SlideShare a Scribd company logo
1 of 15
Evidence Tracking
Evidence Tracking
Name
Class
Date
Professor
Evidence Tracking
Evidence is essential to solving any case and proving the
guilt of an offender in a court of law. Once a crime has been
reported the first step of the responding officer is to secure the
crime scene to ensure it is properly preserved until forensic
investigators can arrive on the scene. The evidence collection
process begins with thoroughly documenting the crime scene.
The process begins with a walk through of the crime scene in
order to identify potential evidence and to develop an idea of
what occurred at the crime scene. Once the evidence has been
identified the evidence collection process will begin with
collecting evidence that is fragile or easily damaged or
destroyed.
In the rape scenario DNA evidence is crucial to proving a
crime occurred and showing the guilt of the offender. Rape
cases are hard to prosecute and require physical evidence to
prove the act of rape even occurred. In a majority of cases it is
the word of the victim against the word of the perpetrator. DNA
evidence can provide conclusive evidence that a sexual assault
occurred and point to the guilty offender. In the rape scenario
evidence that was located and will need to be collected is the
semen on the comforter and the tissue located in the trash can.
This evidence can contain valuable DNA that points directly to
the offender. The semen and the tissue can contain the DNA
profile of the offender and the tissue.
The evidence collection process begins first by identifying
the evidence in a walk through and then properly documenting
the evidence. Documenting the evidence is an essential step in
the collection process. This begins with photographing the
evidence where it sits in order to show the court where the
evidence was located and in what condition. Once the evidence
has been photographed it must be collected using uniform
collection standards. The comforter that was located contained a
semen stain that must be collected in order to develop DNA on
the criminal suspect. Most items of evidence will be collected in
paper containers such as packets, envelopes, and bags and liquid
items can be transported in non-breakable, leak proof containers
(Schiro, 2006).
When collecting DNA from the comforter the forensic
technician will mark the wet stain with a permanent marker in
order to make it easier to locate during the DNA analysis. The
technician will then wait for the comforter to air dry before
placing it in a clean package and properly sealing and
documenting for transportation. The second piece of evidence
that was located at the crime scene was a tissue in a waste paper
basket. The tissue will need to be collected using a pair of
tweezers or using a pair of gloves and then be placed in a
plastic container. The plastic container will need to be sealed
and then properly documented for transportation.
Documentation does not include just sketching and
photographing the evidence located at the crime scene but also
includes detailing every step of the evidence collection process,
transportation, and steps taken in the analysis of the evidence at
the lab. Documenting includes ensuring the person that collect
the evidence labels the document with their name, date, time,
number, and the steps that were taken in the collection process.
When the evidence is transported these steps also need to be
documented. The person transporting the evidence needs to
document time and date evidence was transported and by whom.
Once the evidence reaches the lab for analysis each step in the
process must also be carefully documented.
Documenting every step in the evidence collection,
transportation, and analysis process is known as the chain of the
custody. The chain of custody is defined as the witnessed,
written record of all of the individuals who maintained
unbroken control over the items of evidence (Byrd, 2009). The
chain of custody shows the court where the evidence was
located and shows exactly what steps were taken to collect,
transport, and analysis the evidence. The chain of evidence
establishes proof for the court that shows who had contact with
evidence, circumstances surrounding the collection of evidence,
and any changes to the evidence.
Processing protocols are the uniform standards that must be
followed when collecting evidence or processing a crime scene.
These protocols as discussed previously include preserving the
evidence, conducting a walk through, sketching the scene,
photographing the scene, using standardized methods to collect
evidence, document the evidence, and lastly transport the
evidence to the forensic lab. The evidence located at the crime
scene must be collected using processing protocols to protect
the integrity of the evidence that is located.
Preserving DNA evidence is one of the most crucial steps
that will be taken by forensic personnel. It falls to the
responding police officers to quickly and properly secure a
crime scene to ensure that evidence is not lost, damaged, or
destroyed. DNA evidence can be extremely fragile and requires
the roper processing controls and the preservation of the
evidence. When processing DNA evidence, which has been
transported to the forensic lab, it is essential to run negative
controls and apply background controls through the entire
process (Riley, 2005). This will ensure any containment is
identified so the evidence does not be contaminated during the
analysis process.
The potential DNA evidence on the tissue would be
considered to be trace evidence because there is a possibility
that minute amounts of DNA may be present on the evidence.
Trace evidence is physical evidence fund in the smallest
amounts and includes skin cells, fibers, and hair. The physical
evidence located on the comforter is considered biological
evidence or body fluids and can contain valuable DNA evidence
that will point directly to a criminal suspect. DNA evidence can
be located on the comforter through the use of ultra violet lights
or chemicals.
Physical evidence is essential to the success of any criminal
case. While many cases are solved with circumstantial evidence,
physical evidence provides the court with more definitive
evidence of the criminal defendant’s guilt. In order to ensure
that physical evidence can be presented in court it must first be
properly collected following uniform standards and it must be
properly documented each step of the way. If evidence is not
collected using uniform standards or is not properly documented
there is no clear chain of custody. When the chain of custody
has been broken the evidence will no longer be eligible for the
court process.
If physical evidence is thrown out of court a guilty offender
could go free. The chain of custody ensures that the court is
aware of every step taken with the physical evidence and can
prove the evidence being presented in court is the evidence that
was located at the crime scene. The proof is established through
the chain of custody and ensures the physical evidence is
eligible for the court process. In order to prove the guilt of an
offender there must be evidence pointing to a criminal offender
that leaves no reasonable doubt in the minds of the jury. In the
case of the rape crime scene the evidence that is collected will
be crucial to identifying the suspect as well as proving their
guilt.
References
Byrd, M. (2009). Proper Tagging and Labeling of Evidence for
Later Identification. Retrieved
November 19, 2012 from http://www.crime-scene-
investigator.net/tagging.html
Riley, D. (2005). DNA Testing: An Introduction For Non-
Scientists An Illustrated Explanation.
Retrieved November 19, 2012 from
http://www.scientific.org/tutorials/articles/riley/riley.html
Schiro, G. (2006). Collection and Preservation of Evidence.
Retrieved November 19, 2012 from
http://www.crime-scene-investigator.net/evidenc3.html
Name
Class
Date
New Security Employee Guide
Evidence Acquisition and Management
Criminal and Civil Responsibility
Secure Evidence
Preserve Evidence
Document Evidence
When conducting a criminal investigation in the security setting
it requires the security personnel to understand and respect the
legal and ethical obligations. Security personnel have a legal
obligation to protect the rights of the citizen and an ethical
obligation not to violate the rights of the suspect (Beaty, 2011).
Just like in a criminal investigation with law enforcement,
security personnel must first secure the evidence so it can be
preserved and the evidence left where it is located so it can be
carefully document. Evidence need to be photographed where it
is located and if it is involved in a criminal investigation must
be left for the police to collect.
2
Evidence Acquisition and Management
Chain of Evidence
Protect integrity
Exclusionary Rule
Secure Custodian
One of the most important aspects in managing evidence is to
ensure the evidence is properly preserved to avoid becoming
damaged, lost or destroyed but also it is in the documentation of
the evidence. In order to protect the chain of evidence every
step of the evidence preservation and collection must be
carefully documented. When the evidence steps are not properly
documented the result is the evidence becomes vulnerable to
being excluded from the court process. Based on the
“exclusionary rule any evidence that is illegally collected or not
properly documented is vulnerable form being excluded from
the court process. Once evidence is collected and documented it
must be placed in the hands of s secure custodian. In criminal
cases law enforcement is the best custodian for the evidence.
3
Administrative and Personnel Investigations
Wrong Doing or Misconduct
Legal and Ethical Obligation
Everyday Work Situation
Not Criminal Investigation
In the administrative or personnel investigation the actions of
the employee are not criminal but against the policies of the
organization resulting in an investigation. The administrative
investigation involves an everyday work situation where the
employee has engaged in some type of wrongdoing or
misconduct. The goal is to develop factual information in order
to determine who is responsible and develop an effective course
of action (NPS, 2012). The investigator still has a legal and
ethical obligation to the employees under scrutiny and must act
in accordance with the law and policies and procedures of the
organization as well as keep in mind there ethical obligation.
4
Administrative and Personnel Investigations
Question Witnesses
Response Private and Confidential
Credible and Factual Information
What, When, Why, Where, Who
The administrative or personnel investigation is usually the
result of a complaint or an action that caused harm for the
organization. The administrative investigation involves
developing factual information through interviewing witnesses
and developing documentation. The administrative investigation
is similar to the criminal investigation in that the goals of the
investigation is to determine who is responsible, why they
committed the wrong doing, where it occurred, and when it
happened. The responses obtained by witnesses must be kept
private and confidential and only factual information developed
in order to make an informed decision on who is to blame as
well as to determine the type of response by the organization.
5
References
Beaty, A. (2011). Evidence Management. Retrieved November
25, 2012 from
http://www.cityofws.org/Home/Departments/Police/Articles/Evi
denceManagement
National Park Service. (2006). Conducting an Administrative
Investigation. Retrieved November 25, 2012 from
http://www.nps.gov/training/tel/Guides/Conducting_Admin_Inv
estigations
New Security
New Security Employee Guide
Name
Class
Date
Professor
New Security Employee Guide
Evidence Acquisition and Management
Security personnel are not under the same restrictions as
law enforcement when acquiring evidence but in order to ensure
the rights of the citizens are not violated when obtaining
evidence, in order to avoid criminal or civil responsibility,
security personnel will be expected to follow company
guidelines and procedures. The first policy for the security
employee is to collect evidence in a fashion which does not
compromise the nature of the evidence and use the proper
protective measures to ensure the evidence does not become
damaged, lost or destroyed. The chain of evidence must be
clearly documented to ensure in criminal cases the evidence can
be used in a court of law.
In any form of security evidence management is the process
for the proper collection, processing, maintenance, and
protection of evidence that is required in order to maintain the
integrity and credibility of the evidence (Beaty, 2011). Once
evidence is located it needs to be properly preserved by
securing the area where the evidence was located and then
reported to the police. Evidence that is not properly collected
can be damaged or destroyed making it impossible to use in
court and if not properly collected could be excluded by the
court process. In order to ensure that any evidence that is
located can be protected in order to be used against criminal
suspect’s security personnel must document the location of
evidence as well as time or date. Evidence should be
photographed and then secured for collection by law
enforcement.
Evidence that is collected for the use of security
investigations, not involving law enforcement, will require
security personnel to collect the evidence before warehousing it
with a secure custodian. The secure custodian will protect the
chain of evidence. Evidence that is acquired will be secured for
collection and disposed off if no longer needed or case is
successfully resolved. Any evidence gathered involving
criminal cases will be kept until collected by police or criminal
case is resolved. Evidence will be collected following the
formal standards of the organization and properly managed until
the time it is returned to owner or destroyed.
Administrative and Personnel Investigations
The security employee guide concerning administrative and
personnel investigations includes teaching employees about the
rights of criminal suspects and their legal responsibilities as
well as how to conduct an interview and the difference in the
interrogation. The administrative investigation is different from
the criminal investigation in that the administrative
investigation involves average workday situations that do not
involve criminal behavior. An investigation consists of any
deliberate effort to obtain or develop information in order to
identify facts or to determine an appropriate course of action
within the requirements established by law, regulations and
labor agreements (NPS, 2006). The purpose is to gather enough
evidence to make a informed decision on a course of action.
The investigator will gather facts, similar to a criminal
investigation, by interviewing other employees or stakeholders
that may have information concerning the work situation. The
goal is not to falsely accuse or develop an opinion but instead to
use facts to make a decision about the situation will be handled.
In these types of investigation the employee has engaged in
some type of wrongdoing or misconduct. For example the
employee may have failed to complete a task that resulted in the
loss of a client or has displayed a pattern of tardiness. A
criminal investigation would involve theft or other crimes such
as bribery. Because there is no crime the course of action will
involve punishment.
The administrative or personnel investigation is usually the
result of a complaint or an action that caused harm for the
organization. The investigator will question witnesses and keep
any responses private and confidential. The investigator should
focus only on the facts and ignore any rumor or speculation. All
information that is collected should be carefully documented
and the investigation should comply with the law and never
violate rights of the employee being investigated. Once credible
and factual data has been gathered a report should be written
that determines what, when, why, and where the alleged
incident happened s well as who was responsible. The report
should also include recommendations for punishment.
References
Beaty, A. (2011). Evidence Management. Retrieved November
25, 2012 from
http://www.cityofws.org/Home/Departments/Police/Articles/Evi
denceManagement
National Park Service. (2006). Conducting an Administrative
Investigation. Retrieved November
25, 2012 from
http://www.nps.gov/training/tel/Guides/Conducting_Admin_Inv
estigations
Evidence Tracking Guide for Security Personnel

More Related Content

Similar to Evidence Tracking Guide for Security Personnel

Crimescenebasics ppt
Crimescenebasics pptCrimescenebasics ppt
Crimescenebasics pptphebemoore
 
1crimescenebasics
1crimescenebasics1crimescenebasics
1crimescenebasicsMrs. Henley
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3Don Caeiro
 
Hall Elizabeth Unit Nine Ethic's Project
Hall Elizabeth Unit Nine Ethic's ProjectHall Elizabeth Unit Nine Ethic's Project
Hall Elizabeth Unit Nine Ethic's ProjectElizabeth Hall
 
Evidence collection & Preservation .pptx
Evidence collection & Preservation .pptxEvidence collection & Preservation .pptx
Evidence collection & Preservation .pptxkhushinidhaan
 
Crime Scene Basics PowerPoint
Crime Scene Basics PowerPointCrime Scene Basics PowerPoint
Crime Scene Basics PowerPointts0001718
 
Forensic science intro
Forensic science introForensic science intro
Forensic science introMaria Donohue
 
Evidence Collection Process
Evidence Collection ProcessEvidence Collection Process
Evidence Collection ProcessMichelle Singh
 
Criminalistics DB1NameClassDateProfessor.docx
Criminalistics DB1NameClassDateProfessor.docxCriminalistics DB1NameClassDateProfessor.docx
Criminalistics DB1NameClassDateProfessor.docxfaithxdunce63732
 
Examine Forensic Examine Forensic Testimo.docx
Examine Forensic      Examine Forensic Testimo.docxExamine Forensic      Examine Forensic Testimo.docx
Examine Forensic Examine Forensic Testimo.docxgitagrimston
 
Collecting Evidence Criminalistics IP2.docx
Collecting Evidence      Criminalistics IP2.docxCollecting Evidence      Criminalistics IP2.docx
Collecting Evidence Criminalistics IP2.docxmonicafrancis71118
 
crime scene.pptx
crime scene.pptxcrime scene.pptx
crime scene.pptxkiran yadav
 
002 crimescenebasics - final (2).pptx hh
002 crimescenebasics - final (2).pptx hh002 crimescenebasics - final (2).pptx hh
002 crimescenebasics - final (2).pptx hhnaveenhooda22nav
 
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxRunning head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxtoltonkendal
 
1) Evidence collection can be the single most crucial process in.docx
1) Evidence collection can be the single most crucial process in.docx1) Evidence collection can be the single most crucial process in.docx
1) Evidence collection can be the single most crucial process in.docxcroftsshanon
 
Investigating A Potential Data Breach On Corporation Techs
Investigating A Potential Data Breach On Corporation TechsInvestigating A Potential Data Breach On Corporation Techs
Investigating A Potential Data Breach On Corporation TechsKristen Stacey
 
Forensics ch 3 notes
Forensics ch 3 notesForensics ch 3 notes
Forensics ch 3 notesLeah Morgan
 

Similar to Evidence Tracking Guide for Security Personnel (19)

Crimescenebasics ppt
Crimescenebasics pptCrimescenebasics ppt
Crimescenebasics ppt
 
1crimescenebasics
1crimescenebasics1crimescenebasics
1crimescenebasics
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3
 
Hall Elizabeth Unit Nine Ethic's Project
Hall Elizabeth Unit Nine Ethic's ProjectHall Elizabeth Unit Nine Ethic's Project
Hall Elizabeth Unit Nine Ethic's Project
 
Evidence collection & Preservation .pptx
Evidence collection & Preservation .pptxEvidence collection & Preservation .pptx
Evidence collection & Preservation .pptx
 
Crime Scene Basics PowerPoint
Crime Scene Basics PowerPointCrime Scene Basics PowerPoint
Crime Scene Basics PowerPoint
 
Forensic science intro
Forensic science introForensic science intro
Forensic science intro
 
Evidence Collection Process
Evidence Collection ProcessEvidence Collection Process
Evidence Collection Process
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
Criminalistics DB1NameClassDateProfessor.docx
Criminalistics DB1NameClassDateProfessor.docxCriminalistics DB1NameClassDateProfessor.docx
Criminalistics DB1NameClassDateProfessor.docx
 
Examine Forensic Examine Forensic Testimo.docx
Examine Forensic      Examine Forensic Testimo.docxExamine Forensic      Examine Forensic Testimo.docx
Examine Forensic Examine Forensic Testimo.docx
 
Collecting Evidence Criminalistics IP2.docx
Collecting Evidence      Criminalistics IP2.docxCollecting Evidence      Criminalistics IP2.docx
Collecting Evidence Criminalistics IP2.docx
 
crime scene.pptx
crime scene.pptxcrime scene.pptx
crime scene.pptx
 
002 crimescenebasics - final (2).pptx hh
002 crimescenebasics - final (2).pptx hh002 crimescenebasics - final (2).pptx hh
002 crimescenebasics - final (2).pptx hh
 
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxRunning head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
 
1) Evidence collection can be the single most crucial process in.docx
1) Evidence collection can be the single most crucial process in.docx1) Evidence collection can be the single most crucial process in.docx
1) Evidence collection can be the single most crucial process in.docx
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
Investigating A Potential Data Breach On Corporation Techs
Investigating A Potential Data Breach On Corporation TechsInvestigating A Potential Data Breach On Corporation Techs
Investigating A Potential Data Breach On Corporation Techs
 
Forensics ch 3 notes
Forensics ch 3 notesForensics ch 3 notes
Forensics ch 3 notes
 

More from gitagrimston

External Factor Analysis Summary (EFAS Table)External Factors.docx
External Factor Analysis Summary (EFAS Table)External Factors.docxExternal Factor Analysis Summary (EFAS Table)External Factors.docx
External Factor Analysis Summary (EFAS Table)External Factors.docxgitagrimston
 
Exploring Online Consumer Behaviors.docx
Exploring Online Consumer Behaviors.docxExploring Online Consumer Behaviors.docx
Exploring Online Consumer Behaviors.docxgitagrimston
 
External and Internal Analysis 8Extern.docx
External and Internal Analysis 8Extern.docxExternal and Internal Analysis 8Extern.docx
External and Internal Analysis 8Extern.docxgitagrimston
 
Exploring Music Concert Paper Guidelines Instructions.docx
Exploring Music  Concert Paper Guidelines Instructions.docxExploring Music  Concert Paper Guidelines Instructions.docx
Exploring Music Concert Paper Guidelines Instructions.docxgitagrimston
 
Expo 12 Discussion QuestionsThink about the cooperative learni.docx
Expo 12 Discussion QuestionsThink about the cooperative learni.docxExpo 12 Discussion QuestionsThink about the cooperative learni.docx
Expo 12 Discussion QuestionsThink about the cooperative learni.docxgitagrimston
 
ExplanationMaster Honey is a franchise-style company that sel.docx
ExplanationMaster Honey is a franchise-style company that sel.docxExplanationMaster Honey is a franchise-style company that sel.docx
ExplanationMaster Honey is a franchise-style company that sel.docxgitagrimston
 
Explain where industry profits are maximized in the figure below.docx
Explain where industry profits are maximized in the figure below.docxExplain where industry profits are maximized in the figure below.docx
Explain where industry profits are maximized in the figure below.docxgitagrimston
 
Exploratory EssayResearch - 1The ability to Wallow in complex.docx
Exploratory EssayResearch - 1The ability to Wallow in complex.docxExploratory EssayResearch - 1The ability to Wallow in complex.docx
Exploratory EssayResearch - 1The ability to Wallow in complex.docxgitagrimston
 
Exploring MusicExtra Credit #2 Due November 6 in classIn G.docx
Exploring MusicExtra Credit #2 Due November 6 in classIn G.docxExploring MusicExtra Credit #2 Due November 6 in classIn G.docx
Exploring MusicExtra Credit #2 Due November 6 in classIn G.docxgitagrimston
 
Explain why Franz Boas did not accept Morgan’s view about evol.docx
Explain why Franz Boas did not accept Morgan’s view about evol.docxExplain why Franz Boas did not accept Morgan’s view about evol.docx
Explain why Franz Boas did not accept Morgan’s view about evol.docxgitagrimston
 
Explanations 6.1 Qualities of Explanations Questions 0 of 3 com.docx
Explanations  6.1 Qualities of Explanations Questions 0 of 3 com.docxExplanations  6.1 Qualities of Explanations Questions 0 of 3 com.docx
Explanations 6.1 Qualities of Explanations Questions 0 of 3 com.docxgitagrimston
 
Experts PresentationStudentPSY 496Instructor.docx
Experts PresentationStudentPSY 496Instructor.docxExperts PresentationStudentPSY 496Instructor.docx
Experts PresentationStudentPSY 496Instructor.docxgitagrimston
 
Explain whether Okonkwo was remaining truthful to himself by killi.docx
Explain whether Okonkwo was remaining truthful to himself by killi.docxExplain whether Okonkwo was remaining truthful to himself by killi.docx
Explain whether Okonkwo was remaining truthful to himself by killi.docxgitagrimston
 
Explain How these Aspects Work Together to Perform the Primary Fun.docx
Explain How these Aspects Work Together to Perform the Primary Fun.docxExplain How these Aspects Work Together to Perform the Primary Fun.docx
Explain How these Aspects Work Together to Perform the Primary Fun.docxgitagrimston
 
Explain the 3 elements of every negotiation. Why is WinWin used m.docx
Explain the 3 elements of every negotiation. Why is WinWin used m.docxExplain the 3 elements of every negotiation. Why is WinWin used m.docx
Explain the 3 elements of every negotiation. Why is WinWin used m.docxgitagrimston
 
Explain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docx
Explain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docxExplain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docx
Explain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docxgitagrimston
 
Exploration 8 – Shifting and Stretching Rational Functions .docx
Exploration 8 – Shifting and Stretching Rational Functions .docxExploration 8 – Shifting and Stretching Rational Functions .docx
Exploration 8 – Shifting and Stretching Rational Functions .docxgitagrimston
 
Exploring Innovation in Action Power to the People – Lifeline Ene.docx
Exploring Innovation in Action Power to the People – Lifeline Ene.docxExploring Innovation in Action Power to the People – Lifeline Ene.docx
Exploring Innovation in Action Power to the People – Lifeline Ene.docxgitagrimston
 
Experiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docx
Experiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docxExperiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docx
Experiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docxgitagrimston
 
Experimental Essay The DialecticThe purpose of this paper is to.docx
Experimental Essay The DialecticThe purpose of this paper is to.docxExperimental Essay The DialecticThe purpose of this paper is to.docx
Experimental Essay The DialecticThe purpose of this paper is to.docxgitagrimston
 

More from gitagrimston (20)

External Factor Analysis Summary (EFAS Table)External Factors.docx
External Factor Analysis Summary (EFAS Table)External Factors.docxExternal Factor Analysis Summary (EFAS Table)External Factors.docx
External Factor Analysis Summary (EFAS Table)External Factors.docx
 
Exploring Online Consumer Behaviors.docx
Exploring Online Consumer Behaviors.docxExploring Online Consumer Behaviors.docx
Exploring Online Consumer Behaviors.docx
 
External and Internal Analysis 8Extern.docx
External and Internal Analysis 8Extern.docxExternal and Internal Analysis 8Extern.docx
External and Internal Analysis 8Extern.docx
 
Exploring Music Concert Paper Guidelines Instructions.docx
Exploring Music  Concert Paper Guidelines Instructions.docxExploring Music  Concert Paper Guidelines Instructions.docx
Exploring Music Concert Paper Guidelines Instructions.docx
 
Expo 12 Discussion QuestionsThink about the cooperative learni.docx
Expo 12 Discussion QuestionsThink about the cooperative learni.docxExpo 12 Discussion QuestionsThink about the cooperative learni.docx
Expo 12 Discussion QuestionsThink about the cooperative learni.docx
 
ExplanationMaster Honey is a franchise-style company that sel.docx
ExplanationMaster Honey is a franchise-style company that sel.docxExplanationMaster Honey is a franchise-style company that sel.docx
ExplanationMaster Honey is a franchise-style company that sel.docx
 
Explain where industry profits are maximized in the figure below.docx
Explain where industry profits are maximized in the figure below.docxExplain where industry profits are maximized in the figure below.docx
Explain where industry profits are maximized in the figure below.docx
 
Exploratory EssayResearch - 1The ability to Wallow in complex.docx
Exploratory EssayResearch - 1The ability to Wallow in complex.docxExploratory EssayResearch - 1The ability to Wallow in complex.docx
Exploratory EssayResearch - 1The ability to Wallow in complex.docx
 
Exploring MusicExtra Credit #2 Due November 6 in classIn G.docx
Exploring MusicExtra Credit #2 Due November 6 in classIn G.docxExploring MusicExtra Credit #2 Due November 6 in classIn G.docx
Exploring MusicExtra Credit #2 Due November 6 in classIn G.docx
 
Explain why Franz Boas did not accept Morgan’s view about evol.docx
Explain why Franz Boas did not accept Morgan’s view about evol.docxExplain why Franz Boas did not accept Morgan’s view about evol.docx
Explain why Franz Boas did not accept Morgan’s view about evol.docx
 
Explanations 6.1 Qualities of Explanations Questions 0 of 3 com.docx
Explanations  6.1 Qualities of Explanations Questions 0 of 3 com.docxExplanations  6.1 Qualities of Explanations Questions 0 of 3 com.docx
Explanations 6.1 Qualities of Explanations Questions 0 of 3 com.docx
 
Experts PresentationStudentPSY 496Instructor.docx
Experts PresentationStudentPSY 496Instructor.docxExperts PresentationStudentPSY 496Instructor.docx
Experts PresentationStudentPSY 496Instructor.docx
 
Explain whether Okonkwo was remaining truthful to himself by killi.docx
Explain whether Okonkwo was remaining truthful to himself by killi.docxExplain whether Okonkwo was remaining truthful to himself by killi.docx
Explain whether Okonkwo was remaining truthful to himself by killi.docx
 
Explain How these Aspects Work Together to Perform the Primary Fun.docx
Explain How these Aspects Work Together to Perform the Primary Fun.docxExplain How these Aspects Work Together to Perform the Primary Fun.docx
Explain How these Aspects Work Together to Perform the Primary Fun.docx
 
Explain the 3 elements of every negotiation. Why is WinWin used m.docx
Explain the 3 elements of every negotiation. Why is WinWin used m.docxExplain the 3 elements of every negotiation. Why is WinWin used m.docx
Explain the 3 elements of every negotiation. Why is WinWin used m.docx
 
Explain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docx
Explain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docxExplain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docx
Explain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docx
 
Exploration 8 – Shifting and Stretching Rational Functions .docx
Exploration 8 – Shifting and Stretching Rational Functions .docxExploration 8 – Shifting and Stretching Rational Functions .docx
Exploration 8 – Shifting and Stretching Rational Functions .docx
 
Exploring Innovation in Action Power to the People – Lifeline Ene.docx
Exploring Innovation in Action Power to the People – Lifeline Ene.docxExploring Innovation in Action Power to the People – Lifeline Ene.docx
Exploring Innovation in Action Power to the People – Lifeline Ene.docx
 
Experiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docx
Experiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docxExperiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docx
Experiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docx
 
Experimental Essay The DialecticThe purpose of this paper is to.docx
Experimental Essay The DialecticThe purpose of this paper is to.docxExperimental Essay The DialecticThe purpose of this paper is to.docx
Experimental Essay The DialecticThe purpose of this paper is to.docx
 

Recently uploaded

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

Evidence Tracking Guide for Security Personnel

  • 1. Evidence Tracking Evidence Tracking Name Class Date Professor Evidence Tracking Evidence is essential to solving any case and proving the guilt of an offender in a court of law. Once a crime has been reported the first step of the responding officer is to secure the crime scene to ensure it is properly preserved until forensic investigators can arrive on the scene. The evidence collection process begins with thoroughly documenting the crime scene.
  • 2. The process begins with a walk through of the crime scene in order to identify potential evidence and to develop an idea of what occurred at the crime scene. Once the evidence has been identified the evidence collection process will begin with collecting evidence that is fragile or easily damaged or destroyed. In the rape scenario DNA evidence is crucial to proving a crime occurred and showing the guilt of the offender. Rape cases are hard to prosecute and require physical evidence to prove the act of rape even occurred. In a majority of cases it is the word of the victim against the word of the perpetrator. DNA evidence can provide conclusive evidence that a sexual assault occurred and point to the guilty offender. In the rape scenario evidence that was located and will need to be collected is the semen on the comforter and the tissue located in the trash can. This evidence can contain valuable DNA that points directly to the offender. The semen and the tissue can contain the DNA profile of the offender and the tissue. The evidence collection process begins first by identifying the evidence in a walk through and then properly documenting the evidence. Documenting the evidence is an essential step in the collection process. This begins with photographing the evidence where it sits in order to show the court where the evidence was located and in what condition. Once the evidence has been photographed it must be collected using uniform collection standards. The comforter that was located contained a semen stain that must be collected in order to develop DNA on the criminal suspect. Most items of evidence will be collected in paper containers such as packets, envelopes, and bags and liquid items can be transported in non-breakable, leak proof containers (Schiro, 2006). When collecting DNA from the comforter the forensic technician will mark the wet stain with a permanent marker in order to make it easier to locate during the DNA analysis. The technician will then wait for the comforter to air dry before placing it in a clean package and properly sealing and
  • 3. documenting for transportation. The second piece of evidence that was located at the crime scene was a tissue in a waste paper basket. The tissue will need to be collected using a pair of tweezers or using a pair of gloves and then be placed in a plastic container. The plastic container will need to be sealed and then properly documented for transportation. Documentation does not include just sketching and photographing the evidence located at the crime scene but also includes detailing every step of the evidence collection process, transportation, and steps taken in the analysis of the evidence at the lab. Documenting includes ensuring the person that collect the evidence labels the document with their name, date, time, number, and the steps that were taken in the collection process. When the evidence is transported these steps also need to be documented. The person transporting the evidence needs to document time and date evidence was transported and by whom. Once the evidence reaches the lab for analysis each step in the process must also be carefully documented. Documenting every step in the evidence collection, transportation, and analysis process is known as the chain of the custody. The chain of custody is defined as the witnessed, written record of all of the individuals who maintained unbroken control over the items of evidence (Byrd, 2009). The chain of custody shows the court where the evidence was located and shows exactly what steps were taken to collect, transport, and analysis the evidence. The chain of evidence establishes proof for the court that shows who had contact with evidence, circumstances surrounding the collection of evidence, and any changes to the evidence. Processing protocols are the uniform standards that must be followed when collecting evidence or processing a crime scene. These protocols as discussed previously include preserving the evidence, conducting a walk through, sketching the scene, photographing the scene, using standardized methods to collect evidence, document the evidence, and lastly transport the evidence to the forensic lab. The evidence located at the crime
  • 4. scene must be collected using processing protocols to protect the integrity of the evidence that is located. Preserving DNA evidence is one of the most crucial steps that will be taken by forensic personnel. It falls to the responding police officers to quickly and properly secure a crime scene to ensure that evidence is not lost, damaged, or destroyed. DNA evidence can be extremely fragile and requires the roper processing controls and the preservation of the evidence. When processing DNA evidence, which has been transported to the forensic lab, it is essential to run negative controls and apply background controls through the entire process (Riley, 2005). This will ensure any containment is identified so the evidence does not be contaminated during the analysis process. The potential DNA evidence on the tissue would be considered to be trace evidence because there is a possibility that minute amounts of DNA may be present on the evidence. Trace evidence is physical evidence fund in the smallest amounts and includes skin cells, fibers, and hair. The physical evidence located on the comforter is considered biological evidence or body fluids and can contain valuable DNA evidence that will point directly to a criminal suspect. DNA evidence can be located on the comforter through the use of ultra violet lights or chemicals. Physical evidence is essential to the success of any criminal case. While many cases are solved with circumstantial evidence, physical evidence provides the court with more definitive evidence of the criminal defendant’s guilt. In order to ensure that physical evidence can be presented in court it must first be properly collected following uniform standards and it must be properly documented each step of the way. If evidence is not collected using uniform standards or is not properly documented there is no clear chain of custody. When the chain of custody has been broken the evidence will no longer be eligible for the court process. If physical evidence is thrown out of court a guilty offender
  • 5. could go free. The chain of custody ensures that the court is aware of every step taken with the physical evidence and can prove the evidence being presented in court is the evidence that was located at the crime scene. The proof is established through the chain of custody and ensures the physical evidence is eligible for the court process. In order to prove the guilt of an offender there must be evidence pointing to a criminal offender that leaves no reasonable doubt in the minds of the jury. In the case of the rape crime scene the evidence that is collected will be crucial to identifying the suspect as well as proving their guilt. References Byrd, M. (2009). Proper Tagging and Labeling of Evidence for Later Identification. Retrieved November 19, 2012 from http://www.crime-scene- investigator.net/tagging.html Riley, D. (2005). DNA Testing: An Introduction For Non- Scientists An Illustrated Explanation. Retrieved November 19, 2012 from http://www.scientific.org/tutorials/articles/riley/riley.html Schiro, G. (2006). Collection and Preservation of Evidence. Retrieved November 19, 2012 from http://www.crime-scene-investigator.net/evidenc3.html
  • 6. Name Class Date New Security Employee Guide Evidence Acquisition and Management Criminal and Civil Responsibility Secure Evidence
  • 7. Preserve Evidence Document Evidence When conducting a criminal investigation in the security setting it requires the security personnel to understand and respect the legal and ethical obligations. Security personnel have a legal obligation to protect the rights of the citizen and an ethical obligation not to violate the rights of the suspect (Beaty, 2011). Just like in a criminal investigation with law enforcement, security personnel must first secure the evidence so it can be preserved and the evidence left where it is located so it can be carefully document. Evidence need to be photographed where it is located and if it is involved in a criminal investigation must be left for the police to collect. 2 Evidence Acquisition and Management Chain of Evidence Protect integrity Exclusionary Rule Secure Custodian
  • 8. One of the most important aspects in managing evidence is to ensure the evidence is properly preserved to avoid becoming damaged, lost or destroyed but also it is in the documentation of the evidence. In order to protect the chain of evidence every step of the evidence preservation and collection must be carefully documented. When the evidence steps are not properly documented the result is the evidence becomes vulnerable to being excluded from the court process. Based on the “exclusionary rule any evidence that is illegally collected or not properly documented is vulnerable form being excluded from the court process. Once evidence is collected and documented it must be placed in the hands of s secure custodian. In criminal cases law enforcement is the best custodian for the evidence. 3
  • 9. Administrative and Personnel Investigations Wrong Doing or Misconduct Legal and Ethical Obligation Everyday Work Situation Not Criminal Investigation In the administrative or personnel investigation the actions of the employee are not criminal but against the policies of the organization resulting in an investigation. The administrative investigation involves an everyday work situation where the employee has engaged in some type of wrongdoing or misconduct. The goal is to develop factual information in order to determine who is responsible and develop an effective course of action (NPS, 2012). The investigator still has a legal and ethical obligation to the employees under scrutiny and must act in accordance with the law and policies and procedures of the organization as well as keep in mind there ethical obligation. 4
  • 10. Administrative and Personnel Investigations Question Witnesses Response Private and Confidential Credible and Factual Information What, When, Why, Where, Who The administrative or personnel investigation is usually the result of a complaint or an action that caused harm for the organization. The administrative investigation involves developing factual information through interviewing witnesses and developing documentation. The administrative investigation is similar to the criminal investigation in that the goals of the investigation is to determine who is responsible, why they committed the wrong doing, where it occurred, and when it happened. The responses obtained by witnesses must be kept private and confidential and only factual information developed in order to make an informed decision on who is to blame as well as to determine the type of response by the organization. 5 References Beaty, A. (2011). Evidence Management. Retrieved November
  • 11. 25, 2012 from http://www.cityofws.org/Home/Departments/Police/Articles/Evi denceManagement National Park Service. (2006). Conducting an Administrative Investigation. Retrieved November 25, 2012 from http://www.nps.gov/training/tel/Guides/Conducting_Admin_Inv estigations New Security New Security Employee Guide Name Class Date Professor
  • 12. New Security Employee Guide Evidence Acquisition and Management Security personnel are not under the same restrictions as law enforcement when acquiring evidence but in order to ensure the rights of the citizens are not violated when obtaining evidence, in order to avoid criminal or civil responsibility, security personnel will be expected to follow company guidelines and procedures. The first policy for the security employee is to collect evidence in a fashion which does not compromise the nature of the evidence and use the proper protective measures to ensure the evidence does not become damaged, lost or destroyed. The chain of evidence must be clearly documented to ensure in criminal cases the evidence can be used in a court of law. In any form of security evidence management is the process for the proper collection, processing, maintenance, and protection of evidence that is required in order to maintain the integrity and credibility of the evidence (Beaty, 2011). Once evidence is located it needs to be properly preserved by securing the area where the evidence was located and then reported to the police. Evidence that is not properly collected can be damaged or destroyed making it impossible to use in court and if not properly collected could be excluded by the court process. In order to ensure that any evidence that is located can be protected in order to be used against criminal
  • 13. suspect’s security personnel must document the location of evidence as well as time or date. Evidence should be photographed and then secured for collection by law enforcement. Evidence that is collected for the use of security investigations, not involving law enforcement, will require security personnel to collect the evidence before warehousing it with a secure custodian. The secure custodian will protect the chain of evidence. Evidence that is acquired will be secured for collection and disposed off if no longer needed or case is successfully resolved. Any evidence gathered involving criminal cases will be kept until collected by police or criminal case is resolved. Evidence will be collected following the formal standards of the organization and properly managed until the time it is returned to owner or destroyed. Administrative and Personnel Investigations The security employee guide concerning administrative and personnel investigations includes teaching employees about the rights of criminal suspects and their legal responsibilities as well as how to conduct an interview and the difference in the interrogation. The administrative investigation is different from the criminal investigation in that the administrative investigation involves average workday situations that do not involve criminal behavior. An investigation consists of any deliberate effort to obtain or develop information in order to identify facts or to determine an appropriate course of action within the requirements established by law, regulations and labor agreements (NPS, 2006). The purpose is to gather enough evidence to make a informed decision on a course of action. The investigator will gather facts, similar to a criminal investigation, by interviewing other employees or stakeholders that may have information concerning the work situation. The goal is not to falsely accuse or develop an opinion but instead to use facts to make a decision about the situation will be handled. In these types of investigation the employee has engaged in some type of wrongdoing or misconduct. For example the
  • 14. employee may have failed to complete a task that resulted in the loss of a client or has displayed a pattern of tardiness. A criminal investigation would involve theft or other crimes such as bribery. Because there is no crime the course of action will involve punishment. The administrative or personnel investigation is usually the result of a complaint or an action that caused harm for the organization. The investigator will question witnesses and keep any responses private and confidential. The investigator should focus only on the facts and ignore any rumor or speculation. All information that is collected should be carefully documented and the investigation should comply with the law and never violate rights of the employee being investigated. Once credible and factual data has been gathered a report should be written that determines what, when, why, and where the alleged incident happened s well as who was responsible. The report should also include recommendations for punishment. References Beaty, A. (2011). Evidence Management. Retrieved November 25, 2012 from http://www.cityofws.org/Home/Departments/Police/Articles/Evi denceManagement National Park Service. (2006). Conducting an Administrative Investigation. Retrieved November 25, 2012 from http://www.nps.gov/training/tel/Guides/Conducting_Admin_Inv estigations