1/264
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What does the Private Security and Investigative Services Act (PSISA) regulate?
It governs Ontario's security and investigations work roles, actions, and responsibilities in the security industry.
When were most regulations of the PSISA implemented?
In 2007.
List the three Ps of Protection under the PSISA.
People
Property
Proprietary Information (confidential data).
What must security guards carry while on duty?
Their licenses, including for plain-clothes security guards.
What is a key principle regarding documentation in security?
If you did not write it down, it did not happen.
What are the basic responsibilities of physical security?
Ensuring the physical security of people, property, and private information, and reducing the risk of loss to assets.
What are the two basic components of physical security?
Soft physical security (rules and procedures) and hard physical security (physical barriers and devices).
What is the rule of gates in physical security?
If you don't need it, keep it locked and check it.
What are the steps in the physical security and threat assessment process?
Identify potential threats. 2. Expose loss events. 3. Assess probability and impact. 4. Determine countermeasures.
What are the objectives of barriers in physical security?
Define property boundaries, deter unauthorized entry, delay entry for checks, and channel flow of people.
What are the types of threats in physical security?
Natural threats (weather-related), intentional threats (crimes), and inadvertent threats (accidents/errors).
What does risk acceptance mean in risk mitigation?
Acknowledging potential loss but deciding it is not worth the cost to avoid it.
What is risk avoidance in risk mitigation?
Eliminating hazards or activities that could negatively affect the company's assets.
What is risk transfer in risk mitigation?
Shifting a pure risk from one party to another, such as purchasing insurance.
What is risk reduction in risk mitigation?
Implementing measures to reduce the frequency or severity of losses, like safety inspections.
What is the goal of layered protection (defense in depth)?
To deter, detect, delay, and defend against threats to assets.
What is the importance of surveillance techniques in security?
To monitor activities and detect potential threats, using covert or overt methods.
What is the purpose of patrols in security?
To ensure safety and security of people and property.
What is the significance of documentation and report writing in security?
It provides a record of incidents and actions taken, essential for accountability.
What is the role of alarm response in security?
To react to alarm signals and investigate potential security breaches.
What are the ten recommendations of Aggressive Protection?
They include knowing your area, verifying information, checking barriers, and focusing on prevention.
What is the significance of understanding the physical security process?
It helps in identifying vulnerabilities and implementing effective security measures.
What is the impact of natural threats on security planning?
They require evaluation based on historical trends and environmental factors.
How can security professionals prepare for inadvertent threats?
Through preparation, education, and awareness of potential risks.
What is overt surveillance?
Surveillance that is visible to the public, such as a uniformed security guard on foot patrol.
What is covert surveillance?
Surveillance that is hidden from the public, often using hidden cameras or other discreet methods.
What are some activities that security teams aim to deter?
Trespassing, damage to property, drug dealing, arson, shoplifting, fighting, and break-and-enter.
What strategies do security teams use to deter unauthorized activities?
Installing locks, CCTV systems, tall fences, and enforcing property rules.
What types of hazards should security teams be looking to detect?
Fire hazards, malfunctioning equipment, suspicious vehicles, tampering signs, and disorderly conduct.
What is the purpose of delaying unauthorized activities?
To allow security, police, or bystanders to intervene before a crime occurs.
What is the main goal of a security program?
To deny unauthorized entry or activity within assigned properties.
What are mobile patrols?
Patrols conducted in a marked vehicle to cover larger areas quickly.
What are foot patrols?
The most common type of patrol, allowing for close inspection and better public relations.
What are fixed post patrols?
Patrols that create a strong security presence at specific locations like gatehouses or lobbies.
What is a visual patrol?
CCTV monitoring conducted by the Security Operations Center Dispatcher to support ground patrols.
When should patrols be conducted?
At irregular times to prevent predictability and counter-surveillance.
What items should a security guard have before starting a patrol?
A site floor plan, flashlight, radio, weather-appropriate clothing, and a cell phone.
What should security guards check for in vacant suites?
Signs of intrusion or theft.
What should be checked in washrooms during patrols?
Unauthorized activity, leaks, and unusual occupancy.
What are common hazards to look for during floor-by-floor checks?
Litter, spills, signs of break-ins, broken light bulbs, and unlocked doors.
What types of alarms are there in security systems?
Intrusion alarms, fire alarms, and special purpose alarms.
What is the role of central alarm stations?
To monitor alarms from an off-site location.
What are contact switches used for in alarm systems?
To detect unauthorized entry through doors and windows.
What is the purpose of pressure devices in alarm systems?
To detect unauthorized access through pressure-sensitive mats.
What do motion detection systems use?
Passive infrared, microwave, or ultrasonic technology to detect movement.
What is the significance of layered protection in security?
It involves using multiple security measures to create a more effective defense.
What is the importance of risk mitigation strategies in security?
To minimize potential risks and enhance the safety of the property.
What is the purpose of Asset Protection in security professions?
To safeguard assets from theft, damage, or loss.
What are Risk Mitigation strategies?
Techniques used to reduce the potential impact of risks in security operations.
What does Layered Protection (Defense in Depth) refer to?
A security strategy that uses multiple layers of defense to protect assets.
What is the difference between Covert and Overt surveillance?
Covert surveillance is hidden and discreet, while overt surveillance is visible and obvious.
What is the primary purpose of patrols in security?
To monitor and ensure the safety of an area or property.
What is Basic Alarm Response?
The initial actions taken when an alarm is triggered to assess and respond to a potential threat.
What is the focus of Section A in the course?
Use of Equipment in security operations.
What are some key functions of Computer Use in security?
Access control, parcel control, special occurrence reports, and video surveillance system monitoring.
Why is Telephone Etiquette important in the security industry?
It facilitates effective communication with clients, vendors, and associates.
What should be done when answering a business phone?
Answer within three rings with a positive greeting and state your name and the business name.
What is a best practice when placing a call?
State your name before asking for the person you are calling.
What should you avoid when answering the phone?
Eating, chewing, or drinking, as it can affect clarity and professionalism.
What is the protocol for transferring a call?
Inform the caller before transferring and confirm the availability of the person receiving the call.
What is the role of Two-Way Radios in security?
To facilitate communication among security personnel and contractors.
What are common errors in radio communication?
Not pausing before talking, forgetting to press the button, and mumbling.
What is the policy regarding personal device use in security?
Personal cell phones are generally prohibited during work hours, except for emergencies.
What is the purpose of notebooks in security reporting?
To document field notes that can serve as evidence in court.
What can reporting software help security guards with?
Writing daily occurrence reports, managing access control, and tracking maintenance requests.
What is Key Management software used for?
To keep keys secure and organized, recording all key transactions.
What is the significance of a positive closure when ending a phone call?
It leaves a good impression and shows respect for the caller's time.
What should you do if you do not know the answer to a caller's question?
Say, 'I'll check on that for you' instead of 'I don't know.'
What is the recommended distance to hold a phone for clarity?
Two fingers from the mouth.
What should you do if a call needs to be put on hold?
Ask for permission first and offer the option to leave a voicemail.
What is the recommended action if a radio transmission will take longer than 30 seconds?
See someone in person or use the phone instead.
What is the importance of being alert and vigilant in security?
To ensure safety and respond effectively to potential threats.
What is the function of a Video Surveillance System (VSS)?
To monitor and record activities in a designated area for security purposes.
What does the automated notification system do?
It sends notifications to management and residents whenever a key is picked up or returned.
What feature does the touchscreen interface provide?
It allows for easy tracking of keys, showing whether they are in or out and who has them if they are out.
Who are some types of guests that security personnel may manage?
Visitors, employees, shoppers, contractors, real estate agents, emergency personnel, and Elections Canada personnel.
What should security personnel do if someone challenges access control rules?
Remain firm in proportion to the level of resistance while maintaining professionalism.
What is required of contractors conducting work on the property?
They are usually assisted and directed by security and must sign in, with prior written notice of the work provided.
What do real estate agents typically present to security for access?
A business card, which is documented along with the suite they are showing and their times of arrival and departure.
What is the purpose of lockboxes for real estate agents?
They allow agents to access properties for sale without needing to rely solely on security personnel.
What rights do Elections Canada personnel have regarding access?
They have the right to enter common areas and solicit votes door to door during elections.
What does CCTV stand for?
Closed Circuit Television.
What is an advantage of CCTV?
It is not accessible from the exterior of the property, making it secure from external hacking.
What is a disadvantage of CCTV?
It cannot be accessed remotely, which can be inconvenient.
What does VSS stand for?
Video Surveillance System.
What is the primary purpose of video surveillance systems?
To help prevent crimes and provide evidence for investigations.
How does video surveillance protect company property?
It records incidents of vandalism or theft, aiding police investigations.
In what way does video surveillance protect people?
It records criminal activity and monitors visitor access, ensuring safety.
How can video surveillance improve productivity?
It allows managers to monitor guard performance and employee adherence to safety rules.
What role does video surveillance play in record keeping?
It helps verify customer claims and interactions, providing evidence in disputes.
What is one benefit of having a surveillance system?
It increases the sense of security for people in the building.
How can surveillance systems discourage crime?
The presence of cameras can deter vandalism and theft before they occur.
What is a caution regarding surveillance systems?
Employee privacy should be respected, and footage should only be reviewed when necessary.
How does video surveillance facilitate investigations?
It provides undeniable proof of events with timestamps and can include audio recording.
What is the impact of knowing one is being recorded on employee behavior?
It tends to reduce time-wasting and can improve overall productivity.
What is one major benefit of installing security cameras?
They deter crime by making potential offenders think twice about their actions.
How can security cameras affect insurance premiums?
Having a video surveillance system can dramatically reduce insurance premiums by lowering the risk of claims.
What role do security cameras play in monitoring activities?
They help monitor suspicious or prohibited activities by providing real-time surveillance.
How can security cameras assist in legal situations?
They gather evidence through high-quality video and audio recordings, which can clarify events during disputes.
What is a significant drawback of security cameras related to privacy?
They can lead to privacy concerns, as employees may object to constant surveillance without consent.