SlideShare a Scribd company logo
1 of 25
1
2:5Searching
2
Rights to search
Security officers, as private members
of the public, have no legal or statutory
right to search any person, vehicle or
building without permission.
Under no
circumstances can they
forcibly search
someone.
NEXT
3
Searching with permission
It is most important, therefore, that security officers actually
obtain permission from a person they wish to search
(beforehand.)
KEY POINT
Searching someone without the necessary consent
could result in ……
NEXT
4
Searching without permission
Criminal proceedings for assault being taken against the
security officer
Civil action (compensation) being taken out against
the security officer and/or the security company
A criminal case against a person committing
a crime failing, because the search that
found the evidence was illegal as
consent was not obtained.
NEXT
5
Types of search
Searches security officers use will be dependent on the type of
site, the people on it, the property involved and the client’s
policies on searching staff and visitors.
What you are required to do will be specified in the site’s A.I.s.
Subject to your site’s search policy, you may be required
to search:
People (and/or their bags)
Vehicles
Property.
NEXT
6
Searching people
People may need to be searched before entering a site as a
condition of entry, or before leaving it.
They might require searching to stop them from
bringing any on to the site:
Weapons
Drugs
Suspect packages
Other unauthorised items
They may also need searching before they leave, to ensure that
they are not accidentally or deliberately taking away any of the
client’s property with them.
NEXT
7
Types of search
When and how often to search
Searches may be:
GENERAL
RANDOM
SPECIFIC
NEXT
8
Employees and search clauses
Specific clauses in employees’ contracts of employment
requiring them to consent to a search at any time
Intended to reduce incidents of theft by employees
Employees refusing a reasonable search request would breach
their contract and become liable to disciplinary proceedings
or even dismissal
Information about such clauses will be found in the
site’s A.I.s.
Security officers still cannot search any person against
their will.
NEXT
9
Search refusals
Accurate details of and reasons for anyone
refusing to be searched should be recorded
in the search register.
The refusal should be reported to the site
management, in line with the guidance given
in the A.I.s.
NEXT
10
Searching visitors
Permission must always be obtained before the search
Security officers may also be required to search staff, visitors
or customers to a site prior to allowing them entry.
Anyone refusing to be searched should be either refused
entry or the matter should be reported to the person they
are trying to visit
If a site has a ‘point of entry’ search policy, this should
be clearly displayed at the entrance to explain the
requirements to potential visitors.
NEXT
11
Search refusals
The police attending may then decide to search the area for the
person and exercise their own powers of search in the street to
find out whether they are in possession of such items.
If you have reason to suspect that a person leaving a site is
in possession of either stolen property or an offensive
weapon, then you should:
Note the person's description
Watch to see which direction they make off in
Report the matter to the police.
NEXT
12
Searching people and their property
● Should be conducted in a friendly, routine way to reduce any
feelings of embarrassment that the person might feel
● Must not be seen as an act of discrimination
or a particular security officer
being obstructive
● Should be carried out in a
polite and courteous manner
● Talk to people as you search them, to
help make them feel at ease
● Conduct searches as quickly and
as efficiently as possible
● Thank them for their assistance afterwards.
NEXT
13
Searching safely
Same-sex searching
Self-searching
Use another security officer
to act as a witness
Be aware of drugs and weapons
Use PPE (gloves, vests, metal
detectors etc.)
Designated search areas.
NEXT
14
Searching safely
Before you physically touch another person you
should ask them:
● Whether they have anything that they
should not have;
● Whether they have anything which could injure
either themselves or you;
● Whether they have any knives, needles or other
sharps in their possession.
NEXT
15
Searching safely
If a person indicates that they have an illegal, stolen or
unauthorised item in their possession:
Do not let them put their hands in their pocket to get it for you
Obtain the assistance of another security officer
Ask the person to keep their hands where you can see them
Ask them to tell you exactly where the item is
Retrieve the item carefully if you can
Retrieve the item and safely place it out of their reach.
NEXT
16
Searching safely
● Look out for obvious dangers
● Search systematically
● Use the same system
every time
● Start at the front at the top and
work your way downwards
● Then move position behind
the subject to repeat
the process.
Body searches:
NEXT
17
Searching vehicles
● Is the vehicle parked properly (handbrake on, etc.)?
● Is it parked in a safe area for searching (other traffic)?
● Is there sufficient lighting?
● Is the engine turned off?
● Are the driver and all passengers out of the vehicle?
● Can you still see the driver?
● Can the driver observe you searching?
● Do you have access to the whole vehicle?
● Do you need any extra equipment?
When searching vehicles, the following also need to
be considered:
NEXT
18
Searching rooms or buildings
● Suspicious or missing people
● Criminal activity
● Suspect vehicles
● Suspect packages
● Signs of intrusion
● Stolen, missing or damaged property.
Outside areas, buildings or individual rooms may need
to be searched
KEY POINT
Security officers may be required to search for:
NEXT
19
Searching rooms or buildings
Security officers must ensure that they have sufficient support
from colleagues to be able to conduct the search:
They also need to ensure that they have any necessary
equipment with them to assist in the search, and that they have
a suitable method of calling for assistance if necessary.
Efficiently
Effectively
Safely
NEXT
20
Search documentation
Proper search records help to:
● Ensure and show that search policies are being
complied with;
● Protect security staff against malicious
allegations; and
● Act as evidence in criminal/disciplinary proceedings.
NEXT
21
Search documentation
Most sites or companies will provide security staff with a
formal search register or book to record details of
searches conducted on the site.
Some sites require search details to be recorded in an
incident report
Search records are to be completed by the security
officer(s) conducting the search.
NEXT
22
Search documentation
● Day, date and time(s) of search
● Location of search
● Details of person searched
● Details of vehicle/driver searched
● Details of searching officer (and any witnesses)
● Reason for search
● Details of search refusal
● Details of anything found during search
● Any action taken
● Signature(s).
Search records should contain details such as:
NEXT
23
Dealing with property found
Any stolen, illegal, suspect or
unauthorised items found must be dealt
with correctly, following the site’s A.I.s.
Dealing with property found during a search
The control room or a supervisor should also be informed.
KEY POINT
NEXT
24
Possible actions
Possible actions, depending on what is found and under
what circumstances, may include:
● Verbal warning given by security officer
● Report to your control room for advice
● Report to senior management for advice
● Seizure of item and report to senior management
● Seizure, arrest and call police
● Refuse entry and report.
ALWAYS follow the procedures specified
in the site’s A.I.s.
NEXT
25
Additional considerations
Particular care should be taken with:
All members of staff and the public need to be treated
with respect and consideration during a search
People with physical or learning difficulties
Children and young people
Other peoples’ cultural and religious beliefs and
values, which may be slightly different
to your own.
NEXT

More Related Content

What's hot

Emergency Response Training
Emergency Response TrainingEmergency Response Training
Emergency Response Trainingedebey
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptFaheem Ul Hasan
 
Security guard roles and responsibilities
Security guard roles and responsibilitiesSecurity guard roles and responsibilities
Security guard roles and responsibilitiesLavanya Priya
 
Gsk training general 2017
Gsk training general   2017Gsk training general   2017
Gsk training general 2017brijesh singh
 
Security training manual
Security training manualSecurity training manual
Security training manualANILDEVADKAR
 
By. Chila G. Lipata EMT, So2 -BOMB THREAT.pptx
By. Chila G. Lipata EMT, So2 -BOMB THREAT.pptxBy. Chila G. Lipata EMT, So2 -BOMB THREAT.pptx
By. Chila G. Lipata EMT, So2 -BOMB THREAT.pptxChila Lipata
 
Bomb Threat Its Detection & Prevention
Bomb Threat Its Detection & PreventionBomb Threat Its Detection & Prevention
Bomb Threat Its Detection & PreventionSunjib Anwar
 
Security Presentation
Security PresentationSecurity Presentation
Security PresentationGerhard Peens
 
What makes a good security guard?
What makes a good security guard?What makes a good security guard?
What makes a good security guard?Perk Security Ltd
 
Safety & Security (Comprehensive) PowerPoint Presentation 71 slides with 0 ...
Safety & Security  (Comprehensive) PowerPoint Presentation  71 slides with 0 ...Safety & Security  (Comprehensive) PowerPoint Presentation  71 slides with 0 ...
Safety & Security (Comprehensive) PowerPoint Presentation 71 slides with 0 ...Andrew Schwartz
 
New Employee Safety Orientation
New Employee Safety OrientationNew Employee Safety Orientation
New Employee Safety OrientationBeamer
 

What's hot (20)

Emergency Response Training
Emergency Response TrainingEmergency Response Training
Emergency Response Training
 
PATROLLING
PATROLLINGPATROLLING
PATROLLING
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.Ppt
 
Unit3
Unit3Unit3
Unit3
 
Security guard roles and responsibilities
Security guard roles and responsibilitiesSecurity guard roles and responsibilities
Security guard roles and responsibilities
 
SOP of Security supervisor
SOP of Security supervisorSOP of Security supervisor
SOP of Security supervisor
 
Gsk training general 2017
Gsk training general   2017Gsk training general   2017
Gsk training general 2017
 
Safety And Security Tips
Safety And Security TipsSafety And Security Tips
Safety And Security Tips
 
Security training manual
Security training manualSecurity training manual
Security training manual
 
By. Chila G. Lipata EMT, So2 -BOMB THREAT.pptx
By. Chila G. Lipata EMT, So2 -BOMB THREAT.pptxBy. Chila G. Lipata EMT, So2 -BOMB THREAT.pptx
By. Chila G. Lipata EMT, So2 -BOMB THREAT.pptx
 
Bomb Threat Its Detection & Prevention
Bomb Threat Its Detection & PreventionBomb Threat Its Detection & Prevention
Bomb Threat Its Detection & Prevention
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
2.1 security officers
2.1 security officers2.1 security officers
2.1 security officers
 
What makes a good security guard?
What makes a good security guard?What makes a good security guard?
What makes a good security guard?
 
Safety & Security (Comprehensive) PowerPoint Presentation 71 slides with 0 ...
Safety & Security  (Comprehensive) PowerPoint Presentation  71 slides with 0 ...Safety & Security  (Comprehensive) PowerPoint Presentation  71 slides with 0 ...
Safety & Security (Comprehensive) PowerPoint Presentation 71 slides with 0 ...
 
Security_Guard
Security_GuardSecurity_Guard
Security_Guard
 
2.3 security officers
2.3 security officers2.3 security officers
2.3 security officers
 
New Employee Safety Orientation
New Employee Safety OrientationNew Employee Safety Orientation
New Employee Safety Orientation
 
Close protection
Close protectionClose protection
Close protection
 
Security training for sis
Security training for sisSecurity training for sis
Security training for sis
 

Similar to 2.5 security officers

Vehicle Search 101
Vehicle Search 101Vehicle Search 101
Vehicle Search 101Ben Davila
 
Unit 4 Project
Unit 4 ProjectUnit 4 Project
Unit 4 Projectlilmxdkid
 
Fourth amendment
Fourth amendmentFourth amendment
Fourth amendmentbayotr
 
Know The Law: What Should You Do If Your Car Is Stopped By The Police?
Know The Law: What Should You Do If Your Car Is Stopped By The Police?Know The Law: What Should You Do If Your Car Is Stopped By The Police?
Know The Law: What Should You Do If Your Car Is Stopped By The Police?Jason Nathu
 
Survey,search and seizure provisions ppt by sh r k gupta ccit mumbai
Survey,search and seizure provisions ppt by sh r k gupta ccit mumbaiSurvey,search and seizure provisions ppt by sh r k gupta ccit mumbai
Survey,search and seizure provisions ppt by sh r k gupta ccit mumbaiPSPCL
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection pointDan Michaluk
 
Search warrants
Search warrantsSearch warrants
Search warrantsvendelajar
 
Sergeant Stefan Fish's Personal Safety Presentation
Sergeant Stefan Fish's Personal Safety PresentationSergeant Stefan Fish's Personal Safety Presentation
Sergeant Stefan Fish's Personal Safety Presentationbartt
 
IntroductionThis presentation guide will.docx
IntroductionThis presentation guide will.docxIntroductionThis presentation guide will.docx
IntroductionThis presentation guide will.docxnormanibarber20063
 
Legal Shield ID Theft via Kroll
Legal Shield ID Theft via KrollLegal Shield ID Theft via Kroll
Legal Shield ID Theft via KrollBarbie Deen
 
Lesson12 Search and Search Warrants.pptx
Lesson12  Search and Search Warrants.pptxLesson12  Search and Search Warrants.pptx
Lesson12 Search and Search Warrants.pptxadnis1
 
Constitutional rights of an arrested person
Constitutional rights of an arrested personConstitutional rights of an arrested person
Constitutional rights of an arrested personvendelajar
 
Chapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptxChapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptxKettyM1
 
Vol 1_Issue 3_Version 2
Vol 1_Issue 3_Version 2Vol 1_Issue 3_Version 2
Vol 1_Issue 3_Version 2Casey Coleman
 
Examples Of Probable Cause
Examples Of Probable CauseExamples Of Probable Cause
Examples Of Probable CauseDiane Allen
 

Similar to 2.5 security officers (20)

Vehicle Search 101
Vehicle Search 101Vehicle Search 101
Vehicle Search 101
 
Unit 4 Project
Unit 4 ProjectUnit 4 Project
Unit 4 Project
 
Fourth amendment
Fourth amendmentFourth amendment
Fourth amendment
 
Investigation & report writing
Investigation & report writingInvestigation & report writing
Investigation & report writing
 
Know The Law: What Should You Do If Your Car Is Stopped By The Police?
Know The Law: What Should You Do If Your Car Is Stopped By The Police?Know The Law: What Should You Do If Your Car Is Stopped By The Police?
Know The Law: What Should You Do If Your Car Is Stopped By The Police?
 
2.4 security officers
2.4 security officers2.4 security officers
2.4 security officers
 
Flexing your rights
Flexing your rightsFlexing your rights
Flexing your rights
 
Survey,search and seizure provisions ppt by sh r k gupta ccit mumbai
Survey,search and seizure provisions ppt by sh r k gupta ccit mumbaiSurvey,search and seizure provisions ppt by sh r k gupta ccit mumbai
Survey,search and seizure provisions ppt by sh r k gupta ccit mumbai
 
Unit 8
Unit 8Unit 8
Unit 8
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
Search warrants
Search warrantsSearch warrants
Search warrants
 
Sergeant Stefan Fish's Personal Safety Presentation
Sergeant Stefan Fish's Personal Safety PresentationSergeant Stefan Fish's Personal Safety Presentation
Sergeant Stefan Fish's Personal Safety Presentation
 
IntroductionThis presentation guide will.docx
IntroductionThis presentation guide will.docxIntroductionThis presentation guide will.docx
IntroductionThis presentation guide will.docx
 
Legal Shield ID Theft via Kroll
Legal Shield ID Theft via KrollLegal Shield ID Theft via Kroll
Legal Shield ID Theft via Kroll
 
Workplace Investigations Presentation
Workplace Investigations PresentationWorkplace Investigations Presentation
Workplace Investigations Presentation
 
Lesson12 Search and Search Warrants.pptx
Lesson12  Search and Search Warrants.pptxLesson12  Search and Search Warrants.pptx
Lesson12 Search and Search Warrants.pptx
 
Constitutional rights of an arrested person
Constitutional rights of an arrested personConstitutional rights of an arrested person
Constitutional rights of an arrested person
 
Chapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptxChapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptx
 
Vol 1_Issue 3_Version 2
Vol 1_Issue 3_Version 2Vol 1_Issue 3_Version 2
Vol 1_Issue 3_Version 2
 
Examples Of Probable Cause
Examples Of Probable CauseExamples Of Probable Cause
Examples Of Probable Cause
 

More from Highland Training Group Ltd

More from Highland Training Group Ltd (20)

2.7 security officers
2.7 security officers2.7 security officers
2.7 security officers
 
2.6 security officers
2.6 security officers2.6 security officers
2.6 security officers
 
2.2 security officers
2.2 security officers2.2 security officers
2.2 security officers
 
2.7 security officers test
2.7 security officers test2.7 security officers test
2.7 security officers test
 
2.6 security officers test
2.6 security officers test2.6 security officers test
2.6 security officers test
 
2.5 security officers test
2.5 security officers test2.5 security officers test
2.5 security officers test
 
2.4 security officers test
2.4 security officers test2.4 security officers test
2.4 security officers test
 
2.1 security officers test
2.1 security officers test2.1 security officers test
2.1 security officers test
 
Recognising, assessing and reducing risks test
Recognising, assessing and reducing risks testRecognising, assessing and reducing risks test
Recognising, assessing and reducing risks test
 
The principles of conflict management test
The principles of conflict management testThe principles of conflict management test
The principles of conflict management test
 
The principles of conflict management
The principles of conflict managementThe principles of conflict management
The principles of conflict management
 
Recognising, assessing and reducing risks
Recognising, assessing and reducing risksRecognising, assessing and reducing risks
Recognising, assessing and reducing risks
 
Working in the private security industry test
Working in the private security industry testWorking in the private security industry test
Working in the private security industry test
 
Legislation test
Legislation testLegislation test
Legislation test
 
Health and safety test
Health and safety testHealth and safety test
Health and safety test
 
Fire procedures test
Fire procedures testFire procedures test
Fire procedures test
 
Emergencies test
Emergencies testEmergencies test
Emergencies test
 
Communication skills and customer service test
Communication skills and customer service testCommunication skills and customer service test
Communication skills and customer service test
 
working within the private security industry
working within the private security industryworking within the private security industry
working within the private security industry
 
Physical Intervention refresher
Physical Intervention refresherPhysical Intervention refresher
Physical Intervention refresher
 

Recently uploaded

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

2.5 security officers

  • 2. 2 Rights to search Security officers, as private members of the public, have no legal or statutory right to search any person, vehicle or building without permission. Under no circumstances can they forcibly search someone. NEXT
  • 3. 3 Searching with permission It is most important, therefore, that security officers actually obtain permission from a person they wish to search (beforehand.) KEY POINT Searching someone without the necessary consent could result in …… NEXT
  • 4. 4 Searching without permission Criminal proceedings for assault being taken against the security officer Civil action (compensation) being taken out against the security officer and/or the security company A criminal case against a person committing a crime failing, because the search that found the evidence was illegal as consent was not obtained. NEXT
  • 5. 5 Types of search Searches security officers use will be dependent on the type of site, the people on it, the property involved and the client’s policies on searching staff and visitors. What you are required to do will be specified in the site’s A.I.s. Subject to your site’s search policy, you may be required to search: People (and/or their bags) Vehicles Property. NEXT
  • 6. 6 Searching people People may need to be searched before entering a site as a condition of entry, or before leaving it. They might require searching to stop them from bringing any on to the site: Weapons Drugs Suspect packages Other unauthorised items They may also need searching before they leave, to ensure that they are not accidentally or deliberately taking away any of the client’s property with them. NEXT
  • 7. 7 Types of search When and how often to search Searches may be: GENERAL RANDOM SPECIFIC NEXT
  • 8. 8 Employees and search clauses Specific clauses in employees’ contracts of employment requiring them to consent to a search at any time Intended to reduce incidents of theft by employees Employees refusing a reasonable search request would breach their contract and become liable to disciplinary proceedings or even dismissal Information about such clauses will be found in the site’s A.I.s. Security officers still cannot search any person against their will. NEXT
  • 9. 9 Search refusals Accurate details of and reasons for anyone refusing to be searched should be recorded in the search register. The refusal should be reported to the site management, in line with the guidance given in the A.I.s. NEXT
  • 10. 10 Searching visitors Permission must always be obtained before the search Security officers may also be required to search staff, visitors or customers to a site prior to allowing them entry. Anyone refusing to be searched should be either refused entry or the matter should be reported to the person they are trying to visit If a site has a ‘point of entry’ search policy, this should be clearly displayed at the entrance to explain the requirements to potential visitors. NEXT
  • 11. 11 Search refusals The police attending may then decide to search the area for the person and exercise their own powers of search in the street to find out whether they are in possession of such items. If you have reason to suspect that a person leaving a site is in possession of either stolen property or an offensive weapon, then you should: Note the person's description Watch to see which direction they make off in Report the matter to the police. NEXT
  • 12. 12 Searching people and their property ● Should be conducted in a friendly, routine way to reduce any feelings of embarrassment that the person might feel ● Must not be seen as an act of discrimination or a particular security officer being obstructive ● Should be carried out in a polite and courteous manner ● Talk to people as you search them, to help make them feel at ease ● Conduct searches as quickly and as efficiently as possible ● Thank them for their assistance afterwards. NEXT
  • 13. 13 Searching safely Same-sex searching Self-searching Use another security officer to act as a witness Be aware of drugs and weapons Use PPE (gloves, vests, metal detectors etc.) Designated search areas. NEXT
  • 14. 14 Searching safely Before you physically touch another person you should ask them: ● Whether they have anything that they should not have; ● Whether they have anything which could injure either themselves or you; ● Whether they have any knives, needles or other sharps in their possession. NEXT
  • 15. 15 Searching safely If a person indicates that they have an illegal, stolen or unauthorised item in their possession: Do not let them put their hands in their pocket to get it for you Obtain the assistance of another security officer Ask the person to keep their hands where you can see them Ask them to tell you exactly where the item is Retrieve the item carefully if you can Retrieve the item and safely place it out of their reach. NEXT
  • 16. 16 Searching safely ● Look out for obvious dangers ● Search systematically ● Use the same system every time ● Start at the front at the top and work your way downwards ● Then move position behind the subject to repeat the process. Body searches: NEXT
  • 17. 17 Searching vehicles ● Is the vehicle parked properly (handbrake on, etc.)? ● Is it parked in a safe area for searching (other traffic)? ● Is there sufficient lighting? ● Is the engine turned off? ● Are the driver and all passengers out of the vehicle? ● Can you still see the driver? ● Can the driver observe you searching? ● Do you have access to the whole vehicle? ● Do you need any extra equipment? When searching vehicles, the following also need to be considered: NEXT
  • 18. 18 Searching rooms or buildings ● Suspicious or missing people ● Criminal activity ● Suspect vehicles ● Suspect packages ● Signs of intrusion ● Stolen, missing or damaged property. Outside areas, buildings or individual rooms may need to be searched KEY POINT Security officers may be required to search for: NEXT
  • 19. 19 Searching rooms or buildings Security officers must ensure that they have sufficient support from colleagues to be able to conduct the search: They also need to ensure that they have any necessary equipment with them to assist in the search, and that they have a suitable method of calling for assistance if necessary. Efficiently Effectively Safely NEXT
  • 20. 20 Search documentation Proper search records help to: ● Ensure and show that search policies are being complied with; ● Protect security staff against malicious allegations; and ● Act as evidence in criminal/disciplinary proceedings. NEXT
  • 21. 21 Search documentation Most sites or companies will provide security staff with a formal search register or book to record details of searches conducted on the site. Some sites require search details to be recorded in an incident report Search records are to be completed by the security officer(s) conducting the search. NEXT
  • 22. 22 Search documentation ● Day, date and time(s) of search ● Location of search ● Details of person searched ● Details of vehicle/driver searched ● Details of searching officer (and any witnesses) ● Reason for search ● Details of search refusal ● Details of anything found during search ● Any action taken ● Signature(s). Search records should contain details such as: NEXT
  • 23. 23 Dealing with property found Any stolen, illegal, suspect or unauthorised items found must be dealt with correctly, following the site’s A.I.s. Dealing with property found during a search The control room or a supervisor should also be informed. KEY POINT NEXT
  • 24. 24 Possible actions Possible actions, depending on what is found and under what circumstances, may include: ● Verbal warning given by security officer ● Report to your control room for advice ● Report to senior management for advice ● Seizure of item and report to senior management ● Seizure, arrest and call police ● Refuse entry and report. ALWAYS follow the procedures specified in the site’s A.I.s. NEXT
  • 25. 25 Additional considerations Particular care should be taken with: All members of staff and the public need to be treated with respect and consideration during a search People with physical or learning difficulties Children and young people Other peoples’ cultural and religious beliefs and values, which may be slightly different to your own. NEXT

Editor's Notes

  1. Title slide.
  2. SEARCHING Rights to search Security officers, as private members of the public, have no legal or statutory right to search any person, vehicle or building without permission. Under no circumstances can they forcibly search anyone.
  3. It is most important, therefore, that security officers actually obtain permission from a person they wish to search (beforehand.) Searching someone without the necessary consent could result in: (next 3 slides)
  4. Criminal proceedings for assault being taken against the security officer; Civil action (compensation) being taken out against the security officer and/or the security company; and/or A criminal case against a person committing a crime failing, because the search that found the evidence was illegal as consent was not obtained.
  5. Types of search The types of searches security officers use will be dependent on the type of site, the people on it, the property involved and the client’s policies on searching staff and visitors. What security officers are required to do will be specified in the site’s A.I.s. You must follow these guidelines at all times.   Subject to your site’s search policy you may be required, for example, to search: People (and/or their bags); Vehicles; and/or Property (rooms or buildings).
  6. Searching people People may need to be searched before entering a site as a condition of entry, or before leaving it. They might require searching to stop them from bringing any weapons, drugs, suspect packages or other unauthorised items on to the site, or they may need searching before they leave to ensure that they are not accidentally or deliberately taking away any of the client’s property with them.
  7. When and how often to search Some sites will have a policy where every visitor is searched prior to entry (GENERAL), whereas others only search odd visitors now and again (RANDOM). This acts as a good deterrent. Some sites only search visitors or staff who they believe for some reason may be in possession of unauthorised items (SPECIFIC).   Searches may be ………. GENERAL ………. RANDOM ………SPECIFIC  
  8. Employees and search clauses Some client companies have specific clauses in their employees’ contracts of employment requiring them to consent to a search at any time when requested to do so by a member of either the security team or the senior management. Such clauses are intended to reduce incidents of employees stealing goods or property from the client. These clauses usually explain that employees refusing a reasonable search request would be in breach of their contract of employment, and therefore liable to disciplinary proceedings or even dismissal. Information about such clauses, as well as details on whom, how often and how security officers are required to search employees will be found in the site’s A.I.s. Even where such clauses are in operation on a site, security officers must still seek permission before a search can be carried out. They still cannot search any person against their will.
  9. Search refusals Accurate details of and reasons for anyone refusing to be searched should be recorded in the search register, and the refusal should be reported to the site management, in line with the guidance given in the A.I.s.
  10. Searching other visitors Security officers may also be required to search staff, visitors or customers to a site prior to allowing them entry. Again, permission must be obtained before a search can take place. Anyone refusing to be searched should be either refused entry or the matter should be reported to the person they are trying to visit. If a site has a ‘point of entry’ search policy, this should be clearly displayed at the entrance to explain the requirements to potential visitors.
  11. Security officers have no other specific powers to deal with people who refuse to be searched. If, however, you have reason to suspect that a person leaving a site (or someone having been refused entry for refusing to be searched) is in possession of either stolen property or an offensive weapon, then you should note the person's description, watch to see which direction they make off in, and report the matter to the police. The police officer(s) attending may then decide to search the area for the person and exercise their own powers of search in the street to find out whether they are in possession of such items.
  12. Searching people and their property Searches should be conducted in a friendly, routine way so as to reduce any feelings of embarrassment that the person might feel, and must not be seen as an act of discrimination or by way of a particular security officer being obstructive. All searches should be carried out in a polite and courteous manner. Some people may feel intimidated or worried when being searched, whilst others may be used to it. You should talk to people as you search them, to help make them feel at ease. You should try to carry out the search as quickly and as efficiently as possible, thanking them for their assistance afterwards.
  13. Searching safely For your own safety you should only search someone of the same sex as yourself. This is to prevent any malicious allegations being made that you have indecently assaulted the person whilst effecting a search. There is nothing wrong with a male security officer asking a female to empty the contents of her handbag and pockets on to a table so that her property can be checked, (often called self-searching) but he should not 'pat her down' or otherwise touch her to detect unauthorised items. Many sites that carry out regular searches now employ security officers of both sexes for this very reason.   Also, to prevent any false allegations of theft being made against you, you should always try to have another security officer or member of staff present during a search, to act as a witness. Also another officer is always an advantage in case of violence. Special care should also be taken when searching people who may be in possession of drugs. The possibility of infection from dirty needles is obvious. You can now buy needle-resistant as well as rubber gloves for searching purposes, which are ideal for these situations. Also, when the emphasis on the searching is for weapons, security officers may wish to use the slash-proof gloves as protection against knife injuries, or can use hand-held metal detectors that can indicate the presence of both knives and firearms. If it is feasible to do so have an empty table in a designated search area so that you can ask people to put the contents of their pockets and bags on to it for inspection prior to the outer clothing being searched.
  14. Before you physically touch another person you should ask them: Whether they have anything that they should not have; Whether they have anything which could injure either themselves or the security officer; and Whether they have any knives, needles or other sharps in their possession.
  15. If a person indicates that they have an illegal, stolen or unauthorised item in their possession then you must not let them put their hands in their pocket to get it for you. At this point it is advisable to obtain the assistance of another security officer if you are on your own, to act as a witness to your search and for safety reasons. You should then ask the person to keep their hands where you can see them, and to tell you exactly where the item is. Lightly pat or feel the area they have indicated so that you can ascertain where the item is and in which position. Only when you are sure that you can retrieve the item safely should you attempt to do so. As soon as you have taken the item from the person you should secure it away from them by either passing it to another security officer, or by safely placing it out of their reach so that they cannot get at it.
  16. If, on the other hand, the person says that they have no unauthorised items in their possession, then you can commence the search, still looking out for obvious dangers. Body searches need to be made in a thorough and systematic way in order that nothing is missed. You should devise your own method of searching, and should use the same system every time, so that you do not forget to search particular areas. A good way to search is to start at the front at the top and to work your way downwards, then moving position to behind the subject to repeat the process.
  17. Searching vehicles The same search rules apply with vehicles. Searches may be requested at the point of entry, on exit or may be a part of employee search clauses. Permission must still be sought prior to commencing the search of any vehicle driven by a member of staff or a visitor to the site. When searching vehicles, the following also need to be considered: Is the vehicle parked properly (handbrake, etc.)? Is it parked in a safe area for searching (other traffic)? Is there sufficient lighting? Is the engine turned off? Are the driver and all passengers out of the vehicle? Can you still see the driver? Can the driver observe you searching? Do you have access to the whole vehicle? Do you need any extra equipment?
  18. Searching rooms or buildings Outside areas, buildings or individual rooms may need to be searched. Security officers may be required to search for: Suspicious or missing people; Criminal activity; Suspect vehicles; Suspect packages; Signs of intrusion; and/or Stolen, missing or damaged property.
  19. Before conducting such an area search, security officers must ensure that they have sufficient support from colleagues to be able to conduct the search efficiently, effectively and safely. They also need to ensure that they have any necessary equipment with them to assist in the search, and that they have a suitable method of calling for assistance if necessary.
  20. Search documentation Sites that require the security team to search people, their property or vehicles must provide a suitable method of recording searches. Proper search records help to: Ensure and show that search policies are being complied with; Protect security staff against malicious allegations; or Act as evidence in criminal/disciplinary proceedings.
  21. Most sites or companies will provide security staff with a formal search register or book to record details of searches conducted on the site. Some sites require search details to be recorded in an incident report. Search records are to be completed by the security officer(s) conducting the search.
  22. Search records are to be completed by the security officer(s) conducting the search, and should contain details such as: Day, date and time(s) of search; Location of search; Details of person searched; Details of vehicle/driver searched; Details of searching officer (and any witnesses); Reason for search; Details of search refusal; Details of anything found during search; Any action taken; and Signature(s).
  23. Dealing with property found during a search Any stolen, illegal, suspect or unauthorised items found must be dealt with correctly, following the site’s A.I.s. The control room or a supervisor should also be informed.
  24. Possible actions, depending on what is found and under what circumstances, may include: Verbal warning given by security officer; Report to your control room for advice; Report to senior management for advice; Seizure of item and report to senior management; Seizure, arrest and call police; and Refuse entry and report.   ALWAYS follow the procedures specified in the site’s A.I.s.
  25. Additional considerations Although all members of staff and the public need to be treated with respect and consideration during a search, particular care should be taken when dealing with people with physical or learning difficulties, and with children and young people. When searching children and young people, two staff should be present during the search and children and young people should not be asked to remove clothing other than outer garments like coats. Security officers should also be aware of other peoples’ cultural and religious beliefs and values, which may be slightly different to their own.