The document provides guidance on managing customer expectations and dealing with potential conflict situations as a security professional. It discusses proactively identifying points of conflict, recognizing signs of escalation, conducting dynamic risk assessments, maintaining safe distances and positioning, and ensuring all parties have an escape exit. The goal is to understand customer expectations, prevent issues from arising, and de-escalate situations through clear communication and following established procedures.
Security officers have no legal right to search people or property without permission. It is important to obtain consent before searching, as searching without consent could result in criminal or civil proceedings against the officer. Searches should be conducted respectfully and according to the site's search policies and procedures.
The document discusses the role and responsibilities of a security officer. It describes their duties such as patrolling sites, controlling access, and responding to incidents. A security officer's specific duties are outlined in Assignment Instructions that provide site-specific procedures, patrol routes, and emergency protocols. Security officers must wear a uniform, have the proper equipment, and follow confidentiality requirements regarding sensitive site information.
This document provides guidance to security operatives on dealing with emergencies. It defines an emergency as an unplanned serious incident that requires immediate action. It outlines various types of emergencies operatives may encounter, such as fires, floods, medical emergencies and crimes. It stresses that in any emergency, preserving life is the top priority. The document then provides guidance on actions to take for different emergency types, such as calling emergency services, raising alarms, and evacuating sites. It also covers responding to medical emergencies and vulnerable people, as well as terrorism awareness.
Patrols are carried out for security purposes such as preventing unauthorized access, damage, theft, and assaults. There are different types of patrols including initial, random/routine, final, and snap patrols. Before patrolling, security officers must know patrol requirements, routes, hazards, and emergency procedures. Patrols should be varied in timing and routes to prevent predictability. Officers must remain vigilant and report any issues found during patrols.
The document discusses workplace violence and conflict management. It defines workplace violence and outlines employers' and employees' responsibilities to maintain safety. Employers must implement policies, training, and safety measures to prevent violence. Employees must follow safety procedures and report any violent incidents. The document also discusses how to manage conflict, including using communication skills, avoiding triggers, and applying inhibitors to de-escalate situations. Security staff are expected to understand conflict management principles to keep encounters calm and resolve issues satisfactorily.
This document provides guidance on basic security procedures for security guards. It discusses the duties of security guards which include protecting people, property and information through monitoring premises, detecting and responding to criminal activity, controlling access and assisting in emergencies. The document outlines how to effectively patrol premises on foot or by vehicle through being visible, taking time, looking for anything unusual, using observation skills and avoiding routines. It emphasizes the importance of safety by observing, deterring and reporting rather than physical intervention.
This PowerPoint provides guidance for a C-TPAT security training program for employees. It suggests tailoring the presentation to include company-specific images and information. The presentation covers topics like identifying suspicious persons and activities, controlling visitors, and maintaining computer and document security. The goal is to enhance supply chain security and prevent illegal cargo from entering containers by having all employees consider security risks.
This document discusses national security, regional/local security, and company physical security. It defines security threats and outlines different types of security concerns. National security involves protecting a nation's sovereignty, territory, and citizens. Company physical security uses measures like surveillance and access control to protect facilities, equipment, personnel, and property from threats. The document emphasizes that security is a shared responsibility involving people, government, management, and employees.
Security officers have no legal right to search people or property without permission. It is important to obtain consent before searching, as searching without consent could result in criminal or civil proceedings against the officer. Searches should be conducted respectfully and according to the site's search policies and procedures.
The document discusses the role and responsibilities of a security officer. It describes their duties such as patrolling sites, controlling access, and responding to incidents. A security officer's specific duties are outlined in Assignment Instructions that provide site-specific procedures, patrol routes, and emergency protocols. Security officers must wear a uniform, have the proper equipment, and follow confidentiality requirements regarding sensitive site information.
This document provides guidance to security operatives on dealing with emergencies. It defines an emergency as an unplanned serious incident that requires immediate action. It outlines various types of emergencies operatives may encounter, such as fires, floods, medical emergencies and crimes. It stresses that in any emergency, preserving life is the top priority. The document then provides guidance on actions to take for different emergency types, such as calling emergency services, raising alarms, and evacuating sites. It also covers responding to medical emergencies and vulnerable people, as well as terrorism awareness.
Patrols are carried out for security purposes such as preventing unauthorized access, damage, theft, and assaults. There are different types of patrols including initial, random/routine, final, and snap patrols. Before patrolling, security officers must know patrol requirements, routes, hazards, and emergency procedures. Patrols should be varied in timing and routes to prevent predictability. Officers must remain vigilant and report any issues found during patrols.
The document discusses workplace violence and conflict management. It defines workplace violence and outlines employers' and employees' responsibilities to maintain safety. Employers must implement policies, training, and safety measures to prevent violence. Employees must follow safety procedures and report any violent incidents. The document also discusses how to manage conflict, including using communication skills, avoiding triggers, and applying inhibitors to de-escalate situations. Security staff are expected to understand conflict management principles to keep encounters calm and resolve issues satisfactorily.
This document provides guidance on basic security procedures for security guards. It discusses the duties of security guards which include protecting people, property and information through monitoring premises, detecting and responding to criminal activity, controlling access and assisting in emergencies. The document outlines how to effectively patrol premises on foot or by vehicle through being visible, taking time, looking for anything unusual, using observation skills and avoiding routines. It emphasizes the importance of safety by observing, deterring and reporting rather than physical intervention.
This PowerPoint provides guidance for a C-TPAT security training program for employees. It suggests tailoring the presentation to include company-specific images and information. The presentation covers topics like identifying suspicious persons and activities, controlling visitors, and maintaining computer and document security. The goal is to enhance supply chain security and prevent illegal cargo from entering containers by having all employees consider security risks.
This document discusses national security, regional/local security, and company physical security. It defines security threats and outlines different types of security concerns. National security involves protecting a nation's sovereignty, territory, and citizens. Company physical security uses measures like surveillance and access control to protect facilities, equipment, personnel, and property from threats. The document emphasizes that security is a shared responsibility involving people, government, management, and employees.
The Security Industry Authority (SIA) regulates the private security industry in the UK. It aims to protect the public by licensing individuals and companies. Licensed security workers must be trained and meet conduct standards. The SIA oversees door supervisors, security officers, CCTV operators, cash and valuables in transit operatives, and close protection operatives. It also runs an Approved Contractor Scheme to recognize high quality security companies.
This document outlines the training curriculum for security guards in Ontario, Canada. It provides the minimum requirements and suggested duration for 12 sections of instruction, including introductions to the security industry and relevant legislation, basic security procedures, report writing, health and safety, emergency response, the legal system, use of force theory, and first aid certification. For each section, the document specifies the learning objectives, outlines the content to be covered, and recommends instructional methodologies and evaluation methods. The detailed curriculum aims to properly equip security guards with the knowledge and skills required to perform their duties effectively and in accordance with applicable laws and regulations.
We have to Plan our Security in proper manner to ensure safety and security of our Assets. The Security rings of Deter, Detect, Assess, Delay , Respond and Deny will ensure proper Security Planning for your organisation.
The document outlines basic procedures for conducting vehicle searches as a security officer, including safety precautions, documentation to check, indicators of potential contraband, and legal restrictions. Key points are to always maintain visibility and safety, systematically search the entire vehicle, check for indicators, interview drivers politely and respectfully, and avoid unreasonable searches or seizures.
Security officers must accurately and promptly record details of incidents and activities through various reports, such as incident reports and log books. These reports create a permanent record that can be referred back to for investigations, legal proceedings, and monitoring crime patterns. Incident reports specifically should provide a factual account of what happened written in black ink, including details of those involved, actions taken, and outcomes. Handover reports ensure incoming security officers are informed of relevant events and prepared for their shift.
This document discusses access control at facility entrances. It notes that while security is important, companies still need people to enter facilities to perform work. The challenges of balancing security and business operations are discussed. Access control is presented as a way to control and monitor entry points while allowing work to continue. Different access control systems, products, and an example entrance gate design are described. The benefits of access control for protecting people, assets, and intellectual property are also summarized.
Patrolling involves moving through an area regularly to observe, inspect, and provide security. The main purposes of patrolling are to protect people, property, and information by serving as a visible deterrent against crime. Effective patrolling uses all five senses to check for unusual conditions, sounds, odors, or other potential issues. It is important to vary patrol routes and patterns unpredictably and to thoroughly document any issues found.
Work at height poses serious injury risks from falls. Collective protection like guardrails and safety nets are preferred over personal protective equipment. Specific precautions are required for different work sites like roofs, walls, and floor openings to prevent falls. Proper equipment selection and maintenance also helps control risks, such as only using ladders suitable for the task and in good condition, having scaffolding erected by specialists, and qualifying personnel to operate elevated work platforms. Fall protection systems must be worn with many types of equipment.
soft skill presentation for securities to understand about the communication skills and also some interpersonal skills to develop in one another among security operatives as well the reception securities
This document contains a risk assessment for a 1000 ton transfer press. It identifies 27 potential hazards associated with the press and linear transfer system. For each hazard, it lists the initial risk level based on severity and probability, describes risk reduction measures, and calculates the final risk level after implementing those measures. Many of the hazards involved risks of critical injury or death from being struck or crushed by the moving press or linear transfer components. The risk assessment recommends engineering controls like light curtains and lockout procedures to mitigate these risks.
These are basic skill set, duty responsibility and his ability to do the assigned work. The requirement of client is also mentioned to make process proper.
The role of a static security guard is to safeguard, patrol as well as monitor any violence or theft inside the premises where his duty has been assigned. To know more about the role of these guards, view this slideshare presentation.
This document provides information on patrolling for security services. It discusses the objectives of patrolling, the different types of patrols (external, internal, route, general), how to organize and conduct patrols, preparation for patrols, what to observe and record during patrols, use of the senses, and expectations for patrol performance. Practical guidance is given for organizing patrols, conducting checks and duties, and preparing patrol reports. External patrols cover the facility perimeter and surroundings, while internal patrols ensure security inside buildings and machinery. General patrolling is done at the start and end of shifts and periodically to monitor security staff duties. Effective preparation, communication, observation, and documentation are emphasized for successful patrolling.
Security Training Incident Investigation And Report Writing.PptFaheem Ul Hasan
The document provides guidance on preserving crime scenes and investigating security incidents. It outlines policies and procedures for responding officers to secure both the immediate crime scene as well as potential entry and exit points. Investigations should involve interviewing witnesses without leading questions to establish facts. Reports should be objective and based on facts rather than opinions.
The document provides information on firefighting training, including the objectives of understanding different fire classes and fire extinguisher types. It discusses the fire triangle of heat, fuel, and oxygen being necessary for a fire. Different fire classes and sources of ignition are defined. Methods of fire extinction like starvation, smothering, and cooling are explained. The RACE method of responding to a fire and the PASS method of using a fire extinguisher are outlined. Electrical, cooking, and storage safety are covered. The document also describes fire alarm systems, sprinklers, signage, exits, brigades, and other fire equipment and infrastructure.
B Part 10 Violence At Work By J Mc CannJames McCann
This document provides guidance for employers on addressing workplace violence. It defines workplace violence and outlines relevant health and safety laws. A four-stage process is presented for effectively managing violence: 1) assessing the problem, 2) deciding on actions, 3) taking action, and 4) reviewing results. Key recommendations include surveying employees, recording incidents, evaluating risks, providing training, improving environments, and supporting victims of violent incidents.
The document provides 7 steps for real estate agents to effectively handle complaints from clients: 1) Listen to understand the client's perspective and the reason for the complaint; 2) Don't be defensive and have an open discussion to understand the issues; 3) Provide a resolution where possible to redirect the client's attention; 4) Apologize to repair the relationship and thank the client for the opportunity to resolve the issue; 5) Don't ignore any feedback as it is an opportunity to improve service; 6) Respond to the client quickly as delayed responses can increase anger and negative buzz.
The Security Industry Authority (SIA) regulates the private security industry in the UK. It aims to protect the public by licensing individuals and companies. Licensed security workers must be trained and meet conduct standards. The SIA oversees door supervisors, security officers, CCTV operators, cash and valuables in transit operatives, and close protection operatives. It also runs an Approved Contractor Scheme to recognize high quality security companies.
This document outlines the training curriculum for security guards in Ontario, Canada. It provides the minimum requirements and suggested duration for 12 sections of instruction, including introductions to the security industry and relevant legislation, basic security procedures, report writing, health and safety, emergency response, the legal system, use of force theory, and first aid certification. For each section, the document specifies the learning objectives, outlines the content to be covered, and recommends instructional methodologies and evaluation methods. The detailed curriculum aims to properly equip security guards with the knowledge and skills required to perform their duties effectively and in accordance with applicable laws and regulations.
We have to Plan our Security in proper manner to ensure safety and security of our Assets. The Security rings of Deter, Detect, Assess, Delay , Respond and Deny will ensure proper Security Planning for your organisation.
The document outlines basic procedures for conducting vehicle searches as a security officer, including safety precautions, documentation to check, indicators of potential contraband, and legal restrictions. Key points are to always maintain visibility and safety, systematically search the entire vehicle, check for indicators, interview drivers politely and respectfully, and avoid unreasonable searches or seizures.
Security officers must accurately and promptly record details of incidents and activities through various reports, such as incident reports and log books. These reports create a permanent record that can be referred back to for investigations, legal proceedings, and monitoring crime patterns. Incident reports specifically should provide a factual account of what happened written in black ink, including details of those involved, actions taken, and outcomes. Handover reports ensure incoming security officers are informed of relevant events and prepared for their shift.
This document discusses access control at facility entrances. It notes that while security is important, companies still need people to enter facilities to perform work. The challenges of balancing security and business operations are discussed. Access control is presented as a way to control and monitor entry points while allowing work to continue. Different access control systems, products, and an example entrance gate design are described. The benefits of access control for protecting people, assets, and intellectual property are also summarized.
Patrolling involves moving through an area regularly to observe, inspect, and provide security. The main purposes of patrolling are to protect people, property, and information by serving as a visible deterrent against crime. Effective patrolling uses all five senses to check for unusual conditions, sounds, odors, or other potential issues. It is important to vary patrol routes and patterns unpredictably and to thoroughly document any issues found.
Work at height poses serious injury risks from falls. Collective protection like guardrails and safety nets are preferred over personal protective equipment. Specific precautions are required for different work sites like roofs, walls, and floor openings to prevent falls. Proper equipment selection and maintenance also helps control risks, such as only using ladders suitable for the task and in good condition, having scaffolding erected by specialists, and qualifying personnel to operate elevated work platforms. Fall protection systems must be worn with many types of equipment.
soft skill presentation for securities to understand about the communication skills and also some interpersonal skills to develop in one another among security operatives as well the reception securities
This document contains a risk assessment for a 1000 ton transfer press. It identifies 27 potential hazards associated with the press and linear transfer system. For each hazard, it lists the initial risk level based on severity and probability, describes risk reduction measures, and calculates the final risk level after implementing those measures. Many of the hazards involved risks of critical injury or death from being struck or crushed by the moving press or linear transfer components. The risk assessment recommends engineering controls like light curtains and lockout procedures to mitigate these risks.
These are basic skill set, duty responsibility and his ability to do the assigned work. The requirement of client is also mentioned to make process proper.
The role of a static security guard is to safeguard, patrol as well as monitor any violence or theft inside the premises where his duty has been assigned. To know more about the role of these guards, view this slideshare presentation.
This document provides information on patrolling for security services. It discusses the objectives of patrolling, the different types of patrols (external, internal, route, general), how to organize and conduct patrols, preparation for patrols, what to observe and record during patrols, use of the senses, and expectations for patrol performance. Practical guidance is given for organizing patrols, conducting checks and duties, and preparing patrol reports. External patrols cover the facility perimeter and surroundings, while internal patrols ensure security inside buildings and machinery. General patrolling is done at the start and end of shifts and periodically to monitor security staff duties. Effective preparation, communication, observation, and documentation are emphasized for successful patrolling.
Security Training Incident Investigation And Report Writing.PptFaheem Ul Hasan
The document provides guidance on preserving crime scenes and investigating security incidents. It outlines policies and procedures for responding officers to secure both the immediate crime scene as well as potential entry and exit points. Investigations should involve interviewing witnesses without leading questions to establish facts. Reports should be objective and based on facts rather than opinions.
The document provides information on firefighting training, including the objectives of understanding different fire classes and fire extinguisher types. It discusses the fire triangle of heat, fuel, and oxygen being necessary for a fire. Different fire classes and sources of ignition are defined. Methods of fire extinction like starvation, smothering, and cooling are explained. The RACE method of responding to a fire and the PASS method of using a fire extinguisher are outlined. Electrical, cooking, and storage safety are covered. The document also describes fire alarm systems, sprinklers, signage, exits, brigades, and other fire equipment and infrastructure.
B Part 10 Violence At Work By J Mc CannJames McCann
This document provides guidance for employers on addressing workplace violence. It defines workplace violence and outlines relevant health and safety laws. A four-stage process is presented for effectively managing violence: 1) assessing the problem, 2) deciding on actions, 3) taking action, and 4) reviewing results. Key recommendations include surveying employees, recording incidents, evaluating risks, providing training, improving environments, and supporting victims of violent incidents.
The document provides 7 steps for real estate agents to effectively handle complaints from clients: 1) Listen to understand the client's perspective and the reason for the complaint; 2) Don't be defensive and have an open discussion to understand the issues; 3) Provide a resolution where possible to redirect the client's attention; 4) Apologize to repair the relationship and thank the client for the opportunity to resolve the issue; 5) Don't ignore any feedback as it is an opportunity to improve service; 6) Respond to the client quickly as delayed responses can increase anger and negative buzz.
Presentation delivered by Chris McLay at Leeds Beckett University on 26th May 2016, as part of the event Front Line Support in FE and HE, organised by Academic and Research Library Group's Yorkshire and Humberside branch.
This document provides guidance on handling difficult customers for trainees. It begins with objectives of identifying different types of difficult customers and demonstrating techniques for managing them. It then defines types of difficult customers like complainers and angry customers and how to deal with each. The document outlines a three stage process for structuring phone calls, with key reminders for dealing with complaints. It discusses active listening, assumptions, and assertiveness, providing tests and scenarios to help trainees improve their skills for managing difficult interactions with customers.
This document summarizes techniques for minimizing conflict when dealing with empowered student or customer groups in academic institutions. It discusses approaching interactions with empathy, equality, and empowerment ("the 4 E's"). Specific techniques include active listening, explaining constraints politely, setting realistic expectations, and building personal relationships. The document also summarizes cognitive restructuring techniques for managing stress, such as changing one's perspective, releasing expectations and control over situations, focusing on opportunities rather than limitations, and making positive comparisons.
The document discusses assertive communication techniques. It defines assertiveness as being confident and persistent without being aggressive. It provides a 12 step process for communicating assertively, including using "I" statements and discussing goals/accomplishments. It also outlines a 4 step ("DESC") process for addressing problems assertively by describing issues, expressing feelings, specifying solutions, and outlining consequences. Being assertive can help manage change, resolve conflicts, reduce stress, and make workplaces more productive.
This document provides guidance on conducting risk assessments through a 5-step process: 1) identify hazards, 2) identify those affected, 3) evaluate risks and controls, 4) record findings, and 5) review regularly. It outlines how to recognize hazards, consider who may be harmed and how, determine existing and needed controls, and document the process. Key steps include walking work areas to find hazards, asking employees for input, and comparing controls to good practices. The goal of risk assessment is to prevent harm through reasonable precautions.
This document provides tips for handling angry customers in a way that improves the customer relationship and turns complaints into opportunities. It advises listening without judgment to understand the customer's feelings and concerns. Representatives should remain calm and focus on solving the problem rather than blame. Resolving issues promptly is important to satisfy customers and earning their loyalty. Regular communication is also key when resolution may take longer than expected.
This document provides training on enhancing customer service skills. It discusses creating a customer-centric environment by listening, giving undivided attention, appreciating individuality, and more. It defines customer service, outlines customer rights, and describes types of customers including new/existing, wavering, and defecting customers. It then focuses on becoming a solution creator for new/existing customers and managing conflict with wavering and defecting customers using tools like the 3 Rs and 10 commandments of customer service. The training emphasizes resolving issues in a respectful manner.
The document provides tips for handling angry customers. It advises remaining calm and listening actively to understand the customer's concerns. Representatives should empathize with the customer, apologize for any issues, and offer solutions. If a solution cannot be immediately provided, ask the customer for feedback on how their problem could be resolved. Representatives should then follow up to ensure the problem is fixed and the customer is satisfied. Taking a brief break after can help representatives destress from difficult customer interactions.
This document provides guidance for being a tenacious medical bill collector. It emphasizes having a positive attitude, understanding one's role as a collector, being well-prepared before calls, and using a friendly but persistent approach to obtain payment from insurance companies. The key aspects are setting goals, showing leadership, addressing claims with a solution-oriented mindset, building rapport with payers, asking the right questions to get payment dates and status updates, following up regularly, involving patients when needed, correcting issues with denied claims, and thoroughly notating all account activities. The overall message is that payment can be obtained through polite but resolute persistence rather than forceful tactics.
I was excited as well as honored when asked to expand my in-service program to include Insurance collections and follow-up. Please see below for more details of the seminar.
Specific Collection / Revenue Generating Seminars for the Provider’s Insurance collectors
Our Exceptional Customer Service / Collection Seminars has included the provider’s insurance collectors, we are developing seminars specific for the provider’s insurance collection / revenue generating associates.
A sample of the additional topics covered in our seminars:
5 W’s for collecting claims.
Call preparation.
Initiation of the call.
The follow-up.
Retorts.
Patient involvement – important to apply “Exceptional Customer Service” principles.
Desired goals of the insurance revenue generating seminars:
Increase cash flow
Reduce “days”
Identify and reduce insurance carriers with slow payment history.
Reverse carrier’s elongated remittance habits or culture.
Build and re-new a robust, tenacious insurance revenue generating team.
This document provides an overview and objectives for a STAR Training on customer service. The training covers using the AER (Acknowledge, Empathize, Reassure) technique, answering calls appropriately, demonstrating customer service skills, and managing customer cases. It includes sections on the contact handling process with steps like preparing for contact, answering calls, and managing the customer relationship through building rapport and resolving requests. Examples of affirmative language and active listening techniques are also discussed. The overall goal is for participants to demonstrate their role in serving customers and applying the skills and processes taught to improve customer satisfaction.
The document discusses the core skills needed to be a trusted advisor: the ability to earn trust, give advice, and build relationships. It explains that trusted advisors value maintaining relationships over short-term gains. Building trust is a multi-stage process involving engaging with clients, listening to understand their needs, framing issues collaboratively, envisioning solutions together, and committing to agreed upon actions. Trusted advisors focus on understanding clients' perspectives and priorities rather than just providing rational solutions.
The document provides guidance on conducting a 5-step workplace risk assessment. It explains that a risk assessment identifies hazards, decides who may be harmed and how, evaluates risks and implements controls, records the findings, and reviews the assessment. The 5 steps include identifying hazards, identifying those at risk, evaluating risks and controls, recording the assessment, and reviewing it periodically. The guidance stresses that risk assessment should be a practical process to focus on significant hazards and control risks in a way that is reasonable and proportionate to the risk.
The document provides guidance on conducting a 5-step workplace risk assessment. It explains that a risk assessment identifies hazards, decides who may be harmed and how, evaluates risks and implements controls, records findings, and reviews the assessment. The 5 steps include identifying hazards, identifying those at risk, evaluating risks and controls, recording the assessment, and reviewing it periodically. The guidance stresses that risk assessment should be a practical process to focus on significant hazards and control risks in a way that is reasonable and proportionate to the risk.
The “Course Topics” series from Manage Train Learn and Slide Topics is a collection of over 4000 slides that will help you master a wide range of management and personal development skills. The 202 PowerPoints in this series offer you a complete and in-depth study of each topic. This presentation is on "Customer Complaints".
This document provides information on dealing with difficult people and opposition in negotiations and selling. It discusses different types of difficult people like the Sherman Tank, Exploder, Complainer, Clam, Wet Blanket, Know-It-All, and Staller. For each type, it describes their behaviors and provides tips on how to cope with them, such as maintaining composure, active listening, and asking open-ended questions. The document also discusses two types of opposition - idea opponents and visceral opponents. Idea opponents disagree based on logic while visceral opponents take it personally. It emphasizes avoiding public embarrassment and making opponents when presenting your case.
This document provides an overview of a safety and security training course. It begins with information on fire alarms, exits, facilities and conduct during the course. The outlines cover private security industry, communication, health and safety, fire safety, and emergency procedures. The document then goes on to define security and the private security industry. It describes the three main types of security provision - manned security, physical security systems, and technical systems. The roles of various security operatives are outlined. The document emphasizes the importance of professionalism in the security industry and communication and customer care skills. It covers health and safety procedures, risks, hazards, and personal protective equipment. First aid duties and fire safety are also summarized.
This document discusses establishing healthy boundaries in the attorney-client relationship. It emphasizes the importance of respect, trust, and rapport between attorneys and clients. Some key points discussed include setting reasonable expectations with clients, understanding client goals, developing a shared understanding of each party's role and responsibilities, and maintaining open communication. The document also provides guidance on addressing potential issues that could challenge boundaries, such as clients with mental illness, domestic violence victims, cultural differences, and difficult personalities. Throughout, it stresses maintaining a normal client-attorney relationship built on mutual understanding and respect.
Similar to Recognising, assessing and reducing risks (20)
Security systems have advanced to include sophisticated alarm systems that alert staff to incidents and allow for quicker response. Modern systems use IP technology to integrate access control, intruder alarms, CCTV, fire alarms and more. This allows different systems to communicate and provide all-round site protection 24/7. Alarm panels control integrated systems, sounding audible and visual alerts while sending emergency signals. False alarms can disrupt operations so systems must be properly installed and maintained to prevent unnecessary activations.
Access and egress control procedures help restrict access to and exit from a site by unauthorized people or vehicles. Effective procedures help control who is on site, reduce crime, protect security staff, and allow for safe evacuations. Common control methods include physical barriers, security checkpoints, visitor logs, patrols, and electronic systems like keypads or biometrics. Security officers monitor gates and barriers, check passes, log visitor details, and deny access to unauthorized individuals.
This document provides information on security officers' powers regarding trespassing, arrest, use of force, and evidence. It discusses when security officers can ask someone to leave for trespassing, the steps for removing a trespasser, and when trespass becomes a criminal offense. The document also outlines when security officers can make arrests for various crimes and indictable offenses, as well as how to conduct and report arrests. It provides guidance on appropriate use of force and what constitutes evidence that security officers should preserve and provide to police.
A security officer might record information about on-site incidents using three types of documents: incident reports, log books, and personal notebooks. When writing reports or using notebooks, the security officer needs to remember the ABCs - being accurate, brief, and clear.
EAS stands for Electrical Article Surveillance, a system used in shops to prevent theft. The two main parts of a CCTV system are cameras and monitors. Building maintenance systems are used to alert security and staff to potential problems on site.
There are three types of searches: general, random, and specific. When conducting a vehicle search, it is important to consider whether the vehicle is properly parked, in a safe search area, and has sufficient lighting. Completing search records properly is essential to demonstrate compliance with search policies, protect security staff from accusations, and provide evidence for legal or disciplinary actions.
Security officers control access and egress on a site to reduce crime, protect staff and visitors, and handle evacuations. They may be asked to man gates/checkpoints/barriers, check passes, and verify authority to enter. Statutory agencies are organizations allowed by law to enter premises, such as police officers and fire safety inspectors.
A security officer may have to deal with checking people, searching people, property or premises, and removing trespassers while on patrol. Assignment instructions explain the tasks security officers must complete, how to carry them out, and when to do patrols. Confidentiality means ensuring information is only accessible to authorized individuals.
Proactive service delivery aims to identify differences between customer expectations and actual experiences to reduce potential conflicts. It involves trying to defuse conflict by addressing issues before escalation occurs. The stages of escalation from least to most severe are: frustration, anger, aggression, and violence. The TACT model stands for think safety first, assess the situation, consider your options, and take action. The SEW model stands for subjects, environment, and weapons.
The document discusses conflict resolution and aggression. It begins by asking the reader to name the two sides of the brain involved in dealing with conflict, as well as asking them to define the term "fight or flight." It then prompts the reader to list four common triggers for aggression, including being ignored, rejected, disrespected, or patronized. Finally, it asks the reader to name three inhibitors to stop someone from using violence, such as self control, social consequences, personal values, and fear of loss or damage.
The document discusses the private security industry. It identifies three ways that security is provided: through manned security like security officers and door supervisors, physical security systems like locks and barriers, and security sensors and alarms. It also notes that in the UK, the Security Industry Authority regulates security operatives and companies, and that an SIA license must be renewed every five years.
The document discusses different types of laws as either criminal or civil. It asks the reader to identify scenarios such as money owed, assault, theft, and drugs offenses as either criminal or civil laws. It then asks about additional scenarios like slander, fraud, adoption, and robbery. Finally, it asks which act brought about regulation of the UK's security industry.
This document defines hazards and risks in the workplace. Hazards are things that have the potential to cause harm, while risks are the likelihood of harm occurring. Typical workplace hazards listed include slips, trips and falls, misuse or abuse of machinery, and moving vehicles. Common personal protective equipment carried by security operatives are defined as high-visibility clothing, rubber gloves and face-shields for dealing with body fluids, and stab-resistant vests.
Fire needs three elements to start and survive: heat, fuel, and oxygen. A fire warden or marshal's tasks may include assisting with fire risk assessments, reporting equipment faults, fighting fires if safe to do so, and liaising with the fire service. Fire extinguishers are labeled with different colors indicating their contents: black contains CO2, cream contains foam, blue contains powder, and red contains water.
The document provides information about emergency contact numbers, suspicious behaviors indicating hostile reconnaissance, and concepts related to sexual exploitation and crimes. It lists 911 and 999 as emergency contact numbers. It identifies four types of suspicious behaviors: interest in CCTV systems, making notes or drawings of a site, damage to perimeter security, and trespassing or loitering with no good reason. It defines a business continuity plan as ensuring a business can survive threats, emergencies, or incidents.
This document discusses non-verbal communication and examples of poor customer service. It asks the reader to provide the phonetic spelling of the word "exhaustion".
Specifically, it defines non-verbal communication as everything done to communicate other than speaking. It lists three examples of poor customer service: using poor communication skills, expressing a lack of concern, and making jokes or being rude. Finally, it asks the reader to use the phonetic alphabet to spell out "exhaustion".
This document outlines the objectives and content of a Level 2 Physical Intervention training course for private security professionals. The course aims to provide knowledge of the law around physical intervention and teach competency in disengagement techniques and safer holding techniques. Key topics covered include conflict resolution models, when physical intervention should be used as a last resort, reasonable force, medical risks, team strategies, and post-incident procedures.
The document provides information on effective communication skills for security operatives. It discusses the importance of communication in their roles, as they regularly interact with both internal and external customers. It outlines best practices for verbal, non-verbal, and written communication. Specific guidance is given around telephone, radio, and in-person communication with customers to ensure a professional and respectful approach.
Fire safety is important to protect staff, visitors, and property. A fire can disrupt business and harm people. Good fire prevention includes electrical safety, storage of flammables, and waste disposal. Employers must conduct risk assessments and provide training. Fires grow due to heat, fuel, and oxygen. Different types of fires require specific extinguishing methods. Fire extinguishers should only be used for small fires when escape is assured. Evacuation procedures and fire wardens help ensure safe evacuation during an emergency.
This document discusses various laws and acts that govern security work in the UK, including:
1. Civil laws that deal with disputes between individuals and organizations, and have a lower standard of proof than criminal laws.
2. Criminal laws that aim to prevent serious offenses like murder and assault, and are prosecuted by the state with penalties like fines or imprisonment requiring proof beyond reasonable doubt.
3. The Private Security Industry Act of 2001 which established the Security Industry Authority to regulate the private security industry through licensing, approving companies, and setting training standards.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
2. 2
Managing customer’s expectations
When customer’s visit the premises or site where you are
working, they will already have preconceived ideas of what to
expect regarding:
● What services, goods, facilities or entertainment
will be provided
● How they should be treated by members of staff,
including the security team.
Problems may occur, however, when someone you are dealing
with has misguided or unrealistic expectations.
Part of providing good customer service is being able to
understand and then manage customers’ expectations.
NEXT
3. 3
Proactive service delivery
For example…
To try to prevent incidents of conflict with people in the
workplace, we need to employ PROACTIVE SERVICE DELIVERY
strategies where we can.
Proactive service delivery is identifying where common
differences between people’s expectations and the actual
experience come about, and seeing what can be done to
reduce incidents where conflict may occur from happening
in the first place.
NEXT
4. 4
Possible point of conflict
Some people may object to being asked to show proof
of age before entering a venue or site that sells alcohol.
COMMON POINT OF CONFLICT
Display clear signs on the approach to
the entrance explaining the condition
and the reason for it. Further politely
explain this to people if they ask for
the reason at the entrance.
PROACTIVE SOLUTION
NEXT
5. 5
Possible point of conflict
Some people become frustrated if they have to wait in
a queue for something.
COMMON POINT OF CONFLICT
Send a member of the security team along the
queue to apologise for and explain the reason for
the delay to people, let them know how long they
are likely to wait, and reassure them that they will
be served as soon as is practicably possible.
People become more frustrated when they do
not understand the reason for the delay.
PROACTIVE SOLUTION
NEXT
6. 6
Dealing with emotive conflict situations
● Be positive and productive in your attitude
● Be professional, welcoming, helpful, smart and polite
● Try to remain calm and rational at all times when handling
complaints or disputes
● Be well-informed about the various
aspects of your work
● Keep up-to-date with procedures and rules
● Have a good basic understanding of the
aspects of civil and criminal law
● Know where everything of interest on the
site is.
When dealing with emotive conflict situations (complaints):
NEXT
7. 7
At the same time, having happy or satisfied
customers tends to decrease the numbers of
problems for the security staff that work there.
Customers
Customers in particular need to be handled
properly because they are the reason that we
are there in the first place.
Satisfied customers continue to visit and
recommend the venue or site to others,
helping the management to reach its sales
targets or satisfaction levels, improving
its future prospects.
NEXT
8. 8
Active listening
It is vital that we listen carefully to what is being said to us.
We cannot deal with a problem if we do not fully understand
what the problem is.
Try not to pre-judge what they are saying
Let them finish explaining their side before
deciding how to resolve the situation
Ask extra questions if you need to, until
you are fully satisfied that you understand
what is being asked of you.
NEXT
9. 9
Reading between the lines
Emotional, distressed or angry people, particularly if they
are under the influence of something, often say things in
the heat of the moment that they don’t really mean.
We need to:
Try to ignore any criticisms or insults
that may be aimed at us
Try to concentrate on the real meaning
behind what the person is trying to say.
NEXT
10. 10
Acknowledging the complaint
Once you have heard their complaint, let them know
that you understand why they are upset or frustrated.
This is sometimes called showing empathy.
Always acknowledge their complaint, regardless of
whether it turns out to be a legitimate one at the end.
NEXT
11. 11
Apologising
Do not be afraid to apologise if it turns out
that the complaint is a legitimate one.
Sometimes apologising will go a long way
towards reducing any possible conflict
before you have a chance to fully deal
with the actual complaint.
NEXT
12. 12
Explaining
Sometimes a complaint or dispute can
be resolved by simply explaining the
appropriate laws, rules or procedures
to them, and explaining the reasons
for them.
NEXT
13. 13
Providing options
Where you can, provide the person with any possible options
they have.
‘I’m sorry we are full capacity at
the moment. Please let me
recommend another great venue’.
‘Would you prefer to
speak to a supervisor
or manager?’
‘Would you like to make a formal complaint?’
Allowing the person to decide which option to take can, again,
reduce the conflict and prevent the situation from escalating.
NEXT
14. 14
Saying ‘No’
Saying ‘no’ can be very difficult for some people.
None of us likes to feel unpopular, and most of us do not like
getting an aggressive reaction when we have to say ‘no’ to
someone else.
Part of security work involves enforcing rules,
regulations and saying ‘no’ to people.
As long as we are correct and within our rights to
say ‘no’ to people for whatever reason, we should
be able to do so without making excuses, feeling
embarrassed, being nervous, beating around the
bush or giving overly-long explanations.
NEXT
15. 15
How to say ‘No’
● Identify situations that will require you to say ‘no’
● Practice saying ‘no’
● Prepare a polite but firm refusal
● Refuse to feel guilty about saying ‘no’ –
it’s part of your job
● Use a definite tone of voice –
don’t hesitate or sound unsure
● Remember that you are refusing
a request, not rejecting a person
● Remember that refusals do not
have to be heavy, aggressive or
hurtful.
NEXT
16. 16
Stages of escalation
It is vital that security operatives are able to recognise
when a situation is escalating to a stage where a more
assertive or even evasive or physical response is required.
Incidents of aggression and violence do not just happen
unexpectedly without warning.
Imagine the 7 stages of boiling a kettle…
NEXT
17. 17
Stages of escalation
- the customer is calm, relaxed and rational.
You start off with a kettle full of cold water…
Flick the switch, and the kettle begins to heat the water…
- the customer gets frustrated about something.
- the customer starts to get angry if the situation isn’t resolved.
Minutes later the water starts to get warm…
- as the situation escalates, the customer starts to get
aggressive.
The water starts to boil…
NEXT
18. 18
Stages of escalation
- the customer turns to violence.
The water reaches boiling point…
- the situation ends, and the customer starts to calm
down again.
The kettle switches itself off and the water starts to cool
down again…
- the customer eventually returns to being calm, relaxed
and rational.
Eventually the water cools back down to being cold again…
NEXT
19. 19
Stages of escalation
Conflict situations escalate in stages…
FRUSTRATION ANGER AGRESSION VIOLENCE
Ideally we should try to prevent customers
from becoming frustrated in the first place.
Using pre-planned effective proactive
delivery service strategies will help with this.
NEXT
20. 20
Signs of escalation
Signs which may indicate an increase in aggressive attitude:
● Extended eye contact
● More threatening facial expressions
● A raised voice
● A change in body stance
● Enlarged movement of the hands
● Moving closer
● Obvious fidgeting as the person prepares to fight.
Security operatives will often get a gut-feeling when an encounter
is about to turn nasty, but they also need to take note of the
person’s words and body language in an attempt to predict any
aggressive action they might take.
NEXT
21. 21
Signs of escalation
● Head
● Eyes
● Lips
● Facial expressions
and colour
● Breathing
● Shoulders
● Hands
● Arms
Particular points to watch
● Feet
● Language
● Tone of voice
● Gesture
● Spacing.
Signs of escalation
NEXT
22. 22
Signs of escalation
● Prepare themselves both physically
and mentally for any imminent attack
● Summon the assistance of other
security staff
● Call the police
● Consider in advance their options
regarding the use of force.
Recognising these SIGNS OF
ESCALATION can help security
operatives to be able to:
NEXT
23. 23
Assessing the risks
There will be times where security operatives are
confronted with situations that are unique and cannot be
specifically catered for in any GENERIC RISK
ASSESSMENT or ASSESSMENT OF A PARTICULAR
TYPE of incident.
There are sometimes conflict situations where people
are hurt because they do not have a way of properly and
effectively ASSESSING THE RISKS there and then, and
as a result do not respond appropriately.
NEXT
24. 24
Dynamic risk assessments
Dynamic risk assessments help us to:
● Deal with any potentially difficult or dangerous situation
● Choose the correct response.
They are called dynamic risk assessments because they are
ongoing.
We use them before, during and after any conflict situation.
To ensure that your safety comes first, you are
encouraged to use what is called DYNAMIC RISK
ASSESSMENT all of the time.
NEXT
26. 26
TACT
THINK safety first
Do not rush in, think about your personal safety first.
ASSESS the situation
What are the possible threats involved?
CONSIDER your options
Consider what help you may need, and possible action
you could take.
TAKE action
Select the safest and most appropriate action, and take
it decisively.
NEXT
27. 27
SEW
SUBJECTS - Who are you dealing with?
Age, height, size, drink/drugs, emotional state, previous
history etc.
ENVIRONMENT - Where is the situation taking place?
Remote/secluded area, stairs, roads, furniture, escape
routes etc.
WEAPONS - Is there anything nearby that could be
used to hurt you?
Knives, bricks, bottles, wood, syringes, tools, furniture, etc.
NEXT
28. 28
Positioning
We can do this by:
● Maintaining a suitable/safe distance
● Showing non-aggression
● Ensuring that both parties can walk
away if they want to.
Maintain our own safety
Ensure we give the right impression
of our attitudes and intentions.
Positioning is important to:
NEXT
29. 29
Maintaining space
The actual distance we are from someone we are dealing
with can have a profound impact on the situation.
Certain situations can be helped by either increasing or
decreasing the distance between ourselves and the other
person.
There are basically THREE types
of spaces we need to consider…
NEXT
30. 30
Intimate space
Intimate space is when we are anything
up to about 0.5m away from someone.
● Partners
● Family
● Close friends.
To enter the personal space of somebody we
don’t know may well be seen as intimidating.
At the very least it could make the other person
feel very uncomfortable.
NEXT
31. 31
Normal/safe space
Normal space and safe space are the phrases given to the
normal distance there would be between us and someone we
are talking to in normal, relaxed circumstances.
● Someone approaching you to ask a
question at work
● Someone standing next to you that you are
having a drink with in a pub.
This normal or safe distance is usually
anything between 0.5 m and 1.2m.
NEXT
32. 32
Stranger space
Stranger space is anything from 1.2m up to 3m, which is not
normally close enough to have a proper one-to-one
conversation with them.
It is, however, the ideal space
when trying to talk to a group of
people.
NEXT
33. 33
Showing non-aggression
We need to be aware of how we come
across to the people we are dealing with.
We obviously need to be careful about
the words we use, but also about the
tone we use when speaking to them.
Our body language is also important.
NEXT
34. 34
Body language
● How do we look and sound to the other person?
● Do we look welcoming and ready to help?
● Are we showing the right attitude?
● Do we look interested or bored with the
conversation?
● Are we using appropriate eye contact?
● Do we look nervous?
● Do we look confident?
● Do we look aggressive or intimidating?
● Are we a suitable distance away and positioned
correctly?
● Are we using appropriate hand gestures?
● Is our stance appropriate?
NEXT
35. 35
Body language
If we look aggressive towards someone,
they are more likely to be aggressive
towards us.
If we look professional and helpful we
are far more likely to get a better
response from the person or people
we are dealing with.
How do we look?
NEXT
36. 36
Escape exit
During any encounter or situation, all parties concerned
need to feel that they are safe and that they can walk away
if they wish to at any stage.
Security operatives need to feel that they always have
enough room to be able to walk away to summon help
or evade attack if they need to.
The people we are dealing with need the same.
NEXT
Editor's Notes
Title slide.
Managing customers expectations
Part of providing good customer service is being able to understand and then manage customers’ expectations.
When members of the public, be they customers or work colleagues, visit the premises or site where you are working, they will already have preconceived ideas of what to expect. They will already have a rough idea of what services, goods, facilities or entertainment will be provided, and will also have expectations as to how they should be treated whilst they are there.
They will also have ideas about how they should be treated by members of staff, including the security team.
Problems may occur, however, when someone you are dealing with has misguided or unrealistic expectations. If they disagree with one of the rules or regulations on the site, and object to a security operative attempting to change their behaviour, then this is where conflict can raise its ugly head.
Proactive service delivery
In an effort to try to prevent incidents of conflict with people in the workplace, we need to employ proactive service delivery strategies where we can.
Proactive service delivery is all about identifying where the common differences between people’s expectations and the actual experience come about, and seeing whether there is anything that can be done to reduce incidents where conflict may occur from happening in the first place.
For example…
COMMON POINT OF CONFLICT-
Some people may object to being asked to show proof of age before entering a venue or site that sells alcohol.
PROACTIVE SOLUTION-
Display clear signs on the approach to the entrance explaining the condition and the reason for it. Further politely explain this to people if they ask for the reason at the entrance.
COMMON POINT OF CONFLICT-
Some people become frustrated if they have to wait in a queue for something.
PROACTIVE SOLUTION-
Send a member of the security team along the queue to apologise for and explain the reason for the delay to people, let them know how long they are likely to wait, and reassure them that they will be served as soon as is practicably possible. People become more frustrated when they do not understand the reason for the delay.
Defusing emotive conflict situations
Security operatives should always try to be positive and productive in their attitude when dealing with members of the public. They should try to remain calm and rational at all times when handling complaints or disputes.
As well as being professional, welcoming, helpful, smart and polite, security operatives also need to be well-informed about the various aspects of their work. They should keep themselves up to date on any particular policies that the organisation they work for puts in place, particularly its security procedures and rules. They need to have a good basic understanding of the aspects of civil and criminal law relating to their role, and need to know where everything of interest on the site is.
Customers in particular need to be handled properly because they are the reason that we are there in the first place. Satisfied customers continue to visit and recommend the venue or site to others, helping the management to reach its sales targets or satisfaction levels, improving its future prospects. At the same time, having happy or satisfied customers tends to decrease the numbers of problems for the security staff that work there.
Active listening
When dealing with a query, it is vital that we listen carefully to what is being said to us. We cannot deal with a problem if we do not fully understand what the problem is.
Try not to pre-judge what they are saying. Let them finish explaining their side before deciding how to resolve the situation. Ask extra questions if you need to, until you are fully satisfied that you understand what is being asked of you.
Read between the lines
Emotional, distressed or angry people, particularly if they are under the influence of something, often say things in the heat of the moment that they don’t really mean. We need to try to ignore any criticisms or insults that may be aimed at us, and try to concentrate on the real meaning behind what the person is trying to say.
Acknowledge their complaint
Once you have heard their complaint, let them know that you understand why they are upset or frustrated. This is called showing empathy. Acknowledge their complaint, regardless of whether it turns out to be a legitimate one at the end.
Do not be afraid to apologise if it turns out that their complaint is a legitimate one. Sometimes that will go a long way to reducing any possible conflict before you have a chance to fully deal with their complaint.
Sometimes a complaint or dispute can be resolved by simply explaining the appropriate laws, rules or procedures to them, and explaining the reasons for them.
Where you can, provide the person with any possible options they have. Consider offering the suggestion of another venue or site that can provide what the person wants if appropriate. Would it be useful and appropriate to offer the person the chance to speak further about the problem with your supervisor or manager? Is there a formal complaints procedure that they could use? Allowing the person to decide which option to take can, again, reduce the conflict and prevent the situation from escalating.
Saying ‘no’ can be very difficult for some people. None of us likes to feel unpopular, and most of us do not like getting an aggressive reaction when we have to say ‘no’ to someone else. Part of security work involves enforcing rules regulations and saying ‘no’ to people.
As long as we are correct and within our rights to say ‘no’ to people for whatever reason, we should be able to do so without making excuses, feeling embarrassed, being nervous, beating around the bush or giving overly-long explanations.
Identify situations that will require you to say ‘no’;
Practice saying ‘no’;
Prepare a polite but firm refusal;
Refuse to feel guilty about saying ‘no’ – it’s part of your job;
Use a definite tone of voice – don’t hesitate or sound unsure;
Remember that you are refusing a request, not rejecting a person; and
Remember that refusals do not have to be heavy, aggressive or hurtful.
It is vital that security operatives are able to recognise when a situation is escalating to a stage where a more assertive or even evasive or physical response is required.
Incidents of aggression and violence do not just happen unexpectedly without warning.
Imagine the 7 stages of boiling a kettle…
You start off with a kettle full of cold water…
- the customer is calm, relaxed and rational.
Flick the switch, and the kettle begins to heat the water…
- the customer gets frustrated about something.
Minutes later the water starts to get warm…
- the customer starts to get angry if the situation isn’t resolved.
The water starts to boil…
- as the situation escalates, the customers starts to get aggressive.
The water reaches boiling point…
- the customer turns to violence.
The kettle switches itself off and the water starts to cool down again…
- the situation ends, and the customer starts to calm down again.
Eventually the water cools back down to being cold again…
- the customer eventually returns to being calm, relaxed and rational.
Conflict situations escalate in stages.
FRUSTRATION - ANGER - AGGRESSION - VIOLENCE
Ideally we should try to prevent customers from becoming frustrated in the first place. Using pre-planned, effective, proactive delivery service strategies will help with this.
Security operatives will often get a gut-feeling when an encounter is about to turn nasty, but they also need to take note of the person’s words and body language in attempt to predict any aggressive action they might take.
Signs which may indicate an increase in aggressive attitude include extended eye contact, more threatening facial expressions, a raised voice, a change in body stance, enlarged movement of the hands, moving closer and obvious fidgeting as the person prepares to fight.
Particular points that need watching if the security operative thinks they are about to be attacked include:
Head;
Eyes;
Lips;
Facial expressions and colour;
Breathing;
Shoulders;
Hands;
Arms;
Feet;
Language;
Tone of voice;
Gesture; and
Spacing.
If security operatives can learn to recognise these signs of escalation, then they can prepare themselves both physically and mentally for any imminent attack. It will also give them time to summon the assistance of either other security staff, or even the police, and to consider in advance their options regarding the use of force.
It is not always possible to prevent conflict from happening in the workplace, and some situations will have to be approached and managed carefully.
There will be times where security operatives are confronted with situations that are unique and cannot be specifically catered for in any generic risk assessment or assessment of a particular type of incident. There are sometimes conflict situations where people are hurt because they do not have a way of properly and effectively assessing the risks there and then, and as a result do not respond appropriately.
To ensure that your safety comes first, you are encouraged to use what is called dynamic risk assessment all of the time.
Dynamic risk assessments should be used as you deal with any potentially difficult or dangerous situation, and will help you to choose the correct response in any given situation.
They are called dynamic risk assessments because they are ongoing. We use them before, during and after any conflict situation.
Using TACT and SEW
Assessing situations: TACT
Assessing specific threats: SEW
Dynamic risk assessment
Before you start to deal with a situation you need to use TACT:
T - THINK safety first
do not rush in, think about your personal safety first.
A - ASSESS the situation
what are the possible threats involved?
C - CONSIDER your options
consider what help you may need, and possible action you could take.
T - TAKE action
select the safest and most appropriate action, and take it decisively.
Using the TACT model will help you to keep yourself safe and ensure that you take the most appropriate course of action to resolve the situation.
Assessing specific aspects of the threat
A simple but effective way of assessing specific threats in relation to the situation where the incident is taking place, the person or people involved and any potential weapons, is to use the SEW model.
S - SUBJECTS - who are you dealing with?
Age, height, size, drink/drugs, emotional state, previous history, etc.
E - ENVIRONMENT - where is the situation taking place?
Remote/secluded area, stairs, roads, furniture, escape routes etc.
W - WEAPONS - is there anything nearby that could be used to hurt you?
Knives, bricks, bottles, wood, syringes, tools, furniture, etc.
Positioning
We need to ensure that we try to get ourselves into the best position in relation to the other person, to maintain our own safety and to make sure that we give the right impression of our attitudes and intentions to the other person.
We do this by:
Maintaining a suitable/safe distance;
Showing non-aggression; and
Ensuring that both parties can walk away if they want to.
Maintaining space
The actual distance we are from someone we are dealing with can have a profound impact on the situation. Certain situations can be helped by either increasing or decreasing the distance between ourselves and the other person.
There are basically three types of spaces we need to consider…
Intimate space is when we are anything up to about 0.5m away from someone. We would normally only ever get this close to another person if they were our partners, family or very close friends. To enter the personal space of somebody we don’t know may well be seen as intimidating. At the very least it could make the other person fell very uncomfortable
Normal space and safe space are the phrases given to the normal distance there would be between us and someone we are talking to in normal, relaxed circumstances. Imagine someone approaching you to ask a question at work, or the distance you might be from someone standing next to you that you are having a drink with in a pub. This normal or safe distance is usually anything between 0.5 m and 1.2m.
To ensure that you are using the safe or normal distance when dealing with someone in the workplace, try to make sure that you are far enough away from them to be able to see the whole of their body, including their feet. This will mean that you are close enough to them to have a reasonable one-to-one conversation with them, but you are far enough away to be able to see any changes in their body language, which will give you enough time to react if the situation escalates.
Stranger space is anything from 1.2m up to 3m, which is not normally close enough to have a proper one-to-one conversation with them. It is, however, the ideal space when trying to talk to a group of people.
Showing non-aggression
We also need to be aware of how we come across to the people we are dealing with. We obviously need to be careful about the words we use, but also about the tone we use when speaking to them.
Our body language is also important.
How do we look and sound to the other person?
Do we look welcoming and ready to help?
Are we showing the right attitude?
Do we look interested or bored with the conversation?
Are we using appropriate eye contact?
Do we look nervous?
Do we look confident?
Do we look aggressive or intimidating?
Are we a suitable distance away and positioned correctly?
Are we using appropriate hand gestures?
Is our stance appropriate?
If we look aggressive towards someone, they are more likely to be aggressive towards us.
If we look professional and helpful, on the other hand, we are far more likely to get a better response from the person or people we are dealing with.
Escape exit
During any encounter or situation, all parties concerned need to feel that they are safe and that they can walk away if they wish to at any stage.
Security operatives need to feel, particularly in conflict situations, that they always have enough room to be able to walk away to summon help or evade attack if they need to.
The people we are dealing with need the same.
Security operatives need to ensure that as well as using suitable spacing between themselves and those they are dealing with, and that they are displaying the right behaviour so that they do not come across as being aggressive, that they are aware of the possibility that the other person may wish to walk away from the situation.
Do not physically block them into a corner or a small space, as this may make them feel trapped. People who feel trapped tend to feel frightened, which may accidentally escalate the situation, or worse still, trigger them into lashing out at you.
During any encounter, make sure that both you and the other person always have an easy escape route, be that by leaving the room or just being able to walk away from the situation.