SlideShare une entreprise Scribd logo
1  sur  22
 
Obviously it has been in existence since the primitive ages. This is when man had to protect himself against wild animals and the harsh environment. At first security needs were simple, but as civilization complex, so did man’s security requirements. Through out the ages men started practicing the utilization of workers and equipment in order to protect his well being and property. Thus, the civilized man adopts security measures to have adequate protection against unsecured and unsafe conditions. This probably led to the establishment of the “POLICE”, an institution today  responsible for law and order as well as public safety.
“ POLICE” Originated from the Greek word “ POLITEIA” Meaning government of a city
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL THEORIES OF PATROL THEORY OF POLICE OMNIPRESENCE – high police visibility discourages criminals. Normally, criminals think twice before executing their plans if there is obvious presence of police officers. Thus, patrol activity should be carried in a manner that attracts maximum attention to the police officer or police vehicles. This theory applies the principle of overt operation or high police visibility. LOW PROFILE THEORY– low police visibility increases the opportunity to apprehend criminals. Deceptive absence of the police officer will let criminals believe that they will not be detected or caught if they execute crimes that they planned. In this theory, the objective is to attract as little attention as possible while on the process of patrolling. The officers should operate in a manner that it would be difficult for either criminals or the public to determine that police are around. The principle of covert operation is integrated in this theory.
There is an incredible growth of the security industry nowadays. Most companies are using guard forces, protective barriers, communication and electronic hardware and other state-of-the art protection methods and techniques in their asset protection. However, every company or installation cannot yet escape the emerging complicated security problems like the deteriorating peace and tranquility, the treat of terrorism and the social conditions of the community. A determine intruder can sneak in the properties of another while the owner is asleep out on a trip or anytime of the day and divest all valuable items which he can find. The incidents of fire and other disaster should also be considered in the asset protection. Hence, a basic understanding on the concept and methods of security is the primordial concern of everybody.
Security is a state or conditions of being secured; there is a freedom from fear, harm, danger, loss, destruction or damages. Basically, it was the action of man against man that led to many unsecured and unsafe conditions. Reasons could be economic, revenge, or just plain greed and avarice. Whatever the motives, the civilized man needs adequate protection.
Since security in general is very hard to comprehend, it can be divided into three major areas: 1. PHYSICAL SECURITY – this concern with the physical measures adopted to prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage, loss and theft. 2. PERSONAL SECURITY – it starts even before the hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is to insure that the firm hires those best suited to assist the firm in achieving its goals and objectives and once hired assist in providing necessary to the work force while carrying out their functions. 3. DOCUMENT AND INFORMATION SECURITY – this involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure. Classified documents need special handling. Lack of indoctrination and orientation among the personal handling them can result in the leakage, loss, theft and unauthorized disclosure of the documents.
PROTECTIVE SECURITY can be defined as those measures taken by an installation or unit to protect itself against sabotage, espionage or subversion and at the same time provide freedom of action in order to provide the installation of the unit with the necessary flexibility to accomplish its mission. The aspects of protective security can be seen with the application of the following: –  INDUSTRIAL SECURITY –  HOTEL SECURITY  –  BANK SECURITY –  VIP SECURITY –  SCHOOL SECURITY –  SUPERMARKET or MALL SECURITY –  OTHER TYPES
INDUSTRIAL SECURITY  A type of security applied to business groups engaged in industries like manufacturing, assembling, research and development, processing, warehousing and even agriculture. It may also mean the business of providing security. HOTEL SECURITY  A type of security applied to hotels where its properties are protected from pilferage, loss, damage, and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This type of security employs house detectives, uniforms guard and supervisor and insures that hotel guests and their personal effects are safeguarded.
BANK SECURITY  This type of security is concern with bank operations. Its main objective is the protection of bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank and assets while in storage, in transit and during transactions.  VIP SECURITY  A type of security applied for the protection of top-ranking officials of the government or private entity, visiting persons of illustrious standing and foreign dignitaries.
SCHOOL SECURITY  A type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students. SUPERMARKET SECURITY A type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel and customers. Security personnel are trained to detect “shoplifter”, robbery, and bomb detection and customer relation.
OTHER TYPES This include all other security matters not covered in the 6 enumeration like; –  FIESTA –  BIRTHDAYS  –  PARTY –  PARADE –  CONCERT –  RALLY –  COURT HEARING –  INAUGURATION OF PRESIDENT
PHYSICAL SECURITY measures are being used to define, protect, and monitor property rights and assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and theft. PHYSICAL SECURITY may be also defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies, programs, personnel, property, utilities, information, facilities and installation against compromise, trespass, sabotage, pilferage, embezzlement, fraud or other dishonest criminal act.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TYPES OF BARRIERS –  NATURAL BARRIERS –  STRUCTURAL BARRIERS  –  HUMAN BARRIERS –  ANIMAL BARRIERS –  ENERGY BARRIERS
NATURAL BARRIERS  It includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse.
STRUCTURAL  BARRIERS  These are features constructed by man regardless of their original intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
HUMAN  BARRIERS  Persons being used in providing a guarding system or by the nature of their employment and locations, fulfill security functions.
ANIMAL BARRIERS  Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to serve as guard dogs.
ENERGY BARRIERS  It is the employment of mechanical, electrical, electric energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. These are protective lighting, alarm system and any electronic devices used as barriers.
 

Contenu connexe

Tendances

Safety & Security Hotel
Safety &  Security HotelSafety &  Security Hotel
Safety & Security HotelFaheem Ul Hasan
 
issues concerning front office.
issues concerning front office. issues concerning front office.
issues concerning front office. Tricia Mae Prado
 
Top 5 Duties Performed by Security Guard.pdf
Top 5 Duties Performed by Security Guard.pdfTop 5 Duties Performed by Security Guard.pdf
Top 5 Duties Performed by Security Guard.pdfCitiguard
 
Safety & security
Safety & securitySafety & security
Safety & securityRohit Mohan
 
How to secure your data safely in the cloud
How to secure your data safely in the cloudHow to secure your data safely in the cloud
How to secure your data safely in the cloudHouse of IT
 
Craig Coultman - Resume
Craig Coultman - ResumeCraig Coultman - Resume
Craig Coultman - ResumeCraig Coultman
 
The airport suit hotel
The airport suit hotelThe airport suit hotel
The airport suit hotelmanuelraspall
 
25 Th District Court House
25 Th District Court House25 Th District Court House
25 Th District Court HouseJessica Flamont
 
Personal Security for High Profile and High Wealth Individuals
Personal Security for High Profile and High Wealth IndividualsPersonal Security for High Profile and High Wealth Individuals
Personal Security for High Profile and High Wealth IndividualsJuval Aviv
 
Safety first (last, and always): how to assure the well being of your tenants.
Safety first (last, and always): how to assure the well being of your tenants.Safety first (last, and always): how to assure the well being of your tenants.
Safety first (last, and always): how to assure the well being of your tenants.Michael Zaransky
 

Tendances (13)

Safety & Security Hotel
Safety &  Security HotelSafety &  Security Hotel
Safety & Security Hotel
 
issues concerning front office.
issues concerning front office. issues concerning front office.
issues concerning front office.
 
Top 5 Duties Performed by Security Guard.pdf
Top 5 Duties Performed by Security Guard.pdfTop 5 Duties Performed by Security Guard.pdf
Top 5 Duties Performed by Security Guard.pdf
 
Safety & security
Safety & securitySafety & security
Safety & security
 
How to secure your data safely in the cloud
How to secure your data safely in the cloudHow to secure your data safely in the cloud
How to secure your data safely in the cloud
 
Hotel Safety & Security
Hotel Safety & SecurityHotel Safety & Security
Hotel Safety & Security
 
Craig Coultman - Resume
Craig Coultman - ResumeCraig Coultman - Resume
Craig Coultman - Resume
 
Safaty at hotels
Safaty at hotelsSafaty at hotels
Safaty at hotels
 
The airport suit hotel
The airport suit hotelThe airport suit hotel
The airport suit hotel
 
25 Th District Court House
25 Th District Court House25 Th District Court House
25 Th District Court House
 
Ims preview
Ims previewIms preview
Ims preview
 
Personal Security for High Profile and High Wealth Individuals
Personal Security for High Profile and High Wealth IndividualsPersonal Security for High Profile and High Wealth Individuals
Personal Security for High Profile and High Wealth Individuals
 
Safety first (last, and always): how to assure the well being of your tenants.
Safety first (last, and always): how to assure the well being of your tenants.Safety first (last, and always): how to assure the well being of your tenants.
Safety first (last, and always): how to assure the well being of your tenants.
 

En vedette

Astronomy
AstronomyAstronomy
Astronomybadigi
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning systems1180034
 
Massive earthquake strikes chile
Massive earthquake strikes chileMassive earthquake strikes chile
Massive earthquake strikes chiles1180109
 
Indian ocean tsunami warning system warks.
Indian ocean tsunami warning system warks.Indian ocean tsunami warning system warks.
Indian ocean tsunami warning system warks.s1180109
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning systems1180109
 
Curriculum propio
Curriculum propioCurriculum propio
Curriculum propioGGuerrero90
 
Debunking The e-Commerce Myths
Debunking The e-Commerce MythsDebunking The e-Commerce Myths
Debunking The e-Commerce MythsSAP Ariba
 
Mineral Dalam Gizi dan Diet
Mineral Dalam Gizi dan DietMineral Dalam Gizi dan Diet
Mineral Dalam Gizi dan DietSya Ombink
 
Lo stegosauro - Disegni da colorare - Sabbiarelli
Lo stegosauro - Disegni da colorare - SabbiarelliLo stegosauro - Disegni da colorare - Sabbiarelli
Lo stegosauro - Disegni da colorare - SabbiarelliSabbiarelli
 
Inwestowanie w surowce
Inwestowanie w surowceInwestowanie w surowce
Inwestowanie w surowcearturskrobich
 
Config
ConfigConfig
Configufuko
 

En vedette (20)

Astronomy
AstronomyAstronomy
Astronomy
 
Increasing conversion
Increasing conversionIncreasing conversion
Increasing conversion
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Massive earthquake strikes chile
Massive earthquake strikes chileMassive earthquake strikes chile
Massive earthquake strikes chile
 
Multimedia project
Multimedia projectMultimedia project
Multimedia project
 
Indian ocean tsunami warning system warks.
Indian ocean tsunami warning system warks.Indian ocean tsunami warning system warks.
Indian ocean tsunami warning system warks.
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Curriculum propio
Curriculum propioCurriculum propio
Curriculum propio
 
Debunking The e-Commerce Myths
Debunking The e-Commerce MythsDebunking The e-Commerce Myths
Debunking The e-Commerce Myths
 
Video digital
Video digitalVideo digital
Video digital
 
The family
The familyThe family
The family
 
Mineral Dalam Gizi dan Diet
Mineral Dalam Gizi dan DietMineral Dalam Gizi dan Diet
Mineral Dalam Gizi dan Diet
 
Abew1 cotation
Abew1 cotationAbew1 cotation
Abew1 cotation
 
Tomas muluwerk
Tomas muluwerkTomas muluwerk
Tomas muluwerk
 
Lo stegosauro - Disegni da colorare - Sabbiarelli
Lo stegosauro - Disegni da colorare - SabbiarelliLo stegosauro - Disegni da colorare - Sabbiarelli
Lo stegosauro - Disegni da colorare - Sabbiarelli
 
Resume 2013
Resume 2013Resume 2013
Resume 2013
 
Inwestowanie w surowce
Inwestowanie w surowceInwestowanie w surowce
Inwestowanie w surowce
 
Licencias creative commons
Licencias creative commonsLicencias creative commons
Licencias creative commons
 
Config
ConfigConfig
Config
 
Shifting to Low Carbon Development: Nationally and Globally
Shifting to Low Carbon Development: Nationally and GloballyShifting to Low Carbon Development: Nationally and Globally
Shifting to Low Carbon Development: Nationally and Globally
 

Similaire à Law Enforcement Administration II

FUNDAMENTALS OF INDUSTRIAL SECURITY.pdf
FUNDAMENTALS OF  INDUSTRIAL SECURITY.pdfFUNDAMENTALS OF  INDUSTRIAL SECURITY.pdf
FUNDAMENTALS OF INDUSTRIAL SECURITY.pdfFlorArquillano3
 
Security Services in Bhubaneswar, odisha
Security Services in Bhubaneswar, odishaSecurity Services in Bhubaneswar, odisha
Security Services in Bhubaneswar, odishaTechno facility
 
Experience Reliable Security with Our Dedicated Guard Services
Experience Reliable Security with Our Dedicated Guard ServicesExperience Reliable Security with Our Dedicated Guard Services
Experience Reliable Security with Our Dedicated Guard ServicesTechno facility
 
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...Md Shaifullar Rabbi
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfLandmark Security Services
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfLandmark Security Services
 
Making Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptxMaking Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptxDenaLigo
 
Occupational Health and Safety Officer
Occupational Health and Safety OfficerOccupational Health and Safety Officer
Occupational Health and Safety OfficerJonathan Alba
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfMax Secure Ltd
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to SecurityNateBrown60
 
Security training manual
Security training manualSecurity training manual
Security training manualANILDEVADKAR
 
Overall Security Services
Overall Security ServicesOverall Security Services
Overall Security Servicesiangobi
 
Terrasol security training f
Terrasol security training fTerrasol security training f
Terrasol security training fSamuel I. Michuki
 
Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Trainingworksteadc
 
SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............Muhammad Saqib
 

Similaire à Law Enforcement Administration II (20)

FUNDAMENTALS OF INDUSTRIAL SECURITY.pdf
FUNDAMENTALS OF  INDUSTRIAL SECURITY.pdfFUNDAMENTALS OF  INDUSTRIAL SECURITY.pdf
FUNDAMENTALS OF INDUSTRIAL SECURITY.pdf
 
Physical Security.pptx
Physical Security.pptxPhysical Security.pptx
Physical Security.pptx
 
Lecture 1 9 sam 100-
Lecture 1   9 sam 100-Lecture 1   9 sam 100-
Lecture 1 9 sam 100-
 
Security Services in Bhubaneswar, odisha
Security Services in Bhubaneswar, odishaSecurity Services in Bhubaneswar, odisha
Security Services in Bhubaneswar, odisha
 
Experience Reliable Security with Our Dedicated Guard Services
Experience Reliable Security with Our Dedicated Guard ServicesExperience Reliable Security with Our Dedicated Guard Services
Experience Reliable Security with Our Dedicated Guard Services
 
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
 
Security_Guard
Security_GuardSecurity_Guard
Security_Guard
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
Making Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptxMaking Quick Decission and Job Discription.pptx
Making Quick Decission and Job Discription.pptx
 
Occupational Health and Safety Officer
Occupational Health and Safety OfficerOccupational Health and Safety Officer
Occupational Health and Safety Officer
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
pln9 presentation mall
pln9 presentation mallpln9 presentation mall
pln9 presentation mall
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to Security
 
Security training manual
Security training manualSecurity training manual
Security training manual
 
Overall Security Services
Overall Security ServicesOverall Security Services
Overall Security Services
 
Terrasol security training f
Terrasol security training fTerrasol security training f
Terrasol security training f
 
Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Training
 
SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............
 

Dernier

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Dernier (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Law Enforcement Administration II

  • 1.  
  • 2. Obviously it has been in existence since the primitive ages. This is when man had to protect himself against wild animals and the harsh environment. At first security needs were simple, but as civilization complex, so did man’s security requirements. Through out the ages men started practicing the utilization of workers and equipment in order to protect his well being and property. Thus, the civilized man adopts security measures to have adequate protection against unsecured and unsafe conditions. This probably led to the establishment of the “POLICE”, an institution today responsible for law and order as well as public safety.
  • 3. “ POLICE” Originated from the Greek word “ POLITEIA” Meaning government of a city
  • 4.
  • 5. FUNDAMENTAL THEORIES OF PATROL THEORY OF POLICE OMNIPRESENCE – high police visibility discourages criminals. Normally, criminals think twice before executing their plans if there is obvious presence of police officers. Thus, patrol activity should be carried in a manner that attracts maximum attention to the police officer or police vehicles. This theory applies the principle of overt operation or high police visibility. LOW PROFILE THEORY– low police visibility increases the opportunity to apprehend criminals. Deceptive absence of the police officer will let criminals believe that they will not be detected or caught if they execute crimes that they planned. In this theory, the objective is to attract as little attention as possible while on the process of patrolling. The officers should operate in a manner that it would be difficult for either criminals or the public to determine that police are around. The principle of covert operation is integrated in this theory.
  • 6. There is an incredible growth of the security industry nowadays. Most companies are using guard forces, protective barriers, communication and electronic hardware and other state-of-the art protection methods and techniques in their asset protection. However, every company or installation cannot yet escape the emerging complicated security problems like the deteriorating peace and tranquility, the treat of terrorism and the social conditions of the community. A determine intruder can sneak in the properties of another while the owner is asleep out on a trip or anytime of the day and divest all valuable items which he can find. The incidents of fire and other disaster should also be considered in the asset protection. Hence, a basic understanding on the concept and methods of security is the primordial concern of everybody.
  • 7. Security is a state or conditions of being secured; there is a freedom from fear, harm, danger, loss, destruction or damages. Basically, it was the action of man against man that led to many unsecured and unsafe conditions. Reasons could be economic, revenge, or just plain greed and avarice. Whatever the motives, the civilized man needs adequate protection.
  • 8. Since security in general is very hard to comprehend, it can be divided into three major areas: 1. PHYSICAL SECURITY – this concern with the physical measures adopted to prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage, loss and theft. 2. PERSONAL SECURITY – it starts even before the hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is to insure that the firm hires those best suited to assist the firm in achieving its goals and objectives and once hired assist in providing necessary to the work force while carrying out their functions. 3. DOCUMENT AND INFORMATION SECURITY – this involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure. Classified documents need special handling. Lack of indoctrination and orientation among the personal handling them can result in the leakage, loss, theft and unauthorized disclosure of the documents.
  • 9. PROTECTIVE SECURITY can be defined as those measures taken by an installation or unit to protect itself against sabotage, espionage or subversion and at the same time provide freedom of action in order to provide the installation of the unit with the necessary flexibility to accomplish its mission. The aspects of protective security can be seen with the application of the following: – INDUSTRIAL SECURITY – HOTEL SECURITY – BANK SECURITY – VIP SECURITY – SCHOOL SECURITY – SUPERMARKET or MALL SECURITY – OTHER TYPES
  • 10. INDUSTRIAL SECURITY A type of security applied to business groups engaged in industries like manufacturing, assembling, research and development, processing, warehousing and even agriculture. It may also mean the business of providing security. HOTEL SECURITY A type of security applied to hotels where its properties are protected from pilferage, loss, damage, and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This type of security employs house detectives, uniforms guard and supervisor and insures that hotel guests and their personal effects are safeguarded.
  • 11. BANK SECURITY This type of security is concern with bank operations. Its main objective is the protection of bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank and assets while in storage, in transit and during transactions. VIP SECURITY A type of security applied for the protection of top-ranking officials of the government or private entity, visiting persons of illustrious standing and foreign dignitaries.
  • 12. SCHOOL SECURITY A type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students. SUPERMARKET SECURITY A type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel and customers. Security personnel are trained to detect “shoplifter”, robbery, and bomb detection and customer relation.
  • 13. OTHER TYPES This include all other security matters not covered in the 6 enumeration like; – FIESTA – BIRTHDAYS – PARTY – PARADE – CONCERT – RALLY – COURT HEARING – INAUGURATION OF PRESIDENT
  • 14. PHYSICAL SECURITY measures are being used to define, protect, and monitor property rights and assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and theft. PHYSICAL SECURITY may be also defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies, programs, personnel, property, utilities, information, facilities and installation against compromise, trespass, sabotage, pilferage, embezzlement, fraud or other dishonest criminal act.
  • 15.
  • 16. TYPES OF BARRIERS – NATURAL BARRIERS – STRUCTURAL BARRIERS – HUMAN BARRIERS – ANIMAL BARRIERS – ENERGY BARRIERS
  • 17. NATURAL BARRIERS It includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse.
  • 18. STRUCTURAL BARRIERS These are features constructed by man regardless of their original intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
  • 19. HUMAN BARRIERS Persons being used in providing a guarding system or by the nature of their employment and locations, fulfill security functions.
  • 20. ANIMAL BARRIERS Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to serve as guard dogs.
  • 21. ENERGY BARRIERS It is the employment of mechanical, electrical, electric energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. These are protective lighting, alarm system and any electronic devices used as barriers.
  • 22.