SlideShare una empresa de Scribd logo
1 de 22
 
Obviously it has been in existence since the primitive ages. This is when man had to protect himself against wild animals and the harsh environment. At first security needs were simple, but as civilization complex, so did man’s security requirements. Through out the ages men started practicing the utilization of workers and equipment in order to protect his well being and property. Thus, the civilized man adopts security measures to have adequate protection against unsecured and unsafe conditions. This probably led to the establishment of the “POLICE”, an institution today  responsible for law and order as well as public safety.
“ POLICE” Originated from the Greek word “ POLITEIA” Meaning government of a city
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL THEORIES OF PATROL THEORY OF POLICE OMNIPRESENCE – high police visibility discourages criminals. Normally, criminals think twice before executing their plans if there is obvious presence of police officers. Thus, patrol activity should be carried in a manner that attracts maximum attention to the police officer or police vehicles. This theory applies the principle of overt operation or high police visibility. LOW PROFILE THEORY– low police visibility increases the opportunity to apprehend criminals. Deceptive absence of the police officer will let criminals believe that they will not be detected or caught if they execute crimes that they planned. In this theory, the objective is to attract as little attention as possible while on the process of patrolling. The officers should operate in a manner that it would be difficult for either criminals or the public to determine that police are around. The principle of covert operation is integrated in this theory.
There is an incredible growth of the security industry nowadays. Most companies are using guard forces, protective barriers, communication and electronic hardware and other state-of-the art protection methods and techniques in their asset protection. However, every company or installation cannot yet escape the emerging complicated security problems like the deteriorating peace and tranquility, the treat of terrorism and the social conditions of the community. A determine intruder can sneak in the properties of another while the owner is asleep out on a trip or anytime of the day and divest all valuable items which he can find. The incidents of fire and other disaster should also be considered in the asset protection. Hence, a basic understanding on the concept and methods of security is the primordial concern of everybody.
Security is a state or conditions of being secured; there is a freedom from fear, harm, danger, loss, destruction or damages. Basically, it was the action of man against man that led to many unsecured and unsafe conditions. Reasons could be economic, revenge, or just plain greed and avarice. Whatever the motives, the civilized man needs adequate protection.
Since security in general is very hard to comprehend, it can be divided into three major areas: 1. PHYSICAL SECURITY – this concern with the physical measures adopted to prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage, loss and theft. 2. PERSONAL SECURITY – it starts even before the hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is to insure that the firm hires those best suited to assist the firm in achieving its goals and objectives and once hired assist in providing necessary to the work force while carrying out their functions. 3. DOCUMENT AND INFORMATION SECURITY – this involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure. Classified documents need special handling. Lack of indoctrination and orientation among the personal handling them can result in the leakage, loss, theft and unauthorized disclosure of the documents.
PROTECTIVE SECURITY can be defined as those measures taken by an installation or unit to protect itself against sabotage, espionage or subversion and at the same time provide freedom of action in order to provide the installation of the unit with the necessary flexibility to accomplish its mission. The aspects of protective security can be seen with the application of the following: –  INDUSTRIAL SECURITY –  HOTEL SECURITY  –  BANK SECURITY –  VIP SECURITY –  SCHOOL SECURITY –  SUPERMARKET or MALL SECURITY –  OTHER TYPES
INDUSTRIAL SECURITY  A type of security applied to business groups engaged in industries like manufacturing, assembling, research and development, processing, warehousing and even agriculture. It may also mean the business of providing security. HOTEL SECURITY  A type of security applied to hotels where its properties are protected from pilferage, loss, damage, and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This type of security employs house detectives, uniforms guard and supervisor and insures that hotel guests and their personal effects are safeguarded.
BANK SECURITY  This type of security is concern with bank operations. Its main objective is the protection of bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank and assets while in storage, in transit and during transactions.  VIP SECURITY  A type of security applied for the protection of top-ranking officials of the government or private entity, visiting persons of illustrious standing and foreign dignitaries.
SCHOOL SECURITY  A type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students. SUPERMARKET SECURITY A type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel and customers. Security personnel are trained to detect “shoplifter”, robbery, and bomb detection and customer relation.
OTHER TYPES This include all other security matters not covered in the 6 enumeration like; –  FIESTA –  BIRTHDAYS  –  PARTY –  PARADE –  CONCERT –  RALLY –  COURT HEARING –  INAUGURATION OF PRESIDENT
PHYSICAL SECURITY measures are being used to define, protect, and monitor property rights and assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and theft. PHYSICAL SECURITY may be also defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies, programs, personnel, property, utilities, information, facilities and installation against compromise, trespass, sabotage, pilferage, embezzlement, fraud or other dishonest criminal act.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TYPES OF BARRIERS –  NATURAL BARRIERS –  STRUCTURAL BARRIERS  –  HUMAN BARRIERS –  ANIMAL BARRIERS –  ENERGY BARRIERS
NATURAL BARRIERS  It includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse.
STRUCTURAL  BARRIERS  These are features constructed by man regardless of their original intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
HUMAN  BARRIERS  Persons being used in providing a guarding system or by the nature of their employment and locations, fulfill security functions.
ANIMAL BARRIERS  Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to serve as guard dogs.
ENERGY BARRIERS  It is the employment of mechanical, electrical, electric energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. These are protective lighting, alarm system and any electronic devices used as barriers.
 

Más contenido relacionado

La actualidad más candente

Title ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateTitle ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateJose Van Tan
 
Technique and strategies on Criminology Board Exam
Technique and strategies on Criminology Board ExamTechnique and strategies on Criminology Board Exam
Technique and strategies on Criminology Board Exammonde24836
 
Sample Sample Pattern Area training Module
Sample Sample  Pattern Area training ModuleSample Sample  Pattern Area training Module
Sample Sample Pattern Area training ModuleRmcauley
 
pnp-ethical-doctrine
pnp-ethical-doctrinepnp-ethical-doctrine
pnp-ethical-doctrineAlpha Charlie
 
Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)Dominic Guiao
 
Child in Conflict with the Law: The Demographic Factors Affecting Juvenile De...
Child in Conflict with the Law: The Demographic Factors Affecting Juvenile De...Child in Conflict with the Law: The Demographic Factors Affecting Juvenile De...
Child in Conflict with the Law: The Demographic Factors Affecting Juvenile De...Mariz Pascua
 
Police Report Vs. Incident Report
Police Report Vs. Incident ReportPolice Report Vs. Incident Report
Police Report Vs. Incident Report- Mark - Fullbright
 
Police report writing
Police report writingPolice report writing
Police report writingkapitanpinoy
 
Criminal investigation manual
Criminal investigation manualCriminal investigation manual
Criminal investigation manualLord Gonzaga
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigationjaredplata
 

La actualidad más candente (20)

Cflm 2
Cflm 2 Cflm 2
Cflm 2
 
Police photography
Police photographyPolice photography
Police photography
 
Title ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateTitle ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the state
 
ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)
 
Ridge counting-and-tracing
Ridge counting-and-tracingRidge counting-and-tracing
Ridge counting-and-tracing
 
Correctional Administration
Correctional AdministrationCorrectional Administration
Correctional Administration
 
Technique and strategies on Criminology Board Exam
Technique and strategies on Criminology Board ExamTechnique and strategies on Criminology Board Exam
Technique and strategies on Criminology Board Exam
 
Sample Sample Pattern Area training Module
Sample Sample  Pattern Area training ModuleSample Sample  Pattern Area training Module
Sample Sample Pattern Area training Module
 
pnp-ethical-doctrine
pnp-ethical-doctrinepnp-ethical-doctrine
pnp-ethical-doctrine
 
Criminal procedure simplified
Criminal procedure simplifiedCriminal procedure simplified
Criminal procedure simplified
 
Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)
 
Child in Conflict with the Law: The Demographic Factors Affecting Juvenile De...
Child in Conflict with the Law: The Demographic Factors Affecting Juvenile De...Child in Conflict with the Law: The Demographic Factors Affecting Juvenile De...
Child in Conflict with the Law: The Demographic Factors Affecting Juvenile De...
 
Police Report Vs. Incident Report
Police Report Vs. Incident ReportPolice Report Vs. Incident Report
Police Report Vs. Incident Report
 
criminal justice system
criminal justice systemcriminal justice system
criminal justice system
 
Who are criminally liable
Who are criminally liableWho are criminally liable
Who are criminally liable
 
ADJ 201-63 Criminology Lesson 1
ADJ 201-63 Criminology Lesson 1ADJ 201-63 Criminology Lesson 1
ADJ 201-63 Criminology Lesson 1
 
Police report writing
Police report writingPolice report writing
Police report writing
 
Criminal investigation manual
Criminal investigation manualCriminal investigation manual
Criminal investigation manual
 
Aggravating circumstances
Aggravating circumstancesAggravating circumstances
Aggravating circumstances
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigation
 

Similar a Law Enforcement Administration II

FUNDAMENTALS OF INDUSTRIAL SECURITY.pdf
FUNDAMENTALS OF  INDUSTRIAL SECURITY.pdfFUNDAMENTALS OF  INDUSTRIAL SECURITY.pdf
FUNDAMENTALS OF INDUSTRIAL SECURITY.pdfFlorArquillano3
 
Security Services in Bhubaneswar, odisha
Security Services in Bhubaneswar, odishaSecurity Services in Bhubaneswar, odisha
Security Services in Bhubaneswar, odishaTechno facility
 
Experience Reliable Security with Our Dedicated Guard Services
Experience Reliable Security with Our Dedicated Guard ServicesExperience Reliable Security with Our Dedicated Guard Services
Experience Reliable Security with Our Dedicated Guard ServicesTechno facility
 
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...Md Shaifullar Rabbi
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfLandmark Security Services
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfLandmark Security Services
 
Making Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptxMaking Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptxDenaLigo
 
Occupational Health and Safety Officer
Occupational Health and Safety OfficerOccupational Health and Safety Officer
Occupational Health and Safety OfficerJonathan Alba
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfMax Secure Ltd
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to SecurityNateBrown60
 
Security training manual
Security training manualSecurity training manual
Security training manualANILDEVADKAR
 
Overall Security Services
Overall Security ServicesOverall Security Services
Overall Security Servicesiangobi
 
Terrasol security training f
Terrasol security training fTerrasol security training f
Terrasol security training fSamuel I. Michuki
 
Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Trainingworksteadc
 
SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............Muhammad Saqib
 

Similar a Law Enforcement Administration II (20)

FUNDAMENTALS OF INDUSTRIAL SECURITY.pdf
FUNDAMENTALS OF  INDUSTRIAL SECURITY.pdfFUNDAMENTALS OF  INDUSTRIAL SECURITY.pdf
FUNDAMENTALS OF INDUSTRIAL SECURITY.pdf
 
Physical Security.pptx
Physical Security.pptxPhysical Security.pptx
Physical Security.pptx
 
Lecture 1 9 sam 100-
Lecture 1   9 sam 100-Lecture 1   9 sam 100-
Lecture 1 9 sam 100-
 
Security Services in Bhubaneswar, odisha
Security Services in Bhubaneswar, odishaSecurity Services in Bhubaneswar, odisha
Security Services in Bhubaneswar, odisha
 
Experience Reliable Security with Our Dedicated Guard Services
Experience Reliable Security with Our Dedicated Guard ServicesExperience Reliable Security with Our Dedicated Guard Services
Experience Reliable Security with Our Dedicated Guard Services
 
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
 
Security_Guard
Security_GuardSecurity_Guard
Security_Guard
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
Making Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptxMaking Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptx
 
Occupational Health and Safety Officer
Occupational Health and Safety OfficerOccupational Health and Safety Officer
Occupational Health and Safety Officer
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
pln9 presentation mall
pln9 presentation mallpln9 presentation mall
pln9 presentation mall
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to Security
 
Security training manual
Security training manualSecurity training manual
Security training manual
 
Overall Security Services
Overall Security ServicesOverall Security Services
Overall Security Services
 
Terrasol security training f
Terrasol security training fTerrasol security training f
Terrasol security training f
 
Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Training
 
SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............
 

Último

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Último (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Law Enforcement Administration II

  • 1.  
  • 2. Obviously it has been in existence since the primitive ages. This is when man had to protect himself against wild animals and the harsh environment. At first security needs were simple, but as civilization complex, so did man’s security requirements. Through out the ages men started practicing the utilization of workers and equipment in order to protect his well being and property. Thus, the civilized man adopts security measures to have adequate protection against unsecured and unsafe conditions. This probably led to the establishment of the “POLICE”, an institution today responsible for law and order as well as public safety.
  • 3. “ POLICE” Originated from the Greek word “ POLITEIA” Meaning government of a city
  • 4.
  • 5. FUNDAMENTAL THEORIES OF PATROL THEORY OF POLICE OMNIPRESENCE – high police visibility discourages criminals. Normally, criminals think twice before executing their plans if there is obvious presence of police officers. Thus, patrol activity should be carried in a manner that attracts maximum attention to the police officer or police vehicles. This theory applies the principle of overt operation or high police visibility. LOW PROFILE THEORY– low police visibility increases the opportunity to apprehend criminals. Deceptive absence of the police officer will let criminals believe that they will not be detected or caught if they execute crimes that they planned. In this theory, the objective is to attract as little attention as possible while on the process of patrolling. The officers should operate in a manner that it would be difficult for either criminals or the public to determine that police are around. The principle of covert operation is integrated in this theory.
  • 6. There is an incredible growth of the security industry nowadays. Most companies are using guard forces, protective barriers, communication and electronic hardware and other state-of-the art protection methods and techniques in their asset protection. However, every company or installation cannot yet escape the emerging complicated security problems like the deteriorating peace and tranquility, the treat of terrorism and the social conditions of the community. A determine intruder can sneak in the properties of another while the owner is asleep out on a trip or anytime of the day and divest all valuable items which he can find. The incidents of fire and other disaster should also be considered in the asset protection. Hence, a basic understanding on the concept and methods of security is the primordial concern of everybody.
  • 7. Security is a state or conditions of being secured; there is a freedom from fear, harm, danger, loss, destruction or damages. Basically, it was the action of man against man that led to many unsecured and unsafe conditions. Reasons could be economic, revenge, or just plain greed and avarice. Whatever the motives, the civilized man needs adequate protection.
  • 8. Since security in general is very hard to comprehend, it can be divided into three major areas: 1. PHYSICAL SECURITY – this concern with the physical measures adopted to prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage, loss and theft. 2. PERSONAL SECURITY – it starts even before the hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is to insure that the firm hires those best suited to assist the firm in achieving its goals and objectives and once hired assist in providing necessary to the work force while carrying out their functions. 3. DOCUMENT AND INFORMATION SECURITY – this involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure. Classified documents need special handling. Lack of indoctrination and orientation among the personal handling them can result in the leakage, loss, theft and unauthorized disclosure of the documents.
  • 9. PROTECTIVE SECURITY can be defined as those measures taken by an installation or unit to protect itself against sabotage, espionage or subversion and at the same time provide freedom of action in order to provide the installation of the unit with the necessary flexibility to accomplish its mission. The aspects of protective security can be seen with the application of the following: – INDUSTRIAL SECURITY – HOTEL SECURITY – BANK SECURITY – VIP SECURITY – SCHOOL SECURITY – SUPERMARKET or MALL SECURITY – OTHER TYPES
  • 10. INDUSTRIAL SECURITY A type of security applied to business groups engaged in industries like manufacturing, assembling, research and development, processing, warehousing and even agriculture. It may also mean the business of providing security. HOTEL SECURITY A type of security applied to hotels where its properties are protected from pilferage, loss, damage, and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This type of security employs house detectives, uniforms guard and supervisor and insures that hotel guests and their personal effects are safeguarded.
  • 11. BANK SECURITY This type of security is concern with bank operations. Its main objective is the protection of bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank and assets while in storage, in transit and during transactions. VIP SECURITY A type of security applied for the protection of top-ranking officials of the government or private entity, visiting persons of illustrious standing and foreign dignitaries.
  • 12. SCHOOL SECURITY A type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students. SUPERMARKET SECURITY A type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel and customers. Security personnel are trained to detect “shoplifter”, robbery, and bomb detection and customer relation.
  • 13. OTHER TYPES This include all other security matters not covered in the 6 enumeration like; – FIESTA – BIRTHDAYS – PARTY – PARADE – CONCERT – RALLY – COURT HEARING – INAUGURATION OF PRESIDENT
  • 14. PHYSICAL SECURITY measures are being used to define, protect, and monitor property rights and assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and theft. PHYSICAL SECURITY may be also defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies, programs, personnel, property, utilities, information, facilities and installation against compromise, trespass, sabotage, pilferage, embezzlement, fraud or other dishonest criminal act.
  • 15.
  • 16. TYPES OF BARRIERS – NATURAL BARRIERS – STRUCTURAL BARRIERS – HUMAN BARRIERS – ANIMAL BARRIERS – ENERGY BARRIERS
  • 17. NATURAL BARRIERS It includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse.
  • 18. STRUCTURAL BARRIERS These are features constructed by man regardless of their original intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
  • 19. HUMAN BARRIERS Persons being used in providing a guarding system or by the nature of their employment and locations, fulfill security functions.
  • 20. ANIMAL BARRIERS Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to serve as guard dogs.
  • 21. ENERGY BARRIERS It is the employment of mechanical, electrical, electric energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. These are protective lighting, alarm system and any electronic devices used as barriers.
  • 22.