SlideShare une entreprise Scribd logo
1  sur  22
 
Obviously it has been in existence since the primitive ages. This is when man had to protect himself against wild animals and the harsh environment. At first security needs were simple, but as civilization complex, so did man’s security requirements. Through out the ages men started practicing the utilization of workers and equipment in order to protect his well being and property. Thus, the civilized man adopts security measures to have adequate protection against unsecured and unsafe conditions. This probably led to the establishment of the “POLICE”, an institution today  responsible for law and order as well as public safety.
“ POLICE” Originated from the Greek word “ POLITEIA” Meaning government of a city
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL THEORIES OF PATROL THEORY OF POLICE OMNIPRESENCE – high police visibility discourages criminals. Normally, criminals think twice before executing their plans if there is obvious presence of police officers. Thus, patrol activity should be carried in a manner that attracts maximum attention to the police officer or police vehicles. This theory applies the principle of overt operation or high police visibility. LOW PROFILE THEORY– low police visibility increases the opportunity to apprehend criminals. Deceptive absence of the police officer will let criminals believe that they will not be detected or caught if they execute crimes that they planned. In this theory, the objective is to attract as little attention as possible while on the process of patrolling. The officers should operate in a manner that it would be difficult for either criminals or the public to determine that police are around. The principle of covert operation is integrated in this theory.
There is an incredible growth of the security industry nowadays. Most companies are using guard forces, protective barriers, communication and electronic hardware and other state-of-the art protection methods and techniques in their asset protection. However, every company or installation cannot yet escape the emerging complicated security problems like the deteriorating peace and tranquility, the treat of terrorism and the social conditions of the community. A determine intruder can sneak in the properties of another while the owner is asleep out on a trip or anytime of the day and divest all valuable items which he can find. The incidents of fire and other disaster should also be considered in the asset protection. Hence, a basic understanding on the concept and methods of security is the primordial concern of everybody.
Security is a state or conditions of being secured; there is a freedom from fear, harm, danger, loss, destruction or damages. Basically, it was the action of man against man that led to many unsecured and unsafe conditions. Reasons could be economic, revenge, or just plain greed and avarice. Whatever the motives, the civilized man needs adequate protection.
Since security in general is very hard to comprehend, it can be divided into three major areas: 1. PHYSICAL SECURITY – this concern with the physical measures adopted to prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage, loss and theft. 2. PERSONAL SECURITY – it starts even before the hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is to insure that the firm hires those best suited to assist the firm in achieving its goals and objectives and once hired assist in providing necessary to the work force while carrying out their functions. 3. DOCUMENT AND INFORMATION SECURITY – this involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure. Classified documents need special handling. Lack of indoctrination and orientation among the personal handling them can result in the leakage, loss, theft and unauthorized disclosure of the documents.
PROTECTIVE SECURITY can be defined as those measures taken by an installation or unit to protect itself against sabotage, espionage or subversion and at the same time provide freedom of action in order to provide the installation of the unit with the necessary flexibility to accomplish its mission. The aspects of protective security can be seen with the application of the following: –  INDUSTRIAL SECURITY –  HOTEL SECURITY  –  BANK SECURITY –  VIP SECURITY –  SCHOOL SECURITY –  SUPERMARKET or MALL SECURITY –  OTHER TYPES
INDUSTRIAL SECURITY  A type of security applied to business groups engaged in industries like manufacturing, assembling, research and development, processing, warehousing and even agriculture. It may also mean the business of providing security. HOTEL SECURITY  A type of security applied to hotels where its properties are protected from pilferage, loss, damage, and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This type of security employs house detectives, uniforms guard and supervisor and insures that hotel guests and their personal effects are safeguarded.
BANK SECURITY  This type of security is concern with bank operations. Its main objective is the protection of bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank and assets while in storage, in transit and during transactions.  VIP SECURITY  A type of security applied for the protection of top-ranking officials of the government or private entity, visiting persons of illustrious standing and foreign dignitaries.
SCHOOL SECURITY  A type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students. SUPERMARKET SECURITY A type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel and customers. Security personnel are trained to detect “shoplifter”, robbery, and bomb detection and customer relation.
OTHER TYPES This include all other security matters not covered in the 6 enumeration like; –  FIESTA –  BIRTHDAYS  –  PARTY –  PARADE –  CONCERT –  RALLY –  COURT HEARING –  INAUGURATION OF PRESIDENT
PHYSICAL SECURITY measures are being used to define, protect, and monitor property rights and assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and theft. PHYSICAL SECURITY may be also defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies, programs, personnel, property, utilities, information, facilities and installation against compromise, trespass, sabotage, pilferage, embezzlement, fraud or other dishonest criminal act.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TYPES OF BARRIERS –  NATURAL BARRIERS –  STRUCTURAL BARRIERS  –  HUMAN BARRIERS –  ANIMAL BARRIERS –  ENERGY BARRIERS
NATURAL BARRIERS  It includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse.
STRUCTURAL  BARRIERS  These are features constructed by man regardless of their original intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
HUMAN  BARRIERS  Persons being used in providing a guarding system or by the nature of their employment and locations, fulfill security functions.
ANIMAL BARRIERS  Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to serve as guard dogs.
ENERGY BARRIERS  It is the employment of mechanical, electrical, electric energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. These are protective lighting, alarm system and any electronic devices used as barriers.
 

Contenu connexe

Tendances

Criminal investigation manual
Criminal investigation manualCriminal investigation manual
Criminal investigation manual
Lord Gonzaga
 
Lecture pnp operations manual presentation
Lecture   pnp operations manual presentationLecture   pnp operations manual presentation
Lecture pnp operations manual presentation
Mcypp Ncmf
 

Tendances (20)

criminal justice system
criminal justice systemcriminal justice system
criminal justice system
 
Arrest
ArrestArrest
Arrest
 
TRAFFIC MANAGEMENT AND 1.pptx
TRAFFIC MANAGEMENT AND 1.pptxTRAFFIC MANAGEMENT AND 1.pptx
TRAFFIC MANAGEMENT AND 1.pptx
 
Philippine Criminal Justice System
Philippine Criminal Justice SystemPhilippine Criminal Justice System
Philippine Criminal Justice System
 
Police patrol
Police patrolPolice patrol
Police patrol
 
ADJ 201-63 Criminology Lesson 1
ADJ 201-63 Criminology Lesson 1ADJ 201-63 Criminology Lesson 1
ADJ 201-63 Criminology Lesson 1
 
POLICE-BLOTTER_01.19.ppt
POLICE-BLOTTER_01.19.pptPOLICE-BLOTTER_01.19.ppt
POLICE-BLOTTER_01.19.ppt
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
 
2. criminal justice system 2.ppt
2. criminal justice system 2.ppt2. criminal justice system 2.ppt
2. criminal justice system 2.ppt
 
Criminal investigation manual
Criminal investigation manualCriminal investigation manual
Criminal investigation manual
 
Technical English 1
Technical English 1Technical English 1
Technical English 1
 
Lecture pnp operations manual presentation
Lecture   pnp operations manual presentationLecture   pnp operations manual presentation
Lecture pnp operations manual presentation
 
Introduction to Criminology and Psychology of Crimes
Introduction to Criminology and Psychology of CrimesIntroduction to Criminology and Psychology of Crimes
Introduction to Criminology and Psychology of Crimes
 
First-Responders-in-CSI_01.19.ppt
First-Responders-in-CSI_01.19.pptFirst-Responders-in-CSI_01.19.ppt
First-Responders-in-CSI_01.19.ppt
 
Police photography
Police photographyPolice photography
Police photography
 
Fire Prevention Program (FPP) of the Bureau of Fire Protection (BFP) in Urdan...
Fire Prevention Program (FPP) of the Bureau of Fire Protection (BFP) in Urdan...Fire Prevention Program (FPP) of the Bureau of Fire Protection (BFP) in Urdan...
Fire Prevention Program (FPP) of the Bureau of Fire Protection (BFP) in Urdan...
 
3 handcuffing foxtroot
3 handcuffing foxtroot3 handcuffing foxtroot
3 handcuffing foxtroot
 
BPAT lecture for Online PCR Executives
BPAT lecture for Online PCR Executives BPAT lecture for Online PCR Executives
BPAT lecture for Online PCR Executives
 
Memo rhaney
Memo rhaneyMemo rhaney
Memo rhaney
 
Crime against property
Crime against propertyCrime against property
Crime against property
 

Similaire à Law Enforcement Administration II

Occupational Health and Safety Officer
Occupational Health and Safety OfficerOccupational Health and Safety Officer
Occupational Health and Safety Officer
Jonathan Alba
 
Overall Security Services
Overall Security ServicesOverall Security Services
Overall Security Services
iangobi
 

Similaire à Law Enforcement Administration II (20)

The Vital Role of Security Guards: Safeguarding People, Property, and Peace o...
The Vital Role of Security Guards: Safeguarding People, Property, and Peace o...The Vital Role of Security Guards: Safeguarding People, Property, and Peace o...
The Vital Role of Security Guards: Safeguarding People, Property, and Peace o...
 
FUNDAMENTALS OF INDUSTRIAL SECURITY.pdf
FUNDAMENTALS OF  INDUSTRIAL SECURITY.pdfFUNDAMENTALS OF  INDUSTRIAL SECURITY.pdf
FUNDAMENTALS OF INDUSTRIAL SECURITY.pdf
 
Physical Security.pptx
Physical Security.pptxPhysical Security.pptx
Physical Security.pptx
 
Lecture 1 9 sam 100-
Lecture 1   9 sam 100-Lecture 1   9 sam 100-
Lecture 1 9 sam 100-
 
Security Services in Bhubaneswar, odisha
Security Services in Bhubaneswar, odishaSecurity Services in Bhubaneswar, odisha
Security Services in Bhubaneswar, odisha
 
Experience Reliable Security with Our Dedicated Guard Services
Experience Reliable Security with Our Dedicated Guard ServicesExperience Reliable Security with Our Dedicated Guard Services
Experience Reliable Security with Our Dedicated Guard Services
 
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
 
Security_Guard
Security_GuardSecurity_Guard
Security_Guard
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
Making Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptxMaking Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptx
 
Occupational Health and Safety Officer
Occupational Health and Safety OfficerOccupational Health and Safety Officer
Occupational Health and Safety Officer
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
pln9 presentation mall
pln9 presentation mallpln9 presentation mall
pln9 presentation mall
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to Security
 
Security training manual
Security training manualSecurity training manual
Security training manual
 
Overall Security Services
Overall Security ServicesOverall Security Services
Overall Security Services
 
Terrasol security training f
Terrasol security training fTerrasol security training f
Terrasol security training f
 
Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Training
 

Dernier

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Dernier (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Law Enforcement Administration II

  • 1.  
  • 2. Obviously it has been in existence since the primitive ages. This is when man had to protect himself against wild animals and the harsh environment. At first security needs were simple, but as civilization complex, so did man’s security requirements. Through out the ages men started practicing the utilization of workers and equipment in order to protect his well being and property. Thus, the civilized man adopts security measures to have adequate protection against unsecured and unsafe conditions. This probably led to the establishment of the “POLICE”, an institution today responsible for law and order as well as public safety.
  • 3. “ POLICE” Originated from the Greek word “ POLITEIA” Meaning government of a city
  • 4.
  • 5. FUNDAMENTAL THEORIES OF PATROL THEORY OF POLICE OMNIPRESENCE – high police visibility discourages criminals. Normally, criminals think twice before executing their plans if there is obvious presence of police officers. Thus, patrol activity should be carried in a manner that attracts maximum attention to the police officer or police vehicles. This theory applies the principle of overt operation or high police visibility. LOW PROFILE THEORY– low police visibility increases the opportunity to apprehend criminals. Deceptive absence of the police officer will let criminals believe that they will not be detected or caught if they execute crimes that they planned. In this theory, the objective is to attract as little attention as possible while on the process of patrolling. The officers should operate in a manner that it would be difficult for either criminals or the public to determine that police are around. The principle of covert operation is integrated in this theory.
  • 6. There is an incredible growth of the security industry nowadays. Most companies are using guard forces, protective barriers, communication and electronic hardware and other state-of-the art protection methods and techniques in their asset protection. However, every company or installation cannot yet escape the emerging complicated security problems like the deteriorating peace and tranquility, the treat of terrorism and the social conditions of the community. A determine intruder can sneak in the properties of another while the owner is asleep out on a trip or anytime of the day and divest all valuable items which he can find. The incidents of fire and other disaster should also be considered in the asset protection. Hence, a basic understanding on the concept and methods of security is the primordial concern of everybody.
  • 7. Security is a state or conditions of being secured; there is a freedom from fear, harm, danger, loss, destruction or damages. Basically, it was the action of man against man that led to many unsecured and unsafe conditions. Reasons could be economic, revenge, or just plain greed and avarice. Whatever the motives, the civilized man needs adequate protection.
  • 8. Since security in general is very hard to comprehend, it can be divided into three major areas: 1. PHYSICAL SECURITY – this concern with the physical measures adopted to prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage, loss and theft. 2. PERSONAL SECURITY – it starts even before the hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is to insure that the firm hires those best suited to assist the firm in achieving its goals and objectives and once hired assist in providing necessary to the work force while carrying out their functions. 3. DOCUMENT AND INFORMATION SECURITY – this involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure. Classified documents need special handling. Lack of indoctrination and orientation among the personal handling them can result in the leakage, loss, theft and unauthorized disclosure of the documents.
  • 9. PROTECTIVE SECURITY can be defined as those measures taken by an installation or unit to protect itself against sabotage, espionage or subversion and at the same time provide freedom of action in order to provide the installation of the unit with the necessary flexibility to accomplish its mission. The aspects of protective security can be seen with the application of the following: – INDUSTRIAL SECURITY – HOTEL SECURITY – BANK SECURITY – VIP SECURITY – SCHOOL SECURITY – SUPERMARKET or MALL SECURITY – OTHER TYPES
  • 10. INDUSTRIAL SECURITY A type of security applied to business groups engaged in industries like manufacturing, assembling, research and development, processing, warehousing and even agriculture. It may also mean the business of providing security. HOTEL SECURITY A type of security applied to hotels where its properties are protected from pilferage, loss, damage, and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This type of security employs house detectives, uniforms guard and supervisor and insures that hotel guests and their personal effects are safeguarded.
  • 11. BANK SECURITY This type of security is concern with bank operations. Its main objective is the protection of bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank and assets while in storage, in transit and during transactions. VIP SECURITY A type of security applied for the protection of top-ranking officials of the government or private entity, visiting persons of illustrious standing and foreign dignitaries.
  • 12. SCHOOL SECURITY A type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students. SUPERMARKET SECURITY A type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel and customers. Security personnel are trained to detect “shoplifter”, robbery, and bomb detection and customer relation.
  • 13. OTHER TYPES This include all other security matters not covered in the 6 enumeration like; – FIESTA – BIRTHDAYS – PARTY – PARADE – CONCERT – RALLY – COURT HEARING – INAUGURATION OF PRESIDENT
  • 14. PHYSICAL SECURITY measures are being used to define, protect, and monitor property rights and assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and theft. PHYSICAL SECURITY may be also defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies, programs, personnel, property, utilities, information, facilities and installation against compromise, trespass, sabotage, pilferage, embezzlement, fraud or other dishonest criminal act.
  • 15.
  • 16. TYPES OF BARRIERS – NATURAL BARRIERS – STRUCTURAL BARRIERS – HUMAN BARRIERS – ANIMAL BARRIERS – ENERGY BARRIERS
  • 17. NATURAL BARRIERS It includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse.
  • 18. STRUCTURAL BARRIERS These are features constructed by man regardless of their original intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
  • 19. HUMAN BARRIERS Persons being used in providing a guarding system or by the nature of their employment and locations, fulfill security functions.
  • 20. ANIMAL BARRIERS Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to serve as guard dogs.
  • 21. ENERGY BARRIERS It is the employment of mechanical, electrical, electric energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. These are protective lighting, alarm system and any electronic devices used as barriers.
  • 22.