SlideShare a Scribd company logo
1 of 10
Download to read offline
Security Training
Security Officer Physical-Maggi ITT-Debbi
SECURITY TOPICS Cash Opening/Closing Procedures Keys/Alarm/Combinations Fire Arms Negotiable Instruments Robbery Burglary Kidnapping
Verify Limits Bait Money Cash Audits Locked Drawers DualControl
Opening/ClosingProcedures Two employees All Clear Signal Cash & Sensitive Materials Locked Check all areas, windows, etc.
Keys/Alarm/Combinations
Miscellaneous No Negotiable Instruments maintained on premises No Firearms Allowed
Robbery Procedures Follow Instructions-DON’T be a Hero! Activate alarm if/when safe & call 911 afterwards Handle the note only on the edges and put it out of sight Pay attention to details of robber and weapon Lock doors immediately and refrain from conversation Secure all remaining cash in the vault Only the CEO is authorized to be a spokesperson
Burglary After hours: Executive management will respond to alarm False alarms should be reported to Security Officer During opening procedures: Notify security officer and police Do not open the office Don’t touch anything
Kidnapping Notify Security Officer and CEO Keep kidnapping confidential Follow Law enforcement instructions

More Related Content

Viewers also liked

Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplacedougfarre
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.Ankur Kumar
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 
Conflict management
Conflict managementConflict management
Conflict managementBeena Edward
 

Viewers also liked (11)

Physical security
Physical securityPhysical security
Physical security
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Security best practices
Security best practices Security best practices
Security best practices
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
Conflict management
Conflict managementConflict management
Conflict management
 

C:\fakepath\security training

Editor's Notes

  1. A log is maintained of keys/combos and alarm codes issued. These items should be secured at all times and never shared.
  2. One deterrent is greeting customers which we do very well……