of desired career positions 2. Relate environments to hiring policies and procedures. 3. Describe.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
CHAPTER 16 HEALTH, SAFETY, AND SECURITY. Chapter 16 HEALTH, SAFETY, AND SECURITY Human Resource Management, 9E Mathis and Jackson © 2000 South-Western.
Chapter 6 Enhancing Security Through Procedural Controls.
1 Washington State Critical Infrastructure Program “No security, No infrastructure” Infrastructure Protection Office Emergency Management Division Washington.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Hayes/Ninemeier: Foundations of Lodging Management. (C) 2006 Pearson Education, Upper Saddle River, NJ All Rights Reserved. Safety and Security.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
HOSPITALITY & TOURISM 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
Food Safety, Work Place Safety, and Emergency Preparedness National Food Service Management Institute The University of Mississippi 1.
Boston – June 12 th. 2 Joe Rozek Microsoft Corporation.
Roles and Functions of Private Security Principles of Law, Public Safety, Corrections and Security.
Chapter 6 legal and ethical issues Section 6.1 Government and Laws
4 Fire Prevention, Code Enforcement, And Fire And Life Safety Education Unit 4.
Executive Branch The Cabinet and Federal Agencies.
9-11 Commission Report: Implications for Transportation Security in the NY/NJ Region Eva Lerner-Lam and David Gaier Transportation Security Committee Transportation.
Executive Branch The Cabinet and Federal Agencies.
© BLR ® —Business & Legal Resources 1501 Essential HR For Those Who Have Recently Assumed HR Responsibilities.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Marketing Principles CHAPTER 6 SECTION 1.  Government actions have a great impact on business and its operations.  The US Government has three branches:
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Workplace Violence Prevention
Draft - Enterprise Risk Management Risk Universe
The Cabinet and Federal Agencies
Chapter 2 Modern Private Security
Disaster and Emergency Management
and Security Management: ISO 28000
Hospitality & Tourism 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
8 Building Blocks of National Cyber Strategies
Roles and Functions of Private Security
CHAPTER 1 - OVERVIEW OF HUMAN RESOURCE MANAGEMENT IN MALAYSIA
LT: Explain the roles government plays in our free enterprise system
The U.S. Department of Homeland Security
What Is Workplace Violence?
Foundations of Homeland Security & Emergency Management Law & Policy Post NPHS 1510.
Presentation transcript:

Security & Loss Prevention: An Introduction 5th Edition Philip Purpura

INTRODUCTION TO SECURITY AND LOSS PREVENTION Part 1 INTRODUCTION TO SECURITY AND LOSS PREVENTION

The History of Security and Loss Prevention: A Critical Perspective Chapter 1 The History of Security and Loss Prevention: A Critical Perspective

Chapter 1 WHY CRITICAL THINKING? HOW CAN WE THINK CRITICALLY? WHY THINK CRITICALLY ABOUT THE HISTORY OF SECURITY AND LOSS PREVENTION? SECURITY AND LOSS PREVENTION DEFINED

Chapter 1 HISTORY EARLY CIVILIZATIONS Why Study the History of Security and Loss Prevention? EARLY CIVILIZATIONS Ancient Greece Ancient Rome The Middle Ages in Europe

Chapter 1 MORE CONTEMPORARY TIMES England Early America The Growth of Policing The Growth of Security Companies Railroads and Labor Unions The Great Wars

Chapter 1 The Third Wave Convergence of IT and Physical Security Convergence of Enterprise Security 21st Century/Post-9/11 Security Challenges

The Business, Careers, and Challenges of Security and Loss Prevention Chapter 2 The Business, Careers, and Challenges of Security and Loss Prevention

Chapter 2 INTRODUCTION METRICS THE SECURITY INDUSTRY Internal Metrics External Metrics THE SECURITY INDUSTRY Contract versus Proprietary Security

Chapter 2 CAREERS: LOSS PREVENTION SERVICES AND SPECIALISTS THE LIMITATIONS OF THE CRIMINAL JUSTICE SYSTEM: IMPLICATIONS FOR LOSS PREVENTION PRACTITIONERS

Chapter 2 CHALLENGES OF THE SECURITY INDUSTRY Cooperation between Public Police and Private Security Regulation of the Industry The Need for Training Ethics The False Alarm Problem

REDUCING THE PROBLEM OF LOSS Part 2 REDUCING THE PROBLEM OF LOSS

Foundations of Security and Loss Prevention Chapter 3 Foundations of Security and Loss Prevention

Chapter 3 THE SECURITY AND LOSS PREVENTION PROFESSION Theoretical Foundations Security Periodicals METHODS FOR PROTECTION PROGRAMS Risk Analysis Planning

Chapter 3 STANDARDS AND REGULATIONS Post-9/11 Standards and Regulations Standard-Setting Organizations EVALUATION OF LOSS PREVENTION PROGRAMS Scientific Method

Chapter 3 PROPRIETARY SECURITY Sources of Research Assistance Basics of Organization: The Vocabulary Basics of Organization: The Practical Management Tools

Chapter 4 Law

Chapter 4 INTRODUCTION JUDICIAL SYSTEMS ORIGINS OF LAW State Court Systems Federal Court System ORIGINS OF LAW TORT LAW AND CONTROLS OVER PRIVATE SECURITY

Chapter 4 LEGAL THEORY OF PREMISES SECURITY CLAIMS CONTRACT LAW CIVIL JUSTICE PROCEDURES ADMINISTRATIVE LAW Recordkeeping, Reporting, Inspections, and Searches

Chapter 4 CRIMINAL JUSTICE PROCEDURE Compliance Auditing Federal Sentencing Guidelines Labor Law CRIMINAL JUSTICE PROCEDURE Arrest Law Force Searches Questioning

Internal and External Relations Chapter 5 Internal and External Relations

Chapter 5 INTERNAL AND EXTERNAL RELATIONS INTERNAL RELATIONS Benefits of Good Relations INTERNAL RELATIONS Customer Driven Security and Loss Prevention Programs Marketing

Chapter 5 Human Relations on the Job Management Support Orientation and Training Programs Loss Prevention Meetings Intranet and E-Mail Involvement Programs

Chapter 5 EXTERNAL RELATIONS Law Enforcement Public Safety Agencies The Community The Media External Loss Prevention Peers

Chapter 5 SPECIAL PROBLEMS Prosecution Decisions Loss Prevention Attire

Applicant Screening and Employee Socialization Chapter 6 Applicant Screening and Employee Socialization

Chapter 6 INTRODUCTION EMPLOYMENT LAW Federal Legislation U.S. Supreme Court Decisions Equal Employment Opportunity Commission EEO, AA, and Quotas

Chapter 6 SCREENING METHODS Diversity Sexual Harassment Resumes and Applications Interview Tests Background Investigations

Chapter 6 EMPLOYEE SOCIALIZATION Loss Prevention Orientation for New Employees Employee Training Planning Training Learning Principles Wasted Training

Chapter 6 Examples Set by Superiors Employee Needs

Internal Threats and Countermeasures Chapter 7 Internal Threats and Countermeasures

Chapter 7 INTRODUCTION INTERNAL THEFT How Serious Is The Problem? Why Do Employees Steal? How Do Employees Steal? Possible Indicators of Theft

Chapter 7 MANAGEMENT COUNTERMEASURES PHYSICAL SECURITY COUNTERMEASURES Integration, Open Architecture, and Convergence Access Controls

Chapter 7 Locks and Keys Intrusion Detection Systems Interior Sensors Closed-Circuit Television Security Officers Safes, Vaults, and File Cabinets

External Threats and Countermeasures Chapter 8 External Threats and Countermeasures

Chapter 8 INTRODUCTION METHODS OF UNAUTHORIZED ENTRY COUNTERMEASURES Construction and Environmental Security Design Perimeter Security

Chapter 8 Barriers Protecting Buildings Against Terrorism Windows Doors Intrusion Detection Systems CCTV Lighting

Chapter 8 Parking Lot and Vehicle Controls Security Officers Communications and the Control Center Protective Dogs

Services and Systems: Methods Toward Wise Purchasing Decisions Chapter 9 Services and Systems: Methods Toward Wise Purchasing Decisions

Chapter 9 INTRODUCTION PITFALLS WHEN PURCHASING SECURITY SERVICES AND SYSTEMS PURCHASING SECURITY SERVICES Questions When Considering Contract Security Officers

Chapter 9 PURCHASING SECURITY SYSTEMS OUTSOURCING Contract Undercover Investigators Consultants Certifications in Security PURCHASING SECURITY SYSTEMS Questions When Considering a Security System System Acquisition OUTSOURCING

Chapter 10 Investigations

Chapter 10 INTRODUCTION TYPES OF INVESTIGATIONS Proprietary and Contract Investigations Private and Public Investigations Overt and Undercover Private Investigations Important Considerations

Chapter 10 LAW EVIDENCE INTERVIEWING AND INTERROGATION INFORMATION SOURCES Legal Restrictions When Collecting Information

Chapter 10 IDENTITY THEFT INVESTIGATIVE LEADS SURVEILLANCE INFORMATION ACCURACY REPORT WRITING TESTIMONY

Accounting, Accountability, and Auditing Chapter 11 Accounting, Accountability, and Auditing

Chapter 11 INTRODUCTION ACCOUNTING ACCOUNTABILITY Cashier Operations Purchasing Inventory

Chapter 11 AUDITING FRAUD GOVERNANCE, RISK MANAGEMENT, AND COMPLIANCE Auditors Internal Control Questionnaire FRAUD GOVERNANCE, RISK MANAGEMENT, AND COMPLIANCE

Risk Management, Business Continuity, and Emergency Management Chapter 12 Risk Management, Business Continuity, and Emergency Management

Chapter 12 RISK MANAGEMENT INSURANCE The Role of the Risk Manager The Risk Management Process Risk Modeling Risk Management Tools Enterprise Risk Management INSURANCE

Chapter 12 BUSINESS CONTINUITY Types of Insurance Crime Insurance and Bonds Fire Insurance Property and Liability Insurance Claims Claims for Crime Losses BUSINESS CONTINUITY

Chapter 12 EMERGENCY MANAGEMENT THE MILITARY Guidance for Business Continuity Planning Methodology for Business Continuity EMERGENCY MANAGEMENT All-Hazards Preparedness Concept The History of Emergency Management Emergency Management Disciplines THE MILITARY

Life Safety, Fire Protection, and Emergencies Chapter 13 Life Safety, Fire Protection, and Emergencies

Chapter 13 LIFE SAFETY FIRE PROTECTION Standards, Regulations, and Codes OSHA Regulations NFPA 101 Life Safety Code Building Design and Building Codes FIRE PROTECTION The Problem of Fire

Chapter 13 FIRE PREVENTION AND FIRE SUPPRESSION STRATEGIES Private Organizations Involved in Fire Protection Fire Departments Fire Department Protection Efforts FIRE PREVENTION AND FIRE SUPPRESSION STRATEGIES Fire Prevention Strategies

Chapter 13 PUBLIC SAFETY AGENCIES EMERGENCIES Fire Suppression Strategies PUBLIC SAFETY AGENCIES Police Emergency Medical Service (EMS) EMERGENCIES Human-Made Emergencies Natural Disasters

Safety in the Workplace Chapter 14 Safety in the Workplace

Chapter 14 INTRODUCTION ACCIDENT STATISTICS AND COSTS HISTORY OF SAFETY LEGISLATION Workers’ Compensation The Development of OSHA OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION

Chapter 14 OSHA’s Strategic Management Plan The Act’s Jurisdiction OSHA Standards OSHA Recordkeeping and Reporting Additional Employer Responsibilities OSHA Inspections OSHA: Criticism and Controversy Assistance with Problems

Chapter 14 SAFETY STRATEGIES Safety and Health Committee Socialization and Incentive Programs Investigations Additional Safety Measures

SPECIAL PROBLEMS AND COUNTERMEASURES Part III SPECIAL PROBLEMS AND COUNTERMEASURES

Terrorism and Homeland Security Chapter 15 Terrorism and Homeland Security

Chapter 15 TERRORISM Terrorism Defined History Religion and Politics Causes of Terrorism International Terrorism International Terrorists

Chapter 15 HOMELAND SECURITY Domestic Terrorism Domestic Terrorists Terrorist Methods Terrorist Weapons Weapons of Mass Destruction HOMELAND SECURITY Homeland Security Defined

Chapter 15 The Measurement of Terrorism National Counterterrorism Center National Memorial Institute for the Prevention of Terrorism National Security and Homeland Security U.S. Government Action Against Terrorism Legislative Action Against Terrorism

Chapter 15 PRIVATE SECTOR State and Local Governments Response to Weapons of Mass Destruction PRIVATE SECTOR Losses and Costs from the 9/11 Attacks The Homeland Security Market Public-Private Sector Partnerships

Chapter 15 Business and Organizational Countermeasures Against Terrorism Citizen Volunteers

Protecting Critical Infrastructures, Key Assets, and Borders Chapter 16 Protecting Critical Infrastructures, Key Assets, and Borders

Chapter 16 CRITICAL INFRASTRUCTURE Critical Infrastructure Defined The Role of Government in Protecting Critical Infrastructure and Key Resources NIPP Risk Management Framework NIPP Recommendations for the Private Sector

Chapter 16 CRITICAL INFRASTRUCTURE SECTORS Agriculture and Food Water Energy Chemical Industry Telecommunications

Chapter 16 BORDER AND TRANSPORTATION SECURITY Cyberspace and Information Technology Defense Industry Base Key Assets BORDER AND TRANSPORTATION SECURITY Government Agencies with Roles in Border and Transportation Security

Chapter 16 TRANSPORTATION SECTORS Aviation Passenger Rail and Railroads Mass Transit Systems Highways, Trucking, and Intercity Busing Maritime Postal and Shipping Pipelines

Loss Prevention at Businesses and Institutions Chapter 17 Loss Prevention at Businesses and Institutions

Chapter 17 INTRODUCTION LOSS PREVENTION AT RETAIL BUSINESSES Shrinkage Human Resources Problems in Retailing Internal Loss Prevention Strategies Preventing Losses at Checkout Counters

Chapter 17 ROBBERY AND BURGLARY E-Business Counterfeiting Shoplifting Confronting the Suspected Shoplifter ROBBERY AND BURGLARY Robbery Countermeasures Burglary Countermeasures

Chapter 17 SHOPPING MALL STRATEGIES BANKS AND FINANCIAL BUSINESSES Banking and Finance Sector Challenges Banking and Finance Sector Initiatives The Scope of Threats and Legal Responsibilities of the Banking and Finance Sector

Chapter 17 EDUCATIONAL INSTITUTIONS Regulation H Bank Robbery Countermeasures Automatic Teller Machines Kidnapping and Extortion Embezzlement, Online Risks, and Fraud EDUCATIONAL INSTITUTIONS Threats and Hazards at Educational Institutions

Chapter 17 HEALTHCARE INSTITUTIONS Countermeasures School Districts Colleges and Universities Fire Protection at Educational Institutions HEALTHCARE INSTITUTIONS Public Health Sector Challenges Public Health Sector Initiatives

Chapter 17 The Scope of Threats and Legal Responsibilities of Healthcare Institutions Strategies for Healthcare Institutions

Chapter 18 Topics of Concern

Chapter 18 WORKPLACE VIOLENCE PERSONNEL PROTECTION Legal Guidelines Protection Methods PERSONNEL PROTECTION Planning Education and Training General Protection Strategies

Chapter 18 SUBSTANCE ABUSE IN THE WORKPLACE INFORMATION SECURITY Countermeasures Alcoholism Types of Substances and Abuse INFORMATION SECURITY Corporate Intelligence Gathering: Putting It in Perspective

Chapter 18 COMMUNICATIONS SECURITY Espionage Techniques and the Vulnerabilities of Technology Countermeasures COMMUNICATIONS SECURITY Electronic Surveillance and Wiretapping Technical Surveillance Countermeasures

Your Future in Security and Loss Prevention Chapter 19 Your Future in Security and Loss Prevention

Chapter 19 SECURITY AND LOSS PREVENTION IN THE FUTURE EDUCATION Trends Affecting Security and Loss Prevention EDUCATION Loss Prevention Education: Today and Tomorrow

Chapter 19 RESEARCH TRAINING EMPLOYMENT The Concept of the Security Institute EMPLOYMENT Sources of Employment Information Career Advice