0% found this document useful (0 votes)
342 views98 pages

CCTV Operator: Working As A

Uploaded by

dcold6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
342 views98 pages

CCTV Operator: Working As A

Uploaded by

dcold6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 98

The UK and Middle East’s leading supplier of compliance, work-based

learning and apprenticeship training materials.

TUTOR:

Enter tutor name here


Enter tutor number here
CENTRE:

Enter centre name here

Enter centre number here

quality, value, service & integrity


18 March 2021

Ed.6 April 2021

Working as a
CCTV Operator
Highfield Place, Shaw Wood Business Park,
Shaw Wood Way, Wheatley Hills, Doncaster, DN2 5TB, UK
Tel 01302 363 277
www.highfield.co.uk

© 2021 Highfield Products Limited


All rights reserved. No part of this product may be reproduced, stored in a
retrieval system, or transmitted in any form or by any means, including
electronic, photocopying, recording or otherwise, without the prior
permission of Highfield Products Ltd. The commission of any
unauthorised act may result in civil or criminal actions. The publisher of
this product has made every effort to ensure the accuracy of the
information contained in this product. However, neither the author, nor
Highfield Products Ltd nor anyone involved in the creation of this
publication accepts any responsibility for any inaccuracies or failure to
implement correctly, however caused.

The UK and Middle East’s leading supplier of compliance, work-based learning


and apprenticeship training materials.

● A family-run business, employing over 250 staff worldwide,


including internationally recognised subject matter experts
● Over 2 million people are trained every year using Highfield
products
● Over 20,000 trainers and approved centres deliver Highfield
qualifications
● A client list comprising the world’s most recognisable
organisations in their field
● Internationally recognised accredited qualifications.

1
Why use Highfield?

Everything we do centres around our core values of:

● quality - leading international industry experts from


all fields, with supporting training materials available
from Highfield
● value - we will not be beaten on value. We concentrate
on the areas important to our clients, including
dedicated customer support, exceptional supporting
documentation and unbeatable service and
turnaround times
● service - we provide all of our centres with their own
dedicated account manager and have a turnaround
time of 4 working days for results and certification
● integrity - we provide our centres with accurate and
honest information at all times - we never put profit
before good advice.

Ground rules

● Fire escapes
● Toilets
●As a courtesy to others,
Smoking
please set your mobile phone
●toDrinks
SILENT MODE
● Breaks
●Mobile
Lunch phones must
●be SWITCHED OFF
Questions
●and removed
Talking from the desk
over others
during the examination.
● Respect others’ points of view
● Timekeeping

Key

Class Individual Key KEY POINT


question exercise point

Group Class CE
Law
exercise exercise

Key
Definition Key Task
Navigation
task

2
Module guide

1 Module 1: Principles of working in the private security


industry

Module 2: Principles of working as a door supervisor


2 in the private security industry

Module 3: Application of conflict management


3 in the private security industry

Principles of working in the


private security industry 1
8

Learning outcomes

This module covers:

the private security


1:1 1:7 communication skills
industry

1:2 legislation 1:8 record-keeping

1:3 arrest procedures 1:9 terror threats

1:4 safe working practices 1:10 vulnerable people


post-incident
1:5 fire procedures 1:11
management.
1:6 emergencies

3
The private security industry
1:1
10

10

What is security?

11

11

Main aims of security

● Prevent and detect crime


● Prevent or reduce loss, waste
and damage
● Monitor and respond to safety
risks.

12

12

4
Security provision

Security can be provided to clients in 3 main ways:

● manned security
● physical security
● systems.

13

13

SIA

The SIA has 3 main aims:

the compulsory licensing of individuals


undertaking designated activities within the
private security industry

to recognise quality service by managing the


voluntary Approved Contractor Scheme (ACS)

to introduce business licensing for all regulated


security companies.

14

14

Approved Contractor Scheme (ACS)

Designed to raise standards of security companies

These companies will assist the SIA with developing


new opportunities

Increases customer confidence in the private


security industry.

15

15

5
SIA

The SIAs main functions are to:

● protect the public by regulating the industry through licensing


● raise standards
● introduce business licensing for all regulated security
businesses
● monitor the activities and effectiveness of those working
in the industry
● set and approve standards of conduct, training and supervision
within the industry
● keep under review the private security industry and the
operation of the legislative framework
● increase customer confidence.

16

16

Individual licensing

The SIA currently licenses:

● door supervisors
● security officers (guarding/key holding)
● cash and valuables in transit operatives
● CCTV operators
● close protection operatives

You MUST have an SIA licence before you can


start work.

17

17

Door supervisors

Door supervisors:
those who carry out security duties in or at
licensed premises, like pubs and
nightclubs, preventing crime and disorder
and keeping staff and customers safe.

18

18

6
Security officers: guarding

Security officers (guarding):


those who guard premises against
unauthorised access or occupation,
outbreaks of disorder, theft or damage.

19

19

Security officers: key holding

Key holding
Key holding is where a security officer keeps custody of,
or controls access to, any key or similar device for
operating (whether mechanically, electronically or
otherwise) any lock.

20

20

Cash and valuables in transit (CVIT)

Cash and valuables in transit operatives:


those who guard property against destruction
or theft while using secure transportation of the
property in specially manufactured vehicles.

21

21

7
CCTV

CCTV operators:
those who carry out guarding activities using closed-circuit
television equipment to either monitor the activities of
members of the public in a public or private place, or to
identify a particular person.

22

22

Close protection

Close protection operatives:


those who guard one or more individuals
against assaults or injuries that might be
suffered as a consequence of the
unlawful conduct of others.

23

23

Vehicle immobilisers

Vehicle immobilisers:
security operatives who either
remove or relocate vehicles, restrict
the movement of vehicles using a
device or release vehicles after
demanding or collecting a charge

BUT - only licensed by the SIA in Northern Ireland.

24

24

8
Individual licensing

Licensing ensures that security operatives are:

● ‘fit and proper’ persons


● properly trained and qualified to do their jobs

The SIA sets standards of conduct, training


and supervision within the industry.

25

25

Getting a licence

● Apply to the SIA itself


● Your identity will be verified
● Specified training must be undertaken
● Your criminal record will be checked
● A license fee will be payable
● Licence will last for 3 years before renewal.

26

26

Working without a licence

Criminal offence

Fines of up to £5,000

Up to a 6-month prison sentence

Criminal offence for an employer to use


an unlicensed security operative.

27

27

9
Standards of behaviour

28

28

Standards of behaviour cont.

29

29

SIA Code of Behaviour

Security operatives MUST always


conduct themselves:

in strict accordance with the SIA’s Code


of Behaviour for their particular role within
the industry

according to their own organisation’s values


and standards.

30

30

10
Community safety initiatives

● Improving the physical security of vulnerable areas


● Improve the environment
● Removing the means and opportunities to commit
crime
● Provide funding for extra lighting and CCTV
Communal radio systems
● Pubwatch/Shopwatch initiatives
● Warning signs
● Using CCTV
● Using the yellow and red warning cards.

31

31

Aims of crime reduction initiatives

To try to reduce:

● crime
● public disorder
● reoffending
● antisocial behaviour
● substance misuse
● vandalism/graffiti.

32

32

Assignment instructions - A.I.s

Assignment instructions (A.I.s)


These are a set of written guidelines on what needs
to be done and how it should be done on that particular site

Complying with these instructions will


ensure you stay within the law and the
client’s requirements.

33

33

11
A.I.s

CONFIDENTIAL
SECURITY
CLIENT OPERATIONAL
COMPANY
PROCEDURES

SECURITY
DUTIES.
OPERATIVE

34

34

A.I.s cont.

A.I.s contain details and instructions on:

● duty times ● health and safety issues

● site plans ● first-aid procedures


● site risks ● methods for calling the
emergency services
● location of high-value
property ● important contact
telephone numbers
● areas of vulnerability
● emergency and
● patrol times/routes
evacuation procedures
● access/egress procedures
● alarm/surveillance systems
● search procedures
● methods of communication
● reporting procedures ● relevant documents.

35

35

A.I.s cont.

● Always read the A.I.s when you start on


a new site
● Keep yourself up to date with the contents
● You may need to sign a form confirming
that you have read the A.I.s at the start of
each shift

A.I.s are CONFIDENTIAL documents –


keep them secure.

36

36

12
Benefits of using CCTV

● Prevents crime
● Reduces incidents
● Reduces costs/risks by not
having to employ additional
patrolling staff
● Can provide clear evidence
for investigations
● Can be used as evidence in court.

37

37

What are the legal implications


of using CCTV?

38

38

Data protection legislation


when using CCTV

● The ICO approval includes the declared


time that footage can be retained on the system
before it over-records
● Approved list of who can access the CCTV system
known as ‘authorised persons’
● Recordings must be used appropriately.

39

39

13
Limitations of CCTV

● Privacy issues and concerns


● Vulnerable to damage and vandalism
● Misuse
● Cannot prevent crime
● Cost
● Familiarity with scope of cover
● Technology vulnerabilities.

40

40

Key Task 1

1 What does the abbreviation SIA stand for?

...................................................................................................................
...................................................................................................................
...................................................................................................................

41

41

Key Task 1

2 Describe the THREE main aims of the SIA.

1
…...................................................................................................

…...................................................................................................
2
…...................................................................................................

…...................................................................................................
3
…...................................................................................................

…...................................................................................................

42

42

14
Key Task 1

Identify FIVE standards of behaviour


3 expected of a security operative.

1
…...................................................................................................
2
.…..................................................................................................
3
..….................................................................................................
4
...…................................................................................................
5
...…................................................................................................

43

43

Legislation
1:2
44

44

Civil law

Civil laws usually deal with disputes between people,


companies or other organisations

They deal with things like:


● libel
● slander (known as
defamation in Scotland)
● personal injury cases
● trespass.

45

45

15
Civil law cont.

Other cases dealt with under civil law include:

● family and matrimonial disputes


● personal injury cases
● employment law
● breach of contract

The standard of proof is ‘on the balance of probabilities’.

46

46

Trespass

Trespass:
A trespass is committed by a person who is
improperly on someone else’s property without
consent.

47

47

Trespass cont.

Trespass:
● is not normally a criminal offence
● can be actionable through the civil
courts
● is an act of interference against
the ‘lawful occupier’.

48

48

16
Trespass cont.

Security operatives may ask people to leave a premise if they:

have no reason to be there

break criminal laws

break licensing laws

breach specific premise rules or conditions

start to display unacceptable behaviour.

49

49

REACT

REACT explains the best way to remove a trespasser

Request them to leave

Explain the reasons for the request

Appeal for them to leave, explaining what will happen


if they do not

Confirm that they are still refusing to leave peacefully

Take action (eject).

50

50

Criminal law

● Criminal laws are in place to prevent people


from committing more serious offences and to
punish people when those laws are breached
● Offences are usually committed against people
or property
● Cases are normally brought by the state
● Guilty verdicts can result in fines, probation
orders and terms of imprisonment
● The standard of proof in the criminal courts
is ‘beyond reasonable doubt’.

51

51

17
Serious crimes include:

● murder ● criminal damage


● rape (and with intent to
endanger life)
● assault (ABH,
GBH,GBH w/i) ● driving under the
influence
● sexual assault
● arson
● possession/
supplying of drugs ● child abuse
● possession of an ● domestic abuse
offensive weapon ● kidnapping or
● firearms offences holding someone
against their will.
● theft, fraud, robbery
and burglary

52

52

The Private Security Industry Act

The Act was brought in to:

● regulate the UK’s private security


industry
● help raise standards of individuals
and companies
● increase the public’s confidence
in the sector
● increase public safety

The SIA is the government’s corporate body who regulate


the private security industry.

53

53

The Private Security Industry Act cont.

The act allows the SIA to:

● license individuals in specific sectors


● approve security companies
● monitor the activities and effectiveness of those
in the industry
● remove criminal elements from the industry
● keep the industry under review
● conduct inspections
● set standards of training
and supervision
● make recommendations
to improve standards.

54

54

18
The Equality Act

A prejudice is a hostile attitude towards someone who


belongs to a certain group, simply because they belong to that
group, and are therefore assumed to have all of the characteristics
ascribed to that group

Stereotyping is when we lump certain


groups of people together, assuming that
they are all the same simply because
they belong to that group.

55

55

The Equality Act cont.

The Equality Act prohibits discrimination based on:

● age
● disability
● gender reassignment
● marriage and civil partnership
● pregnancy and maternity
● race
● religion
● sex
Known as ‘protected
● sexual orientation characteristics’.

56

56

The Equality Act cont.

The Equality Act also applies to:

● recruitment
● access to training
● pay and benefits
● promotion opportunities
● terms and conditions
● redundancy
● dismissal
● making reasonable adjustments
for employees with specific needs/disabilities.

57

57

19
Types of discrimination

Direct discrimination occurs when someone is


treated less favourably than another person because of a
protected characteristic they have or are thought to have, or
because they associate with someone who has a protected
characteristic

Indirect discrimination occurs when a policy or practice


that applies to everyone particularly disadvantages
people who share a protected characteristic.

58

58

The Human Rights Act

It is also made clear under the Human Rights Act that all
people have the right to be free from discrimination.

59

59

The Human Rights Act cont.

Human Rights Act articles:

Article 2 right to life

Article 3 prohibition of torture

Article 5 right to liberty and security

Article 6 right to a fair trial

Article 7 no punishment without law

Article 14 prohibition on discrimination.

60

60

20
Data Protection Act

Data Protection Act

● Control of data (images)


● Collection of images in public,
code of practice 2018
● 6 principles of data protection.

61

61

Data Protection Principles

(a) Processed lawfully, fairly and in a transparent manner

(b) Collected for specified, explicit and legitimate purposes and


not further processed in a manner that is incompatible with
those purposes

(c) Adequate, relevant and limited to what is necessary in


relation to the purposes for which they are processed.

62

62

Data Protection Principles cont.

(d) Accurate and, where necessary, kept up to date

(e) Kept in a form which permits identification of data subjects


for no longer than is necessary for the purposes for which the
personal data are processed

(f) Processed in a manner that ensures appropriate


security of the personal data.

63

63

21
Body-worn cameras (BWC)

● The wearer does not require a CCTV


operator licence
● Must be clearly visible to the person(s)
it is recording
● Images must be downloaded by an
authorised person
● Images must be stored securely on an
approved system
● Camera does not replace the need to
complete your notebook or company
documentation, e.g. incident reports.

64

64

Key Task 2

1 Describe civil law and criminal law.

Civil law Criminal law

65

65

Key Task 2

Identify the key legislation relating to equality


2 and diversity in the workplace.

...................................................................................................................
...................................................................................................................
...................................................................................................................

66

66

22
Key Task 2

Explain how the data protection regulation impacts your


3 role as a security operative.

...................................................................................................................
...................................................................................................................
...................................................................................................................

67

67

Arrest Procedures
1:3
68

68

Arrest

An arrest or apprehension is
the taking or restraint of a person from his liberty
in order that he shall be forthcoming to answer an
alleged crime or offence.

69

69

23
Arrest is a last resort

Taking away someone’s liberty is a very serious matter. Prior to


acting, you must consider:

● whether you have powers of arrest (is it an indictable offence?)


● how long until/can the police attend?
● how you are going to stop the person from leaving and where
are you going to this?
● whether you have a colleague to act as your witness
● if you are covered by CCTV
● if the person is likely to attempt to assault you

Remember, your safety is as important as a customer’s safety.

70

70

Indictable offences

Certain serious offences have been given a special condition


within the criminal law and are known as ‘indictable offences’

The majority of serious crimes that security operatives


come across will fall within this category

Indictable offences are those that may be tried at a


Crown Court.

71

71

Arrest for indictable offences

Section 24a of the Police and Criminal Evidence Act 1984 says that:
1) A person other than a constable (which includes
security operatives) may arrest without a warrant:
a) Anyone who is in the act of committing an
indictable offence
b) Anyone whom he has reasonable grounds for
suspecting to be committing an indictable offence
2) Where an indictable offence has been committed, a person
other than a constable may arrest without a warrant:
a) Anyone who is guilty of the offence
b) Anyone whom he has reasonable grounds for
suspecting to be guilty of it.

72

72

24
Arrest for indictable offences cont.

But this power of arrest is only exercisable if:

a) The person making the arrest has


reasonable grounds for believing
that for any of the reasons
mentioned it is necessary to arrest
the person in question
b) It appears to the person making
the arrest that it is not reasonably
practicable for a constable to make
it instead

Security operatives have no more powers of arrest than any other


citizen.

73

73

Reasons to arrest

The reasons to arrest are to prevent


the person from:

● causing physical injury to themselves


or any other person
● suffering physical injury
● causing loss of or damage to property
● making off before a constable can assume
responsibility for them.

74

74

Power of arrest

Offences under this section, for which all security operatives


have the same powers of arrest as other members of the
public include:

● murder/homicide ● drugs offences


● culpable homicide ● robbery
● assault (ABH, GBH ● theft
and GBH w/i) ● burglary/housebreaking
● rape ● fraud
● sexual assault ● criminal damage and
● firearms offences malicious mischief
(Scotland).

75

75

25
Breach of the peace

A breach of the peace is a common law


concept that has very ancient roots

In general terms it is considered to be:

‘any disorder or disruption to the peace


in public or in private that results in
violence, threat of violence or provokes
violence from another’.

76

76

When to arrest

Security operatives should only arrest someone


for one of the following reasons:
a) To prevent an offence being committed
b) To prevent the continuance of an offence
c) To prevent the renewal of an offence
d) To detain someone for an offence already
committed.

77

77

How to arrest

The person must be told:

Who you are The grounds for the


(if not obvious); arrest;
‘I am a member of the ‘I have just seen you
security team here’ breaking that window’

That they are under That the police will be


arrest; called.
‘You are under ‘We are calling the police
arrest……...’ and you must wait here
until they arrive’.
What they are being
arrested for;
‘…….for criminal
damage’

78

78

26
During an arrest

When carrying out an arrest:

● use everyday words


● do not ‘caution’ the suspect
● explain the reasons for the arrest
● only use force, if necessary, to prevent escape
or assault
● treat the person reasonably
● you are in charge of their welfare until the police arrive.

79

79

The arrest

After an arrest, you are responsible for the person


You must:

● ensure own safety


● ensure the person’s safety
● ensure the evidence is preserved
● hand over the person and the evidence
to the police; explain reason for arrest in
front of person and police
● record the arrest
● assist police with a statement
● possibly attend court to give evidence
● discuss the arrest procedure with
the police.

80

80

Unlawful arrest

● You can use your powers of arrest in the course


of crime prevention and detection
● Relatively few successful civil/criminal actions
have been taken against security
staff for unlawful arrest
● Use discretion and common
sense when deciding when
to effect an arrest
● Ensure you have the power
to arrest in the first place.

81

81

27
Your safety

Never put yourself in any unnecessary


danger while effecting an arrest

If you are in any doubt about your


ability to make the arrest, or about
your personal safety, then the police
should be called to:
● assist with the arrest
● make the arrest themselves.

82

82

Self-defence

Common law – the rules of self-defence:


if any person has an honestly held belief that he
or another is in imminent danger, then he may use such
force as is reasonable and necessary to avert that danger.

83

83

The use of force

Security operatives do occasionally


need to use force to carry out
their duties and, under certain
circumstances, are legally
empowered to do so. Force
can be used if:
● being used for self-defence
● saving life/saving others from harm
● preventing someone from leaving
after an arrest (citizen’s arrest).

84

84

28
Criminal Law Act

Sec.3 Criminal Law Act, 1967

This act gives everyone, including


door supervisors, the authority to
use:

‘such force as is reasonable in the


circumstances in the prevention of
crime, or in effecting (or assisting in)
the lawful arrest of offenders,
suspected offenders or persons
unlawfully at large’.

85

85

Was the force used necessary?

This is a matter of opinion. Questions that are likely to be


asked about any use of force are:

1. Was there a need to use the force?


2. Was the amount of force used reasonable?
3. What was the extent of the injuries compared to the amount
of resistance given?
4. What was the size and build of the injured party compared
to the door supervisor?
5. Were any weapons used or threatened by the other party?
6. At what stage did the security operative stop using the force?
7. Was the force applied in good faith or in a malicious way?

86

86

The use of force

Remember…

87

87

29
Key Task 3

1 Explain what is meant by the term ‘arrest’.

...................................................................................................................
...................................................................................................................
...................................................................................................................

88

88

Key Task 3

Provide SIX examples of offences for


2 which a security operative can make an arrest.

1 4
…....................................... ….......................................
2 5
.…...................................... .…......................................
3 6
...….................................... ...…....................................

89

89

Key Task 3

Explain the procedures a security operative should


3 follow after an arrest.

...................................................................................................................
...................................................................................................................
...................................................................................................................

90

90

30
Health and safety
1:4
91

91

Health and safety in


the workplace

Every year, thousands of people have time


off work due to sustaining injuries that could
have been avoided

KEY POINT

Health and safety procedures are there


to keep everyone safe.

92

92

The Health and Safety at Work etc. Act

Covers:

● employers
● employers
● the self-employed
● subcontractors
● Suppliers
● people who control premises
● visitors/customers on the site.

93

93

31
Breaches

Breaches of the legislation can be dealt with by either:


● The Health and Safety Executive (HSE)
● The local environmental health practitioner (EHP)
from the local authority

Breaches can result in:

● improvement notices
● prohibition notices
● criminal proceedings.

94

94

Other implications

Other negative consequences of breaches:


loss of productivity

business disruption

staff shortages

possible long-term effects


on employees.

95

95

Duty of care

Duty of care:
A moral or legal obligation to ensure the health,
safety and welfare of others.

96

96

32
What are the
employer’s responsibilities?

97

97

What are the


employee’s responsibilities?

98

98

Risks and hazards

Hazard:
something with the potential to cause harm
Risk:
the likelihood of harm occurring
Risk assessment:
the identification of hazards, the calculation of risk and the
reduction of that risk, either completely or to an acceptable level

Good health and safety practices are all about reducing


hazards and risks.

99

99

33
Risks and hazards cont.

Typical risks and hazards in the workplace include:

● slips, trips and falls ● noise pollution


● injuries from poor ● moving vehicles
manual handling ● locked or blocked
● misuse/abuse of fire exits
machinery ● obstructions
● sharp objects like ● poor lighting
needles and knives
● overcrowding
● diseases ● fires, floods and
● hazardous other emergencies
chemicals
● unsuitable footwear.
● global or critical
incidents
100

100

Minimising risks

Once a hazard or risk has been identified,


follow the hierarchy of control to work out
the best ways to deal with the potential problem.

101

101

Minimising risks

Ask the questions:

● can the hazard be eliminated?


● can the hazard be substituted with a
reduced risk?
● can the hazard be isolated or enclosed?
● would the introduction of a safe system
of work reduce the risk? For example,
new procedures and routines.
● would information, training or supervision
reduce the risk?
● would PPE help?

102

102

34
5 steps to risk assessment

There are 5 steps to carrying out a risk assessment:

Step Identify the hazards

Step Identify who may be harmed and how

Step Evaluate the risk and introduce further controls

Step Record the findings and implement them

Step Review and revise and update if necessary.

103

103

Personal protective equipment (PPE)

104

104

Personal protective equipment (PPE) cont.

105

105

35
Safe manual handling

Manual handling is the movement or support of any load


by physical effort, including lifting, moving, carrying, pushing
and pulling

If you lift or move heavy objects without using the


recognised procedures, you run the risk of sustaining
the following injuries:

● fractures ● damaged ligaments


● spinal disc injuries and tendons
● trapped nerves ● abrasions and cuts
● friction burns ● hernias.
● damage to muscles

106

106

Using LITE

Before attempting to lift a load, use LITE


to evaluate the risk:

LOAD
Look at the load. If it is too heavy, can it be lightened
or split? If it is unstable, can handles be fitted or the
load be reapportioned?

INDIVIDUAL
Consider the capability of the person. Are they strong
or fit enough? Are they adequately trained for the task?

107

107

Using LITE cont.

TASK
Evaluate the job to be done. Does the task involve
stretching, twisting or bending? Can machinery be
used or can team handling be used?

ENVIRONMENT
Control the environment where the task takes place. Is
the floor slippery or uneven? Can the layout or floor
condition be improved?

108

108

36
Lifting techniques

The 6 safe lifting techniques are:

1. Stop and think


2. Position the feet
3. Bend the knees
4. Get a firm grip, keeping the back slightly flexed
5. Raise with the legs
6. Raise with the legs
7. Keep the load close to the body.

109

109

Lone working

Security operatives who work alone can


be particularly susceptible to:
● violence
● injury
● ill health
● lack of support/communication
● lack of welfare facilities for rest.

110

110

Safety signs and signals

Safety signs and signals:

are used to communicate health


and safety instructions

must be kept clean

must be displayed where they can


be easily seen.

111

111

37
Prohibition signs

Prohibition signs mean that you are


prohibited from doing something.

112

112

Mandatory signs

Mandatory signs mean that you must do something.

113

113

Safe condition signs

Safe condition signs indicate where to go for safety.

114

114

38
Warning signs

Warning signs indicate a specific danger.

115

115

Fire safety signs

Fire safety signs indicate firefighting equipment.

116

116

Hazardous substances

Hazardous substances signs warn


you about dangerous chemicals.

117

117

39
Reporting incidents and accidents

Incidents and accidents must be properly reported to:

● meet legal requirements


● help identify accident
trends
● improve practices and
procedures
● help prevent similar incidents
● assist with insurance claims
and investigations.

118

118

Information required

Incident/accident reports need to include at least the following


information:

● day, date and time ● whether first aid was


of incident required
● location of incident ● whether the emergency
● how you were alerted to it services were called
● what you saw ● what the result was
● what you were told ● details of any injuries
● what happened ● details of any witnesses
● what action you took ● any descriptions of
property or people.

119

119

RIDDOR

RIDDOR: Reporting of Injuries, Diseases


and Dangerous Occurrences Regulations

The employer or designated ‘responsible person’ is required


by law to notify their local authority, the Health and Safety
Executive (HSE) or the incident contact centre

This can now be done online.

120

120

40
Keeping personal information safe

The Data Protection Act 2018 (GDPR), covers any information


related to a person or ‘data subject’ that can be used to
directly or indirectly identify them

It can be:

● anything from a name, a photo and an email


● address to bank details, social media posts,
● biometric data and medical information.

121

121

Keeping personal
information safe cont.

Personal information can be kept safe by:

● following all organisational ● not wearing anything


procedures identifiable outside the
● following assignment workplace
instructions ● demonstrating personal
● maintaining confidentiality vigilance, e.g. not
of information completing surveys
● using social media in a ● not discussing work issues
responsible way; this outside the workplace
includes having the highest ● not discussing work
levels of security settings on information with colleagues.
your accounts

122

122

Key Task 4

1 Identify the responsibilities of


employees and employers under
the Health and Safety at Work Act.

Employees Employers

123

123

41
Key Task 4

2 Identify FOUR risks associated


with lone working.

1
…....................................................................................................
2
…....................................................................................................
3
…....................................................................................................

4
…....................................................................................................

124

124

Key Task 4

3 State the procedures that should be


followed for recording and reporting
accidents and health and safety incidents.

Accidents Health and safety incidents

125

125

Fire procedures
1:5
126

126

42
Fire safety measures

Fire safety on the premises or site


is important for staff/visitors/customers

If a fire occurs in the workplace, it could


result in the disruption of normal business
activities and can affect profitability

Staff and/or customers could be injured


or even lose their lives

Good fire safety is everyone’s responsibility.

127

127

Basic fire prevention

Basic fire prevention measures include:

● switching off all non-essential electrical appliances


● not overloading electrical points
● regularly inspecting and maintaining all electrical
equipment
● safely storing flammables
● regularly emptying ashtrays
● storing rubbish away from the building
● keeping electric and gas fires well away from furniture.

128

128

Fire regulations

Under the Regulatory Reform (Fire Safety)


Order of 2005 (Fire (Scotland) Act 2005),
employers must:

● nominate a competent person to carry


out a full fire risk assessment
● provide their employees with any relevant
information, instruction and training

Security operatives must also cooperate


with their employers in all matters relating
to fire safety.

129

129

43
The fire triangle

Fire needs 3 elements to start


and survive. They are heat,
fuel and oxygen.

1 2

130

130

The fire triangle cont.

If any of these 3 elements are greatly reduced


or removed, then the fire itself will be reduced
or extinguished

HEAT - a minimum temperature is needed to start


1
a fire and for it to continue

FUEL - fire needs something to burn, like solid fuel,


2
oil or gas

OXYGEN - fire needs oxygen to burn, as it supports


3
the combustion process.

131

131

Classifications of fire

Fires are divided into types or classifications.


Each class requires a different method of extinguishing

Ordinary combustibles, i.e. paper, wood,


CLASS A textiles, rubber, plastic, fabrics
Flammable liquids, i.e. petrol, oil, paints
CLASS B
and solvents

CLASS C Flammable gases, i.e. butane, propane

CLASS D Metal fires, i.e. magnesium, sodium

CLASS F Cooking oils and fats

Fires involving electricity.

132

132

44
Fire extinguishers

Fire extinguishers:

● are used for small fires


● have a limited capacity
● can be easily carried to a fire
● intended for use by anyone

Security operatives need to know their:

● uses
● locations
● methods of operation.

133

133

Fire extinguishers cont.

134

134

Fire extinguishers cont.

135

135

45
Fire extinguishers cont.

Only attempt to fight the fire if:

● the alarm has been raised


● the emergency services
have been contacted
● the fire is not spreading
and is confined
● you have a clear escape
route not threatened by fire
● you have selected the correct extinguisher.

136

136

Fire extinguishers cont.

Do not attempt to fight a fire if:

● it is bigger than a wastepaper bin (rule of thumb)


● you need more than 1 extinguisher
● the room is filling with smoke
● you do not have a clear escape route
● gas cylinders or chemicals are involved
● your efforts are not reducing the size of the fire
● you do not have the correct extinguisher.

137

137

Fire extinguishers cont.

Operating an extinguisher

● Select the correct extinguisher


● Check contents gauge
● Pull the pin to break the seal
● Holding the extinguisher upright,
squeeze the trigger
● Test the range and content (away
from the fire)
● Extinguish the fire using the correct
technique for that type of extinguisher
and the nature of the fire.

138

138

46
Discovering a fire

It is important that all security operatives take the correct actions


on discovering a fire

You will need to:


• follow the organisation’s policies and procedures
• sound the alarm and inform emergency services
• follow the acronym of FIRE:
• Find – you discover a fire
• Inform – raise the fire alarm
• Restrict – restrict access to the area of the fire
• Evacuate – evacuate the building or extinguish
(extinguish the fire if safe to do so).
• control panel: Important to ensure full understanding of the
extent of the area of the incident, to pass on correct message
to emergency services e.g. with regard to materials or chemicals
stored in the affected area.
139

139

Fire alarms

Most commercial and business buildings now have their own


fire alarm systems

These are designed to detect fires as soon as they start, raise


the alarm and sometimes to call the fire brigade automatically

Security operatives need to be aware of how their fire alarm


system works and what they need to do on hearing the alarm.

140

140

Fire blankets

Fire blankets can be used to extinguish fires by smothering


them. They are often found in kitchens, as they are very
useful for extinguishing fat fires in pans.

141

141

47
Sprinklers

Some fire alarm systems are connected to sprinklers


which spray water onto the fire from outlets in the ceiling,
holding back the fire until the arrival of the fire service.

142

142

Hose reels

Long lengths of rubber hose positioned


strategically around the site

Permanently connected to the mains water


supply and are started by opening a valve
before use

Can be quite heavy to unreel when needed,


but are very effective when used as they
provide a limitless supply of water.

143

143

Dry and wet risers

Some buildings have riser systems built in

These systems consist of long water pipes running along the


outside of the building and across the ceilings on each floor,
allowing water to be dispensed via sprinklers to each floor in
the event of a fire

Wet riser systems have water in the pipes all the time,
whereas dry riser systems need to be activated manually to
send the water into the pipes.

144

144

48
Flooding systems

● Flooding systems are designed to be used in


unoccupied rooms where there are high-value contents
or areas where a fire may cause major disruption to the
activities of the organisation
● Examples might be archives, electrical equipment or
switchgear
● On detection of the fire, a fire extinguishing medium
(most commonly CO²) will be discharged into the room
to replace the air and extinguish the fire by smothering.

145

145

Fire doors and fire exits

Internal fire doors:

● help prevent/reduce the spread of smoke


and flames from one room to another
● should be closed at all times
● should not be obstructed

Fire exits:

● are vital as a means of escape in the event


of a fire
● should be clearly marked
● must be unlocked when
anyone is in the building
● should not be obstructed on the inside/outside.

146

146

Fire alarm control panels

● The warning and controlling units within


a fire alarm system
● If a fire emergency is detected, the control
panel alerts those monitoring it via various
lights and audible alarms
● Security operatives can work out the type
of emergency, exactly where it is occurring
and over what extent of an area
● Some systems actually call the fire brigade,
sound the fire alarm, unlock doors, cut off
electricity and set off sprinkler systems
automatically.

147

147

49
Fire evacuation procedures

In an evacuation, security operatives must:

● take control
● communicate effectively
● help to evacuate the site quickly and safely
● encourage people to leave via the safest exit
● assist anyone who does not know where to go
● assist any vulnerable people (elderly, disabled and children)
● avoid causing unnecessary panic
● know where the assembly points are
● know what to do once the building is empty.

148

148

Action to take

Typical actions would include:

● raise the alarm – shout ‘fire’ to warn others


● operate the nearest manual call point (if fitted)
● call the fire service on 999
● evacuate the area
● restrict access and isolate the fire
● report to the assembly point
● only attempt to fight the fire if it is
safe to do so and you have been trained.

149

149

Practising evacuations

Evacuation procedures need to be practised

Remember the 5 Ps:

PLANNING and PREPARATION

PREVENTS POOR PERFORMANCE

By acting promptly and correctly in times of emergency,


security operatives can help to save time in the evacuation,
keep themselves and others safe, assist the emergency services,
prevent injuries and save lives.

150

150

50
Fire wardens/marshals

● Members of staff nominated to take


responsibility for a particular area with
regards to fire safety
● Numbers will vary depending on the size
of the site and the numbers of people
involved
● Under the Regulatory Reform (Fire Safety)
Order of 2005, (Fire (Scotland) Act 2005),
they are there to assist the designated
person responsible for general fire safety.

151

151

Fire warden/marshal duties

Typical duties include:

● assisting with fire risk assessments


● checking all exit doors/escape routes
are unlocked and unobstructed
● ensuring all fire extinguishers are in the
correct position with seals in place
● checking all safety signs are clearly
visible and in the correct place.

152

152

Fire warden/marshal duties cont.

Typical duties include:

● making sure that all alarm call points are


unobstructed and working correctly
● checking all fire doors are closed and functioning properly
● ensuring corridors and walkways are kept clear
● ensuring assembly points are clearly marked and easily
accessible
● reporting any equipment faults.

153

153

51
Fire warden/marshal duties cont.

During a fire situation, their duties will include:

● sounding the alarm/calling the fire service


● assisting with the evacuation
● fighting the fire if it is safe to do so
● ensuring everyone is out of the building
● closing doors and windows
● manning the assembly point
● taking or assisting with the roll call
● assisting the fire coordinator
● liaising with the fire service.

154

154

Key Task 5

1 State the THREE elements needed for a fire to start


and survive.

1
…....................................................................................................
?
??

??

2
??

…....................................................................................................
??
?

3 …....................................................................................................
?????

155

155

Key Task 5

2 List FOUR tasks a fire warden/


marshal may be required to carry out.

1
…....................................................................................................
2
?

…....................................................................................................
??

??
??

3
…....................................................................................................
??
?

4
…....................................................................................................
?????

156

156

52
Key Task 5

3 List FOUR classes of fire and their meaning.

1
…....................................................................................................
2
…....................................................................................................
3
…....................................................................................................

4
…....................................................................................................

157

157

Emergencies
1:6
158

158

Emergencies

An emergency is any unexpected


situation that is so serious that it must
be dealt with immediately

It is important that all security operatives


know how to deal with emergencies
promptly, efficiently and safely.

159

159

53
Emergencies cont.

Emergencies can include incidents, occurrences


and accidents:

● an incident/occurrence could include a fight, power cut


or drug overdose
● an emergency could include health emergencies such
as epileptic seizure, anaphylactic shock, heart attack etc.
● an accident could include someone falling down steps
or slipping on a wet floor.

160

160

Emergencies cont.

Incidents generally fit into 3 camps:

EMERGENCIES

URGERT

NON-URGERT

Emergencies are life-threatening incidents requiring


immediate attention and probable deployment of emergency
services.

161

161

Types of emergencies

Emergencies that security operatives may become


involved in include:

● power system/equipment failures


● floods
● actual or threatened serious injuries
● serious Illness
● fights/assaults
● bomb/terror threats
● gas leaks
● fires
● chemical spillages.

162

162

54
Actions

Fires - Floods - Power cuts - Gas leaks


- Chemical spillages

Activate the alarm

Evacuate the site

Call the emergency services on 999.

163

163

Actions – gas leak

If a gas leak is suspected, security operatives should try to


ensure that no one smokes or switches on any lights or
electrical equipment in the area

Even a small spark could cause an explosion

Where possible, doors and windows should be opened to try


to disperse the gas

If possible, the gas supply should be turned off at the mains.

164

164

Actions – road traffic accidents

Road traffic accidents are usually dealt with by the police

Incidents of violence may be


dealt with by removing the
instigators from the site,
calling the police or making
arrests
First aid may also be required.

165

165

55
Actions – bomb threats/suspect packages

All bomb threats and suspicious packages must be dealt


with seriously by:

• raising the alarm


• evacuating staff and visitors/customers
• call the police.

166

166

Actions - other

Serious crimes that occur on the site will normally


be dealt with by calling the police

Containing any suspects and crime scene preservation


must also be considered

First-aid incidents where staff/visitors/customers are injured


or become ill should be dealt with by a trained first-aider

In serious incidents, an ambulance should be called.

167

167

Making emergency calls

● Call 999
● This will put you through to the emergency
services operator

The operator will ask you for the following information:

● which service you require ● type of incident


(police, fire, ambulance) ● number of casualties
● the telephone number you ● extent of injuries
are calling from (in case you
● any other dangers or hazards.
are cut off or for a call back)
● your exact location (address
and postcode)

168

168

56
Fight or flight

When you become frightened, your body will automatically


go into what is called fight or flight mode
This is because of the basic natural animal instinct in us all
to help us survive potentially dangerous situations

Fight or flight prepares our brains and bodies to:

Stand and physically FIGHT off an attack


or to

Run away from the situation, FLIGHT to keep


ourselves safe.

169

169

During fight or flight

Your body releases adrenaline into your system to


increase your physical ability to fight or run away

This adrenaline rush:

● increases your heart rate


● pumps extra blood and oxygen
to the muscles you need to use
● widens your eyes to take in as much
of the situation as possible
● intensifies your sense of hearing.

170

170

After fight or flight

Once the situation ends, your brain and body begins to calm
down again in an attempt to get back to normal

Your body slowly returns to its natural relaxed state,


and as you calm down, your brain returns to thinking with the
rational side again.

171

171

57
Shock

If brains and bodies do not return to their natural conditions


as they should, you can go into a state known as shock

This normally only happens after a particularly threatening


or frightening situation.

172

172

Escalation procedure

Companies will often have an escalation procedure for


incidents and emergencies. It is important that you:

● understand how a graduated response can be applied in


each situation
● be required to record your involvement as you may be asked
to review and evaluate the responses during the incident

When dealing with an emergency situation you must be aware


of taking control in crowds to avoid people from being
crushed or injured during an evacuation or invacuation.

173

173

First aid

First aid is defined as the initial


or immediate assistance given to
someone who has been injured or
taken ill, prior to the arrival of an
ambulance, doctor or other suitably
qualified person.

174

174

58
First-aid aims

The main aims of first aid are to:

● preserve life
● prevent the condition from worsening
● promote recovery
● obtain qualified assistance

Employers are required by law to provide adequate


personnel, training, equipment and facilities to any
staff/visitors/customers should they be injured or
taken ill on the site.

175

175

Person injury responses

You need to know:

● the site’s policy for providing first aid


● what you are expected to do in a medical emergency
● who the designated first-aiders on the site are
● how to contact them
● where the first-aid room and equipment are

You may even be required to undergo first-aid training.

176

176

First aid actions

If you are trained to do so, you may be required to administer


first aid in times of emergency

Remember the following:

● ensure your own safety first ● send for appropriate


● assess the situation medical assistance
● control the situation ● keep people safe
● diagnose the injury/illness ● provide privacy.
● save life

177

177

59
First aid actions cont.

If you are not trained to administer first aid


in times of emergency

Remember the following:

• call the first-aider if you are not qualified


• know when to call an ambulance
• ensure that onlookers are kept to a minimum but also
monitor anyone who has remained for signs of shock
• provide as much of a physical block as you can, to protect
the dignity of the casualty and prevent onlooking
• direct the ambulance to the casualty (if you are not the first-
aider).

178

178

Recording first-aid incidents

It is important to record all details relating to injuries sustained


on the site, whether they are sustained through accidents or
criminal actions

The information contained in the accident


book can often help employers to:

● identify accident trends


● improve the general health
and safety of the site
● assist with insurance and/or
criminal investigations.

179

179

Evacuation

Evacuation is the controlled process of emptying


an area or premises of people

Evacuation:

● can be to an adjoining area or


premises depending on the incident
● may be required in the event of
flooding, fire or terror threat.

180

180

60
Invacuation

Invacuation is the controlled process of getting people into safe


premises due to an incident which could cause harm to people who
are outside

● Invacuation may be required if a person with a firearm started to


shoot people in the street
● Security operatives should encourage everyone into the building
and lock the doors for safety

Different sites or venues may have different evacuation and


invacuation procedures. You will need to make yourself aware of
these policies.

181

181

Key Task 6

1 What are the FOUR aims of first aid?

1
…....................................................................................................
2
…....................................................................................................
3
…....................................................................................................

4
…....................................................................................................

182

182

Key Task 6

Identify FOUR types of emergency


2 that could happen in the workplace.

1
…....................................................................................................
2
…....................................................................................................
3
…....................................................................................................

4
…....................................................................................................

183

183

61
Key Task 6

3 Explain the principles of evacuation and invacuation.

Evacuation Invacuation

184

184

Communicate effectively
1:7
185

185

Communication

You will regularly come into contact


with members of the public during
the course of your duties

You will also regularly interact with


other members of staff and people
from other organisations

Effective communication is vital.

186

186

62
How we communicate

Communication is the sending and receiving of signals

● The ‘sender’ decides what thoughts SENDER


they wish to pass on, ‘encodes’
those thoughts into the most
effective form of communication ENCODES THOUGHTS
and then ‘sends’ those thoughts
to the ‘receiver’
● The receiver takes in the message SENDER SENDS
and replies if necessary
● Receiver and sender check RECEIVER RECEIVES
understanding.

187

187

Communication

188

188

Types of communication

Verbal communication is when you interact with another


person using words and tone to convey your message

The words you use are important, but so is the tone in


which you use those words.

189

189

63
Types of communication cont.

Non-verbal communication is everything


else that you do when you communicate
with another person on a face-to-face basis

How you stand, what you are wearing,


how close you are to the other person,
facial expressions, eye contact, how
you use your hands, other physical
gestures – these all help you to
convey your message.

190

190

Importance of effective
communication

To effectively communicate in the workplace you will need to:


● choose an appropriate medium and use appropriate
language for the message and recipient it is intended for
● deliver the message clearly
● check the recipient’s understanding of the message, for
example by asking them to repeat the message back to you

Communicating effectively will also help


to prevent misunderstandings.

191

191

Importance of effective
communication cont.

Communicating effectively will also help to:

● prevent misunderstandings
● prevent mistakes being made
● reduce incidents of conflict, aggression or violence

Security operatives need to come across as positive,


assertive and professional at all times if they are to be treated
with respect by anyone they come into contact with.

192

192

64
Communicating in a team

● Effective communication in a
team is essential
● Communication skills play
an important role in how you
interact with your colleagues,
supervisors and managers
● You should treat all members of
staff with courtesy and respect
and you should expect to be
treated in the same way.

193

193

Effective communication in a team

Good teamwork in the workplace:

● promotes safety
● provides a professional and safe service
and establishment
● supports colleagues
● promotes efficiency.

194

194

Diverse customer needs

All customers are different people, with differing


needs and expectations

People form their own personal values as they grow up

Security operatives need to take into account other people’s


values and try to choose the most appropriate and effective
way of dealing with them.

195

195

65
Customers with particular needs

You may need to consider adapting to how you would communicate


with individuals who have particular needs such as:

● physical disabilities
● learning difficulties
● sensory impairment
● English as a second language
● being under the influence of drink and drugs

You may need to speak slower when giving information, assistance


or directions or draw a picture to provide guidance

Remember it is important to acknowledge and respect all individuals.

196

196

The principles of customer service

One main role of a security operative is looking


after people

How people are treated is very important.


Customer care is all about delivering service
and providing security to customers on a
day-to-day basis.

197

197

The principles of customer service cont.

Examples of delivering good customer care include:

● being professional with every customer


● being approachable
● communicating with them effectively
● acknowledging them
● concerning yourself with customers’ needs
● building a rapport
● treating customers as you would wish to be treated yourself
● going out of your way to help customers
● leaving customers pleased with how you have dealt
with them.

198

198

66
Dealing with problems

Good customer service can often avoid problems occurring


even if the problems haven’t been caused by you or are out
of your control

To appease the customer in these circumstances you can:

● acknowledge and listen to them


● establish the customers’ need
● put yourself in the customer’s position
● accept responsibility for the problem
● involve the customer in the proposed solution
● see it through, make sure any promised actions
are carried out.

199

199

Different types of customer

Security operatives must understand that every single person


they come into contact with is a customer

Security operatives provide customer service to both internal


and external customers (direct and indirect).

200

200

Customers

Internal customers

Internally, within your own company, your customers include


your work colleagues, supervisors, managers and anyone
working for any other company or organisation on the site

External customers

Other customers you may come into contact with include


visitors to the site, workmen, delivery drivers, the emergency
services, neighbours and members of the public.

201

201

67
Phonetic alphabet

The NATO phonetic alphabet:

● was developed in the 1950s to be intelligible and


pronounceable to all NATO allies in the heat of
battle
● is now widely used in business and
telecommunications in Europe and the rest of the
world
● requires words to be spelt out by their letters
during a conversation

The normal alphabet cannot be used as some


letters, for example P, B, C and D sound similar
and, over certain media, can be totally indistinguishable.

202

202

Phonetic alphabet

LETTERS

A Alpha H Hotel O Oscar V Victor

B Bravo I India P Papa W Whiskey

C Charlie J Juliet Q Quebec X X-ray

D Delta K Kilo R Romeo Y Yankee

E Echo L Lima S Sierra Z Zulu.

F Foxtrot M Mike T Tango

G Golf N November U Uniform

203

203

Key Task 7

Provide THREE examples of verbal


1 and non-verbal communication.

Verbal Non-Verbal

204

204

68
Key Task 7

Give THREE examples of good


2 customer service.

1
…....................................................................................................
2
…....................................................................................................
3 …....................................................................................................

205

205

Key Task 7

State the importance of effective communication


3 in the workplace.

...................................................................................................................
...................................................................................................................
...................................................................................................................

206

206

Record keeping
1:8
207

207

69
Why is accurate record-keeping important?

208

208

Reports/Records

Typical records you may complete include:

● incident reports ● lost/found property


● accident records registers
● searches and checks ● message books
● logbooks ● handover reports
● pocket notebooks ● other site specific reports.
● search/visitor/ key registers
● duty sheets

209

209

Incident reports

REMEMBER

A ACCURATE

B BRIEF

C CLEAR

All communications should be accurate, brief and clear.

210

210

70
Using notebooks

● Notebooks are still official documents


● Must be used properly at all times
● Only be used to record work-related
matters
● For making accurate, timely notes
while working at the scene
● Ensure that sufficient details about a routine or unusual
event are taken at the time
● Fuller report can be made of the incident later
● Must be kept securely as they may contain
confidential information.

211

211

Notebook rules

No Erasers

No Leaves (pages) torn out

No Blank spaces

No Overwriting

No Writing between the lines

And Statements in direct speech.

212

212

Reporting procedures

Incident reports will need to show:

● who - the report is for and who it is written by


● what - happened/action was taken/was the result
● when - day/time/date
● where - place of incident
● details of any other witnesses/people/injuries or property

Records need to be completed as soon as you


are able to following the incident and should be purely
factual, without personal opinion, and each separate report
should be signed, dated and timed.

213

213

71
Statements

Statement:
A written account of what evidence a witness
can give about an incident

The rules about statement writing and giving evidence can be


found in the Police and Criminal Evidence Act (PACE) 1984.

214

214

Statements cont.

Statements are taken for the following reasons:

● to allow police officers to collate and evaluate evidence


during investigations
● to record witnesses’ evidence as soon as is practicable
after an incident
● to submit as evidence (when not contested) in court
to save the attendance of a witness
● to refresh a witness’s memory prior to actually giving
evidence in court.

215

215

Use of force in statements

If force is used against a person or while carrying out a lawful


arrest, the incident will need to be explained in detail,
including:

● time, date and location of incident


● how the security operative (SO) was called to the incident
● what type of incident it was
● if the SO was alone
● how the incident was approached
● what was seen and heard
● number of people involved
● the state of mind of the people involved.

216

216

72
Use of force in statements cont.

● the offender’s size in comparison to the SO


● how the SO felt about the situation
● actions that were taken
● what was said to the offender
● what was said to the SO
● why the SO decided to use force
● how much force was used
● what the level of resistance was
● how the offender was restrained or ejected
● how they were held until police arrived
● whether there were any injuries.

217

217

Use of force in statements cont.

● details of the officer who took the offender from the SO


● details of any witnesses
● details of first-aid/medical support provided
● details of the support involved and any follow-up action
required.

218

218

Identification in statements

Descriptions of people may need to be given when providing


a statement. Accurate information must be provided

● How long was the person observed for?


● How far away was the person from the SO?
● What were the lighting conditions like?
● Was the view impeded at any point?
● Has the SO seen the person before, if so how many times?
● Is there any special reason for remembering the person?

219

219

73
Identification in statements cont.

Covering all of these points will provide


good evidence for the prosecution.

220

220

Attending court

● Follow your organisation’s policies and procedures


● Arrive at court in good time and let CPS know
you are there
● Read your statement (if not already read through)
● Follow any legal advice from your representative
● Avoid giving opinion (unless asked)
● Keep your answers straightforward
● You will be asked questions by
the solicitors (barristers in CC)
● Address your answers to the judge,
magistrate or jury
● If you do not know the answer to a question,
say so
● Follow your organisation’s policies and procedure.

221

221

Key Task 8

1 Explain the importance of accurate record-keeping.

...................................................................................................................
...................................................................................................................
...................................................................................................................

222

222

74
Key Task 8

Identify the types of information that


2 should be included in records.

1 4
…......................................... ….........................................
2 5
…......................................... ….........................................
3 …......................................... 6 ….........................................

223

223

Key Task 8

Describe the process of attending


3 court to give evidence.

..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................

224

224

Terrorism
1:9
225

225

75
Terrorism

Terrorism is the use of violence, threats and


intimidation, especially in the pursuit of political aims.

226

226

Terrorism cont.

Security operatives need to be aware of:

● what is currently happening around the world and in their


particular area
● any recent terrorist attacks or threats
● the location of their own site in relation to other possible
targets nearby
● where the site itself is famous or important in
its own right
● the vulnerability of the site to attack
● the current level of threat nationally.

227

227

National threat levels

THREAT LEVEL DEFINITIONS


CRITICAL - an attack is highly likely in the near future

SEVERE – an attack is highly likely

SUBSTANTIAL - an attack is likely

MODERATE - an attack is possible but not likely

LOW - an attack is highly unlikely.

228

228

76
Counterterrorism

Counterterrorism measures will help to reduce the chances of a site


becoming a target. Threats can be reduced by:

● vigilance ● visible use of CCTV


● good housekeeping ● the reporting of suspicions
● use of physical security to supervisors or managers
measures immediately
● regular, obvious patrols ● know what information
emergency response require
● use of strict access control
procedures and have an awareness of
emergency response times.
● effective search procedures

229

229

Planning phase

Once terrorists have identified a target, the potential attack will


be moved into the planning phase. This phase involves:

● gathering information on the target


● identifying the target’s vulnerabilities
● identifying levels of security present at the target.

230

230

Attack methods

The most current terrorist attack methods have included:

● marauding terror attacks (MTAs)


● explosive devices, including improvised explosive device
(IED), person-borne improvised explosive device (PBIED),
vehicle-borne improvised device (VBIED)
● vehicle as a weapon (VAAW)
● hazardous substances including chemical, biological
and radiological (CBR)
● cyberattacks.

231

231

77
Actions to take

The role you will be expected to take during a terror attack will
be outlined in your organisation’s policies and procedures

You should encourage members of the public to:

RUN HIDE TELL

call 999 (response


to a place of if you cannot
times may vary
safety run, hide
according to location).

232

232

Run

In the event of an attack, you should:

● consider your route


● insist others go along with you (however,
don't let their indecision slow you down)
● once you have identified a safe route, RUN

Consider your route as you leave. Will it place you in the line
of fire, is it safer to wait for the attacker to move away before
you continue?

233

233

Hide

If you can’t move to safety - HIDE

When finding a hiding place, you should consider:

● the exits and escape routes


● rooms that have reinforced walls and doors with internal
locks
● moving away from the door
● switching your phone to silent and switching off vibrate
● staying silent (don’t shout for help).

234

234

78
Tell

If you are able to evacuate, get as far away


as possible and TELL

Call the police by dialling 999


● TELL them clearly where you are located and where the
attackers are
● Give a clear description of the attackers, including details
of their clothing and weapons
● Give details about the number of casualties
● Explain the layout of the building
● Include anything else that you think is important.

235

235

Following procedures

Follow all invacuation/lockdown and evacuation procedures

Invacuation/lockdown -
staff members and members of the public should be moved
to the most sheltered area of the venue/site, away from
windows and other exposed areas. All external doors and
windows should be locked

Evacuation -
the orderly removal of staff and members of the public to a
safe place away from the immediate vicinity of the building.
Evacuation will normally happen in situations such as a fire.

236

236

Following procedures cont.

An early assessment of the situation is vital. If a terrorist


attack begins outside, a quick lockdown procedure could
protect everybody inside the site/venue

If lockdown is slow, incomplete or causes a state of


confusion, the threat could move inside, putting the people
inside at great risk.

237

237

79
Following procedures

Pros Cons
Invacuation Locks staff and members Potential lack of exits
of the public away from the limits the ability to run
perpetrator, providing a should the perpetrator gain
physical barrier access or the attack zone
spreads
Evacuation Allows staff and members Some evacuation routes
of the public to get as far may put staff and members
away as possible from the of the public at risk of
scene of the incident being in the line of fire, or
the perpetrator may
attempt to pursue along
the evacuation route.

238

238

Suspicious packages

You need to be aware of suspicious packages and know the


procedures to follow if one is identified

You need to know what looks out of place at the venue or site
that you are working at

You can use the HOT protocol to help you determine whether
items are suspicious.

239

239

Suspicious packages cont.

HIDDEN – has someone deliberately tried to conceal


it from view?

OBVIOUSLY SUSPICIOUS – does its appearance


seem odd or out of the ordinary? Maybe it’s even
showing wires, batteries or liquids?

TYPICAL – is it typical for the location? For


example, ae large rucksack would be expected at an
outdoor festival but would be out of place at an
indoor concert venue.

240

240

80
Suspicious packages cont.

Suspicious items should be treated with caution

● Don’t touch the item


● Move yourself and others a safe distance from the item
● Clear 100m around the object
● Large items or small vehicles need a clear area of around
200m
● Large vehicles need a clear area of 400m or the length
of a football pitch.

241

241

Suspicious packages cont.

Keep yourself and others out of line of sight

If you can’t see the item then you’re better protected from it

THINK ABOUT
what you can hide behind, find something
substantial and keep away from glass, such
as windows and skylights.

242

242

Suspicious packages cont.

Inform the relevant people as well as the police

Don’t use communication devices within 15m of the item

Remember, some explosives can be triggered


by the signal from a radio or mobile phone.

243

243

81
Suspicious packages cont.

Remember the 4 Cs:

Confirm if the package is suspicious

Clear the area as best you can

Communicate to your team and the police

Control others getting into that area.

244

244

Suspicious activity

Suspicious activity is any observed behaviour that could


indicate terrorism or terrorism-related crime

Security operatives need to be familiar with the different


methods of observing suspicious activity including:

● people ● vehicles
● places ● locations.

245

245

Suspicious activity cont.

Hostile reconnaissance is the term used to describe


how terrorists gain information on potential targets

They will often:

● visit potential targets a number


of times prior to an attack
● try to find out as much as they
can about the location itself
● try to discover the best time and method of attack

You need to be vigilant at all times to try and recognise suspicious


behaviour that may indicate a terrorist interest in your site.

246

246

82
Suspicious behaviour

Suspicious behaviour may include:

● a particular interest in the ● damage to perimeter security


outside of the site ● attempts to disguise identity
● an interest in the CCTV (hats and hoods)
systems ● trespassing or loitering with no
● taking pictures of the site good reason
(overtly or covertly) ● asking unusual/specific
● making notes or drawing questions about the site or
diagrams of the site security arrangements
● taking an interest in the ● nervousness
timings of activities ● reluctance to be noticed or seen
● false alarm activations ● use of forged/fake identity
(testing response times) documents
● strangely parked vehicles.

247

247

Responding to suspicious behaviour

Don’t be afraid to take action, have the confidence to ACT

Dial 999 if it is a life-threatening emergency and provide the


operator with the following information:

● your place of work and the specific building


● location of the suspicious package inside the building
● whether all customers and employees have been
evacuated from the building.

248

248

Reporting

Non-urgent information about terrorism should


be passed to the anti-terrorist hotline on
0800 789321

This line is covered at all times by specialist counterterrorism


police officers
● Urgent information should be passed on using
999
● Report online https://act.campaign.gov.uk/
● non-emergency, call 101.

249

249

83
Responding to suspicious behaviour

See it Say it Sorted

The British Transport Police’s nationwide campaign,


designed to encourage train passengers and people visiting
train stations to report any unusual items or activity.
Passengers and visitors can report any issues by texting
61016 or by calling 0800 405040.

250

250

Current initiatives

See, Check and Notify

A current awareness strategy that aims to help businesses


and organisations maximise safety and security using their
existing resources

Action Counters Terrorism (ACT) Awareness - elearning

This is a free course to access via:


https://ct.highfieldelearning.com/

251

251

Counterterrorism experts

Additional information, advice and guidance can be found


with the following sources:

Centre for the protection of National infrastructure (CPNI)


www.cpni.gov.uk/cpni-context

National Counter Terrorism Security office (NaCTSO)


www.gov.uk/government/organisations/national-counter-
terrorism-security-office.

252

252

84
Action counters terrorism

253

253

Key Task 9

1 What are the FIVE different threat levels?

1 4
…......................................... ….........................................
2 5
…......................................... ….........................................
3 ….........................................

254

254

Key Task 9

2 What are the most common terror attack methods?

..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................

255

255

85
Key Task 9

Identify behaviours that could indicate


3 suspicious activity and explain how you
would respond to the activity you have identified.

..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................

256

256

Keeping vulnerable
people safe 1:10
257

257

Vulnerable people

Security operatives have a duty of care for all individuals on


their premise but particularly for vulnerable people

Duty of care is defined as:


‘a moral or legal obligation to ensure the health,
safety and welfare of others.’

It can be difficult to tell who is and who is not vulnerable, so


best practice is to have a duty of care for everyone.

258

258

86
Vulnerable people cont.

Vulnerable people may be:

● under the influence of drink or drugs


● alone or receiving unwanted attention
● separated from friends
● appearing lost or isolated
● being followed or threatened
● victims of domestic violence
● young people under the age of 18
● being elderly.

259

259

Vulnerable people

Vulnerable people may also:

● have mental ill health


● have learning disabilities
● have physical disabilities
● be elderly
● be acutely ill
● have invisible disabilities.

260

260

Actions towards vulnerable people

Consider

• Is there a relative or friend nearby to help them?


• Can you telephone anyone to come and help
them?
• Are there any local safe havens or safety
initiatives nearby?
• Can local street marshals, street pastors
or similar groups help them?
• Do you need to call the emergency services?

If in any doubt whatsoever, report as soon as possible


to your supervisor, the police or call crimestoppers.

261

261

87
Indicators of child sexual exploitation

There are certain indicators that a child is being sexually


exploited such as:

● children and young people in the company of older people


or antisocial groups
● acting in an inappropriate and sexualised way
● being intoxicated arriving and departing a location with
● different adults
● getting into and out of several different cars

You must be vigilant at all times if you suspect a child is being


sexually exploited, you must report it immediately and follow
the organisation’s policies and procedures.

262

262

Sexual predators

Sexual predators are those who commit sexual crimes

They very often target vulnerable children, young adults


or adults they think they can groom or overpower

They can be all genders, shapes and sizes

They will often appear to be confident, friendly,


helpful and sober.

263

263

Sexual predators cont.

Sexual predators may select their victims based on:

● gender
● age
● race
● vulnerability
● appearance
● location
● time of day.

264

264

88
What behaviours might indicate a sexual
predator?

265

265

What behaviours might indicate abuse?

266

266

Allegations of sexual assault

Follow your organisation’s policies and procedures

Safeguard the victim by making sure they


have a safe space to stay

Inform your manager or supervisor as soon as possible

Notify the police

Record and document all information at the first opportunity.

267

267

89
What is anti-social behaviour?

268

268

How to deal with anti-social behaviour

● Follow your organisation’s policies and procedures


● Speak to the person
● Explain the situation and the risks of the anti-social
behavior
● Explain the consequences if the anti-social behavior
continues
● Remain calm
● Ensure that your colleagues know about the situation
and that you have back-up if needed
● Remain vigilant.

269

269

How to deal with anti-social


behaviour cont .

● Conduct high-profile patrols


● Promote early intervention
● Use positive, non-aggressive communication
● Promptly report incidents
● Accurately record incidents
● Liaise with police and other appropriate agencies.

270

270

90
Key Task 10

1 Identify FIVE factors that could make someone vulnerable.

1 4
…......................................... ….........................................
2 5
…......................................... ….........................................
3 ….........................................

271

271

Key Task 10

Identify behaviours that may be exhibited by sexual


2 predators.

..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................

272

272

Key Task 10

3 Identify indicators of abuse.

1
…....................................................................................................
2
…....................................................................................................
3
…....................................................................................................

4 …....................................................................................................

273

273

91
Post-incident management
1:11
274

274

Post-incident

Anyone can be affected by something they have seen


or experienced, for example:

● violence in the workplace


● a first-aid incident such as a heart attack or seizure
● a traffic accident
● serious injury from equipment
● a lost child.

275

275

Accessing help and support

It is important that businesses and organisations are


able to help staff after an incident, particularly in relation to:

● providing immediate and ongoing


support
● helping all members of staff to learn
from the incident
● updating policies and procedures
to improve safety
● sharing good practice.

276

276

92
Responses to incidents

Typical symptoms are how the brain and body react


to abnormal situations or incidents

The severity of the symptoms can depend on the severity


of the incident

In the time following the incident, anyone could start to


feel shock, anger, embarrassment or disbelief.

277

277

Typical effects

Typical effects

Short-term and long-term symptoms following exposure


to workplace violence could include:

● sickness ● fear
● insomnia ● depression
● behavioural changes ● loss of confidence
● becoming withdrawn ● stress
● anxiety ● post-traumatic stress
● intolerance disorder (PTSD).
● hypersensitivity

278

278

Post-incident support

KEY POINT
It is vital that if a member of staff starts to
show any signs that they may be suffering from any of these
symptoms, support must be given immediately to reduce the
changes of long term effects.

279

279

93
Post-incident support cont.

Support can be provided by:

● colleagues
● management
● counsellors
● helplines (such as the Samaritans)
● citizen’s advice
● trade unions
● trade publications such as victim support

(www.victimsupport.org.uk/)

Professional medical help may even be required


for serious problems.

280

280

Reflecting on and learning from conflict

Dealing with people, particularly


within the private security industry,
is a large ongoing learning curve

● You never stop learning


● There is always room for
improvement in everything you do

There are 6 basic steps to take


following an incident of violence in
the workplace…

281

281

Reflecting on and learning


from conflict cont.

STEP 1 – Reflect on what happened

Consider
● What happened?
● Why did it happen?
● What went wrong?
● What could you have done better?

282

282

94
Reflecting on and learning
from conflict cont.

STEP 2 – Recognise trends and any


poor practice

Consider
● Does this problem occur regularly?
● At any particular place or time?
● Can you reduce or stop these types of incidents?
● Is there something you are doing wrong?
● What is the common response to this type of situation?

283

283

Reflecting on and learning


from conflict cont.

STEP 3 – Share good practice

Consider
● Did you do something well?
● Does everyone know how to do it?
● Is extra training required?
● Does it need to be a policy?

284

284

Reflecting on and learning


from conflict cont.

STEP 4 – Learn from what happened

Consider
● How do you make sure this doesn’t happen again?
● Can you improve something for next time?

285

285

95
Reflecting on and learning
from conflict cont.

STEP 5 – Update policies, practices and procedures

Consider
● Are your organisation’s policies, practices and procedures
up to date?
● Can anything be added or improved?

286

286

Reflecting on and learning


from conflict cont.

STEP 6 – Monitor progress

Consider
● How can you record future incidents better?
● How can you monitor the effectiveness of any
changes made?
● When and how can you re-evaluate your future
performance?

287

287

Debriefing

Debriefing

Helps to improve how similar problems


are dealt with in the future

Reduces the chances of them happening


in the first place

Or can even stop them from happening at all.

288

288

96
Improving practices

It is in everyone’s best interest to be continually


improving your work practices. Good debriefings
and therefore reflection can:

● promote a professional service


● increase safety for staff
● promote teamwork
● increase safety for customers
● identify procedures or methods to better deal
with situations effectively.

289

289

Key Task 11

Explain where post-incident support


1 or resources can be found.

..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................

290

290

Key Task 11

Explain why it is important to access


2 support following an incident.

..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................

291

291

97
Key Task 11

3 Identify indicators of abuse.

1 3
…......................................... ….........................................
2 4
…......................................... ….........................................

…......................................... 5 ….........................................

292

292

The UK and Middle East’s leading supplier of compliance, work-based


The important things to do now are…
learning and apprenticeship training materials.

1 to put into practice what you have learnt

2 to develop competency in your work activities

3 to keep your knowledge up to date

4 to pass the examination.

Thank you for listening


quality, value, service & integrity

293

98

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy