CPP •Study Guide # 2 •1 - 667 Sensitive Information Sample Questions 1. Any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is: • • • • a. b. c. d. A monopoly An unfair trade practice A trade secret A patent 1. Any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is: • • • • a. b. c. d. A monopoly An unfair trade practice A trade secret A patent 2. Probably the main reason for loss of sensitive information is: • • • • a. b. c. d. Inadvertent disclosure Deliberately stolen by outsider Industrial espionage Deliberately stolen by insider 2. Probably the main reason for loss of sensitive information is: • • • • a. b. c. d. Inadvertent disclosure Deliberately stolen by outsider Industrial espionage Deliberately stolen by insider 3. The primary tool of pre-employment screening is the: • • • • a. b. c. d. Interview Application form The investigation The investigator 3. The primary tool of pre-employment screening is the: • • • • a. b. c. d. Interview Application form The investigation The investigator 4. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to: • a. Alert senior management to marketplace changes in order to prevent surprise • b. Alert senior management as to the personal habits of competitive senior management • c. Alert government intelligence agencies to marketplace changes • d. Alert senior management to changes in protocol in foreign countries 4. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to: • a. Alert senior management to marketplace changes in order to prevent surprise • b. Alert senior management as to the personal habits of competitive senior management • c. Alert government intelligence agencies to marketplace changes • d. Alert senior management to changes in protocol in foreign countries 5. The instrument used to monitor telephone call by providing a record of all numbers dialed from a particular phone is called: • • • • a. b. c. d. A wiretap A bug An electronic surveillance A pen register 5. The instrument used to monitor telephone call by providing a record of all numbers dialed from a particular phone is called: • • • • a. b. c. d. A wiretap A bug An electronic surveillance A pen register 6. A clandestine listening device, generally a small hidden microphone and radio transmitter is known as : • • • • a. b. c. d. A bug A wiretap A tempest A beeper 6. A clandestine listening device, generally a small hidden microphone and radio transmitter is known as : • • • • a. b. c. d. A bug A wiretap A tempest A beeper 7. A microphone with a large disk-like attachment used for listening to audio from great distances is known as: • • • • a. b. c. d. Contact microphone Spike microphone Parabolic microphone Moving coil microphone 7. A microphone with a large disk-like attachment used for listening to audio from great distances is known as: • • • • a. b. c. d. Contact microphone Spike microphone Parabolic microphone Moving coil microphone 8. Sound waves too high in frequency to be heard by the human ear, generally above 20 KHZ are known as: • • • • a. b. c. d. Microwaves Ultrasonic High frequency Short-wave 8. Sound waves too high in frequency to be heard by the human ear, generally above 20 KHZ are known as: • • • • a. b. c. d. Microwaves Ultrasonic High frequency Short-wave 9. Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is “don’t discuss sensitive information” and the other is: • a. To use a wire tap detector • b. To use a radio jammer • c. To use an audio jammer • d. To use encryption equipment 9. Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is “don’t discuss sensitive information” and the other is: • a. To use a wire tap detector • b. To use a radio jammer • c. To use an audio jammer • d. To use encryption equipment 10. The unauthorized acquisition of sensitive information is known as: • • • • a. b. c. d. Industrial espionage Embezzlement Larceny False pretenses 10. The unauthorized acquisition of sensitive information is known as: • • • • a. b. c. d. Industrial espionage Embezzlement Larceny False pretenses 11. Proprietary information is: • a. Information which must be so classified under government order • b. Private information of highly sensitive character • c. Defense data which must be classified according to federal regulations • d. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly 11. Proprietary information is: • a. Information which must be so classified under government order • b. Private information of highly sensitive character • c. Defense data which must be classified according to federal regulations • d. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly 12. A trade secret is: • a. Any formula, pattern, device or compilation of information which is used in one’s business and which gives that business an opportunity to gain an advantage over competitors who do not know or use it • b. All information about a company which the company desires to protect • c. Information of a company which is registered as such with the Patent Office • d. Information so designated by the government 12. A trade secret is: • a. Any formula, pattern, device or compilation of information which is used in one’s business and which gives that business an opportunity to gain an advantage over competitors who do not know or use it • b. All information about a company which the company desires to protect • c. Information of a company which is registered as such with the Patent Office • d. Information so designated by the government 13. The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the: • • • • a. b. c. d. Time Domain Reflectometer Remote Maintenance Access Terminal Current Carrier Signaling Port Internal and Remote Signal Port 13. The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the: • • • • a. b. c. d. Time Domain Reflectometer Remote Maintenance Access Terminal Current Carrier Signaling Port Internal and Remote Signal Port 14. Which of the following is generally not true in regard to proprietary information? • a. Secret information does not have to be specifically identifiable • b. Secret information must be such that it can be effectively protected • c. The more narrowly a business defines what it regards as secret, the easier it is to protect that body of information • d. It is difficult to protect as a trade secret that which can be found in publicly accessible sources 14. Which of the following is generally not true in regard to proprietary information? • a. Secret information does not have to be specifically identifiable • b. Secret information must be such that it can be effectively protected • c. The more narrowly a business defines what it regards as secret, the easier it is to protect that body of information • d. It is difficult to protect as a trade secret that which can be found in publicly accessible sources 15. With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when: • a. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information • b. The trade secret was not registered • c. The trade secret did not involve national defense information • d. The trade secret was not in current use 15. With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when: • a. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information • b. The trade secret was not registered • c. The trade secret did not involve national defense information • d. The trade secret was not in current use 16. The class of person under a duty to safeguard a proprietary secret is known as: • • • • a. b. c. d. Agents Principals Fiduciaries Business Associates 16. The class of person under a duty to safeguard a proprietary secret is known as: • • • • a. b. c. d. Agents Principals Fiduciaries Business Associates 17. Which of the following is not a correct statement, or a general rule, involving the protection of proprietary information? • a. • b. • c. • d. By operation of common law employees are presumed to be fiduciaries to the extent they may not disclose secrets of their employers without authorization As a class, employees are the largest group of persons bound to secrecy because of their status or relationship Other than employees, any other persons to be bound to secrecy must agree to be so bound Any agreements to be bound must always be in writing and are not implied from acts 17. Which of the following is not a correct statement, or a general rule, involving the protection of proprietary information? • a. • b. • c. • d. By operation of common law employees are presumed to be fiduciaries to the extent they may not disclose secrets of their employers without authorization As a class, employees are the largest group of persons bound to secrecy because of their status or relationship Other than employees, any other persons to be bound to secrecy must agree to be so bound Any agreements to be bound must always be in writing and are not implied from acts 18. Probably the chief reason for the loss of information about sensitive operations is: • • • • a. b. c. d. Deliberately stolen by an outsider Loss by fire or other disaster Deliberately stolen by insider Lost through inadvertent disclosure 18. Probably the chief reason for the loss of information about sensitive operations is: • • • • a. b. c. d. Deliberately stolen by an outsider Loss by fire or other disaster Deliberately stolen by insider Lost through inadvertent disclosure 19. The term “eavesdropping” refers to: • • • • a. b. c. d. Wiretapping only “Bugging” only Both wiretapping and “bugging” Mail covers 19. The term “eavesdropping” refers to: • • • • a. b. c. d. Wiretapping only “Bugging” only Both wiretapping and “bugging” Mail covers 20. A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as: • • • • a. b. c. d. Carbon microphone Dynamic microphone Contact microphone Parabolic microphone 20. A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as: • • • • a. b. c. d. Carbon microphone Dynamic microphone Contact microphone Parabolic microphone 21. A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation is: • • • • a. b. c. d. Carbon microphone Dynamic microphone Contact microphone Parabolic microphone 21. A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation is: • • • • a. b. c. d. Carbon microphone Dynamic microphone Contact microphone Parabolic microphone 22. Which of the following is not true with regard to electronic eavesdropping: • a. • b. • c. A listening device installed in a wire will cause a crackling sound, click or other noise than can be heard on the line An effective countermeasures survey to detect evidence of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment All wiring should be traced out and accounted for in a countermeasures survey • d. In a countermeasures survey to detect electronic eavesdropping. A physical search should be utilized as well as an electronic search 22. Which of the following is not true with regard to electronic eavesdropping: • a. • b. • c. A listening device installed in a wire will cause a crackling sound, click or other noise than can be heard on the line An effective countermeasures survey to detect evidence of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment All wiring should be traced out and accounted for in a countermeasures survey • d. In a countermeasures survey to detect electronic eavesdropping. A physical search should be utilized as well as an electronic search 23. In designing a proprietary information protection program, the area of greatest vulnerability is: • • • • a. b. c. d. Personnel files Marketing data Employees Computers 23. In designing a proprietary information protection program, the area of greatest vulnerability is: • • • • a. b. c. d. Personnel files Marketing data Employees Computers 24. Two of the three most common methods of information losses are inadvertent disclosure and industrial espionage. Which of the following is the third: • • • • a. b. c. d. Newspaper articles Television Magazine articles Theft by an insider 24. Two of the three most common methods of information losses are inadvertent disclosure and industrial espionage. Which of the following is the third: • • • • a. b. c. d. Newspaper articles Television Magazine articles Theft by an insider 25. Which of the following statements is incorrect with regard to an information security program? • a. • b. • c. • d. A good information security program will provide absolute protection against an enemy spy The information security program is an attempt to make theft of sensitive information difficult, not necessarily eliminate it A trust relationship must be established and maintained with employees The good will and compliance of employees is crucial for success 25. Which of the following statements is incorrect with regard to an information security program? • a. • b. • c. • d. A good information security program will provide absolute protection against an enemy spy The information security program is an attempt to make theft of sensitive information difficult, not necessarily eliminate it A trust relationship must be established and maintained with employees The good will and compliance of employees is crucial for success 26. Vital records normally constitute the following percentage of the company’s total records: • • • • a. b. c. d. 2% 5% 10% 15% 26. Vital records normally constitute the following percentage of the company’s total records: • • • • a. b. c. d. 2% 5% 10% 15% 27. A specially constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as: • • • • a. b. c. d. Parabolic microphone Special audio microphone Contact microphone Surreptitious microphone 27. A specially constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as: • • • • a. b. c. d. Parabolic microphone Special audio microphone Contact microphone Surreptitious microphone 28. “Social engineering” is: • a. The conversation involved in the beginning of a romantic relationship • b. A function of the personnel department in which like persons are teamed together in workshops or seminars for maximum productivity • c. The subtle elicitation of information without revealing the true purpose of the call • d. The specific design of a business structure to facilitate the interaction of the inhabitants 28. “Social engineering” is: • a. The conversation involved in the beginning of a romantic relationship • b. A function of the personnel department in which like persons are teamed together in workshops or seminars for maximum productivity • c. The subtle elicitation of information without revealing the true purpose of the call • d. The specific design of a business structure to facilitate the interaction of the inhabitants 29. A former employee, who had access to your trade secret information, is now employed by a competitor and is apparently using the trade secret information to gain market share. There are several serious factors you should consider before you institute litigation in the matter. Which of the following is not a serious factor to be considered? • a. You may have to expose the very secrets you are attempting to protect • b. The cost of the litigation may exceed the value of the secret information • c. You may lose your case • d. Other employees may leave the company and attempt to use trade secret information in the business of a new employer 29. A former employee, who had access to your trade secret information, is now employed by a competitor and is apparently using the trade secret information to gain market share. There are several serious factors you should consider before you institute litigation in the matter. Which of the following is not a serious factor to be considered? • a. You may have to expose the very secrets you are attempting to protect • b. The cost of the litigation may exceed the value of the secret information • c. You may lose your case • d. Other employees may leave the company and attempt to use trade secret information in the business of a new employer 30. Electromagnetic radiation is detectable electromagnetic energy is generated by electronic information processing devices. Which of the following is used to protect very sensitive equipment? • • • • a. b. c. d. A current carrier device Pneumatic cavity shielding Tempest shielding Pen register shielding 30. Electromagnetic radiation is detectable electromagnetic energy is generated by electronic information processing devices. Which of the following is used to protect very sensitive equipment? • • • • a. b. c. d. A current carrier device Pneumatic cavity shielding Tempest shielding Pen register shielding Significant Notes Sensitive Information The basis for any industrial espionage prevention program is protection of information There are many kinds of information which a company would like to keep in a confidential status but not all such information could be classified as “trade secrets” One definition of “trade secret” is “information including formula, pattern, compilation, program, device, method, technique or process that; a. Derives independent economic value, actual or potential, from not being generally known to and not being readily ascertainable by proper means, by other persons who can obtain economic value from its disclosure or use, and b. Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy. “Proprietary information” is information of value owned by or entrusted to a company which relates to the operations of the company and which has not been disclosed publicly A “trade secret” is part of a company’s proprietary information but not all propriety information necessarily fits the definition of “trade secret” information Generally “trade secrets” are given a higher degree of legal protection than other proprietary information There are three basic requirements of a “trade secret” a. b. c. Must be of competitive advantage Must be secret Must be used in the business of the owner Information must meet the following requirements to fit the definition required of a “trade secret” a. b. c. d. e. Must be specifically identifiable Cannot be found in publicly accessible sources Should be disclosed by owner only to those under a duty to protect secrecy Persons afforded knowledge of secret information must know it to be confidential The owners must be able to show they have instituted adequate protective measures to safeguard secrecy of date Unless the owner of a trade secret can furnish proof of diligent care in the protection of a trade secret, such trade secret may be lost Patent laws provide that an inventor who first develops a new machine, manufacturing process, composition or matter, plan or design that is sufficiently novel and useful can apply for and receive an exclusive right to that invention for a period of 17 years “Inadvertent disclosure” probably is the chief reason for loss of information about sensitive operations One method important in protection of sensitive information is installing an effective “awareness program” to assure all employees are aware of the existence of sensitive data in the company and their responsibilities in protecting such Another important protective device is the use of “nondisclosure agreements”(employee patent and secrecy agreements) from employees in which the employees acknowledge their fiduciary responsibility A “non-competitive agreement” is agreement on part of employee upon leaving employment of one company that the employee will not accept employment with a defined competitor for a stated period of time A telephone instrument may also be utilized as a listening device In an electronic countermeasure survey, note that light switches and electrical outlets are favorite places to install listening devices Most loss of proprietary information occurs because of negligence One very important protective measure used to safeguard sensitive data is to disclose such only in a need-to-know basis Theft of sensitive information through industrial espionage methods or other methods of outside theft accounts for a smaller loss than through negligence; however, the loss through outside theft is more dangerous because the data stolen is usually the most valuable One of the biggest problems in designing a proprietary information protection program is caused by the large amount of vital data processed and analyzed electronically Employees are the greatest vulnerability in a proprietary information protection program. Accordingly, an employee awareness program is necessary whereby they are educated with regard to their responsibilities in protecting sensitive data. Definitions • Proprietary Information – Information over which the possessor asserts ownership and which is related to the activities or status of the possessor in some special way Definitions • Patent – A government grant conveying and securing the exclusive right to make, use, and sell an invention for a term of years (seventeen) Trade Secret • A trade Secret is a process or device for continuous use in the operation of the business • For trade secret protection, must prove – Secrecy – Value – Use in the owner’s business Trade Secret • Trade Secret information is entitled by law to more protection than other kinds of proprietary information Trade Secret • The following are not trade secrets: – Salary information – Rank surveys – Customer usage evaluation – Profitability margins – Unit costs – Personnel changes Trade Secret / Patent • A trade secret remains secret as long as it continues to meet trade secret tests but the exclusive right to patent protection expires after 17 years Trade Secret / Patent • Since anyone can purchase a patent, there are not industrial espionage targets in a patented invention • Trade Secrets are targets Proprietary Information • Two approaches used to deal with P.I.: • “Property Concept” – regards the information as having independent value if it amounts to a trade secret • “Fiduciaries” – Imposition of duties upon certain classes of people, other than the owner not to use or divulge info without owner’s consent. Proprietary Information • There are 3 broad threats to proprietary information: – It can be lost through inadvertent disclosure – It can be deliberately stolen by an outsider – It can be deliberately stolen by an insider Competitive Intelligence Gathering • The most important function of competitive intelligence gathering is to alert senior management to marketplace changes in order to prevent surprise Competitive Intelligence Gathering • A rich source of information is in the information provided to government regulators • Never reveal information to anyone that you would not reveal to a competitor Industrial Espionage • Industrial espionage is the theft of information by legal or illegal means. It is more dangerous than inadvertent disclosure by employees in that highly valuable information is stolen for release to others who plan to exploit it. Protection Programs • The vulnerability assessment is conducted from the perspective of the competitor and considers: – What critical information exists – The period of time when the information is critical. This may be a short period or may be for the life of a product – The identity of employees and indirect associates who have access to the information Eavesdropping Tactics & Equipment • “Wiretapping” - is the interception of communication over a wire w/o participants consent and requires physical entry into the communication circuit • “Bugging” - interception of communication w/o participants consent by means of electronic devices and w/o penetration of a wire. Eavesdropping Tactics & Equipment • Eavesdropping is a psychological traumatic experience for the victim. • It is the most devastating of espionage techniques. Wired microphones • Carbon microphone – commonly used in a standard telephone handset • Crystal microphone – generates a small electrical current when the crystal is vibrated by sound waves • Contact microphone – installed on a common wall with the target area Wired microphones • Spike microphone – installed in a hole in the common wall (not fully through) • Dynamic microphone – movement of a small wire near a permanent magnet converts sound into electrical energy. Good eavesdropping device which operates as a loudspeaker in reverse Wired microphones • Pneumatic cavity device – has a specially designed small cavity which picks up surface vibrations. (Glass tumbler effect) • Condenser microphone – high fidelity use. Fragile and sensitive • Electret microphone – used primarily in P.A. and audio recording. (Extremely small) Wired microphones • Omnidirectional microphone – used in conferences. Picks up sound from many directions around the room • Cardioid microphone – picks up sound from directly in front of mic • Parabolic microphone – gathers audio energy and directs it to a conventional microphone in the center of a dishtype reflector Wireless microphones • A radio frequency (RF) device. Consists of: – A microphone – A transmitter – A power supply – An antenna; and, – A receiver Light transformation • 1. Infrared light wave transmissions use light waves invisible to the human eye. Sound waves are converted to electronic impulses and the pulses are used to modulate infrared light waves. Similar to a TV remote Light transformation • 2. Laser (Light Amplification by Stimulated Emission of Radiation) transmission of sound does not require any equipment in the surveillance area. A laser beam focused on a window pane or a reflective object in the room. The vibrating glass modulates a reflected laser beam. Rarely used due to interference. Light transformation • 3. Fiber optic laser transmission uses a communications grade glass fiber, filled with laser light, routed through the surveillance area. Sound waves cause the fiber to vibrate slightly, altering the laser light. Electromagnetic radiation • Detectable electromagnetic energy is generated by electronic information processing devices. Detection is possible for several hundred feet. The “faraday cage” or “tempest shielding” is used for very sensitive equipment. Telephone eavesdropping • Digital systems - originally thought to be secure: • Digit stream can be recorded and converted to analog and speech. • The control system is available from an onsite terminal or from off-site through the network. (Remote Maintenance Access Terminal) (RMAT) The Eavesdropping Threat • Risk for the electronic eavesdropper is low: – – – – – electronic eavesdropping is easily committed chances are low that victim will find the device chances low, if found, can be tied to eavesdropper prosecution of eavesdropping cases is rare; and, the reward far outweighs the risk Miscellaneous • Plenum – space above a dropped ceiling • Variable Path Encryption (VPE) • is particularly useful to secure cellular signals. A call is made to a toll-free number of the VPE provider. A unit attached to the cellular set and a unit at the VPE provider alter the communication between them. The signal is sent in the clear from the VPE provider to the intended destination of the call Miscellaneous • Time domain reflectometry – an electronic picture of the telephone line at a given time which is compared to the same line at a future time Miscellaneous • Audio masking – generation of noise at the perimeter of the secure area to cover or mask conversation. Music is not used; “white” or “pink” noise is not as easily filtered from the tape Security Management Sample Questions 1. One supervisor can effectively control only a limited number of people and that limit should not be exceeded. This principle is called: • • • • a. b. c. d. Unity of command Supervisory limits Span of control Line of discipline 1. One supervisor can effectively control only a limited number of people and that limit should not be exceeded. This principle is called: • • • • a. b. c. d. Unity of command Supervisory limits Span of control Line of discipline 2. An important principle of organization is that an employee should be under the direct control of one and only one immediate supervisor. This principle is : • • • • a. b. c. d. Unity of command Supervisory limits Span of control Line of discipline 2. An important principle of organization is that an employee should be under the direct control of one and only one immediate supervisor. This principle is : • • • • a. b. c. d. Unity of command Supervisory limits Span of control Line of discipline 3. From an organizational standpoint, the head of security should report to: • • • • a. b. c. d. Superintendent of buildings Manager of buildings and grounds Head housekeeper A vice-president or higher 3. From an organizational standpoint, the head of security should report to: • • • • a. b. c. d. Superintendent of buildings Manager of buildings and grounds Head housekeeper A vice-president or higher 4. The most conspicuous role of the security department in any organization is that of: • • • • a. b. c. d. Educational services Management services Special services Protective services 4. The most conspicuous role of the security department in any organization is that of: • • • • a. b. c. d. Educational services Management services Special services Protective services 5. Training sessions consisting of a security awareness program for new employees should be conducted by: • • • • a. b. c. d. Special training officers Security personnel Consultants skilled in training Member of management 5. Training sessions consisting of a security awareness program for new employees should be conducted by: • • • • a. b. c. d. Special training officers Security personnel Consultants skilled in training Member of management 6. • • • • There are necessary and legitimate exceptions to the principle of unity of command. One condition which sometimes allows for shifting in supervision is: a. When order is given by the rank of captain or above b. When order is given by the head of a department c. When the order is given by the head of internal affairs d. During emergencies 6. • • • • There are necessary and legitimate exceptions to the principle of unity of command. One condition which sometimes allows for shifting in supervision is: a. When order is given by the rank of captain or above b. When order is given by the head of a department c. When the order is given by the head of internal affairs d. During emergencies 7. Perhaps the most common shortcoming in the security industry is: • a. Lack of support by top management • b. Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities (supervisor training) • c. Lack of planning • d. Lack of monetary resources 7. Perhaps the most common shortcoming in the security industry is: • a. Lack of support by top management • b. Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities (supervisor training) • c. Lack of planning • d. Lack of monetary resources 8. As a rule, which department of the company administers the recruiting activity? • • • • a. b. c. d. The security department Administrative department Personnel department Internal affairs 8. As a rule, which department of the company administers the recruiting activity? • • • • a. b. c. d. The security department Administrative department Personnel department Internal affairs 9. • • • • In non-entry level recruiting, the recommended technique is: a. b. c. d. “Blind ad” Open advertisement in newspaper Advertisement in trade journal By word of mouth on selective basis 9. • • • • In non-entry level recruiting, the recommended technique is: a. b. c. d. “Blind ad” Open advertisement in newspaper Advertisement in trade journal By word of mouth on selective basis 10. Every applicant’s first interview should be with: • • • • a. b. c. d. The security manager director The security supervisor A security line employee A personnel interviewer 10. Every applicant’s first interview should be with: • • • • a. b. c. d. The security manager director The security supervisor A security line employee A personnel interviewer 11. The heart of personnel selection is: • • • • a. b. c. d. Polygraph test Review of application Interview Background investigation 11. The heart of personnel selection is: • • • • a. b. c. d. Polygraph test Review of application Interview Background investigation 12. Which of the following is not recommended policy with regard to security manuals? • a. It must be updated on a regular basis • b. Employees should not be allowed to have possession of it • c. The manual should be put in the hands of all regular security personnel • d. It should include procedural instructions for specific incidents 12. Which of the following is not recommended policy with regard to security manuals? • a. It must be updated on a regular basis • b. Employees should not be allowed to have possession of it • c. The manual should be put in the hands of all regular security personnel • d. It should include procedural instructions for specific incidents 13. Discipline is primarily the responsibility of: • • • • a. b. c. d. The supervisor The employee The security manager or director The inspection division 13. Discipline is primarily the responsibility of: • • • • a. b. c. d. The supervisor The employee The security manager or director The inspection division 14. Among classical theories of human behavior in the work environment, one emphasizes negative aspects of employee behavior which is known as: • • • • a. b. c. d. The autocrat theory The custodial theory The supportive theory McGregor’s “Theory X” 14. Among classical theories of human behavior in the work environment, one emphasizes negative aspects of employee behavior which is known as: • • • • a. b. c. d. The autocrat theory The custodial theory The supportive theory McGregor’s “Theory X” 15. Among classical theories of human behavior in the work environment is one which suggests that employees do not inherently dislike work and will actually seek responsibility and better performance if encouraged to do so. It is known as: • • • • a. b. c. d. McGregor’s “Theory Y” McGregor’s “Theory X” The supportive theory The motivation theory 15. Among classical theories of human behavior in the work environment is one which suggests that employees do not inherently dislike work and will actually seek responsibility and better performance if encouraged to do so. It is known as: • • • • a. b. c. d. McGregor’s “Theory Y” McGregor’s “Theory X” The supportive theory The motivation theory 16. Dr. Frederick Herzberg developed a position that motivation comes from work itself, not from those factors such as salary and job security. This theory is known as: • • • • a. b. c. d. The supportive theory The work motivation theory The custodial theory McGregor’s “Theory X” 16. Dr. Frederick Herzberg developed a position that motivation comes from work itself, not from those factors such as salary and job security. This theory is known as: • • • • a. b. c. d. The supportive theory The work motivation theory The custodial theory McGregor’s “Theory X” 17. Which of the following is not an advantage of using in-house (career) personnel? • a. Career personnel develop a loyalty to the department • b. Career personnel tend to be more ambitious • c. There is more stability among career personnel • d. Career personnel constitute a fixed, limited cadre or pool of manpower resources 17. Which of the following is not an advantage of using in-house (career) personnel? • a. Career personnel develop a loyalty to the department • b. Career personnel tend to be more ambitious • c. There is more stability among career personnel • d. Career personnel constitute a fixed, limited cadre or pool of manpower resources 18. Which of the following is known to be one of the disadvantages of contract security services? • • • • a. b. c. d. Turnover Cost Manpower resource Skills 18. Which of the following is known to be one of the disadvantages of contract security services? • • • • a. b. c. d. Turnover Cost Manpower resource Skills 19. Ideally, the person who should conduct the inspection of a security department is: • • • • a. b. c. d. An outside consultant The second ranking person The security director or security manager The ranking sergeant 19. Ideally, the person who should conduct the inspection of a security department is: • • • • a. b. c. d. An outside consultant The second ranking person The security director or security manager The ranking sergeant 20. The process of determining the probability and cost of potential loss is known as: • • • • a. b. c. d. Probability analysis Risk assessment Potential loss analysis Physical survey 20. The process of determining the probability and cost of potential loss is known as: • • • • a. b. c. d. Probability analysis Risk assessment Potential loss analysis Physical survey 21. In conducting background investigations, it is good policy to: • a. Not let prospective employee know investigation is being conducted • b. Restrict investigation to “confidential” records checks • c. Restrict investigation to employment checks • d. Advise applicant of forthcoming investigation and secure his permission 21. In conducting background investigations, it is good policy to: • a. Not let prospective employee know investigation is being conducted • b. Restrict investigation to “confidential” records checks • c. Restrict investigation to employment checks • d. Advise applicant of forthcoming investigation and secure his permission 22. The ultimate responsibility for the internal security in a department should rest with: • • • • a. b. c. d. The president Chairman of the board Security director The line supervisor 22. The ultimate responsibility for the internal security in a department should rest with: • • • • a. b. c. d. The president Chairman of the board Security director The line supervisor 23. The behavioral scientist whose key concept is that every executive relates to his subordinates on the basis of a set of assumptions termed theory X and theory Y was formulated by: • • • • a. b. c. d. Abraham Maslow Douglas McGregor Warren Bennis B.F. Skinner 23. The behavioral scientist whose key concept is that every executive relates to his subordinates on the basis of a set of assumptions termed theory X and theory Y was formulated by: • • • • a. b. c. d. Abraham Maslow Douglas McGregor Warren Bennis B.F. Skinner 24. The issuance of weapons to guards is usually not justified: • a. In a situation where deterrence is needed in handling control of large amounts of cash • b. In situations in which terrorism is a real threat • c. In situations where there would be greater danger to life without weapons than with them • d. In a situation where there is no danger to life safety 24. The issuance of weapons to guards is usually not justified: • a. In a situation where deterrence is needed in handling control of large amounts of cash • b. In situations in which terrorism is a real threat • c. In situations where there would be greater danger to life without weapons than with them • d. In a situation where there is no danger to life safety 25. In issuing policy statements regarding the handling of disturbed persons, the primary consideration is: • a. Legal liability to the disturbed • b. Reducing the disturbed person to a form of benevolent custody and eliminating the immediate danger • c. Legal liability to employees and third persons if restraint not achieved • d. Employee-community public relations 25. In issuing policy statements regarding the handling of disturbed persons, the primary consideration is: • a. Legal liability to the disturbed • b. Reducing the disturbed person to a form of benevolent custody and eliminating the immediate danger • c. Legal liability to employees and third persons if restraint not achieved • d. Employee-community public relations 26. Spotting the individual loss events that might take place is the primary step in dealing with security vulnerability. This process is called • • • • a. b. c. d. Loss event probability Threat assessment process Loss event profile Actual threat analysis 26. Spotting the individual loss events that might take place is the primary step in dealing with security vulnerability. This process is called • • • • a. b. c. d. Loss event probability Threat assessment process Loss event profile Actual threat analysis 27. The likelihood or probability of risks affecting the assets becoming actual loss events is known as: • • • • a. b. c. d. Loss event probability Loss event profile Threat analysis control Threat target control 27. The likelihood or probability of risks affecting the assets becoming actual loss events is known as: • • • • a. b. c. d. Loss event probability Loss event profile Threat analysis control Threat target control 28. The impact or effect on the enterprise if the loss occurs is known as: • • • • a. b. c. d. Loss event profile Loss event probability Loss event criticality Security survey analysis 28. The impact or effect on the enterprise if the loss occurs is known as: • • • • a. b. c. d. Loss event profile Loss event probability Loss event criticality Security survey analysis 29. Which of the following is considered to be one of the 3 basic functions of risk management? • • • • a. b. c. d. Lock control Barrier control Disaster management Loss control 29. Which of the following is considered to be one of the 3 basic functions of risk management? • • • • a. b. c. d. Lock control Barrier control Disaster management Loss control 30. Oscar Neuman published a classic in which he presented ideas and applied strategies from the New York public housing project to aid in reducing the risk of being victimized and reducing fear of crime when on the streets. What is the name of this book? • • • • a. b. c. d. Crime Prevention Crime Reduction Defensible Space Crime in Architectural Planning 30. Oscar Neuman published a classic in which he presented ideas and applied strategies from the New York public housing project to aid in reducing the risk of being victimized and reducing fear of crime when on the streets. What is the name of this book? • • • • a. b. c. d. Crime Prevention Crime Reduction Defensible Space Crime in Architectural Planning 31. From a security perspective, what is the first factor to be considered in facility construction? • a. The identity of experienced consultants • b. An effective security plan • c. An architect with knowledge of physical security • d. The building site itself 31. From a security perspective, what is the first factor to be considered in facility construction? • a. The identity of experienced consultants • b. An effective security plan • c. An architect with knowledge of physical security • d. The building site itself 32. A critical on-site examination and analysis of an industrial plant business, home or public or private institution to ascertain the present security status, to identify deficiencies or excesses to determine the protection needed to make recommendations to improve the overall security is the definition of : • • • • a. b. c. d. Security survey Risk analysis Full-field inspection Crime prevention assessment 32. A critical on-site examination and analysis of an industrial plant business, home or public or private institution to ascertain the present security status, to identify deficiencies or excesses to determine the protection needed to make recommendations to improve the overall security is the definition of : • • • • a. b. c. d. Security survey Risk analysis Full-field inspection Crime prevention assessment 33. There are two generally accepted definitions of risk. These are more commonly known to risk managers and security officers as: • • • • a. b. c. d. Potential risk and dynamic risk Profit risk and dynamic risk Potential risk and pure risk Pure risk and dynamic risk 33. There are two generally accepted definitions of risk. These are more commonly known to risk managers and security officers as: • • • • a. b. c. d. Potential risk and dynamic risk Profit risk and dynamic risk Potential risk and pure risk Pure risk and dynamic risk 34. The most effective deterrent to shoplifting is: • a. Highly competent and educated security officers • b. Widespread use of sensor devices • c. Well positioned CCTV’s • d. Well trained personnel 34. The most effective deterrent to shoplifting is: • a. Highly competent and educated security officers • b. Widespread use of sensor devices • c. Well positioned CCTV’s • d. Well trained personnel 35. A simplified answer to the question of why employees steal is: • • • • a. b. c. d. Sickness in family To feed a drug habit To live on a higher level The theft triangle 35. A simplified answer to the question of why employees steal is: • • • • a. b. c. d. Sickness in family To feed a drug habit To live on a higher level The theft triangle 36. Many experts agree that the most important deterrent to internal theft is: • • • • a. b. c. d. Threat of dismissal Fear of discovery Threat of prosecution Conscience pangs 36. Many experts agree that the most important deterrent to internal theft is: • • • • a. b. c. d. Threat of dismissal Fear of discovery Threat of prosecution Conscience pangs 37. Crime analysis is a key element in focusing the use of police and security resources to address crime problems. Data collection and analysis are two specific steps. The other two are: • • • • a. b. c. d. Inspection and discovery of facts Response and feedback Feedback and corrective action Dissemination and feedback 37. Crime analysis is a key element in focusing the use of police and security resources to address crime problems. Data collection and analysis are two specific steps. The other two are: • • • • a. b. c. d. Inspection and discovery of facts Response and feedback Feedback and corrective action Dissemination and feedback 38. It is generally accepted that insurance rates are dependent upon two primary variables. These are: • a. Cost of claims and competitors rates • b. Competition among insurance companies and frequency of claims • c. Cost of claims and frequency of claims • d. Cost of claims and government regulations 38. It is generally accepted that insurance rates are dependent upon two primary variables. These are: • a. Cost of claims and competitors rates • b. Competition among insurance companies and frequency of claims • c. Cost of claims and frequency of claims • d. Cost of claims and government regulations 39. The basic types of protection which security personnel realize as best can be described by the following: • • • • a. b. c. d. Fidelity Bonds Surety Bonds Burglary/Robbery/Theft Insurance All of the above 39. The basic types of protection which security personnel realize as best can be described by the following: • • • • a. b. c. d. Fidelity Bonds Surety Bonds Burglary/Robbery/Theft Insurance All of the above 40. Bonds which require that an employee be investigated by the bonding company to limit the risk of dishonesty, and if that trust is violated, the insurance company must indemnify the employer, are called: • • • • a. b. c. d. Surety Bonds Fidelity Bonds Insurance Bonds Blanket Bonds 40. Bonds which require that an employee be investigated by the bonding company to limit the risk of dishonesty, and if that trust is violated, the insurance company must indemnify the employer, are called: • • • • a. b. c. d. Surety Bonds Fidelity Bonds Insurance Bonds Blanket Bonds 41. Protection for a corporation, if there is a failure to perform specified acts within a certain period of time, is known as a: • • • • a. b. c. d. Contract Bond Blanket Bond Surety Bond Fiduciary Bond 41. Protection for a corporation, if there is a failure to perform specified acts within a certain period of time, is known as a: • • • • a. b. c. d. Contract Bond Blanket Bond Surety Bond Fiduciary Bond 42. The urban planning and design process which integrates crime prevention techniques with neighborhood design is known as: • • • • a. b. c. d. Urban Development Planning Conceptual Modeling in Architecture Environmental Design Environmental Security (E/S) 42. The urban planning and design process which integrates crime prevention techniques with neighborhood design is known as: • • • • a. b. c. d. Urban Development Planning Conceptual Modeling in Architecture Environmental Design Environmental Security (E/S) 43. The ability of design to counteract the perception that the area is isolated and criminally vulnerable is known as: • • • • a. b. c. d. Natural Surveillance Techniques Image and Milieu Soft Area Protection Territorial Cleansing 43. The ability of design to counteract the perception that the area is isolated and criminally vulnerable is known as: • • • • a. b. c. d. Natural Surveillance Techniques Image and Milieu Soft Area Protection Territorial Cleansing 44. The greatest ongoing threat to any business is: • • • • a. b. c. d. Shoplifting Shrinkage Internal Theft Pilferage 44. The greatest ongoing threat to any business is: • • • • a. b. c. d. Shoplifting Shrinkage Internal Theft Pilferage 45. Pilferage is defined as stealing in small quantities over a long period of time. The taking of property entrusted to someone’s care is called: • • • • a. b. c. d. Mistake of fact Misprison of a felony Uttering Embezzlement 45. Pilferage is defined as stealing in small quantities over a long period of time. The taking of property entrusted to someone’s care is called: • • • • a. b. c. d. Mistake of fact Misprison of a felony Uttering Embezzlement 46. The theft triangle consists of the following components: • • • • a. b. c. d. Desire, skill and training Motivation, skill and opportunity Opportunity, desire and skill Motivation, opportunity and rationalization (Desire) 46. The theft triangle consists of the following components: • • • • a. b. c. d. Desire, skill and training Motivation, skill and opportunity Opportunity, desire and skill Motivation, opportunity and rationalization (Desire) 47. A line item budget is the traditional and most frequently used method of budgeting. Two other commonly used budgeting techniques include: • • • • a. b. c. d. Management and program budgets Capital and program budgets Program and exception item budgets Fund allocation and capital budgets 47. A line item budget is the traditional and most frequently used method of budgeting. Two other commonly used budgeting techniques include: • • • • a. b. c. d. Management and program budgets Capital and program budgets Program and exception item budgets Fund allocation and capital budgets 48. A management tool wherein there is a systematic method of achieving agreed upon goals set in advance is known as : • • • • a. b. c. d. Matrix Management Proactive Management Scheduling Management Management by Objective 48. A management tool wherein there is a systematic method of achieving agreed upon goals set in advance is known as : • • • • a. b. c. d. Matrix Management Proactive Management Scheduling Management Management by Objective 49. The activity concerned with proposals for the future, an analysis of these proposals and method for achieving them is known as: • • • • a. b. c. d. Effective Management Evaluation Techniques Planning Budgeting 49. The activity concerned with proposals for the future, an analysis of these proposals and method for achieving them is known as: • • • • a. b. c. d. Effective Management Evaluation Techniques Planning Budgeting 50. A key element in focusing the use of police and security resources to address crime problems is commonly called: • • • • a. b. c. d. Data collection and analysis Systematic evaluation of data available Crime analysis Analysis and feedback 50. A key element in focusing the use of police and security resources to address crime problems is commonly called: • • • • a. b. c. d. Data collection and analysis Systematic evaluation of data available Crime analysis Analysis and feedback 51. According to estimates, about 1/3 of all business failures are caused by: • • • • a. b. c. d. Thefts by outsiders (non-employees) Thefts by employees Mismanagement Poor quality of product 51. According to estimates, about 1/3 of all business failures are caused by: • • • • a. b. c. d. Thefts by outsiders (non-employees) Thefts by employees Mismanagement Poor quality of product 52. The major item conspicuously absent from police-based crime prevention programs was: • a. Comprehensive training program • b. Manpower dedicated to crime prevention concepts • c. The input of huge number of persons employed in private security • d. Use of up-dated technology 52. The major item conspicuously absent from police-based crime prevention programs was: • a. Comprehensive training program • b. Manpower dedicated to crime prevention concepts • c. The input of huge number of persons employed in private security • d. Use of up-dated technology 53. What was the most frequent recommendation made by both law enforcement and security managers to improve private security and their working relationships with police? • a. Higher entry-level pay • b. Upgrading quality of security personnel • c. A planned educational program involving both police and private security • d. Requirement of being armed 53. What was the most frequent recommendation made by both law enforcement and security managers to improve private security and their working relationships with police? • a. Higher entry-level pay • b. Upgrading quality of security personnel • c. A planned educational program involving both police and private security • d. Requirement of being armed 54. The most frequently shared resource between law enforcement and private security is: • • • • a. b. c. d. CCTV and other surveillance equipment Personnel “Buy money” for stolen goods Reward money 54. The most frequently shared resource between law enforcement and private security is: • • • • a. b. c. d. CCTV and other surveillance equipment Personnel “Buy money” for stolen goods Reward money 55. The main objective of private security is: • a. To apprehend those who steal property from their firms • b. To protect assets and prevent losses • c. To assist police in investigations of crimes • d. To prevent unauthorized persons entry on firm’s property 55. The main objective of private security is: • a. To apprehend those who steal property from their firms • b. To protect assets and prevent losses • c. To assist police in investigations of crimes • d. To prevent unauthorized persons entry on firm’s property 56. What is the most frequently investigated crime by private security? • • • • a. b. c. d. Employee theft Shoplifting Bad checks Embezzlement 56. What is the most frequently investigated crime by private security? • • • • a. b. c. d. Employee theft Shoplifting Bad checks Embezzlement 57. The two major components of economic crime have been: • • • • a. b. c. d. Employee theft and corporate bribery Fraud and embezzlement White collar and ordinary crime Computer and ordinary crime 57. The two major components of economic crime have been: • • • • a. b. c. d. Employee theft and corporate bribery Fraud and embezzlement White collar and ordinary crime Computer and ordinary crime 58. The practice of preventing unauthorized persons from gaining information by analyzing electromagnetic emanations from electronic equipment is often termed: • • • • a. b. c. d. Tempest Veiling Bugging Hardening 58. The practice of preventing unauthorized persons from gaining information by analyzing electromagnetic emanations from electronic equipment is often termed: • • • • a. b. c. d. Tempest Veiling Bugging Hardening 59. Which of the following is not a correct statement with regard to narcotics? • a. The term “narcotic” in it’s medical meaning refers to opium and opium derivatives or synthetic substitutes • b. They are the most effective agents known for the relief of intense pain • c. They have been used for a long period of time as a remedy for diarrhea • d. They tend to intensify vision and increase alertness 59. Which of the following is not a correct statement with regard to narcotics? • a. The term “narcotic” in it’s medical meaning refers to opium and opium derivatives or synthetic substitutes • b. They are the most effective agents known for the relief of intense pain • c. They have been used for a long period of time as a remedy for diarrhea • d. They tend to intensify vision and increase alertness 60. Which of the following characteristics does not pertain to morphine? • a. It is the principal constituent of opium • b. Its legal use is restricted primarily to hospitals • c. It tastes sweet and is marketed in the form of yellow crystals • d. Tolerance and dependence develop rapidly 60. Which of the following characteristics does not pertain to morphine? • a. It is the principal constituent of opium • b. Its legal use is restricted primarily to hospitals • c. It tastes sweet and is marketed in the form of yellow crystals • d. Tolerance and dependence develop rapidly 61. Most of this substance is produced from morphine; but it is often combined with other products such as aspirin or Tylenol. It is often used for the relief of coughs; and it is by far the most widely used natural occurring narcotic in medical treatment. It is: • • • • a. b. c. d. Barbiturates Mescaline Chloral Hydrate Codeine 61. Most of this substance is produced from morphine; but it is often combined with other products such as aspirin or Tylenol. It is often used for the relief of coughs; and it is by far the most widely used natural occurring narcotic in medical treatment. It is: • • • • a. b. c. d. Barbiturates Mescaline Chloral Hydrate Codeine 62. German scientists synthesized methadone during World War II because of a shortage of morphine. Which of the following is not characteristic of methadone and it’s usage ? • a. Although chemically unlike morphine and heroin, it produces many of the same effects • b. It was distributed under such names as amidone, dolophine, and methadone • c. It was widely used in the 1960’s in the treatment of narcotic addicts. • d. It is only effective when administered by injection 62. German scientists synthesized methadone during World War II because of a shortage of morphine. Which of the following is not characteristic of methadone and it’s usage ? • a. Although chemically unlike morphine and heroin, it produces many of the same effects • b. It was distributed under such names as amidone, dolophine, and methadone • c. It was widely used in the 1960’s in the treatment of narcotic addicts. • d. It is only effective when administered by injection 63. Which of the following characteristics do not pertain to the use or effects of depressants generally? • a. The usual methods of administration are oral or injected. • b. Excessive use results in drunken behavior similar to that of alcohol • c. There is no danger of tolerance developing • d. Taken as prescribed, they may be beneficial for the relief of anxiety and tension 63. Which of the following characteristics do not pertain to the use or effects of depressants generally? • a. The usual methods of administration are oral or injected. • b. Excessive use results in drunken behavior similar to that of alcohol • c. There is no danger of tolerance developing • d. Taken as prescribed, they may be beneficial for the relief of anxiety and tension 64. Another widely abused depressant is methaqualone. All of the following are factually descriptive of methaqualone except one. Identify this exception. • a. It is chemically unrelated to the barbiturates • b. It was once mistakenly thought to be effective as an aphrodisiac. • c. It is administered orally • d. It is one of the depressants that does not lead to tolerance and dependence. 64. Another widely abused depressant is methaqualone. All of the following are factually descriptive of methaqualone except one. Identify this exception. • a. It is chemically unrelated to the barbiturates • b. It was once mistakenly thought to be effective as an aphrodisiac. • c. It is administered orally • d. It is one of the depressants that does not lead to tolerance and dependence. 65. All of the following are controlled substances grouped as stimulants except one. Identify the exception. • a. Cocaine • b. Amphetamines • c. Phenmetrazine • d. Mescaline 65. All of the following are controlled substances grouped as stimulants except one. Identify the exception. • a. Cocaine • b. Amphetamines • c. Phenmetrazine • d. Mescaline 66. All of the following are factual statements descriptive of illicit cocaine except one, which is: • a. It is distributed on the street as a white to dark brown powder. • b. It is often adulterated to about half its volume by a variety of other ingredients. • c. This substance is only used through the process of injection • d. It is popularly accepted as a recreational drug 66. All of the following are factual statements descriptive of illicit cocaine except one, which is: • a. It is distributed on the street as a white to dark brown powder. • b. It is often adulterated to about half its volume by a variety of other ingredients. • c. This substance is only used through the process of injection • d. It is popularly accepted as a recreational drug 67. Which of the following is another name for cocaine ? • a. Adipex • b. Bacarate • c. Piegine • d. Snow 67. Which of the following is another name for cocaine ? • a. Adipex • b. Bacarate • c. Piegine • d. Snow 68. Which of the following statements does not pertain to cocaine ? • a. It has a medical use as a sedative • b. There is a possibility that sustained use could result in physical dependence • c. There is a high possibility that sustained use could result in psychological dependence • d. Tolerance is a distinct possibility 68. Which of the following statements does not pertain to cocaine ? • a. It has a medical use as a sedative • b. There is a possibility that sustained use could result in physical dependence • c. There is a high possibility that sustained use could result in psychological dependence • d. Tolerance is a distinct possibility 69. The effects of illusions and hallucinations with poor perception of time and distance possibly indicates the use of which of the following substances ? • a. Cannabis • b. Hallucinogen • c. Stimulants • d. Depressants 69. The effects of illusions and hallucinations with poor perception of time and distance possibly indicates the use of which of the following substances ? • a. Cannabis • b. Hallucinogen • c. Stimulants • d. Depressants 70. All of the following are hallucinogens except: • a. LSD • b. Marihuana • c. Mescaline • d. Phencyclidine 70. All of the following are hallucinogens except: • a. LSD • b. Marihuana (it is also a hallucinogen) • c. Mescaline • d. Phencyclidine 71. The source of marihuana is the: • a. Peyote cactus • b. Mushrooms • c. Coca plant • d. Cannabis plant 71. The source of marihuana is the: • a. Peyote cactus • b. Mushrooms • c. Coca plant • d. Cannabis plant 72. Cannabis products are usually taken: • a. Through sniffing • b. Injection • c. Smoking • d. By rubbing into the skin 72. Cannabis products are usually taken: • a. Through sniffing • b. Injection • c. Smoking • d. By rubbing into the skin 73. The condition whereby a user develops an attachment to the use of a substance due to it’s ability to satisfy some emotional or personality need of the person is known as: • • • • a. b. c. d. Tolerance Physical dependence Addiction Psychological Dependence 73. The condition whereby a user develops an attachment to the use of a substance due to it’s ability to satisfy some emotional or personality need of the person is known as: • • • • a. b. c. d. Tolerance Physical dependence Addiction Psychological Dependence 74. The state of periodic or chronic intoxication produced by the repeated consumption of a substance is known as: • a. Tolerance • b. Addiction • c. Habituation • d. Drug dependence 74. The state of periodic or chronic intoxication produced by the repeated consumption of a substance is known as: • a. Tolerance • b. Addiction • c. Habituation • d. Drug dependence Significant Notes •Security Management In the organizational structure of proprietary firms, security may provide both line and staff functions a. When advising senior executives, the security manager performs “staff”duties b. In security operations, the security manager carries out “line” duties As a general rule, “line” duties are considered to be operational in nature and “staff” duties are of a support nature When security managers exercise authority delegated by a senior executive to whom they report, such authority is known as “functional” authority Security functions cut across departmental lines and consist of involvement into every activity of the company but should not involve significant interference Probably the most common security management failure is the inability to delegate responsibility and the authority necessary to carry it out “Span of control” is a management term which refers to the number of personnel over which one can effectively supervise The largest single item of expense in the security operation is the cost of the security personnel The number of security personnel required to cover a single post around the clock on three eighthour shifts is 4-1/2 to 5 persons Not 3 “Chain of command” is a management term which refers to the path along which authority flows Well-trained, well-supervised security personnel may be the best possible protection available to a company The accounting department of a company is the most vulnerable to major loss due to crime “Unity of command” is a management concept which means that an employee should have only one immediate superior to whom the employee should report The security manager should have the necessary authority to carry out responsibilities. To accomplish this, the security manager should occupy a position where the manager reports directly to a vice-president or higher The “Theory X” management theory holds that the average employee has little ambition, dislikes work and must be coerced, controlled and directed to achieve organizational objectives - Douglas McGregor The “Theory Y” management theory holds that the average employee does not dislike work, is self-directed, is creative and imaginative, accepts responsibility and is committed to achieving organizational needs and objectives Douglas McGregor Theory X and Theory Y were developed by Douglas McGregor Those in management who believe the behavioral assumption of “Theory X” take an autocratic approach to get work done. Whereas “Theory Y” encourages managers to support and encourage employees in efforts to higher achievement The three main theories of organizational behavior are: a. Autocratic theory b. Custodial theory c. Supportive theory The “autocratic theory” holds that management is all-powerful and employees are obligated to follow orders without question The “custodial theory” holds that the aim of the company is to make the employee happy and contented through economic benefits and thus they will be positively adjusted to their work. This theory does not motivate employees to produce to their full capacity The “supportive theory” holds that through good leadership, management will provide a climate where employees will take on added responsibilities and thus make greater contributions to the growth of the company. Leadership: “We rather than they” “Herzberg’s theory” is a management theory which holds that motivation comes from work achievement satisfaction and not from such things as salary and job security “Theory Z” is a recent management style used effectively by the Japanese. This theory emphasizes humanized working conditions along with attention by management to enhance trust and close personal relationships “Management by objectives” also known as “MBO” was introduced by Peter Drucker. In this approach, both subordinate and superior agree on measurable goals to be achieved primarily by the subordinate over a stated period of time A “budget” is a plan stated in financial terms. It sets forth in dollars the necessary allocation of funds to achieve the plan “Risk analysis” is a management method used to minimize risks through application of security measures commensurate with the threat The major resource required for a risk analysis is manpower The most important management skill is the ability to communicate effectively Written communication is the best means to communicate The primary objective in implementing a protection program within an organization should be to motivate every employee to become part of the protection team Both private security and public law have, as their primary mission, the prevention of crime and protection of persons and property “Economic crime” is defined as the illicit behavior having as its object the unjust enrichment of the perpetrator at the expense of the economic system as a whole Private security relies upon both commercial security services and government agencies for intelligence gathering and crisis management planning Private security frequently avoids or bypasses police with regard to white collar or economic crime Business crime is most effectively attacked through sound management controls. The emphasis on loss prevention rather than the “offender” involved in the incident is a distinguishing characteristic of private security. About 95% to 99% of activated alarms are “false” The main deterrent value of a burglar alarm system is that the alarm signal enunciated locally or transmitted to a central station brings a police response Employee theft was the most frequently investigated crime by private security As a general rule, local law enforcement has very little effect on many crimes against business. Exceptions are burglaries, robberies and arson Frequently cited measures for improving private security are: a. More or better training b. Mandated training c. Improved selection process d. Higher wages e. Establishment or improvement of licensing and regulation Two problems in police and security relationships which seem to have the greatest intensity of feelings are: a. Secondary employment or moonlighting by police officers in private security b. Police response to activated alarms which are largely false The two major components of economic crime are white collar and ordinary crime 80% of computer security incidents result from insider attacks by dishonest and disgruntled employees Only 1% of computer security incidents annually are attributed to “hackers” The practice of preventing unauthorized persons from gaining intelligence information by analyzing electromagnetic emanations from electronic equipment such as computers, is often termed “tempest” In the year 2000, expenditures for private security industry will be $104 billion while public law enforcement expenditures will be only $44 billion by 2000 Employment in private security is projected to grow at 2.3% per annum to 2000 while law enforcement growth will be one percent annually The term “narcotic” in its medical meaning refers to opium and opium derivatives or synthetic substitutes “Drug dependence” is a condition resulting from repeated use whereby the user must administer progressively larger doses to attain the desired effect, thereby reinforcing compulsive behavior “Physical dependence” refers to an alteration of the normal functions of the body that necessitates the continued presence of a drug in order to prevent the withdrawal or abstinence syndrome The poppy (papaver somnifferum) is the main source of the non-synthetic narcotics Examples of synthetic narcotics, which are produced entirely within the laboratory, are meperidine and methadone Depressants have a potential for both physical and psychological dependence. Some examples : a. Chloral Hydrate b. Barbiturates c. Benzodiazepines When “depressant” drugs are used to obtain a “high” they are usually taken in conjunction with another drug, such as alcohol “Stimulants” are drugs which may produce a temporary sense of exhilaration, superabundant energy and hyperactivity including extended wakefulness. Examples are cocaine and amphetamines The two most prevalent stimulants are nicotine and caffeine, both accepted in our culture The most potent stimulant of natural origin is cocaine which is extracted from the leaves of the coca plant Excessive doses of cocaine may cause seizures and death. There is no “safe” dose of cocaine “Marijuana” refers to cannabis plant parts and extracts that produce somatic or psychic changes in humans The hemp plant grows wild throughout most of the tropic and temperate regions of the world “Hallucinogenic” drugs distort the perception of objective reality. Examples are: a. b. c. d. LSD Mescaline and peyote Phencyclidine (PCP) Amphetamine Variants (such as DOM and DOB) Long after hallucinogens are eliminated from the body, users may experience “flashbacks” DOM, DOB, JDA, MDMA, DET and MDA are hallucinogens which are synthesized in the laboratory Another source of hallucinogens (psilocybin and psilocyn) is psilocybe mushrooms “Designer” drugs are analogues of controlled substances with slight variations in their chemical structure so as not to be specifically listed as a controlled substance A “drug” is a substance which, because of its chemical make-up, alters the mood, perception or consciousness of the user. All drugs are not illegal. The most abused “drug” is alcohol and the most used “drug” also alcohol “Tolerance” is a body condition wherein ever-increasing amounts of a drug are needed to gain the desired effect The street name for PCP is “angel dust” The person most likely to become an alcoholic is a white male over 40 who is living alone The following behavioral characteristics are associated with substance abuse: a. b. c. d. e. f. g. h. I. j. Abrupt changes in attendance, quality of work grades and work output Attitude changes Withdrawal from responsibility Breakdown in personal appearance Wearing sunglasses at inappropriate times Wears long-sleeved garments to hide needle marks Association with known substance abusers Excessive borrowing of money Stealing small items from home, work or school Secretive habits Internal Accounting - Audit • To insure correctness and accuracy of accounting records • Not to detect theft and fraud • More losses due to accounting errors than by theft External Audit • Valuable because the persons conducting the audit do not know your business / company Financial Aspects • “CL” • “L/T” - Current Liability Long term Liability Payroll • Biggest problem is “Ghosting” – Paying people that don’t exist • Can use “Pay-out” to detect Ghosting – manually paying each employee • Recommended twice a year Internal Cash • Best way to handle is using two people at all times to handle cash situations Payables • Money owed to vendors Receivables • Money owed by customers General Management • Line Executives are those who are delegated chain of command authority to accomplish specific objectives in the organization. General Management • The security manager, in exercising authority delegated by the senior executive to whom the security manager reports, is exercising functional authority General Management • Chain of Command is the path along which authority flows General Management • Span of Control - the number of personnel which one individual can effectively control • 1 supervisor to 3 employees - ideal • 1 supervisor to 6 employees - good • 1 supv to 12 employees - Acceptable General Management • Unity of Command - means that an employee should be under the direct control of only one immediate supervisor General Management • The most common management weakness is the failure to properly delegate responsibility and the authority to carry out the responsibility. Organizational Chart • Horizontal plane - indicates the divisions of areas of responsibility • Vertical plane - defines the levels of authority General Management • Organizational structure should be flexible to be most effective Behavioral Theories • Dr. Abraham Maslow developed a five-step process which describes man’s behavior in terms of the needs he experiences. These needs are: – Food and shelter (basic needs) – Safety - such as security, protection and avoidance of harm and risk – To belong – Ego status - receiving some special recognition – Self-actualization, such as being given assignments which are challenging Behavioral Theories • Frederick Herzberg’s “Motivation-Hygene Theory” - defined two independent categories of needs - hygene factors and motivators. • Hygene Factors - salary, fringe benefits, security (Civil Service), rules and regulations and supervision. • Motivators - Challenging assignment, increased responsibility, recognition for work and individual growth Security’s Role • Security provides protection services for the organization. The protective service of prevention is a primary service provided. Key Resources • Human resources - identification of staffing needs and selection, training, leading, and directing, and retaining of effective personnel • Financial resources • Administrative resources • Operational resources- basic and technology based equipment to complete the mission Budgeting and Planning • A budget, a plan in financial terms, is an essential element of management planning and control. Three purposes for budgeting: • Estimate the costs and expected revenues of planned activities • Provide a warning mechanism when variances occur in actual numbers • Exercise uniformity in fiscal control Budgeting and Planning • If the contribution of an operating function cannot be quantified or cannot be shown to result in greater net revenue, it is an axiom of sound management that the function be reduced or eliminated. Budgeting and Planning • Zero based budgeting requires that the benefits from an activity be weighed against the benefits to be lost if the planned activity is carried out at a lesser level or not done at all. Budgeting and Planning • Budgeting approaches can be bottom up and top down or top down and bottom up. • Top down and bottom up is preferred by some because senior management initiates the process by establishing acceptable expenditure limits and guidelines prior to detailed planning by middle or operating management Budgeting and Planning • Line item budgets - each item is listed by separate line • Program budgets - funds are allocated by specific activity • Capital budgets - used for infrequently purchased high dollar items Budgeting and Planning • Budget costs are classified under one of three categories: – Salary expenses – Sundry expenses - all ongoing non-salary expenses – capital expenses - for physical improvements, physical additions or major expenditures for hardware. Generally considered one time expenses Budgeting and Planning • A budget is also an instrument which records work programs in terms of appropriations needed to put them to work. • It is also a management tool which is devised to ensure that work programs are carried out as planned Budgeting and Planning • Carry budget out in three dimensions: – The operation/project must unfold as planned – The operation/project must take place when planned – It will not exceed the planned costs. Budgeting and Planning • Budgets are normally prepared annually or biannually Planning • Planning is an activity concerned with proposals for the future, an evaluation of those proposals, and methods for achieving the proposals Management • Management is the activity which plans, organizes and controls activities in an organization M.B.O. • Management by objective (MBO) is a systematic way of achieving agreed to goals set ahead of time. Risk Assessment • The possibility and probability of a risk resulting in loss depends on the risk itself and the preventative measures taken. • Defining the problem – Loss event profile – Loss event probability – Loss event criticality Risk Assessment • Methods for handling a risk; –Accept –Eliminate –Reduce –Transfer (insurance) Risk Management • Crime and incident analysis is one of the first tools to be applied to the assessment of risks in order to determine vulnerability. • When assessing vulnerability and the response to risks, PML factors must be considered. Risk Management • PML stands for: – Possible Maximum Loss - max loss sustained if a given target is totally destroyed or removed – Probable Maximum Loss - amount of loss a target is likely to sustain • ALE stands for: – Annual Loss Expectancy Risk Management • Five principal crime risk management methods: – Risk Avoidance – Risk Reduction – Risk Spreading – Risk Transfer – Risk Acceptance Risk Management • Two basic types of protection against crime are: – Fidelity and Surety Bonds – Burglary, robbery and theft insurance Communications • The art of effective communication is the most important skill for successful management. • When a job is done poorly, it is usually because the manager failed to communicate clearly. Discipline • Means Learning A.S.I.S. Ethics • Perform professional duties • observe the precepts of truthfulness, honesty and integrity • be faithful and diligent in discharging professional responsibilities • competent in discharging responsibilities • Safeguard confidential information • Not maliciously injure reputation of colleagues CPO / LPO • Crime Prevention Officer (CPO) – a public servant with police powers • Loss Prevention Officer (LPO) – private sector individual deriving authority from an employer CPTED • Crime prevention through environmental design (CPTED) advocates that the proper design and effective use of the building environment leads to a reduction in crime and in the fear of crime. Environmental Security • Environmental Security (E/S) is an urban planning and design process which integrates crime prevention with neighborhood design and urban development. • Has little or no effect on white collar crime, embezzlement, and fraud Defensible Space by Oscar Newman • Territoriality - attitude of maintaining perceived boundaries. Outsider quietly recognized, observed. • Natural Surveillance - ability of inhabitants of particular territory to casually and continually observe public areas. • Image and Milieu - involve the ability of design to counteract the perception that the area is isolated and vulnerable to crime. • Safe area - locales that allow for high degree of observation by police Security Survey • The cost of protection is measured in: –Protection in depth –Delay time Internal Theft • The greatest ongoing threat to business. Internal Losses • Pilferage - stealing in small quantities over a long period of time • Embezzlement - taking money/property entrusted to their care • Shrinkage - loss of inventory through any means Employee Theft • Two major causes of employee theft are: – personal problems – environment (inadequate socialization) • Research indicates that dissatisfied employees are most frequently involved in internal theft. Theft Triangle • Consists of three elements: – Motivation, and – Opportunity, and – Rationalization • Loss prevention techniques are designed to eliminate the opportunity Security Tools • Deter criminal attack • Detect attacks that occur • Delay attack to allow time for response by authorities • Deny access to selected targets Crime Analysis • • • • Data Collection Analysis Dissemination Feedback Safety and Loss Prevention • Unsafe acts cause 85% of all accidents • Unsafe conditions cause the remaining 15% Safety and Loss Prevention • Incident - is anything from serious injury to a breakdown in quality control. • Accident - is an undesired event resulting in physical harm to a person or damage to property. Management • Matrix management uses assets over a wide spectrum of activity by forming ad hoc teams to work on shorter term projects. Liaison • A linking up or connecting of parts of a whole in order to bring about proper coordination of activities. Liaison • Private security occasionally assists in law enforcement investigations. – Providing u/c operators, surv equip, CCTV, money for rewards, O/T pay • Information is the most frequently exchanged item. Liaison • 10 % to 30 % of all calls for police service were for alarms • 95% to 99% are false Liaison • By the year 2000, the ratio of private security personnel to public police will be three to one respectively. Economic Crime • Financially motivated crime with a direct impact on the economy Economic Crime • Indirect costs of economic crime include: – Effects on business; – Effects on government; and – Effect on the public Economic Crime • Liability is the largest indirect cost of economic crimes for the past 20 years Substance Abuse • Narcotics - effects –Generally, there is no loss of motor coordination or slurred speech. Substance Abuse • The poppy, cultivated in many countries around the world, is the main source of nonsynthetic narcotics Substance Abuse • Morphine –One of the most effective drugs known for the relief of pain. • Codeine –It is by far the most widely used “natural occurring narcotic”. Substance Abuse • Thebaine –the principal alkaloid in a species of poppy which has been grown experimentally in the U.S. –converted into a variety of medical compounds including codeine. Substance Abuse • Etorphine and Diprenorphine –made from Thebaine –Etorphine is more than a thousand times as potent as morphine in it’s analgesic, sedative and respiratory depressant effect Substance Abuse • Hydromorphone –Highly marketable with a potency two to eight times as great as morphine. Substance Abuse • Meperidine (Pethidine) • Probably the most widely used drug for the relief of moderate to severe pain Substance Abuse • Narcotic Antagonists –A class of compounds developed to block and reverse the effects of narcotics Substance Abuse • Chloral Hydrate –The oldest of sleep inducing drugs –liquid with a slightly acrid odor and a bitter, caustic taste Substance Abuse • Benzodiazepines –Depressants which relieve anxiety, tension and muscle spasms as well as producing sedation and preventing convulsions. Substance Abuse • Stimulants –Of all abused drugs, stimulants are the most powerfully reinforcing. Substance Abuse • Stimulants –The two most prevalent stimulants are nicotine in tobacco and caffeine. Substance Abuse • Cocaine • The most potent stimulant of natural origin. • Designated as a narcotic in the US CSA Substance Abuse • Khat –Compulsive use may result in manic behavior with grandiose delusions or in a paranoid type of illness, sometimes accompanied by hallucinations. Substance Abuse • Alcohol –The most used and abused recreational drug. Physical dependence can occur if alcohol is taken regularly in large quantities. Drug Screening • Enzyme Multiplied Immunoassay Technique (EMIT) screens – easy to administer and relatively inexpensive • Gas Chromatography/Mass Spectrometry – used for confirming tests • Initial positives are confirmed before any personnel action is taken. • Confirming tests should be done on the same specimen. Drug Screening • To avoid liability in the screening process: – Notify all to be tested of the screening process. – Get consent from persons tested. – Provide prior notice to incumbents that testing is a condition of continued employment. – Define the circumstances under which testing is done. Drug Screening • To avoid liability in the screening process: – Insure a positive identification and chain of custody for specimen collection, identification and handling. – Limit dissemination of test results. – Maintain an Employee Assistance Program. – Regularly verify results from test facilities. U.S. Legal Aspects Sample Questions 1. In substance, a crime is: • a. A violent act • b. A violation of one’s privacy • c. An act or omission prohibited by law for which a penalty is provided • d. A public wrong 1. In substance, a crime is: • a. A violent act • b. A violation of one’s privacy • c. An act or omission prohibited by law for which a penalty is provided • d. A public wrong 2. • • • • The Federal definition of a felony is any offense: a. b. c. d. Which calls for punishment Punishable by death For which the minimum penalty is $500 Punishable by imprisonment for a term exceeding one year 2. • • • • The Federal definition of a felony is any offense: a. b. c. d. Which calls for punishment Punishable by death For which the minimum penalty is $500 Punishable by imprisonment for a term exceeding one year 3. • • • • In federal courts, the usual prosecutor is: a. b. c. d. The district attorney The state’s attorney The commonwealth attorney The U.S. Attorney 3. • • • • In federal courts, the usual prosecutor is: a. b. c. d. The district attorney The state’s attorney The commonwealth attorney The U.S. Attorney 4. The main purpose of a grand jury is to: • a. Determine whether or not an individual has committed a crime • b. Determine guilt • c. Determine whether there is sufficient evidence that a crime has been committed and that the accused probably committed it • d. Determine the nature of the punishment 4. The main purpose of a grand jury is to: • a. Determine whether or not an individual has committed a crime • b. Determine guilt • c. Determine whether there is sufficient evidence that a crime has been committed and that the accused probably committed it • d. Determine the nature of the punishment 5. The purpose of bail is to: • a. Confine the accused pending trial • b. To take dangerous offenders off the streets • c. Make certain each accused is offered his constitutional right to put up security in order to gain his release • d. To assure the appearance of the accused in court 5. The purpose of bail is to: • a. Confine the accused pending trial • b. To take dangerous offenders off the streets • c. Make certain each accused is offered his constitutional right to put up security in order to gain his release • d. To assure the appearance of the accused in court 6. • • • • In a criminal trial, the burden of proof required to find guilt is: a. b. c. d. Preponderance of evidence Beyond a reasonable doubt Reasonableness of presentation Amount necessary to convince a majority of jurors 6. • • • • In a criminal trial, the burden of proof required to find guilt is: a. b. c. d. Preponderance of evidence Beyond a reasonable doubt Reasonableness of presentation Amount necessary to convince a majority of jurors 7. The release of a convicted person under certain conditions without having to be imprisoned is known as: • • • • a. b. c. d. Probation Parole Corpus Juris Detainer 7. The release of a convicted person under certain conditions without having to be imprisoned is known as: • • • • a. b. c. d. Probation Parole Corpus Juris Detainer 8. The release from confinement of a person who has served part of a sentence is called: • • • • a. b. c. d. Probation Parole Reprieve Commutation 8. The release from confinement of a person who has served part of a sentence is called: • • • • a. b. c. d. Probation Parole Reprieve Commutation 9. The process in which a court abides by a previous court decision is known as: • • • • a. b. c. d. Corpus Delicti Habeas corpus Ex-post facto Stare decisis 9. The process in which a court abides by a previous court decision is known as: • • • • a. b. c. d. Corpus Delicti Habeas corpus Ex-post facto Stare decisis 10. The crime of unlawful entry into or remaining within a building, with intent to commit some crime therein is: • • • • a. b. c. d. Robbery Trespass Burglary Embezzlement 10. The crime of unlawful entry into or remaining within a building, with intent to commit some crime therein is: • • • • a. b. c. d. Robbery Trespass Burglary Embezzlement 11. To make proof of intent easier in proving shoplifting, many stores have a policy which requires apprehension of a suspect to be made: • • • • a. b. c. d. After the accused leaves the premises As soon as the theft occurs As soon as the material is concealed Only on issuance of a warrant 11. To make proof of intent easier in proving shoplifting, many stores have a policy which requires apprehension of a suspect to be made: • • • • a. b. c. d. After the accused leaves the premises As soon as the theft occurs As soon as the material is concealed Only on issuance of a warrant 12. The private person generally may arrest without a warrant: • • • • a. b. c. d. For a felony For misdemeanors For a crime committed in his presence Where he had “reasonable cause” to believe the person arrested committed the crime 12. The private person generally may arrest without a warrant: • • • • a. b. c. d. For a felony For misdemeanors For a crime committed in his presence Where he had “reasonable cause” to believe the person arrested committed the crime 13. The Supreme Court decision which holds that no suspect, in a custodial environment, may be asked any questions until he has first been warned that he need not make any statement and advised of other rights is the: • • • • a. b. c. d. McNabb decision Mallory decision Ennis decision Miranda decision 13. The Supreme Court decision which holds that no suspect, in a custodial environment, may be asked any questions until he has first been warned that he need not make any statement and advised of other rights is the: • • • • a. b. c. d. McNabb decision Mallory decision Ennis decision Miranda decision 14. The Amendment to the U.S. Constitution which deals with searches and seizures is: • • • • a. b. c. d. 1st Amendment 4th Amendment 5th Amendment 6th Amendment 14. The Amendment to the U.S. Constitution which deals with searches and seizures is: • • • • a. b. c. d. 1st Amendment 4th Amendment 5th Amendment 6th Amendment 15. As a general rule, searches may be made of employee lockers and desks located on the premises of the company: • • • • a. b. c. d. If consent is given by the employee Under no circumstances If done by local police If done by the security manager 15. As a general rule, searches may be made of employee lockers and desks located on the premises of the company: • • • • a. b. c. d. If consent is given by the employee Under no circumstances If done by local police If done by the security manager 16. When a law enforcement agent induces the commission of a offense not otherwise contemplated, the accused may use an affirmative defense known as: • • • • a. b. c. d. Hearsay Illegally induce crime Ex-post facto Entrapment 16. When a law enforcement agent induces the commission of a offense not otherwise contemplated, the accused may use an affirmative defense known as: • • • • a. b. c. d. Hearsay Illegally induce crime Ex-post facto Entrapment 17. The imputation of another’s negligence to the employer is described as: • • • • a. b. c. d. Gross liability Vicarious liability Agency liability Net liability 17. The imputation of another’s negligence to the employer is described as: • • • • a. b. c. d. Gross liability Vicarious liability Agency liability Net liability 18. A willful or negligent wrong done by one person to another is a : • • • • a. b. c. d. Crime Misdemeanor Felony Tort 18. A willful or negligent wrong done by one person to another is a : • • • • a. b. c. d. Crime Misdemeanor Felony Tort 19. The unlawful taking of property by force or threat of force constitutes the crime of: • • • • a. b. c. d. Burglary Robbery Assault and battery Larceny 19. The unlawful taking of property by force or threat of force constitutes the crime of: • • • • a. b. c. d. Burglary Robbery Assault and battery Larceny 20. The act of inducing a person to commit a crime for the purpose of having him arrested is known as: • • • • a. b. c. d. Solicitation Entrapment Nolo contendre Misprison 20. The act of inducing a person to commit a crime for the purpose of having him arrested is known as: • • • • a. b. c. d. Solicitation Entrapment Nolo contendre Misprison 21. Deadly force may be used to defend yourself if you: • a. Reasonably believe deadly force is necessary to protect yourself or another from unlawful use of deadly force of a third party • b. Your home is broken into • c. You are protecting your property • d. You are attacked by a drug dealer 21. Deadly force may be used to defend yourself if you: • a. Reasonably believe deadly force is necessary to protect yourself or another from unlawful use of deadly force of a third party • b. Your home is broken into • c. You are protecting your property • d. You are attacked by a drug dealer 22. The prohibition against being tried twice for the same crime is found in the: • • • • a. b. c. d. First Amendment Third Amendment Fifth Amendment Fourteenth Amendment 22. The prohibition against being tried twice for the same crime is found in the: • • • • a. b. c. d. First Amendment Third Amendment Fifth Amendment Fourteenth Amendment 23. In a criminal prosecution the measure of evidence used to find the accused guilty is: • • • • a. b. c. d. Beyond a reasonable doubt Probable cause Suspicion Preponderance of evidences 23. In a criminal prosecution the measure of evidence used to find the accused guilty is: • • • • a. b. c. d. Beyond a reasonable doubt Probable cause Suspicion Preponderance of evidences 24. “Strict liability” in tort involves: • a. Specific instructions given a security officer by a supervisor • b. Comparative negligence by anyone in any occupation • c. Intentional liability • d. An ultra-hazardous or abnormally dangerous activity 24. “Strict liability” in tort involves: • a. Specific instructions given a security officer by a supervisor • b. Comparative negligence by anyone in any occupation • c. Intentional liability • d. An ultra-hazardous or abnormally dangerous activity 25. The theory of law which vicariously imposes liability on the principal for the acts of his or her agents is known as: • • • • a. b. c. d. Plain agency Master servant Strict liability Respondeat superior 25. The theory of law which vicariously imposes liability on the principal for the acts of his or her agents is known as: • • • • a. b. c. d. Plain agency Master servant Strict liability Respondeat superior 26. An employer is responsible for the acts of his or her employee committed within the: • • • • a. b. c. d. Employee’s scope of employment Area of the place of business Employer’s area of primary activity Employee’s area of primary activity 26. An employer is responsible for the acts of his or her employee committed within the: • • • • a. b. c. d. Employee’s scope of employment Area of the place of business Employer’s area of primary activity Employee’s area of primary activity 27. The relationship in which two parties agree that one will act as the representative of the other is known as: • • • • a. b. c. d. Contractual relationship Fiduciary relationship Partnership relationship Agency relationship 27. The relationship in which two parties agree that one will act as the representative of the other is known as: • • • • a. b. c. d. Contractual relationship Fiduciary relationship Partnership relationship Agency relationship 28. An agent can ordinarily act for the principal in such a way to make the principal legally responsible provided the agent: • • • • a. b. c. d. Is authorized by the principal to act that way Acts reasonably Notifies the principal within 24 hours Is eighteen years of age 28. An agent can ordinarily act for the principal in such a way to make the principal legally responsible provided the agent: • • • • a. b. c. d. Is authorized by the principal to act that way Acts reasonably Notifies the principal within 24 hours Is eighteen years of age 29. If “S”, while acting within the scope of employment, injures “T” and “T” dies, the employer of “S” can be: • • • • a. b. c. d. Held liable in a civil suit for damages Subjected to criminal liability Held liable for both civil and criminal action Criminally liable if the act is malicious 29. If “S”, while acting within the scope of employment, injures “T” and “T” dies, the employer of “S” can be: • • • • a. b. c. d. Held liable in a civil suit for damages Subjected to criminal liability Held liable for both civil and criminal action Criminally liable if the act is malicious 30. The Constitutional Amendment which provides that no person shall be denied life, liberty, or property without due process of law is: • • • • a. b. c. d. First Amendment Second Amendment Fifth Amendment Eighth Amendment 30. The Constitutional Amendment which provides that no person shall be denied life, liberty, or property without due process of law is: • • • • a. b. c. d. First Amendment Second Amendment Fifth Amendment Eighth Amendment 31. The right to have the assistance of counsel for one’s defense is provided by the: • • • • a. b. c. d. Second Amendment Fifth Amendment Sixth Amendment Eighth Amendment 31. The right to have the assistance of counsel for one’s defense is provided by the: • • • • a. b. c. d. Second Amendment Fifth Amendment Sixth Amendment Eighth Amendment 32. The primary duty of a grand jury is: • • • • a. b. c. d. Ascertain if the accused is guilty Determine probable cause Determine if a conspiracy exists Determine if an investigation should be opened 32. The primary duty of a grand jury is: • • • • a. b. c. d. Ascertain if the accused is guilty Determine probable cause Determine if a conspiracy exists Determine if an investigation should be opened 33. According to the U.S. code, a felony is any offense: • a. Punishable by death • b. Punishable by imprisonment of three years or more • c. Punishable by imprisonment exceeding one year • d. Punishable by imprisonment for a term exceeding one year 33. According to the U.S. code, a felony is any offense: • a. Punishable by death • b. Punishable by imprisonment of three years or more • c. Punishable by imprisonment exceeding one year • d. Punishable by imprisonment for a term exceeding one year 34. The affirmative act of concealing the commission of a felony, cognizable by a court of the U.S., by someone having knowledge of the felony is a violation called • • • • a. b. c. d. Misprison of a felony Accessory Subornation of perjury Obstruction of justice 34. The affirmative act of concealing the commission of a felony, cognizable by a court of the U.S., by someone having knowledge of the felony is a violation called • • • • a. b. c. d. Misprison of a felony Accessory Subornation of perjury Obstruction of justice 35. When a law enforcement agent induces the commission of an offense, the process is called: • • • • a. b. c. d. Accessory before the act Misprison of a felony Entrapment Stare decisis 35. When a law enforcement agent induces the commission of an offense, the process is called: • • • • a. b. c. d. Accessory before the act Misprison of a felony Entrapment Stare decisis 36. Wrongful appropriation of the personal property of another to the use of the taker is a tort called: • • • • a. b. c. d. Conversion Larceny Trespass Embezzlement 36. Wrongful appropriation of the personal property of another to the use of the taker is a tort called: • • • • a. b. c. d. Conversion Larceny Trespass Embezzlement 37. A writ issued by a court directing the recipient to appear and testify is a: • • • • a. b. c. d. Warrant Subpoena Writ of Mandamus Writ of prohibition 37. A writ issued by a court directing the recipient to appear and testify is a: • • • • a. b. c. d. Warrant Subpoena Writ of Mandamus Writ of prohibition 38. The general rule as to the amount of force a security officer is permitted to use in order to accomplish a lawful arrest is: • a. The amount needed to assure that the security officer is not injured • b. Up to and including deadly force • c. The maximum amount • d. Only such force as is reasonably necessary 38. The general rule as to the amount of force a security officer is permitted to use in order to accomplish a lawful arrest is: • a. The amount needed to assure that the security officer is not injured • b. Up to and including deadly force • c. The maximum amount • d. Only such force as is reasonably necessary 39. If a grand jury finds that probable cause exists that the accused committed the crime alleged, the grand jury then: • • • • a. b. c. d. Issues an information Issues an indictment Issues a mittimus Enters a finding of guilty 39. If a grand jury finds that probable cause exists that the accused committed the crime alleged, the grand jury then: • • • • a. b. c. d. Issues an information Issues an indictment Issues a mittimus Enters a finding of guilty 40. The usual charge placed against someone who has made an erroneous arrest is: • • • • a. b. c. d. Kidnapping False imprisonment Assault and battery Malicious prosecution 40. The usual charge placed against someone who has made an erroneous arrest is: • • • • a. b. c. d. Kidnapping False imprisonment Assault and battery Malicious prosecution 41. The federal agency in charge of disaster planning is: • • • • a. b. c. d. Federal Emergency Management Agency Office of Civil Defense Department of the Army Department of the Interior 41. The federal agency in charge of disaster planning is: • • • • a. b. c. d. Federal Emergency Management Agency Office of Civil Defense Department of the Army Department of the Interior 42. One of the following is not prohibited by the Federal Civil Rights Act during an investigation: • a. Asking questions as to religious affiliation • b. Asking questions as to prior convictions • c. Directing inquiry into areas of race or color for discriminating purposes • d. Directing inquiry into areas of religion or sex for discriminating purposes 42. One of the following is not prohibited by the Federal Civil Rights Act during an investigation: • a. Asking questions as to religious affiliation • b. Asking questions as to prior convictions • c. Directing inquiry into areas of race or color for discriminating purposes • d. Directing inquiry into areas of religion or sex for discriminating purposes 43. Questions on an application blank or field investigative inquiries dealing with union membership or affiliation should be avoided as they may lead to charges which constitute violations of: • • • • a. National Labor Relations Act b. The Civil Rights Act of 1964 c. The Civil Rights Act of 1976 d. The Fair Credit Reporting Act 43. Questions on an application blank or field investigative inquiries dealing with union membership or affiliation should be avoided as they may lead to charges which constitute violations of: • • • • a. National Labor Relations Act b. The Civil Rights Act of 1964 c. The Civil Rights Act of 1976 d. The Fair Credit Reporting Act 44. A question on the application form inquiring about prior arrests is on its face illegal as a violation of: • • • • a. b. c. d. The National Labor Relations Act The Federal Tort Claim Act The Omnibus Crime Control Act The Civil Rights Act of 1964 44. A question on the application form inquiring about prior arrests is on its face illegal as a violation of: • • • • a. b. c. d. The National Labor Relations Act The Federal Tort Claim Act The Omnibus Crime Control Act The Civil Rights Act of 1964 45. Identify the act which basically prohibits discrimination, discharge, failure or refusal to hire, on any of the grounds of race, color, religion, sex or national origin: • • • • a. b. c. d. Fair Credit Reporting Act The Civil Rights Act of 1964 First Amendment Omnibus Crime Control Act 45. Identify the act which basically prohibits discrimination, discharge, failure or refusal to hire, on any of the grounds of race, color, religion, sex or national origin: • • • • a. b. c. d. Fair Credit Reporting Act The Civil Rights Act of 1964 First Amendment Omnibus Crime Control Act Significant Notes U.S. Legal Aspects The Bill of Rights is the first ten amendments to the Constitution of the U.S. First amendment provides for freedom of speech, religion, press, assembly and to petition the government Second amendment provides the right to keep arms (weapons) Forth amendment prohibits unreasonable searches and seizures and also sets out the requirement that a warrant be supported by probable cause Fifth amendment prohibits double jeopardy, compulsory self incrimination, and deprivation of life, liberty or property without due process Sixth amendment provides that the accused have a speedy public trial, know the charges against him, confront witnesses against him, have compulsory process to obtain his witnesses, and have assistance of a counsel for his defense Seventh amendment provides the right to trial by jury Eighth amendment prohibits excessive bail, excessive fines and cruel and unusual punishment “Miranda warning” must be given before “custodial” interrogation. The suspect is advised: a. You have the right to remain silent b. Anything you say may be used against you c. You have the right to contact an attorney d. If you cannot afford an attorney, one will be provided free of charge Generally, Miranda warnings need not be given by security officers The crime of “robbery” is the unlawful taking of property from the immediate possession of another by force or the threat of force “Larceny” is the unlawful taking of property from the possession of another with the intent of depriving the owner of it permanently “Vicarious liability” is the legal concept which holds the employer, as well as the employee, liable if the “wrong” was committed while the employee was acting within the scope of employment Vicarious Liability • An employer may avoid liability for the tortious acts of another if the hiring contract is such that the relationship of “independent contractor” on the part of the tort feasor has been established. Vicarious Liability • But, the employer may be held liable for the acts of an independent contractor when: – – – – The work contracted for is wrongful per se The work contracted for is a public nuisance The work contracted for is inherently dangerous The act of the independent contractor violates a duty imposed on the employer by contract. – The wrongful act by the independent contractor violates a statutory duty. “Respondeat superior” is the legal rule that an employer is responsible for the action or lack of action of an employee taken within the course of employment. Respondeat Superior (Let the master respond) Basic Aspects • Respondeat Superior: –The right of control and not necessarily the exercise of that right is the test of the relation of the master to the servant. Note the difference between a “crime” and a “tort”. A crime is a violation of the government’s penal laws; whereas a tort is a legal wrong done to another person (a civil wrong) No agreement between parties is required. A crime can also be a tort examples: battery trespass assault Most crimes are of two primary types; a. b. The federal definition of a “felony” is: a crime punishable by imprisonment for a term exceeding one year A “misdemeanor” is any crime which is not a felony “Corpus delicti” is a legal term for the “body of the crime” or the elements of the crime which must be proved. It does not mean a dead body Treason is the only crime specifically mentioned in the U.S. Constitution The criminal code of the United States is found in Title 18 There are no Federal common law crimes Essential elements of the crime of negligence: a. b. c. d. A duty owed by the defendant to the injured party A violation of that duty by failure to follow a required standard of conduct A causal connection between the negligent conduct and the harm Actual loss or damage to the plaintiff A fidelity bond is insurance on a person covering that person’s dishonesty “Strict liability” refers to the legal concept that one may be held responsible for some acts without the necessity to prove criminal intent (mens rea). Strict liability statutes are usually in the areas of public health, safety and welfare and they are generally classified as “mala prohibitum” “Compensatory damages” are actual damages directly related to the amount of the loss “Punitive damages” are designed to punish the defendant and to deter him, and others, from a repetition of the wrongful act Generally, searches by security officers are not subject to constitutional regulation under the 4th Amendment In judging whether certain conduct is negligent, the law uses the standard of reasonableness. The “reasonable person” is one of ordinary prudence who exercises due care in a situation such as that under litigation “Deadly force”, as a general rule, should be used by law enforcement officers as a last resort and then only when the life of the officer or another person is in jeopardy An “express contract” is one which is clear, definite, direct, and spelled out by explicit words An “implied contract” is one which is not spelled out clearly by explicit words, but is interpreted by analyzing surrounding circumstances or the actions of the persons involved “Entrapment” is a defense in which the defendant alleges that he was induced by government officers or agents to commit a crime which he would not have committed without the inducement Statements made by subjects being interrogated must be “voluntary” The concept of the grand jury originated in England An “indemnity bond” is an insurance contract designed to reimburse an individual or organization for possible losses of a particular type A “citizen’s arrest” is an arrest by a private person, rather than by a public law enforcement officer. This authority originated at common law and is the authority of most arrests by proprietary and contract security officers A law enforcement officer may arrest for a felony based solely on “probable cause”. A private security officer may arrest for a felony based in “probable cause”, but there is no margin for error; otherwise, a suit for false arrest may be litigated The “plain view” doctrine holds that if police, in the course of lawful duty, recognize a plainly visible item as evidence of a crime, the item may be seized and admitted in a criminal trial Probable Cause is that combination of facts and circumstances which would warrant a person of reasonable caution and prudence to believe that a crime has been committed and that the person to be arrested is the one who committed the crime. The Supreme Court of Terry v. Ohio authorized “stop and frisk” technique without probable cause where an experienced officer had good reason to suspect criminal activity which was dangerous to the officer or others The undercover agent must know the law regarding “entrapment.” “Entrapment” is defined as the acts of officers of the government in inducing a person to commit a crime not contemplated by him/her in order to initiate a criminal investigation Under no circumstances will an undercover agent be permitted to engage in “malum in se” crime such as murder, burglary, rape, arson, robbery, etc. The Fair Credit Reporting Act, among other things, requires written notice to the applicant prior to an investigation by a third party (Consumer Reporting Agency) As a general rule, it is permissible to ask about possible “convictions” but not “arrests” on the employment questionnaire Basic Aspects • Civil law is the statutory and common law in which private rights and remedies are found. Of the 50 titles of the United States Code, 49 deal primarily with civil matters. Basic Aspects • Express Contract is an actual agreement of the parties, the terms of which are openly uttered or declared at the time the contract is made. • Implied Contract is one not created or evidenced by the explicit agreement of the parties, but is inferred by law. Basic Aspects • Price is the dollar value stated in the contract. • Reasonable value is the dollar value of goods and/or services determined by a court or arbitrator. Basic Aspects • In the transportation of goods, recovery of damages may be estopped by a “time bar” clause in the shipping documents (contracts). Basic Aspects • The concept of tort liability operates to: –Compensate a victim for his loss –Act as a deterrent for future conduct of the same kind –Serve as evidence of society’s disapproval of the wrong Basic Aspects • The basic elements of intentional tort liability are: – An act or omission – Which brought about the intended result Basic Aspects • Examples of intentional torts: – – – – – – – Battery Assault False imprisonment Trespass to land or to chattels (Conversion) Fraud / Misrepresentation Defamation Invasion of privacy Basic Aspects • Generally, proprietary security officers are servants, whereas contract security personnel are employees of the supplying agency and therefor may not be considered servants of the employing organization. “Stare Decisis” • The Law of Precedence Felony • Federal statutes provide for five classes of felonies ranging is punishment from imprisonment for a term exceeding one year to death or life imprisonment. Misdemeanor • Three classes of misdemeanors: • Class A - One year or less but more than 6 months • Class B - Six months or less, but more than 30 days • Class C - Thirty days or less, but more than 5 days Infraction • Federal statutes provide for one class of infraction for which the penalty ranges from 5 days or less imprisonment to no authorized penalty. “Mala in se” • Those crimes which are bad in themselves, ie... –Murder –Rape –All Common Law crimes were mala in se. “Mala prohibita” • Those acts which are considered “offenses” by the passage of statutes. Generally no criminal intent is required; the mere accomplishment of the act is sufficient for criminal liability. Corpus delicti • The body of the crime. The combination of the elements which provide proof of the crime is the corpus delicti. • Consists of: – Mens Rea (criminal intent) – Actus Rea (the forbidden act) – Coming together of the above two Law of Causation • There must be a cause and effect relationship between the act of the accused and the resulting harm. The Law of Causation - a person is presumed to intend the natural and probable consequences of his act. But, the accused takes his victims as he finds him. “Motive” • Motive is not an essential part of a crime; it is not part of the corpus delicti. • Most crimes require the combination of an act and an intent, which must be simultaneous. • “Negligence” differs from “recklessness,” in that in recklessness, conduct is governed by the actual state of mind of the accused. “Alibi” • The alibi defense is one of physical impossibility. The testimony of an alibi witness must cover the entire time of the crime. “Mistake of Fact” • The “Mistake of Fact” defense is used when one commits a violation of the law in good faith with a reasonable belief that certain facts existed, which would make the act innocent if indeed they did exist. Laws of Arrest • The basic elements which constitute an arrest are: – A purpose or intention to effect the arrest – An actual or constructive seizure or detention of the person to be arrested – A communication by the arresting officer to the arrestee of his intention to place him under arrest. – An understanding by the person to be arrested that he is being arrested. Laws of Arrest • The mere words “you are under arrest:” will not satisfy the seizure or detention element of arrest. Laws of Arrest • A warrant is an order for the arrest of a person. • A summons directs the defendant to appear before a court at a stated time and place. Laws of Arrest • When a private citizen acts in aid of a known law enforcement officer, the citizen has the same rights and privileges as the officer and is protected from liability even if the officer was acting illegally. Laws of Arrest • Generally, private citizens may arrest any person who has committed an offense in their presence or for a felony not committed in their presence. BUT, the arrest can be justified only by further showing that the felony was actually committed by the person arrested. Search and Seizure • The “Exclusionary Rule” excludes evidence, otherwise admissible, obtained by methods which violate Constitutional guarantees of the Forth Amendment which protects an individual in his person and property. The “Tainted Fruit of the Poisonous Tree” doctrine is that any and all evidence obtained as a result of an unreasonable search cannot be used against the accused. Any other evidence obtained as a result of the original unlawful invasion is dubbed the “tainted fruit of the poisonous tree” and may not be used against the person whose privacy was violated. 4th Amendment • The 4th Amendment does not specifically authorize a search without a warrant. We have legal searches without a warrant because of court decisions. Searches • A private security officer has only the search authority of a private citizen. • The Fourth Amendment does not apply to searches by private persons. • Evidence discovered by private search is admissible in a criminal trial and is not subject to the Exclusionary Rule. Confession / Admission • A confession is a statement in which a person acknowledges guilt of a crime. • An admission is a statement in which a person admits a fact or facts which would tend to prove him guilty of a crime, but which does not constitute a full acknowledgement of guilt of a crime. Confession / Admission • The fundamental test regarding the use of confessions and admissions is the “free and voluntary” test. Federal Bureau of Investigation (DOJ) • Investigative Jurisdiction over Federal criminal violations and concurrent jurisdiction with the DEA on Narcotics and Dangerous Drugs. Includes the: – National Depository of Fingerprints; – National Crime Information Center (NCIC); – National Center for the Analysis of Violent Crime; Federal Bureau of Investigation (DOJ) – National Center for the Analysis of Violent Crime; – Violent Criminal Apprehension Program; – Forensic Science Training and Research Center; – National Bomb Data Center U.S. Marshall’s Service (DOJ) • Operational priorities include: – – – – – – – Physical security for Federal courts Custodian of Federal evidence Service of Federal Criminal and civil process Witness-protection program Federal Assets Forfeiture and Seizure Transportation of Federal prisoners Conduct fugitive investigations Immigration and Naturalization Service (DOJ) • Responsible for administering U.S. Immigration and Naturalization laws. – Regulates non-resident aliens – Determines admissibility of aliens into this country. – Handles deportation proceedings U.S. Secret Service (Treasury Department) • Responsible for the protection of the President, Vice-President and their families as well as other designated persons. • Investigative responsibilities include counterfeiting, credit card fraud and bank failures Customs Service (Treasury Department) • Enforces customs-related laws and regulations • Collect import duties. Internal Revenue Service (Treasury Department) • Administers and enforces Federal tax laws. • Special intelligence division investigates organized crime, gambling, and tax stamp violations. B.A.T. F. (Treasury Department) • Bureau of Alcohol, Tobacco and Firearm • Administration and enforcement of U.S. gun and explosive laws. • Training and investigative assistance in arson and bomb investigations. • Trace of weapons for law enforcement agencies Defense Investigative Service (Department of Defense) • Administers the Defense Industrial Security Program. F.E.M.A. • Federal Emergency Management Agency • An independent agency • Primary responsibility of dealing with disaster planning. F.E.M.A. • The Director of FEMA reports to the President and works closely with the National Security Council, Cabinet, and White House staff Coast Guard (Department of Transportation) • Security and safety of ports. • Investigations of marine-related accidents, casualties and violations. • Safety standards for commercial vessels. Federal Aviation Administration (Department of Transportation) • Issue and enforcement of rules and regulations for air commerce and air safety. • Certification of airports and inspection of air-navigation facilities. Federal Highway Administration (Department of Transportation) • Regulatory jurisdiction over safety and performance of commercial motor carriers engaged in interstate commerce. Authorized to investigate violations of: Federal Highway Administration (Department of Transportation) –Highway Safety Act –Interstate Commerce Act –Explosive and Dangerous Articles Act U.S. Army Corp of Engineers • Flood control planning should be coordinated with the U.S. Corp of Engineers. “NOAA” • Progressive situation reports of floods are available from the National Oceanic and Atmosphere Administration (NOAA). National Weather Service • The NWS begins issuing hurricane advisories as soon as there are indications a hurricane is forming and it is given a name. The purpose of an advisory is to: – Tell where the storm is located – Intensity of winds – Speed and direction of movement Bureau of Vital Statistics • Records of births, marriages and deaths The Age Discrimination in Employment Act of 1967 • Prohibits discrimination against applicants or employees over 40 years of age. Equal Pay Act of 1963 • Requires that employees receive equal pay for equal work, requiring equal skill, effort and responsibility regardless of sex; however, the employer may pay different rates at different establishments. The National Labor Relations Act • Known as the “Wagner Act” • The basic test of an unfair labor practice is whether it results in coercion or discrimination prohibited by the labor act. The National Labor Relations Act • Management representatives may not attend a union meeting. • Undercover operations are neither conducted nor authorized where and when labor organizing efforts or labor problems are occurring. The National Labor Relations Act • Advise security personnel that their actions will be considered “employer actions”. The National Labor Relations Act • When an employee reasonably believes that an interview may lead to or result in disciplinary action and requests that a union representative be present, union representation must be allowed (The Weingarten Rule). The National Labor Relations Act • Management is not required to advise an employee of this right of representation or to “bargain” with the union representative. The National Labor Relations Act • The NLRA specifically provides that guards and non-guard employees cannot be members of the same bargaining unit. The Labor Management Relations Act • Known as the Taft-Hartley Act • Forbids unions from: –Coercing an employer to pay for work not performed (Featherbedding) Labor Management Reporting and Disclosure Act • Known as the Landrum-Griffin Act • Established safeguards and restrictions on union officers and management conduct regarding their members, also prohibits either union or employer from “Hot Cargo” agreements. Labor Management Reporting and Disclosure Act • A “Hot Cargo” agreement is defined as one where the employer agrees to cease doing business with any person or to cease dealing in any products of another employer. Strikes • Economic Strike - The most frequent type • takes place where there is a vote to stop work because a satisfactory employment agreement has not been negotiated. • Economic strikes must be preceded by at least a 60-day notice that the union desires to modify the existing collective bargaining agreement. Strikes • The Unfair Labor Practice Strike • When strikers strike to force discontinuance of an alleged violation by an employer of the labor law. • This type of strike permits no time for effective planning by security. • All striking employees who request to return to their jobs must be allowed to do so by their employer. Strikes • Three phases of security involvement during strikes: –Pre-strike planning stage –Strike operation plan phase –Post-strike intelligence phase Strikes • The main goals of the security force during labor disturbances should be: – – – – – To lessen potential for violence To adequately deal with violence when it occurs To prevent death, injury, and damage to property To maintain order To preserve the integrity of the work site. Strikes • The security strike operations plan is a comprehensive statement of all policies, procedures and activities to be done during the strike period. Strikes • The security strike operations plan – The plan should be made available to each security supervisor and higher manager. – It should not contain sensitive information – Effective planning of access control indicates uses the fewest entries possible and those used should be located where easily policed. – Management should develop a prior policy, which is understood and adhered to by all parties, regarding arrests during a strike. A sound policy would be not to agree to amnesty for serious offenses (felonies). Strikes • The chief weapon of the strikers is the ability to discourage people from entering plant premises and to prevent movement of goods and materials to and from the plant. Strikes • “Lockout” - is the refusal of management to allow members of the bargaining unit on the premises. A “lockout” may be used legally in the face of an imminent violent strike; however, notice of a “lockout” must be given to the bargaining unit or a charge of unfair labor practice could result. Occupational Safety and Health Act (OSHA) • The Williams-Steiger Occupational Safety and Health Act (29 USC 651678) was signed into law in December 1970 and became effective on April 28, 1971. The primary responsibility for administration of this act falls upon the Department of Labor. Occupational Safety and Health Act (OSHA) • The statute states that every employee “affecting commerce” is subject to the provisions of OSHA. This means just about all employees in every industry are covered. One exception is the mining industry. Occupational Safety and Health Act (OSHA) • The general purpose of OSHA is to provide safe and healthful working conditions for employees. • All businesses are required under OSHA to have a person or persons trained in first aid available. Occupational Safety and Health Act (OSHA) • OSHA Form #200 - a log and summary of occupational injuries and illness. • OSHA Form #101 - a supplemental record of occupational injuries and illness. Occupational Safety and Health Act (OSHA) • An “injury” results from a single incident. A one time chemical exposure is an injury. • An “illness” is an abnormal condition or disorder caused by exposure to environmental factors in employment. Occupational Safety and Health Act (OSHA) • Records on all work-related deaths, injuries, and illnesses must be current and must be available to Labor Department inspectors upon request. All records concerning injury/illness must be maintained for at least 5 years. Occupational Safety and Health Act (OSHA) • If an on-the-job accident results in the death of an employee or the hospitalization of 3 or more employees, the nearest OSHA office must be contacted within 8 hours. Occupational Safety and Health Act (OSHA) • In Marshall vs. Barlow, the Supreme Court held that officials of OSHA cannot inspect businesses without first obtaining warrants. This ruling does not apply to a few specialized industries such as firearms and liquor industries. Occupational Safety and Health Act (OSHA) • It is not necessary for OSHA inspectors to show “probable cause” to obtain a warrant. The inspectors only must show that the inspection is part of a general administrative plan to enforce the safety laws. Occupational Safety and Health Act (OSHA) • When they find conditions of “imminent danger”, compliance officers may REQUEST, not demand shutdown. Occupational Safety and Health Act (OSHA) • Most citations allege violations of specific safety and health standards or of the posting and record keeping requirements. Occupational Safety and Health Act (OSHA) • Citations based on the “general duty” clause are increasing in frequency and will further increase if OSHA tries to regulate conditions such as workplace violence. There is no “free first bite” !! Occupational Safety and Health Act (OSHA) • Citations are not issued to employees. A citation is issued to the employer if employees fail to comply with safety and health standards. Occupational Safety and Health Act (OSHA) • • • • • • • Types of citations include; Imminent Danger Serious Violation Non-serious Violation De Minimis Violation Willful Violation Repeated Violation Occupational Safety and Health Act (OSHA) • Types of citations include; • Imminent Danger – any condition or practice such that a danger exists which could reasonably be expected to cause death or serious physical harm immediately, or before the imminence of such danger can be eliminated through the enforcement procedures provided by this act. Occupational Safety and Health Act (OSHA) • Types of citations include; • Serious Violation – a substantial probability that death or serious physical harm could result and the employer knew, or with the exercise of reasonable diligence, should have known of the hazard. A fine not exceeding $7,000 must be assessed. Occupational Safety and Health Act (OSHA) • Types of citations include; • Non-serious Violation – The condition is likely to cause injury, but not death or serious physical harm, or the employer did not know of the hazard. (A tripping hazard on a level surface). A fine of $7,000 or less may be imposed. Occupational Safety and Health Act (OSHA) • Types of citations include; • De Minimis Violation –No immediate or direct relationship to safety or health. Occupational Safety and Health Act (OSHA) • Types of citations include; • Willful Violation – The employer intentionally or knowingly violated the act, or was aware of a hazard and made no attempt to correct it. The minimum penalty is $5,000 - max. of $70,000 Occupational Safety and Health Act (OSHA) • Types of citations include; • Repeated Violation –a second or subsequent citation for violation of the same standard or general duty clause. The minimum penalty is $5,000 - max. of $70,000. The American With Disabilities Act of 1990 (ADA) • Regulations to implement Title 1 (Employment) are issued by the Equal Opportunity Employment Commission (EEOC). The regulations cover all employers with 15 or more employees in industries affecting commerce. The American With Disabilities Act of 1990 (ADA) • Those not protected under the Act: – Transvestites (Section 508) – Current illegal drug users (Section 510) – Homosexuals, bisexuals, persons with sexual behavior or compulsive gambling disorders, kleptomaniacs, and pyromaniacs (Section 511) The American With Disabilities Act of 1990 (ADA) • Any medical examination or inquiry into the disability of an applicant or employee is prohibited unless the employer can show a job relationship and a consistent business necessity. Medical examinations after an offer of employment has been made must be given to all prospective employees. The American With Disabilities Act of 1990 (ADA) • Readily achievable means easily accomplished without much difficulty or expense. • Accessibility means free of barriers that could prevent a person with impaired mobility from getting to a desired location in the facility, or to use lavatories, lounges, lunchrooms, public telephones, drinking fountains or other amenities. The American With Disabilities Act of 1990 (ADA) • The World Health Organization (WHO) definition of “impairment” is a permanent or transitory psychological, physiological, or anatomical loss or abnormality of structure or function (an amputated limb, paralysis after polio, diabetes, mental retardation, impaired hearing or sight). The American With Disabilities Act of 1990 (ADA) • The WHO definition of “disability” includes restrictions on, or the prevention of, carrying out an activity because of an impairment, in the manner or within the range considered normal for a human. The American With Disabilities Act of 1990 (ADA) • Under the ADA, a “disability” is a physical or mental impairment that substantially limits one or more of the major life activities of an individual. The American With Disabilities Act of 1990 (ADA) • The WHO defines “handicap” as a disability which interferes with what is expected at a particular time in one’s life (inability to care for oneself, communicating thoughts and concerns, developing a capacity for independent economic activity). Federal Sentencing Guidelines • The 1987 Individual Sentencing Guidelines tended to narrow the range of punishment for a certain crime and to standardize sentencing. Federal Sentencing Guidelines • The 1991 Organizational Sentencing Guidelines cover antitrust, money laundering, fraud, ERISA, securities, and environmental law violations. Federal Sentencing Guidelines • A $20 million gain to a company from an anti-trust violation could result in a criminal fine ranging from $1 million to $80 million depending on the guidelines applied. Federal Sentencing Guidelines • The deterrence and detection objectives are reached by requiring every company: – To make restitution to any party injured by the criminal conduct; and – To pay a fine which is not tax deductible Federal Sentencing Guidelines • The fine consists of a “base fine” which is multiplied by a “culpability score” to determine a minimum and a maximum range within which the court impose a fine. Federal Sentencing Guidelines • The “base fine” is the greater of: –The pre-tax gain to the company from the crime, or –The loss to any party intentionally injured by the crime, or –From $5,000 to $72,500, determined from a “level of seriousness” table. Federal Sentencing Guidelines • In determining the “culpability score”, every business starts with a rating of 5 and aggravating or mitigating factors move the score within the range of 0 to 10. Federal Sentencing Guidelines • Aggravating factors, include; – Participation, tolerance, or disregard of criminal conduct by high level personnel or substantial authority personnel in a large organization. (Add 5 points). – A history of similar conduct within the last 5 years. (Add 2 points) – Obstruction of justice in the course of the investigation, prosecution or sentencing. (Add 3 points) Federal Sentencing Guidelines • Mitigating factors, include; – Self-reporting, cooperation with an investigation, and accepting responsibility for the conduct of the organization. (Subtract 5 points) – An effective compliance program(s) to prevent and detect criminal conduct. (Subtract 3 points) Federal Sentencing Guidelines •An effective compliance program has seven mandatory components: Federal Sentencing Guidelines • 1. Establishment of compliance standards which are reasonably capable of preventing criminal conduct. • 2. Specific responsibility for high level management to oversee the standards. Federal Sentencing Guidelines • 3. Communication of standards and offering training in compliance issues to employees. • 4. Tests of the compliance system with auditing, monitoring, and other tests designed to detect criminal conduct. Federal Sentencing Guidelines • 5. Due care to insure that discretionary authority is not delegated to individuals with a propensity to engage in illegal conduct. • 6. Enforcement using disciplinary procedures which include provisions for discipline of individuals who fail to detect or report an offense. Federal Sentencing Guidelines • 7. All reasonable steps, after an offense has been detected, to prevent a future similar occurrence. Federal Sentencing Guidelines • A determination, after the fact, that an effective compliance program did not exist will probably result in a probation status which may require that the company: Federal Sentencing Guidelines • 1. Publicize its criminal acts at its own expense as directed by the court. • 2. File periodic financial reports with the court • 3. Submit to periodic examination by court appointed experts. The End