SlideShare una empresa de Scribd logo
1 de 22
 
Obviously it has been in existence since the primitive ages. This is when man had to protect himself against wild animals and the harsh environment. At first security needs were simple, but as civilization complex, so did man’s security requirements. Through out the ages men started practicing the utilization of workers and equipment in order to protect his well being and property. Thus, the civilized man adopts security measures to have adequate protection against unsecured and unsafe conditions. This probably led to the establishment of the “POLICE”, an institution today  responsible for law and order as well as public safety.
“ POLICE” Originated from the Greek word “ POLITEIA” Meaning government of a city
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL THEORIES OF PATROL THEORY OF POLICE OMNIPRESENCE – high police visibility discourages criminals. Normally, criminals think twice before executing their plans if there is obvious presence of police officers. Thus, patrol activity should be carried in a manner that attracts maximum attention to the police officer or police vehicles. This theory applies the principle of overt operation or high police visibility. LOW PROFILE THEORY– low police visibility increases the opportunity to apprehend criminals. Deceptive absence of the police officer will let criminals believe that they will not be detected or caught if they execute crimes that they planned. In this theory, the objective is to attract as little attention as possible while on the process of patrolling. The officers should operate in a manner that it would be difficult for either criminals or the public to determine that police are around. The principle of covert operation is integrated in this theory.
There is an incredible growth of the security industry nowadays. Most companies are using guard forces, protective barriers, communication and electronic hardware and other state-of-the art protection methods and techniques in their asset protection. However, every company or installation cannot yet escape the emerging complicated security problems like the deteriorating peace and tranquility, the treat of terrorism and the social conditions of the community. A determine intruder can sneak in the properties of another while the owner is asleep out on a trip or anytime of the day and divest all valuable items which he can find. The incidents of fire and other disaster should also be considered in the asset protection. Hence, a basic understanding on the concept and methods of security is the primordial concern of everybody.
Security is a state or conditions of being secured; there is a freedom from fear, harm, danger, loss, destruction or damages. Basically, it was the action of man against man that led to many unsecured and unsafe conditions. Reasons could be economic, revenge, or just plain greed and avarice. Whatever the motives, the civilized man needs adequate protection.
Since security in general is very hard to comprehend, it can be divided into three major areas: 1. PHYSICAL SECURITY – this concern with the physical measures adopted to prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage, loss and theft. 2. PERSONAL SECURITY – it starts even before the hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is to insure that the firm hires those best suited to assist the firm in achieving its goals and objectives and once hired assist in providing necessary to the work force while carrying out their functions. 3. DOCUMENT AND INFORMATION SECURITY – this involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure. Classified documents need special handling. Lack of indoctrination and orientation among the personal handling them can result in the leakage, loss, theft and unauthorized disclosure of the documents.
PROTECTIVE SECURITY can be defined as those measures taken by an installation or unit to protect itself against sabotage, espionage or subversion and at the same time provide freedom of action in order to provide the installation of the unit with the necessary flexibility to accomplish its mission. The aspects of protective security can be seen with the application of the following: –  INDUSTRIAL SECURITY –  HOTEL SECURITY  –  BANK SECURITY –  VIP SECURITY –  SCHOOL SECURITY –  SUPERMARKET or MALL SECURITY –  OTHER TYPES
INDUSTRIAL SECURITY  A type of security applied to business groups engaged in industries like manufacturing, assembling, research and development, processing, warehousing and even agriculture. It may also mean the business of providing security. HOTEL SECURITY  A type of security applied to hotels where its properties are protected from pilferage, loss, damage, and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This type of security employs house detectives, uniforms guard and supervisor and insures that hotel guests and their personal effects are safeguarded.
BANK SECURITY  This type of security is concern with bank operations. Its main objective is the protection of bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank and assets while in storage, in transit and during transactions.  VIP SECURITY  A type of security applied for the protection of top-ranking officials of the government or private entity, visiting persons of illustrious standing and foreign dignitaries.
SCHOOL SECURITY  A type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students. SUPERMARKET SECURITY A type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel and customers. Security personnel are trained to detect “shoplifter”, robbery, and bomb detection and customer relation.
OTHER TYPES This include all other security matters not covered in the 6 enumeration like; –  FIESTA –  BIRTHDAYS  –  PARTY –  PARADE –  CONCERT –  RALLY –  COURT HEARING –  INAUGURATION OF PRESIDENT
PHYSICAL SECURITY measures are being used to define, protect, and monitor property rights and assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and theft. PHYSICAL SECURITY may be also defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies, programs, personnel, property, utilities, information, facilities and installation against compromise, trespass, sabotage, pilferage, embezzlement, fraud or other dishonest criminal act.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TYPES OF BARRIERS –  NATURAL BARRIERS –  STRUCTURAL BARRIERS  –  HUMAN BARRIERS –  ANIMAL BARRIERS –  ENERGY BARRIERS
NATURAL BARRIERS  It includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse.
STRUCTURAL  BARRIERS  These are features constructed by man regardless of their original intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
HUMAN  BARRIERS  Persons being used in providing a guarding system or by the nature of their employment and locations, fulfill security functions.
ANIMAL BARRIERS  Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to serve as guard dogs.
ENERGY BARRIERS  It is the employment of mechanical, electrical, electric energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. These are protective lighting, alarm system and any electronic devices used as barriers.
 

Más contenido relacionado

La actualidad más candente

Title ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateTitle ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the state
Jose Van Tan
 
CDI-1-FUNDAMENTALS-OF-CRIMINAL-INVESTIGATION.docx
CDI-1-FUNDAMENTALS-OF-CRIMINAL-INVESTIGATION.docxCDI-1-FUNDAMENTALS-OF-CRIMINAL-INVESTIGATION.docx
CDI-1-FUNDAMENTALS-OF-CRIMINAL-INVESTIGATION.docx
JanOpenMihar
 
Police administrative disciplinary machinery
Police administrative disciplinary machineryPolice administrative disciplinary machinery
Police administrative disciplinary machinery
ayyel
 

La actualidad más candente (20)

Pnp operational procedure
Pnp operational procedurePnp operational procedure
Pnp operational procedure
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
 
ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)
 
Title ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateTitle ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the state
 
First-Responders-in-CSI_01.19.ppt
First-Responders-in-CSI_01.19.pptFirst-Responders-in-CSI_01.19.ppt
First-Responders-in-CSI_01.19.ppt
 
Pnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebookPnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebook
 
CDI-1-FUNDAMENTALS-OF-CRIMINAL-INVESTIGATION.docx
CDI-1-FUNDAMENTALS-OF-CRIMINAL-INVESTIGATION.docxCDI-1-FUNDAMENTALS-OF-CRIMINAL-INVESTIGATION.docx
CDI-1-FUNDAMENTALS-OF-CRIMINAL-INVESTIGATION.docx
 
Arrest
ArrestArrest
Arrest
 
Philippine Criminal Justice System
Philippine Criminal Justice SystemPhilippine Criminal Justice System
Philippine Criminal Justice System
 
Cflm 2
Cflm 2 Cflm 2
Cflm 2
 
Police patrol preview
Police patrol previewPolice patrol preview
Police patrol preview
 
Arraignment and plea
Arraignment and pleaArraignment and plea
Arraignment and plea
 
Memo rhaney
Memo rhaneyMemo rhaney
Memo rhaney
 
Police administrative disciplinary machinery
Police administrative disciplinary machineryPolice administrative disciplinary machinery
Police administrative disciplinary machinery
 
pnp-ethical-doctrine
pnp-ethical-doctrinepnp-ethical-doctrine
pnp-ethical-doctrine
 
Who are criminally liable
Who are criminally liableWho are criminally liable
Who are criminally liable
 
3 handcuffing foxtroot
3 handcuffing foxtroot3 handcuffing foxtroot
3 handcuffing foxtroot
 
Exempting circumstance
Exempting circumstanceExempting circumstance
Exempting circumstance
 
POLICE-BLOTTER_01.19.ppt
POLICE-BLOTTER_01.19.pptPOLICE-BLOTTER_01.19.ppt
POLICE-BLOTTER_01.19.ppt
 
Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)
 

Similar a Law Enforcement Administration II

Occupational Health and Safety Officer
Occupational Health and Safety OfficerOccupational Health and Safety Officer
Occupational Health and Safety Officer
Jonathan Alba
 
Overall Security Services
Overall Security ServicesOverall Security Services
Overall Security Services
iangobi
 

Similar a Law Enforcement Administration II (20)

The Vital Role of Security Guards: Safeguarding People, Property, and Peace o...
The Vital Role of Security Guards: Safeguarding People, Property, and Peace o...The Vital Role of Security Guards: Safeguarding People, Property, and Peace o...
The Vital Role of Security Guards: Safeguarding People, Property, and Peace o...
 
FUNDAMENTALS OF INDUSTRIAL SECURITY.pdf
FUNDAMENTALS OF  INDUSTRIAL SECURITY.pdfFUNDAMENTALS OF  INDUSTRIAL SECURITY.pdf
FUNDAMENTALS OF INDUSTRIAL SECURITY.pdf
 
Physical Security.pptx
Physical Security.pptxPhysical Security.pptx
Physical Security.pptx
 
Lecture 1 9 sam 100-
Lecture 1   9 sam 100-Lecture 1   9 sam 100-
Lecture 1 9 sam 100-
 
Security Services in Bhubaneswar, odisha
Security Services in Bhubaneswar, odishaSecurity Services in Bhubaneswar, odisha
Security Services in Bhubaneswar, odisha
 
Experience Reliable Security with Our Dedicated Guard Services
Experience Reliable Security with Our Dedicated Guard ServicesExperience Reliable Security with Our Dedicated Guard Services
Experience Reliable Security with Our Dedicated Guard Services
 
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
 
Security_Guard
Security_GuardSecurity_Guard
Security_Guard
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
Making Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptxMaking Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptx
 
Occupational Health and Safety Officer
Occupational Health and Safety OfficerOccupational Health and Safety Officer
Occupational Health and Safety Officer
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
pln9 presentation mall
pln9 presentation mallpln9 presentation mall
pln9 presentation mall
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to Security
 
Security training manual
Security training manualSecurity training manual
Security training manual
 
Overall Security Services
Overall Security ServicesOverall Security Services
Overall Security Services
 
Terrasol security training f
Terrasol security training fTerrasol security training f
Terrasol security training f
 
Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Training
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Law Enforcement Administration II

  • 1.  
  • 2. Obviously it has been in existence since the primitive ages. This is when man had to protect himself against wild animals and the harsh environment. At first security needs were simple, but as civilization complex, so did man’s security requirements. Through out the ages men started practicing the utilization of workers and equipment in order to protect his well being and property. Thus, the civilized man adopts security measures to have adequate protection against unsecured and unsafe conditions. This probably led to the establishment of the “POLICE”, an institution today responsible for law and order as well as public safety.
  • 3. “ POLICE” Originated from the Greek word “ POLITEIA” Meaning government of a city
  • 4.
  • 5. FUNDAMENTAL THEORIES OF PATROL THEORY OF POLICE OMNIPRESENCE – high police visibility discourages criminals. Normally, criminals think twice before executing their plans if there is obvious presence of police officers. Thus, patrol activity should be carried in a manner that attracts maximum attention to the police officer or police vehicles. This theory applies the principle of overt operation or high police visibility. LOW PROFILE THEORY– low police visibility increases the opportunity to apprehend criminals. Deceptive absence of the police officer will let criminals believe that they will not be detected or caught if they execute crimes that they planned. In this theory, the objective is to attract as little attention as possible while on the process of patrolling. The officers should operate in a manner that it would be difficult for either criminals or the public to determine that police are around. The principle of covert operation is integrated in this theory.
  • 6. There is an incredible growth of the security industry nowadays. Most companies are using guard forces, protective barriers, communication and electronic hardware and other state-of-the art protection methods and techniques in their asset protection. However, every company or installation cannot yet escape the emerging complicated security problems like the deteriorating peace and tranquility, the treat of terrorism and the social conditions of the community. A determine intruder can sneak in the properties of another while the owner is asleep out on a trip or anytime of the day and divest all valuable items which he can find. The incidents of fire and other disaster should also be considered in the asset protection. Hence, a basic understanding on the concept and methods of security is the primordial concern of everybody.
  • 7. Security is a state or conditions of being secured; there is a freedom from fear, harm, danger, loss, destruction or damages. Basically, it was the action of man against man that led to many unsecured and unsafe conditions. Reasons could be economic, revenge, or just plain greed and avarice. Whatever the motives, the civilized man needs adequate protection.
  • 8. Since security in general is very hard to comprehend, it can be divided into three major areas: 1. PHYSICAL SECURITY – this concern with the physical measures adopted to prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage, loss and theft. 2. PERSONAL SECURITY – it starts even before the hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is to insure that the firm hires those best suited to assist the firm in achieving its goals and objectives and once hired assist in providing necessary to the work force while carrying out their functions. 3. DOCUMENT AND INFORMATION SECURITY – this involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure. Classified documents need special handling. Lack of indoctrination and orientation among the personal handling them can result in the leakage, loss, theft and unauthorized disclosure of the documents.
  • 9. PROTECTIVE SECURITY can be defined as those measures taken by an installation or unit to protect itself against sabotage, espionage or subversion and at the same time provide freedom of action in order to provide the installation of the unit with the necessary flexibility to accomplish its mission. The aspects of protective security can be seen with the application of the following: – INDUSTRIAL SECURITY – HOTEL SECURITY – BANK SECURITY – VIP SECURITY – SCHOOL SECURITY – SUPERMARKET or MALL SECURITY – OTHER TYPES
  • 10. INDUSTRIAL SECURITY A type of security applied to business groups engaged in industries like manufacturing, assembling, research and development, processing, warehousing and even agriculture. It may also mean the business of providing security. HOTEL SECURITY A type of security applied to hotels where its properties are protected from pilferage, loss, damage, and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This type of security employs house detectives, uniforms guard and supervisor and insures that hotel guests and their personal effects are safeguarded.
  • 11. BANK SECURITY This type of security is concern with bank operations. Its main objective is the protection of bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank and assets while in storage, in transit and during transactions. VIP SECURITY A type of security applied for the protection of top-ranking officials of the government or private entity, visiting persons of illustrious standing and foreign dignitaries.
  • 12. SCHOOL SECURITY A type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students. SUPERMARKET SECURITY A type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel and customers. Security personnel are trained to detect “shoplifter”, robbery, and bomb detection and customer relation.
  • 13. OTHER TYPES This include all other security matters not covered in the 6 enumeration like; – FIESTA – BIRTHDAYS – PARTY – PARADE – CONCERT – RALLY – COURT HEARING – INAUGURATION OF PRESIDENT
  • 14. PHYSICAL SECURITY measures are being used to define, protect, and monitor property rights and assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and theft. PHYSICAL SECURITY may be also defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies, programs, personnel, property, utilities, information, facilities and installation against compromise, trespass, sabotage, pilferage, embezzlement, fraud or other dishonest criminal act.
  • 15.
  • 16. TYPES OF BARRIERS – NATURAL BARRIERS – STRUCTURAL BARRIERS – HUMAN BARRIERS – ANIMAL BARRIERS – ENERGY BARRIERS
  • 17. NATURAL BARRIERS It includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse.
  • 18. STRUCTURAL BARRIERS These are features constructed by man regardless of their original intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
  • 19. HUMAN BARRIERS Persons being used in providing a guarding system or by the nature of their employment and locations, fulfill security functions.
  • 20. ANIMAL BARRIERS Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to serve as guard dogs.
  • 21. ENERGY BARRIERS It is the employment of mechanical, electrical, electric energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. These are protective lighting, alarm system and any electronic devices used as barriers.
  • 22.