SlideShare a Scribd company logo
1 of 10
Security Training
Security Officer Physical-”name” ITT-”name”
SECURITY TOPICS Cash Opening/Closing Procedures Keys/Alarm/Combinations Fire Arms Negotiable Instruments Robbery Burglary Kidnapping
Verify Limits Bait Money Cash Audits Locked Drawers DualControl
Opening/ClosingProcedures Two employees All Clear Signal Cash & Sensitive Materials Locked Check all areas, windows, etc.
Keys/Alarm/Combinations
Miscellaneous No Negotiable Instruments maintained on premises No Firearms Allowed
Robbery Procedures Follow Instructions-DON’T be a Hero! Activate alarm if/when safe & call 911 afterwards Handle the note only on the edges and put it out of sight Pay attention to details of robber and weapon Lock doors immediately and refrain from conversation Secure all remaining cash in the vault Only the CEO is authorized to be a spokesperson
Burglary After hours: Executive management will respond to alarm False alarms should be reported to Security Officer During opening procedures: Notify security officer and police Do not open the office Don’t touch anything
Kidnapping Notify Security Officer and CEO Keep kidnapping confidential Follow Law enforcement instructions

More Related Content

What's hot (9)

Risk Management- Armed Robbery
Risk Management- Armed RobberyRisk Management- Armed Robbery
Risk Management- Armed Robbery
 
Safety by h.k deptt
Safety by h.k depttSafety by h.k deptt
Safety by h.k deptt
 
Surviving an armed robbery
Surviving an armed robberySurviving an armed robbery
Surviving an armed robbery
 
Handling emergency situations
Handling emergency situationsHandling emergency situations
Handling emergency situations
 
safety
safetysafety
safety
 
Emergency Procedures Flip Book
Emergency Procedures Flip BookEmergency Procedures Flip Book
Emergency Procedures Flip Book
 
BANK SECURITY BY --- KHUSH AHUJA
BANK SECURITY BY --- KHUSH AHUJABANK SECURITY BY --- KHUSH AHUJA
BANK SECURITY BY --- KHUSH AHUJA
 
Active shooter pocket card
Active shooter pocket cardActive shooter pocket card
Active shooter pocket card
 
Patrolling
PatrollingPatrolling
Patrolling
 

C:\fakepath\security training

Editor's Notes

  1. A log is maintained of keys/combos and alarm codes issued. These items should be secured at all times and never shared.
  2. One deterrent is greeting customers which we do very well……