StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Private Security Law - Essay Example

Comments (0) Cite this document
Summary
Private security law Name: Institution: Abstract Certain kinds of private security conduct may lead to legal liability on the part of the organization. Some acts that present potential risks are the excessive use of force and of unauthorized firearms, as well as intimidating comments and illegal searches…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Private Security Law
Read TextPreview

Extract of sample "Private Security Law"

Download file to see previous pages Private security agencies have played a vital role in preventing, detecting and investigating instances of crime on the employer’s premises (Dempsey, 2010). Private security agencies have engaged in activities such as cash transportation, building surveillance using closed circuit televisions (CCTVs) and alarm systems, and private investigation of crime (Dempsey, 2010). Private security law is contained in the Private Security Officer Employment Authorization Act of 2004, which licenses and provides guidelines for the operation of private security services and agencies (Dempsey, 2010). When it is necessary to search an individual on your employer’s premises, there are certain legal risks which the security persons should be concerned about. These legal risks present potential causes of action against the personnel. Laws protect individuals from being searched, since security personnel are not authorized to search individuals for the purpose of finding evidence to arrest them (Maxwell, 1992). To have an opportunity to conduct the search, security personnel should first detain the individual after discovering the ongoing crime (Maxwell, 1992). Security personnel should not assist in, or allow any opportunity of, disposing the items stolen from the premises. According to Penal Code 846, a member of security personnel is allowed to search for weapons only if he or she believes that he or she is in physical danger after detaining the suspect. The searching officer must be in uniform and a badge to avoid any misunderstanding between him and the suspect (Dempsey, 2010). Some potential risks that can lead to criminal liability during the search include intimidation of the suspect to make him or her cooperate and confess the crime (Maxwell, 1992). Another potential risk includes the use of excessive physical force which is unreasonable in restraining the suspects who resist the search (Pastor, 2007). Use of excessive and unreasonable force will lead to both criminal and civil liability of the private security personnel. For instance, discharging a firearm and shooting the suspect in order to ensure the safety of the employer’s property will lead to criminal liability, since deadly force is only permissible in protecting human life (Maxwell, 1992). The use of unauthorized deadly weapons such as switch-blade knives and guns will also lead to criminal liability. For instance, proprietary security guards are usually unarmed and thus cannot carry or use any weapons such as knives, batons and guns during the search, since they are deadly weapons. The unlawful use of defensive weapons like batons or making misdemeanor arrest will lead to criminal liability, since the security guard has not actually observed the suspect committing the crime (Maxwell, 1992). If the there is a reason to believe that a particular employee of your employer was engaging in anonymous harassment of a co-worker and you wanted to confront the individual in a meeting in your office, there are several steps that you can undertake in order to reduce the legal exposure of the company by the alleged harasser arising from the meeting. The investigator should desist from spreading any rumors, gossip or false statements about the alleged harasser and should conduct fair and impartial investigations before the meeting in order to avoid causing personal harm to the alleged haras ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Private Security Law Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Private Security Law Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/law/1456182-private-security-law
(Private Security Law Essay Example | Topics and Well Written Essays - 750 Words)
Private Security Law Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/law/1456182-private-security-law.
“Private Security Law Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/law/1456182-private-security-law.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Private Security Law

Organization and Functions of Federal Law Enforcement Agencies

Threats may either appear in the form of terrorism or from other intelligence groups or from the espionage. It may arise within the country, against the existing government or social systems. Though most of the federal law enforcement groups are investigative groups, they are not only focused on investigations but stand for the people. One can see that the importance of the federal agencies is growing day by day because the threats from militants and others have considerably increased. Such kinds of federal law enforcement agencies include Federal Air Marshalls, Secret Service, FBI, Untouchables, C.I.A and Federal Corrections etc. The organization and functions of these agencies vary in different fields and can be cited in the fol...
7 Pages(1750 words)Case Study

Constitutional and Administrative Law

When examining the decision of previous court comments that are made obiter dicta will not be part of the precedent since often obiter dicta comments are speculative remarks on how the judge might have acted if the facts had been different.

Binding precedents come from earlier case law and, as suggested in the wording, must be followed even if the judge in the present case does not agree with the legal reasoning of the judge in the earlier case. In order for a precedent to be binding the facts of the present case to have to be sufficiently similar to the earlier case. Decisions given in a lower court to the one in which the present case is being heard will not be binding. For a decision to set a precedent it must have b...
8 Pages(2000 words)Assignment

The Relationship Between Security, Risk and Health in a Large Organisation

Managers in modern organizations tend to use appropriately customized policies – in accordance with their firms’ needs and resources (employees, funds, technology) available. The current paper focuses on the examination of the various aspects of security, risk, health and safety within large organizations; Particular emphasis is paid on the fact that the demands of each one of these factors may be differentiated under the pressure of the market conditions and the organizational priorities. The case of Shell in Nigeria has been used as an example in order to show the potential co-existence and interaction of these factors within a specific organizational environment. The measures required and the role of the security ma...
9 Pages(2250 words)Coursework

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

International Law: Child Soldiers

Using children to fight wars is not only morally abhorrent but very bad very the physical and mental health of the children in question. That is in part why a series of international laws and treaties have come into effect to try to deal with this scourge. But the issue is more complicated than that. While child soldiers are victims of war crimes, they too can also perpetrate serious breaches of the law of armed conflict. Under normal circumstances, individuals who commit such acts, be they combatants or not,2 would be vulnerable to prosecution. However, because children in such situations are victims as well as perpetrators and because of the special protections afforded to children under international law, many have questioned w...
8 Pages(2000 words)Case Study

Role of the Police and Private Security

... terrorism. Hence understanding the criminal justice system is extremely important so that it may be implemented effectively and impartially. Hence, this report will also cover the following areas namely, the three levels of law enforcement in United States, the interaction between those agencies, the role of the police and private security personnel in homeland security, the role of this group in intelligence gathering and federal funding. Three levels of law enforcement: The three levels of law enforcement in the United States cover national, state and local security. This task of homeland security is the responsibility of the Federal Bureau of Investigation (FBI), the state police forces, and the local police force. Each of them has...
8 Pages(2000 words)Case Study

The Law and the Media

New and complex issues have arisen which demanded fresh understanding and handling of cases involved them. This has resulted in the enhanced development of specialized laws e.g. cyber laws and interpretation of those laws. The same is true with Media Laws. Media has developed much in the last half-century. As it evolved as a profession and more people started to join it, there arose the levels of money involved in it. With this grew the contractual obligations on the parts of parties and concerned laws e.g. patent laws, privacy laws, and copyrights laws, etc. also started to play their parts. With these issues, the role of law in the media industry also reached a new height.
Mathew Fisher, the appellant, joined a band with Mr...
6 Pages(1500 words)Assignment

Juvenile Delinquency and Education: A Comparison of Public and Private Education

... behavior causing attributes. Social care and development would require major time and initiative investments as well as the correct services which work hands on with such children and their respective families. The most effective way in which this can be done is to keep in mind the rights of children rather than any other individuals or communities. Private sector education should immediately report abuse, deal with social and societal discrimination both, support young by providing them with jobs, and provide a healthy put turn of volunteers, tutors, mentors, and advocates for youth. Local governments and communities can enforce vigorously juvenile delinquency laws and make available other activities and alternatives available. Moreover...
6 Pages(1500 words)Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Private Security Law for FREE!

Contact Us