Sie sind auf Seite 1von 13

Security Training Academy

Security Training Academy


SECURITY GRADE D NOTES

MODULE 1:

BASIC FIRE FIGHTING


It is important what to do and to do when fighting a fire because this
knowledge can save your life.

DO'S

Ensure back-up assistance


Ensure that an escape route is available
Follow instructions on the extinguisher's label
Break the seal and remove the safety device.
Check the operating milt
Apply the extinguisher medium to the base of the flames
Drive the flames away from you
For vertical fires start at the base of the flame and move upwards
If the fire is outside approach the fire from the windward side.
When approaching fire adopt a crouching approach attitude which provides
some protection against heat and smoke.
Keep alert for any changes in the fire pattern.
When tackling a fire involving electrical equipment isolate power as soon as possible
to prevent re-ignition.
Ensure that the fire is completely extinguished and no sparks remain

DON'T S

Do not place yourself at risk


Never tilt or invert any fire extinguisher
Never walk on the spillage area in case the flames flesh back.
When tackling flammable liquid fires using controllable discharge type extinguisher
medium until the fire is completely extinguished.
When the fire is extinguished, back off slowly and never turn your back on it.

VERSION 1/2015 Page 1


Security Training Academy

CLASSIFICATION OF FIRES AND TYPES OF FRE EXTINGUISHERS


Classes Description Examples Fire Extinguisher Color of label
of fires
Class A Solid Wood; coal; R e d
p l a s t i
combustible
c Water
material
Class B Flammable liquids Oil; Foam Yellow
Petrol;
benzen
e
Class C Electrical Generat BCF Green I
appliances ors;
cables
Class D Metals Magnesi Dry Blue
um; chemical
aluminu Powder
m;
sodium
Methane;
L Class E Flammable gas Carbon Dioxide Black J
butane

All fires involve 3 common elements:


Fuel; oxygen; and heat.
Chain reaction necessary to start the fire.

METHODS OF STARVING THE FIRE

Close windows and doors


Blanket small fire with a bag
Hose down hot walls and floors or the fire.
Saturate with appropriate extinguisher.
Drag combustible articles away or cool them with water.
Keep bystanders away.
Turn off all electric mains
Clear gates and paths for fire brigade to arrive when fire brigade arrives indicate
location of fire.

MODULE 2:

RADIO COMMUNICATION

Sometimes the two-way radio is the only link between the Security Officer and the
control room. Therefore, it is necessary that the Security Officer knows the phonetic
alphabet to prevent misunderstandings or messages received wrongly.

VERSION 1/2015 Page 2


Security Training Academy

SECURITY OF COMMUNICATIONS

Based on the principle that "enemy listens", every effort must be made to
safeguard the information transmitted over the air. Examples which must be
safeguarded are:
 Information received from delicate sources.
 Inters and Satraps of a classified nature.
 Future intentions on operations
 Movement of bullions and cash, etc...

PHONETIC ALPHABET

A – ALPHA N - NOVEMBER
B – BRAVO O - OSCAR
C – CHARLIE P - PAPPA
D – DELTA Q - QUEBEC
E – ECHO R - ROMEO
F – FOXTROT S - SIERRA
G – GOLF T - TANGO
H – HOTEL U - UNIFORM
I – INDIA V - VICTOR
J – JULIET W - WISKEY
K – KILO X – X-RAY
L – LIMA Y - YANKEE
M – MIKE Z – ZULU

MODULE 3:

BASIC OCCUPATIONAL SAFETY

It is important for us to know how an accident happens and how to prevent it, and how
unsafe acts and conditions can affect us in a working situation.

DEFINITION OF AN ACCIDENT

An accident can be defined as an undesirable event often caused by unsafe acts and
conditions. It can damage property and injure personnel. Accidents are the result of lack
of control. Accidents don't just happen. It is direct result of a person acting in an unsafe
manner. The result of unsafe condition that has been left unattended

CAUSES OF AN ACCIDENT

Lack of knowledge Physical


or mental defect
Inadequate work standard
Improper attitude unsafe conditions.

VERSION 1/2015 Page 3


Security Training Academy

UNSAFE ACTS

Working at unsafe speed — example driving a forklift at a high speed inside the
workshop.
Failure to secure machinery and materials
Rendering safety devices inoperative.
Arranging items in an unsafe manner

UNSAFE CONDITIONS

Unsafe construction
Lack of guards (protective covers for machines)
Uneven or slippery floors
Poorly lit up areas
Unsafe storage of hazardous substances.
Committing unsafe acts
Creating unsafe conditions

REPORT UNSAFE ACTS AND CONDITIONS

Report to the supervisor. If no supervisor is present, make an entry in the


occurrence book. Make sure that the entry has been brought to management
attention.
Causes of accidents on a percentage basis — unsafe acts 88%, unsafe conditions 10%
and providence %.

MODULE 4:

PUBLIC RELATIONS

It is important that the Security Officer know how to deal with people to
create favorable impression and to avoid conflict.

FAVOURABLE IMPRESSIONS

Smartly dressed
Have a professional attitude
Communicate effectively
Show concern
Demonstrate good manners

VERSION 1/2015 Page 4


Security Training Academy

POINTS THAT CONTRIBUTE TO POOR RELATIONS WITH THE GENERAL PUBLIC

Poor attitude
Crude Speech
Incompetence
Rumor Spreading
Impoliteness
Exploitation
Abuse of authority
Poor communication
Disinterest

MODULE 5:

POCKET BOOK

It is important to us as we are frequently involved in arrests, investigations and


then have to give evidence in court.

REASONS FOR KEEPING A POCKET BOOK

To provide permanent personal record on hours and work performance.


For recording instructions, messages and incidents during course of duties.
To record details of found property.
To record particulars of fires, accidents, enquiries, suspicious persons and
vehicles and information that can be of assistance in an investigation.
To record all arrests made and the explanation of the accused.
To record all irregularities and hazards observed during period of duty.

AS EVIDENCE IN COURT

To be used as evidence in court


To remember particulars of a case to be used in court
Particulars of arrests and investigation to be used in court
Information that assist in the investigation.

The information written into the pocket book must answer the following critical
questions: Who; When; Where; what; Why; and How. The pocket must always be kept
neat and clean. It is an official document and no pages must be torn out or entries
raised or altered. All entries must he made with pen. (Black and Red).

VERSION 1/2015 Page 5


Security Training Academy

MODULE 6:

ACCESS CONTROL

This module is important because it is necessary to know how to control


people, parcels and vehicles entering the premises.

DEFINITION OF ACCESS CONTROL

Access control is the application of systems or methods to control


access/exits/passage of people. Vehicles and parcels/goods into and out of
premises.

REASONS FO ACCESS CONTROL

Who has access and to which area.


Egress procedure
How are they identified?
How are they monitored during their period of duty/visit?
Observing all orders relating to access control.

FUNCTIONS AT ACCESS CONTROL

Supervisions of entry/exits of all regular employees.


Regulating of all parcels entering or leaving the premises.
Control of all visitors or contractors entering the
premises. Issuing of permits to authorized visitors
Keeping of a visitor’s log book
Conducting searches.
Maintaining a record of all vehicles entering or leaving
premises.

THE 3 "D" PRINCIPLES

Access control is based on 3 "D" Principle: Denial; Detection; deterrence.

DENIAL
This is the first line of defense and includes all the measures and aids which
prevent an unauthorized person from entering the premises. This includes the
following gates; guards; fences, etc...

DETECTION
If the intruder succeeds to break through the first line of defense he must be
discovered, apprehended and removed before he has the opportunity to commit a
crime. The following aids are used guards, dogs, alarms, CCTV. Etc...

VERSION 1/2015 Page 6


Security Training Academy

DETERRENCE
The more barriers for the intruder to encounter the lesser his chances become in
achieving his aim. Quite often this psychological deterrent is enough to turn him
away. The following aids can be used fences; gates; dogs, etc...

SECURITY KNOWLEDGE
Utilizing of all aids
One official language
Task description
Powers of observation
Legal aspects
Behavioral patterns
Permits and waybills
Access and Egress procedures
Immediate action drills
Emergency procedures
Radio communication

AIDS TO EFECTIVE ACCESS CONTROL


Fences Alarms Lights Burglar-proofing Locks
Electronic gates/booms Guards Dogs Strong Rooms.
Safes CCTV

THE FOLLWING PROCEDURES TO BE FOLLOWED WHEN THE VISTOR


ARRIVES:
 Gr e et t h e vi si t or
 Ask if you could assist him
 Ask him to identify himself (ID document)
 Determine who and what department he want to visit.
 Determine whether he has an appointment.
 Determine whether he has a firearm to declare — issue a receipt — put away in
safe.
 Complete visitor register
 Issue permit and arrange escort; and
 Thank the visitor for his time when leaving
 Take permit back
 H a n do v er fi r e ar m
 Writ e t h e l e avi n g
 Ask if he has any company property to declare; and
 Wish him a safe journey.

VERSION 1/2015 Page 7


Security Training Academy

MODULE 7:

SEARCH PROCEDURES AND TECHNIQUES

It is important for Security Officer to know how to conduct a search and how to
follow the procedures of searching.

THE GOLDEN RULES OF SEARCHING

 Identi fy the person


 Search systematically and thoroughly
 Put yourself in the place of the person to be searched and determine where you
will hide an article.
 Be alert against any possible attack during the search.
 A search must always be conducted within the bounds of the Criminal
Procedure act.

WHAT TO LOOK FOR DURING SEARCHES?

 Suspicious objects and/or weapons.


 Prohibited habit forming drugs and/or
liquor.
 Precious metals and/or stolen
property.

SEARCHING OF VEHICLE

Determine if the vehicle may enter or leave the premises


To search a motor vehicle thoroughly takes a long time and searches are
normally done superficially
The time to search a vehicle thoroughly cannot be justified unless there are good reasons
to do so. There are many hiding places in a vehicle, but if the search is done
systematically and thoroughly most items come to light.

PROCEDURE TO BE FOLLOWED

The persons in the vehicle must be informed that they and the vehicle are liable to
be searched.
All persons should be told to get out of the vehicle.
One Security Officer must do the searching whilst the second Security Officer stands
back and supervise the search.
He will inform the searcher which places still to be searched.
If a person refuses to be searched or have his vehicle searched, he will be denied
access to the premises

VERSION 1/2015 Page 8


Security Training Academy

EXTERIOR

Number plates
Under mudguards and bumpers.
Under the car — look for newly painted areas on underside, welded plates or unusual
additions

INTERIOR
The car must be searched from front to near.

ENGINE COMPARTMENT
Air filter
Lift battery' and look underneath
Heater.

PASSENGER COMPARTMENT

Dashboard pockets and/or cubby holes


Behind dashboard
Check weights of doors
Wind down windows
Check all seats
Lift movable mats
Check under seats
Rear window panel shelf

COMMERCIAL VEHICLES

Between twin rear wheels


Packing sacks or containers
Drivers cab
All along the chassis
Under the seat of the cab
On the inside of the spare wheel
Hidden against the tail-board of a loaded vehicle
Look for false bottoms in vehicle with wooden body

MOTORCYCLES

Petrol tanks
Toolbox or case
Rubber handle or grips
Foot rest
Lamps
Mudguards and all hollow tubular frameworks should be examined.

VERSION 1/2015 Page 9


Security Training Academy

BICYCLES

Handle bars and rubber grips


Bells and bicycle pumps
Lamps and dynamos
The saddle
All tubular frameworks
Under mudguard and chain case
Sacks and tool bags.

PROCEDURES IN DOING ROUTINE CHECKS

Obtain permission to search


Request person to stand with his legs apart and arms raised
Run hands quickly but thoroughly over the body, head to toe.
Clothing should be rolled between the fingers to discover even the smallest object.
If suspect let him stand facing the wall or vehicle with his hands on the structure.
Routine checks normally imply the checking of ID. Documents.

The following should be checked

Photograph
Compare the photograph in the document with the holder. Should the person be
wearing a hat and there is a problem regarding identification asks him to remove the
hat?

Stamp
Careful examination of the stamp to ensure that it is genuine and original.

Condition of Document
Check the date of issue against the condition of the document. There should be
reason for suspicion if a new document is in poor condition and vice versa.
Avoid leading questions.

PROCEDURE IN SELECTING COMPANY EMPLOYEES FOR SEARCHING

The selecting of company employees for searching can be done electronically or


manually. Some company's use a computer which is programmed to select the person
as they pass the turnstile or door. Other makes use of color cards or balls which
employee draws. The following must be kept in mind when selecting employees to be
searched:
 Don't discriminate against race, religion or sex.
 Don't select the same person every day.
 Stay friendly
 Don't make jokes about it.

VERSION 1/2015 Page 10


Security Training Academy

When searching a person, the following arrears must be covered:


 Under the arms
 Th e st o m ac h
 Inside the thighs and crutch
 Turn-ups of trousers, seems and padded areas.
 Headgear must be removed and searched
 Overalls and clothing in the hands.

When searching a briefcase or parcel:


 Do not damage everything
 Obtain permission before searching.
 Ask owner to open own briefcase or parcel.
 Check for false bottoms or compartments.
 If anything suspicious report to senior.

MODULE 8:

LEGAL ASPECTS

It is important that the Security Officer know that there are certain laws against the use
of another person’s vehicle without his consent and know which articles may be seized
in terms of Criminal Procedure Act during a search.

UNAUTHORIZED ACTS; SECTION 123 (1) ROAD TRAFFIC 29/1989

a. sta rt t he v e hi cl e
b. put the vehicle into gear
c. tamper with the machine or any part of the vehicle
d. enters or climbs upon that vehicle
e. If you ride in or drive that vehicle upon a public road without permission.

SECTION 20: SEIZE OF ARTICLES BY THE STATE

a. which i s concerned
b. which may afford as evidence
c. Which - is intended to be used?

SECTION 1 (1) OF THE GENERAL LAW OF AMENDMENT

Any person who, without a bona fide claim or right and without the consent of the
owner or person having control thereof, removes any property from the control of the
owner or any other person competent to give such consent, whether or not he
intends throughout to return the property to the owner or person from who's control
he removed it. Shall, unless it is proved that such person, at the time of the removal,
had reasonable grounds for believing that the owner or such person would have
consented to such use if he had known about it, be guilty of an offence.

VERSION 1/2015 Page 11


Security Training Academy

SECTION 36 OF THE GENERAL LAW AMENDMENT ACT

Any person who is found in possession of any goods other than stock or produce of which
there is reasonable suspicion that they have been stolen and is unable to give a
satisfactory account of such possession shall be guilty of an offence and liable on
conviction to the penalties which may be imposed on a conviction of theft.

GROUNDS OF JUSTIFICATION — CONSENT

Se arches must be conducted within the framework of the law. Whenever a search
is done, it must be done with strict regard to decency and order. If the provisions of
the Criminal Procedure Act don't apply on the specific situation the only way to
conduct the search is by getting his or her consent.

REQUIREMENTS OF CONSENT TO BE VALID

a. Person who consent must be capable to exercise his will


 He is not under the influence of drugs or liquor.
 He does not suffer from mental defect and is mature to appreciate the
implications of his consent

b. He must have the authority to consent.


 Consent can only be given by a person who or whose property will be search

c. Consent must not be contrary to public morals.


 If a lady consents to a body search by a man, it will not be regarded as valid.

d. Consent cannot be withdrawn after the act has started.


 It must be withdrawn before the search has started.

e. Consent must cover the whole act.


 Consent to search a briefcase is not a consent to do a body search.
 If a person consents to be searched by a specific person. Another person can't
do the search.

f. Consent must be voluntary.


 Consent obtained through the use of threats is not valid.
 It is only valid if the person understands the implications of the consent.
 Consent fraudulently obtained will not be valid.

MODULE 9:

SELF DEFENCE AND MINIMUM FORCE:

VERSION 1/2015 Page 12


Security Training Academy

PRACTICALS

VERSION 1/2015 Page 13

Das könnte Ihnen auch gefallen